Lab: Bypassing access controls via HTTP/2 request tunnelling

Lab: Bypassing access controls via HTTP/2 request tunnelling

Jarno Timmermans

55 лет назад

2,026 Просмотров

In-depth solution to Portswigger's "Bypassing access controls via HTTP/2 request tunnelling" lab.

👀 Check out playlist https://www.youtube.com/playlist?list=PLGb2cDlBWRUX1_7RAIjRkZDYgAB3VbUSw for all my solutions to the HTTP Request Smuggling labs from PortSwigger.

Try it yourself:
https://portswigger.net/web-security/request-smuggling/advanced/request-tunnelling/lab-request-smuggling-h2-bypass-access-controls-via-request-tunnelling

Timestamps:
00:00 - Intro
00:30 - Confirm the CRLF vulnerability
01:50 - Leak the internal headers using CRLF injection
05:30 - Smuggle a request to the admin page
09:36 - Use a HEAD request instead of GET

Тэги:

#web_security_academy #portswigger #http/2_CRLF_injection #http/2_request_tunnelling #bypass_access_controls #http_request_smuggling
Ссылки и html тэги не поддерживаются


Комментарии:

@haythamkt5607
@haythamkt5607 - 23.11.2023 19:05

rak mqawd a khay thank you so much !

Ответить
@draxler.a
@draxler.a - 03.05.2024 17:05

the content is great 👍🏻 but you talk tooooo fast 😅

Ответить
@anonymousvevo8697
@anonymousvevo8697 - 19.05.2024 17:41

what is the difference if we injected the payload into the name or the value ? i got mixed up

Ответить