Open-Source Web Server Identification In The IPv4 Address Space: Side-Channeling HTTP
Ruben van der Ham • 04.07.2019
Open-Source Web Server Identification In The IPv4 Address Space: - - PowerPoint PPT Presentation
Open-Source Web Server Identification In The IPv4 Address Space: Side-Channeling HTTP Ruben van der Ham 04.07.2019 Background Pipeline Overview Identification Evaluation Conclusion Background RFC2616 Server:
Ruben van der Ham • 04.07.2019
RFC2616
Why?
hidden banners
‘lying’
Why not?
about the Server header, they bruteforce
1. The dumping run 2. The identification run
Old approach
New approach
identificationTool
HTTP(S) servers
Request Identification Properties Index Date header pos, Default index, Etag Delete Date header pos, Status code, status text, Default error page Malformed HTTP Status code, HTTP version, Etag Random request type Date header pos, HTTP version, Status code, Default error page
Pipeline
Wasted time with scanTool. Could have invested resources in an all-in-one tool.
Identification
Very limited -> needs to cover more versions and types
General
More thinking less programming
HTTP
Amount of servers in Zmap: 43M Total amount of servers: 36M
HTTPS
Amount of servers in Zmap: 45M Total amount of servers: 29M?
delete 34M index 36M malformed http 34M random request type 33M delete 24M index 25M malformed http 21M random request type 24M
the banner
Thank you for your time!