Don't Bump Your Head(er)
40 points Medium

Try to bypass my security measure on this site! http://165.227.106.113/header.php

Flag
Rating 4.60
5
4
3
2
1

Discussion

Protected
0

curl --path-as-is -i -s -k -X $'GET' \ -H $'Host: 165.227.106.113' -H $'User-Agent: Sup3rS3cr3tAg3nt' -H $'Referer: awesomesauce.com' -H $'Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,/;q=0.8' -H $'Accept-Language: en-US,en;q=0.5' -H $'Accept-Encoding: gzip, deflate, br' -H $'Connection: close' -H $'Upgrade-Insecure-Requests: 1' \ $'http://165.227.106.113/header.php'

-> Burp Curl Copy"

0

This challenge helped me revise Burpsuite and learnt more about Curl tool. Good Challenge

0

damn this was good

0

At first it was confusing, but burp suite made life easy, i just had to go back and forth with the user agent. it was cool

0
Protected
0
Protected
0

this messed up my head

0

this messed up my head

0

How on earth are people getting this?? I'm probably just new to this, but I've read everything on headers, assumed there was some hidden secret header that concealed the user agent necessary, found the super secret agent that didn't do much, then proceeded to find the exact same requests using verbose in R and Python. I'm still hunting and am continuing to install more and more packages. Do I have any idea what I'm doing? Nope. Will I find out eventually? I hope so.

1
Protected
0

use berp suite

0