May 2017
Intermediate to advanced
416 pages
21h 33m
English
XST vulnerabilities are caused by the existence of Cross-Site Scripting (XSS) vulnerabilities in web servers where the HTTP method TRACE is enabled. This technique is mainly used to bypass cookie restrictions imposed by the directive httpOnly. Penetration testers can save time using Nmap to quickly determine if the web server has the method TRACE enabled.
This recipe describes how to use Nmap to check whether HTTP TRACE is enabled and therefore susceptible to possible XST vulnerabilities.
Read now
Unlock full access