instruction
stringlengths
24
29.9k
I've managed to get a version of netcat onto my Windows machine and I can run the standard: nc -lvnp 1234 and this properly connects to the victim's machine, but it's a very fragile connection. Ctrl + C will just drop the connection, tab doesn't auto-complete, and the up and down arrows don't give me history. On Linux...
We have a current microservice architecture where we secure communication between microservices via Machine-To-Machine access tokens (these tokens are obtained using the Client Credentials grant flow). We do this for all communications between microservices, whether triggered by a user action or otherwise (e.g. schedul...
I'm developing a protocol for private LoRa (Any RF by abstract) product, It consists of a gateway and a sensor node. I don't use LoRaWAN. I want the user to dynamically 'pair/link' one to multiple sensor nodes to a gateway by pressing a button in both sides (Sensor node and Gateway). I got suggestions to look at OTAA j...
I recently heard that a telephone company (a mobile network operator) was hacked and lots of data was stolen, maybe affecting up to a million customers. It sounds like the leaked data is already available on the dark web, and it includes all personal information (names, addresses, ID numbers, phone numbers, etc.) and a...
My employer recently changed their WiFi network set up, and they now require accepting a certificate in order to connect. Is there any way that I can check if they are performing a MITM attack to spy on the employees? I would expect that I should be able to see which CA was used to establish a connection in my browser,...
Back when I was a Java developer, we used to use build.properties or build.xml to store sensitive information outside of the VCS and just add the file with whatever passwords would go in it after check out. But that's pretty language specific to Java, how would one do this in a Powershell script? Is there a way to sto...
I was trying to solve SEED security lab regarding buffer overflow attack but in that exercise we get buffer address and ebp and thus offset of it. so we are able to guess where the return address is stored. I know that without getting ebp and calculating offset you can also do this attack by writing the return address ...
I have found links to an obvious bait website. Link to PHISHING website. However, I was very surprised to see the domain is "holidayinn.com". On first sight this appears to be a genuine subdomain. How is this possible? EDIT: An extra link. I do not believe this is an acccident. This leads to "genuine" signup scams.
I open wireshark to inspect the ikev2 handhsake and noticed it is 8 packets instead of 4. Two groups of 4 packets, one originating from the first peer and the other from the second peer. Is it normal ? Shouldn't it be one 4-packet exchange only ? (note : i am using tunnel mode esp)
TLS client implementations will tend to try and do hostname verification by default for remote TLS endpoints (servers). The client connects to the server, and as part of the negotiation the certificate chain is checked (valid, signed by a trusted CA etc.) and the hostname is also verified (is the hostname that I'm conn...
I've made a single photo purchase from Shutterstock back in 2012. I created an account and gave them my debit card #. I haven't made a single purchase from them since. Silently in 2018, they activated auto-renew without my consent, without notifying me via e-mail and without sending a receipt. They just started chargin...
I am trying to understand code injection via eval in the context of different technologies. In the case of asp.net, is it possible to be vulnerable to code injection if i am using eval? E.g.- <asp:Label ID="lbldtgCIDStatus" runat="server" Text='<%#: DataBinder.Eval(Container.DataItem, "CIDStatus") %>' Visible="True" /...
Trusting kernel drivers is bad. Is there something we can do to have at least an idea about what it does? For example, let's suppose an armv8a linux kernel. I'd search for all the syscalls, which according to https://stackoverflow.com/a/12951533, are the SVC commands. They should contain the number of the syscalls and ...
I am studying for an exam in computer security, and I got stuck on the following question from a past exam: A random program generator service S allows clients to generate random data. Each client Ci shares a symmetric key Ki with the service. The system implements the following protocol: In order to ask for random da...
I am trying to implement JWT in a secure way in Node.js and I am unsure when to request the refresh token. I got one access token and one refresh token. Both are saved in two httpOnly cookies. When the access token expires the refresh token should check for a new one. Right now I have implented it so that if the refres...
I have an IP who I was told is down. If I try to ping this IP, I can't reach it but if I launch nmap with -Pn option, I obtain that the IP is UP and that the 1720 port is open. Do you think nmap is giving me false values or is the ip really UP with port 1720 open?
I am looking for a review of the solution to store my Ledger Nano S BIP39 recovery phrase as well as my password manager usage. This solution is mostly based on this video. Few points that I think require explanation Emergency access process for Bitwarden explained here. Essentially if I get hit by a bus, my partner ...
RFC 6238 recommends the server to implement some form of resynchronization algorithm to account for time drift of the device used to generate the OTP. However, the RFC provides very little information on how to actually implement such a synchronization and the consequences it might have on the overall security of the a...
A quick and dirty nmap scan (nmap -p 1-65535 hostname) lists many ports as open. However, a more involved scan (nmap -T4 -A -sS -sU hostname) does not list the same ports as open. Some report as open, and others I'm guessing get thrown into the extraports state as there are many reported there. My question is why am I ...
An e-commerce site uses the Direct-Post method (see page 14 PCI e-commerce security). Is the server for the e-commerce application and network it resides on in scope for PCI? There are questions in the SAQ A-EP for servers and networking that appear to apply.
Metasploit successfully executes the exploit, but after that, I get a non-responsive shell: Do you know what could be the problem here?
Sorry for my lack of terminology in the field, that's something I've little (or none any) practical knowledge about. I've browsed similar questions on the security risks of using (web) proxies, but both the questions and the answers generally focus on the risks involved with the potentially malicious proxy operators (w...
I'm excited about the prospects of web-assembly for the future, but I'm curious if this will have the same security ramifications of Java Applets. What are some of the reasons why web assembly is expected to be more secure than Java Applets? (Isn't a sandboxed JVM in the browser similar to how web assembly might work?)...
On the Internet, I can find several statements done over the years claiming that serving a X.509 CRL over HTTPS is a bad practice because either it causes a chicken-and-egg problem when checking for the TLS certificate and it is simply a waste of resources, given that the CRL is by definition signed by a CA, and a non...
I've found a couple of suspicious-looking PHP files on my webserver obfuscated by a substantial block of eval. Ideally, I'd like to know what they do, but I'm struggling to decrypt them. Everything else on the server matches my git repo, so I'm pretty confident nothing else has been changed. I can't find any mention in...
I am working on analyzing Android applications from my phone using MITM Proxy. My Android phone version is 4.4.2, SDK is 19 and its rooted. I have performed all WiFi configurations required for MITM. Using manual proxy with the Proxy hostname and gateway set as IP address of host machine and port as 8080. When I run pr...
I'm new to Metasploit. I set up a multi-handler exploit and also made an EXE file with meterpreter/reverse_tcp payload. Both 3rd party AV and Windows Defender are deactivated. But when the victim (my own Windows 10 machine) runs the EXE file, my Metasploit shell hangs on the sending stage. What do I do?
I've noticed a lot of phones (not to mention, other devices) have built in fingerprint sensors these days. Do these devices store information in such a way that your fingerprint could be reconstructed by someone with access to it?
I am a little confused on how the token is shared from the client to an AJAX script to the resource server in the oauth2 flow. To explain the scenario I am trying to set up, I have a client (http://localhost:3000) a resource server (http://localhost:3001) an authentication server (http://localhost:3002) The client is...
I've been working on a project and one of the requirements that came up is offline authentication. On the web what we would like to do is ask the user to login using their device authentication for example touch ID and face ID on iOS devices. I know webauthn exists, but the current spec requires the server to respond w...
I've just noticed that different sites define RAT differently. Which one should be used? Remote Access Tool https://www.cybersecurity-review.com/tag/rat/ Remote Access Trojan https://searchsecurity.techtarget.com/definition/RAT-remote-access-Trojan Remote Administration Tool https://www.mcafee.com/blogs/consumer/what-i...
I need to perform an nmap scan on all of the (responding) IPs in an array of VLANs. The command is nested in a PowerShell for loop and looks something like this: nmap.exe -Pn -T4 -A -oG [FILE].txt -oX [FILE].xml "$($subnet).0/24" We had to add the -Pn flag as the command wasn't picking up all of the hosts in each VLAN ...
It seems that a new trend has emerged in the past few weeks. While users are (meanwhile) aware that an unexpected mail with subject "Your invoice" or "Your delivery" is suspicious, it seems that nowadays such attempts more often (in fact, according to my observations: massively) use specific subject lines that match so...
I wanted to know what efficient way is there to handle malicious attempts to connect to my server by single IPs. The attempts show up logged in /var/log/auth.log as Connection closed by IPaddress port XXX [preauth]. Additional info about sshd_config: Password login is disabled MaxAuthTries 3 PubkeyAuthentication yes P...
A potential project partner (I never met him; a friend worked with him) needs to have Anydesk access. He needs IP from my region to access some servers, so VPN would not work for him. What are the security risks?
I have a symmetric key and I have the data that needs to be authenticated. So one of the solution that I have in mind is to use the AES GMAC. I know there are other MAC's such as HMAC or hash algorithms like SHA2. However, my only constraint is that I have to use AES GMAC - others are not possible. Does the below examp...
I am 15 years old. I want to be a hacker. Can you give me advice on what to start or what to learn as
I currently have to write a paper for university in my Network Security lecture about methods of secure location verification. Therefore, I chose to write about several distance bounding protocols, e.g. the one by Brands and Chaum and the Keyed Echo Protocol. Both these protocols are said to be secured against Mafia Fr...
I have my serve set up with AbuseIPDB so I can keep a log of all suspicious request and hacking attempts for my honeypot machine. I noticed an IP that sent a GET request to port 80. 177.154.28.130 - - [07/Jan/2021:12:07:20 -0500] "GET / HTTP/1.1" 200 326 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTM...
How would I get the password for encrypted SSD's I bought (legally bought from a business who forgot the password, I plan on wiping them after I unlock them) I am new to using software like hashcat, I tried finding the hardware reset key hut these drives are old so They don't have a code I can use to factory reset it, ...
Someone has sent me a link on Tor which when visited instantly read that the website itself was not available and that apparently the link is broken somehow. When using Tor i use the option "Safest" But im a little paranoid that i clicked on something which was risky. Am i instantly exposed now to the apparent "hacker"...
Not sure this is the right site to ask this, but here it goes. I've never created a Facebook account, because I don't want people to know about me more than I know about them. But I do have an WhatsApp account (since before it was bought), it's practically a requirement where I live (not EU, unfortunately). I've taken ...
I was reading Serious Cryptography book. I am a newbie in cryptography field who try to learn as possible as he can. In this book, there is the following section of phrases: For example, if a ciphertext is 128 bits long (meaning the plaintext is 128 bits as well), there are 2^128 possible ciphertexts; therefore, there...
So i think someone is mirroring my site with a proxy and hides behind cloudflare (cloudflare already notified and google also) so i cant find out the real ip of the server to block it. Is there anyway to detect if your website is opening in a other domain and block it or redirect it? maybe some javascript hostname look...
With client authentication the client sends the certificate after the client and server hello. Is it possible to send it already with the client hello, so the server does not even answer with a hello but instead rejects the connection?
Say you want to prove that you received a certain message from someone. This can be difficult because many messaging apps (like facebook messenger) allow the sender to delete messages on the recipient's end. Of course, you could screenshot the message, but then you still need to prove 2 things: The time of the message...
Is it possible to use Certbot for automating the renewal process of the SSL certificates with CAs other than Let's Encrypt?
I live in a country with censorship and was wondering if it's possible to bypass DPI by just enabling ESNI, DNS over HTTPS and Always HTTPS? If not, what else should I enable to bypass DPI firewall without having to go the VPN route?
New WhatsApp data privacy update, that it will share our data with Facebook, we all know Facebook owns WhatsApp and this is obvious Facebook can always access users of WhatsApp as well. So why to ask from us even if they can do it and we won't even complaint against it? And what if Facebook access WhatsApp users data, ...
My boss truly believes that keeping files on paper and locked in his drawer is the safest place ever. He is the type of guy that processes a file in Word/Excel, prints it, delete the file and store the physical paper in his drawer. Also, he deletes (not archive) all of his emails after reading them. If important, print...
I am planning to go door-to-door and host events in which people use a computer to login to the Arizona Secretary of State website, enter sensitive information (like address, social security number, driver's license number), to register to vote or to sign candidate petitions. I wanted to know which browser I should use...
I would like to hash user password with Argon2id, then use this hash as ECDSA private key. I made some tests with Python and passlib.hash and found following parameters: memory: 32 MB iterations: 100 hash length: 32 bytes (the same as ECDSA private key length) parallelism: 1 (I want to make it slow on purpose and the ...
I have a web application where user can upload and view files. The user has a link next to the file (s)he has uploaded. Clicking on the link will open the file in the browser (if possible) or show the download dialog (of the browser). Meaning that, if the user upload an html/pdf/txt file it will be rendered in the brow...
Can files outside database which are not part of any tables in database be read via union based SQL injection? For eg http://xyz.com/fetch?id=3 Consider id parameter is used at server side by cursor library to execute mysql query and no sanitisation is being done. Would something like 3' union select '../../x.py' -- b...
I wanted to wipe free disk space of my PC, as I had accidentally deleted confidential data permanently without securely deleting them. So wiping the entire free disk seems to be the only option now. I know that generally 1 overwrite is enough and no better than the 35 overwrites proposed by Peter Gutman. However, becau...
Is there a reason for not copying certificate signing request's (CSR) extensions over to certificate when creating a root CA the following way? openssl req -config openssl.cnf -new -key ca.key.pem -out ca.csr.pem -addext 'basicConstraints=critical,CA:true' -addext 'keyUsage=critical,keyCertSign' openssl x509 -req -in ...
Hey guys this is my first question in this kind of platform. I made a pentest a vulnerable machine this is like a web page video content there are not much target vectors. In my attack a detect only two possible attack vectors an admin panel (http://vulnerabletarge.com/login) and GET parameter(this seems sanitized) in ...
I recently downloaded one apk from a custom apkstore from my country. You can download the app for free but you need to pay to use some functionalities. I cracked the app jumping over all the activation mechanism just changing a boolean 'isActivated' flag which is used in an 'if'. I did this just for curiosity because ...
Can the user get the private key from the encrypted and the plaintext data or does it make it easier for an attacker?
To what extent can cryptography help protect against relay attacks (on vehicles)?
I have some confusion in understanding the security groups itself i guess. The login attempts are being made to different ports , here are the logs Jan 08 00:00:13 ip-172-31-10-252 sshd[6067]: Disconnecting invalid user test2 75.121.129.252 port 49340: Too many authent Jan 08 00:00:19 ip-172-31-10-252 sshd[6070]: Inval...
We are designing a Python application and we need to "load" encryption secret key in "memory" at the application boot. It can be also an admin pin code. Anyway, just some data. Our application will run under docker container. What is the most secure process to do it ? Can we trust the OS from any memory dump ? Can we u...
I was fiddling around with an OAuth2.0 request on burpsuite and I found that it validated the account even after I deleted the state parameter completely and forwarded the request through burpsuite. I would like to report this as a bug so I want to know if this has any attack vectors.
During a credit card payment to site X , it asks me to login to my ebanking account through a frame in a site that handles that transaction in order to implement a more secure authentication (3d secure). My question is : Should i trust such a process when i just see a frame that looks like a login page from my ebanking...
I do not quite understand why it is common practice to require a difficult to remember password with alphanumeric and special character requirements, while also having an upper limit of 32 characters. Wouldn't it be easier for everyone to remember the password if the lower character requirement was 32 and there was no ...
I'm implementing a service that makes signs and sends transactions at the end of the day, this acts as a crypto exchange. The service creates for every new user a key pair (Private key with its public key). The user can deposit his funds to his respective public key (this is a hot wallet and he has no access to the pri...
In "Framework Executable Formats" in msfvenom i see some options (psh,psh-cmd,psh-net,psh-reflection) in this article https://docs.rapid7.com/metasploit/the-payload-generator/ I see some explanation on the differences between psh and psh-cmd but what is it is psh-reflection and where I can find an explanation on the r...
From what I gathered, Windows 10 built-in encryption decrypts file/folder when a specific user logs into Windows. In a PC that only has one user, I want to keep the files encrypted until the user is prompted with a password and only then the files are decrypted. If I understood correctly file encryption does not do thi...
First off, I'm not even sure if this question belongs on this site, but I am a programmer and I usually just ask stack overflow questions like this, and I know for a fact this one doesn't belong there. But basically, my question is if I get a flash drive, and only ever attach it to say a Raspberry pi 0 (the one without...
Some VPN providers offer to encrypt mobile data. This goes beyond the typical Wifi hotspot mitigation paradigm. So what exactly are the benefits of VPN over mobile data? What threat models can this mitigate? Does this depend on the protocol? (I assume yes based on first research stating for instance that 2G signal can ...
Suppose a student takes an exam at home. Since home-exams are prone to cheating, the student wants to be able to prove that he/she did not cheat. So the student puts cameras in the room, which videotape the room during the entire exam. Now, if the student is blamed for cheating (e.g. because his/her exam is similar to ...
If I use the same machine (my PC) but with a different IP address and a different browser that I have never used to visit a site, will that site still be able to identify me? I don't understand the browser fingerprinting thing that well. To clarify, suppose I have visited a website with Chrome but later I visit that sa...
I am on a Windows 10 machine using Chrome (latest updates). I took a screenshot of Instagram, because I was having problems logging in, and then using Paint 3D applied a black rectangle to hide my username on the screenshot: My worry is that someone might be able to peel back the black rectangle to reveal my username ...
I am working on implementing an Android App (client) which will be connected to Raspberry Pi (server) via Bluetooth Classic. To make data transfer securely, I want to implement SSL encryption between client and server. I have created the Bluetooth socket and connected to the server successfully. To establish a secure c...
The company I work at uses a program on their Windows workstations that runs as the logged-in user but some tasks require elevated privileges. The user must be able to run these without having admin permissions himself. The current approach is that at the installation of said program a Windows Service is installed with...
I'm developing application with react and all the main logic is on the client side. I want to force users to use the application only if they paid for the app subscription. Are there any methods to prevent(or harden the ability to remove certain restrictions/api calls etc) users to access the app without paying? I was ...
I have 2 hashes which I don't remember which type of encryption I used or if i used a secret key. can you help me identify these I will just give all details but not paste the whole hash here. hash1 start: qe$weroodjf end:ejosfkgowieorjwr length: 71 bytes hash2 start: bHQ4VNwAbe3b end: TagEhBhrpZXVPqr6jQ== length: ...
WhatsApp team updates their policy and it will be from Feb 8. I accidentally agreed with the policy. Later I realized the policy is not good. How can I revert my agreement with the WhatsApp team? We have alternatives like Signal and telegram but I like to use WhatsApp. I am thinking if most of us not agree with WhatsAp...
Given 3 factors of authentication: Type 1: something you know Type 2: something you have Type 3: something you are Which factor of authentication would be an X.509 certificate, assuming this certificate is stored in the filesystem of the device I use? For example, let's place it in the context of TLS mutual authentic...
Are there any ways to get information on who is sending certain emails from an anonymous email address? Besides the obvious IP solution, would there be any alternative such as embedding some kind of script or something that reads some phone information (such as phone name, carrier, etc...) when the receiver opens the e...
As you can see, all fields that I send only the attributes < > are coded, so they are not executing in the browser. Is there any way to bypass this XSS filter? In my case, only these attributes are encoded. payload = <script>alert(1)</script> response = <h1 class="StoreTitle__StyledStoreTitle-qk8d4w-0 dRnViH">&lt;scrip...
I have Kali Linux on an external flash drive that is 128GB. I would like to build a PC with my friend but I don't know which operating system to put on it. I want to be able to play games and I know that the parts I've searched for are pretty fast and I also know that Windows is the best for it. But I am also aware tha...
I have an Ubuntu VPS running at a remote host. The disk is not encrypted but I have a specific directory that is encrypted for which I must provide a password via an SSH session (not stored anywhere on the VPS) to "unlock" it so that the services can run on this VPS and serve the content decrypted. Assuming the bad adm...
I have a VPS hosted at a remote location. Obviously the host can login directly (without SSH or any keys) on this box and I want to make brute force password guessing as hard as possible for a bad admin.This leads to the question: What is the maximum password length for user accounts in Ubuntu? While questions like "wh...
I am learning TLS Session Resumption. What I got is session resumption can reduce 1 RTT for TLS 1.2 by reusing MasterSecret. Both the client and server needn't to run key exchange algorithm. My questions are: Whether session resumption reuses symmetric encryption keys (to encrypt TLS records). What factors affect whet...
I am preparing for an exam in Computer Security and doing a past-exam without soluions, so I wanted to check if my reasoning holds on a question about stack overflow. Below is the C code in question. The goal is to make the function do_something() execute, no matter if pwd is "abcd" or "1234". My thought is to overflow...
Let's say I am a developer/maintainer of an open-source-webapplication distributed via docker. Any server-admin can install (using docker) and host this webapplication on his server with his own domain. So the webserver itself is "included" in the docker-image, the user can simply run a container and use the webapplica...
There are many tools designed to brute force directories and files in webservers, for example: https://tools.kali.org/web-applications/dirbuster https://github.com/maurosoria/dirsearch https://github.com/pyno/dirfy https://github.com/OJ/gobuster Which are the features to consider when selecting the one to use?
As you can see from my previous question, How can I escape Google?, I am not overly keen on sharing my personal data. I just got yet another new Android phone, after yet another died. Because I do not want Google having access to my data, I was going to post to post to Software Recommendations asking for an alternative...
TL:DR; What are good learning resources for security testing a software which runs with Docker on Ubuntu. I am in junior position at this company, and they figured it would be good if I just test their software from security perspective. I already learned a bit about hacking, but it was mainly webservers, CTFs, Tryhack...
I'm looking to install a virtual machine and since Hyper-V is not available for my Windows 10 production version I'm forced to decide between VirtualBox and VMWare. VMWare looks much more modern and new while Virtual Box has a very old and 'sketchy' looking website. I was always under the impression that VirtualBox is ...
I own a custom domain that I use for e-mail. The mail server is configured with a catch-all that redirects messages to any user to my inbox. For the first time this afternoon, I received a benign "auto-reply" to a message ("I'm driving and will get back to you later") that was "sent by" accnt966.wellsfargobanking.onlin...
If someone is having a Remote Code Execution, that means, one can run the commands on the server, then why does he need to get the Reverse Shell? Even though I can run system commands, then why do I go for Reverse Shell? I am finding the primary reason behind it.
So my friend sent me a IP grabbing link. I copied and pasted into playstation messages and sent it to my cousin. I’m wondering if my friend got my IP because I copied and pasted. I didn’t open the link nor click it so am I safe?
I wrote a one-liner shell script for rustscan which runs gobuster if port 80 is open. I have added the script to /home/$USER/.rustscan_scripts directory. The script looks like: #!/bin/bash #tags=["first","second"] #developer=[ "example","http://sdf.com" ] #trigger_port= "80" #call_format = "bash {{script}} {{ip}} {{por...
Let's consider the following code in a hypothetical C library. uint8_t size; uint8_t buf[128]; read(untrusted_fd, &size, 1); read(untrusted_fd, buf, size); In the early 2000s, it would be a serious buffer overflow vulnerability that enables arbitrary code execution, a CVSS score would be high (definitely C:P/I:P/A:P)....
Assume that it is an android 10+ and that it is encrypted. Assume that it is protected by a 6-digit pseudo-random pin code. Assume that the data can be erased remotely using google's "Find My Device" service. If the thief shuts the phone down, they'll have to contend with the disk encryption (it will wipe itself afte...
Let's assume an ecommerce site works over HTTP, rather than HTTPS. What are the practical dangers here? How could an attacker exploit this? Whenever I read about dangers of unencrypted traffic, it is somehow magically assumed that the attacker has managed to somehow slip into a point between me and the endpoint (establ...
A small DC motor working and moving a disc. When device/motor is powered off, a hacker with a strong magnet came and rotated the motor; without touching the motor, just moving the magnet near the motor is sufficient to cause the motor-nucleus to rotate, and hence the shaft rotated and the disc. A friend told me this ha...
If so, how would one go about that, and realistically, how long would it take? Is there something we can do proactively to make this more difficult? This seems more relevant than ever since we would not want anyone to gain access to our phone number and any associated accounts, and more and more services, even financ...