✔️ Ability to exploit a misconfigured web server
✔️ Attacks can be used against embedded devices
✔️ Ability to create a custom PHP shell
Common HTTP methods:
→ request a resource
Opening a simple webpage is a GET request in the browser
> GET /page.php HTTP/1.1
Host: www.example.site
passing arguments with GET:
we are passing "course=PTS"
> GET /page.php?course=PTS HTTP/1.1
Host: www.example.site
→ submit HTML form data
post parameters must be defined in the body of the request
> POST /page.php HTTP/1.1
Host: www.example.site
username=john&password=pass123
→ asks for just the Header of the response instead of a response body
> HEAD /page.php HTTP/1.1
Host: www.example.site
→ used to upload a file to the server
it can be a dangerous feature if allowed and/or misconfigured