Back to Browse

Exploiting HTTP request smuggling to capture other users' requests - Lab#06

107 views
Dec 29, 2025
16:59

In this video, I demonstrate how to exploit HTTP Request Smuggling to capture other users’ requests, a powerful and often overlooked impact of request desynchronization vulnerabilities. This lab features a front-end and back-end server with inconsistent HTTP parsing behavior, where the front-end server does not support chunked encoding. By carefully crafting a smuggled request, we can desynchronize the request queues between the two servers and force the next victim user’s request to be interpreted as part of our own request stream. As a result, the application unintentionally stores another user’s HTTP request, including their session cookies. We then retrieve this stored request and reuse the victim’s cookies to access their authenticated account. 🎯 What you’ll learn in this video: ✔️ How HTTP request smuggling leads to request queue desynchronization ✔️ Capturing another user’s request via CL.TE / TE.CL behavior ✔️ Understanding real-world impacts beyond simple 404 responses ✔️ Extracting and abusing victim session cookies ✔️ Account takeover through request smuggling This lab highlights how HTTP request smuggling can directly lead to session hijacking, making it a critical vulnerability for real-world applications. ⚠️ Educational purposes only. Always test responsibly and with permission. 👍 Like, share, and subscribe for more PortSwigger Web Security Academy lab walkthroughs and advanced web exploitation techniques. 🔖 Hashtags: #HTTPRequestSmuggling #WebSecurity #BugBounty #EthicalHacking #PortSwigger #BurpSuite #CyberSecurity #InfoSec #WebAppSec #SessionHijacking #OWASP #PenetrationTesting

Download

1 formats

Video Formats

360pmp418.6 MB

Right-click 'Download' and select 'Save Link As' if the file opens in a new tab.

Exploiting HTTP request smuggling to capture other users' requests - Lab#06 | NatokHD