Tag

request interception

1 views collected around this technical thread.

Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Aug 13, 2024 · Frontend Development

Traffic Hijacking and Request Interception Techniques for Unified Authentication Platforms

This article explores the concept of traffic hijacking, compares front‑end and back‑end interception methods, and provides practical proxy‑based implementations for fetch, XMLHttpRequest, and ReadableStream to achieve seamless request and response manipulation in a unified authentication system.

BackendProxyTraffic Hijacking
0 likes · 16 min read
Traffic Hijacking and Request Interception Techniques for Unified Authentication Platforms
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Aug 22, 2022 · Information Security

Master Spring Security: Custom Request Interception & Login Page

This tutorial demonstrates how to configure Spring Security to selectively intercept requests, permit static resources, enforce role‑based access, and replace the default login page with a custom Thymeleaf view, complete with code examples and screenshots.

Spring BootSpring Securitycustom login page
0 likes · 9 min read
Master Spring Security: Custom Request Interception & Login Page
NetEase Cloud Music Tech Team
NetEase Cloud Music Tech Team
Jan 28, 2021 · Mobile Development

iOS WKWebView Request Interception via WKURLSchemeHandler and JavaScript Injection

By combining WKURLSchemeHandler with injected JavaScript that captures request bodies, forwards them via WKScriptMessageHandler, and synchronizes cookies and redirects, this approach overcomes iOS WKWebView’s native limitations, offering a stable, per‑webview interception method superior to NSURLProtocol for offline‑package loading.

JavaScript InjectionMobile DevelopmentWKURLSchemeHandler
0 likes · 18 min read
iOS WKWebView Request Interception via WKURLSchemeHandler and JavaScript Injection