instruction
stringlengths
24
29.9k
got this email on gmail spam folder was wondering if this is legit or not ..
I'm a bit paranoid right now about what my school can and can't see on my device. My school has a BYOD policy which means that I bring my own device to work. I am logged in using my personal account almost all the time though and I recently did an incognito search. I want to know whether or not my school could see what...
If you have looked into this demo of Spectre in JavaScript: Did I get it right that only current site memory can be accessed, due to site isolation etc? I saw there is also an addon to detect attackts (Spectroscope). Can somebody describe the potential impact of it? If I visit a site attacking me via Spectre and they c...
I am wondering if ransomware can encrypt currently opened/locked files by an application? Example: Some application opens files and lock them for manipulation e.g. Database. So I assume that when the system gets infected by ransomware, but database file is already in use, it can't be encrypted until database engine clo...
I stumbled upon this command: kubectl get secrets -n namespace-name (Jay Beale, Attacking and Hardening Kubernetes | KringleCon 2020) It seems to list the secrets for a specific namespace (here namespace-name). But I couldn't find any documentation about that (e.g. https://kubernetes.io/docs/concepts/configuration/sec...
I want to understand if end user is doing MITM attack on my app and i want my API server to receive this. Is there any way i can hook an SDK or some listener that tracks which certificate is being used for outgoing / incoming requests at some particular moment and if that doesnt match something i hard coded or my own s...
A company has a database with user's passwords encrypted. An attacker compromised the password encryption now it needs to be changed. In this situation does the company needs to change the encryption key or Is there another way to prevent it. Note: The services active at all times.
If all our identities, our data (emails, pictures) are on distributed ledgers/blockchain, can the use of distributed ledgers/blockchain stop data exfiltration for good?
How unsafe would be to publish the hash of my passwords? I have written a Python script for helping me to remember my basic passwords (computer password, encrypted backup password, AppleID password, and KeyChain password). It is hardcoded inside this: SHA256(MD5(password) + password + MD5(password)) for each password ...
How does Linux know if a new password is a "wrapped" version of an old password? (or, the process of creating a new password) know "certain" parts of one's password? Let's say I have the password abcEFGH123321 and I set a new password to be: acbdEFGH123321 (added a d). it displays: new password is a wrapped version of ...
I have read about BitTorrent protocols and how uTorrent works specifically. The main idea is that instead of many clients accessing the same server for downloading a file, different parts of the file are given to the clients, and then it is shared among the peers (peer to peer). Therefore, improving efficiency and down...
I was reading the Wikipedia article about TAO and there is written that: Details on a program titled QUANTUMSQUIRREL indicate NSA ability to masquerade as any routable IPv4 or IPv6 host. This enables an NSA computer to generate false geographical location and personal identification credentials when accessing the Inte...
I am not sure if this is the correct platform for this question. The source code of Zeus trojan is available on the internet. It can be found on github as well. I have read somewhere that the purpose is to make research easier to understand how something like this works. My questions are: How was the source code found...
I have a PC using Windows 7 that I realize should be upgraded. I'm using the Windows Defender antivirus that came with the computer. I recently joined a discussion forum. Member profiles there allow for a personal photo to be uploaded through the site. "Upload" button on profile, which when clicked opens the C drive on...
Motorola Z667T The phone reset itself after several attempts to enter my encryption password that i forgot. is there anything i can do to recover the text messages and contacts ?
when we securely delete a volume in a machine which is installed in a virtual machine or docker, for example by overwriting 7 times or more, we securely delete the data in virtual disk (in guest) and some related data in real disk (in host) may remain. is it true? so to consider this and to securely delete the data bot...
Nmap keeps telling me no hosts are up when I am using scanning with an IP range Ive tried using sudo and 192.168.0.1/16 and the same results shows ermine-c@ubuntu:~/Desktop$ nmap -sn 192.168.1.1-255 Starting Nmap 7.80 ( https://nmap.org ) at 2021-03-17 00:34 PDT Nmap done: 255 IP addresses (0 hosts up) scanned in 103.1...
Can I deobfuscate java code (apk, that contains obfuscated code, or java bytecode), when running it? If android gets able to run code, so he must get those keys, and get access to code which to run. How I can intercept (read), code android is executing, but not to be assembler, where it's still obfuscated. I have roote...
Suppose I want to print a human readable 10 digit serial using ordinary day today printer but the printer is communal printer and manned. My intention is for the person manning the printer to not read the code. Initial inputs that i know is that printer is not a copier and person manning does not have a camera or smart...
As a security in-charge, I just noticed that one of our production web apps was attacked by some hackers. The attacker accessed the .git/objects/ files. I already modified .htaccess to make .git and its content inaccessible. The attacker may get some model file which includes some data queries but not with database cr...
A hour ago we receive a suspicious mail targeting some of our mailing lists. It contains a .zip file, itself containing a .xlsm file. This .xlsm file appears to be recognized as an ASCII text file from the file utility and olevba: olevba 0.56.1.dev2 on Python 2.7.16 - http://decalage.info/python/oletools ==============...
If a web-app is using cloudfront as CDN, what happens if I ping the domain? Am I pinging the cloudfront endpoint? Or the web-app server? Why is it DNS resolution resolves to different IPs in this case? One example is when I ping the domain, I use the IP on shodan and see that it's a cloudfront hostname. I'm guessing th...
I have manually scraped multiple pages of search results on Google and haven't found a single suggestion as to how to find an optimal k when you are trying to "k-anonymize" your dataset. All I can find is the obvious fact that "higher k = more security but more loss of information", but not a single idea is given as to...
I keep seeing how people are working to make virtual machines look more like real machines, but I have been wondering about the reverse. I have noticed a trend where viruses will automatically shut off if they think that they are in a virtual machine. Using that train of thought, couldn't you attack this from both ends...
A lot of personal life is digital and should be protected to stay private. But in case of a medical emergency, like being unresponsive in hospital, maybe being in a coma for a few years (possibly waking up afterward) or dying, one may want to share some information with relatives. An example would be: When I am unresp...
So I'm looking at scoring a vulnerability, and I'm waffling on how to handle Scope and Confidentiality impact. If scope is changed, isn't confidentiality-impact necessarily changed to at least Low? If I can get into a scope I shouldn't have access to, I can definitely get information I shouldn't have access to, correct...
I am able to use the PowerShell New-SelfSignedCertificate cmdlet to create a self-signed cert just fine, but I'd like to create one with an AIA extension and give it an OCSP responder URL. There is a cmdlet parameter called -Extension, but the docs are limited and don't have examples: The -TextExtension parameter look...
A normal user can execute these commands as root without providing any password (sudo includes the full path of the command so path hijack isn't the case here), could "halt", "reboot", or "poweroff" be leveraged to escalate the users' privileges to root?
I feel like this information should be readily available but looks like it's not: When I buy a new laptop or phone, it seems like there's a whole set of initial connections that might require my (client) authentication. For example, if I bought a Mac, Apple might want to authenticate that the Mac I'm registering is not...
I was trying to run the bolt CMS exploit. Bolt CMS 3.7.0 - Authenticated Remote Code Execution | php/webapps/48296.py (taken from searchsploit) and it wouldn't work because automatic check which happens before the exploit is actually ran returned a false result. I've tried a lot of combinations like set auto check to f...
Let's imagine I have a work macbook with ssd and I use FileVault, and the company has the FileVault recovery key. I want to make sure my data is erased and unrecoverable, what is the best way to proceed? I can do a full reinstall of the operating system, which in turn would re-enable FileVault changing the previous rec...
I have been researching kerberos and ntlm for the last couple of days and still got one thing unresolved. After an interactive logon with kerberos, you will have in the cached credentials both kerberos tickets and ntlm hashes. I figured winlogon/lsass are responsible for calculating the NTHash from the plain password a...
Imagine the following scenario: There exist all kinds of information on my SSD. Now I take away the SSD of my MacBook Pro, replace it, and reboot. I should have a MacBook that is on factory settings, right? I am wondering if there is any way, or hardware, where information from my old SSD can be found, whether in parts...
I'm implementing a web login system and am confused about how to think about when authenticated sessions (not just browser sessions) should be expired. There seem to be 2 factors: absolute lifetime of a session; idle time. Idle time makes sense to me. Having an absolute lifetime implies a session should be expired ev...
I have examined a web application, and I have found some strange behaviour of tokens. I will try to explain it. I think OAuth2 is used for authorization. User Alice will login to the app, in the HTTP headers there is an item Authorization: alice_token. User Bob will login to the app, in the HTTP headers there is also a...
I need to receive emails and put them in different "inboxes". Identifying and validating an inbox involves a database hit in order to search for the to-address. I would like to not hit the db if I know that the to-address is not valid. As of now the inbox names are generated as random strings with only smallcaps and 1-...
Yesterday, I was sitting at the computer and noticed that the phone is making the "calling" sound (that usual beep). I unlocked the phone and did not see any activity like I would call someone, except the beep. Today, it happened again. The same thing: heard the beep, unlocked my phone, and did not see like I would cal...
Lately I've been getting a lot (well, 2-3 mails per day) of greeting card spam (I think it's called), aka spammers signing my personal email address up for contact forms and accounts with random sites, ranging from a webstore selling food supplements in the Netherlands to the City of Brighton tourism board in England. ...
When creating a self-signed certificate you are asked to enter some information (First Name, Last Name, Organization Unit, Organization, City, State,...). Is it possible to update any of those fields later? (E.g. my company changed its legal name and now I want to update the "Organization" name to reflect the new one.)...
I know that a device can be compromised by a drive-by download. But could an attacker access my device without installing any malicious app? Can he access my camera by just executing a malicious JavaScript on a website?
I am practicing a function return address overwriting exploit. However, the program instruction pointer instead gets overwritten by gibberish. I have tried compiling with -fno-builtin and -fno-stack-protector, but nothing seems to change the behavior. Code (from "Hacking the Art of Exploitation", 2nd Edition, Page 1...
I found an obfuscated PHP-script in a log directory on a shared hosting, which had been given chmod 0777 by mistake. The script in it's original form looks like this: $zowyb = 'i#7uH0_ls5y4m*bcrovaptf-8d1x69\'3egkn'; $hifcq = array(); $hifcq[] = $zowyb[4] . $zowyb[13]; $hifcq[] = $zowyb[15] . $zowyb[16] . $zowyb[32] . ...
Today, OAuth is the standard for authenticating Users. It employs an elaborate setup to reduce vulnerabilities. Yet, when it comes to APIs, the standard is just to have an API Key provided in the HTTP Request Header. Voila, you're in. This is even adopted by Google. Why is this so? These API endpoints are public!
I have seen so many articles which they write that the salt is stored together with the hashed password in the database. However, there's one thing that is bugging me. Since the plain text salt is stored in the database, and the hacker has access to the database, and provided he guessed one of the password correctly, l...
I have a javascript function on a website that I want to attack which is called every time if we log something. So, if we are running on localhost then, window.location.href.substr(7, 9) is "localhost". Can I make the website think that I'm running on localhost? I want to do this because redlog() is often called for lo...
Is it some secure way to store private keys in session storage? or is there any place to store that info securely?
Currently there is this design of two apps that work together: Proof app: On customers phone, takes in a textcode and creates a QR code Scanner app: On hosts phone, Scans the QR code and displays some information like birthday, initial and valid date. Does not connect to the internet for this. Both applications will ...
Let's say you cat /dev/random or /dev/urandom all day from boot to system shutdown, either redirecting the output to a file, or just catting it (in a terminal, or whatever) doesn't matter. Is this insecure, or a bad idea? If so, why? Revealing random bytes when the system (and/or the applications running on it, think e...
I built an app, which authenticates users via oauth2. I have a simple server that can accept requests. After authentication, the user is redirected to https://127.0.0.1:1234/token=<token> and the app listens on this port. How can I make a certificate to accept a callback from the host? Self-signed certificates are rest...
I share the same wireless router with some other people living in the same apartment. I want to safeguard my privacy and also not be held liable for their internet activity. The modem from the ISP only allows connecting one router to it. What can I do in this case? Will connecting another router to the current router o...
Consider the following Linux system: root account is disabled (passwd -l root, passwd -d root), there is an account 'admin', with sudo rights, there is an account 'webservice', with limited privileges, and no sudo rights, su is disabled via PAM (auth required pam_wheel.so), only 'admin' can SSH into the system (AllowU...
This morning I received the following text message from a Gmail account: v3s5f3rs4f3gs3.nf5j4k8j4k3o.solar?G$1?V&?KL?O=$HO?&S?K0?$1T A couple of my friends got it too. I have an iPhone and it didn't do anything, but on android phones, it shows up as a link (both were smart enough not to tap it). What is this message? ...
I'm building a web service and have questions regarding authentication. I have a strict requirement that this application only run on company machines. We have a root certificate this is installed on all the machines in the company. I'm planning to use this certificate for authentication. My idea is - when the client r...
I own the internet connection and router and going to share it with apartment mates. I want to accomplish the following things Isolate our networks, such that they cannot see my internet activity or my devices (want to avoid router cascading or VPN) not be held liable for their internet activity maybe even have two di...
I have a project where we are asked to assume the existence of a document D on a soft page which is handwritten in ink, a jpeg file of its native photograph (image A), and another discolored and angled/stretched image B in PDF format which shows the same document. We have to find if the image B was obtained by scanning...
Starting with kernel 5.13 RiscV will get XIP where parts of the kernel run from non volatile memory like flash. In theory you could make parts of the kernel really read only either from the hardware side by storing on a write protected chip or a bit limited write protection via the hypervisor when run in a VM. Will th...
I always hear on YouTube and other places on the internet that Tor is the best option to stay anonymous. Tor is used by many activists, journalists etc. hiding from oppressive governments and so on. Not a VPN nor a proxy would guarantee the same level of anonymity as the Tor browser because of the possibility to keep l...
(FYI: I'm using Ubuntu 18.04 Desktop although I don't think my question is platform-dependent.) I read the article Scalable and secure access with SSH and it says: ... if you want to use revocation lists, unique serial numbers are a requirement. But by reading ssh-keygen manual page, I didn't seem to find a way to gu...
How does malware usually embed into / infect exe files? (As in actually modifying the file on disk, not in memory). I've read it may look for gaps in the code section, insert its code, then redirect or change the entry point to that location. That makes sense, but what if there are no gaps large enough? Specifically, w...
Bitwarden uses TOTP as the multi-factor authenticator method for their password manager. Bitwarden stores and syncs your data so you need the master password + TOTP to get access to your account Assuming we ignore Keychain, Enpass does not have an MFA method. Enpass is, however, stored locally and can be synced by the ...
Why doesn't my conversion from id_rsa work? I have an empty file in the final conversion idrsa.hash and when I use command cat idrsa.hash to check the result is ERRNO2 no such file or directory : id_rsa impossible to convert the file with command usr/share/john/ssh2john.py id_rsa > idrsa.hash the conversion in the fi...
Is it possible to programmatically generate different hash functions? Of course, it is. We can simply tweak the numerical parameters of the hash function. But is there a known way to generate secure hash functions programmatically? I got an idea for a new authentication system, but it relies on using a hash function th...
I am aware of the fact that authentication via email is discouraged, but in some specific applications and given as secondary method, we all agree that it may be useful. Having said that, what is the preferred way to generate OTP to send via email and validate in the application in a 2FA system? Should I use TOTP algor...
I am currently building a Python desktop application in PyQt/PySide which will be compiled to .exe. I am planning to use the Azure SQL database and a remote file storage (like S3). An issue arises that the application needs passwords (credentials) to access these services and be able to upload files etc. "Hardcoding" t...
Over the years I've received the occasional password reset from a service I've never used (or even heard of sometimes). As far as I can tell, the emails are genuinely being generated and sent by the service. Still, I always ignore them. But, more recently, this has been ramping up, to the point where I recevied dozens ...
I have email headers of people I have never met with their IP.I need to know and validate their exact location as they expect to take money from me but I do not wish to be fooled.
There are two options, what is the best approach? I want to either Create a squid proxy server that detects MITM attacks or Create a python UI application to detect differences between local certificate store and certificate sent from server. If there is a difference, show error on the client side that a possible MI...
I recently had to reset my password for a popular instant messaging service. Unfortunately, I failed to write down the new password I picked. So I had to reset the password again. That is when I got the following message: Please wait one day before requesting another password reset. A bit irritating, but perhaps moti...
Background I have a "main" Gmail account, which I set to keep logged in, on my laptop. This "main" Gmail account is important, because it's the email address I used to sign up for many other services (and, so, if I forget my password on these other services, I get the password reset link sent to this Gmail account). I ...
Which programming language I can use to modify Windows registry? Can I use js or powershell?
Does the built-in apt package manager in Debian-based systems require successful cryptographic authentication and integrity validation for all packages? My understanding was that software downloaded with apt-get packages would be cryptographically verified because the repo would sync pgp-signed manifest files on apt-ge...
I don't like my server having access to plaintext passwords. Instead of SRP, OPAQUE or another PAKE that needs several rounds, I was thinking I could take the username, server url and password, run a hardened hash like scrypt and generate a private/public key pair. When registering the account, the client send the publ...
FIDO2's HMAC Secret extension generates a symmetric secret that can be used to encrypt and decrypt data. HMAC secret's output is based on output1: HMAC-SHA-256(CredRandom, salt1) Where salt1 is from the platform and CredRandom is generated and kept secret by the authenticator. After platform encrypts some data using ...
I have an API Key to a paid service. This API is invoked from an unauthenticated page on my site. I am proxying the request to the paid service through my backend server. I have also added CORS on the API to make sure it is called from my site. THe above protections work when a user is accessing it through the browser....
As the title suggests, I am wondering why some sites do not configure their servers to get a SSLabs A rating. I have found a link suggesting why an A+ rating could complicate things compared to an A rating, but no other information. I also do not think that it is because of backward compatibility with older browsers su...
Let's say HonestInc is super generous and provides the source code of its web application HonestApp on github. However, I'm extremely distrustful of them, and have doubts that their actual server is running the same source code as what is provided on github, as it is trivial to maintain changes between the published co...
I am setting up an NGINX reverse proxy, which sits in front of an API. I would like to use: proxy_set_header X-Secret-Key ${SECRET_VALUE}; to add a token to the request, which is then read by the API. ${SECRET_VALUE} is pulled from a secrets vault and injected into the conf file at runtime. For the purposes of this que...
I am trying to make a simple buffer-overflow exploit on an example program to understand binary exploitation a bit better. The goal is to simple write shellcode on the stack and execute it. However, despite all the resources online, I keep running into weird problems that I can't figure out a solution for. I hope someo...
Lets say I want to generate a name-based UUID using v5 of the RFC 4122 using sensitive information as the input (for example the password to my bank account). And lets say I give the generated UUID to a malicious user who wishes to reverse it and obtain my password. Given the following about how UUID v5 is generated: ...
This may already have been answered, but I'm having difficulty understanding the technical jargon of various posts. I have to give a Callback URL to receive some sort of validation, to use an API. Does providing my localhost url (https://...), make it possible for someone on the other end (e.g. the people that run the ...
I have a https server with following the certificate chain : Root CA -> Intermediate CA -> server certificate I noticed that for the client (eg. browser) trusts the server I need to install in Windows: Root CA in Trusted Root CA store, Intermediate CA in Trusted Intermediate CA store. Why do I need to install Root CA a...
Do iPhones (or just a smart phones in general) send packets when they are fully shutdown? I have heard that they do, but I have not been able to verify such a claim. In an effort to investigate, I ARP Poisoned my own iPhone (legally on my own network) and monitored the packets via Wireshark on my computer, but once I s...
I'm deploying software that is licensed based on uniquely identifiable computer characteristics. I am wondering about the Manufacturer-assigned serial number of an internal fixed hard-disk. To be clear, I am not referring to the Volume Serial Number which changes every time you format a Windows hard drive. I mean th...
Does the snapd package manager in Debian-based systems require successful cryptographic authentication and integrity validation for all packages? I know that software downloaded with apt-get packages must be cryptographically verified because the repo's manifest files (synced with apt-get update) are cryptographically ...
Suppose you are going to mass manufacture custom circuit boards and would like the manufacturer to upload the device firmware onto these boards before shipping them out. What are some security systems/methodologies/features you would put in place to prevent the theft of firmware IP in order to prevent counterfeit devic...
I've created a method to allow my project EditVideoBot to be 'decentralised', where rather than the program processing and uploading all video editing requests on my own central server, users can volunteer to run this program on their computer and take some of the load off my server. I'd like to be able to start distri...
I have a angular project which has several packages that have direct dependencies and developer dependencies like below "dependencies": { "@angular/animations": "8.2.14", "@angular/cdk": "8.2.3", "@angular/common": "8.2.14", "@angular/compiler": "8.2.14", "@angular/core": "8.2.14", "@angular/forms": "8.2.14", "@angular...
I'm not really sure exactly how to ask this, but I'll try my best. I have two SSL certs, and I'm tyring to figure out if I accidentally invalidated one of them. Cert 1 was just renewed, and issued to www.mydomain.com in the CNAME. This cert included mysub.mydomain.com along with about 10 other subdomains in the SAN fie...
What would this do? I'm a bit of a beginner to root certificates so stay with me here, I Don't want it to be able to see what I'm doing at home.
APRA's CPS 234 regulation section 56 states: An APRA-regulated entity would typically deploy appropriate information security technology solutions which maintain the security of information assets. Examples include firewalls, network access control, intrusion detection/prevention devices, anti-malware, encryption and ...
We are developing a web application. It has several features so the first time the user enters it shows a short video explaining how to use it. We use the iframe approach to embed a video from YouTube (or potentially other streaming services like Vimeo, MS Stream, etc.). The video only shows for authenticated users (we...
A simple way of automatically decrypting system drive at boot time: clevis luks bind -d /dev/yourdrive tpm2 '{"pcr_ids":"4,5"}' systemctl enable clevis-luks-askpass.path When I booted another OS on the same machine, tpm2_pcrread listed mostly identical PCR values, except for 4 and 5. I understand that PCR 4 is a hash ...
Why is it considered insecure for an NFS export to allow connections originating from high ports? Compare the manual: exportfs understands the following export options: secure This option requires that requests originate on an Internet port less than IPPORT_RESERVED (1024). This option is on by default. To turn it off...
Some applications tend to hide completely the user associated email address or just showing a part of it (e.g. f***o@foo.com) in the user's personal settings. Other applications don't mind showing the full email address. What are the security implications of knowing the email address of a possible compromised account? ...
I'm wondering if there is a way to require 2-factor authentication on webpages and Android apps that don't have it by default. I am already using a password manager but I feel that this may not be enough and would like to also have 2-factor authentication for everything I'm using, if possible. Or is this overkill?
I have a simple PHP-HTML-CSS contact form which saves emails to a local email client's database (in my case, Roundcube's database, which is a standalone MySQL database, I think --- I haven't used the program yet). The data this simple form gathers is very trivial, things like name, email, phone number, etc. no sensitiv...
What are the possible ways to protect an organization's web servers from a DDoS attack without giving away your web server's https private keys? Many of the common solutions for DDoS protection of a web server (eg CloudFlare) require you to give a third party either your https private key or (worse) give them the abili...
Are there any Open-Source Hardware Security Modules (meeting OSHWA requirements)? I've worked with Utimaco HSMs, but I'm not a big fan of closed-source hardware -- especially when it comes to security but also out of principle. Moreover, I was shocked that Utimaco didn't ship with any anti-interdiction services. I can'...
I am developing a CSP that performs electronic signature in the cloud and I want to use it from applications like Adobe Reader and Microsoft Word. For this, the certificates from CSP (from the cloud) must to be hosted also in Windows Store with a link to the CSP. I found something similar in this question but it is for...
What is the difference betwen a Trusted Computing Base (TCB) and a Root of Trust (RoT)? Can both terms be used interchangeably? A TCB is defined by the NIST as follows: Totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination responsible for enforcing a se...