Broken Access Control, Downloads, Forbidden, Hacking Tools

Forbidden – Bypass 4Xx HTTP Response Status Codes

Bypass 4xx HTTP response status codes. Based on PycURL.

Script uses multithreading, and is based on brute forcing so might have some false positives. Script uses colored output.

Results will be sorted by HTTP response status code ascending, content length descending, and ID ascending.

To filter out false positives, check each content length manually with the provided cURL command. If it does not results in bypass, just ignore all other results with the same content length.

TestScope
Various HTTP methodsmethod
Various HTTP methods with ‘Content-Length: 0’ headermethod
Cross-site tracing (XST) with HTTP TRACE and TRACK methodsmethod
File upload with HTTP PUT methodmethod
Various HTTP method overridesmethod-override
Various HTTP headersheader
Various URL overridesheader
URL override with two ‘Host’ headersheader
Various URL path bypassespath
Basic authentication/authorization including null sessionauth
Broken URL parser checkparser

Extend this script to your liking.

Tested on Kali Linux v2021.4 (64-bit).

Made for educational purposes. I hope it will help!

Future plans:

  • add option to test only allowed HTTP methods,
  • do not ignore URL parameters and fragments.

Table of Contents

How to Run

Open your preferred console from /src/ and run the commands shown below.

Install required tools:

apt-get install -y curl 

Install required packages:

pip3 install -r requirements.txt 

Run the script:

python3 forbidden.py 

Be aware of rate limiting. Give it some time before you run the script again for the same domain in order to get better results.

Some websites require a user agent header. Download a user agent list from here.

Automation

Bypass 403 Forbidden HTTP response status code:

<div class="highlight highlight-source-shell position-relative overflow-auto" data-snippet-clipboard-copy-content="count=0; for subdomain in $(cat subdomains_403.txt); do count=$((count+1)); echo "#${count} | ${subdomain}"; python3 forbidden.py -u "${subdomain}" -t method,method-override,header,path -f GET -o "forbidden_403_results_${count}.json"; done “>

apt-get install -y curl

Bypass 401 Unauthorized HTTP response status code:

pip3 install -r requirements.txt

Broken URL parser check:

python3 forbidden.py
ACL ARBITRARY BASELINE-CONTROL BIND CHECKIN CHECKOUT CONNECT COPY DELETE GET HEAD INDEX LABEL LINK LOCK MERGE MKACTIVITY MKCALENDAR MKCOL MKREDIRECTREF MKWORKSPACE MOVE OPTIONS ORDERPATCH PATCH POST PRI PROPFIND PROPPATCH PUT REBIND REPORT SEARCH SHOWMETHOD SPACEJUMP TEXTSEARCH TRACE TRACK UNBIND UNCHECKOUT UNLINK UNLOCK UPDATE UPDATEREDIRECTREF VERSION-CONTROL 
Client-IP Cluster-Client-IP Connection Contact Forwarded Forwarded-For Forwarded-For-Ip From Host Origin Referer Stuff True-Client-IP X-Client-IP X-Custom-IP-Authorization X-Forward X-Forwarded X-Forwarded-By X-Forwarded-For X-Forwarded-For-Original X-Forwarded-Host X-Forwarded-Server X-Forward-For X-Forwared-Host X-Host X-HTTP-Host-Override X-Original-URL X-Originating-IP X-Override-URL X-ProxyUser-IP X-Real-IP X-Remote-Addr X-Remote-IP X-Rewrite-URL X-Wap-Profile X-Server-IP X-Target 

Inject to front, back, and both front and back of URL path; with and without prepending and appending slashes.

count=0; for subdomain in $(cat subdomains_403.txt); do count=$((count+1)); echo "#${count} | ${subdomain}"; python3 forbidden.py -u "${subdomain}" -t method,method-override,header,path -f GET -o "forbidden_403_results_${count}.json"; done

Results Format

count=0; for subdomain in $(cat subdomains_401.txt); do count=$((count+1)); echo "#${count} | ${subdomain}"; python3 forbidden.py -u "${subdomain}" -t auth -f GET -o "forbidden_401_results_${count}.json"; done

Images

Figure 1 – Help

Source : KitPloit – PenTest Tools!

Previous ArticleNext Article
Send this to a friend