instruction stringlengths 24 29.9k |
|---|
I have an API that is handling a lot of volume and is using Basic authorization. This is causing me some performance issues and I'd like to move to token based auth but for various reasons, including problems forcing integrated parties to migrate to a new API version, I am unable to do so.
So, for the time being I'm st... |
I've recently implemented an OAuth server functionality to our service. I've consulted OAuth 2.0 Threat Model and Security Considerations and addressed most of the concerns. I am curious about any best practices for generating authorization code and access_token.
Our backend is written in Node.js, so I am using uuid v4... |
I'm developing a web-app which communicates with an external email message application through its HTTP API. My web-app consists of a JS (Svelte) front-end and a Node.js back-end.
Each user on my app will be getting a different API key for each email address they sent from. A single user could, for example, be using 1... |
I'm familiar with password managers like KeePass, and that there are a variety of interfaces for them. However, I've decided that I rather like the charm of pass. It's command-line oriented, and generally just really good. I can use git to make sure that I sync my PW store across my different machines.
However, if you ... |
I'm trying to improve my wife's password hygiene, and have now finally got her to use different passwords for different sites. She now has trouble remembering to keep the book of them to hand. She flatly refuses to learn to use another program, like KeePass (Excel, Zoom and a web browser are pretty much her limit).
Eve... |
According to RFC 6749 the strings [scopes] are defined by the authorization server.
However isn't it really the resource server who defines the scopes? I mean scopes vary from resource server to resource server, no? Even if they are registered with the same authorization server.
|
I've got a server that has domain and an SSL Certificate issued to that domain.
It's expected behavior that when an IP address is browsed, it redirects to the domain name of the server and the SSL Certificate is valid. e.g:
https://ip => https://example.com
In my case, if I put in the IP, it stays as an IP in the URL ... |
A client says they can't accept password-protected PDFs to put in their payroll system, so I have to send them without security. I don't want to send unsecured PDFs via e-mail because e-mail is inherently insecure. I figured a good alternative was, instead of password-protecting each PDF, I could encrypt the containing... |
Let's say I have this piece of code that changes the 10 address to the value 20 and the following one to 30
mov ebx,10
mov [ebx],20
add ebx,1
mov ebx,30
How can the address change each time it is executed?
is it require change that the compiler do to allow it
|
Someone sends me a link. Whatsapp shows its preview. How can they do that despite being E2E encrypted?
|
I received a decrypted file back from the hacker as proof that he could decrypt my files affected by his DjVU ransomware. Is it possible to find out which key he used to decrypt the encrypted file?
|
With increasing password complexity requirements, I've found myself just hitting forgot every time on almost every website, because it has become more convenient. It made me start to wonder, what would be the security implications of just requiring that same process for every login, given the current push for 2-factor ... |
I'm trying to evade the HTML sanitizer in a field I found more vulnerable in my application to test some XSS injection.
The field that I'm trying to exploit is a dropdown with the following code. The vulnerable field is this classNameId, which consists of a "class name - class id" from the database.
<in... |
QUESTION: Can an empty, but used, usb flash drive that has NO firmware within it be infected with malware?
I have been told by a networking and security expert that malware will only attach to (write to) firmware on an empty microsd card or empty usb-flash drive; that there is no where else for it to write to in this c... |
This is related to https://crypto.stackexchange.com/questions/48622/how-safe-is-xor-with-multiple-independent-but-non-random-keys but not exactly the same question.
Let's say there are three different vendors in the market, they sell a product called preprinted key tag. A preprinted key tag is a stainless steel card en... |
I am using an Android app downloaded from playstore and wanted to know whether the app uses Webview.
So, I tried intercepting the network calls with the help of Charles (proxy) and I found out that page is actually a webview from coming from the server and has the following code.
<tmpl>
<scrs>
<scr si="10" ... |
Given
Attacker is targeting a user of bank.com.
bank.com uses SMS or Google Authenticator 2FA, where the user enters the 2FA code into a form.
Scenario
Attacker registers domain name baank.com
Attacker creates a web page that scrapes the login page of bank.com and presents it from the domain baank.com (or working as... |
I use Google Firebase Services. I am thinking about using only https on mobile to send and receive a payload from my server. I will have RSA encryption with a public key on all clients. So when a client wants to call my server, it'll only get encrypted data. But if the client calls my server to get data, it will be fir... |
Imagine I am using VPN service app on my PC and I am logged into a website. Then the PC enters sleep mode.
Disconnection sequence of sleep mode I suppose: first browser, second VPN. And for re-start mode: first VPN, second browser.
When the PC wakes up, will the VPN start first? Is there any way the website can registe... |
How to detect where the issue on my server is, and whether the server is being used for cryptocurrency mining?
I just received an email from Google and my server stopped working.
Dear Developer,
Our systems identified that your Google Cloud Platform / API Project
ID HelloWorld (id: fair-solution-555555) may have been... |
DOM XSS and client prototype pollution-based XSS have one thing in common, we are modifying the pre-existing JavaScript code to popup an alert(1). Will CSP mitigate XSS in this case? Theoretically, JavaScript is already there and we aren't inserting new JavaScript, just modifying the existing code, so it makes sense th... |
I need to encrypt some sensitive fields back and forth in browser and server, same goes for decryption, for this I am planning to implement AES algorithm, but the problem here is with secret key which is exposed to the client side.
I got to know about this Envelope/Wrapped Key Encryption which used shared public key fo... |
$patterns[0] = '/[^[:print:]]+/'; // remove non-printable characters
$patterns[1] = '/[ \t]+$/'; // remove whitespace at end of string
$patterns[2] = '/^[ \t]+/'; // remove whitespace at beginning of string
$patterns[4] = '/^[\\\\|\/]+/'; // remove leading slash if one exists
$patterns[5] = '/^[\.... |
There are three ways for a TLS client to obtain Signed Certficiate Timestamps (SCTs):
During the TLS handshake itself using the SCT List extension
As embedded precertificate SCTs in the leaf certificate
As embedded SCTs in a stapled OCSP response using an OCSP extension (OID 1.3.6.1.4.1.11129.2.4.5).
Question: Is the... |
In a CSRF defense based on checking forbidden headers, should I check Origin/Referer header against the ServerName configuration directive, or is it sufficient to simply check against the HTTP Host header?
I'm asking because I'm trying to make my application ready for proxies. Load balancers on public networks are one ... |
I am working with a team who is developing a mobile app for which they are using GraphQL.
So as part of performing security testing it, they only shared the graphql endpoint and nothing else.
Not even the app UI nor any credentials.
Based on my basic understanding of GraphQL I was able to get the schema and see some of... |
I'm doing a IoT project therefore want to reduce connection overhead to a minimum. We want to secure the communication, especially the authenticity and confidentiality. With a standard TLS protocol, a 2-way authorization requires certificates to be sent from both sides of the communication. That will result in a huge d... |
When building my own Docker container, if I use a base image such as Debian 10.6 (stable) there are times when high vulnerabilities are found in the OS packages, that have not been fixed in this stable release, yet.
At the point of getting ready to release the container, if high vulnerabilities are found, but there is ... |
We've recently had a penetration test for one of our applications.
The Penetration Testing company identified that our application lacks protections against brute-force attacks on the login page.
Ref: https://owasp.org/www-community/controls/Blocking_Brute_Force_Attacks
We've been recommended to implement a captcha to ... |
I was on my normal gmail account that I always use, then this website opened my google docs app which was signed into my school account and it put some weird stuff on there like “i’m the hottest girl in school” weird messages.
Can the school see that that document got put on there although it was not my school laptop o... |
Is there a way to obfuscate an existing .exe file?
I'm in a situation where I cannot transfer the winPEAS.exe file (for PrivEsc purposes) on a Win10 machine because of the AV blocking the executable.
Any other solution will be appreciated.
|
I am looking into EMV Contact and Contactless protocols, but I felt there were a few ambiguities which I would appreciate help with:
Is the chip used in EMV Contactless capable of performing the same computations as the contact? I know that the contactless is based on ISO 14443 while the contact is ISO 7816 but they d... |
I like data privacy, so I would like to set up a system that allows me to exchange data such as photos with family and friends. I have a raspberry pi (version 4 I think? the one that was new in the previous winter) running with OpenMediaVault5 to exchange documents within our home network. But now I would like a soluti... |
There are ways that a file [.jpg, .pdf, .png, etc..] can contain a malware using steganography.
How can a file be analyze in order to verify it doesn't contain any malware?
|
Is it possible for someone to make a purposefully vulnerable site then lure users to his site where he then takes advantage of that vulnerability to hack their social media accounts etc? If so how?
|
I have program called pdfelement installed (from Wondershare).
I also have Google Cloud Sdk installed.
Today, when I ran a command from the google cloud sdk (which uses python) I noticed that path where python is executing from is somehow modified to use \wondershare\creatorTemp (which isn't where I have Python install... |
Our web application features a lot of media upload. We are making use of AWS S3 buckets for media storage. As per the current implementation, whenever a new file upload API is called, we send the AWS credentials to the front end and front end will use these credentials to initiate the file upload.
But a recent security... |
I'm testing a site whose audience doesn't usually have English as their main language. When it comes to non-English, I consider there to be 3 groups
The target language's alphabet is a subset of the English alphabet
This is easy. Just use something like cewl.
The target language uses some characters not in the Engli... |
I would like to implement a network discovery tool, which automatically detects all devices in a network including OS information. I would like to do a very secure implementation. The biggest threat in the eyes of my colleagues are the insecure firewall rules this kind of tools needs and the privileged user. They are a... |
I'm having a discussion about transparency of the HTTPS protocol over a specific COVID-19 detection app. The opponents maintain that using HTTPS is obfuscating the app, that the app should behave transparently and send all the traffic over HTTP so they can see what they are sending, because the data is "anonymous" anyw... |
Let's say I want to make an encrypted message app (just an example). So, I will need a user1 with a password1, private key1 (that will be encrypted with the password1), public key1 (that will depend on private key1), and the data1 (that will be generated in encrypted format by another user2 using the public key1 mentio... |
I'm only a beginner so if any more info is needed just request and i'll update the question.
For one of my modules we are covering cross-site scripting and I have been given a series of PHP files that I need to get a script through to print document.cookie to an an alert box. I've spent a while on this one and i'm havi... |
I created a trading algorithm which I want to sell. People would be able to buy the "bot" at my website and it would run from there on (if this is even safe to do).
What is the best way to secure my algorithm its code? I created it in Javascript so if I run it straight on the website itself people could just F12 and se... |
My friend uses Microsoft Phone 8.1 mobile for a tax accountancy firm. As it hasn't received security updates for five years I believe that is a significant information security risk. However, the principal of the firm does not believe it to be a significant risk.
Only MMS, SMS and phone calls are made on the phone. MMS... |
I work at a small software company, and we are working with another company that wants to use our software. However, their InfoSec team want us to have a 3rd party source code review completed, with static and dynamic scanning pipelines created.
Is this a common practice where full, unrestricted access to proprietary... |
I am running few security algorithms on my product and would like know few general details about the CRLs (Certificate Revocation Lists).
I am using the following command openssl asn1parse -inform DER -in signed.p7s >> sign_extract.txt to extract the information(crls) from my CA signed file(signed.p7s).Based on the str... |
SCENARIO:
I'm testing a web application. To test if TRACE is enabled I used both
nmap --script http-methods target.com
and
curl -k -i -X OPTIONS target.com
After running the former I get
443/tcp open https
| http-methods:
| Supported Methods: OPTIONS TRACE GET HEAD POST
|_ Potentially risky methods: TRACE
with... |
I've experienced a behavior where I would specify a header/parameter with a certain name in the request and send it to the Node application (using Postman/BurpSuite), but it doesn't appear in the request body/headers in the application's controller. I suspect it's a NodeJS builtin security feature, but I'm not sure.
Ar... |
The Web Authentication API allows websites served via HTTPS to allow users to authenticate via asymmetric encryption. The procedure for login is basically the following:
Server sends a challenge (16 random bytes);
Client signs the challenge;
Client sends the signature.
How is this better than password-based authentic... |
I went to my router admin page where first you need to type in the router's admin and password. I am not talking about that. I am talking about PPP account and password (separate from router's username and password). By accident, I typed in in the PPP password where the PPP username field is. Is my router at risk?
|
To help ensure authenticity of packages some projects on GitHub and on GitLab add hashsums to the descriptions of the release on the Releases page.
Sometimes, at least here, the hashsum are made part of the release's filename. Sometimes, at least here, a script generates a file with hashsums that's uploaded to the rele... |
In the case of phishing training, most training will say "don't click the link, you can get hacked!"
If there was an exploit that could bypass the chrome sandbox on an up-to-date verison of chrome, would that person realistically target an employee at a regional insurance provider or some other non fortune 100 company?... |
Brief description :
I think Wireguard is blocked from special datacenters like Hetzner.
How can I bypass the government firewall?
Is there a way, for example, a plugin or something to mix it with original wireguard to get it to work?
Details (story):
I have a VPS from Hetzner datacenter.
I have set up a Wireguard using... |
IT support guy here (NOT security expert):
I have several clients who currently have at least one legacy appliance that runs a Samba (or something like it) server using SMBv1, which cannot be upgraded to use higher SMB versions. Other than replacing the appliance completely (which in some cases would be quite expensiv... |
In a recent attack to INTEL-SA-00086, the researchers are able to extract the secret key that encrypts updates to various Intel CPUs.
In the arstechnica blog it is mentioned as
The key may also allow parties other than Intel—say a malicious hacker or a hobbyist—to update chips with their own microcode, although that c... |
In my company, we are issued .p12 files and extract the certificate and private key like so:
openssl pkcs12 -in path.p12 -out newfile.crt.pem -clcerts -nokeys
openssl pkcs12 -in path.p12 -out newfile.key.pem -nocerts -nodes
These are now in PEM format, and when making any call to a web service, we must send the creden... |
Introduction – Context
Everyone has seen so called "Injectors" or "Cracks" for certain programs & games at some point in their life.
These applications inject their own code into game (or application) to extend custom functionality (for example, opening up a cheating menu or overwrite a timer function).
Body – Main qu... |
In Cryptography Engineering Ferguson, Schneier and Kohno put a big emphasis on quality of code in order to prevent it from leaking information and from being vulnerable to memory corruption exploits.
Re-implementing cryptography, especially when open source libraries are already available, widely used and scrutinized; ... |
I've been reading up on malware that can bridge air gaps between computers, like GSMem, Funtenna, etc. In the papers and articles I've been reading, the researchers mostly talking about getting files and data out of air-gapped computers using parts and components of the computer not normally used for networkingor sendi... |
This question refers to automatic E2E encryption (i.e., the app creates and shares encryption keys, never the user).
Apps such as Discord and Hangouts store messages in a server-side DB thereby allowing users to delete the app without losing messages. Apps such as WhatsApp and Signal store messages on the user's device... |
I am asking this because WhatsApp says it is end-to-end encrypted.
Are there any problems with sending a public key through WhatsApp?
There might be some objections to sending symmetric and private keys.
Under what circumstances can I send symmetric and private keys?
|
Is this usual? These bots hit my website every 15 minutes and they're the only visitors I get since I haven't shared the website with anyone yet... How do they even know about my website?
What is the purpose of this, are they trying to scrape info off of my page or something? Is this a privacy issue?
|
I hope this is the correct stackexchange website to ask this, if it's not I'm sorry.
Some time ago I started giving private lectures to a girl and she told me, a computer engineering student, that someone she knows is hunting her and managed to gain access to both her mobile phone (some iPhone I think, she generically... |
I came across a number of somewhat similar solutions, which are based on the knowledge factor related to a symmetric key in particular:
If a party was able to generate correct message authentication code, be it in form of HMAC...
If a party was able to encrypt a piece of plaintext which decrypts to a message of expect... |
Hi I want an easy way to hardware lock an exe file to a specific system so that when a user copies that file to another system it does not open.
|
Hi I want to know if I use dd to clone an external hard drive encrypted by bitlocker to another external drive, can the clone always be opened using the same password or there are exceptions?
|
I am currently investigating the idea of implementing FIDO2 (WebAuthN) support in native iOS using Swift. I understand that there is no FIDO2 support in native iOS, and only available through Safari native app, but Safari is not an option that I'm currently considering.
The idea is to implement FIDO2 interfaces followi... |
I am trying to parse the signature algorithm off a certificate using Openssl's APIs. Currently I am using the X509_get_signature_info function to get the hash/digest nid and the pkey nid. However, these nids seem to be exclusive to Openssl, whereas I am looking for the IANA value of said signature algorithm. (IANA valu... |
Context
I am playing around with a machine from hack the box. I found what appears to be a squid v. 4.6 listening on port 3128. None of my requests works
< HTTP/1.1 400 Bad Request
< Server: squid/4.6
< Mime-Version: 1.0
< Date: Fri, 30 Oct 2020 23:27:28 GMT
< Content-Type: text/html;charset=utf-8
< Content-Length: 350... |
I'm new to cybersecurity. I am participating in the cybersec challenge.
I have an image to analyze. This image is small but super heavy. I thought that there was a message hidden behind but all my attempts at steganography have been unsuccessful.
Do you have any advice? I am only looking for tips as it's a challenge :)... |
I'm a noob in home security and networking. I suspect one of my neighbor is sniffing packets destined to my wifi router. I have many questions about this
Will they be able to identify the no. of devices I have connected to the router?
If yes, is there a way for me to hide the device details from packet sniffers?
Will ... |
When I go into incognito session and then use Youtube, I always thought that it's like coming to the site as a totally new person. How surprising it was when one day I watched a cabaret (not a very trendy, nor fashionable thing to watch) in incognito mode and a day later, on the same browser, on the same computer, in i... |
I have Zscaler service installed on my system and it does a good job of filtering content and malicious websites.
I was wondering how does Zscaler manage to do this? I read that it creates a PAC file that is saved on your system which contains the policy to divert requests.
Would be great if someone could explain the p... |
I'm trying to understand a series of steps for an authentication system I want to replicate. The steps are executed by this script. To sum up, it does the following:
It runs in a Raspberry Pi and the main objective is to register and login the device in a server.
First, runs openssl in the RPI to generate a private k... |
I am considering using the same password for my Computer, Mobile and Password Manager.
The premise of the "password reusing is bad" rule is that if one website leak the password then all of your accounts on other websites are vulnerable.
But I don't see how it apply in that case. If somebody got access to any of my dev... |
I found a website that has a very strict but malformed Content Security Policy of the form:
Content-Security-Policy: script-src none
which should actually be
Content-Security-Policy: script-src 'none'
Firefox shows warnings
Content Security Policy: Interpreting http://none as a hostname, not a keyword. If you intend... |
I sent an email through my normal internet provider.
Afterwards, I set up an account so I’d have VPN to hide/randomize my IP address.
If someone traces the original email (before I got vpn to change my IP address) will that yahoo email I sent, have my original IP address?
I didn’t get VPN yet, so now I’m wondering if t... |
I'm writing a DNS client, where records are queried and shown to the user, and I'm adding support for the SSHFP record type, which stores SSH fingerprints. Records of this type have three fields:
The public key algorithm number (where 1 is RSA, 2 is DSS, 3 is ECDSA, among others)
The hashing algorithm number (where 1 ... |
I've come across several papers introducing the concept of mutual distance-bounding, where basically both sides can verify an upper bound of the distance in between, rather than having this unilateral relationship between a verifier and a prover. Although promising, these papers do not address the fact that in relay at... |
I assume that the only thing the server checks is whether the IP on the certificate matches the one for the current TCP/IP connection and that the certificate is signed by an authority the server trusts. Is this true?
|
Seeking assistance on using PKCS11 with a remote HSM.
I have a small linux host with an HSM card installed. The HSM has libraries and utility scripts provided to interact with it, on that host. These include a pkcs11 utility. What I can’t grasp is how to access this remotely. I get that pkcs11 provides an API.
But ... |
I was just surprised to find out that devices when connecting to WiFi networks compare the SSID to known ones and try the saved password.
In other terms: I have replaced my home router, and my device connected on the new network right away after it had the same SSID and password.
Is this not a hazard? What if someone ... |
The client random is enough to prevent replay attack. The server signs the client random when sending the serverkeyexchange, so an attacker can't replay a session because client.random is different.
What is the purpose of server.random ?
|
I have recently bought one of the recent "best" USB gaming mouses out there. The thing that is bothering that the marketing material says it contains a self-programmable computer embedded in the mouse, which is able to save the lightning, sensitivity and other settings.
On my Windows machine the mouse gets accepted as ... |
I am trying to figure out what is wrong with my Mac.
Here are my devices:
iPad (7th generation, MW752LL/A) with iOS 14.01 (18A393),
iPad Air (MD788LL/A) with iOS 12.4.8 (16G201),
iPhone 6 Plus (MGCW2LL/A) with iOS 12.4.8 (16G201)
Mac mini (Mid 2011) with macOS Catalina 10.15.7 (using macOS Catalina Patcher from dosdud... |
If we look at encryption format and standards of JWE following RFC-7516, we can see that it uses a 2 way encryption method.
So what are the benefits of this compared to just using RSA? Are computation (decryption) time not significantly affected?
|
I have an app which sends a user-email and a password to a server for verification using a post request:
$.post(server_url,{
email: user_email,
password: user_password,
action: requested_action_on_server
}, function(result){
//do stuff
});
The server is an https website, but I'm concerned that this doesn'... |
From my understanding, the point of having a refresh token and short lived access tokens is to mitigate the consequences of having the access token stolen. This way, if this happens, the attacker will only be able to use it for a very short duration of time.
However, because refresh tokens and access tokens are usually... |
I have disabled JavaScript using the Firefox extension uMatrix and yet some websites are still able to force page reloads at an interval referenced by a script on that page. How is this possible please, and can I prevent it?
For example, https://www.drudgereport.com/ contains the following script tag meant to reload th... |
I've recently tested a web application and found out that it was vulnerable to Stored XSS attacks. However, a peculiar behavior left me a bit puzzled. When I inserted John <script>alert(1)</script>Doe, my browser showed that the script tag was indeed injected correctly, but the alert did not pop up.
When inserting John... |
Every time when user wants to login to my service it sends one time password (OTP) to the user's phone number, then this OTP is used to confirm login.
Someone uses my service to bombard people with sms notifications.
I already implemented various blocks:
no more then 1 OTP per phone number per minute
no more then 5 OT... |
I read somewhere that entering a malicious website can infect your machine without you noticing it at all. When someone wants to infect other's computers he has to pass two challenges (as I see this).
The victim needs to get the malicious payload.
The malicious payload should be executed.
First, the victim should get ... |
I understand that TPM is a specification and devices conforming to it are called Trusted Platform Modules and they play an important role in trusted computing (as is defined by the same people who make the TPM specifications in the first place). What are, in relation to this, for example Apple's T2 chip or Google's Tit... |
I have just extended the expiry date of my GPG key by following these instructions: Can you extend the expiration date of an already expired GPG key? I have previously backed-up my key. Do I need to backup again after extending its expiry date?
|
I tried repackaging an Android app but after installation, when I launch that app, the app crashes immediately.
This is the exception I am getting when I decompile this application using apktool and rebuild this application using apktool irrespective of any modifications done at the smali level or not.
exalvxhzn.█: 01
... |
I read that one way to perform a dll hijacking is to place a malicious dll file under a specific folder. Then, the original dll won't be executed and the malicious one will instead. I understand this concept but I can't see how it would be implemented practically.
Every tutorial I found on the internet about how to per... |
I have a home directory and a gpg file I am attempting to brute force. Is there a utility that you know that will recursively create wordlist from directives and file contents?
|
A follow up to my 7,5 years old question. Back 10-15 years ago, when I wanted to send an executable file over Gmail from my PC, all I had to do was to change file's extension to some meaningless one or compress that file with a password.
The mentioned question (and all answer to it) proven that contents of ZIP file can... |
I was learning about Digital footprints.
What is the difference between active digital footprints and passive digital footprints?
|
Im currently looking into the security of different browser password storing mechanisms. My main focus lies on the new Chromium based Microsoft Edge browser.
As far as I can see, Chromium based browsers use the system's credential manager / keychain to store passwords. On Windows that is the Credential Manager, seeming... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.