instruction
stringlengths
24
29.9k
I've seen a lot of websites by security teams & companies which use HTTP instead of HTTPS. I'm using HTTPS Everywhere and have found even some medium-big groups not using HTTPS. I'm a noob at cybersecurity so I'm not knowledgeable about such details. Why are security companies that specialize in cybersecurity using th...
I am working in React, and I have an image which has an src attribute of https://s3.amazonaws.com/sample_endpoint. My website domain is https://sample-website.com. I am using a library, dom-to-image, https://www.npmjs.com/package/dom-to-image-more, which takes any html element and converts all of its children elements ...
I did source analyzer with third party services to my wordpress project. It found out that there are heaps of cross site scripting vulnerabilities. One of the example is like image below. How do I prevent the cross site scripting? Should I put validation in front end view (HTML / CSS / JS) or on back end (PHP / Wordpre...
The risks using open public WiFi networks has been done to death. What I've been wondering is whether an open WiFi network (typically public) is safe against packet-sniffing if that network is using client isolation? (Putting aside the still-important risk of an evil twin which the above does not mitigate against) As ...
I would like suggestions for a good strategy for dealing with web sites that have arcane rules about what must or must not appear in a password. My ideal are the sites that allow a good range of characters, a relatively long password length, and no special rules. In those cases, my password is chosen by a password gene...
Generating a Private Key... $ openssl genrsa -out ./oci_api_key.pem 2048 Generate a Public Key...from the private key: I'm trying to generate a public key from a private key in PEM format (the Base64 of a DER) by running: $ openssl rsa -pubout -in ./oci_api_key.pem -out ./oci_api_key_public.pem Next I'd like to: Veri...
Is it possible to digitally sign a document only with a x509 certificate (ie public key)? We received a question from one customer saying that they wanted to sign a document using only a certificate. Is it possible? I understand that the private key is needed in order to sign. The only case that I think this holds is t...
Im concerned if I am scanning effectively. When I scan our external IP's with the scanner on my laptop the packets are leaving my network through my firewall and routing across the internet to hit my public IP's. If this can be done why would I need to pay extra for a "cloud\external scanner" if I can just do it from...
My hosting blocked my website because malware, they say. I dived into the (shared) server via ssh and found a file that looks suspicious. This file was in an old, not working installation of wordpress in a subfolder. The subfolder was not blocked tho, so I assume it was accessible via browser. (I changed permissions so...
What is the current speed an offline password cracking attack can be performed in guesses per seconds? It is for sure heavily influenced by the used hashing-algorithm and the used hardware. But I am more interested in the general top bar achieved by a reasonable price without a botnet. Since I need this information fo...
Depending on the brand, some Android devices stop receiving security updates as soon as one year after release. In my case, I own a Moto Z Play which latest security update was a year ago... However, actually how important is this lack of security updates for an end-user? Reading through Android security bulletins, oft...
My webspace has been compromised as explained on this answered question. While looking for advice on other q&a it seems to me in the answers it is assumed the compromised system is a full dedicated or virtual, but not the shared hosting type. As in shared hosting, even if ssh is available, most of the system is not th...
Unfortunately, although my keys are protected by password, I am afraid it is not strong enough. I assume I lost control of all my private keys now. I still have backup of my private keys, what I want to know is, for my privacy, should I generate a new sub key from my old master key and revoke the other old subkeys, or ...
I'm trying to understand how XMPP works and I'm much concerned about how do both the protocol and existing implementations ensure privacy. More specifically, I want to understand how do XMPP servers process the messages sent out by their clients. While reading the chapter 4 of the book "XMPP: The Definitive Guide by Re...
This is a question similar to this one but it is all about editing the clipboard contents. Can phone apps read my clipboard? Is this actually a case on latest API of Android an iOS? I mean particularly Clipper malware that e.g. replaces financial account number after it get's copied to the clipboard so then you paste ...
Is it possible to somehow cut up a packet and send it from multiple IPs into parts and send them to one IP address to reconstruct a semi-anonymous packet/frame? Can frames have their source faked? Does this somehow relate to the Tor network?
This falls under the category of eliminating what might be normal activity from my attention. I'm looking at Windows 7 security event logs. I don't have context to know if the following event is a normal occurrence. It happens 10 times a day or more on my workstation. What is causing it? Same events in event view...
Let's assume we are talking about top 10 most used web browsers: Usage share of web browsers https://www.cgisecurity.com/questions/httptrace.shtml 'TRACE' is a HTTP request method used for debugging which echo's back input back to the user. Jeremiah Grossman from Whitehatsec posted a paper outlining a risk allowin...
(This is hypothetical, but based on a real-life problem I've had) Context: I am developing an (embedded) device which includes a few exposed network services. I'm responsible for security, not developing these services, so I don't know how they're built. I do some testing (send targeted Client Hello messages to the dev...
Veracode reports that the below code is susceptible to CWE-611: Improper Restriction of XML External Entity Reference. XslCompiledTransform transform = new XslCompiledTransform(); transform.Load(xslwithospath); StringWriter results = new StringWriter(); using (XmlReader reader = XmlReader.Create(new StringReader(xml)))...
Let we have a hash function that is second preimage resistant but not collision-resistant. Then an adversary can create a pair of different messages M and M', M is benign and M' is malicious, for both of which the signature will be valid. I don't understand why it is an issue in the setting where signatures are used to...
I work for a municipal government, using mostly Windows servers. In recent days several similar governments in our geographic area have been attacked, some successfully, by ransomware. So our security folks are alarmed, and have decreed (among other things) no more using SMB file-sharing to upload files from the "inter...
I've been reading about encryption methods and see things like 'ecryptfs', 'veracrypt', 'LUKS' that "military grade encryption" is basically 256-AES encryption. I have data on an external hdd - can't tell by reading which encryption method is best to use; maybe it is one I have never heard of.
Running netsh wlan export profile key=clear in PowerShell will dump your current stored Wi-Fi settings, including the password, into xml files inside of whatever directory you are currently in. Why is it that Windows would store credentials in a reversible format? Why is it not just storing the hash of the password th...
In a large organization (e.g., a city staff), relying on human behavior to prevent phishing attacks isn't nearly effective enough. While it would be somewhat inconvenient (security usually is), I'm thinking of an approach whereby the email client would redact all URLs in a message. Not only make the URLs inactive, but ...
Do modern (versions of) operating systems, primarily Android and iOS on mobile, still send targeted or directed probe requests when searching for Wi-Fi networks to connect to? Such targeted or directed probe requests contain the SSIDs of known networks, and may thus leak information about the sending device’s location ...
Could someone explain what this is doing and how it works? I already know about SQL injection but the NoSQL is confusing. This is a lecture slide from my professor but he provides very little context.
I know of a website, lets call it website.com, that has these vulnerabilities: iframe injection: I can inject an iframe with a src attribute, but cannot inject any script directly. Lets say that this is on website.com/iframeinjection. uncontrolled redirect vulnerability: website.com/link?path=google.com redirects to g...
As far as I know, current versions of Mozilla Firefox store the saved passwords (encrypted with 3DES) to the logins.json file meanwhile the keys are stored in key4.db (or key3.db in older versions). If one hasn't set up a Master Key for the passwords, the key database file can then be accessed. In the database, I've en...
Is there any way to use tools such as Fiddler to easily figure out if any software from my system sends data to the internet behind the scene? I have downloaded some open source free software's to achieve some tasks. But worried if they scan my PC and send data to cloud behind the scene!
I recently installed openvas9 following this guide. I can log into the web interface on port 4000 just fine, and I ran a scan on my metasploitable VM for testing, and it seems good. Now I wanted to import the results into metasploit. The issue is that the service openvas-manager to which the openvas plugin of metasploi...
I'm working on an IDE that should run a user's JavaScript in the Browser. I don't want to just eval arbitrary code, especially as code may be shared between users. From here and other sources, I learned iframes to be the likely tool for this. On the other hand, things like Caja are also suggested, and I haven't found a...
My pendrive had a Files.bat virus and all my files been shortcut folder. When I opened my files all my images and some videos still can be opened. Then I copied to my desktop and format my pendrive. When I plug my other pendrive to the laptop, the pendrive infected with the files.bat virus...now my 4 pendrives had the ...
On my server one of the services is a Discord bot. It was down which prompted me to look into why. In my syslogs I noticed three increasingly concerning items: do-agent[1066]: 2019/08/25 08:50:21 Sending metrics to DigitalOcean: Post https://sfo2.sonar.digitalocean.com/v1/metrics/droplet_id: x509: certificate is val...
I have a scenario where I need to call /api/login to get a token and then use said token in subsequent calls until it expires. Is there a way to automate the call and token extraction and then to auto add it to the next requests? I have tried making a macro and I can define a regex to get the token - but I can't seem t...
I’m relatively new to this topic so forgive what may be an obvious lack of understanding. Say that an attacker had a malicious website whose objective was to plant a Trojan into the device of the user who clicks on a particular link. Assuming that the website could be accessed by various browsers and/or operating syst...
I'm asking a client why some password parameters are not defined in the Linux OS level and he's saying that, internally, Linux and Windows complexity and timeout settings are different. If they set the Linux password complexity/timeout settings, then there is potential that the Linux system will ask for a password chan...
I am creating a service that will access a database with passwords to different network devices like routers etc. Service takes users credentials and validates if he or she is allowed to access a particular device. The problem is that there must be an option for some administrator to be able to see the devices' passwor...
GCM (now FCM after a change of ownership to a Google subsidiary) is a push notification framework which is commonly used on Android phones. MicroG is an open source reimplementation of Google proprietary userspace apps and libraries, including GCM, with more focus on openness and privacy. What kind of information does ...
I received an invitation for an IT security fair (https://www.it-sa.de/en). They additionally delivered a password "Kryptonizer". That is a little card to hang on your keychain with the following (example values, my translation): It is often too easy for hackers to acquire personal information. The reason: Passwords t...
I want to prevent potential theft of my web application (source code + database) by my local hosting company, that I don't fully trust for some reason (but have no other choice but to use as they give, by far, the best latency over here). I'm planning to encrypt a partition with cryptsetup, and store the web directory ...
I have the following setting: Let A, A', A'' be different mobile devices. They want to sent a secret message M to all (or some of) the C,C', C''. The message is passed on to B that stores it for some time, and passes is on to the different C. Now I am looking for an encryption scheme, such that A encrypts the message,...
I have a document which I wrote my passwords in and saved it to my disk, and I have been hearing a lot about programs storing passwords in plaintext Did word store my password I saved in plaintext??? If yes, how do I have a word with it?
I'm investigating TRESOR as a way to prevent stealing of encryption keys from RAM by someone with physical access to the machine. This seems solid in the case of a dedicated server, but what about a virtual machine? I saw in this answer that TRESOR stores the key in the CPU DR registers, and patches the kernel to tell ...
I have a laptop operating a vehicle with attached camera. Video is exported using removable media. Ports available are USB and Ethernet (also video and audio I suppose). The laptop is not infected (presumably). Transfer speed must be enough for streamed video (H.264). I've been looking into different removable media so...
When i use Openssl to connect to facebook.com I see 'ECDHE-ECDSA-AES128-GCM-SHA256' ciphersuite used. openssl s_client -connect www.facebook.com:443 SSL handshake has read 3280 bytes and written 373 bytes --- New, TLSv1/SSLv3, Cipher is ECDHE-ECDSA-AES128-GCM-SHA256 Server public key is 256 bit Secure Renegotiation IS ...
My ISP offers a "cyber protection" service at an extra cost. They say it "identifies and blocks privacy attacks, credit-card scams, identity thefts and hacker attacks against computers connected to your home network", but do not say how they do this. Is there a test I can make, in order to see if their cyber-protection...
I'm using Rfc2898DeriveBytes in my application to encrypt a password with a randomly generated salt, and with a set iterator count for slowness. Before, I just grabbed the generated salt and put it as a parameter for Rfc2898DeriveBytes to take care of, but now I've changed my approach to the following, and I'm wonderin...
Can a keylogger in a virtual machine (guest OS) capture keystrokes in host OS? Is there any way to do it?
I have read 2FA adds a beneficial layer of security when logging into accounts. However, many organizations often ask me if I would like to trust the device that I am using permanently so I don't have to receive a text on my phone when logging in. Does trusting a device effectively mean I'm not using 2FA? Or are the se...
I have solve half of the problem by decoding a base64 code that reveal the next URL(https://app.findbug.io/app/task/FinDBuG-CTF2019) but now i don't know what to find or where i tried it with burpsuite. Here is the link for confirmation code:https://app.findbug.io/app/hacker/task
Today, I found a SD card in my pocket. I've never seen it before and am nearly certain I didn't put it there myself. My suspicion is that someone stealthily planted it there while I was walking through a public space. I'm just wondering, as someone who is fairly knowledgeable about computers but not particularly famili...
I've recently implemented a SIEM solution, and am now able to see a large amount of failed login attempts from legitimate users. In fact, it's such high volume that my SIEM is correlating them to be Brute Force attacks. However they come from a variety of accounts and computers, and are just simple auth attempts agains...
I find the following somewhat confusing, but it doesn't have many steps. Is this a solid method for encrypting a hdd with LUKS? Here’s the process in few steps: Create a LUKS partition cryptsetup luksFormat --hash=sha512 --key-size=512 --cipher=aes-xts-plain64 --verify-passphrase /dev/sda Note that obviously you can...
I am basically positive my macbook pro has been hacked and has a firmware rootkit installed on it, and at this point I have decided it is now a brick and I need to move onto a new computer. The problem is, I have years worth of files (I make music) of songs I am in the process of creating that I want to keep and move o...
Wifi passwords are a pretty weak way to secure a Wifi Access point; is it possible to use a public / private key to secure traffic on a wifi access point which runs OpenWRT. I know I can secure SSH with one, but what about the traffic on my access point?
Say I have Math.random() (which supposedly generates ~32 bits of entropy.) If I use Math.random() + Math.random(), both of them generate ~32 bits of entropy. I will use the solution of Math.random() + Math.random() to seed another PRNG, so is using Math.random() + Math.random() to seed the PRNG 'better' (as in total en...
Tried following openssl command to show the certificate chain,but the ROOT certificate 'depth=2 OU = GlobalSign Root CA - R2, O = GlobalSign, CN = GlobalSign' is not shown in the output...Why? openssl s_client -connect www.google.com:443 -showcerts -verify 5 verify depth is 5 CONNECTED(00000003) depth=2 OU = GlobalSign...
I have dynamic IP address and I am trying to find the solution to limit the access to wp-admin. It seems that the only option is to block the access by domain name by using a Dynamic DNS Manager instead of IP address. Are there any alternatives?
I want to know under which case would Mimikatz still run despite disabling WDigest? Whether wdigest is set to 1 or 0, mimikatz still worked. (tested on Windows 7, 8, 2012) Is there a better way to block it specifically on the OS level?
Is there anyone out there who have tested AES-CCM and AES-XTS using openssl CLI. ? Whether openssl supports AES-XTS? I was having a backup plan of creating custom API if CLI does not supports XTS and CCM . I googled regarding the same. But I expect a better feedback from openssl and cryptographic experts.
Recently, a forum I frequent has received multiple spam posts on its general discussion board (three in the space of ten days). They all look like legitimate posts at first, but buried inside each of them was a spam link to an external website. I don't know whether it's the same website each time - I didn't check the f...
What is the importance of identifying our target's web platform? I have recently watched the video 'DEF CON 23 - Jason Haddix - How to Shot Web: Web and mobile hacking in 2015' from youtube and he highlighted the importance of platform identification using Chrome extensions such as Wapplyzer, Builtwith and etc. How wil...
We're currently redesigning our access control system for our SaaS startup (over the past two years it has grown alongside the business and decided to clean it up at this point). The access control system should serve customers with 500 - 10,000 users each. It should support: Read-only users (i.e. some users may only ...
Scenario: An iOS application that prompts the users to take a picture with their iPhone camera. These pictures (e.g. of documents) will then be uploaded to our server. Is there a possible way for an attacker to bypass the dialogue and directly upload existing files - so instead of using the camera, an existing (manipul...
In a recent pen test of a web application one of the issues found was a 'backup file'. This was a javascript file that was renamed to filename.js1 when an updated version of filename.js was uploaded. The 'backup file' lives in a directory with forbidden listing and is not referenced or used anywhere in the application....
A lot of questions here are about the safety of passwords e.g a Login Password to an account on site X. But how can attackers get in the account when they have to guess the passwords? I know there is the "brute-force" method but most sites will simply lock the account, when there are too many false tries. So how get h...
According to my understanding of computational cryptology, the body of a signed document can be retrieved disregarding whether or not the signature is authentic. However, I cannot apply this practically: Given a pair of RSA keys private.pem and public.pem, I have signed some data: openssl rsautl -inkey private.pem -sig...
I use OpenID Connect to let my users login. What could happen if Flasks SECRET_KEY becomes public?
A suspected hacker was trying to get the user to input those numbers (2412958) in their address book. And user knows that the numbers are weird. Can URLs be shortened in texts like that?
Does Google Chrome store browsing history on their servers? I think, if for example I use private browsing, Chrome can still log my activity.
I was testing a websocket when i found an add to cart request like the following ["{\"ITEMS\":{\"ITEM\":[{\"package_id\":\"123\",\"customer_type\":\"3\",\"qty\":1,\"}"] I tried to edit the value of the parameter qty to -1 and send the request. In response i received this error: a["{\"error_msg\":\"Failed to add ITEM[0...
I have a virus on my laptop preventing me from installing antivirus, or updating windows or even opening task manager. i tried running a virus scanner from a portable scanners, the virus disappears and the task manager opens normally and i can install the antivirus when the scanner is running. but after that the virus ...
I want to buy a chair from this website http://www.autofull.com/ but the entire website says it is "not secure" except when I press the "settlement/pay now" button and it takes me to a new website that is "secure" https://secure.oceanpayment.com/ I've searched EVERYWHERE to see if this company is legit or not. Most of ...
Unfortunately, someone stole my laptop (a MacBook) and I did not realize that for 48 hours. Now, this was a work laptop and my company's security team is going to wipe the laptop remotely as soon as it connects to the internet. Which is nice. However, what I am worried about is more about what could happen in those fi...
My wife's machine could not load any Instagram content through JavaScript because of the following error: Cross-Origin Request Blocked: The Same Origin Policy disallows reading the remote resource at https://graph.instagram.com/logging_client_events. (Reason: CORS request did not succeed). I tried getting it to work a...
This question builds off of this question. I want to create more entropy from a viable entropy source to seed another CSPRNG. If I use window.crypto.getRandomValues(newUint8Array(1)) To seed a CSPRNG, is that less entropy than if I used: window.crypto.getRandomValues(newUint8Array(65536)) To seed the CSPRNG? What I ...
I have to store pre-master keys for all TLS connections due to regulator request. We are using nginx to terminate TLS. I've read Extract pre-master keys from an OpenSSL application and especially excellent walkthrough Extracting openssl pre-master secret from apache2 and I was able to record keys from apache, but still...
I need some viable sources for entropy to seed a CSPRNG. So far, I have: JS Events Web Crypto API performance.now() Timing for xmlHTTPRequests etc. Are there any other viable/secure entropy sources that I can use/access in JavaScript?
I just had a random occurrence when I went to one of my hosted websites, and saw the page was broken. We host several domains at this IP, but one domain is actually in the server's webroot directory, inside are all the directories for the 6 or so other domains, and other random assets. We use this server for dev and a ...
If I have a JavaScript CSPRNG such as isaac.random(), and I seed it using a truly random number T as such: isaac.seed(T), does this make the result of the CSPRNG more, less, or equally random? I would imagine that with a CSPRNG such as isaac, (Which has passed TestU01) that the result would not add any randomness sin...
This is more a conceptual question than it is about a bug/error I'm encountering. I am learning about PKI (public key infrastructure), and attempting to sign my own certifications by walking through one of the SEED labs. When I attempt to sign a CSR using a self-signed CA certification, I get an error message that Th...
Organization A has a service that is ISO 27001 certified. It is acquired by Organization B which does not have any certification. What are the formal impacts of the acquisition on the ISO 27001 certification? I am interested in two cases: Right after the acquisition when nothing changed yet in Organization A. → My und...
Can someone tell me please if my VPN-configuration is secure enough for small business? (Point to site VPN) IKEv1 Protocol (aggressive mode) PFS/IKE Group: 2 MODP-1024 individual PSK for every user 64 Characters (unique) no xauth IPSec over HTTPS disabled IKE-Proposal AES-CBC 256Bit Hash: SHA 512Bit Authentic...
I am currently planning security testing procedures within an API gateway. We want to define in advance what we expect to be covered on the security level. Scanning REST APIs (see http://docs.w3af.org/en/latest/scan-rest-apis.html) SQL Injection Command Injection Header Injection Cross-site scripting – reflected. Cros...
DDoS attack can be used to infiltrate your network for attackers to try to exploit the machines in the inner network ? Or it just attack that meant to disrupt the daily operation of a Network.
I've been looking for information about vulnerability classification and it's not completely clear to me. Reading the CVSS documentation (2.1.1. Access Vector) I observe the following explanation about the N (Network) value for AV (Access Vector): "A vulnerability exploitable with network access means the vulnerable ...
I want to share a file for viewing purposes to customers. The qr code will be imprinted on the product, so the customer will be the only one with access to it. The file should not be accessible to anyone else, except for the holder of the qr code. How can I make the server realize, whether the request for the file came...
I am looking at a Java web application that compares all incoming request params and cookies against the following regex. If it matches, it is considered "an attack" and refuses the request. I'm guessing it's trying to prevent SQL injection / class loading or something, but I'm not sure. Can anyone help? (.*\.|^|.*|\[...
I sometimes use these features where I can use my Google account to sign in to different service providers. For example, the Postman app lets me sign in to it using either their own user store, or Google's (I believe this uses the OAuth schema, but I could be wrong). When I do this on a website, it's pretty clear I am ...
When we use file system encryption, even though attackers won't be able to access the information we've stored, they would be able to find out the fact that we have encrypted data on our drive. So the question is, are there ways to hide even the existence of encryption to an attacker with full access to the storage dev...
I accidently discovered a misconfiguration (?) security vulnerability: Workstation managing system is publicly exposed with default credentials. admin/admin The system contains arround 2k workstations with functionality such as software deployment, wiping, remote device control, etc. I really would like to inform the c...
Basically, I am having an <a> tag with target set to _blank, where an attacker has control over the href parameter, thus possible inserting a javascript tag, like the following: <a target="_blank" href="javascript:alert(document.location)"> However, this XSS executes in a new about:blank tab because of the target set...
In SAML, signing or encrypting the assertions seems to be essential, but I'm not finding much information describing any benefits or drawbacks of signing the authentication request in real world "practical" scenarios. Security and Privacy Considerations forthe OASIS Security Assertion MarkupLanguage (SAML) section 5.2....
Some doctors' offices give a personal email address, like Yahoo! or Gmail for patients to email medical records. What questions should I be asking them to make sure the email account is secure? Even if they supply an email address associated with their website, doesn't mean it's secure.
I'm downloading a small sample tar file using curl and outputting verbose log to see the details: curl -v -H 'Connection: close' https://ftp.gnu.org/gnu/gcc/gcc-2.95.1/gcc-objc-2.95.1.tar.gz > /dev/null And this is the tail of the output once download is finished: ... ... < X-Content-Type-Options: nosniff < Connection...
What's going on is that, Twitter is switching me to their "mobile" site after it detected my browser was outdated. Factly I can still send Tweets, its just their mobile site. My experience with websites that doesn't support old browsers is that they disable all the features to help staying safe. "You are on Twitter Mo...
I have two options for remoting into our Azure VMs: RDP to public IP or RDP through VPN. I'm certain using a VPN is 'more' secure. But my question is: Is it still reasonably secure to have a hole in the firewall for our local office's IP and RDP directly w/o VPN? It's just way, way more convenient to be able to just do...
Given that secp256k1 is used to underpin the entire Bitcoin network (worth $174B as of today) -- it appears to offer demonstrably better security than other EC curves as no one has yet taken the bounty. It also stands to reason that researchers will actively look for vulnerabilities. If somehow broken, we will probabl...
Using Firefox on Windows 10 every time when I visit ebay.com I get redirected to a clearly fraudulent website telling me I've won some prize and asking me to enter my personal information. The website is also trying to convince me that it is legitimate by posing as my ISP and showing my IP address. I try to keep my ma...