Главная
Study mode:
on
1
Intro
2
Outline
3
HTTP/1.1 keep-alive, desynchronized
4
Desynchronizing: the classic approach
5
Desynchronizing: the chunked approach
6
Desynchronizing: the TE.CL approach
7
Methodology
8
Detecting desync
9
Confirming desync
10
Bypassing rules
11
Bypassing rewrites
12
Request reflection
13
Exploring
14
Involuntary request storage
15
Harmful responses
16
Accidental Cache Poisoning
17
Chaining DOM Problems
18
Redirects with teeth
19
Web Cache Poisoning
20
PayPal Poisoning
21
Wrapped exploits
22
Aggressive detection
23
Source code review
24
Other sources
25
Defence
26
Case Study: Application Load Balancer BHEU EXCLUSIVE
Description:
Explore HTTP desync attacks and request smuggling techniques in this Black Hat conference talk. Delve into methods for breaking HTTP request isolation, allowing remote attackers to manipulate web infrastructure. Learn about exploiting keep-alive connections, chunked encoding, and TE.CL approaches to desynchronize requests. Discover methodologies for detecting and confirming desyncs, bypassing security rules and rewrites, and leveraging request reflection. Examine advanced topics such as involuntary request storage, cache poisoning, and chaining DOM vulnerabilities. Gain insights into defensive strategies and explore a case study on Application Load Balancer vulnerabilities. Presented by James Kettle, this 48-minute session covers both offensive and defensive aspects of HTTP desync attacks, including real-world examples and bug bounty successes.

HTTP Desync Attacks - Request Smuggling Reborn

Black Hat
Add to list
0:00 / 0:00