instruction stringlengths 24 29.9k |
|---|
Say I am on a a computer behind a NAT and I want to execute an RCE exploit on another computer behind a different NAT(note that no ports are forwarded to the victim's computer on his/her NAT) Could I then run an exploit like this(assuming that I already know that the target computer is vulnerable to that exploit) and h... |
Could the website owner (admin) determine whether to record users IP?
If the website owner (admin) doesn’t want to record users IP, will the host provider or domain name provider still get and record users IP?
For example I buy a domain name (say, some website.eu) from namescheap.com, so namescheap company is the domai... |
Lately I've noticed that pages I go to on http sometimes have a large banner at the top from my ISP. What's weird is when I refresh the pages I get the https version of the site and the banner is not there. I try to type the http version into the address bar but when I click enter I get the https version. The network t... |
How should the auth server (IDP) report the error if the authorisation request redirect_uri doesn't match the configured redirect_uri for the given client?
Let's consider concrete example:
auth.com is the IDP
service.com if the registered redirect_uri
service.io if passed in the authorisation request
Should the auth ... |
In my lecture notes, it says that a system composed of two Bell-LaPadula-secure systems is not necessarily Bell-LaPadula-secure? Is there an example that demonstrates this concept?
|
I have an unidentified PSK encryption in airodump's output (see red square on screenshot) and I would like to get more information about the encryption method used by the network: do you know any tool that would give me more information about the encryption type?
Note: I'm not trying here to break the encryption method... |
As Root CA are kept offline for security purposes, how does it sign OCSP Response sent by Client for Intermediate Certificate Status Check?
|
We have two factor authentication, with passwords and one time code received on SMS.
Now normally I know you could restrict users to create passwords with min 8 character length, lower and caps letters, and one number.
But since we are using mobile codes together with passwords, how far can we relax requirements on pas... |
For an enterprise setting, how secure are Route Guards against script kiddies, hackers, and advanced threats?
If I understand correctly, the route guards are all available in .js files to the attacker and since all of the data is on the client-side, the user might be able to easily hack the route protection and manipul... |
I am a Computer Science Engineering undergraduate aspiring to pursue a career in the field of cyber security. I have some experience in web application security, memory and network forensics fields. I would like to have some suggestions for my FYP in cyber security + Machine learning domain.I have seen some projects su... |
I was looking into my websites traffic and found few entries from a subdomain for shnpoc.net domain. And when I looked into it, it was transparent proxying my website.
On checking further, I found this twitter post which states that the domain shnpoc.net is owned by Sky High Networks which is a subsidiary of McAfee.
Th... |
What to think about a user making thousands of successful login attempts over a short period? What are the dangers of such a behavior and how to protect against them?
A couple of examples of dangers that jump in my mind:
it might be a DDOS attempt, trying to do a large number of costly operations in a short period of ... |
At my current company, the IT Risk team decided to ensure root passwords of about 90 systems by the following conventional method:
The length of each password must be 16 characters, where they input 8 characters while the IT Infra team give the remaining ones.
Each team will print the partial password on paper and wi... |
I know there are laws which require all data to be encrypted in transit and at rest. It makes sense for browser to server connections but,
Does data flow within a VPC, lets say a kubernetes cluster needs to be encrypted too?
Does the data in transit between RAM and mounted volumes needs to be encrypted too?
If I am no... |
I bought an used IP security camera on eBay, I dont know who was the previous owner. I've always thought that we can't trust 100% any firmwares/OSes that were been installed or used by someone else. We can't tell if it has been altered with malware and or spywares.
Is it a recommanded practice to reflash the stock firm... |
Many password managers for mobile offer the option to unlock the password vault with a fingerprint instead of a password. If you never type in your master password, how is it possible to decrypt the data? It appears that there must be a way to decrypt the database without actually typing in the master password.
|
We work with many other companies to do data exchange. As an example, we might work with COMPANY A to send them sensitive data over SFTP. This would be done by them giving us an SFTP Host/Account/Password. We configure our side for the connection and have a process to push those on an interval.
My question is not about... |
I am somewhat new to this and trying to figure out why my program isn't executing as expected. I ran it a number of times with 1 time being completed successfully but not allowing me to connect to the victims machine.
I am running the following exploit on my victims machine (https://github.com/jivoi/pentest/blob/maste... |
I am testing a mobile app that makes calls to a REST API. The API is only used by Android and iOS apps. Apps are native apps and they do not use web views. API trusts arbitrary Origins and Access-Control-Allow-Credentials header value is set to true. API contains sensitive data and requires authentication.
If this was... |
Recently, I have downloaded a game from Steam. I wondered whether it was somehow possible to alter the data of the game and replace it with malware without the computer it was sent to noticing. Basically, is it likely that I became a victim of a MITM attack? And is the method of checking for time delay to detect tamper... |
A few months ago, kutschkem answered a question about HIBP with this:
Let's say every person on earth has used ~1000 passwords so far. That makes approximately 10 trillion passwords, which is ~243 if I am not mistaken. Choosing any existing password at random is thus about as good as a truly random 8-9 character case-... |
I am planning to track the Network calls being made by apps and the website of an Android Device.
I have used the Burp Suite tool for tracking the network calls.
Until now the Android Device and the Laptop were connected to the same WIFI.
But now I am planning to use an emulator which will not be hosted in my Laptop.
I... |
Is anyone willing to share techniques for creating a Windows Meterpreter payload that can bypass AV? I've noticed that Defender does a very good job these days at detecting it. Some of the techniques I've used and will share here. The particular method I'm trying to use is creating an executable Meterpreter payload ... |
I was wondering if you could add into a snort rule the ability to only alert if the first 3 bytes match. I think I need to edit the content in my current rule content:"|37 e1 a4|"; I can add the full rule if that can help.
|
Modern operating systems like Windows 10 isolate memory addresses for processes so how is it possible that Cheat Engine can get these addressed and change their values?
At this forum it has already been asked: "how to get pointers to foreign address " - and the answer is: it's not possible, because OS has isolated add... |
I've created and published a .com web-application (nodejs-express in backend, react in frontend) with social-login (facebook, google, linkedin etc..). But I haven't gone out publicly to ask people to use it, just a few beta-testers.
Today I when I googled the name of the site just to see if I could find it as a search ... |
https://wjianz.wordpress.com/2014/09/03/howto-installconfigure-msmtp-and-mutt-on-ubuntu/
I got GTS CA 1O1 as the common name instead of Google Internet Authority G2. What is the difference between the two.
So GTS CA 1O1 refers to the one listed here https://pki.goog/?
I see GTS CA 1O1 valid until Dec 15, 2021. So by De... |
I was trying to initiate a Western Union transaction from my bank account, but toward the end of the process I was prompted by this request, which is to type in my bank's login information.
The request evidently comes through PayWithMyBank, which I guess is what Western Union uses to process bank transfers.
I can't im... |
If I want to access the Galaxy Store on a Samsung Galaxy phone I have to agree to a set of terms (Legal information). These terms are excerpted below:
All content made available to you by the Samsung Galaxy Store is subject to the terms and conditions set forth below...
In order to provide you with and further improv... |
Lets say you are designing a new API. The consumer of your API is a mobile app that periodically sends requests in the background, but you expect other consumers as well, such as web apps or servers.
Now lets consider two schemes:
In scheme number one, you create a login endpoint that accepts your username and password... |
I am asked about my opinion in a case as follows:
Someone visited a (totally legal, in fact US government) website A and identified themselves. At a very different point in time they - allegedly - visited a (doubtlessly very) illegal website B.
US law enforcement claims there is no doubt that the access to B was by the... |
I have seen multiple mobile applications that are pinning Global Root CA's instead of intermediate/leaf certificates. Doesn't this expose to the same risk as not having certificate pinning at all?
Considering the classic coffee shop attack scenario where the owner of the network has a certificate issued for his domain ... |
So what kind of discomfort will you have to deal with?
Will it break websites?
Or is it just a win for privacy?
You can disable the Referer headers in Firefox like this:
Open Firefox and type “about:config” in the address bar and press “Enter“.
If prompted with a warning, select “I accept the risk!“
Find th... |
For instance, the MAC address is one variable that stays the same across networks, along with Hostname, Operating System, and the combination of open ports/services. Ignoring browser specific identifiers, just the max that a wireless AP would be able to log, what else is there?
|
New to file encryption. Need to use AES-GCM for file encryption, can't change the alg. Heard about the max plain text size should be 64GB with same key and IV pair. Environment is python 3 with cryptography module.
Question:
As GCM is a stream mode, to encrypt the file should I chunk the file to 128 bits and do encrypt... |
In my software both the server and the client sends unencrypted TCP keepalive messages to be able to detect the broken pipe within a reasonable time. It also uses TLS 1.3 encryption with OpenSSL 1.1.1.
Are there any security concerns about this?
For example: Man-in-the-middle attacker disrupt the communication. To spoo... |
I have been trying to use Volatility 2.6 to analyze memory dumps generated by DumpIt. I am experiencing an issue analyzing the memory dumps (all 4 GB in size) of two Windows 10 64 bit boxes (build numbers 18362.1 and 18362.476) and a Windows Server 2016 64 bit box (build number 14393). When running the below command to... |
While trying (and failing) to convice a certain older person who wanted me to "fix" their ~20 years old PC that they should not be connecting to the Internet with whatever version of Windows they have installed (they couldn't tell me) and they should rather buy a new PC I resorted to arguments of this sort:
The develo... |
This is an issue I'm recurringly facing: older people from my family (or people who my family members know) can be surprisingly reluctant to apply most basic security measures when they're using their PCs. The particular issues vary, but this time I'm struggling with a really egregious one: the refusal to upgrade from ... |
I have read this: Can I detect a MITM attack? My question is very simple, since a MITM attacker consumes double number of packets, is possible to identify him, isn't it?
|
Is there any risk associated with having lots of websites in your SAN list? For instance:
Or is this common among website hosts, and possibly safe?
|
I've spent more than 10 days trying to understand the Authorization Code Flow for a web application where I'm supposed to implement OpenID Connect for a single sign on. It feels that there is a lot of conflicting information out there and I still haven't gotten a clear picture of everything.
In many places people ment... |
It is a fact that antivirus software can't detect all the spyware/viruses/malware that exist. And when they get detected, new ones are created.
An example is the pegasus spyware for ios created by the NSO group. There is also an android version available. And there are many spyware for windows computers which claim to ... |
I am in preparation of developing an Incident Response Plan for a computer that has been hacked (no malware installed, just a system hack). My plan is to analyse through Windows Event Viewer to try and detect some unusual behaviour to the machine.
However, if a hacker has changed the contents of the log file or change... |
It is common to be wary of links and attachments in emails but I have heard some people say that opening the emails themselves can be risky. Are vulnerabilities that can be exploited simply by opening an email common? Have there been any recent examples?
|
By looking at https://letsencrypt.org/how-it-works/, I got the feeling that a man-in-the-middle attack might be possible in the 'Domain Validation' phase.
During that phase, the admin is asked to e.g. perform the challenge of putting a file on the webserver and sending a signed nonce to the CA.
What if a man-in-the-m... |
I recently read that whatsapp has fallen again to buffer overflow attacks.
But I wonder, why canary protection isn't used. I guess that for some reason, Facebook, and other code companies don't use it globally for a reason or it doesn't protect some of the buffer overflow attacks, if so why or how?
|
As Google mentions itself in the documentation,
the HTTP functions in Cloud Functions have no authentication and are not secure. HTTP functions are unprotected and will respond to any HTTP request, which means anybody on the internet could start and stop your Compute Engine instances.
What is the real use of such HT... |
How can I secure elasticsearch for production use in Docker?
I use this docker-compose.yml:
version: '2'
services:
elasticsearch:
image: docker.elastic.co/elasticsearch/elasticsearch:5.6.16
container_name: elasticsearch
restart: unless-stopped
environment:
- "network.host=0.0.0.0"
- "http.port=9200"
- "cluster.name=ela... |
One form of social engineering is the practice of running up to a building's external door just as an employee is entering. The employee often holds the door open for the intruder, bypassing security systems (RFID systems, for example).
Is there a name for this specific practice?
|
A recruiter directly e-mailed me about a job offer and pretended to have found the e-mail address via my GitHub account. Normally I receive e-mails via LinkedIn and almost never directly, as I try my best to avoid exposing my personal e-mail.
While I doubt her claim I also know that when GDPR hit the world the few recr... |
In HTML when we describe a certain field as a password field is it somehow secured against sending out the data via XHR/AJAX/similar technologies?
This is relevant in case we have to deal with script injection and similar attacks.
According to this question the protection is done on the client-side and only protects ag... |
I'm having a hard time finding relevant documentation from Microsoft (or any third party, for that matter) about any registry key that may change the cost factor of cached credentials.
One can control how many logons are stored through the registry key CachedLogonsCount, but what I would like to change is the cost para... |
i have issue about SSL cerf. in small local network.
One of the computers is server with apache (xampp), there is basic website called site.test
When i created certification, all works only when im located on LOCALHOST and address is marked site.test
If i wanna connect from another computer and ping via cmd SERVER PC a... |
Either there is a security hole or I'm missing information about something.
While I was testing how Surfingkeys addon works I've noticed that it has command yf to copy form content on current web page. I though about testing it on "Sign In" and "Log In" forms on few websites to see if it would be able to retrieve typed... |
I have to set up a browser to surf the internet. I'm trying to stay safe from malware as much as possible. (I already know that there's no way to stay 100% safe.)
My idea is to use Firefox with these extensions: Adblock Plus, uBlock Origin, HTTPS Everywhere, and particularly NoScript Security Suite. I also thought abou... |
My intention is to add support in QEMU for a new machine/platform. I just started this project, so I can't say more details about it because I don't know them.
My question is related about the possible security issues that could occur. What are the main security problems about what I should take care?
|
I'm learning and thriving to be a Red Teamer. I'd like suggestions for stories and blogs to read on real Red Team/Pentest engagements (or just realistic one) such as this.
The subject can be in any area of Pentesting. I am, however, mainly looking for articles on Physical, WebApp and Infiltration.
|
A previous question of mine lead to this discussion which mentioned the subject of Document forgery.
I've seen many people (in videos) forge IDs and employee badges for such engagements so that seems fine as a test. However, if asked to present a more critical/serious document like a "Permission to Attack" slip (when c... |
I received a question as follows: Does the vendor solution need to have the ISO 27001 certification for the application itself, or just for the hosting of the platform?
In my understanding, ISO 27001 cert concerns companies/vendors and includes both solution and the hosting platform. Are they separable? In the case of ... |
It looks like Whatsapp stores encryption keys on the phone side, but I wonder if there are any details on how they do it? Do they use Android Keystore / Secure Enclave? Or something else?
The main concern is whether those storages are safe in case of rooted device.
|
I'm playing around with Kerberos SSO. As experimented so far,
When I open a web app that is configured with Kerberos, from the browser, it prompts me for the username and credential, once I enter, I'm logged into the web app.
When I do a kinit from the terminal and give my credentials, I'm signed into the KDC for the ... |
I don't know much about the SMPP protocol, but I often hear that it is not a secure protocol.
If Alice sends a SMS to Bob, can Eve view what Alice sent to him? If yes, can you give an example on how Eve can accomplish that?
|
For Authorization code grant flow, RFC says the authorization server will send back the code to the redirect_uri specified.
I believe it means the browser will recieve a URL like http://webapp/?code=xyz
Now, the code in the browser will send the code to the client app so that the client will ask, using the code, an acc... |
My understanding is that IP address spoofing would not be possible if all ISPs would be doing egress filtering. That is, each ISP would not allow any IP packet to go outside of it's network if it sees a source IP, which does not belong to the source sub-network.
But what is the modern empirical evidence of it actually ... |
I grasp a basic theoretical knowledge about SNMP. However, I saw several events from our SIEM showing that a client endpoint generated SNMP events with port 161 and concluding that this host could be a local UDP scanner or something like that.
How could this local machine trigger such SNMP logs, which I assumed that th... |
When using a proper VPN to access a remote server, the server should not be able to resolve your country of origin using your IP address because the IP provided in the request will be the one of the proxy.
Now let's talk about a desktop application able to run system commands: even if you use a proxy to hide your origi... |
I seem to have some confusion around ED25519 private keys in different implementations. Both Bouncy Castle as well as OpenSSL generate 32 byte private keys. However libSodium seems to want 64 byte private keys, as does ST's crypto library (see UM1924).
So how are these systems interoperable in regards to this?
|
I try to do a simple TCP scan on an Kubunt VM (is on VirtualBox), from two different OS.
From the Host (Mac OS system) and from a Kali Linux VM (tried VirtualBox and Parallels also).
Kali Linux (same result VirtualBox and Parallels) gives:
From Mac OS (run with root privileges, to simulate the same scan from Kali):
... |
I would like to host simple HTTP webservices and develop a web client for it (basic javascript app in the browser).
any person (even without registering) shold be able to access the webservices but only via my web client.
other web clients should not be able to achieve a meaningful interaction with the webservices
Wh... |
I followed a guide where the author connected Windows PC and iPhone to his home WiFi network. He installed mitmproxy and ran mitmweb.exe on PC. On iPhone he went to wifi settings and set a manual proxy setting to the local IP of the PC and he set for port the default port where mitmproxy listens at, which is 8080.
I fo... |
In HTTP Parameter Pollution, I know theory how it work; you inject multiple HTTP parameters with the same name to trigger bugs in the server, but I can't understand how one can exploit this.
When I send some request using this technique and for example I know that the server is using last occurrence of parameter, how t... |
I'm reading a sans paper on IOCs (indicators of compromise) in malware forensics and I came across this interesting obstacle:
polymorphic and metamorphic codes (Paxson, 2011) result in multiple
hash identities for the same class of malware
Now I understand the existence of IOCs and the frameworks (such as OpenIOC) pu... |
I have a project with very critical information from business clients. I will buy a new laptop for this to manage/handle/analyze that information.
All I need is:
WAMP to run php script only on localhost
Notepad++ or other IDE
Chrome browser to access gmail, google drive, amazon aws etc.
Winscp to connect with exter... |
Let's say you have a Java app which has a query which can unlock/reset passwords for users like:
ALTER USER " + iD_Of_User.toUpperCase() + " IDENTIFIED BY " + password_Of_User + " ACCOUNT UNLOCK
Where iD_Of_User and password_Of_User definitely come in directly from an HTTP request.
This is a pretty textbook SQL inject... |
I registered mydomain.net (with Google domain registration server). In the DNS settings on the google control panel, I say that mail.mydomain.net should go to the email cloud app (business.zoho.com in this case, but that's probably not pertinent). I used a CNAME record to do this in the Google domain DNS panel.
mail CN... |
Ubuntu 18.04
Apache/2.4.29
ModSecurity for Apache/2.9.2 (http://www.modsecurity.org/); OWASP_CRS/3.0.0
modsecurity-crs 3.0.2-1
This is a new server. The following message appears in modsec_audit.log in every entry:
--c2d2e910-H--
Message: Warning. Operator EQ matched 0 at TX. [file
"/usr/share/modsecurity-crs/rules/R... |
I realized my system Ubuntu and windows dual boot might have been compromised. So, I installed OSSEC HIDS to try to look for issues.
When I ran dmesg, i found the following trace:
------------[ cut here ]------------
[ 31.461050] Could not determine valid watermarks for inherited state
[ 31.461117] WARNING: CPU: 3... |
Let's say that some malicious person extracts my hard disk (HDD or SSD) from my laptop, while it is in sleep mode. Is there a way to check for that event?
I am mostly interested for Ubuntu OS, but if there are differences between other operating systems, feel free to note.
|
Does someone know why the WMI Performance Adapter (WmiApSrv.exe) always starts when launching Chrome browser? Whats the function of this service?
I have heared this service can be maliciously used to "communicate" through the internet via open ports?
When I forcefully end this process in the taskmanager, Chrome keeps r... |
Thought experiment: You need to upload a file, and the threat model is the entire world trying to find out who you are after you do so.
I know this is absurd, but bear with me, it's a thought experiment, where the scenario is the following:
You are a normal citizen, and you have a file (assume that you just have it, an... |
I’ve been trying to understand how operating systems protect processes from each other. My understanding of Windows security is that a process can call OpenProcess() (thereby allowing read and write access to the virtual memory of another process) as long as it has seDebugPrivilege and an integrity level at least as hi... |
Would it add any additional layer of security to use another VPN client while connected to a VPN router? Or would it just be overkill and slow things down for no reason?
|
Is Server-Side Includes injection really common vulnerability? And how can I detect it - is there some way like automatic tools or some kind of fingerprint test or do I have to just play with input?
|
This morning, talking to a colleague, we were discussing the correction of assigning a CVSS to a bad configuration. Specifically, we were discussing whether using HTTP instead of HTTPS should have an associated vector.
From my point of view, a configuration is not a vulnerability, in the sense that it is not a software... |
From what I've read, I was able to deduce a number of steps but I am not sure if they cover all action or if they are 100% correct.
Initial setup for client
Enables ssh service
Initial setup for server
Installs a ssh-server, that will provide a public/private key pair, which will be the server's identity
Now it will... |
I asked a question before about how you can tell that a website is safe to visit (to prevent yourself from getting hacked) and I was told that it can not be done. A virus scan with virustotal will not be proof that a website is not malicious. It can tell you about threats but even if it says that a website is safe, it ... |
I have an external program which calls a PowerShell script with a random secret identifier as a single argument. The PowerShell script needs to return the same random secret id when it calls the REST client on the external program.
Even though the PowerShell scripts are in secured location on the server, anyone can ope... |
I am using manjaro Linux, And create a Hotspot with create_ap script
I spoof my mobile and laptop to have the same MAC address
What can I do so they can not detect I am using my mobile connected to my laptop with a Hotspot?
|
I'm trying to understand whether Wireguard's key re-exchanges are done inside of the existing encrypted tunnel, or if they are done outside of that existing encrypted tunnel.
|
A firewall is for blocking / limiting access to specific service / port.
I know that it can be useful for allowing only certain IPs to a port (for example I don't want to have SSH open for the whole world).
Imagine that I have server that is running apache2 (port 80 & 443), SSH (port 22), mysql (it is bound to localhos... |
I was going through the OpenSSL cipher algorithms list. I found these two:
des-ede-cbc
des-ede3-ofb
What does that exactly mean? What is the difference between EDE and EDE3? What are the key-size and blocksize of the algorithms?
|
I want to harden my SPF setting.
However I have trouble testing my SPF setting.
I want to be able send a test email to try out my new SPF settings.
Most of the resource on internet seems to be use a similar php script, which looks something like this:
<?php
$to = 'nobody@example.com';
$subject = 'the subject';
$me... |
I am trying to start a business online but don't want viruses from any sketchy software that I will be downloading. I will be using a VM and a VPN but was wondering if I needed any other software so my computer, network etc will not be affected. I understand not to have shared files on and all that but still don't know... |
I'm writing an antivirus in python mostly to learn and for research purposes, I do understand it would be more efficient to do this in something like C and eventually I will port this over. So far I have coded the first part of the AV that will check virus share and download the latest hashes to a file.
From here I'm ... |
In the course of my computer working I daily use dozens of username/passphrase pairs. Within the limits of my understanding and restrictions I apply the best practices for security. Unfortunately I have limitations on my abilities to employ some measures. I am often using the Internet in high-risk situations, such as o... |
My company computer is using MS Windows and I myself as a software engineer I would recommend my developer team to use OSX since it is hassle least than Linux/Unix based OS. When I propose the computer spec to IT department.
I would like the company to support us for this because my developers they are using mixed up ... |
I searched for Yubico on this NIST validated modules but found only a module from the Yubico 4 series.
(https://csrc.nist.gov/Projects/Cryptographic-Module-Validation-Program/Validated-Modules/Search)
Between Yubikey FIPS vs Yubikey HSM2, Is the HSM any more secure at the storage level than the Yubkey FIPS?
|
Does a TLS client needs to support one of the named groups (curves?) supported by the server for TLS handshake to succeed?
Longer version:
I'm running a web site using Windows Server 2016. The web site has thousands of users and provides a REST API which many users interact with from various environments. Some of them ... |
As I try to come up with company regulations for IT security, the question arose if employees can use their company provided iPhones 8 for personal matters. Specifically they want to install spotify (and probably other apps like instagram, whatsapp and so on), so they don't have to own another smartphone. I know there ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.