Overview
Explore practical attacks using HTTP request smuggling in this 45-minute conference talk from NahamCon2020. Dive into CL.TE and TE.CL desync attacks, learn testing techniques for request smuggling, and understand the impact radius of RS. Follow along with real-world desync attack and reconnaissance stories, and examine proof-of-concept demonstrations for session stealing using open redirects and response queue poisoning. Gain valuable insights into web security vulnerabilities and attack methodologies from this virtual security conference presentation.
Syllabus
Intro
CL.TE / TE.CL Desync Attacks
CL.TE Desync Attack
Testing for Request Smuggling
Impact Radius of RS
Desync Attack/Recon Story #1
Desync Attack/Recon Story #2
Desync Attack/Recon Story #3
POC #1 - Sesson Stealing using an Open Redirect
PoC #1 - Session Stealing using an Open Redirect
POC #2 - Session Stealing using Response Queue Poisoning
VIRTUAL SECURITY CONFERENCE 06.13.2020
Taught by
NahamSec