instruction stringlengths 24 29.9k |
|---|
I'm developing a mobile application for a client that sells digital courses on a service called Teachable that hosts their website and handles the purchase process for them. My client wants to keep using this service for the purchase process and when a user bought a course, he should have access to it on my app.
Now I ... |
I have a web application with a log in page.
In the log in page, I've set maxlength for the username input and the password input, which looks like the code below.
@Html.TextBoxFor(m => m.Username, new { @maxlength="30"})
When I run OWASP ZAP, it gives me an alert with the following description.
A Format String er... |
I'm having issues finding the right language to search for answers to my problem so hopefully I can explain it here.
I am trying to create an API that will be accessed by a 3rd party. This 3rd party authenticates their users using some unknown system (they use something like auth0 or Okta). Their web application will ... |
To allow api users to verify the authenticity of outgoing webhooks, I am using a similar model to slack:
Concatenate timestamp and body, HMAC with pre-shared key, add timestamp and HMAC digest to headers.
Recipient does the same, and compares to the digest in the header.
I can either implement this exclusively on out... |
As a part of my learning, I installed OpenVAS into one of our Ubuntu test servers and scan the said server. I have the results and I wanted to remediate the findings as part of my learning the Linux system.
I solve some of it but I'm stuck with this vulnerability:
SSL/TLS: Report Vulnerable Cipher Suites for HTTPS
'Vul... |
How are eSIM profiles tied to a particular device? That is, what prevents a bad actor from digitally copying an eSIM profile (or, why is the eUICC chip required; can't we have a soft or emulated SIM)?
|
Let's say there is an XSS vulnerability in an application, and the application is not using any kind of CSRF token, just using the referer header to protect against CSRF. Referer header is validating properly. So in this case can we bypass the referer header to perform the CSRF? If yes, then how?
Because OWASP always r... |
TL;DR, I think this mail was sent by mail.okgroup.cz. Not sure though, I would like confirmation.
I just got a mail from my sister with no subject and only a link.
NOTE; That the email used in this mail is the ACTUAL mail of my sister.
I am using Outlook for my email (and I'm using it via Firefox)
When hovering over t... |
I have a router (TP Link Archer C2) that I would like to pass on to a friend or give to a thriftstore. However, I noticed some logs via the admin tools. The router apparently logged some requests and associated IP adresses for debugging. Logging was turned on by default, and this got me thinking that you might want to ... |
Let's say that I have an executable running on a client machine, and, it requires to download some updates on a regular basis. The solution uses TLS to communicate with the download server.
I would like to include authenticating these updates before applying them, i.e., that these updates are cryptographically signed.
... |
I'm planning on porting all of my office's software needs to cloud services that I can access via internet. It's a simple LAN that has a NAT gateway pointing to the open internet.
Would a firewall give me any benefits in this use case? What am I defending against?
|
Right now I'm looking at an office document (most likely rtf based on it exploiting equation editor) that opens just fine when you double click it, but on further examination in a hex editor and in entropy analysis (7.9) is technically encrypted, even without requiring a password to open. It seems as thought the workbo... |
Recently I discovered method of generating passwords with Diceware/EFF dictionary.
Look at my example, passphrase vs randomly generated password:
rockstar reword gamma banker unwarlike (64,6 bits entropy)
9zbhL=HyWNV (65,7 bits entropy)
Both are considered as strong passwords.
is easy to type and remember. You can... |
I'm aware of multiple ways to store an encryption key, some very bad, such as in your codebase or elsewhere on the same server, and others much better such as where the encryption/decryption is done away from your application or is bound to specific hardware (e.g. with a H.S.M.).
It strikes me that whatever method is u... |
We are looking to implement push notifications for things like when a user receives an internal message within our app. We have an application with sensitive data so we have a short length inactivity timeout of around 15 minutes. We are using firebase cloud-messaging, but are curious as to how store and manage the fire... |
So I was thinking, if people get access somehow to your list of hashes, it's easy for them to figure out what alghoritm you used if they have 32, 40, 60 characters etc
But what if you slice those strings a bit, like you use SHA-1 which is 40 and slice it to 32 characters? That would certainly make people think you are ... |
When using compression on openssh (a la ssh -C ...), does this reduce entropy and make the tunnel traffic more vulnerable to cryptanalysis? Is compression an option I should disable server-side for this or any other reason?
I have a vague recollection of disabling compression being recommended for security reasons, bu... |
Im testing an application for XSS. My input from an HTTP request is being reflected into an inline script in the response. Specifically it is being reflected into an object.
I am trying to escape the " and } in order to generate a successful XSS. The application is URL encoding (%) these characters, and I am stuck ins... |
We're setting up a card processing service on Amazon AWS, and were wondering whether the AWS Time Sync service could be incorporated without running afoul of the PCI time sync requirements?
Specifically, the requirements talk about all hosts, services, etc. synchronizing to a service hosted internal to the network, and... |
I test two websites on ssllabs, which one is better for secure payment:
https://www.ssllabs.com/ssltest/analyze.html?d=senpay.vn
https://www.ssllabs.com/ssltest/analyze.html?d=alepay.vn
|
Let's say, if I use both NordVPN's own software (random VPN location) and its Google Chrome VPN extension (random VPN location), does this add an extra layer of protection/encryption - means hiding internet activity from ISP and/or from your network plus an encryption- ?
Or connecting to the VPN server via NordVPN sof... |
Currently my web app stores user-uploaded ID scans in S3. I am concerned about an eventual data leak.
The S3 bucket is encrypted with server-side encryption (AES-256) but I figure the next obvious risk is an attacker gaining access to the AWS account itself. I have secured the root account with 2FA but there are severa... |
I'm studying for the Network+ exam and wanted to understand the difference between one-way authentication and two-way authentication.
I've tried searching to no avail. It seems when I search for it the results return 2FA and single-factor authentication. Are single-factor authentication and one-way authentication the s... |
In the process of trying to recover data in bulk from what I assumed was a failing hard drive, Windows Security kindly notified me it had found a handful of malicious items among the recovered files. I immediately nuked that secondary drive, but for a few items it reported either "Remediation Failed" or "Item removed o... |
I would like to protect my flash drives to being infected when I put it in another computers or devices. After some research, I found that I will not be able to reach this level of protection by using only software solutions (correct me if I'm wrong).
However, I don't have a flash drive with hardware protection and my... |
I have heard of malware using TLS, RC4, and XOR to encrypt command and control communications. Why is it that malware doesn't use VPN's? For example Ipsec vpn, I would think this would make end to end traffic much more secure and encrypted.
|
Consider this scenario. I have a file hosted on AWS with private access. I want the file to be accessible to several authorized users of a web applicaton that I have built. As I am the one authenticating these users, how do I tell AWS to delever the file only to users authenticated by my applicaton?
This seems somewha... |
I ran "autoruns" from Windows Sysinternals on a Windows 10 machine, and noticed that the Windows Defender services were marked in red colour, and did not have verified signatures. I checked these services on another machine and found that they were all verified as expected.
Does this mean the Windows Defender on my ma... |
Imagine that I have a server made with technologies and programming language that are not secure for some reason, such as legacy versions with known vulnerabilities or anything else that may result in giving a hacker an opportunity to forge an invalid request to access more data or internals of the system.
Now to solve... |
I scan my site via namp , I only see 3 ports open.
nmap -sV {ip}
Starting Nmap 7.80 ( https://nmap.org ) at 2020-01-25 09:42 EST
Nmap scan report for {ip}
Host... |
I just recently broke up with my ex boyfriend, I am not computer smart but he is, scary computer smart and can basically do anything, with lots of schooling and whatever it is he does for work...
I was staying at his place for about 3 or 4 months and would use his WIFI. We had a messy break up, and I wonder if he has... |
Is it possible that a user can hack a server running Apache httpd from the website it hosts? Let's say I have a PHP web application running under Apache with explicit user www-data in the virtual host configuration. If the user hacks the website, he would only have access to modify the PHP code, since he only has the p... |
I've heard that tabs in modern web browsers are fairly well sandboxed, so what kind of attacks could a malicious site do to your computer and/or web browser assuming you don't do anything obviously stupid (like download and run a file from it)?
Does it make a difference if you are using a private / incognito tab to rem... |
I've used Dashline (password manager) with random generated passwords, but I forgot the master password and there is no way to get it back. I read that password managers and random generated passwords aren't that safe as I thought they are. So what type of a password should I have that is the safest?
|
I am currently reading through Windows Event Log (OpenSSH) looking at the artefacts created by an attack, I am trying to understand the meaning of certain notifications.
A brute force attack was made by myself, from a Kali Linux machine and the software I use was Metasploit.
In Kali Linux when I ran the nmap command ... |
A certificate, in itself, (RFC 5280) does not seem to have any indicator of what algorithm was used (for example the argument to openssl req -newkey) to create the public and private keys ("Certificate Key Type"). That surprised me. A certificate has a "signature algorithm" field but that is the algorithm used by the C... |
Doing some testing on my home network with Kali and was messing around with deauth commands using aireplay-ng, however when I input my target IP address it will still send a broadcast and deauth all devices connected. Am I doing something wrong?
The command Im using: aireplay-ng wlan0 --deauth 0 -a (My bssid) -k (Targe... |
Ubuntu (focal 20.04)
Using Google webdesigner apt repository in /etc/apt/sources.list.d/google-webdesigner.list:
deb [arch=amd64] https://dl.google.com/linux/webdesigner/deb/ stable main
leads to:
# wget -q -O - https://dl.google.com/linux/linux_signing_key.pub | sudo apt-key add -
OK
# apt-key list | grep -C 2 "Googl... |
I recently heard of Chrome's Renderer Code Integrity Protection, which is apparently supposed to prevent unsigned dlls from being loaded into the chrome.exe process, and figured I'd test what would happen if I tampered with one of Chrome's default dlls. So, I opened chrome.dll in a hex editor, appended some random dat... |
I am attempting to implement these solutions for multi-user document encryption:
https://security.stackexchange.com/a/71915
https://owncloud.com/wp-content/uploads/2014/10/Overview_of_ownCloud_Encryption_Model_1.1.pdf
The user's private key is stored in a database and encrypted using a symmetrical cipher, the key t... |
I am using unpatched iPhone that has IOS 13.1.3 installed. Apple released IOS 13.1.3 15 Oct 2019.
Are there any vulnerabilities for IOS 13.1.3's safari that are currently being exploited in the wild?
Are there any publicly available modules for penetration testing tools such as metasploit that can exploit safari of I... |
I want to create e.g a Gmail account while connected to an unknown PPTP VPN. Is it safe, or can the owner of the PPTP VPN see my Gmail web page information, such as username or password, at all? Can the PPTP owner decrypt our information using our HTTPS private key?
|
Suppose I have some important text data on my computer, like a plain text password y5278dhk28ds and I have malware on my PC that periodically searches for sensitive data and sends that data to anothersite.com. I want to block the transfer of this sensitive data.
I'm searching a simple to use packet sniffer which I wou... |
I have been unable to find a definitive answer to the above question.
We currently use JWTs from AWS Cognito for our Authentication. Currently the JWTs that are returned are too large to use in Cookies (over the 4KB limit) so we do not store the entire JWT in cookie.
Our current process is to login the user, then v... |
I'm working on an iOS app whose login system does not seem entirely secure but I don't know enough to be sure.
Skipping account creation, the first time the user logs in they send their user and hashed pass to the server to acquire a token with which they can make the rest of the API calls.
This seems fine but the user... |
An organisation I work with requires that employees be able to connect to machines on their network and log on to them from machines that are not on the network and not joined to the domain.
They have these unsecure machines connect through up to date OpenVPN. When logging on externally, they use MFA.
Recently they've ... |
Catalina has some new security features which include System Preferences > Security & Privacy features, which requires apps to request access to specific computer functionality such as camera, microphone, full disk access, input monitoring, etc.
Under what conditions could malware bypass such requirements to use those ... |
I am trying to find the differences between a covert timing channel and a covert storage channel in terms of detectability, performance, features, and any other advantages and disadvantages.
Is there any resource that directly compares the advantages and disadvantages of the two attacks?
|
It seems a friend of mine got his phone number stolen. Someone got access to his Facebook account (where they tried to post ad campaigns) and to his WhatsApp account. The Facebook security page said his account was accessed using his password and phone validation. This combined with the WhatsApp access is what makes us... |
If I use the tpm2tss-engine coupled with openssl, can I substitute, optionally any file path to a private key by a TPM persisent handle ?
Will it work with extensions, like CMP for OpenSSL, for instance ?
What is the purpose of "-keyform engine" ?
Do you know any documentation that better eplain the use of "-engine tpm... |
The idea would be to wrap a server-side IMAP client in a wrapper that transforms IMAP authentication into a web API for authentication (maybe OAuth?). When the back-end application receives credentials, it then passes them onto IMAP without storing them, waits to see if authentication was successful and if it was, it t... |
I have a question about Man in the Middle attack.
What should I do during the Man in the middle attack?
In case I am already connected with a friend of mine on the net, but I suspect that there is a third party among us who is reading or modifying mine and my friend's messages. What do I have to do?
First, I thought ... |
Can we consider the Integrity Check on power-on and the secure boot equal from security point of view?
Secure boot is about allowing only a trusted SW to boot on the processor. A chain of trust can be built as a result of sequence of a securely booted Software components:
for example:
Bootloader authenticates the OS... |
Could anyone tell me if there's a way I can trust an application I'm running on my computer. Like a video game, for example, or the launcher of that video game.
How can I know if, Counter-Strike for example, did or is doing anything malicious?
I understand that some big video game titles might be safer for how many peo... |
I'm looking for the best way to secure unauthorized redirects from GET parameter where
url=http://example.com
I'm thinking about creating an unique identifier like using a hashing function (md5 for example) and check whether hash(url) === passed hash via GET to validate the redirect or deny it,
Where passed hash is w... |
I have read about The OpenPGP trust model but I don't see any mention of the specific signature types. Are all signature types (sig0 - sig3) treated the same by tools such as gpg or the PGP Pathfinder?
|
I just installed the Global Protect VPN from my company on my local machine so I can access our servers remotely. I just "agreed" to the following statement:
VPN Connected
This system is for the use of authorized users only. Individuals using
this computer system without authority, or in excess of their
authorit... |
I would like to understand how firewalls work in details, and understand the attack surface.
TCP and UDP
I understand that TCP and UDP are easy to filter. Programs on a computer need to ask the OS to open a port and will listen to these ports. Firewalls can simply look at all incoming packets, check the port number, an... |
In a moment of desperation and without thinking, I executed an .exe file purporting to be a pirated version of a hard-to-find program, forgetting that I had no real-time antivirus active. A few seconds later Malwarebytes (the free version, so not real-time) had been removed from the system. I then hurriedly tried to do... |
A user was discovered using a QR code to log into a PC. Apparently, the password was put into a QR code generator and printed. The user:
Provides their username
Scans the QR code with a handheld scanner and is granted access
Our company utilizes handheld scanners for a variety of reasons so it is not feasible to use... |
I am building a web app that allows login with an email and password. I understand that I need to use a timing safe function to compare the passwords to prevent timing attacks. However I realized that the emails might be vulnerable to the same attack. I am unsure how to prevent timing attacks on the emails.
The emails... |
We've got implementations in a browser-based system right now that does both SAML and OpenID-connect login support, but does them differently and was looking for advice on the risks.
Our SAML implementation does a full browser redirect to log in - it completely leaves the SP site, goes to the IdP, and the postback goes... |
I have a local application which will be accessible only after login. Its single URL application, URL of application won't change, just it use 'XMLHttpRequest' to refresh the content of screen based on action and other parameters.
Database used as below
[root@localhost ~]# mysql -q
Welcome to the MariaDB monitor. Com... |
I am reading the PWK course book, the chapter of Linux Buffer Overflow:
Once the crossfire application is running, we can use the following Proof of Concept
(PoC) code, found on the Exploit Database to crash the application.
...
crash="\x41" * 4379
buffer = "\x11(setup sound " + crash + "\x90\x00#"
...
s.send(buffe... |
I would like to know how auth services, such as OpenID Connect and OAuth, are able to distinguish between a first party application over a third party one - in particular for clients such as mobile applications, since they obviously can't securely hold some predefined key/identifier.
An example of this would be the Go... |
I work on a software product that allows customers to use SAML or OAuth provisioning to their users. e.g to Azure AD.
Now non technical savvy users understandably presume that logging off from our software (the SP) would log them out. Because the SSO session still exists from the IDP it doesn't.
Their argument is tha... |
Computers on our network have this weird issue that some web pages (mostly Turkish news sites, but not all) show a specific type of ad that looks like adware/malware. When I click to close them, they open a new web page, which some of them are legit (e.g. youtube) and some of them are not.
Background:
appear on almost... |
What are the security implications of using the APK Signature Scheme v1 instead of the APK Signature Scheme v2/v3? Are there any additional attack vectors for v1 except for direct attack vectors in an APK verifier? With direct attack vectors mean things like DoS directly in the APK verifier.
|
I'm developing an application over an intranet and is used only by an internal employee. There wouldn't be any external parties involved here and no external communication would be used by the application.
Does it need secure software design in this case? If so, will it be enough to follow the guideline of OWASP?
|
I have a zip file containing a JPEG image of size 3.5 MB, encrypted with AES-256. I used WinZip for the creation of the zip file. In order to create the hash of the zip file, I used John The Ripper's zip2john which created 2 hashes, where the hashes starts and ends like this:
$zip2$*0*3*0*7076f893dbcdc27f228fa179ff9908... |
I came across the idea of adding many domain names to an hosts list to prevent "malvertising" (malware hidden in ads). How does this compare to using an adblocker?
Using an host files seems better to me at first sight, but are there performance concerns with a very large list? Is there a reason why adblocker might be b... |
I downloaded Windows from Microsoft website. Then I type in (or paste) a product key that I bought from an unofficial seller to activate Windows. Can that lead to any security issues?
|
I asked a question on what I need to do to make my application secure, when somebody told me:
That depends on your threat model.
What is a threat model? How do I make a threat model for my application?
|
The main question here is: If you are using a backend server to authenticate a user with a third party provider such as Auth0, do you need to validate the JWT received in this scenario?
I am looking at the example custom login from Auth0 here:
https://github.com/auth0-samples/auth0-aspnet-owin-mvc-samples/blob/master/S... |
My hosting provider (ovh) recently blocked my VPS due to some attack on the server. When I restored it to the normal mode, I can see indeed something is happening: the access to server is limited, ping results are slow and frequently cannot access server, and when I try any service (ftp, ssh, http...), it is difficult ... |
Last month I made a pentesting course and now they opened a lab for us to practice before we apply for the certification exam. We connect to the lab over OpenVPN in our Kali Linux machine.
I'm trying to attack a Windows XP machine in the lab with EternalBlue (ms17_010) using a reverse_tcp payload but it doesn't work. I... |
I have 3 VPS based on Ubuntu 18.04 server OS and would like to open particular ports on each servers.
The ports, that I would like to open are:
Then let's take a look on the environment:
As you can see on the image, every server has a public IP address.
Now, I would like configure the UFW firewall, so that only tho... |
I know what fail2ban does; it monitors the firewall logs and finds ip addresses that have too many failed logins to ssh; and then tells the firewall to drop packets from those addresses.
So is fail2ban an IPS?
|
While I understand the differences between DTLS-SRTP and pure DTLS, I cannot find much information on why exactly is DTLS-SRTP really "optimized" over generic DTLS 1.2.
RFC 5764's Introduction makes an obvious statement but without specifics anywhere in that document:
Datagram Transport Layer Security (DTLS) [RFC4347... |
I recently started to do the pwnable.tw challenges. I have no problem understanding the actual buffer-overflow and shellcode injection.
However, after the shell is spawned, the flag is read from /home/start/flag (with "start" being the name of the binary file).
Obviously, this directory does not exist in my filesystem... |
Is there any evidence or research into the likelihood, as well as damage, via vulnerabilities in previous versions compared to following iterations of software?
For example, with every software version, there is the likelihood of new security vulnerabilities. More importantly, the existence and likelihood of those vul... |
The company I work for is about to publish a custom web app (hosted in AWS) that authenticates through AzureAD.
That way, when someone goes to https://www.mywebap.com it is redirected to AzureAd and, if successfully authenticated, access is granted.
What are the security risks here? Is this a recommended practice? As ... |
Let's assume I have issued two root certificates for my domain - a RSA and a ECDSA one. Both have the same subject. As far as I know, the subject does not have to be unique.
Do crypto libraries such as OpenSSL cycle through all installed certificates when validating a certificate chain? Or is having two root certificat... |
According to my knowledge, phishing basically only steals the email id and password, right?
|
I read in the answer here by Marcus that ROM is Tamper-proof.
What is the difference between tamper-proof, tamper protected and tamper-resistant?
Now, there are some re-writable memory (eg. eNVM) that can be configured to have some of its pages as write-protected (set as ROM option) (Read-Only VS. Write Protected). I... |
From a security perspective, is it considered bad practice to use the company name as a part of an SSID?
Assuming that the company is located in a densely populated area with a lot of "competing" wireless networks, having an easily identifiable SSID would make it easy to find the network for those who work at that off... |
I am currently trying to install Kaspersky Total Security, but it persistently asks me to uninstall all other antivirus software: McAfee Security Scan Plus and Avast Software(Free). They claim their software won't work well if other antivirus programs are installed.
I can understand that two simultaneously working anti... |
There is a file found by antivirus program and it was put into the virus' quarantine section (its not a false positive). Now I don't know how to handle this "quarantined" files.
What is the best practice and secure way to deal with them? Delete from quarantine, or let them in there?
If I delete a file from the quaran... |
We have a Java web application that was vulnerable to blind SQL injection attacks. Our developers fixed the code by using the replaceAll() function to convert single quotes to two single quotes. I am trying to understand whether the following lines of code would still be vulnerable to SQL injection attacks?
String use... |
I'm reading the BeyondCorp papers and trying to get a very high level idea of how it could be implemented by a small to medium organisation, rather than a behemoth like Google.
What kind of software would a managed device require? I assume that not only an anti-malware, but something that also blocks potential dangerou... |
I've just downloaded composer from getcomposer.org, but a strange thing had happened.
When I clicked "install for all users" button, the UCA says "Unknown publisher", but when I was checking its properties, it displays "Open Source Developer, John Stevenson" and it's a normal signature.
In Extended Error Information... |
In this question I saw that you can use command key to store credentials and then just run a command like mstsc /v:servername to connect to it without typing anything.
Additionally, you can delete it using the /delete switch of cmdkey...would I be able to make sure when I log out for the day the credentials are gone?
I... |
I have a bunch of users that are all behind the same VPN. My website (outside of the VPN) is supposed to be only accessible for these users. There is no guest for this VPN. My website is https only. Is it acceptable in this case to rely on IP as an authentication mecanism ?
|
Scenario:
Adam has designed an iPad app that will be publicly distributed. The app will communicate with Adam's server via https. While the fact that this app communicates with this server isn't sensitive, the particulars of the communication between the app and the server are -- things that are trade secrets might b... |
So we have an OpenVPN Server running on a Synology File Server. We have SSH into the Synology to have custom certificate keys and a password for two factor authentication.
This is working well, and allows us to access the network remotely for files, printers etc. We are happy, BUT I noticed our router which is a Netgea... |
Can I separately store 8-digit BINs and truncated (6/4) PANs outside of my CDE?
Truncated PANs are no more than the first 6 and last 4 digits of PAN, compliant to the standard's section 3.4, but it only says:
The intent of truncation is to permanently remove a segment of PAN data so that only a portion of the PAN is ... |
I sometimes run into sites with CSRF bugs and I want to know the simplest way to recommend for the developer to fix it. (i.e., if I tell them "Switch to a framework that has anti-CSRF protection", they won't listen.)
Anecdotally, it looks like most sites mitigate CSRF by including a random token as a hidden form field... |
I was going through set of security vulnerabilities reported in Oracle Critical Patch Update. I want to find out the standard process followed by developers/security people to mitigate these kind of vulnerabilities before the patch is released. So to ask direct questions..
What is the standard set of steps I should fol... |
I'm trying to decode this attack. I know it's attempting to send some kind of malicious command to the web server but I can't figure out how to decode it. It's like encoded more than once or something. I don't know. I've looked around and can't find it.
a=@ eval (base64_decode($_POST[z0]));&z0=QGluaV9zZXQoImRpc3BsYXlf... |
I have a domain email address which in addition to being able to create multiple mail accounts allows the creation of aliases for each inbox.
Is there any benefit to security in using a different email alias for every website/service I have an account/will make an account for in the future? Specifically from the angle... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.