Lab: Exploiting HTTP request smuggling to bypass front-end security controls, TE.CL vulnerability
Автор: Jarno Timmermans
Загружено: 2023-06-28
Просмотров: 4769
Описание:
In-depth solution to PortSwigger's "Exploiting HTTP request smuggling to bypass front-end security controls, TE.CL vulnerability" lab.
👀 Check out playlist • HTTP Request Smuggling for all my solutions to the HTTP Request Smuggling labs from PortSwigger.
Try it yourself:
https://portswigger.net/web-security/...
Timestamps:
00:00 - Intro
00:22 - Set up Normal Request and Attack Request
01:50 - Trigger a Differential Response
02:52 - How to calculate the Smuggled Request Chunk Size
03:29 - Set the Request's Content-Length
03:54 - Why we need to specify a Content-Length in the Smuggled Request Body
04:36 - How to calculate and set the minimum Smuggled Content-Length
05:17 - Update the Chunk Size
06:06 - Now request the /admin page
06:35 - Bypass the local users limitation
07:12 - Delete user 'carlos' and solve the lab
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: