HTTP/2 - The Sequel is Always Worse
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the frontier of HTTP/2 research in this Black Hat conference talk, uncovering implementation flaws and RFC imperfections that enable HTTP/2-exclusive desync attacks. Delve into case studies targeting high-profile websites powered by various servers, including Amazon's Application Load Balancer, WAFs, CDNs, and bespoke stacks by big tech. Learn about request smuggling via HTTP/2 downgrades, H2.TE Desync attacks, H2.X via Request Splitting, and ambiguous HTTP/2 requests. Discover potential attacks, including URL token hijacking, header hijacking, and cache poisoning via tunnelling. Examine the tooling situation and defense strategies against these vulnerabilities. Gain valuable insights into the security implications of HTTP/2 implementation and walk away with key takeaways to enhance your understanding of this protocol's potential risks.
Syllabus
Intro
Outline
Request Smuggling via HTTP/2 downgrades
H2.TE Desync: URL token hijack
H2.TE Desync: Header hijack
H2.X via Request Splitting - Resp Queue Poisoning
H2.TE via request line injection
Possible attacks
No connection reuse
Tunnelling confirmation
Tunnel-vision Problem: Front-end reads Scontent-length bytes from back-end
Leaking internal headers via tunnelling
Cache poisoning via tunnelling
Ambiguous HTTP/2 requests
URL prefix injection
Header name splitting
The tooling situation Existing tooling does not work
Defence
References & further reading
Takeaways
Taught by
Black Hat
Related Courses
Internet History, Technology, and SecurityUniversity of Michigan via Coursera Client-Server Communication
Google via Udacity HTTP & Web Servers
Udacity Network Security
Georgia Institute of Technology via Udacity Web Security Fundamentals
KU Leuven University via edX