instruction stringlengths 24 29.9k |
|---|
Looking for general mail server security best practices here.
I did some research and it's really hard to find the information out there.
How do you safeguard a smtp server log? Are there any encryption tools out there? Our reason is if the server is compromised, at least the logs are not in plaint text format for at... |
So I recently stumbled on multiple cases suggesting there's a JPG/PNG exploit which is able to silently execute malicious code when simply viewing the image? Just looking for some insight as to whether this vulnerability requires the user to open the png or just simply " view " it.
videos showing POC -
https://www.yout... |
By configuring ssh, only set IP can log in over ssh. I found this important since I'm going to provide public-facing web services which would expose my IP. Moreover, I can't use a CDN for some reason I prefer not to share. Furthermore, I need to protect against zero-days in sshd. (Credits: @mti2935 )
However, I don't h... |
I'm using Windows 10. I found several ways to install Kali Linux on Win10:
Install it on VMWare
Install it on Docker
Install it on Linux subsystem (WSL)
I might need to access some files in my physical computer so I'd prefer the Linux subsystem. Can you tell me the pros and cons of each method ??? Is there any possib... |
As stated in the title - is formatting my own USB stick on a separate computer with live-Ubuntu enough to prevent malware infection?
I work as computer technician and sometimes my pendrives must be plugged into potentially unsafe computers of my clients, which afterwards makes me think of how to properly clean them be... |
As far as I know, a digital certificate contains information about a user or firm that has been vouched for by a trusted organization.
https://www.geeksforgeeks.org/digital-signatures-certificates/ says
Digital certificate is a file that ensures holder’s identity and provides security.
If person A holds the digital ... |
Why do Browsers implement a Same-Origin-Policy (SOP) to prevent open websites in the browser from executing scripts that may access / modify data of other open websites in the used browser?
Another more 'usual' approach would be to simply sandbox each open website, i.e. every website 'thinks' to be the only website on ... |
So far I understood that from Bluetooth 4.2 onwards the Pass Key method is safer due to pre-shared public keys and a 128-bit encryption key. After this pairing process occurs, is the link between the two devices kept encrypted? Meaning that if users sniff data transfer between the two devices they can't see the actual ... |
I understood the difference between them. The problem is I am not sure when to use each. I mean, if a firewall will block my connection to the target when I use bind shell, why the connection will not be blocked, when I send the payload again through reverse shell
|
In web, what is a certificate issued to, a website, a web server or a web application?
Which has to handle certificate, a website, a web server or a web application?
For example, when I run a web application on Nginx, an article shows to configure Nginx to support HTTPS and certificates.
I was wondering if a web ap... |
I was in Windows 10 and it told me I needed to Initialize Disk so I clicked it and now my LUKS header has been overwritten. I created my encrypted partitions in Linux with cryptsetup command. However, I have another drive that uses the same password and keyfile as the one with the overwritten partition header, ... and ... |
I have a scenario as the following:
<?php include("resource/" + $_GET['vuln']); ?>
And I'm trying to get RCE from this, or atleast acquire some interesting information.
I already looked at /etc/passwd and other important files. Are there things I can do to bypass the resource/ prefix (since it disables me from usin... |
SSL Labs checks for TLS version intolerance and TLS extension intolerance. I've seen another answer on this site that covers version intolerance, but what does extension intolerance mean, specifically, in this context?
The most information I could find online is that specifying extensions in the ServerHello message tha... |
Say we have a server-side code does a whitelist validation of allowed file extensions when user uploads a file:
// Java code
if (allowedExtensionsInLowercase.contains(fileExtension.toLowerCase())) {
// File allowed
} else {
// Booh, bad file
}
I was wondering if a unicode-extension could be lowercased into a valid e... |
I'm currently trying to get a bidirectional TLS 1.2 connection working between 2 local Karaf-based XMLRPC servers that by design only accept POST requests. The environment is Windows 10 and both XMLRPC servers are running in the same JDK: 1.8.172. I'm currently at the point that the client can send a ClientHello to the... |
Is NONCE supported in Asp.Net when implementing the Content-Security-Policy header to protect from XSS ??
I read that NONCE was not supported in Asp.Net, however, I read another simple article, that shows how it is done? Does anyone use nonce for CSP headers, I was able to make my implementation work without it by usin... |
Can someone help me understand how the PCI Timeout rules change for an application like the Starbucks App? A user is able to keep their card open ready for scan for longer the 15 minutes if needed, but PCI A11y AA also requires to display a message giving the user a chance to react and keep the session alive.
I underst... |
I'm talking about a class of old mobile phones that are not smartphones but are still (theoretically) Internet-capable, at least via 3G. Examples of such phones include Series 40 Nokia phones or the
Samsung phone featured in Spectre (OK that one at least is still available so I have to retract the 'old' word). Note the... |
Are injection vulnerabilities mainly a design or an implementation problem? I'm using SQL injection as an example; I'm interested in other injection vulnerabilities as well.
I believe that it is the direct consequence of lazy programming, i.e.
lack of input sanitization
lack of parameterization (not using APIs and in... |
I created a hotspot on wlp2s0 and connected an android device, whose IP is 10.42.0.62.
I am trying to route my all packets from my wlp2s0 interface to burp proxy which is running on 8080. I also enabled invisible proxy, but still no luck
I am routing packets using this firewall rule
iptables -t nat -A PREROUTING -s 10.... |
Consider the following website. Page A (https://example.com/login) contains a login form and its password field has the attributes name and id set to "password". Page B (https://example.com/vuln) has a XSS vulnerability that allows an attacker to inject JavaScript code. One opens page A in a browser tab and enters a pa... |
I think I've understood what CASB are and the differences between proxy/API-based architectures. What is still unclear to me is how exactly API-based CASB function.
I know most products use APIs to traverse the cloud documents storage to download and inspect the documents. Or maybe even use APIs to download auditing l... |
From Google's Cross-client identity document:
Cross-client access tokens
[...]
The effect is that if an Android app requests an access token for a particular scope, and the requesting user has already granted approval to a web application in the same project for that same scope, the user will not be asked once again t... |
I've got an SD card that I think might contain infected files. However, those files are from my Windows days. I hear that Chrome OS is pretty hardy, and that it's really only posisble to get damage from apps and extensions. But if I were to, say, plug in an SD card that's got malware on it... what then? Sounds to me li... |
I have an Ansible script that setup google chrome apt repo. I keep Google's signing key together with the scripts (rather than download it every time) because I think it minimizes the chance of getting malicious key (TOFU security model).
Now the key no longer works:
W: GPG error: http://dl.google.com/linux/chrome/deb ... |
When creating a Security Policy such as Password Policy, what are some of the typical assets that need to be protected?
And how does this affect, employees, contractors, vendors, suppliers, and representatives who access the organization-provided or organization-supported applications, programs, networks, systems, and... |
How likely is one to get hacked or infected using an end-of-life Windows 7 if you dont upgrade to either Windows 8 or Windows 10 ?
|
My google account was compromised recently, and I'm trying to go through all details to understand how. Maybe you guys have ideas.
I discovered a few days ago that my gmail account had the following settings:
Filters to automatically delete certain incoming messages
IMAP setup
Application Specific Password (not sure w... |
By running a simple port scan, I have noticed that pycharm is opening three ports on the machines it is installed on.
Pycharm is a great tool for developer, but it seems fairly awful to me on the security side. Opening ports is a known security hole, and they do not advertise loudly they are doing so.
How can I prevent... |
Can I use Wireshark to see what websites are visited on my network? I'm just looking for the domain name, and not a full url or any credentials. Would I need any additional tools such as sslstrip to see this? Would getting the DNS query be easier?
Thank you in advance for any help.
|
Online joint accounts that are similar to bank accounts that are joint accounts?
Say you want to have two partners for a certain account, let's say a PayPal account, and you want to make it so that if one partner wants to change a password he must get confirmation from the second person.
Are there currently any online... |
I wonder if there are virus scanners that can be run without installation.
It would be very practical.
Simply insert the USB pen drive and scan...
It would be good if the scanner also detects malware.
|
A few days ago while messing around with a web server, I put my server into a DMZ via my router and forgot to disable it. I opened port 80 and 3306 on the server's firewall (Windows Server) to access it on my LAN. Today I logged into the server and noticed several databases were deleted from phpmyadmin and the logs sho... |
Is it correct that there are various ways that a HTTP client can authenticate itself with a HTTP server?
Are the following such ways?
authorization header: for various authorization protocols (e.g. basic, digest, ...)
digital certificates: as used in HTTPS.
specify user name and passwords in HTTP request's message ... |
I have a project where I would like to allow a user to view a document (PDF) in their browser by clicking on a link or thumbnail of the file. They would be able to download said file. Ive just begun to research the vulnerabilities associated with PDF files but here is what I can gather so far:
PDFs can contain executab... |
I'm trying to run a docker and it fails for various reasons. As I check my list of dockers (docker ps -a), I see those names:
pedantic_gauss
recursing_feynman
adoring_brattain
suspicious_tesla
gallant_gates
competent_gates
elated_davinci
ecstatic_mahavira
focused_mirzakhani
I use docker-compose and I'm sure we do not ... |
I have a folder with very important files on my computer and I zipped it with a password for security reasons. Unfortunately, I'm not able to recover the password. Usually, I always use the same kind of passwords but I have done dozens of tries and I can't remember what the password is.
I usually use passwords of 10 to... |
Like many, most of my time is spent away from home: at work, the gym, out socializing, etc. I'd estimate I use my internet a few hours a night.
I never turn my modem off unless I travel for longer than a few days, and I have not disabled SSID broadcasting, as I've read that doing so has little to no security benefits.... |
Given a situation where a system has SSL 3.0 and TLS 1.0 enabled would the following mapping be accurate:
Weakness/vulnerability: The remote service accepts connections encrypted using TLS 1.0 and SSL 3.0.
Threat: An attacker can exploit these flaws to conduct man-in-the-middle attacks or to decrypt communications be... |
HTTP knows to look for user names and passwords in authorization
headers in HTTP requests. So this is at HTTP level.
Is it correct that putting user passwords into message bodies of
HTTP requests is at web application level, which is higher than the
HTTP level, because HTTP doesn't interpret the content of the
message... |
In our environment we have three type of machines: Root CA (Microsoft CA), web servers and user PCs.
We need to move our Root CA to another site, there are many guidelines on how to migrate Root CA by backup and restore it. But do I need to reissue all certificates on web servers since the FQDN and IP address of the Ro... |
I have some sensitive client data that needs to be hashed, but I also need to check that that data isn’t duplicated by another client.
So the hash function needs to produce the same value for the same data so I can search the db for duplicates.
One option is brcrypt with a constant salt but that isn’t very secure.
Any ... |
Question:
How can an AWS IAM policy be devised to differentiate between a console (web) and access key (API) access?
Use Case:
Say, I want to allow the a certain group of users full IAM privileges via console(web), and read only IAM via access key (API).
The specific use case is that I trust some AWS users with full I... |
I thought cookies are stored on client side only, as files. Then I realize if cookies are not stored on server side, how could a server match a cookie just received from a client to some session or other information created in the past?
So is it correct that cookie information is also stored on the server side?
How d... |
I am learning about malware and botnets and came across that botnets can "self-propogate" and I am confused as to how they can do this. I know that a botnet can be created through multiple people downloading a malicious software or clicking on a malicious link/email attachment but how can an infected computer infect an... |
I've made a signing key with GPG and I would like to have it verified since GPG displays a warning whenever a file signed with my key is verified. I've heard of Let's Encrypt but it only talks about HTTPS. Can I use it on my signing key?
|
I assume that anything written or read on WeChat is read by the government of the People's Republic of China. I understand the risks of that.
However, I would like to understand the implications of using WeChat for other data on my device. With earlier versions of Android, you had to grant all an app's permission reque... |
I am currently in the process of employing a 2FA authentication on as many services as I can. If it is relevant for the question: I use a time-based OTP authenticator app.
When setting up, I noticed that some services offer a way to login on systems which don't allow 2FA by generating specific app passwords:
Microsoft... |
I am looking to build a custom keyboard and bring it to work, but the security department is extremely wary of keyloggers, and rightly so. Now, my understanding of hardware keyloggers is that they are either USB adapters or additional PCBs wired into keyboards, and since I am not planning on wiring a keylogger into my ... |
I'm using JWTs for authentication. It would be good as a means of double checking the user's experience if an admin user could log in as a regular user.
One way I thought to implement this could be to test the hash of the login password against a master password hash when authenticating in addition to the user's passwo... |
I posted a question yesterday about PDF files in a browser that can be found here. There you can find more information about dealing with PDF documents in browser.
My question here is how each browser handles PDF files by default.
PDF files can cause security concerns because the have the capability to contain executab... |
I have been gathering information on handling PDF files for web applications. Much of my research has been on displaying the files to the user.
What I want to learn here is how to properly handle the file on the server side. That is,
1. How to properly accept and store a new document.
Lets assume I can trust a new inco... |
Forgive me any mistakes as I am not very knowledgeable in cryptography.
I would like to prove to any 3rd party that a user, with email $x$, accessed my server/database. Only method I can think of is to request the user to sign some message right after logging in. Problems:
The user may not sign the message even though... |
We have an Active Directory EC2 server on AWS US East region that has DNS enabled to resolve only internal hostnames. It is not reachable from any hosts on the public internet.
Recently we enabled an AWS service called Guard Duty for threat detection and it flagged a finding which indicated our DNS server communicated... |
I'm trying to perform Reflective Dll Injection via VBA macro. The main idea behind using Reflective Dll Injection is to bypass Windows Defender as dropping an dll onto the disk seems very loud.
The problem is that I would like my VBA macro to run with Administrator privileges. I want excel/word vba macro to force Run ... |
I may not be using the appropriate jargon, but I'll try to explain in my own words.
My understanding is that usually a firewall is facing the internet, but my question is about a differnet setup. I'm setting up a terminal at home to interface with my office server which has sensitive information (FYI, its a small busin... |
I am monitoring a webdav service that has been probed repeatedly since the beginning of February. The Apache 2.4 httpd server hosts just this one application. Access to the application is only possible over https and is controlled by an .htaccess file. Various directories in the web site directory tree are further ... |
I'm new to penetration testing and I found a Reflected XSS vulnerability on the website I'm working on.
But the thing is when I submit the form, the website automatically redirects me to www.website.com/sendform.php without showing the parameters in the URL.
Is there a way to exploit the XSS vulnerability in a way that... |
I noticed that both of the Feitian USB/NFC U2F Security Keys I purchased on Amazon a few years ago are unfused. This means that the pre-personalization step was partially performed but not completed in a irreversible way. The devices are otherwise working normally. I have no idea if more recently purchased devices are ... |
I have used pfsense before as the main gateway, load balancer, traffic shaping, proxy, firewall, virus/malware protection, enterprise wifi solution for an entire office of 50+ users. Yet I have received criticism from top IT companies who have done an audit on our IT infrastructure calling this solution immature and in... |
Flask Web Development says
The current login functionality implemented with the help of Flask-Login stores data
in the user session, which Flask stores by default in a client-side cookie, so the server
does not store any user-related information; it asks the client to store it instead. It
would appear that th... |
So my phone was stolen but it has a PW. Could the thief reset it somehow & access to the gallery or my SD cards? Personal pics of me that i don't want leaked. Plus how do i even know they've been leaked? Thanks
It's a Samsung
|
I have rar with protected pass.But I have the AES-256 key can I crack it and if I can. how?
|
First things first, I'm a newbie so, bear with me...
I created a word list with a combination of a possible password for a certain user using Crunch (it's the dictionary output) and need to use John The Ripper to sort through all the possible combinations in the wordlist created for the password and display it, alongsi... |
A client is developing a website which is vulnerable to reflected XSS through a GET parameter:
https://example.com/vulnerable-url?")||true)alert("XSS");</script>
I would like to demonstrate this vulnerability by providing a link like the above but the text contains characters (such as the ") which are URL encoded by a... |
The API of a mobile app I was testing is sending the AWS AccessKeyId and SecretKey used for request signing from the AWS Cognito server unencrypted (apart from the regular TLS encryption). Making it possible to re-sign all requests to their AWS Lambda API, e.g. using Burp's "AWS Signer" extension.
With this, a Man-In-T... |
I have a Laravel 6 site, and a legacy Drupal 7 site. Both are served under the same domain, and both share the same user database table.
I'd like users to be able to log in via Laravel (never via Drupal) and then browse between the two systems freely, being logged into both.
Rather than attempt to reverse-engineer one ... |
wanted to get some advise in our OAuth process of getting token from 3rd party. Any comment would be appreciated!
User click a short link and rediredirected to original link https://webssite.com/oauth2/authorize?client_id=CLIENTID&scope=SCOPE&callback=CALLBACK_URL
User facing 3rd party login form
After user login succ... |
10 minutes after installing Nmap on a fresh install of windows, NMap loaded on its own and attempted to scan dozens of IP addresses around the globe. I never initiated the scan. Notice the source address is different than my own IP 192.168.50.241. How is this possible? Is this a feature in NMap? Packet generator? Virtu... |
I want to generate combinations in sequential range of the length 8-20 with the following characters:
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890!@#$%^&*()~`";.,/[]-=
How could I achieve this with kali's crunch wordlist generator tool?
I am trying to crack my own wifi password using crunch to test ho... |
There is an old Windows XP installation that was being used without even an antivirus. This WinXP computer has files. These files are important and should be moved to a Linux installation. Given the lack of any security practices on the side of the WinXP owner it seems possible that the data contains malware.
I can now... |
When connecting to a specific website(www.test.yyy.com) inside of an organisation SSL/TLS handshake is performed.
From my understanding, I would say that one of my personal certificates on computer is used to validate the encryption/decryption of transferred data.
Now I want to figure out which one is used for that spe... |
I am trying to crack a less than 4 character Linux password using john. I unshadowed my password into file.txt I use the following command:
john -incremental file.txt
the output is:
0g 0:00:00:04 0g/s 1226p/s 1226c/s 1226C/s sonkys..michot
0g 0:00:00:05 0g/s 1259p/s 1259c/s 1259C/s 083078..115269
0g 0:00:00:06 0g/s... |
I have an application under test. The application response with a simple HTML with a response code 200 to every requests. The HTML contains link tags and script tags which contains necessary js files and css files to render the HTML content later.
So, if I run a gobuster or dirb against the app, it responds with the s... |
some_admin_user ALL=/some_path/some_bin ALL, !/some_path/some_sh
How to bypass the above sudoers rule.
|
I wonder how vulnerable are Sweet32 and Lucky13? I mean, how often do the attackers use these vulnerabilities to gain access?
|
[Tue Feb 11 10:37:00 2020] 127.0.0.1:49951 [404]: (null) /c/msdownload/update/software/defu/2020/02/am_delta_patch_1.309.678.0_2ed0992bc429bfc321a0209f24dcd8912733a2a5.exe - No such file or directory
The above was logged by PHP's built-in webserver, which listens on 127.0.0.1:80 for my internal, private use only. It i... |
I always thought that to authenticate email we needed both SPF and DKIM (and DMARC). But email is confusing and recently I found myself asking why we can't do with just SPF or DKIM. I then discovered that the problem with using just SPF is that automatic forwarding will break (at least if we check alignment with the Fr... |
I would like to clarify the following scenario with DMARC, (assuming there is a publish DMARC policy):
SPF fails
No (aligned or any) DKIM records
Should result of DMARC check be none or fail? Technically we cannot align anything with From thus we couldn't find any aligned identifiers (because failing SPF cannot align... |
There are some EPP solutions that are considered very innovative (Crowdstrike, SentinelOne...) for the use of Behavior Monitoring. What is the difference with more standard EPP solution (ex. Symantec Endpoint Protection) that have also some behavioral monitoring capabilities?
|
I have a number of relatively small password files that I'd like to use with Hydra in one go without having to manually merge them but it seems that it doesn't natively support this or stdin.
From https://security.stackexchange.com/a/198871/29845, I thought that something like the following could achieve this:
hydra -l... |
In this question on this board the author of the selected answer states the following.
If you, as an attacker, manage to extract hashes and salts from a database, you probably either find a way to extract the password hashing algorithm of the website or you just create a new account with a known password, extract the ... |
If I do a web search for proxying macOS apps using Burp Suite, I don't get any useful info. Instead, I get dozens of results talking about how to proxy iOS or Android apps. I am talking about desktop apps. On macOS, I've followed the below steps:
Downloaded and installed Burp Suite (Note it's been installed, as I'm no... |
Sorry for being still confused. I hope someone could share how they understand the following questions and also Is session/cookie based authentication stateful or stateless?. There might be some different terminologies used by different people. We can focus more on the concepts than terminology, and define terms before... |
i read every available hijacking websocket guide/explanation there is in the wild but i still don't understand one thing.
In a CSWSH it is possible to custom requests to the server and retrieve sensitive information that an attacker can steal, also perform sensitive state-changing actions like a normal CSRF.
But, is it... |
A neighbor, somehow, knows, when I connect to the Internet - and begins shooting something at my home (ice pellets). Is there a way to prevent people from seeing my SSID/internet connection? We are on cable Internet; I heard that was akin to a party line.
|
I want to be able to spot a phishing email. What are the things to check when investigating and doing forensics on one?
There are some things I know to look for already but I want to get moer technical with it.
Here are some things I already look for:
verify the sender (actually looking at the senders email rather t... |
I work for a small company and for our webapp, we want to offer bug bounties for vulnerabilities reported with monetary rewards based on criticality.
Problem is we only have a limited overall budget and dont want to promise anything we cannot pay. My question is: how to best phrase out the terms for our bug bounty proj... |
I have an application that is a SAML SP, authenticating users via inbound SAML assertions from some other IdP.
If I want to require multi-factor auth, is it a common practice to add multi-factor auth on the SAML SP side, on top of validating the incoming SAML assertion? Or is it more typical to expect MFA to be impleme... |
In a TLS handshake using DH to negotiate a session key, a prime number on both sides must exist. Calculating a prime number large enough to be secure takes a litte computational time.
When does chrome generate this number?
|
Say I talk to a developer who is using some output of a Pseudo-random number generator in order to do some security task. I know based upon common knowledge that only Cryptographically Secure Pseudo Random Numbers should be used.
However, I want to take this a step further - how would I create a proof-of-concept that t... |
I'm building a desktop application with electron/react, which allows the users to sign up/login, but only if they have a specific email domain (user@example.com). I have a working API written in golang that can successfully serve GET requests. As for authentication,
I've tried mapping out my authentication flow, but I'... |
I am trying to understand the benefits of a PKCS #11 keyfile stored on a smartcard such as a YubiKey with regards to Veracrypt volumes. Am I correct that the file will be taken off of the hardware device to be used? If so, this would seem to expose it to software running on the system therefore negating most or all o... |
I'm a newbie to software security. I'm designing a network and I was wondering is it possible to detect if a program upgrade being downloaded on the network is malicious just by analyzing the structure of the downloaded executable?
I tried some literature search but couldn't find much. Any help is highly appreciated. ... |
So, I was involving in one of projects where client site and admin panel/dashboard was hosted on different sites. Not like a lot of CRM`s do or 90% of common sites (just in /admin or other URL location on root client site), but literally on different domains.
To get access inside of dashboard login page, user should d... |
I have a number of contacts who can only decrypt 3DES, when it comes to S/MIME encrypted mails. I'm aware that this is by far not ideal, but better than no encryption at all.
My problem is, that I can't find a way to force Thunderbird to use 3DES for specific mails. Thunderbird itself doesn't seem to have an option, so... |
I need some help to understand my problem.
I'm studying a way to provide authentication for my applications.
My scenario:
I have a set of APIs with restricted access and users that will be authenticated and authorized to consume these resources.
I'm using Keycloak as Identity Management to authenticate/authorize users.... |
Imagine I connect to example.com, change my IP address using my VPN service, and then remain on example.com in my browser. Meanwhile I open some other sites and eventually switch off my VPN service. Therefore I start using my initial IP again and continue using example.com. Can example.com detect the change of IP ad... |
When running vulnerability scans, often a particular version of, say, Node.js is reported to be vulnerable along with a recommendation to update to a higher version. Then we also have insecure SSL/TLS protocols, like TLS 1.0 and SSL 3.0, and it’s recommended to disable them altogether. For me, any of the above recomme... |
My employer issues a list of security recommendations when using a work laptop outside of the work network. The security recommendations are related to such risks as data theft, viruses, or other unauthorised access. Most recommendations I understand, but this one surprised me:
Never connect simultaneously to two di... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.