CANADIAN CYBERSECURITY INC.’s Post

💻 📁 The top attacked HTTP Uniform Resource Identifiers (URI) were led by “/”, the universal URI for testing the presence of a web service and collecting information from header fields in server responses. There is a significant difference in the top targeted URIs for unsolicited events compared to the top targets in web application attacks where services are supporting real applications. The top URIs should be interpreted as the top services and applications that are targeted by actors that are randomly scanning and exploiting the internet. Typically, a URI will conform with a known and disclosed vulnerability. In HTTP, the user-agent string is often used for content negotiation, where the origin server selects suitable content or operating parameters for the response. For example, the user-agent string might be used by a web server to choose variants based on the known capabilities of a particular version of client software, and to differentiate its interface for smartphones or desktop browsers. The concept of content tailoring is built into the HTTP standard in RFC1945. As such, the user-agent field in a web request can be used to identify the client agent that makes the request. Some malicious actors are aware of this identifying feature being used to score the legitimacy of a web request by web security modules. This causes them to mask their origins by randomly generating and changing the user-agent to known legitimate values. Commercial and open source web service vulnerability scanning tools and programming language implementations can be identified through their user agent. For example, zgrab is the application-layer network scanning component of the Zmap open source scanning tool and “Go-http-client” is the default user agent header when using the Golang net/http package. Radware 2024 Global Threat Analysis Report #ddos #appsec #cyberrisk #cybersecurity #canadiancybersecurity CANADIAN CYBERSECURITY INC.

  • No alternative text description for this image

To view or add a comment, sign in

Explore topics