instruction
stringlengths
24
29.9k
This may not be the correct community for this question, I apologize if that's the case. Scenario: A software development company has created a collection of small desktop applications. They have followed best practices, signed their software using an EV code signing certificate, vigorously tested their software, perfo...
These two seem to be an intermediary for external network and internal network. What is the correct use for each deployment? What are their differences?
I have an R&D team that has been recently set up. I have been asked to help out with the cyber-security requirements for the department. They require access to anything and everything available on the internet, and also will require access to mailing sites other than O365. Any leads on what can be the different aspects...
The Bitlocker the guidance from Microsoft is to disable sleep states and use hibernate in combination with TPM + PIN for elevated security against cold boot and DMA attacks. Unfortunately this is pretty inconvenient as it results in very frequent entry of PIN and slower hibernate/wake times. I don’t regard the cold b...
My default configuration of Apple Time Capsule has port 445 (Apple Time Capsule smbd) open to the world. Online port scanners (shodan/detectify.com) show me that this. What's a bit worrying is the version showing "SMB Version: 1" and I don't need to share files with the world over SMB. Is it ok to disable this and how ...
What are the differences between authenticated and unauthenticated network scans? Do they show the same results? In which scenario should both be used?
I get emails like this all the time: Hello dear, I’m a long time reader. I’m writing to you because I’d love to contribute a guest post on your website. I’ve been brainstorming some topics that I think your readers would get a ton of value from: [The Best XXXL Extra Large Electric Heating Pad on Amazon for Full Body...
I have the following code, <li data-type="test" title="?"> test </li> Following values were Not allowed <>&*#%\'"= My goal here is to get a javascript popup to appear. is there a way to make an alert popup? Ex <li data-type="test" title="" onmouseover="alert(1)//" ""> test </li>
I've been researching and testing different approaches when it comes to securing code secrets, and am unsure what the best options are, and if they even have any relevance once a host gets compromised. Some standard approaches I've read about storing variables are: Compiled code Environment variables on machine or th...
My method for editing encrypted text files is to decrypt them in a RAM drive, edit them, and then encrypt them. What I'm worried about is information from my text files being transferred to non-volatile memory drives (for example by the creation of temp files in the drive in which Windows is installed). How could I edi...
Sorry if this isn't the right place for this.. I recently joined an online gambling website and clicked on live assist. To verify my identity they asked for my username and password. I did not give it to them. I am not really worried about it being a phishing attempt, but my main concern is that he can see my passwo...
Are the privacy features (blocking of Trackers, Cookies, Cryptominers, Fingerprinters) of Firefox 69.0 complemantary to PrivacyBadger? or do they interfere with each other?
How does an attacker use Cryptographic nonces to generate access cookies through a script on a server? As what happened to Yahoo! servers.
Is there any benefit to signing a random number? E.g. a link for password reset, sent to email, often includes a base64 encoded random number to prevent someone guessing what the password reset link would be. If that number is cryptographically signed or hashed, does it improve the security in any way? Say, 256-bits of...
I'm using the TLS cipher suite TLS_RSA_WITH_AES_256_CBC_SHA56. The Public Key of the Server's Certificate is RSA (2048 Bits) I understand that the RSA algorithm is used here for for key exchange, as well as authentication. Does the fact that the certificate contains an RSA 2048 bit public key mean that the length of t...
I have a bit of a unique application. I'm trying to create fancy ID cards for local membership. It's a cocktail club, and they're doing some cool things with the front of house and service structuring. All that to say, they want to use some nice brass magstripe cards for members IDs, but they'd like to further integra...
I have a WiFi network showing up on my phone: "H2O-e04f43b9ec36". My neighbors are a significant distance away and I am curious as to what is giving it off as I’m in the middle of an ugly separation.
We have a physical Xeon host (bare metal - BM host) with a hardware TPM installed on it. The BM host's attestation status is established at through boot-time measurements captured and written to the PCRs on it's TPM. An agent program on the BM host transmits a trust quote when an attestation challenge is received. Each...
How do you protect your mobile phones from SimJacking?
There's one software, let's call it an anti-malware, that uses a heuristic to detect some types of attack. However there's a very simple to stay under its radar. Where may I report that kind of "exploit"? It does not require patching anything at runtime or any interaction with that software, so I don't see it really as...
I'm making a little media server, just for fun, but I want to know if what I'm thinking makes sense. The idea is that the files will be stored on the server, encrypted. The file encryption key (henceforth FEK) will also be stored on the server, but it too will be encrypted using a 2nd key, derived from the user's passw...
simjacker.com looks like a pretty serious security issue with SIM cards. There's not much technical detail on their website though. And it'd be nice to be able to already know which SIMs are vulnerable. Unfortunately the S@T technical specification doesn't look very helpful to me. Is there a simple way to know whethe...
My colleague has forwarded me an email and asked "Can you please check for me if it is genuine?" I'm just a programmer, so I have no idea. The email is from a website called PDFfiller, which seems to be a document editing and sharing service. The person sending it is called **Account Payable**. I'm meant to click on a...
I would like to know if the following is possible: Is it possible to detect a file that has been put into my file system using back dating? Are there any trace artifacts left behind which can help to detect this sort of tampering? Is it possible to detect file tampering? I mean this in terms of content, file created/m...
I've been tracking my budget the old way for a few years now by using excel spread sheets that have my checking account ledger, and monthly expenses broken down to categories. But I have noticed more people have moved to using apps to track their budget and some of these also connect to their bank accounts, which to me...
This question is about best practices, and not necessarily my how I manage my current setup. I have these two scenarios, macOS Mojave with KeepassXC, and Windows 7 + Android 8.0.0 with SafeInCloud. The first is a work machine owned by my employer, while the second is my personal machine and phone. Right now, I have to ...
Suppose TLS client and server want to communicate, authenticating both parties. They each have sufficiently trusted certificates, but one corresponds to an ECDSA private key and the other corresponds to a RSA private key, or maybe ECDSA private key with a different curve (not sure if this makes any difference). I am n...
LinkedIn owns a sub-site called LinkedIn Learning. On September 9th, I took a LinkedIn skill assessment on one course. As I have passed, LinkedIn offered me few courses, which you can see in the above image for free for only 24 hours Here is where I saw a strange behavior. I went to LinkedIn Learning and browsed fo...
I used this guide to install Nextcloud instance on a Raspberry Pi. The installation went smoothly and in the end I could open the Nextcloud login page which, once presented with the right password, gives access to various resources which I assumed were therefore password-protected. That is, until I tried to log out and...
I have a zip file that has a Powershell script inside that I want to look at. Is it possible that the Powershell script could execute automatically just by unzipping the file? This is not something I want to happen. Thank you!
I'm just wondering about the naming of these firewall behaviours. My basic understanding is that stateful filtering lets inbound traffic to return the outbound response without explicitly specifying the rule, whereas stateless requires that outbound rule to be specified. I don't get it. Why is requiring explicit rules ...
When hackers put trojan horses on someones PC, those programs (which are, by definition, just stealthy RATs with some... extra features) need to communicate with them somehow. A direct peer-to-peer connection to their own PC is obviously impossible due to NATs being installed in pretty much any modern Network. Even if ...
I am having a disagreement with a friend concerning how best to defend oneself against an evil twin attack at the local coffee shop, airport, or hotel. According to what I have read it is best to always use a VPN when connecting to a public network period. My friend claims that it is sufficient to just connect to websi...
So I am testing a website that runs on Varnish and has HTTP authentication. Typically, if you try to visit the site, it prompts you for a username and password and if you enter it incorrectly/close the prompt, you get a 401 response. However, if you change the host header in the request to any invalid site, you receive...
Alice uses the OFB mode to encrypt her emails sent to Bob, but instead of using randomly generated IVs, she always uses the same IV to encrypt her emails. Charlie somehow gets the following data: The first 8 bits of the first ciphertext block: 0x11010101 The first 8 bits of the first plaintext block: 0x01111001 The...
As it shows in attached pictures, there is a "Difference between system uptime and last boot time" in my windows, it becomes an issue because AV, SIEM or every monitoring system shows a different time between system and boot. Because of this problem, these workstations do not accept security policy from AV. what is ...
I have a yubikey which supports only U2F. It doesn't support FIDO2. I read about U2F and i understand how it works. When i test my Yubikey for WebAuthn on https://webauthn.io it works. I wanted to know how WebAuthn works with my Yubikey when there is no support for FIDO2 on my yubikey? When they say FIDO2 is backward ...
From my understanding a typical way to achieve SEP buffer overflow (ignoring protections like DEP, SafeSEH, etc.) is to overwrite SEH with POP POP RET which goes back to nSEH which we control. nSEH will then be used to point to our located shell code. Below is how the stack will look. [BUFFER][nSEH to payload][SE handl...
I'm trying an XSS challenge. I found an exploit that breaks CSP by using a JSONP callback. I can get an alert to pop up by putting something like: <script src="https://whitelisted.jsonp?callback=alert#1"></script> But I'm having trouble trying to get it to send an HTTP-request. I've tried putting functions changing wi...
I am trying to implement a kind of email verification system with a node.js server with no state. The strategy User sends his email to the server Server generates a 4 digits code based on the email address and sends it to the user via email. User sends back the received code via email + the email address to the serve...
Newer versions of MariaDB (a MySQL database server fork) have a new password based auth scheme called "ed25519". The docs are very sparse regarding how it works and what it does. https://mariadb.com/kb/en/library/authentication-plugin-ed25519/ What is the value stored in the database? How is it generated from the passw...
I just started studying up for the CISSP and am having trouble understanding few concepts: Data owner Data custodian System owner Somewhere I read: The data owner (information owner) is usually a member of management who is in charge of a specific business unit, and who is ultimately responsible for the protection a...
I am trying to use msf word-lists but I just noticed in usr/share/metasploit-framework there are only two folders lib and config. I am not sure how that happened but my msf is updated. Is there any way to fix this and replace what is missing or get this back to the original state? Thanks in advance.
Vending machines at my workplace got recently changed and the new ones support an hybrid NFC\BT system to pay through a dedicated application. Looking for online, I found some articles about this app being cracked and how it was done. Being several months later, I expected some new security measure to have been added s...
Is this eToken can be reformatted or re-flashed for using as smart-card for authentication? I have this stick left from my former work and wanna re-use it some way, for example, for authentication in laptop. Is there a way?
MDN says that attempting to use Access-control-allow-origin: * with credentials should result in an error. Taking this into account, why so many major companies' APIs (spotify, twilio, among many others) return both Access-control-allow-origin: * and Access-control-allow-credentials: true response headers?
I know we should ideally never reuse the IV (Depending upon the mode of encryption used), but is it possible to have a protocol which uses the same IV for the message stream and is as safe as one which has a new IV every time?
I have a VPS server with Windows 2016 Server and use XAMPP as Apache Server. Yesterday I receied too many requests from 1-2 IPs. How can I detect how many requests I get per 10 seconds and block them?
I'm testing a service that might not do a proper checks for the certificate chain but instead it checks issuer and subject fields only. I would need to create a (self signed?) certificate with different issuer and subject. Is this possible with OpenSSL For example: openssl req -new -sha256 -key mydomain.com.key -subj "...
The normal advice you see everywhere when setting up a Linux server is to setup SSH and disable the password login. Is this because there is some security issue with password logins or because sooner or later someone will use a weak password? If a complex generated password was to be used would it be secure?
Are there any security risks associated with client-side port scanning? Or, more specifically, a "trusted" site (e.g., banking website) loading javascript trying to connect to various localhost ports? This looks suspicious to me, but seems to be an emerging (or standard?) practice, as referenced in earlier questions h...
I'm struggling with creating a mask to brute-force using Hashcat a password of variable length, but with a known suffix. Say the known suffix is 123$ but the variable-length "prefix" can contain between 4 and 7 characters (i.e. total length 8 to 11 characters) Do I need to define a charset? I'm aware of "increment mode...
I have a follow up question on this answer about executing image files as php. The answer explains that nginx support virtual directories. One can run www.something.com/blan.php/one/two/3 and one/two/3 will be virtual subdirectories. Then, according to the answer, if we have a file named malicious.jpg, we can trick n...
Services like phpMyadmin needs a domain name to access. Instead of adding a global DNS record, one could make a local DNS record (e.g. in /etc/hosts) to access the site. Would it increase security if no global DNS record was made, if one assumes that other typical security measures (HTTPS, Password Authentication, etc....
I want to do this by just using memory and not using disk modification or a tool, in post exploitation of a remote system, i already know how to enable RDP but the problem is when a user is logged in i cannot log in there is a method : https://www.mysysadmintips.com/windows/clients/545-multiple-rdp-remote-desktop-se...
I've been following this guide: https://www.cybrary.it/0p3n/using-sslstrip-in-kali-linux/ and others too, ex: official Sslstrip one: https://moxie.org/software/sslstrip/ without any success. I'm using: 5.2.0-kali2-amd64 #1 SMP Debian 5.2.9-2kali1 (2019-08-22) x86_64 GNU/Linux sslstrip 0.9 by Moxie Marlinspike and arps...
How to make imported public key available after logging off? I have a Powershell process that encrypts the file (recipient was masked): Start-Process "gpg.exe" -ArgumentList "--batch --yes --always-trust --recipient 3******D --log-file l.txt --encrypt $fileToSend" -Wait -NoNewWindow That key was imported using the ser...
I have been a loyal iPhone user for years. I did have two Apple IDs previously. The other one has already been deleted by Apple formally. The current Apple ID I am using was set up years ago when you had the option of opting out from iCloud features. So basically the iCloud was never set up at the first place with reg...
I am currently outside the US trying to log in to my health care provider's website and the connection just times out. I reached out to them on Twitter and they told me that as a security measure they block connections from outside of the US and suggest I use a VPN. So great, I can use a VPN to solve my problem. But I ...
I have a working script done with python to do dictionary attack on a few hashes import hashlib def main(): print("Starting...") users = [] with open('users.txt') as f: for line in f: splitted = line.split() users.append(User(splitted[1], splitted[2], splitted[3])) wi...
I'm using the guest Wi-Fi at a large corporation, and connecting to a commercial VPN provider via the OpenVPN client. I do not know one way or another if a proxy is used on the guest wi-fi, but I know that a proxy is used on the main network. I noticed that a particular website was timing out. I'm not sure why, but ...
What kind of vulnerability in the implementation of a vision-based machine learning system (object recognition, for example) would enable an attacker to achieve remote code execution? The only instance I can think of is a vulnerability (e.g., buffer overflow) exploited in an ML-based text recognition system via malicio...
To extend on How can a webpage scan my local, internal network from the Internet? how safe is my private network against possible threats like DoS attacks, spoofing attacks, revealing info about my private network services etc. Have there have been recent exploits? I recently read (https://www.sans.org/reading-room/whi...
I've got two byte sequences, and I decode them as UTF-8 (in strict mode to be sure they're valid UTF-8). Is it correct to assume that, if the bytes are different, the decoded codepoints will also be different? In other words, is it possible to find 2 valid UTF-8 byte-sequences that decode to the same string?
The NTLM over HTTP documentation can be found here https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-ntht/f09cf6e1-529e-403b-a8a5-7368ee096a6a Where is the Kerberos over HTTP official documentation?
It seems to be common knowledge that a VPN has the potential to protect data that is being transferred through an insecure network. Does a VPN also protect a secure network/router from malicious website data being sent to a device using that network with a VPN? I am new to this site so please forgive any mistakes or i...
I am writing an article about a late-1980s system that uses the RSA algorithm for the purpose of authentication. However, rather than the usual approach of encrypting a hash of the message using a private key, in this case the entire message is encrypted, using: Modulus: n = 0x35... # length 51 bytes / 406 bit...
My organisation is adding a firewall to our test stacks, using AWS WAF. We'd like to whitelist all traffic from the SDKs we've built to facilitate requests between our services. We thought of doing this using a custom 'X-' request header, and then using AWS WAF's regex match conditions to check it against a 'non-trivi...
I've been studying XXE attacks through Portswigger's Web Security Academy. I stumbled upon a lab Exploiting blind XXE to exfiltrate data using a malicious external DTD. In this lab an attacker has to define an entity within XML request to request an external DTD containing exploit. The content of exploit.dtd should be ...
I'm working on radius authentication. Server for this moment and production is windows server 2016. The authenticator is a hp ProCurve 2610-pwr 24p supplicants is a windows pc running windows 10 1903 and all the other are IP cams: bosch and axis. As for this moment, the radius is working with the windows supplicant usi...
S/Mime can be used to encrypt email and it can also be used by the sender to provide his digital signature so that the recipient is able to confirm the authenticity of the sender. Why then do we still need to have DKIM implemented on top of S/Mime in certain cases. I do understand that DKIM is used to authenticate the...
I'm struggling to find a quote advising that we should be comfortable in sharing details of encryption methods and implementation with would-be attackers and the system still remain secure. The idea is that the keys are what we should be protecting as opposed to some obscurity in our code and approach. Does anybody hav...
We have a web-service that follows RFC 7515 / JWT: it supplies public keys on a /jwt endpoint and encodes data transferred on its main endpoints into JOSE+JSON. Using several standard JAVA libraries to achieve this process everything is now up and running. I want to manually create the output for the /jwt endpoint that...
When creating API tokens, one can pick any format one likes. Many people choose to use 40 random characters. I'm wondering how much of a security issue is to prefix the API key with a prefix "leaking" it's use-case? E.g. if I were to use 40char tokens I could do: 'myproj-refresh-'+random_chars(40). So that the resul...
I'm considering an environment in which I will have to identify a computer. In this scenario all hardware parts (CPU, HDDs, RAM, etc) won't change, while I'd like to consider a changing OS. The goal is not to have to rely on any additional software or hardware other than the computer I want to identify and the plug-in ...
We have a web application, where other partners can include their pages as iframes. We implemented a server-to-server way of authenticating users for the iframes, but one partner doesn't want to implement it. The bad thing is, they also don't want to display their login page in the iframe in order not to be vulnerable ...
To work with ECDSA keys I am using the python-ecdsa library. Unfortunately this library can not process keyfiles properly if they are provided in the OpenSSH format. Instead I generate them in the PEM format, which the library can handle, using the following command: ssh-keygen -t ecdsa -b 256 -f /home/user/Documents/E...
How can a static ECC public key be authenticated when being shared between the client (who has just created the static ECC public key) and the CA (Certification Authority) - who will sign and send the client's static public key to another node in the network?? Background context: The client and another node will both g...
There are plenty of comparisons, but most of them are for older versions of OpenSSL. Apparently OpenSSL fixed a lot of infamous vulnerabilities, and cleaned up the code and the build process. As of today (OpenSSL 1.1.1d), how does OpenSSL compare to BoringSSL? Would you move from BoringSSL to OpenSSL?
If you are using onedrive or any other cloud storage system is your identity safe when you connect and want to browse using a VPN or should you shut down all USERNAME / PASSWORD required services before using a VPN connection in order to remain anonymous?
When I use openssl genrsa -out yourdomain.key 2048 command to generate a key. I understand the yourdomain.key file contains both the private and public keys. But when I check the content of this key file, it starts and ends with -----BEGIN PRIVATE KEY----- and -----END PRIVATE KEY-----, which gives feeling that this fi...
AWS console(EC2 dashboard) shows public DNS name as ec2-99-xx-xx-xx.ca-central-1.compute.amazonaws.com for an EC2 instance. But the same AWS EC2 has a different DNS name (shown below): $ hostname -f ip-172-xx-xx-xx.ca-central-1.compute.internal compared to DNS name shown at AWS console. EC2 is created in default VPC...
I would like to download a website's SSL certificate but can only see my cooperate firewall SSL certificate. Question: When all traffic that flows to my computer from the network have the same ssl signature (due to firewall) is there a way to see the actual site signature? Is there a way to view the actual SSL certific...
I bypassed a WAF and found an XSS vulnerability using the onpointerover event handler. In the page where I found the vulnerability, there's also a login page. What XSS payload can I use with the onpointerover to load an external javascript file inside the page? Something like: onpointerover="load.external.javascript/f...
I captured my network traffic to a web server and the SSL Handshake consists only of two packets. Why does that happen and why aren't there all the other packets?
So I just came to know about Digital certificates, and this is what I understand. Public Key, Message + PK_encrypt(Hash(message))/Message Signing, And other identifiers is what a digital signature is. The Signed message is decrypted by the client and if the client computed hash of the message is identical to the signe...
I have an SFTP server. My ServerA wants to send a file to SFTP server, and i was told that ServerA public key needs to stored on SFTP server for Authentication purposes. My question is, if the public key of ServerA gets installed into another server by an internal attacker, and if somehow he also points ServerA to anot...
In the context of Identity and Access Management, is my understanding that Trust is between directory services and Federation is between IdP servers correct? I have also come across terms that are specific to each, for example Transitive Trust (but not Transitive Federation) and Federated Service Provider.
I thought I read that if my network connections, both wifi/ethernet, are NOT on, that if someone wanted to try and work on hacking my OS, that they would have to wait until the network connection is active, even if my computer and everything connected to it is powered on (firewall, switch, router, etc).
I just received an email from "Have I been pwned" to say my credentials have been made public via a breach. The quoted text is: "The exposed data included names, email addresses, genders, spoken language and either a bcrypt password hash or Google auth token." I would like to know what someone could do with a Googl...
GDPR classifies data into Non-personal, Personal and Sensitive personal. Sensitive personal is further broken down to Genetic and biometric, Racial and ethnical, Religion and Philosophical etc. Coming to implement a new Active Directory I want to present my stakeholders with the different options that they have, with G...
I have iframe in my website i want it to be encrypted so that user can't understand the link and when user try to paste on browser it should show the video <iframe id="<?php echo $fetchyoutubedetails['id'];?>" class="yt_players" width="972" height="284" src="<?php echo $fetchyoutubedetails['video_links']?>?r...
as mentioned in the title I have disabled Network Discovery for all of the 3 profiles yet when I run an NMap scan, the port comes up to be open. I have also run the command netstat -a -b to find the services running on ports, but port 5357 does not show up in it all. Is there something I am missing outright here? Can ...
There has been a lot of news lately about facial recognition use by police forces being banned or that it should be banned. The obvious example is that a police officer who is motivated by personal reasons to misuse the capability could do so. While I agree there is potential for misuse like this... I would assume meas...
Trying to determine if there's a way to configure an FGPP(the policy itself) to last/be enforced only for a specified period of time or ideally, until a triggering event occurs. E.g., create temp pwds for a group w/ a 10-day expiry FGPP, but only have that FGPP in place until the pwds expire in 10 days, or they change...
In an SMS conversation, my friend received a text message within our SMS thread that was clearly not sent from me, and that did not appear in my SMS thread. They took a screenshot and it is in Chinese characters. Could this only be a SMS spoof, or could it be worse like a SIM Swap Attack?
I want my application to verify that it is being run on a computer with a certificate issued by my Private CA. How can I do this when the computer is not on the network?
So this is a little out of the ordinary. Not sure what to make of it. I've enable 2-Step Verification on a Google account. When opening mail or other G-related services, it sends an SMS(text message) to my cell, with a code. That code is used to complete the login to mailbox... But obviously you already knew that ! A f...
We have a long-term key used for signing/verifying the ephemeral keys. The problem is we have to first share the long term public key with the other party. Is it possible to avoid a man in the middle attack without using certificates? I will be using this for a TCP chat.
I was wondering how could I give some advice to one of my friend when attempting to analyze live Windows machine which was infected with malware. As far as I know, hibernation saves RAM memory contents and compresses them into hiberfile.sys file. But also there are 3rd party tools like Belkasoft RAM Capturer which rea...