Lab: HTTP/2 request splitting via CRLF injection

  Рет қаралды 2,270

Jarno Timmermans

Jarno Timmermans

Күн бұрын

Пікірлер: 11
@netletic
@netletic 7 ай бұрын
Hey everyone! Check out this playlist for all my solutions to the HTTP Request Smuggling labs from PortSwigger - 👀 kzbin.info/aero/PLGb2cDlBWRUX1_7RAIjRkZDYgAB3VbUSw Here are the timestamps for this video - ⏱ 00:00 - Intro 00:25 - Confirm the HTTP/2 to HTTP/1.1 CRLF injection vulnerability 03:35 - Start poisoning the response queue to leak the admin's session cookie
@zinjacoder
@zinjacoder 3 ай бұрын
Your HTTP request smuggling videos contains, by far the best explanation on the topic. Thank you for making this.
@panchakosha
@panchakosha Жыл бұрын
Nice Jarno! At this rate you're going to cover all the academy's request smuggling labs. 😂
@netletic
@netletic Жыл бұрын
Haha, thanks @panchakosha! There were definitely more request smuggling labs than I had anticipated before I started the series haha, I'm still having fun, at the same time I'm looking forward to starting videos on a new topic once this one is done and dusted. 😂
@haireeizzam6349
@haireeizzam6349 5 ай бұрын
Hi Jarno, nice demonstration of this one, i still don't get a few things: 1. If this response splitting is based on response queue poisoning, why is the first request at :path /"arbitrarytexthere" being send as the response for the next request? I thought this is a normal request being made? The response queue poisoning lab request 404 response only triggers with the first smuggled GET request? 2. Why do we need to specify the second GET request with arbitrary text only then it would redirect us to the administrators page? Why this one did not get triggered if we put the /admin path as the second GET request? Your help is kindly appreciated. You're my savior 😂
@nguyenthanhcong92
@nguyenthanhcong92 9 ай бұрын
Super!! but below are not correct yeah Timestamps: 00:00 - Intro 00:25 - Confirm the H2.TE CRLF injection vulnerability 05:00 - Explore the Search endpoint 06:29 - Smuggle the Search Request 08:12 - Capture our victim's request
@netletic
@netletic 8 ай бұрын
thanks for flagging that @nguyenthanhcong92! I've corrected the timestamps 👍
@nguyenthanhcong92
@nguyenthanhcong92 8 ай бұрын
@@netletic really really appreciated your explanation. can you finish the XSS labs please 😍
@yoldoshali8398
@yoldoshali8398 Ай бұрын
🔥🔥🔥🔥🔥🔥
@Safvanviber-xm3pn
@Safvanviber-xm3pn 10 ай бұрын
Thanks sir you save my laptop display 🥲🔥🔥
@netletic
@netletic 8 ай бұрын
thanks @Safvanviber-xm3pn, glad I made a contribution in saving your display 😂
Lab: Bypassing access controls via HTTP/2 request tunnelling
13:27
Jarno Timmermans
Рет қаралды 1,5 М.
Worst flight ever
00:55
Adam W
Рет қаралды 19 МЛН
GIANT Gummy Worm Pt.6 #shorts
00:46
Mr DegrEE
Рет қаралды 63 МЛН
The joker favorite#joker  #shorts
00:15
Untitled Joker
Рет қаралды 8 МЛН
Lab: HTTP/2 request smuggling via CRLF injection
9:19
Jarno Timmermans
Рет қаралды 1,6 М.
Lab: Exploiting HTTP request smuggling to capture other users' requests
13:05
Hacking Websites with SQL Injection - Computerphile
8:59
Computerphile
Рет қаралды 2,4 МЛН
Lab: HTTP request smuggling, obfuscating the TE header
9:20
Jarno Timmermans
Рет қаралды 3,8 М.
Turns out REST APIs weren't the answer (and that's OK!)
10:38
Dylan Beattie
Рет қаралды 158 М.
Lab: Exploiting HTTP request smuggling to perform web cache poisoning
8:30
Worst flight ever
00:55
Adam W
Рет қаралды 19 МЛН