instruction
stringlengths
24
29.9k
I am working on a hobby project which will involve a web server (hosted and owned by me) and a native app (which will communicate with the web server periodically) an end-user can install via a deb/rpm package. This native app has no traditional UI (besides via command line) and can be installed on browser-less environ...
This is a more direct "yes" or "no" question to the following PKCE vs Client Secret What is the purpose of the OAuth2 client secret? Does PKCE replace state in the Authorization Code OAuth flow? What is PKCE actually protecting? I am assuming the answer is "yes" based on the above so only the client_id is needed and th...
During my testing I have found a vulnerable parameter in an API (/api/v1/documents/?direction=desc&limit=30&mode=reports**&page=1**) and its parameter is page=1 at the end. Upon giving the parameter a NULL value, &page=, it returns the following error. You have an error in your SQL syntax; check the manual that corres...
Is there a way to find out how an RSA private key is encrypted? The password for the private file is known, but there is no more information about the cipher in the private key file, only the information -----BEGIN ENCRYPTED PRIVATE KEY----- with encrypted data after that. The background is, when I generate encrypted p...
Adding that the vpn has an hard kill switch enabled that doesn't allow connections other than through it.
I always using Proxifire in my windows 7 os machine. This app can show all network traffic through the proxy. Here is image of my proxifire : Google chrome is close. So what are those random names connections for google chrome? Is this a virus? How can i remove them? I have malwarebytes + eset internet security l...
Say I wanted to start live streaming on YouTube or Twitch, but I don't want those services to know my real IP or where I'm located. Commercial VPNs might not be a good option here since they reduce the overall stability of internet traffic, which would translate into stream dropouts (at least, in theory). I'm exploring...
I'm using an existing exploit which calls for a cookie called wp_sap to be set with the following value: ["1650149780')) OR 1=2 UNION ALL SELECT 1,2,3,4,5,6,7,8,9,@@version,11#"] This works great manually. Now, I'd like to be able to use this within SQLMap to enumerate the database automatically but have been struggli...
I have seen many hackers bruteforce password for gaining access to social media. In famous Mr Robot series it is shown that Elliot(main character) brute forces people and the password is displayed on screen. But for brute forcing we need the encrypted password. So how does a hacker get this encrypted password? (Mainly...
What tools or techniques can companies use to prevent penetration testers from behaving maliciously and exfiltrating data or compromising the system? I cannot imagine that the only protections companies use are contractual ones.
I am doing research in identifying backdoors in Windows .exe files. Currently I found some methods to detect them: String search in .exe Find reference .dll and win32 API calls using import table What are other static analysis methods to detect backdoors?
We've recently overhauled the backend to our mobile app from having a very basic authentication mechanism that went through the API to having both an authentication server and an API server, with the auth server issuing OAuth2 JWT tokens (authorization code flow) for login and the API authenticating clients based on th...
Let's say I perform some request through OWASP ZAP local proxy, and it fails SSL handshake for some reason. Is there any way to see what SSL certificates zaproxy offered during the handshake, at which url etc?
How can I spoof my caller ID to make it look like someone else is calling for pen testing purposes. Note: I tagged Python because I am trying to make it with Python.
A friend of mine works for a company which owns a 15-ish years old website written in PHP using Apache/MySQL/home brew CMS and outdated hosting on OS Debian 8 "jessie". SSH allows passwords (with no fail2ban or similar) plus both their "admin" page and phpMyAdmin are exposed, accessible and they do not use rate-limiter...
I'm new to backend and currently don't know best practices of storing sensitive data in safe. I configured node.js server with JWT. I signed JWT with RSA key. Each time server receive request it verifies integrity of JWT. For now I have 2 files private.key and public.key. The first file is used for signing JWT and the ...
I recently set up a new VPN on a Hetzner VPS (using Wireguard). It works fine, but I notice that when I do a traceroute from home to the server, I see several Chinese intermediaries. I'm not too thrilled with any of my traffic touching Chinese servers, but I'm wondering, assuming my VPN server has a basic but functiona...
I'm using Splunk to try to detect multiple Windows login sessions by a single user, as an indicator of compromise. However, I'm not sure how to go about this - I can ingest workstation logs (events 4624/4634) and look for a large discrepancy between logins and logouts (indicating a high number of sessions) in the works...
I was surprised to read in the responses to this popular question that it's considered nigh impossible to secure a computer system if intruders have physical access. Does this apply to smartphones as well? Let's suppose I have done the most I can to secure my phone on a software level (e.g. encrypted storage, restrict...
Which are still relevant sources for Dom-based Cross-Site Scripting (XSS) in 2020? Had a list of those: document.URL, document.documentURI, document.location, location, location.href, location.search, location.hash, document.referer, window.name But just found out that: window.location.href is now properly encoded on...
In a scenario where there are client RSA certificates (e.g. on a smart card), is it possible to record a form submission (or an AJAX request) in a form which makes it possible to later ascertain that the client actually did send that information (e.g. containing a client's signature of temporary keys used to encrypt th...
For security reasons in public spaces administrators choose to disable the USB interfaces. Is there a possibility for having something like port knocking on disabled/sleeping USB interfaces? Port knocking in this case would be a detection of a specific kind of device (basically from lsusb information) and ideally some...
My company sells products through calls. During the calls a customers PII is collected and used to create the product. This PII includes email. After the product is created, we email the customer a summary of the product and all the details they provided us. However, because the email is not verified, there is the pote...
I found an implementation of port knocking described in an article: https://www.digitalocean.com/community/tutorials/how-to-configure-port-knocking-using-only-iptables-on-an-ubuntu-vps I checked what iptables DROP actually means and now I am very confused: https://serverfault.com/questions/157375/reject-vs-drop-when-us...
I have a legacy Windows application that needs to be looked over in terms of security. During this review something caught me eye. In the out of process COM server I'm looking at is a method that accepts an arbitrary class pointer. The method manually queries the attacker supplied interface for a specific IID and proce...
Is it possible to delete all traces and files on a mac, so no one can recover files and there will be no traces at all for this files or any activity?
One of the tests I carried out was brute-forcing. I already knew what the username and password was for a factory reset IP Netcam but wanted to see how it would work in practice and if it even worked on IoT devices. The commands I used for both tools are as follows: Medusa -h "IP address" -u "default login" -P Desktop...
I have an app which connects to an API. The API TLS certificate is about to expire and we are using Public key Pinning. How do I rotate the certs without disabling access to our users? When rotating certs; can I change the private key without changing the public key? I assume no as they are a key pair. Can someone con...
OpenVAS found a vulnerability where it points to PHP versions 5.4.3 and 5.3.13. But both the two hosts I checked with OpenVAS are running PHP 7.2.x. Would this vulnerability be a false positive? High (CVSS: 7.5) NVT: PHP-CGI-based setups vulnerability when parsing query string parameters from ph... (OID: 1.3.6.1.4.1.2...
I'm wondering how applications like Skype and Dropbox store access credentials securely on a user's computer. I imagine the flow for doing this would look something like this: Prompt the user for a username/password if its the first time Acquire an access token using the user provided credentials Encrypt the token us...
I'm getting into OWASP CRS with ModSecurity and was investigating the way OWASP calculate the anomaly score in the REQUEST-901-INITIALIZATION.conf they set the following lines: setvar:'tx.anomaly_score=0',\ setvar:'tx.anomaly_score_pl1=0',\ setvar:'tx.anomaly_score_pl2=0',\ setvar:'tx.anomaly_score_pl3=0',\ setvar:'tx....
After the second hack, we did all the necessary things written here - https://wordpress.org/support/article/hardening-wordpress/ , https://security.stackexchange.com/a/180925 and we also changed the file permission (wp-config.php to 400). We added WordFence, Limit Login and Bad Robot Black hole plugin to secure the ins...
I am looking to join the warzone hosted by overthewire.org using an Ubuntu VM hosted in VirtualBox on Windows 10. I posted here a few days ago asking whether or not others on the warzone could use my VM to compromise my host machine and/or my home network. Here is the answer by multithr3at3d: Yes, if your VM is access...
The hack redirects all my sites to another site All are running WP 5.4.1 (latest) and I even have a site that barely runs any plugins, just a simple open-source theme with 3 common plugins - Contact Form 7, etc. Thus, can I assume the attacker might be coming from A2 Hosting? I moved one of my sites to a new host (InMo...
I want to authenticate a user on a 3rd party website (this is more or less an OAuth flow, so this website will be able to perform actions on behalf of my user afterwards, e.g. receive some of her data). My user is already authenticated in my mobile app. Now usually multiple websites implement OTP in a manner where I en...
Say I had a centralized OAuth 2 authentication server, a Single Page Application (SPA) in an electron app, and a third-party server. The user launches this SPA, goes through the PKCE flow to obtain an access & refresh token, and is now authenticated. The SPA is now allowed to access & modify information in the authenti...
In web apps there are vulnerabilities like SQLi or XSS and many more. I heard that for hackers to hack a computer they have to find a vulnerability in a software that is running on an open port. What are the names of software vulnerabilities, just like web apps have SQLi or XSS? What is the equivalent for computer sof...
We're building a web application embedded in a desktop application (via CefSharp) so that we can use client-side C# methods based on front-end JS on the website. For example, there is a billing data portal in which users can enter in their billing data (cardholder name, cvv, exp. date, street address, etc.) - now, the ...
I saw various questions on a similar note but not quite the same as my situation: I entered my password manager's password into the browser URL bar and hit enter. Has this breached the confidentiality of that password?
Most "big" websites seem to have enormous sessions. From looking through the cookies, Stack Exchange seems to have a one-week rolling session, GitHub has 45 days, and Gmail seems to have a never-ending session. What are the security implications for having sessions longer than an a few hours? Apparently, the recommende...
I recently watched a 1980s computer television programme about the problems of spying. Basically, they showed how anyone could buy relatively cheap and common hardware and then be able to sit outside a house, or drive around in a car, and receive the signals going from the computers to the monitors, or even generated b...
On Cobalt Strike how do I point a domain (in this case a subdomain) to the IP address to create a listener?
Burp reported potential DOM XSS. Data is read from location and passed to the 'init()' function of JQuery via: var table = location['table'] || location['sysparm_table']; snPresence.init(table, sys_id, query); URL looks as such, https://publicsite.com/scripts/Scoreboard/js_includes_cmdb_scoreboard.jsx Is this vulner...
I am a beginner to TLS/Ops. Our operations team have setup a number of virtual hosts with domains we own for hosting endpoints on our Cloud. We have 3 virtual hosts- internal - to be used internally for integration purposes with the other departments in our organisation like Siebel CRM... partner - for organisations...
I asked a question on superuser about plink rejecting server keys. Someone previously asked about logs. Does the output I get from plink -sshlog contain any secret information I should not be sharing? When I look at the file it looks like a packet dump of the authentication process. I would assume no secrets are sent b...
When using OpenSSH server (sshd) we specify allowed ciphers, host key algorithms and MACs. Some of those ciphers have an email address appended, for example aes256-gcm@openssh.com as opposed to aes256-ctr. What is the meaning of that? I checked sshd_config and couldn't find an explanation.
I've recently read about Diffie-Hellman Man-in-the-Middle attack when a third party can intercept messages and thus construt two different symetric keys with both sides. However I still don't understand how the intercepting how the messages works. Does the third party can "catch" messages and throw them away? perhaps t...
following problem: A file is marked as being deleted without a tracked time-deletion date. However, timestamps such as File Accessed, Entry Modified etc. point e. g. to the 30.12.2019. Is it safe to assume that the deletion must have happened at or later than the 30.12.2019 as the file was accessed/created/modified/ch...
What is the easiest setup to hide your public IP from installed applications and prevent things like WebRTC leaks on a common Linux distro?
Considering I am vulnerable to Cross-site WebSocket hijacking, so my WebSocket handshake (GET to example.com/wss) does not require a random (CSRF) token. I have defined no CORS settings, so no custom headers can be added to cross-site requests. Would it theoretically be enough to add a static custom request header, tha...
I am testing Wordpress website that is in 5.3.3 version, which is current and updated just few days ago (April 29, 2020). But there is also 5.4 branch, is it recommended to upgrade to 5.4 because it seems to be supported longer? List of Wordpress versions: https://codex.wordpress.org/WordPress_Versions
Given an RSA signature as produced by openssl dgst -sha256 -sign rsapriv.pem -out afile.sig afile and without access to the private key used for that, one can¹ come up with a fully functional RSA public/private key pair such that signature afile.sig verifies against that new public key and any desired file. This does ...
I recently created a new gpg key just for the sake of learning the basics of public key encryption. Now, I'd like to revoke that test key so that I can go on using a more "permanent" key that is associated with my personal email account. Using the GPG Keychain application on Mac OS 10.15.*, I was able to revoke the k...
It has become common trend to use shell scripts from the web and directly run them: bash <(curl -sL some.random.website.com) I always view the script before running them. However, shell scripts are always more cryptic than reading a regular program. And yet, they are extremely powerful. They can do so much without the ...
Outline I am writing a web app that will need to store some transaction data (amount, date, merchant...). Objective I want to keep this data reasonably private from unwelcome eyes. Threat Model I don't anticipate anything huge. The audience is pretty small (~200 for now), and the data is not bank account/credit card i...
I recently came across some log messages that indicated that someone was trying to compromise a website I manage. They tried several times to access various url paths that end in /Telerik.Web.UI.DialogHandler.aspx This page suggests that accessing that page may be used to compromise a site. I don't use any telerik ser...
We have an issue on our Mailenable with the MTA enabled on MXSCAN software, everything were working fine, but today we have realized that we are only able of sending emails but not receiving.we have checked the logs on MxScan message logs,We have found that a stranger with an external IP and PostOffice (null) and Sende...
I have a question about what key usage should I choose when creating a private CA (root or subordinate). I have inspected some root and issuing web certificate authorities and they tend to use digitalSignature, cRLSign and keyCertSign. But isn't it logical to only use cRLSign and keyCertSign since the job of a CA is t...
As you may know, Virtual Private Network or VPN is a system to create an encrypted tunnel between two computers on the internet, on one end is the VPN client, and on the other end is the VPN server. Everything the client does on the internet can be monitored by the VPN server, which will otherwise be monitored by the I...
I am in the process of looking for a specific keyword on a particularly large website with lots of pages. I'm thinking I'd have better luck if I have a way to see the links within the website. If I want to see all links under a website, for example: company.com/1, company.com/2, company.com/3, etc. will DirBuster be a...
Setup I have several services (Postfix, Apache (PHP)) that access a PostgreSQL database on a Debian Linux 10 system. everyone is on the same host they use the loopback interface (127.0.0.1) to communicate the accessing services store the db user and db password in plain in configuration files owned by root:(service)...
We send to our staff notification emails with links to "private" pages on our website. These pages are password protected, we log the access and get notifications when accessed from new ip ranges. To read these emails, our staff use G Suite. We have noticed that every time someone clic on a link, a Google bot is reques...
How is it possible to detect malicious files or web shell on a vps web server? I used to use a shared hosting, and when I tried to upload any malicious code for testing it got deleted automatically. Now I'm on my own vps and I want to increase its security. Is there any tool that can help me do this?
i want to store session information in android application temporarily (as long as application is running). i am sending real-time data to node.js server from android client using Custom Protocol (over UDP). Along with this data i will send cookie (or session string unique to each user) to server for further processing...
If I understand correctly, they can see all the requests that are coming in to your server. So, all POST requests (user credentials, comments user posts, and many more) can be seen by Cloudflare (responses are protected if your site just allows https). How is having one entity not a security hazard not just for your co...
I know I can input this into a search box that queries the MongoDB. I have updated the code with my shell code, but I won't include that, I will just use the exploit as it is here: db.my_collection.find({'$where':'shellcode=unescape("METASPLOIT JS GENERATED SHELLCODE"); sizechunk=0x1000; chunk=""; for(i=0;i<sizechunk;i...
The environment is Windows. We are using 3rd party tools in our app, and for tools to work they require method call and pass a license key that is a string. License.Import(string name, string email, string organization, string code) Since it is an installable Windows app that might not have access to the internet, I do...
I was looking at a popular file sharing app called Zapya and really liked it's functionality. I scanned the Windows executable ZapyaPC28Lite.exe, on two online virus scanners: https://virusscan.jotti.org/en-US/filescanjob/8e462hjw1m https://www.virustotal.com/gui/file/6210d10145358e05ea5e2852277a393c51a8dde8308f003e101...
My hoster placed a .user.ini in my public_html. What is the recommended file permission be? Now it's 644.
I just made a new contract over the phone with my mobile phone provider and I needed to pay the activation fee. The lady told me that they could accept only credit cards and asked me for the full details (number, expiry date, and security code, the usual stuff) over the phone. However, she took the details personally (...
I have multiple IoT devices that will be connected to a cloud based platform in order to control these devices. In order to have a proper security I´m thinking about using Authentication Certificates so that each IoT device is a trusted element in my system. The problem here is that I don´t really know much about this ...
A few months ago my iPhone had a pop up saying 'incorrect wifi password' and telling me to enter the correct password, however it was for a network that I had never connected to or seen before. It happened when I was on safari on my 4G but wifi must have still been on. At the time I thought nothing of it but now am sta...
I hope this is the Right Place I have implemented a full user encrypted data storage solution. This works well and I can sleep well in the knowledge that neither I nor anyone else except the user can access the data ( AES 265 encrypted should hold for a while). All thanks to you guys. Here is an honorable backlink to t...
Recently I started creating a CTF challenge based on Drupal 8. I want to create a REST API parameter that will be vulnerable to SQLi. Even if this isn't something I should ask for here, I decided to do it in case anyone who knows Drupal is willing to help. I don't know Drupal much and I'm not sure about configuration. ...
When securing a web server/web application/website, you often have the choice between choosing something like using a password for authentication/securing a service and creating an IP whitelist or whitelisting a whole subnet. Or e.g. using/hosting the service in a subdirectory (may be faked/configured by the web server...
In the scenario where "Application A" wants to communicate with "Application B" over an API (HTTPS), I want to ensure mutual authentication is implemented. Meaning that "A" should authenticate "B" before it authenticates itself. A CA signed certificate will be held on "B" to enable HTTPS. When "A" initiates the TLS(1.2...
In 2020, there are a lot of applications which have a web interface as well as "desktop apps." Such applications are either the same in functionality or very close. Three examples of this situation are the Slack, Discord, and Keeper Security applications. As a user, I am often left with a choice: Do I use the webapp in...
We are rolling out a new mobile app. Our security team recommends us to pin the public key in order to avoid MITM. iOS already has CT checks and we can enable that for the Android app as well. The security team's arguments for pinning are: Pinning is a more hardened solution CT is more reactive, we might have to live...
I run nikto on a server, let's say www.example.com and it says the following: OSVDB-630: The web server may reveal its internal or real IP in the Location header via a request to / over HTTP/1.0. The value is "A.B.C.D". I have nginx as a reverse proxy with ip "A.B.C.D" and behind a few web servers. Is really risky re...
It is my understanding that when file is signed with gpg the signature will provide 2 guarantees, a proof of ownership of the signature and the integrity of the signed data. lets say I have a doc.txt I want to sigh, so I use: gpg --output doc.sig --detach-sig doc.txt but I see that many software destitution use a sli...
I would like to understand Cloudflare full(strict) SSL flow. Because if user type https://example.com it redirects to Cloudflare web servers. So how Cloudflare decrypt HTTPS data before sending to origin host without browser warning ? How Cloudflare match certificate data between Browser and Cloudflare servers. Becaus...
I have a friendly, fun bot on Twitch. I haven't logged into its account for ages, purely communicating with the Twitch API and their IRC service. The other day, they announced a new annouying "Oauth" requirement to access their API. As a result of this, I was forced to log in to the account. Of course, I had noted down...
I am a penetration tester, and I was doing some SSL pinning bypass using Frida. I have pushed all the required files and certificates, and burp is intercepting traffic from the Android Studio emulator. I have performed the steps to run frida. [Android Emulator 5554::com.*****.**** ( flagged for ethical security reaso...
I know the victim's public ip of his router, and also the victim runs a program that is vuln to a remote buffer overflow. How does an attacker attack this victim computer with just an exploit that needs IP and port? For example: public ip of the router: 1.1.1.1 vulnerable program is listening to port 5511 local ip of...
If it is possible? Any devices that can be bought to do so. If not, how are GPS satellites are designed to be spoof-free.
I know that even when connected to a VPN, the ISP (or anyone who controls my WIFI network) could see that I am connected to (A VPN brand), what I would like to know is would they obtain the exact IP that I'm connected to. As a side note, what could the ISP really see when I use VPN? I imagine packet size and frequency...
If I'm understanding this correctly, the Palo Alto PA-220 allows for SSL/TLS traffic decryption using its proxy feature. By generating a Certificate Signing Request and loading it into the firewall, Clients should never receive a browser warning when accessing HTTPS sites?
I'm doing a buffer overflow challenge, and I can't understand what exactly I'm doing wrong. Through debugging, I managed to figure out how my input should look like such that I can force the program to return to a function. From gdb I figured if I entered "aaaaaaaaaaaaaaaaaaaaaaaaaaaacdefbbbbbbbbbbbbbbbbbbbbbbbbbbbbbbb...
I need to encrypt my Windows Disks with full disk encryption. Windows is already installed and all drives have data. My Drives/Disks: 1 SSD - C: drive 1 HDD - D: drive and I have a drive where Linux is installed I need to encrypt C: and D: drives so no one see my files in case they access my PC or use Live Boot CD to b...
Navigating to any website with Let's Encrypt CA cert and even after enabling the HTTPS Everywhere addon, I'm getting "Your connection is not private". Getting this error from all the browser except Firefox The certificate cannot be verified up to a trusted certification authority This CA Root certificate is not truste...
I have an RSA key I use for ssh between various accounts that was originally generated in 2002 — hence it has the then-standard 1024 bits. Is there any point to deleting that key from all my machines and regenerating a new (and presumably somewhat more secure) one? Most of the responses to this similar but older quest...
Many files that are available for download (eg in github) come along with "asc" signature files attached, or with a sha256 file hash. Can someone please explain difference of PGP signatures vs file hashes? My questions: Is the purpose of both files (pgp/256hash) the same, to verify file authenticity/not manipulated? W...
I am using securityscorecard.com to security test some web sites. One of the issues it has flagged is "Outdated web browser observed". Full description is as follows... The web is constantly evolving, using different languages, protocols, and file formats over time. Web browsers regularly release new versions, on time...
The only difference I am aware, is of CLI vs GUI. But I am curious to know as to what is the difference in their performance and what are the additional features in one tool compared to another?
Can you please hint me to the steps I need to verify a file's signature (without connecting to the Internet) on command line using GnuPG, when I have the required files ready: -installation file (eg the .exe file) -the respective .asc signature file of that installer -the respective PGP public key number of the develo...
I would like to establish a secure connection between two servers (Alice and Bob) via Mutual TLS authentication. That means: Alice provides Bob a certificate signed by CA Bob provides Alice a self-signed certificate (p12) Suppose Alice’s trusted root CA is compromised and would be able to issue a fraudulent certific...
I was on a WhatsApp call with my friend (Alice) when the call suddenly dropped. I then immediately opened my chats and noticed an alert in a mutual group that said "Your security code with Alice changed, because their account was registered on a new device". At this point Alice was logged out of her account on her phon...
My boss wants to sign our binary. I need to tell him how he can create the signing key. Most if not all sites I have seen about signing binaries say "use gpg". OK, so gpg per default has 2048. Their FAQ https://www.gnupg.org/faq/gnupg-faq.html#sec-11-4 has several arguments why 3072 or even 4096 does not offer higher s...
While troubleshooting an unrelated network problem, I noticed an interesting pattern on one of our networks for the last few days (at least). Before crying wolf, I wanted to see if somebody here may have seen this pattern before, and whether it is either associated with some known legitimate activity, or with some know...
A CSP response header is set on the web worker JS file, but it is not enforced by the browser. The CSP is enforced in the Web worker only if the parent document's response header contains the CSP header. Is this expected? index.html <html> <head> <title>Helle</title> </head> <body> <script> var worke...