BOOK THIS SPACE FOR AD
ARTICLE AD🆓Free Article Link: Click here
Article alert — Bigners Only
Hello friends in this blog I discussing about types and Basics of HTTP Request Sumgling vulnerability. You already know this vulnerability please skip this blog and waiting for my next blog Task 2 - HTTP Request Sumgling — Real world attack’s, automations, all Hackerone reports, resrschers publiced articles, tips & tricks.
Understanding Words
HTTP/2 & HTTP/1.1Content-LengthTransfer-EncodingMost HTTP request smuggling vulnerabilities arise because the HTTP/1 specification provides two different ways to specify where a request ends: the Content-Length header and the Transfer-Encoding header.
You need this two thoughts only
First change the HTTP/2 to HTTP/1.1Modify or rearrangeing Content-Length & Transfer-EncodingFirst I discuss mostly vulnerable CL.TE type.