websecurity Questions
2
Solved
Is it necessary to apply the Content-Security-Policy Header to all resources on your domain (images/CSS/JavaScript) or just web pages?
For example, I noticed that https://content-security-policy.co...
Harrisonharrod asked 10/6, 2022 at 15:11
7
Solved
If CORS is properly setup on a server to only allow a certain origins to access the server,
Is this enough to prevent CSRF attacks?
Doyen asked 5/11, 2013 at 16:19
3
Solved
I want to prevent my website from clickJacking attack. In which file and where to set X-Frame-Options for preventing clickJacking attack.
Ambrosane asked 28/5, 2020 at 7:38
5
I've just noticed my console is littered with this warning, appearing for every single linked resource. This includes all referenced CSS files, javascript files, SVG images, and even URLs from ajax...
Budding asked 7/8, 2020 at 8:19
1
The documentation of hashlib.scrypt is a bit short:
hashlib.scrypt(password, *, salt, n, r, p, maxmem=0, dklen=64)
The function provides scrypt password-based key derivation function as defined in...
Farcical asked 17/10, 2020 at 7:0
12
Solved
I'm trying to do a simple test without changing any server-side code involving a cross-domain AJAX call, and I was wondering if it's possible to use --disable-web-security anymore. It seems to not ...
Chromolithograph asked 16/7, 2013 at 14:32
2
Solved
At 3. CSP Policy Delivery it says
The Content-Security-Policy HTTP response header field is the preferred mechanism for delivering a policy
But there are two valid mechanisms, delivery via an ...
Cupulate asked 6/5, 2019 at 14:43
2
Solved
I was just looking through our logs after getting some intermittent 5xx errors on a Heroku hosted site, and in there I discovered many errors that were emanating from localhost and were reque...
Sunnisunnite asked 28/9, 2020 at 20:12
0
I have the following application.
SpringMainApplication.java
@SpringBootApplication
public class SpringMainApplication extends SpringBootServletInitializer {
@Override
protected SpringApplicatio...
Nuzzle asked 13/1, 2021 at 23:12
2
The .net core server code I'm working on is going to be hosted both in cloud infrastructure and on premises.
There are many options to handle secret management (connection strings etc...):
Big clo...
Chavey asked 1/12, 2020 at 14:46
4
Solved
I don't understand why is the token for AJAX requests (XSRF-TOKEN) different from a _token that normal forms use. In addition, it's much longer. Why? And why have 2 tokens at all? Why not just use ...
Footboard asked 29/10, 2020 at 13:38
5
I'm working on a project which generates audio from text(TTS) and provides player with speed/pitch control to users.
My question is related to request security.
The user got widget_id during regist...
Raki asked 2/10, 2020 at 17:16
1
Solved
I am able to sign the SOAP XML using a certificate for the WS-Security signature. But i am unable to verify its signature. On verifying the signature it leads to Exception, Some help will be apprec...
Mindimindless asked 27/8, 2020 at 12:23
2
Solved
If I release an API on the public internet, but it's only meant to be used by my apps, I can make a white list of accepted domains, so other domains can't use it.
But I always wonder, can't hacker...
Hanes asked 11/10, 2019 at 17:22
1
For a software in active development we are using Spring Boot (with Spring Security) and the Keycloak Adapter.
The goal is to:
require valid authentication for all endpoints except those annotat...
Tarshatarshish asked 11/7, 2019 at 9:30
0
Lets say you are designing a new API. The consumer of your API is a mobile app that periodically sends requests in the background, but you expect other consumers as well, such as web apps or server...
Eduction asked 23/11, 2019 at 17:40
1
Intro
This topic has been the bane of many questions and answers on StackOverflow -and in many other tech-forums; however, most of them are specific to exact conditions and even worse: "over-all" ...
Outmarch asked 28/10, 2019 at 21:15
1
Solved
Hi currently i have an angular application and java backend. in my angular component html i have some image such as profile photos. the resource that serves the image files is secured with spring s...
Fair asked 23/5, 2019 at 10:50
3
Solved
Chrome allows us to disable the same origin policy, so we can test cross origin requests. I would like to know if there any possibility to do the same thing in IE
Lull asked 6/1, 2014 at 9:59
1
Burp Suite and Wireshark are said to be the best tools for penetration testing. I'm curious what the difference is between them, and the pros and cons of each.
Bissell asked 20/12, 2018 at 14:40
2
Solved
As we already know that the URL and FORM scope variables can be modified using external proxy tools.
For example if someone makes a request like this - http:\\website\index.cfm?a=1&b=2
This w...
Tinfoil asked 15/2, 2018 at 19:3
1
© 2022 - 2024 — McMap. All rights reserved.