instruction stringlengths 24 29.9k |
|---|
Note: this is extra credit for a homework assignment
I'm trying to figure out how to call win() via stdin. I assumed that the vulnerability would be exploited by a buffer overflow, but I can't even figure out how to overflow the buffer (if I input a 45-character string, it prints all 45 characters). What sort of vulner... |
Section 5.3 of RFC6052 explained how an attacker could abuse the NAT64 translation mechanism to bypass security mechanism such as firewall or IDS/IPS if those devices only have an IPv4 blacklist. The mitigation is to convert the IPv4-embedded IPv6 to IPv4 than comparing it with the IPv4 blacklist.
My question is how to... |
I'm using two routers in my home network, as described in this question (router B in the diagram). Therefore, router B is not accessible from the internet.
Going over the logs of this router, I was surprised to find what is logged as "SYN flood". I have several entries such as:Nov 18 21:27:50 [ATTACK]: SYN Flood from 1... |
I have a HIPAA complaint app which uses an API hosted at https://iswearthisissecure.com.
Is the app allowed to make outbound requests to services that are not HIPAA compliant if no PHI is transferred?
For example:
Can I serve an image from our blog which does not run on a HIPAA compliant platform?
Can I make a request... |
I want to make it impractical to link the users to their sensitive data without their passwords – even with a full access to the database.
Furthermore, if a user has multiple pieces of sensitive data, I also want to avoid linking the different pieces together
Based on the comments and some searching, I have updated the... |
Quote https://manpages.debian.org/buster/manpages/ld.so.8.en.html#Secure-execution_mode
Secure-execution mode
For security reasons, the effects of some environment variables are voided or modified if the dynamic linker determines that the binary should be run in secure-execution mode. (For details, see the discussion ... |
in the Wordpress directory I found some suspicious-looking files with random strings in their name e.g. uxs5sxp59f_index.php. Can I safely check their content ? I have a suspicion that the site has been infected because some of its links on external portals to the site with the malware.
|
I have recently been reading about reverse tabnabbing, where a child window can change the url of the parent window if it has access to window.opener (which it has by default unless you explicitly disallow it)
In this case the phishing attack is to change the parent tab url and present a similar UI as some trusted webs... |
For the last 15 years I've been using SpamCop to report the spam I receive. I do this because
it sometimes results in spammers and the third-party machines they compromise getting shut down, at least temporarily (as evidenced by the occasional responses I get from ISPs thanking me for my reports and confirming that t... |
In my program I use CertGetCertificateChain to investigate the validity of certificates.
If in my test PKI I revoke a certificate and specify the reason "unspecified", the error code in the last parameter pChainContext->TrustStatus.dwErrorStatus is zero, meaning no error, the certificate is not considered revoked. Howe... |
I'm frequently getting these weird URLs.
https://mywebsite.com/mymage.php?id=1'[0]
The weird part is '[0].
The webpage pass the id to the database and the database expect an integer so we are frequently getting errors.
Is it an attack? If yes, what is it targeting?
Note: It's similar to this question that doesn't have... |
When we want to send a message that contains only a link - such as a question from the Stack Exchange network - WhatsApp displays information from the website as below:
Does this leak information about what was sent, and from who, and to whom?
We can assume that WhatsApp uses an internal browser and doesn't send infor... |
I have recently been reading about scenarios where browser might block automatic redirects. One scenario that i came across is what chrome calls as "tab-under". When the user clicks on a link to open in a new tab, the original tab redirects to an advertisement. To block this, chrome shows a redirect blocked banner.
I u... |
I have my site xyz.mysite.com this is sitting on Cloudflare. I was reviewing my Apache logs and I saw a website as a referrer I did not recognise. I went to the site and it redirected to my site xyz.mysite.com totally bypassing Cloudflare. How can I break this link?
My .htaccess seems just not to work.
RewriteEngine ... |
Is it possible to whitelist only 1 domain name but not IP?
For example:
On some "Doogle" hosting is IP 1.1.1.1 and have multiple domain resolution for this IP: dog.com, cat.com
cat.com generating phishing attempts, brute-forcing etc., but dog.com is legit.
Is it possible to whitelist only dog.com but all other domains ... |
I wanted to know for how long Porn websites retain data about visitors' IP addresses and the specific pages they visit. I wanted to check it for Pornhub, xnxx, and xvideos. However, my country recently blocked all such websites, so I am unable to visit their privacy policy pages.
Can anyone please tell me for how long ... |
I hack wifi passwords with kali linux on airmon-ng and I make always password lists with crunch but the lists are always too long (I'm talking about <100 PT) and I want to know if is there a solution with the same result but with a small size.
|
I was wondering how this works.
We have a marketing site in Holland where people can sell second hand goods.
Rumor goes that there is a lot of phishing going on there and XSS code is used in the images that are uploaded to the site for malicious intent.
Can someone explain to me how this works and how people can stay o... |
So I recently downloaded Tor Browser on my Linux machine and what immediately caught my eye is the fact that after uncompressing the file (I think it was .tar.gz, but the question applies to every compression method) a .desktop file got generated in the extracted folder. Is this hidden functionality of .tar.gz and some... |
So, I was just at home, minding my business. I was on some sites that are not allowed at school, and my email was logged in.
I was using safari with the google site.
Do they know what I am doing now? They openly say they monitor everything we do on our school laptops.
|
I want to get pre-master key from OpenSSL application (in order to decrypt traffic).
Details:
OpenSSL version: 1.0.2l, statically linked, no debug symbols
I'm able to debug the application (hit breakpoint inside SSL_connect(SSL *s) method)
Is there any way to get the pre-master key from there? I'm using x64dbg.
|
I have an ecommerce website with over 5 million customer database. From past couple of days, probably a hacker is hitting an AJAX endpoint continuously. This endpoint takes email address as a parameter and returns whether that email address is registered on our website or not, and we accordingly prompt user to login or... |
Everyone knows of the common cybersecurity tips to be careful when you open links in an email. But every day we look for something on the Internet, clicking links which the search engine shows us, and we do not have the same fear. Why are the links in email considered more dangerous than links from web search results?
... |
I manage a Debian GNU/Linux web server (Debian 10 Buster with its bundled 4.19 kernel). I put in place simple iptables logging rules a long time ago, among other things. Here they are:
# iptables -A OUTPUT -d [mySmtpSmarthost]/32 -p tcp -m tcp --dport 25 -j ACCEPT
# iptables -A OUTPUT -d [mySmtpSmarthost]/32 -p tcp -m ... |
I have an excersise of making a buffer flow exploit for directing a function insinde another function without calling it. First I need to print "now inside entrance()" then print "now inside secret()"
I was able to print "now inside secret()" by overflowing the buffer via assingning above address of doNotTouch which is... |
I've studying and practicing different approach to SQLi filter bypass and I faced a challenge. What if the WAF filters look for specific strings rather than SQL keywords?
Example:
Filter: /UNION/
SQLi: UnIoN
Filter: /UNION/i
SQLi: un/**/ion
Filter: /UNION/i and no comments
SQLi: un%0bion
So far, so good. There are l... |
On my WordPress websites (on LEMP stack with Nginx) I normally install a WAF plugin such as Ninja Firewall or Wordfence.
I was wondering if a better practice would be to replace them with a host-based WAF like mod-security (I guess that running both wouldn't be recommended...).
|
I'm new to exploit development and while watching a tutorial I came across the topic of "Bad character identification". I'm referring to the process of sending all possible characters to the vulnerable process to see if there are characters which fail to pass to the receiver.
The existence and identification of those c... |
At https://aws.amazon.com/premiumsupport/knowledge-center/mfa-iam-user-aws-cli/ the AWS officially recommends to have this policy
{
"Sid": "BlockMostAccessUnlessSignedInWithMFA",
"Effect": "Deny",
"NotAction": [
"iam:CreateVirtualMFADevice",
"iam:Dele... |
I have recently seen many people use Google Forms as a way of sharing “passcode protected” information. They seem to have the first section of the form with a required field asking for a short piece of text (the “password”), and if the inputted text does not exactly match the required text, it gives you a custom error ... |
What mechanisms (if any) modern GPUs implement to prevent different processes from accessing each other's memory (on graphics card)?
|
In the CSRF implementation of Spring Security (https://github.com/spring-projects/spring-security/blob/master/web/src/main/java/org/springframework/security/web/csrf/CsrfAuthenticationStrategy.java#L57) they first "delete" the XSRF-TOKEN-Cookie (Line 58) and directly after that they set a new one (Line 60).
This leads ... |
I am currently making amendments to an IR process and the topic of incident closure has come up. The organisation follows NIST and therefore their IR process has four phases:
Preparation
Detection & Analysis
Containment, Eradication & Recovery
Post-Incident activity
My proposal is that an incident can be deemed resol... |
I have a public hosting server. I want to give access to it only from one specific IP address. Since it's a public hosting I don't have access to its infrastructure or apache configuration. I can create .htaccess file only. Based on that can I create a truly secure firewall to accept request from specified IP address o... |
I found a reflected XSS in a POST request that sends a file to the web server.
The HTTP POST Request
The HTTP 200 OK Response
When I want to try to insert document.cookie in the payload, the web server detects the dot and breaks the injection because the extension is not good.
HTTP/1.1 200 OK
Date: Mon, 23 Nov 2020 19:... |
I am reading on how to sign and publish my flutter app on android.
When reading through the official docs, they suggest to make a configuration file where I put my password to the keystore in plain text. I feel like that is a bad idea, but maybe I am missing something. The Keystore is used to sign my app for publishing... |
Can the internet administrator on my school where I teach see what I'm uploading to my students on Blackboard. I.e. if I upload a file: "exercises_class1A.pdf", would they be able to see and open the files that I upload to my students? Or would they only be able to see some "activity" from my side?
|
My parents use AOL (there's no point trying to migrate them at this stage) with two factor authentication. My father let me know that he recently received an identity log in verification email that looks suspicious.
The resolved client location in the email my dad received is marked as Brazil, which would imply to me h... |
I always hear people say "test your backups", but I have no idea how that is done in practice when you have to deal with complex infrastructures.
For personal backups it's easy to rely on something like checksums, because all you have to recover is your own files (pictures, zip files, documents, etc.). So if you compar... |
I understand that end-to-end VPNs (such as SurfShark and NordVPN) hide the domains I visit whereas HTTPS does not
However, are they any attacks that an HTTPS website would be subject to, that could be avoided if I used an end-to-end VPN?
The main kind of attack I am concerned about is having any secure information (suc... |
The expensive one: https://www.dustinhome.se/product/5010873750/ironkey-basic-s1000
The cheap one: https://www.dustinhome.se/product/5010887912/datatraveler-100-g3
Over 14,000 SEK difference in price. Same company (Kingston). Same USB standard (3). Same storage capacity (128 GB). Same store.
Yet such a massive price di... |
I'm currently working on a project. The apis on the backend will support both mobile and web clients. I'm attempting to design a user management flow for both clients and a bit confused about how to go about this. I came across a few ways to address this but i'm not sure if
Have separate APIs for both the client and m... |
I am working with a form that a user can fill out to send an e-mail. As part of the form, there is a preview button that shows the user a preview of how the mail will look in a new tab in the browser. The e-mail template itself is defined in a 3rd party service. The site the form is on is protected with a log-in.
When ... |
Having this simple formula Risk = Threat x Vulnerability x Information Value it is quite difficult to estimate risks quantitatively because of threat estimation seems to me the most difficult part.
I aware about CVSS and other vulnerability scoring systems. However it seems that such systems provide a single score for ... |
One assignement of my teacher is driving me crazy because I don't think I'm that far from the solution but I still can't get it so I hope someone will be able to help me figure it out.
Assignment
The assignment in short is as follow : create a LUKS partition of 2GB, then with the dd command, dump 1 Mbytes of the partit... |
I want to measure the execution time of a function. The execution time of this function is only slightly different in the two cases. Is there any way I can accurately measure its time to distinguish the two cases?
The possible solutions are:
Use precise measurement functions. Such as __rdtscp or std::chrono clock. I t... |
i am trying to learn something about computer security, I decided to start from the linux world, through raspberry p3 with raspbian jessie OS
I would like to start with forensics file management, and I did a test on data recovery
I took an empty FAT usb stick, copied 5 images (jpg and png) and deleted 4 of 'em
I insert... |
CVE-2019-11157 exposes a vulnerability in the undervolting API from Intel processors, that became known as the Plundervolt attack.
What is the Plundervolt attack?
Should domestic users be afraid of undervolting their CPUs because of it? Or does it require a sophisticated hacker to exploit it, which would make it only ... |
I found apparently successful logins from a foreign ip-address to our cyrus-imap server:
Nov 24 08:16:20 server-1 cyrus/imaps[12101]: starttls: TLSv1.2 with cipher ECDHE-RSA-AES256-SHA (256/256 bits new) no authentication
Nov 24 08:16:20 server-1 cyrus/imaps[12101]: login: 33.44.55.66.static.example.org [33.44.55.66] e... |
I own a company that has hired an IT employee. He has all passwords to servers, work stations and data. He is refusing to share or supply these passwords (Keys to the Kingdom) on the grounds of security. He has pointed me to your site along with many others, about the implications of sharing passwords. I understand the... |
I have nginx and php-fm set up to front a word press site. I used certbot to setup TLS.
When I load any page, I see selinux violations and it looks like php-fpm is trying to reach out to some port 443 for some reason and getting blocked.
The AVC looks like this:
# ausearch -m avc --start recent
----
time->Tue Nov 24 ... |
When using postMessage it's important to define a targetOrigin to ensure we don't leak data to other sites.
It's equally important to check the origin when receiving a message to prevent other sites from triggering our scripts.
But, if we're just expecting to do this on our own domain, is there anything wrong with:
tar... |
I got just this typical spam email, but this one seemed odd. It came from Google Forms, which apparently can send emails too, however you have to sign in to Google Forms to use it, and it uses the email you signed in with.
How did this spammer manage to appear to send from the Forms email? This seems like it can be eas... |
I have two SSDs in my laptop. one is SATA 500GB and the other is M.2 SATA 250 GB. I used the following steps for both to securly erase them so that I can sell the laptop:
unfreeze the drives:
sudo systemctl suspend
Set a User Password: hdparm --user-master u --security-set-pass mypass /dev/sdx
Issue the ATA Secure Er... |
Forenote: I'm not familiar with how virtualisation works on a low-level (but I'd certainly like to learn) so this question could arise from ignorance.
Example Scenario: One virtualised router is connected to a networked device. Appropriate firewall rules are in place (on the virtualised router) to ensure the device can... |
The Tech Solidarity organization provides a list of basic security guidelines, described by Jeff Atwood as
... pure gold and has been vetted by many industry professionals ...
From that same organization, there is also a list of Security Guidelines for Congressional Campaigns (april 2019).
Here are a few quotes from ... |
I run LEMP stack on Ubuntu 18.04. I need to sign / verify transactions for Ethereum real-time. Where can I store the private key for it? Is storing it in .env good enough? It just seems super dangerous but I can't think of a way of me losing that key. But I am not a security specialist, so want to make sure and use the... |
Recently, I have found out about Microsoft Cybersecurity Reference Architecture. It shows how Microsoft products can fit into an existing company's network and policy setup, however it is quite generic.
I am looking for something similar to that, but just an example, reference network diagram from a known tech company ... |
If all the applications, virtual machines and services we use at our company are hosted in different clouds and assuming all these services are accessed through encrypted layers (https/TLS/ssl ...).
Does getting a VPN so every employees trafic goes through our companies internet connexion (even if he's not physically i... |
Can File Shredder be used to purge specifically Temporary Internet Files rather than the whole disk?
Is there any option to just shred the Temporary Internet Files, and nothing else?
Is this a good way to make cache unrecoverable (read: harder to recover)?
|
I am planning to encrypt database fields using AES encryption.
Now, this encrypted data will not transfer over the internet and will reside in our own datacenter only.
From what I read, GCM mode should be the obvious choice for encryption since it's more secure(basically it's authentication encryption) and it's fast.
B... |
So I read this question about deniable encryption but it left me with a few questions.
The first answer describes how you could hide one file system on a drive.
The process goes like this:
Fill the drive with random data
Select a random offset and create the encrypted file system there so it's indistinguishable from t... |
Let's say I have a site like stack overflow. People post comments with - possibly - links to external sites. Is there some "standard" set of rules to make it reasonably safe for users and website?
I have noticed the following features on other websites:
All links have nofollow attribute, that helps to reduce site pena... |
I was working with a freelancer from upwork and noticed they added this script titled .default in my config directory. It looks malicious and they were hired to do CSS style changes of elementor:
<?php
header('Cache-Control: private, max-age=0, no-cache');
if (!function_exists('getUserIP')) {
function getUserI... |
We know that Intel processors have one (ME) so it is definitely possible.
In general, how could you even trust a piece of hardware like a CPU or network card, even if the manufacturer says there is no backdoor?
For software, it is easy since you can access the source code verify it and compile it. But for hardware?
|
I just got an email from the Unsplash service telling me that someone had logged into my account via credential sniffing:
Five minutes later I get three more emails, each one notifying that a (generic) photo just uploaded to the account had been flagged.
The news doesn't surprise me because the password is a weak thro... |
I am evaluating a vendor whose technology takes the following approach:
My website asks user to install vendor's executable (EXE) on their machine. This EXE does operations that cannot be done in-browser
EXE also starts a local web server on client's machine
My website connects to 'exe.vendor-website.com'. This is a p... |
Recently i wanted to play a bit with TCP/UDP networking (and touch some custom HTTP server impl) on C# and found out that i'm getting requests from totally unknown dudes, such as this one:
FROM: [::ffff:149.129.139.48]:52306
[ANS]
POST /cgi-bin/ViewLog.asp HTTP/1.1
Host: 127.0.0.1
Connection: keep-alive
Accept-En... |
Our application stored **e.printstacktrace()** in a log file, which is accessible to a specific user group. We need such detailed information for debugging purposes.
As per the security team, they are requesting us to remove such detailed system information from the log file, so here my question is about how it will af... |
I have reason to believe that there is a persistent backdoor on my device, one which is not removed after a re installation of the OS.
I wanted to know the step by step protocol of system wipe to remove any potential back doors.
It's possible that the installation media -- live USB is re-infecting my machine when I boo... |
If I compile a code with gets, the compiler outputs a warning saying that the function shouldn't be used:
<source>:5:13: warning: 'char* gets(char*)' is deprecated [-Wdeprecated-declarations]
gets(buf);
^
In file included from <source>:1:0:
/usr/include/stdio.h:577:14: note: declared here
extern char... |
Let's say I'm doing a pentest on BlueCorp and find a bug in the software UnrealSec made and distributed by SecCorp which is used by BlueCorp and found during said pentest. Should I report this bug to both BlueCorp and SecCorp or only one?
|
I recently was studying x86 buffer overflows + ret2libc attacks from https://www.ret2rop.com/2018/08/return-to-libc.html and I noticed the order is as follows:
bytes to fill buffer + address of system + return address for system/address of exit + address of "/bin/sh"
I am confused to as to why the return address (the P... |
I recently set up a python-bottle web server for a school project to essentially open my Garage Door remotely over the internet. Recently I saw the logs had a strange get request and was wondering if anyone knows if I should be worried about this. Just looking up the ip address it appears to be from India I was also wo... |
Assuming that both travel over the latest version of TLS, why should I use client credentials?
The obvious answer is:
The access token will expire at some point
The client id and secret will travel only once over the wire
We can also use a refresh token, further strengthening the security
I argue that we could also m... |
I was going through this process https://developer.twitter.com/en/docs/authentication/oauth-1-0a/obtaining-user-access-tokens and there are two points that do not make clear sense to me:
Step 1: POST OAuth/request_token
response includes oauth_token_secret. What is the purpose of this value? It is not mentioned anywh... |
I have a web app where I allow users to create a one-page portfolio using drag and drop, also I allow them to add custom HTML freely (basically any html or js code)
I'm aware that I shouldn't allow the custom HTML to be executed while they are in the EDIT mode, so I save it in the database but never render it into the ... |
So I hope I'm phrasing this right. I'm trying to exploit a piece of c code which you can see below.
#include <stdlib.h>
#include <unistd.h>
#include <stdio.h>
#include <string.h>
int user_age;
void secretClub(){
if(user_age<18){
printf("Come back when your old enough!!");
}
else{
printf("Come on in.");
}... |
I recently encountered a strange incident regarding the 2FA of my Google Account.
The user Dunois has described a very similar occurrence in this post: Functional Google 2FA code (via SMS) received from a random (but in use) mobile phone number
My experience is a bit different, in the the code itself is also suspicious... |
I would like to know if we can really trust antiviruses because virus makers check their virus with antiviruses before releasing them. So how can we place our confidence in antiviruses?
|
In a project of mine, I have two fields which I need to use for storing a cryptographic signature (hash) of a file, but I can only use 112 bits in total, spread as 16+12 hex chars in those two fields.
Since I cannot store a full SHA256, I intend to use a truncated SHA256 value. Which of the following scenarios would be... |
Recently I downloaded Open Shell application and checked it via VirusTotal.
Most famous antiviruses like Bitdefender, Nrothon, Kaspersky found nothing.
But some of antiviruses thing there are some bad stuff in it.
|
I use Docker Desktop for Windows. I noticed it adds to my OS's host file <ip> host.docker.internal, where <ip> is the private machine IP for the connected local network. (This DNS name is used to communicate from containers to the host machine.) What are the implications of this? Does this mean that a machine connected... |
I was reading this question ( How to check if an image file is clean? ) and forest's answer suggested converting the image to a "trivial pixelmap format, such as PPM". Such a format was considered "simple enough that it would be infeasible to exploit".
The question is: what makes a PPM file safer? Is it because there's... |
If you are logged in with your Google account and click "Manage your Google Account," you can then edit your payment profile. But you cannot (1) see the complete card number except for the last 4 digits or (2) change the number of an existing card. You are only allowed to (1) edit other information of the card like CVC... |
I'm checking the options to harden my web app by setting the appropriate HTTP headers.
Besides the Content Security Policy (CSP) there are two another approaches: Document Policy and Permissions-Policy (Feature-Policy).
I've checked the W3C Relation to Feature Policy documentation, but still can't grasp the clear answ... |
I have a laptop on which I'm the only user. While installing the laptop I was wondering why I should choose a different password for the root account and user account. My reasoning is:
The change of finding a valid password doubles if the user and root have different passwords. Of course the salting algorithms make su... |
I have just stumbled upon what is a very helpful flag in chrome (for developers):
chrome://flags/#allow-insecure-localhost
The flag is described as:
Allow invalid certificates for resources loaded from localhost.
Allows requests to localhost over HTTPS even when an invalid certificate is presented. – Mac, Windows, Lin... |
My traffic goes trough 6 routers in sequence.
+----------+ +----------+
| | 192.168.3.2 | |
| Internet | +---------->+ Router 4 |
| | | | |
+-+--------+ | +-+--------+
^ | ... |
Modern password-managers are moving towards a "fully-in-the-browser" model (see: historical RCE on LastPass, and now 1Password is also moving towards 1Password X as "the future" and no longer adding new features to the non-browser-extension version of their products).
Several sources indicate that using other browser-e... |
I read this post: How does hacking work? and I saw that Chris Dale answered the question with some PHP exploit instructions. However, how does a hacker can read a PHP file (or another back-end file), since it is in a server? What do hackers do to reach a back-end file in the first place? is it done with pre-made tools ... |
I am building an application that is integrated with a 3rd party service provider and uses OAuth 2 to obtain permission from other users using the service to access their account information. Based on the documentation, the implementation process is:
A user clicks a frontend element of my application, which makes a ca... |
When I do in linux root shell cat /boot/System.map-$(uname -r) it returns me segments of memory but there is a big gap around phys_startup_64:
00000000000228c0 D softnet_data
0000000000022a80 d rt_uncached_list
0000000000022ac0 d rt6_uncached_list
0000000000023000 d kvm_apic_eoi
0000000000023040 d steal_time
0000000000... |
I looked at my Credit card statement, and noticed a fraudulent charge to what turned out to be the NY Department of State. This was especially odd to me, since I don't live in NY (and so was obvious fraud), but I also couldn't understand how a criminal could monetize this.
Some Googling reveals that other people have ... |
I was wondering if it would be possible to create some sort of ethernet passthrough device, but this device also functions as a layer 2 mac address spoofer, which can be used with any device without the need for a software mac address spoofer, or for devices which are incapable of changing their mac address normally i... |
Recently I have installed RKhunter (v1.4.2) on a couple of loadbalancers ( Haproxy 2.0.14 ) running on Debian 9. Stretch. While performing a full system check I'm getting a lot or warnings about tcp ports being used by Haproxy. They look like this:
Use the 'lsof -i' or 'netstat -an' command to check this.
Warn... |
Phone is rooted
Basically I want to be able to access a website without it being able to determine any of the things it dermined about me (my device, ip address etc) when I accessed it last, no matter how advanced of a tracking mechanism it uses.
I want it to seem as if it is being accessed from a different device, com... |
I need to save very sensitive data from an Excelfile that the user uploads. The data will then be saved to mySQL. All is done in Node.js.
Now I wonder what is the most secure way to upload the file.
Should I use Multer (https://expressjs.com/en/resources/middleware/multer.html) which has a memoryStorage option (a buffe... |
Assume an Angular SPA application on www.example.com that works invoking an API over that same domain www.example.com/api/...
The Angular app gets a session cookie and sends it in each API call.
The usual CSRF attack would try to execute a script with some API call, such as POST www.example.com/api/deleteUser when the ... |
I have a login system for my website that works as follows:
In the database I have a table called users with the fields user, password and authentication_token.
user gets set manually by request in the database.
When a user activates his account, the following script stores his password and an authentication_token to t... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.