You are on page 1of 7

PUA SRG

07/03/2015
Meeting 2 GET/POST Requests and Responses

1 PING
Ping is a computer network administration software utility used to test the reachability of a host on an
Internet Protocol (IP) network and to measure the round-trip time for messages sent from the
originating host to a destination computer. The name comes from active sonar terminology which sends
a pulse of sound and listens for the echo to detect objects underwater.
Ping operates by sending Internet Control Message Protocol (ICMP) echo request packets to the target
host and waiting for an ICMP response. In the process it measures the time from transmission to
reception (round-trip time) and records any packet loss. The results of the test are printed in the form of
a statistical summary of the response packets received, including the minimum, maximum, and the
mean round-trip times, and sometimes the standard deviation of the mean.
http://tools.ietf.org/html/rfc1122
http://en.wikipedia.org/wiki/Ping_%28networking_utility%29

1/7

PUA SRG

07/03/2015

2/7

PUA SRG

07/03/2015

2 HTTP
The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative,
hypermedia information systems. HTTP is the foundation of data communication for the World Wide
Web.
Hypertext is structured text that uses logical links (hyperlinks) between nodes containing text. HTTP is
the protocol to exchange or transfer hypertext.
The standards development of HTTP was coordinated by the Internet Engineering Task Force (IETF)
and the World Wide Web Consortium (W3C), culminating in the publication of a series of Requests for
Comments (RFCs), most notably RFC 2616 (June 1999), which defined HTTP/1.1, the version of
HTTP most commonly used today. In June 2014, RFC 2616 was retired and HTTP/1.1 was redefined
by RFCs 7230, 7231, 7232, 7233, 7234, and 7235. HTTP/2 is currently in draft form.
HTTP functions as a request-response protocol in the client-server computing model. A web browser,
for example, may be the client and an application running on a computer hosting a web site may be the
server. The client submits an HTTP request message to the server. The server, which provides
resources such as HTML files and other content, or performs other functions on behalf of the client,
returns a response message to the client. The response contains completion status information about the
request and may also contain requested content in its message body.
A web browser is an example of a user agent (UA). Other types of user agent include the indexing
software used by search providers (web crawlers), voice browsers, mobile apps, and other software that
accesses, consumes, or displays web content.
GET
Requests a representation of the specified resource. Requests using GET should only retrieve data
and should have no other effect. (This is also true of some other HTTP methods.) The W3C has
published guidance principles on this distinction, saying, "Web application design should be
informed by the above principles, but also by the relevant limitations." See safe methods below.
POST
Requests that the server accept the entity enclosed in the request as a new subordinate of the web
resource identified by the URI. The data POSTed might be, for example, an annotation for
existing resources; a message for a bulletin board, newsgroup, mailing list, or comment thread; a
block of data that is the result of submitting a web form to a data-handling process; or an item to
add to a database.
http://www.w3.org/Protocols/
http://en.wikipedia.org/wiki/List_of_HTTP_status_codes
3/7

PUA SRG

07/03/2015

The request message consists of the following:


A request line, for example GET /images/logo.png HTTP/1.1, which requests a
resource called /images/logo.png from the server.
Request header fields, such as Accept-Language: en
An empty line.
An optional message body.
The response message consists of the following:
A Status-Line, which include the status code and reason message. (e.g., HTTP/1.1 200 OK,
which indicates that the client's request succeeded)
Response header fields, such as Content-Type: text/html
An empty line
An optional message body
Below is a sample conversation between an HTTP client and an HTTP server running on
www.example.com, port 80.

Client request
GET /index.html HTTP/1.1
Host: www.example.com

A client request (consisting in this case of the request line and only one header field) is followed by a
blank line, so that the request ends with a double newline, each in the form of a carriage return
followed by a line feed. The "Host" field distinguishes between various DNS names sharing a single IP
address, allowing name-based virtual hosting. While optional in HTTP/1.0, it is mandatory in
HTTP/1.1.

Server response
HTTP/1.1 200 OK
Date: Mon, 23 May 2005 22:38:34 GMT
Server: Apache/1.3.3.7 (Unix) (Red-Hat/Linux)
Last-Modified: Wed, 08 Jan 2003 23:11:55 GMT
ETag: "3f80f-1b6-3e1cb03b"
Content-Type: text/html; charset=UTF-8
Content-Length: 131
Accept-Ranges: bytes
Connection: close
<html>
<head>
<title>An Example Page</title>

4/7

PUA SRG

07/03/2015

</head>
<body>
Hello World, this is a very simple HTML document.
</body>
</html>

he ETag (entity tag) header field is used to determine if a cached version of the requested resource is
identical to the current version of the resource on the server. Content-Type specifies the Internet media
type of the data conveyed by the HTTP message, while Content-Length indicates its length in bytes.
The HTTP/1.1 webserver publishes its ability to respond to requests for certain byte ranges of the
document by setting the field Accept-Ranges: bytes. This is useful, if the client needs to have only
certain portions[27] of a resource sent by the server, which is called byte serving. When Connection:
close is sent, it means that the web server will close the TCP connection immediately after the transfer
of this response.
Most of the header lines are optional. When Content-Length is missing the length is determined in
other ways. Chunked transfer encoding uses a chunk size of 0 to mark the end of the content. Identity
encoding without Content-Length reads content until the socket is closed.
A Content-Encoding like gzip can be used to compress the transmitted data.

3 Using firefox's Network Monitor tools


Check attached pdf.
https://developer.mozilla.org/en-US/docs/Tools/Network_Monitor
and finally...I leave you with the hacker's manifesto

5/7

PUA SRG

07/03/2015

==Phrack Inc.==
Volume One, Issue 7, Phile 3 of 10
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
The following was written shortly after my arrest...
\/\The Conscience of a Hacker/\/
by
+++The Mentor+++
Written on January 8, 1986
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Another one got caught today, it's all over the papers. "Teenager
Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
Damn kids. They're all alike.
But did you, in your three-piece psychology and 1950's technobrain,
ever take a look behind the eyes of the hacker? Did you ever wonder what
made him tick, what forces shaped him, what may have molded him?
I am a hacker, enter my world...
Mine is a world that begins with school... I'm smarter than most of
the other kids, this crap they teach us bores me...
Damn underachiever. They're all alike.
I'm in junior high or high school. I've listened to teachers explain
for the fifteenth time how to reduce a fraction. I understand it. "No, Ms.
Smith, I didn't show my work. I did it in my head..."
Damn kid. Probably copied it. They're all alike.
I made a discovery today. I found a computer. Wait a second, this is
cool. It does what I want it to. If it makes a mistake, it's because I
screwed it up. Not because it doesn't like me...
Or feels threatened by me...
Or thinks I'm a smart ass...
Or doesn't like teaching and shouldn't be here...
Damn kid. All he does is play games. They're all alike.
And then it happened... a door opened to a world... rushing through
the phone line like heroin through an addict's veins, an electronic pulse is
sent out, a refuge from the day-to-day incompetencies is sought... a board is
found.
"This is it... this is where I belong..."
I know everyone here... even if I've never met them, never talked to
them, may never hear from them again... I know you all...
Damn kid. Tying up the phone line again. They're all alike...
You bet your ass we're all alike... we've been spoon-fed baby food at
school when we hungered for steak... the bits of meat that you did let slip
through were pre-chewed and tasteless. We've been dominated by sadists, or
ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert.
This is our world now... the world of the electron and the switch, the
beauty of the baud. We make use of a service already existing without paying
for what could be dirt-cheap if it wasn't run by profiteering gluttons, and
you call us criminals. We explore... and you call us criminals. We seek
after knowledge... and you call us criminals. We exist without skin color,
without nationality, without religious bias... and you call us criminals.

6/7

PUA SRG

07/03/2015

You build atomic bombs, you wage wars, you murder, cheat, and lie to us
and try to make us believe it's for our own good, yet we're the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is
that of judging people by what they say and think, not what they look like.
My crime is that of outsmarting you, something that you will never forgive me
for.
I am a hacker, and this is my manifesto. You may stop this individual,
but you can't stop us all... after all, we're all alike.
+++The Mentor+++
_______________________________________________________________________________

http://phrack.org/issues/7/3.html
http://en.wikipedia.org/wiki/Hacker_Manifesto

7/7

You might also like