dialog listlengths 4 30 | title stringlengths 15 150 | category stringclasses 14 values | dialog_time stringdate 2016-01-21 01:59:30 2018-07-01 01:34:46 |
|---|---|---|---|
[
{
"message": "I was asked by my friend to play around with his family's new website and report any bugs I may encounter. Going through the pages, I noticed one that very much looks like it's prone to SQL injection. I do not have access to the source code as it is hosted by a local website design company.<pre><c... | SQL injection possible with hidden GET parameters? | security | 2017-02-09T08:28:57.023 |
[
{
"message": "Suppose I run mongodb as a service with the --auth option (requiring a username and password to CRUD data) in an AWS EC2 shell (which does not ask for a password when you sudo)Now, suppose someone has hacked into the terminal of my stack via SSH and they cannot query mongodb yet because of the --a... | mongodb --auth option | security | 2017-02-10T00:02:37.207 |
[
{
"message": "Whatsapp <a href=\"https://www.whatsapp.com/faq/en/general/26000021\" rel=\"nofollow noreferrer\">has announced that they are introducing 2FA to their service. Normally, services rely on a password (what you know), and adding 2FA means that they require an additional code sent via SMS to your phon... | Whatsapp is adding passwords: what is the threat model that they want to protect their users from? | security | 2017-02-10T14:07:25.490 |
[
{
"message": "If I open up the index page of some completely random website (which I have no prior contract to test), and I find myself seeing sensitive information caused by some webapp error, SQL errors for example. That should not be my problem, because I didn't intend to see it and it's not my fault.Let's p... | Does the legality of pentesting without permission depend on its success? | security | 2017-02-10T20:46:55.093 |
[
{
"message": "I want to collect all the API calls made by an Android app that runs on a real device (with root permissions, obvs).With API call I mean the methods invoked on objects like:<a href=\"https://developer.android.com/reference/android/net/ConnectivityManager.html\" rel=\"nofollow noreferrer\">Connecti... | Log all API calls during the execution of an Android app | security | 2017-02-10T22:24:46.483 |
[
{
"message": "Suppose that I want to give to users of my site the option to pay for a service and use it later. I am thinking to generate a unique ID for the paid service. I want to be able to trust the ID to decide if the user has paid the service or not but I do not want to store anything on the servers becau... | Secure IDs and QR | security | 2017-02-11T13:03:58.413 |
[
{
"message": "I'm in process of creating a tiny blog platform and I've encountered a pretty controversial topic of storing connection string to a DB securely on a host. Here is a reference question: <a href=\"https://security.stackexchange.com/questions/22817/how-to-encrypt-database-connection-credentials-on-a-... | Securing connection credentials on a web server | security | 2017-02-11T18:45:12.887 |
[
{
"message": "Veracrypt is a tool to encrypt disk.It uses many encrypting algorithms, including AES. I'm wondering if someone knows how Veracrypt proceed if we choose AES encryption with a password of 3 characters (considering that Veracrypt will use the password as the AES key, and the size key must be a fixed... | How does Veracrypt proceed with small password? | security | 2017-02-12T10:09:32.727 |
[
{
"message": "I am a beginner in security testing. I was testing a form in a website for XSS vulnerabilities and I noticed that the data is sent as JSON data with XHR request and the response is also as JSON. Is it is possible to search for XSS in such forms or is it a waste of time?",
"role": "user"
},
... | Is that possible to execute reflected XSS if you return JSON from XHR request? | security | 2017-02-12T21:25:04.200 |
[
{
"message": "What are startup scripts in Linux and what are the steps to exploit startup scripts if they are world writable?I would appreciate if one can explain based on the following two files as example in Ubuntu 16:<pre><code>/etc/init.d/README/etc/init.d/sudo</code></pre>",
"role": "user"
},
{
... | Exploiting a Linux startup script that is world writable | security | 2017-02-13T03:02:16.190 |
[
{
"message": "We have a REST API that communicates with a mobile front-end. After submitting a one time password, the backend will issue a token (random UUID v4 string) for the mobile app to use as authentication on subsequent requests. The server will store a hashed version of this token in the database with t... | What kind of hashing to use for storing REST API tokens in the database? | security | 2017-02-14T00:42:07.483 |
[
{
"message": "My question is what happen if an attacker takes an encrypted packet from the network and send it on his/her behalf to the server. How server will identify that it is not a legitimate user. In HTTP using cookies we get the identity of a user otherwise, HTTP is stateless protocol, Now how does HTTPS... | How SSL/TLS identify a legitimate user? | security | 2017-02-14T04:42:09.930 |
[
{
"message": "As mentioned on <a href=\"https://www.google.com/search?q=second+factor+sms+insecure\" rel=\"nofollow noreferrer\">many places at web, SIM cards are one of the weakest link in Two Factor Authentication process. Bad actors can impersonate as user to Telecom Company to get duplicate SIM, or simply m... | How to secure Google Account from SIM hijacking & intercepting Two factor SMS codes on the way & still keep it accessible? | security | 2017-02-14T15:58:53.313 |
[
{
"message": "Im developing a system which a android client send and receive data from a mysql database (connected to a java restfull webservice).To do the authentication method, i dont want to send id&pass in clean text in the URL. Maybe hash and cryptography methods are apropriate, with CHAP or one time p... | Best and secure way to do a authentication protocol between Restfull webservice and Android client | security | 2017-02-15T11:53:46.530 |
[
{
"message": "EDITI added the full replies I got from HelloSign. These may perhaps help someone more expert than I am to determine if they actually provide an AdES signature. Please note that I also asked questions regarding private certificates that as far as I understand now are not required by an AdES signat... | Is HelloSign actually compliant with EU Regulation 910/2014 (eIDAS)? | security | 2017-02-17T08:26:16.197 |
[
{
"message": "I don't understand very well the concept of trusted platform module. from what I understood AIKs are sent to servers for authentication. Does that means that id two computers are communicating they could learn each other's AIKs? Does TPM publish any information at all by default whenever starting ... | Is AIK from the TPM publicly accessible? | security | 2017-02-17T10:31:41.897 |
[
{
"message": "We're running a web service in Europe, secured with TLS and we're using private keys generated on our private hardware.We would like to use CloudFlare for DDoS protection and caching reverse proxy.However, putting my tinfoil hat on, I'm wondering is there any way to avoid being potentially MitM'd ... | Can I use CloudFlare if I want to avoid NSA and FISA secret orders? | security | 2017-02-17T13:56:19.000 |
[
{
"message": "If cookies store an unique ID to track the user on server-side and the content of this cookies is transmitted to the web site owner, how can I monitor / know what type of information are they collecting ? I have EditThisCookie installed but other than the cookie flags and some random string number... | how to monitor / know what information is transferred in cookies? | security | 2017-02-18T10:44:21.217 |
[
{
"message": "As above, I received a code (twice!) on my phone for a security code for PayPal with no further text than the number. Should I be worried someone has successfully obtained my password and accidentally alerted me to their success, or is it more likely someone mistyped their number is mine? Are ther... | Received an unsolicited two-factor security code on my phone: bad? | security | 2017-02-18T11:26:09.800 |
[
{
"message": "Lately, I have been verifying the HTTPS cert fingerprints of the sites that I log in to, by using the fingerprint tool on grc.com to fetch the correct ones from them and then comparing those to the fingerprints I actually receive from these sites, but is it necessary for me to further check that t... | A Question About HTTPS Certificates & Their Fingerprints | security | 2017-02-19T04:54:03.383 |
[
{
"message": "Let’s say I have the following pseudocode in the trusted part of a sandbox which prevent untrusted code calling <code>mprotect()</code> and <code>mmap()</code> and <code>ptrace()</code> directly (mutext isn’t accessible from sandboxed memory)…<pre><code>//src and dest are user controlled but must ... | Are memcpy() based race conditions exploitable for causing remote code execution? | security | 2017-02-20T01:44:30.930 |
[
{
"message": "Why do systems that do password authentication actually send the password over the wire?Why not just have the server issue a challenge, and have the client append append that challenge to the password and reply with its SHA256 hash, to protect against MITM leakage of the password?Is there any bene... | Why should password authentication require sending the password? | security | 2017-02-20T12:39:36.017 |
[
{
"message": "I'm in the process of implementing 802.1x WPA2 Enterprise Authentication using FreeRadius and EAP-TLS (Mutual TLS Cert Based Auth).I am keen to understand how to actual protocols work together and how they keep our WiFi network safe.I understand the basics of Cert-based auth, using pub/priv keys. ... | WPA2 Enterprise EAP-TLS Key Exchange | security | 2017-02-21T16:48:01.313 |
[
{
"message": "In the Bluetooth core document, there are various Association Models, I'm trying to understand Numeric Comparison, where both devices are capable of showing a six-digit number (which I will call the PIN, although apparently they don't like that terminology).The paragraph in section 5.2.4.1 of v4.2... | Bluetooth Low Energy - Relationship between PINs and man-in-the-middle attacks | security | 2017-02-21T17:28:49.520 |
[
{
"message": "What plugins are there for Chrome, that would increase security while browsing the web?For Firefox I have used NoScript, Flashblock, and AdBlock Plus, are there equivalents to these plugins for Chrome?Several plugins I have heard about are uMatrix and uBlock.Thank you very much.",
"role": "use... | Plugins to increase security of Chrome? | security | 2017-02-21T18:28:05.673 |
[
{
"message": "What is the exact difference between the Online Certificate Status Protocol (<a href=\"https://en.m.wikipedia.org/wiki/Online_Certificate_Status_Protocol\" rel=\"nofollow noreferrer\">OCSP) and <a href=\"https://en.m.wikipedia.org/wiki/OCSP_stapling\" rel=\"nofollow noreferrer\">OCSP stapling, whi... | What is the exact difference between regular OCSP and OCSP stapling? | security | 2017-02-21T23:39:41.787 |
[
{
"message": "I have read the details of pure JSON web token (JWT), and found that it is signed (e.g. by SHA256) but not encrypted. Hence, attack can read the sensitive information by decoding the header and payload.I am not very familiar the details of OpenID, but I know that OpenID uses JWT as data format to ... | Is JSON web token further secured in OpenID, and how? | security | 2017-02-22T12:38:20.923 |
[
{
"message": "I may be missing something about how WiFi and networking in general works, but I do know how WiFi device tracking works.When eg. an Android phone has WiFi on, it's sending a ping/broadcast message every few seconds. Using this message eg. retailers can track the location of the device by triangula... | Why do WiFi devices broadcast? | security | 2017-02-22T13:57:01.533 |
[
{
"message": "I am connected to a wireless network that is huge (think large organization). After opening up Wireshark and capturing pcap for about 15 minutes I am seeing lots of MDNS Standard Query traffic with devices and printers also connected to this network. 1) Is it weird that my machine is seeing this... | MDNS activity-- is this a network risk/vuln? | security | 2017-02-22T23:36:17.237 |
[
{
"message": "When users store complicated and unremembered passwords in password manager service such as lastpass, what authentication factor does the lastpass access represent? Does forcing the need for a password manager make the secret no longer a knowledge factor but only a value to the URL key stored in a... | do password managers count as a MFA authentication factor | security | 2017-02-23T06:51:28.480 |
[
{
"message": "I have noticed high CPU usage, and noticed that user dinko had high CPU usage with the <code>sshd</code> process when I typed <code>top</code>.User dinko was just some random user that I created and had a Ruby application running.I have immediateley deleted that user and rebooted the server. Now i... | Are these log entries normal? | security | 2017-02-23T08:22:27.257 |
[
{
"message": "I read an article and there was a link certificate short introduced (about a half sentence). Now I want to know what exactly a link certificate is?Assumption: A link certificate is used, when an old certificate is replaced by a new one. The link certificate is the new certificate signed with the o... | What is a link certificate? | security | 2017-02-23T08:44:52.323 |
[
{
"message": "Me and my brother live in the same apartment and use the same internet connection. (A WiFi router with WPA2 password).He uses Microsoft Outlook as his primary email tool and I noticed that his POP and SMTP port settings were to use ports 110 and 25 respectively, which means he sends and receives h... | Using port port 25 on the same WiFi | security | 2017-02-23T13:04:28.750 |
[
{
"message": "I am studying Openssl , but didn't getting that openssl is a tool/library.what is its main application and how it will be used?And how this openssl is related to ipsec, i have studied the ipsec protocol there if i want to configure ipsec ,that openssl has to be installed(required package) why?plea... | how to understand openssl | security | 2017-02-23T13:37:49.470 |
[
{
"message": "This is my first web-server which I'm looking to construct for my client. I have developed a Laravel application which has been fully deployed onto this server; now i'm looking for any security issues.What security concerns are there regarding Ubuntu 14.04 running Apache, Laravel, PHP7 & MySQL... | Ubuntu 14.04 Laravel Web Server - What should I be concerned about? | security | 2017-02-23T23:10:42.187 |
[
{
"message": "I currently use the SHA-3 Hash Algorithms to create passwords through a given Set of Characters.The User Flow:User enters his Masterpassword (M), Sitename (S), Password length (PL) and choose the Characters the password should have (C).sha(sha3(M+S+C)+PL)the binary Result will then mapped to the c... | Is SHA-3 used in a Password creator like this safe to use? | security | 2017-02-24T14:55:08.423 |
[
{
"message": "I have enabled XSS protection in server using nginx with below header. But After long research google chrome, IE 10 & above and safari supports that but Firefox doesnt support<blockquote> add_header X-XSS-Protection: \"1; mode=block\";</blockquote>For eg: when i try below url in IE, chrome an... | XSS protection header for firefox | security | 2017-02-24T19:10:09.970 |
[
{
"message": "For example, <a href=\"https://www.owasp.org/index.php/Authentication_Cheat_Sheet#Password_Complexity\" rel=\"nofollow noreferrer\">OWASP considers 10-128 characters, with lower, upper, digit, and special characters (I don't get why there's an upper limit). Using the OWASP's minimum guidelines and... | Why are passwords with special characters considered more secure than longer length passwords? | security | 2017-02-26T05:48:11.713 |
[
{
"message": "I was testing a web application where cookies (session ID, session values) are the same for all times. Even after successful authentication takes place it remains unchanged. The session ID travels in the form of a HTTP cookie. To investigate a session fixation vulnerability, I sent my colleague a ... | Testing Session Fixation when cookie is unchanged | security | 2017-02-28T08:57:46.483 |
[
{
"message": "I was reading about SQL injection and saw this, which got me thinking:<blockquote> input fields as small as possible to reduce the likelihood of a hacker being able to squeeze SQL code into the field without it being truncated (which usually leads to a T-SQL syntax error).</blockquote>Source: Mic... | Is there a field length that is too short to allow harmful SQL injection? | security | 2017-02-28T16:18:55.293 |
[
{
"message": "I start learning about DNS and DNSSEC. I discovered DNSSEC work similar to a PGP signature. A piece of data signed by a key and the key signed by another key. So, I have an attack might work with some assumption, but I want some validation will this work.Assuming an attacker had intercepted a netw... | Possibility of a DNSSEC attack | security | 2017-03-01T02:31:12.293 |
[
{
"message": "We are trying to install a PCI compliant firewall on our Azure Vnet. The problem is, that ones like opnsense can only be installed through an iso, having to install it on a local VM and then having to upload around a 4GB disk to Azure create a VM from. With our internet connection it's not a viabl... | Are there any PCI compliant firewalls that can be installed on Linux through normal means and not through an ISO? | security | 2017-03-01T06:22:31.797 |
[
{
"message": "I am writing a collaborative password management system and have questions pertaining to the storage of encrypted passwords. Essentially, I would like several users to be able to access and change a database.High level:User runs the client which asks for username/password authentication (backended... | Writing a Password Management System, need advice on database storage | security | 2017-03-01T21:35:12.363 |
[
{
"message": "I have two network peers that need to use custom, encrypted application protocol to communicate with each other. Exchanged messages are fairly small, usually less than couple of hundreds of bytes, and key exchange is performed in person. Is it then reasonable to make the following assumptions:No c... | Bidirectional encrypted communication between two systems | security | 2017-03-02T00:08:11.700 |
[
{
"message": "I was exploring how websites track users with how paywalls are implemented. WSJ.com has the best ways to detect users who have read content (which I am unable to figure out how they have done it).The standard mechanisms known to track users (to put up a paywall) is withRequest Parameters (includin... | How is wsj.com tracking users to find how many articles I have read? | security | 2017-03-02T08:06:54.600 |
[
{
"message": "I have been thinking on how an app could be \"perfectly\" isolated from the rest of the system. Now I know we will never achieve \"perfect\" in practice, but in theory, how could one go about it? I put together a few thoughts:IMHO the security that we are talking about has to be on the lowest poss... | Designing a sandbox or how to "perfectly" isolate an app? | security | 2017-03-02T15:26:25.243 |
[
{
"message": "I have been thinking on how an app could be \"perfectly\" isolated from the rest of the system. Now I know we will never achieve \"perfect\" in practice, but in theory, how could one go about it? I put together a few thoughts:IMHO the security that we are talking about has to be on the lowest poss... | Designing a sandbox or how to "perfectly" isolate an app? | security | 2017-03-02T15:26:25.243 |
[
{
"message": "I am partly responsible for the security and malware detection (in general) of a huge number of hosting accounts. Our methods rely heavily on signature-based detection provided by ClamAV for which we have also created a pretty decent signature database ourselves (500+ samples).We receive up to 30-... | Anomaly-based Malware Detection in Web Applications | security | 2017-03-02T22:25:24.783 |
[
{
"message": "I have a self access medical portal project for patients to view their visit history and consultation info. Some fields in the database needs to be encrypted. The reason is in case the DB gets unauthorised access, they should not see the plaintext data. We will be using PHP 7 for the project. I've... | PHP and Amazon KMS for encryption | security | 2017-03-04T01:20:27.440 |
[
{
"message": "Recently i just checked my server and found in logs that it is being attacked. Seeing the logs i am not able to exactly figure out, if i should actually be worried.i checked the attacker domain rating on opendns, it is not good.Follwoings are the logs of the request received:<pre><code>31.210.102.... | My WebSite is being attacked, should i be worried seeing the logs? | security | 2017-03-04T19:37:09.863 |
[
{
"message": "I'm trying to establish a connection to an encrypted SSID, using scapy.<br>My intent was basically to sniff the frames of the handshake from the victim, acting as a proxy (MITM), and redirect the frames to the actual AP, changing source and destination.<br>But I realized that would be impossible f... | PMK is what prevent to generate the PTK and decrypt the traffic? | security | 2017-03-05T10:34:54.957 |
[
{
"message": "When you add a new domain in some hostings (i.e. 000webhost or some <a href=\"https://www.protectpages.com/blog/cheap-hosting-list-comparations/\" rel=\"nofollow noreferrer\">other hostings, which DOESNT USE cPanel) an entirely separate <code>public_html</code> is created (with a separate FTP logi... | How to separate and secure domains using cPanel? | security | 2017-03-05T13:21:17.073 |
[
{
"message": "I was thinking of writing a little program to generate passwords for me. What I want to do is encrypt the url of the login page with my master password, and take the first ~20 characters as my password for that login page (or however many characters any password length restrictions allow). What I ... | Can I use an encryption of a url as a password to use on that url? | security | 2017-03-05T16:12:49.480 |
[
{
"message": "Postgres allows dynamic code execution, which might leave it vulnerable to SQL injection.What protective measures does it have against this?",
"role": "user"
},
{
"message": "The same as any other database using SQL, use the following (taken from the <a href=\"https://www.owasp.org/ind... | Postgres protection from SQL Injection | security | 2017-03-06T22:26:00.920 |
[
{
"message": "I'm reviewing API documentation from a potential supplier.In order to gain access to the useful parts of the API, we have to send a GET or POST request to a particular endpoint passing two parameters - our organization name and the \"public key hash\". This endpoint will then return a token that w... | API hash-based authentication | security | 2017-03-07T14:18:45.277 |
[
{
"message": "I need to know if Mozilla Firfox implements the <a href=\"https://tools.ietf.org/html/rfc7507\" rel=\"nofollow noreferrer\">SCSV which adds a specific ciphersuite in case if the client initial hello message is resent (either due to MITM or due to network erro). I opened about:config and checked th... | Does Firefox implements SCSV? | security | 2017-03-07T14:20:41.280 |
[
{
"message": "Yesterday I got back home from an overseas trip to Germany only to find that my Gmail was logged in from China. Now I'm not tech savvy and believe I might have made some mistakes regarding security but how in god's name did someone from China access my Gmail account? I could not login to my accou... | How was my Gmail account hacked from China? | security | 2017-03-07T20:22:53.313 |
[
{
"message": "When an SSH session is rekeyed, does the new key exchange take place within the existing encrypted channel, or does it take place outside of the existing encrypted channel?",
"role": "user"
},
{
"message": "Key re-exchange is performed using whatever encryption was in effect when th... | Does SSH rekeying take place in the encrypted tunnel or outside of it | security | 2017-03-08T04:03:26.747 |
[
{
"message": "if attacker poisioned the cache of DNS server then it will give me illegitimate information.so, how to identify it?if the solution is to create the local database of domain name and ip addresses and compare it with DNS response then how/where to get the correct information about it?",
"role": ... | how to ensure that the DNS server is giving me the legitimate information? | security | 2017-03-08T07:09:49.587 |
[
{
"message": "Can anyone tell me how ARP Poisoning exactly works?Because I was sure that worked as I stated <a href=\"https://security.stackexchange.com/questions/153017/arp-poisoning-wpa-personal-and-enterprise?noredirect=1\">here.But I've been told that is not how ARP poisoning works. That the path I've menti... | ARP Poisoning: exactly how it works | security | 2017-03-08T13:42:14.920 |
[
{
"message": "A very similar question was asked <a href=\"https://security.stackexchange.com/questions/137153/evil-twin-access-point-with-wpa-wpa2\">here but it didn't get any reply, so I'm going to ask a new question with some more insights.The problem of the most common Evil Twin Attack is that the fake AP is... | Evil Twin Access Point Secured-Unsecured | security | 2017-03-08T16:55:18.147 |
[
{
"message": "We have a client on AMI Linux (Amazon), which is currently using OpenSSL 1.0.1k-15.99.As far as I can tell Amazon is very good about backporting security patches as per this page: <a href=\"https://alas.aws.amazon.com/\" rel=\"nofollow noreferrer\">https://alas.aws.amazon.com/ And they have stated... | OpenSSL version causes PCI Compliance failure | security | 2017-03-09T01:55:18.757 |
[
{
"message": "I have a telnet and ssh honeypot (more specifically, cowrie). Most viruses I get there are designed for routers, cameras, etc...The virtualization software I am using is VirtualBox, and I am using it with cuckoo sandbox, which also supports the android emulator.Here is the output of the file comma... | What OS should I use for sandboxing/running viruses designed for IoT devices? | security | 2017-03-09T15:40:29.923 |
[
{
"message": "I am working on a site that has an online health and safety course where you buy x number of serials to use. 1 serial per candidate. We don’t store credit card details and payments are processed securely by a third party. At the moment we do collect/store the address of any sign-up in a mysql data... | What secure alternatives do I have to storing postal addresses/telephone numbers in MySQL? | security | 2017-03-09T16:24:40.777 |
[
{
"message": "In the screen output below from msfvenom when listing all supported encoders with <code>-l encoders</code>; what does \"Rank\" mean exactly?<a href=\"https://i.stack.imgur.com/trtRa.png\" rel=\"nofollow noreferrer\">",
"role": "user"
},
{
"message": "The rank refares to the potential i... | what does "Rank" mean in msfvenom? | security | 2017-03-10T18:53:36.340 |
[
{
"message": "in the past I expirmented with Google available api tools, like the Drive and Youtube api's.The way it works is after you purchase a deveopler account, you are granted to many of Google services through api's, which in order to use, you need a uniuqe api key that is linked to your account, and app... | Why Youtube, or any other Google services use account binded authorization key plain in the url? | security | 2017-03-10T20:29:09.323 |
[
{
"message": "Nearly every airplane these days has 5V USB power port at every seat. Some of these appear to be configured for power only, while others appear to be configured for both power and data transfer, since I will sometimes get a prompt on my iPhone: \"Allow this device to access photos and videos?\"I t... | Is it possible to hack a device via the USB port on an airplane? | security | 2017-03-12T00:51:18.653 |
[
{
"message": "I was trying to build a firewall where in the access to my LAN from internet should be allowed only if it matches the predefined MAC address of the device i.e,. MAC filtering, but later i found out that MAC filtering is not possible for the traffic coming from the internet, since it changes the MA... | MAC filtering the internet traffic? | security | 2017-03-12T05:55:16.867 |
[
{
"message": "We're building a suite of mobile apps where the communications to/from the server's REST API need to be as secure as possible.The intention is to use TLS (i.e. https) at the session layer.However, I've become aware that, on a jailbroken/rooted device it's possible to sniff SSL traffic by inserting... | Layering encryption on top of HTTPS | security | 2017-03-13T07:46:27.760 |
[
{
"message": "I have an API communicating with my client, now I want to secure that API so that onlyu my client can use it. I am planning to do the following, since I have no experience in this I have gathered all this from reading up on the subject and I need advice, here is my flow: When a user signs in/regis... | Creating my own tokens to secure communication with my API | security | 2017-03-13T09:53:48.507 |
[
{
"message": "Making an android app (for fun) that communicates with a server I am trying to come up with out of the box security ideas, one of them would be to use a heartbeat sensor instead of a captcha for avoiding spam. How effective would it be? It is not a password, just a mean to prove me as human. For m... | How effective would a heartbeat sensor be at stopping spam? | security | 2017-03-14T15:39:41.583 |
[
{
"message": "We have a build system, which fetches the sources and executes build commands. At present a dedicated person (build master) does the fetching with her personal account in the source control system.We'd like to automate the build process. How can access to the source control system be secured?I see... | How to secure access to build system credentials? | security | 2017-03-14T21:09:47.127 |
[
{
"message": "I am trying to do a simple buffer overflow that just calls /bin/sh but can't seem to get it to work, it just segfaults. This same exploit worked on a linux vm that I ported over to my mac. As far as I'm concerned I have control of EIP and it points to my nopsled. I have tried a few addresses withi... | Simple buffer overflow on mac El Capitan? | security | 2017-03-15T01:42:56.920 |
[
{
"message": "If I protect my private key with a passphrase, then it will be encrypted<a href=\"https://i.stack.imgur.com/HlSWD.jpg\" rel=\"nofollow noreferrer\">Where is the symmetric key stored for it ? Is it somehow in the certificate itself? What if I have specified that it's not exportable and passphrase ... | private key passphrase protected, symmetric key location | security | 2017-03-15T08:39:24.760 |
[
{
"message": "I have a case here, where I need to encrypt messages to a team/group. Everyone in the group can create a new message, and everyone else in the group can read/edit/delete that message. I want the following things:Encrypted messagesDecryptable by everyone in a group (no one else can unlock it)Group ... | End-to-end "group chat" encryption | security | 2017-03-15T10:37:53.453 |
[
{
"message": "I was looking at the google tool: Nogotofail <a href=\"https://github.com/google/nogotofail\" rel=\"nofollow noreferrer\">https://github.com/google/nogotofailI used their examples to set it up and this works for the examples with proxychains.But now I want to use it with my android device or andro... | Nogotofail usage android pentesting | security | 2017-03-15T11:41:36.813 |
[
{
"message": "Just found session fixation vulnerability in couple of tech giants. Giving the steps I have done: 1. Login to your account in a browser (Browser 1). 2. Extract cookie using cookie extractor. 3. Import the cookie to different browser (Browser 2). 4. You logged into your account without password... | Is Session Fixation a tough one to resolve? | security | 2017-03-16T04:49:02.257 |
[
{
"message": "I'm trying to work with OpenSSL C API, I'm relatively new to all this still, and I find a lot of mixed information out there, so I think it's wise to ask for ideas/opinions/clarification.Anyway, the client program requires a certificate or directory to be loaded which contains a \"TrustStore\". Is... | When creating self signed certs, is the CA.crt supposed to be installed into client machine? | security | 2017-03-17T08:28:00.337 |
[
{
"message": "tl;dr: Is a pseudorandomly generated string unguessable enough to be used as token in a URL?I'm making a web application, let's for the sake of argument assume it's another PasteBin. I allow users to paste text and I generate a random URL for them that they can pass to their friends but otherwise... | Do I need a "cryptographically secure" random value for an unguessable URL? | security | 2017-03-17T09:18:39.043 |
[
{
"message": "It's pretty much my first time playing around with a buffer overflow exploit. I've written a simple C program that is vulnerable to buffer overflows:<pre><code>#include <stdio.h>#include <stdlib.h>#include <string.h>void main(){ char* filename = getenv(\"filename\"); char b... | What lies behind this complicated shellcode on linux? | security | 2017-03-17T11:45:08.080 |
[
{
"message": "It's pretty much my first time playing around with a buffer overflow exploit. I've written a simple C program that is vulnerable to buffer overflows:<pre><code>#include <stdio.h>#include <stdlib.h>#include <string.h>void main(){ char* filename = getenv(\"filename\"); char b... | What lies behind this complicated shellcode on linux? | security | 2017-03-17T11:45:08.080 |
[
{
"message": "As part of a bigger project that I am working on, I need to write a PHP script to convert a Base64 string into an image. The way I would like to go about passing the Base64 string into the script via a GET query, so...<code>example.com/base64ToPng.php?base64=thisIsTheBase64ForTheImage</code>I woul... | Is it safe to use a PHP script to load a Base64-encoded PNG? | security | 2017-03-17T17:28:04.560 |
[
{
"message": "My partner was testing a web application and he found a XSS vulnerability on a change password module, this module places the old password in a hidden field, then it's possible to use a XSS attack to change a password of a user, because the old password can be got by XSS exploit. Also this module ... | Could a request sent by a XSS attack in a change password module be cosidered as a CSRF? | security | 2017-03-17T22:57:31.930 |
[
{
"message": "I have noticed some strange activity on a dns server of mine and wanted to pick some brains. Every request being made to this dns server has an additional udp packet being sent to an ec2 IP address in Ireland. FYI, I am in the US so this should not be going to the Ireland at all. The udp packet se... | DNS sending queries to weird IP | security | 2017-03-18T00:05:38.800 |
[
{
"message": "I'm a web developer with about 7 years experience, but for the last 12 months I've been getting into cyber security so I've started implementing secure code practices and OWASP good practices at work. I've been preparing to do my OSCP an I've done a few CTFs because pentesting seems really interes... | Application security vs network penetration testing | security | 2017-03-18T03:04:10.547 |
[
{
"message": "I recently found an article about the <a href=\"https://www.google.nl/amp/s/foxglovesecurity.com/2016/01/16/hot-potato/amp/\" rel=\"nofollow noreferrer\">Hot Potato vulnerability and it seemed quite interesting.<blockquote> Using this technique, we can elevate our privilege on a Windows workstati... | How likely is it that the Hot Potato vulnerability can be exploited on a up-to-date Windows 2012 machine? | security | 2017-03-18T09:25:16.587 |
[
{
"message": "First, here’s my interpretation of the certificate validation process (if mistaken, please feel more than free to correct me). When connecting to a web site using https, the website present an SSL certificate to the browser. It is used to authenticate the website. The browser has to have a way to ... | SHA-1 how and when is it really a problem | security | 2017-03-18T10:00:53.303 |
[
{
"message": "If I understand correctly, <code>meterpreter</code>'s <code>hashdump</code> dumps the content of the SAM file. Domain users should be in the AD database on domain controllers, which I understand is NTDS.dit .On my test network, if I run <code>hashdump</code> on a domain joined workstation I don't ... | Does hashdump also dump domain creds when run on a domain controller | security | 2017-03-18T17:12:26.800 |
[
{
"message": "I'm trying to up my Windows domain enumeration game. I'm doing some exercises where I'm tasked to find the forest trust relationships without exploitation or creds or being on the domain.All resources I've found seem to use Windows tools and imply that you're already on the domain.How can I do thi... | Enumerate forest trust relationships | security | 2017-03-18T21:24:10.247 |
[
{
"message": "In National Vulnerability Database page (<a href=\"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0778\" rel=\"nofollow noreferrer\">https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0778), from the change history, we can see CVSS v3 scores has been changed overtime. For example... | Why do CVSS scores change? | security | 2017-03-19T19:12:09.363 |
[
{
"message": "I am making an Android app that needs to be very secure. For authentication to the server, it will use 2-factor authentication that includes:username/passwordsms verificationI can't use client certificates(with private keys), as in my case it wouldn't be practical.Password will be stored securely ... | Storing password in sqlite vs asking user to type it in every time | security | 2017-03-20T14:27:23.993 |
[
{
"message": "The SSH2 protocol defines the SSH_MSG_IGNORE message type as a means of disguising actual message lengths from strongly correlating with encrypted message lengths. I have not found any recommendations on how often and when these messages should be sent to be effective. Is there any literature or ... | How often should SSH_MSG_IGNORE messages be sent? | security | 2017-03-21T20:27:25.973 |
[
{
"message": "Suggestion from <a href=\"https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet#RULE_.235_-_URL_Escape_Before_Inserting_Untrusted_Data_into_HTML_URL_Parameter_Values\" rel=\"nofollow noreferrer\">OWASP:<blockquote> RULE #5 - URL Escape Before Inserting Untrusted Data i... | URL escape before inserting user data into HTML URL parameter values? | security | 2017-03-22T13:47:12.147 |
[
{
"message": "Is there any way to bypass the x-frame-options header without using a MitM or changing the packets in another way? So actually getting a site that has x-frame-options: DENY to be shown in an iframe.",
"role": "user"
},
{
"message": "There is one caveat when using <code>X-Frame-Options<... | Bypass x-frame-options for clickjacking | security | 2017-03-22T14:04:56.737 |
[
{
"message": "I want check if my various passwords are in lists of cracked passwords, but I don't want to type the passwords online. For example, I'd rather scroll through an ordered list of passwords that have been merged from all rainbow tables and other sources to see if my favorite passwords are in there. ... | Is there a way to check lists of cracked passwords without revealing my password? | security | 2017-03-22T23:00:42.667 |
[
{
"message": "I'm setting up a limited user account. I would like it as limited as possible, while retaining the capabilities of: running a handful of programs, and saving files into one folder.Can I use ACL rules to deny access to all hard drives, and then make an ACL rule on just the needed programs and fold... | Limiting a standard user on Windows | security | 2017-03-23T21:16:56.643 |
[
{
"message": "Introduction:I used to use the same password for everything (it was at least a really random password with fake words). Then I found out that I should have different passwords for different sites cause some developers have no clue about security and store things in plaintext or just let themselves... | How secure is this method of password generation? | security | 2017-03-24T05:22:14.670 |
[
{
"message": "In Windows 10, there is the Administrator account that is disabled by default. What should I do with it, with regards to hardening Windows?I have heard of adding a password to it, but is that necessary if it is set to Disabled?Thank you.",
"role": "user"
},
{
"message": "If the passwor... | What should I do with the hidden/disabled Administrator account? | security | 2017-03-24T20:04:30.753 |
[
{
"message": "I am going through an introductory tutorial on writing exploits, which can be <a href=\"https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/\" rel=\"nofollow noreferrer\">found here. The tutorial goes over a simple stack based buffer overflow vulnerabi... | Why is fnstenv giving me a NULL address in my shellcode on Windows XP? | security | 2017-03-25T10:18:50.977 |
[
{
"message": "in symetric encryption it is different. however in asymetirc encryption lets say we have a part of the cipher text only,not the entire ciphertext. you also have the private key. can you decypt that specific part of the cipher text with the private key",
"role": "user"
},
{
"message": "... | is the entire cipher-text needed for decryption in asymmetric encryption? | security | 2017-03-27T01:22:26.113 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.