Главная
Study mode:
on
1
Introduction
2
My Story
3
Outline
4
Key Differences
5
Exploitation
6
H2 Request Smuggling
7
Case Study Netflix
8
Case Study Amazon
9
Case Studyjira
10
Hotfixes
11
Visualization
12
First Problem
13
Second Problem
14
HP2 Exploit Primitives
15
HTTP colons
16
A few practicalities
Description:
Explore the security implications of HTTP/2 in this 38-minute Black Hat conference talk. Delve beyond existing research to uncover critical implementation flaws and RFC imperfections in the protocol. Learn about HTTP/2 request smuggling techniques, examine case studies involving major platforms like Netflix and Amazon, and understand key differences from HTTP/1. Discover new exploit primitives, visualization techniques, and practical considerations for working with HTTP/2. Gain insights into potential vulnerabilities and hotfixes as presented by security researcher James Kettle.

HTTP/2 - The Sequel is Always Worse

Black Hat
Add to list
0:00 / 0:00