Рет қаралды 4,049
...In this session, I'll show you how to turn your victim's web browser into a desync delivery platform, shifting the request smuggling frontier by exposing single-server websites and internal networks. You'll learn how to combine cross-domain requests with server flaws to poison browser connection pools, install backdoors, and release desync worms....
By: James Kettle
Full Abstract & Presentation Materials: www.blackhat.c...