Spring security - user dynamic authorization and dynamic role permissions

1, Spring security dynamic authorization In the last article, we introduced the dynamic authentication of spring security. The last article said that the two main functions of spring security are authentication and authorization. Since authentication and learning, this article learned the dynamic authorization of spring security together. ...

Posted by MyWebAlias on Sun, 09 Jan 2022 10:45:05 +0100

How to design a secure external interface is summarized

The blogger has previously worked in the collection and payment system of Hengfeng Bank (equivalent to the payment interface), including the current OLTP API transaction interface and the external data interface of virtual business. In short, when you have done a lot of projects and written a lot of code, you need to go back and summarize more, ...

Posted by Vince on Wed, 05 Jan 2022 22:22:12 +0100

Canokey Getting Started Guide: F2A, OpenPGP, PIV

Canokeys F2A Canokey uses Yubikey Authenticator to manage F2A. Download Yubikey Authenticator. The following is the official download website of Yubikey Authenticator https://www.yubico.com/products/yubico-authenticator/#h-download-yubico-authenticator Run Yubikey Authenticator Enter the custom reader and fill in the CanoKey in the custo ...

Posted by juminoz on Wed, 05 Jan 2022 18:00:20 +0100

What aspects should be considered when designing a secure external API interface?

How to ensure the security of external network open interface. Signature is used to prevent data tampering Information encryption and key management Build oauth2 0 authentication authorization Use Token Mode Build a gateway to realize blacklist and whitelist 1, Build API open platform in token mode Scheme design: 1. The third-party o ...

Posted by harty83 on Tue, 04 Jan 2022 20:15:47 +0100

CAS5.3 server configuration, link mysql, custom password encryption, login page, login verification, custom exception, ajax login, etc

catalogue 1. Configuring mysql for cas server 2. cas server custom password encryption method 3. The cas server can customize the theme, that is, the login page, or other pages 4. The cas server adds fields to the form submitted during login 5. cas server custom login verification 6. cas server custom return exception 7. The cas server uses aj ...

Posted by sdlyr8 on Tue, 04 Jan 2022 14:32:06 +0100

Chapter 7 Spring Security

The project is advanced to build a safe and efficient enterprise service Spring Security The bottom layer of Spring Security intercepts the whole request by using filter (many special login, permission, exit...) and Java EE specification. The control of permission is relatively advanced. If the permission is not available, you can't get to ...

Posted by donbueck on Mon, 03 Jan 2022 17:10:46 +0100

4W words + thousands of lines of code! Tomcat penetration test method summary, bring it to you!

catalogue preface install Tomcat analysis Main documents Upload directory Tomcat penetration Tomcat arbitrary file write (CVE-2017-12615) Tomcat remote code execution (CVE-2019-0232) Tomcat weak password & background getshell vulnerability Tomcat manager App brute force cracking Tomcat AJP file contains vulnerability analysis (CV ...

Posted by live_ex3me on Mon, 03 Jan 2022 11:34:46 +0100

DASCTF July X CBCTF 4th web part WP

DASCTF July X CBCTF 4th web part WP ezrce Yapi remote command execution vulnerability YAPI uses mock data / script as the intermediate interaction layer, in which mock data returns fixed content by setting fixed data. For the case that the response content needs to be customized according to the user's request, the mock script processes the ...

Posted by Snatch on Mon, 03 Jan 2022 06:24:19 +0100

[quick start Nessus - beginner level]

What is Nessus? This is a vulnerability scanning system based on C/S architecture What is vulnerability scanning? Vulnerability scanning is a technical means to find the vulnerabilities of the target system, and further use the discovered vulnerabilities to do something they have always wanted to do but couldn't do before, such as penetratio ...

Posted by voitek on Mon, 03 Jan 2022 03:08:52 +0100

Basic knowledge suitable for beginners - SSTI vulnerability learning

Introduction to SSTI MVC MVC is a framework mode. Its full name is Model View Controller. That is, model - View - controller Under the guidance of MVC, in the development, a method of separating business logic, data and interface display is used to organize the code, gather the business logic into one component, and get better development a ...

Posted by Jurik on Sun, 02 Jan 2022 15:02:35 +0100