除錯
HTTP Request Smuggling and Desync Attacks
HTTP request smuggling and desync attacks - CL.TE, TE.CL, TE.TE, H2.CL, H2.TE, and browser-powered client-side desync. Invoke this skill PROACTIVELY whenever: a target sits behind a CDN, reverse proxy, or load balancer (Cloudflare, Akamai, Fastly, CloudFront, nginx, HAProxy, AWS ALB, Azure Front Door), uses HTTP/2 with HTTP/1.1 backend downgrade, shows signs of multi-layer request processing (multiple Server headers, Via header, different error pages for different paths), or you detect unusual Transfer-Encoding or Content-Length handling. Also invoke when you see response splitting, CRLF injection, or cache poisoning opportunities. Covers cache poisoning via desync, credential theft from other users' requests, WAF bypass, and request routing manipulation. Use PROACTIVELY during Phase 4 for ANY web target - most targets have proxy infrastructure even if it's not immediately visible.