Lab: CL.0 request smuggling

  Рет қаралды 1,750

Jarno Timmermans

Jarno Timmermans

Күн бұрын

Пікірлер: 9
@netletic
@netletic Жыл бұрын
Hey everyone! Check out this playlist for all my solutions to the HTTP Request Smuggling labs from PortSwigger - 👀 kzbin.info/aero/PLGb2cDlBWRUX1_7RAIjRkZDYgAB3VbUSw Here are the timestamps for this video - ⏱ 00:00 - Intro 01:17 - Find endpoint that ignores Content-Length 02:36 - Use Differential Responses to detect & confirm the CL.0 vulnerability 04:24 - Exploit the CL.0 vulnerability to bypass the frontend security control
@vlkn-ml5jv
@vlkn-ml5jv Жыл бұрын
I appreciate your effort in making it understandable. Normally, I don't leave comments, but I had to make an exception in this case.
@netletic
@netletic 10 ай бұрын
thank you @vlkn-ml5jv, glad it was helpful! 🔥
@panchakosha
@panchakosha Жыл бұрын
You are a beast! Only one more to go. Your efforts are greatly appreciated.
@netletic
@netletic 10 ай бұрын
thanks @panchakosha, and thanks for cheering me on throughout the entire series - that was great motivation! 🔥
@thinhdang9256
@thinhdang9256 3 ай бұрын
how can you make a graph for this attack, could you tell me which website or app did you use?
@thinhdang9256
@thinhdang9256 3 ай бұрын
when i try to solve the lab, i didn't add Connection: Keep-Alive header and add group 2 req but i still solve this like the previous lab (TE-CL)
@thinhdang9256
@thinhdang9256 3 ай бұрын
Did the step add header and add group not necessary
@muhammadadel9537
@muhammadadel9537 19 күн бұрын
@@thinhdang9256 I think the Connection: keep-alive is being added automatically by the application Check a normal request, and you will notice that it is being added automatically. but the burp option "Strip Connection header over HTTP/2" removes it.
Lab: Client-Side Desync
17:55
Jarno Timmermans
Рет қаралды 4,7 М.
Lab: Exploiting HTTP request smuggling to capture other users' requests
13:05
Ice Cream or Surprise Trip Around the World?
00:31
Hungry FAM
Рет қаралды 11 МЛН
The Ultimate Sausage Prank! Watch Their Reactions 😂🌭 #Unexpected
00:17
La La Life Shorts
Рет қаралды 3,7 МЛН
Lab: HTTP request smuggling, basic TE.CL vulnerability
14:16
Jarno Timmermans
Рет қаралды 12 М.
Lab: H2.CL request smuggling
10:52
Jarno Timmermans
Рет қаралды 2 М.
SameSite Lax bypass via cookie refresh - Lab#10
29:39
Mohd Badrudduja
Рет қаралды 107
Lab: Web cache poisoning with multiple headers
11:02
Jarno Timmermans
Рет қаралды 1,8 М.
Lab: Bypassing access controls via HTTP/2 request tunnelling
13:27
Jarno Timmermans
Рет қаралды 1,7 М.
Lab: HTTP request smuggling, obfuscating the TE header
9:20
Jarno Timmermans
Рет қаралды 4,3 М.
Ice Cream or Surprise Trip Around the World?
00:31
Hungry FAM
Рет қаралды 11 МЛН