Lab: Bypassing access controls via HTTP/2 request tunnelling

Поділитися
Вставка
  • Опубліковано 29 лис 2024

КОМЕНТАРІ • 11

  • @netletic
    @netletic  Рік тому +1

    Hey everyone! Check out this playlist for all my solutions to the HTTP Request Smuggling labs from PortSwigger - 👀
    ua-cam.com/play/PLGb2cDlBWRUX1_7RAIjRkZDYgAB3VbUSw.html
    Here are the timestamps for this video - ⏱
    00:00 - Intro
    00:30 - Confirm the CRLF vulnerability
    01:50 - Leak the internal headers using CRLF injection
    05:30 - Smuggle a request to the admin page
    09:36 - Use a HEAD request instead of GET

  • @haythamkt5607
    @haythamkt5607 Рік тому +1

    rak mqawd a khay thank you so much !

    • @anonymousvevo8697
      @anonymousvevo8697 6 місяців тому

      @@netletic haha i bet you didn't understand the first two words

  • @gopikanna_
    @gopikanna_ 10 місяців тому +3

    10:00 we don't need an endpoint to match the CL of the admin page, instead we can use the GET /?search= , we should add the search terms until it matches the /admin endpoint's content length (3521)

    • @netletic
      @netletic  9 місяців тому

      hey @gopikanna_, that's an excellent find! definitely also a great way to work around the content-length issue 🔥

    • @gopikanna_
      @gopikanna_ 9 місяців тому

      @@netletic Thank you for your appreciation man!

  • @gopikanna_
    @gopikanna_ 10 місяців тому +1

    1:23 why're we adding the Host values in the name of the foo header name section? Instead of adding them in the values section

    • @netletic
      @netletic  9 місяців тому +1

      hey @gopikanna_, it's always good to try both, sometimes frontend implementations will strip CRLFs from header values when converting the request to http/1.1 to talk to the backend - essentially fixing this vulnerability - but not from the header name. Then we can still exploit this by injecting CRLFs in the header name.

    • @gopikanna_
      @gopikanna_ 9 місяців тому

      @@netletic Understood, thank you for your reply

  • @anonymousvevo8697
    @anonymousvevo8697 6 місяців тому

    what is the difference if we injected the payload into the name or the value ? i got mixed up

  • @draxler.a
    @draxler.a 7 місяців тому

    the content is great 👍🏻 but you talk tooooo fast 😅