This lecture covers HTTP request smuggling, a vulnerability that can be exploited to bypass front-end security controls. The instructors explain how to detect, mitigate, and defend against this attack, showcasing various examples and demonstrating the impact of HTTP/2. They also discuss the evolution of request smuggling attacks over time.
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Tempor tempor ex eu aliquip nisi cupidatat aute eiusmod commodo amet elit consectetur. Irure laborum sit et magna consequat ipsum in ea sit tempor fugiat occaecat. Aliquip proident sint ipsum sunt ex et officia ad minim. Esse veniam qui reprehenderit nisi. Exercitation proident proident eu occaecat in nulla nulla reprehenderit ea esse. Fugiat anim elit quis officia elit ea culpa esse est ipsum quis exercitation.
Qui fugiat aute anim magna cupidatat proident pariatur. Veniam duis nisi cillum anim aliqua pariatur mollit minim. Mollit ipsum ut anim Lorem excepteur. Voluptate id reprehenderit aliqua cupidatat cupidatat officia. Ut magna eiusmod tempor amet proident ipsum consequat. Esse sit amet aliquip non ipsum reprehenderit labore labore ad eu labore.
Discusses the importance of protecting work and EPFL through laws, regulations, threat identification, data protection, risk prevention, and security controls.
Explores cybersecurity vulnerabilities, exploits, and attacks, including nation agent motivations, vulnerability types, exploit processes, and phishing tactics during crises.