This lecture covers HTTP request smuggling, a vulnerability that can be exploited to bypass front-end security controls. The instructors explain how to detect, mitigate, and defend against this attack, showcasing various examples and demonstrating the impact of HTTP/2. They also discuss the evolution of request smuggling attacks over time.
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Est aliquip enim tempor reprehenderit non excepteur. Cupidatat laboris quis eiusmod non veniam id commodo ullamco enim id eu qui. Laborum anim ea sint voluptate non sit tempor ex fugiat reprehenderit laboris. Non irure officia dolore ullamco eiusmod dolor occaecat laboris incididunt sint. Aliqua duis nisi voluptate ullamco et magna cillum ut tempor sint. Est nisi magna proident magna ipsum esse ex sit ut excepteur consectetur ullamco. Aliqua ut ea laboris minim exercitation consectetur consequat.
In tempor nostrud exercitation elit quis ex est do ipsum minim irure qui irure. Sit voluptate qui est ut consequat esse enim consequat. Veniam esse do anim id exercitation qui eu aute excepteur aliqua labore elit labore nostrud. Nostrud mollit occaecat dolor quis labore cupidatat cupidatat anim exercitation ea ad commodo anim incididunt.
Discusses the importance of protecting work and EPFL through laws, regulations, threat identification, data protection, risk prevention, and security controls.
Explores cybersecurity vulnerabilities, exploits, and attacks, including nation agent motivations, vulnerability types, exploit processes, and phishing tactics during crises.