Skip to content

Scomurr's Blog

Play for serendipity…

  • Main Blog
  • Web Attacks
  • Web Dev
  • SCOM
  • Game Dev
  • About
  • Disclaimer
  • HTTP Request Smuggling – HTTP/2 Request Tunnelling

    03/19/2023 scomurr Security, Web Attacks
  • HTTP Request Smuggling – Web Cache Poisoning for Deception

    03/12/2023 scomurr Security, Web Attacks
  • HTTP Request Smuggling – Web Cache Poisoning

    03/05/2023 scomurr Security, Web Attacks
  • HTTP Request Smuggling – Admin Access via CL.0 Vulnerability

    02/25/2023 scomurr Security, Web Attacks
  • HTTP Request Smuggling–H2 CRLF Header Injection Part 2

    02/20/2023 scomurr Security, Web Attacks
  • HTTP Request Smuggling – H2 CRLF Injection

    01/27/2023 scomurr Security, Web Attacks
  • HTTP Request Smuggling – HTTP/2 Downgrade Attack Part 2

    01/25/2023 scomurr Security, Web Attacks
  • HTTP Request Smuggling – HTTP/2 Downgrade Attack

    01/23/2023 scomurr Security, Web Attacks

Latest Posts

HTTP Request Smuggling – TE.CL Vulnerability

12/13/2022 scomurr Security, Web Attacks

I am continuing my blog series on HTTP Request Smuggling or HTTP Desync attacks. These vulnerabilities arise when there is[…]

Read more

HTTP Request Smuggling – CL.TE Vulnerability

12/12/2022 scomurr Security, Web Attacks

In my preparation for taking the Burp Certified Professional test, I ran through the majority of the content on Web[…]

Read more

Microsoft Sentinel – Incident Enrichment with urlscan.io

09/27/2022 scomurr Automation, Azure, Security

Helping a SOC Analyst get the data they need during an investigation is critical in helping drive down security incident[…]

Read more

Browser Tip: Pinning Sites as Applications

08/24/2022 scomurr Productivity

This is a trick I use pretty heavily to control the amount of tabs I have open and allows me[…]

Read more

MITRE Caldera – Emulating an Adversary

11/15/2020 scomurr MITRE, OffSec, Security

Perishable threat intelligence – when a new attacker enters the fray or when an existing threat actor changes their tactics,[…]

Read more

Posts navigation

«Previous Posts 1 2 3 4 5 6 … 14 Next Posts»
  • Automation (6)
  • Azure (4)
  • Hack Job (6)
  • MCAS (2)
  • PowerShell (2)
  • Presentation (3)
  • Productivity (2)
  • Security (25)
  • System Center (32)

Recent Posts

  • HTTP Request Smuggling – HTTP/2 Request Tunnelling
  • HTTP Request Smuggling – Web Cache Poisoning for Deception
  • HTTP Request Smuggling – Web Cache Poisoning
  • HTTP Request Smuggling – Admin Access via CL.0 Vulnerability
  • HTTP Request Smuggling–H2 CRLF Header Injection Part 2

Categories

  • Activities
  • ARM
  • Automation
  • Azure
  • Developement
  • Hack Job
  • Infrastructure as Code
  • Integration Packs
  • Management Packs
  • MCAS
  • MITRE
  • MP Authoring
  • OffSec
  • OSCP
  • PowerShell
  • PowerShell
  • Presentation
  • Productivity
  • Reporting
  • SC Operations Manager
  • SC Orchestrator
  • SC Service Manager
  • Security
  • System Center
  • Web Attacks
WordPress Theme: Poseidon by ThemeZee.