Talk With an Expert

Penetration Testing Of A Web Application Using Dangerous HTTP Methods

Penetration Testing Of A Web Application Using Dangerous HTTP Methods (PDF, 2.59MB)Published: 22 May, 2012
Created by:
Issac Kim

Vulnerability scanner results and web security guides often suggest that dangerous HTTP methods should be disabled. But these guides usually do not describe in detail how to exploit these methods. In the penetration testing of a web application or web server, this type of vulnerability is easy to find, but it is not easy to use when it comes to performing penetration test against the web application. This paper will describe in detail why these HTTP methods are dangerous and how to use such a method for the penetration test. Finally, it will demonstrate how this method can be used during penetration testing.