instruction stringlengths 24 29.9k |
|---|
My chip and pin Visa debit card was stolen from a gym locker and successfully used to withdraw money from an ATM in 2017 in London, England. The PIN was not recorded anywhere and yet the card was used and the bank has refused a refund because the PIN must have been known to the thief.
It is truly perplexing and I would... |
I have a service that runs HTTPS and XMPP multiplexed on a single port. The HTTPS part of the service always uses implicit TLS, but the XMPP protocol may use implicit TLS or may negotiate TLS after a handshake with the StartTLS command.
I had originally set aside two ports (one for HTTPS/XMPP with implicit TLS and one ... |
Is it possible to install Certbot on Google Kubernetes Engine (GKE) for installing and renewing the SSL certificates on Load Balancers (LB) but with CAs other than Let's Encrypt?
|
If you were in a Five Eyes country and you wanted to contact someone else anonymously, without this person or the government finding out who you are or your location, how would you do it?
The person you are contacting does not know you and you have never spoken before. The only initial contact information you have is a... |
I have a question regarding Linuxcontainers. How do you classify the security vulnerability mentioned here, more specifically the ones that ends with 6441,1331,1134,1335 and 10124.
I mean are they a guest to the host and the internet to host type of attack or what exactly ?
|
I am using GnuPG 2.2.20 to create my key pair.
I have successfully created a key pair, now I want to create a backup copy in case of HDD failure.
Following the instruction here, I have tried
gpg --output backupkeys.pgp --armor --export-secret-keys --export-options export-backup MYEMAIL@MYDOMAIN.com
but only the private... |
Internet service providers (ISP) can choose to have full information on the browsing activity of one of its subscribers.
Can an outsider, who is not the ISP, but who simply knows someone's IP address, be able to somehow monitor the browsing activity of that IP address and know every website it is visiting?
How much inf... |
All the examples of an SQL injections that I've seen have a user controlled string variable that was directly used to construct the SQL query but, I was wondering if it's possible to perform an SQL injection provided that the variable userNumber is a long and is user-controlled in the following query.
sqlQuery='SELECT ... |
I have a company laptop where I had many of my personal files and pictures. Now, I'm leaving for a new opportunity and I need to give them back the machine. So I used DBAN to wipe the hard drive.
I'm a bit paranoid so I wiped the HDD many times with DOD then DOD short. After that Quick and DOD short again and finally P... |
A HDD with OSx installed removed from mac and used DBAN to wipe it under a PC. Does all the data is lost even if we put it back on a mac machine ?
|
Looking for "Barack Obama" in Ubuntu's keyserver return these results
For example, take the first search result:
pub rsa2048/86678817fca9987e2d9a3d3ea2437f33d4266cc0 2017-07-08T04:17:08Z
Hash=40135e3a9da88180a317be949b301708
The first line is the key's fingerprint.
I can obtain the fingerprint of my keys using gp... |
To keep it short I've recently been learning about hashing and password hash cracking on TryHackMe.
I was tasked to crack the following hash: $2y$10$0veO/JSFh4389Lluc4Xya.dfy2MF.bZhz0jVMw.V.d3p12kBtZutm
When trying to crack with hashcat I used the following command to attempt to crack the hash:
hashcat.exe -a 0 -m 3200... |
On a particular page in this application, we have a form which allows for a very select few to input data into it, because at the end of the day (and, well, event loop) we end up wrappping that input in to an eval which we highly sanitize and whitelist. This character however seems to bypass everything yet javascript s... |
So I want to do the following
Check the RSA public key of a https server
Make a GET request to that server
Get a response+signature from the server
I should be able to check if ANY reponse+signature pair matches the publickey.
I was able to get the public key based on another qeustion https://security.stackexchange.c... |
I am using Ubuntu 18.04. When making a HTTP request to invalid domains, I get a HTML page with javascript code that redirects me to uniregistry a landing page.
More specifically, when trying to load axdv-invalid-domain.com, I get redirected to uniregistry.com/buy-domains/axdv-invalid-domain.com?src=uniregistry-lander
T... |
I am reading about the Diffie–Hellman key exchange in TLS 1.3. So the first step here is that the two parts Alice and Bob t agree on a large prime p and a nonzero integer g modulo p. Then Alice and Bob make the values of p and g public knowledge.
How the values p and g get public as we are before the client and server... |
I was recently a victim of the any van data breach and so I started read up on password encryption and security - it is pretty amazing stuff. One thing that confuses me though is, since GPUs can now be used to guess passwords thousands of time per second, even salted password have become vulnerable. So how does a hacke... |
What should be the custom response code when WAF blocks a request due to matched rules or policy violation.
We should kept the response code as 403 or 200 when WAF returns a response against a blocked request. What is the general security practice and why
|
I am testing an in-development app locally.
Currently I use environment variables to store JWT secrets and database usernames and passwords.
I am interested in further securing this, and found out about secret managers (like Conjur).
How is this anymore secure than what I currently have?
Isn't it just a transition from... |
I know a text can be unredacted but can pictures too? I have a picture I would love to unredact can that be done? Please and Thank you.
|
Consider a scenario, where your AV / EDR software has to exclude paths of database files as suggested by vendors to avoid affecting performance or stability issues.
You want to review your database for integrity with the aim to make sure that any malicious code such as shells injected in DB code that trigger when calle... |
when I open the burpsuite proxy, it kept hit me with recaptcha , after I click submit, another one pop up, and another, and another, and so on what is wrong?
|
I have an offline safe at a remote location that I want to give people access to at my discretion. I would like to control who and when they have access, without having to travel to the safe.
Example:
I would like "Peter" to be able to open the safe, which is at a remote location, tomorrow.
In my office, I sign the te... |
I would like to send emails from a server, but also make them unable to trace for me as server owner or attackers. I want this for GDPR but also to protect people from abusers.
Short info about service: I am a provider of a service as a person, not a company. Emails will be tied to product (invites and service content)... |
Please correct me if i'm wrong. As far as i know, when we use vpn service, our datas are only encrypted from us to vpn server. After leaving the server to intended recipient, our data is decrypted and interceptable by any party who is spying us.
How to prevent our data from being intercepted or viewed until it reaches ... |
I've always read: Put validations in the backend. Frontend validations are for UX, not security. This is because bad actors can trick frontend validation. But I'm having a hard time wrapping my head around how a bad actor could trick it.
I never thought about it much, I just thought this meant someone could bypass the ... |
I find SSL real confusing, but anyways.
For my frontend static website, I host on S3 and distribute using CF. I just use something simple like comodo SSL to generate an SSL cert and then go through the AWS ACM process to import the cert. All good.
But I realized all my API requests of course go to a Node.js server runn... |
According to the man page, ssh by default sends multiple public keys from files in the ~/.ssh folder, one by one, until authentication success. Does that mean that the server side could know multiple (possibly all of) the client's public keys after a single authentication?
If so, website A would easily know a user's us... |
I recently started using a VPS hosting service, that offers unmanaged VPS. It allows me to reinstall the VM at any point in time, choosing from a number of OS ISO files (doesn't have to be the same OS as before). You are probably already familiar with this kind of service.
When I first created the VM instance I had to ... |
I want to know that whether Amazon S3 Pre-Signed URL is protected from brute force attack.
For example, if I am the only person who knows the Pre-signed URL, is it extremely unlikely that somebody use brute force attack and access to bucket?
|
For the moment I implemented a login form asking for a username and a password and returning a session id (SID) that is stored in a cookie, without setting max_age or expires so that it will be deleted when the user closes his browser (if I understood it correctly).
It is a good behavior for users who log in via a publ... |
Here is the dilemma we're having: we developed proprietary bash scripts that do something, which is meant to be secure and closed source.
Our customers however will have to buy separate IOT devices and flash our software (i.e. bash scripts) into them. The IOTs will have a Linux running (alpine or the like).
What we wan... |
I understand how Diffie-Hellman algorithm can be used to agree on a common key between a client and server.
I am struggling to understand the three variations of Diffie_Hellman - Anonymous Diffie-Hellman, Fixed Diffie-Hellman and Ephemeral Diffie-Hellman.
Is DHE used along with AES for forward secrecy ? Can someone exp... |
Public key is for encryption, and private key is for decryption in PKIs.
And digital signature employs the PKIs.
How to use a private key for encryption, and using public key for decryption which violate asymmetric cryptography?
from geeksforgeeks
https://www.geeksforgeeks.org/digital-signatures-certificates/
The step... |
Recently, after blocking third-party cookies, I thought that all non-domain cookies will be blocked.
But as a surprise Google (google.com) cookies are not removed even if there is no link between the visited domain and google.com, and still, that cookie is present.
Does anyone have an idea why Google cookies are treate... |
One of applications I use has a password manager feature included in it. I can add logins to the password manager and they get stored in a .ini file (for simpler login purpose, I can select an account to log in with without typing username and password). I'd like to know if it is possible to find the key used to encryp... |
I am participating in a program that when I write in the url parameter ' or 1=1;-- it gives me Forbidden 403 and when I write in the parameter ' or 1=2;-- it shows me the page.
Is the website and parameter vulnerable?
If yes is it a blind SQL?
If it is a blind SQL how can I exploit it further?
|
Shouldn't it just "emulate" the admin privileges like everything else? Why dose it actually require it? And is there any security problems with that?
|
I created a large backend+frontend project for a client. They recently started a different project, and contracted an other company to develop and host it. Since they need some of the data from my project, they asked me to develop an api, so they can access the required data.
I created a rest api, where the client is a... |
We all know that if you visit a secure site which uses https, all modern browsers will show a padlock sign if it has a CA certified certificate. My questions are:
Suppose there is an image loaded in the page from an insecure site (for example, from a site having self signed certificate). But the original page URL is a... |
I want to share AES key using RSA. What is the recommended/widely used format for encrypting the AES key and its attributes with the public key? I know that PKCS#7/CMS enveloped-data allows encrypting any key with its attributes using a certificate. But how can I achieve the same thing without a certificate and only us... |
When I look up a site on wayback machine, I click through a couple of links on the site, and then instead of loading the page, it downloads a file called "default.exe".
Since I was expecting a page to load, not an .exe to download, it roused suspicions.
Is this a common thing, and is there any way to figure out what's ... |
I'm trying to implement CSP on my site and after some research I saw that most of the sites don't implement it or the implementation is very weak.
I also see that the implementation of the CSP is similar to HSTS and you need to insert some CSP tags for its implementation.
So my questions are :
Is CSP a minimal require... |
I understand that for most users, the Envelope-from address is the most difficult part of an email to spoof because (I assume) it is checked by the receiving MTA i.e. if you attempt to spoof the "MAIL FROM" address the first MTA in the chain (normally your outbound SMTP provider) will reject it. This means the SPF chec... |
I noticed that Recon-ng is part of PWK/OSCP syllabus.
I decided to give it a try. However, the module google_site_web doesn't seems to work anymore.
[recon-ng][default] > modules load recon/domains-hosts/google_site_web
[recon-ng][default][google_site_web] > options set SOURCE vulnweb.com
SOURCE => vulnweb.com
[recon-n... |
I just tested a site and it looks like the certificate uses weak ciphers but the certificate is new.
Can this issue be related to the Certification Authority that provides the certificate?
Or this issue is related to the possibility of older browser usage?
As you can see in the attached picture the test also found TLS ... |
So the plan is to make a Windows 10 guest, give it lots of vCPUs and memory, perform GPU passthrough to achieve maximal performance, and then load my games onto this guest. The aim of this would be to stream the games over LAN to my PCs, thus providing easy access while also putting all games on a single box that has n... |
I'm designing an app (for PC), that is intended to run on users' machines and generate a file with some data. The user will then upload the file to the server, and I want to verify that this file has been produced by my app and hasn't been modified. Can it be done reliably at all?
Things that I have considered:
genera... |
My friends have my ip address and they're all programmers/hackers. They've been interfering with my wifi connection several times today. Asking them to stop or saying "they won't do anything" is not an answer since I've tried to tell them to stop but they carried on. What can I do?
Also, I have witnessed them interferi... |
Is it possible that after establishing a SIP phone call my conversation partner is able to identify my location? If so what are the prerequisites and how accurate would he be to do so?
|
GitHub Pages allows to set up a public page under <user>.github.io that can optionally be customized with a personal domain. In order to do so:
GitHub must be set up to recognize that an incoming call referred to by a non-GitHub domain should be handled
the personal domain must have a pointer to GitHub, via a CNAME in... |
My lecturer said that if the server sends a public key certificate (RSA) signed by a Certificate Authority that the client does not know about (i.e. the client doesn't have a master certificate for the root CA in that chain), then the key exchange protocol falls back to some form of unauthenticated Diffie-Hellman (e.g.... |
As I understand it, when a client wants to authenticate to an application server using Kerberos it must first request a service ticket from the KDC (and possibly a ticket-granting-ticket if it does not already have one). For scenarios where the client cannot directly connect to the KDC but can connect to the applicatio... |
I have a child domestic violence victim I am trying to collect evidence from and coordinate relief for (remotely), but I have cause to believe her phone and/or identity has been hijacked in the past to sabotage her escape options and paint her as non-credible ahead of law enforcement intervention.
In addition the suspe... |
I have tried to dip my toe into android hacking. I followed this helpful article on Medium.
I'm using NoxPlayer emulator and OWASP ZAP as proxy. I have rooted the device, imported certificate from ZAP, changed the file extension to .cer . I have developer mode and have I managed to connect to the device from the host m... |
Assuming a given SSD supports TRIM, and is on a physical bus that supports sending that command, and the connected computer is running an OS that is aware of TRIM:
If the drive is formatted, or has had its files erased, will the data be unrecoverable after the drive's firmware has performed its full garbage collection ... |
There are recommendations to run processes as a non-privileged user within the docker container:
[...] run your processes as non-privileged users inside the container
See: docs.docker.com, also 1, 2
One reason I can see is that an attacker who got access to the container can install malicous software. However, I run ... |
I would like to implement a "Login from a suspicious location" email for my users.
The first thing that came to my mind was to use a GeoIP Latitude Longitude and a k-d tree to compare the distance
between the current login and the geographically closest prior login for a threshold.
The problem I'm seeing is that to ach... |
I manage a set of service providers (SP1, SP2, SP3, etc), and we currently have this SAML SSO flow working where the SP causes a POST submit to the SAML IDP with an XML SAML request which includes an SP SAML Endpoint. The SAML IDP returns a SAMLresponse token to the browser which sends it to the SP SAML endpoint for ve... |
In the past, to install VirtualBox on Debian/Ubuntu you needed to sign some kernel modules, otherwise it would not work. The process involved creating a key pair, importing the public key as a MOK (Machine Owner Key) in the firmware, signing the modules with your private key, etc. If you didn't want to do this, and rep... |
A vendor implements two-factor authentication that requires us to enter a TOTP code generated, for example by FreeOTP, after user/password.
I asked them how it is possible that using two different sessions from two different computers I am able to use the same code in both sessions to log in which defies the nature of ... |
I work as a CISO/Director of Cybersecurity for a large hospital. My background is in penetration testing, but I'm fairly new (a couple years) to the healthcare side. The challenge that I and almost every healthcare security exec faces is securing with medical devices that are ghastly expensive to replace and have littl... |
A vendor's software is generating CSRs with no keyUsage or extendedKeyUsage set and in combination with this they contain commonNames that are not fully qualified domain names. If I submit them to Digicert as "Private SSL" certificates they sign them for me.
I understand that web browsers will ignore the CN and treat o... |
I recently updated the certificate on my site and after a few days and a checked with Security Scorecard, I noticed that the certificate is self-signed.
Is that legal and permitted?
As you can see, the certificate is released to "DST Root CA" by "DST Root CA".
That configuration is considered as a security error by Se... |
Do docker (web service/server)s run unattended updates? Otherwise, how to do this? I am worried about the recent sudo -s CVE. How are docker containers affected? If I set up an auditing system with remote logging, and have unattended/security updates for docker web apps, is this sufficiently secure?
|
Question resolved: no reason at this time to assume the remote access was with any malicious intent.
[skip this beginning if you want]
My partner was offered a job with a real estate listing company doing photo processing for their virtual tours, and this rang a couple of alarm bells: their photos aren't super profess... |
A lot of services offer authentication with FIDO2, such as Twitter, but only allow the user to set one "security key". This is problematic in case the key is lost or breaks. The ideal solution would be to allow a user to set up multiple keys, similar to how Google does, but that's not something the user can influence.
... |
I was playing around on my website and was trying to hack it. I read an article about telnet the article said to test telnet hostname/ipaddress port.
I used this and I got this back:
Trying 103.211.216.63...
Connected to 103.211.216.63.
Escape character is '^]'.
220-bh-in-20.webhostbox.net ESMTP Exim 4.93 #2 Wed, 03 Fe... |
This question is intended for better understanding of security features of Android architecture.
In particular, I want to know what part of the architecture needs to be secure to prevent an attacker from gaining control of the hardware (say speaker, or microphone).
Specifically, is it the Linux Kernel, the Android OS, ... |
Maybe someone can explain why my concern is not realistic. If I create a browser-based app with a login (let's say I'm Facebook or Microsoft), why wouldn't I store all the wrong passwords people type? Some of them have to be valid passwords for other apps and I (if I were dishonest) could probably sell them. From ... |
I am trying to Use AES to store passwords for a password manager. For authentication I am already using bcrypt. As AES uses 256 bit Key can I use SHA256 to generate 256 bit key from hashed value of bcrypt(Not talking about hash saved in Db).
|
I wanted to know if anyone had experience sensoring single flows that generate 90 kpps or upward of traffic. My conundrum is that I use tools which I would like to be able to properly see an entire flow with (Zeek, Suricata), however both of these utilities are not capable of handling larger traffic volumes if a single... |
I'll formulate my question in regards to timestamped PDF, but I wonder actually about the long term validation of RFC3161 tokens in general.
So, PAdES has the concept of Long Term Validation, which means (correct me if I'm wrong), that a document contains all the necessary data to confirm even after a certificate has e... |
My question is about how to properly store RFC3161 tokens, so that their validity can be verified for a long time (aka "long term validation")
Let's say I use an RFC3161 (https://www.ietf.org/rfc/rfc3161.txt) to timestamp data (not signatures in this case, just the hash of some data that I want to prove existed at this... |
If a webpage is delivered over HTTPS, the browser makes this clear with a padlock symbol. It's something that people look for. My browser also makes it clear that a page is not secure.
Why aren't emails treated similarly? In Gmail, you have to open up a small pop-up to see that an email is signed by DKIM and delivered ... |
hi I started to find bug bounty vulnerabilities and i think i found a te.cl vulnerability in a website.
i send
GET / HTTP/1.1
Transfer-Encoding: chunked
Host: subdomain.domain.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.87 Safari/537.36
Content-type:... |
To be clear when I say "private unique identifier" I mean an identifier, which is not stored on the database for the website, it would be hashed in combination with the password and a good salt in the hash table for login information to each account. And when a new user signs up or has forgotten their unique identifier... |
I found a privilege escalation bug in an HTTP response page and I want to fuzz one of the field with ID values that define the admin role and see if any other viable ID comes up. Is there a way to do this?
|
In WPA 4-way handshake and in Message 3 (while GTK transfer), A RSC (Received sequence Number ) sent by the Authenticator (AP) to the supplicant.
The only information I found about RSC is that it's the starting sequence Number for GTK.
How is it generated and How is it relevant for the supplicant?
|
I'm new to buffer overflow exploitation. I've written a simple C program which will ask the user to input a string (as a password) and match that string with "1235". If matched then it will print "Access Approved", otherwise it'll print "Access Denied".
Now I'm trying to overflow the string buffer which will overwrite ... |
Does implementing a Network Intrusion Detection System (NIDS) give you any advantages over an Endpoint Detection and Response (EDR) solution?
I've been trying to do research on this, but are struggling to find good sources comparing the two together, or even discussing them within the same context. There seems to be a ... |
The company X is selling its home made IoT device.
Each IoT device is only communicating over Internet with a web server of the X company, using HTTPS (with state-of-the art configuration : latest TLS protocol, higher cipher suite, etc).
Is there any good security reasons for the X company to encapsulate the HTTPS traf... |
I have two sticks of RAM in my computer that I would like to sell or donate. From what I understand some RAM is volatile, losing all its contents when power is gone for a few minutes, and some is non-volatile, retaining that information after power is lost. I would like to know which kind of RAM I have and whether it i... |
The RFC3161 (https://www.ietf.org/rfc/rfc3161.txt) specification states
3. Transports
There is no mandatory transport mechanism for TSA messages in this
document. The mechanisms described below are optional; additional
optional mechanisms may be defined in the future.
It lists a few examples such as
3.2. Fi... |
I want to make an application that uses oauth2 and JWT as access tokens for securing some apis and providing authentication mechanisms. The application is a microservice architecture and wirtten in python. It would be deployed on AWS. So I have a authorization-service and an api-service. I want the auth-service to sign... |
What is the industry standard on this matter? How do you handle the keys for your websites, apis, micro-services, etc.
If I create private keys without password they will be 100% compromised if one has access to them.
On the other hand if I use a password they won't be compromised if one has the key without the passwor... |
Can my Root, Intermediate and SAN certificates have the same serial number?
The serial number is 00.
If the Root, Intermediate and SAN should not have same serial numbers, then should I use the random serial number which gets generated when I do not mention 00? Or, suggest me which serial numbers to use for those.
I am... |
I've found an application that allows arbitrary file upload (client side validation on file extensions), however those files are not stored in a folder which is accessible by the webserver, so a web shell is not possible.
However, due to detailed debug output provided by the webserver the file upload function simply p... |
Hope someone can explain the impact as I know a bit but not too much about using certificates.
We use an external CA QV (I think now Digicert) to create certs and install into the web, vpn, wired/wireless dot1x servers.
QV recently revoked an ICA and provided a new intermediate which prompted a scramble toupdate the vp... |
So OpenSSL can calculate a hash value for X509 certificates that uniquely identifies this certificate:
https://www.openssl.org/docs/man1.0.2/man1/x509.html (argument -hash or -subject_hash)
now, if I have a CMS file (https://www.rfc-editor.org/rfc/rfc3852) in DER encoding, which has a SignedData field with exactly one ... |
Having difficulty understanding how to translate 'traditional' vulnerability management to a cloud environment. Previously accustomed to using tools like OpenVAS and Nessus, setting up scans which target static IPs and CIDR blocks. This approach does not appear to lend itself well to a modern cloud environment from wha... |
I learned about this years ago and don't remember enough of the keywords to search for it appropriately.
Its where sites can tell the browser that the site must not allow the site to be downgraded to HTTP.
|
From my understanding, while HTTPS does not stop a mitm, it makes it so the mitm cannot read the plaintext requests. But, the mitm could still tamper with the public/private keys anyways, so in came the use of encryption certificate companies. However, as far as I know these are meant for use over the internet. So over... |
OS: Lubuntu When using Outline Manager from Alphabet, it asks to allow incoming TCP connections on ports ranging from 1024 to 65535. Could this be a security flow, more exploitable, than buying a VPN from a third party?
|
I was practising on OWASP Mutillidae, and I met a problem. There's a task that examines our knowledge of UNION query.
The vulnerable query is:
SELECT * FROM accounts WHERE username='
The accounts table has 5 columns, and we want to obtain schema_name from information_schema.schemata
So I write [John' UNION ...] in the... |
I have been going through OWASP guidelines on managing JWT based authentication. So, I have decided to change my current JWT implementation as per that.
Flow is as below.
When authenticated successfully,
Generate accessToken as JWT also an opaque refreshToken *(Also add a bcrypt hash of some random string as csrf in t... |
Recently I had a Windows 10 (64 bit) PC where Windows Defender would report that it found and (apparently) removed a "threat" it calls Win32/Tnega!MSR. Unfortunately, the removal was unsuccessful, and after restarting the machine, the same message would pop up again. I then built a "Windows PE" USB stick with various a... |
I just got my academic license for Shodan and I was playing around it. I noticed that when I use the
has_screenshot:true
filter it even shows screenshots from sites which requests authentication.
How is that possible? Because according to this, Shodan can not do that.
So am I seeing a cached version or something?
|
We know that in WPA2's four-way handshake, a MIC is generated in order verify the supplicant (client). But how it is generated? Is something hashed to get the MIC? The PTK (pairwise transient key) depends on the nonces and MAC addresses and also the PMK (Pairwise Master Key); what are the inputs upon which the MIC depe... |
A problem with Chrome extensions was raised in an earlier question: extension owners can sell their extension to another owner, who can then insert malicious code.
From a user's perspective, they may trust the initial owner and install an extension, only to find malicious code silently installed months later when the e... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.