instruction stringlengths 24 29.9k |
|---|
After reading some research papers about cold boot attack, I got a big shock and start searching for ways to protect against that kind of vulnerability. I got one solution that is using BitLocker pin access to RAM. But I have still a concern.
Windows 10 Latest patch can protect cold boot attack?
DDR3 or DDR4 RAM still... |
I've asked if I could continue working from home. They said ok. The laptop belongs to the company with VPN on it. From home I'll connect the laptop to my personal network/rooter with wifi. When I'll deliver the laptop I'll change my personal/home wifi password. Is there any other security concerns for my home network w... |
Is there a way or program to make another program think I am using a different system?
For example, let's say currently I am on Windows 7 32-bit and I want the program to detect Windows 10 64-bit or perhaps Windows XP.
Can I do something similar with hardware? Can I tell a program that I'm running on a PC from the earl... |
My apartment complex uses PPPoE CHAP authentication for internet (Mikrotik router), I want to switch their provided router with my own, however they aren't willing to give me my password.
I have fooled the router by connecting it's WAN port to my computer and running a PPPoE server on it, however, the router does not a... |
I read that developing a security layer on top of communication protocol without any binding between them could cause an issue like MITM attack. I am having a hard time seeing how that could be possible. Can someone shed some light on this?
If there is no binding, can attackers manipulate lower-level layers to bypass t... |
I am testing a website that makes heavily use of REST API endpoints. After authentication, the app adds the authentication token as part of every request in the form of:
OPTIONS
https://www.target.com/api/Action/some-action?data=foobar&access_token=THISISTHETOKEN
User-Agent: ...
Accept: */*
..
Host: target.com
Length: ... |
When making a SASL/GSSAPI bind to an LDAP server over port 389 (ldap:///), after the authentication is finished is the resulting LDAP traffic encrypted? If so, is there a document or RFC that describes this?
Assume that no STARTLS command is issued by the client.
Note that the question "Is it secure to be using LDAP, ... |
I added MFA to Office 365, but a security specialist says it can be defeated with NecroBrowser, which can capture and transmit an already MFA-authenticated cookie. I can't find any specifics about this.
What steps would a user need to take to install NecroBrowser?
Has this been patched? Any links to the prevention an... |
I want to measure the guarantee of integrity of a digital signature.
I use RSA with a 4096 bit key, and SHA 256, and a passphrase. The level of security is going to depend on these three factors, yeah?
How do I measure how safe the digital signature is?
|
I have a domain which when opened shows :
Whatever I type after xyz.com/whatever appears on the title bar as xyz.com/whatever , if i write xyz.com/stackoverflow the title bar shows the same as xyz.com/stackoverflow.
Is there any XSS that i can perform here??
|
I am quite confused. I have been reading about SSL stripping and what I have found is that
The client (victim) has to initiate the first connection via HTTP
The server will redirect to HTTPS - here is were interception and stripping occurs.
But I have also read articles where the first connection is an HTTPS connec... |
In RFC 6749 Section 4.4 regarding Client Credentials Grant:
4.4. Client Credentials Grant
The client can request an access token using only its client
credentials (or other supported means of authentication) when the
client is requesting access to the protected resources under its
control, or those of ano... |
What is the risk of altering time in a system via an NTP exploit or any other mean in a network?
Could it be a step to a higher severity risk and how exactly can it be exploited?
|
As part of an internal Client/Server application, I have created my own (self-signed) Certificate Authority (CA), as well as both Client and Server certificates signed by my CA.
Loading my CA certificates into FireFox in PEM format is relatively easy.
Creating an HTTPS server in Go using my Server certificates is also... |
What I am attempting to do is ensure all ingress web traffic [http(s)] to exampledomain1.com forwards to exampledomain2.com but I still want to use the MX record of exampledomain1.com to point to at google's mail relays for mail delivery.
I know that I can do this at the application level with redirects and a web-serv... |
I've read that many types of malware scan a system for various clues regarding virtualization software, in order to stifle forensics. Is there any way to hide the fact that a computer is a virtual machine from malware?
|
I recently successfully uploaded an msfvenom binary payload into a Windows server 2008 VM.
My netcat listener displays the following message:
connect to [lhost ip] from (UNKNOWN) [rhost ip] 49155
which means it is connected.
But when I run commands such as dir it doesn't output anything.
What do you think is the pr... |
My understanding is that most secure web communication protocols ultimately want to agree on a symmetric encryption algorithm to use for sending and receiving data. Once an algorithm is agreed upon by both client and host, how is this maintained on the host/server side? For example, when multiple users are SSHing into ... |
I'm adopting/setting up DNSSEC on my domains for the first time, and curious about the practical benefits I can expect. In theory, regardless of whether client/stub resolvers want checking, recursive nameservers can request signature chains, and, for any domain where the higher-level delegating one indicates that there... |
I believe many will benefit from this as there is not clear answer online and I keep making my policies too strong and locking myself out from accessing the LAN admin panel.
What would be the absolute strongest security settings without locking myself out on the Firewall Zone settings.
The settings go as follows and t... |
I'm implementing my JWT method by using the double submit method: where we separate the payload & header portion of the JWT from the signature.
The header & payload is stored in a separate cookie, not HttpOnly so its accessible by the client, and the signature is HttpOnly.
The implementation seems pretty straight forwa... |
I'm extremely confused on the topic of generating a session long CSRF token on a single page application using React.
It looks like the convention is to have the server generate the CSRF token on log in, and embed the token on the login form.
However in single page applications, it's not so simple.
What is the best met... |
I may be misunderstanding, but if I want to use a hashing algorithm such as argon2, what's stopping from someone seeing how it works and reversing what it does?
|
Google Timeline claims (e.g. here) that "Your Timeline is private, so only you can see it."
What does that mean? As a cryptographer I would take that to mean that the Timeline data is encrypted using a key that only I have access to.
But based on some of the features, that doesn't seem likely. For instance it can be ac... |
I am developing a system for storage of medical records. A person could upload image(s) or file(s). Since it is a medical record , it needs to be stored in encrypted form.Also I want that the files or images could only be seen by authorised user. Can you please suggest what standards should I be using (The API is in No... |
How to remove malware from files?
Files may be images, documents or videos.
Except Anti-Virus are there any other ways available?
|
Can I recover a password of an AES-encrypted ZIP if I know its extracted & decrypted content? The archive contains two files protected with two different passwords.
|
Key generation program in C:
#include <stdio.h>
#include <stdlib.h>
#include <time.h>
#define KEYSIZE 16
void main()
{
int i;
char key[KEYSIZE];
printf("%lld\n", (long long)
time(NULL));
srand (time(NULL));
for (i = 0; i< KEYSIZE; i++){
key[i] = ran... |
I'll keep it short and clean and illustrate it.
There is a chat that has a JS/AJAX exploit that some hacker is using to redirect the site, Im trying to access the site without being redirected.
The site : https://chatws.com (Login as a guest to see what I mean)
The injected code is something like this :
if(my_usernam... |
Based on other questions, it seems protecting GET resources with CSRF tokens is useless. However, that quickly becomes untrue when CORS gets thrown into the mix
I have a server domain server.com and a UI app at client.com. The server.com domain handles user auth and sets a session cookie under the server.com domain. It... |
There are several posts here about how easy it is to spoof caller ID and that there is no way to detect it.
I did find one post suggesting the calls to 1-800 numbers could not be spoofed.
being done by forwarding calls to a toll-free number, which then (by virtue of being toll-free) receives the true calling number ... |
My concern is with resource constrained devices with limited resources to perform verification of signatures e.g. RSA signature. What I know is that the asymmetric keys are use to determine that the symmetric key is coming from legitimate source.
Since, some of the IoT devices lack resources for such computation. What... |
I would like to know if anyone knows how to stop or speed-up an in-progress ZAP passive scan on version 2.9. I have a 64000+ passive scan queue and it is not draining fast at all.
I have disabled all of the passive scan rules by going to Options -> Passive Scan Rules and setting the threshold to "OFF" on everything.
... |
The main thing i am interested in is the 3rd point below.
In short I am worried about having a virus and what will suffice to remove it.
I am on Mac and am running the latest version of Catalina. I do a lot of stuff on the command line using iTerm2 as an emulator and fish as the shell. As a package manager i use homebr... |
I was trying to access my account on an e-commerce website but I couldn't get my password right. So, the website offered me the option to authenticate using my security code from Google Authenticator alone (my 2-factor authentication method). I was wondering if this is a possible misuse of this concept of multi-factor ... |
I am currently using mac os disc utility on mac and normally create a 10GB encrypted image to store my random private files in...
What really makes me paranoid is how fast or shall we say that it opens instantly once i put in my passcode.
I tried to experiment, made a 50GB encrypted volume, filled it... again it opens ... |
I live in Peru and we have a small problem in the organization where I work. Dozens of documents are physically signed daily but this is a waste of time since there are documents that must be signed by more than one person and these people are in different geographical locations.
I am thinking of using digital certifi... |
I left port 6005 open on a server of mine. Currently, if the server goes down, it won't be much of a loss. But my port 6005 is open for Redis queues and I don't necessarily want to have deal with it going down.
To clarify, port 6005 is open to all connections with no encryption or password. It is on a server with nginx... |
Is there is a way to create a better anti-malware tool by utilizing malware to fight against malware itself?
I've looked up how anti-malware works and searched a lot in famous sites like Avast Blogs (Academy) and articles on McAfee, but nothing addressed this question.
Is it (ever) possible to make malware fight for us... |
Given an application which prints user-supplied values inside single quotes in a JavaScript context while escaping ' - but not \ -, is there a way to gain XSS without /?
Example code:
<script>
test('input1, fixed, input2', '/some/path?somearguments');
</script>
Transformations for user input:
' -> \'
\ -> \ (not t... |
I want to automate web vulnerability scanning and generate a HTML/PDF report.
Are there any WVS that offer a scanning and reporting API? If so, what are some examples?
|
This has been really getting my nerve.
My friend installed some freeware which, in turn, hijacked the homepage of various browsers. The latter include chrome, edge, internet explorer, etc.
Here is the basic information on system hardware and software .
Hardware: Dell XPS13 9360
OS: Microsoft Windows Pro 10.0.18363
Anti... |
How would one go about defending against this sort of attack to best protect a sloppy user? There can be obvious signs of a spoofing attack, such as not using SSL, slightly different domain, etc, but I am assuming Tristed.com (the malicious site) has completely fooled the user. The only mitigation that comes to mind is... |
Years ago, I was running a service where the moderators were able to do various actions with massive privacy implications if the accounts or contributions were less than a short period of time. I did this by checking the timestamp against the current Unix epoch, allowing for X hours/days. Normally, this worked well.
On... |
Is it possible to stop VPN access for all devices when you are the administrator of the wireless connection?
|
I have an iPhone that runs 13.3.1 (latest at this time). It's a corporate phone and has an MDM profile installed. I've been using the phone for almost 2 years now with a custom keyboard (Google Keyboard). However, after recently traveling to the States, I noticed that my phone is forcing me to use the default Apple key... |
This is my first time using JWT. I'm using the jwcrypto library as directed, and the key I'm using is an RSA key I generated with OpenSSL.
My initial inclination was to store the JWT in the database with the user's row, and then validate the token's claims against the database on every request.
But then it occurred to ... |
I am building web applications for my customer's company. At the server side, there will be 2 kinds of server to server network communication.
Separated REST API servers making requests among each other.
Communication from application load balancers (AWS ALB specifically) to their auto-scaling EC2 instances.
Currentl... |
If I want to deploy a Laravel WebApp using MySQL DB on a VPS like DigitalOcean, Vultr or similar platforms, should I separate the VPS into WebApp VPS and MySQL VPS? Is it more secure?
And what if I separate the Laravel project into AdminProject and UserProject but use the same MySQL DB and VPS. Is it more secure?
|
My understanding as as follows:
Client requests a secure connection with a Website's Server
Server provides a certificate with the address of the server and public key of the server encrypted with a Certificate Authority's (CA's) private key.
Client then decrypts that certificate with the public key of the CA which is ... |
When I scanned a host for open ports I came across the following result:
PORT STATE SERVICE
22/tcp open ssh
80/tcp open http
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
3306/tcp open mysql
What does filtered mean?
|
I want to backup many secrets using a secret sharing scheme, to make sure my family can access those secrets in case of my death. I need a way to keep adding secrets (without distributing new shares).
I can encrypt all the data with a symmetric cipher and then distribute that passphrase, but then I have two options, bu... |
How can I make sure in the terminal that my Ubuntu updates are from the real source?
I am asking because I know that one download was fake. It was rkhunter. The update was malware. Done from Bangkok. I think it was DNS hijacking.
|
I have a REST API that is used by 2 separate application and is authenticating them by M2M OAuth2 Client Credential Flow.
One of the two application is an automation service without user context. The second one is a REST API where users authenticate with OAuth2 Implicit Flow.
Now I need to include the user context in... |
I have a fundamental theory question. Is looking for cross-site scripting a solved computer science problem? Or is it an open problem? Does it approximate the halting problem, injection problem or similar known CS problems?
Or is XSS not intractable but just tedious to find and fix as there are many possible sources an... |
I am puzzled by how people on Youtube bait scammers into connecting to their machines and end up "reversing" the connection on them. Essentially controlling the scammer's PC.
Is this done via reverse shells ? Or do you get them to open up a malicious application, ie do you have to use a dropper ?
I want to know how is ... |
We have an issue where people are taking laptops home and connecting them to their personal home networks in order to backup corporate data to their private NAS devices. From a DLP standpoint we have trouble reconciling this activity because the activity destination is typically a private IP, something like 192.168.1.1... |
If I am storing multiple customers' data in cloud-based file storage such as an AWS S3 bucket, and I use an encryption service such as AWS KMS to achieve encryption at rest, does it add any extra security for me to store each customer's data in a separate bucket and use a separate encryption key for each customer?
Or i... |
I am not that familiar with security and malware analysis, but I know it is theoretically possible to embed a malware into files like video, audio ...
Say that someone managed to embed a malware into an mp4 file and send it via gmail.
I have the following questions.
Is it easy to bypass the google security that is... |
We have a web application where the input fields for login are: username and password. In order to prevent brute force attacks, we have implemented a lockout function for 5 invalid tries of valid username but the incorrect password.
What the penetration testers did was use the same password but enumerated usernames un... |
I want to design an api which an organization is going to use to connect with my server. For a client-server application, a simple jwt-based authentication is done by verifying user credential and generating a token for them.
My question is what should be the process for authenticating another system? How that organiza... |
All my life, well, at least since the late 1990s, I've heard of this concept of "script kiddies". Allegedly, it's a term to refer to young kids or teenagers who, apparently, are somehow able to find "proof of concept" pre-coded exploit scripts of some kind, and proceed to download these to their own computers where the... |
Lets say I have two internal hard disks, one for the operating system the other for backups. If i make sure to delete the MBR and partition table with dd if=/dev/zero of=/dev/sda bs=512 count=2048 of the disk with the operating system to avoid the possibility of a boot sector virus.
If I reinstall in what ways can that... |
I think the following is not possible, but I have no proof and would like to find out wether it is possible or not.
Let's say in a network, every participant cannot connect to each other participant directly. Every message is sent via a person M. Every participant can connect through M to every other participant.
Is th... |
I understand CSP can be beneficial against multiple attack vectors (i.e clickjacking, XSS), but as it specifically relates to XSS -- why is it a solution?
My reason for asking this question stems from a question that i was recently asked. "If input sanitization / output encoding always works, then why has XSS still a ... |
I need to create an attestation key (AK) and use it to sign arbitrary data in TPM 2.0. The TCG Guidance documents, suggest that some TPMs may come pre-provisioned with an AK that is part of the endorsement hierarchy. I am wondering if there is way to tell whether a TPM has such a key and if not what is the best way to ... |
I'm concerned about my network that I'm currently using. There is an network on my flat with several access points in the building and the network admin is providing access - afaik it's PEAP with 802.1X
He's not the internet provider, but just normal person that manages this network.
I've got concerned when trying to ... |
I want to do a malware test that specifically uses recent morphic malware samples (polymorphic, metamorphic, etc). There are a couple of good sources I can pull samples from, but I need to know if their signature will change or not.
The best idea I have so far is to use a tool to disassemble it so I can look at the As... |
And can they break the PIN number easily?
|
We want our users to send us a post request to an Azure Function endpoint. Is storing sensitive data (such as connectionstrings or passwords) in the post request body going to be an issue? Any insight would be greatly appreciated.
|
I'm building a webmail application using php at the moment. I'm getting the email content from gmail using Imap and wanted to display the email as close as I can to how gmail shows it. Is it safe to display the raw html body from the email or is there additional steps I should take to ensure my application is secure fr... |
I've been messing around with qpdf, and noticed something that seems huge: that a document's Owner Password is essentially useless, as it can be easily unset, and therefore that only the User Password offers any real security for a PDF.
For example, when I set a User Password and an Owner Password on a PDF:
qpdf --encr... |
Is it possible to exploit the "Ghostcat" vulnerability (CNVD-2020-10487/CVE-2020-1938) indirectly over mod_proxy_ajp?
I was able to successfully test the proof-of-concept exploit (https://www.exploit-db.com/exploits/48143) when targeting my Tomcat's AJP port. However, my tomcat instance is not directly externally ac... |
I'm new to security field. I have a website. Whenever I upload a photo to the website that, for example, its name is 123 with the format of .jpg, its name seems to turn to string like this f408KFcUb+k=. The address for reaching this image will be something like this:
example.com?imgID=f408KFcUb%2bk%3d
If I upload the... |
I'm the admin of a small Linux server owned by a relative of mine. He's fairly tech savvy, but more at a level of a power user than an expert. I want to make a handy visual tool for him that would allow to do some simple server tasks: add/remove users and change their passwords; set up/remove websites; set up/remove ma... |
Let's say "User A" has a set of data like below. Each entry has been hashed (sha256) to ensure integrity within a single entry. You can't modify data of a single entry without also modifying the corresponding hash:
[
{ data: "000000", hash: "91b4d142823f7d20c5f08df69122de43f35f057a988d9619f6d3138485c9a203" },
{ data: ... |
I have the following command:
patator ssh_login host=<ip> port=<port> user=<user> password=FILE0 0=<path to pwdlist>
I would like to output the success result only and not output every attempt. Is this possible?
My first attempt was:
patator ssh_login host=<ip> port=<port> user=<user> password=FILE0 0=<path to pwdl... |
I have 2 ssds both with Windows 10. If I boot the 2nd ssd and start downloading infected files can my primary ssd be infected too?
|
I was on a webmastering forum and saw an ad that made a disturbing promise. They claimed that if a person makes a casual visit to your web site, they can obtain that person's email address, and either send emails on your behalf or supply the email address to you.
I've been fighting email spam since '91 and first sat d... |
The Wikipedia article about emergency numbers mentions that Most GSM mobile phones can dial emergency numbers even when the phone keyboard is locked, the phone is without a SIM card, emergency number is entered instead of the PIN or there is not a network signal (busy network).
Is there anything that makes a regular ca... |
I see every now and then how hackers stole DB with emails and hashed passwords of millions of users from popular websites and sell it on the black market.
I assume that passwords were hashed with proper unique salt for each which makes rainbow tables useless.
And in the end, a consumer only gets emails and useless hash... |
AWS provides signed url to objects in bucket.On backend we can connect with AWS and create such signed urls and send to front-endJust discussing this one use case where we use that signed url to make a put request through javascript, thereby directly uploading file to bucket from webpagehttps://medium.com/@khelif96/upl... |
I'm working on an embedded device which need to decrypt a file in USB stick using a secret key. I read many questions about storing a key in embedded device and found that it's secure to store a key in a volatile memory such as SRAM.
My idea is to use a function to calculate the key from a random string (like sha256("s... |
In every TV program where there's a person that wants to remain anonymous, they change their voice in a way that to me sounds like a simple increase or decrease in pitch (frequencies). What I'm wondering is:
is the usual anonymizing method actually based on a simple change in pitch, or is it a more complex transformat... |
I'm able to edit a parameter which is then reflected inside a link. I'd like to know how and if it's possible to cause a redirect. In shorts when i edit the parameter example like this example=/test.com that value is reflected in generated link like: www.example.com/test.com but when i open the link the browser loads w... |
I have come across a CTF challenge that has a part with an SQL injection (MySQL DB). I have completed it, but I do not know why or how the injection works.
The query in the PHP application would probably be like this:
SELECT * FROM users WHERE email = 'admin@admin.sys' AND password = md5('1234');
And the injection co... |
Imagine yourself connecting your personal device to your workplace wi-fi network.
Can managers, network administrators, or some other person/potential attacker see my browser's activity if I'm using Tor browser or run all my traffic through the Tor network?
|
I'm currently reading about the TPM and remote attestation. Here's my current understanding of what is happening.
To attest a PCR value to a remote party, the TPM signs the value with an attestation key (AK). This AK is not linkable to the endorsement key (EK) of the TPM, and thus doesn't leak the identity of the TPM. ... |
I'm about to buy a new WiFi router tomorrow (probably) & I'm wondering what kind of security features I should choose (Like: AES, WPA2, DMZ, TKIP, SPI, ...)
What is the current status of what is considered to be secure?
As I understand it, eg. WPA encryption was cracked MANY years ago, how is it with WPA2?
Or AES? I al... |
I'm aware of bootkits and booting a device causes it, so if i'm reinstalling the OS and the stick i'm reinstalling from is compromised will it cause infection during installation itself?
The hard drive i'm installing to is set up as GPT i no MBR is definitely effected by a bootkit, i'm assuming the only way to avoid th... |
I'm using openssl to convert an exported *.p12 file into a *.pem file that has a certificate and an encrypted private key.
The P12 file was exported with a password, this is the command that I'm using to generate the PEM file:
openssl pkcs12 -clcerts -in exported.p12 -out both.pem
When I run that command I provide a ... |
I want to run a program on a vps, which uses my api key for doing financial transactions. I don't want there to be any chance the host owning the vps or any other hacker to ever be able to see my api key. Is there a way to make this impossible.
|
On a homepage I can inject HTML-text in the URL. After som T-and-E I was able to send in this thing; ?type=<script<script>>alert(1)</script<script>>
Which gave me a homepage which presented me with the headline-text: <script>alert(1)</script> So I am pretty close.
The Page Source had the following HTML: <h1><script>... |
At the moment, there aren't any of those vulnerabilities that we know. I was looking the docs on what damages can be done by hackers if apache tomcat favicon is revealed in web application.
|
I am interested in the metrics of the attack. Is there any packet rate that can be considered a reasonable threshold to detect this attack from traffic perspective? Or this is completely connected to the limits of the hardware?
|
If I understand it correctly memcached servers respond with a larger packet as response to a user request.
I spoof my address to 1.1.1.0 (memcached servers).
Now that I, masquerading as the memcached server address. I can send packets to rival.com
rival.com will turn down.
|
I'm confused with the term "Dynamic SSL certificate", how it works and what the difference is with a usual SSL certificate for web communication between client and the server.
For example, I'm using ZAP proxy. We must set the SSL certificates that are dynamically generated by the application and save it, so our browser... |
Is there a working open-source implementation of a WiFi channel-based man-in-the-middle attack out there?
I have been looking for it for a while and what I found so far was this python package which is in python2 and I don't think it works. I tried contacting the author but he probably stopped maintaining it.
Then I th... |
I'm a beginner at proxy traffic stuff and I'm struggling here with Charles Proxy
I'm trying to 'intercept traffic'. I have an HTTPS page and I want to display the data from the content (inside Charles proxy).
ALL my https are returning <unknown>
I'm currently using Firefox. I'm not manually setting the proxy configs.
... |
I'm trying to import and scan Open API Definitions and it seems to me that the url parameters and request body are not being replaced with real data. Is there a way for OWASP ZAP to automatically replace those parameters and body requests with real data? If not, what other optimum solutions are there solve this?
Thank... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.