Home » Vulnerabilities Knowledge Base » Excessive Information in headers
By default, Apache reveals server version, OS, and modules in HTTP headers. Attackers can exploit this information.
We can hide sensitive response headers to improve security.
httpd -M
httpd -V
LoadModule headers_module modules/mod_headers.so
ServerSignature Off
ServerTokens Prod
<IfModule mod_headers.c>
Header unset Server
Header unset X-Powered-By
</IfModule>
<httpProtocol>
<customHeaders>
<remove name="X-Powered-By" />
</customHeaders>
</httpProtocol>
Response.Headers.Remove("Server");
<httpRuntime enableVersionHeader="false" />
MvcHandler.DisableMvcResponseHeader = true;
This prevents the exposure of server details that attackers can leverage for targeted attacks.
Content Sniffing
Certain browsers, try to determine the content type and encoding of the response even when these properties are defined correctly...
Content Sniffing
Certain browsers, try to determine the content type and encoding of the response even when these properties are defined correctly...
Content Sniffing
Certain browsers, try to determine the content type and encoding of the response even when these properties are defined correctly...
Content Sniffing
Certain browsers, try to determine the content type and encoding of the response even when these properties are defined correctly...