instruction stringlengths 24 29.9k |
|---|
I know that a WiFi adapter can scan for active BSSIDs, and that in monitor mode it can scan all unencrypted traffic.
What is the best way to list nearby WiFi clients from Python? I understand that all I might get is a MAC address and the AP it's communicating with, but this is all the data that I need.
|
I have a system with an OAuth2 authorization server. It hands out JWT access tokens and refresh tokens (the latter only to the mobile app client).
We don't persist access tokens (as is normal with JWT) but we do persist the (hashed) refresh tokens together with some meta data to be able to revoke them so that users can... |
I am Implementing CSRF i.e Cross-Site Request Forgery in my project but not getting proper way to implement in my project and i am using Angular for FrontEnd and Java for BackEnd in Spring Boot and I tried many resources for solution from the internet but not getting proper way to implement
This is my Spring Boot Code
... |
I recently wanted to do some major changes to my account for an online game. So they wanted to do a thorough account verification.
First they asked me for some character information which can be easily gotten from the account as well as where the account was created. This seems like a great question because you can't ... |
I want to buy a new domain (example.com) and a Wildcard certificate for that domain (*.example.com) from namecheap. Then I will set up an NS server to define a rule to resolve part of my subdomain to every ipv4 address, then I will write a tool that everyone can start a https website with a ipv4 address with my domain,... |
I want to protect my admin page not only with a login and password, but also with IP filtering as described here: https://security.stackexchange.com/a/30649/68841
But I have two questions:
Can I use a proxy instead of a VPN?
I also need to use one more proxy on the server, for API requests to the specific site which ... |
Say, an attacker wants to perform a MitM but all he has available is the network traffic between a client and a server. He has no further information about the data or certificates than what's being exchanged over the network, with him in the middle.
Both client and server have a very limited set of trusted CAs, and wi... |
Suppose one is running a single internet-facing daemon, as a service in a FreeBSD jail, and expects targeted hostile attacks targeting open WAN ports and services.
Like many services, the service and indeed its jail don't need interactive user login or ssh, as it can be completely configured and managed by editing its ... |
As an example, the original OnePlus One has good LineageOS support, but the vendor security patches were seemingly discontinued three years ago:
What are the security implications and is the vendor dropping support enough of a reason to buy a new phone?
|
I am working on large windows based network environment (Active Directory) and I have a requirement of implementing clear and secure password reset process for windows user. Especially management requested to use same process for all applications which are using in our factory.
Currently we ask them to raise help desk ... |
A very good friend of mine is a journalist in a country where the state is becoming more and more despotic.
She would like to store critical data on a server abroad. Is there any service that would be safe for her ?
|
In visudo Ubuntu I whitelist this program
myuser ALL=(root) NOPASSWD:/myuser/program.pl
when I run
sudo /myuser/program.pl
I get prompt to set password. The solution is to add to visudo /usr/bin/perl
myuser ALL=(root) NOPASSWD:/myuser/program.pl,/usr/bin/perl
Now I can run without asking the password.
Here is the p... |
Having trouble choosing between the three, I would of course love to learn all three in the future, but right now I'm curious as to which language would be the most beneficial to me.
Also, I'm aware that different tools might be more useful in certain scenarios, in this case, I just want to learn the language that suit... |
Jane needs access to John's Outlook mailbox and calendar. When Jane attempts to access it (she has his UN & PW) John receives the MFA challenge preventing Jane from accessing it.
This works exactly as expected, problem is Jane is the admin assistant to John the CEO. Jane puts his schedule together in the evenings from ... |
Say, an attacker fakes an original server certificate by a trusted CA using a another certificate from the same CA in a Man-in-the-middle attack. Why can this be detected using subject verification on the client-side?
(I'm not asking about the general workings of the protocol, all it's mechanisms, but, in the framework... |
I have x.x@gmail.com as primary email-address, but per accident i sent confidential information to xx@gmail.com (note the dot). How will this be handled?
|
The newest Android phones use the Qualcomm Snapdragon 855 chipset with its TrustZone/TEE. The Android OS makes sure that a stolen phone, in its assembled form, is not usable.
Does Trustzone further prevent the CPU from being removed from a stolen phone and used in any way? I see how Qualcomm could lock the CPU (e.g.,... |
Our company have 10+ private websites and 20+ person and need to open a different one automatic when the developers are testing some functional. We do not want anyone outside the company to view the content of the private websites.The websites is access with ip and port.Those websites have public ip, can be access from... |
When using a single page application, in what way is access token + refresh token more secure than a single token in a cookie with SameSite: strict.
Given the browser supports SameSite.
I completely understand that if you don't have the SameSite setting available that you need an access token and a refresh token.
It ju... |
I am developing ERP software. One of the features that I am implementing is the issuance of invoices, which is something related to the federal revenue of my country.
In the documentation says that I need an A1 or A3 certificate to sign the note, the problem that does not I find information about this type of certific... |
As per RFC 5246 (TLS) the max possible length of the record is 2^14.
But I could see now a new parameter "Maximum record size limit".
Why do we have the new parameter "Maximum record size limit" since RFC 5246 already mentions Max possible length is 2^14
|
I was reading up on CSP's and I did some testing on a site which had one implemented, I found an xss vulnerability even though it was using a CSP.
|
Everyone knows that two factors are better than one. My problem is that often the only second factor allowed is text messages sent to your mobile phone. This creates two concerns:
I travel frequently overseas and lose access to 2FA accounts any time the associated SIM card can't touch a network.
Your phone is inherent... |
Concerning the very familiar (and sensible) security practice of Zeroizing sensitive data from memory after you're finished with it, such as Cryptographic keys, passwords, etc, I was pondering how you can achieve that task when programming in a FP Language such as Erlang/Haskell and the likes.
Especially in something l... |
My dental office just printed my user-defined password (not a first or one-time password) to their portal on some checkout paperwork.
I asked on Law.stackexchange and it doesn't sound like this is a HIPAA violation, but I am really curious if this violates other regulations or goes against known best practices, as it s... |
High Availability Boot (HAB) is a technique described here in an NxP application note. This is best summarised as:
"HAB authentication is based on public key cryptography using the RSA algorithm in which image data
is signed offline using a series of private keys. The resulting signed image data is then verified on the... |
Can you help in summarizing what would be the main threats for a web app when its SSL certificate is graded as C from the Qualys web scanning tool at https://www.ssllabs.com/ssltest/.
The summary of key findings from Qualys tool
This server supports weak Diffie-Hellman (DH) key exchange parameters. Grade capped to B.
... |
I have had an encounter with the paint virus and I noticed it infects OS files in order to target .exe files(it changes an original .exe file to a hidden OS file and renames with a 'v' before the initial name and then names a 899KB size of itself as the original .exe for the user to click).
I was able to get rid of i... |
I recently received an email from a well-known company stating that the password I use is weak and can be easily guessed.
The email seems legit with no attempt to steal information, they only say "log into your account and go to account->account details to change your password" with no link that they can fake or anythi... |
Having a hard time verifying the trustworthiness of GPGTools. I really want to trust the project as it adds a lot of convenience on macOS, but can’t figure out if I can without spending a lot of time auditing the codebase.
The pinentry-mac git repository, for example, has only a few contributors with no public track re... |
With Burp Suite we can capture the traffic of protocols like http, https. But i want now monitor the data traffic in urls like chrome://settings
|
I was just reading through the "Token sidejacking" of the JWT Cheat Sheet of OWASP (https://cheatsheetseries.owasp.org/cheatsheets/JSON_Web_Token_Cheat_Sheet_for_Java.html#token-sidejacking)
At the moment I don't understand how the recommended prevention actually solves the issue.
The solution is to add a context and s... |
I have a resource server (REST API) and an authorization server which are installed on the same server and behind a reverse proxy. All incoming external requests use https. Would it be acceptable not to use https for the communication between both servers internally (using localhost)? This way I'd only need to install ... |
I’d like to have an AlgoVPN server that uses a trusted CA to issue a certificate for the VPN server.
I am currently using an AlgoVPN server, which is completely setup via Ansible scripts and automatically creates user profiles (mobileconfig files for iOS). This works fine for loading via an MDM or manually, but it uses... |
I have referred this link and I know that
Authentication = login + password (who you are)
Authorization = permissions (what you are allowed to do)
My question is:
Suppose A gets the login id and password of B which has higher authority than A, that would compromise authorisation because once A gets falsely authentica... |
So I am quite new to VPNs, just downloaded and installed NORDVPN despite the latest admission of security breach for a trial period.
I am also running BitDefender TS on my computer.
I wanted to know if there is any way to automatically reconnect to server from another country when accessing particular websites?
I have ... |
What websites (URLs) can be protected by one SSL certificate?
For example, www.security.hsbc.co.uk has a SSL certificate. Can this certificate be used to protect other websites (URLs)? Something that branches off from this one maybe?
|
I want to set up two factor authentication for some of my online accounts. I don't want to install an app, and I don't like using my phone as the physical medium anyway, because it's more likely to get stolen and it's also more vulnerable than a static object that I just carry around.
I'm attracted to the idea of Yubi... |
What purpose does it serve to have a CRL with nextUpdate set to +25 years?
A CRL issued by the root of an operating Certificate Authority
Certificate Revocation List (CRL):
Version 2 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: ..........
Last Update: Jun 19 21:19:12 2019 G... |
is it possible to trick someone into running a malicious executable file instead of a real one provided by a website; assuming they will md5sum the file
|
Is it possible to make an AWS load balancer for a non-HTTP port allowed to access a specific port on a host without opening that port open to the entire VPC's subnet? I seem to remember reading that this might be possible with an IAM policy based around specific resources or something like that.
As you create a non-cla... |
I've heard about the dangers of port forwarding to let people play on a minecraft server hosted on your computer. But I was wondering, could having a VPN on the computer with the server possibly avoid the danger or make it safer?
|
I was intrigued by the discussion of this SO question as well as the accompanying blog post. I'm trying to better understand the mechanics of the two systems, and one of the questions I came up with is how much worse is it to have a token stolen vs. a session ID?
Here's what I understand so far, and please do correct ... |
I've recently received 2 spam SMS messages, claiming to be from 2 different organizations, but (obviously) not sent by them.
However, all of the contact details in the SMS match the real details of the organizations in question.
Message 1 from "FraudBureau": Please contact (my financial institution) Fraud Department on... |
On Debian, I can generate new SSH server keys:
rm /etc/ssh/ssh_host_*
dpkg-reconfigure openssh-server
but that will generate the keys with default values, ie 2048 RSA key.
What is happening under the hood, when I execute dpkg-reconfigure openssh-server ?
How can I change these defaults (ie, rsa to 4096), when generate... |
I handle a joomla website (https://dom-ng.eu) which is marked as unsafe by Microsoft Edge but not Chrome an others. The site is flagged with a phishing threat and i tried to fix the issue but it's not working out. Now i don't know what content that cause it to happen. I added it to Bing webmaster and got links inside t... |
I am trying to pentest my friend's site. It is clearly vulnerable to SQL injection attack based on the error messages I get from entering different get parameters.
Whenever I try very simple attacks containing SQL commands such as %27%20or%201=1%20 which is ' or 1=1 I get a 403 error page. I also get a 403 message when... |
I'm trying to follow this: https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/4/html/Step_by_Step_Guide/s1-gnupg-import.html to import a key.asc using gpg --import key.asc, so that I can try to verify it, but I get the error:
gpg: no valid OpenPGP data found.
gpg: Total number processed: 0
How can... |
I am working on a small IOT device that basically is a status display, which includes data about my phone. That means that I have a simple web server running, which can be used to update the devices display using POST requests.
On to my question: Would it be enough to use a UUID as a primitive auth token? Because all t... |
I was recently going through the HTTP Desync attack presented here:
https://portswigger.net/research/http-desync-attacks-request-smuggling-reborn
This raised one question concerning the way the HTTP packets are treated through a single TCP socket.
Usually, when we send a request over a HTTP connection with a Content-L... |
While I am attending the private bug bounty program, I realized the web application has a hidden element and its value is an empty string in HTML code.
The app is using this element's value in some of the front-end works with Javascript. In addition to that, the application has got client-side XSS protection function ... |
I would like to make data, in many (more than 250) old floppies, unreadable/unrecoverable.
I have some HDDs that I can take apart. Their magnet is sufficient to do the job to make it unreadable to the general public? How much time it will the process take?
I don't want to destroy the floppy as I want to re-use them (so... |
I work in a PCI DSS certified environment, which (as many secure environments) require 'Strong Cryptography' when storing user passwords, as per requirement 8.2.1. We simply hash them using BCrpyt.
However, we have a new use case. When a new user is defined to the system, a password is generated automatically and email... |
Should non options requests be blocked if the origin header is not allowed?
I was talking about programming to someone and which led me to tell them about CORS. The person compared it to a gate.
Which in turn led me to look at my code which adds the CORS headers but does not block if the origin is not allowed. Now I ge... |
I know that enabling http compression would make a server vulnerable to the BREACH attacks. So we have disabled compression from the server side, tested and it was all good.
Then we implemented CloudFlare for the instance. We performed the SSL security scan again and found that the application is using gzip and so it ... |
I send a message to someone along with a public key, which they use to hash the message.
If they get the same hash value that I get when I hash the same content with the private key, does that safely imply that they have my public key?
|
I work as a security researcher, tonight I implemented Windows Hello For Business in our environment, because it is marketed as the "passwordless way of the future" and I wanted to see if it holds up to its promises.
The decision was made to go on-premise with certificate-based authentication (AD2016+ADFS+WindowsCA), a... |
Our identities are stored in a separate IdP (Azure AD in this case) and the applications are acting as Service Providers. MFA is triggered based on some rules (based on geoIP etc.). We are now about to add a new application which contain sensitive data and wish for it to trigger MFA.
What are the mechanism for Service ... |
I have heard there is a fingerprinting method that traces internet users based on browser data. I believe it is called "canvas HTML hash".
This hash is unique, as I understand? Or does it change depending on what?
Imagine someone uses one VPN server for "googling", a different VPN server for "amazon-buying", etc...
O... |
building on this previous post Can canvas hash be used to track me and ruin my anonymity?
I want to ask:
Is there any way a user can affect this canvas html hash generation, a way to make the hash change regularly? Could things like playing around with browser settings or cookie policies help? What good methods are the... |
I'm putting together a Root CA to sign multiple intermediate CAs which will then be used to sign VPN server and VPN user certificates.
When I provide a user with their certificate, ideally I only want to give them their keypair/cert and the cert of the signing intermediate. This will mean that if the root CA is comprom... |
From my understanding of a VPN, it essentially creates a network between the two 'machines'. So if I have open ports (e.g. HTTP, SSH) on my client machine, those can be accessed by the VPN provider or other users.
This leads to the question: should VPN users harden their machine before joining a potentially malicious n... |
If a user is logged into a website and they submit sensitive info over HTTPS, which is encrypted and stored in a database, does it matter if the info is not also signed?
Given that signing requires a private key, if a hacker has access to the server and they wanted to tamper with the data, couldn’t they also resign the... |
How can one steal files off a laptop hard drive using RF / Wi-Fi signals? Can it be done with the laptop powered off if there is a battery?
|
I recently used a Thunderbolt to HDMI connector (ADAM 4K2K) casually given by a colleague who then left the country, misguidedly thinking "oh, it's a display adapter, not a USB, so it probably isn't risky". My computer immediately froze with a crazy interleaved display (looked like corrupted video memory), and I had to... |
I have an application that unshortens URLs by using the python requests library to send HEAD requests with allow_redirects=True. I don't do anything with the response except check the response URL. Since the URLs are provided by users, is there a risk of the production machine being compromised by a malicious server?
|
These:
Do they threaten privacy/anonymity on a VPN?
In this particular case, I'm using Opera VPN, which I thought might bear mentioning because it's a browser-based VPN, but I am asking about regular VPNs too.
|
I'm asking about the risks one may face for setting 2FA using their own phone number as second step of a 2FA, in scenarios such as, for example, logging in a bank account page with 2FA that provides only that type of protection. In the latter, if I use a secondary phone number that I don't use and that I keep secret, ... |
It is my understanding that HMAC is a symmetric signing algorithm (single secret key) whereas RSA is an asymmetric signing algorithm (private/public key pair). I am trying to choose between these 2 methods for signing JSON Web Tokens.
However, I am a little bit confused about the use case of HMAC. If both the clien... |
Story
We are developing an API that which allow consumer to create or modify (i.e. upsert) objects stored in database via an endpoint with HTTP PUT.
The primary key of the object stored in this way is a GUID instead of an auto-increment number to prevent potential conflicts in future and it was decided that the GUID sh... |
I'm developing a merchant page where users can pay their bills.
On this page, users must fill in their bank details (Card number, card holder name, expiration date, CVC).
As a verification, we have a phone field where the user inputs a phone number and submits (with AJAX). After that, an SMS with OTP is sent to that nu... |
Note: it is not really a masked PAN as nothing is masked so to speak.
For testing purposes, I need users to only submit their first 6 and 4 last digits of their CC. At no point at all will they submit their full PAN or any other card data.
Is it ok to store the first 6 and last 4 digits?
|
I'm trying to secure a REST API that I'm using as a backend for a single-page application. The API provides access to read/create/modify/delete protected resources, based on a set of permissions managed by an administrator. What I'm thinking is the following:
All connections must be over HTTPS; plain HTTP requests wil... |
I have read Apple documents on the iOS 12 password autofill function for iPhones. But I could not find much information pertaining to where the passwords are stored and what vulnerabilities might exist. I understand storage would be either the device or the cloud. Apple Keychain includes a setting for cloud storage, an... |
Suppose I want to give a computer to someone that runs an application. I want to avoid that the program can be copied to another computer or be tampered with. For that, I want to encrypt the folder that contains the program and would like to make it so that only the host OS (Linux) on that device can decrypt it (ie. al... |
I have a REST API that will be called by other external 3rd party servers over the internet and be used only for machine to machine communication. I am looking for mechanisms to secure this API such that only servers that I designate will be allowed to use this API. I do not control the servers and cannot guarantee the... |
I'm asking how does one steal files by connecting to a laptop's WIFI / Bluetooth and can it be done with the laptop powered off if there is a battery?
Could you please explain how you would connect to a laptop's WIFI / Bluetooth and brute force the login, step by step?
I'm not asking for a hacking tutorial as misunder... |
Cannot remove an unknown active session from my Facebook account . My Facebook account was hacked and I changed my password, then i deleted my active sessions. There was one session from MI that it will not let me lo
|
In implementing block-ciphers, I've had to calculate the initialization vector and have been stuffing those IV-bytes onto the first few bytes of the encrypted file (to be read in on the decryption process).
Should I be doing something different with the IV? Is there another strategy I should be employing?
|
We all know that attacks on web browsers are entirely possible. This includes attacks such as drive-by downloads, MITB (man-in-the-browser) attacks and keylogger browser plugins/extensions.
However, although we know how these attacks are carried out, the question here is how do these browser attacks succeed in being ca... |
I was practicing web pentesting on this level of ctf2 and I was supposed to edit the HTML and the Javascript to get rid of the input validation and < > sanitization. I succeded after looking up the solution elsewhere.
Now what I don't understand is why modify the HTMLand the Javascript. The changes will be lost once t... |
So, I'm trying to solve a CTF challenge that involves exploiting a remote service. The service doesn't check for the size of the input and there is a buffer overflow vulnerability. However, before I can hijack the control flow to my shellcode, the program closes the connection. So, I'm trying to have my shellcode conne... |
When one deletes a Whatsapp (or other similar apps) message from a device (assume that no Google Drive, ICloud backup), can this message be recovered from the device? Does Whatsapp save messages into SQLite DB as normal text/unencrypted format?
|
My question relates to this question: How does Google know where I am? and ask a similar question to this (but that accepted answer doesn't pertain to BSSIDs).
The chosen answer in my first linked question describes a large database of previously saved geolocation information (GPS, cell towers) mapped to BSSIDs.
The re... |
Say you created some IP in the form of some files. How do you prove that you created the IP, in a theoretical cryptographic sense? A major constraint is to maintain security as well, so you can't just create a patent which will share the information publicly.
I can imagine all kinds of scenarios where someone can say d... |
This question is very much related to Router reboots when using Nmap, the difference is that I'm actually interested in a practical solution to this problem.
I have a piece of C code that is doing port scans with raw sockets. The port I'm interested in is very rarely open, therefore I would want to increase my scan rat... |
In a PowerShell script in Windows 10 Pro 64, I'm getting access-denied errors on several folders, such as:
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\Content.IE5
C:\Windows\System32\LogFiles\WMI\RtBackup
I went to look at those folders in File Explorer. I never did get into the... |
I would like to understand, given a smart phone IOS (i.e. IOS or Android), what keywords would be helpful to understand the contours of the default geo-location data measurements (location \ kinetics), retention and access?
It seems Orwellian, if not 'creepy' that an OS would by default record whereabouts without th... |
I want to know links to download "username and password" dataset for my research.
I want to create a big dataset of 100-200MB for my research.
|
I have my business email on GMail. I use 2-factor authentication for access to said business email. I access my business email from 2 computers and 1 mobile Android device. I do not use Outlook or any email client I access it solely through the web browser. I run Webroot AV on both computers and have run MalwareByt... |
I've found several extremely cheap USB Bluetooth options and, while the reviews say they work, I am skeptical of them because they are so cheap/have no name brand recognition.
Here is the main one I am looking at: https://www.amazon.com/gp/product/B071WKP37Q/
My real question: How do I know this isn't a sort of trojan ... |
I have a pdf file with confidential information on a usb flash drive. This document needs to be printed on a multi user Ubuntu system. I want to prevent other users from seeing the content of the document.
Assume the following procedure:
The usb drive is inserted to the computer and mounted.
The document is opened wit... |
In Oracle DB 12c, which uses TDE-Tablespace level. If i want to implement key rotation policy, what is the impact?
1. Is it the Tablespace key that will be rotated or the Masterkey?
2. Does key rotation involve, Decrypting the data with previous key and Re-Encrypting key with new key? If yes, would'nt this impact the a... |
I am aware of research which shows that single (or sometimes double) random overwrites on a magnetic hard drive is enough to ensure data is not recoverable, but is there any research into the recovery of data stored in an EEPROM after the high-voltage bulk erase (not bytewise or pagewise erase) operation? I'm wondering... |
I block most everything with my firewall, what I don't get is why would I constantly receive hits to connect on random ports from port 443.
[iptables] reject_ipv6: IN=eno1 OUT= MAC=...
SRC=2607:f8b0:4005:0805:0000:0000:0000:200e
DST=<one of my IPv6 IPs>
LEN=80 TC=32 HOPLIMIT=120 FLOWLBL=753719 PROTO=TCP
SPT=44... |
Here is what I have done roughly, starting from scratch:
$ brew install gnupg
$ cat >foo <<EOF
Key-Type: RSA
Key-Length: 4096
Subkey-Type: RSA
Subkey-Length: 4096
Name-Real: My Name
Name-Comment: ...
Name-Email: ...
Expire-Date: ...
Passphrase:
EOF
$ gpg --batch --full-generate-key foo
gpg: ... |
I want to continue my transcription job in Mexico. If I use a VPN will I be able to prevent them from discovering that I am without being found outside the Country?
|
I'm trying to run some automated scans without stopping for long periods of time (each scan can take anywhere from 8 hours to 3 days). I currently don't have a PC I can leave running for many days without shutting down, nor can I afford to rent some machines to run it for me.
I've tried running my scans on a VirtualBox... |
I was asked to explain why Kali Linux does not have any firewalls or endpoint security. I would appreciate any help as I am a complete beginner to Kali Linux.
|
Say I have a document. I want to encrypt it, then give it to my friend, and I don't want them to be able to decrypt it. I want them to encrypt it again using their GPG system. Then to decrypt it my friend has to first decrypt it, send it to me, and I decrypt it.
How do I do that roughly with the GPG CLI? I am confused ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.