instruction
stringlengths
24
29.9k
I've read similar questions being answered on the safety and privacy of school wifi certificates but my question on whether they can still track me at home stands. I'm using my own computer (not school's) but the certificate I installed in order to use wifi seems a bit fishy. This is the BYOD programme we're using: ht...
How secure is it to use Bluetooth handsfree? Can't someone eavesdrop the signals and listen to the conversation? Does encryption in Bluetooth secure the information? Can I use anyother tool to secure more the Bluetooth I use?
How a ticket system works A ticket system - one you see at festivals - works like this: when a user pays for their ticket, a row is added to the database with a column named is_scanned, whose default value is set to false. As soon as a guard at the festival scans the barcode (containing an ID, and unique hash) with the...
Can someone explain a technique when I know that I can expoit RCE on a server that is located in an internal network but I don't understand how to get a reply back from the payload once it gets inside the server?
I am wondering about the security of adding a letter in front of a long passphrase to help me have different passphrases for each site I use while not requiring me to remember several different N word sentences. E.g., if my phrase is the classic "correcthorsebatterystaple", would it be ill-advised to add, say, "f" for...
I have created Makefile to simplify generation certificates for local development: DOMAIN ?= localhost NAME ?= ${DOMAIN} CAKEY ?= CAkey.key CACERT ?= CAcert.pem SIGN_REQ ?= ${NAME}.csr CERT ?= ${NAME}.crt PEM ?= ${NAME}.pem KEY ?= ${NAME}.key CA = "/C=US/ST=NY/O=/localityName=City/CN=Hauleth...
i'm building an app that really needs encryption of this type , my question is it safe to store the aes encrypted RSA key in the database ? here is how i encrypt the key : i generate a random 256 bit number and turn it to hex (this is the salt) then i get the user password and derive a key from it using pbkdf2 i store...
I have a piece of software that monitors C:\Folder1. It keeps it in sync with C:\Folder2. It encrypts everything in C:\Folder2. I want to sync Folder2 to my Google Drive. But this additional encryption step is silly if they could scan my entire file system now that they're downloaded to my machine. Is there a way to ch...
In a bunch of APIs, there are several possible query parameters. Some of these may be PHI. So even if we are using HTTPS, they could go to a logfile or somewhere else and hence violate PHI. Was thinking of an approach where the parameters would be encrypted in the client and then decrypted by the server. On login, t...
I was recently advised that when a user is logged in as a regular user and they need an administrator to do something (i.e. install an application) that entering the administrator credentials when the regular logged in user is still logged in, puts the credentials at great risk and logging out as the regular user and l...
Does anybody have hands-on experience with stateless password generators (managers) like Getpass? It seems like it does most of the work of cloud password managers, but leans more to the security side as there is no servers with passwords to penetrate.
I'm working on something where using windows authentication to SQL server is difficult if not impossible. My team member is adamant that using SQL auth is much more difficult to manage and is a major red flag from a security and compliance perspective. I can definitely see how it could be more complicated than just usi...
I receive a lot of spam email (probably from recent breaches). A lot of them contain text that looks a lot like the below text: Why do they contain such weird characters? Is this part of an exploit? Is this to mislead spam filters? Or is it for a different reason?
Lets use Google Authenticator as example. A 6 digit code is generated every 30 second. Each random attempt has 1/1,000,000 chance of success. Server will usually accept code of ±30s which increased the chance of each attempt to 3/1,000,000 If the attacker tries one code every min for 200 days then he/she will have 92....
Assuming I have a secret key of sufficient length and entropy (I get to decide the length and have a good random source). I would like to generate 256 length keys by hashing the root key with the name of each key, ex: key1 = sha256(rootKey +"key1") key2 = sha256(rootKey +"key2") ... keyN = sha256(rootKey +"keyN") ...
For example, if I am using my personal laptop on a public wifi, and type in the website I want to go to that includes HTTPS, (lets assume https://www.google.com/gmail/) can I reasonably trust that I'm establishing a secure encrypted connection with that website? Can a man in the middle compromise that kind of connectio...
the AJAX login script var xhr1 = new XMLHttpRequest(); xhr1.open("post", 'https://192.168.1.1/index/login.cgi', false); xhr1.send("Username=admin&Password=6836394be82df057e085fc344c6179d1b50b30224ad0SJ0GQrNWmpsXCSk5so7o73f93282&challange=SJ0GQrNWmpsXCSk5so7o"); the problem is it gives me this error Login Failure:...
If we establish the connections between two peers using two way SSL with strict configuration(TLS1.3 ,strict cipher etc..) and disabling client initiated re-negotiation. And likewise we establish the ssh connection,then which connection will be considered more secure ? Can a two way ssl connection be as secure as ssh ?...
I have a website to do security testing. The CSP is as follows. default-src * ; style-src 'self' 'unsafe-inline' data: https://netdna.bootstrapcdn.com/ http://s3.amazonaws.com/ https://s3.amazonaws.com/ ; script-src 'self' 'unsafe-inline' 'unsafe-eval' data: https://cdn.ckeditor.com/ http://s3.amazonaws.com/ https://s3...
The principles are programs instead of human. I want to rotate their password regularly, using random generated password, and then deliver the new password to the programs. I have a mechanism to make program use the new password at its next kerberos connect, but the delivery may take time. I am concerned that the prin...
As AWS S3 already keeps files encrypted. What could be the use case where we need to encrypt our file using any other library explicitly. Is that required in real world application ? Is it really required to encrypt files explicitly our self knowing that S3 will keep everything encrypted ?
I have been pen testing an android mobile application for security vulnerabilities. As part of the test, I started Frida server on a mobile phone where the mobile application to be tested is installed, running, and after login (Already inserted credentials and logged in). While being logged in the application, I dumped...
I'm unsure if I have posted this in the correct community but the organisation I am currently working for currently uses an SQL 'data warehouse' which contains a bunch of tables from various sources, for various purposes. This data warehouse (as far as I can tell) has two or three environments; Dev, QA and Production. ...
I have a pet project where I am trying to develop a small antivirus program for Linux. I have already designed the mathematical model and the heuristic approach that I plan on using, yet now I am struggling when trying to fingerprint the host machine. In order to achieve that, I need to list all the processes and thei...
I am able to inject javascript:alert `1` or javascript:alert(1) into the href field of the rails app and it is getting executed as JavaScript. Html encoding is already implemented but it doesnt encode brackets and back quotes. How to solve this? What is the best method to prevent XSS in rails?
I know that I can disable USB devices using group policy for the computers of my company. What I want to achieve is allow users to use the USB port only for charging their phones, connect their mouse and keyboard but NOT allow file sharing from removable media to computer (and vice versa). So my question is how do I e...
I intend to train an RNN on snapshots of the VM metrics to classify malware. I will, therefore, run hundreds of different pieces of malware inside that VM. It has been isolated from my host (as best as I could/thought). What would be the best (most secure for the host and most reliable for the information collected) w...
When typing a secret keyword into Getpass, a little jdenticon is showing on the right, based on the secret that was entered. The FAQ on Getpass states the following about it : Did you notice that secret keyword is obscured? If yes, than this is a way to visually represent a hash of your Secret Keyword, based on jd...
I am second-year CS student, I know C, OOP concepts, x86 architecture, reverse engineering basics, TCP/IP stack and OS concepts, also I love Linux OS. I have just one question: Is it a mandatory to learn in depth a Linux kernel and develop some low-level stuff like kernel drivers before I dive into a binary exploitatio...
Visiting facebook.com you will query s.update.fbsbx.com. s.update.fbsbx.com is a CNAME to s.agentanalytics.com. Currently, the only way to block s.agentanalytics.com is to block s.update.fbsbx.com via hosts. Windows DNS client, and even wildcard blocking resolvers such as Dnscrypt do not have the ability to block the ...
Sometimes sensitive data is copied from/to processes and external devices like (long)passwords, usernames and so forth , but also often people don't get this always in mind and forget to clean that type of memory (it is actually RAM) with the risk that another person extract this information by reading from it. How can...
When creating a new user in AWS IAM, an admin sets the user's name and permissions for that user. The user's password and programmatic access keys (if programmatic access is granted) are then generated and shown to the admin. You successfully created the users shown below. You can view and download user security crede...
I'm writing a small task management program in Java (not for mobile devices btw), and part of it was kind of a 'data service' to encapsulate and reuse database related code - such as connecting to different DBs, CRUD actions and stuff. The program itself should run offline, so I'm thinking of using SQLite for data stor...
I've recently been delving more into Wifi security and am starting with Pixie Dust, I've learned about it, mostly how it works (with the pins, being able to crack two halves of the pins and whatnot, not much in-depth, but enough to understand it and know what's going on). I read on a Quora thread that it's loud (obvi...
After that FaceApp got viral, so many articles have been writing about privacy issues of FaceApp. They argue that FaceApp sends user pictures to their servers and store. As the company is based in Russia most of the US news outlets mention that FaceApp can use stored images in anyway they want While I am not fond of...
I want to know if IDOR is a client-side or server-side vulnerability. In my opinion, it is a server-side vulnerability.
I've read that passing GUID as URL parameter isn't considered insecure because usually, an app has an authentication mechanism (checking against some session token). However, how secure would an application be if the user's page can be accessed just by the GUID in the URL and there's no login / authentication at all? T...
Example: I want company X to perform an analysis on the data I output from a campaign of tensile testing. I send them encrypted data and ask them to fit a function between deformation and constraint (I say to X, my data is u and v), to obtain the response of my material to solicitation for future calculation What preve...
Company sends me an email to my gmail.com account. I open the email in my gmail account. It turns from bold to grey, showing it has been read by me. I do not reply to it. Can the company gauge my IP address when I clicked on their email and opened it in my gmail account?
I know you need prepared statements and such to avoid SQL injection, and I've seen that there are different questions about exploits for SELECT, INSERT, UPDATE injectable queries. But I couldn't come up with an exploit sample for USE statement. Suppose I have an injectable single statement that looks like this: USE `da...
I am running an evil twin attack with eaphammer, by default it seems to capture mschapv2 authentication which contains the username and NETNTLM hashes. I have manually created a WiFi connection (on Windows) and manually select not to verify CA and to use PAP authentication. When I connect to this new connection, I am a...
If it were possible to alter an ASCII character without detection--that could only be "seen" by the intended receiver of a message--it would be ciphertext heaven. Consider Bacon's Bilateral Cipher (example taken from here): ITS A BEAUTIFUL DAY IN THE NEIGHBORHOOD then the message (RHODES) is hidden as: .....R.....H....
I have been successfully using openssl to encrypt a large file. I'm trying to develop the equivalent nodejs crypto API code for the following openssl commands: openssl rand -hex 64 -out {keyfile} openssl enc -aes-256-cbc -salt -in {infile} -out {outfile} -pass file:{keyfile} So far, I think this is what I need...
How can I protect a VM build e.g. with LinuxKit, if my host system is compromised? Are there methods available or am I always at the host's mercy? And is it possible to isolate what's going on inside the VM from the host in order to avoid data leakages?
See the title. I'm involved in a security audit right now, and am wondering whether 2FA should be enabled on not just human login accounts but also on service accounts (non-human accounts)? If so, how is this normally managed? Someone must still be at the other end to confirm the 2FA right? And would this be mainly a o...
My newest boyfriend sent me a Grabify link on Messenger. Without thinking (probably because of trusting him), I clicked the link (yeah, I'm an idiot, lol). The link has routed to my Facebook account. I'v done some searches online but I find no answer. I just wanted to know if there's any possibility that he was able to...
This organization I'm working for uses OpenDNS/Cisco Umbrella. I'm confused as to why I'm seeing requests for SSL traffic resolved to 146.112.255.155 146.112.250.83 146.112.250.64 146.112.250.87 146.112.250.73 Are these sinkholed IP addresses? I thought the blockpage IPs were these ones: https://support.opendns.com/hc...
I have some data on CSV files and I want automate the input of this data into an SQL database using Powershell. The data is mostly, if not completely, numbers. I am using a script based on the one found here: SIMPLE POWERSHELL SCRIPT TO BULK LOAD CSV INTO A SQL SERVER TABLE. What sort of security concerns would I have...
I found slack team_id in vdp source code, is it a sensitive token if yes how can I use it for a PoC?
We are taking a look at using Redis for a Cache Aside pattern, and I am thinking, is it safe to store username and hashed passwords in Redis Cache? If yes, are there security issues with having a key structure like user:username? Or for initial authentication / login using username and password, it is safer to perform ...
Is there any way to load html data uri: data:text/html,<html><svg/onload=confirm(1)></html> with this scheme: data:// i have seen this payload going around: data://text/javascript,alert(1) But only shows as text plain, on latest Chrome / Firefox Mozzila Firefox ESR latest -> prompts download
I have read a few wrong information about HTTP/SSL (I think) and those information was saying that the private key from a certificate is used for message decryption. I have followed a tutorial on pluralsight and there was explain how the encryption key is generated for a TLS session and the private key of the certifica...
Is there a way to exchange phone numbers/email addresses through public chats with a person without giving them or other communication information away to all the other people in the public chat? Example for a public chat can be the comments to this post right here.
A spammer is harassing my friend and she doesn't know who. With some struggle, I found out the spammer's IP address. But I don't know how to proceed after this. She says she doesn't want to move legally; as she suspects the perpetrator could be in her own family. How can I get owner information (name, physical address)...
An app I'm using requires me to grant it the permission to track my location, which I grant. But, if I manually toggle off the device's location service (for example in the settings or the drop down menu that appears when swiping down from the top of my screen), can the app still access the location service? I know th...
Currently I am working on a project in which I am supposed to define the following aspects as a test manager: Conception of a penetration test for a test staging environment Planning security guidelines for REST API development Use of REST API scans via SOAPUI (create security test cases) So my planning within the st...
I'm a one-man company and I'm getting a lot of phishing emails very similar to the emails from companies I use. Some of these companies and the emails we exchange are very unique. How would these malicious senders 'learn' the type of emails and content I send? Since the increase in phishing emails I've also noticed I'm...
I support a number of applications some of which have sql databases. There's a number of scripts (mostly powershell/bash) to check the state of an application to see if it's considered healthy. Some of these scripts make calls out to the sql databases. I'm fairly certain I could just change the script in place to do s...
Here is a list of obsolete DNS record types. Should I restrict my DNS server to not respond to these query types? Why are current public DNS servers responding to these query types?
My wife's phone can't boot into android and instead displays a message that encryption has failed and all data is lost. She did not start the encryption process by herself. Now my question is: can android 5's own encryption mechanism be hijacked by ransomware? (and not by means of some custom implementation manually en...
I was thinking about end-to-end encryption for my chat application, but I am struggling to understand how do I migrate my private keys from one device to another. One option I thought is to store private keys somewhere very secure (which I can't imagine of), but it will expose the privacy... Another option is to do som...
I have a nice, expensive, metal credit card with a chip but it's from an older card. I’m wanting to rewrite the magnetic stripe and the chip to my new card. I know how to rewrite the magnetic stripe but what do I need to buy and do, to rewrite the chip?
Consider a young (primary-school age) child who is starting to collect passwords for online services. How can a parent (or equivalent) help them manage their passwords? An example to make things clearer: My daughter might want to log on to http://scratch.mit.edu from several locations/devices to show her projects to t...
I understand how buffer overflow works (in minimal knowledge), which create buffer overflow and take control of stack pointer, to make it execute whatever attacker wants. However, with my current knowledge, programming language such as python or java, the memory space is allocated dynamically at heap (correct me if I a...
Edited to clarify: *The bucket is used by EC2 instances that process its data and display parts of it to the user. The EC2-S3 interaction is invisible to the user. * Can I assume that a public S3 bucket will not be discovered if it has a very long and complicated URL? For example s3://5eb63bbbe01eeed093cb22bb8f5acdc8...
I know the first char is A and it's all upper alphanumeric. Is there a way to estimate how long a mid level single GPU using hashcat would take to crack it?
I was getting interested in data privacy and looked up how users are tracked on the internet to connect the different traces to a single user. I found this: In addition to regular cookies, pixel tags, ultrasound beacons and fingerprinting technologies, there exists other methods for tracking users, such as undeletable...
A former employee, put the following in our "global.axas" if (url.Contains("xss")){ response.StatusCode = 404; response.end(); } I get he was trying to prevent cross site scripting, but other than example where people put alert('prevent xss');, what is the risk that he was trying to prevent? The reason I'm asking is...
I have "blackbox" with the following python function code (without permission to change it): def exec_ping(): forbidden = ['&', ';', '-', '`', '||', '|'] command = input('Enter an IP: ') for i in forbidden: if i in command: print('Invalid characters') exit() os.system('pi...
We are a brick and mortar company... literally. We are brick masons. At our office we connect to the internet through our cable modem provided to us by Spectrum Business. Our Treasurer uses a Verifone vx520 card reader to process credit card payments. It connects via ethernet. We don't store credit card data. We got a ...
As far as I know, with OpenSSL, you can self-sign your website's certificate. This means that the browsers that will connect your server are supposed to be willing to accept a self-signed certificate for your website. My question is, how does the browser know whether or not to accept a self-signed certificate for a par...
I am about to install some custom pi cameras that connect to my network via WiFi. I know people hack wifi through spoofing SSID. My password is randomly generated and is impossible to brute force even without router protection and a supercomputer. Spoofing, on the other hand, could reveal my password. Auto-connect is ...
All I will need to check is AAAAAAAA - AZZZZZZZ. So I will only have to check the A's but will checking the A's be faster knowing the first char , I can't see why it would be as it would have to check every combination anyway?
I have created a ASP.NET project and I want to implement Anti-CSRF method in my project. How to do that?
I have a website and i want to consume public API from third party services such as Zoopla, weather etc. I want to ensure i do not consume malicious code/malware from the data retrieved from the 3rd party services. What are the security checks/best practice i should consider when using any 3rd party public API? I am u...
I work remotely and have to go to Europe for a few weeks in order to deal with a family emergency. I don’t want to explain the situation to my company and I know it won’t affect my work productivity. Will I be able to log into the network/VPN from there, and if so, will it alert IT for a possible security threat? (Ther...
I am reading abpit the attack amd defense strategies of web spiders. Assume I have sensitive information on my website, which should be protected from 3rd party web spiders. Use case #1: Me: I set the sensitive data only visible to registered user account. Tourist accounts cannot see them, and hence cannot crawl. Atta...
I am considering moving my SPA from Implicit flow to Authorization Code + PKCE extension. This new flow will provide the SPA with a Refresh Token that doesn't expire. Let's say a malicious user on the computer/browser manages to get hold of the Refresh Token from the browser. What are the remediations I need to set-u...
I'm working for a public sector organisation (around 6000 staff) with a mixed IT skill set. We're looking at setting up a patch advisory board to assist in server patching. The plan is to have a team from different areas of the business (Apps, DBs, infrastructure, etc) to review each patch and then approve whether they...
I'm using BBB in my project. I need to prevent any changes to the software running on it. I've been reading about uBoot and TPM. But if I understand everything correctly, this can't be implemented correctly, that is, in a really secure manner. I understand that during boot, each boot stage passes "something" to TPM, TP...
The idea to "improve" security is as follows - the service will reply with a failure code even if supplied credentials are correct, but then on a second (third/whatever configured) attempt it will return a success and provide an auth token. The rationale behind it is that even if there was a leak of some hashes/passwor...
Why not just create a network named: Starbucks_passIsHelloWorld, wouldn't that prevent the network from having some security issues? After that every user would be able to login using the password and have better security.
I'm popped in the middle of the domain with what appears to be a VERY solid network. Good policy, good security, a lot of the usual tactics won't work. I cant pass-the-hash, find any SYSVOL loot, or gain access to any local users in any way. They are pretty strict about patches. No local exploits to think of. I've tri...
I read here, but that wasn't related. If userA is connected to router and userB is connected to the same router, then how can userB sniff communications between userA and the router? I've see a few videos where it says userB can sniff userA's traffic without ever explaining how that's possible. Isn't it like two para...
An administrator of an AWS account wants their users to be able to create their own S3 buckets, SQS queues, and KMS keys and attach resource-based IAM policies to their resources. How can said administrator find resources that have resource-based IAM policies in bulk and review these to ensure they are in compliance wi...
Very recently, I had received a message containing this text: #E(£ΘULÆ;iFΩ¥bi:iFΩké¤V7ud£Φ M:ed9+FÅH9edYK6,ΘΔbr£1wÄ:mJi £ΦùÅΣMè£$¤Z9 B#ΨMÑ0tJ_¥ΦL2 Φ9#WLÆ7eh£Ç6IX2sf£9Ψ6 DΩ¥B.Θ9mR9ØF.Θ2 BΘ#WLÆΔvÜ1+W-ΘΔ which is similar to what happened to this post's OP's staff me...
What are the risks that we allow security camera made in China to access our modem/router (all in one)? We granted the camera on Guest network which is the only thing we have it on. Our laptops, phones, tablets are connected to the main wifi. Can they hack into the main wifi from the Guest network? If so, how can we co...
To see what would happen, I attempted to access Hulu from a VPN outside the US. As I expected, Hulu detected the VPN. My understanding is that this is because Hulu is aware of the IP address ranges that belong to known VPNs. However, what caught me by surprise was Hulu's ability to display the time of the incident in m...
I was wondering that infinite redirection could be used as a dos attack in my case, I have this test.php <?php $url = $_GET['url']; header('Location: '.$newURL); ?> if I use it like http://mysite.com/test.php?url=http://mysite.com/test.php?url=http://mysite.com/test.php?url=http://mysite.com/t...
I'm trying to configure several AWS accounts to log CloudTrail to a central logging account, from which the logs will be brought into Splunk. In order to do this, I need to configure CloudTrail on each source AWS account to log to an S3 bucket in the central logging account, and also to notify an SNS topic in the centr...
Just like the title says, I would like to understand: what are the implications of running a custom app (like node or flask) on port 80/443. Is running a reverse proxy like Nginx mandatory from a security point of view? What if I run Nginx as root user and we discover a security vulnerability today? Wouldn't that make...
When using the web message response mode spec with OpenID Connect for silent authentication, what prevents an attacker leveraging an XSS attack from registering a "message" listener and intercepting authorization messages (a code or token, depending on the flow)? In the spec, going off the Simple Mode, the Main Window ...
I have gotten a number of calls where after I answer (I rarely answer but occasionally a number pops up that could be from a customer) the caller hangs up. I'm assuming it was a robo call (the calls are not just ones from my local area code and exchange.) I got one of those calls a short time ago and began wondering wh...
Is it possible that someone could hack a website if they have the database name, database username, and database password? If so, how do they do it? The database connection is mysql.
My webapp has "password reset" and "password change" functionality. Password "reset" is typical: user clicks "I forgot my password", enters his email, one-time link emailed there, he visits a form to choose a new password. Password "change" is more complicated. There are two approaches: Some sites use a one-step proce...
I've seen many places refer to "256 bits certificates" in SSL encryption. Assuming they are talking about the key size, when I look at these certificates in browser I see 256 bytes instead. I know 1 bytes = 8 bits, so am I reading this wrong or should it instead be "256-bytes certificates"?
I'm fairly good with PC's but no expert. I'm at a WeWork (coworking) and connecting to WeWork's wifi network. There are a bunch of tech startups, so quite a number of people who could potentially breach a vulnerable PC/network. What precautions can I take to keep them off my computer? VPN? Encrypted router? What wo...
Let's say I create a website (with apache for example) and my php pages get some sensitive information from a file on disk (a .ini file, a SQLite db or whatever). I thought two ways to prevent users from getting to this information: separate document folder (/var/www/html) and data folder (/var/www/data) where to put ...
I'm currently building a web based membership application form that will require a user to enter an SSN and other identifiable information. Part of the requirements of the membership application is to allow a user to be able to resume their application and pre-fill of the information they already entered into the form ...
I am just wondering about this since I heard that tor exit nodes know the ip of the website the user is visiting