|
@dcuthbert | |||||
|
Next up...
I want to be James Kettle @albinowax when I grow up. He's singlehandedly made appsec sexy again after years of hardly any decent research. This little trick will make the bug bounty scene go mad.
#BHEU pic.twitter.com/BxjEgKRDW7
|
||||||
|
||||||
|
Daniel Cuthbert
@dcuthbert
|
4. pro |
|
HTTP is stateless. Repeat after me.
Oh wait. Someone put the kettle on and he's about to show how this isn't exactly the case. This topic scared James so much that it nearly put him off researching it. pic.twitter.com/IMvlgqSUCT
|
||
|
|
||
|
Daniel Cuthbert
@dcuthbert
|
4. pro |
|
Can I just say how DAMN refreshing that James starts off with a side no-one talks about: the fear we all have of the subject and failures along the way.
|
||
|
|
||
|
Daniel Cuthbert
@dcuthbert
|
4. pro |
|
Now we all know RFCs right? RFC 2616 #4.4.3 says that if you get a message with both transfer-encoding AND content-length, the latter MUST be ignored.
But who reads the docs??
|
||
|
|
||
|
Daniel Cuthbert
@dcuthbert
|
4. pro |
|
The Kettle Break The Web© methodology. it's based upon timing and on influence. pic.twitter.com/avax1zhRkO
|
||
|
|
||
|
Daniel Cuthbert
@dcuthbert
|
4. pro |
|
Ok Jesus wept bugbounty crowd, stop DMing me.
Here's the simple trick. Buy a copy of @PortSwigger and support Daffs growing fancy shirt collection pic.twitter.com/W9GtfcKbop
|
||
|
|
||
|
Daniel Cuthbert
@dcuthbert
|
4. pro |
|
Attack one: bypassing front-end rules pic.twitter.com/aPOnWqcxgM
|
||
|
|
||
|
Daniel Cuthbert
@dcuthbert
|
4. pro |
|
Attack two: request reflection
Cool thing here is that the request gets concatenated onto the other POST login request.
That's sexy af! pic.twitter.com/NqWeQ1B4lr
|
||
|
|
||
|
Daniel Cuthbert
@dcuthbert
|
4. pro |
|
The X-Forwarded headers are so misunderstood and at the same time so widely used. pic.twitter.com/aRFCC89NDQ
|
||
|
|
||
|
Daniel Cuthbert
@dcuthbert
|
4. pro |
|
PSA: F5 didn't seem to think that this was enough to issue a patch but just an advisory. pic.twitter.com/n96u43N4dq
|
||
|
|
||
|
Daniel Cuthbert
@dcuthbert
|
4. pro |
|
When James says "accidental" and "cache poisoning" and then making many accessing a well-known homepage automatically hit the burp collaborator, to grab an image
Accidental, pfft pic.twitter.com/SXrsnpnP7U
|
||
|
|
||
|
Daniel Cuthbert
@dcuthbert
|
4. pro |
|
He is the Dwayne Johnson of infosec and bug bounties. Such a baller pic.twitter.com/0O0kssUN5J
|
||
|
|
||
|
Daniel Cuthbert
@dcuthbert
|
4. pro |
|
The demo video truly shows how friggin amazing this research is and has earned him over 90,000 USD. Seriously I couldn't be more of an appsec fanboy at this moment in time pic.twitter.com/2oCpk3bMZD
|
||
|
|
||
|
Daniel Cuthbert
@dcuthbert
|
4. pro |
|
The defensive side is actually the most important. We really need to push adoption of HTTP/2 overall. Many said WAFs solve this, no no no they will only ever be bandaids. pic.twitter.com/mGZGkBvqxG
|
||
|
|
||