|
1 | 1 | # HTTP Desync or Request Smuggling:
|
2 | 2 | - Basics:
|
3 |
| -"HTTP request smuggling is a technique for interfering with the way a web site processes sequences of HTTP requests that are received from one or more users. Request smuggling vulnerabilities are often critical in nature, allowing an attacker to bypass security controls, gain unauthorized access to sensitive data, and directly compromise other application users. " -Portswigger |
| 3 | +"HTTP request smuggling is a technique for interfering with the way a web site processes sequences of HTTP requests that are received from one or more users. Request smuggling vulnerabilities are often critical in nature, allowing an attacker to bypass security controls, gain unauthorized access to sensitive data, and directly compromise other application users. " -Portswigger |
4 | 4 |
|
5 |
| -- Where?: |
6 |
| - -Any Endpoint might be Vulnerable to HTTP Desync attack. |
| 5 | + |
| 6 | +- Where?: |
| 7 | + |
| 8 | + -Any Endpoint might be Vulnerable to HTTP Desync attack. |
| 9 | + |
7 | 10 | -You can Find the Vulnerability on Non-endpoints as well, But impact is always much higher on Sensitive Endpoints ;)
|
8 | 11 |
|
9 |
| -Step 1: |
10 |
| --Go To Repeater tab, and try various Timing based payloads to confirm the bug. More Explaination here: |
| 12 | +Step 1: |
| 13 | + |
| 14 | +-Go To Repeater tab, and try various Timing based payloads to confirm the bug. More Explaination here: |
| 15 | + |
11 | 16 | [Finding the Vulnerability](https://portswigger.net/web-security/request-smuggling/finding)
|
12 | 17 |
|
13 |
| -Step 2: |
14 |
| --Once you have successfully discovored the bug, you can chain it with various bugs eg. Account Takeover by stealing session IDs, Cross side Scripting Attacks in User-Agent Header,etc. More Description here: |
15 |
| -[Exploiting the Vulnerability](https://portswigger.net/web-security/request-smuggling/exploiting) |
| 18 | +Step 2: |
| 19 | + |
| 20 | +-Once you have successfully discovored the bug, you can chain it with various bugs eg. Account Takeover by stealing session IDs, Cross side Scripting Attacks in User-Agent Header,etc. More Description here: |
| 21 | + |
| 22 | +[Exploiting the Vulnerability](https://portswigger.net/web-security/request-smuggling/exploiting) |
| 23 | + |
| 24 | + |
| 25 | +- Tools: |
| 26 | + |
| 27 | +1.[defparam`s_smuggler.py](https://github.com/defparam/smuggler) |
| 28 | + |
| 29 | +- Usage: |
16 | 30 |
|
17 |
| -- Tools: |
18 |
| -1.[defparam`s_smuggler.py](https://github.com/defparam/smuggler) |
19 |
| -2.[Burp_smuggler](https://github.com/PortSwigger/http-request-smuggler) (also available in BApp store) |
20 |
| - |
21 |
| -- Usage: |
22 | 31 | -Smuggler.py :
|
23 | 32 | ``` cat alive_urls.txt | python3 smuggler.py -m GET/POST #either GET or POST ```
|
24 | 33 | or
|
25 | 34 | ``` python3 smuggler.py -u https://example.com -m GET/POST ```
|
26 | 35 |
|
27 |
| -#### More Info: |
28 |
| -- Topics |
29 |
| -https://paper.seebug.org/1049/ (Recommended !) |
30 |
| -[Portswigger Topic](https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn) |
31 |
| -[Portswigger Lab](https://portswigger.net/web-security/request-smuggling) |
32 |
| -- Reports (Hackerone): |
33 |
| -[Report 1](https://hackerone.com/reports/737140) |
34 |
| -[Report 2](https://hackerone.com/reports/867952) |
35 |
| -[Report 3](https://hackerone.com/reports/498052) |
| 36 | +2.[Burp_smuggler](https://github.com/PortSwigger/http-request-smuggler) (also available in BApp store) |
| 37 | + |
| 38 | + |
| 39 | +#### More Info: |
| 40 | + |
| 41 | +- Topics |
| 42 | + |
| 43 | +https://paper.seebug.org/1049/ (Recommended !) |
| 44 | + |
| 45 | +[Portswigger Topic](https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn) |
| 46 | + |
| 47 | +[Portswigger Lab](https://portswigger.net/web-security/request-smuggling) |
| 48 | + |
| 49 | +- Reports (Hackerone): |
| 50 | + |
| 51 | +[Report 1](https://hackerone.com/reports/737140) |
| 52 | + |
| 53 | +[Report 2](https://hackerone.com/reports/867952) |
| 54 | + |
| 55 | +[Report 3](https://hackerone.com/reports/498052) |
| 56 | + |
36 | 57 | [Report 4](https://hackerone.com/reports/526880)
|
37 |
| -[Report 5](https://hackerone.com/reports/771666) |
38 |
| -[Report 6](https://hackerone.com/reports/753939) |
39 |
| -[Report 7](https://hackerone.com/reports/648434 ) |
40 |
| -[Report 8](https://hackerone.com/reports/740037) |
41 |
| -- Writeups (Medium.com): |
42 |
| -[Article 1](https://medium.com/@ricardoiramar/the-powerful-http-request-smuggling-af208fafa142) |
43 |
| -[Article 2](https://medium.com/cyberverse/http-request-smuggling-in-plain-english-7080e48df8b4) |
44 |
| -[Article 3](https://medium.com/@cc1h2e1/write-up-of-two-http-requests-smuggling-ff211656fe7d) |
45 |
| -[Article 4](https://medium.com/bugbountywriteup/crossing-the-borders-the-illegal-trade-of-http-requests-57da188520ca) |
46 |
| -- Extra: |
| 58 | + |
| 59 | +[Report 5](https://hackerone.com/reports/771666) |
| 60 | + |
| 61 | +[Report 6](https://hackerone.com/reports/753939) |
| 62 | + |
| 63 | +[Report 7](https://hackerone.com/reports/648434 ) |
| 64 | + |
| 65 | +[Report 8](https://hackerone.com/reports/740037) |
| 66 | + |
| 67 | +- Writeups (Medium.com): |
| 68 | + |
| 69 | +[Article 1](https://medium.com/@ricardoiramar/the-powerful-http-request-smuggling-af208fafa142) |
| 70 | + |
| 71 | +[Article 2](https://medium.com/cyberverse/http-request-smuggling-in-plain-english-7080e48df8b4) |
| 72 | + |
| 73 | +[Article 3](https://medium.com/@cc1h2e1/write-up-of-two-http-requests-smuggling-ff211656fe7d) |
| 74 | + |
| 75 | +[Article 4](https://medium.com/bugbountywriteup/crossing-the-borders-the-illegal-trade-of-http-requests-57da188520ca) |
| 76 | + |
| 77 | +- Extra: |
| 78 | + |
47 | 79 | [A Brief Vidoe About Req. Smuggling](https://youtu.be/gzM4wWA7RFo)
|
48 | 80 |
|
49 | 81 | ###### If you think something was missed, feel free to add/modify/delete it :)
|
50 |
| - |
|
0 commit comments