- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 146 for attacks (0.08 seconds)
-
docs/en/docs/advanced/security/http-basic-auth.md
# Return some error ... ``` But by using the `secrets.compare_digest()` it will be secure against a type of attacks called "timing attacks". ### Timing Attacks { #timing-attacks } But what's a "timing attack"? Let's imagine some attackers are trying to guess the username and password. And they send a request with a username `johndoe` and a password `love123`.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Sun Aug 31 09:15:41 GMT 2025 - 5K bytes - Click Count (0) -
docs/es/docs/advanced/security/http-basic-auth.md
# Devuelve algún error ... ``` Pero al usar `secrets.compare_digest()` será seguro contra un tipo de ataques llamados "timing attacks". ### Timing attacks { #timing-attacks } ¿Pero qué es un "timing attack"? Imaginemos que algunos atacantes están tratando de adivinar el nombre de usuario y la contraseña. Y envían un request con un nombre de usuario `johndoe` y una contraseña `love123`.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Tue Dec 16 16:33:45 GMT 2025 - 5.4K bytes - Click Count (0) -
docs/pt/docs/advanced/security/http-basic-auth.md
# Return some error ... ``` Porém, ao utilizar o `secrets.compare_digest()`, isso estará seguro contra um tipo de ataque chamado "timing attacks" (ataques de temporização). ### Ataques de Temporização { #timing-attacks } Mas o que é um "timing attack" (ataque de temporização)? Vamos imaginar que alguns invasores estão tentando adivinhar o usuário e a senha.Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Wed Nov 12 16:23:57 GMT 2025 - 5.3K bytes - Click Count (0) -
src/main/java/org/codelibs/core/io/SerializeUtil.java
/** * Utility for serializing objects with security protections. * <p> * This utility provides object serialization and deserialization with built-in * security protections against deserialization attacks. By default, it uses an * ObjectInputFilter to restrict which classes can be deserialized. * </p> * <p> * The default filter allows common safe classes like primitives, arrays, String,
Created: Sat Dec 20 08:55:33 GMT 2025 - Last Modified: Sat Nov 22 11:21:59 GMT 2025 - 9K bytes - Click Count (0) -
src/main/java/org/codelibs/core/io/FileUtil.java
/** * Utility class for handling {@link File}. * <p> * <strong>SECURITY NOTE:</strong> When accepting file paths from untrusted sources, * always validate them using {@link #isPathSafe(Path, Path)} to prevent path traversal attacks. * Methods that accept path strings do not perform automatic validation to maintain backward compatibility. * </p> * * @author higa */ public abstract class FileUtil { /** * Do not instantiate.Created: Sat Dec 20 08:55:33 GMT 2025 - Last Modified: Sat Nov 22 11:21:59 GMT 2025 - 13.1K bytes - Click Count (0) -
src/main/java/jcifs/ntlmssp/av/AvTimestamp.java
*/ package jcifs.ntlmssp.av; import jcifs.internal.util.SMBUtil; /** * NTLMSSP AV pair representing timestamp information in NTLM authentication. * Contains time-based data used to prevent replay attacks and ensure message freshness. * * @author mbechler */ public class AvTimestamp extends AvPair { /** * Constructs an AvTimestamp from raw byte data *Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 1.9K bytes - Click Count (0) -
docs/ru/docs/advanced/security/http-basic-auth.md
Замечая, что сервер прислал «Неверное имя пользователя или пароль» на несколько микросекунд позже, злоумышленники поймут, что какая-то часть была угадана — начальные буквы верны. Тогда они могут попробовать снова, зная, что правильнее что-то ближе к `stanleyjobsox`, чем к `johndoe`. #### «Профессиональная» атака { #a-professional-attack }Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Tue Sep 30 11:37:11 GMT 2025 - 7.4K bytes - Click Count (0) -
README.md
- **Encryption Context**: Per-session encryption state management - **Key Derivation**: SMB3 KDF implementation with dialect-specific parameters - **Pre-Authentication Integrity**: SMB 3.1.1 PAI for preventing downgrade attacks - **Automatic Detection**: Encryption automatically enabled when servers require it - **Secure Key Management**: Proper key derivation and nonce generation ### Core Features
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 09:24:52 GMT 2025 - 6.2K bytes - Click Count (0) -
guava/src/com/google/common/collect/JdkBackedImmutableMultiset.java
import java.util.Collection; import java.util.Map; import org.jspecify.annotations.Nullable; /** * An implementation of ImmutableMultiset backed by a JDK Map and a list of entries. Used to protect * against hash flooding attacks. * * @author Louis Wasserman */ @GwtCompatible final class JdkBackedImmutableMultiset<E> extends ImmutableMultiset<E> { private final Map<E, Integer> delegateMap; private final ImmutableList<Entry<E>> entries;
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Tue Sep 23 17:50:58 GMT 2025 - 3.2K bytes - Click Count (0) -
src/main/java/jcifs/internal/smb2/nego/PreauthIntegrityNegotiateContext.java
import jcifs.internal.util.SMBUtil; /** * SMB2 Pre-authentication Integrity Negotiate Context. * * This negotiate context is used in SMB 3.1.1 to establish * pre-authentication integrity protection against downgrade attacks. * * @author mbechler */ public class PreauthIntegrityNegotiateContext implements NegotiateContextRequest, NegotiateContextResponse { /** * Context type */Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 16 01:32:48 GMT 2025 - 4.4K bytes - Click Count (0)