To access material, start machines and answer questions login.
In this room, we'll look at ways to smuggle requests through proxies by abusing WebSockets.
Learning Objectives
- Understand how WebSockets work.
- Learn how to exploit request smuggling via WebSockets functionality.
- Use tools to detect/exploit said vulnerabilities.
Room Prerequisites
Before attempting this room, you must complete the Request Smuggling room. You must also be comfortable using proxies like Burp or .
Starting the
You will need to deploy the attached to this task by pressing the green Start Machine button at the top of the task. The machine will deploy all the required scenarios to complete the room. Each task that requires you to complete a practical element will point you to the URL of the web application you will need. You may access the using the AttackBox or your connection.
Ready to learn Cyber Security?
The Request Smuggling: WebSockets room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in
