instruction stringlengths 24 29.9k |
|---|
I'm having difficulty to rate a CVSS for an Identity Provider.
Imagine you have a vulnerability where you can bypass an authentication mechanism.
How would you rate :
Confidentiality (C)
Integrity (I)
Availability (A)
as you don't with which system it will be connected?
The scope is changing, but I can't just assume... |
From what I read, I understood that both the bastion host and the dual homed host are special computers that act as a link between the local network and the internet, so what is the difference between them?
|
Security Newbie,
I'm using OpenSSL for my client, and noticed that when testing it against Bad ssl's sha1-intermediate test, it accepts it although the agreed upon cipher is TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (0xc02f). I had to set the security level for OpenSSL to 2 using SSL_CTX_get_security_level in order to bloc... |
Does hashing once on clientside and once on server-side increase security when dealing with an untrustworthy server?
For example when dealing with open source projects where users can self-host their version of the service.
My thought process behind this:
When only hashing clientside it's essentially sending plain pas... |
I am a programmer. I recently developed an automation tool that periodically downloads couple of files over a non-secured (http) url.
Two files are:
A text file that is very tiny (under 10KB) which has details about
the version, checksum of the main file, the relative path from where to download, size of the file etc.... |
My organization within my company uses this KEX Algorithm in our SSH Implementation.
Another organization within my company won't connect to our servers as long as this algorithm is implemented as they claim it is "weak and vulnerable". They referenced this article:https://nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.796... |
This post has been MOVED to StackOverflow due to lack of answers on Info Security:
https://stackoverflow.com/questions/60960802/securely-encrypt-and-decrypt-files-via-pbe-in-java-jasypt-seems-insecure
Considered solutions were Jasypt and Google Tink but neither worked well for Java. See above stackoverflow post for de... |
I am developing secure payment APIs, i want to avoid manipulation of API parameters and fired same API again. For example, following is the API call
https://api.payment.com/wallet/transfer?from_account=123&to_account=456&amount=100
Once this API call is executed, someone with enough knowledge can execute the same API c... |
Our concern is more on application side prevention automated attacks. Although the firewall does it part to help prevent this, it has been mandated in our development team's security practices that we need a 2nd level of protection. Solutions such as MFA and CAPTCHA are solutions to a different issue. They help reduce ... |
In our enterprise we have an antivirus solution but we are evaluating to pass to another solution. What could be a good strategy to test on our enviroment what antivirus solution works better?
|
To reduce disk space I have planned to use a hard link instead of full copy, Is there any security issue while two different processes using different hard links of the same executable file as base?
|
I have a single port open for my own proxy server. All other ports are closed. Is it safe for my PC? Even if my port will keep getting bombed by hackers could my PC be exposed to them? There is no sensitive information going through my proxy so I don't mind it to be leaked, but I want to keep information on my PC safe.... |
I need to desensitize data for reporting. There may be some PII but nothing like SSN, mostly Name or Phone. They won't be concatenated together anywhere. Also this is in the US with no European (or other regions) data.
Given the same key and input the hash needs to create the same output. Therefore I can't use somet... |
It seems that the default password based key derivation function that is used by PKCS12 to generate a MAC is this one. It is unique to the standard and probably not used anywhere else. Is it possible to use PBKDF2 instead to generate a MAC? Surely I can use PBES2 scheme with PBKDF2 to protect key bags, but how do I enc... |
I have a zip file containing an unencrypted folder with encrypted files inside.
Given that for some files I have their originals, is it possible to restore the password used for encryption?
|
My bosses have tasked me with coming up with a kind of "friendly reminder" card that we can leave on the desks of folks where we see they've walked away without locking their workstation and we have to lock it.
Has anyone else ever had to do something like this or do you have like a template email you have to send to ... |
I know that for text, WhatsApp messages are encrypted in a way no "man in the middle" could read them. But what about images?
Imagine you received some private image on your smartphone. Then you open WhatsApp Web on your PC, which uses an employer VPN.
Would the employer be able to "download" the image your Whatsapp We... |
I want to create a java program for server client communication. Therefore first the client creates a RSA keypair. Then the client sends the public key to the server.
After that the server will create a RSA keypair and also send its public key to the client.
Is it safe to say that now (after key exchange) it is safe to... |
Does it matter where I buy my TPM from? What are the downsides of buying a $15TPM over Ebay? Can a TPM be a Trojan horse that compromises my security?
|
I have a question about the security of private repo's on Github. Assume you use HTTPS authenticated against SAML SSO to fetch and push changes to remote. Could an outside adversary scrape the files from the display page if they know the URL?
|
Consider a blogging platform - example.com and we want to host untrusted content in subdomain1.example.com and subdomain2.example.com.
By default, same origin policy doesn't allow communication between these two subdomains. Beyond SOP, what are some of the security considerations we need to have in place to make sure s... |
I have seen many posts here about /etc/hosts, but I don't see them addressing this issue. The issue is:
If a person adds 127.0.0.1 mywebsite.com to their /etc/hosts file and 127.0.0.1 has dangerous social engineering and other malicious content. When the access mywebsite.com in Chrome, which has the Safe Browsing techn... |
Description
PayPal suggests that generating a PIN by spelling words (on a numeric pad, e.g., [ABC] = 2) is a good method for security and memorability, e.g., B-L-U-E-C-O-W = 2583269.
My knowledge about password security is limited and I have not found any information about this. While these PINs are not completely rand... |
There's some website which I can't have access to and they return 403 error to me. On the other hand, there are some DNS servers, where if I use them, I can have access to those websites!
Does using these unknown DNS servers cause any security risks for me? Is there any way for the owner of DNS to use my computer or m... |
I've been working on an eCommerce store for people to be able to buy items. I want to implement a basket system for this store.
Looking at lots of other posts, it is clear to me that there are definite security risks from using sessionStorage/localStorage techniques in order to store data on the clients side which can ... |
I'm trying to crack my wifi (WPA-CCMP) password to test its strength and security, I'm using the commview for wifi and aircrack-ng software on windows 10. I've three laptops, Windows 10 (64bit) with dual boot ubuntu 18.04, only Windows 10(64bit), Windows 7(32bit), with Qualcomm Atheros QCA61x4A Wireless, Intel(R) Dual ... |
I'm trying to perform a De-authentication attack on my own network and client. However, the client never disconnects and I cannot boot the client from the AP.
I'm running:
aireplay-ng -0 0 -a [BSSID] wlan0 -c [TARGET MAC]
I'm close to the client
Target is a normal laptop computer
AP is an ARRIS (I've been able to cap... |
I've set up an Evil twin access point using the aircrack suite, what i'm missing is how to complete the man in the middle access point side like the picture shown below, I've been suggested ettercap but I'm not familiar with it.
The goal is: establish a connection between evil twin the and access point and trick the a... |
I'm using a KDF (PBKDF2HMAC) to generate a Fernet key from a given password, but to do so I also need to generate and store a salt.
import base64
import os
from cryptography.fernet import Fernet
from cryptography.hazmat.backends imort default_backend
from cryptography.hazmat.primitives import hashes... |
I'm peparing for OSCP and I found an interesting situation (Alpine Linux).
There is a daemon super_service executed by root that is reading configuration file from /var/super_service/configs/ which is a symbolic link to location that my user john has no write permissions.
$ id
uid=1000(john) gid=1000(john) groups=100... |
I'm new to Linux and want to understand if X11 is really as dangerous as they say on the Internet?
I will explain how I understand this. Any application launched from under the current user has access to the keyboard, mouse, display (screenshot), and this is not good. BUT, if we install programs from the official repos... |
The Diceware method of password generation is simple, secure and easy to use
When registering an account on a website
Why do websites not suggest to their users to use the diceware method?
Why do websites not include a diceware based password generator?
What other reasons make this a bad idea?
|
I am using PHP as a server side language. And I don't use CMS or Framework. From the nginx log the website attack seems obvious.
I wonder what kind of attack the attacker attempted.
The attacker sent 941 malicious queries over a period of about 5 minutes, some of which are listed below.
--- Nginx Log 1 ---
[23/Mar/2020... |
I am trying to make the http request by removing the header termination character. I manually removed it by intercepting the request in proxies like burp and manually removing the header termination CRLF. I wanted to do the same using python script. I know, using 'requests' or 'urllib' packages, I can make the request ... |
I'm looking for a way to limit the certs that my IPsec can accept. I'm using StrongSwan (swanctl version 5.7), I want to accept only certs coming from a remote with a name of yoji.*.example.com
I searched a lot on the internet. The documentation does not give any solution except modify on the client-side, which I'm not... |
I have a python script ,which accepts an incoming connection, reads from the byte stream ,hash it (I'm pretty sure the hash function itself can't be exploited) ,sends the hash key back ,then closes the connection .
Is my server secure (by secure I mean the data on my server is not leaked ,doesn't have to be serving 7x2... |
Will the DNS server reply to the spoofed address if you send a DNS request on behalf of it?
What I'm trying to ask isn't DNS spoofing but spoofing the source address.
|
Django templates have access to a large number of builtin template tags and filters. I'm wondering what the security implications are of accepting contributions from template authors without reviewing them.
In what ways could a malicious template author attack a Django web application?
|
I'm trying to get a password from a website (From my account, I know the password) using Hydra. The problem: I can't find any usable feedback from the website telling Hydra if the password is wrong or not, so every password gets accepted.
I'm currently using:
hydra -l SchR-esgf -p NotMyPass [IP] http-post-form "/users... |
What I am building is service that can be consumed by third-party. Something like Omdb API for example.
For my service to be functional I needed to disable CSRF on some endpoints.
How can I secure them? To make CORS rules? To whitelist domains or?
Thanks.
Edit:
API trusts a few known host, and handles anti CSRF token ... |
I was trying to aireplay'ng my home WiFi but I understood that with the new generation of APs, there is a system of protected management frames. So I'm asking, is it still worth it to perform an evil twin attack? I think not, because without deauthenticating a station, the client will never go to search for a new conne... |
I remember learning about an attack against sequential cipher locks - ones that don't have a 'reset' or 'enter', you just enter digits and as soon as the last n consecutive entries match, the lock opens. So, if the code is '1234', the sequence '32431234' will work just fine.
The attack depends on a specific sequence t... |
How concerned should I be about this result from unhide?
unhide-linux scan starting at: 17:02:43, 2020-03-23 Used options:
logtofile [*]Searching for Hidden processes through /proc stat
scanning
[*]Searching for Hidden processes through /proc chdir scanning
[*]Searching for Hidden processes through /proc opendir ... |
Hi is there a way where we can extract public key from certificate signing request ? if so can this be done using python3 ? here is the sample csr from https://www.digicert.com/order/sample-csr.php as an example. I have some POC regarding this, please let me know the steps of extracting public key from CSR, or do I nee... |
I have a hash
$office$*2013*100000*256*16*664f9e0787392c2b1632d3947aaadee4*27dc7d029f76244a407acf9b5afa3740*ebbc055ae08124f6a6be81ef812da4fece16b2ad86eede3916d9cda15f71833f
password: лl
My wordlist:
6ceb
eb6c
6c6c
лл
лl
ll
Start hashcat
hashcat -a 0 -m 9600 'h.lst' 'wordlist.txt' --force
this leads to failure.
A... |
What is the role of leaf certificate's private key if this certificate is signed by the intermediate certificate's private key and the certificate signature will only be validated using its public key.
|
I'm developing an API and different apps to access to it, each with different scopes, including a native mobile app, and I'm wondering what would be a good strategy to authenticate my own native app to my own API (or more specifically my users).
I can't find a recommended method to guarantee that it is really my client... |
Today when I opened an incognito session in Chrome Browser, I got an immediate pop-up from Avast antivirus:
Should I be concerned that my antivirus is acting like spyware? I sometimes use the TOR Browser Bundle (Firefox), can avast monitor that too?
|
I refer to this question's answer, the second part mentioning the random data, and no headers or anything, including files that are recognizable. Reading the answer just made me think adding random file data would just further the security?
If an encryption method does make all of the data (when viewing the HEX values)... |
I need to keep notes that are personal (decisions, objectives, goals, ideas, projects) and I was thinking of using box.com which seems to be quite trustworthy, but how do I know that box.com respects the privacy of my data? Asking me this, I came up with the idea of using a free hosting service (I know a very stable on... |
Does the CORS policy add any value during the development phase? Should I develop with CORS on or off? The development is occurring in a distributed environment and there are no local copies of components, only a testing environment where components are uploaded and tested (not on the same servers, so CORS still apply)... |
It seems to me that there's some sort of "race condition" when you install a new Linux OS (this applies to every OS, but I'll restrict this question to Linux only). When you download the OS for a fresh installation, the image is usually out-of-date. In OS's that have a rolling release policy, the downloaded image is no... |
I have a company that has been attacked through SQL and their tables were removed. The attacker put a message replace it with all database entries.
The first thing that I did was to figure out if the sql port is open globally. What I saw was the sql 3306 open locally on 127.0.0.1. How the attacker reach it?
Hint: he di... |
I'd like to better understand my workaround, and confirm that it's secure.
Problem
I have a crt file containing a root and intermediate certificate installed on my server (I have limited access to the server - its running in a third party docker container running Wildfly).
I have the root CA certificate installed on m... |
I have previously removed less secure ciphers from WHM (Web Host Manager) however it has been a while and I want to learn how to fish, not be handed a fish.
The trouble seems to stem from the fact that there is little-to-no consistency in how ciphers are referenced or even where they are defined.
WHM Cipher Definitions... |
I'm working on an API that I'd like to be accessible internally by other servers as well as devices that I consider both as confidential private clients. Devices are considered private clients because the client_secret is stored in an encrypted area that prevents from unauthorised readout and modification (even though ... |
My scenario: A production facility that uses data sets provided by customer(s) to produce personalized goods in bulk. Data sets can range from 100,000 to 2,000,000 names and addresses in the US. This isn’t PCI and doesn’t fall under HIPPA or Sarbanes-Oxley Act.
In a job shop environment, how long is too long to keep ... |
Authy is a popular cross-platform TOTP application that supports syncing keys across devices. I have been a little confused by the idea of having a desktop client... This way if someone accesses my primary PC they'd find all my passwords saved in my browsers, and would have access to my TOTP keys as well...
Doesn't ins... |
A local brewery recently ran a photo contest where the grand prize winner is determined by a public vote using a third party platform/administration. One of the entrants reached out to us because they suspected that someone was using a platform or application to enter multiple votes at one time. In the last hour they g... |
I was using Edge on my personal device at home browsing stuff and realised I was logged in on Bing.com with my Microsoft work account. I cleared my browser's browsing history and also Bing's browsing history for my work account. I am sure I saw some ads while I was browsing in some websites.
I am using Microsoft produc... |
There are many tools, devices and programs that by default run a http server and expose a user interface on port 80. Even my coffee machine has a web ui that it provides on port 80.
Now, it's easy to make these existing webservers available through the internet by simply doing port-forwarding on the internet facing NAT... |
I am testing web service on production.
There is a standard SVC web page available like the example below (another randomly selected webpage, just for example). Is it ok to have this page available on the production environment?
|
Issue: I have a presigned url which is valid for 15 minutes. Upload can be initiated any number of times if the presigned url is captured in this time frame.
I want to make an S3 presigned url for upload as secure as possible, so that uploaded file is not modified. I always need first version.
Solutions I researched f... |
I am able to make cross site requests because I have enabled CORS. I read about CSRF vulnerability which is caused by the fact that browser sends cookie when making a form POST request.
I tried to exploit my website to see if it works. Therefore, I tried with something simple first. I sent a cross-site GET request but... |
Recently I started new work, and going through documentation and code to understand what company is doing. While doing that, I noticed there is logged number of special characters in his password.
Personally, I don't think it is good idea as disclose some information regarding password, especially for users who didn't ... |
I am performing security testing on a Rest API and it is a POST method. I injected a XSS script in a body parameter and the API responded with '400 Bad Request' error, but the response displays the XSS script that I have injected in the request payload.
If the response is '200 OK' and if the response body displays the... |
The attacker spoofs SYN packets to attack a server.
In this document:
Spoofed Attack: A malicious user can also spoof the IP address on each SYN packet they send in order to inhibit mitigation efforts and make their identity more difficult to discover. While the packets may be spoofed, those packets can potentially b... |
Like so many others, I'm an intermediate web developer who is starting to get into the security side of things and I'm looking to start running a Linux VPS (Debian). For years, I've resisted the move to VPSs because of the security implications. There are many, many guides available on the internet and even questions o... |
I looked around, and all I see is websites using RSA2048 for Root signature, and a few using ECC for encryption.
Are there any reasons folks don't seem to use ECC for TLS root signature?
Are there any drawbacks to using ECC for X.509? - if indeed it's possible?
|
How should I understand the word "hijack" in network security?
In Cloudflare's page about the Mirai botnet, there is a sentence:
The Mirai botnet employed a hundred thousand hijacked IoT devices to bring down Dyn.
Does the word "hijacked" mean "be controlled"? or "infected"?
|
I get a sentence:
If an attack is created using a botnet the likelihood of tracking the attack back to its source is low. For an added level of obfuscation, an attacker may have each distributed device also spoof the IP addresses from which it sends packets. If the attacker is using a botnet such as the Mirai botnet,... |
I have done some research but have not found an absolute answer to my specific question. I understand the basic concept of how this header will allow or disallow website A from sending request and viewing response to resources on website B.
However, suppose website B set the header Access-Control-Allow-Credentials to ... |
I'm trying to create a script using the Node ZAP SDK. The script needs to perform an active scan of the site on localhost while signed in as a super admin; if no user is signed in, it can only reach about 3 of the 50 or so available pages.
I have the entire script working, except for signing in as the user. Now, when I... |
Due to situation, my employer made a work-from-home policy.
And remote administration tool is not installed, since I did clean installation of the system.
Is my employer able to see my activity?
Let's say that I use my company email.
What steps shall one take to secure his activity?
P. S. Don't write "You'll break com... |
I would like to understand whether nmap can be used to detect the operating system type for realtime OS (Vxworks, threadx, free RTOS, etc.).
Has anyone done similar work before? Or if you have any idea how to do that, please share.
|
My server is using Django Rest Framework. My mobile app logs in using token authentication. However, I also have a webview in the mobile app where I need to log in. I can't inject the auth token on every request in the webview, so I use the auth token for authenticating this endpoint and then create a session from it. ... |
I have a REST API which returns an auth token when the user is logged in successfully. This token needs to be sent in different routes for authorisation. This is working fine is my android app. But I want to use this is my website and I am not sure how should I be storing auth token in browser securely .
|
I want to block Microsoft Store on Windows 10 pro in a corporate environment. Having read relevant articles about this matter and tested on my machine, I see that Windows 10 Pro does not support this function (either through Group Policy [not recommended by my Manager] or Registry.
Now, I opt for another solution, that... |
Guidance on the PRIME profile for IPsec (https://www.ncsc.gov.uk/guidance/using-ipsec-protect-data) does not explicitly mention the use of PFS.
Is there a recommendation for its use in the Prime profile I'm missing?
|
I was on the Kik messenger app, and someone in a group chat posted screenshots of his modded Kik app that contains an "IP grabber". He said he could hack people easily, and was very fast to tell me my own IP address. He was able to tell when anyone in the chatroom was lurking (i.e watching the chat without typing), for... |
I have an architecture with a root ca and a sub ca like this:
root ca > sub ca > server <----------> external client
The root ca delivers a certificate for the sub ca.
The sub ca delivers a certificate for the internal server.
So I have two ocsp responders: one in the root ca and another in the sub ca.
My goal is to ch... |
Why are there predefined sets of cipher suites. Why is creating your own cipher suites not recommended.
|
So far, I knew that traditional HSMs (Hardware Security Module) can be used to store key of a single user. But, recently, I came to know that newer HSMs have the capability to store keys of multiple users and let users use those keys to sign documents. Newer HSMs does this using Subscriber Authentication Module (SAM).... |
I've found that UltraVNC Single Click is an interesting alternative to TeamViewer.
However it as far I understand uses RC4 to encrypt. Would you recommend this tool to remote desktop bearing in mind the security?
|
Since newsletters are often forwarded (and in fact successful ones encourage it!), what's the conventional wisdom on the security of unsubscribe links?
It's common practice to provide an unsubscribe link at the bottom of every newsletter or newsletter-like email sent to consenting customers, along with a List-Unsubscri... |
First Situation: I proxy through some requests to zap and want to perform an active scan on them. Zap active scan is working on one property at a time, and this particular request requires some of the properties to be unique per request.
For example, a username can only be used once on registration, what pattern in zap... |
I know they say CSRF tokens are the most secure way to prevent CSRF attacks but what if someone uses XHR to retrieve the page containing the csrf token along with the form and then use that token for his attacks?
Why they don't say "Referer" header is the most secure way to prevent CSRF attacks? Afterall nearly 99% of ... |
In general it's recommended not to store refresh tokens in local storage. The Auth0 documentation advises against it.
Even though I am aware of the underlying threats, what I am not aware is if there are any alternatives as to how to store those tokens in order to have persistence within the duration of a user's sessio... |
When building a system, where all users belong to the same organisation, should regular users be able to see admin users?
On one hand one could argue that there is no need for this information to be hidden. That regular users would benefit on knowing what accounts have admin privilege since they then knows who to ask f... |
For my SPA app, I'm using Firebase as the authentication provider. I'm also using this token to authenticate with my back-end server. The Firebase documentation reads:
"Warning: Do not accept plain user IDs, such as those you can get
with the GoogleSignInAccount.getId() method, on your backend server. A
modified ... |
I'm trying to get a view on what extra security checks our packaging team could do when they download a potentially infected installer from the web before they package an MSI or EXE (assuming that the software vendor didn't provide a checksum or the staff member from the packaging team omitted to check it). By nature, ... |
I am writing a server-client program. When a new user installs the program and opens it for the first time, he has to enter a password. The password in combination with an email address is needed to authenticate to the server via SSLSocket.
I know how to save a password securely (store salt and hashed password), but ho... |
We have a web application that puts a private key in LocalStorage, which enables users to sign off certain messages. It's been working fine until today we saw this announcement from Apple.
The TLDR; version is that now there is a "7-Day Cap on All Script-Writeable Storage". If the user does not interact with your web ... |
Practically, we are outsourcing the authentication of our users to a third party application, that's, needless to say, external to our system. I am not sure if this is actually advisable, but from our perspective, since we don't really want to maintain security credentials ourselves, we thought that it makes sense to l... |
I'm trying to calculating the unicity distance for a cipher applied to a language I wrote and I'm having trouble understanding the concept of redundancy in a language.
From this book
The redundancy of a language severely reduces the amount of information conveyed with each character and the rate of a language is defi... |
I recently created a virtualbox virtual machine of Ubuntu 18.04 and installed Anydesk remote desktop app in it. An IT guy accessed my computers desktop via Anydesk app, but he is actually inside the Ubuntu Virtual Machine on Virtualbox. I don't even mentioned anything about Virtualbox, but after asking me my laptop mod... |
Title says it all, I can't tell if John is just crashing or "gives up" on cracking the hash. First I start off by creating an md5 hash out of a word I KNOW is on the rockyou.txt wordlist:
echo -n 'password' | md5sum > testhash
After removing the hyphen at the end of the test hash file:
5f4dcc3b5aa765d61d8327deb882cf99... |
The windows account name can be seen as one the folders in C:\Users. Assuming you changed your windows account name to something different to the folder, can programs see your new windows account name given admin rights?
|
When trying to set RHOSTS for an auxiliary module, I tried using $server, which is a bash variable I've set before entering msfconsole. It is not readable from within msfconsole.
How do I access bash variables from msfconsole?
|
In my understanding, to ssh login to my server, I need a private key:
However, the key I get when generating seems to be a public key:
Do you know where to locate my private key?
Manually generating your SSH key in Windows
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.