Hey everyone! Check out this playlist for all my solutions to the HTTP Request Smuggling labs from PortSwigger - 👀 kzbin.info/aero/PLGb2cDlBWRUX1_7RAIjRkZDYgAB3VbUSw Here are the timestamps for this video - ⏱ 00:00 - Intro 00:27 - Detect the CRLF vulnerability 02:19 - Smuggle our first request 03:35 - Turn blind into non-blind using HEAD 04:16 - Find a resource larger than the frontpage 05:54 - Find a sink for a reflection attack 08:05 - Add padding to our sink to solve the lab
@Saur3n9 ай бұрын
Thanks man
@lambermaybe840411 ай бұрын
Thank you, I've been stuck on this issue for a long time
@netletic10 ай бұрын
thanks @lambermaybe8404, glad it was helpful in getting you unstuck on this one 🔥
@doya8130 Жыл бұрын
Thank you
@NitrogenXP13 күн бұрын
Hey, when I send all the A's I get "request path too long" any help? I did everything exactly as shown in the video multiple times