instruction
stringlengths
24
29.9k
I understand the purpose of Microsoft Word is not to store secret information. However, I would rather spread my secret information between a Password Manager and a Word document, each of which has separate secure passwords. Is a password-protected Word document from Office 365 (2020) sufficiently secure to store finan...
Im trying to wrap my head around the difference between SAML/OIDC/and OAuth Is the only reason SAML is the most popular choice for enterprise SSO that its been around much longer? Is it expected to eventually be replaced by OIDC and OAuth for SSO OR is there something inherent to SAML that makes it better suited to SSO...
I know that this world is very evil, and that the most unfathomable things go on around the clock, inside and outside of the "computer world". However, I sometimes really wonder if certain things can really be true. For example, I read this comment today: you'd be fucked with that virus I saw back in the times. Corrup...
So right after I clicked the link, the owner of the link sent a screenshot, and it was accurate, the city was correct, so not long after my internet box reseted out of nowhere, while I was in class, it would log me off the meeting and say that someone else was trying to log somewhere else, which is so weird. And usuall...
I was reading about The Hacking Team on Wikipedia. It produces "offensive intrusion and surveillance capabilities" and sells it to "to governments, law enforcement agencies". Its spyware allows governments "to monitor the communications of internet users, decipher their encrypted files and emails, record Skype and othe...
I've been wondering about which level of trust I can apply to a used phone bought from someone else. I can easily unlock the bootloader and flash a brand new Android. However, what about firmware customizations? What if there is something bad that runs before Android boots? I'm not talking about something that the manu...
So my teacher caught someone playing a game in my online class and warned us that they have installed a new program so they can track "everything we do using our ip address" now im quite techy so im sure this is bs but i want to make sure, im on my home computer using my home internet and using google meets, there are ...
How does AWS request signing and verification work? Let's say I have created a signed request using this guide. How does AWS service verify this signature? I see 2 options with their respective flaws (considering symmetrical encryption only) AWS stores encrypted access key, which is used by the end service to calculat...
I want to sell online some of the electronic stuff that I don't need anymore, such as my ASUS Wi-Fi router, and I'm wondering when I upload photos of it should I leave its serial number, MAC address, and pin code written on the back of the device visible or should I photoshop it out. I checked other people's stuff page...
The laptops in use at my company have SIM card slots, which are actually used by some of our users. I am threat modeling our devices, so I was wondering if there are any realistic exploits that can be used on these laptops, no matter if the users use a SIM card or not. According to this question, it is in theory possib...
All the other questions I have seen here focus on the security implications of IP addresses. I'm interested about the privacy implications. In my opinion, static IP addresses for home connections (where you usually don't need to host any services) should be avoided, because they will make you easily recognizable on the...
I'm looking for a consolidated list of how and where isolated storage is managed on each operating system... (Windows, MacOS, Linux, (mobile?), ...) Does such a list exist? What considerations might be worth considering in conjunction or as an alternative? (e.g. TPM integration, SecureElement, or for cloud scenarios Ke...
I use Redis to track valid JWTs by saving the JTI (uuid-v4) mapped to the users id in Redis. If the JTI can not be found in Redis or the user id in Redis does not match the user id in the JWT the access is denied. If the JWT has expired (after 30 min) the client sends a token refresh request to get a new token which ap...
I am using same configuration files for OpenVPN, same operating system (ubuntu 20) on two different laptops, but I notice with Wireshark, then on one of them, the VPN connection goes through UDP, including all DNS requests, so I don't see any DNS, but the other laptop, all through TCP, and I see the DNS requests. One o...
Is there any benefit to mixing vpn protocols as far as obfuscating your traffic. Would a multiple hop setup like (openvpn(server1) + wireguard(server2)) be better or is (openvpn(server1) + openvpn(server2)) just as good.
I need to develop a website where a user (Bob) send text, image, or video content to my website. After some time, I need to send this data to another user of his choice (Alice). I want to encrypt user data before storing them on my website to preserve user privacy. I don't want to be able to decrypt these files/store t...
I though it would be an interesting idea for my final year project. A honeypot token in an image form, with a hidden script that will send you information about the user when the file is executed (opened with an image viewer). Main goal is to identify leaks and stolen data. But the more I research the topic, the more...
I have recently bought a wifi range extender to improve the signal coverage through the house. When I set it up, I noticed the iOS 14 recognizes it as unsafe since it uses TKIP and advises to set it up to use AES instead. I did my research and according to the manufacturer, it seems the device automatically uses WPA2 f...
Say I'm using a VPN to talk with a server, and Bob is eavesdropping for packets at the VPN. Basically a special kind of man-in-the-middle attack. If I'm using HTTPS, how clever would Bob have to be to bypass HTTPS and get the data from my packets? How about metadata (e.g. my IP, target IP, time sent)?
I have an API (in this case GraphQL) and an accompanying app. My server is already censoring any data that the user is not authorized to see, so forget the risk of leaking any data. There are certain actions I would like my client to take based on the user's role (logged-in, subscriber etc). A simple way to achieve thi...
In class, we learned how to set up a VPN between two remote sites using IPSec in tunnel mode. I have a VPS for hosting my website (with root access), but if I set up a tunnel between my PC and the VPS, then my source IP will still be clear between the VPS and the internet when I browse the internet, right? (traffic is ...
I am aware of several ways QR code generators could pass "hidden" information "around" the QR spec. For example, if you can use the masking in a spec to ignore an area where you plan to put a logo, then you could just as easily put information there. However, in any of these schemes, the "hidden" information would only...
I'd like a solution that autounlocks Bitlocker, VeraCrypt or similar FDE on Windows 10 while I have a device plugged in. When it's not plugged in (or I lose/destroy the device) it should just ask for a password of considerable length (not just a PIN). It can be boot time or not, I'm interested in either way. If I remo...
I have come across a file eraser called Eraser, and I have two questions about it: Are file erasers sufficient for completely removing secure files/folders on a computer (meaning is it possible, in any way, for the data to be recovered). (Slightly less important.) How can I verify the security of Eraser? Are there web...
So I was wondering if I were to be infected with malware would it be visible? For example most malware will want to gain access to system files. Since Catalina Apple introduced some insight into Security/Privacy via settings inside System preferences, which lists applications that have and/or have requested access to C...
Nowadays people prefer to do their shopping online rather than using the real shop, especially because of the COVID-19 restrictions. But in the same context, attackers (scammers) are trying to gain their own interest from this situation. I'm in the middle of one research where we have found hundreds of scam webshops, b...
I'm trying to get the IP address of a CCTV camera and so far had no luck. The device it's a Hikvision DS-2CD2042WD-I I have connected it to a PoE switch, which is then connected to my laptop(Ubuntu 18.04) I want to find the address to that I can rstp to check if the camera works correctly. My understanding is that thes...
I'd like to set up a remote backup for my PC. I want to have it run at scheduled times, encrypting the data locally and then transmitting it to the server. I'd like to use something popular and open source (like veracrypt), but most of those seem to be symmetric encryption. In order to perform the encryption, the syste...
Looking for some guidance on an internal discussion we're having. We have a .Net developer that is requesting all development systems with Visual Studio installed don't have .Net updates installed. The reasoning is that it breaks Visual Studio and things (I'm not clear on exactly what things) go 'missing' or no longer ...
We are running vulnerability scans on our systems. I can see a few XSS vulnerabilities being reported, such as CVE-2020-14173. Let me quote: The file upload feature in Atlassian Jira Server and Data Center in affected versions allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (X...
We have open endpoints because there is a flow where access token is still not presented. Because of that, I've implemented HMAC + DPAPI (using Azure Blob Storage) to store the keys, without involving config files/database. DPAPI is shared between the applications (using .SetApplicationName()) The flow is basically: C...
In Microservice architecture, public clients & confidential clients are there as per API Gateway Pattern, Public clients connecting from Browser to backend reaches it via API Gateway API Gateway does Authentication / Authorization and reaches backend point Depending on the client [ OAUTH2 Grants type are used]. Que...
Although using multi-factor authentication is clearly a good move, I'm struggling with the 'one-time recovery codes' concept. It seems to me that if you choose to use them, what you're doing is putting extra security on the front door (like bolts and padlocks) making it harder to break in that way, but installing a pap...
I'm using a secondary drive to store encrypted files, in VeraCrypt file containers. Unfortunately, even if the external drive is formatted as exFAT, Windows leaks information on files inside mounted VeraCrypt containers. The highlighted file has been created inside the external drive-hosted container. Thus, how can I ...
SCENARIO: webapp X use clodufront distributions to serve its content. It's possible to contact directly the origin server and get the content with the following steps: modify /etc/hosts to add <ORIGIN SERVER IP> <WEBAPP URL> intercept the request to <ORIGIN SERVER IP> change from https to http modify Host substituting...
So I'm trying to evade a filter that escapes < and >. I read that it's possible if the XSS gets injected inside a tag, but in my case, it gets injected between <span></span>. Are there any methods that I should know about?
As part of incident response to malicious code outbreak and given the hash value of the malicious artifact, I would like to search across the entire organization for this specific hash value. Do you know of best practices or solutions that implement such functionality?
I was wondering if I compare SHA-256 of two binaries with same version on different machines, results will be two identical checksums. I tried this on ssh on macOS (Catalina). (I checked that ssh -V produce exactly same version) And tested with this command: shasum -a 256 /usr/bin/ssh and run same command on my friend...
I have two lab machines, one Kali and one Windows 10. Netcat is running on both and both are communicating successfully. If I create a simple text file I can transfer the file from Kali onto Windows no problem. However, if I run the following commands: [on windows] nc -nlvp 4444 > incoming.exe [on kali] nc -nv 10.11.0....
According to this source about TLS, there are 3 stages (I'm over simplifying): Set up. Server client hello and select TLS version + Cipher Server Sends. The server sends Certificate = Public Key + Signature (SSH connection requires the same kind of arrangement, the server holds a private key, and the client a public ...
tl;dr: I have switched phone and operating system: Android 8.0 --> Android 10.0. Phone restored from backup, so all the remaining is the same except for Microsoft Authenticator that now requires fingerprint scan. Does this truly increase security? Or is this only an irritating addition? I have crashed my phone, but ch...
I would like to compute the MD5 hash of a file The file is uploaded to my webserver by my clients The file is uploaded in pieces (called chunks) The client also sends the md5 hash of the file so that the file integrity could be verified The chunks can come in any random order. (The first chunk doesn't always have to co...
I am searching evaluated WAF rules that check OWASP Top 10 and even more to have decent protection of a web infrastructure.
I have an Relying Party that has obtained an Access Token and Refresh Token (as well as an ID Token) from an OpenID Provider (not an offline token). In all cases I have seen, the Refresh Token is invalidated when the user logs out from the OpenID Provider. When I have an OAuth Client that obtains an Access Token and Re...
I have a Linux machine running Kubuntu 20.10. I have installed VirtualBox 6.1. I then created a virtual machine on which I have installed Windows 10. Suppose an hacker enters in my Windows 10 guest. Will he be able to see the files of my Kubuntu host (I mean, the files not in the shared folders, of course)? How does th...
I've seen this but the related answers don't answer my question. For TLS 1.2 is the hashing algorithm specified in an X.509 certificate's cipher suite used for the signature inside the certificate or the TLS handshake/communication process or both? I'm in the process of replacing an old self-signed certificate used for...
I have recently read about the comparison between KARMA attack and Evil Twin attack. The article states that contrary to an Evil Twin attack, in which the attacker is required to be in range of the victim's network, the KARMA attack can be performed even if the attacker is far away from the targeted network. The articl...
I have downloaded the ISO image of Kubuntu 20.10 and installed it. I am afraid that the ISO image may have been tainted (for example, by the NSA) to insert a backdoor into it. As I see it, there are two ways to insert a backdoor (I mean an intentional one, not an OpenSSL bug): Directly in the source code that is publi...
MS has exposed ADROZEK: https://www.zdnet.com/article/microsoft-exposes-adrozek-malware-that-hijacks-chrome-edge-and-firefox/ I would like to know if the browsers (Chrome, blue ff) of my Ubuntu 20.04.1 LTS are infected. After a few searches, nothing came up. Perhaps it's still too soon? PD: I wasn't allowed to add the ...
Is it correct that TLS 1.2 prohibits MD5 as a Signature hash algorithm in X.509 certificates used? Is this just an SChannel + TLS 1.2 limitation? Trying to find any webpage/documentation that is stating this explicitly in relation to TLS 1.2 or SChannel. I've found the following in the TLS 1.2 RFC but I'm not sure if t...
Please excuse me if this is a dumb or obvious question, I'm self taught and have not been able to find an exact answer to my question after much Googling and reading through StacEx! I'm having issues with the process of requesting/purchasing an SSL cert for a public website where the cert is not going to be used in a t...
I'm writing a rule for modsecurity 2.x to match an IP address to those in a file. SecRule REMOTE_ADDR "@ipMatchFromFile /etc/modsecurity/address_list.txt" I understand how this works, I'm just wondering if anyone knows when modsecurity loads that .txt file. Is it only loaded when the rules first load or can it be dyn...
Assuming quantum computing continues to improve and continues to perform like this: ... quantum computer completes 2.5-billion-year task in minutes is it reasonable to expect that 256 bit encryption will be possible to brute force at some point in the future, and if so, what estimates (preferably from large tech comp...
Is it safe to include the CSRF token as part of an HTTPS successful login JSON response in an SPA? If not, is there a better mechanism for sending it which avoids the Double Submit Cookie pattern? Some background: I am building an SPA application (Node/React) which communicates HTTPS with a JSON API backend and I am tr...
I've been asked by a customer of mine, to manage a few hundred WordPress sites. Doing an initial security assessment, I've found that every site (350 sites) has unusual file permissions on every php file (755) that means executable bit on all groups (user, group and other)... Trying to investigate further, I've checked...
The motive for doing this is that I want to open other ports so that I can evade firewalls which block VPN connections. Instead of redirecting eg. port 53 or 123, I could simply set up a destination NAT rule (my router allows 'easy' port forwarding or you can set it up manually with a destination NAT rule. using the DN...
I'm developing a headless linux based industrial safety product. It is very much limited to work with only known sources/hosts. Can I safely delete the trusted root certificates provided by the OS and Mozilla. Though I had not enabled mozilla in my target packages configuration, I see the certificates in the Root File ...
I'm auditing my network setup and trying to determine an appropriate password length with a random set of digits and numbers. I found a Security Stack exchange answer but it was written in 2012 and wanted to see if the recommendation has changed since then.
If I allow base64 encoded images to load on my website, but I do not have unsafe-eval enabled, nor have I allowed 'inline-script' would my site still be at risk by allowing base64 encoded image data to be painted onto images that might have malicious script inside?
In creating a blacklist function as part of our multi-pronged defense against SQL injection that includes parameterized queries and validating for length and type of input, we are creating a Blacklist function to check input from a .Net web form to run against SQL Server. Does there HAVE to be a semicolon (;) or commen...
If the target's traffic is going through the MiTM, then can't the spoofer find a way to just not traffic the connection? Or traffic the connection very slowly? Over all what I'm asking is that instead of a MiTM attack being for traffic analysis, could it be used to simply block a connection?
Does nmap support the following (-sS -sV -sC -O ) with a scan using socks5 proxy and if it is not what is the best way to scan linux system through a windows system ?
If I'm not wrong, one of the many ways companies track and collect data of people through the internet is by identifying their hardware. Getting the monitor resolution, figuring what CPU it is, etc. So are there any methods of resisting this? I had a potential idea of evading the monitor thing by VNCing into another co...
Let's assume I have a Windows 10 computer and my login password has an entropy of infinity. If I did not encrypt my entire hard-drive, does it matter how secure my password is? Is it possible for someone to plug the hard-drive into another computer as an external drive and simply read all its contents? Thanks
I feel like I am going crazy. A friend was at my house and received text messages from a number from a person i know. She had a conversation with this number for basically a week. She is now saying that she set it up to make it look like it was that person texting her. The messages were even coming in when she was asle...
I am aware that running ssh-keyscan on a remote host doesn't prove that the remote host is indeed the one you are trying to connect to, only that it's the same one each time, but what about if I run ssh-keyscan localhost on that host beforehand, and add that info to my known hosts manually? Is there any way that that c...
I wrote a stand-alone anticheat. When the client anticheat connects to its server, the server creates a firewall rule allowing the game client to gain access to the server. The problem is the firewall creates rules by IP address. If NAT is used, then one of the NATed IPs accesses the anticheat server, this server creat...
Been given a smart tv that used to be used as display connected to a pc with a HDMI cable, now I'm using it as a display as well, over HDMI too. I was thinking maybe when connected to a network or inserted an usb into the smart tv it could get infected, but what about when connected over HDMI cable? As far as I know HD...
Situation I'm using KeePass to manage my password together with a long complicated password. I need to access passwords quite often so it's a little cumbersome to have to enter the password each time. Since I'm working in a regular workplace with other people I have a quite short interval before KeePass locks itself af...
From what I understood TLS is protocol independent of HTTPS and can be used with other protocols as well. For example in order to connect to MS SQL server via encrypted connection I'll have to enable TLS with cert on MS SQL server and I know that works. My question is why it's not possible to leave MS SQL server withou...
As far as I know, before sending and receiving data in HTTPS, there needs to be an SSL/TLS handshake. Is it reliable to consider every SSL/TLS handshake in port 443 as the start of an HTTPS connection? For example, to understand how much data is transmitted between client and server via HTTPS, can you check for an SSL/...
An nmap scan of my test computer returns a result of “5357 / tcp open wsdapi”. After some research, this is something that can be exploited. It is explained here that: By default, WSDAPI will listen on TCP ports 5357 and 5358. The Windows Firewall will allow messages in to these ports if the interface firewall profile...
If an attacker successfully delivers a CSRF payload by any means, what response can he can see once a victim clicks the link?
I've recently become the "tech guy" at a startup, and am tasked with standardizing our hardware infrastructure. Further more, I choose how employees working from home will connect to business hardware. I am not a security expert, although I do know some things here and there through life experience as a developer and c...
I have setup squid proxy on a CentOs server where I set forwarded_for to delete and denied request headers on the /etc/squid/squid.conf file. However, whilst connected to the proxy, if I visit http://ip-check.net/detect-proxy.php it still detects that I'm using a proxy. How can I configure Squid to hide the fact that I...
As far as I know, when passwords from a website leak, they leak in an encrypted form. Are all those passwords equally easy to decrypt? My hunch is that a 10-character-long password maybe gets decrypted in a few minutes, but if a password is 100-characters-long, it takes days or years to decrypt. Does it make sense? Is ...
Does DVD+R have an MBR? If it does, can a virus that overwrites the MBR overwrite the MBR on the DVD+R? I'm about to run a virus in a virtual machine with the DVD mounted because the virus is on the DVD, and I don't know if it's a virus that overwrites the MBR, so I don't know if it will overwrite the MBR of the DVD. I...
On some internet banking websites, I've seen some CVV input fields that seem strange to me. Here is an example: The field works as such: You can not input a CVV code using a keyboard. The numbers are never in their normal order (1, 2, 3...). The positions of the numbers are shuffled each time you open the CVV input p...
I've always been afraid of downloading software because of viruses, and that has affected my life as a programmer a lot. So, I want some tips to be able to install and download software without fear of viruses.
This question has been asked previously, here. However, none of the answers there address the question. The accepted answer conflates Authy's multi-device mode with its cloud backup feature. I am specifically not asking about the cloud backup feature, but about the multi-device mode which is available even without havi...
I am dealing with a unique scenario where I have a mobile app that is unable to be updated on the App Store and has implemented SSL pinning. The issue is that the app pins against Lets Encrypt, which now will be moving to new certificates that are not pinned. As a backup, the app pinned a number of other certificates: ...
We recently received an email from a self described "white hat hacker" purporting to be from our own organization. According to the mail headers, spf, dmarc, dkim and arc all passed okay and gmail didn't flag it in anyway. We use google domains for our email and the spf/dmarc record in question for the domain is SPF ...
I, user ABC, have an account on some financial website example.com. I have logged in from my browser many times before so cookies were saved. Each time I would log off after I finish browsing that website. The next time I arrive at the page, I am at the log-in page again. Now if I do not log in and simply browse around...
If an enemy company's hacker has Remote access to my computer (RAT), can they spy on me and screen record my activities for proof without me knowing it? Can they screen record all my internet activities (writing emails, dealing with companies, Linkedin chat) in the background (i.e. without my knowledge)? I use Windows ...
In several Python libraries, I have seen validation functions that raise exceptions upon failure, instead of returning a boolean result. Examples include: various verify functions in the Cryptography library the validate_authentication method of pyftpdlib's Authorizer These functions only serve to test whether or not...
Yesterday I was on a call with some friends on the discord when suddenly the sound of the windows was silenced and my cursor started to move robotically, as if I was fighting a tug of war with someone who moved the mouse in the opposite direction to me. At the same time I restarted my computer, and when I started windo...
I am increasingly being requested to join videoconferences through Zoom, which I don't trust to run on my machine. I understand that there are two common ways of sandboxing this software: you can either download the standalone Zoom application and then run it with the aid of some access control system, such as Firejai...
We use a linked hash list for data integrity. Content is hashed (HMAC-SHA256) and stored in a block that itself is hashed and referenced in the next block: Simplified example: ... { id: "block1", cId: "A", cHash: "hashOfA", pId: "block0", pHash: "hashOfBlock0", t: time }, { id: block2, cId: "B",...
What would be a way to transfer files in one direction from internet-facing computerA => air-gapped computerB to protect the files on computerB from unauthorised disclosure, short of using an expensive data-diode? Requirements The data transfer must be continuous. (cable is ok but not a USB flash drive) Only the confi...
I'm finding it really hard to find a solution to make secure requests via our API without a potential hacker being able to see sensitive secret information via Google Chrome dev tools (or any browser's dev tools), as React tends to show everything that's client-facing. Our backend hosts Stripe payment info (which may o...
As I understand it, there is no internet protocol that provides true broadcast like in say a card game or a partially synchronous network assumption. How close can internet protocols come though? We've many parties playing some card game. Alice has a "hairdresser" card she wishes to play, so she broadcasts "hairdress...
I read some articles about XSS and how to mitigate the flaws in a web application. I've seen the HttpOnly on Set-Cookie. Can this flag be bypassed? Or is there another way to access a session cookie? I read some articles but I think they are too old: https://stackoverflow.com/questions/228138/is-it-possible-for-a-xss-...
SolarWinds Orion customers have suffered some network compromises according to news reports. One report says, right at the end of the article, that SAML2.0 signing certificates may have been compromised. From the point of view of a SAML service provider (that's me!), this means attackers can spoof Assertions (credentia...
I know that anything can be exploited. But let's say I want to prevent thieves that do not have access to not openly available exploits, to reset my phone so he can sell. If no openly available exploits exist, then he'd be left with the options of factory resetting (which I opened a question about here: Is Android's sy...
I'm using Ubuntu, I detected a file called "yveqsh93.exe" after plugging my USB into a heavily used Windows XP machine in one of the labs of my research group at university (Controlling some lab equipment). This file was labeled as a trojan by VirusTotal How do I act now? I immediately disconnected my Password vault fr...
As Windows is case-insensitive, the string mimikatz can be evaluated the same as MIMIKATZ or MimIkaTZ. A naive method of AV evasion by switching cases of some characters in suspicious string has been demonstrated here where the string wdigest.dll is simply replaced with the same thing but with some characters in upperc...
If someone buys a brand new PC with NO antivirus program, and:- Never opens ANY emails/attachments Never visits shady/malicious websites Never downloads anything, Never connects an infected removable drive to the PC. Never clicks any advertisement ...but just browses YouTube, Wikipedia, and some other educationa...
I was testing how WPS works on my home router and tried to gain access with airgeddon. Problem is the key that airgeddon returns is an 8-digit number, not my WPA2 password. My output looks like this: PIN: 12345670 Key: 12312312 while it should look like this: PIN: 12345670 Key: "mypassword" Is this a IPS that comes...
Can the data in a password-manager Chrome extension be accessed by a different Chrome extension? For example, if one were to install a malicious extension, could that extension access the data (i.e., the passwords) inside an extension like 1Password X? Could the malicious extension log the password a user types to unlo...
I am running Responder on Kali Linux within a client network using the following command sudo responder -I eth0 -w -r -d which is capturing many hashes in the environment. Responder is a LLMNR, NBT-NS and MDNS poisoner used for MITM attacks. Essentially it waits for users to enter an incorrect DNS name and then acts a...