HTTP Request Smuggling in 2020

Logo
Presented by

Amit Klein, VP Security Research at SafeBreach and Jesse Munos, Technical Marketing Manager at ExtraHop

About this talk

HTTP Request Smuggling is an attack technique invented in 2005, that exploits different interpretations of a stream of non-standard HTTP requests among various HTTP devices between the client (attacker) and the server (including the server itself). It can be used to smuggle requests across WAFs and security solutions, poison HTTP caches, inject responses to users and hijack user requests. In the first part of my talk, Amit presents new HTTP Request Smuggling attack variants that work against present-day web servers and HTTP proxy servers. He also presents an attack which circumvents the HTTP Request Smuggling protection in a free, open source WAF. In the second part of his talk, I describe my C++ "Request Smuggling Firewall" class library that can be injected to any user-space process (web server or proxy server) to provide robust socket-level protection against HTTP Request Smuggling. He concludes with some anomalies I found in various web servers and proxy servers, showing there is a lot of potential for additional research in this area.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (131)
Subscribers (11593)
The prevention and protection model of cybersecurity isn’t working: between the cloud, IoT, and the sheer pace of change, the enterprise is no longer built to be walled in. This channel provides educational webinars to help SecOps (SOC) and NetOps (NOC) teams, from CIOs and CISOs to analysts and practitioners, change their perspective in order to identify, investigate, and respond to threats across the modern attack surface. We explore how cloud-native network detection and response (NDR) provides the complete visibility, real-time threat detection, and intelligent response you need to secure your hybrid environment. You’ll also find product information about ExtraHop Reveal(x) which enables you to: Eliminate blind spots: Cover 100% of your hybrid environment, Detect what matters: Find threats 95% faster, and Act quickly: Respond to breaches 70% faster. Learn more at www.extrahop.com