A Web Server For Bug Bounty Hunters (Part 1)

FulPlan Mutasim
3 min readOct 11, 2021

To be able to completely compromise a server, you have to understand the theory of a web server and its architecture. A web server is computer software or hardware which has the functionality to store data and process data and deliver data through a client browser and a server.

Hello respectful readers. I am Mutasim Abubakar known as fulplan a bug bounty hunter and cybersecurity enthusiasm in today’s write-up. I am explaining the theory of web server, web server attacks, and web server attack methodology. And in the conclusion of my write-up, I will explain the preventive measures needed to take place to prevent web server attacks.

  • Web Server Concept
  • Web Server Attack
  • Web Server Attack Methodology
  • Web Server Preventive Measures

Web Server Concept

To be able to completely compromise a server, you have to understand the theory of a web server and its architecture.
Let talk about what a web server is, A web server is computer software or hardware which has the functionality to store data and process data and deliver data through a client web application called a web browser such as (Firefox, Chrome, Opera Mini, etc.) through HTTP/HTTP’s, web network protocol.

A web server has some components there are:
1. Document Root: This is used to store critical HTML files related to the web pages of a domain that will be rendered when a client user sends an HTTP request or communicate with the server. This is mostly found in a server system directory it’s also the writable counterpart to other User Binaries & Read-Only Data found on a web server directory, which must be read-only in normal operation for everyone accessing the server on the web. In simple words: When someone else looks at your website, The Document root directory is the location they will be accessing.

The document root is the “WWW” mostly by default on the Linux systems directory, but of course, some hosts may well use a different folder. Some of the more common alternatives are:

  • htdocs
  • httpdocs
  • html
  • public_html
  • web

2. Server Root: This is the important root directory under the directory tree in which configurations and errors, executables, and logs are stored. The server root consists of four files one file is purposely the code that implements the server whiles the other three files are subdirectories, namely Conf, Logs, Cgi-bin.

  • Conf — A Conf file is a configuration or “config” file used on Unix and Linux based systems. It stores settings used to configure system processes and applications.
  • Logs — Log file is used to maintain a set of records for the administrators or owner to keep track of important events. They contain messages about the computer/server, including the kernel, services, and applications running on it.
  • Cgi-bin : Popularly known as CGI Common Gateway Interface. Which is used for accommodating the use of scripts in Web design. It is also a standard for interfacing external applications with Apache Web servers. /usr/lib/cgi-bin/ is cgi-bin directory. If you have public_htm directory, then cgi-bin directory should be inside this directory. Once you located cgi-bin directory, you can use it.

3. Virtual Document Tree: This is similar to virtual hosting, but for virtual document tree, it is used to provide storage on a different machine or disk after the original disk is full. Such as (AWS, cloud Dropbox, iCloud, Google Drive, Microsoft One Drive and IDrive, and more)

4. Virtual Hosting: This is a technique used for hosting multiple domain names or a website on a single server. This allows one server to share its resources, such as memory and processor cycles, without requiring all services provided to use the same hostname.

5. Web Proxy: This is a tool that acts as another client in a middle of a network protocol that facilitates your connection to a web server.

It makes requests to the real server on behalf of the client, or sometimes fulfills the claim itself.

Fellow me for more.

Twitter

--

--

FulPlan Mutasim

• Bug bounty Hunter • Red Teamer • Activist • Hacktivist • Privacy Advocate • Programmer • Free Software Fan • Cybersecurity Curious.