instruction
stringlengths
24
29.9k
Assume that I have a GPG secret key Sk guarded by a passphrase and that I store the key in a safe in case a thief steals my laptop. The safe is itself reliable and secure. Assume also that I am likely to lose my memory in a car accident while catching the thief. I wouldn't worry about the thief, as I used the passphra...
Assuming I have a website with a button that sends AJAX requests to my server which will be expensive to process. I suppose that mostly cookie or JavaScript + cookie challenges are used to prevent (most) attacks from bots. This way, only requests sent by bots who can process cookies (and JavaScript) would be processed ...
I just generated a revocation certificate for my key. Unfortunately I don't fully understand the concept. Here are my questions: How exactly am I supposed to use it? Suppose for example that my private key gets compromised. What exactly I am gonna do with my revocation certificate? For instance, send an e-mail to all ...
I'm looking into the feasibility of using indirect CRLs to eliminate the need to manually publish CRLs from an offline root. Is anyone familiar with any similar deployments? If so, how did they set it up so the CRL signer doesn't need access to the offline CA's db? Thanks!
One of my friends has recently found malicious activity on his device. He hasn't lost anything monetary yet, but he has been getting password recovery requests sent to his email from all the various sites on which he uses his email to login. My friend has changed all his passwords and backup his data, and I have cutoff...
I'm looking at hardening our AD. One concern I have is around Golden Ticket Attacks using Mimikatz and the likes (https://attack.stealthbits.com/how-golden-ticket-attack-works). One of the things that struck me about the attack is that it requires privileges on a DC. If you already have privileges on a DC, what's the p...
Given the following situation: we have sensitive information and want to give a user access to it. At this point the user might not have interacted with our system yet. We generate a random code that we send to a user to grant him access to his information. There would also be a second factor for the access. But this q...
I've been researching low-cost, yet strong, tamper-evident mechanisms, and purchased some low-cost glitter-hot-glue sticks as part of this research. The Amazon page advertising the sticks, seems to indicate (in the product photos) that they can be used on electronics; maybe the photos even hint as to it being possible ...
Does the CA need to mandatorily publish the new CRL file even though there are no new certificates that have been compromised since the last CRL published? If CA needs to publish the CRL's periodically, how do I identity whether there are new records added to the revocation list or not? If there are no new records adde...
My email server has been under constant brute force attack for a while now, without success. Recently, however, these bots or automated scripts have found a way to "use my own static IP" in an attempt to break into the email server. I am running fail2ban which is now "banning my own static IP". My server is running Deb...
I have read and seen that javascript framekiller code doesn't seem to be widely espoused as a panacea solution. It's target use case seems to primarily be for legacy browsers or old browser versions that don't support X-Frame-Options. I am not sure if I am reading this page correctly: https://caniuse.com/?search=X-FRAM...
This is not an exercise, there might be no solution. We are producing a Docker image (based on CentOS) which is designed to be executed by a non-root user. However, this user has write access to /etc/passwd because he is in "root" group. Here are /etc/passwd permissions: -rw-rw-r-- 1 root root 692 Dec 16 14:35 /etc/pas...
I wanted to try and publish my public key via WKD. I followed some tutorials and managed quite soon to make work enough for https://metacode.biz/openpgp/web-key-directory to tell me that everything is fine. Next step: try it out. So I tried it out on my significant others Win10/Thunderbird setup - and it wouldn't disco...
I'm investigating a protection options for a mesh network (p2p). The amount of nodes is constantly changing and possibly owned by different entities. We are thinking between 802.11s with SAE (Simultaneous Authentication of Equals) https://en.wikipedia.org/wiki/IEEE_802.11s#Peer_authentication_methods and WPA-RSN https:...
In this hot question on Gaming, the asker wants to know how to continue playing FarmVille. Answers and comments exlpain ways to do so, but no one currently has a solution that seems safe to me. Someone mentioned VMs and emulators, but I’m not convinced this wouldn’t still compromise the host machine. Assuming the Flash...
I'm testing Linux server where Java web application is run as root, I typed: >ps aux in the result I see: root 18265 (...) Sl+ 19:52 0:37 java -Xmx2g -jar test_app.jar what is the best explanation for admins to convince them to run application not as root? What if user is not root, but in sudo group?
Context: Disqus and similar tools allow content creators to have an embedded "chat box" so that site visitors can comment on your content. I noticed recently that when I sign up I can claim ownership of any domain, even if I don't actually own it. I found that rather concerning, but personally don't know what the risks...
I'm currently testing OpenVPN to give developers limited access to AWS VPC's. Assuming I have 3 VPC's... VPC-A, VPC-B, VPC-C, each of these with private and public subnets. The OpenVPN server will be in the public subnet VPC-A-Pub-1. VPC-A is peered to the other 2 VPC's. I want developers to have direct access to VPC-A...
I'm currently learning about network security and came across a problem, maybe I'm just missing something obvious but I'll try to explain my environment: I have a Kali Linux VM connected to the WAN Interface (192.168.178.109) of a Pfsense VM, the PFsense has another LAN (.2.1) and DMZ (.1.1) interfaces with a few VMs c...
A web scan by ZAP indicated that my website is vulnerable to a Remote OS command injection. Details are below: This is the URL the scanner found vulnerable: https://[redacted]/[redacted]?address=ZAP%22%26sleep+15%26%22&email=foo-bar%40example.com&message=&name=ZAP&phone=9999999999 This is the exploit: ZAP"&sleep 15&" ...
All the popular password managers on the market advertise that they have AES-256 grade security. In a nutshell, the user has the master key and the password manager has the cipher-text. So the password manager cannot read any of the user data. How do password managers have the feature to share passwords between friends...
According to cvedetail graph Vulnerability Distribution By CVSS Scores, we can see that CVE with a CVSS in range 8 to 9 are the less represented of all range. Even compared to the low score ranges which seems to be generally less populated. It's really strange because it make like a gap: the range 8 to 9 represent 0.4...
If I check the processes that are running in the Task Manager and find that only the usual process run every time I restart my PC, can I assume that my device is not compromised? In other words, does a compromised device always show an alien process running?
When i use google chrome occasionally appears about 5 different McAfee's notification (I don't have McAfee installed), one of those: ATTENTION! Your computer is in danger. We detected a virus on your computer. You need to remove viruses from your computer. The system is infected. Click here to clean 22.39 uelihaldiscr...
I'm using Metasploit. I tried adding the file 46731.rb to both /usr/share/metasploit-framework/modules/exploits/confluence/46731.rb and ~/.msf4/modules/exploits/msf4/46731.rb. Then I updated the database using the updatedb command. However, when I do search 46731 in msfconsole, then it doesn't find any results. What am...
A family member of mine called my attention to a Facebook profile with data significantly resembling mine: Matching first and last name Matching city Matching secondary school Matching university Different workplace (although same industry) 4 profile photos showing someone else (safe-for-work but a bit dating-sit...
Kazakhstan recently tried to force users again to install a root CA. This has been rejected again by numerous western tech companies. https://www.engadget.com/tech-giants-browsers-block-kazakhstan-web-surveillance-080031499.html How they do it might be questionable. But consider they would have gone the official way to...
I have a WCF (Windows Communication Foundation) application using the netTcpBinding. Server configuration: <netTcpBinding> <binding name="defaultNetTcpBinding"> <security mode="Transport"> <transport clientCredentialType="Windows" protectionLevel="EncryptAndSign" sslProtocols="Tls12"> <extendedProte...
Obviously there is massive information about the SolarWinds Orion hack itself of the malicious DLL injected into the update: https://www.fireeye.com/blog/threat-research/2020/12/evasive-attacker-leverages-solarwinds-supply-chain-compromises-with-sunburst-backdoor.html But how did the SolarWinds company themselves get i...
I'm working with a program with a networking protocol that is using RSA keys to authenticate clients. I am looking to replace the custom authentication protocol with TLS (as it's a vetted protocol). I can use self-signed certificates or RFC 7250 for client authentication. The problem is that there are some use cases fo...
Equipment: Alfa AWUS036ACH Wi-Fi adapter AC1200 Fresh Install of Kali Linux, fully updated (not on a VM) I have been running across this same "bad beacon" error (sometimes with "DEAUTH" in front of it) when trying to run besside-ng. I am running besside-ng after I run the sudo airmon-ng start wlan1 command, which I ge...
I'm trying to come up with an authentication/authorization system for what seems like a really simple scenario, but as far as I can tell it's virtually unsupported. There are two parties, total; myself and someone else ("other"). I'm running a bunch of services with HTTP APIs that are reachable over the public Internet...
We have developed a script that generates certain reports as output. Input data being confidential in nature, one of our clients wants the code to be hosted in their country and also for the business continuity have access to the source code with a caveat to never re-use or sell it further. I would like to know is ther...
I'm working on a sharing protocol, and the handshake, authentication etc. is done with RSA keys. By default I use 4096 bit keys, but it seems the beginning and end of any key generated are the same, how worried should I be? This phenomenon happens both on Windows and Linux. The python code generating the keys is roughl...
When I enter the right password to log in to my computer*, I am in instantly. However, if I mistype it, there is around a 2 second pause. Are there significantly more computations taking place to check if a password is incorrect than incorrect? * (MacBook Air 2015 if it matters)
Was going through the SSH key pair generation and did tried with the few systems i have. refer to the below command and the thumbprint value post key pair generation. $ ssh-keygen.exe -t rsa Generating public/private rsa key pair. Enter file in which to save the key (/c/Users/user/.ssh/id_rsa): ./temp ./temp already ex...
This is a very newbie question, but I would just like to make sure that I'm not missing anything: If I connect via VNC protocol to my various servers etc. inside my own LAN (home network), then should I consider hardening my VNC in any way? (E.g. VNC through SSH etc.). Or is it really pointless? I mean when initiating ...
When an attack on IT systems of a state is discovered, often another state is publicly blamed for it within a few days. I wonder whether these attributions are plausible from a technical point of view. How are sophisticaed cyber attacks traced? Is it trivial to hide one's geographical location in a large-scale attack? ...
Consider a remote and local system doing mutual authentication either by TLS through server/client certificates or similarly wireguard. What are the differences when the private keys (in particular the one for the remote system/server) are a) exposed in clear to an attacker or b) the attacker can actively change those ...
I am attempting to exploit HEVD kernel driver buffer overflow challenge: https://github.com/hacksysteam/HackSysExtremeVulnerableDriver However when running the below code my windows 7 machine doesn't execute the desired shellcode (assign current process with SYSTEM token): #include <windows.h> #include <stdio.h> int m...
I have some web applications (for example jupyter notebook) running on my home pc (ubuntu) that sometimes I would like to access remotely. What would be an efficient and safe method to do it? I don't need to remotely access the computer, I just want to access web applications that run on it The following are the option...
I was considering creating a 1Password families account because I liked the idea that 1Password never has the information needed to decrypt my passwords; however, when I created an account, I entered my master password on the 1Password website and then the website generated a PDF with my secret key. If the 1Password we...
I was not sure about it and I got some answers from internet but didn't get the logical reasoning behind it. If I just click on a malicious link it might open a new tab, or it might download something. When it opens a new tab, it might download certain things in the browser cache, which should get deleted after restart...
I'm trying to answer a multiple-choice question which is the following: "Consider the security of a password file, which includes a 10 bit salt and all passwords are hashed, but known to consist of exactly 8 characters from the following alphabet: lowercase letters ('a' to 'z') uppercase letters ('A' to 'Z') digits (...
I have a database for a chat app to which users can upload images. These images get scanned before they are made available to other users in a conversation. But when the antivirus gets an update, should I rescan images which have already been uploaded (or maybe only those that haven't been viewed by every member of the...
As in the title, hydra will only execute one try per task before hanging. $ hydra -l admin -P /usr/share/wordlists/wfuzz/general/common.txt -u 10.10.68.141 http-post-form "/admin:user=^USER^&pass=^PASS^:F=invalid:H=Cookie:PHPSESSID=f92meothea0jd8u7faabbnk1p6" -I -t 1 -vV [DATA] max 1 task per 1 server, overall 1 task,...
I'm in the market for a new phone. The cheapest ones with decent specs are from China. Unfortunately I've read articles of phones sending data back to China for spying purposes. The phone I am looking to buy is the Xiaomi Poco X3 NFC which has had their code open sourced https://github.com/MiCode/Xiaomi_Kernel_OpenSour...
From the definition of key escrow (a method to store important cryptographic keys providing data-at-rest protection), it sounds very similar to that of secure storage which could be basically software-based or hardware-based (TPM/HSM). But, I could not figure out any differences or similarities between these two on the...
Being gadgets change per each system and architecture (do they?), how would an attacker be able to determine the offsets of various Return Oriented Programming gadgets, would an attacker first need to determine: -The operating system? -The architecture the operating system is running on (i386, 64bit, arm, arm64, etc) -...
Is there a usage of OpenID Connect (OIDC) that allows for a chain of RP (terminology reference) user -> RP#1 user <-redirect to chosen OP- RP#1 user -> OP: verifies identity user <-redirects to RP#2- OP user -> RP#2 user <-Signs this attestation and redirects to next RP in the chain- RP#2 user -> RP#1: Has an authentic...
Bitwarden claims that it is more secure than traditional cloud password managers (such as Google) as it only stores the encrypted version of the passwords database. But for some reason the password you use to authenticate on their website is the same as the vault password - meaning that the company could potentially de...
What is the purpose of endpoints in mutual TLS authentication? Actually, what do we mean by an endpoint? I am following this OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens If a Client A wants to gain access on a protected resource hosted by some other Entity B, then wants an access token...
I am a novice with cryptography. I am studying the GPG for encryption of my backup files. My current understanding is that the keys are saved in the home directory of GPG. And it means that if someone can access my home directory, all of my encryption efforts would be in vain as he can decrypt my backup files with the ...
What would be the most appropriate way to store private keys for barcode signing in the Android app? Probably most experts here would say - just don't do it, cause it's insecure... But I would like to understand the level of "insecurity" and risks to proposed solutions. P.S. Commodity Smartphones to assume. P.S. we can...
I wrote the following rules: alert tcp any any -> 192.168.6.4 any (msg:"SYN"; flags: S;) alert tcp any any -> 192.168.6.4 any (msg:"FIN"; flags: F;) The SYN rule is matching. The FIN isn't. I can't find a part in their documentation for TCP Flags. I want to detect packets, where the SYN,FIN,PSH,ACK flags are set. How ...
We have a form that is using asp.net core AntiForgery validation. Recently encountered an issue with a form on the site hosted on www.domain.ie not being able to POST to the API at api.domain.co.uk due to AntiForgery validation. The recommendation from the team who implemented this is to set sameSite=none on the AntiFo...
I tried to create a payload using msfvenom and it doesn't work on Android 10... What can be the possible reason and how to prevent it? And I used Metasploit on Termux to do it so is that a problem?
First off, this may not be the right community. If it's not, I apologize and please close this and point me in the right direction. Apple will start enforcing two-factor authentication for its developer accounts in February and we are trying to figure out how to best handle this. We are currently a small team (fewer th...
The server is running the Kubuntu Desktop variant of Ubuntu (I transformed it into a server, I had things configured that would have been a pain to transfer to another installation.). One day I decided to do a security check-up and I checked my UFW rules (sudo ufw status) and I found these rules that I don't remember a...
I'm trying to decrypt a pdf that I no longer have the password for. When I use JohnTheRipper, it can't seem to load any password hashes. Basically, this is what I run. └─$ perl pdf2john.pl /home/andrew/Desktop/Example.pdf > /home/andrew/Desktop/trial.hash And this runs fine with no output. I've checked the hash file,...
I want openssl to list entire cert chain, including root CA, when executing: openssl s_client -showcerts -connect host:443 However, this is not the case. Depth 2 cert root CA cert is not included: openssl s_client -showcerts -connect www.google.com:443 CONNECTED(00000005) depth=2 OU = GlobalSign Root CA - R2, O = Globa...
So the goal is to use AES-CBC-256 to encrypt the data in a file. To derive the AES key and IV pbkdf2 will be used to generate a 384 bit output using a given password and salt, where the first 256 bits will be the key and the last 128 will be the IV. The key and iv will be used to encrypt the file and then a hash of the...
I am reading this OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens I am interested to know how the certificates and public keys are exchanged between the client and the auth server. Maybe in offline mode/manual? or online for example in a post? So are these actions of the protocol or we mu...
I am considering using OpenZFS on FreeBSD. I am not quite sure how secure native OpenZFS encryption is? If somebody steals my server and the disks, is he able to decrypt the files? In a Discord room I found a possible answer: Native ZFS encryption is still fairly new in the world of software encryption, and it doesn't...
I have a question in regard to insecure deserialization with the JSON.Net component. It is my understanding that this component is safe by default unless you specify the TypeNameHandling setting to anything except for none. However, suppose you do not change the TypeNameHandling setting (so that the default applies), w...
I am trying to understand how the client is authenticated to the server during mutual tls So during the handshake, the client sends this message Client — CertificateVerify This message is used by the client to prove the server that it possesses the private key corresponding to its public key certificate. The message ho...
Let's say that I have been sent some maliciously-crafted audio files by an attacker that use an unpatched security exploit somewhere in my system to compromise it. How can I reprocess the actual audio (or image, or text etc.) content of such a non-executable file to ensure that, regardless of whether or not the file is...
I have a client how asks a token from an auth server in order to use it to an endpoint which serves as the resource server. Between the client and the server, a handshake is utilized in order the two parties authenticate with each other. In the normal TLS handshake procedure, the client sents a symmetric key to the ser...
I was trying to reproduce this vulnerability: https://www.exploit-db.com/exploits/49294 According to the explanation, it is possible to bypass a check in a Wordpress plugin by appending a special char after php extension. I was trying the attack, and the file is uploaded with the name shell.php<special_char> containing...
I am writing an app that serves images to clients. The app is written mostly in python. I store the images in AWS s3 and serve the clients them directly from there. Am I vulnerable to buffer overflow attacks? If an image is bigger than 500KB I resize it so it would be less than 500KB. Does this prevent buffer overflow ...
I am making an API that uses the following steps for encryption. All of this is implemented using libsodium. First of all the client has to make an initial request to the server for getting his public key and client token, with that key that corresponds to an unique sealedbox he encrypts and sends all the requests body...
I'm looking at the OpenSCAP Security Guide for CentOS 7: https://static.open-scap.org/ssg-guides/ssg-centos7-guide-index.html Under "Record File Deletion Events by User" (as an example), it provides this auditd rule: -a always,exit -F arch=ARCH -S rmdir,unlink,unlinkat,rename,renameat -F auid>=1000 -F auid!=unset -F ke...
For example, how long does a typical CPU take to verify a single secp256k1 signature? Wouldn't this need to change in time so that signatures can't be brute forced? How is it decided how "strong" the signature verification should be?
In most examples I’ve read, I see people mentioning that when the server returns a 401 the client should hit the jwt refresh endpoint, passing in the refresh token somehow (i.e as a cookie), and then continuing on from there with the new JWT token. I’m failing to see why this can’t just happen automatically on the serv...
How someone might run an encoded executable, mp3, or any other file safely in memory after being decrypted. A use case might be someone trying to make code or a file only usable through their service or software, which is my case, I don't want a user to simply steal my code so when stored on their filesystem my goal is...
I am reading this OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens where the authorization server issues a client a JSON web token with the following format { "iss": "https://server.example.com", "sub": "ty.webb@example.com", "exp": 1493726400, "nbf": 1493722800, "cnf":{ "x5t#S256": "bwcK0...
As far as I know, when Alice sends an encrypted email using PGP to Bob then the email will be encrypted using Bob's public key. Only Bob can decrypt it (as long as no one else has Bob's private key). As far as I know, Thunderbird implements exactly this behavior. Thunderbird 78 has this function built-in, for previous ...
I have a private file encryption project that I'm working on that currently uses Encrypt-then-MAC. However, I've been looking at age and the article that's referenced in the spec that discusses encrypting streams with AEADs. It's not possible to load entire GB files into memory to get one authentication tag, and it wou...
I stumbled into this recently for a specific project I had in mind. I thought HTTPS would prove that a given content actually came from the origin, by having its contents always signed before transfer. But actually, after the initial handshake, all communications are only secured through an agreed-upon symmetric encryp...
I am doing some bug hunting. I inserted a malicious payload into a request. But I am not sure if the response is from CloudFlare or the origin. Are there special headers which help me to distinguish the origin from the CDN? I always see the HTTP header Server: CloudFlare even if the response came from the origin. Why d...
I'm a beginner in Information Security and am learning about salting. Unfortunately, most of the time I have to learn by myself since the lecturer doesn't provide deep explanation on these. I now have to solve some problems related to this and having trouble understand how salting slow down the attack An access contro...
Basically I have the outlook app on my phone, if I connect to work WiFi what can they see? For example the emails in my inbox can all of them be read? Or the emails I have sent from let’s say my home and are now in sent items can they see these or is it just the emails being received and sent on their network?
The secrets module is marketed as a safe alternative to random for things that are meant to be secret. But what's the actual difference? Looking at their code, in some cases these libraries actually make reference to the same underlying functions. For example, the definition of secrets.randbits is basically a reference...
On linux ami the only way to easily run systemctl for my server is by running sudo systemctl start node In the service: /etc/systemd/system/node.service sudo seems to be mandatory for the 'enable', 'status', 'start' and 'stop' systemctl commands to work (I know there are tutorials out there to run as 'user' and not...
I was watching this short video and apparently every time users open an HTTPS connection, a handshake between client & server happens. They interchange the public keys, keeping the private keys. On each side, the public-private key pair is generated using an algorithm called RSA. Private key can't be derived from publi...
A friend of mine sent me this encrypted message and I have no idea how to decrypt it! And btw, to make things worse, the message is in portuguese, not english!! Here: V2tod1lXTnNiM2xUYWxaU1ltNUNhRlpxU2xKbFJteFhXWHBHVGxKdVFsVlZWekUwWVRGVmQxTlla RmhXYldob1dWVldjMU5HV25WagpSM0JUVFZadk1WWXhXbXBOVjBWNVUycFdVZ3BpYlZKaFZqQldk...
Okay so im looking into understanding more about Wireless security. One thing i have not be able to understand is what does WEP, WPA and WPA2 do without the help of TKIP, CCMP, and AES, and what do TKIP, CCMP and AES provide to WEP, WPA and WPA2? What is WEP WPA WPA2 lacking in its design that TKIP CCMP and AES have a ...
Let's say an IP address hosts multiple domains, (example.com, example.net, example.org, etc.). How do I port scan a specific domain?
I've heard java files can pose a significant security risk due to vulnerabilities. Is it possible for these java files to infect a computer with malware if they are never run? In my case, I am downloading plugins for my Minecraft server running on my Raspberry Pi (a small project I'm quite proud about). There is always...
I'm building an end-to-end encrypted web-app. I plan to use ECDH + P256 curve for generating private/public keys. The private keys are saved onto the user's computer and the public keys are stored on a server. The recipient's public keys are pulled from the server when the sender wants to encrypt and send a file. The s...
Telegram is completely blocked in my country (entire IP range and domain of telegram is blocked), and I cannot access messages by telegram app. However, notifications for newly received telegram messages are being displayed on my android phone and iPad. This implies that in addition to me and Telegram Company, third pa...
As with anything to do with software, there have been many documented security vulnerabilities that relate to media files. While many of these exploits take advantage of attributes or variables of specific files types, such as metadata or comments associated with a file, my question is this: Is it possible for a malici...
There are some threads talking about Bluetooth keyboard security. But I have a different concern. I will only need 4 keys from an external keyboard, Home/End/PageUp/PageDn keys. Because I use them a lot and my laptop keyboard has a bad design (no separate keys for them). There are some programable 4 keys keyboard or Nu...
i am reading this in the OAuth 2.0 Mutual-TLS Client Authentication and Certificate-Bound Access Tokens What is the difference between a client_id and a distinguished name? I see in the PKI Mutual-TLS Method that the distinguished name of the client is registered into the auth server. What is the purpose of the client_...
I normally use my personal email (e.g. @gmail or @yahoo) to create online financial accounts such as online wallets, bank accounts, stock market, and etc. I am currently planning to create an online wallet for my customers to deposit funds to when they make a purchase from my online store--something like PayPal. Is it...
Given a native windows app, with a redirect URL of example://redirect, what prevents a malicious user from taking the Client ID (public), and creating a new app that sets itself up to be the target of the example:// protocol? There are two significant implications that I'm trying to tackle. The first is the reputation ...
DNSSEC security starts by first grouping DNS records (RR) of the same type into a record set (RRset) and then this RRset gets signed... Does this mean that I have to completely define all the RR in my DNS prior to enabling DNSSEC? What would happen if I added some DANE TLSA records after DANE was already enabled?
As part of configuration tasks I am doing at work I am having to learn more about how https works and how to set things up. One bit that I am not sure about is the need to install a certificate in the Trusted Root CA of the server. I understand when a client makes a request to an HTTP server, the HTTP server responds w...
Beginner question here, I don't seem to be able to wrap my head around the security benefits of the token exchange protocol as specified by RFC8693. To me it seems like a delegation pattern where a webservice (service A) impersonates the authenticated user when accessing another webservice (service B). It does so by ...
Is it worth calling Array.Clear() to clear sensitive byte arrays such as those containing encryption keys? It's not clear whether this is worth doing since the language has a garbage collector.