Tag

MITM

1 views collected around this technical thread.

vivo Internet Technology
vivo Internet Technology
May 7, 2025 · Information Security

FunProxy: A Rust‑Based Cross‑Platform Full‑Link Testing and Proxy Tool

FunProxy is a Rust‑based, Tauri‑powered cross‑platform tool that provides high‑performance packet capture, cloud‑managed hosts and rules, collaborative sharing, and extensible plugins for full‑link testing and proxying across Windows, macOS, Linux, Android, iOS and web, delivering secure, low‑memory, fast startup testing.

MITMProxyRust
0 likes · 18 min read
FunProxy: A Rust‑Based Cross‑Platform Full‑Link Testing and Proxy Tool
Java Tech Enthusiast
Java Tech Enthusiast
Apr 27, 2025 · Frontend Development

Common Front-End Security Attacks, Principles, and Mitigations

The article outlines prevalent front‑end security threats such as XSS, SQL injection, CSRF, MITM, clickjacking, misconfiguration, and vulnerable dependencies, explains their underlying principles, and recommends practical mitigations including input validation, CSP, HTTPS/TLS, CSRF tokens, secure headers, regular audits, and dependency scanning.

CSRFClickjackingMITM
0 likes · 8 min read
Common Front-End Security Attacks, Principles, and Mitigations
Selected Java Interview Questions
Selected Java Interview Questions
Aug 10, 2024 · Information Security

Understanding HTTP, MITM Attacks, and How HTTPS Secures Communication

This article explains the fundamentals of the HTTP protocol, demonstrates how man‑in‑the‑middle attacks exploit its plaintext nature, discusses symmetric and asymmetric encryption attempts to mitigate these risks, and describes how HTTPS (TLS) and the CA trust model provide robust protection against such attacks.

HTTPSMITMTLS
0 likes · 9 min read
Understanding HTTP, MITM Attacks, and How HTTPS Secures Communication
Java Architect Essentials
Java Architect Essentials
Jun 27, 2024 · Information Security

Understanding HTTP, Its Vulnerabilities, and How HTTPS Secures Communication

This article explains the fundamentals of the HTTP protocol, illustrates its susceptibility to man‑in‑the‑middle attacks, discusses symmetric and asymmetric encryption attempts, and then details how HTTPS (TLS) and the CA trust model protect data transmission from interception and tampering.

CAHTTPSMITM
0 likes · 9 min read
Understanding HTTP, Its Vulnerabilities, and How HTTPS Secures Communication
Top Architect
Top Architect
Sep 17, 2021 · Information Security

Security Considerations for Designing Login Interfaces

Designing a login interface requires not only functional implementation but also comprehensive security measures such as protecting against brute‑force attacks, implementing captchas, login throttling, IP restrictions, mobile verification, and mitigating man‑in‑the‑middle threats, while balancing usability and system robustness.

Brute ForceHTTPSIP restriction
0 likes · 10 min read
Security Considerations for Designing Login Interfaces
Java Captain
Java Captain
May 4, 2021 · Information Security

Security Risks and Mitigation Strategies for Login Interfaces

This article examines common security threats to login APIs such as brute‑force attacks, CAPTCHA bypass, IP blocking, and man‑in‑the‑middle attacks, and presents practical mitigation techniques including rate limiting, captcha, phone verification, HTTPS, and encrypted transmission to harden authentication systems.

Brute ForceHTTPSIP blocking
0 likes · 10 min read
Security Risks and Mitigation Strategies for Login Interfaces
Top Architect
Top Architect
Apr 4, 2021 · Information Security

Understanding HTTP Vulnerabilities and How HTTPS Secures Communication

This article explains the inherent insecurity of plain HTTP, illustrates man‑in‑the‑middle attacks, shows why simple symmetric encryption is insufficient, and details how HTTPS (SSL/TLS) with asymmetric key exchange and CA verification protects data transmission.

CAHTTPSMITM
0 likes · 10 min read
Understanding HTTP Vulnerabilities and How HTTPS Secures Communication
Architecture Digest
Architecture Digest
Feb 8, 2021 · Information Security

Understanding HTTP, Its Vulnerabilities, and How HTTPS Secures Communication

This article explains the fundamentals of the HTTP protocol, illustrates its susceptibility to man‑in‑the‑middle attacks, discusses mitigation techniques using symmetric and asymmetric encryption, and describes how HTTPS with TLS and a CA certification system protects data integrity and confidentiality.

CAHTTPSMITM
0 likes · 10 min read
Understanding HTTP, Its Vulnerabilities, and How HTTPS Secures Communication
Java Architect Essentials
Java Architect Essentials
Jan 5, 2021 · Information Security

Understanding HTTPS: From HTTP Vulnerabilities to Secure Communication

This article explains why plain HTTP is insecure, illustrates man‑in‑the‑middle attacks, discusses symmetric and asymmetric encryption attempts, and details how HTTPS (SSL/TLS) with CA certificate verification protects data integrity and confidentiality.

HTTPSMITMTLS
0 likes · 9 min read
Understanding HTTPS: From HTTP Vulnerabilities to Secure Communication
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
May 21, 2015 · Information Security

Understanding DDoS Attacks via Malicious JavaScript and Mitigation with HTTPS and Subresource Integrity

The article explains how malicious JavaScript can turn browsers into participants of DDoS attacks through techniques like server hijacking and man‑in‑the‑middle injection, and describes how HTTPS and the emerging Subresource Integrity feature can help protect websites from such threats.

DDoSHTTPSJavaScript
0 likes · 6 min read
Understanding DDoS Attacks via Malicious JavaScript and Mitigation with HTTPS and Subresource Integrity