This repository provides a Proof of Concept (PoC) for testing various vulnerabilities in the Apache HTTP Server, including Filename Confusion Attacks, SSRF, Denial of Service, and others related to recent CVEs.
The tool sends crafted HTTP requests to assess whether the server is vulnerable to certain types of attacks.
The tool performs HTTP requests to potential endpoints that might be vulnerable to confusion attacks or misconfigurations. It checks for specific patterns and encodings that could lead to unauthorized access or system failures.
The tool checks for vulnerabilities on the following paths:
You can install the required Python library using:
pip install requests git clone https://github.com/mrmtwoj/apache-vulnerability-testing.git
cd apache-vulnerability-testing To use the tool, provide the target URL you want to test:
python3 poc_vulnerability_testing.py --target http://<target-ip> For example:
python3 poc_vulnerability_testing.py --target http://192.168.1.10 Artificial Intelligence (AI) is changing how industries operate, automating processes, and driving new innovations. However,…
Image credit:pexels.com If you think back to the early days of personal computing, you probably…
In an era defined by technological innovation, the way people handle and understand money has…
The online world becomes more visually driven with every passing year. Images spread across websites,…
General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…