instruction
stringlengths
24
29.9k
AFAIK, if the connection to the VPN server is properly set up, the ISP is not able to see any of the traffic. Nevertheless, I just found a worrying comment to this blog post: https://www.stealth-phones-guide.com/blog/anonymous-sim-card-scam I Just wanted to double check with the experts of this website: is it true what...
I have an alert for monitoring windows server logon success (event ID 4624) and already whitelisting all the authorized users in the alert rule but after a while, there is some alert showed up using domain NT AUTHORITY with account names like SYSTEM and some MSSQL services account with domain NT Service Logon. The logo...
Received an email which contain the below hyperlink https://nam02.safelinks.protection.outlook.com/?url=http*3A*2F*2Factuallysale.com*2F&data=02*7C01*7C*7C548d20ace3ec4747fe1008d7d7d8b597*7C84df9e7fe9f640afb435aaaaaaaaaaaa*7C1*7C0*7C637215198062448150&sdata=nk69pKQ7jIMsMVSfWVFG*2B38GuiK08jysbwN114W*2BMpM*3D&reserved=0_...
I want to allow users to link/unlink several OAuth providers to their account. How can I mitigate 'office prank' attacks, when someone can access my computer while I am away? My account: OAuth with Facebook. Attack 1: Attacker logins with his Google account, and links to mine. Attack 2: Attacker clicks 'unlink' my Face...
I have a question about "session-theft" and the supporting of "deep links" in a web application, and best practice. Our web application has a small number of front-door public web pages (e.g. /servlet/Login) and the rest of the application is considered to be private pages that can only be accessed by authenticated use...
I built new web application. In my login system I make remember me check box, If user clicks on that then his/her username and password will stored in cookies so for next time they will logged in without any asking those credentials. Is that a secure way? or what else a good way for better security issue?
I seem to be missing one fundamental point regarding Certificates and hoping someone can set me straight. It is constantly described that a certificate can be used for authentication and to ensure the server you think you are talking too is the server that you are talking too. I understand the principal of verifying th...
If I have opened a website in Google Chrome on Windows 10 and it runs in the background, can it spy to see whether I'm actively interacting my computer or the computer runs without any user interaction?
I have a REST API and I want to handle all HTTP requests via POST. Is there any security issue in using just POST to perform all CRUD operations requested by a user, which sends JSON specifying the operation to be performed (and other informations)?
I read a lot of Q&A here, and read a lot of articles about RSA and Diffie-Hellman, but it seems like they are all saying opposite things about the question: When I start an HTTPS session in a website, for example, is the symmetric key that will be used in AES combined with the RSA asymmetric algorithm, or is it combine...
Is it possible to automatically reconfigure a router when the router is reset? My 13-year old son is resetting the router to bypass time controls (set to go off at midnight). I can configure the router to block access midnight to 5am when he should be asleep, but resetting the router bypasses this. The router can sav...
I have a web application which is vulnerable to XXE attack. The impact of this vulnerability is, it can do a port scan by sending a malicious XML that does a request to a specific host+port in the server instance/network. When calculating the CVSS score for this issue, I have the following concern for 'Scope' vector o...
I shared a Speccy report link (publish option) on Reddit Security's chatroom after I was asked to by an expert while he was trying to solve an issue for me. please let me know. thanks
I've been reading various articles about escaping restricted shells, e.g. rbash. I’ve been speaking with friends working in different Linux environments (small, mid-size and huge) and none of them is using restricted shells. Are restricted shells really used that often or is it more for demonstrative purposes describe...
I was reading an article on Bluetooth security (see citation below), and in the introduction the authors writes: "Bluetooth specifications provide for three basic security services: - Authentication: verifying the identity of communicating devices based on their Bluetooth device address. Bluetooth does not provide nat...
I got an email from my hosting provider telling me that my VPS was used to perform DDOS attacks on this website: cpanel4.vhosting-it.com. Unfortunately I haven't read their email sooner, so they suspended my account. Here's the log that they receive from the attacked website. Before reactivating my VPS, I want to know ...
I live in a remote area with few visitors and it would be very interesting to detect a mobile phone in my vicinity that isn't my own. It would be very easy to just use a frequency counter and look for activity on those bands, but that might be my own mobile phone and might also be chatter from a base station, etc. So I...
I am receiving SOAP requests with SAML AuthnStatements whose SessionNotOnOrAfter timestamp is EXACTLY the same value as its AuthnInstant: <saml:AuthnStatement AuthnInstant="2020-04-22T21:11:41.453Z" SessionNotOnOrAfter="2020-04-22T21:11:41.453Z"> I am using ApacheWSS4J to validate the SOAP Signatures it also v...
Where I can find more information about Malware, like its name, malware family, its behavior, first seen, which type of file its use, its internal code, etc. If someone knows any source of Malware Repository or CSV File source or any website from where I can get these details for like name, malware family, description,...
I think I quite well understand the theoretical benefit of adding the HMAC (authenticity/integrity on top of confidentiality), but I am looking at this from a key management point-of-view. Premise: Since anyone could in theory encrypt plain text, I add a MAC tag so the ciphertext origin can be verified. This derives th...
In the last months I very often was in a position where I needed to send an email attachments with sensitive content to someone whom I didn't know well personally (so that I could talk to them how set up encryption), but about whom I knew that they had little IT background and barely knew how to operate a mail client. ...
In one of the recent penetrationtests I encountered an XSS vulnerability within a cookie. The situation is as follows. The webapplication uses the cookie to store the current URL. Once the user switches to another functionality within the application the cookies information is placed on the website as link. The created...
Imagine a web server running on 93.184.216.34, usually reachable via the public DNS entry example.com. Web servers usually allow the distinction of multiple "virtual" servers, based on the Host header received via the HTTP request. Now imagine the same web server would offer a different service when requested via cx6wd...
.htaccess is now a very common URL rewrite to make it SEO friendly and cover the database IDs. What are the ways to explore php file on the server given to URL via .htaccess? Example : The URL is www.domain.com/news/56. I expect to find news.php?id=56 i.e. www.domain.com/news.php?id=56
If the same hard or soft RSA SecureID token was used across security domains would this introduce any additional cryptographic weakness? For example, if I had to access two secure customer networks could I use the same hardware token, as an additional factor without adding weakness?
When I hear that bio-metrics are tougher to crack, it's left ambiguous as to whether they refer to the term 'hack' as simply getting through the system by guessing the password or mimicking the person. So in terms of technical hacking techniques you use such as SQL injection or something similar where you have absolute...
From my understanding, except we meet the creator of an archive in person and verify the primary key fingerprint, we can never be sure, that the archive we download is really created by the person we think it is. Therefore gpg warns us that: gpg: WARNING: This key is not certified with a trusted signature! gpg: ...
I've been looking into third-party encryption tools and noticed that this particular provider has a bounty going on. Does this mean that they take security more seriously than other providers? How long can bounties like this last? I'd like to see some examples if there are any similar going on right now or have been in...
I've been struggling with encrypting this hash for a school homework. (Backstory) I had to gain access from my Kali Linux machine to an "unknown" Linux machine and I've done it, but now I have to basically get the username and password of the unknown Linux machine. I located the passwords file "/etc/shadow" and I nano'...
We have a client complaining that there is PII in the browser history (as in the persistent history you get to through your browser's menu - Ctrl + H in Chrome). For example, the URL for editing a user is something like: https://www.mysite.com/users/USERNAME_HERE/edit. And of course, that will show up in your browser h...
So, I'ma login to the website using my valid account. But there is Web API (GET) using "application/x-www-form-urlencoded" or "parameter" that we can access without login. Some page needs to login to access it. This is the case Login using: Username Password Available Page: Page A => We should log in to access it Pa...
We are a small nonprofit that accepts donations online. Our site is being hammered by hundreds of fraudulent credit card submissions per day, coming from multiple IP's all over the world (a distributed attack). 99% of these are declined, however our merchant services provider (Braintree) has asked that we remedy the fr...
Making our own phishing page isn't a big deal. Copying source code from website and modifying link just does our job. But what if we want to add phishing page for 2FA in the same code? Consider the scenario Attacker and Victim are both on same network (router) without any firewall. Attacker burps victim with a phishing...
I need to scan the contents of a USB stick with several antivirus software. I have several ways to do this. Either I mount the key, I scan its contents (I may place the suspicious files in quarantine), I copy the files on the host, I format the key and I copy the files to the key. This solution is super slow and is th...
How do I protect videos on my server from being downloaded or hotlinked on a different site but accessible on/by one website only. I'm open to utilizing any integration either via .HTACCESS or CORS For example, I want a website on one server to access videos hosted on a different server. Any attempts to download the ...
We will be providing a service to a client, where the end user logged on to our system can submit their payment information to Authorize .Net. I need help figuring out if we as a service provider need to be PCI Compliant. We will either select the Accept Hosted option or Accept.js option (SAQ A or SAQ A-EP solutions.) ...
I'm currently working on a project where we have to rethink a PKI architecture, but we don't know how to segment the different CA_SUBs, do you have any recommendations?
I researched password hashing and cracking and I have some misconceptions: First rule of thumb to create a strong password is to use 10+ combination of digits/upper/lower/symbols to prevent brute force attacks. Then the problem will be only if the password is a member of a pre-made table (whether it was long or short p...
During all this covid-19 stuff my school is letting students sign out computers and take them home until the end of the school year. When you log in to the computers, you log in to your school gmail account. So even though I’m connected to my own wifi network can they still view my screen at all times? I know they can...
I am working on a service which offers information on the road traffic situation. Users can subscribe to the service via an API, indicating the area and road classes they are interested in, and are assigned a subscription ID. With the subscription ID they can then poll the service for information. The first poll will r...
I have a MISP server set up. I then use a REST API endpoint to get a STIX feed from that server. This portion appears to be working fine. I then try to add that STIX feed to LogRhythms Threat Intelligence Service manager. It tells me that it is successful and the "Test" button returns a positive result but I cannot see...
I have an app using angular and when deployed to a server, everyone can ofc download the source codes, obfuscated or not. Yet, I would like to prevent user that are not authenticated to see the source code of the core application. Since right now, the login is made on the real app, they have access to everything. I was...
Let's say I connect a safe server example.com. In which case(s) can a malicious router in the middle of the route (or my ISP) see secret? 1) HTTP + GET, secret in URL query parameter : http://example.com/mypage?user=abc&secret=238 2) HTTPS + GET, secret in URL query parameter : http://example.com/mypage?user=abc&secr...
I’m learning about key management, encryption and GPG for provenance (verifying authorship). Using DevDungeon’s GPG Tutorial I learned that to export your GnuPG private key to your local computer, you use this command: $ gpg --export-secret-keys --armor XXX > ./my-priv-gpg-key.asc (where XXX is your unique hexadecimal ...
This question is quite general as I want to understand the (security) benefits of a 'timeout' in general. For our Nginx proxy-server, we have been using HTTP/S timeouts where we came across the issue were the Nginx server returned a time-out. Now, we have solved this by simply increasing the Nginx time-out. We keep up...
So, I tried to create a backdoor on my own using python (for a course), as veil kept getting detected. All went well on my windows 10 VM and my old windows 7 laptop. However, when I copied the .exe file to my windows 10 machine, Symantec detected it using "WS.Reputation.1" and moved it to quarantine. Can someone tell m...
I have an application server, written in C++ and also uses REST API to serve requests. There is no database, just a simple service which returns if the content of request is valid. Situation The server is in a local network and only reachable there, has no internet connections, and only meant to serve request from the ...
I just found out a bindshell backdoor, but I don't know how to access/connect to it using Metasploit. I'm a beginner with exploiting; is there a way to access the backdoor? I tried to search for "bindshell" on Metasploit but I didn't find anything. I also searched "shell" and it displayed a bunch of reverse shell expl...
Why does Kaspersky antivirus blocks the website saying that it has untrusted root center when the root CA is Kasperksy itself and also the certificate status seems to be "OK". Figure-1 shows the blocked website and Figure-2 shows the root CA as Kaspersky. Figure-1 Figure-2
Facebook has recently launched "off facebook activity" which lets you see all the activities shared by other apps/websites that you have interacted with. But how did those apps and websites share that data with facebook, even when I didn't use facebook to log into them? In some cases, I have just surfed a website as a...
I have 3 VM's running in VirtualBox. All 3 VM's are connected to a virtual network created from VirtualBox with the IP 192.168.56.1/24 For all VM's are configured Host only Adapter 1 Linux web server that hosts the OWASP broken web applications : 192.168.56.3 2 windows machine that is a client accessing the website : ...
I stumbled upon Google's firing range for DOM XSS testing, and this case caught my eye: <script> var payload = window.location.hash.substr(1);document.write(payload); </script> As far as I know, Chrome, Firefox ans Safari now URL-encode location.hash and location.search, making the exploit fail: malicious link: http...
Whatever is to the right of < is being deleted if I don't have a following >, else everything in between < and > is being deleted. Is there a way to bypass this sanitization?
I'm looking for a recommendation or more details on how to fix the issue (SSLv3 - server responded with higher version number (TLSv1.2) than requested by client (NOT ok)) reported by testssl.sh. testssl version └─▪ bash testssl.sh --version ########################################################### testssl.sh ...
I just found out my company started using LastPass Enterprise for service accounts. (databases and web applications that our whole team needs access to) I immediately switched my team over to it because it seemed safer than the method we were previously using - storing all the passwords in an encrypted file and passing...
By default, ASP.Net Core configures the login exercise with a couple of things that seem strange to me. I'd like someone who knows more about infosec than I to comment on these please. First, it sends an email to a user upon registration containing a confirmation link. The confirmation link contains BOTH the user ID (t...
For example, assume I get a NET::ERR_CERT_AUTHORITY_INVALID warning in Chrome, when visiting a website. If I still choose to visit that site, do cookies still get sent as usual (when the site is safe, no warning)?
Is it worth paying for a VPN to protect myself from Google tracking since, on an Android phone, you're logged into a Google account and Google knows who you are, anyway? Google can still track your activities depending on what Android OS reports to them. A related question would be whether encrypted messaging and email...
Let's say I my password is a simple password, 123456 Then if the database was exposed, if the password was: -- stored in plain text -> cracked -- stored it hashed with no salt -> prone to rainbow tables -> cracked -- stored it hashed with salt -> rainbow tables are less effective since a specific rainbow table for each...
I am using mitmproxy on ubuntu 18.04 I know how to capture another devices' traffic on my wifi network. but I don't know how to capture http requests which are sent by programs in my own laptop (where mitm has been installed) my laptops ip is 192.168.xx.10 routers ip is 192.168.xx.1 When I tried to do this using arpsp...
I am by no means a security engineer , and I have barely started my journey as a web developer. I'm utilizing a Python package known as Django for my backend and react.js for my front end. Recently I have incorporated django-channels, which is a package that gives me the ability to use websockets in my project. Since ...
I am practicing reflected xss .I found a page in my lab which gives back the input in response of the request.But the application is sanitizing anything which comes after a < character because of which I can't use any tags.What is actually happening is when I give input as < it is being encoded and then sent to server...
I connect to my github repo using ssh keys which I have whitelisted in GitHub. I do pull/push to this repo from my linux server which is hosted in AWS. If a hacker gains access to this AWS server, what all damage can he do to my code in github? Can he/she remove my repos permanently from GitHub?
In this environment an intercepting HTTPS proxy is used for legitimate purposes and its CA root certificate is installed on all clients. Every HTTPS proxy solution I've seen so far simply signs a new certificate directly with the CA, not preserving any information on the original certification path. After the proxy has...
We are considering to add the following feature to our web application (an online product database, if it matters): Instead of uploading an image, the user can provide the (self-hosted) URL of an image. We store the URL instead of the image. So far, so good. However, sometimes our web application will have to fetch t...
I have the following problem: I have two platforms, one of them has a TPM. I need to transfer data between these two platforms, so I first determine an attestation, in order to confirm that the destiny platform is the original and not a corrupted platform. I find a lot of information, but I don't know how to do that wi...
When a database is breached and my password and email have been leaked I can go onto have I been pwned? and I can see that my password has been leaked. But why wouldn't the service send out an email notifying me of my leaked password WITHOUT signing up for getting notified? In my experience, a lot of senior people find...
There's a question on infosec stack exchange here that is similar but not the same as what I want to know: Threshold for DDOS Attack I want to know how to calculate the amount of requests, and/or speed of requests it would take for a hacker to compromise a server's hard drives. This is how someone could theoretically g...
I’ve written a little utility that, given a web site address, goes and gets some metadata from the site. My ultimate goal here is to use this inside a web site that allows users to enter a site, and then this utility goes and gets some information: title, URL, and description. I’m looking specifically at certain tags ...
Let's say I use a 5 word password composed of 4 words plus the name of the website I'm accessing. For example for GitHub, it would be something like "correct battery horse staple github". How is that different to using a password manager with "correct battery horse staple github" as the master password? I also have a s...
Google sent me a security alert about my account being accessed from a new device. In fact, I believe I did access my account myself from a new device but it was NOT the device Google warned me about. I used an Amazon Firestick for access and Google said it was an Asus Nexus 7. Is it possible Google's device detection ...
My mobile sends SMS to random numbers without my permission. All messages are sent automatically. Here is an example of an SMS. SBIUPI qUrXgeX26iEY%2B2si9JHhubIjm7R2aHoo6pWcbXBpJho%3D All the receivers are Indian numbers (mostly airtel sim card). When I check the Truecaller app I found those numbers are named Cybercr...
This will be a long one. Here's the thing: I want to build a privacy-preserving system where the user data is not even accessible to the database administrator. Intuitively, I immediately thought of simply using AES to encrypt user data with their own password and hashing their username so that an attacker with access...
I found out today that ISPs get the IMEI code of any device connected to them. See a (very old) reference here: http://news.bbc.co.uk/2/hi/technology/4738219.stm I was hence wondering: in case I connect to the web through a mobile hotspot with a prepay SIM card, which IMEI(s) does the ISP gets? Say the setup is: Laptop...
I would like to block the execution of any instance of CSS's url() function in CSS provided by my server. One promising method would be a CSP, but I'm not sure if this is possible using a CSP. Is it? And if not, what is the best way to accomplish this? The reason is, there are some instances where users can modify CSS ...
We have a web app where the back end is composed of APIs. We use OAuth to authorize the web app's call to the APIs. We all know that in OAuth, there is always the Authorization endpoint used to get the Authorization code, which in turn is used to get the Authorization token. In the Authorization endpoint, part of its i...
I have a proposed method to encrypt files (I don't know if it is actually applied or discussed). The way I suggest is to use a sector to sector table in a random manner, So if a specific sector of the file is x1 is mapped to y1 according to the sector to sector table. The sector to sector table is created once at the...
I know how incognito/private tab works. But I'm not sure private mode works as expected in this situation: If someone uses Chrome "incognito/private mode" on Android device and plays a video file or views pdf file that is shared on Google Drive (without download), is video stream data or pdf file TEMPORARILY SAVED on ...
Goal My goal is to build a PWA. I am new to programming and I believe it is better to start with NGINX. I have not found a good article (explaining the security risk) about using the Cloud DNS (such as Alibaba Cloud DNS) to function as a WAF. I am documenting it in a README.md My intention on why I ask this question I ...
I have been wondering if all my online and wifi passwords are complex enough. So to test this I was checking if the password was already present on the rockyou.txt wordlist. If the password is not present in the wordlist then can I conclude that my password is complex enough ?
My email server(admin@myEmailDomain.com, ip 1.2.3.4) ---> ISP network ----> Gmail I built my own email server on my personal computer(ip 1.2.3.4). I also control the domain. It seems that my ISP can impersonate me to send emails on my behalf. The threat mode I am imagining is that my ISP allows normal traffic flows in...
When I start new torrents, I find there is no traffic for hours. I switch to another network (a cellular data hotspot) and the torrents start flowing. I return to my usual network, and the torrents continue. I have tried this several times. What could explain this? Is it possible for the ISP to block BitTorrent peer d...
I worked for some companies that recommend cutting the VPN connection when not needed anymore while working remote. The VPN is just required to access internal sytems. Nobody could tell me why, besides "lowering load from the company servers". Are there any security concerns that came to your mind when using a VPN in ...
I lived under impression that timely updates were very important. Even a home user wouldn't like their computer to demand ransom for their data. However, the less home and the more corporate our setting is, security only becomes more, not less important. A big company that has a lot to lose needs to apply all security ...
I've used OpenSSL cms to sign the data and generate a detached signature. As per my requirements, I need to timestamp the signature as well, so that if the certificate expired, verification of signature can be done. The generated timestamp is also in a detached format. I've also generated the CRL after revoking the cer...
What I mean is what protocol are best to DOS something like TCP, UDP, HTTP?
Is it safe to run an unmaintained version of Fedora in dom0? Fedora 25 went EOL on December 12th, 2017. Qubes is currently based on Fedora 25. From the Qubes FAQ, Dom0 is isolated from domUs. DomUs can access only a few interfaces, such as Xen, device backends (in the dom0 kernel and in other VMs, such as the NetVM), ...
I am doing a practice with Hydra in Kali Linux 2020. The problem i have is that when finish the process and obtain a correct password, it does not show me the password obtained, what it does show is the name of my text files with users and passwords. hydra -l /home/elunadanilo/Desktop/username.txt -p /home/elunadanilo...
This is a question concerning ways that people can get their feet wet with ethical hacking: https://www.reddit.com/r/hacking/comments/1d9onz/how_do_i_start_getting_into_pentesting/ It's an extremely technical field, yet a lot of the time the best way to learn things is through activities (like coding and running progra...
Sendgrid delivered me malware* - where should I report that? There was no contact info in the headers and the only abuse contact I could find in whois was domain registrar Godaddy. Last time I dealt with Godaddy they were pretty gung-ho against spam and I really don't want to face sendgrids lawyers because I work for a...
I work in a Software Company. Currently, we don't have any security software to secure our data in an employee laptop. Now we want to make a policy where any data stored or created on the company laptop and server must not get outside of the internal network. This includes securing these scenarios: Any data from the c...
How much is "remote wipe" beneficial for company data protection on company laptops, assuming that the storage is encrypted? I understand it so that only determined, targeting attackers are interested in confidential company data. For sure they will not just turn the stolen laptop on and connect to the Internet. If so,...
I am trying to understand more about HTTP Request Smuggling and I have been reading this article (https://portswigger.net/web-security/request-smuggling). Content-Length represents the length of the entity-body in bytes (https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Length) but where does the counti...
We are building a public-facing API. The consumers of this API will be business partners of ours - we will probably have a personal relationship with each one, and I suspect there will only ever be 10-40 of these customers. So we're not dealing with the same problems that e.g. Spotify/Facebook might with their public A...
I recently set up my WordPress blog and I changed the password of its mysql database to a 24 character randomly generated password. I have a few questions about the database: Is my database name visible? Does a hacker need both the database name and the password to crack it? How long would it take to brute force it? ...
I'm currently trying to do ARP-Spoofing / ARP-Poisoning with Kali Linux in Virtualbox in order to check the security of the Network of my company. I'm currently doing a little pentest, therefore I am allowed to do this. I'm trying to gain a man-in-the-middle position between a Laptop and my router. Therefore, let's sa...
When we are dealing with form pages, the recommendation is to use tokens to prevent csrf attacks. I see many csrf tokens set as a hidden HTML field or in the user cookies/headers. I thought that csrf could prevent automate attacks, but actually, these tokens do not stop a hacker from parser the HTML/Cookies, extract th...
If I ask AWS Key Management Service for a 64-byte key, is it OK to split it in half and use each half as a separate key? e.g. the first half for encryption and the second for HMAC? I figure that it would be ok because assuming that AWS's keys are high quality, the distribution of information in a key ought to be unifor...
I am currently trying to implement my own Authorization Server following the OAuth2 protocol PKCE flow, coupled with my own Identity Provider. The idea is to be able to reuse the same identity provider across multiple SPA. To get a clearer picture I decided to draw a UML sequence diagram. This diagram details the diffe...
I'm working through an OWASP Zap report that has flagged several URLs on the domain as being vulnerable to XSS, but the vulnerability is never output in a context that is executable by the browser. For instance, the report is showing path/contacts.php?search=John%3Balert%281%29 decoded: path/contacts.php?search=John;...