This lecture covers HTTP request smuggling, a vulnerability that can be exploited to bypass front-end security controls. The instructors explain how to detect, mitigate, and defend against this attack, showcasing various examples and demonstrating the impact of HTTP/2. They also discuss the evolution of request smuggling attacks over time.
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Amet incididunt adipisicing tempor in qui id esse ex occaecat cupidatat ea velit eu cupidatat. Laboris nulla proident dolore ipsum dolor ut. Commodo magna minim officia officia commodo ad sunt est fugiat culpa dolor nisi. Magna cupidatat proident et nostrud culpa tempor mollit nostrud est commodo Lorem.
Aute laborum ad excepteur pariatur anim voluptate non occaecat ex tempor. Eu sint aute ex nulla magna irure esse ea duis anim cupidatat aliquip incididunt adipisicing. Culpa adipisicing ipsum qui consequat.
Discusses the importance of protecting work and EPFL through laws, regulations, threat identification, data protection, risk prevention, and security controls.
Explores cybersecurity vulnerabilities, exploits, and attacks, including nation agent motivations, vulnerability types, exploit processes, and phishing tactics during crises.