Python, Prompt Engineering, Data Science — Build the Skills Employers Want Now
You’re only 3 weeks away from a new language
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore a groundbreaking cybersecurity conference talk that introduces Recursive Request Exploits (RRE), a novel attack methodology targeting modern web applications. Learn how interdependent web requests can be weaponized to systematically bypass authentication, authorization, and payment controls across digital platforms. Discover the automated techniques for recursive request discovery and mapping hidden relationships between API and web calls to exploit overlooked logic flaws in application security. Examine a compelling real-world case study demonstrating how RRE was successfully used to bypass premium paywalls on a major streaming platform without requiring authentication or compromising DRM systems. Understand how this technique exposes fundamental vulnerabilities in checkout logic enforcement across e-commerce and digital subscription services, revealing how attackers can chain requests in unintended ways to exploit blind spots in authentication, entitlement, and payment flows. Gain insights into how security through obscurity has evolved into an active attack surface that security professionals must address. Access practical tools through the released Burp Suite extension that automates RRE discovery and exploitation, providing both offensive and defensive capabilities for cybersecurity practitioners working to identify and mitigate these emerging threats in web application security.
Syllabus
DEF CON 33 - Paywall Optional: Stream for Free w/ New Technique, RRE - Farzan Karim
Taught by
DEFCONConference
Reviews
5.0 rating, based on 1 Class Central review
Showing Class Central Sort
-
Mind blowing! The technique targets logic flaws which is an often missed area with automation. Highly recommend it for web application engineers and penetration testers.