Web application security - the fast guide Chapter 4: Be the attacker | Page 9

Detecting load balancers: - - - - - Detecting Proxies: - Surrounding IP scan Detecting unsynchronized time stamp detecting different (last modified or Etag) header for the - - same resource Existence of unusual cookies. Different SSL certificate 2017-05-10 Mapping Intermediaries info Using Trace command that echo the exact request and detect changes. Standard connect test Standard proxy request Web Application Security Fast Guide (book slides) By Dr.Sami Khiami Slide 9