Practical Attacks Using HTTP Request Smuggling
Offered By: NahamSec via YouTube
Course Description
Overview
Explore practical attacks using HTTP request smuggling in this 45-minute conference talk from NahamCon2020. Dive into CL.TE and TE.CL desync attacks, learn testing techniques for request smuggling, and understand the impact radius of RS. Follow along with real-world desync attack and reconnaissance stories, and examine proof-of-concept demonstrations for session stealing using open redirects and response queue poisoning. Gain valuable insights into web security vulnerabilities and attack methodologies from this virtual security conference presentation.
Syllabus
Intro
CL.TE / TE.CL Desync Attacks
CL.TE Desync Attack
Testing for Request Smuggling
Impact Radius of RS
Desync Attack/Recon Story #1
Desync Attack/Recon Story #2
Desync Attack/Recon Story #3
POC #1 - Sesson Stealing using an Open Redirect
PoC #1 - Session Stealing using an Open Redirect
POC #2 - Session Stealing using Response Queue Poisoning
VIRTUAL SECURITY CONFERENCE 06.13.2020
Taught by
NahamSec
Related Courses
Bug Bounty In HindiYouTube Secure Development, Programming, and Coding with Veracode
Cybrary Live Recon on Rockstar Games - Vulnerability Testing Methodology
NahamSec via YouTube Exploiting CORS Misconfigurations for Bitcoins and Bounties - AppSec EU 2017
OWASP Foundation via YouTube The Dark Side of Search Engine Optimization Campaigns - AppSec EU 2017
OWASP Foundation via YouTube