DEF CON 30 - James Kettle - Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling

  Рет қаралды 13,419

DEFCONConference

DEFCONConference

Жыл бұрын

The recent rise of HTTP Request Smuggling has seen a flood of critical findings enabling near-complete compromise of numerous major websites. However, the threat has been confined to attacker-accessible systems with a reverse proxy front-end... until now.
In this session, I'll show you how to turn your victim's web browser into a desync delivery platform, shifting the request smuggling frontier by exposing single-server websites and internal networks. You'll learn how to combine cross-domain requests with server flaws to poison browser connection pools, install backdoors, and release desync worms. With these techniques I'll compromise targets including Apache, Akamai, Varnish, Amazon, and multiple web VPNs.
While some classic desync gadgets can be adapted, other scenarios force extreme innovation. To help, I'll share a battle-tested methodology combining browser features and custom open-source tooling. We'll also release free online labs to help hone your new skillset.
I'll also share the research journey, uncovering a strategy for black-box analysis that solved several long-standing desync obstacles and unveiled an extremely effective novel desync trigger. The resulting fallout will encompass client-side, server-side, and even MITM attacks; to wrap up, I'll demo breaking HTTPS on Apache.

Пікірлер: 11
@InuYasha-SitBoy
@InuYasha-SitBoy Жыл бұрын
one of THE BEST bug hunters of all time. he’s legendary
@Jango1989
@Jango1989 Жыл бұрын
Great talk! I always look forward to hearing James' latest hacks.
@October-fo3bz
@October-fo3bz Жыл бұрын
I waited for this talk for so long, still BH didn't release their talks smh :/
@Buttclown-vz9vk
@Buttclown-vz9vk 13 күн бұрын
@pinskiller im sorry but he is pretty clear in what he is doing. (Multiple novel desync techniques) Desyncronising de front and backend server. When you send a req to a website that uses a reverse proxy to handle the req and pass it on its very important that both front and back agree (are in sync) on where the req starts and stops. If for any reason they dont agree on this (they are in desync) there is a possibility that you can inject intoo other people their traffic.
@kingcomedy5491
@kingcomedy5491 Жыл бұрын
What happened with turbo intruder nowadays not working
@Thiago1337
@Thiago1337 Жыл бұрын
It works fine, what do you mean?
@apristen
@apristen 7 ай бұрын
13:23 "So if I'd used the head technique to *execute* JavaScript" - in user's browser? how? where to read about this? thanks in advance!
@Buttclown-vz9vk
@Buttclown-vz9vk 13 күн бұрын
He explains it later in the talk
@thewhitefalcon8539
@thewhitefalcon8539 Жыл бұрын
But most of all, Bezos is my hero. (13:30)
@pinskiller9914
@pinskiller9914 Жыл бұрын
I wish he could better express what he's doing. sounds like a confusing random mixture of thoughts
DEF CON 30 - Roger Dingledine - How Russia is trying to block Tor
47:27
DEFCONConference
Рет қаралды 62 М.
CAN YOU HELP ME? (ROAD TO 100 MLN!) #shorts
00:26
PANDA BOI
Рет қаралды 35 МЛН
ELE QUEBROU A TAÇA DE FUTEBOL
00:45
Matheus Kriwat
Рет қаралды 11 МЛН
Кәріс тіріма өзі ?  | Synyptas 3 | 8 серия
24:47
kak budto
Рет қаралды 1,7 МЛН
Como ela fez isso? 😲
00:12
Los Wagners
Рет қаралды 23 МЛН
DEF CON 30  - Sharon Brizinov - Evil PLC Attacks - Weaponizing PLCs
22:22
DEFCONConference
Рет қаралды 22 М.
Lab: HTTP request smuggling, basic TE.CL vulnerability
14:16
Jarno Timmermans
Рет қаралды 7 М.
DEF CON 30 - Sam Bent - Tor - Darknet Opsec By a Veteran Darknet Vendor
48:29
Cracking the Lens: Targeting HTTP's Hidden Attack-Surface
44:06
A Comprehensive Guide to Using Zoyya Tools for Photo Editing
0:50
3D printed Nintendo Switch Game Carousel
0:14
Bambu Lab
Рет қаралды 4,6 МЛН
Kalem ile Apple Pen Nasıl Yapılır?😱
0:20
Safak Novruz
Рет қаралды 860 М.
Apple watch hidden camera
0:34
_vector_
Рет қаралды 48 МЛН
Выложил СВОЙ АЙФОН НА АВИТО #shorts
0:42
Дмитрий Левандовский
Рет қаралды 667 М.