Cyber Security
Network
Network
Hacker intercepts traffic between you and the server.
Common on public Wi-Fi.
Can read unencrypted data (non-HTTPS).
Tools: Wireshark, mitmproxy, Ettercap
Resolutions: JWT token/Encryption/Obfuscation
Monitors local network traffic (LAN/Wi-Fi).
Can capture data if not encrypted.
Tools: tcpdump, Wireshark.
Resolutions: JWT token/Encryption/Obfuscation
Malware logs traffic or data before it's encrypted.
Can steal session tokens, passwords, or cookies.
Resolution: OS upgrade patches/AntiVirus/Limit access/Block USB/Training awareness
Downgrades HTTPS to HTTP.
Hacker sees data in cleartext.
Tool: sslstrip.
Resolution: Disable HTTP, use HSTS, Enable TLS 1.2
Redirects your traffic to a fake server.
Can capture login credentials or sensitive data.
Some extensions or spyware log traffic or user input.
Always use HTTPS (look for 🔒).
Use VPN on public networks.
Enable HSTS, CSP headers on websites.
Keep antivirus and system updated.
Enable HSTS (HTTP Strict Transport Security) at all layers: Strict-Transport-Security
Enable TLS 1.2 or higher, in order to secure connection
Enable WAF services(Web application firewall) that to prevent overengineering the solution by security aspects, as it applies machine learning mechanisms for anomaly detection, and OWASP best practices.
Definition
(Web Application Firewall) is a specialized security solution that monitors, filters, and blocks HTTP/HTTPS traffic to and from a web application, protecting it from various attacks.
How does It Increase Security?
🔍 Traffic Inspection
⛔ Automatic Blocking
🔧 Custom Rules
🧠 Machine Learning (some WAFs)
Vulnerabilities
SQL Injection
Cross-Site Scripting (XSS)
File Inclusion (LFI/RFI)
Command Injection
CSRF (Cross-Site Request Forgery)
Popular Solutions:
Commercial: AWS WAF, Azure WAF, Cloudflare, Imperva, F5
Open Source: ModSecurity (Apache/Nginx), NAXSI
Implementation Guidelines
WAF complements but does not replace secure coding.
It’s strongest against input-based attacks (e.g., injections).
Less effective against logic-based or role-based vulnerabilities.
Dr. Ghoniem Lawaty
Tech Evangelist @TechHuB Egypt