Practical Attacks Using HTTP Request Smuggling
Offered By: NahamSec via YouTube
Course Description
Overview
Explore practical attacks using HTTP request smuggling in this 45-minute conference talk from NahamCon2020. Dive into CL.TE and TE.CL desync attacks, learn testing techniques for request smuggling, and understand the impact radius of RS. Follow along with real-world desync attack and reconnaissance stories, and examine proof-of-concept demonstrations for session stealing using open redirects and response queue poisoning. Gain valuable insights into web security vulnerabilities and attack methodologies from this virtual security conference presentation.
Syllabus
Intro
CL.TE / TE.CL Desync Attacks
CL.TE Desync Attack
Testing for Request Smuggling
Impact Radius of RS
Desync Attack/Recon Story #1
Desync Attack/Recon Story #2
Desync Attack/Recon Story #3
POC #1 - Sesson Stealing using an Open Redirect
PoC #1 - Session Stealing using an Open Redirect
POC #2 - Session Stealing using Response Queue Poisoning
VIRTUAL SECURITY CONFERENCE 06.13.2020
Taught by
NahamSec
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network