This repository provides a Proof of Concept (PoC) for testing various vulnerabilities in the Apache HTTP Server, including Filename Confusion Attacks, SSRF, Denial of Service, and others related to recent CVEs.
The tool sends crafted HTTP requests to assess whether the server is vulnerable to certain types of attacks.
The tool performs HTTP requests to potential endpoints that might be vulnerable to confusion attacks or misconfigurations. It checks for specific patterns and encodings that could lead to unauthorized access or system failures.
The tool checks for vulnerabilities on the following paths:
You can install the required Python library using:
pip install requests git clone https://github.com/mrmtwoj/apache-vulnerability-testing.git
cd apache-vulnerability-testing To use the tool, provide the target URL you want to test:
python3 poc_vulnerability_testing.py --target http://<target-ip> For example:
python3 poc_vulnerability_testing.py --target http://192.168.1.10 General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…
If you are a Linux user, you have probably seen commands like chmod 777 while…
Vim and Vi are among the most powerful text editors in the Linux world. They…
Working with compressed files is a common task for any Linux user. Whether you are…
In the digital era, an email address can reveal much more than just a contact…