Is encrypting a query parameter within a URI a security best practice?

Assumption a customer is sitting in a public area connected to a public wifi.
Step 1. example.com server sends the following information to trustworthy.external.domain over https:

redirectPath="https://www.example.com/public/endpoint… Continue reading Is encrypting a query parameter within a URI a security best practice?

how should a web application verify a redirect comes from a trustworthy source?

This document has a sequence diagram (annotated and shown below) explaining how Stripe handle’s a Checkout Session.
My question : When a customer is returned to the successUrl = www.example.com/some/specific/path, how can www.example.com (… Continue reading how should a web application verify a redirect comes from a trustworthy source?

How can a stolen computer card be protected from being re-manufactured and resold?

In this scenario, the attacker is not trying to discover secret information or break the system. Instead, his objective is to create an exact replica of the card and sell it at a lower price.
This means that he does not have to know anythi… Continue reading How can a stolen computer card be protected from being re-manufactured and resold?

What is a proper way to prevent parameter tampering and to make parameter secure

I’m developing a HTTP web server. I’ve used HTTPS as the protocol between client and server but I know that HTTPS can’t prevent parameter tampering.
As we know, we can set parameters in URL, in HTTP header or in HTTP body. So clients could… Continue reading What is a proper way to prevent parameter tampering and to make parameter secure

Windows 10 Update – Man In The Middle Attack – Tamper Update [duplicate]

I am connecting to a wi-fi network and blocked all IP addresses in this network with a regular Windows 10 firewall. The only available IP addresses are:

192.168.1.1 = gateway
192.168.1.102 = my own IP address

Some people from the wi-fi s… Continue reading Windows 10 Update – Man In The Middle Attack – Tamper Update [duplicate]

Prudent Design Principles for Digital Tampering Experiments

Mark: Okay. Good afternoon. Welcome to the next full paper session. We have three papers for you in this session on forensic methods. So, Janine will start shortly with a paper on evidence tampering, we have a paper on … Read more The post… Continue reading Prudent Design Principles for Digital Tampering Experiments

Does client-side data tampering allow more than just evading validation? Dictionary attacks? Brute-force login attempts?

I am trying to better understand and determine the impact and implications of a web app where data tamping is possible.
When discussing data tampering, I am referring to when you are able to use a tool such as BurpSuite or Tamper Data to i… Continue reading Does client-side data tampering allow more than just evading validation? Dictionary attacks? Brute-force login attempts?