Главная
Study mode:
on
1
Introduction
2
The HTTP Chain
3
Desynchronisation
4
Why does it work
5
Detection
6
Case Studies
7
Smuggling
8
Backend System
9
Cache Poisoning
10
CDNs
11
DOM
12
Local Feed
13
PayPal
14
PayPal Login
15
Demo
16
How to fix
Description:
Explore advanced techniques for exploiting HTTP request isolation vulnerabilities in this Black Hat conference talk. Delve into HTTP desynchronization attacks that allow remote, unauthenticated attackers to manipulate web infrastructure, compromise visitor security, and exploit system weaknesses. Learn about the HTTP chain, desynchronization methods, detection strategies, and real-world case studies involving backend systems, cache poisoning, and CDNs. Examine specific examples, including attacks on PayPal's infrastructure, and witness a live demonstration. Gain insights into the underlying mechanisms of these attacks, their potential impact, and effective mitigation strategies to protect web applications from HTTP desync vulnerabilities.

HTTP Desync Attacks - Smashing into the Cell Next Door

Black Hat
Add to list
0:00 / 0:00