Similar Tracks
DEF CON 30 - James Kettle - Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling
DEFCONConference
What functionalities are vulnerable to SSRFs? Case study of 124 bug bounty reports
Bug Bounty Reports Explained
albinowax - HTTP Desync Attacks: Smashing into the Cell Next Door - DEF CON 27 Conference
DEFCONConference