From the course: Threat Hunting: Network Data
Unlock the full course today
Join today to access over 24,900 courses taught by industry experts.
HTTP protocol attack methods
From the course: Threat Hunting: Network Data
HTTP protocol attack methods
- [Instructor] The first web server went live in the early 1990s and data security wasn't a primary focus at that time. Hypertext transfer protocol messages, or HTTP are text-based, making them human readable, which is one of the reasons that over 80% of the internet now uses HTTPS to encrypt data in transit. The small percentage of servers not using HTTPS, typically include old informational websites, organizations that cannot afford or don't see the value in paying annually for a digital certificate, testing or development servers or network devices like switches and routers. As HTTP traffic now accounts for a minority of web traffic and legitimate use cases are sparse, I find HTTP Hunts particularly rewarding. Let's explore some of the interesting characteristics I examined during my hunts. The user agent filled in the HTTP header is part of the request sent by a web client, for example, a browser to a web server.…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.