PortSwiggerRes Profile Banner
PortSwigger Research Profile
PortSwigger Research

@PortSwiggerRes

Followers
113K
Following
66
Media
75
Statuses
1K

Web security research from the team at @PortSwigger

Joined September 2019
Don't wanna be here? Send us removal request.
@albinowax
James Kettle
15 days
HTTP is supposed to be stateless, but sometimes... it isn't! Some servers create invisible vulnerabilities by only validating the first request on each TCP/TLS connection. I've just published a Custom Action to help you detect & exploit this - here's a narrated demo:
23
184
1K
@zakfedotkin
d4d
28 days
I’m excited to announce that I’ll be presenting The Fragile Lock: Novel Bypasses for SAML Authentication at Black Hat Europe! In this talk, I’ll show how I was able to continuously bypass security patches to achieve complete auth bypass for major libraries. #BHEU @BlackHatEvents
5
17
143
@albinowax
James Kettle
1 month
Hackers are becoming builders - by integrating AI enhancements they’re amplifying their unique tradecraft to hack deeper, faster. I'll be sharing my vision of the future of hacking in @Hacker0x01's 'Bionic Hacking' webinar on October 15! Register here:
4
27
214
@albinowax
James Kettle
2 months
HTTP/1.1 Must Die is coming to #romhack2025 as the keynote! In-person tickets are sold out but you can still watch the livestream. This is your last chance to catch it live - register to watch here: https://t.co/j5vmX9dVnE
4
15
90
@compasssecurity
Compass Security
2 months
We use James Kettle’s (@albinowax) Burp extension Collaborator Everywhere daily. Now our upgrades are in v2: customizable payloads, storage, visibility. Perfect for OOB bugs like SSRF. Find out more here: https://t.co/HhGUYrJNvQ #AppSec #BurpSuite #Pentesting
2
28
143
@zakfedotkin
d4d
2 months
We've just published a novel technique to bypass the __Host and __Secure cookie flags, to achieve maximum impact for your cookie injection findings:
Tweet card summary image
portswigger.net
Browsers added cookie prefixes to protect your sessions and stop attackers from setting harmful cookies. In this post, you’ll see how to bypass cookie defenses using discrepancies in browser and serve
3
70
213
@albinowax
James Kettle
3 months
I just published a Repeater feature to make it easier to explore request smuggling. It repeats your request until the status code changes. It's called "Retry until success" and you can install it via the Extensibility helper bapp.
5
49
385
@albinowax
James Kettle
3 months
Ever seen two responses to one request? That's just pipelining... or is it? I've just published "Beware the false false-positive: how to distinguish HTTP pipelining from request smuggling" 👇
3
36
235
@albinowax
James Kettle
3 months
Watch HTTP/1.1 Must Die live today at 1630 PST! - In person at #defcon33 track 1, main stage - Remote livestream free on YouTube (link below) Enjoy!
7
20
226
@PortSwiggerRes
PortSwigger Research
3 months
🚨 New @WebSecAcademy lab: https://t.co/Am8qEYVI5K request smuggling Based on HTTP/1 Must Die, presented at #BHUSA Solve it, write it up, and you could: ✅ Get featured on the PortSwigger blog 🎁 Win a 1-year Burp Suite Pro license 🧢 Score some swag https://t.co/FD5QVZKecn
4
9
66
@albinowax
James Kettle
3 months
The whitepaper is live! Learn how to win the HTTP desync endgame... and why HTTP/1.1 needs to die:
Tweet card summary image
http1mustdie.com
Upstream HTTP/1.1 is inherently insecure, and routinely exposes millions of websites to hostile takeover. Join the mission to kill HTTP/1.1 now
19
246
749
@NahamSec
Ben Sadeghipour
3 months
HTTP Request Smuggling Explained (with @albinowax) 🎥👉🏼 https://t.co/tCvlLoupgz
5
90
572
@ryancbarnett
Ryan Barnett (B0N3)
3 months
I was testing out the Activescan++ suspect transform updates prepping for our upcoming @BlackHatEvents talk. Worked like a charm. Then I used the new "Explore" issue AI functionality. It took the issue data based on the behavior and identified a full-width XSS bypass. #impressed
@Burp_Suite
Burp Suite
5 months
Five major AI capabilities arrived in Burp Suite Professional: ✨Explore Issue ✨Explainer ✨AI-generated recorded logins ✨False positive reduction ✨AI-powered extensibility Each one helps you tackle complex tasks faster and smarter 👉
2
5
39
@albinowax
James Kettle
3 months
Ever seen a header injection where achieving a desync seemed impossible? I think I've finally identified the cause - nginx doesn't reuse upstream connections by default, and often has header injection. This means you're left with a blind request tunneling vulnerability 👇
3
46
385
@albinowax
James Kettle
3 months
Want to make the most of the upcoming "HTTP/1.1 Must Die" research drop? We've just updated the countdown page with links to essential pre-read/watch resources. Enjoy!
@albinowax
James Kettle
4 months
It's easy to bash vulnerabilities with logos but... I couldn't resist, say hello to https://t.co/nrJtM5dDp3 :)
0
10
95
@garethheyes
Gareth Heyes \u2028
4 months
Manual testing doesn't have to be repetitive. Meet Repeater Strike - an AI-powered Burp Suite extension that turns your Repeater traffic into a scan check.
2
8
66
@albinowax
James Kettle
4 months
We've just released a massive update to Collaborator Everywhere! This is a complete rewrite by @compasssecurity which adds loads of features including in-tool payload customization. Massive thanks to Compass for this epic project takeover. Check out the new features:
0
13
114
@albinowax
James Kettle
4 months
When HTTP/1.1 Must Die lands at DEFCON we’ll publish a @WebSecAcademy lab with a new class of desync attack. One week later, I’ll livestream the solution on air with @offby1security! You’re invited :) https://t.co/BPt0h0YiN2
7
65
304