Lab: Combining web cache poisoning vulnerabilities

Поділитися
Вставка
  • Опубліковано 29 лис 2024

КОМЕНТАРІ • 8

  • @netletic
    @netletic  10 місяців тому +2

    Hey everyone! Check out this playlist for all my solutions to the Web Cache Poisoning labs from PortSwigger: ua-cam.com/play/PLGb2cDlBWRUUvoGqcCF1xe86AaRXGSMT5.html
    Here are the timestamps for this video - ⏱
    00:00 - Start
    00:40 - Identify a cache oracle
    01:10 - Add a cache buster
    01:39 - Find unkeyed inputs
    02:35 - Explore X-Forwarded-Host input potential
    06:29 - Identify the DOM XSS Source & Sink
    07:25 - Inject a harmful response into the cache with the X-Forwarded-Host header
    10:32 - How can we redirect all users to the Spanish homepage?
    12:23 - Explore X-Original-URL input potential
    15:37 - Figure out how the language setting works
    16:05 - How can we get the /setlang/es? redirect cached?
    18:22 - Inject a harmful response into the cache via X-Original-URL
    19:28 - Chain the two vulnerabilities together

  • @warnawarni5227
    @warnawarni5227 9 місяців тому +1

    Always The Best Explanation...NIce job

    • @netletic
      @netletic  9 місяців тому

      thanks @warnawarni5227! ☺️

  • @KL-og8gg
    @KL-og8gg 9 місяців тому +1

    Very nice, keep going brother. Can you do the SSO series?

    • @netletic
      @netletic  9 місяців тому

      thanks @KL-og8gg! are these the OAuth labs? I can add it to the list, I'm working on the API security labs and GraphQL labs at the moment, but could do OAuth after. ☺

    • @KL-og8gg
      @KL-og8gg 9 місяців тому +1

      @@netletic Thank you, that's awesome. You have the best explain and walk through ever. Please keep going, I will share your channel to everyone :)

  • @zinjacoder
    @zinjacoder 6 місяців тому

    Hats off to you brother, You are making content which are typical comes with paid courses requiring huge amount of fees.

  • @kittoh_
    @kittoh_ 3 місяці тому

    Do you have a hotkey to send request within repeater?