Web application security - the fast guide Chapter 4: Be the attacker | Page 9
Detecting load balancers:
-
-
-
-
-
Detecting Proxies:
-
Surrounding IP scan
Detecting unsynchronized time stamp
detecting different (last modified or Etag) header for the -
-
same resource
Existence of unusual cookies.
Different SSL certificate
2017-05-10
Mapping Intermediaries info
Using Trace command that echo the exact request and
detect changes.
Standard connect test
Standard proxy request
Web Application Security Fast Guide (book slides)
By Dr.Sami Khiami
Slide 9