instruction
stringlengths
24
29.9k
With all the recent vulnerabilities in WPA2 and so many low quality posts/articles in the internet about WPA2 security I am not being able to fully understand the risks of WPA2. Is WPA2 Personal secure provided that strong passwords (63 bytes random) are used? Shall I use TKIP, AES or TKIP+AES in the configuration? If...
There's a technique called sim swap, which enables a fraudster to transfer the victim phone number to an other sim, allowing a fraudster hence to read the messages but especially to empty out their bank account by recovering or changing the bank website account password via phone number, so by receiving a recovery code...
I'm working in a task for class where I need to sign my public key with 3 signatures. After I got them, I need to send my key back to the keyserver with these 3 new signatures. The thing is that when I search for my key, I just get an output that looks like this: gpg: data source: http://130.206.1.8:11371 (1) adria...
I'm challenged to capture packets sent from a client to the gateway in a network. is it even possible to see the packets between client and gateway for me?
https://www.irs.gov/identity-theft-fraud-scams/identity-verification I received a letter in the mail indicating that I need to verify my ID with the IRS. Can I be reasonably certain that the website is actually the IRS? Why / How?
My parents are getting up there in age and recently, my dad asked me about a message on his answering machine from "Apple" saying his account was "compromised". After having educated him on phishing calls, I'm somewhat exasperated that he thought the message was authentic, so I had an idea to manually screen calls for ...
DAA (Direct Anonymous Attestation) is not the only scheme to achieve anonymous attestation. In general, these schemes allow an entity to stay anonymous throughout the attestation process. The concern here is not the attestation but key revocation. TPM/FIDO DAA scheme requires to keep a rogue list of compromised private...
I was reviewing my spam folder and spotted this: People are going to have one of two reactions: Hooray! Free porn! Confirm, confirm, confirm! OR OMG! I didn't sign up for porn! Now everyone can see my profile! I'm so embarrassed! Close, close, close! I inspected the buttons and links in the email and they are all <a...
Browser fingerprinting is well-known: since a client gives many HTTP attributes/Javascript attributes during a website visit, the probability that two users have the same exact values for all this parameters is very low, and a user can sometimes be easily identified as unique (example: amiunique.org). In a same fashion...
For a mobile application I would like to be so compliant as possible with the AdES standard. The mobile application will perform operations on behalf of the user, signing them first. A backend service will verify the signature and proceed with the operations. The main question is about the restrictions regarding who t...
As part of application security compliance we are supposed to implement an IPS on our application. The application is basically an educational web portal where students can enrol for course assessment. The assessment will be done in the backend by professionals and the certificate is issued to the students. This involv...
How can I prevent DoS/flooding attacks on a wireless MANET network?
If anyone can see the receiver IP address in a HTTPS request, what will stop ISPs from analysing the packet, reverse DNS lookup the IP and block the access to the domain the client is trying to reach. Is this possible and if yes how much would it slow down traffic? This is a followup question to Will HTTPS expose the I...
Would storing the output of a HMAC function with the PAN and CVV as input be considered PCI-DSS compliant ? This is post authorisation. I suspect probably not as PCI-DSS explicitly forbids encrypting a CVV and storing that but a HMAC function is technically different. Thanks.
When using GPG to sign Git commits, and as the SSH-agent, is it important to use separate sub-keys for the signing of the Git commits as it is for authentication with the SSH host of the Git server? Does using the same sub-key for both expose owner of the to an attack vector where previously or planned signatures of Gi...
If an ISP wants to gather profiles on users, or block certain websites, they can fairly easily redirect outgoing UDP traffic to port 53 to their own DNS servers. How could this be detected by the end user? Assume that the redirection is being done via a trivial router rule rather than though deep packet inspection.
I'm trying to perform a De-authentication attack on my own network and client. However, the client never disconnects and I cannot boot the client from the AP. I'm running: aireplay-ng -0 0 -a XX:XX:XX:XX:XX:XX wlan0 -c XX:XX:XX:XX:XX:XX I'm close to the client Target is a basic Apple Macbook computer AP is an ARRIS (...
I am learning the general concept of network security, and becomes aware of two poisoning attacks on the network infrastructures, that is, DNS poisoning attacks and ARP poisoning attacks. They are both due to certain cache structures. It seems to me, that NAT table in the firewall is also using a cache structure to ma...
I set up a Guest wifi on my new router. It has no password. For some reason, I cannot see who joins it on my router's settings at 192.168.1.1. The other connections I have do show connected devices, however. Is this a settings problem? Or are Guests usually invisible to me? I am curious, since I can see if it is used r...
You sign into myaccount.google.com. Somewhere along the line your browser is redirected to https://accounts.youtube.com/accounts/SetSID?ssdc=1&sidt=<reallyLongBase64>&continue=https://myaccount.google.com/intro&tcc=1 probably inside an iframe. Youtube server sets some cookies. You click the youtube icon in myaccount.g...
When setting up my refurbished iphone se, it wants a phone # for 2fA... I have one phone. It's not sitting on a desktop, I carry it with me places. The other option is to not use 2FA, which it cautions against. Am I expected to carry 2 phones with me? Or, how is this expected to work?
We are implementing file integrity solution on Microsoft active directory servers, I need to know the critical paths(files and folders and registry keys) that need to be monitored for any change or the paths which are targeted by common malwares and attacks.
I am studying the SMTP protocol and follow a course materials to setup a PoC spoofed email by talking with a SMTP server of our department. This is what I have right now: shuaiw@shuaicpu1:~$ telnet mail.XXXXXX 25 Trying XXX... Connected to mail.XXX.hk. Escape character is '^]'. 220 XXX ESMTP ; Mon, 4 Nov 2019 16:07:07...
Why does my computer send any network data, even if I am not doing anything? Is it possible that this network traffic includes private data (text documents, images,...), to which I did not consent?
We all know that deleting a file from your computer does not really erase it, but only marks as free the memory where the file was written, so that, until such memory is not overwritten, the file can still be recovered by reading the raw memory. To really erase a file, its memory must be overwritten by random data or s...
At my workplace we are implementing a process so my colleagues can share the burp states of the security assessment of the project. The issue here is, sometimes we have to use personal account information to check productions issues. My question is about is there any option provided in burpsuite tool that I can use it...
This question might very well be more a confirmation than anything else, but I'm breaking my head over a problem I try to solve. I hope someone can either confirm my thoughts or tell me something I'm missing. We are trying to setup a secure environment on an existing system (I'm aware this is not the way to go, but com...
In my group we have been asked to implement an authentication-authorization flow in a new web portal that lives in a complex infrastructure. For historical reason the initial authentication of each user is done by an older "main portal", which does the job for every other service in the infra. This originates a token t...
Currently I am developing an iOS/Android app and a corresponding backend in PHP. In the last days I read a lot about user authentication and now I am a bit confused. For now I am using a session ID for user authentication. A user can login in the app using email and password. The credentials will be send to the server ...
I know it is impossible to completely prevent a host from accessing the data of a virtual machine (as noted here, here and here), but I think there is value in making it harder to do so. Bare metal servers aren't always an option, and they are much more expensive. Here is the threat model I have in mind: Buy a VPS fr...
name file as command Is it possible to put command as filename in Linux For example touch anything.jpg or touch anything Can i change name of file with mv to be anything;nc -e /bin/sh
I have an AWS static site in an S3 bucket, accessible through CloudFront and a bunch of lambda functions that form the backend of the site. Is there anything else I can/should do security wise to guard against someone unauthorized running any of the lambda functions? Since I wanted to make sure the webpage didnt offer ...
How can I know if visiting a website is safe? Is a scan with virus total good enough? If it says that the website is clean then can I be sure that I won't get hacked by visiting it? Could a website still be unsafe to visit even if virustotal says it is clean? Is it possible that a website has malicious code that is no...
I am asking this question from a security perspective (not privacy) I have read that using a vpn can prevent hackers including your isp (who could be working for the government) from doing mitm attacks. Is this correct? That using a vpn has security benefits? It can provide security against the isp and government? But ...
I have an application that is hosted on AWS. It has an Application Load Balancer in its front and it is also attached to the Cloudfront to handle a heavy load. In my case, I have enabled SSL only on Cloudfront and haven't had SSL on ALB. Now the application works fine without any issue. It is showing a secured lock sym...
I have created a custom dynamic hash function comprised of a series of different existing hash functions chained together. I'll spare you the exact details because it's for a class assignment. I've created a dynamic hash function in a John the Ripper (1.9.0-jumbo-1-win64) .conf file. I labeled it 'dynamic_2015' like so...
This question, but focused on .NET's given PBKDF2 implementation, has been asked here now. Situation I am currently updating a password storage mechanism for a website. My plan for storing a password was Create a 16 byte salt* Create a 64 byte hash with that salt, using SHA512* Concatenate the 2 Convert the whole th...
My question Meaning of persistent full-chain -- ? What is the difference between OS-level CE and Kernel level CE? How do OS-level CE and Kernel level CE differentiate in impacting a system? Rarity and difficulty when it comes to exploitation When is user-interaction needed to successfully exploit the CE?
If an attacker would have access to a certificate, could he build an attack out of that? or rephrasing it: How could an attacker profit from a device certificate, that he gets his hands on? For example: A certificate that is used for a device (IoT-Device) gets public, which is in my mind part of the idea of using it,...
What would happen if the random bytes provided by the client and the server in the first two messages would be reused by one peer/by both peers? I think it would highly reduce the provided security, like for example if you use a nonce multiple times, but i am not quite sure. Does using the same random bytes multiple ti...
I am customer of a large European bank, but I have found the following happening consistently with multiple past banks. Basically, I have always been able to pay using my legitimate card(s), credit or debit, under a fake name. When you are prompted online for your card information, you will normally select Circuit (Vi...
My company is currently a target of some social engineering attacks where company employees are being sent e-mails from the attacker pretending to be senior members of staff. They have the correct names but are sending the e-mails from random addresses and aren't bothering to hide them. Whilst technical employees are ...
I want to use .NET's Rfc2898DeriveBytes functionality in order to store my passwords in a database. In order to use it, I still need to make several decisions which will influence the level of security provided. These decisions are: Salt length Add pepper before hashing or not Pepper length Iteration count Algorithm c...
I know reading that title probably made some of you gag, but let me explain the situation. I was tasked with creating a pretty straightforward storefront web app (php/laravel/stripe for payments) which I have done several times in the past, no big deal. However my past applications all required the user to create an ac...
We have a software system with several different users (let's say 10) and a single super user. A super user is a regular user with the privileges needed for managing other user accounts. This is a production control software system for large manufacturing companies, so nothing cheap. We would like to solve the risk of...
How do clients (browser for example) handle a missing intermediate certificate? In the following answer it is explained that they download certificates or use cached certificates: https://security.stackexchange.com/a/163660 I don't understand how this works. Where do they download them from? If they can download and ca...
Many services integrate with github. Some of them seem to require a personal access token with "repo" permission. Personal access tokens are global across all projects. In other words you may want to use some external service to access just one project but by giving that service a personal access token you've giving it...
I have a Linux (4.9.171) machine running on ARM Cortex-A processor. The system has internet connection and talks to my server over SSL. At the first boot, I can configure the date and time to it. However, if my system restarts, it won't have a right time and SSL connection can fail in Certification Path Validation Algo...
I'm studying network security and I found this question in my slide, but don't have an answer. Discuss the use of keyed HMACs for guaranteeing the integrity of a file being transmitted over the network (no other guarantees requested). All resources that I found online, say only that HMAC guarantee integrity, but ...
We are developing a solution where a door is controlled by a backend that is publicly available over the 4G network (there is no local network available at the place of deployment). The user is scanning an NFC tag that is next to the door and thus gets the id of the door and the URL of the backend (both values have to ...
How can you make sure site admins are not able to get information like your IP, Browser, Device, etc?
I have this scenario on my lab. HTTP POST login form on a IIS server. ASP backend using MSSQL database, and a single simple query as this: sql="SELECT * FROM USERS_TABLE WHERE USER='" & user & "' AND PASS='" & pass & "'" There is a simple "security" mechanism on ASP doing a replacement for single quote char. Single qu...
How to do an SSL MITM for all programs trying to access the internet on my local Ubuntu. When a program on my local machine tries to access the internet using https I would like to intercept and switch out the SSL Cert with a different SSL cert. I only want this to happen for specific websites and web APIs and I would...
I've been reading both FIDO and FIDO2 specs for a while tring to understand the similarities and differences between both. Here is how I broke it down so far: FIDO: First iteration in creating a cross industry standard for passwordless / 2fa experience (with UAF and U2F) FIDO2: Second iteration (with CTAP and Webauth...
The start page of my browser is example.com. Recently, connecting through the main Spanish telcom network (Movistar), I got a different page, with a header showing the name of the this company. This is the js: setInterval(function(){if(!document.getElementById('OPTSmartBannerScript')){var js = document.createElement...
I've been trying to implement 2FA for a web application, both server and client side. As everybody knows, an H/TOTP is intended to prove that I own something, for example through the use of an authenticator app installed on a mobile phone which will generate the OTP for me. I'm not sure about what that "something" I ow...
As of 2018, a recent security measure was passed, called 'The Cookie Law'. It states that; if you have a website or blog with visitors from the EU (which is likely to happen), "you need a cookie warning or popup notice when collecting user data by means of cookies", thus requiring need to get consent for doing so from ...
Is the hex code at the top of this source file the same as the assembly at the bottom, as in they do the same thing? How can I convert assembly into hex like in this source code file? I frequently see it being used in payloads. I understand it is done to preserve space, bypass IDS among other reasons. Example file from...
I came across a site which overrides copy functionality and injects current page url as paste value. I was trying to select couple of words and instead it copied the page link. Simple developer tools inspection showed event getting overridden with following function window.addEventListener("copy", event=>{ const s...
The above screenshot is from my website's cpanel visitors list.My website is build on wordpress. And I think someone is trying hard to crack open my website with DDOS attack and drain out my 10gb bandwidth in single night.Although I've applied https and blacklisted the repetitive ip address accessing the non existin...
I recently learned that in Windows a process is generally allowed to alter the the memory of another process as long as it is running under the same user. I tried running the following code with various pids: #include <iostream> #include <processthreadsapi.h> #include <errhandlingapi.h> int main() { HANDLE handle ...
I was reading about Passwords and came across methods used for authenticating client to a server. Since sending password in Plain text to the server isn't the best method for authentication of a user, certain methods were described which provide resistance to replay attacks, MITM etc. Some methods described were:- 1) R...
We have an AI model which needs to be deployed on premise. The hardware will be provided by us, so we can do what ever we want on the device. The device is a mini PC running Ubuntu 18.04. The UI is launched in kiosk mode so only our program will be running. The user should be able to start the machine, provide the use...
We need to fill out a PCI self assessment questionnaire, and I am wondering If we need to fill out SAQ A-EP or SAQ D. We are an e-commerce merchant that doesnt operate trough a website, but we receive credit card details on our API. We tokenize it and send it to third-party PCI compliant service provider. We don't sto...
I have a setup whereby the SSL certificates are terminated at the load balancer (i.e. Load balancer to web server is in plaintext). In order to do the SSL termination, the private key is stored on the load balancer itself. I do have a HSM in a data center. I was told by security guys that best practice is to store the ...
The referenced RFC details a mitigation to what appears to be the ability to compromise a TLS connection through an attack known as the 'triple handshake attack'. How serious is this vulnerability? How could this vulnerability be exploited and what would the impact be? The related RFC for this can be found here: https:...
On my work computer, I have connected to my personal Gmail account to check my email and go to my drive. At home I use my own personal phone and/or laptop. Can my employer see what I'm searching and looking at through my phone (never connected to their network) or computer (using my own WiFi), since my Gmail is connec...
x2goclient (on Windows) shows a different ssh host key hash than the output of ssh-keygen -lf /etc/ssh/ssh_host_key_$cypher_ley.pub -E md5 on the host. Connecting with other ssh clients from the same machine works fine (x2goclient comes with own ssh client). Interestingly, connecting to different hosts produces differe...
I am trying to figure out how to detect potential threats from malwares in various systems installed in the airport. To be specific, my focus is on the following systems in airports: Baggage Handling System (BHS) X-ray machines CCTV Building Management System (BMS) Airport Operating System (AOS) Human Resource Managem...
I started learning about stack-smashing after it came up during a CTF exercise. I have been practicing on an ELF 32-bit executable that I received for the CTF. After disassembling the binary file, I find that the program loads and writes out a prompt and then reads input without checking length, using syscalls (no lib...
I am a newbie of sorts as far as particulars of security is concerned.can somebody list all the possible uses of a digital certificate? it is used in SSL, signing and what else? Also is there a good reference book or article to understand certificates in its entirety?
I ran across this OWASP paper and was frankly confused. I thought this pattern was still one of the cornerstone strategies against CSRF but the paper seems to say it's broken. Should this pattern still be used? https://www.owasp.org/images/3/32/David_Johansson-Double_Defeat_of_Double-Submit_Cookie.pdf
I just bypassed SSL pinning on an android application but the problem is application won't let me play with the request on my intercepting proxy. It says something like problem with your network or check your internet connection, it might be slow. It used to say the same thing before I didn't bypassed SSL pinning. My ...
I am a highschool student taking TestOut's Ethical Hacker Pro. Currently I am learning about rootkits and Sirefef. When explaining Sirefef, it says: Sirefef hides itself by altering the internal processes of an operating system so that your antivirus and anti-spyware can't detect it. I'm not sure what this means....
I am currently conducting a pentest and I found an application vulnerable to http header injection, where the user input is reflected after the Content-Type header, and the Content-Type is set to application/force-download. That is, the attacker can pass content in the GET parameter that is then reflected in the header...
Now, I've done some research by googling about the subject and reading the manual and read other topics about this at stackoverflow. But still I have a question about the security and secrecy behind the encryption extenstion called sodium. I use the script in this topic as example: https://stackoverflow.com/questions/3...
I'd like to be able to inject my own key material in the FIDO2 authenticator; at the very least it will remove the need to trust the vendor (because we have no guarantee whether the vendor keeps copies of the keys to themselves, because of government request or for any other reason). So I believe that for customers it'...
I'm writing an essay about "Browser Password Managers". As part of this I have to write about vulnerabilities and exploits. I stumbled across the following scientific paper from 2013: "Password Managers: Attacks and Defenses by Silver et al." (https://crypto.stanford.edu/~dabo/pubs/papers/pwdmgrBrowser.pdf), which desc...
During login to a system, is it better to compare the registered encrypted password with the inserted password after encrypting it or compare the inserted password with the registered password after decrypting it? And why?
A friend received a text from my phone which actually used my husbands name in the text. It was not from me and does not show up in my text message thread. The text does not include a link or any picture. I also received from a friend a strange text that I know she would not have sent. It was sent in the middle of the ...
One of the SOC 2 controls is apparently around ensuring antivirus/anti-spam/anti-malware is running on production servers. I've been googling to see if there are any recommendation/best practices for this in the container world. I'm not sure if it's a good practice to run AV on the host OS? Some materials I found in my...
In an architecture with a root CA and a daughter CA, is it possible to combine OCSP stapling and CRL check? More precisely, is it possible for a client: to connect to an https server verify the validity of the server's certificate with ocsp stapling (the daughter CA issued the certificate for the https server) then...
When someone launches a slowloris attack on a website, could that attack be traced via IP? Could someone feasibly locate the IP of the person that launches said attack?
I read in Peter Szor's Art of Computer Virus Research and Defense that, in the past, a 16-byte malware signature was sufficient to 16-bit detect malware, but that longer signatures are necessary for 32-bit malware. I am wondering how large the typical signature is for modern malware.
I have a mTLS (client authentication) setup where client sends a self-signed certificate. This self-signed certificate is transferred to and trusted by the server. The server's certificate is signed by Let's encrypt and Let's encrypt CA is trusted by the client. [ client.key ] -- | (signed) [ client.cr...
Last Monday I received two emails from my hoster: 10h42: Connection notification 10h42: Confirm your notification I didn't login that day, so I knew something was wrong. I immediately logged in, changed the password and activated 2FA. I called the support and they told me that indeed there was a "successful" login bu...
I'm facing a surprising problem : A windows 10 computer seem to use keyboard and mouse by himself on the login screen. So I'm guessing : It's not a software intrusion, because it that way the program should have access to the shell and should use command by programs instead of attempt to login; It may be a hardware at...
Normally, to upload an encrypted file I would first encrypt the entire file, then upload the encrypted file. However, for large files this is not that easy as I need a external hard drive to hold the encrypted file. I am wondering if it is possible to perhaps encrypt a large file, say of 500 GB size, bit by bit, and to...
What are the steps of hashing password during registration and login to an application using salt and key? Are the following steps considered correct if applied to an application?: 1- During registration: user insert password hashing function generates unique salt hashing function adds the salt to the password hashi...
My girlfriend asked me why I texted her at 2:30 am. But I went to bed at 2am and that message was not recorded on my phone. She had an iPhone and I have a Samsung Galaxy S9. She sent me a picture of the text and yes in fact it was a message from my number but I never sent it. Can it be an old message that was sent auto...
When I specify an individual target, >nmap -v3 -sn 172.18.188.209 I get the correct and expected nmap response Starting Nmap 7.70 ( https://nmap.org ) at 2019-11-08 11:16 India Standard Time Initiating Ping Scan at 11:16 Scanning 172.18.188.209 [2 ports] Completed Ping Scan at 11:16, 1.00s elapsed (1 total hosts) In...
I would like to set up OCSP multi stapling and I can not find a lot of documentation on it, or in any case, recent information. I have a root certificate authority (CA) and a daughter CA below. Both work with Freeipa (and Freeipa uses Dogtag). I have a https server too. The root CA issues a certificate for the daughte...
I have gone through articles on google for adding a root certificate on my Embedded Device to validate Server Certificate During Handshake. but still, I am not clear about a few topics 1) do we need to install these certificates with OpenSSL command or need to work on OpenSSL code 2) does OpenSSL code will take care ...
Someone sent me a txt that was old, from a number that I recognize. It originally was from that person months ago, but they erased it. It was resent to me and I was supposed to have sent messages to a phone...I didnt. How could this happen.
I have done the first development of a website and deployment. Scanning the server with an online security evaluation tool I was recommended that I add a Content security Policy to the website, and I understand that this can help with XSS. But I read that this will disable inline CSS styles. I have used inline CSS free...
I would say the key exchange part, because PFS is used only during the key exchange of server and client. Am I right or have I overlooked something?
One of my teacher said "Without asymmetric encryption, we would be forced to use third-party to initiate any connection". I don't understand how it can be possible, what if an attack occur during the communication with the third-party? Maybe my teacher was speaking about a physical third-party? (i thought about an init...
I tried to understand what is the difference between node and admin certificate. Admin certificate is like root and the node certificate is just for communication with others nodes?
I'm working on a service where I want to protect endpoints from unauthorized access, but I don't want to deal with user management. This is how I found the OpenID Connect which I would like to use only as an identity layer. I'm a bit lost however with the authorization. For the authorization I want to have an applicati...
I am trying to evaluate how safe personal accounts are (including my own). Are there any statistics on the top security flaws which cause accounts to be compromised/stolen? Like: 25% of cases is common password, 13% of cases is malware accessing passwords in browsers, 10% is password interception on an unsecure channel...