094 90 48200     Get SUPPORT

Aniar IT Services Blog

URL Manipulation and What to Do About It

URL Manipulation and What to Do About It

Most people know what a URL is. It’s the address of a website, typically starting with http:// or https://, and it is essentially the location of a web page or application that can be accessed through a web browser or application. Nowadays, URLs are being manipulated by actors for both positive and negative means. Let’s take a look at URL manipulation and how it could affect you.


Before we get into the manipulation of the URL, let’s define its parts. 

The first part of the URL is called the protocol, which tells the computing network which language is being used to communicate on said network. Most of the time, the URL will use the protocol “HTTP”. The HyperText Transfer Protocol makes it possible to exchange web pages. Other protocols that are used include File Transfer Protocol, News, and Mailto. 

The second part of the URL is the ID and password, which makes it possible to access secure servers on the network. This part is typically removed because the password will be visible and transfer unencrypted over the computer network.

The third part of the URL is the server name. It allows users to access information stored on specific servers whether through a domain or the IP address associated with the server. 

The fourth part of the URL is the port number. This number is associated with a service and tells the server what type of resources are being requested. The default port is port 80, which can be left off the URL as long as the information that is being requested is associated with port 80.

Finally, the fifth, and last, part of the URL is the path. The path gives direct access to the resources found tied to the IP (or domain).

Manipulating the URL

By manipulating parts of the URL, a hacker can gain access to web pages found on servers that they wouldn’t normally have access to. Most users will visit a website and then use the links provided by the website. This will get them to where they need to go without much problem, but it creates their own perimeters.

When a hacker wants to test the site for vulnerabilities, he’ll start by manually modifying the parameters to try different values. If the web designer hasn’t anticipated this behavior, a hacker could potentially obtain access to a typically-protected part of the website. This trial and error method, where a hacker tests directories and file extensions randomly to find important information can be automated, allowing hackers to get through whole websites in seconds. 

With this method they can try searching for directories that make it possible to control the site, scripts that reveal information about the site, or for hidden files. 

Directory traversal attacks, also known as path traversal attacks, are also popular. This is where the hacker will modify the tree structure path in a URL to force a server to access unauthorized parts of the website. On vulnerable servers, hackers will be able to move through directories simply.

What You Can Do?

Securing your server against URL attacks is important. You need to ensure that all of your software is updated with the latest threat definitions, and keeping a detailed configuration will keep users in their lanes, even those who know all the tricks. 

The IT experts at Aniar IT Services can help you keep your business’ IT infrastructure from working against you. Call us today at 094 90 48200 for more information about how to maintain your organization’s network security.

Big Data for the Small Business
Cybersecurity: An Origin Story


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, November 14 2019

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Privacy Cloud Email User Tips Productivity Microsoft Internet Network Security Innovation Hosted Solutions Workplace Tips Data Hackers Google Hardware Tech Term Communications Managed IT Services Software Data Backup Efficiency Cybersecurity IT Support Communication IT Services Windows 10 Data Recovery Mobile Devices Computer Small Business Cloud Computing Smartphones Business Artificial Intelligence VoIP Collaboration Android Smartphone Gadgets Mobile Device Malware Network Outsourced IT Users Backup Internet of Things Spam Business Management Browser Phishing Miscellaneous Server Windows Business Continuity Information Managed Service Office 365 Chrome How To Router Upgrade Saving Money Applications BDR Passwords Computers Word Cybercrime Money Mobile Device Management Display Vulnerability Encryption Infrastructure Operating System Two-factor Authentication History BYOD Staff Windows 7 Blockchain Facebook Microsoft Office Data Protection Remote Monitoring Settings Paperless Office Data Security Holiday Data Storage Ransomware Connectivity Social Media Access Control Spam Blocking Digital Signage Law Enforcement Sports Machine Learning Cryptocurrency Telephony CES Software as a Service Scam Bring Your Own Device Training Managed IT Fraud Wi-Fi IT Management Business Intelligence Human Resources Update Keyboard Content Management App Quick Tips Meetings Augmented Reality Botnet VPN Processor Password Google Drive Disaster Recovery Apps Virtual Assistant Managed IT services Government Redundancy Voice over Internet Protocol Automation Patch Management Telephone Systems Private Cloud IT Plan Save Money Social Engineering OneNote Virtualization Big Data Avoiding Downtime Website Unsupported Software Education Identity Theft Servers Telephone System Comparison Vendor Help Desk Google Docs Remote Computing Workers Wireless Compliance Specifications Batteries Data Management Printer Tip of the week Cleaning Cortana Alert Trending Employee/Employer Relationship FENG Mobile Computing Default App Evernote HaaS Virtual Machine Recycling Devices Cryptomining Biometric Security Information Technology Windows Server 2008 R2 Authentication Google Search Virtual Private Network YouTube Mouse Windows Server 2008 Practices Safe Mode Security Cameras Cache Smart Office HBO IT Infrastructure Networking Shortcuts Hypervisor eWaste Thought Leadership Solid State Drive Remote Worker Database Telecommuting Manufacturing Amazon Computer Care 5G Bandwidth Windows 10s Save Time Remote Workers Downtime Microchip Charger Hosted Computing Screen Mirroring Smartwatch Skype Data Breach Wireless Internet Document Management Camera Outlook Investment Employer-Employee Relationship Enterprise Content Management Mobility Vendor Management The Internet of Things Legal Audit Physical Security Wiring Business Technology Travel Remote Work Virtual Reality Amazon Web Services Hacker Accountants Hard Drive Password Manager Nanotechnology Proactive IT Tools Work/Life Balance Managed IT Service Root Cause Analysis Search Engine ROI Wireless Charging Inventory Cast Health Start Menu Project Management HIPAA USB Frequently Asked Questions Recovery Password Management Social Sync Multi-Factor Security Saving Time Criminal Firewall Cabling Bing WiFi Business Mangement Smart Tech Public Cloud MSP Net Neutrality Millennials Managed Services Provider Digital Signature GDPR Google Apps Employee Bitcoin Electronic Medical Records Wire Entertainment Warranty Excel Data loss NIST Procurement Addiction Computer Fan Unified Threat Management Cables Online Shopping HVAC Flash Gmail Software Tips File Sharing ISP Value Workforce OLED Using Data Credit Cards PDF CrashOverride Windows 10 Public Speaking Presentation Regulation Managed Service Provider Lithium-ion battery Hiring/Firing Wireless Technology Emergency Tech Support Company Culture Safety IBM Fun Productivity Marketing Budget Managing Stress Competition Customer Relationship Management Printers Twitter IP Address Personal Information Hard Drives Customer Service Search Mobile Office Financial Domains