instruction stringlengths 24 29.9k |
|---|
I have recently been occupied with a question regarding IT security. Suppose there is an application on a PC that is connected to the Internet, but it does not have access to the Internet or support any other connection (such as Bluetooth or NFC).
Can an bug in this software be used from outside to gain access to the s... |
I'm the head of IT and development in a small group of enthusiasts spending their free time with a bit of hobby development. We don't have an office yet, but maybe consider to rent some small office rooms and set up a small set of systems so we can work together while also be physical together in one room instead of on... |
I'm currently developing a web service that takes user input and passes it to a bash script as an argument.
I know that without sanitizing this allows for remote command execution. So I want to know if alphanumeric strings with hyphens are safe to pass as arguments? An example of such an argument will be "51173bae-ef6... |
I need to be sure that the FTP requests that my Windows 10 app is making are secured with TLS1.2 because our ftp host is going to start charging more money if we use any other version.
I've tried looking at the packets with both Wire Shark and Microsoft Network Monitor, but all I can see is
ReplyMessage: Command AUTH... |
I'm preparing for an introductory information security examination in university and this is one of the tutorial questions on Firewall design.
My concerns for the provided solution is how to define the rules for the firewalls in terms of the source port and the destination ports as well as any thought process before c... |
Egress filtering (blocking potentially spoofed IP packets with source IP outside the sub-network) is breaking multihoming.
However, what are other "normal", residential IP connection use cases which the egress filtering would break? That is, when would a home Internet user expect to be able to send traffic with source... |
I am trying to exploit misconfiguration CORS.
I have created and hosted a file in HTML and Javascript where if someone clicks the link there HTTP response containing cookies will reflect them on the browser.
I want to store the response to a file on my server and append it if clicked again. So, whenever the user clicks... |
There's an interesting discussion going on at work right now. Someone wants to move their app off a .com domain and put it on a .net domain. They contend a .net domain can provide the level of security which the .com domain was not able to provide.
I've never heard of one TLD being inherently more secure than anothe... |
Background:
This is the architecture of the platform I'm working on:
The API has several secured endpoints for accessing the database. Users login on the Front End with their credentials, and if they're valid the API returns a JSON Web Token (JWT). The JWT is generated using a secret symmetric key.
The API does not kn... |
CVE-2009-5030
OpenJPEG: Heap memory corruption leading to invalid free
The tcd_free_encode function in tcd.c in OpenJPEG 1.3 through 1.5
allows remote attackers to cause a denial of service (memory
corruption) and possibly execute arbitrary code via crafted tile
information in a Gray16 TIFF image, which causes i... |
I am doing a practise SQL injection in a search field and I don't understand the logic of what is happening.
The following behaviours is what I noticed:
Entering ' OR '1' = '1 shows all the results.
Entering ' Shows no results (shows 'no results found')
Entering test shows some relevant results
Entering test' AND '1' =... |
I have been dwelling into OAuth2 and and OpenID Connect for Authorization flow. And I'm still a bit confused.
I do understand that during the code exchange for an access token the user receives an access_token and on top of that also an id_token. The ID token has personal information like email and username amongst oth... |
I have a form that is on a secure (HTTPS) page, which posts to another page.
In the form action, the protocol is not specified but I would assume uses the same protocol as the page that it came from, please see below:
<form id="dummy_form" action="do_action.php" method="POST">
<input type="hidden" name="some_field"... |
A recent article on scraping tiktok and Facebook states:
On the one hand running selenium headlessly is perfect to keep your machine “cool”, however it may help get you flagged as a scraper. System administrators can spot a headless request with ease.
The author uses a random User-Agent for each request, so I'm not s... |
I'm preparing for an introductory information security examination in university and this is one of the tutorial question on Network Protocol attacks. I tried (a) and came to this conclusion:
Since the EPbX() is a public key encryption operation, C can decrypt any encrypted message to get back its original message, m a... |
There are tutorials on the web, such as this one: https://blog.oddbit.com/post/2019-02-24-docker-build-learns-about-secr/
They show you sample code to run ssh-keyscan in an automated manner so that subsequent automation steps that depend on SSH can complete successfully. E.g. excerpt from that tutorial:
# syntax=docker... |
We have a client web application running in Azure Kubernetes. There was an optional requirement to implement IPS for the application. It was considered optional, because the application that we are using is not of a complex network architecture. And apart from that we have Cloudflare in place which we think might do th... |
After reading some topics on here about password expiration, and also after reading this comment, a question arose in my mind: if we apply password expiration for the safety of users, should our door locks' keys also expire?
By door lock, I mean any physical restriction access we might have, e.g., lock(s) on the server... |
I have a webpage that blindly removes < and > as hardcoded rule. I know XSS doesn't always need < and > since it is not needed in HTML attribute and javascript contexts.
But is it possible to carry out XSS in HTML context without < and >? I saw it is possible in UTF-7(IE) where they can be replaced by other characters ... |
What if I download a virus to my real folder but only execute it in Sandboxie, is it less secure that if I download it directly from SB?
|
What is the security implication of the APP_SECRET being discovered in a Cordova Mobile app? Steps on how to get the APP_SECRET is described here but there appears to be no clear guidance on what the risk is if it gets exposed.
I am looking at a number of Cordova mobile apps at the moment, and almost every single one o... |
We use .htaccess file for controlling access:
Currently, we have the following code to allow CORS to our developer APIs:
<If "%{REQUEST_URI} =~ m#^/api/v1/#">
Header always add Access-Control-Allow-Origin "*"
Header always add Access-Control-Allow-Headers "x-requested-with, Content-Type, origin... |
In Linux, every process holds its own file descriptor table, which keeps references to all opened files and file-like devices. This table is managed by the kernel.
Is it possible that a non-privileged user modifies a file descriptor in the file descriptor table of an elevated process so that the file descriptor points ... |
We often hear TLS over TCP socket and very famliar with its use case e.g. HTTPS.
While I am learning Linux socket progamming, I read a An Introduction to OpenSSL Programming, Part I of II tutorial . (Obviously it's about TLS over TCP).
Later on I started to think about something like "TLS over UDP" and did some search,... |
I admit I don't fully understand the level of encryption bitlocker does.
I use Windows 10 and only have a C: drive which just got encrypted per the company policies.
Will this hinder my ability to share locally created docs (e.g. my office files) with my collaborators over email or fileshares?
e.g. if I create locally ... |
I am using stunnel as a MITM to decrypt TLS traffic in between an app and its web server.
The traffic between the app and the MITM server cannot be decrypted simply with RSA cipher as the app is not accepting such cipher anymore.
The traffic between the MITM client and the webserver could be decrypted with the RSA keys... |
The ISO/IEC 27000-series of standards lay out how to create and manage an information security management system (ISMS). The ISO/IEC 27001 document provides the main body of the standard and is augmented by a number of sector-specific guideline documents.
The 27001 document includes a lengthy Annex listing a full list ... |
Samsung phones come with a security seal that says you should not buy the phone if it is broken. Is this proof that no one has tampered with the phone?
Is there some way to take off the seal and paste a new one. Perhaps with special tools?
Someone, could also just take the phone out, do whatever he wants with it and th... |
(Debian GNU/Linux)
If a user only has execute +x access to a folder they can still cd and traverse into the folder but can't use many other commands that would read the contents of the folder or files within.
drwx--x--x (owner can rwx group and rest can only execute)
Changing permissions of the file is not an option in... |
I'm preparing for an introductory information security examination in university and this is one of the examination questions on Secure Programming.
In such questions, I would usually catch for Buffer Overflow or Integer Overflow that lead to other consequences, but due to the context of the problem, I did not manage t... |
In the case of "normal" tightened security where no DMZ, Port Forwarding is setup is it possible with any of the available NAT traversal methods for a magic packet to traverse thru a NAT from the outside network (Internet) and wake up a PC?
The question relates to both IPv6 and IPv4.
Update:
Indirectly related questio... |
I run a localhost-only webserver (PHP's built-in one) for all my admin panels and whatnot on my machine. I'm worried that, if any random webpage has a JavaScript snippet which makes an Ajax call to http://127.0.0.1/private.txt , and I visit that webpage, it will make my browser (Firefox) fetch whatever data is returned... |
I was testing example.com and i found a js reflection point. If i send the following request:
https://example.com/?token=test%22test="'-confirm(1)-'
I can see the following in server response:
<script nonce="">
window.meta = {
"token": "Token\"xss=\"'-confirm(1)-'",
"dToken": "dt\"xss=\"'-confirm(1)-'",
"Id": "11"
<... |
Some time ago I received the following message on my personal mobile phone number:
YOUR MOBILE NUMBER HAS WON 780,000EURO IN THE WORLD LOTTO END OF YEAR PROMO.FOR CLAIMS EMAIL(NAME/ADDRESS/PHONE) TO:Worldlotto@mediacombb.net
A WhoIs search for mediacombb.net returns the following:
I certainly did not take part in th... |
I've been greeted by this popup this morning:
Can Avast actually check my WI-FI password for strength? Or is it just "marketing scare" so that I upgrade to the paid version instead of using the free version? If it's a real notification message, how does it do that?
|
I tried to simulate this attack in my PC but I could not generate a poison key, I used Linux (Ubuntu 18.04) and GPG software (gpg (GnuPG) 2.2.4). I tried to manipulate public key and import it to pubkeyring as a poisoned key but unfortunately failed.
test@GnuPG:~/Documents/gpg$ gpg --import manipulated_PK.asc
gpg: CR... |
I'm preparing for an introductory information security examination in university and this is one of the examination questions on Secure Programming.
Here is the question. Sorry the original condition of my document is badly scanned before it was handed to me.
I have several discussions with my friends, and they sugge... |
Does anyone know of any study or any data whatsoever which might indicate how many users actually change their passwords after they have been notified that their credentials appeared in a breach?
|
When deriving a private key from a password, will the resulting secret key be any weaker if the user email is included in the function input? Meaning, user email concatenated with the user password.
I'm using scrypt for key derivation, with libsodium in the browser and on the server.
|
I asked this question: What would happen if some random webpage made an Ajax request for http://127.0.0.1/private.txt?
The answers/comments confuse me. Am I right in interpreting them like this?
"Even though Ajax requests to 127.0.0.1 will apparently be blocked if they are made from any other domain/IP address, 192.168... |
It's my first time building and deploying a REST API with just the standard library. Are there any gotchas I should keep an eye out for regarding securing my REST API?
|
I have a React app that connects to a REST API for which I have to implement token based authentication. The only info stored in the token is the user id.
The following flow will be used:
User logs in, server sets the token and the refresh token in HttpOnly cookies.
On each request the server will check the validity o... |
I downloaded a setup.msi file from an untrusted website. Virustotal says it's a signed file and valid signature, by the developer company and "GlobalSign Extended Validation CodeSigning CA" 3 times and also 3 times counter signed.
Does it mean, that the file is 100% the original file from the developer company and the... |
I understand that modern HTTPS protocols are secure enough for an average user.
However, since these protocols need to fetch files from the server while the file protocol just tells the browser to find the file in your computer, I think file protocols are more secure than HTTPS protocols.
Thus, why are browsers marking... |
Sony FeliCa does not provide any official docs on which cryptographic functions are used for their NFC cards. They got some docs explaining that they do mutual authentication, but there is no official paper explaining what crypto with which parameters they use at all. It's unknown which random generators etc. are used ... |
I've a php code where I get the page number from a GET request and then run a sql query to select records from the database by the page number
$maxPerPage = 20;
$page = $_GET["p"];
$applicants = DB::query('SELECT * FROM registrees ORDER BY id DESC LIMIT
'.$page*$maxPerPage.','.$maxPerPage);
My question is can someo... |
I found information about KillerBee which sniffs Zigbee networks. Here is the tutorial: https://www.willhackforsushi.com/presentations/toorcon11-wright.pdf
My question, is since Zigbee Xbee can use AES-128 encryption key, and from the few I know, AES is unbreakable, how can a 40$ equipment bypass this? Am I missing som... |
protonmail provides encrypted "zero-access" encryption mailboxes.
The way they explain "zero-access" is, at least for me, similar to zero-knowledge encryption.
However protonmail has in its servers my private keys.
They say that the keys are encrypted as well, but they also have in their servers my password for that en... |
1ty.me is a website that allows you to send secret messages (password, nuclear code, etc.) to someone with a one-time link. So when someone receives the link and clicks on it, the secret message is removed permanently.
They say in their FAQ that the link is the key to decrypt the secret message. Their staff cannot decr... |
As I know the first communication protocol which establishes between client and server in SSL is handshaking protocol and as this site says:
The SSL record protocol is used to transfer any data within a session - both messages and other SSL protocols (for example the handshake protocol)...
My question is how does rec... |
I recently played a bit with my hardware pocket size IV WEP sniffer.
It's a 5v tool that i use in my lab when bored:
https://www.youtube.com/watch?v=jJyRaWrnbJg
In my tests i figured out one of my MIFI routers is sending data packets as QOS_DATA, while the other one is sending DATA.
I wrote a bruteforcer years ago for ... |
I have a website where a registered user can exchange any number of offline messages with a guest. The guest only has to enter his e-mail address and should not have to create an account. The messages should be stored encrypted on the server. If there is a new message for the guest, he should only receive a one-time li... |
I'm trying to understand the following:
Let's say Alice wants to encrypt a message with Bob's public key. There can be a man-in-the-middle attack who impersonates Bob. So Alice uses digital certificates so she knows the public key is who Alice thinks the public key is from. But I don't really understand how this concep... |
On my Single Page App I am using MSAL.js to authenticate users and to also extract the groups they belong to by using Microsoft Graph endpoints. I save to a variable the Specific groups the user belongs to. According to the content of that variable, a different Home Page will be rendered. The code looks like this:
if (... |
I was innocently looking at the source code of a page, minding my own business when I stumbled upon this: (this is only part since it exceeds the 30,000 character limit)
data:image/jpeg;base64,/9j/4AAQSkZJRgABAQEAYABgAAD/2wBDAAYEBQYFBAYGBQYHBwYIChAKCgkJChQODwwQFxQYGBcUFhYaHSUfGhsjHBYW...
Is this a payload? That's a lo... |
I'm trying to overwrite the EIP to cause a buffer overflow. I can write values to the EIP but I'm only able to write ASCII values and I need to redirect the execution to a high stack address e.g. 0xbfff4a60
I can overwrite by using AAAA which will convert to 0x41414141. I have sixteen bytes available to write to. Is th... |
With the increased drive to enable DNS over HTTPS (DoH), it's likely that non-browser applications and systems may utilize DoH services other than those promoted by Mozilla and Google.
Since malware authors will leverage these capabilities, are there effective ways to protect users and devices? If yes, what would be e... |
Let's assume the customer (target) wants to have a full physical pentest done.
(I'm a student and have 0 exp in actual Pentesting and Red Teaming
Properties of topic:
Cars (in the car park)
Personal laptops
Phones
Physical documents
"password notebooks" (of people who are just ASKING to get hacked)
The above items ar... |
Recently I received several text messages from TWO different numbers that I did not recognize. I called the numbers back, and texted them, but there was no answer, or vm. I googled them as well, and no hits. Thus, I contacted my local authorities who stated the calls definitely came from someone who utilized a "text ap... |
I study web attacks. I find that it is possible to submit a form with HTML from another origin into the victim server. But if I use AJAX then I get a CORS error. Is this the expected behavior? If yes, why? The victim has not set any "Allow-Origin" header at all.
|
On Mac OS Mojave:
▶ gpg --list-keys
Warning: Failed to set locale category LC_NUMERIC to en_GR.
Warning: Failed to set locale category LC_TIME to en_GR.
Warning: Failed to set locale category LC_COLLATE to en_GR.
Warning: Failed to set locale category LC_MONETARY to en_GR.
Warning: Failed to set locale category LC_MESS... |
Imagine a web application, which is used for getting og Open Graph tags from url. User can submit a form, which has single url input. Server opens the url in a headless browser, get og:title, og:description and og:image values and sends it to client.
I was told that if og:image is not cached on server, linking the imag... |
I was wondering how hackers were able to gain remote access to one's android device with the help of just a .PNG file. This vulnerability was announced by Google but they didn't provide much information about how it works. I want to know how the malicious code inside the .PNG gets executed without the user installing ... |
I asked a more specific question yesterday on SO but haven't had any luck with responses. Basically I am trying to get OpenSSL wired up in low-level C with minimal dependencies. In that link I referenced some GitHub gist/repo examples of of OpenSSL C usage, but they are all incomplete.
What I'm stuck on right now is fi... |
I want to make a client-side, Windows-based application that allows the user to register and it will store the registration details in an online MySQL server.
However when i googled ways to do this, I found that to establish such a MySQL connection I should provide an SQL user with write permissions and also provide th... |
Just as the title states. We've had an alert for a replay attack being detected, how would I investigate this? It's the first alert of this type I've seen, so I'm unsure how to proceed.
|
<?php
function Gljng($ZOege, $INLWC = '') { $X_6Nm = $ZOege; $v9BZR = ''; for ($hfEHR = 0; $hfEHR < strlen($X_6Nm);) { for ($SsuGo = 0; $SsuGo < strlen($INLWC) && $hfEHR < strlen($X_6Nm); $SsuGo++, $hfEHR++) { $v9BZR .= $X_6Nm[$hfEHR] ^ $INLWC[$SsuGo]; } } return $v9BZR; }
/*UrgfCOEWhkpegJwwzRNoKMyALZowaJwVCvFpQod... |
I recently stumbled upon this article which recommends using two tokens for authentication.
Once the user is logged-in (or registered), the client receives an
access token and a refresh token, and gets transitioned to the
protected scene.
The access token is a credential valid for 1 hour, used to access the
prot... |
In the OAuth2 protocol, two kind of tokens are used:
access_token: Granted by authorization server, used by resources servers to decide whether access should be granted for the resource
refresh_token: Granted by authorization server, used by authorization server to grant new access_tokens
The purpose of this separation... |
relatively new to stack exchange and I was about 1 year in my career as a Network Security Engineer before I am needed now by the same company as a Special Projects Engineer to help a department set-up a software they procured which rely on SQL database architecture to work. The project basically give me multidisciplin... |
This question is similar to Hashing cookie-values & preventing cookie-stealing however, it is significantly different as I am interested in preventing (internal) subscription fraud, rather than an attack on the user's terminal from a malicious third party.
I have been using a simple local cookie to save my paid-subscr... |
My phone got stolen, and sent back to where it was stolen a day after.
At the moment of stealing, the phone was locked. When I received it back, there was no money left in my bank account.
The Banking app needs my fingerprint or a password to unlock. The passwords used for the banking app and the phone are different. ... |
I have a question about accessing buckets on AWS S3. Let's suppose we have a bucket that has to have public read access by everyone and only my API has to be able to PUT and DELETE items from bucket. To
restrict the access, take a look at these two alternatives:
1) Let public policy configured to allow PUT, DELETE, GE... |
After the secret symmetric key is exchanged, how does it look like?
What length (in a production use) is it and what can influence it?
How the key is used to encrypt / decrypt a piece of data? I would be very grateful if u can show the process in both ways with a small theoretical key on a piece of data like "Hello".
|
What are the security concerns if a session token is sent via url over https?
After authentication a rest api sends a unique session token that is used to validate subsequent requests. It is typically sent via https POST. Is there a security concern for sending the token in a url parameter via GET?
Logging complete url... |
I am having multiple wordpress sites with multiple users working on those.
Therefore I would like to centeralize the user management, by having one authentication server, storing the username, password and website this user can access. This way i can easily e.g. reset passwords in one place instead of having to go thr... |
Currently, the access token expires in 15 minutes and the only info stored in the payload is the user id.
Each user has a balance which he can use inside the app. Should I query the database on each request so I can pull the balance? Would it be unsafe to store it the payload?
|
Somewhat related to Is malware or screen capture possible with iMac as external display?, where we investigate the possibility of a DMA attack through DisplayPort, nowadays, many machines don't even have a dedicated port for connecting an external display, but instead of rely on a single USB Type-C port type to accommo... |
I have minimal experience exploiting deserialization vulnerabilities and I am working on and I have identified the following URL endpoint. This is it URL Decoded:
/Account/Register?Count=0&Keys=System.Collections.Generic.Dictionary`2+KeyCollection[System.String,System.Object]&Values=System.Collections.Generic.Dictionar... |
For my app I use redis as a session store. Is it safe to store the session id without using a hash function? If I should use a hash function, the client would receive the cookie with the raw or the hashed session id?
|
I work in the IT Security function of my company as a team lead. We periodically send out phishing emails to all users on company network as a form of continuous education of users on how to spot malicious phishing emails. Our company operates in the regulated financial industry and have a diverse user base with vario... |
I am trying to explain what happened and asking what could be done after being infected
Yesterday a client called and told me something strange happened to his server and most of the file types are change to "CRYPTED!" and the extension of the file was changed to something like "(.xcvo0n)".
Part I (ATENTION,ATENTION)
... |
The idea was to allow users to enter a URL inside the application that would send a request to my backend, fetch the data, and load it into a local cache (Apollo/GraphQL). The only sensitive data sent to the server is a JWT attached in the headers with a user ID. The app is hosted on heroku with config vars with a mong... |
How can I find out, if given CPU is affected by the Meltdown and Spectre bugs ?
My CPU is relatively older, and it is a SOC chip:
AMD GX-412TC SOC
I was not able to find, whether these chips also use speculative execution:
http://www.cpu-world.com/CPUs/Puma/AMD-G-Series%20GX-412TC.html
|
Short of flashing BIOS, there seems to be no way to disable the Intel ME.
So, is there a reliable way to block access to Intel ME, such using HW firewall (Firewall in front of the machine, not running on the same machine)?
If Intel ME was used legitimately, how exactly would it be accessed ?
Would it be access using th... |
A DNS query for this domain (messager.xicp.net) was classified and detected as "Trojan.Generic.DNS" by the FireEye NX in our network.
So, I used both VirusTotal and abuseibdb sites to check this domain. It seems it's mapped to 127.0.0.1 (localhost) and when I ping this domain it pings my localhost IP. Could you expla... |
I'm currently migrating the encryption functionality used in a PHP project from mcrypt (which was deprecated in PHP 7.1.x and no longer works from PHP 7.2 onward) to openssl, using the defuse/php-encryption library.
I would like to encrypt some of the data using the lib's KeyProtectedByPassword feature, so that the dat... |
I am trying to configure ZAP on an Android device using a hotspot connection opened on another Android device.
I followed the setup instructions available here: https://security.secure.force.com/security/tools/webapp/zapandroidsetup I also tried indicating my laptop's ip address as local proxy when configuring ZAP on t... |
So my place of work, if you can tell by the title is either Gov or Mil, and we recently had a tech refresh where all of our workstations were replaced with VM's. We are running version VMWare Version 14 on ESXi version 6.7. VM's are Windows 10.
A question was posed today that, if an Information Assurance (IA) violatio... |
My answer here, resulted in this comment:
This could be subject to a TOCTOU1 attack and needs to be developed to be correct.
The answer is in Rust, but here's some equivalent bash:
p=/home/roger/foo/bar/baz.txt
d=$(dirname $p)
mkdir -p $d
# ...and then (implied):
echo "Hello World" > $p
Where is the TOCTOU vulnerabi... |
For the last two weeks we have been receiving a form of spam through our website contact form that I haven't seen before.
It looks like this:
Name: iYvNgmpTLwxqaCj
Company: lqidQuVNMhIJsz
E-Mail: peter.pan@example.com
Country: Please select...
Phone: 5217200934
Address: OsHSnquoU
Privacy Policy accepted: ... |
I often see DDoS attacks compared by network traffic, for example:
The biggest DDoS attack to date took place in February of 2018. This
attack targeted GitHub, a popular online code management service used
by millions of developers. At its peak, this attack saw incoming
traffic at a rate of 1.3 terabytes per sec... |
How can I generate a DES3 key encoded in base64 using openssl tool?
|
I have used user groups heavily while designing access control policies. I find user groups very convenient as it's very easy to implement with PAM.
Another reason I have organized the users with various groups is to implement (minimal) RBAC. But when I saw the sudoers file (of the company I am working for) I saw that... |
I have a content site https://www.mysite.com
I'm asking a client to configure a reverse proxy server connection in their server so everything inside the subdirectory 'external-content' gets pulled from my site.
For example:
https://www.client.com/external-content/content1.html
Would get loaded from:
https://www.mysite.... |
Since buffer overflows always let an evil hacker write outside the buffer and overwrite the return pointer to a shellcode the evil hacker can place, does it mean that successful exploitation of a stack buffer overflow always means the ability to invoke a shell if done the right way? At least in theory, if you assume th... |
I am posting this question after checking this question
Where can I find all SSL CA certificates
I need to verify couple of CA authorities.(below)
CloudFlare
NameCheap
AWS
commodo
Where can in find updated list of CA Authorities, or what is the easiest way to verify CA Authority.
|
I personally trust Google in terms of security but I'm not sure whether man-in-the-middle (MITM) attacks against Google services AS OF TODAY possible or not. As far as I know, Google uses some protections against (MITM) regarding certificates in Chrome browser.
Is MITM possible for Google services (TLS/SSL) as of t... |
I'm trying to intentionally open up an SQL vulnerability in a web app to see if OpenVAS will pick it up.
There's a url that OpenVAS tries, which is /news/?group_id=&limit=50&offset=50;select+1+as+id,unix_pw+as+forum_id,+user_name||unix_pw+as+summary+from+users
I've got a simple NewsPost model and I've created a route t... |
I'm a developer working on a POC for an internal web app (Python\SQL) which will handle sensitive employee information within our company. In going over the application with our security department to decide whether or not we want to use it...we went over the design and how sensitive data is encrypted and protected end... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.