• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

HTTP Method Scan

Risk Factors

Attackers can easily perform an HTTP method scan to learn if a website contains vulnerabilities that help the attacker bypass security controls. While this scan typically does not negatively affect the website, this technique helps attackers find information to take the next step in an attack campaign.

The system might change the risk score for this detection.

Kill Chain

Reconnaissance

Risk Score

37

Detection diagram
Next in Reconnaissance: Impacket AD Delegation Enumeration Activity

Attack Background

HTTP methods such as GET and POST enable website visitors and administrators to perform actions on a web server. But some HTTP methods are considered risky because they could enable an attacker to modify data or steal credentials from a server. While most websites have security controls for risky methods such as DELETE, PUT, CONNECT, and TRACE, these controls are not comprehensive and could allow arbitrary methods to get through. To confirm whether an attacker can bypass security controls, multiple requests with arbitrary or invalid methods are sent to a web server. If the web server allows these invalid methods, then the attacker learns about potential vulnerabilities to exploit.

Mitigation Options

Configure web servers to only allow HTTP methods that are required

MITRE ATT&CK ID

What else can RevealX do for you?