0% found this document useful (0 votes)
4 views

LI - HTTP Security Header

Uploaded by

a01ak1n69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

LI - HTTP Security Header

Uploaded by

a01ak1n69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

۱ DevSecOpsGuides.

com

No Name Description Policies Attacks

nosniff -> Blocks a request if


1 MIME sniffing attacks Misconfigure
the request destination is of
X-Content-Type-Options
prevention type style and the MIME type is
RFD
not text/css, or of type script

0 -> Allow

1 -> Enables XSS filtering Misconfigure


Detect reflected
2 mode=block -> browser will prevent rendering of

X-XSS-Protection the page if an attack is detected. CORS


cross-site scripting report=<reporting-URI> -> sanitize the page and

report the violation


Deception

Browser should be DENY -> deny displayed in a frame

3 SAMEORIGIN -> displayed if all Misconfigure


X-Frame-Options
allowed to render a page
Virtual Patching Heatmap

ancestor frames are same origin to


Clickjacking
the page itself

Attacks Heatmap
default-src -> come from the site's own
Misconfigure
Control what origin
4
Content-Security-Policy media-src -> media to trusted providers
XSS
resources script-src -> specific server that hosts

trusted code
Clickjacking

informs browsers that max-age -> The time, in seconds, that the
Misconfigure
browser should remember that a site is only to be
5 Strict-Transport-Security MITM
the site should only be accessed using HTTPS.

includeSubDomains -> rule applies to all of the


SSL/TLS Stripping attacks

accessed using HTTPS site's subdomains as well Cookie hijacking attacks

Misconfigure
no-referrer -> not include any
CSRF
sent requests do not referrer information
6 Privacy attacks
Referrer-Policy include any referrer no-referrer-when-downgrade ->

Don't send the Referer header for Information


information requests to less secure destinations disclosure attacks
(HTTPS→HTTP, HTTPS→file)
۱ DevSecOpsGuides.com

No Name Description Policies Attacks

no-cache -> response must be validated

7
control caching in with the origin server before each reuse Misconfigure
Cache-Control no-store -> response directive indicates
browsers and shared Cache Inspection
that any caches of any kind (private or

caches shared) should not store this response. Cache Deception

response header is a header


inline Misconfigure

8 indicating if the content is XSS


attachment
Content-Disposition
expected to be displayed clickjacking
filename="filename.jpg"
inline in the browser RFD

same-site -> Only requests from the

protection against same Site can read the resource. Misconfigure


9 same-origin -> requests from the same
Cross-Origin-Resource-Policy XSS
certain requests from origin (i.e. scheme + host + port)
Virtual Patching Heatmap

cross-origin -> any origin (both same- clickjacking


other origins

Attacks Heatmap
site and cross-site) can read the resource

Misconfigure
X-Rate-Limit: Control Limit of
Http Header Injection
10
X-* Extra HTTP Header request
Cache Deception
X-Origin -> Origin of requests
Ratelimit Bypass
X-Forwarded-IP -> Change Real IP

lists any encodings that gzip


DDoS
have been applied to the compress
11 Content-Encoding
Network
representation (message deflate
eavesdropping
payload), and in what order br

Misconfigure
whether the response can
* XSS

Access-Control-Allow-Origin be shared with requesting Host Header


12
<origin>
code from the given origin Injection
null
Cache Poisoning

Misconfigure
specifies one or more POST, GET, OPTIONS
13 Access-Control-Allow-Methods
CSRF
methods allowed *
XSS

You might also like