instruction
stringlengths
24
29.9k
My school has provided us with a private server (HTTP) for each student that we can test reflected XSS attack we are asked create a test user. Create a url with malicious parameter and send it to the test user to steal the cookie and send it to an external and server e.g.Pastebin and the use that cookie to login. I ca...
I try to avoid big internet companies (big tech) and try to find decentralized and/or open source alternatives. I use a password manager with unique usernames and generated, complex passwords. A lot of accounts have accumulated in the last 10+ years and I wonder why do I have to delete an account instead of simply no l...
We know the TCP 3-way handshake: C->SYN->S C<-SYN-ACK<-S C->ACK->S we also know stateful firewall. When a stateful filter entry(source ip, source port, dest ip, dest port) create? after the 3-way handshake finish or just the first 2 step of it finish?
I am reading Hackers Handbook and in one chapter it says: "Parameters submitted within the URL query string, message body, and HTTP cookies, are the most obvious entry points..." I understand that the URL can provide e.g. a XSS. But can somebody explain how the message body and/or the HTTP cookie can be used as "User i...
What is CORS default policy if it's not explicitly implemented by the Web Server ?
I am trying to put some fields in a Postgres database hosted on a Heroku app and it keeps returning this error: Error: self signed certificate code: 'DEPTH_ZERO_SELF_SIGNED_CERT' I have tried adding a key, certificate, and CA bundle but to no avail Many StackOverflow questions with the same error say to set the variab...
Merely because of private interest and usage in my own network, I'm creating a certificate chain (Root CA → Intermediate CA → Server cert) using openssl. I'd like the certificate chain to be traceable and also being able to revoke certificates. At the moment, I am not sure, which CRL distribution Points (crlDistributio...
I recently participated in a CTF and solution of that CTF is based on this weird behavior of browser. In First case when I am including script tag inside an HTML comment and without closing that comment then the browser(Firefox) assumes whole content after that as comment including body part. And no alert is popped. Co...
I have some games which work on Windows only, but I don't want to buy a new Windows, I would rather keep Windows 7 as a second OS for gaming and use Linux or BSD for working, browsing, etc. As far as I know vulnerabilities in multiplayer game clients are very rare, so there is only a very low chance that somebody hacks...
Many bots attack websites by trying to find an admin login page (such as wp-login.php) and trying to login. Would an effective way to stop these attacks be to create a fake (non-login) page for the targeted URLs? Stack Overflow does this by redirecting to YouTube: stackoverflow.com/wp-login.php
Just trying to get a postgreSQL exploit (32847.txt - Low Cost Function ) from exploitdb to run in msfconsole. After pulling my hair out trying to figure out why it isn't loading, here I am. I'm using Kali Linux, Debian 64 bit in Virtual Box, Windows Host. So far here's what I've done: Downloaded appropriate exploit fro...
Kleopatra/ GPG can create revocation certificates, which look a lot like public/private keys. Obviously, these keys should not be shared or used unless one intends to revoke their keys. But assume that the revocation certificate were not secure. Would sharing this key with the world leak information about the private k...
If you were to configure a Work PC at home to exclusively connect to your work network via a small VPN box, would this adequately isolate it from your home network and related threats? What alternatives would you recommend? Work PC <=cable=> VPN Hardware <=cable/wifi=> Home Router <=> Work VPN Endpoint
Why do some BSSIDs show as "not associated" (note: not all of them show as such; some just show a usual BSSID). I have tried to use the other BSSID that shows up for the other station but it didn't work.
Any intentional malware injected into open source software by the same people who are developing them may eventually get known as the source code is open to the public. However, if the code base is large, average people dont have the time and resources to go through it and hence it is possible for such malware to remai...
My enterprise would like to make some mass mailing to their customers, using a third party solution (e.g.: sendinblue, sendgrid, mailchimp...). Is there a real risk that my domain mail address could be considered as spam if the shared IP is badly used by one of the shared service's evil customers (e.g., for spamming, e...
Can the presence of the username in the cookie at every request represent a security problem? If yes, why?
I've recently migrated my application to use external provider for login so that my application doesn't have to deal with auth and storing user credentials. For this I'm using OpenID Connect (OIDC) over OAuth2 and so the auth flow is quite standard (visit my app -> redirect to OIDC Provider's (OIDCP) login page -> logi...
I have a firewall (pfsense) acting as a gateway for my network users. All user traffic is going through this firewall. I need to block HotspotShield VPN traffic on this firewall. As known, this VPN is using TCP port 443 and changing its server IPs every day. I can't block port 443 due to https traffic and can't block...
I have a backup script that encrypts everything using AES 256 Every day, I generate a random binary file as the password, and encrypt this random file with my public key. Until now, I printed the SHA256 hash of the unencrypted file on the log, but today I thought that, maybe, the SHA256 of unencrypted data can be used ...
I'm a student and I'm studying the security of the CoAP protocol. So, thinking on the attack-surface my thought was about internal attacks (i.e inside the network) and the external attack (i.e. outside the network). Regarding them, considering the scenario without encryption (i.e. without DTLS) there could be done atta...
I manage a company's equipment and the manager has used a piece of equipment for the last 3 years. He told me, that he will give that equipment to one of the employees. However, he has told me to please make sure that the information on it is deleted so that it is unrecoverable. I like this subject and don't know much ...
most of my question are already answered by reading in this forum, but "one last thing" is still open. I am running a OpenVPN server with the following security characters: SERVER (Raspbian Buster) auth SHA512 auth-nocache remote-cert-tls client user openvpn group openvpn ca /etc/openvpn/server/ca.crt c...
I have an interview where I am expecting to have to review some vulnerable C code and point out the vulnerability(s). I am by no means a C developer, but I do know that the common vulnerabilities are primarily related to how developers manage memory. I'm aware of Microsofts list of banned functions not to use when wri...
There's something I don't get with RDP in a domain. During an authentication, if we're using a local account of the distant machine, then the creds are in the SAM so all good. But with a domain account, how is done the comparison ? How does RDP authentication works in this case ? Kindly
I have been learning the famous "SIGNAL MESSAGING PROTOCOL", Its brilliantly designed and perfectly secure , but I doubt on its implementations Famous messenger services like Whatsapp and Signal claim to have implemented the e2e messaging protocol for message privacy , but where are the private keys (of users) stored...
I save my notes in a git repository in plaintext (markdown). Currently, the remote repository is another computer in my appartment. I am thinking about moving this remote repository to a remote server. Description: I want this to be as simple as possible. As few external tools as possible. Because of this, i don't w...
I am very confused with calculating password entropy i know that the formula is E = log2(RL). where E is password entropy, R is the range of available characters, and L is the password length. but what i if don't have the password length. Imagine there is a company that has 5 millions users and decided to use English a...
I'm developing an app for alert people if they encounter covid-19 positive person. I'm very much concern about user's privacy. So I need to make a user completely anonymous. What is want is as follows. Suppose there are devices A, B, C, A, B, and C should broadcast the their own UUID via bluetooth When A, B, and C is n...
I have quite good hardware in my PC and an optic fiber connection. I opened a CS:GO (Counter Strike Global Offensive) server on it, and made it public. The IP for connecting to this server is my public IP address. I set a strong password to the router admin (24+ characters), and I made sure that I have no risky/unwante...
I am using CIS benchmark framework to audit my Linux OS, and I have received various pass/fail results. But is there any way to prioritize the fail results ? Is there any severity mapping available for these recommendations?
My idea is to use a sort of layered CAPTCHA model (4 layers - from which layer 0 is no captcha) with difficulty as primary focus. My first focus beside stopping bots is to make the visitor more and more aware of what he's doing. It will give the visitor more think work than "type-in" or "watch-and-type-in" work and thi...
I'm currently undergoing a penetration testing certification, where I'm asked to : Set up a fully-patched Windows 10 Pro VM (done) Retrieve local password hashes from the SAM database using pwdump7 Crack these passwords using rainbow tables and OphCrack But I encounter a strange behavior of pwdump7 that I don't under...
I'm running a simple NodeJS REST API and a ReactJS frontend application and I want them to communicate in a secure way over TSL. I've successfully issued a certificate (DNS challenge) from Let's Encrypt and I'm currently using it for my IIS site where the React application is running. I now want to use this certificate...
A user sends a request to a system A. The request is signed with a digital signature, so the system A can authenticate and authorize the user. Then the system A creates a series of sub-requests to systems B, C, D, ... These sub-requests are based on the original request (in other words they are semantically related to ...
About 6 months ago, every so often, when visiting digg.com, my browser (Safari) would get redirected to some malware site for updating Adobe Flash. This happened both on my iPhone (not jailbroken) and on my desktop iMac. Lately, it has been happening more and more frequently to the point where it happens almost all the...
Imagine your site was hacked, you have put measures in place to prevent the same hack being successful again using server permission settings but are still unsure what the original exploit was which allowed the hack to take place, and the hacker left their ICQ nickname. Is there a benefit in getting in touch to ask for...
We have a single web platform, where users can log in to different workspaces. Each workspace has its own list of users with email and password credentials and various permissions for each of those users. Email and password pairs can be duplicated across the workspaces. The passwords are hashed and stored in a database...
What is the difference between data leak and data breach? Could you give an example of what the insider threat would be for a data leak and a data breach? Reading the section "Who Causes Data breaches" on Kaspersky page I think I understand, but please help me with examples.
So I have a binary I've been tasked with exploiting. However, I need to have root privileges to execute a function in it that (hopefully) gives the password. There is a function in the program that gives root privileges which I can run with a buffer overflow and pointing assigning the eip to the function's address. The...
I have a non-wordpress website running on a not-so-powerful server. Bots often try to find admin pages (such as wp-login/wp-admin), which increases the bandwidth that is used. Here, in a comment, MSalters mentions that I could return a non-standard error code to mess with the bots. Will this help stop the bots from pre...
I bought a USB stick with a hardware switch to enable write protection. I burned a Linux iso on it to make some forensics analysis on my installed OS. Could the write protection be bypassed via software from a remote attacker? Could it be attacked and re-written?
In my website, the backend sends an email to the sysadmin whenever there is an Error 500 with the logs and other data about the error. How can I prevent a cracker from intentionally triggering the Error 500 and, in turn, flooding the mail server?
Could you please let me know how can we check the origin header server-wide in IIS to prevent CSRF through the configuration change only without adding a custom HTTP module in IIS?
I want to know that what the security impact is if someone leaks the password of a PKCS12 certificate. I am referring to the password which is required when we export the certificate.
I recently got a VPS with Ubuntu on it, and I'd like to start creating a very basic website. However, I don't know what steps I should take to secure this server. I'm new with Ubuntu, new with security and new with creating websites (the website will probably be just HTML, CSS, Django/Python and some database). My bigg...
Smart cards (for instance, public transit cards) are widely used in some countries for authentication purposes at universities and workplaces, so that an authorized person can use a printer or access a room by just putting the card on a reader. How does this really work and is it enough safe to use a public transit car...
An application running under Intel SGX can invoke EGETKEY to obtain an encryption key from the CPU HW. The same key will be obtained each time the application is run. This allows the application to encrypt data with the key (a/k/a seal it to the SGX enclave), exit, restart, and then decrypt the data again. However, sin...
I'm creating a Kubernetes deployment that needs to pull an image from a private registry. The private registry requires credentials to authenticate to be able to pull an image, so I've added an imagePullSecret to the default service account in my namespace. Is it a security issue to give the default service account in ...
My goal is to understand, which security issues will arise, when I use old java 8 versions on my server applications. There are lots of java security issues, but most are only relevant for client applications. This vulnerability does not apply to Java deployments, typically in servers ... There is a similar question....
I have a web server which is running on a private subnet in AWS VPC, let us call it worker. I can access the worker VM through a Bastion VM which is in the same VPC but in a public subnet. Then, I have another VM (public_host) in a public subnet in a different VPC which listenning to the worker VM through SSH tunnel. ...
From what I understand, ASLR has 3 Modes: 0 - turned off 1 - randomizes stack, heap, shared libraries, vDSO, mmap memory area and text area (if built with -fPIE -pie) 2 - additionally randomizes brk()-allocated memory, which comes, to my understanding, mostly from small malloc()-calls. Why is there an extra mode espe...
I cannot quite understand the role of Diffie–Hellman key exchange. Does RSA SSL certificate work with the Diffie–Hellman key exchange or is it only used with an ECDSA certificate? When is Diffie–Hellman algorithm used if a client still has an option to use the RSA algorithm suggested by most servers for compatibility?
After checking multiple suppliers and reading about HW secure elements, I would like to understand the use of this type of electronic components. Maybe I´m wrong, but it seems a HW secure element provides a Root of Trust for a certain data. This is, the HW Secure Element assures that, for example, a private key, will o...
I was working on a project where two programs are exchanging information over a network. I am having them generate a public/private RSA key pair to encrypt traffic. It seems that one of the programming language environments has a built-in limit of using SHA-1 in the processing of RSA asynchronous encryption. Can someon...
I have an internet isolated EC2 instance which is a Ruby client and it is connecting with multiple EC2 servers of mine in the same network having different sub-domain names. These EC2 servers are protected with forced SSL whenever they are accessed from the internet. But since the Ruby client is isolated from the inter...
In chrome there is a flag called: allow-insecure-localhost. As far as I can tell all it does is block localhost connection over tls if the certificate is self signed. Why is this feature turned off by default? Does it affect regular users in any way (regular user = someone who is not developing something). Are there ...
In the movie "Minority Report", the Precogs can foresee murders and store in video log files that can be inspected in the future. There was a known "won't fix" bug where these visions would "echo" and therefore were discarded by operators, but still recorded. [spoiler] One of the main plots is an unsolved murder, whi...
It might sound like a silly question, but clearly I'm not getting something. I've enabled 256-bit encryption in group policy settings and encrypted a drive. manage-bde -status says Encryption Method: XTS-AES 256. But the recovery key is still 48 digits long. Since every sixth digit is a checksum, it gives us 10^40 (...
I was recently looking at EvilAbigail and making sad faces over how vulnerable my Linux FDE system is, when I started to wonder if there was a similar simple attack for other OSs. I did a bunch of searching but couldn't even find any information on the current state-of-the-art for evil maid on other OSs, let alone a sk...
I've just received this email. Is it a standard practice or a scam? I'm a Security Researcher running a vulnerability identification service for a small group of private clients, and I accidentally found some vulnerabilities in your infrastructure. For a small fee, I will share the vulnerability details with you ...
I was reading RFC8446-TLS13 and a tls visualization and could not grasp some concepts. I have all the tls connection data (client hello etc.) and SSL Logs (server_traffic_handshake_secret) I see that authentication message is all handshake messages - except the record headers- concatenated and hashed, but this does no...
It is completely clear how desktop and mobile platforms for sync.com allow zero knowledge. However, it blows my mind when I try to understand how "Zero Knowledge" could be theoretically possible when using a browser, i.e. web application upload. So I login to sync.com with Chrome. Then I hit upload a file button, an...
I started learning PHP and I wanted to practice PHP code using xampp or wamp server. But after reading this and doing some google research,I thought that installing server software on my home pc might be dangerous. I thought it would be better to install xampp server on a virtual box.Is this a good idea? Is there an...
Also I had it for around 3 days. It downloaded a file that's 1kb big on my PC. What should I do? I'm afraid to use my PC again.
I've my this webapp running on localhost. I've been trying to reflect XSS through this input tag but it's not working for some reason. could someone please tell how to have it reflected? the payload i put is: "/> <script>alert('xss')</script> <br class=" and this came up: <input class="form-control form-control-lg" id=...
A couple of days ago I asked about deleting the information and making it unrecoverable. The company bought a new disk and I have to leave the old disk. My question is simple: I had very confidential (critical) data and I would like to know if you formatted and encrypted the partition that was not encrypted, it is poss...
We all know that HSTS should be implemented on HTTPS application. Recently, I came across an application HSTS implemened on HTTP application. I need to answer to the client. According to me, HSTS implemented on HTTP would have no advantage. Please let me know.
My configuration is: allow only OpenVpn traffic and block any other (income/outcome) traffic with UFW on my ubuntu laptop. unreal scenario: let’s say i have ubuntu with chrome version 50 [2016] on it connected to a public Wifi . Would attackers on the public wifi would be able to exploit my Laptop or would they have t...
During the COVID-19 pandemic, many of us are working from home using meeting apps like Zoom. It's all over the news that Zoom is lacking in its E2E encryption. Let's assume we're using Zoom and can't switch apps. Considering only the traffic, how can we make these meetings secured/encrypted? The solution can be hard o...
We are trying to bulletproof our server from DDoS / MIM etc. Use case: Clients (<5 in number) want to get some data from remote server Client open SSH connection to server, they can now access GET REST APIs on server. Is this a safe architecture? SSH connection is on a non-default port What could be the advantages of...
I would like to learn more about protocols using a JWT as a Token. I'm aware of OIDC but I can't find any other well defined and robust protocols for user authentication using JWTs. Sure, I can use a simple REST endpoint providing a JWT in exchange of valid credentials, but where can I find an RFC about that ?
Consider the following architecture: An on premise Web API 2 [Written in C# hosted in IIS] which uses OAuth 2 authentication [ Implicit Flow ] to secure itself. This API acts as the data source by external apps [ Currently an angular 9 APP ]. Token service itself is an installation of Identity Server which is responsib...
My system to share private data works like this: I rent a virtual server at a hosting company. There I have a self-signed certificate installed. The folder with the files inside is password protected via htaccess file AuthType Basic AuthUserFile /path/.htpasswd Require valid-user passwords are salted in htpasswd. It i...
I was cross checking my environment and i found that System process PID 4 establishing Outbound connection to public IP using Port 445 is that a normal behavior? OS: Windows 10 1909 System PID 4 Local Port: 54114 Remote Port: 445 Remote IP: 134.32.141.238
I've gotten the following email today (the password has been changed; and the Greek characters are reproduced verbatim): Your ρasswοrd is REPLACED. Ι kηow α lot more τhngs about you τhaη τhαt. How? I ρlaced α malwαre on τhe ροrn websιte αηd guess whαt, yοu visιτed this web sιte to hαve fun (you kηow whaτ I meαη). Wh...
I have a naive question about certificates. I know the hash of the public key is signed with the CA's private key. I have an alternative design. Because the public key is being transmitted anyway, so why don't we sign the public key directly and send it? So the browser can decipher it to get the public key? What consid...
I'm planning on using KeePass XC for the first time and am trying to create a setup that: (1) would prevent hackers from stealing my passwords (2) would prevent me from losing access to my passwords My password management setup is written below. Currently, my weakest point of attack is if someone steals my USB. I us...
I have a virtual environment and I am making a SYN flood attack to a Ubuntu Server's port 53 using Kali 2020. I realized that a countermeasure for this attack is to limit or block the responses to the SYN packets, which are the SYN,ACK. But how can I do this with iptables? What else should be done to prevent that kind ...
We have a whale phishing case, in which the sender is from the insider (we're using Zimbra email service for some specific user groups). A cursory investigation indicated that this account had probably been compromised. My concern here is that is there anyway for the hacker to take over this account through server? I ...
If you run the command cryptsetup luksDump /dev/sda5 (change device to whatever LUKS encrypted device), you will get an output, and at the end there is a section "Digests" which contains something like this: Digests: 0: pbkdf2 Hash: sha256 Iterations: 104492 What does this section represent? Why does i...
I'm designing a password reset system for my website/app right now and I'm not sure if the solution that I've reached could be considered suitably secure. The steps for resetting a password are as follows: User visits the login page (HTTPS) and chooses 'Forgot Password'. The user submits their email address (or userna...
I found the article that describes how to access a Linux machine behind a home router with SSH tunnels. https://juliansimioni.com/blog/howto-access-a-linux-machine-behind-a-home-router-with-ssh-tunnels/ How safe is such setup? I'm not an expert, so not sure if there are any pitfalls. My use case is almost the same as t...
Firefox Monitor has given me a warning that Lumin PDF has been hacked. However, I use my Google account to login to Lumin, which I believe means Lumin did not store a password for me. Does the Lumin PDF hack mean that my Google account may be compromised in any way? The warnings for Firefox Monitor don't seem to ever...
I'm a well established software company. For more than 30 years, my business has been delivering both hardware and software. My Windows software is being quarantined by some of my customer's antivirus. How I handle it, up to now, is that I have been asking Symantec to whitelist every single executable binary I build, b...
A web application only sets the HSTS header in responses to requests to /assets/*. Any other response does not include the HSTS header. While it does seem insecure at first, any browser opening the index page will quickly follow up loading all the assets, which then results in the HSTS header being seen and respected f...
Many CLI applications store or need secrets in plaintext files. I'm searching preferably for a tool, or a methodology, to encrypt those files without the application knowing. What do I mean by that : In my ideal dream world, when some process (unix) tries to access an encrypted file, I would get a prompt telling me pro...
I'm using a Linux system and cross-compiling to Win32. The most trivial Windows source code ("Hello world" by Petzold), when compiled using i686-w64-mingw32-gcc (gcc version 7.3-win32 20180312), generates a valid Windows executable; this executable runs nicely on Wine (under Linux) and on native Windows; however, when ...
So my understanding of Service Workers is that once installed they grant you full control over requests to a domain. If an attacker managed to include their service worker in your site, then for anyone who visited that site the service worker could be installed, and then for example proxy all further requests to the si...
We're using argon2-jvm to use Argon2id on our Java TCP Server. Because its argon2id instance is thread-safe, we plan to only create a single instance for the lifetime of our app and have each request handler call it whenever necessary (e.g. for new registrations and user log-ins). We've fine-tuned our single argon2id i...
I have been trying to make sqlmap test the username parameter in a fake login page that uses basic authentication. However I cannot make it test the Authentication header via the asterisk trick: sqlmap --auth-type "BASIC" --auth-cred="*:pass" --level 5 --risk 3 --method POST -u http://fake_endpoint.local/ --proxy http:...
Let's say we have a web server. Server startup time is the time the server process was started. Say, the startup time was being leaked via its response headers due to the carelessness of a programmer by not getting current time while the generation of the response. The programmer is using the time variable he initiali...
Security policies have become like puzzles these days. Except for the obvious requirements like alpha-numberic, special symbols and length, there are more arbitrary rules. I've seen even 15 requirements for the password. Something like this: not to start with prefix like jan, feb, mar or dictionary words at least 3 ...
I have an important email to send. Unfortunately, the recipient's email server rejects it because it found a virus. Note the email has a zipped .exe file attached, the .exe is supposed to download data from the internet - this, I believe, is likely to make AV engines suspicious and perhaps be a source of false positive...
I'm wondering if there is a way to bypass this xss filter XSS Context: In a script tag What the filter does: lowercases the user input doesn't encode < > UNLESS </script is present (it doesn't encode >), if it is it'll encode the first closing angle bracket so a payload would look like this: &lt;/script> I'm not th...
So I found this section of a webpage, which is a basic "feedback box". It had all the characteristics of an SQL injectable element. Scanned it with OWASP, it was true. Tried SQLmap, it gave me connection errors since it was protected. Since it's an element with no output, only a "thank you" message. How can I test it? ...
how can I get remote access to android box the the other people has to it ?
Many companies have some BINs where you can enter a fake credit card and you get a premium account (the Credit card is based on a BIN that just trick or bypass the plateform), I want to know how this works ? For example : bin spotify/netflix etc.. 5273XXXXXXXX How people can discover these bins ? And how/why they wor...
How does Cloudflare web firewall work? When someone tries to enter a website, they first go through the Cloudflare server and then, if a captcha is solved, they can see the content of the website. So from what I understand it goes like this User -> Domain -> IP of firewall -> captcha -> IP of website -> loads content ...
I'm in the process of creating a password reset functionality for my project. I currently have my website send a password reset link to the user's email if they request it and validates the link properly when clicked (checks for selector and validator tokens and not expired) before displaying the form to create a new p...