Researcher: Gareth Heyes
Websites often parse users' email addresses to identify their organisation. Unfortunately, parsing emails is far from straightforward thanks to a collection of ancient RFCs that everyone knows are crazy. You can probably see where this is going...
In this session, I'll introduce techniques for crafting RFC-compliant email addresses that bypass virtually all defences leading to broken assumptions, parser discrepancies and emails being routed to wildly unexpected destinations. I'll show you how to exploit multiple applications and libraries to spoof email domains, access internal systems protected by 'Zero Trust', and bypass employee-only registration barriers.
Then I'll introduce another class of attack - harmless-looking input transformed into malicious payloads by unwitting libraries, leading to yet more misrouted emails, and blind CSS injection on a well-known target.
I'll leave you with a full methodology and toolkit to identify and exploit your own targets, plus a CTF to develop your new skillset.
Researcher: James Kettle
Some people think the days of critical HTTP request smuggling attacks on hardened targets have passed. Unfortunately, this is an illusion propped up by wafer-thin mitigations that collapse as soon as you apply a little creativity. As long as HTTP/1.1 lives upstream, desync attacks will thrive.
In this session, I'll introduce multiple new classes of desync attack, enabling mass compromise of user credentials across hundreds of targets, including tech giants, SaaS providers, US government systems, and almost every company using a certain CDN. Every technique has been honed for maximum impact with minimum effort, with an unplanned collaboration yielding over $200,000 in bug bounties in two weeks.
I'll also share the research methodology and open-source toolkit that made this possible, replacing outdated, canned-exploit probes with focused analysis that reveals each target's unique weak spots. This strategy creates an avalanche of desync research leads, yielding results ranging from entire new attack classes, down to exotic implementation flaws that bleed server memory into attackers' welcoming arms. You'll witness attacks meticulously crafted from theoretical foundations alongside accidental exploits with a root cause so incomprehensible, the developers ended up even more confused than me.
You'll leave this talk equipped with everything you need to join me in the desync research endgame: the mission to kill HTTP/1.
Researcher: Martin Doyhenard
Conferences: Black Hat USA Arsenal, 06 Aug 2025
Researcher: Zakhar Fedotkin
Conferences: Black Hat USA Arsenal, 06 Aug 2025
Researcher: Gareth Heyes
Conferences: Steelcon, 12 Jul 2025
Researcher: Zakhar Fedotkin
Conferences: Steelcon, 12 Jul 2025
Researcher: Gareth Heyes
Conferences: PortSwigger Discord, 07 Nov 2024
Researcher: Gareth Heyes
Conferences: DEF CON 32, 11 Aug 2024 | Black Hat USA 2024, 07 Aug 2024
Researcher: James Kettle
Conferences: DEF CON 32, 09 Aug 2024 | Black Hat USA 2024, 07 Aug 2024
Researcher: Martin Doyhenard
Conferences: DEF CON 32, 09 Aug 2024 | Black Hat USA 2024, 07 Aug 2024
Researcher: James Kettle
Conferences: Nullcon Goa 2023, 23 Sept 2023 | DEF CON 31, 12 Aug 2023 | Black Hat USA 2023, 09 Aug 2023
Researcher: Gareth Heyes
Conferences: Nullcon Berlin 2023, 09 Mar 2023 | OWASP 2023 Global AppSec Dublin, 15 Feb 2023
Researcher: James Kettle
Conferences: DEF CON 30, 12 Aug 2022 | Black Hat USA 2022, 10 Aug 2022
Researcher: James Kettle
Conferences: Nullcon Berlin, 08 Apr 2022
Researcher: James Kettle
Conferences: Black Hat Europe, 10 Nov 2021 | DEF CON 29, 06 Aug 2021 | Black Hat USA, 05 Aug 2021
Researcher: James Kettle
Conferences: Black Hat Europe 2020, 10 Dec 2020
Researcher: Gareth Heyes
Conferences: Black Hat Europe 2020, 10 Dec 2020
Researcher: James Kettle
Conferences: Black Hat USA 2020, 05 Aug 2020
Researcher: Gareth Heyes
Conferences: Global AppSec Allstars, 26 Sept 2019
Researcher: James Kettle
Conferences: Black Hat USA 2019, 07 Aug 2019
Researcher: James Kettle
Conferences: LevelUp 0x03, 25 Jan 2019
Researcher: James Kettle
Conferences: Black Hat USA 2018, 09 Aug 2018
Researcher: Gareth Heyes
Conferences: AppSec Europe, 06 Jul 2018
Researcher: Gareth Heyes
Conferences: BSides Manchester, 17 Nov 2017
Researcher: James Kettle
Conferences: Black Hat USA 2017, 27 Jul 2017
Researcher: James Kettle
Conferences: OWASP AppSec EU 2017, 12 May 2017
Researcher: James Kettle
Conferences: Black Hat Europe 2016, 05 Dec 2016
Researcher: Gareth Heyes
Conferences: OWASP London , 24 Nov 2016
Researcher: James Kettle
Conferences: 44Con 2015, 15 Sept 2015
Researcher: James Kettle
Conferences: Black Hat USA 2015, 05 Aug 2015