instruction stringlengths 24 29.9k |
|---|
When generating a OTP, I know I can use either Authy or Google Auth, either can scan the code & generate the same OTP.
What about push notification? Are Duo/Okta verify and other apps interchangeable? I am trying to limit the number of apps on my mobile.
|
I need a openssl generated diffie-hellman params for work with ECDHE or DHE cipher suites on TLSv1.2 nginx server?
|
I am interested to know if anyone has experienced this, what was the response and more importantly, is there best practices to handle these situations?
My organization recently had a case where one of our many vendors was unfortunately hit by Ransomware (Ryuk). Some of their users have access to our systems (VPN users... |
Preloading is a primitive operation. You must preload for a year or more, and "be aware that inclusion in the preload list cannot easily be undone," according to the registration tool. Therefore, if there is ANY chance of an error, it is prudent NOT to preload, at least for awhile. During that time your website is wide... |
I am creating a secure network data transfer system, and would like to know if there are any obvious flaws in this scheme.
Secrets
The secret is a password that is known to both clients. This password is never transferred plaintext, nor is the PBKDF2 password hash.
Server side
The server never stores the password perma... |
I'm trying to brute force login on my domain using THC Hydra v9.1-dev. It is using an ASP.net form and some of the required post body parameters contain a colon : in them which is the separator used by Hydra. An example parameter: _ctl0:PlaceHolder:LoginName:txtLoginUsername=^USER^.
This makes hydra think that I have _... |
Browsers and standards bodies favor HSTS with Preload because it avoids ever sending an http request to a website that supports https. This is good, because cleartext http requests can be intercepted to set up Man in The Middle attacks.
But a number of websites explain that a centralized Preload list doesn't scale up w... |
In the case of social engineering attack vector is an email sent with a malicious attachment like XSL file, I am not really understanding where we will need Sandbox solution if we can just use CDR (content disarm and reconstruction) solution (in many cases much cheaper for organization)
|
I'm receiving a lot of requests like these
[server] zcat access*gz | grep 404 | awk '{print $1" "$7}' | sort | uniq -c | less
:
2 103.193.242.137 /MCLi.php
1 103.193.242.137 /Moxin.PHP
1 103.193.242.137 /MyAdmin/index.php
1 103.193.242.137 /MyAdmin/scripts/db___.init.php
1 103.193.242.137 ... |
Thinking of buying a used iPhone and MacBook. Probably an iPhone 7/8/X and MBP 2015. As a security conscious (many would say overly paranoid) person I'm considering the risks. I'm quite sure I'm not someone specifically targeted by state-sponsored hackers or anything like that.
What security risks would I face and how ... |
I have been doing 32bit buffer overflows for some time and I decided to try some 64bit overflows, to explore some more realistic scenarios. I have compiled my code with gcc -fno-stack-protector -z execstack -no-pie overflow.c -o Overflow.
Here is the code:
#include <stdio.h>
#include <string.h>
void function(char *str... |
I found a fake PayPal phishing website, and I want to shut it down, I have run my script that sends many requests to this website with randomize emails and password, but it is not fully shut it down.
When I refresh the website it takes like 10 sec to load, but it is still working, it seems like this website is powerfu... |
There are different ways to perform a MAC, but without doubt the most used and efficient in many cases is HMAC, this serves to verify that the message has not been altered. A hash such as sha-256, sha-512 or bcrypt is regularly used.
That is my first doubt. bcrypt never generates the same hash, how do I see if the hash... |
I have a python script that connects to google drive and upload some files automatically.
The first time the application runs, it asks for a google account to use in its behalf to upload files to that drive.
However, I had to configure a project for this application in google api, and then download the corresponding ... |
Today I was shopping for a New Years journal on my desktop and apparently other family members' devices started showing up ads for the same. I feel this could be because we are all on the same wifi. We do not share any email or social media accounts. I am confused about how to prevent this from happening in the future.... |
This is a theoretical question. I just watched a certain video in which the author apparently unmasks a chatbot AI that is likely trying to harvest data and spread influence in a cult-like manner on a given social network. The video is hosted on YouTube:
Who or What is Stephanie Lawson Stevens?
What really caught my at... |
Basically, I have a webapp which needs to check the validity of the user of an Android app. After completing the basic login flow with Facebook in the Android app, a Facebook access token is sent to the server where it is validated using the Graph API, something like this:
var url = "https://graph.facebook.com/debug_t... |
For example, if I lost my SIM card (and stopped using it for years), and someone found it years later (after being deactivated by the SIM providing company due to extended nonuse), would the person who found it still have to enter the PIN code? Say I moved countries and stopped using the number.
|
Objective:
Sending a forged Probe Request frame from one machine and capturing it on a second machine.
I have two codes running:
sender.py
interface = sys.argv[1]
dot11 = Dot11(addr1='ff:ff:ff:ff:ff:ff', addr2='11:11:11:11:11:11', addr3='ff:ff:ff:ff:ff:ff')
probeReq = Dot11ProbeReq()
dot11elt = Dot11Elt()
frame = Rad... |
Client wants to send them files using SFTP and they just shared the username and their public key.
My understanding is that they will either need to share the username and password OR a username and a private key - is that right?
|
I'm trying to implement a simple protocol to authenticate users and authorize them to access a certain web page/resource via a login form.
Please note that this is just something to use on my own and that it's just to get the basic idea of how such systems work.
My idea is to store the hash of a shared secret between S... |
While scanning my LAN with Angry IP Scanner, I found an ip @ that I didn't recognise 192.168.1.59:
IP Ping Hostname MAC Address MAC Vendor
192.168.1.10 0 ms DESKTOP-F126TH4 48:5F:99:46:XX:XX CloudTechnology /... |
While I was reading an article about proxy chaining
https://resources.infosecinstitute.com/proxy-chaining/
I've stumbled upon this paragraph
Even if you use proxy chaining you can’t be 100% anonymous. You could be traced on the basis of each proxy used to establish a connection. It just makes it a lot harder to tra... |
I'm on a website which have a program, there is a search input for keywords.
When I input & or < or > and search, it returns Got error 'empty (sub)expression' from regexp error and when I input $ or ^ or .* I get all keywords at once, which seem like its relying on REGEXP function from MySQL to match.
Ok, so I have tri... |
My website is wirten in Joomla. The provider turned it off saying it has been phished.
REQUIRES PHILIPPINES PROXY TO VIEW
IP Address: 178.32.141.220
Phishing Content:
hxxps://www .officinadelle11 .it /portal/onlinebanking/verify_success.php
hxxps://www .officinadelle11 .it /portal/onlinebanking/sign-in/index.php
Bra... |
I have generated a csr with key usage attributes and enhanced key usage attribute but when we sign with the computer template in Microsoft CA, it overwrites the attributes in the CSR, how do i maintain the attributes in csr while signing via microsoft CA ?
|
I currently use very much Ubuntu and Kali from the Debian family for penetration testing (Network and Apps) and I want to know if anybody has tested arch Linux or other distros for penetration testing.
If so where you able to download all the packages from kali into arch ?
|
I found a Django app running on http://test.com that is running on debug mode. After trying some wrong paths I got with the django error screen showing the stacktrace and the credentials used to access the DB.
But this DB is used on the LAN, so I can't access remotely.
Is there a way to bypass this restriction, or even... |
I am creating a simple application so a distributed team can access sensitive data. This application will have a database that will be inaccessible to the public internet inside a VPC with my cloud provider. It will also have a web application inside this VPC that can access this database and accept incoming traffic fr... |
One of our clients has an issue with a government security audit on one of their mobile applications.
The finding states that the application stores session cookies on the device in clear text format therefore on a rooted device it is theoretically possible for an attacker to steal the session cookie while it the sessi... |
I am building a web (also potentially mobile app) for a platform that allows plugins. We're using the OAuth2 Authorization Code grant type for third-party client plugins.
Which, if any, grant type should I use for our first party clients (i.e. our web/mobile apps)?
Currently, our users log in with an external service... |
Is this value just used to log in or is it used as a key for anything else later on? I see that the pm-srp code does make a point of keeping it around but it isn’t clear for what purpose, and some unofficial clients like Hydroxide don’t keep it at all.
|
Let me explain it with an example:
Consider that timestamp of today is 1262304000000 (2010-01-01 00:00:00.00) and you have a web page (or file) with content "AAA". Content on this page may change over time however, you know you'll need to somehow prove that the content of the page on timestamp 1262304000000 was exactly... |
Do the encrypt_and_digest() and decrypt_and_verify() methods in pycryptodome also perform the electronic signature process?
I have seen on the internet that the electronic signature consists of signing the message with my private key so that any entity can verify (with my public key) that it was I who sent that file.
B... |
Is there anyway to export a configuration profile from an IOS device that you have root on? So I have a device with an MDM profile with login credentials for a wifi network, VPN, and email authentication certificates. Is there anyway to export these certificates and access the 802.1x wifi password? If I cannot individu... |
Just wanted to know if this was an accurate way of determining how long it would take someone with an 8GB GPU to derive 1 million keys using some assumed parameters below:
Time per derivation...........: 3.5 seconds
Memory required per derivation: 128MB
GPU Max Memory................: 8GB
So, 128MB = 0.125GB. Max deri... |
I'm trying to protect my software against cracking. Protection against cracking is crucial before listing the product on market.
Info about the software:
Built using .NET C# (Framework 4.5.2)
WinForms
32 bit
I have made a several protection layers:
Obfuscation, Renaming, anti-debugging
Encrypted communications betw... |
I am trying to write a DLL injector to perform a DLL injector on a calculator process.
I wrote the DLL injector program in C and the DLL but the injector doesn't inject the DLL or any other DLL (I tried to take some random windows DLL that the calculator doesn't use).
#include <Windows.h>
#include <stdio.h>
int main()... |
I recently made a very basic TCP client/server system in C++. I got the client and server running between two computers connected to my private Wi-Fi. Since a private Wi-Fi is encrypted, does that protect the TCP server-client communication in any way?
How about connecting it over WAN ? In that case, cryptography would... |
As far as I know, HTTPS URLs are encrypted (correct me if I'm wrong). There was a data leak recently and in one article about the leak I saw this picture:
If HTTPS URLs are encrypted then how did the ISP log the full URL (notice "fw-url")?
|
A company's asked me to submit a scan of my passport claiming KYC (Know Your Customer) and AML (Anti-money Laundering) purposes. In times of daily data breaches, what can we ask for a company to be more transparent as to how they protect their clients' PII (personally identifiable information)? For example, by showing ... |
Having read up on a bunch of different SRP implementations I understand that the session ID is generally not random, although it’s missing from the documented SRP write up they did. Anyone know how theirs work? It’s 32 hex characters long.
|
I write Python scripts for clients to "algo trade" at currency/stock exchange websites. My clients are typically running my scripts on traditional personal desktop PC's. Usually using these PCs for web browsing activities as well. The environment is always Linux; usually Debian. In the industry; Python is quite sta... |
I recently came across this comment written in a journal article.
Lastly, medical apparatus are expected to use Dynamic Host Configuration Protocol (DHCP) for the allocation of their IP addresses and even worst [sic] use non-standard ports for their communication creating an unstable environment of information that... |
It's pretty clear that GPG signing and GitHub ssh keys serve different purposes
But what is the use of GPG signing commits? Is it just that you know that commit abcd1234 was signed by Alice's key? Is there anything else that GPG signing a commit is useful for?
|
For the samesite cookie attribute I'm not clear on if I set a cookie with domain .example.com from sub.example.com with the samesite attribute, if it will be considered the same site as other.example.com.
Cookie behavior is different than CORS and I'm having trouble finding a resource that definitively clarifies this.
|
Context: I had a virus on my WordPress website server that injected itself into every functions.php file on the server across two different sites. After removing the heavily obfuscated virus code I decoded it. (I won't bore you with process details.) The resulting code was a simple backdoor that let the hackers execute... |
Let's say you're in a public café, or conference, where you trust your device won't be stolen if you go to the bathroom for 5 minutes, but you don't trust it might not be tampered with.
What are the potential security risks I might run into here, assuming I lock/log off my laptop's (windows / mac / linux) user session,... |
I've been writing up a guide to OAuth 2.0, OpenID Connect, and Identity Server 4 mostly for my own learning, drawing on several sources such as OAuth2 In Action, OAuth 2.0 Simplified, and CISSP: A Comprehensive Beginners Guide on the Information Systems Security, but I'm having trouble finding explicit definitions of d... |
I am using crytsetup with LUKS to encrypt a data drive, separate to the system drive, under Ubuntu 16.04. The issue I am facing is that this system will also be required to automatically start itself up in the event of power loss. The other constraint is that this system can not be connected to a network.
Essentially ... |
I realized that my bank handles sensitive information in the web console log, so my concern is if any browser extension could read the log?
|
And if so, what protections are available against this kind of thing?
|
Suppose I symmetrically encrypt a file with a passphrase using GNU Privacy Guard and send it to a friend. I use the latest version and all the defaults, so AES-128 encryption is used, with the salt and s2k_count used for the password derivation function automatically generated.
I then tell my friend the passphrase and ... |
Assume we have only access to the traffic between two module (Hardware, Software, ...) and These modules communicate with SSL (PSK).
Is it possible to assess AES encryption of this traffic?
some features like key length, AES cypher mode or any other important parameter
|
Just listened to a bit of the Darknet Diaries podcast episode on NotPetya. It’s insane just the damage it was able to cause even if it was only able to infect one machine initially. Which got me wondering: how could a similar large-scale attack happened?
Then I thought about cell towers. Our phones blindly connect to ... |
From what I can tell there were two main TMP files present on the infected USB stick. The smaller of the two would run first and hook various functions related to viewing files so as to hide the LNK and TMP files.
While this was happening would it not raise suspicions? Someone would view the USB stick, see the six fi... |
Certificate authentication on https has always been one of my huge knowledge gaps ,and was trying to fill it today.
I have made some progress on the client side certificate authentication but however there's some fundamental question that can't get my head around.
I have worked with third parties that use to send the c... |
I use the free version of proton VPN because it has such a nice interface. From my understanding, when I connect to one of their VPNs located in the US, my information passes through an encrypted tunnel visible to my ISP, then to an entry node, then to a relay node, then to an exit node, then to where my internet activ... |
For example, my website has Email/Password login and the "sign in with Google" button. If a user creates an account with their email and a password, then decides to sign in using the "sign in with Google" button, but using the same email as their email/password account, should we let them into their account? Or should ... |
I'm planning to start a distributed crawler in order to avoid common limitations imposed by servers/CDN like rate limit, region filter, and others.
My idea is to have a central server and multiple agents that will run on different networks. These agents will be SOCKS5 servers. The central server will round-robin the re... |
I’ve been thinking about P2P systems using asymmetric keys and wondering if there is anyway to recover an identity in the event it was compromised using some kind of web-of-trust.
This seems to be a large issue compared to a regular system (using a central authority) that can remove the intruder's access and restore c... |
I wrote an implementation of a non-interactive zero-knowledge proof system as outline in this research paper. As far as I can tell, it functions flawlessly as intended with text secrets such as authentication passwords.
# USER REGISTRATION:
# CLIENT-SIDE
client_zk = ZKProof.new(bits=256, curve_name="secp256k1")
... |
This is a duplicate of a stack overflow question, since it might apply more to security and authentication best practices.
I'm working on auth between a Chrome Extension, Google Cloud Platform, and trying to send the id_token JWT to an AWS server to retrieve user data (and/or establish a session?).
My question is this ... |
What is the difference between a digital certificate and a digital signature?
Read on the internet that the digital signature is the result of encrypting with a private key, the 'hash' of the message to be sent. As for the digital certificate it is not very clear to me.
|
In TOTP implementations, it's always suggested that you give your users recovery codes. Should I treat these like tokens? Display them once and hash them?
If so, I'd love to know why. If not, I'm curious too.
|
Hopefully this question won't come across too closely to a which product is best as that is not my intention.
I am moving into a larger property and I would like to setup some home security now i'm not 100% sure on I should be aware of and how to possibly mitigate being broken into.
I also do not know the area much at ... |
There is this Web App which uses cloudflare and to bypass certain things I had to find a way to access the actual web server directly. I tried numerous things and finally I think I have found the actual server's IP but seems like direct access to IP is blocked as am greeted with this error.
Error 1003 Ray ID:
Direct IP... |
My company has a 'bring your own device' policy. You connect your device to the WiFi, and then open a citrix environment through a web portal. Basically, everything inside the citrix env is company-software/email. Outside is your own software/mail/browser.
I know that anything I do online outside of the citrix environm... |
I've been using BitWarden as my main password keeper, would like to ask if it's safe? I know that everything is not 100% safe but still want to know if they are worth it.
All my passwords are different beside some accounts password.
I know there is also keepass but can't really be annoyed to backup it each time because... |
I reported a flaw to the security team and they changed the UIDs from regular integers to hash kind of a thing. Like this, XXXX-XXXX-and-so-on
I still want to try and bypass things but I don't understand what kind of hashing is this? I have seen a lot of applications using this kind of hash for tokens, UIDs etc. Charac... |
What possible risks/attack vectors could be introduced be allowing my server application to make outbound calls to a 3rd party REST API? The 3rd party REST API is off premises and owned and operated by the 3rd party.
In order to clarify and limit scope let's just focus on attacks that result in impact on our business ... |
Recently, when staying in a rented apartment, I signed in to the YouTube app on the smart TV by entering a code using chrome on my tablet to pair them. I was planning to log out before I vacated the apartment but forgot to do so.
What are the security implementations of this? I am not bothered by people seeing my vie... |
There is a requirement for an unattended, publicly-accessible machine that I have to only allow company-approved USB devices (e.g., USB mass storage, keyboard, mouse, Bluetooth, etc.,) and block all the rest (non-approved).
Even though PID, VID, serial number are unique identifiers to USB devices, but, if somebody know... |
I am about to go travelling to some high risk countries where corrupt officials will most likely try to go through my laptop and external HDD.
I am using Linux Mint and LUKS. Could someone please tell me based on these pictures whether I have encrypted them both properly, this includes the cache (or whatever it is call... |
Searched around and couldn't find a similar question.
I've gotten tired of waiting for an 2FA SMS to come every time I check my email. So I got to setting up an app similar to say Google Authentication on my desktop, so that when I get prompted for a code I can just copy/paste from my toolbar.
I can see how this basica... |
A similar question has been asked here:
Can hackers detect my operating system?
My question is, if malicious file has been downloaded off of a secure 3rd party website (i.e. not owned/controlled by the malware writer), would this malware be able to detect which operating system it has been downloaded to? Or would the m... |
If you have multiple products/sites under a common domain, what are the advantages and disadvantages, from user convenience to security, of having a common login page? For example, this site uses https://security.stackexchange.com/users/login for login. Google uses accounts.google.com and Microsoft uses login.live.com.... |
I noticed this while testing SNI-based HTTPS filtering for fun. My test was to block mail.yahoo.com, but allow other yahoo.com services. Here are my tests using Chrome:
Access mail.yahoo.com by entering the full URL https://mail.yahoo.com: BLOCKED
Access mail.yahoo.com by logging into my Yahoo account via https://yaho... |
If the intention of attacker is to execute an arbitrary client side script in the context of a web application, is XSS the only possible attack other than compromising the server with an RCE or a sub-resource supply chain attack?
XSS is Cross Site Scripting - Be it reflected, persistent or DOM based.
A sub-resource ... |
DNS is centralized across several servers to stop the following:
Querying the IP for the domain name.
Continuously querying the domain name to do #1.
Changing an entry to the database.
What if you:
Use the same servers as distributors of a file, each holding a private key.
The file includes a line for each entry in ... |
Why I believe this question is not a duplicate:
There are multiple questions dealing with the exploitation of a locked computer on this site, but most of the answers are focused on exploiting a non-hardened system in default configuration. I believe that in recent years, with major advances in encryption and hardware+s... |
I'm learning about security, and it seems that all of the security problems I have seen come from input from malicious actors.
I was told that it's possible to check for the existence of bugs in a program, but not possible to check that a program doesn't have any bugs. Following from this, this means that it's not poss... |
What is the security risk of not disabling TLS v1.1/.2 ?
I have multiple websites on Cloudflare
|
So I booted up two windows 7 64bit sp1 versions in virtualbox and shared their network and the operating systems are vulnerable to the SMB exploit that the wannacry ransomware is using. The Issue is that when I'm running wireshark I don't see any attempts of the SMB exploit on the other machine. Is it because wannacry ... |
I'm running https://ngrok.com/ on Windows 10 pro with a custom app made on Node server running locally (can't be Linux) for a test suite that uses both web and desktop integrated. So I'm basically hosting a server on the machine for another internal machine to access via the internet (there is no other way to solve the... |
I'm working on improving the security of my own system by mitigating the chance sensitive information, (e.g. encryption keys) stored in RAM, are inadvertently written to disk. As of now I know of three common ways this can occur and how they could be mitigated:
The contents of RAM are copied to hiberfil.sys when Windo... |
I am looking for best practice for username/password login.
People have different views for client side hashing on password.
From Google's recommendation
https://cloud.google.com/solutions/modern-password-security-for-system-designers.pdf
The client side hashing should be implemented as below:
Have the client computer... |
I’m willing to create a system of transferable documents (identified by it’s ID) whose author can transfer his ownership of that document to another person (identified by his/her ID).
For example:
Alice; owner of document 1.
Alice transfers his ownership of that document to Bob.
Now: Bob is owner of document 1.
Alice ... |
We're a company selling embedded devices. Our devices use u-boot & Linux, both being GPL and therefore we have to release the sourcecode as used to build our binary.
We're in the process of implementing more security measures (both to increase reliability as well as protection against IP theft), so of cause encryption ... |
We are currently evaluating which authorization type to use for our production AppSync APIs.
As per AWS docs(https://docs.aws.amazon.com/appsync/latest/devguide/security.html, https://aws.amazon.com/blogs/mobile/using-multiple-authorization-types-with-aws-appsync-graphql-apis/ ), AppSync supports multiple authorizatio... |
UPDATE: Upon further research, I discovered a library that appears to meet my needs, especially with regard to the chunked aspect. Rather than "roll my own", I would be better served to use this well-established library:
https://github.com/defuse/php-encryption
I have a need to encrypt large files (up to 2GB), while a... |
From my experience, 99%[citation needed] of the time, when you try to log on to a website, and you mistype your password, you get some indication that the login could not proceed due to incorrect information and the password field is cleared out. Usually the username field remains filled in, so you simply have to retyp... |
What's the likelihood of a laptop being compromised when it comes directly from a trusted computer store or a large, known computer technology company? Would there be any liability if malware or rookit was discovered?
What checks / scans would you perform if you wanted to be as sure as possible that it hasn't been comp... |
With SSH, most of my servers use ed25519 (the twisted Edwards variant EC) for authentication.
I was wondering, after authentication with ed25519, does SSH protocol 2 simple use ephemeral/ephemeral ECDH over curve25519 for the session key?
I can't see what else it's doing unless it converts the ed25519 x,y co-ordinates ... |
The description from Mozilla warns that require-sri-for is obsolete and may be removed at any time.
The feature seems useful, especially for large websites where it's likely that a developer may forget to include an integrity attribute.
Is there a specific reason this has been deprecated? Is there an alternative featur... |
My host machine is running Windows 10. I've installed VirtualBox and use it to run an Ubuntu VM. Inside the VM I use Firefox to do all of my web browsing that doesn't involve entering sensitive data like important passwords, financial data or government id info.
I use another separate Ubuntu VM for just the followin... |
So, imagine that a vulnerable app provides a login interface. This login sends the user's credentials to the App's server to authenticate the user. However this is done via HTTP, therefore not secure.
If I were inside the user's LAN network, I could easily perform a MITM and sniff the traffic and therefore the unencry... |
I set up an external drive for data backup (an SD card inside my laptop card slot). In addition, I connect with a cloud drive for offsite backup (an app that I run only when syncing files).
I always sign in and use my laptop as a 'standard' user. My external drive is set for UAC 'read' privilege only.
I then set my d... |
I know that you can pass cookies in Wfuzz by using multiple -b parameters like so: wfuzz -w /path/to/wordlist -b cookie1=foo -b cookie2=bar http://example.com/FUZZ
but I am wondering if you can pass a list of cookies, instead of doing them one by one, which takes forever and is ineffecient. I have looked everywhere for... |
gpg has some preset default settings, which I assume were selected as a compromise between speed and security. I understand that these are good enough for most people.
But, in a situation where speed / performance was not an issue, what defaults could be changed, to make gpg use stronger parameters, and use even strong... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.