Hey guys, welcome back. In this post, I am going to post all the HTTP (Hypertext Transfer Protocol) errors response status code. Status codes are issued by a server in response to a client's request made to the server. The first digit of the status code specifies one of five standard classes of responses. The message phrases shown are typical, but any human-readable alternative may be provided. Unless otherwise stated, the status code is part of the HTTP/1.1 standard (RFC 7231).
The Internet Assigned Numbers Authority (IANA) maintains the official registry of HTTP status codes. The first digit of the status-code defines the class of response, while the last two digits do not have any classifying or categorization role.
Here are some list of HTTP status codes error:
- 400 (Bad request)
- 401 (Authorization required)
- 402 (Payment required)
- 403 (Forbidden)
- 404 (Not found)
- 405 (Method not allowed)
- 406 (Not acceptable)
- 407 (Proxy authentication required)
- 408 (Request Timeout)
- 409 (Conflict)
- 410 (Gone)
- 411 (Length required)
- 412 (Precondition failed)
- 413 (Request entity too large)
- 414 (Request URI too large)
- 415 (Unsupported media type)
- 416 (Request range not satisfiable)
- 417 (Expectation failed)
- 422 (Unprocessable entity)
- 423 (Locked)
- 424 (Failed dependency)
- 500 (Internal server error)
- 501 (Not Implemented)
- 502 (Bad gateway)
- 503 (Service unavailable)
- 504 (Gateway timeout)
- 505 (HTTP version not supported)
- 506 (Variant also negotiates)
- 507 (Insufficient storage)
- 510 (Not extended)
Hacking Tools:
What are Hacking Tools?
Hacking Tools are computer programs and scripts that help you find and exploit weaknesses in computer systems, web applications, servers and networks. There are a variety of such tools available in the market. Users can easily download hack tools for ethical hacking. Some of them are open source while others are commercial solutions.
Following is a handpicked list of hacking tools that are very popular:.
*cpf* - Perl script that scans web servers for administrative login and control panel sections
*AdminLoginFnder* - is a perl script that scans webservers for administrative login / control panel sections.
*Aircrack-ng* - 802.11 WEP and WPA-PSK keys cracking program
*cintruder* - an automatic pen-testing tool to bypass captchas
*cmsexplore* - is designed to reveal the specific modules, plugins, components and themes that various CMS driven web sites are running
*darkd0rk3r* - dork searching and searches for local file inclusion and SQL injection
*dsniff* - is a collection of tools for network auditing and penetration testing
*hashcatplus* - a GPGPU-based multi-hash cracker
*hashid* - identifies the different types of hashes used to encrypt data
*Image-exiftool* - provides an extensible set of Perl modules to read and write meta information in a wide variety of image, audio and video files
*johntheripper* - a fast password cracker
*maltego* - an open-source intelligence and forensics application
*networkmine* - a Network Forensic Analysis Tool (NFAT) for Windows
*nikto* - an Open Source web server scanner
*nipper* - used to make observations about the security configurations of many different device types such as routers, firewalls, and switches
*nmap* - a free and open-source utility for network discovery and security auditing
*sqlmap* - an open-source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws
*shodan* - "unsafe routers and more" list
*uniscan* - a simple Remote File Include, Local File Include and Remote Command Execution vulnerability scanner
*unix-privesc-checker* - tries to find misconfigurations that could allow local unprivileged users to escalate privileges to other users
*wireshark* - a network protocol analyzer for Unix and Windows
*wpscan* - a black box WordPress vulnerability scanner
*xsser* - an automatic -framework- to detect, exploit and report XSS vulnerabilities in web-based applications