instruction stringlengths 24 29.9k |
|---|
I have specific number of artifact, and I want to search for those particular artifacts in the disk image using the bulk_extractor tool via different methods using Random Sampling, Stop List, Alert List, or Search Text. I want to know which method is most efficient, and how can I reproduce such test scenario and get re... |
Suppose I have my own website mydomain.example and I've got a certificate from a CA, e.g. Let's encrypt.
What prevents me from issueing a new certificate for one my friends' website friend.example?
|
I just had this security alert about one of my Google accounts:
Device : Unknown device
Time : 25 minutes ago
Place : United States
IP Address : 2a00:1450:4864:20::51b
Someone just used your password to try to connect to your account from an application not belonging to Google, we have blocked this person.
This ale... |
For Example
Is it safer to do:
$ sudo [cmd] [args] [enter user password]
or
$ su - [enter root password]
# [cmd] [args]
I always assumed they are the exact same thing, because sudo utilizes setuid-root, so the process that is run as sudo's first arg is run with the sudo's effective ID, which is root.
my questio... |
Quoting this paper - SmartWalk (https://dl.acm.org/doi/pdf/10.1145/2976749.2978319):
For graph privacy, strong link privacy relies on deep perturbation to
the original graph, indicating a large random walk length. However, as
the fixed random walk length increases, the perturbed graph gradually
approaches to a ra... |
Eduroam is an organization that provides free WiFi to educational institutions and around some cities. I don't fully understand how the authentication works, but in order to connect you have to install a CA Certificate called eduroam_WPA_EAP_TTLS_PAP on your device. I know CA certificates are used to decrypt TLS/SSL tr... |
I decoded some of the original traffic from hex and got the below output. I'm not sure how to decode it further. Any help? Thanks.
T=2020-04-10+13:27:30.758+PST&L=i&M=[g2tray]&N=22&X=6/A3eZDCME9jCLvH9D6cciMZAFUWx2xUayI+JAbr1hzuW0BNOuxYTlatYqKViHFk0RKP1lCag7gtlyUH9l1a+fDDMkI4W/+8t0zuNFEgGcMW/qlM5iGhhJKB38/186Uy2Q+vUGBpg... |
I was advised recently by someone on here to reinstall my OS after being infected by belombrea dot com. However, in order to reinstall I needed to download Windows 10 on a USB drive. Now I'm afraid the USB drive itself might be infected. Thanks
|
I would like to know if a simple malware designed to execute commands received by a C&C will have the same result rate if programmed in :
lower-language like C++
high-language like Python (converted to executable with a Python converter like
auto-py-to-exe)
During the static and dynamic anlysis : Do Antivirus have th... |
I am working with a PHP vulnerability. Below is the code snippet. Basically, I need to print the contents of get_flag.php.
My train of thought is that the following could be the vulnerabilities in the code
The global $secret variable
The unserialized_safe function
The hash_equals built in PHP function
The attack will... |
My public website is getting a lot of get requests to endpoints like "wp-login.php", ".env", ".git/HEAD" and many others. This seems to be a non-trivial portion of my website's traffic and I'd like to discourage it or at least reduce its impact.
Option 1.
I've heard of tactics such as redirecting such requests to rando... |
I participate in a CTF and I had to steal Admin's cookies. And quotes (single and double) were encoded.
I needed to use document.location=URL for steal cookie, but I can't pass URL using quotes.
So I thought I could just create all (document.location=URL) using a base64 and can pass in eval to execute. But problem is b... |
I have access to a server via RCE over http. I can send post requests to the server which results in command execution. I am attempting to escalate privileges via sudo (su is not installed).
The server is heavily firewalled with egress filters and there are no writeable directories/files within the web application.
My ... |
Is blocking outgoing HTTP connections from a home network and only allowing HTTPS
connections reasonable? Will it reduce the chances of a man in the middle attack?
|
While trying out the wordlist generator crunch in Kali Linux 2020.1 I came across the following behaviour:
root@kali:/home/kali# crunch 10 10 \
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890,.-:! -o chars.txt
Crunch will now generate the following amount of data: 1604471776359824323 bytes
1530143524513 ... |
I've started looking into password managers these days and have come to trust the general concept. They provide convenience and very good general security if used right.
However there is one point of concern that remains:
What happens if my password manager service fails i.e. both the servers and the client (or browse... |
I am reading how different services are handling API signature and authentication.
Particularly I was looking at:
AWS Signing v4
WeChat Signature Algorithm
Alipay Digital Signature
Google Maps API
I see the algorithm Amazon is using for signing is quite complicated, while the ones used by Alipay, WeChat and Google are ... |
Recently I read about the pixie dust attack in which a WPS PIN is decoded with time stamp and other resources within a fraction of a second. The only drawback is that it only works on WPS-enabled routers.
What is the success rate of this attack? Is it better than a bully brute force attack?
|
I'm trying to capture TCP requests through Burp Suite with this hacky method.
Basically it listens for user selected protocol requests (TCP/UDP) and then forwards them to Burp Suite (or any other tool, if you want to) just like they're HTTP requests. All this by setting a proxy, and Burp Suite will listen to that proxy... |
https://people.cs.umass.edu/~amir/papers/CCS18-DeepCorr.pdf
https://www.youtube.com/watch?v=_OKLtKgEn4k
I have some questions about this "Deepcorr". Does "DeepCorr" really work that good? They say that "DeepCorr’s performance does not degrade with the number of test flows", but more people are using Tor more and more p... |
I need to generate a keypair for each user registered with my website. The user already has an assigned username and password (let's assume that these credentials were assigned to the user and that he did not have to sign up to the website).
Upon first authentication i want to generate a keypair for the user such that ... |
I was robbed...
That included my Linux notebook and my company's notebook. Both are encrypted.
Mine is encrypted with LVM over LUKS, using a passphrase to unlock the hard drive once the kernel has been started by the UEFI. But Secure Boot was disabled on the machine.
The company uses Bitlocker in Transparent Operation ... |
So, I have an embedded system running a Linux distro. It has a key (RSA) in an intermediate stage and then calls switch_root. switch_root recursively deletes the files on the host filesystem, but I don't think this is a secure delete, so it seems to me that the new filesystem should be able to recover files from the pr... |
When I was doing some security research, I found an unexpected query in a POST request like this:
q=select%20*%20from%20x%20where%20a%20%3D%20'%7B%22something%22%3A%22blah%22%2C...%7D'
Where the decoded content is:
q=select * from x where a = '{"something":"blah",...}'
And the requested endpoint is: /v2/public/yql?..... |
Is there a way to encrypt files with AES 256 in the authenticated GCM mode using GPG?
I don't see GCM in supported cipher modes. It seems that the GPG uses only one mode (its own modification of CFB), although libgcrypt supports GCM.
Edit:
GnuPG relies on Modification Detection Code (MDC) based on SHA-1 for authentic... |
I'm learning from the "Information Security" book and already know what the two terms policy and procedure mean.
While these two terms are quite easy to distinguish:
policy is what to do to secure the data and the information system, whereas procedure refers to the steps about how the policy should be enforced.
I came... |
I read about recommendations about secret keys (or password as rfc8018 call it), one of them is to change the password from time to time.
I would like to know: is there some best practice for this change of password?
I found this reference in the RFC with the following information:
changing a password changes the key ... |
I sign my Git commits with a GPG key which I stored on an old computer. I lost this key so I created a new one to sign my commits with. It has not been compromised so I do not wish to revoke it.
However, I accidentally deleted my public key too (I use GitHub) so all my past commits now show up as unverified. Is it poss... |
Let's say I've got a generic, cheap mouse.
It's a USB-device. Any USB-device may contain memory, so how to know if the manufacturer didn't embed any memory with malware software in a device?
(on Linux preferably)
|
When configuring an OpenVPN server, you have the option of pushing DNS resolvers to the client - like so:
push "dhcp-option DNS "
If this approach is used and a public DNS resolver is defined, will the DNS lookup be performed via the connected OpenVPN client, or by the server? In other words - will the DNS resolver see... |
What are the subtle differences in both - as one could say that both are almost the same...
Static Code Analysis (also known as Source Code Analysis) is usually
performed as part of a Code Review (also known as white-box testing)
and is carried out at the Implementation phase of a Security
Development Lifecycle... |
How can i decrypt Diffie-hellman TCP packets?
I'm trying to make a tool that shows cleartext response from a server that uses this encryption.
However when i look online people all seem to say it's impossible to decrypt DHE, which is not true since we are the client and have access to this information,
but how can i de... |
I'm working on a project which we intend to launch for developing countries, and, as a result, want to limit the amount of information needed for login and identification, while still maintaining individual privacy and security.
Speaking to the team, it became clear that passwords are a no-go, as users may end up acces... |
I got an IM from a person I recently got acquainted with this year. In the text message, he asked me if I knew the name of the website you download free ebooks from (libgen.is) I found it really weird he asked me this the same day I went on this website through my phone for the first time. And besides, there are only t... |
You can find many claims online regarding BSD jails being "better" in some way than Linux namespaces for containment, but they typically lack technical details.
From what I understand, the attack surface is pretty much equivalent (shared kernel syscalls, drivers in exposed devices, shared networking stack, shared file... |
For convenience and security I find password rotation requirements harmful.
Our SOC 2 auditor seems to still require them. Does SOC 2 actually require password rotation in 2020?
I would think(hope) meeting NIST password guidelines and TOTP MFA should be more than enough.
|
This will seem like a very basic question, but I wanted to make sure I don't miss something.
When you enter your password in a login page and you press enter, what exactly happens right after until you're "approved"? I mean in common/regular websites.
I know some websites like Password managers, secure email providers ... |
Trying to make an important router as safe as possible from low skill "dos" attack on it. Is it possible for someone in the range of a wifi router to write a script in whatever programming language to try to login to the router with wrong password on purpose with full speed to basically "dos" it to the point where the ... |
I'm currently requested in my enterprise to do myself (security team) the firewall overtures requests in TUFIN (firewall workflow), instead of our local IT team. it's for simplicity and saving costs.
These opening are at the end done by the network team of our IT provider with the control of the security team of the IT... |
Signing HTTP requests is all the rage nowadays. The benefits of doing so when communicating over an insecure channel are clear. With signatures you can bring message integrity and authentication to such an environment.
But I'm struggling what signatures bring to the table when the communication channel IS secure. Like ... |
A friend of mine had her mother allow a "telecommunications customer support agent" (a scammer) to access her computer via TeamViewer.
What should I do to secure the system/ensure the computer is free from any malware?
I've checked msconfig and there are no strange processes starting up which seems good so far.
However... |
This is another attempt of mine to make sense of securing my web-app, which is built with two frameworks:
Django REST API - serves as the backend. It generates both a token upon correct login, and a CSRF-Token.
Nuxt.js - This is a framework built on top of Vue.js, and enables server-side-rendering. The latter feature ... |
I have a strange situation.
My scanning machine is on networkA and target is on networkB.
Those networks are managed by IP pools in cisco ASA.
When I nmap the target with -Pn -sS --reason, I get as results the following:
Host is up ; port is filtered ; reason = no-response
What doesn't make sense is Host is up. It sho... |
Someone is using my wifi other than my devices, so i checked the connected devices in the d-link and found the ip address of the user and saved it.
Now how do I find the location of the user?
|
In our web app, we need to allow users to input rich text which is then presented to other users. We are looking for a simple WYSIWYG (JavaScript) editor that outputs a format which is backwards compatible with plain text (to support existing text in our database), has simple rich-text formatting support (bold/italic/u... |
Everything earlier used to work fine. However, recently I downloaded a newer virtual device on Genymotion, which is an Android 8.0 API 26. I have been struggling to get HTTPS traffic intercepted on this device. Some digging suggested that since Android Nougat things have changed with respect to the use of user installe... |
There is currently an ongoing discussion in our company about what security measures to put in place regarding workstation access to the company network and the internet.
Situation:
Employees have Linux laptops with encrypted SSDs
on these SSDs is the intellectual property of the company
Employees have unrestricted ro... |
I am a proud owner of a YubiKey 5 NFC and have been using it for quite some time now. I want to replace it with another YubiKey 5 NFC running a slightly newer firmware. I have utilized almost all features the YubiKey offers including Yubico OTP, PIV (X.509 certificates), OpenPGP, FIDO2, U2F and configured a static pass... |
I have a text file parole.txt containing the dictionary to be passed to john with the --wordlist option.
Here is an extract of the file
mamma
papa
libro
...
...
if I use the --mask=?u?w?d option I get the following
Amamma0
Bmamma0
Cmamma0
....
Alibro0
Blibro0
Clibro0
and this is NOT what I'm looking for. I would like... |
Is it possible to protect against DNS cache snooping on ISC bind and PowerDNS servers?
If not, is there a similar DNS server software which can't protect agains snooping?
|
So I'm building an application that needs authentication, I'm wondering if there's an security concerns with using a persistent httpOnly cookie to store user authentication with a SPA? (only 1 server. OAuth is not an option) I could set the duration to say 30 days (is this a reasonable duration or should it be shorter?... |
I heard hackers' top ports to hack computers through are port 80 and port 443. How do they do this though aren't port 80 and port 443 just for HTTP requests such as GET, POST?
|
Let's say I share a screenshot of an area of interest (AOI) from Google Maps. Does that alone reveal the specific location of the AOI, even if it has no identifiers (roads, coordinates) on it? What if state/region is known along with the image? I'm wondering about programmatic approaches, as I don't think someone could... |
//update 1: please look at the end for edit #1
This applies to pretty much any credential system, even include 2FA: When and How do I tell the user that the login had failed - and If at all?
On a Tech-News site I read about a recent data leak on which the attacker used what they called "credential stuff" or something -... |
I heard that Microsoft DS is a port that is commonly used by hackers to hack computers due to its ability to transfer files.
How do they transfer files with Microsoft DS?
Do they need an exploit to let the malware run?
|
I'm currently studying for the Comptia Security+ exam
In few months from now, I will have the opportunity to attend a 4 months preparation course for CEH without paying! But I will not try to get the CEH exam because of the price of the voucher a little too high for my pocket.
I read that CEH and Pentest+ are similar ... |
Based on one of the lectures of Planning, Auditing and Maintaining Enterprise system course by Greg Williams (Department of computer science university of Colorado):
Let's say they were installing a service on a Linux system and we forget to take down the installation page. That installation page has a lot of sensiti... |
Firstly I am not sure if this is the right place to ask this. If anyone has any idea of where this question belong please tell me.
Recently I was reading about TPM and TSS(TPM Software Stack). The diagram in this document -- TSS TAB and Resource Manager Specification shows the structure of the stack. In my understandin... |
Say there is a bank/financial service that wants to have hyperlinks on their secure website/domain (or even in emails they send out to customers). In some of these links there are some long/obscure URLs which link to one of their subdomains, but the long links are ugly and not very user friendly, so they want to have s... |
Scenario: Consider a huge and diverse federation of Identity (IDPs) and Service (SPs) providers. Since trust level is generally low, Identity providers are reluctant to give out any kind of personal identifiable information (PII).
Now there are some services requiring PII, the respective SPs follow some higher standard... |
I was wondering if it is secure or not to run containers from different customers on the same machine. Basically I was investigating the level of isolation / security provided by Docker alone.
Then I found Google Cloud Run, and I was wondering which one of the following is true:
Does it relies only on Docker isolatio... |
I use a password manager with a long rememberable master password for logging into all of my online accounts. When signing up for new accounts my password manager prompts me to generate a strong password which it then autofills. This auto generated password is a twelve character long alphanumeric string. Is there highe... |
I've done some research for the past hour but I can't find a definitive answer to what is happening.
So I use a AWUS036NHA, put it in monitor mode, sniff everything, then sniff the AP I want to do the deauth attack on, I don't see any clients, I'm like "OK maybe it's just some type of encryption or protocol I'm not awa... |
I am a software engineer by profession and as of now doing wfh. So we always connect to VPN and I know my activities will be monitored. But what will happen if I disconnect from VPN? Will IT team be able to monitor what I browse or access? I am just curious to know this. It is my office laptop and we have softwares ins... |
I have a single machine (client) and several servers and I need to take from them several files through sftp. My idea is to generate a pair of public and private keys in the client, and copy the public key to the different servers to be able to access them later. Does this make sense or is it a bad practice?
|
One of my company's clients recently produced an application security assessment report, noting a list of violations based on OWASP's top 10 list of web application security risks. One of the violations, based on OWASP's #3 risk, is that sensitive data is present in browser history. This can be both in the query string... |
I am trying to find the best OAuth2 mechanism for our VueJS Single Page Application (SPA) hosted on our own backend. From my research, Authorization Code should be sufficient, as long as the redirect URI happens on the backend. If it happens on the front end, I would need to use PKCE.
The confusion I have is that I saw... |
I'm building an authentication system that I want to be secure. I plan on using JWT tokens as the main authentication mechanism. When the token expires, the server will return a "401 unauthorized" response, and I would like the client to be able to perform a silent refresh. Typically this is done using a refresh token.... |
I would like to assess the actual risk for various CORS attacks when a web application properly sets CSP and other response headers, but the app server error page does not. When a 40x can be provoked by trying to access protected content, for example, can the error response be used to inject malicious scripts, even tho... |
In the OWASP Testing Guide, it has a whole section called "Client-Side Testing." This section has to do with testing for things such as DOM-based XSS, JavaScript execution, HTML injection, Client-Side URL Redirect, etc. The examples in the testing guide for the first four vulnerabilities (the ones I just listed) all in... |
Let's say I have a simple web application which uses a single JavaScript (JS) file, loaded from its own domain, and has implemented the restrictive Content Security Policy (CSP) of default-src 'self'. There's a stored XSS in it whereby the JS file will make an Ajax call to an API which would return some content stored ... |
So basically with my app, I keep users access tokens in memory for the duration page load (e.g. once they refresh the token dissapears). To prevent them from having to sign in again, I have my auth server (https://api.myapp.com) set a httpOnly, secure cookie with a refresh token. This works fine for most users, however... |
We have set up Modsecurity CRS with Nginx and we are in the phase of customization (or writing the exclusion rules).
We'd like to know if it is possible that modsec can only log the exception for certain URIs without adding up the score while the rest of the URIs still being protected. Or, whenever it tries to return A... |
The AES-GCM algorithm provides not only confidentiality but also integrity. I understand that integrity is an important part of security in overall, but whenever I think in terms of possible attacks, only attacks against encryption in transit like POODLE.
Is there any good use case for AES-GCM and encription at rest?
|
Looking for recommendations for security in sending token (e.g. JWT Token) through a GET vs POST request to the server.
There are two options:
Sending token through Headers as part of HTTP GET request
Sending token via request Headers/Body as part of HTTP POST request
Note: TLS is used for securing the connection.
|
I'm in the midst of exploring the concept of Single Sign On with JWT.
I'm planning to build sso.test.com using Laravel
Referring to chart above, may I know:
Is it safe to POST JWT token (that consist of user_id) to client (app1.com)?
Is it appropriate to check "shortExp" and refresh the token every 3 minutes?
Do we h... |
So this is a two part question:
1) When I have a compartmentalized system, and then I use the same hardware 2FA key for 2FA across all compartments, can my hardware key be used to trace me through the compartments and link my compartments together?
2) Can a poorly designed application (native) or a web app, compromise ... |
I have a IoT device that works with BLE and uses a smartphone as a bridge to connect to a digital platform (cloud).
The communication between the IoT device and the platform is based in PKI.
The IoT device has only few privileges and services to with the platform such as status communication, public key sharing and oth... |
I just learned AES-CTR.
I am wondering about the security of the CTR mode. It is basically an AES of the nonce with an XOR-Encryption at the end.
Are this 2 assumptions correct?
The nonce doesn't have to be random, can also be 0 for example, but it has to be unique in combination with the key
XOR-Encryption needs a ke... |
so here is my test setup, I write something "hello world", created its hash, created signature of hash from private key, then using this openssl command, i can get same hash from which signature was generated
openssl rsautl -verify -inkey pubkey.pem -pubin -keyform PEM -in signature
Next I downloaded stackexchange.com ... |
We've received frequent emails from our Threat Intelligence Group with IoCs artifacts, such as file names, hashes, domains/urls. They request us to do preventive measures for the given attributes.
However, I find it very hard to follow their request. Should I block all given IOCs? If so, it is very time-consuming and ... |
I am currently reading on DKIM authentication for email and I would like to manually try to run through it (to facilitate my understanding of DKIM), but I would like to verify if it is possible to do so.
My intended steps to run through this:
Obtaining DKIM record from Gmail using "nslookup -type=TXT
selector.google.c... |
How can I make sure my master password is as strong as possible?
The password manager I'm using is Bit Warden.
Is creating a passphrase a good idea?
I know it's good to include characters, numbers and words in it, and its stronger if it's longer.
What else? Any tips?
Thanks!
|
I trying to implement authN/authZ for my application using Spring Security 5.2.2 and OAuth2/openid connect protocols. I use AWS Cognito as an identity provider and I'm trying to implement role-based authorization for my application.
I've created user groups in the AWS Cognito user pool. In the resource server, when I c... |
If supposing I discover that my network is being attacked by some hacker or is being compromised in any way and I am able to detect it. So, is there any software-oriented way of 'locking-down' the network?
Basically, that means that there would be NO traffic at all in the whole network. A solution like yanking the mode... |
While using FB, I observed many friends playing games such as "Which character you are from some particular web series or movie?" I think this can be dangerous because when I clicked on CLICK TO PLAY button of one of those games, I opened the privacy policy page of that product.ON this page, it is mentioned that some t... |
I am going through the Burpsuite Academy Training on Access Control and I came across a section I still don't fully understand. In their reading, they explain:
Some application frameworks support various non-standard HTTP headers
that can be used to override the URL in the original request, such as
X-Original-URL ... |
As a home exercise I'm trying to achieve buffer overflow attack by running a simple char array program that stores the input argument in the program stack and then overflowing that stack with long enough input so that EIP gets overwritten with one of the NOP instructions and then it would slide to the shellcode and exe... |
<input type="email"
class="form-control"
name="email address"
id="signinEmail"
placeholder="Email address"
aria-label="Email address"
value="INPUT"
required=""
data-msg="Please enter a valid email address."
data-error-class="u-has-error"
data-success-class="u-has-success"
aria-invalid="true"
aria-describedby="signinSrE... |
I administer a few hundred servers and am going through a yearly PCI audit. This time around we need to prove that we've got anti-virus protection on our "systems commonly affected by malicious software (particularly personal computers and servers)"
The systems I work on consist of several intermediate hosts (all in P... |
With the traditional session system where only the session ID is stored on the client possibly even encrypted, the user won't be able to assume the identity of another user or escalate their privileges without accessing the database or the session store directly.
But with JWTs, it seems once the attacker gets a hold of... |
Does Digital Ocean have something similar to Credstash or AWS Secrets Manager (both AWS services)?
Trying to decide on the most secure way to store environmental variables with sensitive information (like database access codes, for example).
Locally, I have .env file that is named in my .gitignore to prevent it being v... |
Let's say that during account creation, I already prohibit passwords known to be reused from breaches of other sites, like if it's in the Have I Been Pwned list. But breaches happen all the time, so what if my customers' passwords show up in the list later, after they've already created their account?
I'm of course sto... |
I am a bug bounty hunter. When doing some research, I found a subdomain that is using Apache Tomcat. Talk about Tomcat, there was a vulnerability found in 2017: CVE-2017-12617.
Any Apache Tomcat server with enabled PUT request method will allow the attacker to create a JSP file in the server through a crafted request a... |
I am reading the following paper:
MPCircuits: Optimized Circuit Generation for Secure Multi-Party Computation
I have the following questions:
Why Preference of group1 starts from L_0 where as preference list from group2 starts with L_(n/2+1)?
Any reason why they used the priority encoder?
Is their anything done for ... |
Have a doubt about about how AWS KMS handles their asymmetrical/symmetrical keys. Does AWS KMS use Hardware Security Modules (HSMs) underneath by default? (cant find documentation that prove/dissmiss the fact).
I saw that it is possible to create a custom key store and connect to your dedicated HSM in the cloud (AWS HS... |
I'm pretty sure this is a stupid idea but I'd like to know why, so bear with me for a moment.
Lots of the work backend developers do is providing CRUD access to customers via HTTP, essentially mapping data from and to the internal database. Customers authorize to the web service using some sort of credentials via an en... |
Can anyone answer which scripts are used when the -A flag is used?
The answers I've found all point to the generic -A: Enables OS detection and Version detection, Script scanning and Traceroute. help info which doesn't answer which scripts are used.
Is it equivalent to having --script="(default and safe)" or something ... |
There is a website with logout button, when I click on logout it just redirects me to login page. If I manually enter the dashboard URL in url bar im still logged in. Is this a security bug for that website and is there any CWE or CVE assigned to this kind of bug?
|
I'm new to the /dev/random and /dev/urandom pipes in general and have an application calling from /dev/urandom which I'm attempting to inject entropy into. I'd prefer not to change the source for this application, but an additional process calling rngd -r /path/to/file from what I can tell appears to inject entropy in... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.