Hey everyone! Check out this playlist for all my solutions to the HTTP Request Smuggling labs from PortSwigger - 👀 kzbin.info/aero/PLGb2cDlBWRUX1_7RAIjRkZDYgAB3VbUSw Here are the timestamps for this video - ⏱ 00:00 - Intro 00:25 - Confirm the H2.TE CRLF injection vulnerability 05:00 - Explore the Search endpoint 06:29 - Smuggle the Search Request 08:12 - Capture our victim's request And here's a link to the Cookie Editor Extension I'm using: chrome.google.com/webstore/detail/cookie-editor/hlkenndednhfkekhgcdicdfddnkalmdm addons.mozilla.org/en-US/firefox/addon/cookie-editor/
@_CryptoCat5 ай бұрын
These have been great for BSCP prep, I only wish you also included solutions with HTTP request smuggler extension at the end of the videos.. It's really hard to find examples online xD
@kunshtanwar47658 ай бұрын
Thanks for explaining so smoothly this hard topic :)