instruction
stringlengths
24
29.9k
I do a pentest for a private server protected by Cloudflare. I bypassed the WAF and got the real IP for the server, then I scanned it with Acunetix and I found: Apache Struts2 Remote Command Execution (S2-052) > POST /ar/ictc/news.jsp HTTP/1.1 Content-Type: application/xml > Connection: keep-alive Cookie: > JSESSIONID=...
According to this blog post (which I assume is an accurate description of the breach): https://www.vpnmentor.com/blog/report-biostar2-leak/ a large amount of very sensitive BioStar 2 biometric data has been leaked. I'm not familiar with BioStar 2 but I had been fingerprinted in some situations in the past and I'd like ...
I am investigating the possibility of testing a system which relies on SSL/TLS with a client which, for testing purposes only, has a very different clock time, at least several weeks different from the actual time. I am aware that if the client's clock is very different from the server, the server might reject the clie...
I'm writing an experimental authentication protocol and need to see the unencrypted URI's of the HTTP Call, but want to provably show that I can't see the data. Does any standard, or feature exist that allows me to receive a HTTPSCall where I can only see My authentication string The URI being accessed (nothing else, ...
I have access to a VPN network while I'm in my office. If I'm in the VPN I can access sites that my office network has blocked. Can the IT admins see that I'm going to those sites? And if so at what part of the network is it visible?
In the context of safety-critical systems, such as transportation systems, it is important to verify if such systems meet/do not meet safety requirements. ISO26262 expresses these requirements as a maximum number of failures per hour of operation. It is generally of a very small magnitude for the most critical compone...
Just Curious to Know, Where my information is being stored and how long its kept for I'm running the latest version of windows 10, my main Browser being firefox developer edition 68. I clear my history regularly, as it clogs up memory and is unnecessary wasted resources. However, I can completely Clear my browsing hi...
Consider a proxy that doesn't intercept TLS, but allows CONNECT tunnelling, but only to limited ports (eg: 443 only). If someone runs an ssh server on port 443 and connects to it using CONNECT, would it be possible for the proxy to detect that the protocol inside the tunnel is not HTTP, and block the traffic?
I was recently sent a notification by https://haveibeenpwned.com/ that one of my email addresses has been found in a breach, in particular in a breach of https://www.chegg.com. I am positive I never signed up for an account there, it's a US education company and I am not from there, nor did I ever have anything to do w...
I'm currently trying to figure out the best way to configure Windows PowerShell logging, so that it is secure (Attackers cannot gain sensitive data out of it) it helps in DFIR (digital forensic and incident response) cases The CIS Benchmark for Windows 10 (latest is v1.5.0 for release 1803) recommends to completely d...
Recently, read an article about phone number being used to hack into one's account. NYTIMES-Phone hacking What needs to be done to prevent my phone number being searched? (Return invalid hyperlinks instead of providing all info).
I'm playing around with learning encryption with a mini messaging project, so far I can do symmetric encryption (AES) where everyone shares the same key, obviously not secure or ideal, I want to learn how to implement a true end-to-end encryption system. I've been told RSA is what I should use? My question is, Do I g...
The first step in a kerberoasting attack is to discover Service Accounts via AD enumeration. One way to do so is searching LDAP for any registered SPNs (Service Principal Names). However, from my understanding, service accounts may exist with no SPNs set. This seems to be confirmed here, specifically; While SPNs are v...
On my system (Ubuntu Server 18.04, if that matters) I have two servers. They are behind a Nginx reverse proxy (i.e. accessing service.mywebsite.com internaly proxies the request to 127.0.0.1:servicePort). I have one server which is responsible for authenticating the user and generating access tokens. Basically it store...
So I am testing a website and found out I can inject most characters, here is what I have found: " is always escaped with \" < and > are not escaped Interestingly, / is only escaped with / if < and / are put together. In other words, if I have < / instead of </, the / won't be escaped. Note I have put a space in betwe...
How long would it take to bruteforce a PGP-Encrypted-Mail? If I'm rightly informed, it depends on the bitsize of the encryption Key.
Is it possible for Chrome extensions to monitor users without them knowing by taking screenshots and/or video? There's an extension called Screencastify that allows you to record your screen. This particular extension (and many others) has a function that allows you to record your entire browser window. And here's the ...
On Linux and/or macOS, how can I check if a device is vulnerable to a Key Negotiation of Bluetooth (KNOB) Attack? And if a device is vulnerable, is there something I can do to mitigate the danger?
Purely for research purposes used nmap to check security of my application deployed to Firebase. However, there some questions which I can't understand: Why Firebase has open so many ports? Something like few hundreds. Almost on every port I'm getting an error auth-owners: ERROR: Script execution failed without any in...
I'm researching ways to make the most secure encryption for additional fixed drives to protect against unknown vulnerabilities, side channel attacks, etc. Basically, securing the data beyond just a single password on ALL drives. The OS utilizes a TPM and has secondary input measures such as a PIN. It was my hypothesis...
I understand that Digital Certificates and Certificate Authorities (trusted 3rd parties) help prevent man in the middle attacks during HTTPS connections. However, I am confused on a few details. Let's say we have a client Alice and Bob who has a server mapped to "bob.com". When Bob (bob.com) asks a CA (let's say veriSi...
I have to execute my .o or .out binary file pre-compiled with gcc, it should be intended to let the user execute the small program so an action is made that connects with the app installed on the user's phone. But i want to prevent other code not related to this concept from being executed at the same time. What i have...
How do hackers/scammers know that I clicked a link? Why is my personal info in the url redirect link? Is this info then being stored in a database and the hacker/scammer knows that because this specific link was clicked it must have been me? I received a dodgy email with a link and was curious. So I activated my VPN an...
When we test a shellcode, we add it to a small C program and execute it in order to see it does the actual job we expect. But most of the time, it crashes saying 'segmentation fault'. I got the same issue when I execute it on my Linux machine. Here is what I got from an article. It happened because the .code section is...
So, Satoshi Nakamoto, creator of Bitcoin has announced that he will supposedly be revealing his real identity. I find the fact that Satoshi's company website is hosted on Wordpress to be endlessly amusing for some reason. I mean, I get it, I use wordpress myself but I always saw it as endlessly vulnerable from a securi...
I have a problem that I have been pondering off and on for a while and I want to see if anyone has a better answer: Is there a way to see where an AD security group is used in an enterprise WITHOUT having to go to every single application/file server? Research, experience, and my thoughts My background is in AD securit...
I've recently had an interesting interview exercise I haven't completed and it does puzzle me what kind of filter/protection they've used. The vuln app is a PHP with simple MariaDB (5.5.56) back-end, where name FORM is vulnerable to SQL injection and challenge is to get FLAG value from diffrent table. In first exercise...
Lately, most banks (at least in Germany) are promoting the photoTAN procedure as the most modern and secure way of authorizing transactions in online banking, see for example here. However, searching online I have not been able to find any explanation of how it actually works: I can only find very detailed explanations...
It's my understanding that passwords I save in Firefox's Password Manager are encrypted and that setting a Master Password encrypts the encryption key used in this process. The Google hit for "Does firefox encrypt saved passwords?" returns this Mozilla Support forum article in which the chosen answer (posted by a moder...
I am considering using Wordpress, WooCommerce, third party payment processor and different plugins for an ecommerce store. I have trouble figuring out if it is possible to do all that and to be PCI DSS compliant and SAQ A eligible. PCI DSS glossary defines service provider as follows: “ Business entity that is not a pa...
I'm creating a messaging system where users send encrypted messages encrypted by the receivers public key. The receiver would decrypt the message using his/her private key. As the messaging service, is there any way that I can validate that the encrypted message has been properly encrypted by the receivers public key? ...
WhatsApp has the option to download a Windows (or Mac) Desktop version. Installation requires pairing the software with a mobile phone. I have read a similar question about Android devices, and according to this answer, in my case, the Desktop PC would be considered a Secondary Device. My question is: Which forensic t...
The browsers have some capability to detect the phishing pages, but they are not able to detect all. Why is that? Phishing still remains to be one of the most convenient way to hacking. Why is it not possible for browsers to detect all phishing pages, and not only the obvious ones.
I was reading the wikipedia article on this subject and it states that when a program starts, the canary is calculated at random, stored in a local variable(which I presume was introduced by the compiler) and is padded by unmapped pages but i'm having problems understanding what that actually means. Is it that this g...
I have developed the application and now it's time to distribute to my users. I was reviewing my application and reading security best practises and found below statement in one of the article. Published software should provide the user with the message digest so that user can validate the accuracy and completeness of...
I am having issues with a particular game, detecting the presence of the games being run inside sandboxie (An application for running programs inside a sandbox) with the goal of running multiple instances of the game on the same computer. The game employs techniques to detect the presence of sandboxie, and I've found ...
How can I configure an inbound rule on a Windows Server 2016 firewall to allow access from a program which is not installed on the server? When searching for a program browse is only offered for locations on the server. Is the path specified for the rule applied to the machine accessing the server? Is it possible to cr...
I'm building a website without a "server": JavaScript and AWS Lambdas as back-end through API Gateway. Knowing there is no solution for session when using lambdas, I was wondering if I could only use the id_token provided by the Google JavaScript library to authenticate a user? The idea is to pass the token for each re...
My internet suddenly cut out yesterday, i checked the router and it looked like nothing is wrong. I looked at the logs and i see this 2019-08-18 12:50:39 Security Warning Detect UDP port scan attack, scan packet from 212.2.127.253 2019-08-18 12:43:19 Security Warning Detect UDP port scan attack, scan packet from ...
This is the ultimate noob question. When reading discussions of cryptography, I often come across phrases like these: ...calculates a hash over the primary key... ...a key derivation function over a static string... ...an HMAC over the i-th derived key... Is "over" in these examples just a hip way to say "of"? More c...
I was recently "invited" to win a free phone on my Google calendar. At first I was concerned that my account was compromised, but i think anyone can send a calendar invite. Is it safe for me to ignore these invites (and obviously never follow any links), or is there some action I need to take to secure my account?
I need to use brute force to crack the password. I know about the password that it has exactly 1 capital letter (A-Z), exacly 1 number (1-9) and exacly 10 lowercase letters (from a to z). I have Python script that generates this type of passwords, but I don't know how to turn it into a hashcat mask. Python code: import...
Can basic authentication over HTTPS do any harm on a personal one-user server if used in addition to native authentication provided by individual web applications?
I have seen around the internet devices like this: https://www.cryptophone.de/ and software that reinforce the security on cellphones. My question is simple, since the cellphones use A5/1, A5/2, A5/3 encryption algorithms why to use more encryption? Aren't A5/1, A5/2, A5/3 secure?
Is there a way of exporting all user data associated with a Firefox Account? Yes? where can I request/download it? No? isn't right of access a legal requirement under the current GDPR legislation? Examples of what I'm asking : Google: Download your data Facebook: Accessing & Downloading Your Information GitHub...
I'm trying to implement a Software deployment & updating function which is part of AUTOSAR AP standard. Background information: There are three parts. Integrator the client which user uses it to create a software from the source and make it into a package. Backend Server the software package will be upload into the s...
I'm a bit paranoid, but I want to know if my school can see what I'm browsing while logged into my school account but on my home network with my own laptop. I have brought my laptop to school previously and have used their Wi-Fi, if that makes a difference. I log in to my school account on chrome but on guest, so eve...
I have been working on decrypting a WEP .cap file using crunch. It has 1268 IVs. I am wondering: Can I get a clue from the captured file to speed the process of brute-forcing? If not, what other ways I can try to decrypt the packet? It is a captured 802.11 file; consisting of data transmission and a part of de-authen...
If a friend wants to send me their S/MIME CA certificate containing his public key, why does he need to add a digital signature? A digital signature verifies that the content was sent by him and not a man-in-the-middle who has put his own public key in the email. But since we are now talking about a CA certificate (wh...
I am new to security testing and I'm confused about two web proxy tools, namely Burp and OWASP ZAP. Both seem to fulfill the same task, so what exactly are the differences between them?
I am creating a .NET core webapp in C# that takes in a user password and hashes it to be stored on a server. I'm using Rfc2898DeriveBytes along with a randomly generated salt. I've read, however, that I should avoid using strings in the entire process since strings cannot be removed from memory. I know that .NET core h...
I have just started with encryption and stuff, so please bear with me. Just playing around. I have an upstream service that has sent us a self-signed cert. Now from what I understand, we can verify if a public key belongs to someone by using the below function: func(CA's public key, digital signature, supplied public ...
I want to test laravel exploit POC based on https://github.com/kozmic/laravel-poc-CVE-2018-15133/ I did docker steps to reach laravel home page on localhost:8000 then I got API key and simply I put APIKEY in PHP command to find header. When I sent POST request with exploit via curl there is not the expected response fr...
I have a customer who insists upon using only certificate-authority signed key-pair certificates for encrypting SAML2 assertions. In this use case, I hold the private key in my Service Provider, and we furnish the public key to the Identity Provider. For most customers using this mode of SAML2, they just accept the se...
Situation: I am trying to intercept TCP (not HTTP) traffic on a Windows machine using Python. I am posting this question as most answers I was able to find teaches how to sniff traffic. Normal operation:- Machine A ===> Machine A's TCP/IP stack ===> Machine B What I am trying to do:- Machine A ===> Intercept + modify ...
Every open code repository has security issues. Attackers can use three ways to sneak malware in: Abuse typos: Create a package with a similar name, but the package is malware Malware + useful code: The library actually provides value, but also contains something malicious Update existing code: Attackers could get acc...
Assume an authentication process that has multiple stages ( eg: username/password then OTP) How you can authorize and identify user between each steps? If JWT tokens are used, is it an option to use different secrets to generate token for each steps? Is there any standards for the above process
So, I am having this issue where I want to buy a specific wacom product but their online store eu-store.wacom.com and us-store.wacom.com, even though it is being accessed through https, does not convince my firefox that it's safe. The actual wacom homepage www.wacom.com shows up with a proper green lock and is verifie...
I recently stumbled upon MySQL Router. Its documentation defines it's purpose as follows: MySQL Router is part of InnoDB cluster, and is lightweight middleware that provides transparent routing between your application and back-end MySQL Servers. As I could not find any Information about the inner workings of it,...
Old IoT devices and some low-power devices are not capable of doing encryption or use weak encryption methods like TLSv1.0. What could be the risks of using such devices and unencrypted protocols like HTTP?
I have a couple social media accounts i want to use on a new phone ive got. The old phone i believe is infected with deep-malware. If I switch 2fa to my new phone which uses the same number but connected on a seperate network and change their passwords, could malware be transfered onto the new device? (Facebook, email,...
I configured my Firefox proxy to send my php website traffic running on localhost to burp suite for intercept but its not intercepting anything. My Firefox and Burp Suite configurations here. I've tried using different port other than 8080, went to about:config and enable localhost hijacking but still it wont work. Day...
I recently ran a couple of security audits for some friends, and was thinking about doing some more. Before I do though, I wanted to know whether I should keep the audit reports and, if so, how? I understand that it's insecure to keep it, but at the same time, what happens if the client loses the files/report and needs...
Please explain the following Snort rule. Describe the meanings of all the options and modifiers used in the rule alert tcp $EXTERNAL_NET any -> $SQL_SERVERS 1433 (msg:"Attack Detected"; flow:to_server,established; content:"|02|";depth:1;content:"sa";depth:2;offset:39; nocase; detection_filter:track_by_src,count 5,secon...
Assuming you have access to another person's device, set up a SOCKS5 proxy, install a root certificate to parse the SSL traffic, and take a screenshot of the private key of a private chat. Is it now possible to use the proxy to record a message and manually decrypt it with the private key? EDIT: You can display the enc...
With the deprecation of TLS 1.0 on the horizon, I'm curious how others are handling connectivity and mail delivery issues for dated client environments. Lets face it, there are more environments live on the internet running deprecated protocols than there are environments running the latest and greatest in updates. How...
I bought and installed a SSL cert for my domain but then changed my mind and canceled the purchase and bought a slightly cheaper one. The old cert is then revoked and I proceed to install the new cert. Here is when things got worse. The domain still showing old revoked SSL and that makes my site couldn't be loaded on F...
I am designing a online programming website similar to https://repl.it. Users can execute shell and python scripts on the browsers. If users execute malicious commands including but not limited to "reboot" etc, then our system are damaged. I understand the easiest way is to leverage Linux user control system. But I do ...
I worked today with our teacher who logged me into a computer as admin. We had a task that required admin rights. A few seconds later he was talking to other students in our classroom, but I was able to reset the administrator password with lusrmgr. Was the teacher right to do this (is it a critical problem)? If he wa...
Are there any benefits to using vulnerability scanners such as Nessus Pro or Tenable.io, if we are already using Azure Security Center for vulnerability and update management? Or does it have any negative effects to do so?
If you search something, can your isp share the google account it was searched from?
In order to gain web access from the perspective of a remote device, it is very common to use the SOCKS5 to SSH Tunnel capability built into OpenSSH Client and Putty (detailed here). Both clients establish an SSH transport to the remote device and open a local port that accepts SOCKS5 requests that translates the reque...
Like the service is there but it's just filterd enabled for lan access only .. what will happen ?
Some forms of attacks on passwords use dictionaries. It is safer to use nonsense passwords like YunSUanLin, Artibichoke, etc., which do not seem to pertain to any dictionary?
I am trying to determine the impact of re-mediating a lucky 13 vulnerability; which i understand requires disabling CBC cipher modes. So far i have added custom logging to my IIS instance to capture and translate the algorithms that clients are connecting with. Using this i am able to get the cipher, hash, and kex algo...
I recently watched this YouTube video about capturing webcam image traffic using Wireshark. Although the technique used in the video is not applicable to my question (because it is about a MITM situation), it shows how image data, such as from webcams, is sent across a network. What I am mainly interested in is blockin...
I've seen this question asked before, but unfortunately, don't understand the responses. I think its something to do with "from" headers being defined differently by different standards. I've added all the domains in the "from" to SPF records, but DMARC is still failing. I'm curious if anyone could help me specificall...
I was assisting a man at the public library who was unable to login to his gmail account. He typed in his password and was prompted for a phone number, presumably so a code to be sent which would then have to entered in order to proceed with the login. He said he had no phone and that he borrowed someone else's phone w...
I connect to the Internet via a neighbor's wireless router (not a guest connection). Windows 10: I don't share files or printer. Domain, private, public network: firewall is on. Scan = no issues. I have a G Suite account to build sites. Site is published. Sharing options are secure. No other authorized users at this po...
I received a Jira as a result of a security scan asking to update lodash for CVE-2019-10744, which is a prototype pollution vulnerability. After reading this excellent paper about prototype pollution, it seems to me that this would only be an issue when running JavaScript on the back end. As we only use JavaScript on t...
Can someone explain the significance of Certificate Signature algorithm in the selection of Cipher suite in a TLS communication?
I'd like to validate message texts with CRC-8/16/32 but I'm afraid that they could be changed to another one (for example, adding a "No" at the beginning). There will be no special characters besides the usual ones (? , . ; ª º + =...) and the number of bytes will be counted as well. The messages will not be encrypted....
In my web application, when the user logs in, a pair of JWT(JSON web tokens),access token and refresh token is sent with some fixed time validity. Using access token client is authenticated and using refresh token, a new access token is generated which works fine. I am not storing tokens in the database. Now, I want to...
Often antivirus programs trigger a false alarm that a certain file is corrupted or infected. How common is that and if it is too common, can we really rely on them? Along with that, how easy it is to corrupt an antivirus?
I have some secrets that need to be transferred from my .NET application to another. I am using the CNG DPAPI to encrypt these secrets, and I wish to find the most suitable place to store them (in this encrypted format) on my machine (from which I can collect them and send them to the other application when needed). Th...
My company ships very large, very heavy products to the homes of everyday consumers (think big home renovation materials). Currently, we provide the customer's name, shipping address, and phone number to the factory. The factory then provides that information to a freight company who will then provides it to a final-mi...
I would like to know any antivirus software that uses strictly only a behaviour-based malware detection technique as the aim of my research is to compare behavioural-based and signature-based malware detection techniques.
I am new to bug hunting and i came across this website, so i came across this bug or atleast what i think is a bug so help me understand and tell me if i should consider it a vulnerability. The website i was testing was only using session tokens to authenticate a user, so my first question is, is it vulnerablity for ...
I am new to Windows Defender but have read about it to understand the basics of Inbound/Outbound rules. As mentioned on the app, Inbound connections that do not match a rule are simply blocked. For my system, I have few number of inbound rules for port 135 AND of these rules are disabled. Which if I understand correctl...
I understand that a signed certificate is a server public key signed by the private key of a certificate authority. As a result, a client allegedly rest assured that the signed public key is for the desired server. Really? How does the client get the public key of the certificate authority? Can't the attacker just sign...
I have a Raspberry Pi connected to my network and keep getting this vulnerability warning from my security software. I turned off the apache2 web server on the Pi, which fixed my port 80 issue but have no idea how to fix the remaining port issues (8080 and 8443 below). I need to fix these vulnerabilities without removi...
First off, let me preface this post by saying I'm not a security expert. I'm trying to build regular expressions to find OAuth 2.0 access tokens and API Keys for common web sites such as Google, Twitter, Facebook, Slack etc. that may have been embedded in source code. I couldn't find the token formats of the large sit...
We have a Node.js based web application, that has routes like: myapp.com/posts/[postId] We tracked strange requests, which lead to 404 on this routes. The requests were to routes like: /posts/phpinfo.php /posts/.user.ini /posts/info.php3 /posts/phptest.php Neither we're using PHP nor do i know anything about it... To ...
Hi today I got email from a security research program. Yesterday I asked "Did you interested insecure permission vulnerability on ... that allow "Guests User" have full permission?" They answer: "We interested in privilege escalation via software that has broad installations, the escalation should be non-user-interacti...
I am working on building an application which will be used in various language , to secure from attacks like xss, SQL injection I thought implementing character filteration (whitelisting/blacking) but not sure if putting validation based on alphanumeric character is best way or not as non English characters might get r...
I've just finished cleaning up a compromised Wordpress site; it was hacked through a vulnerable plugin & several fake sitemaps & redirects set up to pollute google results with pharma ads etc. After dealing with this I noticed that the hacker had also compromised files of an old copy of the site which was still in the ...
I just learned about FIDO2 (WebAuthn) and try to make a comparison to the lesser-known novel SQRL authentication scheme. Both seem to use the same key elements: a private, user-resident "master key" thus not relying on a 3rd party like OAuth. a specific piece of soft- or hardware managing the identity a specific proto...
A friend of mine whom I trust 100% states that a user he was exchanging messages via WhatsApp deleted the whole chat,on his phone as well. He was able to take a screenshot of the last messages before the chat had been cleared. I have seen, both the empty chat and the screenshot.The chat is totally empty,my friend's mes...
SQRL - Secure, Quick, Reliable Login - is an open draft for user authentication. Have there been "enough" publicly available tests to make any backed statements about the security of SQRL?
I only want a bash shell in Windows 10 that runs faster and doesn't have any of the quirks of git bash / MINGW64, like for instance all of that CRLF garbage. Is there any security harm in installing it? I mean I'm sure depending on what you install with apt-get there could be issues, but what if you're just installi...