Skills Assessment
Scenario
Company: SentinelFrame Solutions
Setup:
WAF deployed to block malicious requests
Admin panel moved from
/adminto concealed pathContact form for reaching system administrator
Email testing account:
attacker@evil.htb(accessible at/mail)
Objective: Combine multiple HTTP attack techniques to bypass security controls and obtain sensitive information.
Attack Chain Overview
1. SMTP Header Injection β Discover hidden admin path
2. TE.CL via TE.TE β Bypass WAF blocking CRLF
3. Request Smuggling β Access hidden admin panelPhase 1: Reconnaissance
Contact Form Discovery
Navigate to website root
Click Contact button
Observe form fields: name, email, message
Initial Request
Phase 2: SMTP Header Injection (Blocked)
First Attempt
Try injecting CRLF to add Cc: header:
Result
WAF blocks requests containing CRLF characters (%0d%0a).
Phase 3: Bypass WAF via TE.CL (TE.TE Substring)
Vulnerability Type
TE.CL via TE.TE using Substring match technique.
The WAF/proxy accepts Transfer-Encoding: asdchunked (substring contains "chunked").
Crafting the Payload
Request 1 (Smuggling + SMTP Injection):
Key Points
Transfer-Encoding: asdchunked
Substring bypass (TE.TE)
Content-Length: 4
For TE.CL (proxy uses TE, backend uses CL)
f3 (hex)
Chunk size = 243 bytes
Cc: attacker@evil.htb
SMTP header injection
DoesNotExist: True
Absorbs appended data
0
Empty chunk terminator
Chunk Size Calculation
Count bytes from POST /contact... until before 0:
Total: 243 bytes = 0xf3
Burp Configuration
Uncheck "Update Content-Length"
Send request
Phase 4: Check Email
Navigate to Inbox
Expected Email
From admin, revealing:
Hidden admin panel path:
/ksu3nsj9cWAF blocks external access to admin
Phase 5: Access Hidden Admin Panel
Challenge
WAF blocks direct access to /ksu3nsj9c.
Solution
Use same TE.CL technique to smuggle request to admin panel.
Exploit Requests
Request 1 (Smuggling):
Request 2 (Trigger):
Chunk Size
Burp Configuration
Uncheck "Update Content-Length" for Request 1
Create Tab Group with both requests
Set Send group in sequence (single connection)
Send
Expected Results
Request 1 (GET /404)
404 Not Found
Request 2 (GET /404)
Admin panel content!
Request 2 receives the response to the smuggled /ksu3nsj9c request.
Attack Summary
Techniques Combined
SMTP Header Injection
CRLF Injection
TE.TE Substring Match
HTTP Request Smuggling
TE.CL Request Smuggling
HTTP Request Smuggling
WAF Bypass
Request Smuggling Exploitation
Key Takeaways
Chain vulnerabilities - Single vuln might not work, combine them
WAF bypass via smuggling - Hide payloads in request body
TE.TE enables TE.CL - Obfuscation creates exploitable scenario
Email as data channel - Use available functionality for recon
Tab groups essential - Single connection required for smuggling
References
Last updated