Lab: Exploiting HTTP request smuggling to capture other users' requests

Поделиться
HTML-код
  • Опубликовано: 11 сен 2024

Комментарии • 14

  • @netletic
    @netletic  7 месяцев назад +1

    Hey everyone! Check out this playlist for all my solutions to the HTTP Request Smuggling labs from PortSwigger - 👀
    ruclips.net/p/PLGb2cDlBWRUX1_7RAIjRkZDYgAB3VbUSw
    Here are the timestamps for this video - ⏱
    00:00 - Intro
    00:32 - Detect the CL.TE vulnerability
    02:08 - Confirm the CL.TE vulnerability
    04:11 - POST'ing a comment
    05:21 - CSRF token and the Session Cookie
    05:50 - Move the 'comment' request body parameter
    06:24 - How to calculate the initial Content-Length
    07:34 - Differential Response Methodology
    08:32 - Avoid errors by adding safe padding to the Normal Request
    10:21 - Start with our estimated Content-Length
    11:19 - Increase the Content-Length to 900
    12:09 - Increase the Content-Length to 950 and solve the lab

  • @collabcomm9007
    @collabcomm9007 10 месяцев назад +3

    Dude. You're so good I watched this video for 5 minutes and liked and subbed. I completed the video and I was not disappointed. You have a talent for this. Please make more I will learn so much from you. Thanks man!

    • @netletic
      @netletic  10 месяцев назад

      Thanks @collabcomm9007, that's really nice to hear! Cheers for subbing, more videos on the way! ☺️

  • @scsf1
    @scsf1 Год назад +2

    I've been waiting for such clear explaination for a long time. Thank you mate.
    Would be awesome if you keep making similar videos for another advanced attacks like prototype pollution or dom-xss.

    • @netletic
      @netletic  Год назад +2

      thank you @scsf1, that's very nice to hear! Indeed once I've finished up the request smuggling labs I was thinking about doing the prototype pollution labs next. Might sprinkle in some of the new GraphQL labs along the way as I'm excited about those too ☺️

  • @aow6813
    @aow6813 6 месяцев назад

    These videos are perfect

  • @ismailmatrix1
    @ismailmatrix1 5 месяцев назад

    An alternative way I did was: normal request -> normal request -> attack request -> refresh the blog page to see Victim's comment

  • @x_gotri
    @x_gotri 6 месяцев назад

    These video awesome 👍👍✨✨

  • @panchakosha
    @panchakosha Год назад +1

    Excellent!

    • @netletic
      @netletic  Год назад +1

      thank you @panchakosha!

  • @abdelrhmanmohamed8561
    @abdelrhmanmohamed8561 Год назад +1

    awesome
    keep going

    • @netletic
      @netletic  Год назад

      thank you @abdelrhmanmohamed8561! ☺️

  • @skull_cyber
    @skull_cyber Год назад +1

    Great Keep it Up

    • @netletic
      @netletic  Год назад +1

      thank you @nulled00! ☺️