Penetration Testing mailing list archives

Re: HEAD request


From: Rogan Dawes <rogan () dawes za net>
Date: Mon, 11 Sep 2006 22:36:03 +0200

Ory Segal wrote:
[snip]

And make sure that the file has the two CRLFs after the request, for
example:
HEAD / HTTP/1.0
[CRLF]
[CRLF]

-Ory Segal



One easy way to get this right is using the shell printf command:

$ printf "HEAD / HTTP/1.0\r\n\r\n" | nc -v target 80

That makes sure that the CRLF is done correctly.

If you are stuck on a Win32 platform, you can use the Cygwin environment to get a usable printf.

Rogan


------------------------------------------------------------------------
This List Sponsored by: Cenzic

Need to secure your web apps?
Cenzic Hailstorm finds vulnerabilities fast.
Click the link to buy it, try it or download Hailstorm for FREE.
http://www.cenzic.com/products_services/download_hailstorm.php
------------------------------------------------------------------------


Current thread: