Overview
Syllabus
Intro
Outline
HTTP/1.1 keep-alive, desynchronized
Desynchronizing: the classic approach
Desynchronizing: the chunked approach
Desynchronizing: the TE.CL approach
Methodology
Detecting desync
Confirming desync
Bypassing rules
Bypassing rewrites
Request reflection
Exploring
Involuntary request storage
Harmful responses
Accidental Cache Poisoning
Chaining DOM Problems
Redirects with teeth
Web Cache Poisoning
PayPal Poisoning
Wrapped exploits
Aggressive detection
Source code review
Other sources
Defence
Case Study: Application Load Balancer BHEU EXCLUSIVE
Taught by
Black Hat