Hey everyone! Check out this playlist for all my solutions to the HTTP Request Smuggling labs from PortSwigger - 👀 th-cam.com/play/PLGb2cDlBWRUX1_7RAIjRkZDYgAB3VbUSw.html Here are the timestamps for this video - ⏱ 00:00 - Intro 00:25 - Confirm the H2.TE CRLF injection vulnerability 05:00 - Explore the Search endpoint 06:29 - Smuggle the Search Request 08:12 - Capture our victim's request And here's a link to the Cookie Editor Extension I'm using: chrome.google.com/webstore/detail/cookie-editor/hlkenndednhfkekhgcdicdfddnkalmdm addons.mozilla.org/en-US/firefox/addon/cookie-editor/
These have been great for BSCP prep, I only wish you also included solutions with HTTP request smuggler extension at the end of the videos.. It's really hard to find examples online xD
Hey everyone! Check out this playlist for all my solutions to the HTTP Request Smuggling labs from PortSwigger - 👀
th-cam.com/play/PLGb2cDlBWRUX1_7RAIjRkZDYgAB3VbUSw.html
Here are the timestamps for this video - ⏱
00:00 - Intro
00:25 - Confirm the H2.TE CRLF injection vulnerability
05:00 - Explore the Search endpoint
06:29 - Smuggle the Search Request
08:12 - Capture our victim's request
And here's a link to the Cookie Editor Extension I'm using:
chrome.google.com/webstore/detail/cookie-editor/hlkenndednhfkekhgcdicdfddnkalmdm
addons.mozilla.org/en-US/firefox/addon/cookie-editor/
These have been great for BSCP prep, I only wish you also included solutions with HTTP request smuggler extension at the end of the videos.. It's really hard to find examples online xD
Thanks for explaining so smoothly this hard topic :)
thank you @kunshtanwar4765! ☺
love you