mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-23 21:24:06 +00:00
GITBOOK-4388: No subject
This commit is contained in:
parent
63a99c33e1
commit
1eac4cf2cc
1 changed files with 3 additions and 3 deletions
|
@ -42,9 +42,9 @@ In the same research, it was shared that the timing technique was great to disco
|
|||
|
||||
Once an scoped open proxy is discovered, it was possible to find valid targets by parsing known subdomains of the target and this allowed to:
|
||||
|
||||
* **Bypass firewalls** by accessing restricted subdomains via the open proxy instead of through internet
|
||||
* Checking subdomains it was even possible to discover and access internal subdomains not publicly known
|
||||
* **Front-End impersonation attacks**: Front-end servers normally add headers for the backend. In open proxies, if you are able to find these headers (which you might be able to do using Timing attacks again), you will be able to set these headers and gather further access.
|
||||
* **Bypass firewalls** by accessing restricted subdomains via the **open proxy** instead of through internet
|
||||
* Moreover, abusing an **open proxy** it's also possible to **discover new subdomains only accessible internally.**
|
||||
* **Front-End impersonation attacks**: Front-end servers normally add headers for the backend like `X-Forwarded-For` or `X-Real-IP`. Open proxies that receives these headers will add them to the requested endpoint, therefore, an attacker could be able to access even more internal domains by adding these headers will whitelisted values.
|
||||
|
||||
## References
|
||||
|
||||
|
|
Loading…
Reference in a new issue