instruction stringlengths 24 29.9k |
|---|
I'm trying to exploit a basic C program (below) which I've written:
#include <stdio.h>
#include <string.h>
void main()
{
char ch[10];
scanf("%s", ch);
if(strcmp("1235", ch))
printf("\nAccess Denied\n");
else
printf("\nAccess Approved\n");
}
It will ask you to input a string (as a password) and... |
I work at a company that provides a SaaS program for other organizations, and each subscribed organization receives their own subdomain of their choosing - generally they choose the organization name. We recently discovered that there are tools that can use brute force DNS requests to enumerate the subdomains for a giv... |
Does the definition of phishing also include tricking the victim into executing malware, such as ransomware, that's not used to retrieve the victim's information?
As I see it, Wikipedia's definition of phishing does not include ransomware:
Phishing is the fraudulent attempt to obtain sensitive information or data, suc... |
There is a small piece of code that is making request to Web server through socket. i am able to see that its a TCP over no SSL through wireshark.
My question is, Is it technically possible to see contents of TCP packets? All communication that is sent from mobile is through TCP (primarily by a C code)
Note: This is no... |
We need to create an API in Azure API Management and allow only known, registered applications to call it. We can require authentication, which restricts access to only people in our AAD, but how can we ensure that only certain applications can call the API? I know (a little) about clientIds and secrets, but those ar... |
Is Bash more commonly used in security work than PowerShell? If so, why? (Now that Powershell can be used on Linux)
I tried to Google around for an answer on this, and the only questions we seem to have here are quite different, e.g.:
What should I learn for Cyber security
https://stackoverflow.com/questions/573623/is-... |
My web application is a long sequence of games, which submit progress results back to the server via a web API. These progress messages are how we know how many points the user has earned. The points are used to show rankings and status and that kind of thing.
By checking stats, we just discovered that a registered use... |
Not sure if this is the right spot to post this, but I have not been able to find how to enable 2FA (such as authy, MS/google authenticator, yubikey etc...) on stack exchange using email authentication. I am aware that I could use SSO through Google or Facebook but would much rather not due to privacy concerns that rel... |
I was recently reading through the nmap port scanning documentation and it points out that to perform a SYN scan (-sS) you require root privileges because an unprivileged user cannot send raw packets. Why does the OS not allow an unprivileged user to send a raw packet?
|
I'd like to test some code that should be compatible with both RFC5816 (https://www.ietf.org/rfc/rfc5816.txt) as well as RFC3161 tokens. The problem is that all timestamping services that I found so far which serve RFC5816 tokens (which use id-smime-aa-signingCertificateV2 rather than id-smime-aa-signingCertificate to ... |
In recent iOS devices you can temporarily disable unlocking via biometrics by holding the power button and either volume button for a couple seconds. I’m trying to find out if this does anything to help prevent AFU mode (after first unlock) vulnerabilities such as GrayKey. Does disabling biometrics evict encryption key... |
Imagine that I'm building a server that provides useful APIs for web chat development. I want it to be accessible only to registered developer accounts. A developer registers and builds a chat that uses my API. The chat is anonymous, so chat users are not expected to register anywhere. However the chat uses my API that... |
Before I proceed to testing this myself I wanted some clarity. I have a basic understanding of SSH and Cryptography but not completely sure about this plan. I want to implement a key rotation policy by enforcing that end user keys are only valid for 90 days, but I don't want to rotate my CA. Let's see this scenario (ap... |
I found a clickjacking issue in a site and the site security team said me that i would require unusual user interaction. So I wrote a code above the iframe but I was not successful in achieving it.
The site had two sensitive buttons which must be clicked to sent a invite request. And so i've added two buttons and also ... |
Years ago (~2010-2019) the Extended Validation (EV) Certificates made a lot of sense.
The user in their browser would see a clear difference between
a "grey" (http/not secured) website
a "green lock" (https normal certificate) website
and a "green lock with name of the company owning the website" (https ev certificate... |
SIM swap occurs where the scammer uses phished information about you to request a SIM card replacement from your cell phone carrier, by tricking them into believing that it is you who is making the request for a SIM card replacement by passing their security questions on the phone based on the biometric data they phish... |
Any PaaS/shared hosting company which I came across offers its customers to protect their websites from DDoS via security-oriented CDNs such as CloudFlare or CloudFront which act as a proxy distributing the content serving via various machines (instead just one machine - the one which hosts the website).
Is the idea of... |
This morning, I found out that I received a call from "skype-resolver" in the middle of the night on my phone. When I went to Skype, the call was nowhere to be found, presumably because the account had already been deleted. iOS however, kept a record of the call listing the name as "Group%20Maker" and username "8:guest... |
When converting a password-protected PEM/PKCS1-encoded private key to DER format one is not able to encrypt the key, OpenSSL automagically asks for the password and writes the plain-text key in the output file.
However, I understand that PKCS8-encoding does support encryption when converted to DER format, my problem is... |
I am trying to access my Gmail account. I have the correct password. When I click on login it asks for a confirmation code sent to my recovery email. Hopefully, the recovery email does not have this strange procedure and I could log in to my recovery email and entered the confirmation code sent to my recovery email. Wh... |
I would like to know how to securely setup HTTPS between two applications running on the same workstation in a production environment please:
A local server application (C#)
A web frontend which accesses the local server through a browser (packaged as an app using Electron and talking to the local server over HTTPS)
... |
This question is related to another inquiry on this site: Can Android phone running without SIM card be tracked (localized) by police?
Accepted answer claims that:
Without a SIM, your cell phone will not normally transmit data to
local base stations, but if you make an emergency call, it will
identify itself with the... |
Are there any ways to serve a webpage locally without revealing IP to end users?
|
So x9.95 seems to be a trusted timestamping scheme built on top of RFC3161.
I couldn‘t find a good definition though how it differes or what additional constraints it imposes.
Can someone list the (technical) constraints that a x9.95 system fulfills which are not generally fulfilled by a system that adheres to RFC3161?... |
Among other things, I use clamscan on my web servers website directories to help find compromised websites. Unfortunately the time to do this scan is becoming onerous.
Are there any good reasons not to ignore the scanning of .jpg and .png files to reduce the load on the scanner?
|
The premise of this question boils down to frictionless access to data. I have User A whose records I have kept on a database.
I want to send them a link to their records such that they can access their records without having to sign into any kind of portal or Auth system.
This is my current approach:
Endpoint --> http... |
Can I use hashcat with the only CPU and not a GPU? I found hashcat-legacy but it isn't stable as much as hashcat current.
|
I'm not sure what's the option to store and manage session IDs for long lived sessions (3-6 months each).
Given that the session ID is generated with enough entropy and that the session ID is then given to the user via SSL and a Secure, HttpOnly cookie, these are the options I came up with for storing the session ID:
... |
In order to mitigate the potential exposure to ripple20 zero-day, I must identify the device/s that have the Trek TCP/IP stack installed.
Can I do this with software like LanSweeper? Or must I check every single device router etc.?
|
I have recently migrated an internal application (API + SPA) security from Windows Authentication (done by IIS) to Azure A/D authentication using the implicit flow.
Now, every user must enter an e-mail address, password and an authentication code (typically generated by a mobile app).
The test environments also expose ... |
I am using putty and private key to access my development server. I used Nmap to see which ports are visible to the public, and in fact the 22 is open.
Is it possible to hide open port from the public?
If not, how secure is the SSH connection with a private key?
I did the following:
Placed a private key on the USB key... |
Most what I read on CT logs is about browsers checking the logs for websites.
But what about normal applications or updates for operating systems (like apt-get over https, windows/osx updates ...)
Is checking CT logs mandatory for those too?
Is it up to the program developer to implement this?
|
I stumbled upon this weird product in a webstore primarily selling Cannabis-related products (not the actual herbs): https://smoketower.com/nyheter/Anonym-3310-mobiltelefon
I've manually translated the Swedish product description for you into English:
Small cellphone for the more sensitive calls. Keep anonymous by set... |
I'm aware of this post that GDPR apparently does not enforce a specific standard to secure sensible data. Based on this post e.g., there is no requirement to encrypt or hash login data in a local database, either.
GDPR however provides the user of a service the right to know what data are stored in the service's data ... |
How to use msfvenom elf approach for metasploitable 2?
I am reading a book that teaches how to make a msfvenom executable for Windows. But I am learning on metasploitable 2. I really did not want to skip this section without understanding this. So I got 2 other books but they both also only teach Windows approach to th... |
As far as I understand it, a simple approach for a malware DLL injection would require 2 DLLs. The first for the DLL side loading, while the malicious DLL remains encrypted. And then this 'loader' would decrypt the DLL and inject the payload into a victims valid process using VirtualAllocEx, LoadLibrary, CreateRemoteTh... |
Suppose a website is logging out the user after some time to re-create the session and start using the website. As the security tester, how will you handle this situation? Isn't it frustrating? Yes! looking from a security perspective this is a nice mechanism, but if you are a penetration tester, how will you handle th... |
Running Windows 10 LTSC. Forwarded 445 port on the router to Windows SMB.
Assuming that:
My machine has no viruses in it (fresh Windows installation)
It has been updated to the latest OS release
I am using a secure, hard to brute force, password
How secure is my setup?
Provided that my computer has some sensitive dat... |
A former employer of mine has reached out to me to assist them with PCI certification (I guess I'll be getting a 1099-NEC from them next year as a result). Here's the point I'm at in the questionnaire:
File-integrity monitoring tools are deployed within the cardholder data environment to detect unauthorized modificati... |
I want to verify whether mysql remote connection is using tls/ssl connection for security purposes.
I ran status command to check initially:
mysql> status
--------------
mysql Ver 8.0.19 for osx10.15 on x86_64 (Homebrew)
Connection id: 47
Current database:
Current user: user@127.219.252.250
SSL: ... |
When you are completely inside the VM, can you have your host machine in which the VM resides be encrypted while running the VM?
Say for example:
Ubuntu(host machine): -> runs VM(Arch)
Can Ubuntu be completely encrypted from the Arch VM?
I am sure it must be possible, right?
|
My understanding of Post-Redirect-Get so far is not very deep. I've used it a couple of times now. What I notice, though, is that when I use it, I am sending a rather private token of some sort to the last page in the GET request. It is a token that allows the server to respond with information about the just-complet... |
I'm thinking of getting a Librem laptop with Pureboot which uses Heads (with the Librem key) for tamper detection. But I've heard rumours that there are weaknesses or vulnerabilities so I wanted to see if anyone here knows about it. For me, I'm thinking of dual booting Qubes and Manjaro. I want to use Heads to verify n... |
We have a set of people who need to do a proof of concept for 9 weeks. To do that, they need to VPN to a well known IT company environment.
However, they want to be able to install the IT company's VPN client (which is simply Cisco anyconnect) onto their corporate VDI to do it.
It works, though we had to whitelist the ... |
I have installed several mod apps of Netflix, amazon prime, games apk from google in android v10. Can spyware be installed through these apk. these apps have not taken much permissions from me they only take permission of storage. I have also shifted to android 11 and and also resetted my phone twice. Do any kind of sp... |
I have a system where I'm using X.509 certificates to authenticate the client to the server. The certificate is sent to an HSM to be signed. When it is returned it is used as part of a TLS connection. Once the connection is established, I need to authorize the user i.e. what actions they are permitted to perform agains... |
I've heard a lot about hackers gaining access to the network by trying default credentials on the router. Let's say an attacker somehow got the router IP of a victim. How would they even know what sort of router it is? Is it even possible to login into your router if you're not connecting to it from inside your network... |
To prevent fraud, we require the users to link their account to a mobile phone number. We send a code by SMS.
Fraudsters use hacked social networks to convince "friends" to send them the code they will receive.
Even if the message clearly say not to give this message to an other person, they still do:
Verification code... |
A website hosts private/personal information at a very long and unpredictable URI, yet access to this URI is completely unauthenticated. Are there any major security issues with this?
I can think of some straight away:
Search engines might index the information if the link ever appears anywhere on the web
It would be ... |
I have had recently gone through the horror of transferring WhatsApp conversations when changing phones (android for iPhone). Actually, the thing that it is close to impossible for everyday folk is a good thing for its security reputation - I suppose.
I suspect that the transfer, that I did with the help of a 3rd party... |
I have been recently working on a little DLL injection program in Go.
While the program works and I am able to successfully inject into a remote process, Windows permissions system still seems to elude me.
Namely, I cannot quite understand the purpose of adding SeDebugPrivilege to my current process token.
In theory, I... |
Often you get a call from a non-business number and your phone's filter app doesn't know who it might be. You might Google it, and find a thousand sites promising to tell you its owner, but they only have placeholders.
This is kind of surprising to me. With the amount of data leaking and unconscionable data sharing wit... |
I've just deployed a barebones Apache server on Digital Ocean, only hosting static files. No PHP et al.
I'm not too bothered to see random exploit attempts, but 99% of the requests are of this similar format and I'd like to know what they are trying to do.
The source IP is always changing, but the GET resource request ... |
I have installed some mod apks on my phone few days ago and i am feared that if they contain any type of spyware then can they access photos of my phone?
|
My friend recently told me that:
Google doesn't have our passwords saved on their database. Instead they put our password when typed on browser, through an algorithm and it'll produce a unique identifier. This identifier goes to database. And it is unable to reverse engineer/decode the password from the identifier.
I... |
I use a device that has access to things like incognito mode. However, it warns me that the device administrator can see what I do even when in incognito. I know that this is true when connected to an administrated WiFi, but, when I’m home and on a private WiFi, can the administrator still see what I do? (No forced VPN... |
I'm given 2 prime numbers, g and n, as well 2 public keys, ga mod n and gb mod n, as part of a leaked Diffie hellman key exchange. I need to derive the shared key gab mod n using the given information. I understand that I have to find a and b which are the private keys first but have no idea how to solve it since it st... |
What approaches are there for cracking user passwords for website/e-mail accounts? can only think of three strategies, but what else?
Algorithmically: Combinatorially attempting different sequences of alpha-numeric-special characters
Internally: Client database information is leaked, but actually, companies rarely sto... |
I see this code in a bug bounty program
The code:
<!DOCTYPE html>
<html>
...
</html>
<script>
if(window.location.pathname === '/' || window.location.pathname.includes('.html')){
window.location='/not_here';
}
else {
console.log("how can i be here?")
}
</script>
The page has no "index.php"
How can I get... |
Let's say Alice sends a message to Bob in their P2P chat app asking him to complete some work. Bob is lazy, so he deletes the message off his machine, does not complete the work, and just claims that he never received the message in the first place. Their boss needs to fire someone, but is unsure who is telling the tru... |
I've read a lot of documentations about encryption in the last weeks and I think I now have a good idea of what system I will use for my project (standard hybrid cryptosystem using RSA/AES). However, there is still an unanswered question and I really need advice on this one.
The project have to manage sensitive health ... |
I have an all-core MediaWiki website; no addons, no forms besides a login form (not even a contact us form); the MediaWiki installation is continuously upgraded and everything is quite minimal and secured.
Say my domain is example.com and I bought an email address such as info@example.com from my domain registrar and I... |
I'm trying to breach a dummy MariaDB database which is vulnerable to SQLI and is storing sensitive data about its users and their passwords. I've collected all the data I could collect, but now how am I supposed to connect to this database and tamper with it? I downloaded MySQL (MariaDB) and I was trying to connect to ... |
Some people want to know what is the "best antivirus", I am a little disappointed and it's difficult for me to answer this question. I think Windows Defender is good but I can't give arguments. How can I answer this?
|
Their 2FA to log in to their web interface requires two things:
something you know (PIN);
something you have (OTP, generated by app for example).
After that, you need to log in by:
input email address;
input PIN, in password field;
input generated OTP right after PIN, in password field.
I have never seen such a 2FA... |
Can an attacker intercept my mobile traffic exploiting the ss7 vulnerability even if encrypted?
|
There is an existing user database that has the following columns:
userId (v4 uuid)
created timestamp
bcrypt password hash
email
I must add a password reset functionality and I cannot add any new column to the table. So my plan is to implement the following flow:
user triggers password reset
the server emails a JWT ... |
I am using a socks4 public proxy for more speed/bandwidth. I am currently using it for downloading files. Now I want to use it for social media or daily day usage. I know that they will get all my traffic. I use DNS over HTTPS in Firefox. So, I think that they won't be able to redirect a phishing site or something like... |
Plenty of "passwords in memory" and "keepass" related (old) topics in here, but most of them are about how to harden key protection ; plus it seems protection mechanisms by Keepass have evolved for the last couple of years.
In 2021, as KeePass is running and unlocked, I understand the master key is stored in the RAM (o... |
When I'm using the authorization code flow with PKCE do I still need state and nonce?
For state (that prevents login-csrf), if an attacker sends me a malicious Authorization Response, the client may accept the response, but in the end no token can be retrieved, as the code_verifier would not match the one for the code ... |
I got questioned about the security of using public computers and sending data with them. I am using HTTPS which is based on SSL, while SSL uses PKI which is hard to hack. Thus, there is nothing to worry about while using a public computer. Is it right? (I don't take into account cases with computer-based viruses like ... |
I really need some help. I have an annoying housemate who seems to have downloaded some app that blocks my wifi with a flick of a switch.
Can anyone tell me how I can bypass this, as it's really getting annoying him keep blocking my wifi just as easy as that.
|
Reading from here: https://cheatsheetseries.owasp.org/cheatsheets/Forgot_Password_Cheat_Sheet.html
It mentioned that password reset link should be single use and expire after appropriate period. I don't understand why should it be single use?
Also found this: https://www.troyhunt.com/everything-you-ever-wanted-to-know/... |
I am developing a Multi-tenant application to allow tenants to open an e-commerce shop (similar to Shopify). We are hosted on AWS.
At this point there will be under 20,000 transactions in the first year but I am a bit confused regarding PCI Compliance in this case.
I (and my tenants) will use a payment provider that al... |
First off: I know that encrypt-then-authenticate is better, however I want to understand the following for authenticate-then-encrypt. The underlying cipher is AES-CTR or AES-CBC for this consideration.
When using encrypt-then-authenticate, the authenticity of the of the cipher text can be proven, because both parties h... |
I recently came across following article
https://www.bleepingcomputer.com/news/security/researcher-hacks-over-35-tech-firms-in-novel-supply-chain-attack/
it describe about an exploit which exploit design flaws of different package managers ex: package manager preferring higher version numbers, public packages over priv... |
I am a student in networking, we learn cybersecurity, but we don't learn buffer overflow vulnerabilities in depth, I understand how it works, but I don't understand how an hacker can detect this vulnerability. Is that very difficult or can be done easily with some techniques ?
|
While monitoring SIEM alerts, I saw that there was more than 200 failed logon for a user to several hosts in the domain. Obviously, it was triggered as a brute-force attempt.
Assuming it was not an attack. What are the non-malicious root causes that could trigger such alerts? Considering that a user will not try 200 wr... |
There is a lot of malware that can detect whether it is running inside a VM or sandboxed environment and if such environment is detected it can conceal it self and not execute. So why not make everything a VM? Now all systems are safe!
I know not all malware does this but considering that there are many cloud services ... |
I am struggling to implement JWT refresh tokens with the Double Submit Cookies method.
My current set up for a browser based webapp without refresh tokens looks like this:
Upon successful login, API server returns JWT with expiry in a httponly cookie
Client server intercepts this and creates httponly cookie copying t... |
I am running Zap version 2.10.0 and was hoping to gain more control of logins with users.authenticate_as_user, link
It is, however, unavailable as when I list attributes of a users object in python I only get (besides dunder methods):
'get_authentication_credentials', 'get_authentication_credentials_config_params', 'ge... |
Excuse me if this is obvious, but while encrypting one of my disks, I got bored and read the text on the window.
And the question came to me, how the heck can I move a mouse in a way that a computer couldn't reproduce?
To be more specific, what information does me moving my mouse provide that VeraCrypt couldn't make i... |
I'm learning about X509 certs used in client-cert authentication to https endpoints. If I have an OCSP checker (Python script that creates, submits, decodes OCSP responses), do I need to check the not-valid-after date on a client cert?
Example:
Client makes request to my https endpoint
I check the client's certificate... |
If a template is provided to Perl's Template Toolkit, can you ensure that the code generation inside Template Toolkit is sufficiently subsetted to be safe?
|
the purpose of adding trusted timestamps to signatures is so that they can be considered valid long beyond the validity of the signing certificate.
However, this is not so easy, since TSA's signing certificate has an expiration date too or may be revoked and already issued timestamps may become invalid.
My question thu... |
I'm wondering if the following system would be a secure way to store frequently duplicated files.
Hash the source file, deterministically derive a key from it.
The source file(s) are likely to be high entropy (PDFs, archives of multiple files etc)
Use that key to encrypt the source file.
Upload that encrypted file ... |
I was thinking of the following scenario :
a network is behind a router (performing NAT) and firewall
this firewall denies all unsollicited incoming packet
a user on a computer of the network opens a browser, types in “http://www.company1.com”. He therefore opens a port to establish a communication with a socket on co... |
I am aware that MS Word documents can be potentially dangerous due to the executable macros contained within them.
But for a particular document, I have opened the macros and can see there are none. Can I be sure, therefore, that this document is not malicious?
|
I wonder if the chat content's are encrypted in local storage on mobile devices (iOS, Android).
I hardly found any reliable information about this topic.
My thought is about somebody stealing my device and plugging it's hard drive into an external device.
This is not about how to decrypt the storage. It's just about if... |
I'm working on app that uses MySQL database on XAMPP Control Panel on Windows.
I am concerned about security part.
I received advice about connecting to MySQL through VPN so it won't be accessible so easily.
As far as I understand it, VPN helps with blocking unwanted traffic to database.
I was thinking about whitelisti... |
If the following data is known:
URL of web site X,
Exact time and dates when the visit to web site X occurred,
Anonymized IP address of web site visitors (without the last digit, e.g. 125.251.101.x),
can ISP still determine/identify users who used its network to visit the web site X in given dates and times only base... |
I know how Buffer Overflows work but in order to do them do you have to be on the same WIFI as your victim. You need to send a packet to a specific device on a specific port. Therefore, unless port forwarding was enabled on that specific port for that specific device, how would you exploit a buffer overflow vulnerabili... |
I have added a root ca in my debian machine by using the following commands:
mkdir /usr/local/share/ca-certificates/custom/
mv myserver.crt /usr/local/share/ca-certificates/custom/
update-ca-certificates
This works as intended, the cacert file in /etc/ssl/certs/java/cacerts (linked from the java installation folder) ... |
I'm learning about X509 certs used in client-cert authentication to https endpoints. I have a nice Python script that checks many facets of the client-cert.
Is there any validation that can be performed from a reverse DNS lookup on the client IP?
Example:
Client makes request to my https endpoint
I grab the IP address... |
When you plug a smartphone into a USB port on a Windows 7-10 computer, often a small message box pops up on the Windows device indicating that drivers are being installed. This happens automatically without any user intervention.
As opposed to a similar question I apparently asked over 4 years ago (oh dear), for this ... |
I'm running a docker container in Kubernetes cluster running in aws, I exposed the container through LoadBalancer service and limited access to it just to my ip address using aws security groups, but I still getting GET/POST requests that seems brute forcing the endpoints of the application.
Illustration:
My question ... |
If I have a file that I encrypted with PGP and I'd like to allow other people to view the file after I performed the original encryption can I simply add them to the PGP payload? Since PGP creates a symmetric encryption key that is used to encrypt the file's content, and encrypts that symmetric key with each user's pu... |
Let's say I had a ca bundle with many certificates in it on my server. I accidentally gave this to a team of programmers I have hired. Could they theoretically use this to somehow ssh into my server or mysql db?
|
I know that the access token can be of any format(it is up to the authorization server), but I noticed that most of the times the access token is not a JWT whereas the id token is a JWT. Why is that so? If it is to check the authenticity of id token over non-ssl connections, wouldn't the same be needed on the access to... |
I have a zip file (.zip created by 7zip v15.10) that I remember the password to (~12 characters long), but it seems I've typed the password wrong while zipping it and now it doesn't open.
What are the best tools to recover the password based on the permutations of what the password should have been?
Some paid zip crack... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.