- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 90字
- 2021-06-24 18:44:52
The TRACE method
When a TRACE method is used, the receiving server bounces back the TRACE response with the original request message in the body of the response. The TRACE method is used to identify any alterations to the request by intermediary devices such as proxy servers and firewalls. Some proxy servers edit the HTTP header when the packets pass through it, and this can be identified using the TRACE method. It is used for testing purposes, as it lets you track what has been received by the other side.
推薦閱讀
- Mastering ElasticSearch
- Modern Web Testing with TestCafe
- Learning Windows Server Containers
- Puppet實戰
- Kali Linux滲透測試全流程詳解
- 操作系統基礎與實踐:基于openEuler平臺
- SOA實踐者說
- 直播系統開發:基于Nginx與Nginx-rtmp-module
- Learning Bootstrap
- Windows 7案例教程
- Mastering Reactive JavaScript
- Cassandra 3.x High Availability(Second Edition)
- Learning BeagleBone
- Agile IT Security Implementation Methodology
- 應急指揮信息系統設計