Tag

Traffic Hijacking

1 views collected around this technical thread.

Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Aug 13, 2024 · Frontend Development

Traffic Hijacking and Request Interception Techniques for Unified Authentication Platforms

This article explores the concept of traffic hijacking, compares front‑end and back‑end interception methods, and provides practical proxy‑based implementations for fetch, XMLHttpRequest, and ReadableStream to achieve seamless request and response manipulation in a unified authentication system.

ProxyTraffic Hijackingbackend
0 likes · 16 min read
Traffic Hijacking and Request Interception Techniques for Unified Authentication Platforms
High Availability Architecture
High Availability Architecture
May 4, 2021 · Cloud Native

TSF Mesh: Extending Istio Service Mesh for Non‑Container Environments

This article explains how TSF Mesh adapts Istio‑based service‑mesh capabilities to support both container and virtual‑machine workloads by redesigning application deployment, sidecar injection, traffic hijacking, and service registration/discovery, providing detailed architectural changes and code examples for enterprise‑grade service governance.

KubernetesTSF MeshTraffic Hijacking
0 likes · 15 min read
TSF Mesh: Extending Istio Service Mesh for Non‑Container Environments
Architect
Architect
Jan 15, 2016 · Information Security

Understanding Traffic Hijacking and How HTTPS Prevents It

Traffic hijacking, a form of man‑in‑the‑middle attack that injects unwanted ads or modifies web content, can be mitigated by HTTPS, which uses SSL/TLS for server authentication, encryption, and integrity, and the article explains the attack methods, HTTPS fundamentals, and practical deployment steps including Alibaba Cloud support.

Alibaba CloudCertificateHTTPS
0 likes · 8 min read
Understanding Traffic Hijacking and How HTTPS Prevents It
Baidu Tech Salon
Baidu Tech Salon
Aug 6, 2014 · Information Security

Security Risks of Traditional vs. Fancy Login Boxes: HTTPS, XSS, and Cache Poisoning

While traditional login pages that redirect to HTTPS offer limited protection, modern floating login boxes embedded in insecure HTTP pages expose users to HTTPS‑downgrade attacks, XSS hijacking, and cache‑poisoning that can harvest credentials, making full‑site HTTPS the only reliable defense.

Cache PoisoningHTTPSLogin Forms
0 likes · 12 min read
Security Risks of Traditional vs. Fancy Login Boxes: HTTPS, XSS, and Cache Poisoning
Baidu Tech Salon
Baidu Tech Salon
Apr 15, 2014 · Information Security

Web Traffic Hijacking: Risks, Techniques, and Defenses

Web traffic hijacking exploits the plaintext nature of HTTP to inject malicious scripts, steal cookies and saved passwords, poison caches or offline storage, bypass HTTPS redirects, and even compromise downloads, making unauthenticated browsing, auto‑fill features, and public Wi‑Fi especially dangerous without proper defenses.

Cache PoisoningHTTPSTraffic Hijacking
0 likes · 27 min read
Web Traffic Hijacking: Risks, Techniques, and Defenses