instruction stringlengths 24 29.9k |
|---|
Summary
The main reason for hashing passwords seems to be that users reuse passwords and, thus, leaked passwords would disclose sensitive information about a user (cf. this question.)
If the password is auto-generated and cannot be changed by a user, are there still good reasons for storing only the (salted) hash of a ... |
The question
Say, one may use a mobile phone's personal hotspot functionality to broadcast a message locally via the ESSID, like "Happy Birthday Lilian" or "Stand with Hong Kong".
Assuming such hotspots are never meant to be connected by anyone (e.g. a random string of 32 characters may be used as the password), everyt... |
I recently worked for a customer that showed me that all their network cables are visible. Indeed, cables were never drawn inside walls, conduits or trunks. Instead, they were "hung" on poles close to the ceiling. If a cable needed to pass through a wall, the hole was way larger than required, allowing a lot of light t... |
I am attempting to overwrite the eip of a binary (in order to perform a ret2libc attack). The program has full relro, PIE and NX.
Here's my thought process.
First I try this, I input "C"*260 + "system address" + "bbbb" + "bin/sh address"
and get the following:
Program received signal SIGSEGV, Segmentation fault.
[----... |
We are in the process of designing an app which, simply put, will allow people to accept payments easily.
The customer won't need an account and we'll be linking customer data (name, address, and phone) via emails used through their payments e.g.
When the user fills out the data and hits "Continue" they are prompted ... |
Is CA the only way to securely share public key - are there other mechanisms that are viable in practice?
I guess if you had a trusted software deployment system that securely transmitted contents from itself to the host, you can use that to deploy the public key there as well?
I believe you also want to rotate the pri... |
I implemented a 2FA authentication for a web app with PHP and Google Authenticator. In order to login to my system there are a few steps:
User types in a complex master password in order to access the login page. The request is throttled for only 1 request every hour and includes a CAPTCHA.
User types in username and ... |
In helping a corporate user log on to eBay, I noticed that when on the login page, a stream of errors were coming up in the Firefox JS Console about not being able to connect to wss://localhost. This is a bit concerning, obviously. Why would a web site need to connect to a web server running locally.
In looking furthe... |
Can the handler exploit/multi/handler handle a connection from another type of payload ?
payload generation:
msfvenom LHOST=IP LPORT=PORT -f exe -e x86/shikata_ga_nai -p windows/meterpreter_reverse_https -o payload.exe
Listener:
msfconsole
use exploit/multi/handler
set payload windows/meterpreter_reverse_tcp
set LHOS... |
I would like to know if there is a way to make a false certificate to bypass a Palo Alto VPN (specifically Global-Protect). The clients only connect by certificate and I don't know if some hacker can create a false certificate and connect to my vpn. I want to emphasize that with the legitimate certificate, they are alr... |
I'm looking to implement a public-key based login / authentication for a website.
This will not be used for general users – it will be used by both automated scripts and for admin logins.
Before someone suggests it, I don't think I want to use client certificates – my understanding is that:
Client Certificates are sen... |
A client is asking for a way so his app can receive credit card information and store them. He needs this to process scheduled payments from his clients.
I told him that I can build a asymmetrical (RSA) encrypted solution that would store the data and only he would be able to decrypt it if he has the correct key.
The p... |
Can USB dongles/wireless receivers get a virus from a computer that has been infected? I imagine it’s no more vulnerable than say a usb mouse is?
But since these Logitech usb devices like your mouse or headphone receivers do contain some firmware, I imagine they can be infected though uncommon.
|
I have an encrypted .eml file and a private key. I've looked it up a lot on the internet but couldn't find a way to decrypt the email using OpenSSL. I've tried this command:
smime -decrypt -in encrypted.eml -inkey privatekey.key -out decrypted.eml
and each time I get this error:
OpenSSL> smime -decrypt -in encrypted.e... |
I have a Laravel site, I thought I patched this issue already.
I got these in my session.php
'secure' => true,
'http_only' => true,
But OpenVas still detected that I still need to it.
It also listed it 3 times
Am I missing anything else ? or this is a potential false positive from OpenVas ?
|
I work in infosec and as such, have read many whitepapers and been to many conference talks. I hear all the time, especially in conversation and literature about malware, the term "nation state" used to refer to a government entity or government-sponsored activity. The term "state actor" is also used.
My question is, w... |
I am doing some pen test on my localhost I was wondering if I could find an EV certificate for localhost only. If you have an EV this is free just for localhost It will be find. I know EV is expensive but I was wondering if I ask Digicert, Comodo or Cloudflare if they have SSL for Pentest.
|
As part of moving from few on-premise monoliths to multiple on-premise microservices, I'm trying to improve the situation where database passwords and other credentials are stored in configuration files in /etc.
Regardless of the the technology used, the consumer of the secrets needs to authenticate with a secret store... |
What are the methods to backup a key to paper?
The idea is to have reasonable protection and the ability to restore the key in case of the digital backup is lost.
Are there things that convert a standard PKCS key into a easy paper representation?
(Example take a key and output a words or QR code maybe?)
Intent:
The int... |
I downloaded a software that has a login interface. It's a $100 a month subscription software.
I disassembled the software and found that passwords are being sent by combining them with a hard coded "salt" that everyone can see in the source code (is it really "salt" if it's the same for everyone?), hashing them with M... |
as the title suggests, I'm new to malware analysis and as I was looking over strings in a sample, I came across one that I haven't seen before using + and / (6AAAAABZg+kFjYm2BgAAUegBAAAAw1WL7IPk+etc...).
I am wondering if there is a list of some kind out there that has examples of certain types of string, like SGVsbG8... |
I am managing development of a platform for health service providers and thus, it houses health information about patients registered. The patient register themselves on the system and maintain their profiles. This system needs to be compliant to HIPAA requirements.
The specifications dictate asymmetric + symmetric enc... |
I'm building a site that will use youtubeAPI to keep track of playlist changes.
In order for 3rd party to use it I would supply a dialog box in which user would type his/hers playlistID - this would be read and then put as an argument into bash script that in turn runs curl/python scripts to connect with API (ran on my... |
We all know that MFA done right can greatly increase the security of an online identity.
There are services around with a fundamental trust problem among the users. For example online market places and classifieds. As long as the user accounts can be compromised via phishing, all indicators of authenticity are worthles... |
WPA3 for Wi-Fi systems is generally acknowledged to be more secure than WPA2. For example, it introduces SAE with the Dragonfly handshake, in an attempt to close the door on the kind of brute force dictionary attacks that WPA2 could be susceptible to. However, even WPA3 has its vulnerabilities. Perhaps the most risky o... |
I downloaded a revoked certificate from the website https://www.ssl.com/sample-valid-revoked-and-expired-ssl-tls-certificates/. Specifically, the revoked certificate of the site https://revoked-rsa-ev.ssl.com/.
To check the verification result in OpenSSL, I downloaded the CRL and ran the command :
openssl verify -untr... |
In the security test report, I have a recommendation to add Expect-CT header to the HTTP response from web application, additionally developers set this to:
Expect-CT: max-age=0, report-uri=
I am not sure if it is a good idea to add this header. According to https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Exp... |
A scan with Burp has identified a DOM-Based cross-site scripting vulnerability.
The only script with a sink is the following.
Do you think it's a false positive? (Can I make it more secure in some way?)
var sPageURL = window.location.pathname;
var urlParts = sPageURL.split('/');
var page = urlParts[urlParts.length - 1]... |
I want to use VPN provider (ProtonVPN), and don't want to use an app. They ask user to install their Root Ca. How safe is it? What type of info could they get from my laptop? If I have their certificate installed, does that means they can see and get all info from my browser, including passwords and https sites? And wh... |
Would an anti-virus software make any other processes that it scans to consume more CPU?
We recently switched to a new Next-Gen, AI based Anti-Virus software. On couple of our Linux servers that runs Java processes, there has been frequent high spikes in CPU usage recently. Apparently, it is Java that is the highest co... |
I would like to create a new token for each request and would like to us the following template-
<script>
var current_token=<?php echo $_SESSION['csrf_token']; ?>
$.ajax({
type: "POST",
url:"script.php",
data: {'token':current_token},
... |
I was trying a machine on vulnhub and I found port 139 open that was samba-4.3.11.
I searched for an exploit for that particular version and I found the is_known_pipename() exploit. But when I ran it, I saw it uses port 445. I read some articles saying port 139 and 445 are similar but 139 is an older version of samba s... |
From time to time my LinkedIn connection gets marked as unsafe: no green lock next to the URL.
First, I believed this was a browser issue, but after I switched to another browser, the warning did not disappear (for now, my browsers are Opera and Chrome).
First, the connection is always safe, but once I enter the job s... |
I'd like to improve security on my home network.
I have a PC and a laptop with Microsoft Windows as well as a PC and a laptop with Linux
There are a few HTTP services installed in the network. The devices should only be allowed access to DNS to router, HTTP and HTTPS to internet, and HTTP to certain local network devic... |
On my Mac, HTTPS connnections to certain sites fail using the built-in curl binary of macOS 10.14. They work fine with different browsers, as well as other builds of cURL on the same system. One of the affected sites is https://kapeli.com/, the download site for the utility "Dash". Another one is https://electroncash.o... |
I have recently started using a cloud gaming service. It provides me with control of a 'remote PC' (actually a virtual machine running in their data centre) accessed through an app or VNC console. The VM is switched on/off using a control webpage where a password must be entered.
This week the cloud gaming service was ... |
I have a program written in Java which takes JSON string as argument, encrypts it using AES then encodes it using Base64.
JSON string is like:
{"a": "b"} or {"a": "n"} or {"a": "k"}
I.e related object would have one property a. Value part is randomly generated.
Program outputs for above JSON inputs looks like
UBNv... |
When opening a corrupt Microsoft Office document, I get a prompt that says something along the lines of:
Excel [or Word/PowerPoint/etc] has found unreadable content on 'filename.xslx'. Do you wish to recover the contents of this document? If you trust the source of the document, click on Yes.
Why does Office tell you... |
In example website "<" character is filtered.Is it possible to find XSS in h1 XSS h1
|
The cable company recently replaced my old gateway/wireless router. After the new gateway was installed (a "Touchstone TG1682G Telephony Gateway", if it matters), both Google and Amazon required additional verification before I could log in to my accounts on their websites. Google gave me a message that my device was u... |
I know that BIOS can get virus but it's very rare, but it seems to me it's pretty impossible or improbable for a virus to creep into your BIOS via normal computer use.
Let's say I'm using windows 10, even if I go as far as downloading a malware on my windows 10, it would seem that the worst damage it can do it to my w... |
Since a BIOS isn't connected to the internet, even if your BIOS is infected with a malware (say you used a usb to flash it but with files that wasn't from the official motherboard manufacturer's site). Is the damage limited locally to the functionality of your system? In that your data can't really be transmitted thro... |
I am trying to connect to http://challenge01.root-me.org/web-serveur/ch10/ in Firefox with FoxyProxy and OWASP ZAP and I got this error message
ZAP Error [java.net.ConnectException]: Connection refused (Connection refused)
Stack Trace:
java.net.ConnectException: Connection refused (Connection refused)
at java.bas... |
I'm a beginner on course to be an expert (hopefully) and I've been set assignments to test security systems on the web. The whole assignment is to prepare, test and document the results to correlate with real-life professional work. Coming from a software development background, I am logically solid on information secu... |
I'm building an API with websocket that serializes data through JSON. The App itself is a chat application. I came up with the following structure to send my data:
{date: '2020-05-31', time: '14:28:05', text: "Hey!", to: '<id:int>', from: '<id:int>'}
The user basically sends a message through the browser and this is r... |
I've found what I believe is a significant security flaw on quite a big platform. It can be exploited to obtain on the orders of millions of email addresses with some additional data. They're big enough in that they have set up a customer support system, which is causing me great problems in getting in touch with the r... |
The idea of having a fast, disposable VM at the palm of my hand appeals to me very much. It makes adding an extra layer of security to any thing I want to do so easy - just launch the sandbox application in a matter of seconds and you're done. Of course, that is considering the VM actually does the job it's supposed to... |
I got the WPA handshake, now it's turn to crack the password using Hashcat. First, I wanted to make a wordlist of passwords [A-Z] the length of 8, but Crunch (the tool in Kali Linux) said it will take 1TB of storage that I don't have available, so I gave up that way. Is there any way to generate passwords (example: ABC... |
We have a use case where a bunch of data needs to be posted from our application to a partner site where the end user takes some actions and then returns back to our site. On the return, the partner site also posts some data back to us. We need to establish trust for both the redirects.. i.e. the partner site needs to ... |
Are there any tools for this?
I am doing some research into pentesting and subdomain takeovers with cloud providers like AWS and Azure. I have a list of subdomains (A records) that could be used for this, but they are indecipherable in terms of seeing where they once resolved to. Without this information, the entire th... |
Last month, I reset my cell phone, also immediately installed Malwarebytes and Avast. Every scan until now was/is safe.
But I also have a virus scanner which is included in my ISP safety package (Telenet Safeguard - Not a lot is known, but it appears to be based on Bitdefender, although no settings or user info is real... |
A scan with Burp Suite has reported a possible vulnerability on all the pages of my application, which is based on ASP.NET 4.7 WebForms.
the issue is: The application may be vulnerable to DOM-based open redirection. Data is read from document.location.pathname and passed to the 'open()' function of an XMLHttpRequest ob... |
I was on Discord, and someone sent me an invite to a server called "Operation: Pridefall".
I didn't know what it was, the link is http://discord.gg/xxxxxxxxx - and the invite was legit.
I thought it was just a regular chat. I looked, and there was some IP addresses being leaked.
I asked the person who invited me, "Wha... |
Let's say that I have a website where I want to sell homemade goods. I want customers to be able to pay for the goods without too much hassle.
A common option is to use buttons provided by a payment service like PayPal. The website uses HTTP, however, and the hosting service does not allow SSL certificates without payi... |
Some websites make it easy to enrol multiple TOTP apps at the same time but make it difficult to disable these apps. For instance, the user would have to completely reset the MFA settings instead of just disabling one TOTP app, or the user would have to provide a state-issued ID to have this done by user support.
What ... |
I have a laptop with Ubuntu 20.04 operating system. I am logged into my Chrome browser using my Google account. This means, every time I open my browser, I am already logged into all the Google services (Gmail + Chrome browser with all passwords + Photos + ...).
Let's say that someone would steal the laptop and would l... |
Is it possible to use any automated scanning tool in order to detect stored passwords in our internal wiki pages?
|
This is part of my preparation for OSCP.
According to https://www.vulnhub.com/entry/kioptrix-level-12-3,24/, Kioptrix 3 is vulnerable to SQL Injection.
However, I found that SQLi challenge on Kioptrix 3 is a little bit tricky as the gallery.php?id= parameter is quite "hidden".
http://kioptrix3.com/gallery/gallery.php?i... |
I logged into my school-based Microsoft account on my personal laptop. But is it possible that somehow my school is monitoring my Google searches and other browsing history through the school Microsoft account? If my activity is being monitored by my school with the aid of the Microsoft account, does a VPN prevent it f... |
I've researched this and found the following on StackExchange and ServerFault, but they're very old.
https://serverfault.com/questions/55889/why-block-outbound-icmp
Is it a bad idea for a firewall to block ICMP?
Security risk of PING?
So, as of now (mid-2020) is there any valid security reason to block outbound ping on... |
what is the difference between performing an evil twin attack with 2 wireless adapters or with just on or is it even possible to perform this attack with just one adapter? i am using Kali Linux
|
I am solving pwn problems in CTF challenges. my exploits are working in the local system but it doesn't work on the remote server when connecting using Netcat. The issue was that even the function address is the same offset was different in the local and remote server. How can I find out the offset used on the remote s... |
Looking over the spec for JSON Web Signature (JWS), I realise that it doesn't seem to specify anything that is HTTP-specific in terms of the payload. Specifically, signing HTTP headers and bodies (say, so a server can verify certain HTTP headers and the HTTP body were constructed by a client).
Is there some way to use ... |
I'm writing a relatively simple app for Android, which should get GPS coordinates and detect if the device is inside one of defined polygons. These polygon definitions I intend to download from a server through an unencrypted connection before the app launches its GPS activities. The polygon data is created by users an... |
Recently I had to use a website which stored things like user role (user or admin) in a cookie.
When I modified the username the displayed username changed in the website.
I immediately asked the developers of said website if it's secure to store the user role in a cookie if you can just modify it. They told me that yo... |
I have a problem which has several layers;
Provide a distributed computing plane where actors can voluntarily add and remove computing resources from, the actors are untrusted by default, and thus their resources too.
Actor A wants to run application 1 (a container) that gets scheduled on a computing resource provided... |
I'm wondering, would it be clearer to declare a company wide requirement with regard to password theoretical entropy, rather than the usual "at least one big letter, and a small latter, and special character..."
Thus if we target a reasonable entropy level for humans to remember, say 60-bits, then calculate the entropy... |
I don't have an education in computer science, I've just become interested in information security and encryption lately.
I'm struggling to understand why encrypted web browsing using HTTPS has been so widely adopted but at the same time most emails are unencrypted. From what I understand when using PGP the exchange o... |
I'm having a hard time drawing the line between Web App pentesting vs a Web App Security Audit.
For instance, OWASP Testing Guide could be used for both of those cases.
Let's say the pentester and the auditor are working inside the enterprise: they therefore have access to the same resources ie architectures, documenta... |
I know that HttpOnly attribute restricts the cookie from being accessed by JavaScript etc. Is there any specific attacks regarding this issue? Can cookie theft and hijacking be counted as attacks towards this issue?
|
We are using cert based authentication where the client sends a cert to the server, which is validated for authentication for a web application. This all works well. The problem happens when the user attempts to logs out. The browser seems to hold on to the cert and the user is immediately re-authenticated. We have tri... |
Today I was checking out macOS security and privacy guide, and when I looked at my keychain, I was surprised to find Startcom CA and Symantec CA trusted by default. Isn't this supposed to be vulnerable to MITM?
|
I am always curious by reports in the news of big network sites getting hacked and the report confidently stating a statistic such as "only 10,000 users were affected" or "Microsoft confirms 40,000 accounts compromised".
Here's just a few examples:
https://www.independent.co.uk/life-style/gadgets-and-tech/news/10000... |
Is there any way that i can use the compromised website as the shell
What i am trying to achieve is to get a reverse shell on the machine,not a webshell.The target machine has a website hosted on it open to public.The machine is behind a waf so all tcp are blocked only port 80 is allowed.
Is there any tool out there th... |
Apart from all the other security and design flaws of Wordpress, there is 1 point that particularly got my attention: "Automatic Backups".
These are saved inside the Wordpress directory. If you ask me, this seems wrong. Cant a hacker download these files or deploy a tool such as HTTrack? Then they would have enough tim... |
Few months ago, my bank forced me to change my password. It was a random 32 characters long password, stored in a well-known password manager.
The new password had to be exactly 8 digits, to be entered manually by clicking on a randomly organized virtual keyboard (of 10 buttons, from 0 to 9), with some JS code preventi... |
In the Telegram API it is stated that Telegram support Perfect Forward Secrecy in their "secret chats". It is also stated that
official Telegram clients will initiate re-keying once a key has been used to decrypt and encrypt more than 100 messages, or has been in use for more than one week, provided the key has been ... |
I have read here that if you choose TPM + PIN protection the PIN does not become part of the key, it is simply used by the TPM as an additional security measure. It doesn't make sense to me, it would have been much safer and much easier to implement by encrypting the key stored in the TPM with the hash of the PIN. Sinc... |
Say there is a secret encryption key that a third party has to handle. The third party is supposed to destroy the secret key when they are done, and tell everyone else it was destroyed and therefore safe to use. However, if the third party makes a secret copy, then they can covertly sell it for large amounts of money.
... |
Does MEGA store my password or decryption key? How do they check if the login information I enter is correct while only my email address is sent to the server?
I read this article: How can mega store my login details and still be secure?
But I still don't understand a few issues:
How do they verify that the user ente... |
This is a question born more from the user perspective but I'm wondering how it fits into a proper user creation and management policy. As a consultant I tend to work with various different clients and one issue that keeps coming up concerns getting access to their systems. While each client has its own procedures and ... |
I was watching an ethical hacking course where the tutor taught me to hack into different virtual machines and also machines from Hack The Box.
In the real world, how are these practices of hacking virtual machines useful? What do these virtual machines represent: a webserver, someone's PC, phone, any kind of server, o... |
One of our clients uses a trusted timestamp service to prove that certain documents existed on the day they were created (they don't need a full digital signature, just the timestamp). The server uses OpenSSL to create a timestamp query, receives a timestamp response and saves it in a database column.
Last year, the pr... |
Problem: I have a local machine (IoT, lets call it MCC) which connects via SSL to a website (mcc.com) to get some JSON data. I would like to send modified JSON from my own server.
Idea: Setup a local device (lets call is rasp) which opens a wifi hotspot. The MCC should then connect to the rasp. The rasp answers with a ... |
I've had an unusual experience today. A phone number (not withdrawn number) texted me demanding to know who I was. Their tone was aggressive and I simply told them I don't know their number. When I asked how they got my number they told me I'd just phoned them, and backed that up with a screenshot showing a missed call... |
My organisation mandated that Windows Domain Service accounts internally should not have the "Allow log on locally" permission, and essentially be non-interactive.
What exactly is the potential risk for enabling this policy for a service account? Microsoft documentation here states that "unauthorized users could downlo... |
On this https://jwt.io/ application, you can paste a jwt and it returns you a public key. How is this public key generated, and how is it exported? Is it contained inside the JWT, and if it is, then how? In raw format?
|
I was working the other day and I had a question come up, that I want to ask here to make sure my assumptions are correct.
In terms of SSL Mutual Authentication a self signed CA and a public CA provide the same functionality, is that assumption correct?
Besides the part that, supposedly, a public CA is stored much more... |
I made an email account at hotmail.com. Before even using once anywhere I already receive spammail. My question is, how is that possible? And is it unavoidable (from the perspective of an email provider)?
|
Assuming password-less authentication, if an attacker is able to gain access to the public key on a host server, they can set up a different machine between the client and the server and place the key there.
When clients connect via SSH, they'll be presented with the same fingerprint as the original machine and their c... |
This morning I took an update to remmina and started getting a "fingerprint changed" warning. When using xfreerdp (from freerdp-x11) I get they old key. The old key being 20 bytes and the new key being 32 bytes.
I originally thought this made it a remmina bug, but changing to freerdp2-x11 gets the new key.
The thing i... |
We have a local virtual windows 10 server hosting some custom software. This VM is only hosting this service and nothing else. This software is made of:
An ASP.Net core web app, public API, only returns data, never writes
Custom UDP communication server (with its own reliable implementation), does some CRUD operations... |
I've spent several hours searching the internet to see if anyone has cracked this encryption yet, but without any luck. I don't want to reward criminals for their activity, but I do have a few files that I absolutely need. Besides finding a decryptor or paying the ransom, do I have any other options for recovering my ... |
What if a hacker steals my cookies for example using BeEF or something else. What can they do with this information? Can they get any passwords or something?
|
I am scheduled to graduate college with a BS in cybersecurity in October. However, whenever I look up different cybersecurity topics and such I find that there are many many topics that I have no exposure to. I understand that there is a lot to cybersecurity and I am trying to be the best of the best. So my question is... |
Assuming I have the master secret from SSLKEYLOGFILE client random, and server random, can I decrypt any tls traffic captured? I've started from Golang's TLS implementation, pulled the connection stuff out, had it generate the keys and iv from the values above (https://github.com/golang/go/blob/cd18da451faedc4218a5fd0e... |
In general(PKI), encryption happens with public key and decryption happens with private key. But, how Certificate Authority sign a digital certificate with private key? How this can be validated using public key in browser? What is the logic behind CA certificate validation?
What is the role of SHA (hash algorithm) rol... |
Could you please help me to understand the best approach to compare two filesystems / hard disks?
As a practical learning exercise I created a clone of whole hard drive a month ago and again yesterday (it’s Ubuntu Server and I cloned it on Debian just using DD on disconnected hard drive). The point is to compare known ... |
Today I saw a snippet a code for authentication logic :
function checkPass($pass, $login){
$inputedPass = $pass;
$req = $bdd->prepare('SELECT password FROM agents WHERE password = MD5(?) AND ID = ?;');
$req->bindParam(1, $inputedPass, PDO::PARAM_STR);
$req->bindParam(2, $login, PDO::PARAM_STR);
... |
IEEE 1363-2000 - IEEE Standard Specifications for Public-Key Cryptography - has been withdrawn on 7th November 2019 and is now in inactive-reserved status. What does this mean? Why was it withdrawn? Are some of the contents suspect? Some serious vulnerabilities were discovered? Should we no longer use it as a reference... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.