Home page logo

pen-test logo Penetration Testing mailing list archives

RE: AkamaiGhost
From: "Bassett, Mark" <mbassett () omaha com>
Date: Thu, 2 Oct 2003 17:20:01 -0500

Akamai hosting hosts very large sites to help load balance.  

Nslookup www.microsoft.com
Name:    a562.cd.akamai.net
Aliases:  www.microsoft.com, www.microsoft.com.edgesuite.net

Mark Bassett
Network Administrator
World media company

-----Original Message-----
From: Jeremy Junginger [mailto:jj () act com] 
Sent: Wednesday, October 01, 2003 1:40 PM
To: pen-test () securityfocus com
Subject: AkamaiGhost

I have recently stumbled across a webserver that I have not seen very
much in
the past, and would like to get some input on the architecture of the
application if any of you have seen it during your penetration testing
free to include archived pen-test/vuln-dev links) .  

The webserver is AkamaiGHost, which, I think stands for Akamai Global
As I understand it, the server is an "internally developed" application
is designed to serve as a "geographically co-located caching server" for
website. Basically, they mirror your site on a server at different
to deliver the content faster from a closer location.  

The host is certainly a Linux machine, as far as IP stack fingerprinting
goes, but ONLY port 80 permitted to the host (at least only TCP port 80,
have not yet run a UDP scan on the machine)...so it begins... :)

At any rate, I would like to know if any of you have conducted pen-tests
against such a host, and your experiences if you have.  Thanks, and have
great day.

Oops, almost forgot, the nessus and amap scans were inconclusive (other
"HTTP is open"), and here is some HTML output from a few
too great...just 400 responses :)

HEAD / HTTP/1.0 yields the following:

HTTP/1.0 400 Bad Request
Server: AkamaiGHost
Mime-Version: 1.0
Content-Type: text/html
Content-Length: 132
Connection: close

GET /stuff /HTTP/1.0 gets the following response:

HTTP/1.0 400 Bad Request
Server: AkamaiGHost
Mime-Version: 1.0
Content-Type: text/html
Content-Length: 136
Connection: close

<H1>Invalid URL</H1>
The requested URL "&#47;stuff", is invalid.<p>



This e-mail message and all attachments transmitted with it may be
and are intended solely for the addressee(s). If you are not the
intended recipient
or the person responsible for delivering it to the intended recipient,
you are
hereby notified that any reading, dissemination, distribution, copying,
or other 
use of this message or its attachment(s) is strictly prohibited.  If you
this email in error, please immediately notify the sender of the message
Best Software, Inc. by e-mailing postmaster () bestsoftware com and destroy
all copies 
of this message.  Best Software, for the protection of our internal
systems and 
those of our customers, does block most email attachments.


Tired of constantly searching the web for the latest exploits?
Tired of using 300 different tools to do one job?
Get CORE IMPACT and get some rest.

  By Date           By Thread  

Current thread:
  • AkamaiGhost Jeremy Junginger (Oct 01)
    • <Possible follow-ups>
    • RE: AkamaiGhost Bassett, Mark (Oct 02)
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]