HTTP request smuggling remains one of the most dangerous yet frequently overlooked web vulnerabilities today. Despite being a widely known issue since 2019, traditional Dynamic Application Security Testing (DAST) tools barely scratch the surface, leaving critical blind spots in many enterprise environments. Vendors often claim to offer comprehensive desync detection, but what does that really mean?
Most DAST tools depend on pre-canned payloads, targeting simple desync vectors like CL.TE or TE.CL, or worse, merely fingerprinting specific CVEs. These simplistic methods primarily identify common, well-known attack scenarios but utterly fail to detect the more complex or novel desync variations that could still be wide open to exploitation by attackers.
Burp Suite DAST changes this entirely. Developed in close collaboration with James "albinowax" Kettle, the leading expert in request smuggling research, Burp Suite DAST is currently the only enterprise-grade solution capable of comprehensive, scalable HTTP request smuggling detection.
Many enterprise-grade DAST solutions, from open-source scanners to heavyweight AST platforms, claim to offer automated HTTP request smuggling detection. Yet our analysis reveals some common shortcomings:
Some tools simply test a single, request smuggling scenario, look for a timeout or basic error, then stop. This approach is a blunt instrument that simply fails against today's evolving threats.
Burp Suite DAST doesn't rely on simplistic signatures. Instead, it probes deeper into desync primitives—the foundational parsing discrepancies between front-end and back-end servers that enable request smuggling in the first place.
This method:
This revolutionary approach, driven by PortSwigger's groundbreaking research, represents a complete shift in detection strategy. Instead of merely verifying known payloads, Burp Suite DAST automatically analyses parsing discrepancies unique to your infrastructure, identifying the root cause of desync vulnerabilities. This approach enables significantly more reliable detection of dangerous parsing behavior and potential request smuggling vulnerabilities that may have remained undetected in your systems for years.
James Kettle, PortSwigger's Director of Research, introduced HTTP request smuggling to the broader security community in 2019 and continues to redefine the landscape. His latest 2025 Black Hat and DEF CON talks introduced entirely new classes of desync attacks and advanced detection techniques. As Burp Suite DAST aligns directly with this cutting-edge research, its smuggling detection capabilities consistently outpace the industry.
While other tools scramble to catch up, Burp Suite DAST continuously integrates fresh detection logic in parallel with ongoing research developments, enabling you to scan your estate, at any scale, the moment new threats are revealed.
Request smuggling is an insidious threat that easily evades conventional testing. If you're tasked with securing complex web apps, especially those involving layered proxies, cloud edge networks, or mixed HTTP protocols, superficial coverage is not enough. Even tools boasting robust automation features can't match Burp's ability to identify a target's unique HTTP parsing quirks and the resulting weaknesses.
Burp Suite DAST stands alone as the only research-grade, enterprise-ready tool capable of robust, automated request smuggling detection. With Burp, you're equipped not only to find vulnerabilities others miss but to proactively secure your infrastructure against emerging threats.
Burp doesn't just find the vulnerabilities others miss; it's designed to be the first tool that can.
Burp Suite DAST already anticipates future desync threats. As James Kettle unveils new vulnerabilities at Black Hat 2025, Burp Suite DAST is prepared.
Is your current DAST solution?