instruction stringlengths 24 29.9k |
|---|
A student asked me a good question today when I was explaining the concept of certificates chain.
As I said "if a CA is compromised by an attacker he can emit false certificates for the entities the CA is allowed to sign (e.g all the *.fr)",
he asked me : "why not signing each certificate by more than one CA, let's say... |
What the title says: Assume Alphanumeric characters. Some years back I vaguely remember that 8 characters was not really sufficient protection against brute-force, but any more characters it got to a point of reasonable security(?)
If found this answer which states that in 2018 a single GPU could crack an 8-character p... |
In our factory we have a "Big Machine" which runs 24/7 and requires input and monitoring from different operators across various shifts. Every operator needs to be able to stop/start/control all processes (which may have been started by another operator) and this involves seeing status-bars etc. on the GUI provided by ... |
I want to make a mobile app that will act as a Credentials Manager and store all my access information for websites, credit cards, secure notes, and so on on the server encrypted with REST API.
The plan is the following for the client:
The mobile app will be the client.
AES/CBC/PKCS7Padding encryption, master password... |
After learning about buffer overflows: In the 90's finding a buffer overflow nearly always meant you could exploit it.
Nowadays there are a lot of protection mechanisms like address layout space randomization, making memory either executable or writeable, stack cookies, ...
It seems to me that with only 1 protection me... |
By definition evil maid attacks involve altering a device in an undetectable way. So if I lock the BIOS, set the HDD to boot first and put a HDD password will this prevent it?
Access to the computer won't be possible as the HDD would be the first to boot and would ask for a password, so no one could try and brute force... |
Now that everyone is working from home using VPN, if infected by any malware, is lateral movement possible?
|
I'm uneasy that Jitsi Meet (videoconferencing stack) is Chrome-first (bug relating to other browsers are fixed later) and dislike Chrome for privacy reasons. Jitsi has an Electron desktop web-wrapper though which I want to try, but I'm just paranoid that not enough devs are verifying its code, and that a hacker could f... |
We are running a purple team which includes attempting to run a malicious PDF on the target system. The targeted user is well aware of the exercise so there is no concerns about an AV picking the payload up, or about prompts (the user can simply agree to them).
However, they have the latest version of Adobe Reader inst... |
When I started reading about honeypots, I could understand what is honeypot, how it works theoretically, i.e it is a trap-network that may or may not mimics a real network, but because of my limited thinking, what I could not get is, how exactly are they setup technically for any given network.
For example I have an IC... |
Situation
I have a university Gmail email address. I'm trying to migrate away from sending emails with the Gmail web client to one I have more control over like Thunderbird. It's also because Gmail eats up a lot of RAM. I set out to learn about and set up each of TLS, OpenPGP, and S/MIME with respect to email signing a... |
In his presentation, A Monitor Darkly, Ang Cui demonstrates how to manipulate images on the monitor by getting the firmware to execute commands embedded in a pixel contained in an image being displayed.
At first, he mentions that this is being done to a monitor with an firmware implant with the firmware acting asthe co... |
Correct me if I'm wrong, but it seems PIN is merely a password but only allowing numbers (and short max length on some services). That sounds very insecure to me, but many services are using it. Chrome Remote Desktop is one example.
My questions are:
Why PIN exists when we can use a password?
Is PIN insecure?
If any, ... |
I am involved in a project which deals with PCI-DSS compliance. Particularly, there is a requirement to implement FIM (File Integrity Monitoring) for critical devices.
Within these devices, there are unix-based firewall and routers, with specific vendors that are specifically NOT recommending installation of 3rd party ... |
As the title says: Should I consider my Azure tenant ID (GUID) as a secret? Are there any security implications when someone knows about this id?
|
Consider the following scenario:
client sends hello
server send a hello and its certificate
client generates a key and encrypts that with server's public key
server decrypts the key with its private key
So, they shared a key and can talk with each other.
What is the problem with this? Why does SSL require that the cl... |
SCENARIO:
a web application using with ASP.NET. In the home page source code there are links like:
./WebResource.axd?d=[string with 87 characters]
./ScriptResource.axd?d=[string with 172 characters]
where in the case of WebResource the string presents 3 underscores, like aaaaa_bbbb_ccc_ddd, where a's string is long 1... |
I trying to pentest website. I know that there are files named "file1" and "file2". The server is nginx.
So I did this test:
http://example.com/file1..%2ffile2 => 404
http://example.com/file1..%2f..%2ffile2 => 200 and it showed me file2, so it worked!
After this test I assume that the website is vulnerable.
So I di... |
I'm having a debate with a coworker right now about how to design an invitation system. The idea is that the mobile app will be able to send an invitation link to, say, a Whatsapp group, and people from that group will be able to use the link to join our system and be automatically enrolled into a group on our system.... |
Many online services use fingerprinting to track users - storing enough hardware and software details to create a unique record.
But what do emulators do? Can they make you completely anonymous on the internet?
Do Bluestacks or Memu use the physical device settings or do they use something else that will help avoid thi... |
One of my banks authenticate me using username and an one time passcode (8 numbers) generated by a hardware token they gave to me when I opened the account.
On the surface it looks like that as long as no one steals the token from me, then no one can generate those one-time passwords and log in on my behalf. But what i... |
Is it considered a good security practice to prevent users from easily changing the backend URL of a desktop application that connects to a backend server with an SSL protected HTTP API?
One concern is that malicious users could just point the URL to a test server and reverse engineer the protocol.
On the other hand, i... |
I'm new to Node.js and I have Node.js App with Vue. I use AWS S3 to server static JS file like app.XXXX.js manifest.XXXX.js vendor.XXXXX.js
So what is the security implication if a hacker can gain access to my S3 bucket and try to modify my static JS files?
Can they execute code on my main server?
|
I recently filed a bug report with Scapy, and while posting screenshots of Wireshark captures for reference, I decided to blank out my private addresses because I'm just getting into InfoSec, and am trying to be mindful of leaking potentially sensitive information:
In retrospect though, this seems overly paranoid.
I u... |
The VPN is used to establish a secure connection (creating a tunnel) to another network over the Internet. It masks our IP address and geographical location and also when the information enters the private tunnel on a VPN, it is always encrypted before it is sent across on other networks.
This private tunnel on VPN all... |
Nowadays websites start migrating to HTTP/2, but Burpsuite hasn't fully support HTTP/2 yet. I know HTTPCanary is good and support multiple protocols like replaying HTTP2 and even TCP/UDP, but that only available in Android.
Are there any similar tools that provide the same functionality as Burpsuite that already suppor... |
I'm looking at way to generate random numbers for cryptographic purposes. More specifically, I looked at the Linux /dev/urandom function, which is considered a real random number generator. There are others number generators such as the glibc rand() function, but this one is not considered sure for cryptographic purpos... |
For several reasons (I have an external monitor, etc.) when I booted the laptop I typed the FDE (Full Disk Encryption on Linux, LUKS) without looking at the monitor, and I ended up typing the full password and hitting enter before the FDE prompt was available. This means that when I looked at the monitor, I saw somethi... |
I recently made a new Facebook account from my android phone [ver. 6.0.1] and when I checked active sessions, instead of my android device a, Linux desktop was displayed.
Then I checked my Gmail and I found that an unknown Linux device logged in about a week ago in two of my Gmail and then I changed all of my passwords... |
I recently found this document: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-121r2.pdf , Guide to Bluetooth Security from NIST.
Unfortunately, there is nothing described w.r.t.actual protection of the communication other than AES-CCM is used. I am asking myself wether the BLE (v.4.2) communication ... |
I'm curious if there is a way to make user input safe for grep commands. I have a search box that should allow an end user to search a directory recursively for files containing a string.
I could accomplish this solely with PHP but grep should be faster and is therefore preferable so long as it can be made safe.
I will... |
After running cipher.exe on my entire C: drive, I'm still able to recover deleted files using recuva. In fact, doing a before and after, I see no discernible difference in the files that are able to be recovered after using cipher.
According to the docs,
the cipher /w:c:\test command causes all deallocated space on dr... |
I am using HTTP Basic Auth to authenticate the user.
Once authenticated, I set req.session.loggedIn = true on the server-side.
If a user makes requests after being logged in, for security purposes, should I just check the session loggedIn value or send the basic auth header on each request and then verify credentials o... |
I noticed a lot of companies do not have social engineering as in-scope of bug bounties/responsible disclosure guidelines, even though it is often used in real-world attacks. I understand that for popular bug bounty programs the amount of social engineering attempts would probably become problematic, but for small comp... |
I just found out that an e-commerce platform (similar to Shopify) I was planning on using allows me to see my password. I know I can't assume anything and I should (probably) just run away from it, but it got me curious: is there a way to do it securely?
I mean, what if they use the password's hash as an encryption key... |
I have a lengthy HTML form with around 20-26 file uploads required and some of them are even multiple. I am really concerned about how secure it is. I would really like to have some secure solution to it.
I am using phpmailer for my project. And rather then storing the file uploads anywhere I am directly sending them a... |
Needless to I say I have no idea how to do this.
I'm performing a pentest and I found an exploit related the box : https://www.exploit-db.com/exploits/44298
In the exploit comments, the author said :
if different kernel adjust CRED offset + check kernel stack size
I see there is a variable for CRED : #define CRED_OFF... |
What is the difference between SRVHOST and LHOST in Metasploit.
I am testing an exploit in my virtual lab of which I had to set both options. LHOST was an option for the payload selected, while SRVHOST was included among the options to be set for the exploit. I believe SRVHOST and LHOST should be the address of my comp... |
My company upgraded to an Extended Validation code signing security certificate, which was delivered via mail on a physical USB key, called a "token." The token contains a private key and the digital certificate, both generated by the Certificate Authority (CA). I was surprised that the CA created the private key. I... |
Since the early days of s3cmd I use it in combination with random generated filenames (uuidgen loop) and a complex passphrase (pwgen -n1 -c 32 -y). On security.stackexchange.com search there is only 1 result for s3cmd.
I use Amazon S3 (Glacier) for offsite backup of my personal files.
I wonder if this in 2020 still the... |
I have a pc with absolute agent (computrace) installed, will it be able to monitor traffic send over a private VPN? I.E. Not a free VPN, or will it still capture history via the browser history on the pc?
|
https://portswigger.net/kb/issues/00700100_cacheable-https-response
Applications should return caching directives instructing browsers not to store local copies of any sensitive data
Which CVSS vector I should assign to a web application which use Cache-Control: private for anything (also sessionID and pages with per... |
Recently I came across this password less login. For authentication, we need to enter an email address and click on a login button. We will receive a link in your email and when we click on that link we will get authenticated.
My question is how much secure it is because when we click on the link it is visible in the n... |
I have a scenario that I want to let people that visit my WordPress website download some PDFs. These PDFs go to my website as products of the Woocommerce plugin, so they are stored on the folder uploads/woocommerce_uploads.
At the moment, I don't want people to go through all the process of buying a free product. If t... |
While VLAN switches can be used to provide security between network segments using VLAN filtering rules. Is there any possibility to have an security issue which is exploited to VLAN switches?
|
The php.net page on the move_uploaded_file() function contains a User Contributed Note which says,
Security tips you must know before use this function:
First: make sure that the file is not empty.
I really cannot see how an empty file could be any more of a problem than a file that has either benign or malicious con... |
X509 is the name of the standard which defines Public Key Infrastructure and the format of SSL/TLS Certificates. My question is: What does x509 mean?
|
I checked my request logs and observed that URLs that seem suspicious are being hit.
Should I increase the security of my application using Cloudflare or block the IP addresses from where I am receiving these hits? Or are these hit by bots?
URLs from my request logs:
https://<my_ip_address>/Telerik.Web.UI.WebResource.a... |
While I was using a VPN, suddenly all websites refused to connect in HTTPS, and Firefox warned me since I enabled HTTPS-only mode. Is there a chance that this was an HTTPS downgrade attack? Should I treat my device as not safe to use right now?
|
Motivation
I want to develop a custom, local Firefox extension and investigate, if its installation has any impact on the browser fingerprint.
Background
Some time (years?) ago, there were articles advising against installing too many browser extensions,
as they would make the browser client more identifiable and track... |
A new Nessus plugin (140735 - HTTP Smuggling Detection) was very recently incorporated into Tenable's PCI template and is now beeing flagged as a "medium" vulnerability and causing scans to fail.
The only info in the scan report is:
A web server was discovered on port 80/443
The below information could make the Web se... |
As far as I know, in order to create a Golden Ticket, the attacker needs to obtain the krbtgt's password's hash, which is not a trivial task. My question is: is it possible to find the krbtgt's password by getting a legitimate TGT (encrypted with the krbtgt's password's hash) from the Authentication Server and cracking... |
I'm trying to build a system as follows:
User 1 is a low permission user. They will be using their phone and at some point will need to do a secure action.
User 2 is an admin user and will be in the same room as user 1.
User 2 will generate a temporary code on their own device (could be a phone or desktop), and then v... |
I'm interested in how I can secure my IoT devices from hackers. Particularly, I have a Xiaomi hub and a range of child devices for it. Also, how to secure devices that communicate using the Zigbee protocol.
I'm looking for some advanced tips. I browsed the web and all I could find are pretty basic tips like:
Create a ... |
I am a long-time Firefox user and remember that usually the UAC prompt popped up when Firefox updated itself. Some months ago (or is it years?), Firefox obviously changed the way it updates itself: I didn't see the UAC prompt since then in such situations. The updates were performed as expected, though. So far, so good... |
Once you plug it into a phone and power it on, the IMEI number of the
phone and the SIM's serial number will be transmitted to the nearest
cell tower(s).
source
Is there a way to spoof the location of a SIM/IMEI that is connected to a smartphone?
I remember a few years ago I played with XPrivacy (XPosed) but I saw an... |
How safe are we when we use phone hardware from untrusted manufacturers and use end-to-end encrypted communication like Signal and Telegram? Are our conversations really safe from keyloggers or spyware? And what is the best option to communicate safely?
|
My home router's configuration interface shows a device I don't know, connected via WiFi to my local network. According to the router's history, that device connected to it several days ago. It is named "PC-24".
I know for a fact that this device is not in my home. I have an iPhone connected via WiFi and a Windows lapt... |
Is this a good idea to make the following text message encryption:
accept text from the user 1
store the text into a document in the form of some handwritten font
convert the document into an image
apply noise to the image
encrypt the image somehow (hide the fact it is image)
send the image to the user 2
show the imag... |
So I accidently clicked some sketchy website called "doxbin.org" and in that website clicked a dox called "rapey org owner" and I realised I can't deletet search history because of my school administrators so I'm sooo paranoid do they see that I'm also on a school provided device so I am 99 percent sure they can see th... |
I am having trouble with some user input security. I have a Flutter app where users can submit comments that can contain text e.g. a-z characters, numbers, symbols and emojis. These are stored in a Firestore database.
I have performed checks to ensure the type of the comment is a string and not over a maximum size but ... |
Does a TPM replace the default device's security, or add to it?
I will try to re formulate it into 2 questions, just to explain what my question is, since I am not very good at English writing.
If we take randomness as a example:
Does the TPM replace the device's own ability to generate its own randomness?
(The rando... |
I've read different articles about https://1.1.1.1/ and am confused since they conflict. A couple examples:
effectively making your traffic invisible to snoopers on your local network but not providing an anonymised connection to the sites you're accessing at the other end - https://www.wired.co.uk/article/cloudflare-... |
A webapp has an img tag that partially takes userinput like so:
<img src="/blah/blah/$USERINPUT.jpg">
where the first / is from the root of the domain.
Could there be a vulnerability here? Potentially using ../ and then attempting path traversal?
|
A web server logs the client IP address but without the last octet due to GDPR, as well as other data such as URI, date, time, cookie, User-Agent etc.
Can law authorities identify a wrongdoer based on the logs from the web server, including the truncated IP address, and the logs from the ISP? I assume they have a subpo... |
Our organization is having problems with hackers/spammers. In order for them to enter our webpage, we require the user to enter an email address and we send them a verification code to that email address. At first, they would use a temporary email address (like @sharklasers) to get the code but we've since blocked th... |
I was directed to post my question here from stackoverflow.
Need some guidance implementing a policy. Specifically a block removable storage policy.
Let's say I have 100 computers named PC1-PC100. PC1-PC10 need to allow removable storage no matter whom logs in. Additionally, a couple user accounts need access to remova... |
We have a distributed product where one server acts as a 'Scheduler' of jobs and there are hundreds if not thousands of 'Agents' which receive commands from the 'Scheduler' and execute the jobs. The communication between the Scheduler and the Agents wasn't secured with TLS till now. We had a symmetric key encryption im... |
Let's say I have a website which uses 4 digit OTP based authentication for login i.e. users will enter their mobile number, receive OTP on the entered mobile number, enter the received OTP to login successfully.
I have an approach on how to crack such a login based mechanism if I have access to a subset of all register... |
In one of the applications I'm testing, the cookie contains the username (set:cookie: username) in the HTTP header. Is it possible to read these cookie values using any methods? The site uses HTTPS.
|
Let me prefix this by saying I am aware of how HTML e-mails can implement trackers and other malicious content, however this question is quite specific.
Consider a service where a company can register its users, and on certain events, an e-mail is sent to the user(s) of that company. Those e-mails should be fully custo... |
Having an Ubuntu server with current software, updated daily, every 5 days or so someone gains root access. I know that from log watch.
I search the logs for his ip and it doesn't show up.
He is probably using a VPN as once it's in china, then Athens, then Russia.
Even if I send the logs every 10 minutes to another ser... |
We are integrating our services with 3rd party companies (ie customers are able to buy the products of third party companies on our platform). These companies are asking us to provide to their security teams a penetration test.
Although we have several quotes from security companies for them to provide penetration test... |
The other developer and I have two different views on storing sensitive data. So, the token is only accessible at run time in a global variable right now, but I suggested moving the token to be stored in the Keychain and therefore encrypted, but he says that it is more secure to be stored as a global object because it ... |
How can I execute docker pull (with Docker Content Trust enabled) such that it fails if the image doesn't have a valid signature using the private key corresponding to (or subordinate to) the public key that I provide?
I just discovered that, in fact, DCT silently and dumbly downloads and trusts (TOFU) the root key whe... |
I have done the message header lookup but the problem is that the 1st result for the from field is blank, so I would like to know can someone with a bit more experience then the basic knowledge of reverse lookups give me some advice with the following header:
Received: from CO1NAM03HT178.eop-NAM03.prod.protection.outlo... |
I'm trying to figure out if I completely understand CSRF security properly. Based on this OWASP cheat sheet.
In all scenarios it seems like your frontend has to have the CSRF token somewhere so that when a request is sent to the backend, it can compare both the csrf token in the cookie/session to the request.
That way ... |
Have noticed that I can scan the network though I have set an arp limit rate on the Cisco switch switchport and need some recommendations.
The previous engineer set an arp rate limit of 200 and probably with good reason too... looking at you Windows OS! :-)
But that allowed strangers to connect their laptops to the net... |
I have a somewhat basic understanding of how entropy relates to password strength - generating a password with a truly random selection from some set (whether that's characters, or a set of dictionary words, or whatever else) gives increasing entropy as either the size of the set and/or the number of selections increas... |
I'm new to RFID blocking and find it interesting. I came across this video to learn more and just have 2 questions
https://www.youtube.com/watch?v=NKwJwOm3bfI
Why would Vaultcard (4:42-5:30) protect both sides while Antetoko (8:47-9:20) protects one side? Are there different types of shields I need to be aware of?
If m... |
I am doing WEP attack test using FMS method (Fluhrer, Mantin and Shamir), but not capturing enough 4,000,000 to 6,000,000 IV.
Please show me how to catch enough IV.
|
I suddenly see a strange thing when developing my Flutter application. My application that I'm developing is not asking for permissions, it does not need any permissions. But when I debug the app in my own physical Android phone device, I see that logs below which it looks like the camera is open and recording. I have ... |
Let's say we have an elf a and a textfile a.txt in the same directory.
The a elf is a program, that is remotely accessible/executable.
In addition a contains the instruction fgets(buf,len,stdin); and a remote attacker manages to get full control over the stdin object. Is the attacker able to reliably generate a file st... |
So with https, someone can still see what website I visited, but not which pages within that website I visited, correct?
why isn’t the whole process of connecting to a website - from when I start typing the website name on the browser - encrypted?
Is there a protocol/technology that actually provides encryption for t... |
If a user sets up a stock Android device to use a VPN and uses the "Always-on" setting, can they be sure[1] that no traffic will leak outside of the VPN?
[1] Assuming no malware is installed by the user and the OS is not trying to deliberately circumvent the VPN secretly.
|
Do commercial AV suites examine image files (pictures) for potential malware that might be imbedded via steganography? Is this a concern for most?
I deal with a lot of imagery data and am wondering what the risk of exposure is.
|
Inspired by the many data leaks where whole databases/tables with personal user information were leaked, what are best practices to protect those assets?
I‘m especially concerned if someone was able to get access to backend code (which definitely should not be the case) and therefore acquire the SQL credentials.
I‘m st... |
I have a browser extension. I would like to use this browser extension to send the cookie from site A to site B. I’m doing this because I want to scrape site A from site B, but this is obviously a use case browsers specifically designed against so I’m not sure how to handle it.
It doesn’t seem like I can use the normal... |
I am way out of my depth here. We have just had a pentest done, and we had one critical finding:
if (file_exists($includeFile)) {
$f_type = filetype($includeFile);
if ($f_info['extension'] == 'md') {
$markdown = file_get_contents($includeFile);
HTMLClass::show($markdown, FALSE, FALSE, FALSE, TR... |
Is https://div.show/options fraud/malware? I saw via https://app.uriports.com that a customer tried to load the page mentioned before and it was blocked thanks to CSP.
|
I am playing ctf and I have gained access to the target machine but not as root. I can see nohup utility has root access on the machine and I used this command to get the root access but that did not work:
nohup /bin/sh -p -c “sh -p <$(tty) >$(tty) 2>$(tty)”
-bash: $(tty)”: Permission denied
Can anybody please help m... |
I'm trying to crack a password, whose hash was formed by first concatenating a known salt, the password and and another known salt, then applying sha256 and then truncating that to 32 characters. So:
truncate(sha256(salt1 + pw + salt2)
How can I use JTR for example to help solve this?
|
I am pushing my way through some beginner level security readings and exercises (ECSA 1 & 2) without much of a networking background. I happened upon an interesting suggestion or command: to use nmap -sU -p 23 target to find out if a target is running a telnet service. I hopped over to the telnet Wikipedia page and fou... |
i got till moment when i do not know if it is secure!
If SQL injection is inserted into myTableTwo via safe PDO query will it make my query below SQL injection open? Is the query below safe?
$mysfield returns SHOW COLUMNS FROM myTable
myTable columns match myTableTwo columns
$sql = $pdo->prepare("INSERT INTO myTable ("... |
Since about 2 weeks, I am receiving from time to time (about 2-3 times per week) similar emails:
What do I have:
A VPS (webserver) with Wordpress, configured to send emails via SMTP, thanks to the WP SMTP Mail plugin.
A VPS - only mailserver
What did I do:
Upgraded wordpress, all the plugins.
Checked if there are u... |
Recently I was sent a WhatsApp verification code, though I did not ask for it. Later a scammer ask for the code, saying they "accidentaly" sent it to me. Now I am sent MojiLaLa verification codes. (I do not have that app installed.)
They are 4 digits codes, and I was just sent hundreds of it. So there is a good chance ... |
Alice just sent a message to Bob, but prior to that she had already sent the very same message. How can Bob prove that?
|
I am having a problems defining the flow of an application that is supposed to be authenticated / authorized securely with an SPA frontend. Currently using an SPA with a Spring application server as a backchannel / client for Oauth2. The spring application / client will be used to communicate with the IDP provider to e... |
I want to prove that the source code I am using is the same as the open-sourced version, which is publicly available. My idea was to publish a hash of the open-sourced version and compare it to the hash of the deployed server at boot. However, because the open-sourced hash is available pre-deployment, it is possible fo... |
We have most of our SSL certificates hosted at GoDaddy but have Standard Code signing certificate from GlobalSign, we would like to switch to GoDaddy CSC since our CSC from GlobalSign is expiring in 3 months.
How would this affect MS SmartScreen, would we have to build our "reputation" again? Or does MS only care about... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.