It is very similar to that of an HTTP request, except that it substitutes an HTTP response message for the URL and uses a different collection of headers. The image above shows the structure of an HTTP response in Wireshark. These headers are under the control of the user and are intended for use by the server, so they can be modified by an attacker who controls both ends of the connection, making them ideal for passing data during an attack. This includes the requested URL and a variety of different HTTP headers, including the host, user-agent and several others. The image above shows the structure of an HTTP request in Wireshark.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |