Tag

defense

1 views collected around this technical thread.

Java Tech Enthusiast
Java Tech Enthusiast
Sep 1, 2024 · Information Security

XSS Defense in Spring Boot Applications

The article explains how to protect Spring Boot applications from XSS attacks by using custom annotations such as @XSS with an XssValidator and by implementing a request‑filter chain—including XssFilter and XssWrapper—to sanitize input, demonstrating through tests that both approaches reliably secure user data.

JavaSpring BootWeb Application
0 likes · 14 min read
XSS Defense in Spring Boot Applications
System Architect Go
System Architect Go
Mar 3, 2021 · Information Security

HTTP Request Smuggling

This article explains what HTTP request smuggling is, how the vulnerability arises from conflicting Content‑Length and Transfer‑Encoding headers, describes common CL.TE, TE.CL and TE.TE attack patterns, and outlines detection techniques and defensive measures for modern web infrastructures.

AttackHTTPRequest Smuggling
0 likes · 29 min read
HTTP Request Smuggling
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Oct 12, 2020 · Information Security

Comprehensive Summary of XSS (Cross‑Site Scripting) Attacks and Defenses

This article provides a comprehensive overview of Cross‑Site Scripting (XSS), explaining its definition, dangers, underlying mechanisms, classification into stored, reflected, and DOM‑based types, common injection vectors, and practical defense strategies, while also addressing common questions and resources for further learning.

Web SecurityXSScross-site scripting
0 likes · 11 min read
Comprehensive Summary of XSS (Cross‑Site Scripting) Attacks and Defenses
360 Smart Cloud
360 Smart Cloud
Nov 21, 2019 · Blockchain

Ethereum RPC Attack Methods and Defense Recommendations

This article outlines multiple Ethereum RPC attack techniques—including unlock‑account hijacking, miner‑address manipulation, brute‑force, offline, and zero‑fee attacks—provides detailed attack flow diagrams, code‑path references, recent honeypot statistics, and practical defense measures to secure RPC endpoints.

AttackEthereumRPC
0 likes · 8 min read
Ethereum RPC Attack Methods and Defense Recommendations
Tencent IMWeb Frontend Team
Tencent IMWeb Frontend Team
Apr 9, 2017 · Information Security

Why Front‑End and Back‑End Security Must Work Together

The article reexamines web security as a holistic system, explaining attack goals, targets, and methods across browsers, transport channels, and servers, and shows how coordinated front‑end and back‑end defenses such as encryption, signing, and input validation are essential to protect the whole web stack.

Web Securityattack vectorsbackend
0 likes · 13 min read
Why Front‑End and Back‑End Security Must Work Together