in

Advanced request smuggling | Web Security Academy

In this section, we’ll build on the concepts you’ve learned so far and teach you some more advanced HTTP request smuggling techniques. We’ll also cover a variety of HTTP/2-based attacks that are made possible thanks to Burp’s unique HTTP/2-testing capabilities. Don’t worry if you’re new to HTTP/2 – we’ll cover all the essentials as we go.

In particular, we’ll look at:

This post was created with our nice and easy submission form. Create your post!

What do you think?

Posted by SH

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Reversing and Exploiting Samsung's NPU (Part 2)

Pre-Auth Takeover Bug in GoCD