Published: 27 July 2017 at 00:30 UTC Updated: 09 March 2023 at 09:26 UTC Modern websites are browsed through a lens of transparent systems built to enhance performance, extract analytics and supply numerous additional services. This almost invisible attack surface has been largely overlooked for years. In this paper, I'll show how to use malformed requests and esoteric headers to coax these system