HTTP Request Smuggling - False Positives

Поделиться
HTML-код
  • Опубликовано: 18 ноя 2024

Комментарии • 55

  • @SeanCallahan52
    @SeanCallahan52 Год назад

    Request smuggling is so cool. Idk why but it’s one of my favorite attacks.

    • @PinkDraconian
      @PinkDraconian  Год назад +1

      Same, I love this attack. I think it still has so much research potential as well!

    • @SeanCallahan52
      @SeanCallahan52 Год назад +1

      @@PinkDraconian 💯, James Kettle has some nice material on it. Still a ton left to be uncovered!

  • @jlinscott8529
    @jlinscott8529 2 года назад +1

    Great stuff, as always, mate! I definitely want to look into HTTP smuggling, and HTTP desync, more now. Thanks!

    • @PinkDraconian
      @PinkDraconian  2 года назад

      It's a very interesting vulnerability. I was mindblown by it at first!

    • @pwnearth5505
      @pwnearth5505 2 года назад

      @@PinkDraconian thanks 👍🏼♥️

  • @SurpriseExecution
    @SurpriseExecution 10 месяцев назад

    Very well explained! I earlier read PortSwiggers material about request smuggling, but this video basically clarified a lot of this topic :)

    • @PinkDraconian
      @PinkDraconian  10 месяцев назад

      Thanks! Happy to hear that this video helped so much!

  • @camelotenglishtuition6394
    @camelotenglishtuition6394 Год назад +1

    Great video dude... I really love these types of attacks, I also prefer not to scan and do most work manually..

  • @SalmanKhan.78692
    @SalmanKhan.78692 2 года назад +3

    Awesome content for cyber security 🔥🔥🔥

  • @lancemarchetti8673
    @lancemarchetti8673 2 года назад +1

    Loving this channel !!

  • @BugBountyReportsExplained
    @BugBountyReportsExplained 2 года назад +3

    I'm going to send here anyone that DMs me with a HRS false-positive

    • @PinkDraconian
      @PinkDraconian  2 года назад +1

      Thank you! Let's get these false positive reports out of the world!

  • @Soujanya_nandan
    @Soujanya_nandan Месяц назад

    Informative.
    Thank you ! ❤

  • @angryman9333
    @angryman9333 Год назад

    I needed that pipelining method thank you, hopefully it works out :)

  • @AidinNaserifard
    @AidinNaserifard 2 года назад +2

    Great video, keep it up , bro💜👊

  • @CristiVladZ
    @CristiVladZ 11 месяцев назад

    Really good explanation

    • @PinkDraconian
      @PinkDraconian  11 месяцев назад

      Thank you Cristi, means a lot coming from you!

  • @faresmahmoud7826
    @faresmahmoud7826 2 года назад

    very great , You solved a very difficult puzzle .... thanks so much😍

  • @khayla_matthews
    @khayla_matthews 2 года назад

    Very interesting video! 👍🏾 thanks for sharing

  • @nigelcarruthers335
    @nigelcarruthers335 2 года назад +1

    I run across a lot of false positives with AWS load balancers.

    • @PinkDraconian
      @PinkDraconian  2 года назад

      Good to know! I read about this but wasn't able to reproduce myself. Didn't try for too long tho!

  • @MusicLover-bp2cc
    @MusicLover-bp2cc 2 года назад

    Thank you. I will subscribe.

  • @rubenrodenascebrian3855
    @rubenrodenascebrian3855 10 месяцев назад

    I really liked your video. Could you tell me which app you use to create the images? It looks very nice.

    • @PinkDraconian
      @PinkDraconian  10 месяцев назад

      Thank you very much. I use the Adobe suite for all images shown.

  • @HaiderAli-hm4lb
    @HaiderAli-hm4lb 8 месяцев назад

    Hey! This video is great. I had a question. Are specific endpoints of a website vulnerable to HTTP Request smuggling or a website as a whole is vulnerable to HTTP Request smuggling?

    • @PinkDraconian
      @PinkDraconian  8 месяцев назад +1

      This vulnerability exists at a lower level than specific endpoints, so it will likely be all endpoints.

  • @ibrahimmuhammad4194
    @ibrahimmuhammad4194 2 года назад

    Thank you!

  • @UnexpectedTokenJs
    @UnexpectedTokenJs Год назад

    Hi, what about servers like s3 (only for statics) under a balancer like f5 ? Exist the vulnerability? T thanks

    • @PinkDraconian
      @PinkDraconian  Год назад

      It all depends on the setup and whether the component is vulnerable. www.praetorian.com/blog/refresh-compromising-f5-big-ip-with-request-smuggling-cve-2023-46747/

  • @pwnearth5505
    @pwnearth5505 2 года назад +2

    🔥🔥🔥👍🏼

  • @ARZ10198
    @ARZ10198 2 года назад

    good stuff < 3

  • @hackerexploit8890
    @hackerexploit8890 2 года назад

    How we spot the HTTP Request Smuggling Vulne .

    • @PinkDraconian
      @PinkDraconian  2 года назад +1

      There's a great PortSwigger academy article on this!

  • @bjarne9700
    @bjarne9700 3 месяца назад +1

    Great video - I understand the desync aspect but what I dont understand is how this could be exploited. From my current understanding, worst that could happen is that another user gets the response to the request I smuggled in. For example I request /indext.html and smuggle /404.html. The user that sends the next request will receive my 404 response.
    How could this behavior be levaraged to pose any harm outside of a DOS attack - giving as many people as possible 404s

    • @PinkDraconian
      @PinkDraconian  3 месяца назад

      There are loads of way of further weaponizing request smuggling. Here's a great article by PortSwigger: portswigger.net/web-security/request-smuggling/exploiting

  • @lordsixth5944
    @lordsixth5944 2 года назад

    How old are You buddy?

  • @trijnvanroey6894
    @trijnvanroey6894 2 года назад +2

    Second Comment

  • @wolfie6512
    @wolfie6512 2 года назад +2

    Third Comment!

  • @aamara_btw4817
    @aamara_btw4817 2 года назад +2

    Fourth comment