instruction
stringlengths
24
29.9k
I'm interested in becoming an ethical hacker someday. I've been reading articles saying the Python language is very popular in hacking activity because of the extent of its modules (including network). Nowadays, lots of applications are web applications or mobile ones and the antivirus software make a great job removin...
We received a message from the IT bods this week stating: Summary of the issue: IT will disabling and blocking the use of the browser Firefox next Thursday the 03.12.20 on all IT managed devices. Due to certain vulnerabilities and security risks associated with the use of this browser it will be blocked from use as of...
Suppose someone hacks my computer (by any means, say a virus or trojan like RAT), will they be able to know my IP address in real time? This is about dynamic IP addresses.
When you search in Google for user cookies top results are VPN services that say that it's used by ISP to track the users. Wikipedia Supercookie say nothing about HTTP headers and what exactly are super cookies. I'm interested what the subdomain can do to harm the domain. Are supercookies the same as HSTS supercookies ...
What are some example attacks that could be vulnerable if HTTP is used, and that can be overcome in HTTPS? The only one I can think of is man in the middle attacks, where the intercepted traffic is in plain text. What are some others? Also are on-path attacks and man in the middle attacks the same thing?
It happened to me a few times that I installed a Windows PC after the CMOS battery has been replaced and all sorts of things stopped working or threw security warnings, only to realize that I just need to set the clock, or click on the sync button. From the above experiences I deduced that time synchronization is impor...
I'm using a VPN which works fine, unless when on Firefox a website asks if they can access my location and I click 'Yes' then it reveals my real location. How is that possible? Is there any way to click Yes with it revealing the VPN location? since some websites don't seem to work properly without a Yes.
The OAuth attacker model (see https://datatracker.ietf.org/doc/html/draft-ietf-oauth-security-topics-15#section-3, A4) states that (A4) Attackers that can read, but not modify, the contents of the authorization request (i.e., the authorization request can leak, in the same manner as above, to an attacker). This descr...
I’m currently trying to get some knowledge in SQL injection. In a pen test environment, there is a challenge on which you get the PHP file and you need to try to login using SQL Injection. I’ve already tried several injections but cannot find a way in. My PHP knowledge is quite basic. May someone help me and give me a ...
Currently, I'm using 1 SSD and I think it's safe. I'm thinking about using 2nd SSD for unsafe software (pirated software). Is it possible that the virus on the 2nd drive can reach the 1st drive, somehow damage the PC, or bring other unwanted effects? There is a BitLocker disk encryption turned on on the 1st drive. I'm ...
I'm currently developing an Android Application that communicates with a server and needs the user to login. The connection is secured with SSL and certificate pinning. For user authentication I'm currently using challenge-response. The server stores a PBKDF2 hash of the password and the salt used in the PBKDF2 (called...
I'm trying to decide whether or not to use the Your Phone app on Windows, and not finding much information on it. It requires a Microsoft account, but I don't really see why that should be necessary for a local connection between my phone and my computer. It makes me wonder about the privacy implications. This page cla...
I'm currently doing a pentest for a client and I've come across something new to me. When I log in, I view the username/password values in burpsuite and find they are encrypted using Cryptojs. I'm looking at the debugger in the browser and come across this function: const encryptParams = parameters=> { if (parameters...
currently engaged in live competitive red vs blue team exercises in an enterprise style Windows AD environment. My device runs a modern Debian Linux OS. cscotun0 We typically connect to the lab/domain directly via ethernet, however I've discovered I can also connect via Cisco AnyConnect VPN, which might prove useful. W...
I was completing an assessment for a client and discovered that web application implemented a Permissive CORS policy which allowed for a Arbitrary Origin Trust. Request: Host: [REDACTED] User-agent: blah Accept: */* Accept Language: en-US,en;q=0.5 Accept-Encoding: gzip, deflate Origin: https://arbitrary-domain.com Conn...
Do I have to hash passwords on the client side of a banking mobile app since i am using a SSL network to send the password to the server end for hashing. Can the password be intercepted before transmission?
Our development team is implementing TLS protocol for a web server. The type of clients are mobile apps and web browsers. Now there is a concern about bypassing TLS in any way trough MITM attacks and disclosure of the server's private key. Is there any solution independent of TLS for data-in-transit protection so that ...
Just found this on GitHub: https://github.com/gnxbr/Fully-Undetectable-Techniques/tree/main/minizinh0-FUD I can imagine similar ransomware, malware, viruses exist. AV is useless? Is only Behavior Analytics the way to go? I can imagine you can implement several layers of security to catch it (i.e HTTP inspection when ma...
I'm working on designing a credit card payment form whose core functionality is provided by a payment processing company ("upstream"). Upon some transaction errors the upstream returns the detail (*one kind at a time) of the user-provided data that was wrong, for example "Invalid CVC" and "Invalid expiry year." With th...
There is an app on Github I was in a rush, so I didn't check, but there is no explanation or source code in its repo. How could I check if it is not just sniffing my information or something? Is there any way to ban it to do anything on my system?
I have a web application and we are working in an agile environment, and the QC team working and need to run security testing. When I can run the security test? I searched for this topic and can't reach an acceptable result for the team.
In the company I work for, we have many clients and the vast majority of them have hosting with us and we make their web apps. One client, though, just applied for cyber security. Our CEH (certified ethical hacker) asked me to make an exact replica of the client's login site to test phishing on their cloud service. All...
Encoding a payload is a means of evading antivirus or IDS. With regard to scripts is there a way to do the same thing? For instance, is it possible to encode a python script in order test intrusion prevention systems? This script here https://github.com/SecuraBV/CVE-2020-1472 ,is there anything I can use to disguise it...
As per some network certification training material, I noticed the following description of the Time To Live IP header: The time to live (TTL) is set into a packet when it's originally generated. If it doesn't get to where it's supposed to go before the TTL expires, boom - it's gone. This stops IP packets from conti...
When using 4g or other cellular networks, while roaming, mobile carriers transfer data between each other, something I've seen refered to as "ITS: Internation Transit Service" how does that work and how is it secured? Does anyone have some insight into what sort of security measures are taken between mobile carriers wh...
SCENARIO: If I send requests like these: http://site.com/page?safe_param=1?my_arbitrary_param=2 The server responds with a normal HTTP response but within common headers it includes also the arbitrary param: [...] my_arbitrary_param: 2 [...] How could be this leveraged?
I'm wondering how apps that leak personally identifiable information can be taken advantage of by hackers? How would they have the infrastructure to capture all that information that come from thousands of users? I'm asking because when analyzing applications, the hacker/analyzer will be the one setting up the network ...
I'm currently in the process of researching for an assignment. In this assignment, I am asked to produce reports on new crimes enabled by technology and how, in Cyber Forensics, one would investigate said crimes. I am having great difficulty finding information on how one would go about investigating DDoS attacks. The ...
Suppose I have this: parameterized_database_call('SELECT * FROM widgets WHERE id = $1', $_GET['widget_id']); The SQL query is parameterized, as I've done for many years now. (I'm trying to repress the days when I did not use those, or that another way was ever used/taught.) As I understand it, this cannot possibly cau...
I've chased my tail into a late night circle thinking about public key authentication to cloud instances. As such, I have some questions on the function of host keys when authenticating an SSH session. If I'm on machine B, and use ssh-keygen to produce B.key and B.key.pub on machine B, I can then use ssh-copy-id to sen...
A cloud operator such as Google can take a snapshot of a normal VM. This includes CPU state, RAM and disk. This can then be copied to another physical and resumed there. Or it can be analyzed off-line, and any cryptokeys in memory or in the CPU state can be extracted. This means that if you do not trust your cloud VM p...
I was reading the OWASP Cheat Sheet Series, specifically their cheat sheet for REST Security and one of the points they had under the section for API Keys was: Do not rely exclusively on API keys to protect sensitive, critical or high-value resources. What are the alternatives to protect resources via a REST API that...
I have a local application that normally authenticates against a remote Active Directory server. If the local host loses network connectivity, a special local account becomes available for login. Currently, that account has a standard password that our technicians know. In the event that our technician is unavailable, ...
I bought a wifi camera and performed the simple startup process: Powered on Discovered the camera through the dedicated App Set the WiFi credentials on the App to pass to the camera After that, the camera gets connected to my WiFi network and I can use the device. I'm curious about how the App passes the WiFi credent...
I have been reading about the security and performance implications of rel="noopener" and rel="noreferrer" in links with target="_blank". These are some of the observations: if you open a link in a new tab from your app, by default it would have access to window.opener and would be able to change the url for it (rever...
Considering that all modern motherboards have code signature procedures in place like it is mentioned here: Is it possible for malware to be in the BIOS or in hardware? I was wondering is it safe to just download BIOS firmware from anywhere on the net or using HTTP? Is it possible to install an infected BIOS firmware o...
I understand that the answer is probably that ideally, I would just have a secured api, but I want to understand the threats that exist as well as the defenses. And all of the articles I've read focus primarily on "they could come in and take your data," which just isn't my problem. Say for example: I have an api that...
I am trying to understand how websites implement in-browser account switcher. e.g you can login to twitter using multiple accounts. On the bottom left when you click your currently logged in account, if you have multiple accounts, you can see them all and simply switch by clicking a different one. How does this work? T...
I have heard online that simply visiting a website can infect a computer. I had an instance recently where someone I know sent me a link but misspelled it. The misspelled link lead to a malicious website. The misspelled link was: WARNING WEBSITE MIGHT BE MALICIOUS http://ww1.vassarstat.net Which is a misspelling of ww...
I have a registration login process which includes a one-time activation link sent via email when the user registers. When the user clicks the link the account get's activated. Now what error message should/can i show to the user when he tries to login with valid credentials but the account not yet activated via this o...
I'm learning Web Security currently, and my tutor left this practice for us. Is there any solution to bypass this js statements and as a result, for example, to display alert(1)? Thanks! input = input.replace(/-->/g, '') return '<!-- ' + input + ' -->' I know how to do it without the replacement. But I'm stuck on the ...
Please assume that I use some FOSS, SaaS, public key && passwordized private key protected password vault program to primarily store passwords of websites I rarely use (such as Q&A websites or free content enterprises), which are not very "sensitive" by means of security and that I wouldn't have any significant damage ...
I want to export the configuration details from an existing CSR or Certificate to a config file which I can use with OpenSSL to generate a new CSR. Background Our CA has changed. For the old one, I submitted a CSR and a list of subjectAltNames and the CA team sorted it out. For the new CA, I have to submit a CSR with...
I need to verify that survey respondents are in the same physical room or video chat (to prevent industry espionage). The respondents can join by scanning a QR-code that opens a URL which embeds a code with 61 bits of entropy. The code and QR changes every 5 minutes. However, as URLs tend to be considered security by o...
Recently I faced argument that threw me a bit off balance. I've been suggested that running application bare metal is actually more secure than running it in container. Reasoning behind that is that even if your containers run on user privileges, still containerd (unless it's running in rootless mode) runs as root so i...
which methodology of pentesting for industrial soltions (DCS/SCADA/PLC/Cotroler Servers network with OPC connectivity) would you recommend to apply?
This is where I took this example from: <a href="<?php echo $_GET['e'];?>">Back</a> In this code, I can do http://my_url?e=javascript:alert() But what can I do if my code is like this: <a href="e<?php echo $_GET['e'];?>">Back</a>
I need help understanding what is happening on my LAN and determine if a malicious attack is taking place. The "attacks" started to occur for the first time last night. This morning, I open my computer to find over 100 remote-access attempts that were block by Avast (Avast Remote Access Shield labelled them as SMB:Brut...
I have a query regarding best practice of using PGP to sign emails with Thunderbird 78. Thunderbird 78 took an existing system by Enigmail and brought it "in-house" to be built into the email client program. This results in some notable changes which -to me- are concerning and I wanted to double check if my concerns ar...
I may have found a security bug in GNU Scientific Library (https://www.gnu.org/software/gsl/) and would like to request a CVE ID number with it. According to the procedure explained here: https://cve.mitre.org/cve/request_id.html#cna_participants, I will need to contact a CNA. But none of the listed CNAs seem to cover ...
I'm trying to create a lab environment to experiment with MiTM attacks. I want to learn docker also so I've decided to do this with docker. I created 2 images (attacker, victim): Victim - based on Alpine, with curl installed Attacker - based on Ubuntu, with installed iputils-ping iproute2 curl iptables vim ettercap-tex...
I am trying to figure out what is the best way to hide Tor traffic in order to improve anonymity. While Tor is pretty good at hiding users’ IP addresses, its traffic stands out. This can be detrimental in some cases. In this article (FBI agents tracked Harvard bomb threats despite Tor), the perpetrator has been identif...
Assume that I share the same IP address with others. Then if I can do something bad to intrigue practical websites, such as Google, Amazon, or jQuery to block me, then all other users will also be blocked as a "collateral damage". I wonder how practical it is to really intrigue a real-world website to block my IP, assu...
I want to run my computer program(or code) on someone else's computer(with permission from the owner of the computer) and get the results back. How can I make sure the owner is running my program only, for the computation of results? Does something like Intel Secure Enclave can help me achieve this?
Someone in our family recently requested a password change for a website (Costco). Soon after requesting, they received an email with the standard "click the link below to reset", followed by a link. They noticed that the email looked a little sketchy, so they had me look at it (after they had already gone through with...
We are using Java and we are planning to create a reusable API that can be used to generate and validate custom tokens. This is how we will do it Step 1: Generate a random number using a good a CSPRNG (Cryptographically Secure Pseudorandom Number Generator) . This will be the seed of the token Step 2: Hash the seed usi...
I have a machine running CentOS 7 with a removable hard drive. I want to restrict what hard drive can be used with the machine i.e. the machine can only be used with one disk and nothing else. I've been looking in to UEFI secure boot. Can UEFI secure boot be used in this way? My research is inconclusive. I may be able ...
A year or so ago, I set up this system which, whenever Composer (that's PHP's packet/library update manager) fetched new updates to my few (but critically required) third-party libraries, created a copy of the Composer dir and opened up WinMerge to display the differences for me to manually go through. Initially, I tho...
let say hacker want to come over the aslr or he want to call function that doesn't exists in user program ,can he insert to the return address address to the share library function or this functions being load only when the user program call them
People say buffer overflows are serious security bugs that can usually be exploited. Here is an artificial buffer overflow #include <stdio.h> int main(){ int a[3]={0,1,2}; printf("value = %d\n",a[10]); } I have two basic questions: Does "exploit the buffer overflow" mean to change the code? If so, ho...
I recently started thinking about an attacker which would clone a mobile application, and add some code which would do something malicious, e.g. credential theft. This cloned app would communicate with a legitimate server and therefore offer a legitimate service to the user. On the web this is solved by relying on user...
in a certain page I have a newsletter subscription form, where the user enters his e-mail address and then through PHP an authenticated e-mail is sent to myself with the user's information (e-mail address he declared, IP address, Hostname, UA, timestamp). Yesterday someone was spamming this function by making hundreds ...
If the private key is used in the server for digital signature, once the server is hacked, the private key may be leaked. Is there a way to create a digital signature without exposing the private key?
I generally use a free college wifi and sometimes chats on telegram and also send pics can hackers access those pics and chats and can he access my gallery and see pics? And if he hacks and install and malicious apk in it to track then can it be deleted by any way, i have reset my phone! Am i safe?
For educational purposes, I am pentesting an app server of mine. I am using ZAP and it reports a remote file inclusion vulnerability. I looked at it and think its a false positive but before I miss something I wanted to ask the community: ZAP Report: URL: https://myapplication.net/home/logoff?target=http%3A%2F%2...
Recently, I've been receiving emails from JP MORGAN CHASE that are blatant phishing attempts. Out of curiosity I have opened them a few times, and they're just completely full of absolute junk characters; lots of symbols, essentially akin to WingDings from Microsoft Word. On my desktop computer, Mozilla's Thunderbird s...
Let me start by acknowledging that I have absolutely no experience with Windows development and this is purely for academic purposes. I apologize for incorrect terminology and welcome corrections or good resources. When we run a program from an uncertified vendor we get a security warning from Windows indicating that t...
Up until now, I believed that TLS authentication and encryption can only be achieved when both the client and server exchange certificates with each other initially? Now I am seeing an example in Python code where an MQTT client is communicating with an MQTT broker, but only the MQTT broker provides a certificate. How ...
My windows defender detected this trojan: win32/credentialaccess!rfn and I tried to remove it. I use dual boot with Ubuntu: can this also effect ubuntu? If i reset my windows completely can it come again
I have two archived files which were shared with me on google drive. Im using a mac. Both are 9GB if I'm remembering correctly. The files are too large for google to scan for viruses, and too large to check with virus total. I believe they are safe, but I want to check both. What is the best way to approach these big a...
This may not be the correct place to ask. Forgive me, if it is not. I bought a computer from ebay second-hand and did not receive activated Windows 10. When I requested a registery key I was sent an invalid one, so the company accepted that I return it to them. However I had logged in to Windows 10 with my name and usi...
What learning path would you recommend for someone interesting in focussing on the Cloud Security side and considering remote work in the future? Many thanks
I'm testing CVE-2019-14748 on an example.com with osTicket. I've uploaded a test.html with the basic <script> and <img> XSS payloads which run when a user opens test.html. However, in Firefox, when I click on the test.html file for viewing, I'm prompted the "Open in/Save as" box and I click "Open in Firefox", which ope...
I have written an application, that calls a 3rd party application with process.Start(). Inside the Arguments I pass needed credentials. like so: proc.StartInfo.Arguments = $"-c: -h: -x: -m:{Hostname} -d:{DomainName} -u:{UserName} -p:{Password}"; Now I want to prevent, any process to sniff on the communication between ...
There is a recent rise in Spam mails sent from seemingly legit german email-addresses according to the mail headers: Received: from mx1.aok.de ([91.199.166.49]) But when I nslookup mx1.aok.de, I get another addresss: Name: mx1.aok.de Address: 217.110.254.8 When I reverse lookup 91.199.166.49, I get mngw.ungstabled...
I thought that there was spyware on my phone so I did a factory reset. Would the spyware be gone or it will still exist even after a factory reset?
Why does owasp recommend using case insensitive logins ? Make sure your usernames/user IDs are case-insensitive. User 'smith' and user 'Smith' should be the same user. What's the security aspect of it?
I was working on a rule that reports phishing sites, and I wanted to exclude known domains, such as .microsoft.com etc, and a doubt arose: can someone register a subdomain of a known site to phishing purposes? I came across this article, where there is a video demonstration. So, 2 questions: Is it possible to register...
I would like to use digital signatures to secure access to a RESTful API, exactly as described here under "Message signing using Digital Signature". Extract: When signing, the sender uses their private key to write message’s signature, and the receiver uses the sender’s public key to check if it’s really from the sen...
Is it more secure to set up a network so that there are no unused IP addresses?
I am making a webview that is going to be part of a native iOS and Android app, I implemented the webview using HTTPS as a protocol, and developed my NodeJS app there. But the security team from where I work, came with the following situation: "what if the phone that has the app is connected to a malicious router, and ...
I've found some KMS key exposed in some code and am wondering what exactly the severity would be. What could an attacker achieve by having this key?
I was reading about encryption and had a question about it in general. If I have a laptop with an encrypted SSD which I decrypt on boot up, it means it is all in plain text/data right? If I do a hard shutdown or snatch that laptop while running, it means that the confidentiality of my data on that disk isn't ensured? I...
When you are under targeted surveillance and all of your internet traffic is tapped (including parts where you exit from a VPN to the internet), is there any point in using traffic obfuscation? It won't matter if you use https, wireguard, openvpn ... the protocol could be the the most rarely used in the world. It won'...
I downloaded a sensitive pic on telegram's secret chat which contained important details on public wifi, can anyone on the same wifi see what i downloaded and saved in my gallery?
Consider the case where a user with a freshly installed Linux box is operating in a hostile environment controlled by an attacker with access to the internet gateway. How can such a user update the system and install software securely using the available package manager, e.g., apt, npm, pacman, etc, when they are targe...
Does it mean that the source IP is replaced with something else (like if in IP spoofing) so intermediate routers don't know who is sending the packet?
I'm new to security concepts. I am studying how SAML works and I'm confused about how IDP sends SAML assertion to SP. I searched on the internet and I found out two scenarios are possible. First is when you authenticate to an IDP, the IDP sends the browser a SAML file and the browser will use it as a token to authentic...
When using a service like 1Password, what happens if you forget or lose your master password? My guess is that you can simply reset your passwords on all the sites 1password remembered for you, but I think if you don't have a recovery email address or phone, things like gmail accounts might be rendered permanently inac...
I recently found out, that according to the RFC, SSH can negotiate two different cipher (and MAC) algorithms for server-to-client-encryption and for client-to-server-encryption (check section 7.1. for reference). In section 6.3 this is also asserted: The ciphers in each direction MUST run independently of each other. ...
To my understanding, it is common security practice to lock the account after X failed login attempts in N minute. Usually, the account will be locked for M minutes. I noticed that most of the time X is 3 and usually the account needs a reset by the system admin. Now my question is why X most of the time 3? and are the...
I'd like to build an IPS which would be a seperate endpoint than the router and/or protected servers. To achieve this I've installed to my Ubuntu server Snort with DAQ(AFPACKET). The instructions I've used is here -> Snort 3.0.1 on Ubuntu 18 & 20 I've built a local network which to simulate a real use case. For simplic...
Could you please explain, how to find all of the existed subdomains of a domain address and registered email addresses of these subdomains? I found a website called snov.io but it only shows some of the email addresses, also it doesn't work for subdomains. The second website called robtex.com, but this one is not for...
Basically, I want to crack hashes programatically using hashcat python without having to install hashcat binaries. Python seem to have a module called hashcat (https://pypi.org/project/hashcat/) but I couldn't find any documentation on the web for how to use it. Does anyone know how to crack hashes using python?
I am a developer who's just starting to learn about authorization and authentication for web apps. I am bit unclear on the concept of managing access control to parts of the app, and where is the best place to have access control managed, given the plethora of third-party authorization services like AD or Auth0. For in...
I have reviewed several discussions here regarding offline root CA management. While useful, none quite capture my question. Firstly it presumably would not be generally assessed as an 'offline' root if its key is in a network connected HSM, no matter how protected (with a PIN, behind firewall, etc)? In my setup a phys...
I have been working on Random Forest Classifier to detect .exe files as Malware and benign. According to me False Negative in my model should be low because they are more harmful but in some blogs online, it is mentioned that False positive are more harmful in malware detection than a false negative. I was wondering wh...
I know many developers use a tunnelling software called ngrok, yet many don't know how it works or what it's doing. An example of its use is in testing webhooks on a development server I found this question which indicates it has some strong usage and big companies use it. I wonder what is it doing to the computer (e.g...
I am using CRC32 to verify the integrity of received UDP packets. Along with the generator polynomial, the sender will also specify how many checksums to perform on the sent data, as well as what iteration to start at in its body. How should this be done? For example, say I am sent this data 100100001 And this key 110...
I'm new to steganography. I have some questions about images on social media sites. I saw that Facebook recently patched a vulnerability on Instagram, but I was wondering whether any of the major sites (Facebook, Twitter, SnapChat) sanitize images? I assume not, but want to cover my bases.