HTTP/2 low level library based on Scapy which can be used for Single Packet Attack (Race Condition on H2)
I wrote an article and published it at InfoSec Write-ups:
- Single Packet Attack - POST
- implement
- Single Packet Attack - GET
- Content-Length: 1 Method
- POST Request with x-override-method: GET header
- Response Parsing
- implement
- implement threaded response parser
- add response times in nano seconds for timing attacks
- Body Decompression
- gzip
- br
- deflate
- Proxy
- Socks5 Proxy
Some following statements are just ideas and not tested or implemented.
- More Request in a Single Packet
- Increase MSS (Idea by James Kettle)
- Out of Order TCP Packets (Idea by James Kettle)
- IP Fragmentation
- Proxy the Single Packet Request through SOCKS
- Single Packet Attack on GET Requests
- Content-Length: 1 Method (Idea by James Kettle)
- x-override-method: GET Method (Idea by James Kettle)
- Index HPACK Headers to Make GET Requests Smaller
- HEADERS Frame without END_HEADER Flag
- HEADERS Frame Without Some Pseudo Headers
H2SpaceX works with Python 3 (preferred: >=3.10)
pip install h2spacex
if you get errors of scapy:
pip install --upgrade scapy
You can import the HTTP/2 TLS Connection and set up the connection. After setting up the connection, you can do other things:
from h2spacex import H2OnTlsConnection
h2_conn = H2OnTlsConnection(
hostname='http2.github.io',
port_number=443
)
h2_conn.setup_connection()
...
see more examples in Wiki Page
See examples which contain some Portswigger race condition examples.
James Kettle introduced an improved version of Single Packet Attack in Black Hat 2024 for timing attacks:
You can implement this method easily using send_ping_frame()
method.
See this Wiki and Parse Response (Threaded) + Response Times for Timing Attacks
part:
Improved Version of SPA Sample Exploit
I also got some ideas from a previous developed library h2tinker.
Finally, thanks again to James Kettle for directly helping and pointing some other techniques.