Platform
Continuous vulnerability management
Attack surface monitoring
effortless reporting & compliance
Intelligent results
pricing
what we do
external vulnerability scanning
internal vulnerability scanning
cloud vulnerability scanning
Web Application Vulnerability Scanning
continuous penetration testing
penetration testing
RESOURCES
Developer hub
Help centre
BLOG
Guides
Success stories
Research
Company
About us
Contact
Careers
Login
login
try for free
platform
continuous vulnerability management
attack surface monitoring
effortless reporting & compliance
intelligent Results
what we do
external vulnerability scanning
internal vulnerability scanning
Cloud Vulnerability Scanning
Web Application Vulnerability scanning
continuous penetration testing
penetration testing
pricing
RESOURCES
developers hub
help centre
blog
Guides
Success stories
research
company
about us
contact
Careers
login
try for free
Login
login
try for free
Cyber Security Research
Read the latest security research from the white hat hacking team at Intruder
All
Vulnerability Scanning
Latest
Practical HTTP Header Smuggling: Sneaking Past Reverse Proxies to Attack AWS and Beyond
Modern web applications typically rely on chains of multiple servers, which forward HTTP requests to one another. The attack surface created by this forwarding is increasingly receiving more attention, including the recent popularisation of cache poisoning...
November 10, 2021
Daniel Thatcher
Sign up for the Intruder Monthly Newsletter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
No items found.
No items found.
Sign up for the Intruder Monthly Newsletter
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
No items found.
Ready to get started with your 30-day trial?
try for free