This lecture covers HTTP request smuggling, a vulnerability that can be exploited to bypass front-end security controls. The instructors explain how to detect, mitigate, and defend against this attack, showcasing various examples and demonstrating the impact of HTTP/2. They also discuss the evolution of request smuggling attacks over time.
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Veniam est occaecat esse aliquip duis laboris excepteur. Exercitation anim enim dolor incididunt ad eiusmod et mollit. Consectetur magna mollit incididunt Lorem cupidatat enim velit quis. Ex Lorem proident aliqua consectetur dolor qui cillum sit non amet magna nisi laborum.
Ut eu adipisicing aute do adipisicing mollit adipisicing duis tempor eu deserunt et. Consequat laboris dolore exercitation Lorem. Et aliqua esse amet do aliquip sint incididunt dolore nostrud cillum excepteur minim. Incididunt culpa occaecat do eiusmod aliquip consectetur duis ipsum do incididunt. Aliqua aliquip adipisicing pariatur excepteur eu qui nostrud voluptate proident.
Discusses the importance of protecting work and EPFL through laws, regulations, threat identification, data protection, risk prevention, and security controls.
Explores cybersecurity vulnerabilities, exploits, and attacks, including nation agent motivations, vulnerability types, exploit processes, and phishing tactics during crises.