instruction stringlengths 24 29.9k |
|---|
I am aware that Format String Attacks work by having a vulnerable function which allows the user to read values from the stack using %x and write by using %n.
Since one of the goals of a Format String Attack can be to overwrite the address of a function in the Global Offset Table, I was wondering does StackGuard preve... |
Our team has been building a custom distributed authentication mechanism, and I wanted to ask if this approach is actually viable. The approach is a dumbed down version of Jason Web Token (JWT). Assuming the user has identified himself to an authentication server, the server creates this payload:
{
"iss": issuer (the... |
I'm debugging some edits I made to hostapd which requires me to capture some beacon frames, but I can only capture them with airodump-ng and not with wireshark.
I have a Panda PAU09 adapter running on Kali.
Method #1:
I fire up airmon-ng and put the Panda into monitor mode. Next I run airodump-ng to find the BSSID and ... |
I bought a used laptop and I'm concerned about the integrity of the firmware on the hardware and bios. I realize these types of malware are very rare.
1) My question is that if I assume that the BIOS or SSD or NIC firmware is indeed compromised from the previous owner, what are some of security features that something ... |
Currently I have a Node JS project that uses the Spotify API. The project displays the users top played artists and tracks. I am following the Authorization Code Flow to obtain the access token. This access token will be used to query certain endpoints to obtain a JSON response of the data that will be used for my proj... |
This question was prompted by a recent visit to a certain site that provides (apparently for GDPR reasons) a table with all of your data, including part of your hashed password. I understand this poses no problem in this case (as you would have to be logged in to see this table), but what if this data was made public?
... |
They say that the last Tor node presents all the information in clear.
If I want to send some sensitive information by Tor, could you encrypt it, and in this way be encrypted by both the Tor nodes, and by my encryption?
Is this possible?
|
My goal is to develop a piece of software which is illegal in my country. Obviously I don't want anyone to be able to trace the code back to me or prove that I developed it after deployment.
What precautions would be needed? Which pitfalls need to be avoided? Is there a tutorial?
I would suspect that full drive encrypt... |
Before you immediately comment "you can't trust the client!", please read the whole question.
I've been reading about how to prevent XSS attacks lately, and everything I've found says that the server should sanitize the data that will be put into the webpage. This would basically look like addToDatabase(filter(userResp... |
I am working to set up OpenVPN access to my home network. To do this, I had to contact my ISP, because they had the necessary port blocked at the Gateway/Router that I do not have access to.
In my house, I have a Google WiFi system.
They put the provided Gateway in Bridge mode, instead of Router mode. This solved my pr... |
Given the plethora of random password generators (RPG) available, I'd like to do some black box testing on some.
Let's take https://passwordsgenerator.net/ for example. Assuming the whole generator is a black box with 0 information about how the passwords are generated (can't even view the .js stuff), and all we have i... |
When looking at entitlements on pycharm CE for macOS, it shows many serious security exceptions. Here are its entitlements:
<dict>
<key>com.apple.security.cs.allow-jit</key>
<true/>
<key>com.apple.security.cs.allow-unsigned-executable-memory</key>
<true/>
<key>com.apple.security.... |
Given a setup where we have nginx sat in a DMZ serving static content, forwarding (REST/WS) requests through a firewall to tomcat running on a server where other applications are also running:
YOU <> [FW:443] <> (NGINX) <> [FW:8443] <> (TOMCAT)
( APP1 )
... |
When a mobile app is sending HTTPS requests, it verifies the server certificate against some kind of certificate store. My question is, would that certificate store be provided by the phone's OS, or would it be packed with the app?
I know I can do certificate pinning, but first I want to know what's the default.
If the... |
If we user both: desktop VPN client + chrome VPN extension
or
if we use just browser's vpn extension,
does ISP see which website/link we visit?
|
I assume the state is not 4Gb but that there's a 32bit counter and it's mixing like in chacha. What's the point of creating those 4Gb if there's no entropy to do so. What I mean is that if the first 1024 bits are the same, so would the rest of the 4Gb, so why even offer the option.
|
Exposing primary keys is bad practice. How should I expose UUID or BIGSERIAL Primary Keys to clients — hashing, encoding, encrypting? For integers there are libraries like hashids, what about UUID?
|
How do you prevent someone from doing an TCP reset attack between client and host without having acess to host?
I am trying to solve a CTF for fun and learning purposes.
In one of the challenges I establish a connection with a server that starts sending me TCP packages, but I am interupted by a third party that sends ... |
Keepassx lets you decide how many transformations rounds need to be run in order to unlock your Keepass database. In my version of Keepassx (2.0.3) the max value seems to be 999,999,999. With that setting it takes my laptop about 22 seconds to unlock the database. I imagine that a beefy workstation would take less t... |
I selfhost my mail server and have earlier downloaded Spamassassin corpus from http://artinvoice.hu/spam to have a head start on the bayes learning.
The artinvoice.hu site is down and has been for weeks.
Are there any known good alternatives?
|
I've read that pre-shared keys (PSKs) are symmetric keys shared in advance among communicating parties but have found no explanation as to how the TLS client and server agree upon the value of the PSK. How is this done?
|
Just before Christmas I received the following message in one of my GMail accounts:
Sign-in attempt was blocked
********@gmail.com [redacted by me]
Someone just used your password to try to sign into your account. Google blocked them, but you should check what happened.
I signed into that account and looked at the... |
I posted a question similar to this one on Stack Overflow, but that has not produced any answers so far, so I'm hoping someone here will be able to help me out.
Somewhat simplified, I'm trying to do a POST request via https using Postman (later I'm hoping to reproduce it in PL/SQL under Oracle using UTL_HTTP), but I'm... |
I'm looking into mutual TLS authentication for a B2B API. Is it possible to use mutual TLS authentication using X.509 certificates while relying on Public CAs?
I see that some Public CAs (from CA/Browser Forum) offer signed "client authentication" certificates. What fields can I rely on in this case? Would I be able to... |
Just reviewing some logs and I am seeing local scans to several local IP addresses on port 137 within my network. The source IP however is the broadcast IP of the VLAN (.255).
I have checked the logs and I can see the broadcast IP trying to initiate udp 137 connections on several other IP addresses of the same subnet.... |
Veracode is reporting a security issue on a piece of code which seems pretty innocuous to me. The code is built with python/Django and the line in question is:
return render(request, 'core/create-user.html', context)
The render shortcut for django is pretty standard and it expects a request object, name of template a... |
I have the following code in my frontend javascript which basically reads the csrf cookie value and sets that in the ajax calls done via jquery.
var csrftoken = self.getCookie('csrftoken');
xhr.setRequestHeader("X-CSRFToken", csrftoken);
This seems to be a very standard technique and yet Veracode reports it as... |
Is it possible to break a Windows encrypted SAM file where passwords are stored if you have the physical drive offline?
Thanks
|
I found CRLF injection on a site but it doesn't has any login, session or anything or that sort. I wonder if there's any way to prove impact of CRLF injection here.
Something that I think can be done is, an attacker can craft the payload in such a way that it would respond with Location header and user would be redirec... |
The following questions regard linux processes with a stack that grows downwards from the end of the process memory.
If I have a buffer overflow on the heap with unlimited size, are there any protection against me overwriting the entire process memory until reaching the stack and overwriting it?
Same question for buff... |
I am trying to write an API that allows the user to reset their password via their email.
I have been following https://www.smashingmagazine.com/2017/11/safe-password-resets-with-json-web-tokens/, but I am a bit confused. They are sending the email and user_id in the payload as JSON, but they never actually need this ... |
I'm working on an Interactive Fiction story in Undum, which is a fully client-side JS/HTML5 framework. I've been reading about Content Security Policy lately (after looking up what a crypto nonce is) and began to wonder if any such thing would be important for code that's entirely client-side. I'd apply some basic CS... |
I'm building an SPA app and I have to use an access token to make requests to an API. The most common way to store the JSON Web Tokens is to use localStorage, but I have always thought that was a bad idea because of XSS attacks or a user could be socially engineered to go to the console, get the token and give it away.... |
Can this method of encryption prevent bruteforce attacks?
If I had a hypothetical table (or function) where every grammatically valid sentence (limited to some number of words) was given an associated number, e.g:
"Good morning, how are you." = 3283
"Today is a nice day." = 2183
Then added a number (as a key), e.g:
32... |
There must be a handy way to securely store, say, GCP key.json somewhere on my machine and access it whenever I'm deploying stuff. Backup to cloud is a must. The Apple's Keychain access seems troublesome. Is there a better solution?
|
Proprietary software developed by a (smallish) company is stored in the company's GitHub private repository. For work, software engineers are requested to create company-specific GitHub account bound to their work email address.
But access to the private repository can be granted or revoked independently from the "acco... |
I've decided to use Argon2id for storing users' passwords in my database.
I have two questions:
Because there are several input parameters (parallelism, iterations etc.) that can influence the output result so I'm wondering if it's a good idea to store those parameters in the database e.g. in a column next to the sto... |
I have been using LastPass for a while and I have just seen an option to generate an exposure report. By its output, I assume it checks various sources containing credentials dumps from hacked web applications for matches to my username / e-mail.
The output looks like the following:
{date 1}
somedomain.com
{date 2}
s... |
A company has several remote branch offices located in relatively dangerous places, such as Iraq, and I'm looking into strategies to secure the SAN in the event of theft or looting. The data is commercially sensitive and contains intellectual property. Some of these offices are mobile, moving locations every couple of ... |
We are currently trying to enhance the security posture of our company, and this means changing how some IT personnel work.
Put precisely, our IT helpdesk currently have 2 separate accounts: 1 for normal day-to-day usage (mails, internet, etc...), and 1 for administrative tasks. The latter is a privileged account havi... |
Recently, we migrated from Windows 7 to Windows 10 and during that migration, we progressively ran into some issues with our NAS device. To be more precise, we progressively noticed some tcp socket flooding on it while client computers were upgraded to Windows 10. We suspect that our NAS has some difficulties with NTLM... |
I received a message with the famous link My-love co via Whatsapp and I never clicked on the link; I blocked the contact and deleted the message containing it; such a link was reported as infected by the newspapers.
Despite the fact that I didn't click on it, a strange icon with the profile picture and the name of the ... |
The a=crypto attribute in RFC 4568 has a separate section 9.2. for SRTP "Crypto" Attribute Grammar. What it basically includes is a list of attribute values required for encrypting media (crypto suite, method, session params, keys, MKI...).
However, DTLS-SRTP also does the same (RFC 5764 - SRTP Extension for DTLS). So... |
I am a junior web developer. All I know is mostly about web development. I have no skills and knowledge about system security and know little about Linux.
I work in a company which is developing some embedded product. In the R&D department, some developers built a build-server for development. They make our own Docker ... |
I am completely new to cryptography but have been trying to make myself familiar with the concepts and applications. I have a project where I believe cryptography to be beneficial.
Project Info:
DB = MySQL 5.6
Engine = InnoDB
My application will reside on an intranet web server behind a network firewall with a very sma... |
I have almost 0 knowledge of IoT, their protocols and usual device constraints. I had a discussion today with someone that has a fair amount of IoT experience and we were discussing some security related issues and the establishment of a shared key came up. I assumed that Diffie-Hellman would be used but this person se... |
I am unsure about how extensions are handled in TLS v1.2.
During the handshake, the client is able to add some extensions during ClientHello. As far I understood, the server can pick arbitrary subsets from this list in ServerHello similar to picking the cipher suite, which the client provided during ClientHello. Is t... |
I'm developing a solution for secure chat over instant messaging, here is the scenario:
I need to encrypt my message then send it on {Whatsapp, telegram, Wechat,...}, I don't trust any software above, so I use an app on my cellphone to encrypt/decrypt messages, basically it works like a translator.
However, the first i... |
Until about a year ago, I was working for one of the big tech giants. During my time there, I noticed that the IT department would do a MITM attack on any website that employees access. i.e. if you opened GMail and Facebook, and you'd click the lock button on Chrome, you'd see that the certificate is a custom certifica... |
I'm working on a flask application which requires some authentication but not on every endpoint.
I use this piece of code to exclude certain endpoints from my authentication handler.
if request.path in NO_AUTH_PATHS or (re.match(r'/dashboard/.*', request.path) is not None):
return None
I then though what would... |
I have installed a VPN on my computer via OpenVPN and a vpnbook.com French server. When activated, IP sites correctly locate me in France (I am currently on holiday in another European country), yet some websites will still "guess" that I am not actually in France. One specific case is a TV replay website that will tel... |
I was trying to practice with meterpreter, so I used the overflow ms17_010_eternalblue and as a payload windows/meterpreter/reverse_https but I am unable to make this payload to work properly.
1st target: win2008r2 (10.0.0.6)
2nd target: win7 (10.0.0.7)
Both without firewall, AV, connectivity is LAN (same adapter) as t... |
Everyone says a computer virus replicates/attaches itself to another host file. This concept is not clear to me. I have read many articles but unable to understand how.
Say, virus V1 is the original virus. It has a payload saying "Hello World".
Two machines (M1 and M2) are available, each with 3 files.
At first, V1 is... |
I am currently trying to solve an exercise where I should look at a TLS 1.2 handshake trace while having access to pre and both randoms (server random and client random).
In order to decrypt application data, I need to rebuild the master key.
But I am struggling with finding the section where it is negotiated how this... |
The site in question is the UK regulator for companies at https://ewf.companieshouse.gov.uk. Online access to a company on this site enables the user to file/change various critical things on behalf of the company including the name, address, owners, directors, annual accounts, etc. The public records that these genera... |
I'm using webcrypto, not PGP/GPG.
I would like to use a key pair to create a "subkey" that is authorized by my primary key in a way anyone can publicly verify so I don't need to expose the primary key's private component to any web-facing systems.
My idea is to:
primary key signs a hash of subkeys public component
the... |
I am building a web site that provides user login. For that, I am currently researching good strategies for dealing with authentication.
How I'm doing it right now
My current concept is modeled after what seems to be the common consensus right now. Passwords are salted with 64 bytes from /dev/urandom and then hashed wi... |
I manage an application that connects to various servers using a client-specific keypair. We have around 70 customers; all but one can connect to our FTP server (for SCP) after first accepting the RSA fingerprint (which hasn't changed in ~5 years).
To illustrate this behavior, I'm trying to SCP to the server every 15 m... |
I want to crack an 8 character password, but I know this password doesn't contain more than 4 symbols, 4 uppercase letters, 4 lowercase letters and 4 numbers, and it contains at least 2 symbols, 2 uppercase letters, 2 lowercase letters and 2 numbers.
The character set I'm using is 94 (brute-force) characters long. My P... |
I found the following strange HTTP request apparently emanating from binaryedge.ninja:
min-li-ustx-12-13-65991-x-prod.binaryedge.ninja - - [05/Jan/2020:07:18:48 -0500] "GET / HTTP/1.0" 302 212 "-" "-"
min-extra-grab-108-ustx-prod.binaryedge.ninja - - [05/Jan/2020:07:18:52 -0500] "GET / HTTP/1.0" 302 212 "-" "-"
min-... |
When attempting to verify google server's certificate chain using openssl, I am getting error.
Extract google's server and intermediate certificates:
$ echo | openssl s_client -showcerts -connect www.google.com:443 | sed
-ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' > /tmp/server_certs.crt
Extract google's root ... |
I need to photograph an image containing a steganographically hidden message, then decode the stego content from the photograph without recourse to the original image data. Are there any steganography algorithms that would make the task more reliable?
Note: I tried the Least Significant Bit (LSB) method, but when I pro... |
I am currently trying to perform a MitM attack on my home wireless network to get a better understanding on how this attack works. I can successfully perform this attack on a NAT network on some virtual machines but it will not work on my home wireless network with an external WiFi adapter. More specifically, the targe... |
I have been looking at OWASP and other forms of checklists on testing web applications. One of the best practices is to ensure session IDs generated are sufficiently random and unpredictable.
Assuming that I am a corporate end user without having permissions to install software on my laptop, to test the security of a w... |
While trying to solve old ctf task (https://blog.frizn.fr/plaidctf-2013/pwn-400-servr) I've encountered a situation which I don't understand.
TLTR
After escalating process privileges my exploit invokes system("/bin/sh"). The shell gets spawned, but after first command (which gets executed as root) kernel panics.
Long ... |
I keep on receiving email which is intend to be received by a gmail id similar to be mine, with no dots(.) in gmail id of other party.
For example : my email id is john.grisham@gmail.com
the inbox of above email ids, get emails intended to be received by johngrisham@gmail.com
Question 1: The other party will also be r... |
I am performing some research on IoT test tools and came across the HackRF One which can transmit and receive from 1 MHz to 6 GHz. I therefore think that it can analyze many protocols, but I cannot find a list of them anywhere. Can it for example analyze (and exploit) Zigbee, Z-Wave, LoRaWAN, RFID and NFC? Why is there... |
I'm building a fairly simple web application at the moment but because I have plans on turning this into sort of a multi-project portfolio app, I've decided to decouple the back-end and the front-end. That way I can easily integrate my other projects into this front-end.
At the moment I have a public GET route that any... |
A strict interpretation of that rule would seem to prohibit any non-payment related web browsing by PCs that are used to transmit card details to a payment processor, and perhaps also prohibit web browsing by any PCs on the same LAN as a card processing PC.
However, it appears that rule has been interpreted by others... |
After reading JSON Web Encryption (JWE) and making a Node JS JWE POC demonstrating key mode using Key Encryption. I'm a bit confused as to how to validate that the sender of the message was in fact, the actual sender (not a man-in-the-middle with access to the public key).
With PGP, public keys are exchanged, and the m... |
From an information security aspect, is there a difference between saying "read-only" or "write-protected" storage/memory?
Is there a chance that a read-only memory would not be write-protected at the same time?
In addition, is the OTP (one-Time-Programmable) memories better described as write-protected memories or as... |
There is a website which I want to register for but it is a internship/job-seeking website and thus on registration some VERY sensitive data is required.
When registering Firefox alerted me that the site was only HTTP, so I tried prefixing https:// and the page doesn't exist. I contacted the site administrator to ask t... |
I remember a security measure I've seen on a few sites in the past against phishing, but I don't know what it's called. When the user logs in, or just inputs their username, the site shows some kind of secret word / phrase / drawing. That word / phrase / drawing is something the user always sees, so it's proof for them... |
I am using msfvenom to backdoor an Android apk. It is supposed that msfvenom adds extra permissions to original AndroidManifest:
[*] Poisoning the manifest with meterpreter permissions..
[*] Adding <uses-permission android:name="android.permission.READ_CONTACTS"/>
[*] Adding <uses-permission android:name="android.permi... |
I am having trouble understanding the point of EAP.
EAP is an authentication framework, which defines several TLS based methods and encapsulations like EAP-TLS, EAP-TTLS and PEAP. These all require the server/authenticator to have a certificate (EAP-TLS require the client/supplicant to have it too).
TLS provides auth... |
In some Java code that I'm reading, I stumbled over the following encryption algorithms passed to the Cipher.getInstance(...) method:
AES/CBC/PKCS5Padding
DESede/ECB/PKCS5Padding
RSA/ECB/PKCS1Padding
Note: In the Java model, the first substring represents the cipher, the second the mode of operation, and the third th... |
I am trying to understand how DRM works under the hood. There doesn't seem to be much information about it on the web so I figured I would ask here.
After some attempted research, I found it extremely difficult to find any information regarding how Widevine or FairPlay DRM actually works. There is some general informa... |
I have a c program that gets the router IP and netmask and puts it into a text file in the format of 192.168.1.1/24. When I issue the nmap scan command with the target text file I get the unable to split netmask from target expression error.
This should work... issuing the nmap command with the ip/mask specified rather... |
openssl ciphers -v 'ECDH+AESGCM:DH+AESCGM' gives:
ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD
ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=AEAD
ECDH-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH/RSA Au=ECDH Enc=AESGCM(256) Mac=AEAD
ECDH-ECDSA-AES256-GCM-SHA... |
I'm a cyber security student and don't do server stuffs on regular basis, I was just wondering how to check SSH login logs and found that it can be checked using sudo cat /var/log/auth.log and checked on my server and there were lots of Failed password for root from [IP] This is a newly installed remote server there's ... |
I want to do something similar to Ubuntu's signed checksums in distribution and I'm currently stuck on the integrity part. The tutorial here covers most of what I'd like the process to look like (I've modified what I'm writing for Mac syntax since that's what I'm using): https://tutorials.ubuntu.com/tutorial/tutorial-h... |
I know Nmap has nmap-services file which gives us the list of top 1000 ports/services found on the Internet. But this list seems to be outdated, as the Nmap top 1000 list doesn't include several services used now-a-days (like 27017/mongoDB, 6379/redis, 11211/memcached, etc). Is there any source other than Nmap, which c... |
I have a wildcard valid certificate signed by Certificate Authority. Is it possible to test the https locally from the server without a registered DNS?
My idea is to bind the domain name with 127.0.0.1 in /etc/hosts.
The HTML is running on Nginx container and I am using centos 7.
Is it possible to make an SSL handsha... |
Hacker is trying to attack the site by using the following SQL injection query to get the SQL version.
Using URL site. example:
www.abc.com/?queryParamString=(SELECT 9701 FROM(SELECT COUNT(*),CONCAT(0x71787a7171,(SELECT (ELT(9701=9701,1))),0x71767a6271,FLOOR(RAND(0)*2))X FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY... |
There are recommendations on this website and in the internet suggesting to never store credentials (e.g. login/password to the database that certain web application is using, or S3 access key on non-AWS instance, etc.) in plain text on the filesystem, apparently due to possibility to recover password from the disk.
Th... |
Perhaps this is off-topic or too broad to answer but I'm thinking that there must be solutions.
Some countries are talking about unplugging from the internet and creating their own isolated domestic internet. Russia, recently, ran their own tests about doing this and it has seemed successful.
How could this, essential... |
In TLS 1.3, handshake messages after Hello and KeyShare--e.g., certificates, signature, finished--are encrypted using an AEAD cipher. Can someone explain what the rationale is? Is it mainly for privacy or integrity, or both?
It doesn't seem to be for integrity because the Finished message should already do that. If it... |
I have a personal phone which I use at work, and connect to the WiFi at work. I also brought my personal laptop to work a couple times and connected to the WiFi.
My question is can my employer see my browsing history from when I was connected to my WiFi at home?
|
Cognitive hacking some say is a new type of hacking field and some say it is something that been there for many years. Exploring the chapters of WIKI and using projects like MisinfoSec, got me confused about the differences between disinformation and misinformation when it relates to deepfakes and fake news.
"Misinform... |
Is there a way to protect sensitive data which is in RAM?
Our setup is a microcontroller with no hardware support for security.
When there is a need to encrypt data, then the secret key exists in RAM.
Even further- plain text exists in RAM.
So if anyone can have an access to RAM (e.g. jtag), then the sensitive data is ... |
I am currently working on exploiting a potential DOM based XSS on a web app. Currently all of my XSS attempts have been thwarted by Internet Explorers XSS auditor, even after disabling it. While investigating I noticed that the query parameter was outputting weird results if I replace the "=" with "[ ]" which reflects ... |
In an application I was assessing, I found an interesting piece of code that took my attacker-supplied input and put it into the bindDN while preparing to connect to an LDAP server.
[USERNAME]@domain.com
Specifically, I can inject whatever I want into the [USERNAME] in the above sample bindDN, including something like... |
Aside from possible implementation bugs, which VPN concept aims to offer more protection by design?
SSL VPN (implementation example - OpenVPN)
L2TP/IPSEC (implementation example - Strong Swan)
After reading this review, I can't understand how to compare designed security levels of both beyond what the author says. Th... |
From a DLP perspective, does anyone know what DLP controls to block or monitor this Logitech Flow?
|
I work on a project where DVDs with configuration files and software updates are delivered periodically to end users, and our software loads those discs. For example, we might load a disc with an updated set of hostnames and IP addresses when the network topology is updated, or we might get a disc with virus definition... |
There are a number of US Department of Defense (DoD) websites that I need to access on a regular basis (e.g., https://ataaps.csd.disa.mil/ and https://web.mail.mil) that Firefox issues a Warning: Potential Security Risk Ahead with error code SEC_ERROR_UNKNOWN_ISSUER. Looking a little further, it says "Peer’s Certificat... |
There are many pre-made tools around for brute-forcing RDP credentials, but I haven't found one for username enumeration. Is it possible by design to enumerate potential RDP logins? If not within the standard of the protocol, are there username enumeration vulnerabilities like the CVE-2018-15473 for certain OpenSSH ver... |
At my company, we have a new development team that has been completely rewriting all of the code for different parts of the system.
I've noticed that with one of the recent changes, you can now see the JSON data for all of the fields and values for each field that exist in our database for that particular section of an... |
Is there a way to establish data sharing between multiple (a couple dozen) businesses where it is the case that some companies don't trust others?
This means that these companies are willing to share some their sensitive data with only select few, while not so sensitive data they are OK with sharing with all. (They can... |
I have a question that might sound a bit weird: A friend of mine (Person A) is being attacked by a former friend (Person B) and now person A asked me for help. Person A and Person B know each other from the internet and Person A used to trust Person B.
Generally speaking, Person A experiences network issues in his WiFi... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.