Listen to the whispers: web timing attacks that actually work |
|
|
|
How to build custom scanners for web security research automation |
|
|
|
Smashing the state machine: the true potential of web race conditions |
|
|
|
HTTP/3 connection contamination: an upcoming threat? |
|
|
|
Making HTTP header injection critical via response queue poisoning |
|
|
|
How to turn security research into profit: a CL.0 case study |
|
|
|
Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling |
|
|
|
Cracking reCAPTCHA, Turbo Intruder style |
|
|
|
Responsible denial of service with web cache poisoning |
|
|
|
Bypassing Web Cache Poisoning Countermeasures |
|
|
|
Practical Web Cache Poisoning |
|
|
|
Cracking the lens: targeting HTTP's hidden attack-surface |
|
|
|
Backslash Powered Scanning: hunting unknown vulnerability classes |
|
|
|
Exploiting CORS misconfigurations for Bitcoins and bounties |
|
|
|