Hey everyone! Check out this playlist for all my solutions to the HTTP Request Smuggling labs from PortSwigger - 👀 kzbin.info/aero/PLGb2cDlBWRUX1_7RAIjRkZDYgAB3VbUSw Here are the timestamps for this video - ⏱ 00:00 - Intro 00:38 - Detect the CL.TE vulnerability 02:02 - Confirm the CL.TE vulnerability 03:54 - Find & turn onsite redirect into offsite redirect 05:37 - Find static asset cached by frontend 06:42 - Poison the frontend server's cached asset
@cowid3 ай бұрын
Jarno, you really have a knack for breaking down complicated steps into something easier to digest. The effort you put in shows, and the quality is top-notch! Most content creators out there solely click around or paraphrase the solution out loud without much explanation, but you stand out by breaking everything down piece by piece. Your understanding of the topic really shines through. I hope you will continue adding content, you save me hours of headache !
@bolbolinfosec13766 ай бұрын
I am sincerely grateful to you , Thanks Bro ❤❤❤ you excel as an educator!
@huyhuynh55753 ай бұрын
Thank you! I really enjoyed the video, especially how you made everything seem so simple. I particularly liked the backend part where every 30 seconds, it takes a JS file. By injecting our JS payload, anyone accessing the page triggers the payload.
@aow68133 ай бұрын
yeh this lab is so good i like it
@amrzaki850 Жыл бұрын
This is so great; thank you keep up the good work.