instruction stringlengths 24 29.9k |
|---|
I'm having trouble making sense of some reported CSP violations that don't seem to actually be violations according to the CSP standard. I have not managed to reproduce the violations in my own browser, and based on my own testing I believe that the block is the result of a non-compliant browser. That seems like a bo... |
While 2FA is clearly an improvement over only a single factor, is there anything which prevents an adversary presenting a convincing sign-in page which captures both factors?
I realise that technically a MITM attack is different to a Phishing attack, though at a high level they're very similar -- the user is inputting ... |
According to the CySA SYBEX book, in chapter 1, power failures are listed as both environmental threats and structural threats... but which one is it?
According to the book:
Environment threats occur when natural or man-made disasters occur
that are outside the control of the organization. These might include
fires, f... |
Please excuse the lack of details, you can understand why. I have a friend in a foreign country who is certain that he is a surveillance target of his local government. Other people he knows in his same category have already had their internet connections spied on, and seen contents of their emails leaked. He refuses t... |
I have a hard drive used for years, there are windows and many personal files on it. What I called "files" are images, musics, documents (pdf or docx), but not programs. All the "files" were not initially infected. As I said in the title, the hard drive may be infected by malware (I did not safely use it).
My question ... |
I am a contractor who does development for more than one client. Let's call them Client A, Client B, and Client X.
I use my own laptop for all 3 clients.
Throughout the day, I have to work on and respond to emails and instant messages about projects for all 3 clients.
In order to work on Client X's project, I must be ... |
I am looking for some compromise with integrating E2E encryption for web app (basic FE and BE).
Basically I read about two concepts which are truly E2E encryption and not that much complicated.
Using two passwords, when one is for login and second is for encryption only used only locally on client device. Something li... |
I am currently trying to learn HTTP Request Smuggling vulnerability to further enhance my pen testing skills. I have watched a couple of videos on Youtube and read articles online regarding it but still have a couple of questions in mind:
What are the attack vectors of HTTP Req Smuggling (Where should I look)?
What is... |
I am using VNC GUI client from my Desktop to connect to a remote (ubuntu) server, say S1. From the remote server (S1), I will be logging into another server (say S2) via SSH. Via VNC client, I will be typing in the SSH password of S2 on putty running on S1 to gain access to S2. Is this a safe way of doing things?
|
I have a piece of code that is using a certificate for authentication with a cloud service.
The certificate is stored locally, and is protected by a password - thus what the developers did is to hardcode the password in their code.
I was wondering if there is a more secure method of performing this, as if the piece of ... |
I am not an expert, but as far as I understand, ransomware will encrypt files and (for an undefined period) decrypt as well, so it appears all is well. At some point in time, the decrypting ends and your files are held hostage.
A backup can help restoring the files, but my question is how to detect the files are not al... |
Let's say I want to give some data to Bob. I have his public key. I tell him to generate a digital signature for text "{some_stuff: 1, nonce: 2}". After he does that and after I verify it's the right signature, I give him the data. I use a different nonce for each session. Is there anything I need to be aware of? Is it... |
Assuming you only use mainstream software like Firefox, Thunderbird and Libreoffice, and update/upgrade every day and use strong passwords and encryption. I know this is probably a very basic and unprofessional question for this site, but I get mixed messages regarding what the best choice is for someone paranoid about... |
The card was a 16gb SanDisk micro SD card (monolithic).
|
I have a virus in my explorer.exe file. Because of that virus the desktop screen gets black sometimes. Then i have to open task manager, browse the explorer.exe file and open it. This solves the problem. However when i attempt to remove this virus, most of the antivirus don't detect it and those who do are not able to ... |
With old HDD to secure delete a file you need to use Gutmann standard, but with new HDD you can use only 1 pass overwrite
I'm not sure what hard drives mobile phones use and don't know how many passes will be okay for secure deleting files on phone.
What standards are okay to safe delete files on phones? How many passe... |
I am trying to gain access to a server using CVE-2019-15107 with help of metasploit. I tried to find examples of its usage, but I found none.
My machines ip is 192.168.109.133. I am connected to a vpn where I have access to the target at 192.168.208.32. At port 10000 Webmin is running with version 1.890, which is susce... |
It seems like all the google results to this question answer what port scanning is, but go into little detail about how a pentester or hacker could use the information about what ports a network has open to leverage an attack on it.
Why do vulnerabilities arise by scanning and finding open ports, and what are those vul... |
I want to build a group chat app where messages are transmitted and stored as securely as they can be, but where the message history is still visible after you or others in the group have changed devices. From my understanding, PFS isn't possible here.
It seems that WhatsApp has implemented PFS, which makes sense becau... |
I recently went on to the Dr Squatch website to buy some soap that I've been seeing in all of those Youtube video ads. What happened really freaked me out.
The website asked for my email, and I provided my outlook account. Immediately, my cell phone buzzed with the text message sound and the website asked me for a six... |
So i started to use VirtualBox in windows 10 and i would like to know if those alert from my windows 10 security program (avast antivirus), during my installation/upgrading of TheHarvester program at virtualmachine Kali Linux of VirtualBox will cause any threat or harm to my personal computer? ( I am really concerned a... |
Hi guys the company I work for gave me an awesome laptop but I don't want them to spy on my personal activities (they have lots of Spyware and security).
I am, however, able to boot from an external drive and the laptop has a thunderbolt 3 port. So it's perfect for booting externally with my personal HD.
I'm not sure... |
Would my laptop be secure against physical access if I set up a bios password and full disk encryption ?
If not then is there any way to secure your laptop from someone with physical access?
How hard would it be to hack into such a laptop? How long would it take? What methods would be used? Does it matter if the hacker... |
Logwatch shows that proftpd was tried to be logged into using root
0.0.0.0 (111.254.68.221[111.254.68.221]) - SECURITY VIOLATION: Root login attempted
I found:
Normally, proftpd does not allow root logins under any circumstance. If a client attempts to login as root, using the correct password, a special security mess... |
I wanted to know my external IP address from the command line. I found this answer on Ask Ubuntu: Command for determining my public IP? which suggests to use
curl -s https://checkip.dyndns.org | sed -e 's/.*Current IP Address: //' -e 's/<.*$//'
But the address https://checkip.dyndns.org is detected as malicious on s... |
A lot of websites scanned with securityheaders.io are missing different headers.
Should all of these headers be reported as findings or just few of them which are more critical?
|
The conundrum
My wife’s laptop has been running openSUSE Leap 15.0 for several years, and she has once or twice been flummoxed by this prompt at the very beginning of the boot sequence, most recently this morning:
Trust openSUSE Certificate
Do you agree to use the built-in openSUSE certificate to verify boot loaders a... |
One of the approaches in order to prevent Sybil or DoS attacks is CPU-bound PoW. However, because of the influence of Moore’s law, the memory-based approaches are suggested.
As actually there are two different terms: (1) memory-hard functions and (2) memory-bound functions;
Does it mean that we have two different memor... |
I'm assessing the security level of a webapp and one of the test cases is the CSP header. I always use the Google CSP evaluator to assess the header. Let's consider the following CSP header:
Content-Security-Policy:
img-src 'self' https://example.com data: www.google-analytics.com;
object-src 'self' https://example.c... |
Cloudflare enables several options regarding the communication between its servers and our own.
"SSL Full" means Cloudflare encrypts the traffic but doesn't check the validity of our servers' certificate.
"SSL Full (Strict)" means Cloudflare encrypts the traffic and checks the validity of our servers' certificate.
I am... |
I wonder if the lack of an SPF DNS record is a factor in the decision to mark a message as spam.
I understand that an SPF fail is definitively such a factor, i.e. when SPF is configured, but a message has "MAIL FROM" / "Return-Path" domain not on the list in the SPF record.
But is the consequence of not setting SPF onl... |
SCENARIO:
user input is reflected inside a variable.
For example
url.com/?a=hello
is reflected as shown below
var test="hello";
I tried to evade from the variable with payload like hello"; or hello%22; or hello%2522; but unsuccessfully.
All these characters are reflected without encoding: .[]{};:{}\/?|_-+ so i can u... |
Assume in a distributed network, where the nodes are not trusted and are identified by their public keys, we intend to select one of them in a random process. In such a situation, all of the nodes have the same chances to be elected.
Since the system is not centralized and there is no trusted server performing the elec... |
I am using the following command to create a certificate sign request file.
openssl.exe req -new -key clinetkey.pem -out client.csr" -config client_cacert.cnf
where client_cacert.cnf has the following content
[ req ]
default_bits = 4096
default_md = sha256
distinguished_name = req_distinguished_name
x509_extensions = ... |
From time to time, questions come up in this board concerning web applications that utilize client-side cryptography (or ‘in-browser’ cryptography), where these applications claim to be designed in such a way that the operators of these applications have ‘zero-access’ to users’ private information. See links to severa... |
In general, CSRF protection means this: "compare <input type=hidden> with a value in user's session" (or sometimes - user cookie).
Now, suppose I want my app/website to be iframe compatible (while still protecting from CSRF "session-riding" attacks).
However, newer browser versions will disable setting a cookie inside ... |
I recently received a call from a number I didn't know to my mobile, answered it anyway. I didn't say anything, when it is a number I don't know I let the other person speak first.. after a few seconds line went down, tried to call back but phone just made an odd noise instead of ringing and it was similar to a fax but... |
I have been reading a bit about the deep web and the dark web, and that you need to connect to the onion network through a VPN to navigate anonymously.
I'm currently using Tails and its default system: onion circuits. I have read that onion circuits is just a free VPN, is this correct?
I have read as well that, to chec... |
I don’t understand the password vs. passphrase analyses that I read. Let me explain.
Here is a pass phrase. It has 5 words using only lower case (I’m ignoring randomness for this purpose): friend house jump touch kiss
When I enter that passphrase, it looks like this: ••••••••••••••••••••••••••••. That’s 28 characters... |
A few days ago I joined a stream on a youtube channel that I later discovered was being hacked.
That got me thinking. Is it possible to have been infected with some type of virus just by accessing the stream (By this I mean that I didn't click on links or add. I just opened the stream on the youtube page)?
|
Several of my Spring Security based projects expose a RESTful API that support the full range of HTTP verbs: GET, POST, PUT, PATCH, DELETE, etc. For those projects only using GET and POST, everything works as expected. When using PUT, however, I encounter CSRF protection issues that usually lead me to disable CSRF prot... |
How can I build a simple website that contains SQL injection vulnerabilities for study purposes? What do I need to learn?
|
My J2EE application is vulnerable to HTTP header injection attack. I want to make it secure from this vulnerability. Also, I am searching if any library (Maven dependency) available for this.
|
Say youtube.com wants to generate their new certificate. How certification authority verify that the request came from youtube.com, not from a party pretending to be youtube.com?
|
From my understanding, TCP spoofing can be carried out if the attacker can correctly guess the sequence numbers from the response packets (to mimic the real client). The attacker may even obtain this sequence of numbers via sniffing. Furthermore, a trusted connection must already exist between the target client and the... |
Should the cookie secure flag be set on websites which are served only through HTTPS?
The Secure attribute tells the browser to only send the cookie if the request is being sent over a secure channel such as HTTPS
Let's say the victim connect to https://example.com and there is no http://example.com.
How can an attack... |
When I receive an email sent by someone using a webmail service (e.g. Gmail, etc.), I can find the IP address of the sender's email server in the email headers.
But do the email headers also contain the IP address of the desktop (client) computer used by the person who sent the email?
Would it be the case if they use s... |
I consider running Android applications in Anbox instead of running them in a virtual machine (Android-x86 in GNOME Boxes using QEMU with KVM). Does it increase the chances that malicious code in an Android app will get unauthorized access to the host system user's files?
According to Anbox.io website:
Anbox puts Andr... |
I want to install a Chrome extension called metamask. I do not trust this kind of software. (Maybe because I am a newbie)
What can a Chrome extension do on my computer? Is it possible, for example, for a Chrome extension to read a local file, sniff my network interface, perform keylogging?
Does Chrome extension run in ... |
Problem
Consider a standard sign-up form (user enters an email address, we send a confirmation link).
Even limiting that form per IP (or even globally per hour), I'm concerned about abuse:
Our real-world reputation would be harmed if someone enters plenty of (publicly known) email addresses of companies in our geograph... |
Does it still make sense with multi factor protected accounts to deactivate them after a certain period of inactivity?
I'd say yes because the user himself probably doesn't remember that an account exists when they aren't using it.
In fact we've had several VPN systems before, during the rise, and after Covid was "esta... |
I am developing an internal web application. I think it would be a good idea to secure the local web server with an https certificate. I read several postings recommending certificates on local servers. This is a large company with its own Certificate Authority, i.e., the Networking group creates the certificates. This... |
I am currently adding single sign-on functionality between my application and an electronic health record (EHR) system. The SSO is done using the OpenID Connect authorization code flow, but unlike a typical OIDC sign-in (i.e. signing in with Google/Facebook/etc), the EHR system initiates the SSO process (IdP-initiated)... |
I have started to work on the Forgotten password feature on my website. Based on OWASP Forgot Password cheatsheet, the user should provide enough information to confirm that it is really them.
The system currently is working as follows:
The user clicks on forgotten password link on the login screen
The user fills in a... |
Looking at a plain system (there are no security controls implemented yet), we need to think about its functions and derive appropriate assets which we'd like to protect in order to ensure the system continues to function as intended (also making sure no intellectual property, private data, etc. are leaked).
My questio... |
I have an CrowdStrike EDR and it seems like the only way to disable this on all OS is to provide maintenance-token or ask CrowdStrike to disable the defences so you can uninstall it. I also have a Carbon Black laptop and this seems to be the case in that you cannot disable it even when loading Services through an admin... |
I've been reading about famous hacking groups targeting law firms, corporations and individuals. They always use remote access backdoors to get into a victim's computer or phone and lock the system with ransomware or steal files and information. This made me wonder if there's a way, no matter how complicated, to close ... |
Let's say you want to "break" all remote access capabilities on your rooted Android phone and your Windows PC. What do you do or delete so remote access is truly broken and can't be used (by a hacker)?
|
I have a test certificate chain that I generated and it fails the openssl verify command:
openssl verify -CAfile ca_cert.pem -untrusted intermediate_cert.pem server_cert.pem
The output I get from the command is :
C = US, ST = CA, O = service, CN = service Test Cert
error 20 at 0 depth lookup: unable to get local issue... |
Background
I am trying to achieve a meterpreter session on a test machine (the "victim") that I already have a shell session on. When I run the command sessions -u #, where # corresponds to the number of the shell session, I receive an error because metasploit tries to create and execute a payload on the victim in the ... |
The security branch of my company worries that the use of older versions of OpenSSH (pre-7.4), where the only Key Exchange Algorithm available is SHA-1 is a major security issue. They suggest generating new public/private keypairs for all users in the infrastructure.
As a Linux admin I'm supposed to be making a plan fo... |
How can I list all of the Docker Content Trust root keys on my system?
I am setting up a CI process that will use the debian:stable-latest docker image to build my application's releases in ephemeral cloud instances. I want to make sure that every time my fresh build system does a docker pull debian:stable-latest, it d... |
I was cleaning out my spam folder, when I saw one with a subject line which had a little-used password of mine. 16 hours ago. I'm fairly sure odds of guessing this password are small, so I looked.
The email comes from mediajobboard.com. If I put that in my browser, it redirects to mediajobboard.thejobnetwork.com, and t... |
I am new to backend development and read about Authorization methods such as Basic, Bearer and OAuth 2.0.
I haven't use any of these directly, but used a token based implementation.
User logs in with username and password -> if (correct) then generate token and send token to front end.
The token is a encrypted value of... |
I would like to bid for contracts where ISO27001 certification is a requirement. I build cloud based bespoke software.
Although I take security extremely seriously - I don't have any formal processes at present. I just try and follow best practice.
How feasible is this?
I assume that ISO27001 is all about processes, ch... |
I have recently been introduced to GPG signing as a better way of verifying data than hashing. It was described that if you posted the hash of the file, someone could hack your website, alter the hash and publish a different binary and you'd be non-the-wiser. GPG signing was a way to overcome this. I'm not entirely sur... |
I am trying to grasp some basic principles of security in Linux (I used Centos 8.0 and Kali 2020 in the example below).
I found that providing you have an account in a particular system that is in the /et/sudoers and its entry is ALL=(ALL) you can execute every command with sudo.
Having said that, we can use less with ... |
I'm building up most functions out of opensource projects; honeypots, firewall, ERP, CRM, PBX, physical security, software security, network security, security government, asset policy management, etc.
I'm doing as much as I can in order to minimize risks but in the worst scenario, let's suppose my company gets comprom... |
Intoduction to Cloudflare WARP
I’ve been looking at Cloudflares WARP app for mobile. It claims to be a VPN but without some of the IP hiding anonymity features normal VPNS have: “Under the covers, WARP acts as a VPN. But now in the 1.1.1.1 App, if users decide to enable WARP, instead of just DNS queries being secured a... |
In the verbose output of hping3, what is win=x. For example,
len=46 ip=4.2.2.1 ttl=56 DF id=32841 sport=52 flags=RA seq=2 win=0 rtt=285.4 ms
len=46 ip=4.2.2.1 ttl=56 DF id=32842 sport=52 flags=RA seq=2 win=29200 rtt=245.4 ms
|
I've been trying to optimize my site's speed and noticed that many websites have low "Initial connection" and "SSL" times while mine are generally double of most sites that I've tested (over 110ms and 60ms, respectively). I optimized the delivery of the certificate as much as I could and it still takes the same amount ... |
I saw a refurbished router on sale on Amazon for a good price and wanted to buy it.
How likely is it that someone could buy these routers, install a custom firmware with spyware? I know spyware has gotten advanced enough that it can mimic the router's auto updater, over ride the factory reset button with a fake dialog ... |
For about 20+ years now, Microsoft Office macros have been used to spread malware. Even in recent years those threats have not disappeared and they often resurface in one form or another e.g. World’s most destructive botnet returns with stolen passwords and email in tow and It’s 2016, so why is the world still falling ... |
The Telegram FAQ's state that they are not able to comply with court orders from one country alone because they "split the encryption keys and spread them over multiple jurisdictions".
To protect the data that is not covered by end-to-end encryption, Telegram uses a distributed infrastructure. Cloud chat data is store... |
Regarding the insecure transmission of data over a network.
When it comes to plaintext credit card information and payment details being transferred in this manner over HTTPS. What are the possible methods of attack or vulnerabilities presented to a system administrator over the network API, if any? If so, are they str... |
Suppose A and B want to create TLS secure channel.
But they do not have pre-shared secret, or mutually trust Certificate, How do they do?
|
Question is the title. To give a bit more information, the same key is used for all ciphertexts and I know ciphertexts C1 and C2 and plaintext P1, which corresponds with C1. The incrementing method for each Ei is also known. I want to find P2.
I can't seem to find an answer since the IV is not known. The first step I t... |
I want to create a list of passwords to perform dictionary attack. Please show me how to build a password dictionary file. First, I gather information from users like hobbies, date of birth, favorite animals, etc. What should I do with this information?
|
For testing purposes of a logging solution, I would like to simulate an attack by using Metasploit against a Windows 7 / Windows 2016 server. However, I am struggling to find a reliable exploit that actually spawns a root shell on the victim machine.
Initially, I tried to identify a reliable MSF module to be used durin... |
For my essay im writing about digital signatures. Lets talk about an advanced digital signature which works with PKI (private-public key infrastructure). For example, im using ValidSign or GlobalSign service to digitally sign my document, do they have my private key to sign the document, or is it on my own machine? Im ... |
Lets say I have a site at myapp.com that talks to the api at myapi.com. For that to work I have to turn on CORS. I want to do it like that:
Access-Control-Allow-Origin: *
and my API authentication is performed via a custom Authorize header (with e.g. Bearer token).
As far as I can see it is safe to do since an attacker... |
Now in order to be familiar with a site's table , I need to dump the last row of a table named "account" . can you please tell me what parameters I can use to dump only the last row of a certain table? Here is the command I'm using for table dump . How should I modify it ?
screen python sqlmap.py -u 'URL' --identify-wa... |
I want to create Password Manager where users can create their accounts and store website passwords.
For the frontend, it will be a mobile app, but I need REST API as the backend data where the data will be stored.
I thought to encrypt and decrypt the data with AES, but then I need to exchange secret key in a secure wh... |
I uploaded my backdoor (made using msfvenom) and executed it on the remote machine. I'm able to connect to it using multi/handler , but after a while I get disconnected and then when I try to exploit again, I see the following behavior:
Multiple sessions keep opening, but they don't fully open (there is no Meterpreter... |
A web server allows to use HTTP methods like DAMN, FUCC, PASTA with the same effect as a GET request: for example executing GET /this.txt brings to the same result as PIZZA /this.txt.
Is authentication bypass the only way to exploit them?
|
After reading an article from a forensics software company. I'm worried about attacks that may be able to recovery the OTFE(on-the-fly encryption) key of VeraCrypt from RAM.
Thereat model:
On Windows, a signed spyware running elevated is able to access RAM or page file.
It tries to locate the OTFE key during or after ... |
I use the RSA SecurID phone app to connect to the VPN at my work. I run the app and type a 4 to 8 digit PIN. Then the app gives me a 6 digit code to connect to the VPN. Does the PIN change the result? What if I type the wrong PIN?
|
I have a file /tmp/urls which has following URLs:
http://127.0.0.1:8081/?id=1
http://127.0.0.1:8081/?id2=1
I am using this command to perform checks on file URLs concurrently:
python3 sqlmap.py --threads=5 -m /tmp/urls --batch
Both of these URLs are vulnerable to SQL injection, but sqlmap stops after it found SQL inj... |
I try to bypass a XSS filter to trigger a XSS in url context.
But the problem this following char is blacklist ' :'
The site allow the user to use some basic html balise like h1, h2, h3, p, a, u, etc ...
The only potential vector attack is to trigger the XSS with this <a href='javascript:alert()'></a>
But the problem ... |
So basically, i was just playing games as always, and I get a voicemail. It reads-"396 (random numbers just incase the numbers are sensitive information), goodbye" It sounds automated but i'm not sure, should I be concerned and do something or just ignore it? FYI, somebody kept trying to break into my account before th... |
I'm specifically concerned with EdDSA being made FIPS compliant, which I realize might take longer with the concerns raised with ECDSA, but I'm curious what the process actually is.
Is it all internal to NIST with just the Public Comment Period being the only transparency we get in the process?
|
I am from Pakistan and Paypal does not work here. I was in contact with a Paypal representative today and he advised me not to access Paypal from Pakistan else they will permanently limit our account.
My business is registered in Dubai but we operate from Pakistan. Accessing our account almost daily is a must and I hav... |
My current project contains multiple heterogeneous TCP servers, but our IT guys have clearly declared that they will give me only one 443 port, which is fair enough.
Two options are on the table now. One is VPN. We can set up a VPN server inside our cooperation and implement the access control. The other one is to i... |
In addition to the authentication techniques that are based on “something you
have”, “something you know” and “something you are”, authentication techniques that consider “somewhere you are” are also used. Why? Does it add further security?
|
I'm currently studying binary heap exploitation (mainly the glibc (ptmalloc2) implementation), for CTF competitions. The problem I'm facing is debugging challenges designed for a certain glibc version. I know there are some differences between (for example) libc 2.27 and libc 2.31 that can make the exploitation of cert... |
Let's consider a stack that grows downwards and a function that has a local variable for a buffer that takes 100 bytes of memory.
So, reading from top to bottom, it would be a 4-byte long return address, a 4-byte long OLD BP and the buffer.
Now, supposing that the user provided a 108-byte long input, there would be a b... |
I've read/watched a lot about Quantum Computers, trying to really get into the physics of it. Seems like the topic is poorly explained. I do understand that it takes a lot of qbits to beat modern encryption, so there's no concern for a while longer.
So while I do see lots of articles/videos claiming Shor's algorithm wi... |
While increasing my communication security as much as possible, I came across OpenPGP & S/MIME and already use an OpenPGP key pair in both of my mail clients (PC & smartphone).
I believe the CSR must be generated based on a truely private key, hence a CA generated one is unacceptable for me. Unfortunately, I struggle w... |
I read about an attack on the TESLA protocol which will be used in Galileo's navigation message authentication (Full article can be found here: https://doi.org/10.1007/978-3-319-49806-5_1)
Basically, an attacker delays all messages to make the receiver change their time. The receiver believes that he is synchronizing i... |
I am trying to make sqlmap to avoid fetch data from stored session. How do I achieve that? I have performed sqlmap check once on a target and now that target is offline, I want sqlmap to just stop the checks if target is offline and even if target is online it should recheck it not just show the data from stored sessio... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.