- Web Penetration Testing with Kali Linux(Third Edition)
- Gilberto Najera Gutierrez Juned Ahmed Ansari
- 90字
- 2021-06-24 18:44:52
The TRACE method
When a TRACE method is used, the receiving server bounces back the TRACE response with the original request message in the body of the response. The TRACE method is used to identify any alterations to the request by intermediary devices such as proxy servers and firewalls. Some proxy servers edit the HTTP header when the packets pass through it, and this can be identified using the TRACE method. It is used for testing purposes, as it lets you track what has been received by the other side.
推薦閱讀
- Mastering ElasticSearch
- Learning OpenDaylight
- Mastering vRealize Operations Manager(Second Edition)
- 每天5分鐘玩轉Kubernetes
- Linux內核完全注釋(20周年版·第2版)
- Google系統架構解密:構建安全可靠的系統
- 計算機系統開發與優化實戰
- Instant Optimizing Embedded Systems using Busybox
- Windows Phone 8 Application Development Essentials
- Linux內核設計的藝術:圖解Linux操作系統架構設計與實現原理
- OpenStack系統架構設計實戰
- 統信UOS應用開發進階教程
- Mastering Sass
- 基于Arduino的嵌入式系統入門與實踐
- C#實用教程(第2版)