Skip to main content
Amit Klein's security corner

Main menu

  • Academia-related
  • Advanced web application attacks
  • DNS X-Ray
  • DNS cache poisoning
  • Home
  • Predictable Javascript Math.Random and HTTP multipart boundary string
  • Public appearances
  • Recent (non-Academic) Research
  • Standards, community, etc.
  • Usenix 2019 *extended* paper
  • Web application security - the early days
  • Web-based virtual machine detection
  • XML and SOAP attacks

You are here

Home

Blog

  • BlackHat and DefCon 2017
  • Black Hat USA 2016
  • Perfect exflitration slides
  • HTTP Response Splitting in Node.js
  • Web-based VM detection with HTML5
  • (NIH) WebRTC exposes internal IP addresses

Recent (non-Academic) Research

Submitted by amit on Thu, 12/01/2017 - 09:58

Research published in 2016-today

"HTTP Request Smuggling in 2020 - New Variants, New Defenses and New Challenges", presented at BlackHat USA 2020 (slides, source code - attacks, source code - RSFW)

"Process Injection Techniques - Gotta Catch Them All" (co-authored with Itzik Kotler, presented at BlackHat USA 2019, DefCon 27 USA 2019) (slides, source code)

"The Adventures of AV and the Leaky Sandbox" (co-authored with Itzik Kotler, presented at BlackHat USA 2017, DefCon 25 USA 2017) (slides, source code)

"Crippling HTTPS with unholy PAC" (co-authored with Itzik Kotler, presented at BlackHat USA 2016) (slides, source code)

"In plain site: the perfect exfiltration" (co-authored with Itzik Kotler, presented in Hack-in-the-Box Amsterdam, May 2016)

 

Tags:

  • research

Advisories

  • HTTP Response Splitting in Node.js
  • Web-based VM detection with HTML5 Performance Object
  • Safari PASV vulnerability
  • The "localhosed" attack - stealing IE local cookies
  • Filezilla FTP server advisory