Bypass 403 / 401

Various bypass tricks and tools

ko-fi

/admin -> 403 or 302

/Admin
/AdMin
/admin/
/admin/. 
//admin//
/.;/admin
/./admin/..
/admin.json
/;/admin
//;//admin
/admi%6e [n is url encoded to %6e]
/%2e/admin
/admin#
/admin;/
/admin/~
/./admin/./
/admin?param
/admin..;/
/admin%20
/admin%09
/admin/..;/
/static../admin.jsp
/admin..;/
/../admin
/..;/admin

X-Originial-URL: /admin
X-Override-URL: /admin
X-Rewrite-URL: /admin

Capitalize the path

Request to /ADMIN/DELETEUSER may still be mapped to the /admin/deleteUser

Add Suffix

URL encoding

Spring framework

If Spring framework have enabled the useSuffixPatternMatch option, a request to /admin/deleteUser.anything would still match the /admin/deleteUser pattern.

Prior to Spring 5.3, this option is enabled by default.

API - IDOR

IDOR

Git

Wordpress

X-Rewrite-Url Header can be used to bypass WordPress 403 pages.

Burp Extensions - 403 Bypasser

HTTP Verb Tampering

HTTP Verb Tampering

Change request method from GET to TRACE, etc.

Change method like this way:

If the application supports method override header then you can also test like this way:

Fuzz

Payload List

  1. Set Up Burp Suite Intruder:

    • Open Burp Suite and navigate to the Intruder tab.

    • Send your request to Intruder by right-clicking on it in the Proxy tab and selecting Send to Intruder.

    • Configure the Intruder positions by selecting the directory or path you want to bypass.

  2. Load the Payloads:

    • Copy the payloads from the provided wordlist.

    • Paste the payloads into the Payload Options input field in the Intruder tab.

  3. Payload Processing:

    • Below the Payload Options section, locate the Payload Processing tool.

    • Click the Add button to open a new window.

    • Select the rule Replace String.

    • Replace the placeholder {base} with the base value you want to use for bypassing.

  4. Disable URL Encoding:

    • Uncheck the option URL-encode these characters to ensure the payloads are not altered.

  5. Start the Attack:

    • Click Start Attack and observe the results.

    • Look for requests that return a 200 status code, indicating a successful bypass.

Content-Length:0

403 Header Bypass

Parameter Tampering

Secret Trick: Override parameters with conflicting values:

Null Byte Injection

HTTP Version Downgrade

Bypass Origin

Tools

Go-recon - gr-403:

Resources

Interesting Books

Interesting Books

Disclaimer: As an Amazon Associate, I earn from qualifying purchases. This helps support this GitBook project at no extra cost to you.

Support this Gitbook

I hope it helps you as much as it has helped me. If you can support me in any way, I would deeply appreciate it.

ko-fi

buymeacoffee

Last updated