Exploiting HTTP request smuggling to capture other users' requests (Video solution, Audio)

  Рет қаралды 16,730

Michael Sommer

Michael Sommer

Күн бұрын

Пікірлер: 13
@jmcsmtp
@jmcsmtp Жыл бұрын
Thank you very much for this video walkthrough. For anyone struggling with this lab, note that the content-length for the smuggled request may change from what others report. It is important to adjust for your own tests.
@georgpauwen5944
@georgpauwen5944 2 жыл бұрын
For anyone struggling with this, I had to set the content length to 835 in order to get the full length of the token. Anything shorter wold result in a truncated, incomplete token.
@JuanBotes
@JuanBotes 2 жыл бұрын
thanks for sharing the content and talking through the lab appreciated \o/
@rastislonge6370
@rastislonge6370 Жыл бұрын
For me when I send a Content-Length of 881 it returns everything except the session token and when I try to make it any longer then it's considered too long and times out...
@naifal-anazi4525
@naifal-anazi4525 3 жыл бұрын
How can you know the Content-length number ?
@halfluke
@halfluke 2 жыл бұрын
you can't, you have to guess, start from a value and increment until you capture the full victim cookie. This lab is pretty hard but in this case this video solution really helps
@rajanrawal6396
@rajanrawal6396 2 жыл бұрын
@@halfluke there is update length options, it will atomatically update content length..
@halfluke
@halfluke 2 жыл бұрын
@@rajanrawal6396 nope, we are talking about the smuggled request, which appears in the body of the first POST / request. Here the content-length header is not updated and you have to find out a satisfying number yourself
@rajanrawal6396
@rajanrawal6396 2 жыл бұрын
@@halfluke thanks dude. i see
@CyberBionicX
@CyberBionicX Жыл бұрын
Thanks for the solution but my bad luck. last 3 days I'm trying and stuck on same error ""Invalid CSRF token (session does not contain a CSRF token)"" . ah Solved it.
@GuiltySpark
@GuiltySpark 2 жыл бұрын
This one will not solve it can't possibly work this way or at least the lab needs more work to make this smoother
@christopherortiz4971
@christopherortiz4971 Жыл бұрын
Thank you very much.
@pranshushakya2106
@pranshushakya2106 2 жыл бұрын
it's not solving
У вас там какие таланты ?😂
00:19
Карина Хафизова
Рет қаралды 25 МЛН
風船をキャッチしろ!🎈 Balloon catch Challenges
00:57
はじめしゃちょー(hajime)
Рет қаралды 66 МЛН
КОГДА К БАТЕ ПРИШЕЛ ДРУГ😂#shorts
00:59
BATEK_OFFICIAL
Рет қаралды 7 МЛН
JWT   Lab05
7:20
Michael Sommer
Рет қаралды 3,7 М.
SSH Keys
10:12
RobEdwards
Рет қаралды 122 М.
CSRF where token is duplicated in cookie (Audio, Explanations)
13:57
Lab: H2.CL request smuggling
13:25
InfoSec
Рет қаралды 2,8 М.
Configuring an HTTP Load Balancer with Autoscaling | GCCP #lab
17:21
CSRF where token is duplicated in cookie (Audio, Comments)
8:11
Michael Sommer
Рет қаралды 2,6 М.
Difference between cookies, session and tokens
11:53
Valentin Despa
Рет қаралды 650 М.
Get your battery storage box
0:14
Nikola Toy
Рет қаралды 23 МЛН
iPhone включил камеру 📲
0:32
serg1us
Рет қаралды 393 М.
Зачем вам нужен телефон?
0:31
Apros I
Рет қаралды 143 М.
Проверил, как вам?
0:53
Коннор
Рет қаралды 573 М.