HTTP/2 Request Smuggling — TryHackMe Walkthrough
Автор: In Phu Sec Lab
Загружено: 2026-01-19
Просмотров: 97
Описание:
🔥 Master HTTP/2 Request Smuggling & Bypass Web Security Like a Pro | Complete TryHackMe Tutorial
Learn how attackers exploit HTTP/2 downgrade vulnerabilities to smuggle malicious requests, hijack user sessions, and poison web caches — even when the protocol was designed to be "hack-proof"!
In this in-depth tutorial on HTTP/2 Request Smuggling, you'll discover:
**HTTP/2 vs HTTP/1.1**: Key protocol differences and why binary formatting matters
[**H2.CL](http://H2.CL) & H2.TE Desync Attacks**: How content-length manipulation breaks backend connections
**CRLF Injection**: Smuggling headers to bypass frontend proxies and WAFs
**Request Tunneling**: Accessing restricted admin panels and internal resources
**Web Cache Poisoning**: Injecting malicious JavaScript payloads via catch poisoning
**H2C Smuggling**: Exploiting clear-text HTTP/2 upgrades to tunnel requests
**Real-World Labs**: Hands-on exploitation using Burp Suite, HAProxy, and custom tools
⏱️ *Timestamps*
00:00 Introduction
01:15 HTTP/2 Explained
06:56 HTTP/2 Desync
13:45 CRLF Injection
16:17 Practical Example
22:25 HTTP/2 Request Tunneling
23:34 HTTP/2 Request Tunneling: Leaking Internal Headers
37:40 Bypassing front end restrictions
42:52 HTTP/2 Request Tunneling: Web Cache Poisoning
54:33 h2c Smuggling
🔗 *Resources & Further Reading*
TryHackMe HTTP/2 Request Smuggling Room: https://tryhackme.com/room/http2reque...
H2C Smuggling Tool (Bishop Fox): https://github.com/BishopFox/h2csmuggler
Full TryHackMe Web App Pentesting Playlist: • TryHackMe - Web App Pentesting
💡 *Don't forget to LIKE this video, SUBSCRIBE for weekly cybersecurity tutorials, and COMMENT with questions or topics you want covered next!*
#HTTP2 #RequestSmuggling #WebSecurity #EthicalHacking #TryHackMe #BurpSuite #PenTesting #InfoSec
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: