Lab: HTTP/2 request smuggling via CRLF injection

  Рет қаралды 1,641

Jarno Timmermans

Jarno Timmermans

Күн бұрын

Пікірлер: 7
@netletic
@netletic Жыл бұрын
Hey everyone! Check out this playlist for all my solutions to the HTTP Request Smuggling labs from PortSwigger - 👀 kzbin.info/aero/PLGb2cDlBWRUX1_7RAIjRkZDYgAB3VbUSw Here are the timestamps for this video - ⏱ 00:00 - Intro 00:25 - Confirm the H2.TE CRLF injection vulnerability 05:00 - Explore the Search endpoint 06:29 - Smuggle the Search Request 08:12 - Capture our victim's request And here's a link to the Cookie Editor Extension I'm using: chrome.google.com/webstore/detail/cookie-editor/hlkenndednhfkekhgcdicdfddnkalmdm addons.mozilla.org/en-US/firefox/addon/cookie-editor/
@_CryptoCat
@_CryptoCat 5 ай бұрын
These have been great for BSCP prep, I only wish you also included solutions with HTTP request smuggler extension at the end of the videos.. It's really hard to find examples online xD
@kunshtanwar4765
@kunshtanwar4765 8 ай бұрын
Thanks for explaining so smoothly this hard topic :)
@netletic
@netletic 7 ай бұрын
thank you @kunshtanwar4765! ☺
@anonraxor317
@anonraxor317 7 ай бұрын
love you
Lab: HTTP/2 request splitting via CRLF injection
5:50
Jarno Timmermans
Рет қаралды 2,2 М.
Lab: Bypassing access controls via HTTP/2 request tunnelling
13:27
Jarno Timmermans
Рет қаралды 1,5 М.
Je peux le faire
00:13
Daniil le Russe
Рет қаралды 22 МЛН
отомстил?
00:56
История одного вокалиста
Рет қаралды 6 МЛН
Lab: Exploiting HTTP request smuggling to capture other users' requests
13:05
HTTP Request Smuggling - False Positives
16:40
PinkDraconian
Рет қаралды 13 М.
Lab: H2.CL request smuggling
10:52
Jarno Timmermans
Рет қаралды 1,7 М.
Lab: Client-Side Desync
17:55
Jarno Timmermans
Рет қаралды 4 М.
Lab: HTTP request smuggling, obfuscating the TE header
9:20
Jarno Timmermans
Рет қаралды 3,8 М.
Lab: Exploiting HTTP request smuggling to perform web cache poisoning
8:30
Je peux le faire
00:13
Daniil le Russe
Рет қаралды 22 МЛН