instruction
stringlengths
24
29.9k
Is it possible to create a pfx file without import password? Or is it possible to remove the import password from pfx file that I've already created?
I found the exact same question about physical stores: What information about me do stores get via my credit card? Though I am interested in online stores! Are there big difference between PHYSICAL and DIGITAL store transactions and the processes involved? What information do merchants get about me (or my credit card)...
A CAA DNS record limits the certificate authorities that may issue a certificate for a domain and its subdomains. Do CAA records make sense in a LAN environment? Assume internal hostnames such as ldap.emea.contoso.local, with certificates signed by an internal CA. Can a CAA record on contoso.local enforce that only the...
I have a site located at https://gooddomain.com/wonderful?returnPath=goodThings which redirects me to https://gooddomain.com/somegoodplace/goodThings At the server side, the redirect is defined by String path = request.getparameter("retrunPath"); String rPath = "redirect:/somegoodplace/"+ path; return new ModelAndVie...
When I go online and calculate a hash from a string on some generator website, no matter the algorithm or the website, it is always a different output than if I do echo "password" | sha256sum (or insert *sum there for corresponding algorithm). What is the difference between the two?
I am a noob :) I am attempting to recover a password from a piece of software. The software has a XML file contains three fields that appear important to this process: Password Value, EncryptionKey Value, and PasswordEncoding Value. PasswordEncoding Value is set to 12000 (in case that helps). The other two fields app...
While doing penetration testing for a client I stumbled upon a security incident. CloudFlare promises to hide the origin IP address when using its DNS. I went to dnsdumpster.com, inputted my client's domain and there I found my client's ORIGIN IP ADDRESS, which should've been hidden. In CloudFlare DNS the corresponding...
Looking at the Oracle security advisory page here: https://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html Oracle in 2016 disclosed vulnerabilites in their OJDBC7 versions 12.1.0.1 and 12.1.0.2. However looking for the most recent versions of OJDBC they are still offering both 12.1.0.1 and 12.1.0.2...
Someone I know (call them Darren Smith) recently received a rather odd email. It was sent to their personal email address, emailaddresswithnonameinit@emailprovider.com. The "From" field had "Darren Smith" as the name in it, but the actual email address was ninerandomlettersandnumbers@differentemailprovider.com. The tex...
Is the solution to preventing credential phising attacks is really only 'educating' people about it? For the sake of this question, let us assume that I have a web application that takes a username and a password within a login form. Currently, as far as I know and could figure out, there is no way I can avoid an atta...
Firstly, please apologise me if I'm still confused about stuff here, Kerberos auth is quite the complex issue for a java dev So, I have the following scenario: A suite of webapps which use kerberos pre-authentication for access and LDAP profiles authorization for the sub-sections I have a Windows Server in AWS with a f...
Given an application backed by a MongoDB database. Documents that are generated via the backend are assigned a BSON ObjectIDs (a hex string) to identify them, unlike SQL like IDs which are usually natural integers starting from 1. Those IDs are not as safe as UUIDs (for example when pausing artificially the time such a...
In the NICE Cybersecurity Workforce Framework document there are 1,007 Tasks and 1,180 KSAs - is there any explanation of the direct links between the Tasks and KSAs? (or any database) In the document, there is no connection between Tasks and KSAs - the Tasks that each Work Role is responsible for and the KSAs required...
I am reading the OWASP Test Guide v4 to learn how to pentest a web application. In the documentation, there is a section called "Map execution paths through application (OTG-INFO-007)". I'm not sure that I understand the title. Is it about having all the paths and therefore the structure of the web application or is it...
Say you have a website which takes file uploads of a certain type and places them in a subdirectory (let's call it "videos") in the web root. I have heard from various sources that trusting uploaded files is never safe, because a payload can be uploaded and executed, even if you check the file extension. Ideally, you s...
The Emotet trojan is active again and I read a bit about how it propagates. This includes phishing and having users launch all kind of files (exes, fiels with macros, ...) - a typical method. It also scans the network for writable shares (where it can copy itself) and tries to brute force accounts. Since it does not se...
Bob sent an email to Alice with nothing much useful and tenuous ( but because it isn't useful it can ruin Bob's reputation if bad Alice decide to publish. ) Is there a way for Bob to include a suicide-after-a-specified-time macro inside the email or similar after the "Seen" flag is set, that is still paired to Bob and...
I am wanting to implement 2FA in my application. I am a relatively new developer (~1 year Spring Boot / Android). At the moment, my App uses Spring Security AuthenticationProviders to authenticate a user only by their username/password combo using BCrypt as the hashing algo. With generally looking online, I can't seem ...
I have certificate that expires in two years. I'll probably try to participate in key signing party so I get to know what it actually looks like. What happens in two years? When my certificate expires, and I'll renew it by setting later expiration date. Will people still trust my certificate via the web of trust? Or wi...
A Runtime Crypter always works with the same principle: It decrypts its payload, starts up a process in suspended state, inserts the payload and resumes the suspended process under false flag. All this happens with calls to Winapi functions like CreateProcessA, ReadProcessMemory. WriteProcessMemory etc. And even tho th...
Someone requested my site's (Wordpress/Apache) 'includes' directory: 122.51.0.219 - - [03/Oct/2019:18:36:15] "GET /wp-includes/Text/Diff/ HTTP/1.1" 200 736 "-" "-" Noticing the 200 response, I hit the URL myself and found the contents readily visible, with navigable subdirectories as well. With the common sentiment t...
I'm trying to implement an automated patching program at a small SaaS provider. When a customer signs up for our software, we provision them a Linux VM in our primary datacenter. Each customer also gets a QA and sandbox server in another datacenter. All the servers in this datacenter are registered to a central Linux ...
I have a website that is being hit with invalid URL requests by thousands of distinct IP addresses, never the same one used twice. Most of them are in a few ranges of IP addresses and often just go up sequentially. Could this be a zombie botnet of compromised devices, or is it possible the attacker is spoofing these a...
So, just a single windows host attached to the router and a virtual machine running on it. No shared folders or clipboard. Just testing your average malware. Note that this question talks about just a single PC connected to a router, without any fancy file sharing enabled via network (It can have stuff like torrents a...
I want to mimic a HTTP POST request that I intercepted and have raw on a file, what would be the best way to send it and be certain that I sent exactly the same request? example file: (private data redacted obviously) POST /mobile/testAPN.ashx HTTP/1.1 Connection: close User-Agent: [REDACTED] Cache-Control: no-cache Pr...
How risky is to let someone connect a smartphone for charging it? Could someone intentionally or unintentionally contaminate a fully updated and patched Windows 10 or Ubuntu laptop?
I am volunteering to teach some folks to learn Splunk to analyze logs by using SIEM. Therefore I will need some public log file archives such as auditd, secure.log, firewall, webapp logs, which I can use to upload to Splunk instance and write some queries on it. Do you have any place you know I can download those kind...
I am trying to overflow the buffer shown bellow, yet can never reach it. I know that the location of buf is before i and len, and in my case to overload the return instruction I need to amend the integer len. I know I need to fill in the buffer till I get to the len variable, but don't know how to avoid filling the i v...
If we have an RSA layer of encryption over some text with n bits of security, then we use an elliptic curve, say with m bits of security, how can we calculate the total bits of security with RSA(ECC(...))? Do we multiply, add, or something else to caulcate the total bits of security?
A TOG (threat intelligence gateway) is a hardware piece that sits between the router and the firewall. The TIG uses the threat intelligence and filters out the malicious urls and IPs before reaching the firewall. My question is how I can build one, what are the parts of a TIG in terms of hardware, How can I build one ...
Is there any benefit in using refresh tokens if your auth and resource server are combined? I understand the benefit when they are separate: The refresh token is never sent to the resource server, but if they are not is there any? Without the refresh tokens, the access tokens could still be refreshed the same, but is t...
victim.com - URL of the misconfigured application. https://victim.com has an overly permissive crossdomain.xml at https://victim.com/crossdomain.xml. <?xml version="1.0"?> <!DOCTYPE cross-domain-policy SYSTEM "http://www.macromedia.com/xml/dtds/cross-domain-policy.dtd"> <cross-domain-policy> <allow-access-from...
I found a site where XSS is running I want to report this site because it is dangerous for others Where should I report it?
I am learning about WS-Security and trying to compare different options offered by UsernameToken as described in this document. AFAIK, a digested password is a hash of the plain text password along with a nonce and a date. This prevent replay attacks and the need to send the plaintext password : Password_Digest = Base6...
I need help to authenticate users with user credentials. We are using Angular 5 as a front-end & need to store the user's email and password if the user checks on Remember Me. Then autofill user credentials after logout and refreshing the browser. There are several ways to store user credentials (Cookies, Local Storage...
Is there a difference between dynamic malware detection using automata and family behavior - graph? I think that they are both relying on API function calls but I don't understand if there is any major difference between them. If you're not sure what I'm talking about: automata - https://www.researchgate.net/publicatio...
So today I read about the sub-resource integrity attribute feature for browsers. And I though of using the same concept to verify the integrity of my HTML to protect against tempering by my web host or other MITM attacks that SSL was not able to prevent. Basically I'm thinking of running my HTML through a hash function...
Is it possible to extract the certificate from a CAC (DOD common access card) and install it on a phone so that access to websites using bidirectional SSL can be done from a user phone. Ideally, the certificate would still be protected by a PIN/passphrase. Initially interested in Android phones.
I'm writing an iOS app that will store some information. Though not too confidential, I'd like to prevent other apps from reading the data, since a malicious app can then "phone home". If the user has jailbroken their phone, that would be their decision, so too if they will give someone else the device so the other per...
If a file is scattered in pieces on a hard drive how is it possible to find all parts of it? Forensically in a file carving situation where one do not have access to a running OS.
Our team's goal We want to protect our sensitive data from being potentially data-at-rest exposed after we relinquish a Linux VPS (see below) provided by a hosting service. We're exploring simple(r) fscrypt usage to potentially solve this problem. We are _not_ seeking impenetrable, "perfect" security. We're seeking a m...
I am very new to authentication and cybersecurity in general, so I apologize if I have anything completely wrong. My goal is to have the client side hash passwords before sending them to server side in order to protect users using the same password on multiple sites. For the sake of this question, assume server-side is...
I am working on the implementation of an ISMS and aiming to get 27001 certification. While i was conducting the Risk Assessment, I found it difficult to match all those assets/asset components with all the threats/threat events without making exhaustive and unmanageable lists. I found many threat lists with their supp...
The USPTO has two-step authentication: recommended applications comprise: Google Authenticator Microsoft Authenticator Oracle Authenticator Assume that I use my Gmail address as the USPTO username. What considerations / questions should I ask myself when choosing an authenticator?
According to the Wikipedia page for key derivation functions, a KDF's purpose is to derive a secret key for cryptography: In cryptography, a key derivation function (KDF) derives one or more secret keys from a secret value such as a master key, a password, or a passphrase using a pseudorandom function.[1][2] KDFs can ...
A few minutes ago i got an email from the real Bitfinex, saying that a unauthorized login attempt was approved by Bitfinix. Is this the work of a new breach? The IP is located somewhere in Japan.
PDFs are very commonly found on the web, and I carefully either view them on the browsers, or use readers without the capability to run the scripts that may come with them (shitty design choice) like Evince or XReader, or, on Windows, disable the scripts on Adobe Reader. However, I was wondering whether other sorts of...
My coworker and I are discussing the pros/cons between two potential architecture options, and I would like to gather feedback on which option is better and why. First, a description of the environment: We have a vertically segmented network into multiple levels. Level A is our internet facing level, with a firewall ...
If I was developing a web app client that would be served statically, I would need to either use the implicit grant flow (which is no longer advisable) or use the authorization code grant flow with PKCE. Given that I'm developing a web app client that will be served dynamically by a server, it's possible for me to util...
I am investigating S/MIME and if it's possible to have a device-specific signing key (or if that's a good idea). The intention is to reduce risk by making the private key read only on the device(es) it was requested from. This would prevent the need to expose the cleartext private key, export, import, and securely era...
So today when I was checking my spam folder on my outlook account, I noticed I had received an email from my own address. The email looks like a typical scam: Claims to have installed a RAT on my system Claims to have footage of me pleasuring myself Demands that I pay him money with the cryptocurrency DASH Acco...
A company I am working for is advocating for single sign on for their Ecommerce site and an Online clinical testing platform that contain sensitive patient information. My concern is the sensitive information on the patient testing site. Users of the ecommerce site does not always use the testing platform and vice ver...
Im trying to learn about http request smuggling and Im trying out the labs for burp suite. Im stuck on the TE.CL vulnerability, Ive clicked on the solution (see below:https://portswigger.net/web-security/request-smuggling/lab-basic-te-cl) but the request just times out. Ive disabled 'update content length' and changed ...
Should these details be stored encrypted, not at all or in plain text in a database? These are both UK terms, used to identify individuals to the tax authorities; the NI number is used more widely, appearing on payslips for example.
Hey i'm trying the hacker101 CTF's im still pretty new at this stuff The CTF answer to the flag i'm trying to understand is https://github.com/testerting/hacker101-ctf/tree/master/micro-cms_v2/flag0 The important part of the error you get when you put a single ' in the username field if cur.execute('SELECT password FRO...
I have 2FA on ALL of my accounts. But my password was leaked in 7 breaches. Unfortunately I have used the same password for most of the accounts. Is it possible for him/her to bypass the 2FA?
Since MySQL 5.7, the root user is configured to use the auth_socket authentication plugin instead of a password. Is it safe to leave the root user that way (without a password)?
We know that information can be retreived after it has been deleted. There are several tools for file "undeletion" (Recuva, FTK, some tools contained in Caine, etc.) I have heard as well, that data can be recovered, even after it has been rewritten. For this exact reason, the DoD used to approve methods which included ...
If a public PGP key can be retrieved, but there is no known path of trust from the sender to the receiver: Is is better to encrypt the message using the key on spec or to not encrypt at all?
I'm trying to understand why having a JWT access token that doesn't expire is bad for my application. The way I have written my backend, when the JWT comes in, I verify it and extract the subject which is the user id. Then I look up this user in the database to get permissions/account status/etc. which I then use to de...
I was checking out Qubes' way of creating safe PDFs, but unless you use Qubes as a daily driver (and use DispVMs to open PDFs) it's still not viable to just use it to create image-based PDFs if you have very huge documents in them. I really hope they someday manage to find a way to create safe PDFs without the increase...
My organization uses SSO for its applications i.e. Once a user logs into his Windows 10 workstation, he accesses his web application without login. I was informed that the web applications uses NetIQ Identity Manager(IdP) and Kerberos in the background to make all this work. So during the web authentication flow, the w...
I'm currently using Bitlocker encrypted external hard drive. The drive is entire-encrypted and single partition. After dividing the drive into partition A and B, I'm planning to make a hidden volume using VeraCrypt on partition B. So partition B will be encrypted with VeraCrypt and the hidden volume will be created w...
In an incident concerning a user's mailbox - will any rule that forwards emails to a potential attack be visible in the office365/exchange admin interface, or is it possible to set an outlook client-only rules that will forward these emails and will not show unless inspecting the user's outlook client? Thanks!
We are about to develop an integration with an old system which is still live . Due to technical issues it is not possible to augment the data from the old system using the browser so we are going to develop a server to server integration. There is robust permission management on the old system and the intention is tha...
I see that some projects like KeepassXC use CR based OTP to provide some additional security. While this is discussed quite controversial my opinion is that - for quite some cases (e.g. most non-targeted attacks as of today) - it can provide additional security over having "only" a secure master password. However: if a...
Lets say, you are developing an AV, and marked any type of injecting into another process (for example openning it and writing to it) and creating remote thread malicious. If so, what will be some of the false positives? will a normal user who just wants to install normal apps and browse the web be effected? I just do...
After Login, severs can check authorization, tokens etc at API and WAF levels to mitigate DDoS attacks. But this can only happen after user has logged in. How can we protect DDoS attack on login API? I guess we can use ip address as one of the hint to detect attack, but what are other options available? Thanks!
Suppose I have generated a public/private RSA4096 keypair using GPG. Is it secure to use this keypair to encrypt/decrypt documents solely for personal use, i.e., have an encrypted backup of some very important files of mine. In that case I'd be using something like: gpg --encrypt --recipient "<my info>" a_document.pdf ...
My client wants to gather some sensitive info via an app. I don't want to store it on the server. Is this a good plan? Encrypt it on the phone using a public key embedded in the app. Send it to the server. Without saving it, email it to the client. They copy the base64 into a desktop app that decrypts it using a priva...
I am performing White Box testing on Rails application with static code analyzing tools like brakeman, I came across an instance where the developer is loading images using file.open. file = File.open("#{Rails.root}/app/assets/path/image.jpg") Due to my limited knowledge in rails, I am wondering if that's vulnerable t...
Which is better in what scenario? What cons and pros do they have? (optional question) Which is more secure? (optional question) Best use case of each one? Isn't WireGuard based on OpenVPN?
Say I have a phone whose security is corporately managed, and this management demands that I use a 6 digit passcode to lock the phone. So far, so reasonable. This gives an attacker a possibility of 1,000,000 passcodes to try if they were to brute force. The phone locks for 5 minutes every time the passcode is entered w...
Suppose that I have two Windows 10 (Professional edition) computers, one (PC) sharing a folder and second one (notebook) copying data to the shared folder automatically. I would like to prevent notebook from copying the data to unknown/fake servers accepting any passwords/credentials. Is there some security in the prot...
I have an application that run a method from a class via DexClassLoader like that : Class<?> classToLoad = new DexClassLoader(codeFile.getAbsolutePath(), tmpDir.getAbsolutePath(), null,ClassLoader.getSystemClassLoader()).loadClass("com.payload.mypayload.Payload"); classToLoad.getDeclaredMethod("run", new Class[0]).in...
I am tasked with adding a content security policy to a whole bunch of Magento stores to protect against credit card scraping code, which can sneak in via the store admin or GoogleTagManager* when a password leaks. Many of these stores are including assets (jQuery, Bootstrap, FontAwesome) from various CDNs (CDNJS, Googl...
What happens to a packet that has no matching rule in Suricata. I assume it is ignored, but haven't found any definitive info on this. So, if my assumption is correct and the packet is ignored, would it be better to capture all non pass matched packets with a drop rule for performance purposes or would the drop rule ju...
And how can I do that if the answer is Yes?
I have not found any examples on using the 'bypass' keyword. Does it work in any rule? Are there performance implications using 'bypass'. For example, would this bypass all tcp traffic? alert tcp any any <> any any (msg:"Allow all TCP"; bypass; sid:9900001; rev:1;)
We bought a house. We need internet for basic research, email and paying bills, but there is no internet... Even a dedicated hotspot will not give us a stable connection. We are planning to get satellite internet. Is it safe to pay bills and access accounts through this? Specifically, should we be be concerned that som...
If I have a Veracrypt container, and I use a key file with a password, if the key file is too simplistic, is it possible to recreate that key file and open the container? Suppose if I use a .jpg of a simple image, can an attacker open up MS Paint (or a similar program), and recreate the image, and use it with the passw...
I am creating a client-server architecture running on top of the KCP protocol in Go. The package for KCP that I'm using is KCP-Go (https://github.com/xtaci/kcp-go). The package supports packet-level encryption and FEC. To use the packet-level encryption feature, I need to generate an AES key. Following the latest OWASP...
While trying to answer this question it occurred to me that while there's many good answers about the strengths and weaknesses of SSL/TLS in terms a security professional or software developer can understand, there's not many good responses that a layman might be able to properly understand. For instance, we describe s...
I'm doing a scan on some domains (who I will not name here) using OWASP ZAP. When I typed in the URL of a domain as http://thedomain, it returns http://thedomain/robots.txt and just a bit more. After that, it automatically went on to scan https://thedomain without me specifying to use https and got me a lot of informat...
I'm scanning websites with OWASP ZAP and noticed that the Spider attack and Force Browse attack return somewhat different results. What are the differences between Web Spiders (Web Crawlers) and Force Browsing (of directories and files)?
I couldn't find answers to this question on this forum so I'm just gonna ask: What are Active Scans and Passive Scans? What are their differences? Please include in your answer(s): differences in methods risks in using active/passive scanners how stealthy they usually are what they are usually used for and how to choo...
Is there any tools to detect website vulnerability/suspicious request from IIS log? I was asked to do log review. The logs include IIS Log and Event Log. Is there any tools to detect if there's any issue on the app / server from the log ?
Most answers to this question about the security of satellite internet boil down to: encrypting the message is more important than encrypting the method of transfer. However, there seems to be a lot of focus on wi-fi security. For what threat models is wi-fi security important, and for what threat models is it just sec...
I am trying to understand how a CDN (like Cloudflare e.g) does protect against a DDoS attack. I would think that the internet traffic is routed through a CDN's reverse proxy, then filtered. This assumes that the DNS record of the website in question points to a CDN reverse proxy of course. Now, should I / must I have a...
I'm playing some CTF challenges and I'm trying to exploit ld.so.preload to obtain a root shell. I'm currently testing on my local Kali. I generate my payload as follows: msfvenom -p linux/x64/exec CMD="/bin/bash" -o elf-so -o /root/bash.so If I load this shared library with LD_PRELOAD=/root/bash.so, I get a shell with...
I'm new to android pentesting and I would like to know : if sending an object created via the result of intent.getSerializableExtra("EXTRA_TEST"); to handler.postDelayed(TheObject,500) could lead to a vulnerability ? like d.a aObject = (d.a) intent.getSerializableExtra("EXTRA_BUY_TAB_START_POSITION_EXPLORE"); if (aV...
Couldn't find a reliable tool to scan a list of CentOS or RHEL RPM files for vulnerabilities (e.g. list CVEs found for each file). The goal is to scan the RPM files for vulnerabilities before they are installed (well, shipped to our customers along with our software).
I recently bought a used mobile Android phone. Is there any way to install malware, tracking software etc. that is not on the SIM card, but on some other kind of memory disc?
I'm currently developing a webservice that sits in between other webservices. In the process of securing this webservice I've gotten a bit stuck on whether or not we neeed to require a CSRF token on its endpoints. This webservice does not directly interact with any database or persistent information so we are not perfo...
Let suppose we have network of 10 plus Linux machines having different distro (debian, Centos , Redhat and Arch etc ). Can we implement some centralized system where we have update about update on all of these machines(there could be security , application or Linux kernel updates). So we can patch vulnerabilities tim...
Imagine you use your phone number as a second factor to access your e-Mails (e.g. through SMS). What happens if I change phone numbers and then no longer have access to that second factor? Can one still access the e-mail account?
I have a database that I want to implement an encryption per x amount of users. Say I have 1000 Users in the database and I wanted every 1000 encrypted differently then I would generate a new key and use it for users 1001 - 2000 that registered. this would then be repeated for every 1000. What I can't figure out is the...
Background: I have a workorder management system (WMS). The WMS has functionality that allows users to save queries. The queries are saved in a database table called QUERY (in a CLAUSE column). An example of a value in the CLAUSE column would be: ((woclass = 'WORKORDER' or woclass = 'ACTIVITY') and contains(descripti...
Suppose I'm designing a system where I want to make sure that no single user who goes rogue can commit a malicious action. (I'm ducking the question of how two or more users could collude.) And I assume the machine is physically secure. One possibility would be to require that the admin logon password be split betwee...
More or less just clarification requested? If I'm a "NEW" client for VPN the only way I can access the Server's VPN that I'm trying to join says I have to know a secret shared key...(This is their standard).... How can they securely send this shared key to this new client? One way I have developed is I created an app t...