Staying Safe in Times of Cyber Uncertainty
Check Point Advisories

Security Best Practice: Familiarize Yourself with the Header Spoofing Protection

Check Point Reference: SBP-2008-22
Date Published: 15 Aug 2008
Severity: Medium
Last Updated: Wednesday 17 March, 2010
Source: IPS Research Center
Protection Provided by:
Who is Vulnerable? Web Servers
Vulnerability Description One of the first steps an attacker takes before attacking a website is to analyze the web server response in order to gather as much information as possible about it. This is known as "fingerprinting".
Vulnerability DetailsSome headers in the HTTP response from the web server contain information that can be used by an attacker to identify the web server. The attacker can then launch an attack that exploits weaknesses in that particular web server.

Protection Overview

This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.