About 555 results
Open links in new tab
  1. What is HTTP request smuggling? Tutorial & Examples - PortSwigger

    What is HTTP request smuggling? HTTP request smuggling is a technique for interfering with the way a web site processes sequences of HTTP requests that are received from one or more …

  2. Finding HTTP request smuggling vulnerabilities - PortSwigger

    The most generally effective way to detect HTTP request smuggling vulnerabilities is to send requests that will cause a time delay in the application's responses if a vulnerability is present.

  3. Exploiting HTTP request smuggling vulnerabilities - PortSwigger

    In this section, we'll describe various ways in which HTTP request smuggling vulnerabilities can be exploited, depending on the intended functionality and other behavior of the application.

  4. Advanced request smuggling | Web Security Academy - PortSwigger

    In this section, we'll build on the concepts you've learned so far and teach you some more advanced HTTP request smuggling techniques. We'll also cover a variety of HTTP/2-based …

  5. Client-side desync attacks | Web Security Academy - PortSwigger

    Classic desync or request smuggling attacks rely on intentionally malformed requests that ordinary browsers simply won't send. This limits these attacks to websites that use a front …

  6. HTTP Desync Attacks: Request Smuggling Reborn - PortSwigger

    Aug 7, 2019 · These requests can be adapted to target arbitrary discrepancies in header parsing, and they're used to automatically identify request smuggling vulnerabilities by HTTP Request …

  7. HTTP Request Smuggling Research - PortSwigger

    Aug 6, 2025 · View the latest HTTP request smuggling research papers, tools, and techniques, from PortSwigger Research. Includes introductory and advanced content.

  8. Lab: HTTP request smuggling, basic CL.TE vulnerability

    The front-end server rejects requests that aren't using the GET or POST method. To solve the lab, smuggle a request to the back-end server, so that the next request processed by the back …

  9. HTTP request smuggling - PortSwigger

    You can resolve all variants of this vulnerability by configuring the front-end server to exclusively use HTTP/2 when communicating with back-end systems. Alternatively, you could ensure all …

  10. CL.0 request smuggling | Web Security Academy - PortSwigger

    Request smuggling vulnerabilities are the result of discrepancies in how chained systems determine where each request starts and ends. This is typically due to inconsistent header …