http header protocol to track vulnerabilities

2011-10-09  来源:本站原创  分类:Internet  人气:64 

Detection method:

c: \> nc www.baidu.com 80 <1.txt

HTTP/1.1 200 ok

Date: Mon, 22 Aug 2011 06:37:25 GMT

Server: Apache/2.2.3 <Red Hat>

Connection: close

Transfer-Encoding: chunked

Content-Type: message / http

88

TRACE / HTTP/1.1

Host: www.baidu.com

Accept: * / *

Accept-Language: en-US

User-Agent: Mozilla/4.0 <compatible; MSIE 6.0; w

0

1.txt content

TRACE / HTTP/1.1
Host: www.baidu.com
Accept: */*
Accept-Language: en-US
User-Agent: Mozilla/4.0 <compatible; MSIE 6.0; w

0

Resolution:

In the apache conf file to add:

RewriteEngine on
RewriteCond %{REQUEST_METHOD} ^(TRACE|TRACK)
RewriteRule .* - [F]

If the virtual site, each virtual must add.

Related module: LoadModule rewrite_module modules / mod_rewrite.so

相关文章
  • http header protocol to track vulnerabilities 2011-10-09

    Detection method: c: \> nc www.baidu.com 80 <1.txt HTTP/1.1 200 ok Date: Mon, 22 Aug 2011 06:37:25 GMT Server: Apache/2.2.3 <Red Hat> Connection: close Transfer-Encoding: chunked Content-Type: message / http 88 TRACE / HTTP/1.1 Host: www.baidu

  • IP transport layer protocol port number and [Z] 2010-12-29

    Network layer - packet packet format which has a very important field is called the protocol number. If the transport layer such as tcp connection, then the ip packets at the network layer protocol which will have a value of No. 6, so if that value i

  • SCTP protocol tracking 2011-01-10

    This document Copyleft owned yfydz all use under the GPL, can be freely copied, reproduced, reprinted, please maintain the integrity of the document, for any commercial purposes is strictly prohibited. msn: [email protected] Source: http://yfydz.

  • IP - Internet Protocol 2010-10-06

    IP: Internet Protocol Conceptually, IP routing is very simple, especially for the host is. If the destination host and source host is directly connected to (such as point to point link) or are in the same shared network (Ethernet or Token Ring networ

  • php的header返回503状态码 2013-01-06

    无忧主机PHP空间 5.3以下版本用兼容写法: if(!function_exists('http_response_code')) { functionhttp_response_code($code= NULL) { if($code!== NULL) { switch($code) { case100:$text='Continue';break; case101:$text='Switching Protocols';break; case200:$text='OK';break; ca

  • IPSEC Linux kernel implementation (6) - reproduced 2010-11-16

    Copyleft this document owned by yfydz all, the use of GPL, free to copy, reprint, reproduced keep the documents for completeness, for any commercial purposes is strictly prohibited. MSN: [email protected] Source: http://yfydz.cublog.cn 8. Securit

  • Linux Kernel IPSEC implementation (6) 2011-01-10

    This document Copyleft owned yfydz all use under the GPL, can be freely copied, reproduced, reprinted, please maintain the integrity of the document, for any commercial purposes is strictly prohibited. msn: [email protected] Source: http://yfydz.

  • Mass-oriented service design principles and strategies summary 2010-05-27

    Internet services is characterized by massive level for the user, for the mass-level users how to provide stable services? Here, some of these years of accumulated experience and contact with some of the ideas usually make a conclusion. First, the pr

  • Massive service-oriented design principles and strategies summary 2010-05-31

    Reprinted from http://ayufox.javaeye.com/blog/676416 Internet services is characterized by massive level for the user, for the mass-level users how to provide stable services? Here, some of these years of accumulated experience and contact with some

  • SMS to achieve long series of mobile CMPP2.0 2010-06-04

    from http://blog.csdn.net/pwlazy/archive/2010/03/05/5349625.aspx To achieve long-Series mobile CMPP2.0 SMS Collection 1) Background At present, our message is basically sending more than 140 bytes (or less) on the cut points (mobile text messages ove

  • Series of mobile messaging to achieve long CMPP2.0 2010-06-04

    from http://blog.csdn.net/pwlazy/archive/2010/03/05/5349625.aspx To achieve long-Series mobile CMPP2.0 SMS Collection 1) Background At present, our message is basically sending more than 140 bytes (or less) on the cut points (mobile text messages ove

  • Mass-oriented service design principles and strategies 2010-08-26

    Internet services is characterized by massive level for the user, for the mass-level users how to provide stable services? First, the principle of 1. CAP principle of Web services CAP refers to three elements: consistency (Consistency), availability

  • IPSEC Linux kernel implementation (5) --- reserved 2010-11-15

    Copyleft this document owned by yfydz all, the use of GPL, free to copy, reprint, reproduced keep the documents for completeness, for any commercial purposes is strictly prohibited. MSN: [email protected] Source: http://yfydz.cublog.cn 7. IPV4 su

  • Clearly and simply talk about the VPN 2010-11-17

    Reprinted from: http://network.51cto.com/art/200511/11884.htm Now a lot of connections are called VPN (Virtual Private Ntwork), so many people could not tell. So, the general said the VPN in the end what is it? As the name implies, the virtual privat

  • About multipart / related; boundary = 2011-05-16

    http protocol described in detail on the mime type, multipart /.... a single body of the message header contains multiple solutions. multipart send non-text media types on the various media types is useful. Currently there are these subtype: Messages

  • Detection and attack from the transport layer defense 2011-01-10

    This document Copyleft owned yfydz all use under the GPL, can be freely copied, reproduced, reprinted, please maintain the integrity of the document, for any commercial purposes is strictly prohibited. msn: [email protected] Source: http://yfydz.

  • How state detection under Linux 2011-01-10

    This document Copyleft owned yfydz all use under the GPL, can be freely copied, reproduced, reprinted, please maintain the integrity of the document, for any commercial purposes is strictly prohibited. msn: [email protected] Source: http://yfydz.

  • Linux Kernel IPSEC implementation (5) 2011-01-10

    This document Copyleft owned yfydz all use under the GPL, can be freely copied, reproduced, reprinted, please maintain the integrity of the document, for any commercial purposes is strictly prohibited. msn: [email protected] Source: http://yfydz.

  • Wifi相关知识 2010-05-17

    epoll实现server_client聊天测试程序源码 poll实现server_client聊天测试程序源码 select实现server_client聊天测试程序源码 terms: ================= 802.1x是一种基于端口的访问控制标准,用户必须通过了认证并获得授权之后,才能通过端口使用网络资源 支持WPA的AP工作需要在开放系统认证方式下,STA以WPA模式与AP建立关联之后,如果网络中有RADIUS服务器作为认证服务器,那么 STA就使用802.1x方式进行认证:

  • Wireshark使用教程 2014-09-06

    第 1 章 介绍 1.1. 什么是Wireshark Wireshark 是网络包分析工具.网络包分析工具的主要作用是尝试捕获网络包, 并尝试显示包的尽可能详细的情况. 你可以把网络包分析工具当成是一种用来测量有什么东西从网线上进出的测量工具,就好像使电工用来测量进入电信的电量的电度表一样.(当然比那个更高级) 过去的此类工具要么是过于昂贵,要么是属于某人私有,或者是二者兼顾. Wireshark出现以后,这种现状得以改变. Wireshark可能算得上是今天能使用的最好的开源网络分析软件. 1