Difference between revisions of "Test HTTP Strict Transport Security (OTG-CONFIG-009)"

From OWASP
Jump to: navigation, search
(Added how to test for the existence of the HSTS header.)
Line 12: Line 12:
 
<br>
 
<br>
 
== Black Box testing and example ==
 
== Black Box testing and example ==
'''Testing for Topic X vulnerabilities:''' <br>
+
'''Testing for the presence of HSTS header:''' <br>
...<br>
+
    $ curl -s -D- <nowiki>https://paypal.com/</nowiki> | grep Strict
 
'''Result Expected:'''<br>
 
'''Result Expected:'''<br>
...<br><br>
+
    Strict-Transport-Security: max-age=14400
 
== References ==
 
== References ==
'''Whitepapers'''<br>
+
'''Forums'''<br />
...<br>
+
http://stackoverflow.com/questions/11717789/how-to-find-if-a-web-site-uses-hsts<br />
'''Tools'''<br>
+
<br />
...<br>
+

Revision as of 10:09, 16 April 2013

This article is part of the new OWASP Testing Guide v4. 
At the moment the project is in the REVIEW phase.

Back to the OWASP Testing Guide v4 ToC: https://www.owasp.org/index.php/OWASP_Testing_Guide_v4_Table_of_Contents Back to the OWASP Testing Guide Project: http://www.owasp.org/index.php/OWASP_Testing_Project

Contents


Brief Summary


HSTS header is a mechanism that web sites have to communicate to the web browsers that all traffic exchanged with a given domain must always be sent over https, this will help protect the information from being passed over unencrypted requests.
Considering the importance of this security measure is important to verify that the web site using this HTTP header, in order to ensure that all the data travels encrypted from the web browser to the server.

Description of the Issue


...here: Short Description of the Issue: Topic and Explanation

Black Box testing and example

Testing for the presence of HSTS header:

   $ curl -s -D- https://paypal.com/ | grep Strict

Result Expected:

   Strict-Transport-Security: max-age=14400

References

Forums
http://stackoverflow.com/questions/11717789/how-to-find-if-a-web-site-uses-hsts