instruction stringlengths 24 29.9k |
|---|
The business is located in the US. But:
Has European customers who put a transaction via a custom-built
shopping cart Sells via tradeshow in Europe or Asia in person Could
Customers send credit cards via phone
Question: is the business supposed to be both PCI and SCA compliant (Europe)
|
I wanted to know if there was any other way to detect the OS of a network (other than nmap) since nmap doesn't detect most versions of Windows 10 at all and identifies them as a different OS altogether or as a different version of Windows.
How can I reliably detect Windows 10 on the network?
|
Is there a way to decrypt passwords from Chrome Login Data file?
My goal is learning about the backend process of this decryption, so I don't want to use any pre-built applications.
|
I have this application that has an input box where the data is going to be sent in a JSON format. The JSON payload might look like this
{“message”: “hello\nmy name is andi”}
But the problem is the \n is blocked by my WAF and so apparently the data is not being passed into the backend. I’ve tried encoding it into %0A ... |
Let's say i have a scenario when the user salt is required in client side before login,
the user obtains the salt by this url http://my-api.example/get-salt/userid
that url should return a salt for any user without login or authorization, should this be a problem or cause some security risks ?
Note: that each user has ... |
I have a headless device that is connected to a router with a VPN connection. Not al the devices connected to the router go through the VPN connection, since I have set rules on the router to tell it which devices want to be routed to the VPN. Specifically this device and a guest network are the only ones that are rout... |
I have an input field in a web that is being saved. This field can be shown in other systems that I do not have control over and that's why I would like to limit what is allowed in this field, although I would like to allow some common special characters for user convenience.
This is what I came up with (I will whiteli... |
My router has been hacked and all devices have had some sort of spyware installed (Don't ask me how I know this, just please take my word for it).
Since they can see everything I do on my devices, they can also see what I change my router password to every time. When I disconnect from wifi and use data they still have... |
I want to set up a MITM-scenario as an exercise for myself. My setup looks like this:
Internet <--------> Laptop <----------> Client
At this stage I just want to route the traffic from my AP to the internet, without monitoring it.
I use an Alfa-Network-Card in monitor-mode to create an AP with no encryption:
sudo air... |
sudo is sometimes used to give untrusted or "semi-trusted" users the ability to perform certain tasks as root, while not giving them unlimited root access. This is usually done via an entry into /etc/sudoers, specifying which programs can be executed.
However, some programs may provide more (no pun intended) functional... |
My MAC address has been spoofed by a neighbor to access my WiFi, positively. I know it's futile changing the WPA key or not broadcasting the SSID.
What are my options at this point ?
|
What are the security risks of basic authorization in SOAP requests?
I know that the username and password are concatenated and sent in Base64 in an HTTP header on every subsequent request, but it is still popular in SOAP WS.
|
Scenario:
a person owns and used only a laptop (or PC) and on its hard drive is stored sensitive information, in addition, in browsers the logged-in sessions to gmail, facebook, server, etc...etc..
Existing secutiry:
Hard-drive is password protected (set from BIOS, thus pwd is asked on PC boot, before boot to Window... |
I've decided to designate a separate topic to this question ( even though I've mentioned this in topic: Best practice to secure hard-drive of computer(laptop) in case of Stealing ^ Loss ^ Unauthorized access? ), so this question is not duplicate.
If I have password-protected hard-drive (so, password is asked on boot), ... |
First I don't want to promote any kind of pirated software here, just don't know where and how to ask this question.
I find out crackers share games released on GOG (which are DRM free), it's interesting that executables are officially signed, so it's perfectly original software, except it's not bought by those who dow... |
I don't want the password to be sent in clear text over the internet, even when using HTTPS the server admin can read the password if they somehow cache or log post requests.
Now, what I have come up with is the following.
First, generate a "salt" from the user email and extend it with padding like this:
var email = "... |
How secure is a 4 digit numbers only captcha?
How many tries will take to be able to bruteforce that captcha?
|
Is it possible to encrypt data server side and then decrypt it client side; without the client having the ability to encrypt the data themselves after decrypting?
I'm working on a license manager which needs to be able to read the contents of the encrypted file, but ideally we don't want the client to have the ability ... |
This is kinda similar to this question, How can you hide / fake your ip address without proxy / vpn?, but this was about particular tools and their effectiveness. What I'm wondering is how someone would configure their internet connection, programmatically, to mask their location as effectively as Tor and VPNs?
|
I want to force all users to use only ed25519 type keys when logging in via SSH / SFTP to a Linux server which is running a recent version* of OpenSSH.
Some general reasons for putting controls on SSH keys might include:
In many cases, SSH keys have been completely overlooked in identity and access management planning... |
We have a homework assignment to encrypt the famous Tux.ppm using AES with ECB and CBC mode. We have to show and outline how insecure the ECB mode is...
So is there any way to ignore this warning?
*** WARNING : deprecated key derivation used.
Using -iter or -pbkdf2 would be better.
|
What is TSA policy OID? Is it a unique identifier of a timestamp server given by a world wide authority? Does that mean that no two servers can have the same oid? Or is it an identifier of the characteristics of the service the server provides? In this context, can a TSA server have more than one OID? I have seen that ... |
WhatSender sends Bulk Whatsapp Messages directly from PC using whatsapp web.
How it works
Can this tool actually access messages and images from other chats?
|
I'm curious to how attackers gain access to valid EV certificates that bypass windows smart screen (for malware delivery/execution) or how they sign these malicious software(s) without access to EV certs. I'm aware of methods to use droppers to utilize windows scripting.
What services actually work?
|
I have made a script that can be used for exploiting CORS misconfiguration.
The script works fine but if I want to send an extra header to the request by
xhttp.setRequestHeader("test_header", "test_value")
It first sends the pre-flight(OPTIONS) request that contains
Access-Control-Request-Headers: header_name
which the... |
I assume OAuth protocol being something like this:
user registers to Gitlab using Facebook (for example)
Facebook asks if user accepts sharing profile info with Gitlab
user accepts
Gitlab receives user profile
user asks Gitlab for a private resource
?? HOW GITLAB KNOWS IT STILL CAN TRUST THE USER ??
Gitlab sends priva... |
How does the stdapi commands 'webcam_snap' and 'webcam_stream' in meterpreter session bypass webcam restrictions/privacy settings on windows? I want to know how one could replicate this for prevention and analysis or just how it works in general.
|
Imagine that we have an x509 cert (if it matters, in .pem format) and a key supposed to certified with it.
How can I validate, that the cert certifies exactly that key?
My impression is that it is enough to examine that the cert and the key have the same pub key. I think it is because this is the only shared informatio... |
Webauthn supports authentication or multi factor authentication with either hardware keys or authentication features that are built into the device used (Windows Hello, Android with a Fingerprint, ...).
Given the case that a user registered with a device bound key that can't be used to access the account on a different... |
I am currently working on a research project where I analyze exploits in different virtualized environments. As an example I picked ProFTPd v1.3.3c which has a remote code execution vulnerability.
I did setup two environments:
A VirtualBox machine with Ubuntu which has the vulnerable ProFTPd version installed
A docke... |
When stealing a WPA2 hash from a packet, why do you need to use brute force to find out the original password instead of just sending the router the hash itself and connect with it to the router?
|
I am learning about "Session fixation" and have read the corresponding OWASP page.
In their Example 2 in the above page, they describe an attack via JavaScript, that is embedded in the URL like:
http://website.kom/<script>document.cookie=”sessionid=abcd”;</script>
I tried this with an embedded <script>alert("XSS!!");<... |
Background: I think I understand how the state parameter is used in oAuth to prevent CSFR attacks against the redirect_uri.
Situation: I am looking at this in the context of implementing a Shopify App and am having problems to see how the recommended state check on the client is adding to security in that case.
In Shop... |
Situation
I am the responsible developer for an ASP.NET application that uses the "Membership" (username and password) authentication scheme. I am presented with the following report from a WebInspect scan:
WebInspect has found a session fixation vulnerability on the site. Session fixation allows an attacker to impers... |
Let's suppose i work in a small office and i can't use my workstation to navigate in Facebook because the external firewall forbids it. But i still can use a VPN to bypass the firewall.
I read that that it's possible to integrate VPN with the firewall, in this case could the security administrator set the external fir... |
Passwords are not stored in plain text. So we hash them. But for hashing we need a key if we use a keyed hash function. In unix system passwords were stored in etc\password file but now the location has changed. Where the keys for the hash functions are stored and does the password management tool handles the key sto... |
Suppose I have a database containing hashes. Hashes are obtained from password developed from randomly chosen set of 94 characters such that each password size is of 8 characters. So we have 94^8 passwords. Each of the passwords are converted into hashes i.e 94^8 hashes and stored in the database.
Now the attacker ge... |
So I found a file uploader on example.com. The file uploader accepts every file extension and the file is uploaded inside the directory
/temp/random-numeric-id.php
I tried to upload a php file and it got uploaded, however when I access that file, the content of the file is read as html comment. For example, I uploaded ... |
I have just recently downloaded kali linux onto my VM software and i was doing apt-get upgrade in terminal and some files got blocked by my kts and i was wondering whether it was a false positive as what its trying to download is tools for code injections, do i allow the files to download or should i listen to kaspersk... |
Appreciate any help on the following.
Built OpenSSL Fips Module and then 'static binaries' of FIPS capable OSSL which 'statically link to the windows run-time'.
Thus, my application binary (FipsApp.exe) does not depend on OSSL DLLs.
Consumed these static binaries namely (libeaycompat32.lib, libeayfips32.lib and ssleay... |
I got a confirmation code without trying to log in which is what prompted me to investigate this. The account is just a Ubisoft account with 1 free game on it; I somehow doubt there would be motivation to employ sophisticated hacker techniques.
I know about Tor services and VPN, but I don't think those would spoof my ... |
I have read that router firmware is supposed to be patched. How do I verify that the firmware update is indeed a unmodified version of the firmware?
I know about signature checking, but how would I do this in regards to my router?
|
We use the Windows 10 file/folder sharing feature to share files between two computers (A and B) that are on the same wifi network. In this network there are several infected computers (computers C).
Computer A and B are on Windows 10 and up to date and Windows firewall is on. Some computers infected are on Windows 7.... |
Using inspect element, I can edit a link opens a popup in edge with the text "1". Is it a possible XSS attack?
|
I have found that the web application uses a weak algorithm to generate CSRF token. The CSRF token is sent in a request header:
X-CSRF-TOKEN: "token-string"
Since the request header is being used, how to do a CSRF attack to perform a sensitive action in real time?
Custom headers can be sent using JS but it's blocked... |
Currently, I'm working in a Fintech StartUp. We have already implemented our payment solution with redirect in a checkout page hosted in our domain (like https://stripe.com/docs/payments/checkout).
Now, we are going to implement a solution that allow payments directly in the merchants page, but in order to maintain PCI... |
I am testing an Android application I am creating for learning purposes (I am using a pre-existing skeleton code my friend gave me). The application uses firebase and stores the JWT token in an xml file in shared_prefs. I am testing this app on a rooted device, so it occurs to me a malicious app could gain access to th... |
I created an ssh key with the command ssh-keygen -t rsa -b 4096 -C "myname@myemail.com".
I put a passphrase.
It created two files : id_rsa and id_rsa.pub .
I am surprised because, when I do less id_rsa , I can read the key without there being a request for my passphrase. There is no word "encrypted" in the text.
I thou... |
We're setting up some new tunnels and have been told to use IKEv2. I understand that IKEv2 allows different authentication methods, e.g. one side using PSK and the other using a certificate. We don't have a PKI so it'll have to be PSK for now.
I can see it's possible to use the same PSK (like IKEv1) or different PSKs ... |
I run my Spring Boot (Java) application in the Kubernetes environment as a root user and with JMX authentication turned on.
My k8s containers are being flagged as a security risk by the security professionals in my company. Is it really a security risk or just plain old housekeeping?
Will it make a difference if the JM... |
I'm thinking to build a VPN for personal use on a VPS but am unable to understand one thing. How exactly VPN providers encrypt data from client to their server? Suppose if I simply configure IP of my VPS and port in my browser it would be simple proxy it won't encrypt traffic that originates from my machine or browser.... |
Can my work computer sniff the websites that my parents personal computer go through? I know this would be very unethical for the company to do so but I never realized this is POTENTIALLY possible when my parents brought it up when they saw me working from home.
|
I'm trying to understand how using a crypto co-processor chip can securely decrypt a disk without someone getting the decryption key by sniffing the bus it communicates on or loading the disk onto another computer and viewing the contents that way. Specifically, I'm trying to figure out how this works when someone has ... |
The premise of end-to-end encryption (E2EE) is that the client is secure and trustworthy, your end devices is secure and trustworthy, but the network and server need not be trusted. You've read all the code in the client, or someone you trust has done so for you. But after loading the code onto your phone -- installing... |
I was wondering about how compilers like GCC compile themselves after each release but that got me thinking:
Are compilers safe?
Correct me if I'm wrong, but even if at one step along the way a version of the compiler was compiled with a piece of malicious code put inside, wouldn't any release after that be infected a... |
I am using a public WIFI network before work how do i keep my devices secure on this network?
I am looking to prevent a attacker using a packet sniffer to grab my data and i am looking to prevent malware from infecting my devices.
Note: I am not asking only how to secure my data during transmission i am also asking ho... |
I use duplicity on a few Ubuntu servers to encrypt backups and send them to a backup server, which then sends another copy to rsync.net, and then, once a week, give it or take, I download these backups to a local server.
The problem I have with this is that to send these encrypted archives to the backup server, each se... |
I noticed that the string ICAgICAgICAgICAgICAg, in various repeating lengths, appears fairly often in public key certificates and ciphertexts.
What does this mean? Is it some kind of padding? Is it a quirk of the encryption?
|
Can someone perform DDoS on my VPS even if I have not installed any webserver software like apache, nginx, etc.? Since I have not installed any webserver software, it's not really available to the public. Am I right? It can only be accessed via SSH.
|
I have recently lost a USB flash drive that contained some important information. Fortunately, it was protected by Bitlocker. I felt the impulse to ask exactly how secure it is.
Most answers on this site related to Bitlocker seem to be about built-in storage on a computer. This answer says there was a possible cold bo... |
I'm building a website and am trying to figure out a way to encrypt the user's email addresses. It would be nice if, in case my database was stolen, the emails of my users weren't in plain text. I figured the user needs the email to login obviously, so if I encrypt it with their password as the key, or even the email i... |
I want to play a very popular game made for mobile platform, but, my father doesn't allow me to touch any smartphone.
I tried bluestacks to play it on my pc. But, while installing the game, its privacy policy says that it might collect some personal data. So, I decided to use a virtual machine over which I would use an... |
Say I were to upload a Wireshark trace to a website that was publicly available. Say, with it, the SSL key log, certificate information, etc were available. If someone had the link to the trace, what dangers would there be?
Obviously, the content and information of the given trace session is visible to everyone, what... |
I have a process that loads into memory like any other process. It contains a special key. Our goal is to read this key inside memory...or while it is in transit across the data bus from cpu. The catch is that our solution has to be stealthy and undetected by the kernel, so no DMA, drivers or anything that invokes trad... |
Is there any reason why PHP files would require write access? (Excluding directories that need to be writable)
I'm installing Magento via composer. They recommend the following permissions:
cd /var/www/html/<magento install directory>
find var generated vendor pub/static pub/media app/etc -type f -exec chmod g+w {} +
f... |
How to determine what type encryption or hashing is used for the following or 6760bb6a0b7468ac3549670e86450c07f424b3b021b983e820eb701b481d5f75 and how to decode it?
|
I know that even a software signed with a new code signing certificate triggers Microsoft Defender SmartScreen warning:
Windows Defender SmartScreen prevented an unrecognized app from starting
The warning goes away only after the certificate builds a reputation:
Smart-Screen filter still complains, despite I signed t... |
I am doing a hypothetical web just for learn some security tips and the first problem I've found is the login, I've read like 40 articles, a lot of questions here on stackoverflow and I still don't know which method is the best one (this is a non-real case, so we can assume we need a very high security)
most webs I've ... |
I work locally with a WordPress site. When I logged in, it looked like the password was highlighted. It went very fast. Half a second maybe. I found it strange that it looked like it was marked, as in the image below.
The reason I am a bit vigilant is that I have a another site with a special login URL that only the ow... |
In the backend I am currently working on I have a servlet (call it S) and a WebSocket endpoint (call it E). S needs to communicate with E, yet, as of now, any WebSocket client may connect to E.
My question is: how should I name the URI of E and how can I enforce that only S is allowed to communicate with E (if that is... |
I am presented with the following scenario:
I have a MySQL-Database with a table of users. The table has two fields: username and password. The password is stored as an unsalted hash.
An over 15 year old application uses this database to authenticate access to its services. It is only accessible internally.
Our team is... |
Can you have Anti Virus and Anti Malware layer sitting deep with the microservice layer and have the malicious file flow through all the services ? Argument being the file is in memory and not getting processed until the service we will put the Anti Virus and Anti Malware layer on.
Shouldn't this be stopped at the rout... |
I am quite familiar with most of the common undergrad/grad security foundations; but I couldn't find anything related to this scenario:
A scheme/system where a piece of data can only be 'decrypted' AND read only once (potentially in a computer program).
Is it even possible? I have heard such things are there in the '... |
Some friends and I want to play FarCry version 1.40 on PC over the internet on our own private server but we have some security concerns. Since the game was released 15 years ago and we'll be running it on Windows XP Pro Version 2002 Service Pack 3, we are likely to have our server and operating systems hacked, correct... |
Recently I accessed my credit card account (with a well-known credit card company) and right on the web page received a message that my account is locked to "prevent some sort of fraud".
I called customer service and was instructed to process certain steps in order to unlock the account. A text message was sent to my p... |
This morning I discovered that the WPA-Personal passphrase of my residential ISP–provided wireless router had been truncated to the first 3 characters. Everything else in its configuration appeared to be in working order, and upon reentering the complete passphrase all clients were able to automatically reassociate.
Wh... |
I have a program I am developing and am currently using ed25519 to cryptographicaly sign messages. However, even those signatures are longer than I would like (64 bytes + the message).
The messages I am signing are generated from within my system (i.e. I am generating and signing the messages within my program, on di... |
I own an ecommerce platform that sells large (500 megabyte+) ebooks. To reduce server costs I am looking at hosting the ebooks on S3 and using Sendowl/ FetchApp to create the links to the downloads.
My understanding is that "customer buys ebook" -> "customer receives signed url (i.e. example.com/ksljfasdkfj)" -> signed... |
I want to sign webhooks so that client services can verify that a request came from my service.
Looking around, it seems that most SaaS use symmetric keys shared by the client and the SaaS. Obviously, there's an overhead of generating and storing a unique secret for each client here.
It seems to me like asymmetric cryp... |
Say, for example, I generate a time based UUID with the following program.
import uuid
uuid = uuid.uuid1()
print uuid
print uuid.time
I get the following:
47702997-155d-11ea-92d3-6030d48747ec
137946228962896279
Can I get back the original UUID, that is 47702997-155d-11ea-92d3-6030d48747ec, if I know the timestamp (13... |
Some malware authors add benign code/behavior to their malware just to throw off antiviruses and IDSs which employ machine learning to detect malware. There is a name for this technique (and even a Wikipedia page somewhere) but I can't seem to figure out what it is or find it on Google.
|
I am creating a database table with an encrypted value, say users:
Say John encrypted is U2FsdGVkX193AOGlBRE1RNScJRGN9vSB4erIljJwaKw=.
UserId | Name
------ | --------------------------------------------
1 | U2FsdGVkX193AOGlBRE1RNScJRGN9vSB4erIljJwaKw=
Johnny would be encrypted as U2FsdGVkX19lYDuvuBg3BzTnZro4J6zKo... |
I have read that GCM is almost always more secure than CBC when implemented correctly.
However, in the documentation of NodeJS, CBC is being used as an example instead. The key-pair will be stored in the node environment.
Since the private key is being stored locally and CBC is an acceptable encryption for local files... |
It is important to note that this user input will undergo validation and sanitation using regex (on the server side in PHP) and then will be inserted into a database. Later it would be shown to other users on the same web site (for example: on a forum).
I'm referring to both a case when I know in advance what length I ... |
Is it possible to find bluetooth device if I have MAC of the device.
|
I had an idea to assign my keyboard's macro keys to various passwords so I can just hit the key and it will paste in (the passwords are long and random so I won't remember them). This is on a home desktop PC. Are there any reasons this is a bad idea security wise?
|
I am in the process of evaluating a number of webapp vuln scanners. For this task, I attack intentionally vulnerable web apps. So far I tried:
Scanner > BurpPro Scanner, arachni, ZAP, wapiti, nikto, w3af
Apps > JuiceShop, DVWA, WebGoat, bWAPP
For some reason, the scanners find almost nothing. Most of them don't even... |
A friend of mine has just received an email from my exactly own email adrress. What could this be and how do I stop it?
|
I've created a CA, server and client certificates:
# set up CA
openssl req -x509 -config openssl-ca.cnf -newkey rsa:4096 -sha256 -out cacert.pem -outform PEM
touch index.txt
echo '01' > serial.txt
# create server CSR, cert
openssl req -config openssl-server.cnf -newkey rsa:2048 -sha256 -out servercert.csr -outform PEM... |
I could not find any similar error after searching the web and struggling with the problem for around two weeks.
One of the Wordpress sites I'm managing keeps getting hacked. There has been no damage so far and I verified the integrity of the WordPress core files. I performed pretty much every hardening for WordPress ... |
I have a Web Apps (Linux) application on Azure, and I added a custom domain which I have protected with CloudFlare.
I added Azure Security Center to my subscription.
At the moment one can access the application either
directly via example.azurewebsites.net or
via www.example.com which is protected by CloudFlare
How... |
I developed a mobile application that runs on our company's mobile terminals. The mobile application connects to the company servers via GSM network.
We had a meeting to decide how to secure the communication between mobile application and server application. Our security team insists that we must install a VPN applic... |
I have a java web application that accepts base64 image strings from users. These strings are first converted to a byte stream after which the stream is scanned for viruses. After that the file is stored as a resized version of the actual image.
My question is, when the file has been transformed from a base64 string to... |
I want to use end-to-end encryption for communicating with other clients using my app. I had the following idea.
Every client creates a public and private key.
Everyone sends the public key to my server and anyone who wants to send messages to another client, gets their public key for that client from my server.
Th... |
The "Affinity" of Android tasks seems really complex to handle. The StrandHogg vulnerability uses tricks with "Affinity" to render itself inside an another app.
The information that I've found this far does not provide exact details of vulnerability but as far as I know there is not a technical vulnerability but a poor... |
I run a small DNS server (pihole) at home behind a firewall, with some custom filtering. It mainly filters ads and trackers, plus some top level domains I want to avoid navigating to. I have an IPv4 address (not fixed) with my ISP and could use DynDNS for HTTP traffic to my home.
Now I would like to use my home-based ... |
So let's say there's a page on the website that shows the admin all the messages that came in from the users since he last logged in.
And it's implemented on the mobile application, with checks in the app to stop this view from showing to normal users AND checks on the server based on the user's role (token-based syste... |
I've recently sent my MacBook (running on Catalina) to repair by a licensed Apple service provider. The whole thing was simple (replacing one key cap) and took about 5 minutes or so. But I forgot to shut down the MacBook and only put it on lock screen. I have FileVault enabled.
Is it possible for my data to be breached... |
For an API, I know that passing tokens in the url has the following security implications:
They get saved in browser history
They’re probably saved in your server’s logs and memory
Users might post the link, not realizing what they’ve shared
This information will be exposed in the “referrer” header.
They’re availabl... |
I try to use Thunderbird to encrypt a message. I do not want to sign the message. Encryption is done with the public key of the receiver. I have imported the certificate of the receiver. But when I try to send the message Thunderbird insists on my certificate. Why?
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.