• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum โ€” post quality content, get reactions, and help the community. Once you reach the minimum credit amount, youโ€™ll be able to withdraw your balance directly. Learn how it works.

Hacking Mastering HTTP Methods โ€” Your Gateway to Web Vulnerabilities in Bug Bounty ๐ŸŒ๐Ÿž๐Ÿ”

dEEpEst

โ˜ฃโ˜ฃ In The Depths โ˜ฃโ˜ฃ
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Mar 29, 2018
Messages
13,861
Solutions
4
Reputation
27
Reaction score
45,546
Points
1,813
Credits
55,350
โ€Ž7 Years of Serviceโ€Ž
 
56%
๐Ÿ›ก Hack Tools Dark Presents: Mastering HTTP Methods โ€” Your Gateway to Web Vulnerabilities in Bug Bounty ๐ŸŒ๐Ÿž๐Ÿ”


๐ŸŒ What are HTTP Methods?
They are the commands sent by clients to web servers to perform actions:
- `GET`: retrieve data
- `POST`: create a resource
- `PUT/PATCH`: update/modify existing data
- `DELETE`: remove data

These methods form the core of interaction with APIs and web apps โ€” and are prime targets for security testing.


โšก๏ธ Shocking Facts:
  1. Overuse of PUT/PATCH in APIs leads to critical misconfigurations.
  2. Many servers have TRACE enabled, leaking cookies via XST.
  3. Some apps accept X-HTTP-Method-Override, bypassing method restrictions.


๐Ÿ’Ž Most Abused Methods in Bug Bounty (with Examples):

  • GET โ€” meant to be safe but often abused:
    โ†’ Used in CSRF on sensitive actions.
    Bash:
    curl -X GET "https://target.com/delete-account?id=123"
  • POST โ€” dangerous if no auth/CSRF protection:
    โ†’ Leads to Mass Assignment, privilege escalation.
    Bash:
    curl -X POST -d '{"is_admin":true}' https://target.com/api/register
  • PUT/PATCH โ€” rarely protected correctly:
    โ†’ Allows overwriting resources or exploiting IDOR.
    Bash:
    curl -X PUT -d @malicious.json https://target.com/api/users/42
  • DELETE โ€” a gift if misconfigured:
    โ†’ Possible to delete any resource via IDOR.
    Bash:
    curl -X DELETE https://target.com/api/posts/1


โœ”๏ธ Best Practices (From Real Bug Bounty Cases):
  • Enable CSRF tokens for every state-changing method.
  • Enforce strict authorization checks per endpoint.
  • Disable TRACE, OPTIONS unless absolutely needed.
  • Implement rate limiting on all critical actions.
  • Avoid predictable URIs like `/api/users/1`.


๐Ÿ”ฅ Tools Every Hunter Should Use:
  • ๐Ÿ Burp Suite Pro โ€” intercept, replay, fuzz every method.
  • ๐Ÿ“ฎ Postman โ€” clean UI to test complex APIs.
  • ๐Ÿ›ก OWASP ZAP โ€” automate detection of misused methods.
  • ๐Ÿ’ป curl โ€” fast CLI testing tool.


๐Ÿ’ฅ Quick Recon: Discover Allowed Methods
Bash:
curl -I -X OPTIONS https://target.com/admin


๐Ÿ‘ฃ Practical Bug Bounty Methodology
  1. Start with `OPTIONS` to list allowed methods.
  2. Bypass restrictions using:
    Bash:
    POST /endpoint HTTP/1.1
    X-HTTP-Method-Override: DELETE
  3. Test for Mass Assignment:
    Inject unexpected fields like `is_admin=true`.
  4. Look for IDOR in every method (especially PUT, DELETE).


๐Ÿ“Š Real-World Stats:
  • HTTP method misconfig is rising among payment & legacy systems.
  • Older web apps and misconfigured proxies often leak critical methods.
  • Many APIs skip auth on `PUT` or `PATCH` โ€” jackpot for bounty hunters.


๐Ÿ’ก Pro Tips for Hunters:
  • Always test `HEAD`, `TRACE`, `OPTIONS` โ€” they reveal server behavior.
  • Exploit method override headers to bypass filters.
  • Target endpoints like `/upload`, `/config`, `/admin`, `/debug`.


๐Ÿ† Final Thoughts:
  • `GET` โ€” can trigger CSRF on unsafe actions.
  • `POST` โ€” vulnerable to mass assignment and CSRF.
  • `PUT/PATCH` โ€” a goldmine for IDOR and business logic flaws.
  • `DELETE` โ€” highly dangerous if improperly authorized.
  • Rare methods โ€” often misconfigured and reveal internal logic.


๐Ÿ“ข Join the Discussion:
Was this useful? Share your stories or questions related to HTTP method exploitation.
Have you ever found a Bug Bounty using obscure HTTP methods? Post your PoC!

โ€” Post created for Hack Tools Dark Community โ€”
 
Back
Top