Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

HTTP/2 - The Sequel is Always Worse

Black Hat via YouTube

Overview

Explore the frontier of HTTP/2 research in this Black Hat conference talk, uncovering implementation flaws and RFC imperfections that enable HTTP/2-exclusive desync attacks. Delve into case studies targeting high-profile websites powered by various servers, including Amazon's Application Load Balancer, WAFs, CDNs, and bespoke stacks by big tech. Learn about request smuggling via HTTP/2 downgrades, H2.TE Desync attacks, H2.X via Request Splitting, and ambiguous HTTP/2 requests. Discover potential attacks, including URL token hijacking, header hijacking, and cache poisoning via tunnelling. Examine the tooling situation and defense strategies against these vulnerabilities. Gain valuable insights into the security implications of HTTP/2 implementation and walk away with key takeaways to enhance your understanding of this protocol's potential risks.

Syllabus

Intro
Outline
Request Smuggling via HTTP/2 downgrades
H2.TE Desync: URL token hijack
H2.TE Desync: Header hijack
H2.X via Request Splitting - Resp Queue Poisoning
H2.TE via request line injection
Possible attacks
No connection reuse
Tunnelling confirmation
Tunnel-vision Problem: Front-end reads Scontent-length bytes from back-end
Leaking internal headers via tunnelling
Cache poisoning via tunnelling
Ambiguous HTTP/2 requests
URL prefix injection
Header name splitting
The tooling situation Existing tooling does not work
Defence
References & further reading
Takeaways

Taught by

Black Hat

Reviews

Start your review of HTTP/2 - The Sequel is Always Worse

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.