instruction
stringlengths
24
29.9k
My project uses different versions of jackson library at a number of places, and a security scanner flagged that the binary is vulnerable to CVE-2018-14721. My reading of https://nvd.nist.gov/vuln/detail/CVE-2018-14721 is that the vulnerability is about deserialization of axis2-jaxws classes resulting in SSRF. Is this ...
I build a simple chat with MySQL. It has a table called users and two colums: id and username. I use the following query to extract username and ID by ID. Is there a way someone can Inject malicios SQL ? and How ? Limit is used to only allow 1 result to come out $query = 'SELECT id, username FROM users WHERE id=' . $id...
I have a sqli and i can dump data from the DB with the query below func=REC&lastid=7491&start=3&uid=56+union+all+select+1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,concat(uid,':',email,':',password) FROM user WHERE uid=56; --&token=6eadee0862e6fe05d588cb29c416d9 How can i add an update query to change the password? I...
I have the below openssl code to decode json content. It works fine if the encoded data is eyJ0ZXN0MSI6eyJ2YWwyIjotOTEuNiwidmFsMyI6NDAuMTIzNH19 but it does not work if the encoded data is eyJ0ZXN0MSI6eyJsYXRpdHVkZSI6LTkxLjYsInZhbDMiOjQwfX0 It's not decoding the last 2 right curly braces. Can somebody help me to underst...
I am wanting to set up a single logging point on my home network that logs URLs and search terms to monitor teenagers... um... activity. I was thinking of setting up a computer between the cable modem and the router, which would capture all network traffic. The upside would be no need for arp spoofing, the downside wou...
We have a shared machine in the office, used for demo'ing our product. I want to be able to fetch the latest code from Github. We have 2FA enabled, so I can't use my login password for https operations. I can use a Personal Access Token as the password. What is the best way to store this Personal Access Token on the sh...
I have a small network of several Windows 10 machines (all protected by BitDefender 2020 Total Security), one of which acts as server with Firebird database. For some time the database is deteriorating - in some random records some fields have altered values. I completly changed the server machine for a brand new with ...
I have seen many answers to this question in different scenarios but I am still unsure of the actual answer. I have a VM in the cloud (Azure), which will be hosting my production database. Is it safe to have port 22 open for my SSH connection? it also has a public IP address, is this safe too? This is my first time hav...
Suppose a website is set up so that only IPs from country X are allowed read/write access. This server goes through a CDN such as Cloudflare. Because the GeoIP read block is at server level, it never actually works because Cloudflare will always cache from an IP in country X and broadcast worldwide so anyone outside of...
This is my code where i have a userId in a method SwitchUser_Click. I need to prevent or somehow encode the return value from the switchUser_Click as it includes the UserId of a user vulnerable to XSS attack or redirects. function SwitchUser_Click(containerElement, OnSuccess) { var selecteduserId = $("sele...
I have a website that is not supposed to be open to the public and the URL is hidden. Currently, I use Comodo certs to do the SSL, but I'm wondering since only approved devices should be accessing it, whether it makes sense to use a self-signed certificate. Is there any danger to this? I control all the end-users compu...
So, Most of us understand that cellphone towers are constantly listening for cellphone broadcasts and we also know that triangulation is possible (even retro-actively, as connection records are permanent) by basically using the different signal strengths from your 3 nearest cellphone towers. Q: Does triangulation, in 2...
I am learning how to configure a multi-region AWS system. However, everything I read says "if you want/need more security then do X". Why would anyone want less security (is what I start thinking)... Is there a way to create a bullet proof AWS system? If so, what are the key pieces? If not, how can I prove that to some...
I have heard that intelligence agencies and hackers can illicitly gain access to a computer's webcam and microphone and keep a close eye on people using suspicious programs or malware. Is there any way to check if such thing is happening to you and are there any mechanisms to avoid it on platforms like Mac OS, Linux an...
Is it possible to bypass NTFS encryption if the password used to encrypt the RSA key is a password to an AD account? So if an administrator can simply change your password, they would then be able to decrypt your files. My understanding of Encrypting File System is that the user's RSA private key is encrypted using a h...
I was wondering if it's possible to implement more secure KDF like bcrypt, scrypt, pbkdf2 and argon2id in PAM authentication. Ideally I would like to have their hashes instead of SHA-512 ones directly in /etc/shadow, but we all know what Ulrich Drepper wrote about bcrypt 13 years ago. OpenSUSE and OpenBSD seems to use ...
As far as I understand, a problem with the idea of a pepper is that, if it's stored as part of your code, then the hacker can read it if they can access your code. So I was wondering, would it not be better to store the pepper in memory? I'm thinking of running the server in such a way that the pepper is made available...
In my company they have MITM/SSL in following way. There is a proxy to whom all PCs connect. Now the company installed some trusted certificate authority (e.g. ISSUER-COMPANY-NAME) on our computers. When I go to facebook it shows me that it has certificate signed by the issuer that was installed by our company. I am cu...
I am doing some pen testing on my wordpress server. I wanted to see what would happen if the attacker were to get a hold of my username and password for wordpress. So I used the standard exploit in msfconsole wp_admin_shell_upload and set password and username. What I do not understand is why my UFW does not block the ...
My wife is working remote due to COVID for a company that has a policy in place to not work from outside of California for an extended period of time. She logs in via a corporate VPN using our home WiFi network. We are moving from LA to Phoenix had she would like to hang on to her job until COVID is over. Are there any...
What actions can I take to make web browsing on mobile phone (android) as safe as possible? My main concern are sites that would install malware (has happened before on desktop computer). On a computer, I would run browser in a sandbox environment (e.g. Sandboxie). Are there similar alternatives for mobile phones? Or a...
Is there any way for hydra to understand the correct combination ^USER^ and ^PASS^ in a http-post-form authentication attack based on the length of the body response? In Burpsuite you can look at the length and understand password and username. So basically how can I set up hydra to look at the length parameter during ...
Is there any Write-once USB stick/Pendrive? I need to submit some files to Authorities and I don't want them to modify on whatsoever. Any suggestion?
I have a rest endpoint for example /user/{userId}/message/{messageId} I have the possibility to create both ID's as I want. How can I create messageId and know the message is belong to this user, without checking in database or any service? I think about hashing userId and add the hash as prefix of messageId.
In the OAuth website here it says "Most services provide a way for developers to retrieve the secret of an existing application, although some will only display the secret one time and require the developer store it themselves immediately" Earlier in the same text it says we should not store the secret in plaintext as ...
We are evaluating how to improve security on our RFID System. Our system was reviewed by someone finding the point that there are duplicate Tags we must get rid of. So the first idea was to read the UID to ensure that the used tag is not a copy of the original one. Basically what I found out is, that the UID is used in...
"IP Spoofing" refers to changing source IP addresses so that the attack appears to be coming from someone else. When the victim replies to the address, it goes back to the spoofed address and not to the attacker’s real address.
I have a flask web application which is configured with HSTS (no man in middle) and it has a login form. Inputs to the login form have necessary constraints and HTML disallows incorrect formats. My question is if a user is on my site's login page, he would have the keys to the secure connection. Is it possible that he ...
I am trying to generate a wordlist. I am using crunch but I am stuck at defining the pattern I want the words to be generated. For example, I want to define a rule such as this: Password: Ameri948 ca# Words: [A|a]meri[\d\d\d][space|no space][C|c]a[space|*|#] Which means, I know the structure of the password and the exa...
I'm making a peer-to-peer cross-platform application (in Java & Kotlin), and I want to encrypt conversations between tens of users, concurrently. However, due to lack of knowledge in security good practices & protocols and due to this being my first time actually getting into informatics security, I'm sort of confused....
Context: I own a machine; I trust root and all the accounts. I virtualize untrusted guests using KVM, and don't want them to escape. When /dev/kvm has the right permissions, non-root users can run KVM guests. Does this bring any security advantages over running guests as root? In case of a qemu or KVM vulnerability, wo...
At work, years ago, I used to have a key-fob device that was about the size of a thumb-drive. It had a 4 digit LCD screen that the numbers changed every 60 seconds. When logging onto certain servers, after entering my user ID and password, it would prompt me for the 4 digit passcode. Now the key-fob was so small, I w...
I have some encryption understanding however I fail to get my head around following scenarios. I would like to know if they are possible with a zero knowledge encryption system. What the system can or can't do can be added to the answer. Example: The system needs to keep a encrypted copy of the key. The user has to ha...
I was reading this question and still have doubts about my use case. I know it's unsafe to store a JWT in local/session storage due to XSS attacks. But what if it's for a JWT that only lasts 1 min when they first login? The client would then use this to get a longer + safer JWT to stay logged in from then on. I'm using...
I've heard the argument against DNS-over-HTTPS that it is supposed to be a security nightmare for network defenders because it enables encrypted DNS over port 443, compared to DNS-over-TLS which goes through port 853. I don't understand this argument because, how is malicious traffic on DoH practically more difficult t...
I'm working on a website and I noticed that if I go to the following URL: website.com/page?alert() this message is reflected in the action form. I tried to close the action attribute using double quotes in order to try a classic like " onload="alert(1)" but double quotes are URLencoded if i read the source code. Do yo...
I was adding logging to my application. And I realized that there are times when I need to debug my sql statements and logging them (at debug logging level of course) would make debugging very easy. I am kind of confused because some times logging statements can contain personal information like contact details, names ...
I have recently read an article about storing passwords safely and I have a few misunderstandings. I found out 4 ways of storing users' passwords: Just keep them in plain text Keep passwords in plain text, but encrypt the database Hash a password Use salted hashes of passwords. The best way is supposed to be the 4th....
As a non security expert, I'm looking for advice from those who are. I work with company X who have hired company Y to develop their website. Company Y needs to integrate server-side online payment and has asked company X for the secret (private) key related to their payment account. Of course, secret keys are called t...
I'm implementing an OAuth 2.0 Authorization Code grant type flow and considering to use a very short-lived JWT as the authorization code so this step doesn't require a database. I understand that this code is usually persisted and removed after it's used, but are there any significant security risks of using a JWT inst...
I use sqlite3 for my database and get data from untrusted source with flask.request.get() I insert all data with such syntax c.execute("INSERT INTO table (e1, e2) VALUES(?, ?)", (V1, V2)) as recommended here. My question is How does python-sqlite3 sanitize these requests? What happens in case the entry type is BLOB? ...
For a recent example, type in to Google (with quotes) "Reggie Kray as a character witness" and your first result should be this article from The Times. Even with all of my best JavaScript tricks, I can only read up to the start of the fourth paragraph. However, the Google search result is clearly showing a part of the ...
Diffie-Hellman won't really work here, since only one side has a public key, one side has the private. It must be this way to prevent decryption when the data is at-rest on one of the sides before transmission. Currently, I am using RSA-2048 only, which limits the payload size to 245 bytes. I want to support much larg...
We all know that the client device and WiFi AP will perform the 4 way handshake to generate the session key (PTK). Here is the recap of the 4 way handshake. 1.Client device<-----ANonce-----WiFi AP 2.Client device------SNonce---->WiFi AP 3.Client device<--Install PTK---WiFi AP 4.Client device--------OK------->WiFi AP I ...
We all hear often about the reused key issue in block cipher. For example, for a picture being encrypted by the electronic codebook mode, we will still see the shape of the picture. https://images.app.goo.gl/Hw8c9xDHcmi7nCNg6 So that is why we need initialization vector to increase the randomization. That is why CBC, O...
I am trying to understand if it's possible to configure a private key size for the given curve. openssl ecparam -name secp256k1 -genkey -----BEGIN EC PARAMETERS----- BgUrgQQACg== -----END EC PARAMETERS----- -----BEGIN EC PRIVATE KEY----- MHQCAQEEIMda3jdFuTnGd2Y9s9lZiQJXKSpxBp6WQWcurn4FnYogoAcGBSuBBAAK oUQDQgAEI272v3lI...
I would like service A (Client) to communicate with service B (server) without the need to send the whole chain of trust in the code ( CA racine and CA1 intermediate).I want to verify just with CA1 intermediate but in my code I have this error: unknoun CA. client side : #include <stdio.h> #include <memory.h> #includ...
So I have a series of these requests in my log and was wondering what they were? It appears malicious but no harm has been done. Can anyone confirm? - Any insight or reading material etc that would prove useful for anything related to this or remotely related would be highly appreciated to further my own understanding....
We are trying to make our web app the most cost effective and secure we can. For that reason we are using Cloudflare instead of CloudFront as a CDN for our frontend resources. We put CloudFront between Cloudflare and S3 to be able to use Full SSL (strict). This is required because we have a subdomain for API Gateway, w...
Our architecture is based on the best practices for PCI-DSS on AWS Amazon WAF -> API Gateway -> AWS Lambda The lambda's are running within a VPC and the SG / Firewall and segmentation have been checked and approved. We are also centralising our logging to Graylog to monitor for specific rules. The item that the PCI-DS...
The first time I forgot to take my mask off before using the facial recognition login to my Windows 10 computer, it wouldn't work (which I expected). After a couple times, though, it started logging me in before I had a chance to take my mask off. Is it a security issue that the facial recognition can recognize me with...
I am looking through a set of PKI certificates and key strings that are specified in a kubernetes yaml file. They are used for testing. Some of the strings are keyed (as in yaml key-value) as crt.pem. All of the strings have the following form: LS0... The typical encoding that I have seen for .pem files is ASCII base64...
I'm currently struggling with the implementation of CSRF in a web application. The application is (more or less) stateless. There is however a session that is kept in a (HttpOnly) cookie. As we use this cookie we are subject to CSRF. But as the session is the only state the application has, I'm wondering how I could do...
I'm currently going through Hacking: The Art of Exploitation and there is an issue I'm having with trying to overflow a function pointer. The code is located here. I'm trying to input hex code into my program so a function pointer can point at the jackpot function to execute it however I can't input it due to not being...
Not sure if things belongs in Crypto SE or here but anyway: I'm building an app and I'm trying to decide whatever is secure to protect user passwords in transit, in addition to TLS we already have. In server side, we already have bcrypt properly implemented and takes the password as an opaque string, salts and peppers ...
if a customer wants to monitor an IPSec-based site-to-site VPN and basically no incoming traffic is needed, would you recommend: a) setting up a permanent tunnel that can be monitored all the time and blocking all incoming traffic b) setting up a non-permanent tunnel (e.g. traffic to IPs of the encryption domain is nee...
I want to run an automatic scan on a web application made with Angular and JSNode. On this one I have access to different types of accounts. On ZAP OWASP I can select the POST request, it detects the parameters in the request, I show it which parameter corresponds to the login and password then I inform it of the diffe...
Context We recently added a feature that used a library whose API we misunderstood. Long story short, if user A sends a request to our web application, the library caches some result, and that result may show in a response to user B's request. Needless to say, this is a security bug, specifically, data from user A leak...
Years ago I created an account and put my reset email as example@yahoo.de by mistake, it should have been @yahoo.com. Recently, I tried to access my old account but could not remember the password. When I tried to reset my email it wanted example@yahoo.de, so I went onto the website but found out that Yahoo now only ha...
I have a bulletin on my site that all valid users have access to (read and write). User input posted to this bulletin is stored in JSON. Because of these qualities there is definitely some concern for XSS. Im hoping to figure out the best way to protect my app and its users when using this feature. Some thoughts: Valid...
I'm having an issue pivoting with meterpreter and portfwd and I am starting to wonder if what I am trying to do is even possible. My attacker (we'll say 10.80.6.3) machine has a shell on victim 1 and I have added a route to victim 2 machine which is in a different subnet. I managed to get a shell on victim 2 and in my ...
I once heard about a type of crypto system that behaves in the following way: I have x secret keys that work together to decrypt messages encrypted with a public key d. If I get at least n of the x secret keys together, I can decrypt messages encrypted with d in their entirety. If I have anything less than n, I get no ...
When I look at the trusted certificates in my browser, I see that many certificate authorities have multiple root certificates associated with them. For example, org-Amazon has Amazon Root CA 1, Amazon Root CA 2, Amazon Root CA 3, and Amazon Root CA 4. How do the purposes of these four certificates differ? I also see t...
As probably all of you, I got an email that was intended as a phishing attack. The HTML version of the email was pretending to be a Facebook email of a security warning. The links do lead to Facebook, for an account-switching crafted URL. I get that one. However, the text version of the email has something like this: ...
I'm going to sell a computer hard drive on the Internet, it's a 500GB SATA hard drive, I really used it 3 or 2 years ago, I never used it again, I used about 20 or 40% of the space. I have read about various tools and used Hardwipe, first I deleted the volume and recreated it, then with the program (option to clean fre...
How would you design a server/client system where a client is granted a key to encrypt/decrypt data, but the key could be revoked/redistributed by the server? Data encrypted prior must still be readable with the new key. A simple scenario: Client wants to send a document to a server Client encrypts the document with s...
I use a laptop running tails/tor to go to a public wifi spot like a coffee shop and set up a new email account on protonmail. Then I take that laptop to a park in the middle of the night where there's an xfinity hotspot and sign up for the free hour pass using that email. No cameras, no people, no harddrive in the lapt...
Our Product Manager wants a 4 digit pin for login in our app, obviously for UX reasons, so user don't have to remember their password each time when they login. A refresh token can be retrieved from backend to obtain a session token, which have access to the API. On our app, we encrypt the refresh token with AES and PB...
I visited a football site yesterday to stream a match online, and since then my connection is unstable. Like, I get connected at times and loses at times. I was over at my friends' and did the same and the network in his house was also weak while trying to visit that website, although I was able to visit the site using...
I'm trying to intercept a SSLv3 connection between a PlayStation 3 client and an authentication server of and outdated game to reverse engineer its protocol. I already tried to set up a simple MITM attack and copied every value from the original certificate. However, the client immediately drops the connection. I'm ass...
I am currently doing a bug bounty program and was testing the company's file upload functionality. After meddling with the functionality for a while, I was able to change the extension of the uploaded file to '.svg' using burpsuite. I have read tons of article saying that .svg files is equal to XSS. In my case I was no...
What do you suggest in order to take over a Windows Domain Controller, given the fact that you gained access to a domain user workstation and so you have domain user credentials? I have domain user credentials (unprivileged user), and so far I have done things like (unfortunately to no avail): Enumeration against the ...
Our company is developing an AOSP-based platform for our customer. Some of our vendor services are using HWBinder for IPC which is using SELinux to restrict service discovery and access. The problem is that our customer insists that SELinux restriction is not enough and we need to provide a DAC-based restriction as wel...
How can I know if a pc has a backdoor in bios, and how to know if there is an hardware malicious impairment?
I would like to know if the following ideas are feasible: Hash function is one-way function. Generate public key from private key is irreversible(asymmetric cryptography). User password entry -> SHA(or adding salt before hashing) -> hash value(as ECC private key) -> generate public key from private key -> save public k...
I checked established connections with "netstat" command in command prompt, and I found that there are some connections with ip's of microsoft (I checked ip online) that have http (and not https) connection established, they bring to some svchost.exe in a Win32 folder of the system. I know that http connections are not...
I am creating WebSocket server with rust and tokio and I want to prevent DDos attacks and spams. So I thought of creating HashMap and inserting IP address for 1 hour which i suspect is trying to do spamming or DDos Attack but will this also ban other innocent users for 1 hour sharing same NAT network with attacker ? If...
I have an application Foo that exposes a web-based portal as well as a REST API service via HTTPS. When a human user connects to the app Foo to use its web-based portal, the human user is first redirected to an OAuth2-based login page. Once the human user is authenticated, they are redirected back to app Foo and now th...
I’m considering developing a simple WiFi scanner and logging App that can run as a service 24 hours a day for months, passively collecting changes in the surrounding wireless environment with the following features: Log changes to BSSIDs, ESSIDs, signal strength, number of clients, etc. Displaying everything on a simp...
I am new to GPG so I may be going about this all wrong. I have some files I would like to encrypt symmetrically using AES256, but I want to sign them with my GPG key. I need to automate this process however so I'm using --batch and I pass the symmetric key after --passphrase. Since it needs to be automated, I've dis...
If my product is currently at EAL4, what is the process to get to EAL7? What additional paperwork or requirements would I need to complete?
What are the things which can be done with SSL VPN which cannot be achieved with IPSec VPN? What are the reasons to opt for SSL VPN instead of IPSec VPN?
If I move a file from a non-hidden encrypted drive to my main C drive, then move the original file to a hidden container on the encrypted drive, then wipe the original file with ccenhancer/secure erase, is that doing enough to ensure the original location isn't known? Or does Windows log moved files by default and some...
I was AFK from my Windows 10 machine, without locking it, and came back to an active TeamViewer session and someone remotely performing a PayPal donation. I do not have TeamViewer installed. I'll reinstall my machine and make some security changes, however I'm wondering: would the same thing have been possible if my se...
please help me out, I am confused in this.
I have a scenario where I have to install Kubernetes on a public cloud and access the Kubernetes via kubectl from a VM on my laptop. Kubectl accesses .kube/config to connect K8S API-Server to do the required operation. There is an application that is running as docker inside the VM and connects to K8S using .kube/confi...
I was told using iptables -P OUTPUT DROP after rules such as iptables -A OUTPUT -p tcp --dport 80 -m state --state NEW -j ACCEPT to accept what is required didn’t do much from a security standpoint. Is that true? This is what I am been using for some time (planning on implementing some SSH brute force rules shortly): i...
Is there way to execute alert box if " is not correctly escaped and can be injected in example below? <script type="application/json">{"requests":{"postClicked":"https://google.com"}</script> injection: <script type="application/json">{"requests":{"postClicked":"injection"}here"-alert()-"}</script> I have tried sever...
I have created a GPG key and uploaded it to pgp.mit.edu. Then I accidentally wiped the drive that contained both the key and the revocation certificate. So what to do now? I found a possible answer here. But how would I do this? And yes, this time I will keep my private key and revocation certificate safe this time.
I'm wondering whether git commit metadata can shred light on potential risk signals or vulnerabilities. Henry Hinnefeld has investigated this, here but this seems to be a way of detecting vulnerabilities which already have been spotted by other developers. Can anyone think how metadata alone can detect vulnerabilities ...
There's a few questions here along these same lines already, but they're nearly a decade old. I'd like to know if things have changed, especially now that Chrome has become more aggressive about asking users to save their passwords, and those passwords being associated with a cloud account. There's lots of rants agains...
I received a notice from maldetect on an Apache machine I'm running, and I've not seen an advice like this before. I'd like to get a better understanding of exactly what I am looking at. I received the following email from the system: HOST: TheMachinesName SCAN ID: 200811-0626.24321 STARTED: Aug 11 2020 06:...
I have a few developers who - well, let's just say I don't have much faith in their operational security. Time was, in the pre-COVID world, it was well understood that they didn't run IDEs directly off their laptops. That seems to have changed. Seeing progressively more requests for remote access to various resources...
To my understanding, password-protected spreadsheets are not best practice for storing admin creds, whether it's a company of 5 people or a company of 50,000 people. In such a case, what are some best practices for storing admin account credentials? My two cents: An obvious answer might be encrypt the data and store it...
I'm working on securing an application that receives SQL and HTML-like information that is actually proprietry formulas in some cases, and parts of XML documents in other cases. So the WAF thinks some HTTP requests are SQL or HTML injection attacks while they actually aren't. So how can I send these formulas and XML in...
Background I have an embedded Linux devices and need to invoke a subprocess. I try to avoid it but sometimes it's the most practical thing to do, e.g. calling networking commands like ip, networkmanager or doing data processing using an proprietary program. The simplest thing to do is to call system(3) but then these b...
The following is the encrypted text: EzKFKgakD7OXpc57py63jCSz9ICVWBxneruHDPqsVDhxDQElGztZwbyOx8Z/mV7GrzMzoCYHeaOCu81gHRzg4aIEusQCuPpoSFqgfhAKKniJYKW108KsVMdb2hmuax/fLCE+pr2ltRD+VMRMPOOB1N6TbCTyqRvKsnBcKFgjBqHgulDW9vbhcqRBKiaaT3kPDLcdkga/rxB/NX/cJUYY8V9zN7aYoQAGCduFDs3+IRQM2Nfi0B6pB/IATitn1bD6LjDCs2w+o0fzqcAH/b7VPoXrrta...
I use VeraCrypt for file-container level encryption for all of my files. But being very paranoid, I am always worried about the OS1, Primary applications and non-primary applications leaking the data.2 I am also tired of cleaning thumbnails, cache files among other things before shutting down my machine. A good solutio...
I know that if i used HTTPS the connection will established after the handshake so (the user will ping the the link then the server will give him public key so the client can provide him with encrypted data only the sever can de-crypt because only the sever have the secret key) now my question is why we use the ssl pin...
I'm implementing client certificate authentication. My server is behind a proxy to which I have no control of. And also I don't have any control over the client side communication. During every request, the client side sends an additional header containing the client cert. From the client help doc, If your server is b...