Skip to content

Latest commit

 

History

History
38 lines (25 loc) · 3.28 KB

File metadata and controls

38 lines (25 loc) · 3.28 KB

Lab40 - HTTP Header scanning

Title Description
Target Check if your application HTTP security headers are implemented as they should
Difficulty Medium
Measure HTTP header secure score
Threat OWASP TOP 10: Misconfiguration. Also E.g. Content-Security-Policy protects against XSS.
Detect Misconfiguration in HTTP headers
Prevent Misconfigurations in HTTP headers
Stage Deploy
Known problems You need live target and sometimes it is not public. So you might need an agent inside your network to do this.

HTTP headers play a vital role in securing web applications. Scanning these headers can uncover missing or misconfigured security directives — such as Content-Security-Policy or Strict-Transport-Security — that help defend against attacks like clickjacking and cross-site scripting. By using tools like MDN HTTP Observatory, you can quickly assess your site’s HTTP security posture, identify weaknesses, and implement fixes before a vulnerability becomes critical.

Good tools for this task are:

Online:

Offline:

Scan HTTP headers

In this lab, you’ll set up a workflow to scan the HTTP headers of your web application using MDN HTTP Observatory. You can ask for a target if you don't have one. This is not something that would be very intrusive. You can also try OSHP validator and running the target in docker. Check the vulnerable-pipeline to see how to run the app in docker. With venom you will need this yml file.

Links

Example solution