Back to all modules

HTTP Request Smuggling

HTTP Request Smuggling icon

Learn to identify and exploit HTTP request smuggling, covering CL.TE, TE.CL, transfer-encoding obfuscation, browser desync, and HTTP2 smuggling.

In this module, we'll explore an attack that takes advantage of how different web servers interpret HTTP requests. We'll examine the basic techniques of HTTP request smuggling, such as Content-Length/Transfer-Encoding (CL.TE), Transfer-Encoding/Content-Length (TE.CL), and Transfer-Encoding obfuscation. We’ll also cover Browser desync attacks, where attackers disrupt the alignment between the user's browser and the server. Additionally, we'll also look into HTTP2 smuggling, which utilizes the complexity of the HTTP2 protocol to bypass security measures.

HTTP Request Smuggling icon

We use cookies to ensure you get the best user experience. For more information contact us.

Read more