YoVDO

Passive Fingerprinting of HTTP/2 Clients

Offered By: OWASP Foundation via YouTube

Tags

Network Security Courses HTTP/2 Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the intricacies of passive fingerprinting HTTP/2 clients in this 44-minute conference talk from OWASP AppSec EU 2018. Dive into the fundamental changes from HTTP/1.x to HTTP/2, including the shift to a full binary protocol using TCP connections, streams, and frames. Discover how these changes introduce nuances in protocol implementations that can be leveraged for passive fingerprinting of web clients. Learn about the research based on over 10 million HTTP/2 connections, resulting in fingerprints for more than 40,000 unique user agents across hundreds of implementations. Gain insights into HTTP/2 basics, fingerprint format components, potential use cases, and usage statistics on Akamai's platform. Examine common HTTP/2 implementations, client fingerprints, and the state of HTTP/2 support among popular web security tools. Conclude with a review of real-world HTTP/2 attacks observed on Akamai's platform, providing a comprehensive understanding of this evolving protocol and its security implications.

Syllabus

Passive Fingerprinting of HTTP/2 Clients - Elad Shuster


Taught by

OWASP Foundation

Related Courses

Client-Server Communication
Google via Udacity
First Look: Java 9
LinkedIn Learning
gRPC [Java] Master Class: Build Modern API & Micro services
Udemy
The Node.js Master Class - No Frameworks, No NPM, No Dependencies
Skillshare
Introduction to NGINX
Udemy