SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsVulnerability scanner results and web security guides often suggest that dangerous HTTP methods should be disabled. But these guides usually do not describe in detail how to exploit these methods. In the penetration testing of a web application or web server, this type of vulnerability is easy to find, but it is not easy to use when it comes to performing penetration test against the web application. This paper will describe in detail why these HTTP methods are dangerous and how to use such a method for the penetration test. Finally, it will demonstrate how this method can be used during penetration testing.