HTTP request smuggling, basic CL.TE vulnerability

HTTP request smuggling, basic CL.TE vulnerability

HTTP request smuggling, basic CL.TE vulnerability

1: Open the Burp Suite.

2: Access the Lab HTTP request smuggling, basic CL.TE vulnerability.

Website: https://portswigger.net/web-security/request-smuggling/lab-basic-cl-te

HTTP request smuggling, basic CL.TE vulnerability 1

2: Send a request to the Repeater.

Shortcut: Ctrl + R

HTTP request smuggling, basic CL.TE vulnerability 2

3: Remove the parameters.

HTTP request smuggling, basic CL.TE vulnerability 3

4: Change the Parameters.

HTTP request smuggling, basic CL.TE vulnerability 4

5: Send the request three times.

6:  Your lab has been completed.

HTTP request smuggling, basic CL.TE vulnerability 5

PortSwigger Labs

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top