instruction
stringlengths
24
29.9k
I recently wrote this answer, in which I explained the process of HSTS preloading. However, I noticed that I didn't actually know the exact mechanism for fetching preload information works. I have checked the Chromium Documentation, MDN Web Docs, hstspreload.org and others, but they all only explain what purpose preloa...
Recently, we've had users complain that they forget that they have an account, try registering, and get error message that the user with such email already exists. There is a proposal to just log them in such cases. So, if the user inputs valid login info into registration form, they are just logged in instead. Obvious...
I am concerned that if it is possible to copy these as .reg files (without privs) and then (on another machine) reverse the .hiv files from them... this would probably be bad, which makes me think it's likely not possible. Has this/is this done to anyone's knowledge? I found some tools that claim the ability to go from...
If a user through a request can add a record to a table (for each request) is theoretically possible that he could cause a dos attack just increasing the size of a table?
If I want to use a S3 clone to host something somewhat sensitive (probably digitalocean, since it's cheapest and probably has a perfectly good quality), is it sensible to do it this way: https://s3clone.example.com/Ki3mCdA3eFrC5haIVvUkZaUOuceisGmv85ZXt4qgXoZuMwOL1IKiG21Cm6i4u83wMpQZNqEibh4CHNUr61s6rCwvAK0IUsCCwZO8MTZa4...
I recently found malware that uses TLS 1.2 to communicate with the c2 server. I wanted to check the content of that but is encrypted. I have tried the method with the SSLKEYLOGFILE but unlike for HTTPS traffic via the browser (in this case firefox), there is no "encrypt TLS" tab in wireshark. Is there a way to get the ...
Since most websites will let user retry their password, lets say 3 times in a row, in case of mistype or forgotten password. Exceeding the set number of retry the account will be locked or timed out. If one were to use online dictionary attack to gain access to a certain account, wouldn't that be a very inefficient met...
I've seen the routersploit program on Github. It's a similar program to metasploit in a way that it exploits vulnerabilities in network devices (or just routers I think. Not too sure). I see that I targets most routers and exploits their vulnerabilities, but I don't understand a few things. What do you get out of explo...
Does the SAML Identity Provider have to know which Service Provider the User is trying to authenticate with, during a Single Sign-On? By looking at the specs, I see references to various elements that to me indicate an affirmative response to the previous question, namely: protocol:AuthnRequest/Issuer protocol:AuthnRe...
I have the problem that in my particular Content Management System (CMS), preventing BFAs in website login forms without Rate limiting, Captcha or Two factor authentication isn't ready out of box or requires development resources that at least to my current understanding I don't have or cannot afford. The only other po...
Can two different Root certificates and their intermediate certs have the same serial number? I issue two root certificates: Organization: My Example Organization: My Example Organization Root Certificate Authority (serial number is 00) ----- My Example Organization Intermediate Certificate Authority (serial number is...
Should root certificates have OCSP or CRL for its own revocation status? So here is what I mean: Intermediate Cert -> http://example.com/root.crl SAN Cert -> https://example.com/intermediate.crl But should you create a crl database for root? Root Cert -> http://example.com/root.crl Like the above?
I'm configuring a Debian (Stretch) webserver to run docker containers for socks requests. So, the application would be able to authenticate (on port 1080) with the Dante server running inside the container and communicate with the web. I'm concerned about potential exploits, although I updated the iptables and set the ...
For my website I need to add "forgot password" functionality. As I searched on the internet there are too much vulnerabilities you may encounter in case of wrong implementing this functionality. Like referer leakage, account enumeration etc. How I Thought To Implement This Step One In login page there will be a link ...
I have an SSH server, where users can login to with their username and password. I want to prevent attacks that try to steal the user's passwords. Is there a way to prevent an impersonation attack on my SSH server? The attack scenario: User connects to my SSH server for the first time or from a new PC (from public/com...
My router configuration panel won't allow me to use emojis in SSID, for some reason. Although, I can very easily bypass this restriction, using the browser developer tools (which makes me think if it's a company's security concern or what). If it is a security concern: why is it so easy to bypass the router restriction...
Note that 00 in 00.pem is the serial number of the certificate. When I run this command, it also creates a file called 00.pem in the new certs directory. The 00.pem has the same content as enduser-example.com.crt. Here is the command: openssl ca -batch -config enduser-certs/enduser-certs.conf -notext -in enduser-certs/...
I have some generic USB C-to-A and A-to-C adapters that were bought cheaply. I thought that if any of them had any advanced capabilities (other than being "dumb" adapters) such as mimicking HID (keyboard, mouse) or allowing something like an attack via a USB cable then it would have to appear under 'Device Manager' in ...
I know there are ways to defend yourself against wireless attacks targeting routers such as changing default creds and implementing a firewall but are there any other techniques that'll increase your router's security?
In Mr Robot season 3, the feds are set up in a safe house spying on Elliot's internet communications (with packet sniffers?) when they intercept an email from Elliot to someone else containing a link that they think is secret information. When Elliot breaks into their safe house shortly after, they realize that clickin...
Could receiving in a text or an email, a URL link just like https://security.stackexchange.com/questions/ask of a website, which could be a pernicious one, ever pose a security problem at all? What I am asking is that: if I receive such a link but do NOT click on it, will it ever do harm to my account, computer or othe...
My ssn,dob,mother's maiden,phone number, and address were compromised and I am worried that some bad people now have all the afore mentioned information. My question is what could criminals do with this information?
I know this might sound silly but given what happened with SIGRed I wanted to ask and see what those who know think: Is there an audit or analysis out there showing the possibility of RCE with ICMP Echos against Windows hosts? I mean, SIGRed was found to be present since Windows Server 2003...so, there might be a possi...
Now that those four are in the censorship business and cooperate to surveil and exclude, I want to do more to get them out of my life. No Facebook, no Twitter, no YouTube, no G-mail, no Microsoft, no Skype--check. Mostly use the TOR network and TAILS--check. Use Fedora with ProtonVPN with AES-256 in GCM/SHA-512 and add...
I'm currently planning to deploy a project on Heroku and was wondering if it is safe to send 2FA sms messages with the blower.io heroku addon? Also is it safe/ok to send a short lived authentication code by sms or is there any way to send secure SMS messages?
Is there a standard order for the X.509 extensions of a certificate? For example: [ myca_extensions ] basicConstraints = critical,CA:FALSE keyUsage = digitalSignature,keyEncipherment extendedKeyUsage = serverAuth subjectKeyIdentifier = hash authorityKeyIdentifier = keyid:always,issuer crlDistributionPoints = @cr...
I always see "false positives" or "false negatives" in HTTP request smuggling forum posts. What does it mean? Example: HTTP Desync Attacks: Request Smuggling Reborn
Libsodium supports Blake2 for key derivation. It seems like you shouldn't truncate the output to get two keys (eg one encryption/one mac) as the recommended way is to use a counter as the salt for different keys. Would it be ok to use the encryption key as input keying material for Blake2 to derive a mac key and then s...
Generalized problem say there are 2 companies/parties A and B (there may be more) and there is an event E which is recorded by both A and B. Let's say the occurrences of event E according to A is 'E by A' and according to B is 'E by B'. B has to pay to A per event E ('some rate' multiplied by 'occurrences of E') So ass...
I'm considering storing a sysmetric encryption key in the form of a CyptoKey Object with extractable set to false in IndexedDB and I was wandering whether this is safe or not. The questions that I didn't find the answers to are: How are the keys stored on the users computer ? in plain text ? encrypted ? or as function...
I read somewhere that TPMs are not hard to be rendered useless or broken by improper use of its API, considering I have complete user access to it via the command line. Is that true? Could you give an example of what I could do to destroy my TPM or my data by improper use?
I am studying WEP protocol and more specifically fake authentication attack. Man page says This is only useful when you need an associated MAC address in various aireplay-ng attacks and there is currently no associated client. Whereas the whole point of the attack is to authenticate by capturing an authentication, and...
I own a Pixel C tablet, which currently has Android 8.1 installed. The Pixel C has officially been discontinued at the end of 2017, and received its last security update 2019. I would like to keep using it, since I only use it to watch YouTube videos and occasionally play some games. However, the fact that it no longer...
I mostly use the Tails browser, but I also use Firefox in Fedora with several add-ons such as TrackMeNot, HTTPS Everywhere, uBlock Origin, NoScript, and Fingerprint Detector. I would like to obfuscate collection against myself when I use Firefox. I do not consider active attack, only passive. CC Cleaner and AVG Interne...
Asked this question on Bitcoin SE was told to post it here. I'm developing a custom Bitcoin service. Besides for the core application (which is written in PHP) I'm going to install a blog for updates and news. Although I would never try to tweak WordPress itself to provide the core functionality I need (as this would p...
I have been trying to figure out a way to script a way to background my auto run scripts. It seems like everything works perfectly fine with the exception of the background command. For example: kerberos credentials ==================== Username Domain Password -------- ------ -------- (n...
Let's say that my passphrase is: aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaapassword9 Yes, it looks ridiculous. But only because we already know it. An attacker, trying to brute-force their way into this passphrase, has zero knowledge about it. That is, unless they have somehow heard or seen me boast about how I always pi...
Sometimes I have to fix an infected WordPress website. I always check the infected website from a virtual machine (Oracle VM VirtualBox). I'm also running Norton 360 DeluXe on the host machine. In the 2 most recent projects, for both, I received a notice from Norton that 'an intrusion attempt was detected and blocked',...
I have a question how to deal with whitelisting field arrays in modsecurity. Currently am doing the following: ... ctl:ruleRemoveTargetById=942510;ARGS:_owc_pdc_faq_group[0][pdc_faq_answer]" ... ctl:ruleRemoveTargetById=942510;ARGS:_owc_pdc_faq_group[1][pdc_faq_answer]" ... ctl:ruleRemoveTargetById=942510;ARGS:_owc_pdc...
First of all I am not a "computer person" and I'm not going to spend a year learning more about computer stuff so I don't have to ask questions here. I've searched for similar questions, and while they provided some advice, much of it was simply too vague for someone like me. I imagine that other people would also bene...
In the PCI DSS3 requirements it states that the user must change their password every 90 days, how are banks in the UK getting around this requirement? Is it because of 2FA? As a new business we are analysing the requirements and what we need to do and this one in particular seems extreme when most companies aren't req...
If I have a Timestamp token, then the signing certificate for the token is identified via the ESSCertID (for RFC3161 tokens) or the ESSCertIDv2 (for FC5816) of the signing certificate, which is the SHA-1 (in the case of ESSCertID) or some other hash (in the case of ESSCertIDv2) of the DER encoding of the signing certif...
How to conduct brute force tests for directory traversal or other operations that require trial and error without accidentally turning it into DOS attack? It comes to how much bandwidth a site is capable of (and other things like memory) and it's different as to every site. How to measure this bandwidth? How to determi...
So, RFC5816 https://www.ietf.org/rfc/rfc5816.txt changes the specification of RFC3161 https://www.ietf.org/rfc/rfc3161.txt RFC3161 specifies the 'version' field in TSTInfo to be set to 1 Why does RFC5816 not change the value of this field? wouldn't that be exactly the idea of this field? If not, how else would a new ve...
We use Snyk as our open source dependency scanner. We currently scan for vulnerable libraries on every pull request and this causes overhead to our developers. What would be a good open source vulnerability scanning frequency? Should it be weekly, bi-weekly, monthly or continuous? I am trying to suggest AppSec processe...
I am not referring to any specific site in this question . If a site allows users to change email after login can't a hacker by obtaining user password due to users negligence then change email and then change username and password to gain full access ?
This may be more suitable for StackOverflow in terms of a recommendation for a library or implementation, but security-related questions are often overlooked or misinterpreted. I'd like to first understand whether the proposed mechanism is an apt solution, as well as a means to implement said solution. I will simplify ...
Virustotal is giving some alerts for the Windows installation of Surfshark VPN. I am sure they are false positives, I just wanted to hear what other users say about this...
These days I intensively read maybe all posts and topics based on software security, but I couldn't find any solution that would be acceptable for me (if there are any of them matching my requirements). So I have .EXE application written in the c# programming language and I have an installation which places all necessa...
Consider the following scenarios of storing sensitive data locally on a network connected always-on device: without any data encryption whatsoever with encryption, the key stored locally in the device with encryption, the key stored on a remote location accessible via network No matter where the key is stored, once t...
I have the following X509 certificate in PEM format: -----BEGIN CERTIFICATE----- MIIHsTCCBZmgAwIBAgIQKopxYDq6VHRa7GfyxvV6hjANBgkqhkiG9w0BAQsFADCB tzELMAkGA1UEBhMCQ0gxHjAcBgNVBGETFVZBVENILUNIRS0yMjEuMDMyLjU3MzE+ MDwGA1UEChM1QnVuZGVzYW10IGZ1ZXIgSW5mb3JtYXRpayB1bmQgVGVsZWtvbW11 bmlrYXRpb24gKEJJVCkxHTAbBgNVBAsTFFN3aXNzIEdv...
The idea is to find, through some search engine or tool, a HTML tag structure, or HTML fingerprint, which reveals similarly coded pages to a particular one. A traditional search engine like Google or Bing will only look out for actual content, but won't give results for HTML itself. I am aware some services, such as sh...
I understand that X.509 certificates are used for authentication. How can I use the information provided in an X.509 certificate for authorization? For example, are there any fields in the certificate that can be checked by the server to determine whether that user can access a resource once authenticated? Thanks
With a single infoleak and access to the binary you can calculate the other addresses. Is this still possible when you don't have access to the binary?
I've realised that there is an easy way for someone who is external to figure out valid employee numbers at my company. And I'm fairly sure they could then be linked to a full name easily too. I've raised this as a concern with our security team as I don't particularly like the idea but it's been brushed off as a fairl...
Recently I tried to make an online purchase in one of the biggest e-commerce sites in Greece. During checkout, and after providing debit card details, it asked me to provide the username/password (not one-time-password) of my e-banking account to an iframe inside the site. I inspected the iframe url (src attribte) and ...
We are a big supermarket chain and have had complaints about fraudulent activities from a few customers who have used a particular email domain. We are in the process of implementing MFA on our site. If the customer's email account is already hacked (and username and password on our site) the MFA will not make any diff...
When parsing a string to a BigDecimal or BigInteger in Java, or BigInt in JavaScript, are there any known security issues around this? Like if you take in the string without validating it's just numbers, is there any risk? Are there any known CVEs around this?
I bumped across a request via Traffic analysis through Burp Suite Proxy & it looked like a 3DS Authentication. Sample below: My question was if this authentication could be intercepted, decoded or tampered with using any attack vectors such as CSRF, MiTM or otherwise. Are there any attack vectors that had been success...
I am using docker to run a few server apps on a raspberryPi with ports exposed to the open internet. If an attacker were to successfully infiltrate my docker containers, I would like to be certain that they cannot access other devices on my network. Therefore, I would like to know how to lock down my docker containers ...
I seems a little strange that the only thing in common between me and my guest is that she was on my wifi and thus using my wan ip address, yet I am receiving advertising from a site she used. I'm not surprised that she sees those ads, but it seems odd that a completely different system, os, useragent, no cookies bein...
As part of a bounty bug, I discovered a Client Side Template Injection (CSTI). I would like to create more "impressive" payload to increase the risk of the vulnerability. The framework affected is AngularJS. Theses payload works: {{7*7}} ${{constructor.constructor('alert("This is a CSTI");')()}} ${{constructor.construc...
I'm testing this application which is properly validating origin header on the sever side. However, if I add any domain and the expect domain as port, application still consider this valid. Origin: https://random-domain.com:expected-domain.com This is also valid. Origin: https://random-domain.com?expected.domain.com I'...
Disclaimer: This is a cross-post after I initially was looking for help on the Gentoo forums since I suspected some major update of my Gentoo system to be the reason behind my problem. However, since then I found that my GnuPG setup is working except for with that one specific key, plus I did not get any useful feedbac...
I was informed recently about the RIPPLE20 vulnerabilities. Can I identify the usage of a specific protocol on my PC or inside some application on a PC? I think that the first thing to do in these cases is to find the assets that can be influenced by these zero days. In that case, I think that the identification of the...
I'm trying to figure out if it's possible while listening to the network to read URLs from the traffic. Since privatebin uses the encryption key in the URL, what process could be in use to prevent spies to see the full URL? I opened wireshark and checked what happens when I open an encrypted paste: I was surprised I co...
I have a (sensitive) background in security, in short, I believe that the infrastructures MUST NOT connect to the internet. If you connect to the internet, it is a matter of time before it is breached. In recent news An unidentified hacker has accessed the computer systems for the water treatment facility in the city ...
A while ago, I installed Tor app on my android (fully updated and Android 10) and with a free Vpn tried to open some sites listed on several blogs (like "best dark sites in 2020" or "dark websites for torrents" etc)(most were scams) and also one that claimed to be providing hidden news of world (basically conspiracy th...
From Yahoo News with an embedded TikTok posting: "To protect your security, www.tiktok.com will not allow Firefox to display the page if another site has embedded it. To see this page, you need to open it in a new window." Firefox explains it here "Websites can use x-frame options or a content security policy to con...
The full story goes here In short, I surfed darkweb on android(updated android 10, now 11) carelessly and ignored some hijack warnings(2 of them) by Tor (warnings came in the form of a purple webpage that was supposed to be the page where automatic ad redirected) on a couple of ads. Now, basically I did not found anyth...
Context I'm building data lake from scratch within a small team (3-6 data engineers). I want to mask PII data when copying data from prod to dev/test environments. I'm particularly interested in the case when ETL join, srk generation, deduplication logic depends on PII columns. So I believe I need bijective (no collisi...
Let's say in my address bar I see such link: Privatebin URL/key interception? Can somebody besides server and me know that I'm visiting not just security.stackexchangec.com but excactly ../questions/244530/privatebin-url-key-interception ?
I'm a student of computer architecture and I just got through a class on Hardware Security. We spent a considerable amount of time learning about microarchitectural side channels, reading papers on how researchers "stole" cryptographic keys from toy crypto libraries by timing memory accesses, and crafting toy example a...
I'm trying to login a user and, then, retrieve the user information like we do on a regular web app using php session. I have searched some solutions but I couldn't find any answer for my problem/doubt. I know that the best way of doing it is using tokens but I would like to know if there's any other way to do that wit...
My colleagues started using https://github1s.com to browse our company's code on Github. It pops a "visual studio" window for the code. Looks great and useful. But... I don't know much about web stuff. How can I tell if this is safe? What can the site see of my code? How is authentication dealt with? All I could find i...
My router's firewall was set to accept incoming traffic for about 48 hours. Misconfiguration from a user, apparently. I have few devices on the network (two Windows PC, Freenas, printer, chromecast TV). The firewall logs were disabled. No default login/password on any device, except for one (guest Windows account witho...
I know its is advised to encrypt the traffic within the company network. Should we also stay away from SSL termination after a reverse proxy that's proxies multiple worker nodes on the same LAN? By SSL termination I mean that the proxy will deal with all the TLS stuff and forward the request afterwards over HTTP. I hop...
I develop an Angular app with a NodeJS API. I am trying to add security to my application and so I need to create a safe authentication. To do it I have found some courses to add JWT to requests and especially followed this one. I have then created verification middleware on express API and token storage in Angular loc...
I'm trying to use john the ripper to vbulletin hashes. Example command here; john -w: D:\Leak\1.2billion.txt -form:dynamic_1007 C:\Users\fatih\Desktop\m2711\m2711-2.hash output: Warning: invalid UTF-8 seen reading D:\Leak\1.2billion.txt Using default input encoding: UTF-8 No password hashes loaded (see FAQ) What is ...
I am trying to migrate off of firebase, as in doing so, you can export the hashes of user passwords. Looking at their algorithm, they do not store password hashes, but rather, they use the first 32-characters of a password hash to encrypt a secret key, and store that instead. I was mostly wondering, why would they be d...
Although What is the best way to store password in memory (RAM) in Java? covers the same territory, this question has the aspect of noticing what other people do and wondering why. The question on SO: https://stackoverflow.com/questions/8881291/why-is-char-preferred-over-string-for-passwords is a better duplicate, th...
I'm currently doing my Cyber Security Certification program, I along with my fellow classmates are in Beginner stages. Over the past few weeks we have been writing up variety of Discussions using Domains 1 to 5, for this Week we are given a scenario and must utilize Domains 6 and 7. Where I have a strong grasp of Techn...
My company NAS has been attacked by Ransomeware and all the files are now encrypted to above file formats. Does anyone know any method of decrypting at least some files? I can find some decryption tools for older ransomware attacks. But unfortunately, I couldn't find any tool for these file formats. Thank you.
The question concerns the idea of transferring sessions between domains without having to log in again. I would like to do it like this: (user is logged in and changes the language to a language from another domain) : the test_token is generated test_token is used to save current session data for redis/database (max...
What happened? This is a live event that a friend of mine is working on, a company's systems were breached by a Threat Actor (TA), when the Cyber Sec company was called in and tried to regain access they could not, as SSH authentication would fail. What I suggested I suggested the use of Hydra, as he mentioned SSH auth...
I don't mean to start another OAuth vs OpenID discussion, but I want to share the underlying cause of my confusion. When I want a Client to process my google docs for something, I have to go through my google account. But if its only use is to process docs, why is it asking for my email address on the consent page? Doe...
I was reading an article which said that if you install custom root cert from a third party then they can decipher all communication between you and others. But that doesn't make sense. What I understand is that root cert allows SSL mechanism to verify if a certificate provided by connecting party is legit or not. So u...
Is an Android device that is rooted has the bootloader unlocked is running some mainstream custom ROM has encryption enabled, with a strong password more vulnerable (As in easier to break into, to have its data decrypted by a criminal or law enforcement) than the same device running stock Android (Also encrypted with...
I understand how some CDNs also suffice protection from DDoS attacks by distributing content serving via various machines instead just one machine so that distributed attacks on one machine become unfeasible. If I am not mistaken, such CDNs can also help protect against brute force attacks and if so it might be good fo...
I am trying to find a list of applications which use RPMB partition in the underlying Storage Device (eMMC/UFS/NVMe) in Android Trusty environment. How do I go about doing this ? Thanks
A new HTTP header named Cross-Origin-Opener-Policy has three values: unsafe-none same-origin-allow-popups same-origin Google's web.dev article about this header explains its effects on other sites (as in, cross-origin sites) that open sites with this header with regards to a separate browsing context group. Scott Hel...
I have an iPhone XR with iOS 14 with security issues in the past. One of my email addresses showed up on to data breach websites and the password I use was the same for all of my accounts like a dummy. Accordingly, my Apple account was hacked at the same time and password was changed by whoever hacked it. I was really ...
What advantages does a Cookie-to-header technique give over CORS in a cross-origin request scenario? Example scenario: A rest API called api.com provides data to good.com. api.com has allowlisted cross-origin requests from good.com. Some client with an old browser that doesn't have CORS implemented goes to evil.com. Fr...
I am trying to learn Metasploit using Kali Linux on a Virtual Machine. I learned that payloads can be "carried" through an Apache server. But the problem is, when I try to access the Apache server through my Android phone, it seems that it cannot reach the server even though I entered the details correctly and the serv...
I'm not sure if this question is within the scope of security.stackexchange or it would be more suitable on stackoverflow. Let me know if needed. I'm wetting my feet in PHP, and I've put together a very simple program that (using JavaScript) receives as user input a .txt file, sanitizes it to remove all punctuation, th...
Can the same public key be used with RSA, Elliptic Curve, or other asymmetric encryptions algorithms? If not, how is a public key bound to a X.509 Certificate? Presumably, you'd have to know the algorithmic choice before determine a public key, and the choice of algorithms is only settled during the handshake.
The first two or three times I ran it, John the Ripper successfully cracked a password file with a single hashed password. Since then, however, I've only been getting this result (with the same password file and JtR version): 0 password hashes cracked, 1 left I tried removing the john.pot file, but that had no effec...
It took only one DLL, the SolarWinds.Orion.Core.BusinessLayer.dll, to bring so many companies to the knees. To be more precise, just a couple lines of code in the single DLL. In today's cloud-native application development, a single microservice (e.g., spring boot jar) can easily be dependent on more than 100 libraries...
Frontend communicates to backend. I am a developer of frontend and backend. I want to protect my app (prohibit end user from using my app without paying). The only thing I have in mind is to have some middle point, some my server. Frontend send some encoded request to my server, there request is being transformed in a ...
Perhaps the answer is no, and perhaps this is a dumb question. However I am trying to understand the underlying principles better. My understanding of certificate signing process. I generate a key pair. I create a CSR. [CSR is essentially the public key + DN information signed using the corresponding private key to pr...