instruction
stringlengths
24
29.9k
The capture file if needed There is supposed to be abnormal behaviour here, and I see that there is. But I can't figure out what it is. There is no response from the ICMP requests. Furthermore some packets have the warning: [Expert Info (Warning/Protocol): Source MAC must not be a group address: IEEE 802.3-2002, S...
I am trying to run a bash script in a sandbox to gain information about what it launches. There don't appear to be good emulators or static analysis tools for it, so I was going to run it in a chroot, and optionally inside a qemu-user(-static) execution of it. This allows it to have access to it's filesystem to run fur...
When I add the HTTP header X-Forwarded-Host: bing.com, a meta tag is injected into the site: <meta property="og:url" content="https://bing.com/argentina"/> Does this have any security impact? Should I report this as a vulnerability? XSS payloads could not get executed because the meta tag sanitizes ", < and >. What t...
A friend of mine was phished for his credit card details and driving license. Very foolish, I know. The criminals then bought bitcoin. The fact is his card is VbV. He claims not to have received any OTP message, while it was obviously sent. I checked his phone, no trace of any malware, plus he told me that he hadn't be...
I am researching this bug here, where the first line of an arbitrary file can be leaked by triggering a SyntaxError using the compile() function. Is there a method of leaking the rest of the file, such as similar to the way Heartbleed leaks data from server memory? In Heartbleed, you can open a listener port on your c...
I am new to cryptography, so please excuse any "obvious" beginner mistakes. I need to send a file larger than one MB to Bob, but my RSA keys are only 1024 bit large. I believe this means I can't use it to encrypt the data. I know the public key of Bob. Can I create a certificate with his public key, so that Bob can the...
I was trying to encrypt a file using a GPG public key. It's working fine on my test server which is ubuntu 18.04 but when I try to use the same key on my production server (Amazon Linux) it failed to encrypt with a message gpg: 40BXFE61: skipped: Unusable public key There are other keys that are working fine, having ...
I'm designing a enterprise infrastructure monitoring application which has customized needs of access control, beyond roles and authorities. The architecture include multiple nodes of REST API being load balanced, an angular client and an authorization server based on OAuth 2.0 using JWT. These Rest API nodes are gener...
What I want to do: Use the "save password" feature in FireFox (on Windows 10) without using FireFox's master password feature. What I'm afraid of: Someone stealing my laptop or getting access to my hard drive in a different way without getting access to my Windows account password. Approach: Using EFS to encrypt the fo...
I can examine a payload using libemu (sctest) and ndisasm, like this : msfvenom -p linux/x86/shell_bind_tcp -f raw | ./sctest -vvv -Ss 1000 msfvenom -p linux/x86/shell_bind_tcp -f raw | ndisasm -u - And I'd also like to debug the payload with gdb. So I create an elf executable : msfvenom -p linux/x86/shell_bind_tcp...
I am studying the concept of software obfuscation and come across this interesting scheme, dynamic opaque predicate: Basically it either goes two false branches, or two true branches, and therefore, three statements will always be executed. I am looking for some implementations of this scheme, for instance, what woul...
UFW‌ Blocks some IPs which are trying to attempt a connection to the server. I checked most blocked IPs in abuseIPD website and all blocked IPs are reported for brute force attack and/Or ssh spamming in past 24hrs. Sample Log: [UFW BLOCK] IN=eth0 OUT= MAC=xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx:xx SRC=189.173.30.x DST=x...
I found a file of unknown origin on a server called /var/tmp/f01bdc03. It was entered in root crontab to run every 10 minutes. So I made a VM and ran the program with strace. The only outside connection it made was to 137.74.146.42 which one IP site said was in Hanoi. Anyway, the messages the mystery program sent t...
I'm following this guide on: How to set up CI/CD Pipeline for a node.js app with Jenkins I've installed Jenkins on a VPS and I can access the Web UI over an SSH Tunnel. Then I saw this: http://JENKINS.SERVER.IP:8080/github-webhook/ In order for GitHub to communicate with Jenkins it makes POST requests on such URL. I've...
I've always firmly held the belief that obfuscation is essentially useless. Obfuscated code is not impossible to read, only harder to read. I had the belief that a sufficiently skilled attacker would be able to bring the obfuscated code back into a more readable state. However, OWASP recommends the usage of obfuscation...
When setting up a web server with TLS support I've generated my dhparams with openssl dhparam -C 2048 some.pem. I understand that the output in some.pem are the parameters by which DH key exchange will be done and that they are by nature public values. With empirical testing it seems that I can rotate the dh parameters...
If you revoke a certificate authority's certificate, do all of the certificates it issued become invalid as well? What about for certificates issued by an authority beneath it? For example, if root CA A issues intermediate CA B, which issues certificate C, and: CA A revokes CA B, does certificate C become invalid? CA ...
So we converted our website from an internally created site to a Magento Cloud environment. In the process, we had to change how we handle credit cards. We used to redirect the user to the payment processor's site to complete the payment then come back to our site for the final receipt. Now we have to handle the cred...
I read this excellent article about vulnerability research into a DLINK wireless router. The researcher explains clearly the coding mistake that leads to the vulnerability. He obviously reverse-engineered a binary running on the device but skips a step in how he acquired the code: The login action is performed via ...
When I try to access the Openmailbox web site, Google Chrome returns a NET::ERR_CERT_DATE_INVALID error: "openmailbox.org normally uses encryption to protect your information. When Google Chrome tried to connect to openmailbox.org this time, the website sent back unusual and incorrect credentials. This may happen ...
I found a login form on a website that redirects you regardless if the insert credentials are correct or wrong (302 redirect). I noticed that the value of the header Referer: is sent to header Location: in response. So for example, if Referer is set to https://www.google.com you will be redirected to https://www.googl...
Hyperion works OK when scrambling/obfuscating win32 files, but I am trying a program that seems to be a Win64 executable, and it fails: C:\Hyperion>hyperion.exe -v mimikatz.exe output.exe ------------------------------- | Stage 1: Analyzing input file | ------------------------------- Opening mimikatz.exe Copied fi...
I don't think there's a need to go into the background here, but identification of the process may be better explored. From a developer pov, at a high level, the files are modified, by virtue of the attack and attacker, they are modified quickly. This is an I/O operation. If I wrote a service that would monitor the IO...
Is it possible to retrieve data from a rewritable CD? Using partitioning and formatting discuss their forensic implications.
AWS has a feature called Instance Metadata, which on EC2 gives you access to the AWS credentials through HTTP calls: curl http://169.254.169.254/latest/meta-data/iam/security-credentials/<role> The feature itself is intentional, thus technically not a vulnerability. The risk is also stated in the documentation: If yo...
So I've tried bruteforcing my server using thc-hydra's https-post-form, but it floods the server very quickly and the requests start timing out. However, If I go through the browser where the HTTP header Connection: Keep Alive is used and accepted by the server, I can make a lot of requests in rapid succession without ...
So I'm playing with WebRTC and I've found that you can get public IP and local IP of other computer. Here is my code that show IP https://codepen.io/jcubic/pen/yvMeRg?editors=1010 (the code is used to transfer the files between computers but it also show the IP of other party). Can I with this information some how send...
I got a laptop from university and my account is on their corporate domain, so I log in with my university credentials. The anti-virus is Sophos Endpoint Security and Control and was installed by the IT department. I recently saw that there's a feature called "Web Control" which is enabled. I can't disable this as my "...
I'm not quite sure if I understood integrity deep enough. Let's suppose that Alice and Bob are using a public-key algorithm and using signatures to assure their data integrity. A hacker was able to get their private keys, and is eavesdropping on their channel. The hacker is doing the following: Receive the message sen...
I have problem to construct advanced mask to crack hash of 7zip file. The password have 16 chars where are all lower, upper, decimal and !@#$%-_=+: Main information is that any char can't duplicate and I want to know how add this to cracking rules. It will reduce time to brake the password. Exactly don't know -1 value ...
I have installed Sysmon 10 on a Windows 2008 R2 box in the hope of, amongst other things, capturing DNS requests. Sysmon appears to be capturing all other Event ID's except for 22. I have installed this on a 2012 box with the same .xml configuration file and 22 is being happily logged. Has anyone else noticed the sam...
I've been seeing a very weird request being made from my Chrome browser (haven't noticed it on Brave). It does not run on all websites, and not all the time (it can appear on a website, then after a reload it disappears from devtools). NOT SURE WHAT HAPPENS IF YOU OPEN THE LINK Here's a couple of examples http://subpy...
I've been using password_hash('password', PASSWORD_DEFAULT) for an internal system, and while I was testing the code, I saw that it generated different hashes for the same input. Why does this happens, and how do password_verify() identify another hash as the same password if the hashes are different? Is there an expl...
Once there's a primary Google account registered on the device and then another work account is added in order to access G Suite of the work place, what are the G Suite administrators are able to access/modify on the phone? Especially: Are they able to install apps remotely? Are they able to intercept communication...
I am using Hyperion v2.1 to scramble (polymorphism) some .exe file: hyperion.exe myexefile.exe scrambled.exe The resulting scrambled.exe file is detected and deleted by the AV or IDS system. As far as I know, Hyperion performs some polymorphics changes, so generally it should work and be able to dodge AV defenses. W...
Currently I am trying to fuzz the request I sent to Repeater. However if I put a new line (using Enter key) inside repeater's text window, burp on background really creates a crlf. My goal: Send a request, which contains only a newline without carriage return. What I tried I tried to use \n (as it is common in a lot of...
So I know that PGP encrypted email can be vulnerable to a known-plaintext attack from a known, consistant email footer or greeting (“Hello”, “Yours truly, xxx”, etc), but does the same thing apply to PGP signatures on an email? If I always PGP sign my emails, and all my emails end with “From, [name]”, can any of my sec...
My ideal bank would offer online banking from a browser with user/pwd and WebAuthn, for example with a NFC or USB key. No OTP or SMS or apps on the smartphone or physical devices required. (It goes without saying, no recovery questions or stuff like that.) This would only require to keep one device safe from attackers,...
In Mag stripe transactions, I've worked on solutions by which you get an initial small value Authorization and then can capture a full amount later using the transaction_id. E.g. The payment gateways in restaurants. With the move to chip and pin / EMV, is this still possible? I've stumbled into some vague articles impl...
I'm scanning a network (whose name will not be stated). It has >1 IP addresses. When I tried scanning its subdomains, there are several subdomains that are translated to the same IP address but return different scan reports (like different ports being reported). For example: nmap subdomain1 nmap subdomain2 nmap i.p.v.4...
In researching OAuth 2.0, I see that implicit grant is no longer recommended:- In order to avoid these issues, clients SHOULD NOT use the implicit grant (response type "token") or any other response type issuing access tokens in the authorization response, such as "token id_token" and "code token id_token", unless the...
Let's say I am using a WiFi connection and am connected through VPN to a private network. Would the computer using VPN be able to monitor the traffic of other computers connected to the same WiFi, but without using VPN. The answer is unclear to me as the VPN connection provides an encrypted tunnel to the private networ...
There is a peice of software i am using at work that has several components to it, lets call them the server and agents. the server runs an api over https that the agents use to communicate with it. the server can be cloud hosted or locally hosted. the entire api is accessible without any authentication process by prov...
I am a Firefox user and recently stumbled upon the Liu, Yabing, et al. "An end-to-end measurement of certificate revocation in the web's PKI." Proceedings of the 2015 Internet Measurement Conference. ACM, 2015 study and after a moment of worry, I found myself wondering if the revocation lists checks or the OCSP were st...
When looking at the Oracle Java JRE vulnerability list on cvedetails, they list the affected versions in the text, and usually also in a table below the description. However, I'm not confident that the vulnerability is only confined to the listed versions. The following is stated for CVE-2019-2816 (https://www.cvedetai...
I have created an exe with a payload which gives me a meterpreter session. But I need to embed this exe into a pdf. Upon opening the pdf the exe ideally should get executed. Is there any way to do this embedding and auto run of exe. Thanks
Entropy or randomness is a quantitative measure of security strength for various types of passcodes, but in current times with digital technology, breaches, and cracking tools it seems that lifetime should also be a factor in determining “strength”. For example, a low entropy password with a short lifetime may be as st...
Very new to application testing here. I am working through the hacker101 CTF (petshop) examples and I am having problems with brute forcing a username form with Hydra. The error message looks like it stalls while trying the first 16 entries in the wordlist. Below is the command I am using: hydra -L femalenames-usa-top1...
As anyone can see network data using browser developer tool, can someone get access to my cookies or API keys by just turning on the developer tool in Chrome or Firefox? For example, imagine a webapp that sends api key in header with each request. Could someone see this key by just turning on "inspect" in C...
Yesterday my wife receive some emails from Sony confirming her purchases on Playstation Network. The only problem is: she was with my side watching Netflix on the smart Tv. The purchased items is a pre-order of the new Call of Duty and an annual subscription to PS plus. We do not recognise this purchases, obviously. Af...
Ok, so we do not store any cardholder data so I get confused by these questions. "Is all access to any database containing cardholder data (including access by applications, administrators, and all other users) restricted as follows:" 8.7(a) Is all user access to, user queries of, and user actions on (for example, mov...
It's possible the external hard drives have been compromised in the company I work for. It would be a huge waste of money to replace them all without detection and if the current ones are compromised, the new hard drives could be compromised again. The hard drives have already been scanned with Anti Virus / Anti Malwar...
Keybase's decryption page says "you must host your private key in Keybase's encrypted key store." This really rubs me the wrong way. I was under the impression that your private key should not leave your device, ever (Keybase even lets you have one private key for each non-web device). But perhaps I'm wrong. Maybe all ...
The scope is server-side session management with session payloads being sent to the client in a cookie. I'm researching session management for web applications. I've been looking at a couple places, and from my understanding is we shouldn't use a secret as a session identifier(index). Because it can lead to timing atta...
I'm writing a libre program named "silently" for enhancing error handling in Bash, emulating the behavior of a jidoka. My question is if that eval would be vulnerable to code injection if the invoking program surrounds its input with doble quotes, like this: silently "function" "command \"${@}\"" Having silently this ...
One of OWASP recomendations is to set the header X-Frame-Options to allow our pages to be loaded in Iframes only by sameorigin. One reason is because of phishing attacks, ok I understand. But if I were an attacker and the target was configured to set X-Frame-Options to sameorigin, I could just copy the target page layo...
Here is the story. There is a private company, that has some software product that is used by thousands of its customers. After spending few sleepless nights on reverse engineering that product, I identified a critical flaw in it. The reason I explored this product was pure sport - reverse engineering is my hobby and n...
I have been trying to run a raw piece of shellcode collected on the net within a C wrapper to try it but it never works... I know the shellcode below is all right because it does work in the context of what the article is all about (making it run within a VirtualAlloc with EXEC rights), see: http://0xdabbad00.com/2012/...
According to Wikipedia: A rainbow table is ineffective against one-way hashes that include large salts. For example, consider a password hash that is generated using the following function (where "||" is the concatenation operator): saltedhash(password) = hash(password || salt) Or saltedhash(password) = hash(hash(pa...
I just wanted to know if its possible... If i have an image i.e abc.jpeg and i rename it to an XSS vector such as <img src=x onerror=alert(1)>.jpeg will it successfully produce the XSS or is there actually another way to do this...
Details: my USB stick got infected and probably my computer too. I suspect that the person I asked to transfer the file did it intentionally. But the problem is I don't know what is their intention. Avast found bunch of malware, Trojan, worm. I researched a bit and came to conclusion that it's not possible to be sure t...
I was able to find the Teardrop Attack. However, there is another one but I couldn't explain it. It keeps getting the warning: Source MAC must not be a group address. Is this some sort of ARP spoofing to steal data? Edit 1: Could there be a chance that a botnet auto-generate MAC address for packets but didn't work as ...
I wanted to clone my garage door remote to learn more about IoT security in particular so I read a lot about rolling codes, and the more I read the more I am convinced there is no way to actually clone any rolling/hopping code remote even with its master key (seed value or encrypting key) - there are many algorithms ou...
Knowing that some pypi packages have a history of being malicious, like libpeshnx, libpesh, and libari. Is there some website/service that labels packages as secure or not? for example: node's npm advisores https://www.npmjs.com/advisories if not, why such service does not exist at this point?
If it is confirmed that Alice is the source of a message (authentication), then shouldn't she be unable to deny that the message is from her (non-repudiation)? Is there an example where authentication happens without non-repudiation?
I came across a website called Bruce Schneier Facts, a parody along the lines of Chuck Norris facts, and saw the following fact: Schneier knows if Reiser did it. What does it mean?
I'm not trained in Linux, but I think I found the solution to my problem documented, but it is not working as expected. I am NOT an iptables guru, I'm learning as I go. A Russian IP is trying to hack my network, especially an email server I have running on my network. So I have a port forward of port 25 to the mail s...
I uploaded a photo of mine with my friend and tagged some random Facebook users of my friend list. After some time when I opened that post, Facebook is suggesting me to tag my friend who is in that picture. Facebook even shows my friend's name (Facebook name). Is Facebook scanning photos we are uploading?
Good evening. I have a password protected zip archive (Zip 2.0 CryptoZip) with a .txt file with sensitive info inside. The problem is that I can't extract it. 7Zip:"Data error : Wrong password?" WinRar:"CRC failed in the encrypted file. Corrupt file or wrong password" I'm pretty sure I enter the right password, beca...
While testing a dummy app, I noticed that the XSS done through POST parameters was getting stored in the form (the alert('XSS') would show every time I loaded the page where I had injected the payload). Is it possible to have reflective XSS through POST requests?
I recently watched a video about OSINT and learnt it can be quite a powerful agent. I've been on the internet for years, and at this point I'm not sure what I've posted and where. Given this is now a form of recon in cybersecurity, do you have tips on how one can protect themselves against it?
This question is not about the trivial usage of the forward/reverse DNS. Getting the IP of a hostname is trivial (DNS), and using reverse DNS, also we can get (typically) a single hostname of an IP. However, particularly for massive http virtualhosting, there is a (sometimes quite long) list of the hostnames, what reso...
I'm setting up a service which allows a single 3rd party to access a file over HTTPS. The only security mechanism the 3rd party supports is Basic Authentication. To reduce complexity, I was going to host the file on S3. However, S3 does not support BA, so I would have to use Cloudfront with an Edge Lambda or API GW if ...
Social media apps like snapchat, instagram, viber, etc notify you if someone takes a screenshot of your profile, chat, conversation, story, etc. How does the app find out that you are taking a screenshot of their conversation, profile, story? Links:(https://support.viber.com/customer/en/portal/articles/2739322-secret-c...
May be it 's not a question for information security stack exchange and if it's true excuse me for my mistake. I want to understand how this code works: char *s = "1"; char *s_2 = "2"; unsigned char *x; gcry_md_hd_t h; gcry_md_open(&h, GCRY_MD_SHA256, GCRY_MD_FLAG_SECURE); gcry_md_write(h, s, strlen(s)); gcry_md_w...
I've created a simple scenario with ssh session hijacking. There is single session open from host A to host B and I can create another connection inside of established connection. I'm wondering how to detect in a SIEM such an activity?I can't use ports because there is only one normal ssh connection. Any ideas?
I have been astonished when I've found that one of the most popular SSH client Putty stores cleartext credentials in Windows Registry: HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\Sessions\ Passwords, or even ssh-key paths are disclosed, making it easier not only for malware, but even a simple bat file to steal the cr...
Windows Defender often takes up a significant amount of CPU time due to I/O operations in WSL. For example, if I'm working on web development and using tools like npm or yarn, downloading packages takes a considerable amount of time as compared to when I disable Windows Defender real-time protection. This is also the c...
Is SmartCard-HSM 4K USB token good enough for a WebTrust category CA's ROOT KEY storage or is a FIPS 140-2 level 3 certified device required? Are there any FIPS 140-2 level 3 certified USB token with N-of-M management scheme and backup functionality available? The idea is not to spend tens of thousands of dollars when ...
So in a CSP like the below: content-security-policy: upgrade-insecure-requests; frame-ancestors 'self' https://stackexchange.com Should the url part be quoted like this (example from mozilla security [1]) - even though this example has both styles: # Disable unsafe inline/eval and plugins, only load scripts and stylesh...
I have set up a server running Linux Kernel 4.4. How can I exploit this, preferably not a DoS attack? I have opened port 80(https), however I would rather do it in an elegant fashion so I can actually learn something instead of just mindlessly running slowloris. A specific vulnerability I have looked into is: CVE-2017...
Who gets a bearer token, will have all the privileges of the actual owner of the token. Is there any tokening mechanism which is not suffering from this issue?
From what I understand, hash functions are one-way functions. Let's say that I want to publish an opinion article anonymously, but there is a possibility that I later want to prove that I was the one that wrote the article. Is it possible for me to simply put my identifying information, such as my name, birthday, and s...
I have begun to notice some apps and websites (particularly ones made by Apple) which present user login in two steps. In the initial state, only the username/email field is shown. Once you enter a value and press return, then the password field appears. What is the logic behind hiding this field initially? The field a...
In JavaScript, it seems common for the official release of the code to use only single-character variable and function names (of course, after converting the original code which uses clearer names) in order to make the code more obscure. I've seen people reverse engineering software to find what seems to be the origina...
I recently read about the bug in Django with regards to PBKDF2 causing Denial of Service with large passwords: https://www.djangoproject.com/weblog/2013/sep/15/security/ This is because PBKDF2 "mixes" in the input password with each iteration, therefore amplifying the effect of a large input. Django originally solved t...
I have found in one of the client side libraries that it is performing an AJAX call to an API and checking if response contains all of the following headers with corresponding values (as a security measure): 'content-type', 'application/json' 'content-type', 'charset=utf-8' 'X-Content-Type-Options', 'nosniff' 'content-...
Attempting to run Puppeteer, a Node library to control a headless Chromium (in order to do things like create a PDF of a website), in Docker is a surprisingly fiddly thing. The problem is that, from my understanding, to run as root, you need the option --no-sandbox, which is rightly decried as being an insecure and bad...
I'm taking a course where I must breach a site which uses 2015 version of JWT for authentication. They gave me the test//test login information and I must login with admin. After I log in, I receive this token, and it's stored in my cookies: eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ1c2VybmFtZSI6InRlc3QifQ.vLVv9jMkXF8YTd...
Can I use Keycloak as a key store like Hashicorp Vault for an example? Keycloak has realm keys, can I use this feature as a secure key store and use it to encrypt and hash data in my web application? Is there an API that I can use to read those keys to use them in my web application? are these keys stored securely on d...
From an information security perspective, which is best for private (on-premise) micro-services (web services) accessed via HTTPS? Are there an advantages in using certificates signed by a Third Party instead of Self-Signed certificates in such a scenario?
I’m using an HttpOnly cookie to store authentication token client-side. To mitigate some of the risks of CSRF attacks, I’m employing the Double Submit Cookie pattern. The same token is saved client-side as a separate header with the same value, and both get sent for subsequent requests when the user is logged in. My q...
I have a cookie that is httponly but without the secure flag. Under this condition, can an attacker capture the cookie, although the site is only on HTTPS?
I was reading this question about ssh authentication and there's a good discussion about authentication schemes. First, there's the answer that yes, ssh sends the full password to the server (but inside the encrypted tunnel). Second, there's talk about alternatives. They talk a lot about the idea of sending the hash of...
I'm on a course and there is a bank application which I need to attack by getting users visit my site which instantly transfers X amount of money to my balance. Their transaction form posts the recipient, the amount, and the a CSRF token at api/transfer. I've already managed to get the user's CSRF token (based on this ...
I've just found out about canary tokens and how they can be hidden in a lot of object types. So I put a canary token on my desktop as a Windows folder. Now, whenever I unplug my phone from the computer, I get a notification that the canary was triggered. I moved the canary token to another location and it won't trigger...
The nacl.cr.yp.to source code has separate methods for doing public key encryption: https://nacl.cr.yp.to/box.html and for verifying signatures: https://nacl.cr.yp.to/sign.html I would expect that a private and public key generated by one would be usable by the other - this would be really nice, since I would only need...
I am testing a python script that provides a ping function os.system('ping ' + command) all of this characters are filtered '&', ';', '-', '`' , '||', '|' i can't use null bytes like %0A i'm passing arguments script.py -p any idea how to bypass the filter to run command like /bin/sh or nc -e ?
I submitted my GPG key to the keyserver earlier. Now I got signatures on my key. Can I republish it? gpg --send-keys doesn't seem to alter my key any more, but doesn't spit out any error either.
I want to make a service stateless(has no data to store or mantain). But the service shoule be able to authenticate user. What I'm considering is using key derivation function with a shared master secret key and username to calculate user password each time when user login. The KDF should ensure it generates the same ...