Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=JT-ljp0lsNo



Duration: 22:01
4 views
0


Black Hat - USA - 2018 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-01-06Detecting Malicious Cloud Account Behavior A Look at the New Native Platform Capabilities
2022-01-06Automated Discovery of Deserialization Gadget Chains
2022-01-06KeenLab iOS Jailbreak Internals Userland Read Only Memory can be Dangerous
2022-01-06Decompiler Internals Microcode
2022-01-06Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities
2022-01-06Dissecting Non Malicious Artifacts One IP at a Time
2022-01-06Kernel Mode Threats and Practical Defenses
2022-01-06Don't @ Me Hunting Twitter Bots at Scale
2022-01-06Back to the Future A Radical Insecure Design of KVM on ARM
2022-01-06Deep Dive into an ICS Firewall, Looking for the Fire Hole
2022-01-06Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking
2022-01-06Keynote Optimistic Dissatisfaction with the Status Quo
2022-01-06A Brief History of Mitigation The Path to EL1 in iOS 11
2022-01-06Deep Neural Networks for Hackers Methods, Applications, and Open Source Tools
2022-01-06Efail Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels
2022-01-06A Deep Dive into macOS MDM and How it can be Compromised
2022-01-06Every ROSE has its Thorn The Dark Art of Remote Online Social Engineering
2022-01-06DeepLocker Concealing Targeted Attacks with AI Locksmithing
2022-01-06A Dive in to Hyper V Architecture & Vulnerabilities
2022-01-06Hardening Hyper V through Offensive Security Research
2022-01-06Exploitation of a Modern Smartphone Baseband



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering