Do you have these dangerous HTTP methods enabled on your server?

Introduction

While most HTTP methods are safe or are implemented in a safe manner, unfortunately, we can not say the same for every server out there. They might implement request methods incorrectly which may even lead to critical vulnerabilities such as remote code execution or firewall bypass.

Usually, the POST and GET methods are safe but they might be implemented incorrectly which leads to logic vulnerabilities. The same can not be said for the PUT, DELETE and CONNECT methods…

--

--

--

No b*llshit Hacking tutorials with extreme value in short bursts

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Your biometric authentication quick install guide through NPM

Hp Pavilion P6000 Driver Updates

PAID Network’s Token Utility & Use Cases

cybe6 Most Common Cybersecurity Mistakes Businesses Make

5 Best WhatsApp alternative apps that you should try

Privacy Policy

Designer, Farmer, Cyber Security Analyst. Meet Frank Tran.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Thexssrat

Thexssrat

No b*llshit Hacking tutorials with extreme value in short bursts

More from Medium

Vulnerability Capstone — Tryhackme

How “Docker” can help you become a better hacker

XSS cheat sheets

Day 14, Set Up Environment for Pentesting #100DaysofHacking