instruction
stringlengths
24
29.9k
I somehow need to accomplish the following: User accesses a application written in JavaScript. Application uses SSO to identify the user who is logged into Windows. Application obtains the access role for that user for the application. When the application performs a REST request, only authorized users with a specific...
What are you doing to help your users view URLs in emails on mobile devices? Our training program is helping people to understand how to view URLs before clicking the actual link. On mobile devices this is difficult and every attempt is a risk due to having to hold press to highlight or copy the information. What sugg...
PKCE explanation: https://www.oauth.com/oauth2-servers/pkce/ OAuth Flow example: https://developer.okta.com/docs/guides/implement-auth-code-pkce/use-flow/ My question is more specifically: Is there any reason to require state if PKCE is implemented? state stops CSRF attacks by having the app server verify the state it ...
I had a google suspicious activity warning four days ago triggered by logging in from a location I don't use often. I accepted the offer to view the activity and acknowledged that I recognized it. This normally makes the warning go away. However in this instance every time I log back in over the last four days, I get a...
Why use an additional VPN (to prevent against snooping) if https is already encrypted? Is it solely for an additional layer so snoopers need to decode the data twice?
I just want to know how much secure are these games. I coded my own game and now want to know how much secure is. If for example the hash is visible(before you bet) would be possible decipher this hash trying to break the algorythm and then guess the number in the roll just with this hash? And what i need to learn to k...
I saw a website which consists of HTTP and HTTPs parts. that is, the website (80% of it) is over HTTP where as the Payment page is over HTTPs. So would that website be considered as safe ? Can it be exploited ? From the HTTP parts of website the payment part be exploited ?
An application is vulnerable to DLL preloading attack on Windows if it loads a DLL simply by it's name. Windows then goes on to search several folders and loads the first DLL with a matching name. Given access to a non-administrative user account, is it possible to determine which DLLs a process/service loaded, would l...
I am using zip 3.0.0 on macOS High Sierra and Ubuntu. Here is my zip version on macOS: $ zip --version | head Copyright (c) 1990-2008 Info-ZIP - Type 'zip "-L"' for software license. This is Zip 3.0 (July 5th 2008), by Info-ZIP. Currently maintained by E. Gordon. Please send bug reports to the authors using the web pa...
I have an identity service that issues JWTs that are signed with private key. I have several resource services that consume that token to determine the claims of the user and thereby to determine the authorization scope. Naturally, the resource service also has access to the public key counterpart that can be used for...
I would like to know, If I have password of a wifi-router? and I know the MAC address and IP of Target Iphone using this wifi-router, can I get to contents of social media like WhatsApp chats?
I am allowing following character in regex that is dash, tilde, attherate, a-z, A-z, 0-9 [A-za-z_0-9.,\t\r()\\[\\]@ ~/[-]+$] Is there any possibility to bypass these regex? Actually, whenever request came to server, request hits to this page first. Is it safe? actually application is huge in nature so I can't apply ...
Hi I have a WebApp where security is important. E.g. www.somewebapp.com The app has a wordpress blog (hence not secure since wordpress). e.g. www.somewebapp.com/blog To protect the webapp from the insecure blog, the blog is hosted on a separate server. We use nginx reverse proxy to redirect all /blog queries to th...
This question might be better suited for Skeptics, but I guess that those who can really answer this might hang around here. In the second episode of the fourth season of the french spy series The Bureau (see around 0:36 in this clip), one hacker (A) demonstrated how when someone else (B) is taking a picture of him wit...
I'm trying to learn about CSRF Attack and having a hard time understanding that. My understanding is, An attacker can maliciously make a request to the user via hidden value in his website to make a request to Bank website to transfer funds. The browser sends all cookies along with that request initialed maliciously vi...
Just found my current company code on the plain internet. We are talking hundreds of thousands of lines of scripts and configurations, including database schemas and a fair amount of internal information. Looks like an archive of some project(s), all concatenated into one file. Didn't have time to go through everything...
I've seen somewhere that in 32-bit and 64-bit Windows registry structure is different so you need to use flag windows_view="32_bit" in registry object behaviors tag. But i forgot about it and tested my files with OVALdi on 32-bit Windows and then on 64-bit Windows. In both cases i used 32-bit app, so on 64-bit systems ...
Under GDPR, IP addresses are personal data. I have no need to trace back IP to specific users, but I would like to limit downloads to one per IP.* I do not want to store plain IPs. My first solution would be to hash the IP. I could store the hash: 12ca17b49af2289436f303e0166030a21e525d266e209267433801a8fd4071a0 The pr...
I'm wondering, if it's possible to discover all the endpoints for any product which is prone to SQL injection. I want all the endpoints where I can apply SQL injection on my site.
There are situations when I have to give several virtual credit card numbers linked to my real credit card to the same vendor. Can a vendor guess the real credit card number by having multiple virtual credit card numbers?
One of recent CVEs particularly 2019-13615 related to VLC media player, attracted my attention because of the developer reaction: Any non-exploitable read overflow get CVSS of 9.8, like VLC is a server and you could do RCE and compromised the machine, while most of the time, the issue is a crash, often not exploitable...
I found that Bootstrap 3.3.7 is vulnerable to Cross-Site Scripting (XSS) via the data-target, data-template, data-content, data-title and data-viewport attributes. How can I inject the XSS into these particular attributes?
Question: Is stringifying all user input with something like JSON.stringify enough to prevent xss attacks? If not, is there an example of a xss exploit that overcomes this? Edit for clarification: You can assume that the website does allow for html/script tags in user input and the user input gets inserted into element...
When using e2e encryption (secret chats), the answer is obviously no (I hope), but I am talking about NOT e2e-encrypted messages, the ones stored in the cloud. I am of course aware that the messages are travelling on SSL encrypted connections, but are the body of the messages encrypted in any way when they reach Google...
I just began learning ethica hacking from The Hacker Playbook 3, and the author uses AWS an amazon VPS. Can I use a vm using VirtualBox and follow up with the book without problems? Will I be able to do the same things as the author? Thanks in advance.
A few months ago I was experimenting with a project which needed to read a Google sheets page. It didn't end up going anywhere, but today I accidentally checked the project, including credentials.json into my version control. A bit of poking around on Google doesn't reveal anything obvious as far as a control for this ...
If I plug in a USB drive in to an Ubuntu (18) machine, is it possible to get a virus? How can I see if a (Windows, Mac or other) virus is on it? How can I format it to remove any virus?
I ran across some legacy code that uses mysql_query($sql) or die(mysql_error()) Was curious and noticed that with a correctly placed " in the email input ... I am shown output from mysql_error() as a user. You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the righ...
I am running a Windows instance on AWS. The instance has an IIS service running on it. The IIS service has a user associated to it and it has no need to access the AWS instance metadata. I was reading up on https://aws.amazon.com/answers/security/aws-securing-windows-instances/ Centrally manage Windows Firewall set...
Using most OAuth 2.0 flows, a client application can identify itself to the authorization server by means of a "client id" and "client secret." The OAuth 2 specification says that the client secret should indeed be kept secret. However, if the client secret is inside of the application, then it's not secret - someone c...
Would displaying the full Credit Card details (PAN, Expiry date and CVV/CVC) in Online Banking and / Mobile Banking be considered both PCI-DSS and secure? Or what would be Best practice to display the details for the instantly granted (approved) Credit card so that customer can start using it for eCommerce?
I was faced with a security control i never saw before, recent i was in a local hospital and i tried to connect to a VPN server via NordVPN mobile app. The effect? A graphical infinite loop showed up and it took unexpected long while it never successfully connected to all of their servers. I'm sure it was not a network...
In case of an open API, the only possible value for Access-Control-Allow-Origin is a wildcard (*), since you can't have a list of allowed domains. Still, this seems not to bug developpers and appears to keep the system secure. How is that possible? Isn't allowing all domains to make every request the same as not having...
My hosting company have pulled my Drupal website because modsecurity highlighted Pattern match "(?:\b(?:(?:type\b\W?\b(?:text\b\W?\b(?:j(?:ava)?|ecma|vb)|application\b\W*?\bx-(?:java|vb))script|c(?:opyparentfolder|reatetextrange)|get(?:special|parent)folder|iframe\b.{0,100}?\bsrc)\b|on(?:(?:mo(?:use(?:o(?:ver|ut)|down...
When you enter something in the search bar right before it connects to google, can an ISP see that?
Every so often I go back and check our server and find random files uploaded to the domain root directory. They are seemingly cryptic and have names like css2.php db_model.php .htaccess menu57.php rss_feeder.class.php stats21.php title.php This is the content...
I searched for a specific answer to this question and although there are many answers about VPN encryption, I did not find this specific question answered. Setup as follows: MyPC -> VPN -> RestaurantISP -> Internet When I first connect to my VPN service using either the OpenVPN protocol or the app supplied by my VPN p...
I came across CVE-2019-2107 that says ".... With CVE-2019-2107 the decoder/codec runs under mediacodec user and with properly "crafted" video (with tiles enabled - ps_pps->i1_tiles_enabled_flag) you can possibly do RCE." Now after googling for a whole night, I still don't know HOW a malicious guy can "craft" th...
I just read https://space.stackexchange.com/questions/37980/does-the-voyager-team-use-a-wrapper-fortran77-to-python-to-transmit-current and it struck me: how does NASA prevent satellites like this to be hi-jacked? Any security protocol designed in the 70s should be broken by now, shouldn't they? Furthermore, the CPU an...
I've recently started using a password manager (1Password). I have a really good master password (using diceware) but I'm worried that if I forget it then I can't access 1P and all my passwords. One solution is just to write it down on a piece of paper (they suggest I do this), but I don't have a safe and live in shar...
My employer has used an external consultant for penetration testing. The web development team not involved in the pentesting itself and we only received the results and suggestions on how to improve security, so I am not experienced in pentesting tools and methodology. I'm now working on a website development privately...
I use a private IE window to browse facebook (theoretically no data stored locally). I log in to facebook maybe once every 6 months. Two months ago, I used Chrome on the same machine to search for Dell computers, a specific model. Both searches were done on the same network. I logged in to facebook today, and lo and b...
There was this challenge in one of the CTF's I played in which you had to exploit the input vulnerability of Python 2.x . I was just wondering that since the input function in Python 2.x is same as eval(raw_input()) you could basically give a power off or move into another directory. How do you setup the server such th...
I'm doing some experimenting with Kali on my home network and was wondering about something regarding ARP spoofing. When I ARP spoof another device AND the default gateway, Internet access stops working for said device. To get it working, I must enabled the http & https proxies. What I'm trying to figure out is why doe...
Is it secure enough for extremely sensitive information like used in banks? What kind of attack vectors and vulnerabilities does it have? Is the technology used making the contraption safe enough? In all cases the wss:// protocol would be used. P.S I am referring to websocketd.com and its corresponding GitHub page and ...
Was multitasking and mindlessly clicked Squarespace phishing email. Page didn't load, and right away I realized my mistake. Completed several malware scans which came back clean. The button link source was https://sqwe7.com/. The domain was registered on Aug 8, I got the email Aug 9, but didn't click till Aug 11. The ...
In many resources, I see that community strings are also called default passwords. But in the Server Manager, I see "Community name" and it makes more sense. So why people often use the phrase "default password"? If we enumerate the information by their name...
According to robertheaton.com: When a Tor client constructs a circuit, it negotiates TLS sessions with each of the nodes it has chosen for its circuit using the nodes’ TLS certificates and public keys. The outcome of each TLS session negotiation is a symmetric encryption key, known only to the client and the node. SS...
Consider a scenario where my ISP attempts to use a Man-in-the-Middle attack against me to read and possibly modify my Internet traffic. What can I do to access the Internet and still ensure the integrity and confidentiality of my traffic? Furthermore, are there techniques I can employ to make it more difficult for the...
Most of examples for extracting files through XXE OOB (Out of Band) sets up a listening HTTP server and listens to incoming request on the URL requested. However, since the URL length is limited to something like 2048, how would you extract larger files through this method, or other OOB methods? Is it possible to perfo...
I recently bought a new laptop. If you read the news you must've noticed Vault 6 and Vault 7 leaks (from Wikileaks), which contain rootkits which sit on your Hard Drive Firmware, MBR and other hidden partitions. Since it's out in the open not only state actors should be able to make such kind of hard to get rid of mal...
Is there anything to say against to have an amount of public keys, which encrypt a common password for a blob encrypted? So Users 1,2,3 have all certificates for themselves and can use them to get the master password. With this master password they are able to decrypt the key to the blob and in case they need the conte...
I'm trying to figure out if products such as Firefox's Lockwise are a superb idea or a terrible one. On the one hand, installing a third-party addon to your browser comes with inherent risks, so cutting out the middle man and using a password manager made by the browser manufacturer could be seen as having less risk. O...
Bitwarden (as an example) allows you to store your TOTP tokens in it. That is: you can use the mobile app to scan the QR code that (e.g.) Amazon AWS gives you, and then it'll generate TOTP codes. So far, so exactly the same as Google Authenticator and similar. Bitwarden synchronises your "vault" (to their servers by de...
Can a VPN gateway enforce policies in form of checking whether a particular software or set of software is installed on the endpoint and based on that allow / deny the remote connection to be established ?
How secure is KeePass KDBX4 by default if someone obtain the .kdbx file and attempt to brute-force it without knowing any hint of the master password? With assumption : The password length is equal/more than 20 character Password is chosen from a book and tweaked (by change some alphabet into number) Database file enc...
Our web application uses a HTML file with jQuery embedded inside. According to the jQuery license (https://jquery.org/license/), we have to leave the license header intact, including the version number. Our client reported exposure of the product and version combination as a security risk. Strangely, the bootstrap vers...
ISPs where I live charge based on usage. A friend just moved here and blew through 60 GB of data ($115) in a couple weeks. When asked, the ISP provided a .csv of URLs and bandwidth usage over those 2 weeks. A pivot of that data shows extremely high usage at a couple of OCSP URLs (apple, digicert, sectigo) as shown in i...
I am testing an app for CSRF vulnerability and i observed that when i generate a Cross-domain XHR POC with burp and try to exploit, a pre-flight request is getting triggered but this is is not happening in IE. I am able to exploit and perform a state change action in Internet Explorer. What is the reason for this behav...
Currently Working on HP Fortify Access Control Database category. Source: userId = request.getParameter(Constants.USERID).trim(); Sink: pstm1.setString(3,userId.trim()); I saw the definition provided by Fortify that is: Without proper access control, executing a SQL statement that contains a user-controlled primary ...
Consider a front-end JavaScript application where menu items needed to be shown or hidden based on somewhat simple logic (roles that user has and some other logical state). A simple language was introduced to define this logic in a concise human-readable way and every menu item was assigned a string condition, which lo...
I have a yara rule that looks for multiple strings in a file and fires if the count is greater than 3. But how would I change the condition statement to only fire if greater than 3 but less than 5? Essentially I want something like this 3 < (#var_*) < 10 But this statement is not valid syntax. Is there a way to use t...
I have heard that a VPN encrypts your data but a proxy doesn't. So a proxy that encrypts your data is the same thing as a VPN?
I have been trying to learn about XSS, more specifically, POST based XSS. But I am unsure if I actually understand how POST based XSS works. With a GET, you can do XSS with the URL parameters, but to exploit a POST based XSS, you need to use an HTML form(it can be disguised as link tag or whatever, but, ultimately, it ...
What would be wrong with the username/password checker where the response is instantaneous for valid attempts but a pre-built time delay (say 1 sec) is used for unsuccessful ones? It would not slow down legitimate users, but would obviate the need for key derivation functions, and thwart the timing attacks. Can someone...
Not too long ago, I decided to switch to Google Drive and Docs to write my cover letter and resumes, I already use the e-mail address to send them anyways, so using Drive and Docs seemed like a good idea. I uploaded a template document that contains the basic information that is common on every application I send out ...
I am new to Kali Linux and I want to check if ethical hacking and pentesting is my cup of tea. I'm trying to associate my wireless adapter with an AP via aireplay-ng --fakeauth, but every time I use this I get a deauthentication packet. I tried this with WEP and WPA2, and result was the same. aireplay-ng --fakeauth 30...
I've changed ISP and am using their router. I wish to donate my old NETGEAR router still with its original Network Key (password). Would someone obtaining this router somehow get access to my computer files and data even though I am no longer using that network or ISP? Thanks.
Is there any way a malicious actor could know my geolocation by replying to a Whatsapp message I have sent? Will being connected with a user allow me to see their geolocation, or would I have to reply to a message sent by another user before they could see this?
I am looking to setup new internet service with an ISP and would like to purchase my own secure modem and router. Googling doesn't seem to give me the list of what I'm looking for, are there any router/modem suggestions for someone just looking to preemptively secure his network as much as possible from the get go? Als...
Increasingly, I hear of hackers gaining control over digital devices for their own gain or merely to be a nuisance. I don't know but suspect that when tethered to another device such as a computer, malware can be unknowingly passed. Blue Tooth might also be a conduit to the camera logic. Maybe something is hiding in th...
First of all, I'm quite new to web security so this might be a dumb question. Also English is not my native language so there might be some errors. I understand that by having a csrf token as a hidden parameter in a form or HTTP header, an attacker cannot use something like an image tag to perform an action on the user...
The Let's Encrypt upcoming features page lists the following: Multi-Perspective Validation Currently Let’s Encrypt validates from a single network perspective. We are planning to start validating from multiple network perspectives. I haven't been able to dig up any good information on this. What is Multi-Perspect...
I was reading about BIOS vulnerabilities and rootkits that have flashed malicious code to the BIOS in order to maintain access after a factory reset/operating system install or a hard drive replacement i was wondering if i should update the BIOS if a update is available i read online that it is generally not a good ide...
Did something stupid, and asked a question on stackoverflow posted a little too much info without realizing it. Is it a major security risk if your client_secret gets displayed for about 30 min - 1 hour on stack overflow before you notice it showing and you can remove it?
I have not been able to find an answer online so I thought I would ask here. I have setup an Amazon Lightsail instance to act as a development platform for my website. I have setup SSH for accessing administrative tools such as PHPMyAdmin. Would this be sufficent in terms of being able to securly access PHPMYAdmin and ...
We have a HTML file with a minified JSlibrary pasted inside with the license header and version number. Our client reported that it's a security risk (https://www.owasp.org/index.php/Top_10-2017_A6-Security_Misconfiguration) because the version number of the library is exposed. If we use an external JS file and just li...
Couldn't you use brute force to guess someone’s binary number because it's 1 or 0 - 256 times then just keep switching 1's and 0's around- which then can be converted hexadecimal to guess their bitcoin private key?
Today I analyzed my home router. I connected a keyboard to the router's USB port, which is usually used for mass storage devices. However, I pressed the key combination to reboot a Linux system from TTY (<Ctrl>-<Alt>-<Del>) multiple times. Afterwards the router actually rebooted. Now, for me this is a strong indication...
If I have three web servers that all have the same CSR based on a domain, *.domain.com, does that mean all the servers have the same private key? I know it's a short question, but I am not sure of the SO answers I have read. Use the same IIS RSA key on all servers What I didn't understand because I am still learning i...
I'm working on a web application where the main purpose/functionality is notifying users when there have been changes to regulations in a particular industry. The application is subscription based, i.e. you have to pay for an account and using it is a choice. Any email addresses for accounts we hold are active users an...
Here is my setup: Cable Modem >> ASA 5505 >>> LAN I want to be able to see all the traffic that leaves the network such as what websites are being visited, IP connections made, etc. I would like to see this in some sort of browseable report. I am looking for the most efficient way to do this whether it be a logger/SI...
Scenario: Person A's normal computer account is personA. They have locked this out with too many bad password attempts. The user is part of the IT group, so they also have an admin account: personA-admin. They use this admin account to unlock their standard account. On the windows event log, it shows as personA-admi...
Let's say you're creating a banking web application with mobile apps. A bank user has permissions "transfer money" and "view balances." When a user logs in, we can create a session token (typical random string, stored in the database on the server and in a cookie or device storage on the client) with "view balances" pe...
I'm working on a vulnerability within an application that uses .NET Remoting. I can see from the code that there are a number of potential ways to get RCE, but due to how the application performs its communications I cannot just replay the traffic with a modified payload that triggers the vulnerability. I would ordinar...
Quoting from McAfee MVISION CASB Many cloud services use custom content disposition headers in an effort to improve the performance of their applications. These custom headers have the unintended side effect of preventing network security solutions (and on-premises DLP solutions that integrate to them via ICAP...
I am doing this online lab where I am hosting a Kali Linux box in VmWare fusion, and VPNing into the online lab. These are my networking adapters once I connect via VPN: eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500 inet 192.168.0.44 netmask 255.255.255.0 broadcast 192.168.0.255 inet6 fe8...
I ran across an opportunity for SQL injection the other day in some legacy code ... // input: email@email.com" $email = $_POST['email']; mysql_query('SELECT * FROM users WHERE email = "'.$email.'" '); // output: you have an error in your syntax near " ... // input: email@email.com' mysql_query("SELECT * FROM users WHE...
I am trying to use ncat from Kali to connect to another ncat instance running on Windows 7. The exercise requires the use of SSL. The Windows instance is using ncat v5.59BETA which does not support the sslciphers switch to just set to ALL. The Kali box is using ncat v7.70 In my setup Kali is acting as the client and Wi...
I am trying to analyze the possibility of accessing keystrokes from an iframe using a javascript running on the parent page. The potential attack which I am looking to verify is Cross Frame Scripting. From the OWASP page, I read that the listener in parent page would get notified only if the keystroke events are from t...
Background: a traditional webapp with a server backend and 3rd party sign in. For this we get a validated id_token on our backend from the 3rd party, use that to identify an account in our system, and issue our own session cookie. We don't need access or refresh tokens from the 3rd party, and the front end doesn't need...
How does malware use the Tor network to keep hidden services safe from takedowns
I hosting my site on infinityfree.net for free and dokuwiki is installed there. Couple of my colleagues, including me, are going to use wiki for writing documentation for our project. Wiki is private, and only I can provide new accounts. Also, there is small chance, that I can give temporal read-only access to third pa...
I have keybase running on my Linux Desktop (Ubuntu 19.04). Since a recent update, the file ~/.config/keybase/gui_config.json is owned by root which is quite irritating. One negative effect of this is that I cannot add the file to my backup. All the file contains is { "gui": true } Does anyone know if there is a v...
For MFA I now use Authy (owned by Twilio) instead of Google Authenticator. I find Authy more convenient because it syncs your accounts between several devices and several authy installations which Google Authenticator will not do. Authy also displays the remaining time before a token times out so that you can see if it...
I would like to be able to decrypt my server's https traffic for debugging and analysis. My server is a debian 9 Apache2 server running mod_wsgi and django. I have seen this post: Extract pre-master keys from an OpenSSL application and I figured out I might be able to use https://httpd.apache.org/docs/2.4/mod/mod_ssl.h...
I would like to create a private mobile hotspot on my smartphone that I will connect to with my laptop to do online banking. My laptop will connect to my smartphone wirelessly, then my smart phone will transmit the data over the 4G network. I use my (Android 8.0.0) smartphone quite liberally when it comes to surfing...
Recently it has come to light that tech companies such as Facebook and Microsoft use humans to listen and transcribe audio conversations on Facebook messenger and Skype to improve their AI. However this only occurs when the app is active. I'm a little concerned if it is possible for applications to listen to backgroun...
I’m a layman in security and was trying to understand how hashes and encryption algorithms are used in Veracrypt/Truecrypt. Reading the documentation, this is what I understood (please, feel free to correct me if I’m wrong): For simplification’s sake, let’s consider a non-system volume, no hidden volumes and no Cascade...
I have successfully used the aireplay-ng --deauth attack on a network with a single access points, but when trying on a network with multiple access points (e.g. a network using Google WiFi) it doesn't seem to work. From what I understand, the device automatically switches the connection to another access point on the ...