DEF CON 30 - James Kettle - Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling

  Рет қаралды 13,446

DEFCONConference

DEFCONConference

Жыл бұрын

The recent rise of HTTP Request Smuggling has seen a flood of critical findings enabling near-complete compromise of numerous major websites. However, the threat has been confined to attacker-accessible systems with a reverse proxy front-end... until now.
In this session, I'll show you how to turn your victim's web browser into a desync delivery platform, shifting the request smuggling frontier by exposing single-server websites and internal networks. You'll learn how to combine cross-domain requests with server flaws to poison browser connection pools, install backdoors, and release desync worms. With these techniques I'll compromise targets including Apache, Akamai, Varnish, Amazon, and multiple web VPNs.
While some classic desync gadgets can be adapted, other scenarios force extreme innovation. To help, I'll share a battle-tested methodology combining browser features and custom open-source tooling. We'll also release free online labs to help hone your new skillset.
I'll also share the research journey, uncovering a strategy for black-box analysis that solved several long-standing desync obstacles and unveiled an extremely effective novel desync trigger. The resulting fallout will encompass client-side, server-side, and even MITM attacks; to wrap up, I'll demo breaking HTTPS on Apache.

Пікірлер: 11
@InuYasha-SitBoy
@InuYasha-SitBoy Жыл бұрын
one of THE BEST bug hunters of all time. he’s legendary
@Jango1989
@Jango1989 Жыл бұрын
Great talk! I always look forward to hearing James' latest hacks.
@Buttclown-vz9vk
@Buttclown-vz9vk 15 күн бұрын
@pinskiller im sorry but he is pretty clear in what he is doing. (Multiple novel desync techniques) Desyncronising de front and backend server. When you send a req to a website that uses a reverse proxy to handle the req and pass it on its very important that both front and back agree (are in sync) on where the req starts and stops. If for any reason they dont agree on this (they are in desync) there is a possibility that you can inject intoo other people their traffic.
@October-fo3bz
@October-fo3bz Жыл бұрын
I waited for this talk for so long, still BH didn't release their talks smh :/
@kingcomedy5491
@kingcomedy5491 Жыл бұрын
What happened with turbo intruder nowadays not working
@Thiago1337
@Thiago1337 Жыл бұрын
It works fine, what do you mean?
@apristen
@apristen 7 ай бұрын
13:23 "So if I'd used the head technique to *execute* JavaScript" - in user's browser? how? where to read about this? thanks in advance!
@Buttclown-vz9vk
@Buttclown-vz9vk 15 күн бұрын
He explains it later in the talk
@thewhitefalcon8539
@thewhitefalcon8539 Жыл бұрын
But most of all, Bezos is my hero. (13:30)
@pinskiller9914
@pinskiller9914 Жыл бұрын
I wish he could better express what he's doing. sounds like a confusing random mixture of thoughts
DEF CON 30 - Roger Dingledine - How Russia is trying to block Tor
47:27
DEFCONConference
Рет қаралды 62 М.
I Need Your Help..
00:33
Stokes Twins
Рет қаралды 124 МЛН
Normal vs Smokers !! 😱😱😱
00:12
Tibo InShape
Рет қаралды 116 МЛН
格斗裁判暴力执法!#fighting #shorts
00:15
武林之巅
Рет қаралды 82 МЛН
Lab: HTTP request smuggling, basic TE.CL vulnerability
14:16
Jarno Timmermans
Рет қаралды 7 М.
Cracking the Lens: Targeting HTTP's Hidden Attack-Surface
44:06
DEF CON 30  - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCs
22:22
DEFCONConference
Рет қаралды 22 М.
Цифровые песочные часы с AliExpress
0:45
Топ-3 суперкрутых ПК из CompShop
1:00
CompShop Shorts
Рет қаралды 99 М.
как спасти усилитель?
0:35
KS Customs
Рет қаралды 446 М.
Дени против умной колонки😁
0:40
Deni & Mani
Рет қаралды 8 МЛН
What’s your charging level??
0:14
Татьяна Дука
Рет қаралды 7 МЛН