instruction stringlengths 24 29.9k |
|---|
I'm currently rebuilding my network infrastructure and am planning to make my NAS available trough an OpenVPN server running on my router for "outside" use (no port forwarding: NAS in private LAN, available trough the VPN).
Now I was wondering about a certain scenario:
let's say, I have mapped some of the NAS's drives... |
Is it safe to transfer location data by using TLS with self-signed certificates?
I read a lot of varied discussions on the web which makes me to ask about the subject.
|
I do not want my ISP logging any of my data, and do not trust my VPN either. Is it a safe measure to use Whonix in a VirtualBox, connecting over VPN, then using remmina to connect to an RDP? My goal is so that ISP and VPN cannot log data of RDP server to which I connect.
Basically current setup VPN -> VirtualBox with W... |
I have a scenario with 2 sites. Site 1 is mysite.com and Site 2 is secondurl.com.
Site 1 is using Wordpress. There, I did a Javascrit/jQuery routine that checks if a given url parameter comes in. If the parameter "p" exists on the query string, I do a replacement on all URLs on my homepage that point to Site 2, now, p... |
Recently, I have been massively spammed by emails, and unsubscribing via the link doesn't work. Another option is to block the sender, but the problem is that the sender email is never the same. It's always in the form of Support@********.de, but the ******** part is never the same.
They all go to the junk folder, but ... |
I was wondering if a website I am visiting can detect whether or not the computer that is being used is being operated remotely.
For example...
I have two desktops. I use Desktop 1 to remotely operate Desktop 2 through windows' Remote Desktop Connection. Through this connection, I visit a website on Desktop 2. Would ... |
We can generate OTP using HOTP - RFC 4226 and TOTP - RFC 6238.
But the generated OTP normally has a checking function authenticator.check(token, secret);. But this only checks if the OTP is valid.
How to store any data such that it will be encrypted in the storage of the system and can only be accessed after entering ... |
I get the fact that we can use digital signatures for authenticating the signer (since they are using their private key to create the signature, and this is known only to the signer ). But how can the verifier also be authenticated using digital signature? I have a feeling that we could use digital certificates for thi... |
We have some development and test environments using our canonical domain, e.g. dev.example.com. We also use some services from 3rd party providers that have obscure URLs like xjkhasdkjvhas.dns.ashdfb.3rdparty.io.
The canonical domain is maintained strictly by our sys admins.
Some services are not served on port 80 whi... |
We have developed an application with contain file upload functionality. We use that application for internal purpose only. We use core php language.
We already use the below validations:
File extension checks (allow only CSV, txt, SQL).
File size checks (allow only 50 MB). We allow bulk upload as well.
MIME Type.
We... |
Got this situation where we are forced due to security reasons to only be allowed to connect through VPN to our network - which is fine when you are in Germany (GER) where the main office is located, and absolutely horrible when you are located at the branch office in the Phillipines (PH) due to really slow connection ... |
We are trying to implement the SAML 2.0 protocol and I stumbled upon a problem related to passing the token from the API to the client SPA application.
The authentication flow goes like this: the client is redirected to the IdP application where he enters his credentials. Then the IdP performs the POST request to the A... |
To summarize:
CSRF is an attack where a page in a different window/tab of the browser
sends nonconsensual request to an authenticated web app, that can typically
be prevented from server-side by checking the Referer, Origin header of the
request or including anti-CSRF token in request header or body.
CORS is variousl... |
I have two accounts, an administrator and a simple user. I can capture the administrator's cookie and use it in a simple user request, I find myself logged in with the administrator user and then log in to the site as an administrator user. Can I consider this vulnerability a privilege escalation?
How should the cookie... |
I'm trying to reverse engineer a linux kernel module (kernel version 4.19).
Ghidra does recognize correctly all function names such as: open, misc_register etc, but it cannot determinate their exact signatures.
Let's take as an example function copy_from_user with signature:
unsigned long copy_from_user (void *to, cons... |
What concepts should a newbie(someone who doesn't have too much knowledge about computer architecture, user/kernel space, memory etc.) understand if he wants to know how Metldown/Spectre works?
I would say :
out of order execution
user/kernel space and how they interact
a little bit of how processors work
Anything el... |
I'm running on linux and I am using a SQL Server database server on some other machine.
My python code has to sit in a directory that many other users have read access to.
I also have a "GenericTaskRunner" linux user And "GenericTaskRunner" databaseuser.
How do I connect to the SQL Server database using the "GenericTas... |
Suppose you lose the bag containing your laptop along with its accessories or while travelling the police confiscate all your computer devices, can you safely use all the devices again if you format all your devices and wipe all the data?
How far should you go at the software level? Would formatting the hard drive be e... |
Is it safe to append the user's username to the session ID? The session ID is 32 bytes long generated using a secure PRNG. I encode it using base64 URL to save it in a HttpOnly cookie. The cookie value would be base64URLEncode(rand32bytes.username).
|
When using the OAuth authorization code flow in web applications, after successful authentication of the resource owner, the authorization server usually responds with a browser redirect to pass the authorization code back to the client via the redirect URL's query string.
Now, if the redirect URL is short enough, the ... |
This question was primarily inspired by this (related) question, but is about the other side of the equation.
I'm a security engineer at Medium Sized Company, Inc. We recently hired John for a penetration test (unbeknownst to me). John successfully got into our building and made it all the way up to our floor. He got... |
So I started to learn reverse engineering, and I came across the ret2libc exploit.
I tried to understand how it works and I got a bit confused.
They say that when you return to the address of system you then need to give 4 bytes of garbage and the after that give the address of /bin/sh.
Why do you need to give these 4 ... |
a 1024-bit private key is generated using the openssl genrsa privateKey.pem 1024 command.
we extract the public key from the private key using the command
openSSl rsa -in privatekey.pem -pubout -out publickey.pem
I want to know the size of my private key and my public key?
I want to know the maximum size of a file th... |
I've been building a web app (rails api + react SPA) for learning / fun and have been researching authentication. The most commonly recommended approach for authenticating SPAs that I have read is to put the auth token (such as a JWT) in a secure HTTP-only cookie to protect from XSS. This seems to have a couple of cons... |
$smarty->assign("action", $_SERVER["PHP_SELF"]);
PHP_SELF is set client side by the browser so it can be modified by an attacker. Is Smarty "action" assigned to the form action field?
So can an attacker control where to POST data is sent, or see the variables set on the server side?
Any other flaws with this statemen... |
Situation: I want to set up some home servers that can store my files. Currently in the planning stage of the setup.
Problem: Security and stuff comes to mind when doing such things, especially exposed servers.
Question: Does it make a difference if I set up a VPN server at home and only expose the VPN server vs exposi... |
Is there a recommended, forensically sound method of acquiring virtual hard drives on VMWare using Autopsy? Or is it a simple copy and paste?
I’ve used other software like Caine in the past, where you take a copy of a hard disk using a “dd” command. Wondering if there is another method like this using Autopsy.
|
I have noticed our website, which is Wordpress based, gets frequent daily requests from other sites where the user agent is Wordpress and the other site is obviously an already hacked Wordpress installation.
In these entries I have replaced our own domain with example.com and purpleplumm.co.za is one of those compromis... |
I draw a custom network (I would use that for developing and testing, my ISP does not support IPv6), there IPv4 and IPv6 are present.
'A' device has firewall: incoming blocked, only accept access (SSH) from 192.168.0.0/16 (private network)
'B' device has default firewall settings: incoming blocked
'C' device has firew... |
In a recent execution of a spider, Burp reported cleartext submission of a password CWE-319, but the evidence in the report is merely the preceding GET request of a non-existant page, redirected via HTTPS to a login page containing the form, which contains a password type field.
The form itself has no "action" attribut... |
If I connect to a WIFI AP and it wants to install a root cert. They read my HTTPS traffic, Right?
Does using OpenSSH on my cell phone to my home router help protect me? Or can this traffic be decrypted as well?
|
I’m expecting some information from a governmental organisation, they claim that they already send the info via email, but I have never received anything.
They also have an automatic reply email, when I email them, then I don’t even get the automatic reply in my outlook inbox or anywhere else.
The nature and the sens... |
I don't know the theoretical background for 2FA so I'm asking here.
I've used a few 2FA apps before including Duo Mobile and Steam Mobile (Guard).
When Duo is opened, it will display your tokens as you expect, but with Steam your Guard token is displayed wether you are logged in or not. The Guard behavior caught my att... |
LVM on LUKS is the only secure option for encrypting a Linux/Ubuntu USB system. If someone gets access to an unencrypted USB that's not LVM on LUKS they know what it is and what's on it.
However LVM on LUKS is not easy to implement, so would anyone be kind enough to explain in the easiest steps possible how to?
Thank y... |
For a HTTP(S) API, which is better (/ which is better under which circumstances)?
Hawk authentication (a secret key is used to create a signature which is transmitted with the request: similar to AWS Signature v4)
API key authentication (a secret key itself transmitted with the request)
A downside of Hawk is that sin... |
So this fixer that I asked to fix my busted front audio ports injected my PC with KMS-R@in in order to get rid of the activate windows watermark without my consent/knowledge, and it gave me Floxif.E and Floxif.H, and updated the drivers to fix the back ports, which wasn't even what I asked him for, is there any legal a... |
For a week someone has been logging into my webserver. Yesterday I mentioned this to the hosting company. They tell me to use an "IP blocker".
I am doing that, but today I looked for more logins. The IP logging int is 37.201.196.78 (that's not my IP). Today I searched more info about this IP with Zenmap:
I know when ... |
When I do CTFs, I can usually cope well with and understanding everything pretty much apart from buffer overflows, binary exploitation and reverse engineering
Almost to the point that I would consider myself having zero knowledge at all. I grasp the concept at the very most basic of levels and by that I mean I can oper... |
Does it increase your internet security in terms of privacy/tracking/fingerprinting if you are surfing with your web browser in a virtual machine environment (virtual box + VPN) instead of surfing from your normal windows operating system?
Or is a virtual machine not helping you in fingerprinting cases? I just want to... |
Is there some sort of rule to determine how large a hash should be to ensure the security (meaning exactly one message maps to a given hash) of a message? Something that can be applied to any message, such as a 32-bit number or an 8-letter ASCII password.
|
I have a project, a webapp/website that uses cookies to authenticate users with long randomly generated strings (also with samesite:lax, httponly, secure), however I also have an API which itself needs authentication tokens.
My current design is when the website server authenticates the user it generates the API authTo... |
Sorry for being so general, but I know my ISP logs connections to others and all. I'm just questioning whether they keep any physical data that was over a HTTPS connection. Learned about how ISPs also "packet sniff", do they keep the data gained from sniffing packets when they want to overview the "log"?
They keep a lo... |
Can someone explain the differences between a CVE and an OSVDB identifier?
Both seem to serve the purpose of uniquely identifying a vulnerability or an expose, however not every OSVDB entry also has a CVE number.
How are both related and how is decided which one is assigned to a certain vulnerability?
|
Recently, I found an iframe injection vulnerability on a website. This website allows users to create projects and name them. So I successfully injected an iframe on the naming function that can redirect me to a malicious website. But I don't know if the injection is visible to other users or to the administrators, so ... |
I use dd to "burn" an ISO file to USB stick:
dd bs=4M if=/mnt/media/ISO/Fedora-Workstation-Live-x86_64-31-1.9.iso of=/dev/sdd conv=fdatasync status=progress
Now I can see several partitions has been created:
sdd 8:48 1 1.9G 0 disk
├─sdd1 8:49 1 1.8G 0 part /run/media/alex/Fedora-WS-Live-31-1-9
├─s... |
What technical methods can be implemented to force Nextcloud Pi users from sharing authentication credentials? For example, In the military, this is halted with a certificates held in a smartchip in the ID (CAC) card. Ideally users would have discentive to share a credential: credential resuse (FB / Google).
Update... |
I am considering buying a nice domain name (say example.com) and would be interested in reselling subdomains (e.g. chris.example.com) to third parties (or close friends). I would give them full control over the zone via the use of NS records.
Ignoring liability issues, are there any Internet security issues that may be... |
Many developers distribute software over a HTTPS connection and recommend that their users verify the integrity of the executable by comparing a hash or PGP signature. Both the executable and the hash are served over HTTPS from the same domain. What possible benefit could one achieve by verifying the executable? If an ... |
When “ethical” hackers/pen testers harvest repositories of stolen credentials to then use them in pen testing for paying clients, what ethical boundaries are broken?
If a lazy hacker leaves their captured credentials out on an insecure, public-facing server and then an “ethical” hacker grabs them for their own paid se... |
I depend on PHP CLI for all kinds of personal and (hopefully, soon) professional/mission-critical "business logic". (This could be any other language and the exact same problem would still stand; I'm just stating what I personally use for the sake of context.)
To the furthest possible extent, I always code everything o... |
I tried to analyze the https traffic of apps on my MacBook and iPhone with Charles with SSL proxy (I use HTTP proxy for IOS and installed and trusted Charles certificate). I managed to decrypt most HTTPS traffic, however, when I discovered that I cannot connect to App Store on my iPhone when I was on the proxy, I reali... |
I am practising on an older version of DVWA (1.0.7 iso image). In High Security settings, I am trying to perform command injection and this is the source code snippet I saw
$target = stripslashes( $target );
$octet = explode(".", $target);
if ((is_numeric($octet[0])) && (is_numeric($octet[1])) && (is_numeric($octet[2... |
I have a secure and private aws ec2 environment but I need to do some backups of mongodb, postgresql, so I have a separate ec2 instance for doing backup and occasionally allow 80 and 443 to allow install/update software on backup instance.
I use shell scripts to do backup job, it requires hardcoded password or credenti... |
I have 0 experience taking exams for security certificates. When I'm taking an exam for something like OSCP, should I obfuscate/disguise my files and names (like naming a file update.sh) to make it harder for "future testers and auditors" to find like a criminal would, or just make them obvious (naming a file exploit.s... |
What is the purpose of using a EAP authenticator in the EAP protocol ? Since underhood, the authentication procedure is between the EAP peer and the authentication server, what is the advantages of using a third actor (that is, the EAP authenticator) ?
|
Two days ago, someone gave me their pen drive to copy some songs from. As soon as I inserted the drive into my laptop's USB interface, Windows Defender immediately warned me that the drive was infected, so I immediately removed it without opening any of the files it contained.
I have since run the Windows Defender Anti... |
On normal networks, it is a security risk to send plaintext data, since attackers can sniff or even manipulate all traffic. Encryption is required for secure communication. When using Docker containers, these can be connected together using virtual network interfaces. Do these suffer from the same security problems, or... |
I have a website in which I include several CSS stylesheets from my own server and one stylesheet from a remote server.
I wanted to write my Content Security Policy in a way to permit all local stylesheets, and only this one specific remote style sheets. This was my attempt:
style-src 'self' 'sha256-L/W5Wfqfa0sdBNIKN9c... |
How do messengers, like signal or XMPP-omemo messengers, store their messages?
Since the session key is only valid for the current session, how can such extensions like MAM (message archiving on XMPP server) or storing the messages encrypted on the disk work? Futher, you often want plausible deniability with "malleable... |
I found that a website protects itself of CSRF attacks by validating the POST request contains a specific header:
-Example-header: GF
What i find strange is that this header doesn't have a csrf token in it, it is just a custom header with a 2 letters value that validates the POST request.
When i try to add it in the H... |
Quoting the FedRAMP official FAQ:
FedRAMP requirements include additional controls above the standard NIST baseline controls in NIST SP 800-53 Revision 4. These additional controls address the unique elements of cloud computing to ensure all federal data is secure in cloud environments.
However when I download the li... |
Is there a generally acknowledged term for spoofing facial recognition with a photo of the target face (Samsung smartphone facial recognition, not Apple FaceID (depth measurement)).
|
Introduction:
I am currently implementing acr_values, acr & amr principles on a Open ID Provider server.
The claim amr (described in the OpenID RFC 1.0) has no standard clearly defined in this same RFC, but I would like to base the system on the RFC 8176 mentioned by IANA.
One of the server authentication method is abo... |
I started working on a service that sends out mails with a link to a registration form. (e.g. a registration for a movie premier)
The link would look like this https://movie-premier.com/rsvp/USERCODE
The problem is that for some users part of the form is prefilled with their name and address etc.
So basically we send t... |
I intend to start learning how to do malware analysis and forensics, but I have a concern or two.
I want to start by just analysing code that I write myself, and that'll be fine. But at some point I'm going to want to start analysing real malware.
As is normal, I'll be analysing within a Windows VM (on a Windows host)... |
Technically speaking, it is possible to spoof both headers using an intercepting proxy but that's useless because we are doing it ourselves as an attacker.
When we send an ajax request using JS from another domain with our spoofed referer and origin header it won't really be spoofed. The browser would still send the le... |
I am a student trying to demonstrate an ARP spoofing attack. To test whether my attack was working I decided to use wireshark to sniff the packets on the attacking machine. At first I thought I was able to intercept traffic with my ARP spoofed setup, but I came to find that the reason I was able to see the packet was b... |
How to create an OpenVPN static / pre-shared key with key size 4096 or 8192 bit?
openvpn --genkey
Creates 2048 bit strong keys only.
Static key. Not CA.
|
Does it have any advantages to do transport-encryption for messages that are already end-to-end encrypted?
|
To create a certificate, first we need to fill a CSR and in CSR we have to place our public key and that key pair can be generated by different ways in different devices. To do ssh, we run command (crypto key generate RSA modules 1024) and generate the key pair.
Now with the help of this command we are generating publ... |
I reported a self-xss on file uploader input to a bug bounty company and they said that they will only accept it if i can find a good clickjacking exploit for that input. My question is: Is it possible to make a clickjacking proof of concept on a file uploader input? This XSS trigger if i select a file named <script>al... |
How can one determine the encryption algorithm type (e.g. AES, DES, 3DES, etc.) that is used by a certificate in Windows (10, 2012-2019)? Is it obvious, and I'm just not seeing it in the certificate details?
|
I think that from title it's pretty obvious what I'm trying to do. My Facebook account has been hacked, as it's using e-mail from whom I've forgotten password I can't get it back. I'm not using this e-mail anymore and is not important to me, while Facebook account is. There were no 2FA on account so that's not possible... |
Is apparmor default deny? For example consider the case under SELinux in enforcing mode, where I install a package with no policy associated with it. SELinux's default behaviour is to deny all syscalls that application makes. Does apparmor work the same way, or do you need to explicitly create the policy first and inst... |
Why hide kernel symbols?
Quote
Anyone with basic knowledge of kernel exploitation knows how important information gathering is to reliable exploitation. This protection hides the kernel symbols from various places that an attacker could use during information gathering in pre-exploitation stage.
...
This option al... |
There are some attack scenarios on NFC. These include e.g. Data modification, data insertion, relay attacks and DoS attacks. Just to name a few.
While some of these attack scenarios are more likely than others, I wonder how to prevent a DoS attack on NFC. The key issue in the DoS attack on NFC devices is that many requ... |
New to OpenPGP. I have 3 Yubikeys, one for my laptop, one for my desktop, and one which I plan to keep in cold storage as a backup. My plan was to create a S/E/A subkey for each Yubikey, attached to my primary key (9 subkeys total). But, now I learned that a message encrypted with one E subkey can not be decrypted by a... |
I am registered to a site which doesn't manage password correctly. It is a user area for a company that provides services of some sort and which uses the area to show details of the contracts and for payments.
Now, if I forget my password, there is a procedure that allows me to gain access to my area again. Problem: t... |
I am working on an android application and the company request is to be able to potentially have a user edit the API URL the app uses to be able to work with different test environments.
This immediately threw up a red flag for me as this might lead an attacker putting in some bad URL (if they knew how to enable the ab... |
I am planning to implement JWT authentication on my micro-services to achieve zero trust architecture. User will generate a JWT token through front end micro-service. Each subsequent request will contain this JWT which will be forwarded to backend services so the service can authenticate the user on it's own instead of... |
I am evaluating the above service design where I want to have mechanism to pass a user through multiple microservices. In this simple example, the user goes through a sign-up process and once done, the user is redirected to another microservice (B).
The session-id for microservice A is stored in a session store. Howe... |
As an admin one gets tasked with configuring [Microsoft Windows 10] computers so that auditing is enabled and captures all events as required by some list that's already defined and handed down.
There are dozens of other things in Event Viewer that I would argue are very relevant in saving should such a time come that... |
An SSL session is established between two nodes (via ip addresses,layer 3) or between applications ( layer 4) ?
Thanks
|
Basically I hashed the result of the "date" command with md5sum:
$date | md5sum
The output is indeed in the likes of:
e4c94362cd4fd71ec6aca78c7411bdc3 -
My question was: is it possible to recover the result of the date command knowing the date pattern (except for maybe the minutes and seconds)?
I tried using john's ... |
Original question is here https://stackoverflow.com/questions/59256905/r-and-shiny-app-secure-connection-to-third-party-robinhood-api
To summarise there is an R package that allows users to enter their login credentials to access their Robinhood account. The user assigns a variable which is sent to Robinhood, Robinhood... |
I'm trying to find SQL injection vulnerability in DVWA with OWASP ZAP. After some clicking through the page I have a small site map:
I ran Active scan, Spider and AJAX spider on the GET:sqli node. As you can see in the screenshot above, SQL injection vulnerability was not found. Neither was the form action from the ht... |
How to represent visually a number (like a key or hash) on a screen for visual comparison with another representation of that number on another screen (or another window) in such way that it would be very hard for an adversary (who knows the correct answer) to convince the user that different numbers are equal?
The app... |
A constant source of debate I've seen between engineers and security teams is how to handle vulnerabilities in internal systems. Specifically, vulnerabilities in linux packages (like gcc, libcurl, openssl, libpng, etc.) inside Docker containers. Many times these packages are not used by the application and they just co... |
On reading about IMSI catchers, I keep seeing that they "impersonate" a real cell tower or "base station" so that the phone drops its signal-carried data on that machine while on its way to the intended destination.
What I don't understand is, how exactly does the IMSI catcher do that, or by what mechanism? What is it ... |
There is an embedded device which should connect to the server over HTTPS and MQTTS. A server certificate is issued by a trusted CA (for example, Let's Encrypt). But there is a problem with server certificate verification on the client side because the device doesn't know about trusted CA's.
So I have a few options:
P... |
In my project I have to integrate with another system which uses quite specific SSL (and also specific cipher suite).
Here's what I mean.
Whenever I try to access the server with Java (send a request), I get the wrong certificate from Server Hello. Subsequently, I get a handshake failure, even though I have installed r... |
As the title states, how can I differentiate both of them.
|
Several apps on my iPhone X including LastPass, and iCloud passwords prompt me for my Face ID before allowing me to use them. I guess the idea is that someone could accidentally take my unlocked phone and access my personal information.
How likely is this in reality given that the phone has a short inactivity timer? Ar... |
I have an embedded device and it is running a https server. This device will be accessed from a standard web browser using the IP address. I am generating a TLS certificate. I have added a commonName (static string) and subjectAltName (default IP address) and generated the certificate.
If the IP address is changed or D... |
Background
Comcast/Xfinity operates various wireless hotspots across the US, accessed via the SSID xfinitywifi through the many wireless access points shown on https://hotspots.wifi.xfinity.com/
xfinitywifi hotspots are all open/unsecured, and, to use such a hotspot, an Xfinity subscriber simply connects to the xfinity... |
If I have the MD5 and SHA1 hash matches for an encrypted container. Is there no possibility it's been modified?
Is it safe to assume the container has never been modified?
|
Let's imagine the following:
I've developed a mobile app using Xamarin (iOS/Android compatible)
I want it to support OAuth2 + OpenID connect's authorization code flow with PKCE, so that the user's credentials are never stored on the device, but rather an access token is. The token grants access to an API used to make ... |
I noticed that when reading from /dev/random, I have a very real impact on the entropy available on my linux box.
(reading from /proc/system/kernel/random/entropy_avail),
Yet when reading from /dev/urandom, (I understand seeded by real entropy but actually a CSPRNG), I can generate high quality entropy data, but my ent... |
I'm setting up an intranet web server that will handle requests coming from multiple different types of employees.
One of the requests that my server will need to handle is to query data from a second server. The second server is managed by a different team and has restrictions as to who can access their server (using... |
I want to see how my application will behave in case if the SSL certificate expires.
CSR are signed by CA, so they are not self-signed and the validity period is 2 years. For my test I want to set the expiration period as 1 day. I don't have control over the CA so I can't create a new template for a certificate validi... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.