Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

albinowax - HTTP Desync Attacks: Smashing into the Cell Next Door - DEF CON 27 Conference

Автор: DEFCONConference

Загружено: 2019-11-15

Просмотров: 64649

Описание:

HTTP requests are traditionally viewed as isolated, standalone entities. In this session, I'll introduce techniques for remote, unauthenticated attackers to smash through this isolation and splice their requests into others, through which I was able to play puppeteer with the web infrastructure of numerous commercial and military systems, rain exploits on their visitors, and harvest over $50k in bug bounties.

Using these targets as case studies, I’ll show you how to delicately amend victim's requests to route them into malicious territory, invoke harmful responses, and lure credentials into your open arms. I’ll also demonstrate using backend reassembly on your own requests to exploit every modicum of trust placed on the frontend, gain maximum privilege access to internal APIs, poison web caches, and compromise my favourite login page.

Although documented over a decade ago, a fearsome reputation for difficulty and collateral damage has left this attack optimistically ignored for years while the web's susceptibility grew. By applying fresh ideas and new techniques, I’ll unveil a vast expanse of vulnerable systems ranging from huge content delivery networks to bespoke backends, and ensure you leave equipped to devise your own desync techniques and tailor attacks to your target of choice.

albinowax
James Kettle is Head of Research at PortSwigger Web Security, where he designs and refines vulnerability detection techniques for Burp Suite's scanner. Recent work has focused on using web cache poisoning to turn caches into exploit delivery systems. James has extensive experience cultivating novel attack techniques, including server-side RCE via Template Injection, client-side RCE via malicious formulas in CSV exports, and abusing the HTTP Host header to poison password reset emails and server-side caches. He has spoken at numerous prestigious venues including both BlackHat USA and EU, and OWASP AppSec USA and EU.

Twitter: @albinowax
Website: https://skeletonscribe.net/

albinowax - HTTP Desync Attacks: Smashing into the Cell Next Door - DEF CON 27 Conference

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

DEF CON 32 - Gotta Cache ‘em all  bending the rules of web cache exploitation - Martin Doyhenard

DEF CON 32 - Gotta Cache ‘em all bending the rules of web cache exploitation - Martin Doyhenard

DEF CON 31 -  Smashing the State Machine the True Potential of Web Race Conditions - James Kettle

DEF CON 31 - Smashing the State Machine the True Potential of Web Race Conditions - James Kettle

Novel HTTP/1 Request Smuggling/Desync Attacks with James Kettle

Novel HTTP/1 Request Smuggling/Desync Attacks with James Kettle

Практические атаки с использованием контрабанды HTTP-запросов от @defparam #NahamCon2020

Практические атаки с использованием контрабанды HTTP-запросов от @defparam #NahamCon2020

Bill Swearingen - HAKC THE POLICE - DEF CON 27 Conference

Bill Swearingen - HAKC THE POLICE - DEF CON 27 Conference

DEF CON 30 - James Kettle - Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling

DEF CON 30 - James Kettle - Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling

The Bug Hunter's Methodology - Application Analysis | Jason Haddix

The Bug Hunter's Methodology - Application Analysis | Jason Haddix

DEF CON 32 - Listen to the Whispers: Web Timing Attacks that Actually Work - James Kettle

DEF CON 32 - Listen to the Whispers: Web Timing Attacks that Actually Work - James Kettle

Руководство по взлому переполнения буфера (обход паролей)

Руководство по взлому переполнения буфера (обход паролей)

Что такое Rest API (http)? Soap? GraphQL? Websockets? RPC (gRPC, tRPC). Клиент - сервер. Вся теория

Что такое Rest API (http)? Soap? GraphQL? Websockets? RPC (gRPC, tRPC). Клиент - сервер. Вся теория

Gerald Doussot - State of DNS Rebinding Attacks & Singularity of Origin - DEF CON 27 Conference

Gerald Doussot - State of DNS Rebinding Attacks & Singularity of Origin - DEF CON 27 Conference

Объяснение контрабанды HTTP-запросов (с Джеймсом Кеттлом)

Объяснение контрабанды HTTP-запросов (с Джеймсом Кеттлом)

DEF CON 29 - James Kettle -  HTTP2: The Sequel is Always Worse

DEF CON 29 - James Kettle - HTTP2: The Sequel is Always Worse

James Kettle | Practical Web Cache Poisoning: Redefining 'Unexploitable' | Ekoparty 2018

James Kettle | Practical Web Cache Poisoning: Redefining 'Unexploitable' | Ekoparty 2018

HTTP Desync Attacks: Request Smuggling Reborn

HTTP Desync Attacks: Request Smuggling Reborn

Музыка для работы - Deep Focus Mix для программирования, кодирования

Музыка для работы - Deep Focus Mix для программирования, кодирования

Brent Stone - Reverse Engineering  17+ Cars in Less than 10 Minutes - DEF CON 27 Conference

Brent Stone - Reverse Engineering 17+ Cars in Less than 10 Minutes - DEF CON 27 Conference

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

Глава Neuralink: чип в мозге заменит вам телефон

Глава Neuralink: чип в мозге заменит вам телефон

DEF CON 32 - Top War Stories from a TryHard Bug Bounty Hunter -Justin Rhynorater Gardner

DEF CON 32 - Top War Stories from a TryHard Bug Bounty Hunter -Justin Rhynorater Gardner

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]