Skip to main contentSkip to main content
Room Banner
Back to all walkthroughs
Room Icon

Request Smuggling: WebSockets

Premium room

Exploit HTTP Request Smuggling through WebSockets.

medium

30 min

6,522

User profile photo.
User profile photo.

To access material, start machines and answer questions login.

In this room, we'll look at ways to smuggle requests through proxies by abusing WebSockets. 

Learning Objectives

  • Understand how WebSockets work.
  • Learn how to exploit request smuggling via WebSockets functionality.
  • Use tools to detect/exploit said vulnerabilities.

Room Prerequisites

Before attempting this room, you must complete the Request Smuggling room. You must also be comfortable using proxies like Burp or .

Starting the

You will need to deploy the attached to this task by pressing the green Start Machine button at the top of the task. The machine will deploy all the required scenarios to complete the room. Each task that requires you to complete a practical element will point you to the URL of the web application you will need. You may access the using the AttackBox or your connection.

Answer the questions below
Click and continue learning!

Ready to learn Cyber Security?

The Request Smuggling: WebSockets room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.

Already have an account? Log in

We use cookies to ensure you get the best user experience. For more information see our cookie policy.