instruction stringlengths 24 29.9k |
|---|
I recently found my self in need of developing a public API for my application. I developed my application with node.js and MongoDB. After some research, I decided to use jwt for generating API keys for users and authentication. For authenticating jwt tokens, they come with the benefit of not needing to store them in a... |
Why is there something like a cache inclusion policy?
What is the benefit of using such an inclusive policy for the cache layout?
I'm asking because with inclusive LLC there you would be able to evict lines in the private L1 cache of another core.
And this would allow us to perform a flush&reload attack.
|
I read the following on Microsoft's site. Can someone please clarify -
"With TDE, is the data stored in my data, log, and backup files protected from a disk theft?"
Yes, but only if the files are stored on a separate disk separate from
the OS image, and if the attacker does not steal the disk containing
the OS ima... |
I want to give a logged in user the ability to search for other users by their exact email. The search input is passed asynchronously by Javascript so the email would remain in server logs and so on. The connections are HTTPS only (cookie secure=true). I am based in Austria so i have to handle according to our DSGVO an... |
This question also applies to clipboard monitoring.
Imagine you are planning to deploy 100,000 copies of a Windows trojan with keylogger functionality. (For the record, I'm not talking about myself here.) Your trojan is going to send you megabytes of user input every day, 99.999% of it irrelevant. How do you find passw... |
I am interested in how DLP systems work. I have noticed that developers of DLP say that the software can see messenger traffic including end-to-end solutions. I understand MITM, certificate change, but in the case of end-to-end, how does it work? There is encryption between two devices, the third device cannot see it, ... |
I'm working on an exploit development challenge right now in which I've been presented with a compiled binary and I have to exploit it on a remote server. No stack protections have been enabled and ASLR is disabled. I've written the exploit successfully and tested on my device and it works. However when I run it on the... |
I would love to understand at the most basic level what their differences are.
When is each one used?
Any advantages and disadvantages?
|
My question is build on top of the answer of the question about SUID exploitation:
SUID not used after exploit
The person (official answer) is stating that:
Many popular implementations of sh drop privileges when they start up: they reset their effective UID to their real UID. This includes bash, dash, mksh and BusyBo... |
I'm not sure I posted in the right place, but I posted a question about an apparent scam that hinges on GoFundMe's particular behavior at https://money.stackexchange.com/questions/112175/is-this-gofundme-response-a-pattern-of-scam-behavior . From the feedback, people were eventually convinced I'm possibly right, but no... |
In my current project I am also setting up the area of security testing. So far there was no way to use security within the REST API development. Beside the known approach, e.g. using static software solutions within a staging environment, the topic Rest API Security Guideline came up.
Of course, there are always artic... |
We are going to analyse some traffic on our network. Some streams are encrypted and we know that the encrypted protocols aren't IPsec.
We suspect it is using MACsec and we are looking for some way to detect that.
Is there a way to detect the type of packet encryption?
|
How to map URL IOCs in the OpenIOC domain? I thought Network/URI would be the more appropriate term but then I saw an open source project mapping from Network/URI in OpenIOC to URI in MISP and from Network/String in OpenIOC to URL in MISP, I'm not so sure.
What is the meaning of the "type" attribute? For example, regar... |
From this FAQ, I understand that BitLocker uses the following keys to encrypt the hard-drive:
Full Volume Encryption Key (FVEK) (used to encrypt raw data; encrypted by the volume master key and stored on-disk)
Volume Master Key (VMK) (encrypted by a key protector and stored on-disk)
Key Protector (KP) (TPM or numerica... |
Currently I am working in code review process.
I have few doubts regrading Path Manipulation Vulnerability.
Some portion of the Path is already hard coded and with extension
public class ReadFile {
public static void main(String args[]) throws IOException {
String fname=args[0];
fname="C:\\Use... |
I have some users that prefer to create a new user account instead of resetting the password (or investigating why there is an issue with the account). Then delete the old account.
I've personally found that this is generally bad practice for an admin and a suspicious pattern from a security point of view (user SID cha... |
Currently I am in a project where I have to test REST APIs among other things. In another question of mine I also discussed the topics Definition of Ready and Definition of Done regarding security.
Since I am planning a new staging environment for Dev - Test -Stage -Production, the whitebox penetration test topic is al... |
I have given an app to test, on which I ran a quick scan in composition tool like Protecode, It shows all component (like okhttp, protobuf,okhttp etc.) used and existing vulnerability.
My question is, if I want to list all component and its version/vulnerability manually, so how can we do that?
Thanks!
|
I just recieved some generic work related mail with word file attached that was requesting to Enable Editing in order to view its content. I'm not going to fall for it but it got me wondering. What could possibly happen to my PC if i enabled the editing there?
|
So for example one of the famous alternatives to Virustotal aka Nodistribute.com claims that it doesn't send the file to AVs, but if it doesn't, then how can they scan it? just by checking the hash? if so, wouldn't that make the scan pretty much useless?
and if it does send the file to them, then what's the difference... |
I am setting up a private home management system containing several daemons/servers and a few clients to connect from.
I am trying to achieve end-to-end encryption with the most monitoring and health check processes I can in order to create trust in this homemade system.
Tl;dr:
I want to ensure the authenticity of ever... |
How can you generate a cryptographically safe integer that falls within a range in C#? I am trying to satisfy a Veracode issue reporting CWE-331: Insufficient Entropy. Obviously the code below is not cryptographically secure.
Random rand = new Random();
return rand.Next(999999);
I generally use the RNGCryptoServicePr... |
The communication is not encrypted during the SSL handshake. If an attacker conducts a man in the middle attack between server and client to capture the certificate, and change the public key in the certificate and send it to client, then the digital signature is same, all the properties except public key are same.
So... |
I have a VPN and PKI in place with MFA. My question is: What's the best method/solution for protecting the integrity and identity of end-user certs? I want to make sure that users only able to use VPN with company provided devices.
Cheers
|
I'm currently building a web based membership application form that will require a user to enter an SSN and other identifiable information. Part of the requirements of the membership application is to allow a user to be able to resume their application and pre-fill of the information they already entered into the form ... |
I've read the PDF 1.7 spec 7.11.1 (okay, not all the spec, but a part of it), and I've seen that you have what Adobe calls /Filespec type objects.
As far as I get it, this means that a PDF can make a reference to a local file (or even a remote file using URI scheme) when opening the PDF. This would be a pretty neat way... |
I'm having some problems to use Github and Bitbucket using Git+SSH. Debuging using ssh -vvv github.com and ssh -vvv bitbucket.org I see the following output line:
debug1: Server host key: ssh-rsa SHA256:KlUGRblWqoKHE/El3La1HXdxh3SdS4UCU+M456GPyIk
I can see the same output line when I ssh to serveo.net. In this help pa... |
Is it possible to find the BIOS password hash in a BIOS dump and decrypt it?
For instance, a person could use flashrom Live CD to dump the BIOS with flashrom -r but how would you find the BIOS password hash in the bios dump?
|
I work at a place that gives Wi-Fi to all the customers, with a password that is 19 characters long. A customer came in and claimed that because the password is long, it slows down the internet speed. Is there any truth to this claim?
|
A recent scan of Acunetix has shown some vulnerability on one of my pages. I tried reproducing it but i can not find any vulnerability. The so called vulnerably is titled The input is reflected inside a tag parameter between double quotes mean.
The scan gives me the following result for my page.
verif.php
Details URL... |
We have a platform where users can sign up for free using their email addresses (they can also associate social media account). Other than the name, email and social account there no other personal information is held about the customer. There is a possibility that the user account may be compromised through brute forc... |
We have an API which has SSL certificate signed from authorized CA. The access to the API is limited. API is accessed from webapp and only from those client who have valid public key for SSL. Now, how can I distribute the public key to the client or issue the ssl certificate to only authorized client who need to access... |
Theoretically, wouldn't it be impossible to be traced using Tor + Virtual Machine? Assuming you connect to a website trying to track your personal location.
Your IP address is completely hidden by Tor, then using a virtual machine, your browser and other computer settings completely change, so shouldn't you be complet... |
I have a web application. The application needs to connect to the database to read/write information. The database can be accessed with username/password or certificate.
Is it possible, somehow, to encrypt all this communication so even the Application administrator/OS administrator cannot see database password in plai... |
Can users actually use the 3DES cipher to connect to a Tomcat web server, if the 3DES cipher has been disabled via registry keys in Windows:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers\Triple DES
dword enabled 0 and dword disabled by default 1 for both client and server
Nmap s... |
I'm hitting a roadblock when it comes to security for managing scoped permissions for servers.
Right now I run a community which can create sub-servers. So community A can allow certain users to moderate it, change settings, invite users, read logs etc for their own sub-server, but not others.
My current system has a g... |
Sorry for the vague description as i do not know how to properly describe this problem.
When some web pages are loaded, the formatting will be the wrong size and in strange places. in addition every drop down menu appears without prompting and it seems to not be able to load certain data.
This only seems to occur o... |
I was using a unsecured website to watch movies and my windows 10 alert went off saying my registration code had been blocked or something to that nature and to call1(888)2521262 .. tech support.. they basically told me I can’t change my IP address and the only way to fix the issue it to pay 500 for firewall protection... |
My fiancé has a drunkard, terrible ex. She sent me a screen shot of her phone saying he sent her a text but it’s not on his phone. He said he didn’t send it. The number at the top appears to be his in the screen shot. It is in the same texting flow as a conversation that had happened earlier. Is this possible? The scr... |
I'm reading a security policy, which seems to be a system security policy and there is an item that requires the system to implement a specific standard, something like "Implement the standard XYZ". Standard XYZ specifies a set of default protections that must be implemented.
My question is, shouldn't this be only a p... |
Our company is limited to using products that maintain FedRAMP compliance, and we are looking to implement a new data collection tool. We are interested in a product that utilizes Microsoft Azure, which I understand is FedRAMP compliant. Is FedRAMP something that applies to this new software (or company that develops... |
Is is safe to backup programming projects (for example websites that where made using HTML/CSS/JS with the help of some frameworks and libraries (Bootstrap, jQuery, etc.), C# projects made with the .NET framework or websites with backend made with PHP) from a possibly infected computer? What messures can I take to back... |
Disclaimer: I have minimal web-dev/security knowledge so please answer as if talking to a "layman."
I've heard that web-advertisements need to be able to run their own JavaScript so that they can verify they're being viewed by "real users." As this incident on StackOverflow shows, they're basically given free reign.
I ... |
We are currently sending the card PIN via SMS. We do not store them in any way, neither do we have the possibility to change it. The only way to change it is for the customer to go to an ATM and change it there.
We face a lot of customer incidents due to the SMS never arriving (it is a problem with the vendor).
Since w... |
We are trying to decide the best approach to designing our new interface with our consumers. Currently we are talking about an Rest API. However there is some debate among our team about how to handle a specific situation. Currently, our consumers make a post to our service with NPI/SPI data, we take that data, gathe... |
My web hosting provider requires my ssh password and one of or both private and or public ssh keys to setup ssh access. This seems like a security risk to me. Aren't private keys supposed to stay on your machine. If I gave out my ssh password couldn't they just create my private and public keys themselves? Wouldn't tha... |
Let's say that a fictional company, AwSemCo, discovers that a published vulnerability "CVE0day" affects their systems and they immediately start investigating it. They go to the web looking for a solution, what to look for forensically if they've already been hit, etc. As employees at AwSemCo are searching all about ... |
I work for a very large, tech heavy organization and I use WiFi at work - been there for many years and have been using their WiFi the whole time. I also use iMessage almost exclusively and I’m starting to wonder about general security of my messages while on their WiFi, are my messages actually private? If an employer... |
I have a rooted android phone and I know there's a malware in the phone . The malware is capable of automatically connect to a nearby bluetooth device or wifi ap and stream whatever I do on the phone to the attacker .
My questions :
What is the best way to dig out the malware ?
Which part of android filesystem should... |
On the Nmap home page in my language, I can see -sP scan, but on the English version of the site, I can't see it. But I see -sn that looks very similar, I want to understand what's the difference.
|
I've been playing around with different login forms online lately to see how they work. One of them was the Facebook login form. When I logged out of my account my email and password were autocompleted by my browser. Then I decided to misspell my email and see what would happen if I tried to log in.
To my surprise I lo... |
I'm just getting started with the book 'Practical Malware Analysis', some of the exercises are using PEview and Dependency Walker however I'm slightly allergic to using Windows.
Is it possible to analyze windows malware on linux without using VM's or does this require using Windows?
|
I want to move data from an insecure host to a secure host, e.g. to update the software on a Ballot marking device, or move data back and forth between such hosts. But as we know, even common thumb drives can stage BadUSB attacks.
Until 2019, I was thinking that SD card interfaces were significantly less vulnerable tha... |
So roughly 2 weeks ago my Remote Desktop was compromised whilst I was actively interacting with my server via Rdp I was prompted with a disconnect status equal to “ Another user has connected to remote server “ which obviously raised alarms so I began checking my event logs and found a third parties IP had connected su... |
Let's take Google and other popular bank websites which uses cookie.
I've been working with a website using Angular which uses Laravel as an API. Data are stored in cookies which is vulnerable in client side including the JWT.
For websites using cookie-based authentication, what security implementation and practices ... |
I am new to security work and I am implementing someone else's design. The design calls for a TCP server with TLS in an environment where there is no DNS - only IPs.
I am working with a typical certificate chain (Self-signed Root cert -> Intermediate cert -> Endpoint cert). The TCP server presents the Endpoint cert to ... |
Something similar to this happened to me recently.
According to the suggested actions in the post:
Do take the device into the dealer and make them explain what those messages are. If they can't figure it out ask for their security department contact details.
Do contact the security department for the devices service... |
I am thinking about using nonce and secure request to API Server. Is this the right implementation for using nonce?
PURPOSE
Protect API Server from Replay attack
Protect API Server from MITM attack
Protect Core API Server from Resource exhaustion attack
IMPLEMENTATION
== ALL REQUEST IN HTTPS ==
PREPARATION:
[CLIENT]... |
I tried to brute force a http-get service using -M option with list of servers of which some host are down/offline.
However when hydra reaches to offline host it tries to redo-attempt many times on the same offline server which makes hydra very slow.
Syntax provided
hydra -l admin -p admin -M (Target ip list) -f -V ... |
In the normal process, users request to logout from the client-side, then the server revokes that authentication cookie. Everything works fine if the network works as expected.
But it seems that there is a security risk in the situations described below:
situations:
I set an authentication cookie for logged users on t... |
Apparently, there's a new speculative execution exploit in town on Intel CPUs: SWAPGS. It takes research on Meltdown and Spectre to the next level and targets the root of the CPU.
This is not the first SE exploit, and probably won't be the last. But how does this one manage to evade all the patches developed for the ot... |
I had checked youtube.com and stackoverflow.com. And found both of them can not log out if the network is unreachable.
I think this is a security risk, right?
Please image a situation below:
I visited this website on my friend's computer. And before I leave, I clicked the logout button but the network is down in that... |
In my work with online orders, I started noticing an extreme abnormality in a few orders. In one field that wasn't restricted there appeared a string of over 3 million characters that were totally gibberish consisting mostly of Cyrillic characters. On closer examination using Python, it turned out it was actually a lis... |
I was working with a users computer yesterday because they complained that an MS-Access Database they were using said that an ODBC datasource was not accessible.
I went to change the settings on the ODBC data source (which was under the systems tab) and no matter which account I logged in with I could not click the dat... |
I know that all servers should at least store my credentials as hash(password + salt) + salt, with a secure and well known hash function and a salt unique for me, generated from a secure and well known source.
The problem is that servers should do that but may not, so as a user I can't trust them.
I am looking for what... |
Scenario: User searches for something and gets a link to a sub-page on a site, proceeds to go there, but is asked to sign-up/login - they do so, only then once they are logged in, they are redirected to the main page or the "mobile" version of the page, as opposed to the one that they were originally intending to view
... |
My AWS infrastructure is publicly available here.
Is this a security concern?
I was prompted to ask this following the Capital One breach and after learning about https://opensourceinfra.org/
Please be nice and don't hack me if it is indeed insecure. I did my best in reviewing the repo for security breaches. I'm just p... |
I want to build a service that collects user spending history with their permission. Users would send over (banking, credit card) account statements and I would extract, store the following information:
Date
Description of transaction
Amount
Account balance
Unfortunately, I noticed that credit card statements also co... |
I have a situation where my users need to be able to access the internet and search engines to be able to perform their jobs. My problem is that I need to prevent them from being able to upload files to the internet through any means. With most sites, even malevolent ones a lot of the time, using https I am guessing th... |
I would like to know if in metasploit for any given exploit its possible to use a target list instead of a single target and if possible how is that done?
|
I'm having trouble understanding how to set up SSO between my app and another app we have deployed. I'm new to trying to set this kind of thing up, so I was hoping someone could explain whether I'm on the right path, both from a standpoint of making it work as well as a standpoint of making it secure.
We have our app (... |
I am looking for recommendations on how to implement our CSP policy. We have an Angular SPA application, that has an iframe without any src attribute. We populate the content of the iframe dynamically based on markup that we receive from an API. The markup that is returned from the API could have scripts that are not c... |
I distribute a client application where I would like to identify a user's hardware specifications when they begin interacting with my server. I am specifically interested in identifying the user's GPU make and model, but I would appreciate hearing techniques applicable to other facets of the hardware such as CPU or RAM... |
Logging in with a username/password can be annoying on non-keyboard devices (game consoles, Rokus, etc). Many media apps on these devices improve on this process by letting me activate my device on my account via these steps:
I download and open the app on my device. It displays a 6-character code.
I log into the web ... |
Is client-side password hashing still necessary / useful when using TLS? What about TLS protocols with PFS (perfect forward secrecy) like Diffie-Hellman?
Let’s say that I’m running a web application which uses authentication (like most websites). Let's say that I'm already doing server-side hashing. As a developer, I... |
As per my understanding, after the TCP three-way handshake we send a TLS ClientHello which has the SNI field in clear text and anyone can see which website I am trying to connect to.
Isn't it a threat that anyone can see my secure website?
The second issue is in case of proxy in between we send the HTTP connect packet,... |
I have been doing some research about using OAuth2.0 on our mobile application, but I'm really having trouble deciding whether OAuth2.0 really is the best choice.
Since we are not interacting with any 3rd party, we don't really have to go through the Authorization stage to authorize the third party resource.
One other ... |
My question is about a malware on the device Iphone 6s.
Can a malware on Iphone survive to an hard factory reset ?
The malware would be installed from the shop where I bought it.It's a second hand device.
IMHO it could be, because the upgrades of ios don't have to be installed after the reset.
Is my assumption correct?... |
We have a client that runs some native (C++) code on both Android and iOS, to mitigate MITM attacks we use certificate pinning.
This means that the binary includes some strings (const char * const bla = "XXXXXXXXXX") that identify the allowed certs to enable HPKP.
Some are worried that nefarious users will easily ident... |
Remoting from a Tails machine to a Windows one.
I have been working for a couple of days on making it work with no avail.
Using Tails with small persistent modules installed (iceweasel, remmina, proxychains & a couple others).
I contacted the small Tails dev team on their XMPP.
They asked me to document my trials and... |
I know .1x is the protocol that actually does the job, does RADIUS have to be involved in this process, .1x only works with RADIUS (AKA NPS on server-side Windows)?
|
I am implementing the password reset functionality using OTPs (one-time passwords). When the user clicks on the 'forgot password' link, he / she is sent an OTP and is redirected to the OTP input page. After typing in the OTP, the user is then redirected to the 'update password' page.
How should I prevent any user from ... |
I am running an Android One (ie vanilla Android supported by Google) phone which has Android 8.1. I have unlocked the bootloader and rooted my device.
Because I've rooted my device I have not been able to apply "System Updates" to my phone for close to a year. Revisiting the available versions I see new versions are ... |
How to do NCrack bruteforcing for http-get service using -iL (mass scan) options where server is having different port.
|
We have MAC OS for our developers (running with root). We also deploy an DLP endpoint agent. Now what happens, in some cases they just sudo and uninstall the agent because it slows down the machine. What options do we have to prevent them doing that ? I guess technically there's probably nothing that can be done, right... |
I know that the vulnerability is a bit old,but still an important one. Today, by chance I found out that a PC with Windows 7 didn't have the update applied and I'm wondering if there are more.
Most of PCs are on WSUS and all of them on a Windows domain. I was looking for tools to detect the problem (either Linux or Win... |
I am looking to disable ASLR (address space layout randomization) inside a Docker container. Not sure if it is possible. The container is running on Alpine, but from what I understand, ASLR is a Kernel feature and Docker uses the host kernel to run, thus not making it easily possible to disable ASLR only for Docker.
Ho... |
My company has been the target of a mail fraud attempt for the second time this year.
The fraud goes as followed:
My company sends an invoice to a customer from the email address alice@mycompany.com (alice is responsible for invoicing).
alice@mycompany.comsends a reminder because the invoice hasn't been paid yet. The ... |
It has been two days in a row that I spend hours trying to decrypt kerberos traffic using wireshark.
For learning purposes, I want to be able to read the encrypted parts of tickets and authenticators inside of wireshark.
I know its possible and wireshark supply an option to import a keytab file.
I read about a tool nam... |
I am trying to use certificate chain verification in Linux kernel.
The purpose is to use IMA/EVM with public keys that are included in x.509 certificates signed by an own root CA.
For this purpose I have used the scripts shown in create local CA and create IMA key as a basis. Of course I have adapted content of the gen... |
I use Google Cloud Platform to serve the site I manage.
I have one load balancer there, which controls the movement to several virtual machines.
When I came across the problem of DDOS attacks on this site, I started using Google Armor to block the intruders' IP addresses, but over time, when the problem escalated, my t... |
At least some decentralised networks purported to provide anonymity are vulnerable to this attack: the original software is modified to allow tracking/logging/whatever, and a large amount of nodes running this modified software joins the network. The larger the proportion of attacker's nodes is, the less secure is the ... |
Hi I have read recently very bad things about WPAD vulnerability for example here nakedsecurity.sophos.com/2016/05/25/when-domain-names-attack-the-wpad-name-collision-vulnerability/ (article from 2016) or here blog.redteam.pl/2019/05/badwpad-dns-suffix-wpad-wpadblocking-com.html. (article from 2019) How to defend aga... |
I have an extension in Chrome, called Daxab ultimate, that I use, because on certain adult sites it lets me stream the video in 1080p and without the extension its 720p.
So, if I turn on the extension, that is, if I enable the extension only while I am on the site, and the rest of the time, I manually go into chrome ex... |
I had a situation that struck me as odd.
I opened an image which I had downloaded via browser save-as.
After the finder/OS initiated the file-open,
a modal dialog momentarily flashed, typical to when a .dmg file is being opened.
This went away without interaction, and the file opened in Preview.
What could have... |
I need to use a KMIP server for a project and searched for an open source solution. The only viable options I found are PyKMIP (https://github.com/OpenKMIP/PyKMIP) and KMIP4J (https://sourceforge.net/projects/kmip4j/).
The problem with PyKMIP is this warning:
"Warning: The PyKMIP server is intended for testing and dem... |
There is a cron job running as root on a web server every 15 minutes:
php cli-script.php
(cli stands for "Command Line Interface", so is only accessible from command-line)
It is not possible to directly modify the PHP script cli-script.php. Hower it includes another PHP script db.php which can be directly modifed as ww... |
Someone had asked me to take a photo, “from my mobile phone” of what looked like a QR code and above that code was a string of numbers that was on “his mobile phone screen”.. (As he wanted to then read my screen, “the string of numbers” , to type it in to his phone as of course he couldn’t remember all the numbers and ... |
Is it possible, via MITM attacks (or other techniques), to hijack an active reverse shell that is running as root, while I am an unprivileged user?
root 2108 2107 0 13:55 ? 00:00:00 /bin/bash /usr/local/bin/run-parts --lsbsysinit /etc/update-motd.d
root 2109 2108 0 13:55 ? 00:00:00 ./tmp/nca... |
If you're sending me a message, you can:
a) Encrypt the message using your private key, and I can decrypt is using your public key.
b) You can create a digital signature of your message, and then send the signature along with the un-encrypted message.
My two questions are:
1) I read somewhere that in the (a) scenario, ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.