instruction stringlengths 24 29.9k |
|---|
I'm running a PHP application with a user management system called userspice. It basically allows you to include the userspice PHP file and then control access to a certain PHP page.
As I have seen some spikes in my log management about 404 requests I was getting curious and decided to look at the apache logs directly.... |
If I am not wrong, both private key and public key are the same since communication is possible only if both keys are matching. So, why we should only keep the private key secret, why not public key? When I generate a key by ssh-keygen command, and save it on a directory, is it a public key or private key?
|
I don't understand the difference between a bastion host and a firewall. I think it could be related to the different level of ISO/OSI they work on: a bastion host works on application level (with proxying capabilities too), but a firewall can work also on L3/L4 layer. Please correct me if my assertions are wrong.
|
I'm trying to follow the OWASP 'Forgot Password Cheat Sheet' recommendations for password reset functionality via email. This requires my server to generate a token. OWASP says that PHP's random_bytes() and openssl_random_pseudo_bytes() functions are adequate for such a token. My questions:
Is it safe to simply append... |
I'm currently setting up a KeePass database after switching over from another password manager, and it has the option to change the character set for generating a password.
This has a lot of options, but now I'm wondering if you could possibly use all of the given characters,
Upper-case, lower-case and digits would ob... |
Some phishing links contain random digits / codes (e.g: https://refno1234.example.com). For such links, is there an increased risk by clicking on them because the unique code could be matched to your email / mobile number and therefore verify it exists?
Is it possible, by clicking on a phishing link, to run malicious... |
There is a JKS file containing an entry named "mycert": https://filebin.net/l93faa9qa3rkt32h
Password is test123
Based on the following screenshot, mycert has a public key (RSA 2048 bits) and in X.509 format encoded it starts like this:
30 82 01 22 30
I need to export mycert from this keystore to have a single X.509 ... |
I took my office desktop computer home and plugged it into the router. I work for a private company and one of the owners went to school for computer programing/information security/etc). Can they see the browsing I do on my iPhone? Or on my Windows laptop (WiFi connected)?
Is this possible?
The desktop computer has no... |
Here's the article from the Belarusian website http://dev.by, it is an interview with a former member of dictator Lukashenko band (so-called Chief Organized Crime and Corruption Fighting Directorate). And he told how they used to detect Telegram administrators:
For example, someone dropped a picture into the chat, it ... |
Example: I own the domain example.com.
Instead of using the nameservers set up by default by the registrar, I set up my own nameservers on my own machines with bind9. Let's say that at the beginning, before becoming more experienced with bind9, a few things are misconfigured for a few months. For example allow-transfer... |
I would like to know how paired devices get synced together in Signal messaging app.
So this is what they say on their website
Signal messages, pictures, files, and other contents are stored locally on your device. These contents are readable by the open source Signal clients. Because everything in Signal is end-to-en... |
As I am currently working a lot with mobile applications a question arised:
How to properly store and transmit API keys within mobile applications?
When I analyze mobile applications most of the times it is easy with the right tool to extract secret information (e.g. dump the keychain, reverse engineer crypto functions... |
I've searched for it but couldn't find a direct answer to this relatively simple question. Most questions are about a 3rd party intersepting the HTTPS POST or GET parameters inbetween client and server.
But my question is: can a PC user somehow see the HTTPS POST or GET parameters?
My C++ application sends HTTPS POST a... |
https://trailofbits.github.io/ctf/vulnerabilities/source.html
It says
"Common examples include libraries like libxml, libpng, libpoppler,
and libfreetype that parse complicated file formats and protocols."
Do such vulnerabilities surely cause security problems? For example, if the library is linked to a binary that d... |
I work in an industry that uses manufacturing equipment that typically run on Windows or unix-like OS.
An industry body is developing security standards and plans to require the use of Security Content Automation Protocol so I was wondering about implementation of SCAP in other industries.
The proposed requirements wil... |
I found this question and tried the solution given (accepted)
Can nmap take a list of ports to scan from a file?
However, it didn't really work as expected.
$ cat ports.list
21
22
23
25
$
Instead of scanning the ports in the file, nmap assume those ports as part of the host. See output below.
$ nmap 127.0.0.1 -vvv -p... |
I would like to know peoples' thoughts as to whether a WAF is a perfectly acceptable compensating/alternative control to things like CSP, X-XSS-Protection, etc. I know WAF is suppose to protect against XSS and etc, but I been using Mozilla Observatory to rate sites and want to know if a WAF should be taken into conside... |
Maybe this is not a useful question, but I got a little hung up on this because it seems a little strange. In the example of the PKCE verification in RFC-7636 it details the following:
The client uses output of a suitable random number generator to
create a 32-octet sequence. The octets representing the value in
... |
I am trying to verify whether I am vulnerable to the OpenSSL TLS renegotiation vulnerability CVE-2021-3449 (fixed in OpenSSL 1.1.1k).
When I connect to the website using openssl s_client -tls1_2 -connect example.com:443, it says "Secure Renegotiation IS supported". When I then send the request for renegotiation, it dis... |
Recently, I connected my Android device to an open wi-fi network. Then a web page opened up asking me to choose username and password to log in with. Now when I connect the same device to that network, the web page doesn't open up anymore and the phone automatically logs into with the chosen credentials.
Is there a way... |
I'm guessing this applies to all implementations of sign-in links, but since I'm using Firebase I'd like to understand their concerns: https://firebase.google.com/docs/auth/web/email-link-auth#security_concerns
Do not pass the user’s email in the redirect URL parameters and re-use it as this may enable session injecti... |
I'm already into web pentesting. I'm willing to learn android pentesting now.
From what I understand, the server side part like API etc is similar to web pentesting and I need to learn about client side bugs.
Am I correct?
|
Our organization maintains a private certificate authority to issue SSL/TLS certificates to non-public backend services running on our cloud infrastructure. For example, Postgres and Elasticsearch servers running on a private vnet.
Currently we issue these certificates with a 2 year expiry, but the renewal process is m... |
Today I found a security issue with Chrome (or maybe other browsers I haven't tested yet).
What happens is that once you open a site and then open another site in the same tab, the previous site's global variables are accessible to the current site in that tab. I have demonstrated it in this video: https://www.youtube.... |
I want to send an email through Gmail without the other side being able to trace me. I actually want to report something. I opened up a new Gmail account with a fake name (I used Tor to log in). I did have to verify the cell phone number, but I did buy a new SIM card that I never used before. I did all this at my home.... |
I manage a multi-user workstation (Windows) server for a small student organisation. One of the students asked me to install docker, as it would simplify his workflow. As this is on a shared workstation, I'm concerned about security. On linux, if you have access to docker, you effectively have root permissions. I am aw... |
I'm a victim of Meterpreter attack. I'm now using VPN in all the devices. My question is, will it help me to restrict meterpreter attack?
If not, what is the way out to get rid of meterpreter attack?
|
Some contact forms in the web have the "send me a copy of my email message" option which I personally find very comfortable.
Let's say that on my own website contact form I add this option, can this be a security breach? I mean, can a user, impersonating as a "potential customer" use this option to cause me trouble?
|
I'd like to store a private symmetric key, aes-256, in a PEM file.
My understanding is that usually these types of keys are derived using RSA/EC DH and there's no need to save them, but in my application I do need to save them and share securely.
Is there an standard defined for saving these keys. Is there any openssl ... |
Doing the webgoat HTTP splitting exercise. I feel like I'm doing something wrong or there is something that I don't understand.
The idea is that since we can control the referer parameter, we can split the request into 2 and have the server sends us another response (This could later on be used to trick victims into ca... |
You may think I'm crazy, that's why I'm here to ask. I read this page which went over the privacy and security of many if not all browsers.
From his reporting, and my own logic, that the government likely has advanced enough tracking tech that no-browser on the market can escape the honeypot/tracking, I reason that usi... |
I understand some might buy a particular brand because, I guess, it's like buying a Rolex instead of a Swatch? But marketing considerations aside, is there any real security difference between the first ($36/yr) and second ($63/yr) certs offered on this page:
https://www.namecheap.com/security/ssl-certificates/wildcard... |
I purchased a usb gaming controller used. It has a usb dongle that plugs into the PC and a I assume its bluetooth.
Is it possible for the USB dongle to contain a keylogger that starts up when I plug it in?
Im just curious if someone could have installed a keylogger on it? Ive tried reading up and some say yes it is pos... |
I am making a password manager and generator. The user creates the login information, and then I hash their password. After that, I generate the password and encrypt the password with a key stored unprotected. My Question is how do I protect the key?
I need an easy way to do it since I am just a beginner and working on... |
I am testing a bug bounty website, and found an endpoint like www.example.com/infinite. When open it, it keep doing 302 redirect to itself until browser stops it for redirecting too many times.
For example:
www.example.com/infinite ==> 302 - location: ?
www.example.com/infinite? ==> 302 - location: ?
www.example.com/i... |
I was reading about whether you should trust a VPN any more than your ISP, and I see that some VPN providers claim they do not log users, when they do indeed log users: UFO VPN claims zero-logs policy, leaks 20M user logs.
I see concerns about the possibility of being logged, particularly from people in parts of the wo... |
Application layer security or transport layer security which one is better?
TLS is convenient but application layer security will help to provide more security as this post explains
|
My project is to find out how to detect HTTPS interception/mitm and create some sort of application using detection techniques. One of the ways I was thinking of is a active desktop application to listen in on the connections between client and server to check the authenticity of SSL certificates using the certificate ... |
Consider the following scenario:
M (who will later be the man-in-the-middle) connects via https to bank.com. He saves the X.509 certificate (or certificate chain) received from bank.com.
Alice starts a https connection to bank.com.
M intercepts Alice's TLS messages and responds with corresponding TLS messages. For t... |
I'm trying to wrap my head around authentication/authorization process within web-app that encrypt data on the client-side and I'm getting very confused about it. Hopefully, you could clarify it to me.
Where should encryption of the password happen, on the client side or server side? If indeed on the client side, then ... |
I need to find the list of services where my email address has been registered as their recovery email address.
I am using Gmail and all other emails also are Gmail, but they are too many and I don't remember many of them I need to see the list of them.
|
The other day I logged into Discord on my friend's computer using the desktop application. Does Windows log these events somewhere? Does it store the password hash or some sort of authentication token?
|
I'm trying to understand the format and functionality of WPA2 hash lines that start with WPA*02* used with -m 22000 on hashcat.
The way I understand it, this format was created as an improvement and replacement to the .hccapx file format, and should thus contain the exact same data elements. However, when comparing it,... |
I found this recommendation by the CISA to disable Javascript in Acrobat Reader. Also, this article recommends to disable Flash and Multimedia, and the opening of non-PDF attachments. Both recommendations are from 2010.
What more steps would you add to harden Acrobat/Acrobat Reader in 2021?
|
Have the same certificates installed on several machines, but this happens on only one of them.
The certificates are self-signed certificates.
The certificates are used for WCF message security.
Installing the certificates with the following PS script (or manually through Manage Computer Certificates, doesn't make a di... |
I'm trying to setup an nginx reverse proxy to a web product I can't modify (it's an appliance).
Client --> https://myapp.com --> nginx --> https://10.1.5.9
I managed to do so, but it required stripping the "Origin" and "Referer" headers from the client request because the webserver won't accept authentications if thos... |
It would be nice if sites like Medium or Substack allowed users to not only add text, images, code snippets, etc., but also custom scripts that allowed readers to run a little piece of code. For example, if someone was writing an article on how to create a unique react element, they could have the running code in the a... |
I know that OTP (One-time password) system is the most secure method for now if online.
Online OTP systems, like sending code to a phone is secure because the attacker cannot know the code if he doesn't have the phone or can intercept the content of the message.
However, offline OTP looks not secure, because it doesn't... |
Is there existing work (or algorithms) that explore (or exploit) imposing an i/o cost to disadvantage hashing hardware, while still using SHA2-family of hashes?
Is this even possible, or would any such effort be trivial to circumvent?
My goal is to put dedicated or lightweight hashing hardware (ie. ASIC/ FPGA) at a dis... |
I know that virtualization is different from emulation; I was wondering if emulation is isolated from its host and any destruction on it will not affect the host as if it were a virtual machine.
I also understand that there can be exploits that can be used to escape the emulator but I just want to know if it is isolate... |
Building the eIDAS compliant certification authority in hierarchy, meaning that the Root CA will issue Subordinate CAs. Root CA will be offline almost whole year and Subordinate CA is online providing services to relying parties.
I am trying for a few weeks to identify options for eIDAS compliant HSM for Root CA. It do... |
From my current understanding, WPA networks use a network's SSID and password to produce a PSK (pre-shared-key), which encrypts/decrypts communications between the router and the client before a new key can be negotiated.
If a router does not have a set password, does this mean that the key negotiation between the rout... |
PrintSpoofer uses named pipe impersonation to elevate on Windows 10 to SYSTEM from a user with SeImpersonatePrivilege (Local Service, Network Service, Administrator etc.). The compiled version is detected by Windows Defender, therefore it would be nice to run it without touching the disk, e.g. in memory.
I've tried usi... |
Recently I had a job interview online as a developer and I had to download a .PHP file from an FTP. I used a VPN to connect to it and after downloading the file I just opened it in VS Code to see the code. Since I don't even have PHP installed on my computer to execute it, is there any chance that the file could be inf... |
We have an open source software that allows users to be created. The users are saved in an LDAP directory. The software connects to the LDAP as an administrator to write a new entry for a new user, or to edit the password if the user wants to change his password. To do this, the LDAP master password must be stored in t... |
If for example there is a game, that is specifically designed to try to get control of your game console or to be able to provide the user of the game control over their system and somehow got onto the console's respective official store (thus is easily install-able for a lot of people).
How much could it do? Are the g... |
Let's say I had an API that told me "for X resource, use this host". My iOS app would then store that host and use it whenever it needs to fetch resource X.
I'm wondering what security concerns there are around this? If I had to support this, would this make sense to store it somewhere encrypted (like the keychain) rat... |
As far as what I understand there are different approaches and I have a few doubts regarding each of them:
On the one hand, it seems that factory reset does not securely erase itself data from SSD storage for certain operating systems and devices. However, in case data are first encrypted and then the factory reset is... |
I am new to SQL injection. When I was researching a bug bounty site protected by cloudflare, unsurprisingly, entering email@gmail.com' OR 1=1--, to test SQL injection, did not work.
So later, trying to bypass the filter, there came a time when Cloudflare no longer blocked my request, what happened was that the response... |
I got an adapter for free from someone in my city.
After googling the serial number I found it also here:
https://www.ebay.de/itm/MOUSE-ADAPTER-501215-B004-PS-2-TO-USB-CONVERTER-/331762184078
Can I check if there is a keylogger or something going on inside the device ?
Kind regards
|
We have a simple C#9/WPF app that we're releasing on .NET 5 Core on which we need to introduce licensing.
From what I'm reading, one of the most common patterns to do so is asymmetric encryption, aka public/private key encryption.
From what I understand, you as the developer encrypt the customer's licensing info using ... |
Encrypted .dmg on MacOS High Sierra, tested password before sending for repair. Upon return from repair, password does not work. The possibilities I see are the .dmg file is corrupted, or I'm wrong about the password I thought I knew.
Nothing else seems corrupted so am tentatively assuming the latter.
In that case, as ... |
Background:
Germany has decided to implement the proof of vacination for Corona based on 5 Blockchains. It's supposed to be anonymus and safe and the verification could hapen with a QR-Code.
My Idea:
Use X509 (SSL) certificates to verify that someone is vacinated, by including additional information and making the Coun... |
I have forgotten my password but I know the words used in the password. I remember the password was something like MyPassport@1.82TB.
Is there any software that can produce all combinations like replacing "M" with "m" or "1" with "!", something like that?
|
The context is a password reset functionality. The user has requested a password reset, either via the web, or via a call to the help desk.
The proposed solution is, behind the scenes:
If Self-Service via the web - require the user to prove that they are the account owner by making them answer their security question... |
I am currently making a file server (Based on HTTP) for my service. I want an upload key, so a key that is needed for uploading. To get this key, the client has to provide his login data.
Let's say my site has the following link where you can get the key:
www.example.com/content/upload/genkey
Currently, the client must... |
I was talking to someone about it, and he claims that he is a programmer who still is able to program in old languages, because hackers these days aren't able to crack the code.
He works for a gigantic bank, as an information security person.
The fact that he believes old languages are immune to hackers these days are ... |
What data or metadata can be sniffed in a LoRaWAN network at various points like the end-device (node), the gateway, the network server and the application server? Is there exists a standardized data format for transmitting the messages since I need to sniff the data for any anomalous activity on every point on the net... |
Most sites having a sign in form have the following html element:
<input type="password" />
If I press F12 to open the debugger on chrome and type:
document.getElementByName("password")[0].value
this will retrieve the password.
A hacker could write a XSS in which the password is read and sent to his server
then log i... |
I have an Windows 10 desktop application that runs in user mode only, and this application is a local tool only -- that is, it does not "talk to the internet".
As an example:
This application uses libxml2 as a DLL distributed in the application directory (as is "usual" on Windows). The libxml2 version used is somewhat ... |
I am currently working through the Android tutorial about implementing Key Attestation. The tutorial can be found here: https://developer.android.com/training/articles/security-key-attestation
In the tutorial, under the implementation steps, there is a warning under the certificate's validity step: "Caution: Although ... |
I tried to load .txt files in TLS PASS Through but it is not accepting the file type. I tried with (.txt) and (.csv) .
The reason behind this is when I open a new project in Burp Suite all time it needs to add manually hosts. So how can I add a list of hosts in a single click?
|
first of all, I would like to admit that I belong to the offensive side of security (Penetration Testing) and this is not my common area of expertise.
Last week I was thinking about how the market usually provides services focused on medium/big companies. On one hand, it makes sense, bigger company = more money but, on... |
What would be an example of a CSP script-src-elem directive allowing a script to be loaded but a script-src-attr directive preventing a function in that script from being executed? If you don't want the js handlers to be executed, why not just prevent the js from being loaded in the first place? I could understand the ... |
I'm developing a custom CSP and I want to use it from Adobe Reader but it is not very clear to me if it still needs to be signed because here there is a note:
"Starting with Windows 8, it is no longer a requirement that CSPs must
be signed."
So, it mustn't be signed, am I right?
I'm asking this because from a custom ... |
in our SaaS application we store different integration tokens from apps like Trello, Pivotal, Intercom etc, based on Oauth tokens, which we want to additionally (on top of the default database encryption at rest) symmetrically encrypt and decrypt using best practices. Given the criticality of the tokens (not cardholder... |
I am looking into TLS 1.3 implementations and am a little confused about what is being referenced in the HKDF functions. Specifically the last argument in the Dervice_Secret wrapper function. From RFC 8446:
PSK -> = Early Secret
|
+-----> Derive-Secret(., "ext binder" | "res binder", "")
... |
I have poisoned the target using Ettercap and redirected the traffic to my IP address. The question is, how to intercept and modify this traffic using burp suite or mitm proxy?
The only condition is, I cannot do any client-side modification. The target computer is also mine, but I have to prove to my manager, that I ha... |
Imagine server A calling server B over SSL and that both servers have SSL certificates installed.
Later server A again calls server B.
Is there a way for server B to know that server A is the same server in both calls without a client certificate?
In my application I issue a shared security token in the first call. But... |
Say I cloned a repo, then maybe worked on it a bit. Then I reverted/pushed all changes, so my friend has all the repo files. Is it safe for me to send him the .git folder? Is there any private information there, such as my username, my email, command history, or perhaps some secrets?
|
Are modern-day UAVs secured from Dos or DDos attacks? Most of the drones available in the markets are easily hackable with the help of Dos attacks be how secure the UAV-GS authentication is. Moreover, drones available in the market are vulnerable to jamming signals, thus stopping the entire communication. One interesti... |
Basically I am trying to bruteforce a MD5 hash in two systems using hashcat. The hash is between 3-8 characters in length. But when I attempt to split the password tries in hashcat, it throws below error
Use of --skip/--limit is not supported with --increment or mask files.
I have been playing around with hashcat for... |
Where are saved passwords stored if you login to a browser, so they sync whenever you login to that browser on another device. Where and how do Google, Firefox etc. save the passwords? Obviously its not on ones own computer if you have to login to get bookmarks, passwords etc. synced. What if fx. Firefoxs servers where... |
I signed into my bank's website and they demanded I change my username because it was found on the web--duh, it's my name and I've been online since the old BBS days. Huh? Since when are account names something to be protected?
The rules presented for usernames included that it couldn't be part of my e-mail. However... |
I need to open an excel file and see its contents which is locked with password. As I made some research on the internet, I have found that only way was a brute force attack. So I used John the Ripper on Ubuntu, and detected and extracted hash of the password, which I believe is encrypted in RC4 format, a format used f... |
How would one go about ensuring that a server at a given IP address is who it says it is? I need to send confidential data to another server at another IP address. If the server had a public domain it is clear that a SSL certificate would be the right solution, but is this also the case for IP addresses?
I control a sp... |
Problem:
On our client's ship, we have an expensive backup internet connection. We want the backup connection to only allow WhatsApp traffic. This way we won't be greeted with an extreme bill because someone downloaded some movies.
Our findings:
We have tested this with a Draytek and some Fortinet equipment. With Drayt... |
I'm learning about XSS and I found I can inject code in this tag a few days ago.
Tag:
<div id="pagenotfound" title='Cannot find /it/search/testtesttesttetst\'onload=alert(1)'>
My payload:
/testtesttesttetst'onload=alert(1)
URL:
/it/search//testtesttesttetst'onload=alert(1)
I have locked < > " & % and many more chara... |
According to man rm:
Overwrite regular files before deleting them. Files are
overwritten three times, first with the byte pattern 0xff,
then 0x00, and then 0xff again, before they are deleted.
How does this compare to the following (used to secure erase whole disk) from a data forensic perspective?
sudo dd bs=1M if=... |
I'm in the course of rescuing a legacy app that got left behind and turned out to be needed on rare occasions, one of which occurred yesterday. I need to rebuild some libraries and the libraries have a strict dependance on gcc > 6.0 which the server sadly lacked by a mile. So I went looking for a newer gcc and found mi... |
Today I noticed that Firefox 88.0 beta (on macOS) is rejecting TLS certificates for many Portuguese websites – including most government websites – with the error SEC_ERROR_UNKNOWN_ISSUER.
Example sites:
https://www.autenticacao.gov.pt/
https://www.portaldasfinancas.gov.pt/
https://www.ctt.pt/
These certificates all ... |
My friends and I have worked at various tech companies which required us to use a security key in order to login to our computers. Some of us had to physically "touch" the device to login, while some of us at other companies did not need to touch our key.
Does the addition of having to touch the security key add any ad... |
I have some queries regarding SSL certifcate chain. I have tried searching documents online, but none has mentioned clearly.
When a chain of trust is established, below would be how it works.
Domain certificate when issued by an intermediate CA, it will put in a signature value in the certificate that is created by has... |
I'm trying to solve a problem on format string exploitation in which I have to overwrite anything in a specific address. Since the target address has a null byte at the begining, I need to write it at the end of the format string, and I want to locate where the last 4 bytes of my format string are, so I just made some ... |
I have a website built with WordPress, unfortunately somebody hacked it several times, deleted my adsense code and put his own adsense.
I tried many security techniques, changed database name, did some stuff to prevent anybody from editing files through admin panel etc...
But this guy infiltrated and put his adsense co... |
Suppose there are three computers: (1) my laptop, (2) a server that has a public static IP address, and (3) a Raspberry Pi behind a NAT. I connect from (1) to (3) via (2) as explained below.
On the server (2), I add GatewayPorts yes to /etc/ssh/sshd-config, and restart the SSH daemon: sudo systemctl reload sshd.service... |
So I have a S3 static website. Domain, DNS and proxy is managed via Cloudflare. Cloudflare is set to communicate with browsers using SSL and it in fact enforces SSL for non-SSL requests. However, traffic between CF and S3 is http only, as S3 buckets don't support SSL on their own and i assume I'd have to remedy that us... |
(I try to understand different concepts regarding web development in general)
Most information I find is about Single Page Applications, but how does a dynamic site make use of (for example) OAuth2/tokens? Maybe we want the pages to be rendered server-side, but have many functions here and there that make use of Websoc... |
Let's say I want to make a messaging(just an example, take it as any data) web(react + node) application(more like an email rather than chat) with end-to-end encryption. So at some point, I will want to send an encrypted(with public key) message and the recipient will need to decrypt it(with private key). Now, say I wa... |
I want to build an SPA with ASP.NET Core (Blazor server side) which some IFrames redirecting to other applications. In this example I have f.e. the SPA, Grafana to show graphs and Node-Red, but there could be more in the future. To create a simple user flow I want the user to login only once in my SPA and then have acc... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.