TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

PortSwigger Blog

How to join the desync endgame: Practical tips from pentester Tom Stacey

2025-09-18 · Read original ↗

ATT&CK techniques detected

6 predictions
T1190Exploit Public-Facing Application
92%
"paper have really only just begun. http / 1. 1 must die serves not only as a demonstration to the industry that http request smuggling is still a prevalent and critical issue, but first and foremost, as a call to arms for all of us to join the desync endgame. whether you ' re new…"
T1071.001Web Protocols
79%
"newby who ' s just been stung by a pipelining false positive, or someone who simply wants to help prevent a series of inevitable black hat talks titled " i told you so ", join the desync endgame now and help us kill http / 1. 1."
T1190Exploit Public-Facing Application
77%
"labs using http hacker which will help you visualize the entire http stream. at this point, you have everything you need to exploit known desync vulnerabilities. however, if you want to find wide - spread desync issues your absolute best bet is to get as up to date as you can on …"
T1588.006Vulnerabilities
71%
"how to join the desync endgame : practical tips from pentester tom stacey research academy my account customers about blog careers legal contact resellers attack surface visibility improve security posture, prioritize manual testing, free up time. ci - driven scanning more proact…"
T1190Exploit Public-Facing Application
67%
"to jump on the latest research as fast as possible. that is, if you want to secure the largest bounties. for newer testers and hunters, this might seem a little daunting, and for good reason. http request smuggling has been around for so long now, that understanding the topic in …"
T1190Exploit Public-Facing Application
63%
"visit the support center note : this is a guest post by pentester and researcher, tom stacey ( @ t0xodile ). you ' d think that after almost 21 years since its initial public discovery, http request smuggling would be barely exploitable on even the most outdated backend servers a…"

Summary

Note: This is a guest post by pentester and researcher, Tom Stacey (@t0xodile). You'd think that after almost 21 years since its initial public discovery, HTTP Request Smuggling would be barely exploi