Penetration Testing mailing list archives
Re: HEAD request
From: Rogan Dawes <rogan () dawes za net>
Date: Mon, 11 Sep 2006 22:36:03 +0200
Ory Segal wrote: [snip]
And make sure that the file has the two CRLFs after the request, for example: HEAD / HTTP/1.0 [CRLF] [CRLF] -Ory Segal
One easy way to get this right is using the shell printf command: $ printf "HEAD / HTTP/1.0\r\n\r\n" | nc -v target 80 That makes sure that the CRLF is done correctly.If you are stuck on a Win32 platform, you can use the Cygwin environment to get a usable printf.
Rogan ------------------------------------------------------------------------ This List Sponsored by: Cenzic Need to secure your web apps? Cenzic Hailstorm finds vulnerabilities fast. Click the link to buy it, try it or download Hailstorm for FREE. http://www.cenzic.com/products_services/download_hailstorm.php ------------------------------------------------------------------------
Current thread:
- Re: HEAD request, (continued)
- Re: HEAD request Steffen Wendzel (Sep 11)
- RE: HEAD request StyleWar (Sep 11)
- RE: HEAD request Sels, Roger (Sep 11)
- Re: HEAD request Mike Klingler (Sep 11)
- RE: HEAD request Paul Melson (Sep 11)
- RE: HEAD request Ory Segal (Sep 11)
- RE: HEAD request Ory Segal (Sep 11)
- RE: HEAD request Levenglick, Jeff (Sep 11)
- RE: HEAD request balaji . v (Sep 11)
- RE: HEAD request Ory Segal (Sep 11)
- Re: HEAD request Rogan Dawes (Sep 11)