https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-13 11:06:462025-03-13 11:06:46INE Security Alert: Using AI-Driven Cybersecurity Training to Counter Emerging Threats
Employees at the Cybersecurity and Infrastructure Security Agency tell WIRED they’re struggling to protect the US while the administration dismisses their colleagues and poisons their partnerships.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-13 10:06:482025-03-13 10:06:48‘People Are Scared’: Inside CISA as It Reels From Trump’s Purge
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-13 10:06:472025-03-13 10:06:47How to set up Bitwarden for personal and work use – and why you should keep them separate
Researchers from Symantec showed how OpenAI’s Operator agent, currently in research preview, can be used to construct a basic phishing attack from start to finish.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-13 10:06:472025-03-13 10:06:47OpenAI Operator Agent Used in Proof-of-Concept Phishing Attack
Meta has warned that a security vulnerability impacting the FreeType open-source font rendering library may have been exploited in the wild.
The vulnerability has been assigned the CVE identifier CVE-2025-27363, and carries a CVSS score of 8.1, indicating high severity. Described as an out-of-bounds write flaw, it could be exploited to achieve remote code execution when parsing certain font
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-13 09:07:062025-03-13 09:07:06Meta Warns of FreeType Vulnerability (CVE-2025-27363) With Active Exploitation Risk
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-13 09:07:052025-03-13 09:07:05Why AI-powered security tools are your secret weapon against tomorrow’s attacks
In the last post about bypassing web filters, I discussed how SNI spoofing works and how this can also be prevented by web filters. This post is about another bypass technique called Host Header spoofing.
What Is a Host Header
The Host header is an HTTP request header sent by the client (usually a browser) to the webserver as part of the HTTP request, and specifies the hostname of the server1. Because a webserver can host multiple websites on the same IP address, this information is required to deliver the correct website. This is called virtual hosting. Reverse proxies can also use this header to determine to which backend system the incoming requests should be sent.
In the following example, Alice connects to the webserver with the IP address 203.0.113.5, which hosts the websites a.example.net, b.example.net, and c.example.net. As Alice’s browser sends the Host header b.example.net, the webserver knows to deliver the files for the right directory.
Alice requesting a file from b.example.net
Nowadays, HTTP traffic is almost always wrapped in TLS, and since the Host header is part of the HTTP request, it is also encrypted. This is illustrated below.
First, the browser establishes a TLS session with the server. In the TLS handshake, the hostname is sent in the SNI ①. Then, an HTTP request is sent to the server ② inside the TLS tunnel ③. As part of this request, the browser again specifies the hostname in the HTTP Host header ④:
HTTP request with Host header inside TLS tunnel
Note: Normally, you would not be able to inspect the decrypted messages exchanged in a TLS tunnel. Instead of the HTTP GET request, you would simply see encrypted data. For this setup, the TLS keys were dumped using the SSLKEYLOGFILE variable2,3 and imported into Wireshark, which allows on-the-fly decryption of TLS traffic.
Host Header Based Filters
Companies often intercept and inspect TLS traffic on proxies. For this to work, the Certificate Authority (CA) certificate of the proxy must be installed on all client devices. This is therefore only possible in corporate environments, where the company manages all clients, so they can install the proxy CA. Without the installed proxy CA, users would receive a TLS certificate error and be able to detect that someone is looking at their traffic (this is also known as a Man-in-the-Middle attack).
With a setup as described above, the proxy is able to decrypt and inspect all traffic, and use the information from the HTTP request (like the Host header) to determine whether a request is legit or not. This approach is used to block dangerous files (such as .exe files), known malicious websites, specific website categories like gaming, or file uploads exceeding a certain size to prevent data exfiltration.
In most cases, such filters work with a blocklist (or known-bad) approach. However, in rare cases, we have seen customers implement the opposite, by defining a list of allowed (or known-good) websites, that can be accessed through the filter.
Bypassing Simple Web Filters Using Host Header Spoofing
When proxies only rely on the Host header to determine if a request is legitimate, this can be exploited to bypass such web filters.
This requires control over the HTTP request, which can be achieved by malware running on the system or by an attacker or user with system access attempting to bypass the web filter.
Imagine you have the following situation where Alice is able to access the website legit.example.net but the access to evil.example.com is blocked by the firewall based on the Host header evil.example.com:
Connection is blocked to evil.example.com
Alice (or a malware on her computer) is now able to bypass the web filter by connecting to evil.example.net (leaving the SNI evil.example.net unmodified), but specifying the Host header legit.example.net:
Blocking mechanism bypass by spoofing a legit hostname in the Host header
The final IP, TLS and HTTP packet structure looks like this:
Host Header Spoofing
Since we only changed the Host header, but not the SNI, there is also the added benefit that we can bypass web filters that perform SNI matching with the hostname/SAN from the certificate (see previous blogpost about SNI spoofing).
Example Using curl
To craft such a request is easy. Using curl, we can control the Host header as shown below:
Here we can see that the SNI is unchanged ① to match the certificate subject but the HTTP request ② contains the spoofed Host header ③:
Connectin with evil host in the SNI but legit one in the Host header
Note: For demonstration purposes, the TLS connection is decrypted again to allow inspection of the contained HTTP traffic.
We found such bypasses in projects, where the customer e.g. blocked large file uploads to most websites to prevent data exfiltration. In this case, this imposed restriction on our C2 communication, because the C2 implant was not able to transmit larger chunks of data back to our server. By overriding the Host header to a value which was excluded from the blocklist (the customer’s own file sharing solution), the filter could be bypassed, allowing unrestricted communication from our C2 implant.
Host Header Spoofing Protection and Limitations
The bypass technique discussed above only works if the proxy only uses the Host header to decide whether a website should be blocked or not, ignoring other mechanisms such as SNI inspection/matching.
However, in most cases web filters will perform additional checks to improve resilience against such bypasses. For example, a proxy could verify that the hostname in the SNI and in the Host header are identical, and drop requests where they are different.
Example: Fortinet FortiGate
The Fortinet FortiGate firewall/proxy has such a feature called “Domain Fronting Protection”4 which blocks mismatches of the hostnames:
The HTTP response looks like this if this is detected:
HTTP/1.1 403 Forbidden
[...]
[...]
<h3>403 domain fronting blocked</h3>
<p>The webserver reported that an error occurred while trying to access the website. Please return to the previous page.</p>
[...]
The message in the log looks like this:
type="utm" subtype="webfilter" eventtype="domain-fronting" srcip=172.17.0.2 dstip=198.51.100.23 dstport=443 hostname="legit.example.net" msg="Domain fronting detected" rawdata="HTTP Host <legit.example.net> does not match SNI <evil.example.com>"
This protection feature is enabled by default but can be disabled:
This protection is enabled by default but can be disabled.
More about domain fronting will be explained in the next post.
Takeaway
Host header spoofing is a rather simple bypass technique, and – given a correctly configured web filter solution – is easily preventable. Nonetheless, it’s always worth looking for it in your next penetration test or in your own infrastructure!
Also keep in mind that it’s not always about being able/not able to access a specific site, but also about bypassing other restrictions such as large file uploads, or downloading certain file types.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-13 08:07:132025-03-13 08:07:13Bypassing Web Filters Part 2: Host Header Spoofing
A huge chunk of online traffic now comes from bots, both good and bad — but AI is boosting the latter. From DDoS attacks to scraping, there’s a renewed barrage of threats that companies have to deal with. According to cybersecurity entrepreneur Nikita Rozenberg, the impact is more severe for SMBs. “The main difference is […]
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-13 07:07:132025-03-13 07:07:13Estonia-based Blackwall raises €45 million Series B to protect SMBs from malicious online traffic
Following increasing attacks on healthcare organizations, the United Arab Emirates has refined its regulatory strategy for improving cybersecurity in healthcare.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-13 06:07:072025-03-13 06:07:07Abu Dhabi Guidelines Offer Blueprint for Cybersecurity in Health
Dragos reveals Volt Typhoon hackers infiltrated a US electric utility for 300 days, collecting sensitive data. Learn how this cyberattack threatens infrastructure.
https://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.png00adminhttps://www.backbox.org/wp-content/uploads/2018/09/website_backbox_text_black.pngadmin2025-03-13 00:07:012025-03-13 00:07:01Chinese Volt Typhoon Hackers Infiltrated US Electric Utility for Nearly a Year
BackBox.org offers a range of Penetration Testing services to simulate an attack on your network or application. If you are interested in our services, please contact us and we will provide you with further information as well as an initial consultation.
INE Security Alert: Using AI-Driven Cybersecurity Training to Counter Emerging Threats
/in General NewsCary, North Carolina, 13th March 2025, CyberNewsWire
Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News – Read More
‘People Are Scared’: Inside CISA as It Reels From Trump’s Purge
/in General NewsEmployees at the Cybersecurity and Infrastructure Security Agency tell WIRED they’re struggling to protect the US while the administration dismisses their colleagues and poisons their partnerships.
Security Latest – Read More
How to set up Bitwarden for personal and work use – and why you should keep them separate
/in General NewsDon’t let work invade your personal life. Separate your passwords with two Bitwarden accounts for better security and peace of mind.
Latest stories for ZDNET in Security – Read More
OpenAI Operator Agent Used in Proof-of-Concept Phishing Attack
/in General NewsResearchers from Symantec showed how OpenAI’s Operator agent, currently in research preview, can be used to construct a basic phishing attack from start to finish.
darkreading – Read More
Meta Warns of FreeType Vulnerability (CVE-2025-27363) With Active Exploitation Risk
/in General NewsMeta has warned that a security vulnerability impacting the FreeType open-source font rendering library may have been exploited in the wild.
The vulnerability has been assigned the CVE identifier CVE-2025-27363, and carries a CVSS score of 8.1, indicating high severity. Described as an out-of-bounds write flaw, it could be exploited to achieve remote code execution when parsing certain font
The Hacker News – Read More
Why AI-powered security tools are your secret weapon against tomorrow’s attacks
/in General NewsIn the cybersecurity arms race, you have access to the same weapons as the bad guys. Just how well-armed are you now?
Latest stories for ZDNET in Security – Read More
Bypassing Web Filters Part 2: Host Header Spoofing
/in General NewsIn the last post about bypassing web filters, I discussed how SNI spoofing works and how this can also be prevented by web filters. This post is about another bypass technique called Host Header spoofing.
What Is a Host Header
The
Host
header is an HTTP request header sent by the client (usually a browser) to the webserver as part of the HTTP request, and specifies the hostname of the server1. Because a webserver can host multiple websites on the same IP address, this information is required to deliver the correct website. This is called virtual hosting. Reverse proxies can also use this header to determine to which backend system the incoming requests should be sent.In the following example, Alice connects to the webserver with the IP address
203.0.113.5
, which hosts the websitesa.example.net
,b.example.net
, andc.example.net
. As Alice’s browser sends theHost
headerb.example.net
, the webserver knows to deliver the files for the right directory.Nowadays, HTTP traffic is almost always wrapped in TLS, and since the
Host
header is part of the HTTP request, it is also encrypted. This is illustrated below.First, the browser establishes a TLS session with the server. In the TLS handshake, the hostname is sent in the SNI ①. Then, an HTTP request is sent to the server ② inside the TLS tunnel ③. As part of this request, the browser again specifies the hostname in the HTTP
Host
header ④:Note: Normally, you would not be able to inspect the decrypted messages exchanged in a TLS tunnel. Instead of the HTTP GET request, you would simply see encrypted data. For this setup, the TLS keys were dumped using the
SSLKEYLOGFILE
variable2,3 and imported into Wireshark, which allows on-the-fly decryption of TLS traffic.Host Header Based Filters
Companies often intercept and inspect TLS traffic on proxies. For this to work, the Certificate Authority (CA) certificate of the proxy must be installed on all client devices. This is therefore only possible in corporate environments, where the company manages all clients, so they can install the proxy CA. Without the installed proxy CA, users would receive a TLS certificate error and be able to detect that someone is looking at their traffic (this is also known as a Man-in-the-Middle attack).
With a setup as described above, the proxy is able to decrypt and inspect all traffic, and use the information from the HTTP request (like the
Host
header) to determine whether a request is legit or not. This approach is used to block dangerous files (such as.exe
files), known malicious websites, specific website categories like gaming, or file uploads exceeding a certain size to prevent data exfiltration.In most cases, such filters work with a blocklist (or known-bad) approach. However, in rare cases, we have seen customers implement the opposite, by defining a list of allowed (or known-good) websites, that can be accessed through the filter.
Bypassing Simple Web Filters Using Host Header Spoofing
When proxies only rely on the
Host
header to determine if a request is legitimate, this can be exploited to bypass such web filters.This requires control over the HTTP request, which can be achieved by malware running on the system or by an attacker or user with system access attempting to bypass the web filter.
Imagine you have the following situation where Alice is able to access the website
legit.example.net
but the access toevil.example.com
is blocked by the firewall based on theHost
headerevil.example.com
:Alice (or a malware on her computer) is now able to bypass the web filter by connecting to
evil.example.net
(leaving the SNI evil.example.net unmodified), but specifying theHost
headerlegit.example.net
:Host
headerThe final IP, TLS and HTTP packet structure looks like this:
Since we only changed the
Host
header, but not the SNI, there is also the added benefit that we can bypass web filters that perform SNI matching with the hostname/SAN from the certificate (see previous blogpost about SNI spoofing).Example Using curl
To craft such a request is easy. Using
curl
, we can control theHost
header as shown below:Here we can see that the SNI is unchanged ① to match the certificate subject but the HTTP request ② contains the spoofed
Host
header ③:Host
headerNote: For demonstration purposes, the TLS connection is decrypted again to allow inspection of the contained HTTP traffic.
We found such bypasses in projects, where the customer e.g. blocked large file uploads to most websites to prevent data exfiltration. In this case, this imposed restriction on our C2 communication, because the C2 implant was not able to transmit larger chunks of data back to our server. By overriding the
Host
header to a value which was excluded from the blocklist (the customer’s own file sharing solution), the filter could be bypassed, allowing unrestricted communication from our C2 implant.Host Header Spoofing Protection and Limitations
The bypass technique discussed above only works if the proxy only uses the Host header to decide whether a website should be blocked or not, ignoring other mechanisms such as SNI inspection/matching.
However, in most cases web filters will perform additional checks to improve resilience against such bypasses. For example, a proxy could verify that the hostname in the SNI and in the
Host
header are identical, and drop requests where they are different.Example: Fortinet FortiGate
The Fortinet FortiGate firewall/proxy has such a feature called “Domain Fronting Protection”4 which blocks mismatches of the hostnames:
The HTTP response looks like this if this is detected:
The message in the log looks like this:
This protection feature is enabled by default but can be disabled:
More about domain fronting will be explained in the next post.
Takeaway
Host header spoofing is a rather simple bypass technique, and – given a correctly configured web filter solution – is easily preventable. Nonetheless, it’s always worth looking for it in your next penetration test or in your own infrastructure!
Also keep in mind that it’s not always about being able/not able to access a specific site, but also about bypassing other restrictions such as large file uploads, or downloading certain file types.
References
SSLKEYLOGFILE
: https://everything.curl.dev/usingcurl/tls/sslkeylogfile.htmlSSLKEYLOGFILE
Format for TLS, https://www.ietf.org/archive/id/draft-ietf-tls-keylogfile-03.txtCompass Security Blog – Read More
Estonia-based Blackwall raises €45 million Series B to protect SMBs from malicious online traffic
/in General NewsA huge chunk of online traffic now comes from bots, both good and bad — but AI is boosting the latter. From DDoS attacks to scraping, there’s a renewed barrage of threats that companies have to deal with. According to cybersecurity entrepreneur Nikita Rozenberg, the impact is more severe for SMBs. “The main difference is […]
© 2024 TechCrunch. All rights reserved. For personal use only.
Security News | TechCrunch – Read More
Abu Dhabi Guidelines Offer Blueprint for Cybersecurity in Health
/in General NewsFollowing increasing attacks on healthcare organizations, the United Arab Emirates has refined its regulatory strategy for improving cybersecurity in healthcare.
darkreading – Read More
Chinese Volt Typhoon Hackers Infiltrated US Electric Utility for Nearly a Year
/in General NewsDragos reveals Volt Typhoon hackers infiltrated a US electric utility for 300 days, collecting sensitive data. Learn how this cyberattack threatens infrastructure.
Hackread – Latest Cybersecurity, Tech, AI, Crypto & Hacking News – Read More