HACKING HTTP/2: h2c SMUGGLING

  Рет қаралды 13,445

Farah Hawa

Farah Hawa

Күн бұрын

Пікірлер: 52
@N7Tonik
@N7Tonik 3 жыл бұрын
3:07 I don't understand why the proxy stops monitoring the content? how does the h2c connection prevent the proxy from monitoring the connection??
@abdulx01
@abdulx01 3 жыл бұрын
Where is the article link ?>
@FarahHawa
@FarahHawa 3 жыл бұрын
in the description!
@virenjoshi
@virenjoshi 3 жыл бұрын
I was trying to complete new portswigger labs related to this topic and I found your video :D
@meljithpereira5532
@meljithpereira5532 3 жыл бұрын
Beautiful explain as well as good concept...❤️🇮🇳
@macktheripper7454
@macktheripper7454 3 жыл бұрын
Gorgeous as always and great video
@tangent69
@tangent69 3 жыл бұрын
So good to see you after a long time
@gurpreetapej
@gurpreetapej 2 жыл бұрын
All proxies, load balancers do not monitor or inspect layer 7 headers and its pay load and if you want that to be inspected one has to have WAF ( web application firewall ) so that each HTTP transaction is inspected. Its not Load balancer or proxy job to inspect path or its content.
@MokshitKalRa
@MokshitKalRa 3 жыл бұрын
Finally She remembered, She has a KZbin channel also 😀😀 😂
@manline_root2770
@manline_root2770 3 жыл бұрын
good Explained !! but we can't use of burpsuite so intercept their request am right ???
@anirudhm.s.4546
@anirudhm.s.4546 3 жыл бұрын
Hey, I found the visual representation of the protocol switch very helpful ( 1:11 - 2:26 ). Throwing out an idea here but I think you should do that when you're explaining H2C as a concept as well (I mean in the beginning 0:27 - 1:11 where I see you speaking about it but there isn't a visual reference for me) What I mean to say is, because of this video, I have a good understanding of the switching of protocol to H2C but not about H2C in general. This is like a User-Experience feedback I guess and I hope it helps your upcoming videos.
@FarahHawa
@FarahHawa 3 жыл бұрын
Hmmm interesting! I’ll keep this is mind for future videos, thanks for the suggestion! :)
@Aolpha
@Aolpha 3 жыл бұрын
So you are saying When a h2c is established It's not check by the proxy server and it's forwarded to the server directly?
@mathusankar5671
@mathusankar5671 3 жыл бұрын
😍After long time see you 😍And make attacks h2c in your video 😍
@dhivishvarshan3857
@dhivishvarshan3857 3 жыл бұрын
Hey!Super clear explanation.please do a practical video about dependency confusion.
@jellemulckhuijse1771
@jellemulckhuijse1771 3 жыл бұрын
You cannot bypass every access control of the application. just the ones that are in the proxy part of the application.
@shivamchaudhary6974
@shivamchaudhary6974 3 жыл бұрын
Farah please tell me programming language is essential or not for bug bounties Please. 🤗
@kishor6881
@kishor6881 3 жыл бұрын
Mam 1 month ke baad...
@bravo-6900
@bravo-6900 3 жыл бұрын
why you in haste?
@Thisisrealfaizan
@Thisisrealfaizan 3 жыл бұрын
Where from you?
@maheshkumarkaushik7582
@maheshkumarkaushik7582 3 жыл бұрын
Very very good explanation 👍☺️
@kabirsingh9584
@kabirsingh9584 3 жыл бұрын
i am class 10th student. and I already learn owasp top 10 with help of DVWA and burpsuit. and learn html css and javascript language. and solve portswigger lab but i am not find bug . i am window user mein wifi ka password hack karna sikh gya, multiple ip addersse use karna sikha gya , kya mujha linux tool use karna nahi aata can you suggest me how to learn tools like assetfinder , dirsearch.etc
@premprakash6138
@premprakash6138 3 жыл бұрын
The best you tuber
@omjha90
@omjha90 3 жыл бұрын
New video After a long time ❤️🙂
@bertrandfossung1216
@bertrandfossung1216 3 жыл бұрын
Thank you very much Farah👍🏽
@AyushKumar-hv2ww
@AyushKumar-hv2ww 3 жыл бұрын
Nice topics because different 🙌🙌👏
@deepdhakate3462
@deepdhakate3462 3 жыл бұрын
Videos on API please
@rajjadhav3053
@rajjadhav3053 3 жыл бұрын
Hi I have one question to you can you tell me if we choose infosec filled then what about packages (salary ) . Write now I am in 2nd year of b tech and I have interest in infosec filled but when I think about packages it's good or not compare to web development .. please answer my question or create one video job opportunity and salary in infosec filled
@haritupadhyay.9145
@haritupadhyay.9145 3 жыл бұрын
Farah !! You should make tutorials , surely help you to gain some serious subscribers ... 👍👍
@freyeahshah4494
@freyeahshah4494 3 жыл бұрын
Long time no see 😭 we missed u
@HackerSumitJi
@HackerSumitJi 3 жыл бұрын
Pls make a video on how to bypass modsecurity firewall
@batista98854
@batista98854 3 жыл бұрын
Please make videos regularly ☺️
@VJ-qr9pe
@VJ-qr9pe 3 жыл бұрын
Can you plz tell us Can someone learn cyber security ownly Without any college And if it is, Are those students able to high package jobs As it is without college or degree???
3 жыл бұрын
Yes you can learn cyber security without college degree... Most of the eh, pen testers, bug bounty hunters are self thought... Even I am from commerce background
@anik6393
@anik6393 3 жыл бұрын
Eid Mubarak ❤️.
@masti2point0
@masti2point0 3 жыл бұрын
thanku mam for helpful content 😊
@sand3epyadav
@sand3epyadav 3 жыл бұрын
I love bug bounty people.
@danishalvi9731
@danishalvi9731 3 жыл бұрын
Make video on software engineering
@anujmahajan6642
@anujmahajan6642 3 жыл бұрын
Video after long time farah, How are you, doing well👍
@FarahHawa
@FarahHawa 3 жыл бұрын
I'm great! Thanks for asking :)
@devanshjain6171
@devanshjain6171 3 жыл бұрын
Good explanation.
@senvishal9023
@senvishal9023 3 жыл бұрын
Farah howz you...? after Long time Hope that you are fine..... 🤗
@arinagrawal575
@arinagrawal575 3 жыл бұрын
Long time no see, hope you were doing well 😁!!
@leaoaugusto
@leaoaugusto 3 жыл бұрын
hey!! great video! You should get a better microphone, your videos would sound much more awesome. Thanks for sharing it!
@FarahHawa
@FarahHawa 3 жыл бұрын
Will def look into the mic issue!
@krishg767
@krishg767 3 жыл бұрын
please makes videos regularly.....
@toorkali4283
@toorkali4283 3 жыл бұрын
SECOND VIEWS😄
@yashverma5683
@yashverma5683 3 жыл бұрын
Insightful
@danishalvi9731
@danishalvi9731 3 жыл бұрын
😊😎
@lapuranjan5574
@lapuranjan5574 3 жыл бұрын
Sorry iam late 💘💘💘💘💘💘💘💘💘💘
@Aolpha
@Aolpha 3 жыл бұрын
Http smuggling made easy
@Hackworm
@Hackworm 3 жыл бұрын
🤐🤐
Finding IDORs with CODE REVIEWS!
4:34
Farah Hawa
Рет қаралды 13 М.
HTTP Request Smuggling - False Positives
16:40
PinkDraconian
Рет қаралды 14 М.
Chain Game Strong ⛓️
00:21
Anwar Jibawi
Рет қаралды 41 МЛН
Mom Hack for Cooking Solo with a Little One! 🍳👶
00:15
5-Minute Crafts HOUSE
Рет қаралды 23 МЛН
99.9% IMPOSSIBLE
00:24
STORROR
Рет қаралды 31 МЛН
HACKING OAuth 2.0 FOR BEGINNERS!
10:26
Farah Hawa
Рет қаралды 44 М.
Access Location, Camera  & Mic of any Device 🌎🎤📍📷
15:48
zSecurity
Рет қаралды 2,8 МЛН
HTTP Desync Attack Explained With Paper
13:00
LiveUnderflow
Рет қаралды 14 М.
Regular Expression DOS FOR BEGINNERS!
9:15
Farah Hawa
Рет қаралды 11 М.
Defeating Facial Recognition - Retia on Hak5
10:00
Hak5
Рет қаралды 458 М.
Missing HTTP Security Headers - Bug Bounty Tips
15:48
LiveOverflow
Рет қаралды 143 М.
Chain Game Strong ⛓️
00:21
Anwar Jibawi
Рет қаралды 41 МЛН