instruction stringlengths 24 29.9k |
|---|
CMP means Certificate Management Protocol.
CMP for OpenSSL is currently a fork of OpenSSL. Do you know when it will be part of OpenSSL?
https://github.com/mpeylo/cmpossl
|
Ever since the early 2000s, when I was using Linux IRC clients which would paste anything you had in your clipboard when pressing the middle mouse button, I have been scared out of my mind that I would one day have copied my sensitive.txt file content's and accidentally pressed the middle mouse button, causing many lin... |
Reading the ETSI EN 319 102-1 V1.1.1 (2016-05) Electronic Signatures and Infrastructures (ESI); Procedures for Creation and Validation of AdES Digital Signatures; Part 1: Creation and Validation.
The signature validation procedures and requirements are clear in section 5. However there are many references to validation... |
These days, it's not uncommon to have dozens and dozens of passwords for various sites and services. If you're using different passwords for each service it can be basically impossible to hold all the passwords in your memory.
Some people keep a book with their passwords written down, and are occasionally mocked for do... |
In famous buffer overflow tutorial by Corelan Team (part 2) a technique called "blind return" is mentioned.
So if you overwrite EIP with the address that will perform a RET instruction, you will load the value stored at ESP into EIP.
and further down
Overwrite EIP with an address pointing to a ret instruction
Hard... |
Which data is actually transmitted between issuing and acquiring banks during various phases of a card payment transaction?
Specifically, does the Issuer tell the Acquirer any info (and which if any?) not originally acquired from the Cardholder by the Acquirer? E.g., when doing a purchase on a website not asking the ca... |
Disclaimer: I am a complete neophyte.
I set 9.9.9.9, Quad9, as my DNS in my router's configuration.
How do I verify Quad9 is working and that I am benefiting from its features, especially encrypted DNS and DNSSEC?
Do I need to use a client on each computer/device, or does configuring my router make it work for the ent... |
What risks are there in allowing external clients to resolve internal IPs to their domain names? The server is used internally for clients, as well as for external clients needing to resolve a web server's domain. Couldn't allowing these reverse lookups allow an attacker to gather a wide array of information if the dom... |
I am wondering if the "/todo1" part of the below URL
curl https://someserver:5000/todo1 -d "data=Remember the milk" -X PUT
Gets encrypted over TLS/HTTPS, or is the full URL that you're sending your request to visible to a middle man?
|
I am reading The Shellcoder's Handbook, and having trouble with an exercise. I am trying to jump to an address after I exceed the buffer space. After 36 bytes I write a 4 byte payload with an address that overwrites the ret instruction so that address will be popped and moved to eip. At which point, I output the input ... |
Am I really understanding things correctly if I claim that:
If a USB stick/device is inserted into a PC running Windows, currently in "lock screen" mode (that is, somebody has pressed WinKey + L), it will auto-mount it behind the scenes?
If a USB stick/device is inserted into a PC running Windows, currently NOT in "lo... |
I have a page(parent.php) from where i am calling a another page(result.php) through jquery ajax that is returning a response in html format. This response is showed on the parent.php page in a div. How can i secure my ajax response from xss attack. Here is the code snippet of parent.php page
$.ajax({
type: "PO... |
When a fully encryped USB drive is connected to a computer, the OS says this USB drive is not formatted. How can I verify that a USB drive is fully encrypted while still being formatted? Is there a certain way to confirm this?
|
I have a recipient with four hardware keys (HKs) that they use interchangeably. These HKs contain different GPG keys that have all been generated inside and have never left the HKs, thus resulting in four different public keys belonging to the same person.
The keys are tagged so that the name, email and identifier stri... |
There size limit on VirusTotal, some videos are very big. What if cut off part from the video and send part of it. Is it possible? What part of it, where malware can be?
|
Would it be possible to run phone apps that connect to the internet (eg. youtube, instagram, etc.) on an Android VM (or any sort of phone VM, doesn't need to be android) in VirtualBox within a host OS such as Tails or Whonix so that they can be run at least pseudonymously? I was thinking using the android ISO.
I'm just... |
can connecting to wifi reveal my cellular identity ?
So what I mean is say hypothetically the powers that be wanted to tap your cellular phone and your home wifi (having the isp monitor all data).
And you buy a new phone with a new simcard.
If a brand new phone (with new simcard) connects to a tapped wifi network, doe... |
Saved on device, I have TLS certificate private key, which I would like to encrypt with AES256; password will be simple PIN.
I would also like to use this same PIN as a secondary protection for some user actions. The salt and hash of this PIN will be saved on server. PIN will also serve as a secondary protection in aut... |
Consider the following common security scenario:
I need to log in with an email and password.
I can't remember my password so I click "forgot password"
Website emails me a password reset link.
I can gain access to my account using only my email.
This is common on many websites. Commonly it is suggested to not use the... |
Someone sent me a grabify link on discord. Now they told me they know my IP address, the device's name that I am using, my location and IP address. I am wondering how much else do they know? Should I be worried? What should I do now?
|
I've just set up my first iPad, and first Apple device. To be extra cautious when setting it up, I created a brand new @icloud.com username, to use as the Apple ID. The username was 10 characters long, and included random alphanumeric characters. The password was also completely random, and over 12 characters long.
Jus... |
What is ECDH public server param reuse?
|
I want to prevent XSS in my demo chat application (written in PHP) that I've created for blog posts. The chat insert messages into a textarea. The problem is that it's vulnerable to XSS. Somone can write </textarea><script>alert('x');</script>. To prevent this I can write:
preg_replace("%</(text)(area)>%i", "</\\1̴... |
What is SSL Session resumption and can we disable it on the server side or it is just the client side can do it?
|
Can anyone explain the below "Session resumption (caching)" warning to me and how to deal with it? It's from an SSL Labs test.
|
Apart from the fact that TLS doesn't have "connection context" variables, is there any reason why this couldn't be technically built into the standard for something like JWT?
Why it is needed
When a browser sends multiple requests to the same API server, it resends the JWT in the header multiple times. This means addit... |
I want to know how to find just the first character or digit in first part of a 64 length string from a MD5 hash. For example, we have a hash:
f95debd50b95304af9de1975393069143b7fb7df10ea00d189657d55b89c555c
and MD5 is:
be254c231d70885f6db16c0399be3066
In this case, what is the solution to find "f" that is the first... |
Is it possible to change passphrase on a subkey by:
gpg --edit-key sub_key_id passwd
Or will this change the passphrase on the master key as well?
(My idea stems from the fact that master key is used only for certification and thus only rarely, while signing or encryption or authorization keys are of daily use and as ... |
I’m thinking a RESTful client–server architecture. There will be routes that require users to authenticate before they can access the resource (e.g. creating or editing resources). Other resources are freely available—no authentication required.
I’m writing a frontend module to provide an abstraction from the request/r... |
Let's say I perform a nmap scan and discover a list of open ports.
If port 80 is opened, I will do this:
$ nc IP_ADDRESS 80
GET / HTTP/1.0
This will be a simple HTTP protocol request.
But what about other ports? Let's say I found a random port like 51236 is open.
How do I communicate with it after a successful netcat ... |
I understand SOP, 'Same origin policy' is supposed to prevent script code with origin x from accessing data with origin y. Origin is said to be a tuple of protocol, domain and port.
This explains what SOP is and why it is important, but not so much how it helps in preventing XSS.
An attacker could craft a malicios li... |
I was reading this topic which talks about the handshake process and key exchange
https://www.ibm.com/support/knowledgecenter/en/SSFKSJ_7.1.0/com.ibm.mq.doc/sy10660_.htm
The article says that the client and the server agrees on the cipher suite algorithm (which is asymmetric) that they are going to use for key exchang... |
In order to allow clients to verify responses originating from our server, we are generating an HMAC signature of the body and a timestamp, and attaching it as a header. The timestamp is also attached as a header. Clients will concatenate the timestamp and the body, and HMAC using the pre-shared key, comparing it to th... |
We visited a friend who's working as a programmer. He told me to connect my phone to his wifi so he could send me a picture, however he didn't send it and I left my phone connected to his wifi for an hour without using it.
Can he see my search history, notes, pictures, messages, passwords? Or install a spyware in my p... |
We have a WAF in front of our environnement.
Let's say now
the client ask for example.com
The waf make a redirect (303) saying https://example.com
Now the communication is established between the client and the WAF.
If now, my back-end have a rule saying "everything comming on port 80 must be redirected to www.exampl... |
If there would be any backdoor in recent Intel CPU's, then it should send and receive data secretly.
Isn't it possible to easily debunk this conspiracy theory by implementing a third physical device between the computer and the router to find out if there's a difference between the amount of data transferred as reporte... |
Today I've create new certificates for my server (since the old ones were about to expire) using openssl with my own CA. I also used that as an oportunity to change the server's name because it was called "server" which I heard can cause problems (didn't have any though for about 6 years).
So in my openssl cnf file I'v... |
If Tor is able to hide the IP address of the machine and make us anonymous, then does it prevent the ISP from tracking us?
|
Is an XSS attack possible on a website in which all the user generated content sits behind Auth and all content is only and strictly only shown to the user that generated it in the first place?
No user generated content is ever shown to other users in its raw form, not even the admin. It's always aggregated stats and n... |
Windows 10 Home's default account lock system for the admin account is not completely secure because there are multiple free password recovery tools & ways available that can be used by a non-admin to reset/bypass the admin password.
How to secure Windows 10 Home admin's data & installed programs behind a password, eve... |
I'd want to ask, what's the safest environment to run potentially unsafe software?
I'm aware that this question may be very tricky, because each of those may have its flaws, but generally speaking which of those 3 sounds like safest option?
Hyper V - Windows 10 as host & guest
Virtualbox - Windows 10 as host & guest
Wi... |
I'm a security newb trying to find out how to secure my SPAs, and am totally lost in the forest of RFCs, BCPs, drafts and blog posts. If possible, I'd like to serve my SPAs statically from a cdn. At first I was uplifted by this article from Okta explaining why and how to replace the implicit flow with the code+PKCE flo... |
I recently discovered BeEF with which someone can gain access to another PC through XSS.
I was wondering if antivirus software can detect when a PC get's hooked to BeEF.. An online search doesn't give a clear answer.
Am I safe from being hooked to BeEF if I have an active and up to date antivirus?
|
I am starting to implement an exponential backoff system to lockout accounts after a certain amount of failed attempts (1min after 5 fails, 2min after 10 fails, etc.). However, as this source suggests, attackers can detect account existence, using the fact that only legitimate accounts are locked after too many failed ... |
I'm a newbie in terms of security, but I need a suggestion to make sure the connection between an API and mobile apps is secure. I'm currently using the Laravel framework. Based on its documentation here:
When using hashed API tokens, you should not generate your API tokens during user registration.
The questions a... |
To bypass a secure boot for System on Chip (SoC), some attacks target the phase of copying the bootloader from where it is stored to the main memory. Instead, a malicious code will be copied to the main memory. In that case, the bootloader which is the fisrt element of the chain of trust is not even booted. In such att... |
I want to know how to bypass the requirement of an admin user in order to have a program run upon windows startup.
|
Malware sometimes uses anti-vm and anti-sandbox behavior to act like harmless software.
Wouldn't it be a good prevention strategy to disguise the host machine as a VM so that potential malware would never break out?
I am not talking about "faking" virtualization which I think isn't possible, I'm talking about having a ... |
If a packer or crypter is used to obfuscate a piece of executable code, it seems that calls and references made in that code will not be updated at load-time and will be incorrect when the code is unpacked or unencrypted! How does a packer or crypter deal with this problem?
|
I am trying to achieve an authentication system that:
Has short-lived passwords/tokens (unlike Basic Auth or Api key),
Won't expose users credentials if my users table is leaked (unlike HMAC),
Every request to the API can be achieved with just one call to the server (unlike schemes with a refresh token).
I understand... |
tl;dr for those who are misunderstanding my post: imagine your friend who uses GMail suddenly tells you they have 2FA enabled, and logged in to their account, and that the 2FA code (SMS) they received upon requesting it came from your number. That would be impossible, right? That's what happened here, except it wasn't ... |
I was talking with someone about my resume, and on the subject of my posting it online they said,
just be careful with PII ... for your own good :)
My reaction to that is How bad can it be? -- and, What's the worst that could happen?
That's more or less my question here.
A resume contains:
Name
Email (more precisely... |
I found an option
-nocache : Disable response cache
in here
https://cirt.net/nikto2-docs/options.html
But when I tried it, I always get this error
Unknown option: nocache
|
I know what I need to do in this challenge, but I am completely lost on how to do the first crucial step. What needs to happen is that I need to overwrite the global structure variable pin_len, which will then let me overflow user_pin in mask_with_pin(), and jump to get_shell(). I'm not sure at all how to overwrite pin... |
Have received the following email which I believe to be a scam
Internet Crime Complaint Center (IC3)
In Partnership with:
Swiss National Fraud Relief Center (NFRC)
Case/Reference ID: IE3033900045
We regret to inform you that you have been a victim of identity theft. Your identity and consumer credit file have been com... |
I've read How to exploit HTTP Methods:
OPTIONS - this is a diagnostic method, which returns a message useful mainly for debugging and the like. This message basically reports, surprisingly, which HTTP Methods are active on the webserver. In reality, this is rarely used nowadays for legitimate purposes, but it does gra... |
I am working on a Django project and trying to create a REST API to verify email without using any database. My present server connection is HTTP and not HTTPS.
So someone using the API end point POST his email:
REQUEST:
curl --location --request POST 'http://127.0.0.1:8000/api/openlogin' \
--header 'Content-Type: app... |
I am creating a network fuzzer in Python and I have a debate about using open-source mutators or create my custom mutator. The fuzzing target is proprietary network protocols. What I am looking for is some flexibility with the data types so I can do "smart" fuzz over integers and strings, but also be able to create my ... |
There is a public query form in my web app, and architecture team asking to authenticate the web app with OAuth2 like this, but I don't believe it will be of any help.
I believe best way to protect is by reCAPTCHA.
Can we prevent DDoS or spam form submission by using client authentication?
|
Tamper-Evident devices and measures are devices which in some way indicate that an event not intended by the developer or manufacturer has occurred. Examples of tamper-evident devices are stickers that leave specific residue or are destroyed upon removal, etc.
Some of these tamper-evident devices are comparatively easy... |
I read on Wikipedia's Article on SNMP
SNMPv1 and v2 are vulnerable to IP spoofing attacks, whether it runs
over TCP or UDP, and is a subject to bypassing device access lists
that might have been implemented to restrict SNMP access.
I'd like to ask why.
|
I recently ran a Nessus scan on my network, and one of the issues that it revealed is a possible avenue for cookie injection (session fixation) through Javascript. The related Nessus issue can be found here:
https://www.tenable.com/plugins/nessus/44135
Is the only solution to update the Apache server package? Or is the... |
I have a client that has a couple of machines that are build to cut kitchen tables. These machines still run on Windows XP and are connected to the internet.
Now I need to find a way that these people can run these machines as safely as possible without updating from OS (not possible, I asked the manufacturer from the ... |
I'm trying to find the best degree of entropy for a password template, and after carrying out several tests, the best result came from this: à.
This symbol alone adds 160 characters to the set (contrary to lower-upper case letters, numbers, or even symbols) and is readily available from a Spanish keyboard such as the o... |
Would someone using basic authentication in a URL such as
https://username:password@example.com
have their credentials be visible to their ISP or DNS?
|
eNSiiFh+GQpFT2B/KrHFamSj4eCag2xAftOXIJ096Sk= is some data provided.
By looking at this data I have to tell if this is an encoding or encryption process.
How do we know the difference by looking at the data?
|
I have a certificate that says the application was signed by Google, but on multiple searches I have reason to believe that it's not actually a google signing certificate.
Is there a way to query google for their approved signing certificates to check the validity?
- Issuer: CN=Android, OU=Android, O=Google Inc., L=M... |
If a website user wants to use WebAuthn, they will start by creating a credential, where their authentication device provides a public key.
This key is encoded, and sent back to the server to store against their account.
Later, when the user needs to be verified, the website provides a challenge, their authentication d... |
Assuming that BIOS integrity can be restored by resetting with the manufacturers bypass code, can a USB device running a corrupted/compromised Linux distro be restored to a state of integrity? The distros are FWUL 3.1 and Qubes respectively on a Acer E5-521 which has had it's hard drive and WIFI card pulled. Despite ... |
I'm using JWTs for authenticating users for my mobile and web applications in the same API.Both access_token and refresh_token have same expiration
Passport::tokensExpireIn(now()->addHours(1));
Passport::refreshTokensExpireIn(now()->addHours(1));
When a user logs in
authenticate (username and password) store acces... |
This is kind of a weird question maybe, so let me explain a little background first that I hope is relevant.
I work as a Developer/Analyst for an organization that operates in a federated model with a central authority, except I'm part of one of the many federated entities. We use software (CRM, Business Analytics, etc... |
In a docker container I am reading the files /proc/stat and /proc/meminfo. As I understand they are the ones of the host. (Not local to the docker container)
In a meeting, a co-worker said that this is a security breach and must be vetted by internal security consultants.
The container does neither run privileged, nor ... |
My company wants to move an internal web app to the cloud. The app only accepts SSL/TLS connections and requires all users to authenticate using our Single Sign-On provider.
Today when a user wants to access this internal app remotely, they connect to our corporate VPN. So the current plan is to configure a site-to-sit... |
According to this question on Quora:
Scanning a public IP address can be a cyber crime.
But there are a few public IPs that can be used for testing purposes such as
45.33.32.156 which is belong to http://scanme.nmap.org/
176.28.50.165 for http://testphp.vulnweb.com/
Is there anything else? I would like to have so... |
I always assumed that each lock is unique and can only be opened with the keys it was sold with (or any copies made later from those originals). But the truth seems to be that they just make "a few" variations (10? 100? 1,000? 10,000?), mix them together and sell them, hoping that it will be "secure enough".
Is this re... |
I'm trying to crack the password Ul1234 using hashcat. I created a user with that password in kali and copied the hash in the shadow folder:
nils:$6$3q88Up7LX1RFIlRU$gVzo1NvtuV4SmJ2SNv6mcLLc9rWtzNsI6u3TKEkKVXb3gNQKhcK/C6y1DW6q4ODNIJrjf1ondgZ7RHqD7kprI1:18296:0:99999:7:::
So the hash should be :
$6$3q88Up7LX1RFIlRU$gVzo... |
I'm reviewing the /etc/sudoers file on a machine in response to CVE-2019-18634, a buffer-overflow vulnerability present in sudo. The bulletin on the sudo.ws website recommends the following mitigation:
If the sudoers file has pwfeedback enabled, disabling it by pre-pending an exclamation point is sufficient to prevent... |
A typical OAuth2 Authorization Code Flow scenario looks like this:
What I'm not understanding is the purpose of the client secret in steps 6 and 7. If the auth server is guaranteed to redirect back to the web app and send its authorization code there, how could an attacker get the authorization code (which is presuma... |
I was reading this article about how the Server Authentication is being done During SSL Handshake
https://docs.oracle.com/cd/E19693-01/819-0997/aakhc/index.html
I do understand everything but I have a specific question about the point number 3 when it says
if the CA certificate’s public key doesn’t correspond to the ... |
As stated in the title, what can I do on the server (or anywhere else for that matter) to protect against phishing attacks?
Some suggestions I've heard is to tell users that you'll never send them a link to click on. However, our password reset functionality is built around this.
We've also added two factor authentica... |
Specifically, I would like to determine, by querying the SSL object, which of the following cases apply:
No outgoing cert was provisioned.
Cert was provisioned but the server never requested it.
Handshake terminated right after send of cert was acked.
Handshake continued after send of cert was acked.
|
Consider the following scenario:
Someone, using a good version of git, issues a git clone followed by a git checkout of some commit hash (the 40 character hexadecimal).
To clarify, assume Bob does the following on a secure machine:
$ git clone https://secureserver.com/HonestEve/project.git
$ git rev-parse HEAD
whic... |
Is it possible to brute-force a WiFi password, since technically there are no limits with login attempts?
If there is any, the MAC address of the attacker device can be changed.
|
How does the Russian Federation enforce the blocking of websites for end users? I know that ISPs have a database of DNS records that will redirect the user to a corresponding IP address for a given URL. Does that mean that every ISP in Russia has the same DNS and the records are always up-to-date?
|
A Zap scan against an app detected the "Web Browser XSS Protection Not Enabled" vulnerability on sitemap and favicon. Would it be safe to ignore those URLs or does it mean that the app is vulnerable?
Here is the full output on favicon:
{'long_description':
"The X-XSS-Protection HTTP response header allows the web ser... |
Send the files by email or upload then in a drive are not a option since my friend's connection is very poor and is a lot of files.
She gave me a USB drive to save her files but I know her computer is infected with a lot of things, I can barely use her PC without stopping work.
So, I would like to know if is there a s... |
Which information is utilized in the account recovery process, after an account hack, if all personal information used to create the account was made-up (such as a nickname) and it's impossible to assign the information to a physical person?
Specifically for a YouTube channel.
If both Gmail and Google accounts, which... |
I've heard in a conversation and read in some forum posts that Cloudflare will proxy your IP, hiding it from the public, and this mitigates the risk of an attacker finding your server in the first place, making it more secure.
Is there any truth to that? It seems like a trivial "security through obscurity" trick, which... |
I'm curious as to whether you can be infected with malware by using a proxy? I currently process data using Python but occasionally I encounter recaptcha, so I'm looking to implement proxy support.
The data processing is simply an experimental project. So of course my priority is the state of my computer and so I want... |
I would like to open a folder using .NET and it seems like as if Process.Start is the way to go: Open a folder using Process.Start.
I already read How to securely use Process.Start? but it deals with user input and was answered almost six years ago, it might be outdated.
I have a certain path like the following which i... |
We have a series of Jenkins nodes that are used to deploy changes onto our SQL Servers, which works fine as long as everyone behaves and can be trusted.
The worry is that a rogue developer or hacker could simply add something like this into a Jenkins file and trash our data or performance:
node (production) {
... |
I've noticed that lots of CVE at www.cvedetails.com do not have publicly available exploits. But they have high scores (ex: score higher than 9).
With such a high score, I'd thought exploits would be readily available but it's not the case (not even present in exploitdb).
So how would a hacker, from the description at ... |
I Want to release software and it is going to be hosted on the client system. How to make sure that it should not be copied or how to restrict unpaid users using the software.
I have 2 questions.
What are the different options to implement?
What are the different aspects of security to be considered?
Note: This appli... |
SSDs seem to be notoriously tricky to properly erase (see for example this question and answers here). An easier and potentially safer solution could be to physically destroy the SSD device.
I am looking for a way to physically destroy an SSD device that..
can be done at home / in an office (with limited emissions),
... |
I have a project that runs a website with a frontend SPA and REST API backend.
Currently the code is split into /client and /server folders and they run independently. However, they are currently in the same repository.
If I hire some contractors that will work only on the client side code, is there any security benefi... |
I just set up Algo VPN on Amazon EC2. I'm wondering if this will be vulnerable to attacks if the Amazon EC2 instance is compromised. or if Amazon hand over my instance to someone else. Moreover the ISP in this case is Amazon, doesn't this give Amazon the ability to see my traffic? Also once a VPN is set up, the destina... |
In the IT Security team where I work, we currently use the Standarized Information Gathering or SIG tool to evaluate IT security posture of prospective 3rd party vendors. What I like about the SIG is the questions are standarized and depending on responses, only relevant follow up questions are asked.
At very small ve... |
First off: I do not, nor intend to, use a home brew hash functionality, ever. I'm aware why one shouldn't do that and have read enough topics about it to know it's foolish to do.
I understand that I am no expert at the subject and that those who are could find and abuse a vulnerability in my own made algorithm and coul... |
I am currently looking into how to protect a BLE connection from active attacks (man-in-the-middle) if one of the devices neither has a display nor a keyboard.
Lemberg Solutions suggests this:
Alternatively, the passcode can be shipped together with the devices
(on paper or as part of an online purchase), and the u... |
Whenever I copy a program into the Applications folder on my Mac, I have to use admin rights to do that. My standard user account (marc) does not have admin rights, so I get an alert and have to fill in the right credentials. I'm the only user on this computer.
I've done that many times, but often ask myself if this i... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.