Monday, October 18, 2021

HTTP Requests

HTTP Requests

Whenever we visit a page on the web, our computer uses the Hypertext Transfer Protocol (HTTP) to downloads or fetches that page (HTML) from another computer or server somewhere on the Internet.

For example: http://abc456.com/index.html/79u0u 

In server client architecture, HTTP (Hypertext Transfer Protocol) is an application layer protocol used to communicate hypermedia documents between the devices, browsers. It is built over TCP/IP protocol and it works same as a request and response protocol between a client and server. 

There are methods used for HTTP as mentioned below;

  • GET
  • POST
  • PUT
  • HEAD
  • DELETE
  • PATCH
  • OPTIONS

There are two methods which are used: HTTP GET and HTTP POST. 

The HTTP GET request method is used to request a resource from the server. Web browsers generally use HTTP GET and HTTP POST, but others such as desktop and mobile applications use many others forms. It is less secure and is easier to hack for script kiddies because data sent is part of the URL. So it's saved in browser history and server logs in plaintext.

HTTP POST is a method meant to send data to the server from an HTTP client. The HTTP POST method requests the web server accept the data enclosed in the body of the POST message. This is often used while submitting login or contact forms or uploading files and images to the server. The HTTP POST method is used to create or add a resource on the server. It becomes difficult in case of hacking because the parameters are not stored or saved in internet browser history or in web server logs.

GET method is visible to everyone as it will be displayed in the browser's address bar and has limits on the amount of information to send whereas POST method variables are not displayed in the URL.

The initial HTTP protocol was with a version of 0.9 with protocol supported by GET. Then version 1.0 released with supporting protocols GET, POST and HEAD. 

Later 1.1 version came with protocol supported by GET, POST, HEAD, OPTIONS, PUT, DELETE, TRACE, and CONNECT. 

HTTP 2.0 later came also known as HTTP 2 with supporting protocols such as GET, POST, HEAD, OPTIONS, PUT, DELETE, TRACE, CONNECT, and PATCH.

This is just a basic understanding. 

-DR





No comments:

Post a Comment

Network Scanning Tools

Network Scanning through Nmap and Nessus Network scanning is a process used to troubleshoot active devices on a network for vulnerabilities....