Tagged articles
24 articles
Page 1 of 1
Architecture Digest
Architecture Digest
Sep 18, 2025 · Information Security

How to Harden Login APIs: From Brute‑Force to MITM Protection

This article examines common login security risks such as brute‑force attacks, captcha bypass, IP blocking, and man‑in‑the‑middle threats, and proposes layered defenses including password‑retry limits, captcha, phone verification, HTTPS, and encrypted payloads to significantly raise the attack cost.

Brute-force protectionCaptchaHTTPS
0 likes · 10 min read
How to Harden Login APIs: From Brute‑Force to MITM Protection
大转转FE
大转转FE
Aug 5, 2025 · Information Security

Why SSL/TLS Certificates Are Shrinking to 47 Days and How HTTPS Secures Your Data

With SSL/TLS certificates now limited to 13 months and soon to just 47 days, this article explains why encryption is essential, details symmetric and asymmetric cryptography, illustrates HTTPS handshake and certificate verification, and shows how these mechanisms protect against man‑in‑the‑middle attacks.

CertificateHTTPSMITM
0 likes · 22 min read
Why SSL/TLS Certificates Are Shrinking to 47 Days and How HTTPS Secures Your Data
vivo Internet Technology
vivo Internet Technology
May 7, 2025 · Information Security

FunProxy: A Rust‑Based Cross‑Platform Full‑Link Testing and Proxy Tool

FunProxy is a Rust‑based, Tauri‑powered cross‑platform tool that provides high‑performance packet capture, cloud‑managed hosts and rules, collaborative sharing, and extensible plugins for full‑link testing and proxying across Windows, macOS, Linux, Android, iOS and web, delivering secure, low‑memory, fast startup testing.

MITMProxyRust
0 likes · 18 min read
FunProxy: A Rust‑Based Cross‑Platform Full‑Link Testing and Proxy Tool
Java Tech Enthusiast
Java Tech Enthusiast
Apr 27, 2025 · Frontend Development

Common Front-End Security Attacks, Principles, and Mitigations

The article outlines prevalent front‑end security threats such as XSS, SQL injection, CSRF, MITM, clickjacking, misconfiguration, and vulnerable dependencies, explains their underlying principles, and recommends practical mitigations including input validation, CSP, HTTPS/TLS, CSRF tokens, secure headers, regular audits, and dependency scanning.

CSRFMITMSQL injection
0 likes · 8 min read
Common Front-End Security Attacks, Principles, and Mitigations
Liangxu Linux
Liangxu Linux
Mar 10, 2024 · Information Security

How to Secure Your Login API Against Brute‑Force, MITM, and Other Attacks

This article explains common login security risks such as brute‑force cracking, CAPTCHA bypass, IP‑based blocking, man‑in‑the‑middle attacks, and shows practical countermeasures like captcha enforcement, login throttling, phone verification, HTTPS adoption, and data encryption.

CaptchaHTTPSMITM
0 likes · 10 min read
How to Secure Your Login API Against Brute‑Force, MITM, and Other Attacks
Java Architect Essentials
Java Architect Essentials
Mar 3, 2024 · Information Security

How to Secure Login APIs: Defending Against Brute Force, MITM, and More

This article examines common login vulnerabilities such as brute‑force attacks, CAPTCHA bypass, IP‑based lockouts, and man‑in‑the‑middle threats, and provides practical mitigation techniques—including password‑retry limits, CAPTCHA, SMS verification, HTTPS enforcement, and logging—to harden web authentication systems.

CaptchaHTTPSIP blocking
0 likes · 11 min read
How to Secure Login APIs: Defending Against Brute Force, MITM, and More
Top Architect
Top Architect
Sep 17, 2021 · Information Security

Security Considerations for Designing Login Interfaces

Designing a login interface requires not only functional implementation but also comprehensive security measures such as protecting against brute‑force attacks, implementing captchas, login throttling, IP restrictions, mobile verification, and mitigating man‑in‑the‑middle threats, while balancing usability and system robustness.

CaptchaHTTPSIP restriction
0 likes · 10 min read
Security Considerations for Designing Login Interfaces
Ops Development Stories
Ops Development Stories
Aug 18, 2021 · Information Security

How to Extract IPs from PCAP and Perform Common Network Attacks with Scapy

This guide demonstrates how to use Python's Scapy library to extract IP addresses from PCAP files, sniff usernames and passwords from mail traffic, discover live hosts via SYN packets, launch MAC address table flooding attacks, and conduct ARP spoofing for man‑in‑the‑middle attacks, providing complete code examples.

ARP spoofingMAC FloodMITM
0 likes · 7 min read
How to Extract IPs from PCAP and Perform Common Network Attacks with Scapy
Programmer DD
Programmer DD
May 9, 2021 · Information Security

How to Secure Login APIs: Defending Against Brute‑Force, MITM, and More

This article explains practical security measures for login interfaces, covering brute‑force attacks, captcha integration, IP throttling, mobile verification, man‑in‑the‑middle protection with HTTPS, and additional best‑practice recommendations to harden web back‑end authentication.

Brute-force protectionCaptchaHTTPS
0 likes · 10 min read
How to Secure Login APIs: Defending Against Brute‑Force, MITM, and More
Liangxu Linux
Liangxu Linux
May 5, 2021 · Information Security

Mastering Common TCP/IP Attacks: From IP Spoofing to DDoS and MITM

This guide reviews the most frequent TCP/IP attacks—including IP spoofing, SYN flooding, UDP flooding, TCP reset hijacking, man‑in‑the‑middle, and DDoS—explains their underlying protocols, demonstrates practical exploitation with Python/Scapy and Netcat, and outlines mitigation techniques and cryptographic fundamentals.

DDoSMITMPython
0 likes · 27 min read
Mastering Common TCP/IP Attacks: From IP Spoofing to DDoS and MITM
Java Captain
Java Captain
May 4, 2021 · Information Security

Security Risks and Mitigation Strategies for Login Interfaces

This article examines common security threats to login APIs such as brute‑force attacks, CAPTCHA bypass, IP blocking, and man‑in‑the‑middle attacks, and presents practical mitigation techniques including rate limiting, captcha, phone verification, HTTPS, and encrypted transmission to harden authentication systems.

CaptchaHTTPSIP blocking
0 likes · 10 min read
Security Risks and Mitigation Strategies for Login Interfaces
Top Architect
Top Architect
Apr 4, 2021 · Information Security

Understanding HTTP Vulnerabilities and How HTTPS Secures Communication

This article explains the inherent insecurity of plain HTTP, illustrates man‑in‑the‑middle attacks, shows why simple symmetric encryption is insufficient, and details how HTTPS (SSL/TLS) with asymmetric key exchange and CA verification protects data transmission.

CAHTTPHTTPS
0 likes · 10 min read
Understanding HTTP Vulnerabilities and How HTTPS Secures Communication
ITPUB
ITPUB
Jan 20, 2021 · Information Security

Is HTTPS Really Private? Uncovering Corporate Monitoring and MITM Risks

The article explains how HTTPS works, why it is considered secure, reveals its limitations such as exposed domain names via SNI, describes man‑in‑the‑middle attacks, SSL pinning, and the various ways companies can monitor employee web traffic even when using encrypted connections.

Corporate MonitoringHTTPSMITM
0 likes · 11 min read
Is HTTPS Really Private? Uncovering Corporate Monitoring and MITM Risks
ITPUB
ITPUB
Aug 16, 2016 · Information Security

Real PGP Short‑ID Collisions Expose Fake Keys and MITM Risks – Use Full Fingerprints

Since June, genuine PGP short‑ID collision attacks have surfaced, allowing attackers to create fake keys that exactly copy the name, email, and trust signatures of real keys, enabling man‑in‑the‑middle exploits, and experts now urge displaying full fingerprints to eliminate the threat.

MITMPGPcollision attack
0 likes · 4 min read
Real PGP Short‑ID Collisions Expose Fake Keys and MITM Risks – Use Full Fingerprints
Art of Distributed System Architecture Design
Art of Distributed System Architecture Design
May 21, 2015 · Information Security

Understanding DDoS Attacks via Malicious JavaScript and Mitigation with HTTPS and Subresource Integrity

The article explains how malicious JavaScript can turn browsers into participants of DDoS attacks through techniques like server hijacking and man‑in‑the‑middle injection, and describes how HTTPS and the emerging Subresource Integrity feature can help protect websites from such threats.

DDoSHTTPSJavaScript
0 likes · 6 min read
Understanding DDoS Attacks via Malicious JavaScript and Mitigation with HTTPS and Subresource Integrity