instruction stringlengths 24 29.9k |
|---|
I own a popular website that allows people to enter a phone number and get information back about that phone number, such as the name of the phone carrier. It's a free service, but it costs us money for each query so we show ads on the site to help pay for it. To make sure people don't abuse it, we have a captcha and u... |
Hope it does not sound as a surprise to anyone that modern Web and its security, with the many layers and technologies, is pretty confusing and difficult to learn well. For someone with a good perspective on the history of Web's design and development, was there anything that, in hindsight, could have been made simpler... |
Part of the web of trust of GPG is the use of Keyservers to publish/distribute versions of public keys. It's encouraged of course to sign public keys you trust so the the web may grow.
How does a Keyserver deal with the following scenario:
I sign a slightly older version of a public key
I try to upload and distribute ... |
I was studying the AWS request signature process and found that they derive the signing key from multiple sources (one and two related questions).
Specifically this:
kSecret = Your AWS Secret Access Key
kDate = HMAC("AWS4" + kSecret, Date)
kRegion = HMAC(kDate, Region)
kService = HMAC(kRegion, Service)
kSigning = HMAC(... |
Lately i was experiencing weird behavour from some big websites.
More specifically, when i normally tried to connect to facebook, i would be greeted with this login page:
I have placed these with boxes to protect my privacy, as i don't want the language to be revealed. (I am creeped out by the incident i am describing... |
Today I accidentally miss-typed a popular's website domain, which led me to a malicious website. I realized immediately but before I had time to close the tab, I was surprised to be presented with the web app that I am running locally on apache. The webpage was identical to my webapp but all links were pointing to the ... |
I need to distribute a shared 256 bit key to 100's or 1000's of nodes (I have the public key of each node).
There's no networking involved - this will all be done by loading a single file on to each node. That file is generated by a "master".
In some cases, the nodes use 2048-bit RSA keys, and others it is a p521 El... |
I have a shared hosting on hostgator with around wordpress based websites. Out of them 4 stopped working with message as error establishing database connection. On checking the wp-config i found the Db connection details were changed for all of them to
/** The name of the database for WordPress */
define('DB_NAME', '... |
So I have SFTP running on a server that I'm working on. It works fine, and it has a very long random like 20 digit password to login. I've already looked at the Synology logs and since port 22 is exposed hackers have already tried and failed at guessing a way in (IPs from India) etc.
I'm thinking that it might be mor... |
Are there any additional attack vectors that apply when an OS is being updated? For example, would the services that are being updated be unstable?
An OS is generally more secure after being updated, but I would like it if someone could explain how an OS can be attacked (additional attack vectors, etc.) while it is be... |
i'm currently running a 802.11n adapter in monitor mode on a kali linux PC. Monitor mode was enabled using airmon-ng. On the same network as the kali linux PC are 2 raspberry pi devices.
Pinging from a Raspberry Pi device to the PC shows ICMP packets on wireshark, but pinging from a Raspberry Pi device to another Raspb... |
I am planning to do vulnerability analysis of a Software Defined Network. Since the connection between the business apps and the controller of the SDN would be done over the application layer, I would assume web attacks can be explored through request manipulation in Burp Suite. Since the connection between the OpenFlo... |
Let's assume I'm a user with root access to a machine and I'm a legit user. My machine/server runs Linux. I'm not very familiar with defensive security (I mainly practice offensive). Sometimes, popping shells can be as easy as running some metasploit module (meterpreter sessions).
What can I do to check if there are re... |
To protect my Debian servers, I'd liked to lock access of username ‘root’ to only IP addresses(or ranges) listed in a ‘whitelist’ file. But getting locked out of my server is even worse than getting hacked. And as I travel a lot, I must have a couple good ways add or change the IP addresses in that whitelist file.
1:... |
I am going through the Thales HSM manuals, and frankly the key acronyms are driving me crazy. I would like to understand the differences between the following keys, and how they relate to one another:
LMK
TMK/TPK/TAK/TEK
ZMK/ZPK/ZAK/ZEK
DEK
KEK
I know that in terms of "hierarchy" (if that's the right term to use), LM... |
My company has been applying really strict information security policies with firewalls and good quality network equipment this is to prevent from someone to connect to the company network.
Many of you know that Team Viewer is blocked for obvious security reasons as well as other remote desktop protocols.
Recently I in... |
I performed "reflective DLL injection", but I am trying to determining if I can view the injected DLL? if so, how can I hide it?
|
Context: Secure boot is one of the important elements of Trusted Computing in computer system. One variety of the Secure boot is authenticated boot. While secure boot prevent the boot of a non trusted software, the authenticated boot detects a non trusted software but does not prevent its boot.
Questions:
What are the ... |
This question is about OTP codes that are used in flows like
Email verification
SMS 2fa
Usually, when you send an OTP, you want to give the user an option to resend the OTP.
Assuming the following protections are in place:
Limit the number of attempts to enter the right code (defend against brute force)
Limit the nu... |
Is there a way to perform session fixation attack with XSS present if session id is passed in request header?
As far as I see it, theoretically there are three ways to do so:
intercept request on login, substitute session id (have not found any ways to do with JS without additional installations for client like servic... |
So I have looked at the following client library, implementing the OpenID Connect spec:
https://github.com/IdentityModel/oidc-client-js
It works as expected, and I can now allow users to login with Google, great.
This library specifically assumes a 'pure' web client application, i.e. an app that has 'no backend' from... |
I'm on a few WhatsApp groups that have signup links. Lately (last few months) I've noticed some very odd activity on a few of these groups: every few days I notice a number (often from a country with a poor reputation for scamming) joining, and then leaving the group, like this:
And I'm wondering, what is the scam bei... |
I'm not really an expert on different key types but here it goes. My company never really managed keys. We have an SKS server that was set up to manage GPG keys for a couple of users sending encrypted documents.
Now a new requirement has come up: all users logging into servers will have to use SSH keys (i.e. ssh-keygen... |
My organization has several certificates used for web services that are going to expire soon. We want to have these certificates renewed so that the service to our clients is uninterrupted and doesn't require any action on their part. Is this possible, and if so, what would need to be done (e.g. create a CSR from the e... |
Is running cryptographic operations (encryption / decryption / signing / verifying / key-exchange / key-generation) in a Docker container affecting the quality of the crypto or entropy?
If it does impact it, how do you mitigate that risk and are all cryptographic programs equals likely to suffer this?
|
I was logging into a website and checking out the network requests, and in the network tab I saw the following:
method: "Login"
params: {username: "username", password: "password1234"}
With my username and password being sent in the request payload as plain text. While I don't know how its being stored in the DB, I lo... |
There were two response headers which could be set by servers to instruct browsers to enable heuristics based reflected XSS detection and prevention in the past.
X-XSS Protection: 1; mode=block
Content-Security-Policy: reflected-xss
X-XSS Protection
This header according to MDN;
Chrome has an "Intent to Deprecate an... |
I had been using my own PGP key (RSA/1024) for more than 15 years. That key is my identify on the Internet for a long time, and also be used for encrypting a huge data.
Recently, my colleagues told me: "You should create a 2048-bit to getting better encryption, or 4096-bit to getting the best". I found no document that... |
This might sound dumb, but I set up an OpenVPN server on a Synology NAS. When I connect via the client at home to the server, everything works for.
I know you can read packets in Wireshark. If I start sniffing on My WiFi that I'm connected to at home, packets show for the OpenVPN protocol and there are few lines that... |
Is there any possibility of malware infection in Windows 10 for the following three situations:
When you download a zipped file, but do not use it (you do not open it)?
When you only open a zipped file (with 7-zip), but do not extract/run its content?
When you download a ".html" file, but do not open it?
|
Since Android 9, there is an option in your location preferences which is called
Location Accuracy.
I know how Google determines my location over wifi and now I wonder if Location Accuracy has also the purpose of feeding new locations of accesspoints to Google.
Is this correct?
If yes, has anybody an official stateme... |
I have a process running named 10183 that occasionally uses mobile data, how do I get more information about it, like know what system application is running under that name, what does it do, and if it's malicious or not ?
|
I have multiple Yubikeys carrying the same GPG secret key. I want to switch from one Yubikey to anohter one on my laptop. The two obviously have different serial numbers.
After switching the keys when I try to decrypt something (e.g. with pass), I get a popup:
Please insert card with serial number XXXXXXXXXX
(This is ... |
I've pentested a lot of websites and a few apps too but this app eludes them all.
On the websites, when there's a websocket upgrade the BURP proxy recognizes it and starts showing it in the websockets tab. Somewhat similar happens on the apps, but not on this one.
This app doesn't do any such thing.
How this app works... |
I recently found out that in order to log on to the web-based administration tool on my ISP-provided router, I need to accept a self-signed certificate it offers. I did a bit of reading and it sounds like self-signed certificates issued by an ISP can enable the ISP to perform MITM attacks on computers that accepted the... |
I've noticed that the search engine Shodan grabs screenshots from hosts running an RDP service, even if they offer a certificate.
To my understanding, the certificate is used to authentify the server, and encrypt the traffic sent and received (exactly like they are used in HTTPS), and thus should be irrelevant to the p... |
Under Ubuntu 16.04 LTS, I cannot seem to debug a once-privileged process for love or money as an unprivileged user.
The file is setgid (mode 2755). It forks, and the child:
releases its capabilities
calls setgid(getgid())
Yet, gdb cannot attach to it when running under the same uid and gid.
$ cat /proc/sys/ker... |
While reading about certificates, I came across this article. It says:
The point of a CA-signed certificate is to give slightly stronger verification that you are actually using the key that belongs to the server you are trying to connect to.
How exactly does the CA ensure stronger verification?
While trying to find ... |
I know this question has been asked before - or similar. I really don't understand Google Authenticator. If I have set up 2FA on my old phone and can no longer use my old phone - how do I login to these various websites (e.g. cryptocurrency exchanges) with my new phone?
I think I misunderstood Backup Codes - I thought... |
Let's build a scene: I'm working on my laptop in the library, and while I'm gone to the toilet for 5 minutes, someone disassembled my laptop and took the hard drive. I encrypted it with VeraCrypt, so I assume it's save. Now, I build some PC's in the past, and a simple step involved in that process is connecting the har... |
On all web services that require passwords, like gmail, you are asked to set a long password. Like 8 characters or more.
The reason being higher security.
But the same services limit the number of login attempts to 3-4 tries before locking your account and asking for more info. Something which I find very annoying, but... |
In my life, I have spent a lot of time thinking and wondering about many things related to larger businesses, even though I have no direct connection to that world. By "larger", I mean "not just a single carpenter or him and his brother". Primarily, I'm talking about the kind of company which has a "board" of people, o... |
Which is better master KeePass password to prevent any type of bruteforce between theses two type of password :
Complete sentence invented by user like : I like cheeseburger,
tomatoes and fries ! :)
Each first letter of the word with lower and
higher case : Ilcb,tAf!:)
Edit : My hesitation come from the fact that th... |
Suppose that I use a smartphone with an external WiFi adapter to cover up my real MAC address and on top of that I use a no-log VPN. In what way could I still be identified? I have heard a lot of talk against smartphones as hacking devices as they contain a lot of personal information, but I cannot see the validity of ... |
I've created an RSA private key in SoftHSM 2 via EJBCA with the following config:
attributes(*, CKO_PUBLIC_KEY, *) = {
CKA_TOKEN = false
CKA_ENCRYPT = true
CKA_VERIFY = true
CKA_WRAP = false
}
attributes(*, CKO_PRIVATE_KEY, *) = {
CKA_TOKEN = true
CKA_PRIVATE = true
CKA_SENSITIVE = false
CKA_EXTRACTAB... |
The latest advice (e.g. from NIST) recommends that user's password are checked against known breaches and compromised passwords are forbidden.
What are some relatively straightforward steps that a regular web dev who is not a security expert can take to implement this? Just knowing what breaches to use and where to dow... |
I want to install homebrew in the safest possible way (single user system). It is often criticized that homebrew takes precedence over /usr/bin and /bin (in /etc/path) and therefore any malware can simply put binaries or libraries there.
For example, software that I install with Homebrew could deliver an infected binar... |
I would like to wipe ALL free space on my SSD which Windows 10 is installed on, so that no previously deleted file can be recovered. How can I achieve this?
|
I'm curious what the current state of author recognition software is, i.e. software that detects the author of a certain anonymous text based on a certain pool of texts obtained from elsewhere. This could identify people in dangerous positions like critics of a government or whistle blowers even if they have been total... |
Many recent phones come with a fingerprint scanner. I use them rarely but I'm curious how do hardware and software protect user's fingerprint data from being stolen.
Does a fingerprint scanner come with its own storage where fingerprints are stored?
How does the fingerprint scanner decide which fingerprint requests fr... |
Why is JavaScripts executed manually from the browser console not allowed to access "everything"? Especially the "visited" status (see this question) of links? What kind of security threat would that pose?
Usually, users have full access to their environment, sometimes with a little bump in the form of entering the roo... |
I have the following architecture for accessing a REST service that requires authentication:
Oidc token flow managed at the client
Access token verified at the server in the auth service (proxied by the api gateway), exchanged for a jwt that contains authorisation information about the user.
The resource is access... |
I loathe passwords with completely random letters and digits. It's so much nicer to have a password made up of proper words. Even if the total length is much longer, it's easier to memorize, transcribe, etc.
So I thought of this password generation scheme:
result = ""
while (result.length < 12)
result += randomWord(... |
I have been given a forensics challenge that contains a SYSTEM and SAM registry files as well as a wordlist.
When using hivexsh (a registry analysis tool) I need to find the password (which I belive to be hashed with the NTLM in the SAM\Domains\Account\Users\000003EB> which is the corresponding password for the user)... |
JWT Bearer token and stateless REST API question
I am implementing a stateless REST API. I am used to using sessions built into frameworks or 0Auth but now I am in the process of developing my own jwt bearer auth implementation instead of relying of frameworks and services. I have a question about a design decision tha... |
I have a website with a contact form on PHP and a mail server.
Email are sent with the help of PHP mail function like so
$name = cleanInput($_POST["name"]);
$e = $_POST["email"];
$email = filter_var(cleanInput($e), FILTER_SANITIZE_EMAIL);
if (strpos($name, "@") !== false) {
$msg = 'Invalid name!';
exit();
}
els... |
So i have a webserver and i would like to have users login and then be able to download an exe file directly from the webserver the issues with this is that users can easily download the file directly eg "example.com/download/file.exe" bypasssing any authentication, so i need a way using post/get requests to authentica... |
Can android lollipop 5.1.1 apps which have permission to access mic and camera access them when the app is not running?
I woke up to the news by the NYT that a popular app I had previously downloaded was solely developed to be used as a spying tool by a government. I did not research the app when I downloaded it and th... |
I was looking at an https page on my phone within the house via my home wifi network.
I turned off wifi and switched to mobile data and when I refreshed the page, suddenly there were adverts on the page.
Worse still, some were targeted based on previous search history.
When I switched back to wifi and refreshed the pa... |
I was recently visiting a semi-popular website by just typing the link into the browser. I actually was sure that I typed the right address in there. But what if I typed in the wrong address and then a malicious site was showing up? The website frontend looked the same as the original site showing images, comments, etc... |
I know that Qubes Os is not suitable for a server use, but some of its features are quite interesting for that. In fact, all the network drivers are contained in a VM that run a different Linux based system and the connections from the "main OS" to the network are made through TCP/IP with that VM. Moreover, network dri... |
As answered in this question, Single Page Applications shouldn't be given a refresh token with the OIDC Authorization Code Flow.
Can you indicate some way of getting a new access token when it expires (without interrupting the SPA UX state (no redirects...)?
If the use of refresh tokens is the only solution, what are t... |
If it is an insecure practise to use setuid/setgid binaries, why do distributions, OSes force it?
The big question: what prevents using sudo instead of the setuid/setgid binaries?
"ping" would be enough for root, no? If a user wants it, give it sudo permission?
|
I have recently sat up an Nginx in a way that makes it not return a Server header and hide the version information from the error pages.
The error page looks like that now (and anyone can provoke it by sending wrong HTTP request very easily):
The question is really if it is enough? Or to be more precise:
Is disclosin... |
Recently we competed in the X-MAS 2019 CTF and many of the challenges included a proof of work (PoW) check to avoid Denial of Service (DoS) attacks against their servers. The most common was we were given a 6 character suffix and asked to find anything where the hash ended in that suffix:
Provide a hex string X such th... |
I have recently found out that a very common setup of Kubernetes for some use cases of access over TLS returns an invalid certificate with name Kubernetes Ingress Controller Fake Certificate. I.e. making it obvious to anyone that one is using Kubernetes.
So the question is not really so much about Kubernetes itself, bu... |
I am working on this application that can be deployed and run by anyone on their server. Most often, it is run as a web service. In our new version, we removed the possibility for admins to set and view a user´s new password in account management. (The old password was never visible as there was only a salted hash of i... |
In this whitepaper, they use a HTTP server history (see screenshot) as the basis for the codename of an identified attack, "Operation Wocao".
https://www.fox-it.com/en/news/whitepapers/operation-wocao-shining-a-light-on-one-of-chinas-hidden-hacking-groups/
The attackers (presumably APT20) were shown to be extremely co... |
Due to server configurations, our recaptcha secret key was publicly readable.
The key has been updated to a new one, but what is the actual impact of a malicious user getting a hold of the key?
Documentation is not clear on the impact
The secret key authorizes communication between your application backend and the reC... |
I am diving now into WebGoat, there's this little exercise in the "general" tab calle d "http proxies" which asks you to use zap/burp to intercept and modify a request, this is what is being us asked.
I understood what is being us asked to do, but I don't understand why if I change it manually it doesn't work, whereas... |
Thought I found DNS tunneling and but after a closer look it seems a bit more complex. Anyone seen this traffic before?
User starts their computer, launches firefox.exe, then they hit c.msn.com within the next second:
DNS Request Sample (171 total)
c-3sux78kvnkay76x24vx2egjyesvzuzoix2eius.g01.msn.com
c-3sux78kvnkay76x... |
Is there any way an untrusted third party who has access to content from a website over HTTPS can prove the authenticity of the data (i.e. that it was distributed by a server in possession of a specific TLS private key)? The way TLS works makes it such that a packet capture and copy of the master key is insufficient to... |
I'm debugging a TLS v1.3 client program, which failed to verify the signature in server's CertificateVerify, so I'm learning the procedures for verifying the signature from server's CertificateVerify handshake message.
Here's my understanding after reading RFC8446 and related articles, is there anything wrong or I'm m... |
I read that Mozilla uses its own trust certificate store but does "weak encryption" have anything to do with whether the browser trusts the certificate?
Has it got anything to do with the signature algorithm or signature hash algorithm?
Firefox Screenshot 1:
Firefox Screenshot 2:
Firefox Screenshot 3:
Chrome Screens... |
Is hashing a password multiple times and then encrypting a text with the hashed password more secure than hashing a password fewer times and encrypting the text multiple times recursively?
|
I've seen some sample "What would you like to be pentested?" page (I can't find or remember the exact source) where Cyber, Physical and Social were asked separately (among other areas like Wifi, Network, WebApp, etc). Let's assume the customer does not request for a Social Engineering test. Whether the test is on-site ... |
I'm facing an issue with rampant scraping and abuse on a website that costs me a good chunk of money to maintain. So, I have been looking to implement a few solutions, and apparently these solutions fingerprint the client in some form.
However, the premise of fingerprinting seems problematic to me. Since fingerprinting... |
About 2 weeks ago, I stumbled across a web application, that can be used by gyms to manage the information about their members. This includes data like the name, billing address, birth date, and medical history. The gym I am visiting (in Europe) is also using this application and so I took a closer look at the applicat... |
While testing a website for CORS misconfiguration, I have found that access-control-allow-origin header is being set dynamically based on host header in requests.
Is it safe or can be exploited?
Origin header is not getting validated.
allow-credential header is set to true
|
I have a very large cluster I am building of over 100 nodes, there are various types but I will use the Elasticsearch nodes as an example. I am encrypting mesh connections between nodes with TLS. For the smaller clusters this worked fine, but when generating a certificate for the larger cluster I ran into this issue:... |
My Glassswire app shows that avast has connected to a suspicious host "myexternalip"
|
Can anyone help me to find out what type of hash this is? I have it in this form:
{SHA}vv359MeXQ+GgsEFZpf0No4HXxCg=
But I don't think it is simply SHA1
I've tried to decode it with an sha1 decryptor on some websites, but that says it is not SHA1.
|
Our partners require such configuration as
vulnerability scanner A (well-known in CIS area)
SIEM B (leaders of the market)
And they should perform a scan of the network, get a report then forward it to the SIEM supposedly to challenge the findings against IOCs.
They insist to get the report into the SIEM -- we don'... |
When I verify a file signature I get the the following warning:
$ gpg --verify file.sig
gpg: Signature made So 01 Dez 2019 10:08:27 CET
gpg: using RSA key <Pierre's key ID>
gpg: Good signature from "Pierre <pierre@example.com>" [unknown]
gpg: WARNING: This key is not certified with a trusted signature!
g... |
My application is a (Windows) desktop application that is required to operate fully offline. To enable this, I have a local data cache that keeps a synced copy of server data.
How can I secure this local data from any access other than my software?
I know that for fully offline software, this is impossible; any encryp... |
Avast antivirus has an option for disabling "Enable hardware-assisted virtualization". If it's enabled, how is it a security issue?
|
I understand that everything is potentially an attack vector, but I would like to ask a practical question about UDP ports
Suppose you're pentesting some small organisation and you found a couple of open UDP ports. Some of them appear to be constantly open. On the first thought, perhaps the ports should be closed, sure... |
We have a tool running on WinPE (Windows PreInstallation Environment) which talks to a web service. A user enters his login credentials and the web service authenticates the user and returns an authentication token. I want to securely store this token on the system for sending this with subsequent requests.
DPAPI Looks... |
I designed a WiFi host whose password contains a truncated SHA256 hash of a password + the time it was set.
For example, “password2019-12-25-12:59” hashed to “acd2775f” which is
truncated to 8 digits (by the way, not the real hash).
The password changes every X minutes based on the time it was modified. So the hash... |
I've been in security for a while now but I'm relatively new to privacy. I've been studying differential privacy and its application to databases. However I'm still a little confused about where security and privacy intersects. Security of a database involves protecting the confidentiality, integrity, and availability ... |
As we know, any user can send IGMP to join a multicast group, which means an unauthirized user can capture any multicast packets in a traditional LAN.
I want to prevent the multicast packets from being snooped by unauthorized user, is there any technology for this?
I know IGMP snooping is a mechanism to analyze IGMP pr... |
The Mozilla Foundation has a "privacy browser" called Firefox Focus that is available for example iPhone (here). This browser has an always-on ad blocking function.
I was checking the third-party licenses used by this iPhone version (image shown below) and noticed that it includes the use of GCDWebServer.
The GitHub p... |
Today I make an archive file. Later I might want to send the archive file to somebody else, but when I send it, I want to be able to prove to the other person that I haven't changed anything in it after today.
Knowing that computer- and serverdates may be spoofed, can I do anything myself to assure this? Like includin... |
Related to "How to know whether a textfile has been edited or tampered with?", I wonder if it's possible to detect file tampering on the local system?
Typical threat model: the old "Hack" computer game. I want to write out saved game state and later, when the user continues their saved game, I want to confirm they have... |
I am trying to steal the admin cookie using an XSS attack for a challenge.
The vulnerable page is a page where a user can post a comment.
When I enter
<script>alert("ok")</script>
in the comment field, a pop-up window is displayed.
I then created a requestbin, and enter the following message in the comment field :
<sc... |
I can read many different attack vectors like swapping and porting but not sure if all those attacks are relevant about eSIM, can you please explain what are a security risk and attack vectors that will target eSIM?
|
I just received some obfuscated code and would like to de-obfuscate it. Could someone explain which encryption method is being used?
And how I could reverse it.
The code is:
On error resume next
Data="}èŝŸȠɩʽ̟ͪρФШҘӔղܦݷބߢࡳࣜ"
Container1=""
id="4d9fdb14-d482-4fc5-a910-9af261a17650"
random1=0
random2=0
do until random1=l... |
I've heard/read several pentesting stories where the pentesters clone RFID badges. I've also seen some articles saying RFID skimming is a negligibly small problem. The RFID skimming I'm talking about is where someone walks up to you to skim your card or "fires" a "skimming beam" from a distance, and not where you activ... |
For my personal research, I have to create a messaging app, but security is only important part of application, security from MITM (man in the middle attack), at device end, and at server level. (note: this will not end to end encryption, as I want to backup messages on server for cross-device access like telegram).
I... |
When keeping OpenPGP keys for daily use on a smartcard (a Yubikey, say), what are, from a security point of view, the advantages of keeping the master key offline as compared to simply keeping the master key pair on the card? (Of course, just like in the case of using subkeys, redundant encrypted offline backups of th... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.