Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a groundbreaking cybersecurity conference talk that introduces Recursive Request Exploits (RRE), a novel attack methodology targeting modern web applications. Learn how interdependent web requests can be weaponized to systematically bypass authentication, authorization, and payment controls across digital platforms. Discover the automated techniques for recursive request discovery and mapping hidden relationships between API and web calls to exploit overlooked logic flaws in application security. Examine a compelling real-world case study demonstrating how RRE was successfully used to bypass premium paywalls on a major streaming platform without requiring authentication or compromising DRM systems. Understand how this technique exposes fundamental vulnerabilities in checkout logic enforcement across e-commerce and digital subscription services, revealing how attackers can chain requests in unintended ways to exploit blind spots in authentication, entitlement, and payment flows. Gain insights into how security through obscurity has evolved into an active attack surface that security professionals must address. Access practical tools through the released Burp Suite extension that automates RRE discovery and exploitation, providing both offensive and defensive capabilities for cybersecurity practitioners working to identify and mitigate these emerging threats in web application security.