Practical Attacks Using HTTP Request Smuggling
Offered By: NahamSec via YouTube
Course Description
Overview
Explore practical attacks using HTTP request smuggling in this 45-minute conference talk from NahamCon2020. Dive into CL.TE and TE.CL desync attacks, learn testing techniques for request smuggling, and understand the impact radius of RS. Follow along with real-world desync attack and reconnaissance stories, and examine proof-of-concept demonstrations for session stealing using open redirects and response queue poisoning. Gain valuable insights into web security vulnerabilities and attack methodologies from this virtual security conference presentation.
Syllabus
Intro
CL.TE / TE.CL Desync Attacks
CL.TE Desync Attack
Testing for Request Smuggling
Impact Radius of RS
Desync Attack/Recon Story #1
Desync Attack/Recon Story #2
Desync Attack/Recon Story #3
POC #1 - Sesson Stealing using an Open Redirect
PoC #1 - Session Stealing using an Open Redirect
POC #2 - Session Stealing using Response Queue Poisoning
VIRTUAL SECURITY CONFERENCE 06.13.2020
Taught by
NahamSec
Related Courses
HTTP Request Smuggling in 2020 - New Variants, New Defenses and New ChallengesBlack Hat via YouTube HTTP Desync Attacks - Request Smuggling Reborn
Black Hat via YouTube Request Smuggling 101
NorthSec via YouTube Ekoparty #UniTalks Colombia - HTTP Request Smuggling
Ekoparty Security Conference via YouTube Browser-Powered Desync Attacks - A New Frontier in HTTP Request Smuggling
Black Hat via YouTube