instruction
stringlengths
24
29.9k
I was recently at my local hardware store, where they were offering copies of car keyfobs. They claimed they could copy ''over 90% of cars on the road'' across a number of manufacturers. I'm wondering how this is possible, given the rolling code encryption used in such keyfobs. I understand a dealership being able to c...
ASP.NET will soon begin reflecting Google's decision to default cookies to SameSite="strict" in a defense against CSRF attacks: https://devblogs.microsoft.com/aspnet/upcoming-samesite-cookie-changes-in-asp-net-and-asp-net-core/ This means that if I own foo.com, any logged-in users who are directed to foo.com from off-s...
I have the following working test... public void Test1() { var symmetricEncryption = new SymmetricEncryption(); var asymmetricEncrption = new AsymmetricEncryption(); var pipeline = new Pipeline(symmetricEncryption, asymmetricEncrption); var keyPair = asymmetricEncrption.NewKey(); var secretMessag...
I'm looking for good books, articles, texts, zines, guides, videos or any other materials / resources regarding computer / information security, hacking and related subjects from 1990's and early 2000's, let's say till year 2009 at maximum. Mainly materials focused on technical aspects (operating systems, networks, pro...
Are there any security benefits of shutting down a modem router when it is not in use? It is now widely known that devices such as D-Link have been insecure. Assuming that this remained undisclosed, are there any added advantages of shutting down an insecure device when it is not in use? If a device is known to be secu...
I'm hoping you might be able to give me some advice. I'm new to linux system administration so go easy on me :) Was doing some checks around the directory that's being served by nginx and noticed some files were set with permission 655. I started to tidy them up and decided to do some looking around. Ran 'w' command an...
rkhunter is checking for processes using shared memory segments and warns with output like: Warning: The following suspicious (large) shared memory segments have been found: Process: /usr/bin/python3.7 Size: 4,0MB (configured size allowed: 1,0MB) Those warnings can be disabled in the rkhunter config with the option AL...
I'm downloading an .iso file that is offered through the main website, which recommends users to use BitTorrent. In addition, they offer the download via HTTP using different mirror sites that belong to different countries, and they claim that the downloads from an HTTP mirror are more prone to be intercepted to serve ...
I working on a setup where I'm getting users to scan their fingers for fingerprint at a local machine but, the templates are stored at a centralized server for efficiency reasons. Since the verification SDK resides at the local machine, the server needs to send the template from database to the local machine for the SD...
I cannot come up with a case where there is only one of them. When there is integrity, a random person cannot modify the message without being noticed. That is, an unauthenticated user cannot modify the message without being noticed. Therefore there is authentication. When there is authentication, nobody except the sen...
When redirecting using header("Location MyPage.php"); in PHP, any code present after will be executed. So, if you're using this as a way to avoid user accessing pages where they should be logged in, the content of the page will still be processed and sent to the client. Using a proxy, you can set that despite returning...
I´m trying to protect my LAN (University campus) against ARP attacks using netcut. I have 100 APs connected to my CISCO 2680. I used 8 VLANs and all of VLAN ports are connected to one gateway provided from a loadbalancer. Even with this, I can detect some attackers. Is there any solution to protect my LAN apart using ...
When I succeed the username recovery process, I saw a suspicious address i didn't know of. How was this added to my list of known accounts? (see below)
How can I have Crunch create a password list where the passwords contain no duplicate characters at all? eg. I currently have crunch 3 3 ABCDEFGHIJKLMNOPQRSTUVWXYZ -d 1 which prevents 'ZZZ' but allows 'ZYZ'. I wish to also exclude passwords like 'ZYZ' or 'ABA'. Is this possible?
I was looking at the wiki for the node-argon2 package in npm, when I came around this justification for using argon2i as the default mode: The variant of the hash function. Argon2 has several variants with different aims: argon2d is faster and highly resistant against GPU attacks, which is useful for cryptocurrenc...
I'm having trouble understanding the difference between NIDS (Network-based Intrusion Detection System) and NBA (Network Behavior Analysis) It is to my understanding that NIDS use two detection methods : Signature-based detection Anomaly-based detection and NBA use one detection method : Anomaly-based detection Bo...
Is it possible for someone who is doing air monitor mode (ex. using airmon-ng) or is using a rogue device to capture attempted authentication on a Wi-Fi AP ? For example, I have a home router WPA2-protected with a strong password. There's like more that 20 other wireless networks around me. I want to connect a Wi-Fi d...
Both AMD and Intel have introduced memory encryption at the hardware level. AMD calls this Secure Memory Encryption (SME), with the Intel version being Total Memory Encryption (TME). What kind of attacks can this technology protect from, and what can't it protect from? A cursory glance at the technologies indicate it ...
A basic plain-text unencrypted TCP connection is setup as follows: Network Client LAN <----> Network Modem <--> ISP <--> Remote Server The network Modem only has a single wired user, and nobody can sniff any LAN packets. TCP packets are generated on the Network Client underneath the lan. The network modem sends packets...
I am toying with the record_mic function on my laptop and noticed that no matter what i do i cannot capture a stream longer than 12 seconds or i get timeout errors. I thought this was a limitation of the record_mic command so i switched to soundrecorder. This also presented issues in that it seemed to save my files as ...
Windows Server using a IEEE-1667 drive allows hardware based encryption on the fly. What are our options when using two disks with a RAID controller, in order to achieve redundancy and parity (T10-DIF)? Is it possible, the booting RAID controller to support IEEE-1667 so that along with UEFI's Secure Boot and TPM, be ab...
I am trying to understand what generic risks are there in using my thumb drive to transfer files to some untrusted machine and plugging it back to my Windows device. Specifically I am interested in generic threats when I plug my USB Drive to external machine is compromised (like public image printing shop). As far as I...
I am trying to analyze a malware in a virtual machine (linux), but it uses the cpuid output to verify if it is in a virtual machine/sandbox, and refuses to run malign code if inside a virtualized environment. Is it possible to change/fake the output of the cpuid instruction, so that when the malware checks for the cpui...
I know how we do code injections with scripted languages like JavaScript, SQL, PHP, etc. and pretty much wherever a execute() function is used. However, I'm still unsure about how code injection works with compiled languages like C and C++ I've looked up "C code injection" and "C++ code injection" on Google and our bel...
I have a startup working on Django app, that will be processing sensitive personal and financial information. We're just finalizing a prototype of the product (no paying clients, no investors), so we're under-staffed on a limited budget. Our product is a B2B tool, the first users of the prototype will be just a few emp...
Does it make sense to log a user out from a web service after the user's IP address is changed? I understand that a change of an IP address might indicate a man-in-the-middle attack. Then again IP addresses of end user devices (mobile phones) might change frequently when switching from network provider to local WLAN. I...
I'm working on an IoT product that uses the cloud once finished. Each of these devices has a serial number, from which a key is derived. This key is then stored on the device itself and in the cloud. These two mechanisms are working flawlessly and are secure when I'm producing the devices by myself. Since this is not ...
I would like to prevent websites like Reddit from having access to information about my devices, my IP, personal information, etc. I have began using Nord VPN and cleared my cache on both safari and Chrome for Reddit, downloaded a new browser, Opera, etc. What are some other useful tips for preventing a website from tr...
For triggering a Java exploit should applets be enabled in the user's machine? That is, in a drive by download scenario, can just visiting a malicious URL trigger an exploit/cve on the user's pc due to an outdated Java version, again without requiring applets? Consider using a modern browser like Chrome which has the...
I want to hash a set of sensitive data using a hash+salt. I've done a little research and now I know that: The salt should be random. The salt should not be reused. Using hashing without salt makes it possible to use rainbow tables and dictionary attacks (using the top 10000 passwords, hashing them, and finding matche...
I was reading sth about android code signing and have run into this statement: The second jarsigner command at v in Listing 3-7 first verifies the signature block and signing certificate, ensuring that the signature file has not been tampered with. Next it verifies that each digest in the signature file (CERT.SF...
What is best practice as of 2019 for storing secrets inside applications? Sometimes in an app, you might need to access some web-resource or other asset that requires authentication or decryption. What is the best practice to achieve this? I've seen folks hardcode symmetric keys, etc but I feel this is a bad way to do ...
I have a MikroTik router. I want to allow only Youtube videos and block all other videos. I tried to write an extended ACL but I really have no idea. Maybe allow only Youtube videos source URL and block other URLs? Can you guys help me?
What are the security impacts of revealing the keys to the user? I googled around and only found the ruby documentation. But did not find any article on how it affects security. Is it just because of 24 character of base58 or someone could enlighten me? key: Returns the key pointing to the file on the service that'...
This is a really theoretical question, but if I use an SSH key with a passphrase to login on a server, could this be considered as a two-factor authentication (2FA)? Indeed, I need the SSH (private) key, which could be considered as the first factor, and the passphrase which could be the second one. If we compare to a ...
As part of a home exercise in my networking class, the professor is asking students to submit a Wireshark capture done on the students' private machines. The capture must contain activity of the local mail client (e.g. refreshing mails) and arbitrary browser activity (browsing on a website of choice). The capture sho...
I want my native applications (android/ios) to have a keypair (RSA or ECIES) so that certain data on requests to my API can be encrypted. I want each client to have a unique keypair. The device will register that keypair with my API and it will be locked down to the unique fingerprint of that device. I have two options...
I've been reading a lot about polymorphic and metamorphic malware and how they evade signature-based detection once they have been discovered. These techniques seem to be utilized to evade recurrent detections by AVs and IDSs. It occurred to me that it might be a high priority goal of malware authors to prevent their m...
(To be clear, in this question I'm not asking about how to protect a login form against brute-force attacks.) I work for a company which designs and builds microsites for competitions that appear on consumer products. If you've ever bought a packet of crisps which has prompted you to look for a unique code printed insi...
Some home routers (AP) have the ability to block connections to the admin page if it's being accessed through a Wi-Fi connection. In order to login to the admin page you need to get a cable and connect to the network. How does the web page/service (80 or 443) knows this? How secure (easy to circumvent) is it? Is it t...
I'm looking at my firewall logs and even though I have my computer set to a static DNS, the logs are showing that my computer is reaching out to multiple DNS servers via port 53. I am worried about botnet activity.
Card's magnetic strip and chip should programmed by banking system. Is there any chance to clone same programming to another chip and magnetic strip empty card? By doing this, our cards may be cloned or not? If vendor and person with a cloned card can do transactions together with mutual understanding?
I'm a uni student taking a course on cybersecurity and what I am attempting to do is solely for educational purposes and not malicious. I used the eternalblue exploit to gain access to the victim's computer (a Windows Server 2008 R2 virtual machine). I uploaded a simple helloworld.exe program on their desktop. Now, I a...
I'm building a web application which configures and interconnects other applications through web services. In all the data I have to save for each applications, there are some that are quite sensitive : the credentials. Unfortunately, most of these applications do not provide dedicated API keys or token for this kind o...
A locally installed application, which runs a daemon as root, creates a directory which is world-writable. By changing files in this world-writable directory, it’s possible to cause the daemon to execute arbitrary code as root. Reviewing the Privileges Required flowchart from the official CVSS user guide doesn’t seem t...
StandardPBEStringEncryptor encryptor = new StandardPBEStringEncryptor(); encryptor.setPassword("jasypt"); // we HAVE TO set a password encryptor.setAlgorithm("PBEWithHMACSHA512AndAES_256"); // optionally set the algorithm encryptor.setIvGenerator(new RandomIvGenerator()); // for PBE-AES-bas...
If I send a HTTPS request to a IP address directly will anybody spying on my network be able to see that IP address? For example if someone captures my HTTPS packets will they be able to identify which server I am connecting to?
My ISP give the option of applying 2FA to your account and setting your level of security (from ‘normal’ to ‘paranoid’). However, none of the levels provide 2FA recovery codes. This is the only service I have so far encountered that offers 2FA but not recovery codes. Before I contact them to ask if they could implement...
After reading this excellent answer, I learned about the existence of side-channel attacks. From the code example provided, it is possible to determine the correct password by timing the code when given various inputs. for (i = 0; i < n; i++) { if (password[i] != input[i]) { return EFAIL; } } What can I do ...
I am creating a website that allows people to upload HTML content. Currently these are the tags that are banned: <script></script> <iframe> <object> <embed> <style></style> All on= attributes, i'm not gonna list them all there are like 70 of them I don't want the user using any JavaScript or placing any code that wi...
I'm using the following authentication scheme for my current MERN project. I'd like to know if it's secure, particularly the renewal approach (more details after the description). User signs in over HTTPS. (Passwords are stored hashed and salted with BCrypt alongside the BCrypt-generated salt.) Server verifies the cre...
I work on a web application which has an array of static assets like button images and css files, every time a request comes in for one of these assets forms security has to check that the request is valid. I understand that it's important to protect user's data and the source code but is there any benefit to checking ...
I have local (private) root domain domainX.example and subdomains : subdomainY.domainX.example and subdomainZ.domainX.example. How would I create chain of trust without using root-servers.net?
I purchased a used laptop on eBay. I scrubbed the hard disk to make sure there were no lingering or unknown viruses left on the disk and then installed fresh Windows 10. But, what about the firmware? Does Windows Update make legitimate updates to the firmware? Is there a way to detect that the firmware contains unauth...
I just finished using the Sysinternals tool called procmon.exe to determine which files were being used during a program's installation. I used the procmon filters to show me only file events in a certain folder. When the installer completed I started looking through the events and found that smartscreen.exe was trying...
I find some website only encode the left angle bracket of inserted HTML tag, for example: <div style="position:absolute;left:63.35px;top:108.41px" class="cls_002"><span class="cls_002">&lt;script>alert("hello")&lt;/script></span></div> Is it still possible to launch XSS on these websites?
I've started my PWK Course, and now I'm on Buffer Overflow topic, which contains SLMail 5.5.0 exploitation. Buffer Overflow is so great interesting for me, but I can't imagine how would look real life buffer overflow exploitation of SLMail 5.5.0. In the course, most of the time is used debugger to investigate EIP value...
I was going through the following tutorial https://www.youtube.com/watch?v=8ptiZlO7ROs to set up an HTTPS connection, and noticed that it seems the code only makes use of server.crt and server.key (I'm not sure if server.key is the public or private key in the RSA key pair). But shouldn't two keys be needed for HTTPS? ...
In a phishing page for Office account (login mimicking the normal login page and stealing the credentials through a simple ajax request, then navigating to a dummy public google doc), attackers have put an invisible iframe with the url https://login.microsoftonline.com/logout.srf?ct=1548343592&rver=64.4.6456.0&lc=1033...
. . . Or is that discouraged, and it's better to use separate key pairs for TLS and JWT? (It would be slightly easier to manage one key pair only, but probably better security to use two separate key pairs).
Is it and how is it possible to modify a HTTP POST parameter that is being sent by the host to a server assuming that you are in a man-in-the-middle position in a network? HOST(POST=foobar) --------> ATTACKER(modification) --------> SERVER(POST=barfoo)
Let's say that ACME, Inc. is making closed-source software. It's closed for a reason (they don't want it leaving their building other than in compiled form). Now, they are hiring some company/person to audit the code for them. How exactly is this done? If I were ACME, Inc., I would want the audit person (or persons) to...
Sometimes when I click on a link to a website, from google search, etc., I get a warning that says "Your connection is not private. Attackers may be trying to steal your personal info", and makes me go into advanced options if I want to proceed to the website. According to some quick research, this means that there is ...
Frequent attacks on password-based encryption are dictionary attacks with special hardware. I suspect that this is the only promising attack on the ciphertext. Is that correct? Another attack scenario that targets passwords is keyloggers. This attack is not on the ciphertext, but on the system. In addition to these t...
I have a client facing micro-service where user logs-in and initiate actions against their resources. After authorization of the resource against the logged in user, the client facing service forwards the request ( with parameters Logged in user Id, Resource Id and requested action) to backend micro-service. Before per...
Pieces of web applications such as WordPress or moodle require to specify the URL that the user will provide in order to visit the site. For example, in moodle has the $CFG->wwwroot config parameter that takes the value of the website's/webapp's URL. So I was wondering what benefit this approach offers into the web app...
I have created a CA root certificate and a device certificate to go on my device signed by the CA certificate. My question is as follows: Can you make the device certificate last for 30 years, and the root certificate only 20 years, but just create a new root certificate based on the same private key, which would last ...
ISO 27017 advises both cloud service customers and providers. Microsoft Azure is compliant with ISO27017. Let us say that a cloud service customer who uses Microsoft Azure wants to be compliant with ISO27017 - I assume that he/she is not automatically compliant with ISO27017 by virtue of Microsoft's certificate. I am ...
I've a device that's running an HTTP server. It doesn't have a fully qualified domain name, and installing a self-signed certificate on every client is tedious. In other words, no HTTPS. I've blocked ingress traffic to the server's HTTP ports, and am currently connecting to it via an SSH tunnel. When using an SSH tunne...
I'm currently working on the following CTF exercise (x64 version), where the objective is to overwrite a pointer stored on the heap to control the write address of strcpy(): https://exploit.education/phoenix/heap-one/ struct heapStructure { int priority; char *name; }; int main(int argc, char **argv) { struct he...
I work on an application where users are sent a unique registration code in the post. They use this, along with other personal information known to the user, to confirm the identity of the user upon creating a new account. Does the unique registration code sent in the post need an expiry time (like after 30 days)? The...
Sequence of events: I didn't touch my phone all day (at work, busy day, know it didn't even come out of my pocket, but was on). 5:20pm I get a call by a guy asking me who I am and why I called him at 2pm. Tell him I didn't call him. Immediately after, I texted the guy who called me to text me if he verified I called h...
today we've had an interesting question over a coffee: If I would implement my own client security for openID connect and use the authorization code grant - do I have to verify the ID-Token if I only use the access token? The spec says "Clients MUST validate the ID Token in the Token Response ..." but does it make sens...
I'm building a Progressive Web App intended to be used primarily in an offline state. The user can "login" while disconnected, which verifies the password against a locally-stored hash and some other stuff. The idea has been proposed to add 2FA to the offline login to make it "more secure". However, my (limited) unders...
I am studying Needham-Schroeder protocol in my course subject and I understood it well, but there is a homework problem which is asking, "what is the outcome of Needham-Schroeder protocol?" According to me, its outcome is a security session between Alice and Bob for communication and kdc is responsible for that securi...
How does TLS 1.3 handle communication between the server and the client where it can last for a very long time (like years), without any pause in it? My concern is that the longer a key is used the more insecure it becomes. I have read about renegotiation (which is deprecated in TLS 1.3), session tickets and session re...
I'm familiar with the concept of downloading a file and manually checking it against a published checksum. See How to verify the checksum of a downloaded file (pgp, sha, etc.)? and Is there a command line method by which I can check whether a downloaded file is complete or broken? for examples. I would now like to main...
This is similar to domain shadowing, but there is no compromise taking place of a registrar account; these sites let users create subdomains. I was wondering if there is a proper name for this kind of phishing/impersonation attack? Two examples that come to mind are Azure blob storage and personal sharepoint sites. Bot...
I am using GnuPG. When gpg encrypt is called from the command line, how is a key chosen to do the encryption? It appears to me that -r, or --recipient, supplies a user id and that is the simple answer. I believe all of the examples I have looked at they show an email address for recipient, which is required input when ...
I was recently presented with e-mails that look like they came from my e-mail and IP address but I didn't send them and never saw them. It is a back and forth correspondence with another gmail account. Is it possible someone was able to set up a forwarding without my knowing and make it look like it was coming to and f...
I've been tasked with looking after an application deployed to azure. I have been allocated 4 hours a month. I essentially have half a workday to secure this application / keep it secure. What is an efficient use of my time? Should I concentrate on: Making sure all the components are up to date? Checking all the log...
As a pentester I came across this scenario: <script type="text/javascript"> URL = 'http://example.com?x=input'; I am able to insert a new line with %A0, spaces and almost anything except '. The problem is that I need that ' before making a new line so the JS doesn't break. I am able to leave it like this: <script ty...
If an unrooted Android device is infected with a virus, rootkit or malware, would resetting the device disinfect it?
....key is normally a string of bits used by a cryptographic algorithm to transform plain text into cipher text or vice versa.... https://www.di-mgt.com.au/cryptokeys.html Suppose I have a Backend server which stores some public keys user submits using some FrontEnd page. Presumably the user is going to copy paste th...
On one of our CentOS6 servers, /var got renamed to /var.1 tonight (around 3.24 am) and a new empty /var folder was created. Not surprisingly, it crashed soon after that. Circumstances: Over the last two days, we have been DDOS'd by botnet activity conducting an apparent reflection attack against a large local busines...
I am 14 years old and I have just created an encryption program with a friend. I wanted to know if anyone here could give me back any feedback on it. Here is how the program works, Imagine you want to encrypt the word 'hi', Depending on the key that can be generated with the program, the computer will choose between 2...
I recently came across reports in media that Whatsapp's services were exploited by a malware Pegasus for illegal surveillance of certain individuals. Pegasus, which exploits 0-day vulnerabilities, is known to infect a device just by visiting a malicious link from the user's device. The recent reports highlight that a ...
I am debugging a TCP connection, which returned multiple values such as: +†Ä˜Õõıû and 'G1÷ù]TB*ø5£"ñB—£s∏f '1÷ù] What I am trying to find out, is how is this encrypted, and find a way to decrypt it.
If a user on normal everyday-use computer wiped the unallocated space on a hard disk drive, how long would it take before analysis of the unallocated space would yield no evidence of a disk wipe? Lets say that there is 100 MB of disk writes per day on a 1 TB drive with 100GB used space (900GB unallocated). Is it simply...
We have got a new connection from a local ISP provider, the provider supplied a router and other few devices, then he has configured the device with a password, but he does not allow us to reset or change the password for own. means we are unable to configure anything from our side, Is this good secure for our personal...
I am looking at implementing an Authorization Code with PKCE grant on a mobile app to communicate to an API. What I am curious about is what applications currently do with the OpenID token that is granted to the user via Google. Do servers typically use the token granted by Google to handle which user is interacting ...
I was listening to a podcast the other day which was sponsored by a VPN provider. During the talking points for the advertisement, the host said something to the effect of the following (I'm recalling this from memory, but this is the gist) Have you ever had your credit card hacked? Be wary of using public WiFi networ...
(This is a followup to my question about a general security scheme here) As part of an authentication scheme for a single-page application + REST API, I planned to provide authenticated clients with a short-lived access JWT and a long-lived, revocable refresh token. After some consideration, it seems like the best way ...
What are the security risks associated with leaving bluetooth on all the time on a Pixel phone updated to Android 10? In this question, I am NOT focusing on the risks associated with someone intercepting my conversation using a bluetooth headset as an example. Rather, I am focused on risks of getting malware similar t...
Let's say I have my ServerB that accept any request and it checks the PHPSESSID and compares the IP saved into the session (thanks to session values) with the IP that made the HTTP request. The IP saved into the Session is the IP of a successfully authenticated client stored previously. If the IP it's different, reque...
My boyfriend said he received a text from me. I never typed it or sent it to him or anyone else. It somehow randomly was sent to his phone but wasn't in my messages to him. How could this happen?
bit of a general question here, would hope to learn more about exactly what is going on technically. I'm attempting to test and capture a handshake from my own AP (an older Apple Airport router). I've used various tools from airgeddon to wifite to fluxion to manual airodump-ng and the weird thing is: I cannot see a sin...
Is there a good security API (all in one) for Java to prevent things like SQL injections, Cross site scripting and those owasp top 10 vulnerabilities?
Today someone tried to access my LinkedIn account. When I logged into my LinkedIn account, I received PIN by mail. So how can I know the location and IP address of the hacker?
Assume that I fully encrypt an unused USB (FDE), then format it and copy plaintext files. If the files are deleted from USB by using a secure wipe, does FDE that was first applied decrease the possibility of recovering files?