instruction
stringlengths
24
29.9k
Decided to have a look at a list of "open" proxies. I've noticed that a good deal of these proxies are on residential IPs. One of the IPs, 68.188.59.198, is owned by Charter Communications and looks to be the IP of someone's house. It looks to have a few other random ports open, such as a VPN, telnet, and an additional...
Take an example of google maps. google maps provides a javascript client SDK, which means any web app running javascript can access the google maps sdk. You need to use an API_KEY so that google can rate limit your requests, and apply some quota on the requests coming from your api key. If you exceed the quota you woul...
A common multi factor authentication solution will ask a user for a username+password and a one-time password. In all documents I can find both factors are asked by the same identity provider. This can be the website itself or for example when it supports 'Login with Google' it can be Google who also asks for an OTP. O...
I was wondering that, when a hacker is trying to hack a Wi-Fi network, they would try to capture a handshake and then try to decrypt it, whereas when you want to log in to your Wi-Fi access point, you would type in your password, the password would be encrypted, and then sent to the router which would decrypt it using ...
I'm not sure if there is already a question here about this because I can't find anything. But I'm wondering if there are any "safer" ways to print sensitive information without leaving traces on the printer (sensitive data in caches, internal memory, etc.), or at least ways to reduce those traces. Suppose I need to pr...
When I first used this mouse and keyboard, my PC died shortly after. Today I used it and it somehow corrupted my Linux. I once put a clean Linux on a laptop and plugged this mouse in and left it, several times the laptop came out of sleep without being touched. I have suspicions that it's effectively a "rubberducky" an...
I have a 60-bit RSA public key and a file encrypted with it. Since RSA with keys under 256 bits should be crackable with even limited computational resources, is it possible to obtain the decrypted file?
I bought a Galaxy S20 Fe, logged my LastPass in it and all of my accounts (google, twitter, etc). Now it has a malfunction and I'm going to have to send it back to get my money back. When I factory reset an Android, I presume that it zeroes the memory in the writable partition of Android. This would explain why it take...
I'm the sole person who has access to this router. I turned uPnP off and have twice found it turned back on in recent weeks. The Router is Asus DSL-AC68U. I have a VPN running at the router level, installed about a month ago. I've recently updated the firmware on it too but after extensive searching neither of those sh...
I've been reading about how powerful frameworks such as Empire and Metasploit are but I'm confused about something. Say I gain access through a custom reverse-shell which I self-coded (so it bypasses AVs). Now, for privilege escalation, I want to have a meterpreter/Empire session. How can I do that if the payload gener...
Does current PCI code require SSH connections be restricted to enumerated (specific) client IP addresses on the unsecure, dirty side? Isn't that outside the scope of the PCI code?
I'm planning to add an "official" command line tool for developers to interact with our API. The tool is basically just a glorified curl client, interacting with the API via HTTPS exclusively. To make this convenient for developers, it should allow them to authorize the CLI using their existing user account, using an a...
What would be the recommended approach (industry standard) for generating a password for a Java keystore that contains TLS certificates? In the event that the keystore is obtained, an attacker would have unlimited time to brute force the password. Would a UUID be the best approach? What is the best way to easily genera...
I have some questions about CSRF protection, specifically about the "double submit cookie" pattern. What I have learned so far, is that this pattern has some weaknesses. But we can add some improvements to protect ourselves from them. Some of them are: Sign cookie Bind cookie to user Use custom HTTP header to send req...
I'm trying to intercept and decipher scripted code that is sent to a previously installed Windows application, after a user have clicked on a particular URL in their web browser which is somehow returning a MIME response that is intercepted by the Win app and processed as a script/program. The particular example of con...
I am learning about SQLi (SQL injection) and I know that the solution to avoid them is prepared statements. However, does this mean that without them we are sure that we can get hacked? Are prepared statements the only solution? I was thinking about that and I have decided to write a piece of code that I think is safe ...
Recently, stumbled upon the new FB 500m+ leak and decided to satisfy my curiosity and poke around. Basically just wanted to see how 500m+ user records were kept and what info was released( it was pretty much all publicly scrapable data with ocassional email address.) Curiosity satisfied, I guess. BUT.. what is this! Sl...
I am looking for alternatives, that are less strict and less time consuming, than ISO 27001. Australia is in the Commonwealth, so maybe Cyber Essentials Plus could work, but I do not know if that plays a part in it being recognized by the Australian Government. Any suggestions? Thanks!
Is there any remote FDE decryption that is resistant to an attacker that has local physical access? Tools like dracut-sshd need to store the private key used for the sshd server on the unencrypted boot partition, so a local attacker has the ability to become a MITM and sniff the decryption password. Can using a TPM to ...
I need to implement some hashing scheme for an open-source project. This is what I currently have and I'd like to hear whether this is secure enough - The password is hashed using PBKDF2-SHA256 (which I prefer over bcrypt simply because OpenSSL supports it natively) with 2048 iterations. The salt is actually a concaten...
I have a ROOT_CA and a subCA. The subCA issued a certificate for a website (CUPS1.local). Moreover I have Windows clients; the ROOT_CA is already installed as Trusted Root Certification Authorities. Validating the subCA works using openssl verify and also I can see it in Windows. I can also verfiy the certificate for C...
I am having some problems with understanding which types of host keys my SSH daemon actually provides or supports (stock debian buster, sshd 7.9.p1). From the manual (man sshd_config): HostKeyAlgorithms Specifies the host key algorithms that the server offers. The default for this option is: ec...
Suppose I have a password, say "thisIsThePassword". Then I have MD5 hashes of that password followed by an increasing numeric suffix: MD5("thisIsThePassword1") = c5c038617ea97315f137606c4123789e MD5("thisIsThePassword2") = 0a52caffe2e7904c832a257a406f903f MD5("thisIsThePassword3") = 06683298a9c3cdf8940518db54c43758 ......
I want to serve a Flask application from my pc. Other machines in my network only should be able to consume the API. However, I wish to have the communication between the other machines and the API secured using https with a self-signed certificate. For this reason (because serving Flask with waitress does not support ...
I am practicing in a website which is vulnerable to XSS so as to learn better this kind of attacks. I have managed to inject somewhere the usual <script>alert('XSS')</script> and it seems to work fine. Apart from that what else can I do? Could I for example completely deface the website? If so, how can I do that? Is it...
A company entrusts a Data Scientist with the mission of processing and valuing data for the research or treatment of events related to traces of computer attacks. I was wondering how would he get the train data. I guess he would need to exploit the logs of the different devices of the clients and use statistical, Machi...
I was looking at the installation instructions for VS Code today and found this step curious: sudo apt install apt-transport-https I see that there appears to be https transport available for apt: $ ls -1 /usr/lib/apt/methods cdrom copy file ftp gpgv http https mirror mirror+copy mirror+file mirror+ftp mirror+http mir...
I'm looking into setting up 2-factor authentication for my registered accounts. However, when setting up 2FA, for example Reddit, you need to write down backup codes in order to regain access to your account in case you lose your smartphone. I've already read this post. But the whole point of using password managers (y...
I have worked on many API integrations scenarios and I used 2 approaches to authenticate the API calls: Using API Keys For example inside Hubspot integration I use this web call to get all the accounts using API Key: https://api.hubapi.com/companies/v2/companies/paged?hapikey=**********&properties=website&properties=...
I'm trying to recreate a Watering hole SMB theft attack where you send a victim a link to your website containing code like file://ip/file.gif. Causing forced authentication which passes the NTLM hash. I have the code which executes the process (check reference links). But how can I retrieve/steal the NTLM hash back ov...
I'm trying to learn and solve some 'kernel related' ctf challenges (reading writups to try to run same environment and achieve root using one of the kernel-pwn technique...). I'm using Ubuntu 20 VM and (for example) this challenge: Unfortunately, only results I can see (no matter if I'm trying to solve mentioned challe...
Background information: I am not a computer scientist. However, in a research project I am currently building a ESP32-based sensor. Multiple sensors of this type are going to be used by multiple users. Every time a user wants to utilize a sensor, the sensor needs to get the WiFi credentials of this specific user so tha...
So, I am trying to add CSRF protection to my Next.js application. I have tried a development branch of the next-csrf library. I have a couple of questions though: The library saves the CSRF token as a cookie. Is this secure? Isn't it vulnerable to session hijacks? Shall I refresh the token in every page? If I choose t...
I am new to SSL certs and trying to understanding once the certificate is imported into the Certificate Store (in Windows), how do we associate the private key pair to the certificate? Is that by creating a pfx that would contain the certificate and private key and import that pfx into Certificate Store? We intent to u...
An application I admin (but did not develop or implement) claims to be storing passwords in a database using “reversible encryption.” I have access to the database table, and was able to work out that they’re really only obfuscated, and can determine the clear text values by applying a simple mapping. This seems very b...
I am fairly new to Kali Linux and Metasploitable and I am trying to set a keylogger for when I gain root access to Metasploitable. I have gained root access by using the use exploit/unix/irc/unreal_ircd_3281_backdoor (I followed everything from here) and have successfully penetrated Metasploitable. However, I am using...
Historically, we have learned that many security vulnerabilities and exploits have resulted from allowing document files to contain executable code, whether it be JavaScript, VBScript, another scripting language, or even macros. As such, since the first days that JavaScript could be embedded into PDF files, I have disa...
I am working as an intern for an online coding platform startup (similar to LeetCode or HackerRank). The backend is written in Nodejs. Instead of running the code in a sandbox of some sort, the lead dev decided to execute the submitted code using a child process spawned from the main process, which is serving the web p...
Today I received some e-mail to Thunderbird. It had image attached that I clicked: Which sent me to onedrive.live.com/download?... and automatically downloaded .tgz file. I am not even sure if the file was really .tgz or it was fake extension. I didn't open the file, but Windows still made some preview inside download...
I am currently looking at the logs of my server and it is currently targeted by an IP address in the Netherlands performing requests to routes such as /X.tar.gz, where they increment X from a to z and 0 to 9. The same happens without the gz extension. I don't serve such content and all of these requests are actually re...
In the diagram below, I have two options for authenticating into a protected resource. Both options use an Identity & Access Management (IDM) tool (in this case keycloak) to store credentials and present as a JWT once properly authenticated. The only real difference between both methods is where the IDM (keycloak) sits...
As far as I have understood it: An explicit proxy challenges the user/application within his session. NGFW (transparent proxy) and SSO/identity-based solutions are just letting everything pass that is using the current IP address of the user. I agree the latter is flexible with regard to roaming users (VPN, Wifi and ...
I am using my computer, but am connected to my work's WiFi. Can my company see what websites I visit when am using Tor browser?
Let's say I have two kind of files on my Windows desktop - first are files that can be published and shared with other people, second kind is confidential and should remain private. To share files I compress them with Peazip. I am a bit paranoid of software bug that would cause other files to be added to archive (I rea...
Are there any advanced security technologies, for example, establishing a secured connection, which first require authentication based on security through organic-like changing obscurity of secrecy? I'm not a fan of "regular" security through obscurity, because hackers will eventually discover and bypass the vulnerabil...
When I go to https://www.google.com/chrome/, I get redirected to sign in and then forwarded to some app engine link as can be seen in the continue parameter of the following URL: https[:]//accounts[.]google[.]com/ServiceLogin/webreauth?service=ah&passive=true&continue=https%3A%2F%2Fuc.appengine[.]google[.]com%2F_ah%2Fc...
I am reading on https://tryhackme.com/room/introtonetworking, it is talking about OSI model. It said that Data Link layer trailer can increase security as the data can't be intercepted and tampered. How can it do it?. If it is because of the trailer added in at the end of the data, what stops a man-in-the-middle from c...
Something about the flow of setting up 2-factor authentication is not clear to me. This is the flow of setting up a Service* to use a 2-factor auth app**: Choose setup 2-factor auth in the account security section. This shows up with a long key. This key is copied and entered when adding a service account in a 2-fact...
There's lots of "SMB is bad" parrotting online, and whenever I look closely, these claims are either unsubstantiated, or apply to unpached or misconfigured Windows servers or old versions of the SMB protocol. If I put stuff like this in my smb.conf server min protocol = SMB3 smb encrypt = required tls cafile = /letsenc...
We host our web application on a VPS, I maintain LAMP environment there to fulfill our client needs (I work on relatively small SaaS service provider), I also set up a script to backup the system regularly at night. Our company had just upgraded all of our Linux VPS to specification of 5gb ram, 5 vcpu, 100gb ssd, etc.,...
I'm having a hard time knowing whether the following setup is vulnerable to CRIME/BREACH type attacks (which target HTTPS). I am running a Wireguard VPN that tunnels VXLAN protocol, using ChachaPoly20 encryption. I would like to add CPU cheap compression (LZ4) on the VXLAN frames (RFC3173 likewise). Would the fact that...
I am trying to understand the mechanics of webpack's chunk loading. From what I understand, chunks are appended to DOM via javascript document.createElement("script") with script's src attribute set to URL of the chunk script. So my question is - how safe is it to append a script tag at runtime and let it execute. What...
I got a mail from my professor this morning with a request.zip file attached and a password in the mail to open it. Since the mail was from my professor and he already did send me zip attachments I didn't think about it and opened it, but it ended being a strange word document. Later he wrote the whole team a mail that...
I'm implementing dh-ietf1024-sha256-aes128-cbc-pkcs7 in golang and according to documentation I've managed to create the 128-bit key appropriate for AES (from my 1024-bit shared-key computed from my private key and clients public key). API function input is just algorithm name and client public key. And for using AES I...
We have desktop software that we install and run on remote, unattended machines. The software needs to hit API endpoints on our server. What is the best way to secure those endpoints to ensure that only our software can call them? We may or may not have admin rights to that machine. Others (staff or 3rd party individu...
Part of a box I'm doing, I can successfully pass basic SQL query 'or'1'='1 with no errors, {"search":"'or'1'='1"} Output: HTTP/1.0 200 OK Trying to error the query {"search":"'"} Output: (successful) HTTP/1.0 500 INTERNAL SERVER ERROR Using SQLMap with --risk=3 --level=5 won't do as the server immediately blocks a...
I am trying to delete a certificate and it's private key using certutil -csp "Microsoft Enhanced Cryptographic Provider v1.0" -delkey "the key container". This gave me a command completed successfully message. I then check what is in the store again with certutil -store, this still lists the certificate. When i then t...
I found a Instagram Basic Display API access token leaked in a website. This token belongs to a Instagram marketing account of this website. Using my leet investigating skill, below are the information i have. This token has 3 months valid period This token is in use (i see it's refreshed last week when its valid peri...
I've just started new project and decide to try something new, so I'am not using anymore EnityFramework and Identity framework. I Decide to try MongoDB, so i wanted to design from scratch storing Users in database. In database I'am going to store password and salt. My salt generator looks like this: internal class Salt...
I'm trying to understand how Kerberos works, in particular how the initial client sends a request to the Access Server. Some YouTube videos I've seen say the initial request is partially encrypted using the client's password. First, what is meant by "partially" encrypted? Second, considering a password is just an arbit...
A website exposes this function: https://test.com/getSessionCookie When an authenticated user clicks on it he gets an html page with his cookie. Could be this exploited in some ways?
I had two copies of a Veracrypt encrypted drive, and from them, I made two additional copies of the drive, which was a few days ago. the two copies had the exact same SHA hashes of the original two copies when they were created, the data should be the same and with no data loss. Both copies worked and mounted perfectly...
I know that forward proxy can enhance security by replacing client IP's address with proxy server IP address. So, the web server or anyone else cannot identify the client identity who's requesting a website. However, can the reverse proxy do the same thing? Can it somehow hide the IP address of the web server? I read s...
I have a need to to create and attach a script tag to DOM at runtime. The script is a remote webpack bundle (via a Module Federation plugin). I would like to be able to change the URL to that hosted remote bundle at runtime (for A/B testing and debugging purposes). This is my own code, and I trust it as far as not hav...
In summary: the idea behind password cracking is just to replicate the password validation procedure of a web server locally with lots and lots of attempts and check whether the output of that verification matches any known leaked hash. However this kind of attack is only possible if the procedure by which the webserve...
In theory, visiting a website with HTTPS and seeing the neat, little lock icon next to the address (e.g.: ) should give us a warm, cozy feeling of safety. However, how safe is it really? As it stands, HTTPS (if implemented correctly), can prevent man-in-the-middle attacks, so that no one knows what is exchanged between...
I'm a newbie in emv world. I'm trying to follow this flow: I'm in the third step. I have to manage the Offline Data Authentication. How can I negotiate the correct way (SDA, DDA or CDA) with the ICC to perform offline auth?
I want to check if I can steal my own ProtonMail cookies. I connect to my account, I delete the cookie named AUTH-x12334xxxaazzzrf6567788ddd (cookie name is randomized name). I refresh the page and as expected, I am disconnected. It means that cookie AUTH-xxxx... is a session cookie. I connect again; I have a new cooki...
I have been experimenting NTLM and its different relay mitigations, including MIC and channel bindings. In my understanding: NTLM auth starts with a negotiation packet sent by the client. In this negotiation packet, the client describes which versions it supports. According to that, the server chooses which version to...
I understand that SYN flood is effective due to how protocol works, waiting around 75 seconds before closing the connection. What about ACK flood, what does it happen on the destination side that makes this attack effective (hypothetically) ?
I have a SQLite Query, which is something like: SELECT id FROM demo WHERE name="insertname". In this case, double-quotes are disabled, which means that insertname cannot contain double-quotes. Is there a way to somehow bypass the double-quote filter?
For the usual reasons we want to cache certain resources browser side, e.g. list of products bought in the past. Context is a web application, accessed via the internet. This list is confidential in my case, and I want to mitigate the case where an attacker get physical access to the (os password locked) machine or to ...
I am completely satisfied with Veracrypt except for one thing. If you open a Veracrypt volume, write something there or deleting. And then you use unsafe shutdown (for example, using the RESET button on PC. Or at the moment when the electricity was turned off in the apartment. Or pulled out the flash drive with volume ...
Is it secure enough to use the SSL certificate used for public website, for encrypting the AspNet Core Data Protections Keys persisted to Redis? Or must I use a separate certificate just for this purpose? Code: X509Certificate2 certificate = GetCertificate(); // Returns website's SSL pfx cert ConnectionMultiplexer red...
I'm under the understanding that in 2019, Chrome and Firefox both planned to move to SameSite=lax default for all unspecified cookies. In addition, recently, Chrome decided to set defaults based on other information such as the 'secure' flag, and whether or not communications were sent over HTTPS. My understanding is t...
A few months ago I reset my Windows password but my keyboard must have had a sticky key or two, effectively changing my password to an unknown password. Out of desperation and a little research I used PCUnlocker to forcefully reset my password. Little did I know that this would cause my EFS encrypted files to be unread...
Some website asked for the verification of my identity to make a purchase of online goods. I didn't think twice and send them a picture of both sides of my country's ID (not USA) and a selfie holding it to the website asked to submit. When I went to the FAQ I noticed something was wrong with the website https://validmy...
I have two systems, one running a C environment on a RTOS and another a python program running on a Pi. I need to generate an encryption key using ECDH between these two systems for symmetric encryption. On the C Side, I am using https://github.com/kokke/tiny-ECDH-c and on the Pi side I am using the Crypto library from...
NIST and OWASP ASVS recommends checking passwords against those obtained from previous data breaches. The list of such passwords can be downloaded from "Have I Been Pwned" (https://haveibeenpwned.com/Passwords), but there are more than 300 million pwned passwords. Do you recommend comparing users' passwords (during reg...
The W3C working group is working on the standardization of Decentralized Identifiers (DIDs). I watched a video presentation about DIDs and the presenter mentioned several times the possibility of generating unique pseudonymous identities for each relationship for better privacy. This is something that is also mentioned...
We have a need to check the arrival time of two relative packets, like packet1 and packet2, if packet2 arrives too late after packet1, we want an alert for it. Is it possible to write a rule for this? I go through the suricata's doc and feel like it's possible to do so, but I could not figure out how to get the arrival...
So this approach seems to be rather popular, particularly among payment processors that provide javascript integrations. The added layer of security that "fields in iframe" brings also supposedly reduces the level of PCI compliance required. Verygoodsecurity, a tokenization service that also offers forms for sensitive ...
I've got a third party service that I want to integrate with various other websites/applications, the third party service says they support this however rather than using an API key or OAuth to provide this they require you enter your username and password for the website you wish to integrate them with, they say they ...
I´m trying to brute force attack a WPA2 Network with Hashcat and a wpa2.hccpax file, but when I do it says that it can take 45years to brute force it. So I had the idea that probably the network I´m trying to brute force has 2 probable words that the password may include, but I don't know where or the order of them. I´...
Am I correct in assuming that setting the 'access-control-allow-credentials True' header, even if you are not including the 'access-control-allow-origin' header is potentially dangerous for a website? My thought here being it still allows attackers to submit requests cross-origin with the creds included, but simply doe...
I just installed Firefox browser, while I have previously used Google Chrome as my main browser. I am using Windows 10. During the installation and setup process for Firefox, I was given the option to migrate over my data from Chrome, including usernames and passwords. This process completed quickly, and I was then abl...
I am practicing some XSS on a vulnerable apache2 web application and having some issues getting the user's cookie information. I am following the instructions in this Lab for the XSS Attack. We are given a malicious webpage: <html> <head> <h2>This page has malicious links</h2> </head> <body> First look at this one. Thi...
I have these two LFI filters and i want to bypass them $bad = str_replace('../','',$_GET['bad']); while( substr_count($bad, '../', 0)) { $bad = str_replace('../', '', $bad); }; include("./".$bad); I tried various ways and i was not able to bypass them, also the php wrappers ...
If SPF is verifying against a set of IP records if the incoming email from a domain was sent from an authorized host piggybacking on the DNS and DKIM does touch the signature of the email and calculate another one based on DNS public key record and if signatures matches, the mail is flagged as authentic from the expect...
If I use MD5 but not for cryptography purposes, and not for any authentication or authorization mechanism, Am I in violation of FedRamp Moderate?
When I use my ISP's DNS servers and I am connected via OpenVPN the DNS trafic will not bounce through the VPN tunnel. When I use others' DNS servers will my DNS traffic bounce through the VPN encrypted tunel?
From this answer I understand that seccomp-bpf filters the list of syscalls a process can call. Similarly, the capabilites mechanism will cause a syscall to fail if the caller does not have the capability necessary for that syscall. What I want to understand if there are scenarios in which one mechanism is more powerfu...
After having captured multiple packets with repeated IVs you can perform cipher1 XOR cipher2 which is the same as having cleartext1 XOR cleartext2, and performing cipher1 XOR cleartext1 gives you the keystream... but how can you separate those XORed clear text messages (cleartext1 XOR cleartext2)?
I've just received a scam SMS with that invite me to click on a link to check a delivery. Since I was curious about where it could lead, I opened a VM and set up a VPN, then clicked on the link. After different redirects I ended up on Google. So I'm wondering about the aim of this scam SMS. Here there the HTTP response...
Say we have multiple instances of application X deployed on site1.com, site2.com, site3.com, etc. And we have a centralized server at example.com serving all of these. All the instances of X are static sites, that is, they do not have a server, and thus, they can't proxy requests to endpoints. Traditionally, in a same-...
Mailed-by: gaia.bounces.google.com Sign.google.com Security: Standard encryption (TLC). So this is a legitimate email from Google. Will this email immediately be sent if someone (who isn’t supposed to) signs into the gmail account? Can Google send this email to warn you that someone else uses the same password? If so...
When I am at home taking an online exam through my school website (they use Blackbaud which allows teachers to set up assessments through a website), on my personal laptop, can that school website see other documents or other apps? I received an embarrassing text message during an exam and I'm wondering how much my tea...
While a hard drive is decrypted on boot up, can the original phrase be intercepted at some comparison calculation step by a specially built CPU or is there some higher math involved? This would be blatant, so I guess not. But would like to make sure and I'm curious how it works indeed.
I have an https website and I want to let other websites embed one of the pages on my website that lets users of my service log in and submit a form, similar to Paypal's payment iframe or Plaid's Link. Many such services exist, and from what I have found they all seem to be using iframes. Of course, I have heard of vul...
I have noticed that Gmail is not encrypting the mails send from an id to the same id (When From address and To/Cc address are same). Is encryption really required in the above scenario? Necessity of other security protocols check? Background : I could not find the encryption details in the tag security: Standard encr...