instruction stringlengths 24 29.9k |
|---|
I'm a cybersecurity student and I'm eager to understand the basic processes of an SSH session. I wrote down the stages to the best of my ability but need help understanding what happens right after the TCP handshake and right before the Diffie-Hellman key exchange. Please help:
Session Start/TCP Handshake
1.Client begi... |
I generated a pkcs12 keystore in Java and wanted to inspect it with OpenSSL, but OpenSSL threw back an error. After a bit of head scratching I realized that the KeyStore format in Java allows you to have different passwords on the store itself and the pkcs8 encrypted key inside, while OpenSSL seems to assume that both ... |
The rules also Include
1. No jQuery
2. Only through making an API AJAX request.
3.character limitation of 100 characters.
Can any suggest me how I can build a payload sticking with these rules.
|
GDPR aims to set standards (and requirements) on how sensitive data should be stored. Although, I couldn't find any information on how (or if even) GDPR applies for sensitive data in a volatile state.
As an example, what if we are in the process of collecting data about users (with their consent) to store it. Although... |
I'm learning about format string exploits, and am attempting to use one on an example program to overwrite the .fini_array section in virtual memory with a stack address containing shellcode (and hence redirect execution to the shellcode once main exits). Unfortunately, trying to write to this address raises a segmenta... |
I couldn't fully grasp why the last single quote of the sql query: ' or "1"="1" ' is necessary. So I understand the part until the last single quote '. The first single quote enables to inject the sql and the or "1"="1" part enables the query to always return true. However, I don't understand why the last single quote ... |
I'm facing a "Alert: handshake failure (40)" error when trying to establish a TLS connection. The error only happens when I run the same application on cloud, it works when I run the application on HPG8 server. OS is the same Redhat 7. By checking into the traces, I found that the cipher suite in "client hello" is much... |
Sometimes I have to photograph sensitive documents such as bank checks or tax forms etc. Is it completely safe to do with a smartphone, or can there be security threats?
Notably, the legit apps in our phones seem to have a lot of AI activities, changes, and the phones consume approx 100MB to 500MB data per day even wh... |
My Windows 10 Surface Laptop 1 i7 has been affected by a ransomware that says it has encrypted my hard drive. Here is what the README says:
---=== Welcome. Again. ===---
[+] Whats Happen? [+]
Your files are encrypted, and currently unavailable. You can check it: all files on you computer has expansion lktja99122.... |
Below are some conclusions I came up reading ebooks, blogs and tutorials about pentesting. I would like you to correct those conclusions if they are (all or partly) wrong.
A vulnerability is any chunk of code of an application/service/OS which gives us the ability to INPUT something other than the input it is meant to... |
I have a situation where I see a bunch of SMB connections initiated from a client to a server every night and it triggers an SMB brute-force alert on my Firewall.
I installed Sysmon on the server to monitor what initiates the connection, but the PID is 4 which is the System process in Windows.
I'm looking for a way to ... |
On a theoretical point of view, I get that it's bad to have my password exposed via a password dump because that means somebody could log into my accounts. In practice, how do hackers use those dumps, and how do they profit from it? I know they can use automated software to try those credentials on a myriad of services... |
Suppose that 2 people have a keyed hash algorithm (that is, a MAC) with a key that they both know. How could they implement challenge-response using their keyed hash algorithm? This confuses me...
|
My goal is to create a docx file that, when uploaded to a server and parsed there, causes the parser to fetch my url so I know it worked.
Unfortunately, I only have Libre Office and not MS Office at my hands. When I open the file with Libre Office, I get an error:
SAXException: [word/document.xml line 2]: Entity 'xxe'... |
If an adversary took over a major Certificate Authority, what bad things could they do? Aside from the obvious attacks, what could they do in the context of the Public Key Infrastructure as a whole?
|
I do not grasp the concept of the first steps in the OAuth process: Authorisation Request and Authorisation Grant. As far as I know:
User wants to access client by authorizing Service API
User clicks e.g "Log in with Github" and gets redirected to Service API's website
User authorizes client by clicking e.g "Authorize... |
I'm generating p12 for ECC key types using the Forge library. https://github.com/digitalbazaar/forge/issues/777
This library already provides p12 for RSA key types; now, I'm trying to enhance to ECC key types.
I'm generating a private key in PEM format, certificates into an ASN.1 format private key. Here I've written ... |
If I have a web-page being sent over the Internet without encryption, anybody in the middle can change it. So if I put a public key of a server inside, the attacker can replace it with his own and decrypt the message sent by the client to the "server" (really an attacker).
How can I be sure that the communication is se... |
I've implemented Auth Code flow with PKCE on my server, but I'm still not entirely clear on why I'm doing it. I've read through the IETF documentation and I get flashes of what seems like understanding but it always seems to fade.
The nearest I can tell at the moment is that an attacker could have access to server info... |
I'm trying to obtain the reputation score of a domain name from whoisxml. There are some resources listed in their website such as the website content and it relation to other domains, and host configuration or Reverse IP lookup that the score is calculated based on them. I'm wondering if there is more information abou... |
I use a password scheme where I keep a small number of easy to remember personal passwords. Instead of using the passwords directly for each service, I run them through a hashing algorithm first, as a sort of a seed, together with the name of the actual service. I then use the resulting hash as my actual password for t... |
I recently had a security breach on my PC, I ran a software called thaiphoon burner and DRAM calculator despite my windows warning. Long story short while I do not know if they are directly responsible, all my anti virus programs, including avira, windows defender were all uninstalled without a trace right after I ran ... |
I read on ssh.com that there are new ECDSA ssh keys that one should be using to create the public / private key pair; and that's it's a US Government Standard based on elliptical curves (probably something mathy). I also noticed that they use fewer bits, so I'm unsure how it is supposed to be more secure. Have you he... |
I recently ran some programs on my computer that caused some kind of security breach, I reinstalled windows (after formatting) to fix it.
3 days later I got an email with my old windows password blackmailing me, the message seem...automated, didn't even have my name, so I'm sure it was a phishing attempt, I opened it o... |
When I was searching for a password manager to use I stumbled upon the concept of Master Password which instead of encrypting and saving your passwords, generates them by using your master password and the name of the service/website you use it for. This way your passwords don't have to be stored anywhere since they ar... |
If I want to store electronic contracts for clients over a long period of time. I need to make sure that those files are not readable by anyone other than the client until the client retrieves them at a later time. But, I do need to be able to verify that a contract was actually sent to me from the client as soon as th... |
I 'm finding a lot of information and i can't search the command. I need to execute a command, that create a key pair according to the PCR values, so in case of these pcr have not changed, always generate the same key pair, but if one of then change, the key will be diferent.
Please, anyone can help me?
|
I am configuring a private cloud at home using nextcloud on a linux machine. It is running an apache webserver over an https connection (let's encrypt self-signed certificate) and a VPN server (wireguard).
The goal is to access, on the move, to information stored on nextcloud's webdav server (it can be personal photos,... |
My company runs a chat room service where the users can securely send messages to one another. All users are authenticated by the service in advance, and will install software from the service onto their computer. The problem is, none of them want to go to the trouble of using public/private key pairs in order to distr... |
Is it possible for someone to exploit a Raspberry PI running Raspian through bluetooth just by having the bluetooth enabled?
|
To sum up the methodology of ethical hacking, what you do is :
Information gathering (gets the IP, domains, etc...)
Fingerprint the IP (what OS, what services are running, etc...)
Vulnerability assessment (are any services or vulnerable application found to be vulnerable ?)
Exploitation : verify the result of the step... |
For example:
I'm browsing my favorite website with my favorite VPN enabled.
I disable my VPN while I'm still on a page of the website. I haven't clicked any links yet, I haven't went back to the previous page, I'm just on the page, touching nothing. At this point, are the web server and ISP now aware of this change? Or... |
Even though I'm working within .Net Core, this question is generally applicable to other platforms as well.
My question is to do with: Using a framework (such as IdentityServer) to manage implementation for Auth (Authentication/Authorisation) -- Vs -- rolling out your own implementation by following protocols. In this ... |
Is it possible to create a new root CA (just for myself) and use it to sign a set of existing intermediate CAs which I'd like to trust? If so, which tool can be used to accomplish this? The private keys of the intermediates are not in my possession.
|
I have an web application which uses login user password and captcha for login. Is there a way to perform vulnerability assessment using AppScan or Burpsuite tools to capture the CAPTCHA automatically and crawl and audit the application
|
I use Nginx for client-side authentication.
Only the SSL-certificates from the User CA should have access to the application.
The CA hierarchy:
Root CA
|
Intermediate CA
|
User CA
So ssl_verify_depth (maximum verification depth) =3
Each CA has a CRL.
For Nginx I need one CRL document.
Do I need to combine... |
I understand that you place public facing servers in a DMZ and so if they are compromised, it doesn't compromise the inner network. In order to do so, the outer firewall forwards ports (80 and 443 in my case) to web servers. From this, I understand that opening ports = allowing untrusted traffic to come in.
However, in... |
The ANPR camera system's internal management dashboard could be
accessed by simply entering its IP address into a web browser. No
login details or authentication of any sort was needed to view and
search the live system
Number-Plate Cam Site Had No Password, Spills 8.6 Million Logs of UK Road Journeys
I keep se... |
I am creating a c++ secure client-server application using openssl library. I am still not clear about some aspects of the SSLHandshake procedure
I have enabled Mutual TLS in-order verify the both the peers are trusted. I have 2 set of certificates and private keys. Both the sets have the same root certificate but diff... |
I have been given a project to perform penetration testing on a Vaadin Web Application. This kind of web application is new for me, so I'm just wondering what should I prepare to perform penetration testing on this application or what should I do after gathering information about the application?
I have tried to interc... |
DNS poisoning works only if we open a certain website.
For example, a victim enters 192.168.21.56 in a browser, it will be directed to a phishing page.
What if we want to redirect the victim to 192.168.21.56 for anything he enters in the browser? www.example.com
He should be redirected to 192.168.21.56
Is there a poss... |
I am learning web security I have to audit a searchbar on a test website which looks like site.truc.fr:5006/ for a contest. It seems the query function is hardcoded in the webpage
function makeSearch(searchInput) {
if(searchInput.length == 0) {
alert("You must provide at least one character!");
... |
If i know the value of bearer token of the victim, can i generate a get csrf page and set a custom Autorization: Bearer [token] header?
|
On my router(Virgin Media) I found a device labelled as "unknown" I often see the router not assigning the device name but I do have a clue about which device is.
However this specific device got me curious because in the port forwarding section, a UDP port has been assigned to the IP address of this unknown device
My ... |
I client of mine is using a custom credit card form, which talks to Stripe, Braintree, etc
To make this acceptable for a PCI audit, currently they do the following:
They host the files in a separate repo + deploy train
They expose the form via an iframe, which is talked too via window.postMessage
Now the problem... |
Would the local network administrator in my dorm be able to figure out that I'm using a WLAN router to access their wired internet connection? Assuming I'm not broadcasting the SSID.
|
How could someone go undetected on a WiFi? (No trace with NMap scan, not in network admin page)
Is this even possible?
If so, how can you prevent it?
If being undetected while on WiFi network isn’t possible, what are some key things to do to hide your devices identity while on a network? (MAC spoofing?)
|
We're locally testing anasp.net application that will let a user upload documents. The app is similar to a jobs site like monster.com, but with sensitive data.
The app works great locally, and now we have to move it to a shared host or VPS.
Once we move the app to the hosting company, my biggest concern is that there ... |
I want to share encrypted files with someone else however it's only for a short time only. What is the best way to do this?
More background: I'd like to add more people to be able to decrypt the file as time goes on and others "expire". Think of this as when members of a team join and leave and that this constant... |
I am considering putting a Facebook share button (shown below) on my website to encourage people to share content to their FB page.
However, I do not want cross site trackers "bloating" my website or tracking users. This is the code I would need to put in the HTML to add the share button to my website.
<iframe src="ht... |
Say I have the following script
var a = document.getElementById('in').value;
escape(a);
Is it possible to bypass the escape function to do some XSS? I have tried );alert(1); to no avail. I have tried ");alert(1); but that doesn't work either. I'm guessing its because document.getElementById returns a string. Anyway to... |
Our mobile devices(iPhones, iPads) don't have iCloud Keychain which seems to have AES 256 bit encryption for storing credentials. The mobile browsers in those devices like Safari, Firefox, Chrome ask users if they want to save their Office 365 email password which is used to login to their desktop devices. I know if th... |
I wanted to exploit my IIS CVE-2020-0688, which I saw that the key is the same as advertised.
The problem is that my IIS is old, and uses AppPool of .NET 2 and not .NET 4. Also I can use only GET as I don't see a POST request using the viewstate. All the exploits in ysoserial use Microsoft.PowerShell.Editor.dll which i... |
I downloaded Google's Cloud SDK installer today, and upon checking the certificate to validate it, I noticed something strange: the expiration date of the certificate appears to be December 22nd 2019 - over four months from today, April 30th 2020. Despite this, however, Windows displays the certificate as valid and doe... |
We have a mobile app (React and Expo) in which the user is able to provide payment via Stripe. Our implementation uses a WebView which renders HTML and JavaScript content, which in turn pulls in the Stripe JavaScript client and implements the payment process.
We've recently made some modifications to the app architectu... |
I see in this answer (Aren't endpoint devices inherently MFA?) that an endpoint device doesn't qualify as an authentication factor (AF). But if the endpoint biometric collecting device is uniquely registered with an entity, e.g. with an id number, then does it count as an AF?
(related to this paper)
The paper uses two ... |
The XP computer is not directly connected to the internet. However, it is on the LAN where it holds analogue faxes for manual processing by staff. The other computers on the LAN are all Windows 10 computers. The entire LAN is behind a 3rd party firewall.
|
I am investigating some strange issues with my home network, and decided to have a look at my device history.
I only have one Macbook Air, but my device history is showing ten, all with different MAC addresses (as well as a variation in the name). The first one in the list is the correct one:
I see it's possible to ra... |
I have been tasked to create a custom repository with signed binaries for download. Our CEO explicitly mentioned that he wants the binary signed by himself and his business parther.
I set up a webserver, and created a secure apt environment with dpkg-sig. So basically for someone to download and install the package, th... |
i was trying to get access in wifi network but i came to something that i need to ask afteraireplay-ng –0 20 –a [router bssid] –c [client bssid] wlan0mon i expect
WPA handshake
in right top corner in the terminal, but it appears
PMKID found
can i crack this as same as WPA handshake with aircrack-ng -a2 -b [router... |
Let's assume there is a service provider that hosts some services behind a firewall. Two different companies connect to the network of the service provider via VPN. (To use the services that aren't accessible via internet) Each company has its own VPN tunnel. Can Company A read/redirect/mitm the traffic of company B?
I... |
Can I trust the (official?) GnuCash Flatpak on Flathub, linked from here to here?
Following up on this Q&A I'm asking myself if I can trust this, bearing in mind this.
Other options would be to use a PPA, compile from source myself or wait for a long time until Ubuntu includes a more recent version of GnuCash in its r... |
People keep saying never put a random USB in your device because it could ruin it with a virus. Hackers are able to program USBs to automatically run a virus when it is put in a device. So I decided to search how to program a USB to auto run a file. It said to use autorun.inf so I tested out autorun.inf and found out t... |
I have a flash drive and I want to recover some files from it. Can I take a dd image of the device and perform the recovery operation on dd image instead? Does it have the same results when performing recovery using software on physical flash drive?
|
I noticed in our APT solution that many endpoints in my company initiate connection attempts:
Process initiate: system process PID 4
Remote risky IP 185.94.111.1
remote port: random remote ports
local port: 137
This is really strange and seems these endpoints infected, right?
|
I have been working on a project and I wonder if it's possible to exploit curl_exec function while in PHP.
Scenario:
I have the PHP script that checks a domain for me, but the curl is not secured, can it be exploited via the request, ex: script.php?action=websiteup&token=apikey&target=EVIL-CODE-HERE
I have googled arou... |
I've been reading about access tokens and refresh tokens, and am implementing it in my own site. Right now, based on an example codebase on GitHub, a refresh token of random characters is created and stored in the database with some details such as the user id and expiry time, and returned alongside the JWT access toke... |
I have a compliance question around crypto shredding and CCPA. I'm basically just wondering if crypto shredding is sufficient to comply with the CCPA customer deletion requests.
I know that crypto shredding has it's own downsides (quantum computers??), but if data is only stored for a period of time (on the order of ye... |
We are building several systems for businesses, like employees schedule management and sharing, customer management and recently we are building HR System.
We have put Schedule management and customer/contacts management application under SSO. Is it safe and meaningful to put HR System also under the same SSO system?
|
After powering on laptops and desktop computers, you are allowed to use biometrics for login. But, as far as I know, biometrics are not allowed for unlocking phones after powering them on. You are only allowed to use biometrics after you've first unlocked the phone with a PIN/password.
Is there any special reason why ... |
Has anyone else noticed that if you are using a Microsoft account for Windows, after changing your password, the old password can still be used indefinitely on previously authenticated devices? I have one I changed a year ago and it still works to login. The change was done from Windows Settings.
I'm sure there is cach... |
In the application I make use of the client credential flow to make requests. I am unsure about how to save the client_id and client_secret. Right now I have them in a seperate file but I am not sure what encoding should be done. This is the code:
response = requests.post(access_url,
data=f"gra... |
We are using Symantec PGP encryption for AIX to encrypt/decrypt files. Keys are generated with passphrase and the passphrase are set by the business users. The IT admin is responsible to perform the encryption/decryption of files on monthly basis.
When decrypting files the passphrase has to be entered however as the I... |
I'm looking for a Passive DNS Replication database.
It exists in virustotal and securitytrails.
Is there a more comprehensive database of dns data by IP address?
|
Unbound has the option to use DNS over TLS as an upstream (through the forward-tls-upstream setting).
CludFlare's 1.1.1.1 service offers this; also through TOR.
My question is whether
Unbound will open a new TLS connection for each request (in which case my queries will be lost in the endless soup of all the others us... |
In the bind9 config (Centos8) there is a note saying
If you are building an AUTHORITATIVE DNS server, do NOT enable
recursion.
I would like to know why and if this is still a concern if the DNS server is entirely within a private network (only used as the dns server for the local network). This is assuming a reaso... |
To meet one of my application's needs, I must store an encrypted object in the database. Sometimes, I need to verify whether the user holds the right decryption key without the need to retrieve (decrypt) the stored object, I just need to make sure the user is its original owner.
I've come up with the solution of storin... |
I don't know if my concept would be secure so I ask here. The main purpose is to log in with password x and also use that password to encrypt an RSA private key with AES to store that in the main database, so when I log in with another account that private key can be reused and I can encrypt all incoming messages with ... |
I have been tasked to pen test a computer on my network. I have done some social engineering to get the username and password of the device, and I know ssh is open on the computer. However, I do not know the device's ip address. Given a file of all the IP addresses on my network, how can I have Hydra attempt to log in ... |
I am designing a 3PRM (Third-Party Risk Management) process in a FS company, and I'm curious about how other companies validate their supplier questionnaires.
The system I'm anticipating is (after I've issued supplier questionnaires, and received the responses) dividing up the responses for degrees of validation.
I'm c... |
I have been getting paranoid lately and decided to ask for your insight on this issue. A year ago, I took photos of some personal information (cc, passport, etc), and deleted them a month later, along with some videos that reveal my face and sound. A couple of months ago, my iPhone (iOS 12.2) was stolen and ever since,... |
Dilemma
We are setting up a docker registry server for our company as per these official indications: https://docs.docker.com/registry/deploying/#run-an-externally-accessible-registry.
We are evaluation what option to implement:
More secure, less practical: Put the server in a private net behind a firewall, accessible... |
I have to verify a signature using DSA FIPS 186-2 (I know it is not used anymore, but I need to make it work for a legacy system). My problem is I have the "y" DSA value, but I cannot work out how I can feed that into the Python code to create my own public key from the "y" value and then apply the verify.
For example ... |
Specifically, how did the new Microsoft Edge (based on Chromium?) import my passwords from Google Chrome (which are synced to my Google account and supposedly secure)?
I'm on Windows 10. Does Windows have a standard password exchange medium? What is stopping a malicious program getting my passwords from Google Chrome, ... |
There is a standard XSS exploitation technique where one can use javascript keyword in <a href=""> to execute javascript code. Example:
<a href="javascript:alert(42);">please clickme</a>
Let's us consider PHP code which uses htmlspecialchars with combination of a prefix check, where the URL must always start with http... |
TL;DR
I want to have "some thing" to handle client-certs on behalf a server that is unable to do it, for secure user authentication in addition to regular TLS encryption.
Context
In this question How can I double check security against a TLS on a public IP? the answers set clear that regular TLS does not typically do c... |
Say for example a person gets an email with a link. That link turns out to be a download link for a virus and once the user clicks on it the virus is installed on his computer. Sure the virus is on his computer but what makes it run. If the user doesn't open the virus file there is nothing to run it? So how do hackers ... |
I have noticed that my employer's website, which handles sensitive information, redirects some pages from HTTPS to HTTP on another domain. This feels like a poor practice. Are there any security threats associated with such redirects? Could you please point me to documentation that talks about it? Or is it just a priva... |
I have a number of devices which need to connect to a server via TLS. In order to make sure that only known devices connect to the server mutual authentication should be used. Similar the client devices should only trust a specific server certificate.
The firmware for each device therefore contains the client certifica... |
I'm connecting to a server via TLS.
My device has installed server cert, device cert, private key and public key.
I read here validity SSL/TLS that TLS cert will last max 2 years.
This means that every 2 years I will have to updat all the certs stored into my device?
Only server cert and device cert?
Do I have to upda... |
Yes I've read forums that says Forward Slash (/) is invalid character in a file name since it being File Separator in Windows and *nix based machines. But Without creating such an exploit file, I think attacks like ZipSlip won't be possible, Isn't it?
Most Zip Slip attacks involve creating an File with a slash characte... |
I would like to combine my router's default VPN with another one I run on my laptop.
Here is what I currently have :
Here is what I would like to have :
Both router (DD-WRT) and laptop use OpenVPN to connect to their servers, and both connections are working. However, when I use both VPN, I get a "smaller" tracer... |
How many chains are the best?
chain_len = ?
I read somewhere at tor browser, that more than 4 is not good so I guess it applies the same to proxychains?
the default setting is chain_len = 2.
|
I have my main computer and Windows installation that I use to work with (to me) important data. I keep this environment reasonably secure, however, I need a place with loosened restrictions. I thought of 2 possible ways to do this using a single machine
simply create and use a VM
use a secondary drive and install Win... |
Similarly if you have access to a PC you can steal session cookies which allows you to login without password and without the login showing in login logs.
If one has access to an android device is it possible to do something similar, I know apps dont work the same as web apllications but still is there a method similar... |
I am getting into the area of hobby exploitation on crack-me systems. So far, I have been playing through overthewire’s Bandit crack-me. One thing that interests me, overthewire has a war zone, which they advertise as a network where you can hack anything. Their warning: use a VM. I have an Ubuntu VM that I can back up... |
I'm in a discussion with Information Security team about a legacy Desktop Application accessing a SQL Server database directly using LINQtoSQL.
The Information Security team insists that there are many security vulnerabilities in a Desktop application and a SQL Server with open port to network communication.
As a +10 e... |
When I launch a program that wants network communication for the first time, I get this dialog:
It's been a part of Windows for a while now (this is running on Windows 10, but note the Vista/7 design language), and has always to my knowledge had the Public Networks choice checked by default. But based on the text, I d... |
I'm developing some sort of VoIP application for mobile devices for fun.
I initially planned to rely on P2P connections only.
I didn't want to use a relay server because I thought (1.) there would be a higher latency and (2.) this would reduce privacy/be another potential risk if not maintained properly.
However, jus... |
Context
I'm working on an application where one of the features requires scraping metadata from resources available over HTTP/HTTPS. These resources are submitted by end-users in the form of a URL, and we then invoke an HTTP request to the resource and parse the response body to pull relevant metadata (title, meta tags... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.