Host Header Attack -> Password Reset Poisoning -> ASP.NET Web API 2 hosted as Azure App Services

I’m currently testing a site where the host header is used for creating a recovery email link. However, when I try to manipulate the host header in Burp I get an HTTP 400 message saying I’m using an invalid hostname. I get this error even … Continue reading Host Header Attack -> Password Reset Poisoning -> ASP.NET Web API 2 hosted as Azure App Services

Bypass Asp.Net 4.6 "A potentially dangerous Request.QueryString value was detected from the client"

I’m testing an application where the application does not handle special characters but request validation in ASP.NET picks it up and throws an exception.

There have been some different ways to bypass this previously like t… Continue reading Bypass Asp.Net 4.6 "A potentially dangerous Request.QueryString value was detected from the client"

Bypass Asp.Net 4.6 "A potentially dangerous Request.QueryString value was detected from the client"

I’m testing an application where the application does not handle special characters but request validation in ASP.NET picks it up and throws an exception.

There have been some different ways to bypass this previously like t… Continue reading Bypass Asp.Net 4.6 "A potentially dangerous Request.QueryString value was detected from the client"