No video

Lab: Exploiting HTTP request smuggling to capture other users' requests

  Рет қаралды 2,509

Jarno Timmermans

Jarno Timmermans

Күн бұрын

Пікірлер: 14
@netletic
@netletic 7 ай бұрын
Hey everyone! Check out this playlist for all my solutions to the HTTP Request Smuggling labs from PortSwigger - 👀 kzfaq.info/sun/PLGb2cDlBWRUX1_7RAIjRkZDYgAB3VbUSw Here are the timestamps for this video - ⏱ 00:00 - Intro 00:32 - Detect the CL.TE vulnerability 02:08 - Confirm the CL.TE vulnerability 04:11 - POST'ing a comment 05:21 - CSRF token and the Session Cookie 05:50 - Move the 'comment' request body parameter 06:24 - How to calculate the initial Content-Length 07:34 - Differential Response Methodology 08:32 - Avoid errors by adding safe padding to the Normal Request 10:21 - Start with our estimated Content-Length 11:19 - Increase the Content-Length to 900 12:09 - Increase the Content-Length to 950 and solve the lab
@collabcomm9007
@collabcomm9007 9 ай бұрын
Dude. You're so good I watched this video for 5 minutes and liked and subbed. I completed the video and I was not disappointed. You have a talent for this. Please make more I will learn so much from you. Thanks man!
@netletic
@netletic 9 ай бұрын
Thanks @collabcomm9007, that's really nice to hear! Cheers for subbing, more videos on the way! ☺️
@scsf1
@scsf1 Жыл бұрын
I've been waiting for such clear explaination for a long time. Thank you mate. Would be awesome if you keep making similar videos for another advanced attacks like prototype pollution or dom-xss.
@netletic
@netletic Жыл бұрын
thank you @scsf1, that's very nice to hear! Indeed once I've finished up the request smuggling labs I was thinking about doing the prototype pollution labs next. Might sprinkle in some of the new GraphQL labs along the way as I'm excited about those too ☺️
@aow6813
@aow6813 5 ай бұрын
These videos are perfect
@ismailmatrix1
@ismailmatrix1 4 ай бұрын
An alternative way I did was: normal request -> normal request -> attack request -> refresh the blog page to see Victim's comment
@x_gotri
@x_gotri 5 ай бұрын
These video awesome 👍👍✨✨
@panchakosha
@panchakosha Жыл бұрын
Excellent!
@netletic
@netletic Жыл бұрын
thank you @panchakosha!
@abdelrhmanmohamed8561
@abdelrhmanmohamed8561 11 ай бұрын
awesome keep going
@netletic
@netletic 11 ай бұрын
thank you @abdelrhmanmohamed8561! ☺️
@skull_cyber
@skull_cyber Жыл бұрын
Great Keep it Up
@netletic
@netletic Жыл бұрын
thank you @nulled00! ☺️
Lab: Exploiting HTTP request smuggling to deliver reflected XSS
6:17
Jarno Timmermans
Рет қаралды 1,3 М.
Lab: H2.CL request smuggling
10:52
Jarno Timmermans
Рет қаралды 1,6 М.
Parenting hacks and gadgets against mosquitoes 🦟👶
00:21
Let's GLOW!
Рет қаралды 13 МЛН
КТО ЛЮБИТ ГРИБЫ?? #shorts
00:24
Паша Осадчий
Рет қаралды 3,1 МЛН
Мы сделали гигантские сухарики!  #большаяеда
00:44
Lab: Bypassing access controls via HTTP/2 request tunnelling
13:27
Jarno Timmermans
Рет қаралды 1,4 М.
Lab: Client-Side Desync
17:55
Jarno Timmermans
Рет қаралды 3,6 М.
Lab: HTTP/2 request smuggling via CRLF injection
9:19
Jarno Timmermans
Рет қаралды 1,5 М.
03. Грабим корованы с HTTP request smuggling
22:51
Хакинг для самых маленьких
Рет қаралды 2,9 М.
How To Secure and Anonymize Your Online Activity
25:10
Mental Outlaw
Рет қаралды 457 М.
Lab: Web cache poisoning with multiple headers
11:02
Jarno Timmermans
Рет қаралды 1,3 М.