Tag

Defense

0 views collected around this technical thread.

Java Tech Enthusiast
Java Tech Enthusiast
Sep 1, 2024 · Information Security

XSS Defense in Spring Boot Applications

The article explains how to protect Spring Boot applications from XSS attacks by using custom annotations such as @XSS with an XssValidator and by implementing a request‑filter chain—including XssFilter and XssWrapper—to sanitize input, demonstrating through tests that both approaches reliably secure user data.

DefenseJavaSecurity
0 likes · 14 min read
XSS Defense in Spring Boot Applications
System Architect Go
System Architect Go
Mar 3, 2021 · Information Security

HTTP Request Smuggling

This article explains what HTTP request smuggling is, how the vulnerability arises from conflicting Content‑Length and Transfer‑Encoding headers, describes common CL.TE, TE.CL and TE.TE attack patterns, and outlines detection techniques and defensive measures for modern web infrastructures.

AttackDefenseHTTP
0 likes · 29 min read
HTTP Request Smuggling
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Oct 12, 2020 · Information Security

Comprehensive Summary of XSS (Cross‑Site Scripting) Attacks and Defenses

This article provides a comprehensive overview of Cross‑Site Scripting (XSS), explaining its definition, dangers, underlying mechanisms, classification into stored, reflected, and DOM‑based types, common injection vectors, and practical defense strategies, while also addressing common questions and resources for further learning.

Cross-Site ScriptingDefenseInformation Security
0 likes · 11 min read
Comprehensive Summary of XSS (Cross‑Site Scripting) Attacks and Defenses
360 Smart Cloud
360 Smart Cloud
Nov 21, 2019 · Blockchain

Ethereum RPC Attack Methods and Defense Recommendations

This article outlines multiple Ethereum RPC attack techniques—including unlock‑account hijacking, miner‑address manipulation, brute‑force, offline, and zero‑fee attacks—provides detailed attack flow diagrams, code‑path references, recent honeypot statistics, and practical defense measures to secure RPC endpoints.

AttackDefenseEthereum
0 likes · 8 min read
Ethereum RPC Attack Methods and Defense Recommendations