Tag

Attack

0 views collected around this technical thread.

System Architect Go
System Architect Go
Mar 3, 2021 · Information Security

HTTP Request Smuggling

This article explains what HTTP request smuggling is, how the vulnerability arises from conflicting Content‑Length and Transfer‑Encoding headers, describes common CL.TE, TE.CL and TE.TE attack patterns, and outlines detection techniques and defensive measures for modern web infrastructures.

AttackDefenseHTTP
0 likes · 29 min read
HTTP Request Smuggling
360 Smart Cloud
360 Smart Cloud
Nov 21, 2019 · Blockchain

Ethereum RPC Attack Methods and Defense Recommendations

This article outlines multiple Ethereum RPC attack techniques—including unlock‑account hijacking, miner‑address manipulation, brute‑force, offline, and zero‑fee attacks—provides detailed attack flow diagrams, code‑path references, recent honeypot statistics, and practical defense measures to secure RPC endpoints.

AttackDefenseEthereum
0 likes · 8 min read
Ethereum RPC Attack Methods and Defense Recommendations