instruction stringlengths 24 29.9k |
|---|
We are in the process of switching from Hamachi to Meraki VPN by Cisco. Hamachi was managed internally, but this new VPN solution is managed by an external party and they have set it up as L2TP/IPsec with a pre-shared key and authentication. They insist on keeping the pre-shared key private, which means they have to se... |
I'm new to computer security, there's one question I got confused. The book "Security in Computing" describe that "To protect the master password, the client uses a form of PBKDF2, salting the master password with random data and hashing it by using a large number (5001 by default) of SHA-256 rounds." for user authenti... |
When we connect to a VPN server, all data that we send and receive are in encrypted form. But when data is sent from the VPN server to the destination, is the data encrypted?
If not then any hacker can sniff the packet and see the details.
Example: connecting to HTTP website using VPN.
So are we compromising privacy us... |
Confidentiality is the property of a message whereby no one but the person who knows a secret (let's calle it K) can read the message.
Hashes do not provide confidentiality (data is destroyed, you can't recover it)
Following these definitions, is it OK to hash sensitive data (eg: passwords) and store it in a database... |
I am trying to harden RHEL with CIS benchmark. One of the items states the following:
Ensure permissions on all logfiles are configured
Description: Log files stored in /var/log/ contain logged information
from many services on the system, or on log hosts others as well.
Rationale: It is important to ensure that log f... |
My understanding is that, threat modelling is used at the design stage to identify the possible threats, prioritize them and help in identifying security requirements/security controls. Vulnerability assessment is done during development and in maintenance also, where we scan the source code for vulnerabilities, priori... |
Reflective DLL Injection is one of the most interesting and best techniques to run custom code in memory.
I've been learning about it a lot, I've learned how to pass in inputs, But I can't figure out how to read in the output? I'm using C++.
The metasploit framework is able to get the output of the reflective dll,
http... |
I got sent an email from someone in response to an over 2 year old exchange, and the contents of it look like spam to me.
Checking the headers the following looks normal:
Return-Path
Received & Received-SPF:
Received: from gateway34.websitewelcome.com (gateway34.websitewelcome.com. [192.185.150.114])
by mx.google.c... |
I've read online that SYN flooding is when "the attacker sends repeated SYN packets to every port on the targeted server." However, HTTPS only runs on port 443. Therefore, why is it productive for an attacker to target "every port" if only port 443 is responsible for web traffic? Why does a web server care what happens... |
I'm looking for an easy way to securely wipe the SSD of my Ubuntu machine. As I'm using a fairly new Dell XPS 13 and am quite a noob with Ubuntu I don't want to use any fancy commands, that might brick my machine.
This is why I thought I could just re-install Ubuntu, this time with encryption, fill up the internal SSD,... |
I am trying to do something like
pp64 --pw-min=10 words.txt | hashcat -a 0 **--keyspace** -r myRule.txt
but this syntax is incorrect. Is there a way to get the keyspace for this combined attack?
|
Since Solarwinds Hack and Hafnium attack involved some degree of unauthorized code modification (orion DLL, creation of web shell), is it possible to use Artificial Intelligence (AI) built into the very application (Solarwinds, Exchange Server) itself to detect and report any unauthorized code modification and unnatura... |
I'm not aware of any frameworks/tools to achieve what we're trying to do, but posting here to hear experts opinions and comments on how this is done at large organizations and recommended automation approaches.
We have automation in place to identify, renew, and track SSL/TLS certificates expirations, but we're unable ... |
Since I can modify pathname, search and hash value could I leverages this in some way?
var URL = window.location.hostname+window.location.pathname + window.location.search + window.location.hash;
var sURL = "https://" + URL ;
window.location = sURL ;
|
I read this article, but I did not understand how and when the client's certificate is actually used to do anything.
As far as I understand, "normal" TLS works like this:
Some unencrypted handshake shenanigans
Server sends their certificate, basically their trusted public key
Client encrypts a symmetric key with the s... |
I am managing a WordPress website.
I have installed the plugin "Limit Login Attempts Reloaded".
This plugin sent me an email saying that A.B.C.D has tried to login with the non-existent username "admin" 9 times and has been blocked.
Googling the IP address, it has been reported as being abusive (it tried to login to ot... |
I searched my email addresses in https://haveibeenpwned.com/.
One of my e-mail addresses results as having been pwned, and is present in a data breach, in particular the Apollo data breach:
Apollo: In July 2018, the sales engagement startup Apollo left a
database containing billions of data points publicly exposed wit... |
I'm testing a web app (for which I have permissions) and I found a stored XSS vulnerability.
It is a little bit tricky to exploit because the input:
is being capitalized
it has a length constraint of 61 characters (every char over the 61th is being replaced with a .)
If I just insert for example <input oncut=alert(1)... |
I was testing an android application using Burp suite. When I opened the android application, an app "Outgoing Traffic" log was added in Burp suite Site map. The API request is:
PUT /api/channels/<channel-id> HTTP/1.1
Content-Type: application/json
Accept: application/vnd.urbanairship+json; version=3;
User-Agent: com.t... |
My agency (which isn't a high security-risk, top-secret place) has an almost zero tolerance rule for Zoom and I am curious why. We are told to use WebEx instead but I fail to see why WebEx is more secure than Zoom. I don't think it's merely an E2E encryption issue because we are allowed to use the web-based version o... |
I would like to know how I can know which is the safest compilation line, that is:
Having several compilation lines in, for example, GCC, how do I know which one is more secure? Hardening would be a good solution? What do you recommend?
Does the compilation optimizations flags affect security?
|
We host exchange on premise (exchange 2013). We believe following MS's guides and guidelines that we were compromised regarding the exchange zero days hack. We did find some .aspx files that did not appear to be from us in our inetpub directory. From the article listed we followed this to find these aspx files:
To ... |
Since application is not responding with allow credentials header, an attacker can't craft cross domain request with cookies, but I was wondering if allow origin * alone (Without credentials being true) can be exploited?
I know allow origin can't be * if allow credentials header is true, what am asking is that is this ... |
Sorry for the naive question.
I wonder how DigitalOcean Spaces (S3 compatible) fits personal backups.
I found a lot of information about security of Amazon S3 and its security is undoubted, however, nothing about DigitalOcean.
On DigitalOcean Spaces, there are only three options: File Listing, CDN, CORS all are Disable... |
I recently downloaded a very popular open-source application. Usually, I compile open-source applications myself after reading the source code. But my compiler box was busy with many tasks, so I decided to download the pre-compiled executable and just run it on a temporary system. Although that system gets reformatt... |
I came across this practice, from a big company handling personal customer data, of not allowing developers/maintainers to look straight at the application logs (e.g. good old tail | grep) by connecting to the application servers through SSH in the production environment. The logs do not contain any personal data.
Deve... |
How can I check before I connect that the WPA2 ssid I am connecting to is the correct one when I'm in an area with spoofed ssid's?
How can I evade an evil twin without trying to connect with a fake password? I would prefer to only connect to safe/trusted ssids.
Here is an image illustrating what I am asking about. Whil... |
I am writing a novel and the main character sent anonymous emails using Outlook and a VPN on an iPhone to disclose information about the mafia. Now, the police are investigating it. How can he avoid getting attributed to the emails? Is there anything he can do?
The police sent a request to Microsoft. Everything is taki... |
is it possibile to bypass some check like this:
$amount = (int)$_REQUEST['amount'];
if (!($amount >= 10)) {
// authorize
}
by sending a NaN value to amount param?
like: https://www.site.com/?amount?<NaN>
and if it is, how can I pass this value?
Because as Wikipedia show:
Theoretically, this should work but I can't... |
I have a TLD, and have set it up to forward any email sent to *@domain.com to myname@domain.com.
Over the last week, I've got a handful of emails from Intuit/TurboTax to random names on my domain, e.g. lucie@domain.com, and they seem legitimate (pass SPF/DKIM/DMARC).
The emails include full names, billing addresses, la... |
I have a .NET 5 application running on AWS which has these requests constantly attempting to run:
GET http://app-10-irules.com/
GET http://www.simpleexample.com/
GET http://ssl-app-default-backend.com/
Currently they all 404, but nothing in my code references them. I reduced the application down to the bare-bones ASP.N... |
Is it possible to extract the Wireshark keylog information directly from the TLSv1.3 handshake in a Java app? If so, how do I map the fields, or is additional material not shared in the handshake required?
From the following links, I believe I need
NSS Key Log Format for TLSv1.3 connections https://developer.mozilla.or... |
Does it make sense to try path traversal on the filename value during a file upload request? Should I encode special characters in the POST request?
For example
POST
[...]
----boundary
Content-Disposition: form-data; name="hello.pdf"; filename="..\..\..\..\license.rtf"
|
I found a vulnerability in a library of vendor A, I reported it, they fixed it and I received a CVE.
We noticed that some application (let's call it vendor B), contained the library of vendor A, we reported it, he updated the application with the fixed library and release it with a new version.
Should vendor B also ass... |
I have set up a self-signed CA in a development environment and have issued a server certificate to a test website.
The issue I'm having is that the certificate is being rejected by the browser with NET::ERR_CERT_INVALID
This only happens with Chrome or Opera in Linux (Opensuse Leap 15.2). I've tested the same site on ... |
We are working with commercial embedded devices, where we install our software. Then, they are deployed in different client sites. The embedded devices have an Ethernet port and a console port for debugging and recovery. They are connected to the Internet and we need to access them remotely using ssh.
By default, the d... |
This question has been asked before but a lot of time has passed since then.
The older question had an answer that the Eula said that Acronis can decrypt the data. I can no longer find that part.
Can you trust their encryption? By trust I mean that nobody can decrypt it (not even Acronis) as long as you have a very str... |
I'm currently testing an application, which connects to a MS-SQL database. Through Wireshark, I can see that the application uses TDS to connect to the database. Furthermore, I can see that both the queries and results are UTF-16 encoded and provided in plaintext.
However, I am unable to find the credentials used to au... |
Say I have a continuously upgraded and well maintained LAMP environment with a website which its CMS is all-core and continuously upgraded as well and I have created a simple backend HTML contact form which is CMS-agnostic (not a module of the site's CMS) so the overall environment is minimalist and very secured and th... |
When logging in to Facebook/Yahoo mail, I receive my 2FA codes from random numbers. Here are some examples (I have a Romanian phone number, hence the country codes):
+40 747 691 103
+40 727 347 814
+40 758 942 742
+40 759 158 056
and the list goes on. It's a different number every time.
Furthermore, the text in the me... |
My Google Account was hacked granting unauthorized access to YouTube and Google Drive. The third party immediately started posting inappropriate content on YT which prompted an email from Google after a couple of hours after which I changed my security settings and password. Aside from the password, my Google Account h... |
Is it possible to spoof the IP once a TCP handshake was performed successfully?
For example:
Perform the handshake
Use the session with the same IP which performed handshake but on
different machine and network then send a request e.g POST HTTP request
The response is delivered to the spoofed IP and processed by ser... |
I have an interactive program. Actually, the program can be reachable over SSH. In the .profile file, the program is launched immediately and with the interactive interface it is not possible to launch any Linux command. However, it is trivial to get a command interpreter with SSH. So, I am wondering what the best prac... |
I have a battle-tested black box crypto library which was developed by industry recognized experts. This box keeps your private key in a hardware backed, tamper proof storage. It only does one thing. Takes an 8 digit all ascii chars as input, encrypts it using RSA and returns the ciphertex. Extreme measures are taken t... |
There are hundreds of articles if we search "how to exploit AD Environment?" but if you read them, you will find that every article focuses on the context of the domain user Account.
Now I am here to ask what can be the attack ways of AD in the perspective of a domain computer account, or more specifically, suppose "Yo... |
According to Kaspersky
Encryption of your IP address: The primary job of a VPN is to hide
your IP address from your ISP and other third parties. This allows you
to send and receive information online without the risk of anyone but
you and the VPN provider seeing it.
So, how is it possible that ISP knows where to retu... |
I'd be interested in hearing some feedback on this
We have an integration tool (i.e Jenkins) that's used to run and deploy pipelines. Elsewhere there are other tools like atlassian etc.
We're going to implement SSO with MFA but I have a question:
When a person is going to run a deployment with a target of a production ... |
I plan to use the TPM to generate CSR's backed by a private key stored on the TPM. The CSR's will then be signed by an external HSM.
Since a certificate is tied to a particular private key, how do you support multiple users on the same laptop on the assumption that each user has a different certificate?
For example, ca... |
I know what mandatory access control (MAC) is, but I don't see how it helps. Often it seems to be said that if you have something like SELinux or AppArmor enabled you are magically more secure. And with this, the permissions of something is mandatory and are enforced so that even the owner cannot change them.
However, ... |
i try to find http smuggling in big bug bouny program
if i send this to the server
POST /path HTTP/1.1
Host: subdomain.domain.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Firefox/78.0
Connection: Keep-Alive
Content-Length: 6
Transfer-Encoding: chunked
0
j
i get
HTTP/1.1 302 Found
Cache-Contr... |
https://threatpost.com/high-risk-vlc-media-player-bugs/147503/ shows attacks with carefully crafted video files.
Can I protect my local users against this?
I imagine the attack will abuse the file format, so my hope is that, I could ask my users to download the file into a checking dir, then run some sort of checker or... |
I got an email the other day telling me that when I visited a website, someone installed malware in the website with which he was able to use my browser as an RDP. Kinda paranoid right now.
|
I use GPG symmetric, to encrypt text file.
Is it possible to use GPG symmetric, to encrypt a text file, and at the same time, add additional setting to the encrypted file, to give us 2 conditions:
correct password will decrypt it.
incorrect password will give fake decryption result, instead of indicator "decryption f... |
We are owing a domain with wildcard certificate (*.mycompany.com). Now we have an application running as an agent on the customer machine. The browser is communicating with the agent by sending websocket requests. Now, we are moving to WebSocket Secure (WSS). Since browser communicates with the agent by sending wss req... |
We are told to erase (overwrite) sensitive files, not only simply "delete" it (i.e. only remove the information where it exists). For the moment being, I'd like to focus on the following and ignore other aspects (e.g. wear leveling on SSD) that may result in data leaks .
Taking this a step farther: does secure erase / ... |
So I made this website on python with Flask. I want to host this website on a rasberry pi on my own home network which everybody in my family uses.
Should I?
Is it safe?
|
I've finished migrating data from several drives on to one newer disk. The older drives were a mix of old mechanical drives, thumb (flash) drives, and SSDs.
Now I will dispose of the worthless drives and sell the rest. In order to sell the drives, I should be completely sure that the data cannot be recovered (e.g. by a... |
I am reading a news article (in italian) in which the police snooped on the Dean of a university by a trojan horse that the police had installed on his mobile phone.
In particular, the trojan horse transmitted face-to-face conversations (I think captured by the microphone of the mobile phone) to the police.
In another ... |
I am auditing an AWS account and I found a public RDS instance, that is with public DNS, no Security Group IP connection filtering and in a public Subnet
However, the instance has a relatively strong password (12 characters, symbols, numbers, and lower case and capital letters)
Is there public record of a database like... |
When implementing password hashing using PBKDF2 for authenticating access to a REST api,when we say that PBKDF2 is slow does it mean that it's going to take a lot of time to hash the password and validate it, therefore the service not being responsive enough for the end user?
Or is it the case that is PBKDF2 slow only ... |
I bought a new router and I'm thinking to make my network a bit smarter from the security aspect.
My question is now: How can I make sure that an attacker cannot get into my "secure" network with properly insecure IoT devices (like SmartTVs, IP-Cameras, printers, smart speaker or zigbee gateways).
For example I have a ... |
I clicked on "It's like you" virus in Facebook Messenger. Then I archived the original link with archive.ph (archive.today), and during the process the site showed me this: https://pastebin.com/e91wZmqP (WARNING! Do not click on any of the links in the paste; they might contain harmful code.)
The most suspicious js fil... |
I read in some docs, there are several version of GPG key extension available.
For ex: gpg, ascii, p12
I know .gpg extension is in binary, and Ascii is in text.
But I want to know their differences regarding its quality and security.
So please tell me their differences (GPG, Ascii, p12) ?
Which one is the most recommen... |
Let’s say I have a server with Port 22 opened to the internet , password authentication disabled, and root remote login disabled. Only Key Authentication is enabled. If the key is tightly secured, is there anything to be concerned about as far somebody being able to crack the key or anything like that. Apologies if the... |
I just logged into my FB account from a different location as usual and received a message that my account was locked down due to that attempt from an unknown location. This spiked my curiosity, and I'm wondering, if I was able to change my location to my home address using a VPN (not even sure you can be that specific... |
I'm trying to develop some tools to share with people made with a custom python installation.
I've copied the python installation folder into a .zip with the purpose to share with friends and others alike
And I've made a .cmd script that unzips the files on their computer.
Does the Python setup write any private inform... |
I'm curious how large cloud computing services that might secure encrypted data would update an encrypted file. For example, let's consider a user is using RSA to encrypt a large file, maybe gigabytes long, and stores it on a server. The user then makes a small change to the file. Encrypting this new update again and s... |
Can someone tell me why a 20-character key makes WPA Personal more secure? That really confuses me.
|
How much time will the Fugaku supercomputer take to generate a wordlist?
Length: 50
Combination: Alphabet(upper/lower) + numbers (0~9)
also, would wordlist generators make a significant time/performance difference?
|
I don't know if this is the right forum for this kind of question.
I was trying to intercept traffic from Twitter for Android app and for that I needed to bypass the SSL pin they implemented. Basically I was following this tutorial
and I got it to work.... sort of:
Spawned `com.twitter.android`. Resuming main thread! ... |
There are tons of exploits being created using the PDF file format for most PDF viewers out there every year. PDF files have lots of power and can utilize things such as JavaScript. This is really good but comes with the cost that there is a lot of attack surface. The company "owning" PDF is also very restrictive about... |
Starting yesterday, my honeypot has been getting a ton of git scans. I normally wouldn't think much of this, but a few weird things are happening:
All of the IP addresses come from Amazon AWS
They are all looking for the same two SHA-256 hashes
They don't appear on any blocklists for .git vulnerability scanning or sca... |
The password manager bitwarden requires the user to log in to their account on their web site to allow them to enable 2FA, import passwords and manage other account related details, as that functionality is not available on the desktop or mobile applications. Could a supposed attacker that has gained control of a self ... |
I was trying this, on a website where I was allowed to carry out testing by the site administrator. On failing to use two different headers (Site is beyond AWS and I am getting a 400), I tried the old way of using 2 different Content-Length headers.
Finally, I stick with one Content-Length header I added 1 to the leng... |
What am I doing wrong with using xbegin in the enclave?
First of all, I checked tsx outside enclave - it works (I tested _xbegin() from <immintrin.h>).
Then I tried to use different examples of xbegin realisations for !Windows! inside enclave. I also tried this https://software.intel.com/content/www/us/en/develop/docum... |
I am getting familiar with authentication (using passportjs) and using things like sessions, jet, etc.
My question is what is the best way to prevent someone from going on a computer and copying a sessionid/token/jwt/etc. and entering it into the website on their browser and getting unobstructed access into the user's ... |
When shodan crawls an IP, it takes a screenshot based on some technique(?)
Nevertheless, most of screenshots that shodan takes are from IP Cameras.
Is there any way to access the URLs the crawler found the image on?
E.g. Crawler found "rtsp://blargh.com/1/stream" and took a screenshot of that stream. Can I somehow acce... |
My son and I have a cybersecurity concern. Somebody somehow compromised his tablet, accessed his files, and emailed them to him from something like guerrilla mail but we cannot figure out how.
Our Malwarebytes shows no evidence of threats. His settings revoke all camera, storage, microphone, and any other personal perm... |
Considering:
A VERY motivated attacker,
A large entropy password, as in 256bits¹ hashed in bcrypt (with recommended cost factor of 12), and
Attacker knowledge of everything he might need (except the password): hash, salt, cost, etc [AFAIK those are included in the bcrypt hash]
Is it safe to assume that an exposed bcr... |
If I connect to a VPN, go to some websites, post something or browse something, is it possible for my OS (Windows 10) in this case to:
Store my IP before I connected to the VPN, say "old IP".
Get my new IP after I connect.
Send both to some servers which log all internet traffic so it could match me up thus destroying... |
I recently learned that there are plenty of services on the internet that offer/list free public proxies (freeproxylists.net, hidemyass.com, proxyscrape.com to name a few). Is this safe? Can't an attacker easily connect to multiple of these free proxies at once and essentially build a botnet?
|
The recommended way of ensuring that data on a hard disk cannot be recovered is to destroy it physically, for example using a hammer, drill or even thermite.
Question
When physical disk destruction is not an available option, what is the next best way of ensuring data cannot be recovered from a hard disk?
Note:
In the... |
I've been looking at OWASP Application Security Verification Standard 4.0.2 for a while now, and I'm trying to understand all the checkpoints in detail.
I am not sure what exactly the author of a particular point meant. Therefore, I have a request to you to explain item 1.1.1 from section V1.1 Secure Software Developme... |
Background
A fellow in my social circle is involved with a cybersecurity company that secured a patent. I want to learn more.
Simple Explanation
US Patent Office Listing
Patent analysis is a very tedious and expensive process. I don't expect anyone on a free tech support site like this one to read the complete patent (... |
There is an answer to this question to this link.
Is there a better way, a more automated way, instead of making the user go in the console and look for how to manage the authenticator?
What happens if after that he removes the authenticator?
Expected:
User tries to log in
Console asks for password change
Colsole as... |
I recently got Windows 10, and I am not overly thrilled at Microsoft having a copy of my password on their servers. I will also be forced to make a hotmail account, instead of just using a local account. I am forced to use Windows because of my job, so iOS and Linux are out of the question.
Is there a way of using Bitl... |
When I browse on my hosting account, I found the index.php of my website has some code embedded to it, in the beginning there was really long line containing erratic code. There was also two more suspicious files I never saw the content of, I will paste the link of each respected files.
Code embedded from index.php --... |
can someone please tell me under what circumstances can WPA be cracked? i'll appreciate it.
|
I'm bit confused about this security flaw. I'm in real need of help in this :smile:
My express code (not using any sessions, just cookie-parser)
app.get("/signin", (req, res) => {
if(!req.query.token) return res.status(403).json({status:403, message:"Authorization Required"});
let options = {maxAge: 1000 * 6048... |
We have multiple customer sites which provides login via mobile number OTP option (new & registered users). Recently, we come across an incident where a user received 100+ OTPs with in few minutes to login to 10+ different websites multiple times. Attempts made on few unfamiliar websites as well.
Which type of attack ... |
A few weeks ago, I was using VirusTotal to check a few files on my computer to see if they were viruses. But I do not remember if I had scanned a particular file. Is there is a way to check that? And if the file had sensitive information on it any recommendation on how to deal with that?
One of the ways that I was thin... |
I'm looking for some guidance and advice on data security best practices, specifically on how to best separate, store and secure personal identifiable information from other data. The background is that we need some data reported by users to run our ML models, so that data would need to be available on the backend. How... |
How is it possible to block reflected XSS on common web servers, such as IIS, Apache HTTP Server and Nginx?
The Content-Security-Policy: reflected-xss filter doesn't work on latest Chrome and X-XSS-Protection was removed from latest Chrome.
The question is specifically about these web servers settings, without any code... |
I have been working on testing whether same encrypted files are same without decrypting it. I have a test file provided to me one with normal data and another encrypted version of it. I need to check whether that test file(without encryption) which goes through an api and encrypts it will be the same as encrypted file ... |
In their Privacy Note, Mozilla writes the following:
Amazon Web Services: Thunderbird uses Amazon Web Services (AWS) to host its servers and as a content delivery network. Your device’s IP address is collected as part of AWS’s server logs.
(i) If one has an Amazon account and uses Thunderbird simultaneously, does thi... |
An attacker want's access to a specific account, he doesn't know the password.
It's a high entropy password. +128bits
The attacker has the hash for the password (Assuming OWASP suggested bcrypt with cost 12)
The attacker has a list with n hashes that HE KNOWS are hashes for the same password he is looking for. (He mag... |
We recently had issues with people messing around inside our system. To prevent code injections within my python code, I implemented the following if block:
#! /usr/bin/python3
#-*- coding:utf-8 -*-
def main():
print("Your interactive Python shell!")
text = input('>>> ')
for keyword in ['eval', 'exec', 'imp... |
Nowadays, many Password managers offer options for 2-Factor Authentication such as TOTP. I am really confused regarding this. Isn't the whole point of 2FA is to prove you have a second way of proving your identity?
What kind of security risks would I have if I have both my passwords and 2FA within the same app compared... |
I have a use case to generate one time codes, and need to, in some cases, verify them offline. A use case:
On arriving at customers door, the delivery agent needs to verify that they dropped off a letter. Before arriving, they send out a SMS to the client with a code. The delivery agents needs to type in the code to ve... |
I noticed on a website that when I entered my credit card number, the entry box was highlighted blue:
I then tried a dummy credit card number, which made the box highlight red, indicating that credit card number can not be used:
I then tried entering other credit card numbers from expired credit cards and the box hig... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.