instruction
stringlengths
24
29.9k
I previously read that Access Token must be sent with every request to the API but Refresh Token must be sent ONLY when the Access Token expires. I'm trying to use a similar model to the conventional model, where the Access Token is JWT, but the Refresh Token is just a random unique string (stored on server) so the Acc...
I've just received two emails in a row stating that "We detected something unusual about a recent sign-in for the Microsoft account" and "someone else might have accessed the Microsoft account..." (see image attached). Seems a little "phishy" to me considering it's a gmail account. Last time I checked gmail was owned b...
Based on this question, I've discovered that the signaling channel for WebRTC must be trusted in order to prevent MITM attacks. This is unfortunate for a P2P use-cases where the signaling channel is some 3rd party device. One idea I had is to encrypt and authenticate the WebRTC signaling with libsodium box algorithm. T...
Ive got an M281fdw laser printer, which i have used for about a year, which I wish to sell. Are there any security issues to consider when selling a printer that has been used. My considerations so far have been : Would any previously printed / scanned documents be viewable / recallable by the purchaser Would any w...
I am trying to use DD for Windows to obtain the hash of a non-system partition that was encrypted via Veracrypt, but have run into a bit of a problem. The command I used to get the hash of the encrypted partition looks like this dd if=\\?\Device\HarddiskVolume11 of=hash_output.txt bs=512 count=1 And this command (in ...
I was going to post this on a different SE site, but I found that explicitly stating --tlsv1.1 to curl fixed the problem, for now. My question now relates to security. A vendor switched to FTPS (not SSH FTP) recently. I've added --ssl and --ssl-reqd to the command and I get aborted transfers when I upload a file. I'm ...
If someone tampers with data being transmitted over HTTPS using TLS, would that result in a corrupted decrypted message or would it result in the error being detected such as through a cryptographic checksum and retransmitted? This has security implications as well as accidental corruption implications (https://stack...
I have read many articles about AV signature-based but I'm still not clear how AV using Hash to compared with the signature.
What I want to do: Lock down the Tech Vlan so that only an approved device AND a user in the tech security group are allocated. I am hoping to achieve this via EAP-TTLS and Windows NPS whereby the machine provides the tunnel then the user authenticates using their normal AD credentials? I don't want the TECH vlan to be...
I recently set up NextDNS on my personal devices to further reduce the amount of tracking and ads I'm exposed to. The service comes with built-in analytics that shows a brief overview of your network activity. Most of the top hits are uninteresting, however there's one domain I couldn't figure out: What's the doma...
I tried to use john the ripper on the sample : ecryptfs_sample_metadata.tar (password is 'openwall') Which I downloaded from here: https://openwall.info/wiki/john/sample-non-hashes If i try sudo john ecryptfs_sample_metadata.tar --progress-every=10 --mask='openwal?l' The result is: Warning: detected hash type "mysql",...
I've heard about RFID-shielding wallets and even individual card sleeves, but my wallet has multiple RFID cards in it (credit card, bus card, building entry card), and if I tap my whole wallet on a POS reader to try to pay for a transaction, it fails. Why does it fail? Is the reader only reading 1 card with the stronge...
Target code: if($(location.href.split("#")[1])) { var target = $('#'+location.href.split("#")[1]); if (target.length) { $('html,body').animate({ scrollTop: target.offset().top - 160 //offset height of header here too. }, 1000); return false; } } It uses from location.href, so I though about usi...
I have a personal service which is deployed on one VPS. The service works based on http requests, and it is due specific goal and handling three types of requests. The order matters in the requests. Client send requests, it usually takes something between 30s to 6min to get a response (and it's OK). When I set it to pe...
When you're using unconstrained delegation, a service A is allowed to authenticate as the user B to any other service. This happens because the user B sends its TGS along with its TGT to the service A, and service A can then request other TGS on behalf of user B. On a first look this would seem less safe than constrain...
I am wondering, assuming the latest version of Firefox, which of the following options would be more preferable security-wise (e.g. assess and/or password to user account will be stolen) and which one privacy-wise (exposing user to the least advertisement tracking etc.): Storing session cookies (i.e. logging in and ne...
I just got my Yubikey 5 NFC, and would like to use it for Linux desktop login Linux KeePassXC (which only supports hmac-sha1 challenge-response) online accounts When reading about U2F it seams to be the preferred protocol, but TOPT is often only supported on online accounts. Right now I got Linux login to work with Y...
I find it hard to believe, and figure I just missed or forgot something obvious (years since I thought about this stuff), so maybe someone can point it out. But it seems like most of what I know about salts is they're kinda loose in guidelines and only really beg for uniqueness. But if you're not following some strict ...
My team and I have written a web app, and we had a bug report regarding a DoS vulnerability. This vulnerability, requires a basic account to be created and allows this user to inject semi-arbitrary data mydata-XXX-mydata where XXX is controlled by the attacker. This data is not supposed to be controlled by the user and...
I always thought HSTS headers were server specific, what reason would cause this header to not be invoked across certain URI endpoints i.e. HSTS header is in response to the root direct /, as well as /contact/doctors, but not in /contact/nurses. Could someone please explain this to me?
I saw a video detailing how to write a simple salted hash program in C# here. Below is the code they wrote (slightly edited for console applications): using System; using System.Text; using System.Security.Cryptography; namespace MyApplication { class Program { const int SALT_SIZE = 10; static...
How is the security of cryptographic keys stored by Microsoft Windows in the key containers used by CryptoAPI/CNG guaranteed? The keys are stored in the user's directory or a directory for the machine-level keys (https://docs.microsoft.com/en-us/windows/win32/seccng/key-storage-and-retrieval?redirectedfrom=MSDN#key-dir...
I am testing an web application and I found a cookie in which the language of the application is set. Specifically, I have modified one request and I have noticed that all the other requests it makes keep the value that I set in the belly. I wanted to know if it is possible to exploit this behavior in some way.
A recent blog post shows hackers owning a web server - at least the content and injecting a web skimming attack. https://blog.malwarebytes.com/hacking-2/2020/03/criminals-hack-tupperware-website-with-credit-card-skimmer/ Should this be detectable in web server logs? The bad guys redirected to legitimate checkout page ...
When I unlock my PC the password manager (any type) needs the password again to unlock it's DB containing passwords. I was wondering what the benefit is in that, as my computer is locked anyway. After reading a few questions here I understand that this is to prevent cold boot attacks. Are there any other advantages? Or...
Is there any way to sign and send a message from email server automatically...without using any desktop client to sign the message. For Example, A wants to send a message to B. A open its email account, composes message and click on 'send'. After pressing send button message should be automatically signed by PGP privat...
Consider the case of username enumeration, where a hacker is able to determine a username based on UI feedback being different from a successful entry vs a failed entry. For example, a website's forgot password page asks for a username. If upon clicking submit with a username, the UI displays that the username is not ...
I understand BLE secure connection pairing mode is improvement over Legacy Pairing. The issue with legacy pairing was intial TK value can easily be bruteforce by an attacker. In contrast, in secure connection, both device start by generating ECDH key pair and exchange public key. Since BLE doesn't use certificate for...
I read an article about how to use Argon2id in C# here. Below is the code they wrote (slightly edited): using System; using System.Diagnostics; using System.Linq; using System.Security.Cryptography; using System.Text; using Konscious.Security.Cryptography; namespace Playground { class Program { // N...
I am trying to understand exactly how JavaScript XSS (cross-site scripting) payloads found across the internet work and I would like your help for the following: <img src=`xx:xx`onerror=alert(1)> "><img src="1" title="true" x:xx/onerror="alert('test xss')"> When are those two (individually) going to trigger the aler...
What is the speed and frequency that hackers can bypass rate limiting continuously in a website using login with an SMS OTP? The rate-limiting activates if the same IP address triggers SMS OTP more than x times.
I have a dedicated server with public IP address, opened port 22 and fail2ban running. I am using root account (I know it is wrong but I have to) and I have disabled logins with password. I am using an RSA 4096 bit key with key password (10 characters length with mixed letters, numbers and symbols). Today checking the ...
I understand when they put a + at the end, URL treats it like a space. I want to know what -- - does. I do know what the "double dash" does. Including the double dash with a "space at the end". I specifically want to know what a dash-dash-space-dash does.
I'm doing testing on the app, if we take only login url as a starting point. How to expand my horizons? I want to make my surface wider, really kinda stuck on this one.
I have an idea for device-level two-factor authentication that involves no direct input from the user, and I wanted to find out if something like it has been tried before. Let's say I have an account that I access from my cellphone (or any device). When I send the password, the device will automatically add its own "pa...
I am trying penetration testing for one of my clients. The platform is Code ignitor. There is an endpoint /find/1. The function queries from the vehicle table where vehicle ID is 1 with no sanity check. Now I tried Acunetix (scanner) and it found both a blind SQL and normal SQL injection vulnerability on the website. I...
I'd like to encrypt my server's daily backups and send them to dropbox / google drive / etc., as a backup. I've read of various approaches. Assuming symmetric encryption (passphrase rather than public/private keypair), people seem to: tar, compress, encrypt with a passphrase (using gpg), and upload the result to cloud ...
I am new to ChaCha20. From the RFC -- The inputs to ChaCha20 are: o A 256-bit key, treated as a concatenation of eight 32-bit little- endian integers. o A 96-bit nonce, treated as a concatenation of three 32-bit little- endian integers. o A 32-bit block count parameter, treated as a 32-bit little-endian...
I'm looking for an helping hand with my https nginx setup. I require my application to be exposed through an nginx frontend, offloading TLS. Easy ! The thing is, I need to have Certificate-based client authentication, and my application cannot be advertising a list of CAs it accepts as it will disclose information abou...
This is my first question on this forum so please let me know if I need to clarify anything. My Android 10 Pixel 2 just downloaded 2 files without my permission today, both named something to the effect of "Coronovirus+Vaccine+Phase1+Consent+Form.pdf". Obviously suspicious, especially in these times. I deleted the PDFs...
Let's say that I'm connected to a network where the ISP has setup a dst-nat from an IP they don't control to an IP that they control,like so: 1- Their DNS server resolves example.xyz to 1.1.1.1 (the ISP doesn't own/control this IP) 2- The ISP hosts a site at x.x.x.x which the ISP controls and maybe part of their networ...
I want to encrypt my server's backups and upload them to cloud storage (e.g. dropbox, google drive). I understand the basics with symmetric (single passphrase-secured key) and asymmetric (public/private keypair) encryption. But I don't know which would be more appropriate in my specific use case. I've read many related...
Recently I started working from home (like half of the world these days due to the Corona virus). Work has provided me with a laptop/screen etc. and a VPN to the company network. I only use this laptop for work purposes (but I am logged into Whatsapp and Facebook on it) and not outside work hours (although sometimes I ...
Many certificate authorities these days use the ACME protocol to automate the process of certificate issuance. This includes verifying that the applicant is the owner of the domain. And the most common way of doing this is via the HTTP-01 challenge, which challenges the applicant to serve up a given token from a server...
I am new to the field of Web Security and am practising labs from Portswigger Web Security Academy. In this lab, we have to call the alert function with 1337 as the parameter. The solution given on the website is https://your-lab-id.web-security-academy.net/post?postId=5&%27},x=x=%3E{throw/**/onerror=alert,1337},toSt...
I am currently using a Yubikey 4 with my PGP subkeys on it. My mainkey is stored within Kleopatra. As I am planning to move over to a new Yubikey 5 I have asked myself if it is possible to still be able to decrypt emails with my new pair of subkeys generated for the new Yubikey?
We're using argon2-jvm to use Argon2id on our Java TCP Server. Because its argon2id instance is thread-safe, we plan to only create a single instance for the lifetime of our app and have each request handler call it whenever necessary (e.g. for new registrations and user log-ins). We've fine-tuned our single argon2id i...
I'm trying to setup an EAP-TLS with latest Freeradius on Debian Buster Used the Freeradius to make certificates But keep running into "unknown CA" error : (4) Found Auth-Type = eap (4) # Executing group from file /etc/freeradius/3.0/sites-enabled/default (4) authenticate { (4) eap: Expiring EAP session with state 0x8...
I was recently reading this question, where the accepted answer claims that it is easy for attackers to bypass rate limiting that is based on IP, which makes any sort of IP rate limiting to prevent a brute force attack much less useful. But, if it is based on the account that is a victim, then it becomes very easy for ...
The goal is to call the function foo in the following program: struct object { unsigned char buf[36]; void (*fp)(); }; void baz(struct object * obj, unsigned int num) { for (int i = 0; i < num; i++) { unsigned int x; scanf("%d", &x); if (x == 0) break; obj->buf[i] = x & 0x00...
Taking a look at the discription of both kinds, orientation seems the same. while it isn't the same I can't figure the difference. In a Heuristic scan it looks for suspicious or malicious behaviors in a file, Anomaly analysis looks for anomalies in a file and its structure.
Most newsletters that I receive use mass-mailing software that rewrites links to add tracking information. That is, instead of www.google.com, the email will point to something like links.somecompany.com/?xyz=unique-id, which redirects to the final URL. Mailchimp, for example, calls this click tracking. 29 of the la...
One of our DC server making auto connection to multiple IP addresses, when i investigated the process, i observed that lsass.exe is making connection, so can anyone help me why the domain controller making auto connection on using process lsass.exe
I find cryptsetup to have an inconsistent way of dealing with headers, I'm tempted to call it a bug I would like to achieve a very large LUKS offset without resulting in a very bulky detached header Here is what I've tried: $ cryptsetup --version cryptsetup 2.2.0 $ # First let's establish the default header size $ cr...
I am new to this so please bear with me. I was downloading a VM image and I was told to check the MD5. Naturally, I did but wondered, If a hacker would change the file to be downloaded from the site, wouldn't the hacker also be able to change the checksum on the site to make the file look genuine? If this is the c...
I need a help to understand some specific points about non-repudiation, nonetheless I implemented some authentication methods: Digital Signature Authentication; CHAP (Challenge Authentication Protocol) Zero-knowledge password proof Let's imagine a situation that a user is authenticated either by TFA or SFA to his ban...
I have this piece of HTML: <img src="image src" alt="{injectable}" title="{injectable}" border="0"> where {injectable} values correspond to the same input value that has to be 32 characters long. How can I trigger my XSS by an external JS file? This is what I thought: a"><script src="url"> It seems to work since Fire...
I know that SSL and TLS below v1.2 are insecure and should not be used. By allowing the use of those insecure protocols, can that expose connections using the stronger TLSv1.2+ protocols to any vulnerabilities? If I have some users who refuse to move off TLSv1.0, can I leave that protocol enabled on an 'at your own ris...
I am trying to find the buffer for where the implement my buffer overflow attack The lab link is also here: https://seedsecuritylabs.org/Labs_16.04/PDF/Return_to_Libc.pdf How I find X Y Z in a Return To libc attack with a buffer of 150? this is the exploit code that was given to us, I already found the addresses that ...
As far as I know WinRar uses the password you type and derives the key from it. But how exactly does it check if the key I typed is correct? What I think is that it compares your guess with the right key before decrypting it? But that'd mean that the right is stored inside the encrypted file. So it doesn't make much se...
We know that vulnerability scanners have three model types: Host-based, Network and Database. The Host-based vulnerability scanner uses a client-server structure, and the host will run an agent. How to understand the client-server structure? Is the Client the Agent and the Server is host's OS?
my api is: localhost/api/aut/1111111111111111 I wanted a script that generate a code of 16 numeric and test possibility the result 200 or 404
I am exploring the vulnerability (CVE-2020-5250) found in PrestaShop software versions <1.7.6.4. Could somebody explain how (with which method) was the program exactly exploitable? And why is the patch provided adequate? Is this a common mistake made when developing software in php? Could not find any information on th...
We have a system in which external users can be invited to our identity management system. The users are not employees of our company, but of our customers. The administrators of the customer do not have access to the system the users are invited to. Currently we send invite emails to the users email addresses that co...
Fighting against a large SYN Flood attack that is happening every 2 minutes repeatedly. During attack, number of syn-rcv is between 290-550 ss -n state syn-recv sport = :80 | wc -l CPU 100% (htop output) Tried cloudflare firewall, not helping at all CSF in action, seems can't help backlog increased to 16K, SYN Cooki...
I understand that Kerberos is the recent authentication protocol used in windows environment and that NTLM is still supported for interoperability only. I want to know in non domain environments,if i am logging to my own pc at home which have windows 10,is the authentication carried by NTLM protocol or Kerberos ? Also...
Other questions have been asked but not with the specific details that I have shown (no log VPN, no leaks, dynamic user agent and JavaScript disabled). Hypothetical situation Someone sends a threatening message via Facebook. The criminal installs a fresh OS and encrypts their HDD. They then set up a no log VPN with dua...
Many Google Chrome extensions require permissions to read the contents of webpages the user visits. How can the user verify whether and to what extent a certain Chrome extension leaks data?
At home I have a dual-stack IPv4/IPv6 broadband connection, and I also have a wireless access point. The access point currently bridges all traffic into my LAN, which is not segmented in any way, so all visitors that use my wireless network have the full run of my LAN. While I certainly do not doubt my friends' good in...
I'm trying to do some csrf attack test on a site. I found that the site protect itself from csrf by checking the http Origin header. But I guess maybe under some conditions I can bypass the protection. The website just check if the request has the Origin: header set to https://example.com - Is it possible to set a cus...
Nmap out put for google.com. ssl-enum-ciphers. TLSv1.2: ciphers: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A. TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A. TLS_RSA_WITH_3DES_EDE_CBC_SHA (rsa 2048) - C. TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A. Questions. Server...
My job uses the remote desktop application for us to work at home. I am just realizing that my laptop, and everything on it, can be opened through the file explorer on the remote desktop application. I am wondering if my emp
I was installing Kali on VirtualBox on a W7 host, and during the upgrading/installation, Avast detected two threats in the Mimikatz package. My question is, how can Avast "see" through the VM? Is he package held for a bit on the host, before going in to the VM? I've always thought that the two enviroment were isolated ...
We have an authorization server which exposes a login page, we would like to authenticate users in our single page app using this authorization server. My employer does not want to redirect users to the authorization server to login due to UX, and I do not want to resort to using the resource owner password flow. Since...
If log in to Amazon website using VPN does this offer 100% security and hide static IP address? OR does some data leak through and show , making Amazon suspicious?
I read that LastPass uses PBKDF2-SHA256 for storing the Master Password hash, I wonder how this compares to BCrypt and why did they chose this, as SHA256 is a quick hash (probably compensated by PKDF2?).
I am trying to understand threat modeling but it seems too elasti from restrictive requirements to general requirements. Now i am trying to understand it with some realistic examples. The first example which comes to my mind is physical access control of an office premise in which visitors have preapproved restrictive...
When securing my device (ubuntu) I noticed strange ufw logs. I am behind a router which should be blocking these kinds of requests? I realise these are using port 443 but I was under the impression that my outgoing connections to a website shouldn't produce incoming connections to me. [UFW BLOCK] IN=wlp1s0 OUT= MAC=b0...
My resource server exposes an API that expects JWT access tokens obtained using OpenID Connect. So far the validation in the resource server side consisted on using the Realm public key to validate the JWT access token signature and check some other parameters suchs as expiration time. Since the access token is a JWT, ...
A few days ago I was searching for information to do an essay and I opened a page using the "in cache" option on Google. But then I realised that the page was not what I was expecting. My question is if I can get a virus from opening a page using that "in cache" option? My browser is Safari.
Tor traffic correlation attacks by global adversaries I know what traffic correlation attack is but I find it hard to understand this article or how it got to its conclusions about 'de-anonymize' 'typical web user' who use Tor within a day just with the ability to monitor enough web traffic. I also don't get how dark m...
Is it theoretically possible to transform PHP files to raw plaintext? I can add the .txt after the server-side programming language extension, but if it is rendered in the wrong content-type, is it theoretically possible for an attacker to obtain the php source-code in plain text by doing things with the url?
When using CSPRNG (crypto secure pseudo random number generation) functions seeding is an important step. So what is the best way to seed a random number function?
I am using a laptop with dual boot Windows and Ubuntu. In addition, I am having another Linux distro installed on a usb thumb drive and using it only for certain things. Generally speaking - if android devices are vulnerable in terms of privacy and security, does that mean that my linux will be vulnerable too if I use ...
Does Apache Tomcat 9 meet PCI compliance? From where I should start reading and gather some information about that topic?
I'm using Windows 10 Home with GPG version 2.2.19. Whenever I try to import the asc file for Tor Browser using the command gpg --import torbrowser-install-win64-9.0.7_en-US.exe.asc, I get this fancy error: gpg: no valid OpenPGP data found. Likewise, this also happens when trying to verify the installer itself with the...
I was trying to crack my WiFi Router. I have two laptops an older one(Lenevo 3000 G430) and a newer one(HP Elitebook 840 G3) with their internal adapter. The old one has BCM4312 802.11b/g chipset and the newer one has Intel Dual Band Wireless AC 8260 (rev 3a) with Linux Drivers b43(older one) and iwlwifi(newer one) res...
Just for fun, I've ping flooded my bluetooth speaker at home using l2ping on Linux and I was unable to connect to it as the pinging continued. I've tried flooding my phone and it seems to have received the packets as I got a response (just like the responses i got from my speaker), but I was still able to connect it to...
Me and my neighbours share a home network managed by me, paid for by the landlord. This person overloads the bandwidth on the regular, jitter spikes up to the 300s,down speed fluctuates, overall shit time. Can't get rid of them/ block them from the network, in spite having admin access. Is it possible to restrict th...
I have a Ubuntu home PC. I often use this system to enter passwords to various websites. Some sites also offer a graphical on screen keyboard to protect from keyloggers. However, I suspect that even the on screen keyboard is not safe from malicious software which records the computer screen. I want my passwords to be s...
For years I have been using the Fing iOS app to scan my home network to check for unknown devices. The iOS apps is nice and self contained, so I never worried much about its own security. I recently downloaded the Windows Fing desktop application. Worked great, has a easy interface, and provides better results than o...
I found a 'Metrics' file during a test containing: # HELP go_gc_duration_seconds A summary of the GC invocation durations. # TYPE go_gc_duration_seconds summary go_gc_duration_seconds{quantile="0"} 0.000115592 go_gc_duration_seconds{quantile="0.25"} 0.00030955 go_gc_duration_seconds{quantile="0.5"} 0.000495939 go_gc_du...
im building a PWA app , where i implemented jwt token to auth users. i have 2 main architecture problems ,but let me introduce you what im building . i'm Building application that is all about dog lovers , this application is to post lost dogs, post dogs for an adoption , for dog owners to find a good dog services arou...
Why do these companies allow to download your data? Is there some law enforcing them to do so? How complete should these data be?
Suppose I have a very simple PHP application that acts as a front-end for an SQL database. The user enters their query into a box, and the app shows the query results in a table. To prevent a user from modifying the table, the SQL user only has permissions for read-only queries, i.e. if a user tries to enter something...
my main goal is to setup iptables that work as a VPN killswitch for my openvpn connection. Thanks to a post from forest, this was pretty straight forward: OpenVPN kill switch on Linux . So. everything that is not going to TUN1 should be blocked. Now there is an issue while configuring an exception as the smb mount to t...
I was reviewing code of an application that uses the following piece of Java code and wanted to know if the the use of exec() was susceptible to command injection. public class FindFileInDir { public static void main(String[] args){ try { Runtime rt = Runtime.getRuntime(); String[] cmdArr = { "bas...
My outlook account received a suspicious email, addressed to somebody else, AW, sent apparently from themselves to themselves. The sender is not an outlook address, but I guess outlook might be hosting their service. According to haveibeenpwned my email address has not been pwned, neither has that of the sender. AW app...
I need to encrypt daily backups, then upload them to untrusted cloud storage (s3, dropbox, etc.) I received help on security.se and crypto.se to formulate this approach: tar and xz the backup file create random 32 byte (symmetric) "session" key (head -c 32 /dev/urandom) encrypt backups using session key encrypt sessio...
I have a need to fetch automatically the GPG private key from a Linux server to decrypt files on a Windows 10 computer in production. There are a few challenges here: How to assure SCP from the Windows 10 to the Linux server that not everybody who operates on the machine can perform this task? Where to store the priv...