instruction
stringlengths
24
29.9k
Here is an extract from a CSP report [csp-report] => Array ( [blocked-uri] => chrome-extension [column-number] => 27329 [document-uri] => https://www.mysite.com/mypage/ [line-number] => 3 [referrer] => https://www.google.com/ [source-file] => https://www.mysite.com/wp...
Have a look here: https://letsencrypt.org/2018/08/06/trusted-by-all-major-root-programs.html First paragraph says: "As of the end of July 2018, the Let’s Encrypt root, ISRG Root X1, is directly trusted by Microsoft products." I have just checked my Windows 10 20H2 certificate store, and ISRG Root X1 is nowhere to be fo...
Does the yarn package manager cryptographically validate its payload's authentication and integrity for all packages after downloading them and before installing them? I see a lot of guides providing installation instructions with steps asking the user to install Node.js dependencies with yarn add .... I usually don't ...
N.B. Asking this here instead of Movies.SE because I'm wanting to know about the cipher itself and any history, which this site is more suitable for. In S01E05 of The Wire, at around 45:00, it's revealed that: the gang that the cops are after encrypt their phone numbers by using a substitution cipher based on the lay...
I am trying a bbp program, and they allow requests only with some custom headers. So I was wondering if it is possible to add custom headers to nmap requests. Things I tried: I tried using burp proxy. I thought of adding headers using burp filters. I used this command nmap -p10000 127.0.0.1 --proxy http://127.0.0.1:808...
I'm working on a resource-constraint product and asked to enable support for MFA/2FA for all maintenance services. Given that MFA/2FA is about using two elements out of three(something you have, know, are). Our maintenance application is a desktop windows-forms application running over HTTPS protocol to interact with t...
I have AWS resources (e.g. EC2s, RDS instances) that I would like to isolate from each other so that if one is compromised, the potential damage is limited. I am most concerned about data leakage / exfiltration. I can group these resources into logical "areas". Some of the resources need access to the public internet. ...
There is something I don't understand about whatsapp's privacy policy. Your Messages. We do not retain your messages in the ordinary course of providing our Services to you. Once your messages (including your chats, photos, videos, voice messages, files, and share location information) are delivered, they are deleted ...
So im doing some pentesting in a TryHackme box (Chill Hack) and I've come to some trouble. In this box I have available an input in a website where I can inject commands to the vulnerable system. This input has filters so I cannot use bash nor netcat without escaping the command characters. Messing around I tried getti...
Microsoft released CVE-2020-1045 in September 2020. A security feature bypass vulnerability exists in the way Microsoft ASP.NET Core parses encoded cookie names. The ASP.NET Core cookie parser decodes entire cookie strings which could allow a malicious attacker to set a second cookie with the name being percent encode...
I was looking for ways to make Wi-Fi that uses WPA2-Personal/WPA-PSK secure, and I stumbled in this answer (the second one, from Terrence Koeman): WPA2-PSK (aka WPA2 Personal) basically does the same thing as WPA2-Enterprise from the clients perspective: The client associates to the access point, authenticates to the ...
Tried looking for it but didn't find solution. So basically every once in a while we are getting from our kindergarten an USB pendrive with photos. I am trying to find a way to safely copy the files from there as this pendrive can be used by all parents from our group. Thought about installing some Linux instance (dual...
I have come across many security keys from different manufacturers such as solokeys, yubico etc.., for the purposes of 2FA/MFA. Products vary basically w.r.t features such as USB-A, USB-C, Apple connector or NFC. But, I could not still figure out the reason for having a push button in couple of products whereas the nan...
Generally speaking, are certificates always non-sensitive? In the form of x509 certs, it's really just a public key and some metadata right? I see some things that call "certificates" the combination of the x509 public key certificate and the private key. But that's not really a certificate at that point (PKCS#12) righ...
I already know how to use password_verify and password_hash functions, but I don't really understand how they work. When I use them I do something like that: $save_hash = password_hash( $password, PASSWORD_DEFAULT ); $check = password_verify( $password, $hash ); How password_verify can know the algorithm used, the salt...
I've been doing some reading on simjacking lately, mainly around how one may be compromised. One common tidbit I read is that you can access your email and your other financial services if you have 2FA for those services. E.g.: here is one quote: Once the swap is complete, messages containing codes for those two-fac...
I wanted to know if there is a way to check if a torrent file has malware or not, before actually downloading it via uTorrent f.e. I only know VirusTotal site. Is this one reliable? Because each time I past a link in it, it says that the link/file is safe. So I don't know if every single link/file I paste on virustotal...
How can I test if/how STIR/SHAKEN is working on my incoming calls? Both for detecting spoofed caller ID AND calls from disreputable (NON-'A' attestation) service providers/carriers/sources. I'm looking for something vaguely like https://www.internetbadguys.com/ , https://dnsleak.com , OpenDNS/Cisco Umbrella list ... ...
I am Algerian. Why when I want to reset my Facebook password I receive a SMS from an Algerian phone number (00 213 ...), and not from Facebook? And why sometimes the SMS contain spelling errors? The six-digit code received by SMS works anyway.
Suppose that I have a password that is n-digits long. Each digit can take m values. So the number of permutations will be m^n. I wanted to know how much time it would take a quantum computer to crack this password. Is there a specific algorithm to this? If quantum computers are actually commercialized, am I (or literal...
I have tried many different tools to avoid being detected by an AV while using meterpreter exploit. Here is a list of tools I have tried: Shellter, Posh C2, Hack the World, Veil, Fat Rat, and many more. But they keep getting detected. I have read on the web, that the best way to evade AVs is to program and build your o...
Let's assume one has created an encrypted partition, e. g. with the LUKS standard. Then one creates a (virtual) disk image, e. g. for use by a virtual machine, containing an encrypted partition created by the same method and using the same encryption password. The disk image is stored inside the outer encrypted partiti...
My client did a pentest and he gave us feedback about root detection. So I used RootBeer android lib to fix root detection. In their readme, they highlighted that root detection is a "game of cat and mouse". Once we have delivered the new release with root detection our client gave us feedback that he could break root ...
Recently I've had two nonprofit organizations ask me to email them a photo of my driver's license. No money is changing hands, and both of these are legitimate and well-known nonprofits. Organization A wanted me to sign a document with a notary, but they also wanted me to email them a photo of my driver's license. This...
Edit #2: It seems the answer to Q#1 is "No" (which suggests I would need to look for some other solution, which is something I can do on my own, please don't spend time making suggestions for that) and that makes Q#2 the thing I'm still seeking information about. The functionality in question seems sufficiently useful,...
Trying to understand assymetric encryption. To my knowledge, it deals with the key management problem by having each user have their own private key and public key. But when is this private and public key pair generated for the user? Does each user have a unique and persistent private and public key? Also, why are hack...
Buffer overflow Attack: Sample Authorization void A( ) { int authorized; char name [128]; authorized = check credentials (...); /* the attacker is not authorized, so returns 0 */ printf ("What is your name?\n"); gets (name); if (authorized != 0) { printf ("Welcome %s, here is all our secret data\n", n...
I really just need an encrypted support ticket system essentially. The user who writes the ticket doesn't need to be able to view it afterward but a handful of staff need to be able to decrypt the data and view it. My backend is Firebase (using Firebase Authentication as well) and the users will be submitting informati...
I'm managing an AWS account for a specific purpose for a company of 120 people. Another supplier of this company of around 5 people also has an AWS account. To protect resources in an AWS account from malicious deletion, it is recommended to synchronise disk snapshots to a secondary account. The other supplier has appr...
I'm curious about what data actually gets signed when I sign a git commit or tag? Is it simply the commit message and metadata? How could I manually duplicate the signature, use gpg instead of git?
I am trying to understand an encryption process on a website (Instagram). As far as I know, a public key is sent from the server to the client. Then the password is encrypted with AES_GCM_256 and packed together with the AES key in an array and then in a sealed box with the public key from the Server. Is a sealed box t...
Are there any recommendations for the physical security of COVID-19 vaccine? I recently watched this video https://www.youtube.com/watch?v=uoqMA9vAOrQ on covid-19 vaccine distribution. At the 0:40 mark, someone enters a code to access a locked freezer. From a security point of view, was it a good idea or a bad idea to...
How to prevent Chrome to connect addresses from LAN to prevent CSRF attacks like this? <img src="http://192.168.0.1/some_action"> Info for other browsers is welcome here too.
For a pendrive like Kingston IronKey, how can the pendrive block multiple password guessing attempts? Couldn't the person just disassemble the pendrive, make 1:1 copies and try again and again to access the data? I'm thinking on a scenario like Lost Passwords Lock Millionaires Out of Their Bitcoin Fortunes, where the b...
I have a requirement to add security between service to API communication. The current implementation is client certificates. The client gets a certificate and just sends it in a cookie to the API. API does zero verification of the certificate. It pretty much is "just there" in the cookie. The reason is they are concer...
Similar to another question about keeping an account locked, is it preferable to allow a user to reset their password while the account is locked out due to the wrong password being used too many times? For example, their account gets locked for 30 mins if the wrong password is used 6 times in a row. While the account ...
I have accidentally clicked on a link in a spam mail (sent to my gmail, wasn't sent to junk folder) and it opened the link in a new firefox tab. hxxps://hm_vqh3bo6.storage.googleapis.com/24476060.html which brought me to the google search home page. What do I need to do now? Do I need to change my password immediately?...
I wanted to ask how to deal with a new remote code execution vulnerability that has the same origin as an already found Denial of Service vulnerability? Can I apply for a new CVE ID for this? This is because the original vulnerability focuses on a Denial of Service and does not contain any remote code execution instruc...
I've noticed that an unknown cmd opens up exactly every 10 minutes and disappears almost instantly. To try and figure out what's doing this i downloaded an application called focus.exe which prints out the pid and application that stole the focus. The log shows this: 23228:C:\Windows\System32\cmd.exe | Fri Jan 15 17:16...
I have noticed lately that instead of having an email address and password entry box on the same page/screen, a lot of websites and apps will instead ask for your email address first, then it will ask for your password in a separate step. As I use a password manager, this means I cannot just fill in the email address a...
I have this very simple script to run a rpcbomb script from auxiliary/dos/rpc/rpcbomb for a DOS attack. use auxiliary/dos/rpc/rpcbomb set RHOSTS Victim_IP_Address set RPORT 111 exploit -j -z I want to run the script about 10 times but I cant find any method to do so
When I run: openssl genrsa -aes-256-gcm -out rootca.key 4096 Then I get the following output: $ openssl genrsa -aes-256-gcm -out rootca.key 4096 Generating RSA private key, 8192 bit long modulus (2 primes) ..........................................................+++ ......................................................
If we have a private network connected to the Internet with NAT, how can an attacker estimate the number of host computers in network using port scanning? For both possible modes, the attacker inside and outside the private network.
I'm helping a non-profit and they have had malware on their WordPress site. I installed Sucuri and it quickly finds some strangely named HTML files in the base directory. I removed those files. Because of the malware found, the non-profit was blacklisted on 3 different spam sites (mxlookup search). I had updated all of...
I used the below command to open a certificate of a website that I downloaded from Firefox. What part of the downloaded certificate indicates that it is a CA's certificate? openssl x509 -in ca.crt -text -noout
I understand how this exploits work on the theoretical level, but I can't find detailed worked tutorials that show for example how to overwrite the return adress in the stack when overflowing a given buffer in a given function etc. Is there a database of such shared exploits ?
I have a Windows 10 computer with 3 hard drives: Samsung SSD 850 EVO 1TB (SSD, system drive where Windows 10 is installed, not encrypted yet) First 3 TB HDD already protected by BitLocker Second 3 TB HDD already protected by BitLocker Whenever I boot into Windows, I need to type in long passwords to unlock the second...
TLDR: Trying to execute commands on site thats got a LFI vuln. So I am making my post request to my vulnerable site and import requests header = { 'User-Agent':'Mozilla/5.0 (Windows; U; Windows NT 6.1; rv:2.2) Gecko/20110201', 'Accept-Language':'en-US;', 'Accept-Encoding': 'gzip, def...
I want to create a web server that does redirects HTTP to HTTPS. What is the simplest method to do this but also secure? Should the DNS handle this? (For example, Route53) I used to do this with my app built from Node/Express but now that I am using a compiled language, I want to be able to do this by hand instead of r...
Pick any dictionary word. Think of a number over 10 and below 20. Repeat the word as many times as the number, and end off with the same number (for example, "12"). Example: bananabananabananabananabananabananabananabananabananabananabananabanana12. All you need to remember is: "banana" and "12". No human is ever go...
I have a hierarchical key system designed for my project. In this system a block of data is encrypted using a Data Encryption Key (DEK). This DEK is encrypted using a Key Encryption Key (KEK) which is encrypted using a Master Key (MK). The KEK is used to encrypt multiple DEKs. Figure 1. The key hierarchy Now, when I h...
Payload: <DIV STYLE="background-image: url(javascript:alert('XSS'))"> Reference: http://seguretat.wiki.uoc.edu/index.php/XSS_Cheat_Sheet Can someone please explain why this payload is not working?
'Reproducible builds' ensure that a published app matches the published open source code. This answer gives some great information on it. But numerous sources1,2 indicate reproducible builds are very difficult (or even impossible) to implement in practice on major app stores. Some reasons listed include: app store pro...
I've looked around on this site and I've not seen a clear answer on this question. From what I've read TLS does not provide data integrity unless specific ciphers are used which use HMAC'ing as part of the protocol. Is this correct, if so would it make sense to use specific ciphers where you need extra assurance on dat...
I've found a very similar question: Should users be allowed to log in with the same password when a password change is requested but not changed?. But the key difference here is that requesting an email change can only be done when someone is logged in, whereas a password change (through the "forgot password" flow) can...
I want certain web pages blocked (within my country) by my Govt on a website that uses HTTPS on all pages. My Govt agrees that the specific URLs need to be blocked but expresses helplessness as their ISPs claim they can't selectively block HTTPS URLs but must block the entire website/domain / sub-domain which will caus...
I have following SQL query in my WordPress plugin, SELECT `ID`, `post_content` FROM `wp_posts` WHERE `post_type` = 'movie' AND `post_status` = 'publish' OR `post_status` = 'private' AND `ID` NOT IN ($data) ORDER BY `ID` DESC LIMIT 10 $data is fully raw input not escaped. I can execute subqueries at $data positi...
I am a member of a forum that recently disabled my account because their system picked up another account from my household. Anyways their terms of rectifying the situation are pretty invasive to my personal information so I'm wondering... If I log on and create a new account while using my VPN is there still identify...
This is a bit of an odd question, and if it doesn't belong on this forum feel free to retract. I was asked by a group of 7th graders to share my thoughts on the problem of credit card data breaches. Honestly I don't think I'm qualified to respond, but would like to encourage their thinking about the problem. They are a...
With over 30,000 projects packaged by Debian, it doesn't seem too unlikely that some of them may contain malware. On Ubuntu's side, the review process is apparently rather superficial, aimed at catching some negligent coding practices rather than intentional malware (I'm appalled by how askubuntu took those kinds of "r...
There exists a class of bugs on Windows where an unprivileged attacker can write a DLL to a location on disk, then add that location to the PATH variable. Then, when an elevated user process is trying to load a DLL with the same name, it will eventually search the locations in the PATH variable to try to find it, givin...
The most popular messaging apps to date (e.g. telegram), even those that are "privacy by design" (e.g. signal, threema), are centralized. What technical challenges prevent peer-to-peer (e.g. jami) or decentralized (e.g. blockchain) messaging apps from servicing billions of users?
All of this happened on 18th November 2020 A person I know sent me a phishing link of Facebook then Google, I entered my credentials however as soon as I found out that its a phishing link, I turned off my mobile WiFi and switched it off and I changed my Google Password immediately from another device which was my iPad...
My question is more towards how this is implemented. I mean do they expose apis to each other or store data at a common place to be accessed by others. Please excuse me if it seems too naive.
If the OCSP signing is delegated explicitly to another entity and that delegated OCSP responder is compromised, how to revoke the certificate and convey the revocation information to a client? We need CRL for this?
Suppose I have multiple EC2 instances deployed with the same key-pair. The key-pair is used for SSH access and general troubleshooting. If one instance is compromised, do I need to be concerned about the key-pair allowing access to the other instances? What kind of cryptographic primitive is used for EC2 key-pairs?
I have a decently powerful desktop running Windows that I use for 2 different use cases: playing games and storing/processing my personal data. As a security-aware person this makes me uncomfortable. A vulnerability on Steam, as I think has happened in the past, or any of the games themselves, can put my personal data ...
I have enciphered a vector of bytes that has 17 bytes in itself. However, When I try to enciphered with AES, AES output has a 32-byte size? What is happening here?
A number of TLS vulnerabilities are listed by Wikipedia, including attacks with brand names such as FREAK, DROWN, CRIME, BREACH, and POODLE. My lay reading of their description makes me think these vulnerabilities are reliant on an attacker being able to either 1) influence a victim's browser's behaviour, or 2) occupy ...
Are there any known exploits in Signal's encryption protocol that could lead to messages being decrypted, or any other compromising information being released?
I've had this idea bouncing around in my head for a while, and I'm honestly surprised that it doesn't seem to be on the market. Which probably means that it wouldn't work well for some reason that hasn't occurred to me yet. I think it should be possible to buy hardware security tokens (Yubikey etc.) in pairs, with each...
I'm working with certificates programmatically through .NET. I usually give the certificate a DN by giving it string like this: "c=eg,s=cairo,st=Nozha,cn=Foo Ltd.,..” But there is another way to give a DN by initializing an object of type X500DistinguishedName. I knew from IETF that X500 standard relates to the LDAP, I...
I have been working on a front end (React) app that sends REST requests to an API end point. I am aware that sensitive items such as API keys should not be stored in front end frameworks (like React, for example), BUT... Right now, I am just running the app from my development machine and the API keys are in one of my...
What was the mechanism for exfiltrating FireEye's redhat tools in the recent SolarWinds hack? I understand it was via HTTP (small packets to many servers)? Are there any further details? Is this a likely ongoing systemic threat or can it be mitigated? If malware is active for long enough, can it split confidential data...
I want to write an exploit for a test application that provides only 12 bytes of space at the ESP. I'm not able to place shellcode in such a small space. I have no clue what I can do to solve this. I have done the following steps. Fuzzing Find offset check for Bad chars find module JMP address control EIP use msfvenom...
Threat model: Malicious user gaining physical access to browser cookies (e.g., 3rd party repair guy copying cookies to his own device or something like that). Let's say legit user did not clear cookies beforehand. Possible mitigation: Pre-authorize user device: Get user's browser signature via JS and save it in a db f...
I am doing some background research into types of XSS and prevention and as I understand it there is not much any application can do against a universal XSS in a plugin or browser. A last line of defense for XSS vulnerabilities is a good content security policy header set. It won't get rid of the underlying vulnerabili...
I was reading this and this article. The first article itself is about why software updates are extremely important for security, and the second one also mentions the following: "Make sure your operating system, browsers, and plugins are always up to date, because keeping your software patched can keep online criminal...
I am not able to understand what use is the manual antimalware scan? All antivirus software has a manual anti-malware scan. I understand if it's the first time someone installs it on their infected/unknown PC, the scan helps in detecting malware. But I can't understand in what situations are such scans useful when the ...
SCENARIO: web application which I think is affected by: a self-xss in the profile section of a user. logout CSRF login CSRF Below I described the test I did to check for the last 2 vulnerabilities, I'd appreciate an opinion about their correctness. TEST: Logout CSRF: in one tab I'm an authenticated user on another ...
I'm using a 3rd party service developed by the Experian Credit Bureau. Looking at their documentation, they are using OAuth2 & are expecting Grant_type: password in order for external developers to obtain an access_token. So, the developer must pass their username/password/client id & client secret (the last 2 of which...
PostgreSQL supports multiple authentication methods, and I think it supports SSL and plaintext connections. How do I find out which authentication method a server uses? I do not have access to the server configuration. Can psql tell we which algorithm it uses to transmit the password, and whether the connection is encr...
Context The company I work in is starting to have a more dynamic website, which can process sensitive user information. With so, we want to improve our security. We are a healthcare company from Brazil, and recently a lot of data has been exposed through national hackers specifically against healthcare companies. We do...
My company are using an offline embedded device, that must encrypt connections to its client (a PC connected with USB). We have chosen to use TLS with both PC and device authentification to encrypt messages, and use certificates to secure the system. So the device needs to send CSR and receives its certificates to auth...
After executing sudo maldet -a / LMD provides the following report: HOST: foo.bar.baz SCAN ID: 210117-2223.1145531 STARTED: Jan 17 2021 22:23:26 +0000 COMPLETED: Jan 18 2021 22:01:12 +0000 ELAPSED: 85066s [find: 42s] PATH: / TOTAL FILES: 579780 TOTAL HITS: 2 TOTAL CLEANED: 0 WARNING: Automati...
You have just noticed that an unknown executable file has been downloaded to your machine. Is there a way to tell what the file does before opening it?
I'm getting a NET::ERR_CERT_AUTHORITY_INVALID for the following google sponsored website: https://viz.mediapipe.dev/ NET::ERR_CERT_AUTHORITY_INVALID Subject: mediapipe.dev Issuer: GTS CA 1O1 Expires on: 8 Mar 2021 I get this in Chrome only. In both Chromium and Firefox (on Ubuntu OS) the certificate is deemed valid an...
I've heard of too many horror stories of people opening a seemingly innocent docx or pptx file that they've got from a business partner, only to find out that it had embedded malware inside. What should a security conscious person do if they receive a doc or a ppt file that they wish to see the contents of, but cannot ...
I work for a company in which the age of our average user is over 70. We have an app* that helps them collect and submit physiological data to their doctors. I found this question that I believe is helpful if you're helping your mother set a password: Secure Memorable Passwords for Older Users However, we're struggling...
I'm working on an small web application (Flask). The application is only for distributed internal usage, e.g. only users with credentials created by the organization will have access to the services beyond the Login page and the organization creates the users. It needs to be distributed because some of the user base is...
I noticed that certain software does not provide hash anymore nowadays. E.g. Zoom https://zoom.us/download wolf@linux:~$ ls -lh zoom_amd64.deb -rw-rw-r-- 1 wolf wolf 44M Jan 1 00:00 zoom_amd64.deb wolf@linux:~$ I've googled both md5 and sha256 hashes but couldn't find it. wolf@linux:~$ md5sum zoom_amd64.deb 5f4...
If a device sends a request to https://example.com and someone spoofs the DNS response to redirect the request to some malicious server. Would the attacker be able to modify the packets during the TLS handshake to make the original request domain name match and therefore establish the connection?
My friend's credit card details were randomly used to make a two small purchases on a food delivery app, by someone other than my friend. They have already contacted the bank and cancelled the card. My friend contacted the app company to let them know, and the app company replied requesting that my friend provides the ...
In reference to the Solarwinds attack, since many organisations have no access to the source codes of the software vendors from whom they just consume the services, how can organisations defend against supply chain attacks?
It's known that card readers, which use the Wiegand format, can be attacked by installing a sniffer, such as an ESPKey. After the sniffer is installed, whenever anyone uses the reader, their credentials get saved, and the attacker can clone them. What is the defense against this? The article mentions that card readers ...
Is there a way to monitor and manage (block, unblock, log) all internet activity (mainly outoing traffic) from my computer? For example, in my android phone I've installed a VPN tool called "Tracker Control" (from the F-Droid repository) that shows me all outgoing traffic and it's destination (google, facebook, amazon ...
Some months ago I bought a peripheral device for my Windows 10 computer (think of something like a game controller). My home router has a function that allows it to capture all incoming and outgoing traffic of my home network. By chance I was capturing traffic right when my Windows 10 PC was starting up. When I later a...
What are the security risks that someone using HTTPS (everywhere) + DoH is vulnerable to, comparing to someone using a "trusted" VPN?
I know we must keep private keys secure, but as long as we don't share the private key, what can go wrong? How hackers/others can steal/get your private key? What is the possible way that can happen for : Non-educated people (Beginner) People that have basic knowledge like not clicking spam, untrusted link, ads, alway...
It comes to my mind a security problem that I would have accessing some data. My current problem is the following: There is a server in AWS London where you can access some data, by law, that data should be accessible only by Europe. I want to access that data being in Brazil physically but operationally talking in Eu...