HTTP Request Smuggling in web application
Author(s):
Kaushik Joshi, Mr. Chandresh Parekh
Keywords:
HTTP request smuggling, HTTP request smuggling in a web app, HTTP request smuggling attack, HTTP request smuggling vulnerability, Methods of HTTP request smuggling attack HTTP request spitting.
Abstract
Now a day's cyber-attacks are increasing extremely on a web application, mobile apps, networks that are more vulnerable for a web application. HTTP requests are common viewed as remote, unaccompanied entities. Attackers simply modified requests and by the response of that request perform exploitation. Unauthenticated attackers delicately amend victims' requests to route them into the malicious territory, invoke harmful responses, and lure credentials into the open network. HTTP request smuggling attacks is one of the kinds of attack that triggered the back-end server through bypassing front-end server. In this paper, I'll show you how HTTP request smuggling attack performs in the real-time using website. By researching some of the articles and papers about this attack I'll figure out some methods of these attacks.
Article Details
Unique Paper ID: 149855

Publication Volume & Issue: Volume 7, Issue 1

Page(s): 820 - 824
Article Preview & Download


Share This Article

Conference Alert

NCSST-2021

AICTE Sponsored National Conference on Smart Systems and Technologies

Last Date: 25th November 2021

SWEC- Management

LATEST INNOVATION’S AND FUTURE TRENDS IN MANAGEMENT

Last Date: 7th November 2021

Latest Publication

Go To Issue



Call For Paper

Volume 8 Issue 4

Last Date 25 September 2021

About Us

IJIRT.org enables door in research by providing high quality research articles in open access market.

Send us any query related to your research on editor@ijirt.org

Social Media

Google Verified Reviews

Contact Details

Telephone:6351679790
Email: editor@ijirt.org
Website: ijirt.org

Policies