Month: March 2025

Web Application Exploitation

HTTP Request Headers as an Attack Vector – Partie Deux

Last time I have showcased a three interesting headers that can be used as attack vector. This time I will showcase a three more, however they will be more exotic that the previous examples. If you haven’t seen part 1, view it first here. Without further ado, let’s buckle up! Forcing HTTP Verb Tunneling In …...

Read More
Close