instruction
stringlengths
24
29.9k
Theoretically, is it possible to hash an executable file and have the output hash end up being another executable file? I know the chances of this are unimaginably small, but I'm curious.
As part of our software procurement process, we're evaluating the security of applications, e.g. by checking if there are non-addressed vulnerability reports and if the vendor embedded secure requirements into their software development lifecycle (e.g. scanning for vulnerable libraries, static code analysis, secure cod...
It would be nice if there was an area on my computer where I could work with temp files that may contain sensitive information that could be encrypted with bitlocker or something similar when the files are at rest. It would be even nicer if these encrypted directories could remain with their projects, and maybe be decr...
I want to know if there is a way for JS from one Origin to delegate a task to JS from another origin in a secure way. The use case is to have a JS Agent from the users' home origin use the JavaScript Web Crypto API, to save the key in the browser storage in a safe manner. Other Apps should then be able to make reques...
In a typical mobile project, a user can register and login into an app, and the app communicates with a server. For simplicity, consider an app where the user can register/login using the OAuth2 standard with his google account. Now, the own developed server would like to fetch additional information; in the example th...
I'm building an app that needs to check bad websites and was wondering if there is a way to download the Firefox bad site list directly outside of the browser? The list is described in the Mozilla.org knowledgebase article below and is automatically downloaded by the Firefox browser every 30 minutes. This question is s...
I am practicing pen testing in a protected box and I have a vulnerable Magento website and I managed to get its MySQL config file which is app/etc/local.xml. In this file there is information such as: <crypt> <key><![CDATA[414c9022922d31b62bbe4447356e4ed6]]></key> </crypt> <disable_local_modules>false</disable_loc...
Say you have an e-commerce site that falls under the SAQ A-EP standard, due to extra content on the same page as the iframe that takes the credit card info. This used to fall under the SAQ A standards, but apparently the standards have recently changed to include any site that hosts any other content on the same page a...
If you Google for an example of XXE injection you get something like this: <?xml version="1.0" encoding="ISO-8859-1"?> <!DOCTYPE foo [ <!ELEMENT foo ANY > <!ENTITY xxe SYSTEM "file:///dev/random" >]><foo>&xxe;</foo> where the attack is carried out from within the DTD - so at the very top of a document. Is it...
My question is about the use of ultrasonic messages that are part of the modern advertising ecosystem and are also used by the Google Nearby Messages API. When it comes to advertising, the type of ultrasonic messages that I am referring to are described in this Wired article titled "How to Block the Ultrasonic Signals ...
Let's say my username is theusername and my password is thepassword. If use those credentials I login as expected. However if I add whatever at the END of the username, say theusername.random.stuff.at.the.end, I still get to login to my account. Doesn't work if I do that at the beginning. Also, if I put an odd number o...
There is an authentication server (OAuth2) that is only accessible from private network. A customer wants me to implement an app where users use VPN to authenticate themselves on such a server via HTTP (specifically not HTTPS) I am not a security expert, but have a bad feeling about this. Is it safe? If not, what are t...
I created test DB file (.kdbx) using KeePassX, after that used keepass2john Python port from this site, but changed line 88: index += 2 to index += 4 because the size of this field is 4 bytes instead of 2 (program will show wrong results without this change). It outputs test.hash: $keepass$*2*0*253*e73cfb2502b6e54390...
Recently we had a failure in one of our systems because IIS rejects query strings with (URL encoded) parameter values containing the sequence &#. It doesn't reject & #. We've got tired of working around this limitation (e.g. user types a formula for a rule they want evaluated, we have to work around encoding less th...
I am working on a SaaS application that handles sensitive data. I had the idea of planting various canaries across our application / infrastructure to get early warnings of people being a bit too much interested in our work. The idea is to plant various CTF like "challenges" with various difficulty that would allow us ...
I was searching this site for questions on Emotet and I was kind of baffled when nothing was on here. So the title is kind of self explanatory. See this question as an attempt to "complete" the content of this page. How does the current (and/or former) iteration(s) of Emotet work?
Im trying to arp spoof a local network but the /proc/sys/net/ipv4/ip_forward is reverting back to 0 when ettercap is performing subnet scan on a network hub. Even if i change it back to 1 after the subnet scan wireshark doesn't seem to get all http data from the scanned hosts. Majority of the packets that wireshark int...
I am building an authentication system to be used within a company's private network. I do not administer this network, and I know very little about the setup, but my basic understanding is you must be on a local machine or VPN in to access it. The system/services consists of: An OAuth server that uses JWT's as access...
If a client connects to a server he will start listening for the response on some random high port number. The client then expects any packet destined for that port to be a valid answer. Or does he additionally check if the ip-address matches or any checksums etc? Would it be possible to send a specifically crafted pac...
If we can't protect the targets (CVEs until we drop), do we need an Internet police that chases the source aka attackers? I don't like the police/military either, but couldn't that be more economical than making the software 99.99% secure? Here is my extension of the question: Regardless of whether it would work well a...
I want use hashcat or John the Ripper to crack the hash of a password. I know the password was created using the following command: openssl passwd -crypt -salt tl ******** The asterisks, of course, are placeholders for the actual password. I know for sure that the password has 8 characters, and that the salt is tl. Ho...
I'm testing a website: https://this-site.com/path/to/dirs but what i've found is if I do the following below the site will load 4 pages in a infinite loop https://this-site.com/path/to/dirs/.../. I was thinking it would be something along the lines of some sort of input validation issue or even DOS as if I open up ma...
Is it possible that the Man-In-The-Middle can eavesdrop on communications in your subnet? (meaning between computers in your subnet and not outside of it) I am learning networking and I made this assumption from my course material and I'd like to double check.
Example strong diceware password: widow stout harvey crest zomba zloty butyl This password will be rejected by most sites, for example by Outlook.com. (Notable exceptions: Gmail, Stackoverflow, which seem to accept this very password (tested)) Example modified diceware password that will be accepted by most sites: Wid...
Diceware wants us to actually randomly pick n words from a given set of m=65 words. Assume a user does not actually use a dice. Instead they take a physical dictionary of m words and "randomly" picks n words. Can it be somehow quantified how big would the drop of randomness be? For example, I suppose that they would ne...
I remember there is a TOCTOU-related vulnerability, where one should never default the access of a user to true and set to false if something goes wrong, but default it to false and set it to true only if everything goes right. However, I dont remember the precise vulnerability or the antipattern name. If some help to ...
I need to whitelist https://hooks.slack.com in Application Security Group (ASGs). As I have understood ASGs are static and they don't resolve DNS. Then how do I whitelist https://hooks.slack.com dynamic IP address in my ASGs? I'm using Pivotal Cloud Foundry
I go to conferences and there are often free bluetooth earbuds and headsets given away. If I pair them with an Android device, is it possible for them to infect the phone with a virus? I have read some other posts which talked about security of the bluetooth connection to the device. However I am worried more about the...
I am looking to have the cryptography identified of this encrypted message aHR0cHM6Ly9nb28uZ2wvZXY5SDN1 Any ideas what crypto was used here? Thank you
If I create a user in a Linux system with an empty password, does that expose any remote vulnerabilities, or is it only a problem if someone gains physical access to the machine?
someone can tell me how rijndael works? for now i need to handle key and iv generated from C# (using rijndael + rfc2898derivebytes) to match with CryptoJS code snippet of C#: byte[] saltArray = Encoding.ASCII.GetBytes("20190925"); Rfc2898DeriveBytes pdb = new Rfc2898DeriveBytes("password", saltArray, 1000); rijndael.Ke...
We have a huge GWT application, which was never tested for security and now we would like to patch it with some of the "best practices" we have found on the GWT website. One of those patches is related to the RPC XSRF token, so we applied the code so any call in the application will sue the token, and everything "looks...
I'm trying to find a buffer overflow sample code in Objective-C but the only samples I found are written in C (without "bracket style"). I understand that Objective-C is based on C, but are there any chance of getting buffer overflows (or any kind of overflow) using only Objective-C ? Would you have a sample code to de...
I want to implement a server side application with REST API - clients are browser and mobile app. User will have a login (email, password) and will store his files on the server. These files must be encrypted so that admins or anyone with access to the DB or filesystem wont have any possibility to open these files. Her...
I don't know what if part of this command does. FROM table WHERE id = 1 AND IF(( Ascii(Lower(Substring((SELECT User()), $i, 1))) ) != $s, 1, Benchmark(200000, Md5(Now()))) ``` any one can help me?
I know similar question have been asked but none of them are explained thoroughly. I have setup a VPS and setup openvpn using https://github.com/Nyr/openvpn-install on tcp and port 443(I have access to limited open ports). Now I want to tunnel the openvpn traffic through ssh.I want to do so because the packets are filt...
I recently built a Downloads Manager that will debut though before I do so I want to know what file extensions I should explicitly disallow from being accepted? Running LAMP/WAMP the most obvious I've come up with since the five minutes this issue came to mind: *.htaccess *.php The idea is to allow clients who use th...
Let's suppose that I allow users to upload an image or a video. Obviously, I rename it on the server side. Can an attacker use it to conduct an XSS attack? I show images in this way: <img src="image_from_user.jpg" /> And videos in this way: <video src="video_from_user.jpg" />
I keep getting an error on airgeddon while using my Alfa AWUS036ACH network adapter (RTL8812AU chipset). I can launch airgeddon successfully with all requisite tools installed, select my wlan0 network, put it into monitor mode then select the Evil Twin menu. In the Evil Twin menu I select option 9. Evil Twin AP attack...
The higher education institution that I attend uses Eduroam, a infrastructure and IT company that often caters for the infrastructure and network needs of research and educational organisations. I am a bit concerned about the risk of sensitive information (such as login details) being stolen while I use the internet at...
I am studying for my Security + exam. I have just learned that ACLs can be designed to block ports and/or entire protocols. The book I am reading states an example: "if you want to block HTTP traffic, you can create a rule to block traffic on port 80" This makes sense - HTTP is usually sent over port 80. But why block ...
I occasionally work from home. I have a work laptop that I bring home and connect to my company's network using my home WiFi (I assume it has its own direct connection). I also have my personal computer and my phone nearby, which also use my home WiFi but have nothing to do with my company's network. I use a browser-le...
If there are multiple exploits, each not accomplishing anything significant on their own (but are still technically exploits), but when used together in an exploit chain can achieve a meaningful result, would the entire chain of them be eligible for A CVE or would each of the individual one be eligible?
I've noticed that on many sites, when they ask for a one-time password (OTP) (usually sent by SMS), the input is hidden in the same way as a password field is. My understanding is that once an OTP is used, then it is no longer useful for anything. Is there a valid reason for hiding the input for these fields?
Recently, a Federal Judge ordered Marriott to reveal the forensics report for its data breach. I know the Courts have sided with businesses in the past to keep the forensic details of breaches from public disclosure (this may now be changing). And I have looked extensively to find information about the authentication s...
If I, as a client, connect to a server and there is a malicious certificate authority, how can the client protect against this CA and still connect to the site? If this isn't possible, how can the client be aware of a compromised CA on Firefox?
I'm by no means a security expert. I own a very small personal site which I wrote in php mostly for practice and all that. I noticed a weird url call in my logs process.php?d=MV0f+F6R+6Nn/B4VDh1FRJ9fSEjpPw==&b=1 I tried following that url myself but it doesn't go anywhere but a 404. I don't want to nuke my site from o...
The initial TLS handshake agrees on a cipher suite to use, but what stops an attacker from MITM-ing the initial handshake and downgrading the cipher suites?
So what I am looking for is a way to prevent anyone from booting from a USB drive on this specific Dell Inspiron 5559. so normally what I would have to do is to set an Admin password in BIOS that would prevent anyone from booting using a USB drive or change BIOS settings without the Admin password, but the bad thing is...
This is slightly different to this one which site do you use to view details of vulnerabilities? My question relates to the differences between various websites for searching vulnerabilities. I am aware of the following sites: National Vulnerability Database (NVD) (https://nvd.nist.gov) CVE Details (https://www.cved...
A user clicked on the link of this email and entered their credentials, thinking the message was legitimate. However, the link didn't redirect to the fake site, and instead their mail client sent them to the link as it was displayed (the real mail server's web portal). What is this (from the raw email)? X-CU-modified: ...
I'm not very experienced in the security field, but I'm trying to sign then encrypt a large folder in order to deal with software updates in some machines that will be offline. I've thought about generatic a key pair which my company will keep in secret and will be deployed in each of the machines. I've used this comma...
I am interested to see if it's possible to have domain fronting through a web browser, using any of its components (e.g. javascript) which can be utilized by the user. For example, i've tried through javascript and XMLHttpRequest, but it's not possible to set the Host header due to "security reasons". Are there any oth...
While on a client's site using the corporate network, I see that only a few search engines are allowed. Google and Bing, possibly others; while my fav DuckDuckGo is blocked, and a few others that I've tried are also blocked. The search engines are being blocked by the proxy. What benefit does blocking a search engine...
A topic has come up with some colleagues that appears to be a 'regular' and I thought to ask the forum: We have had use-cases for remote workers who VPN to the corporate network, which does not support split-tunneling, who wish to print to a local IP-printer. In exploring both Cisco and Palo Alto clients, there appear ...
Our webserver is forwarding HTTP GET request to application server as below including a statement or condition like "AND 1=1", our Palo Alto Firewall detecting this traffic as SQL Injection alert. PCAP is like below Hypertext Transfer Protocol GET /cadocs/0/j027931e.pdf?resultnum=9&intcmp=searchresultclick AND 1=1 H...
I was fiddling with https://jwt.io/ using this header { "alg": "HS256", "typ": "JWT" } when I realized that replacing the payload name with something repetitive like AAAAAAAAAAAAAAAAAAAA would produce a token such as this: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwibmFtZSI6IkFBQUFBQUFBQUFBQUF...
Basically, trying to wrap my brain around how I should be handling secrets using Docker, k8s, and Skaffold in a dev environment. I'm pretty new to this tech, so don't fully understand all of it. Just not sure if I should be using a .env, or config.json, that isn't committed to the repo, or if there is a better way with...
We are experiencing fraud with our open API, so we're turning it private. Let's suppose that I'm using OAuth and Bearer token to authorize who can access my API. Request: App -> Credentials -> Auth Endpoint ... Response: a bearer token to be used in future requests But even with HTTPS an attacker can user Fiddler, Bur...
A renown online bank uses a phone dial login system (input your login and password via the phone dial pad). How secure is this communication against MitM and similar attacks? Considering I recently read how many major telecommunication networks had backdoors in them I am considering this to be bad news.
An email system typically consists of multiple agents: Mail user agent (MUA) Mail submission agent (MSA) Mail tranfer agent (MTA) Mail delivery agent (MDA) Evidently the 'middlemen' of this system are a spoofing risk. (Technically the endpoints could also be a spoof risk, but let's assume in this case that the end u...
There are many "threat maps" online such as Norse, Fortinet etc serving accurate information of all kinds of attacks around the globe such as DOS, Scans, Pings, and many more. How accurate is this If i launched a big DDOS attack will this attack be visible Where do they get their data from, or where is it based on
I understand how FIDO works with yubikey: Yubikey device has a symmetric key and it uses appId, nonce and symmetric key to generate key pair for a website. And the device gives back public key and keyHandle (which can used to generate private key) to the RP. But U2F works on chrome in Mac with Touchbar without yubikey....
It is my first time posting on this forum, so correct me if I do things incorrectly. My ISP is Xfinity. I use their modem/router. I have been noticing unusual activities from my network and an unknown ssid broadcasting from my modem. As a test, I disabled my wifi ( both 2.4 and 5) and my hotspot, so that the only int...
Microsoft Windows 10 does support physical security keys since some time. Google recently announced that Android phones can be used as security keys as well (primarily for their own services). Is there a way that these two play together, i.e. can I use a Pixel phone with NFC to unlock a laptop with Windows 10 and a NFC...
At the moment, I am struggling on a question to which I have not found a good answer so far. I wan't to create a password manager, which will be used by a lot of people. Used languages: PHP / Javascript (don't think JS should be used for any security-related things tho) My concept so far: Only (Framework-)Admins can a...
Assume a scenario where we have a modular system including: an Authentication Module (AM) which gets username and password of an internet user and issues a token for the user. User<-->AM communication is secured by TLS and AM has a certificate from a known Certificate Authority. Some services that accept {Token, Requ...
I am building a system that at some point requires a 256 bit key AES key. I used to feed passphrases through PBKDF2 to derive a key, but then I decided to generate random passwords of 12 words selected out of a set of 2048 words which offers me 132 bits of entropy. Is it safe to pass through PBKDF2 the set of random wo...
I found online an web app that is vulnerable to blind sql injection, I manage to get in users table and I looked at my password, in the table was the hased version, this one->57b0fcbe39b9336d, now I know that my password is dinamo, knowing the hashed version and the original password how I can use this informations to ...
This morning I booted up my computer and not long afterward, got a notification from ByteFence (unsubscribed) that an unknown process attempted to execute a command that was deemed unwanted. ByteFence gives me the option to ignore the "threat" and let it execute, but to Block it, I need to pay for their service. I don'...
I have a mobile application that needs to be able to work when the phone is offline. In order to prevent misuse by others when they have a short physical access to the phone the requirement is to authenticate the user every time the application gets opened, i.e. even when offline. By keeping a hash of the password on t...
So, say I am using Snapchat, can my internet provider see that I am using it?
The author of the PGP pathfinder deceased this year. Shortly after the data was not updated any more. Are there any alternatives known to find signature paths?
If an iOS device is jailbroken, I understand an attacker cannot extricate key material from the secure enclave. But would they be able to use keys using CryptoKit within the enclave to encrypt a password stored within keychain? Or do the CrytpoKit APIs perform some sort of system integrity check before accessing the k...
WEP is dead and no one should use it... but I have a couple of devices that I would like to use (mainly an original DS that does not support any of the newer standards) Is it possible to set up a usable WEP wifi network that isn't a gaping hole into the rest of my network? Maybe something that can reject devices that a...
we want to encrypt emails that we send to the user with his public key. this works great, however the user can also type in a broken/invalid public key ("asdf123") and then the encryption won't work obviously. how can i validate, that the user inputted a pgp public key with correct format?
I have an active account at ebay-kleinanzeigen.de (like Craigslist in the US). Today I got a valid email from them that my email address was changed. On my mac, I opened up my ebay-kleinanzeigen account in my Chrome browser and was logged in with the hacker's email address. I understand how the attacker could have c...
I work in a company that has strict antivirus policy. Each computer must have an up-to date antivirus with all the bells and whistles turned on. But as a developers, this is giving us problems. Most noticeable is performance degradation. As building big solution might be creating, deleting and moving around lots of fi...
I have flashed an old Samsung phone with a custom ROM. The OS (and all the needed software) come from a website that "should" be safe, from users that "should" be trustworthy. Still, I like to be a bit paranoid when it comes to security. And so, let's assume the mobile is now compromised, as a result of something nefar...
Should the VPN have a no-log policy or is it better to have a log policy? I think a log policy is OK, I am not doing anything illegal just protecting myself from illegal surveillance by criminals. Does it really matter what country the VPN is based in? Wouldn't it be better if it is based in your home country, as it ...
While I was studying ret2libc, I saw that tutorials use: call_to_function + ret addr + arguments For example I understand that if I want to execute system function from libc I can use the following scheme: system_address(that overwrite eip) + addrsssOf_exit_function + arguments What I didn't understand is why we us...
I am making an universal app using react-native and react-native-web. My graphql endpoint is open to public. I know CORS/CSRF do not apply to mobile apps. But I also run the same app on the browser using react-native-web. So I need to prevent other malicious websites to manipulate my users' requests on their browsers. ...
I understand how JWTs work and that with my secret anyone can issue new tokens. I control the server that my node website runs on and am considering different options for hosting the key. In code - Not acceptable because my code is in a github repo ENV variable - seperate secrets for dev and production while not leaki...
Seems like a modern ISP would already be equipped with some basic level of packet inspection to identify outgoing TCP connections even if just for doing traffic shaping or carrier-grade NAT, and maintaining a reverse lookup does not sound prohibitively expensive.
I am building a JavaScript application that will run in a web browser but also as a pseudo-native mobile application via Apache Cordova. It communicates via API to a separate backend service. The app requires that the user be prompted for some kind of identifying information whenever it is launched, but for ease of use...
Can we listen for 10 connections at once using any options present in Metasploit.
I've been learning about OAuth2, JWT tokens, and refresh tokens. My understanding of this is: A user logs in using their credentials. They are given back an access token (short-lived) and a refresh token (long-lived). Any requests to API resources uses the access token. When the access token expires, the refresh token...
I want to implement a zero-deployment strategy for my websever. My first attempt was to create a specific user (deployer) for that: # Create user deployer sudo adduser deployer # Give the read-write-execute permissions to deployer user for directory /var/www sudo setfacl -R -m u:deployer:rwx /var/www With GitLab and s...
My client has 5 different identity and access management solutions. Until now they have been asking each one of their suppliers to add 5 trusted parties to their IAM solution, implement different URLs that will trigger SSO etc. It is now proposed that a new component is introduced in between the company's IAM and the s...
Lets say we have private math/developers forum website made with asp.net. Users can post text-messages in topics. Based on OWASP articles we should escape symbols like: ' " < > / to prevent XSS attacks. But characters ' " < > / are too important for that community. Since it's private forum we can have some level of tru...
I use a smart card reader and I want to know if the reader is secure. How to sniff communication between card and card reader?
I have a basic understanding of how the certificate authority ecosystem works. I know that when I'm connecting to a site, and they provide me with a certificate, my computer verifies the certificate's signature based on the trusted authorities stored locally. And I can follow the chain of authorities my computer trusts...
The main question: How can I securely connect to my personal computer at home from a workplace computer? Background: I do much of my work on a university computer, but the computer itself is not fantastic, so I SSH into my home machine to run computations. This system works well, but I am facing a dilemma about how to ...
I saw this design recently in an infotainment product. The goal is mutual authentication between two ECUs, E1 and E2. They only care about each other. The basic idea is to keep both keys secret and let each ECU have one. Let's call the keys k1 and k2, instead of public key and secret key, or E and D. Both keys are larg...
I am pentesting a PHP website running on Apache in a Ubuntu server. I found a vulnerability that allows me to write files to the target system. I know it's possible to write a php shell to the HTTP root directory and get RCE this way, but in my case It does not seem possible. The web server is running as the www-data u...
I have taken a working HTTPS certificate from a server that I want to use on the same server, just on a different port. The certificate has a Subject Alternative Name defined in it. Using keytool, I generated a new keystore, added the existing certificate, and restarted Tomcat. However, when I get to the site, it st...
I have a bunch of different apps on my iPhone 7 (iOS v.12.4.1). Some of these are made by large companies such as Amazon, McDonalds, and so on. There are also some that have been made by perhaps a single developer. Some of my apps are quite well known in the Apple App Store while others, not so much (judging from very ...
I will have an application server that needs to use credentials to authenticate to another service (email). What's the best way to securely store these credentials locally on the machine? Thanks in advance!
I have a client application installed on my Windows computer and I want to perform a MITM on this application to inspect the traffic. I understand that Burp can do the MITM for web application, but can it do the same for a client application? If yes, how do I setup Burp to intercept with client apps? Thanks!
I've been trying to solve a homework question in a beginner infosec class, and I was stumped on an issue and I didn't really know of the right place to ask. If it isn't then please let me know. Given the following ports, 8080/UDP 6667/TCP 53/TCP 443/TCP if somebody was developing malware, which would be the most likely...