instruction stringlengths 24 29.9k |
|---|
The traditional login page has two fields: username and password. But some sites, notably Google and Amazon, first ask for the username and only later provide a password field, placing each field on its own page. Is this design choice motivated by a security point of view? If so, why is that?
|
I have a laptop with the system disk encrypted by Bitlocker. Bitlocker is configured to require a pre-boot pin, and unlocks by TPM. The recovery key is required to unlock and is not available atm. The recovery key should be stored in the TPM though. I would like to try a recovery of the keys from the TPM through a cold... |
I am installing the Twitch app, and a firewall warning popped up asking that I give permissions to use the app via private and/or public networks.
I am a security newbie but a bit paranoid and wonder what are the risks of allowing the app to run freely with a firewall exception.
|
In the past I have dealt with security issues related to Default Service Banners/Verbose Headers/Information Leakage via HttpResponse Headers. These issues are quite common, and usually look something like this for an Asp.Net - IIS Server.
Server: Microsoft-IIS/10.0
X-AspNet-Version: 4.0.30319
X-Powered-By: ASP.NET... |
This mail that got through has me stumped. It appeared to me as being from PayPal <unclaimedproperty@paypal.com> in my Inbox. I happened to look at the original and it says SPF, DKIM and DMARC all passed.
If I'm reading this right, 74.112.67.243 connected to mail2550.paypal-notification.com and sent the mail. They u... |
I want to send someone an offline app (but would be streamed online by other app like OBS) to use, while wanting to show him that his PC won't be infected (or similar) by that app.
App will rely on some external libraries (seemingly all from trusted sources) and will use mic and camera.
How to approach this so that rec... |
For my web app, I hardcode a reverse DNS detection for common web crawlers. And for detecting them I use their Reverse DNS, which I always check whether it includes i.e. google.com. My questions would be:
Can this be a possible security flaw, because a subsubdomain could be just named googlebot.com.malicious.bot?
Can ... |
I use Cloudflare's Warp VPN all the time for regular browsing and yet I recently found that Patreon can tell the country I'm physically located in. It baffled me how it could do so; Patreon could tell the country on multiple browsers, across Windows and Android devices as well, all the while I opened it in incognito/pr... |
Let's say you have an account on a social media site (e.g. Twitter). You set up a fake identity on that site (used a separate email address to sign up, not using your real name etc).
Now let's say you are logged into another site (e.g. news-site.com) as your true identity and that site posts on the social media site. Y... |
I know that ring 0 is a CPU concept, but are processes running as root allowed to run instructions that require ring 0 such as changing the cr3 register for the page table ?
|
I'm looking for ways to further protect my web app against supply chain attacks.
Attacks focusing on supply chain have been increased a lot recently. NIST is working on a recommendation, following the May 2021 Executive Order, and questions about this have already been asked here (How does one defend against software s... |
I was wondering something about a day ago when I remembered that Apple stores notes in a database (so you can recover them or view them on icloud.com) - What if Apple stores your notes in plaintext?
I've heard you shouldn't store passwords in plaintext (e.g., a MySQL DB) so is it the same with storing passwords in note... |
If a virus added itself to windows defender exclusions, it will never be scanned.
However would windows defender still remove its startup registry keys and scheduled tasks?
Windows defender is the only antivirus allowing exclusions to be added in such a simple way through powershell and i see it as a big issue. If it r... |
Wonder if secure boot can protect my computer from usb drives with infected firmware after Debian os is booted ?
|
In my current project i have few ESP32's connected to server over TCP.
These ESP's are distributed across a range of 300 meters.
Once per hour server requests (randomly) selected ESP's to beacon a frame over the air.
These are called "BEACONERS"
At the same time, server requests few other (randomly) selected ESP's t... |
I have a video file on my Drive which is very old but I am not sure whether it's infected or not. Is it safe to view this MP4 on Google Drive (no downloading only viewing it in the Drive app)?
|
I need to decrypt a password. I have the ciphertext for this
however, I have many plain text and encrypted equivalents.
This device can only be given passwords with a maximum of 8 characters from the 0123456789abcdef alphabet, and it can be less than 8.
The default password is 12345678 and this is the encrypted equival... |
If I started with “password”, then change it to “password2”, “password3” etc, is that easier to crack the hashes of the set of passwords than if I used only the original password?
Does having the output of hash(password1), hash(password2), etc. make it easier to crack the complete set than having only hash(password)?
|
I routinely access www.email-provider-of-my-choice.com via browser over Tor. My browser enforces https-only mode and I opt for never saving my credentials with this provider. I tend to use the domain address and not the Tor address of my email provider.
Most of the time I access the internet via router which I control... |
I have been looking at risk assessments lately and I am looking for a way to practically estimate likelihood. Most people recommend assessing based on historical precedent which sounds great to me, however some risks have never materialized at my company but currently still seem pretty likely.
Does anyone have any advi... |
I'm building an app that uses Braintree for processing payments. According to the documentation, I need a server-side endpoint that returns the clientToken, which is then used to manage a user's vault and process payments, so I'm trying to make sure I understand the security implications of exposing this token but I ca... |
If I have a security key (U2F key) like yubikey and use it on websites A and B and the owner of these two websites is the same, can the website owner know that I am the same user?
|
I'm writing a canary for monitoring which will be deployed to the same host as the monitored application. The underlying application validates certificates for incoming requests and validates that the cn is coming from a specific domain.
The easiest way around for me is to skip cert validation if the host is localhost ... |
I need to set up a small network as shown below. Is it really required that the "switch should also host a firewall" when all the communication between the "computers" is over TLS?
|
Background information:
I have a client application that communicates with a server through a web API.
The data being communicated is not personally sensitive (no passwords, credit card details, usernames, etc). It's just challenge/response queries between client/server related to client license information (serial key... |
Linus mentioned in 2009 that "Signing each commit is totally stupid".
Has the common view evolved on this subject since then ? Doesn't it protect against someone usurping your identity to commit something into your git repo ?
Thanks
|
I have recently added 2FA for my Google account using an authenticator installed on my mobile phone. After doing this, I have realized that it would be nice to also have the authenticator installed in a backup phone.
However, it was not possible to simply enable another authenticator. The only way was to remove the aut... |
I was learning about TLS 1.3 recently, and I was wondering if there are any reasons not to use it. (Rather stay at TLS 1.2). Are there are any factors that refrain users or products from making the change?
|
Question: It appears that somebody can intercept and read emails that I send from my server, although
I have set up 2-Factor authentification for sudo-access
I log all logins on my server (Did not notice anything suspicious)
Emails sent from my server are encrypted
More context:
When a user registers on my website, ... |
An application uses RSA to encrypt small texts before persisting in database, using public key of the end node of the application. Only these end nodes must be able to decrypt thge ciphers and only they have the corresponding private key. Size of plain texts to be encrypted is way smaller than the RSA keys.
Keys are st... |
I’ve seen estimations that the NSA is capable of at least 1 trillion (PGP pass phrase) guesses per second, which would mean a password with 80 bits of entropy would take, on average, over 15,000 years to guess. However, this estimation was from 2015 and almost definitely outdated. How many bits of entropy is secure tod... |
I am researching information regarding locker ransomware. I did a search for "Locker ransomware github". I clicked on the link in GitHub and found the link to view code and clicked that link and Symantec endpoint detected the file as Ransom.Locky.. two files as Ransom.Locky.
I have disconnected the WiFi and network. I ... |
I've read a lot of advice against storing your 2FA codes in your password manager and I don't understand why. Isn't a file on your computer something you have?
There is the added benefit that you don't have to worry about losing your phone or yubikey so long as you keep multiple backups of your encrypted password datab... |
Let's say I visited a malicious website and it downloaded malware that registered my phone to a C&C server
And after realizing what happened I uninstalled the malware from my device
Will my phone be disconnected from the server? And if not how do I as a normal user with no special software or a decent firewall block th... |
When thinking of encrypting a file (also how I implemented it in a program of mine), I think of getting the data of a file, encrypting it, and writing it back into the file (overwriting the file).
But actually, is that the usual way of encrypting a file?
Since when securely deleting files, there is also the option to o... |
I was learning to use wireshark when I noticed that opening a reddit url (reddit.com/r/privacy) sent a GET request for r/privacy over HTTP. Is this visible to the ISP or network sniffers? I was under the impression that anything after the hostname on an HTTPS site goes over TLS.
No. Time Source ... |
https://goteleport.com/blog/how-to-ssh-properly/ I'm following this guide on setting up SSH certificates, and it says to NOT put a passphrase on keys, or that it's "my choice" whether to do so.
I don't understand the ramifications of a machine getting hacked when using SSH certificates. Is it really unnecessary to encr... |
As per Bitwarden's FAQ
If you don’t have your Recovery Code saved somewhere outside of your Vault, there is unfortunately no way for the team to recover the account or data therein. You’ll need to delete your account and start a new one.
I understand that losing the master password renders the data encrypted with it ... |
I have a client who does payroll and taxes and is looking for a web app to easily communicate and transfer tax related documents for clients. I would assume that the IRS or someone would have some standard on how this type of data should be handled. I haven't been able to find any good information on the subject and I ... |
One can simply add exceptions to the Windows Defender by running this command in Powershell:
Add-MpPreference -ExclusionPath <your_path>
Why does Windows Defender not immediately flag programs that run such commands? Most processes that do this should have malicious intentions, right?
Malware authors can simply code a... |
I decided to implement "forgotten password" functionality, without having to create a website just for that. The usual workflow that I've seen for any app is:
User requests password reset
Link is sent to their email with a token embedded in URL
They click the link which redirects them to a website, where they change t... |
I am trying to find an XSS in website protected by Cloudflare. I use Burp to find which HTML tags allowed.
Only the <script/> is tag disallowed. I tested multiple payloads to pass the WAF and this one is not blocked:
<img src=ddd onerror=alert%26%230000000040"1")>
The payload is inserted inside a <li> HTML tag (li... |
I'm sending emails via the Ionos mail servers.
I've got spf set up, but dmarc still fails.
This seems related to: Why is DMARC failing when SPF and DKIM are passing?
But I can't figure out how to fix it.
My dns records:
TXT @ "v=spf1 include:_spf.perfora.net include:_spf.kundenserver.de ~all"
TXT _dmarc "v=DMARC1... |
Various versions of Spectre, Meltdown, Foreshadow and ZombieLoad make it quite the jungle trip to navigate which CPUs are affected, how to mitigate them.
Right now, my problem is that I need a new computer but I want to make sure that I buy the most secure CPU available.
Let's say I don't care at all about performance,... |
Is it possible that clicking a link would hack a device?
For example:
injecting a malicious code into the device directly from the link's host website
connecting to the device remotely in a way through its internet connection
And how to protect a device from them?
|
This is similar to Is this Google mail from gaia.bounces.google.com legit?, except a) I have nothing in my life related to the language used (Indonesian), b) these are different notifications (and more than one: an account recovery notif., and then a password change notif. (came twice, might also happen with legit ones... |
Based on my research the best USB device can do is to trick the OS believing its device type A while it is device type B.
However it can never auto install a custom driver or auto execute a program/command when plugged in given that auto play is turned off (which is the default for Windows 10/11)
Now comes the interest... |
Does the yum package manager in CentOS/RHEL-based systems require successful cryptographic authentication and integrity validation for all packages?
I know that software downloaded with apt-get packages must be cryptographically verified because the repo's manifest files (synced with apt-get update) are cryptographical... |
I received a suspicious looking SMS today with a link.
I checked out the page source code and came across this script between the <head> tags:
<script async="" src="/cdn-cgi/challenge-platform/h/b/scripts/invisible.js"></script>
Followed by this Javascript before the closing </body> tag:
<script type="text/javascript"... |
Usually, when a file is deleted on your computer, it is simply unlinked. The file data is still stored on your disk, there's just nothing pointing to that spot in the memory, and the OS interprets that block of mem as free and open to be overwritten. Using VM, you are able to partition a portion of your HD dedicated ... |
I was practicing stack buffer exploitation on a well known application
I was able to bypass canaries, ASLR and nx bit with techniques easily found on the internet
However it has fortify-source enabled which checks that strcpy does not copy more than the buffer size, (the size of the buffer is compile-time known)
Is it ... |
I’m trying to find the correct forum for this question, so if not here, please suggest an alternative.
I notice a number of web sites now log in users in two steps: one for the username/email address, and the next for the password. In the past, both would be on the same form.
I’m not talking about two-factor authentica... |
Let's suppose i lend my new macbook to a (dishonest) friend.
This is a new fresh macbook, just unboxed.
My friend does what ever he wants on this macbook.
One month later, he gives me back the macbook.
I want to work with this macbook and i will store confidential documents on it.
So i decide to re-install mac os befor... |
I've been seeing a few false positives from our AV Carbon Black pertaining to wordpad (wordpad.exe) use.
The alert I'd see is The application wordpad.exe injected code into another process. Upon doing some research, I didn't find anything malicious in the activity. In this case it was someone uploading a doc (confirmed... |
I've looked extensively for a duplicate question, but I couldn't find anything that answers this question exactly.
I have a SQL Server that will be used to store data for a multi-tenant application. Every tenant will have their own database, and there will be a central database for managing logins, authentication, etc.... |
I am trying to detect the presence of a blind/stored XSS vulnerability of an input field. The vulnerability does not trigger on page 'A' where the payload is injected.
It is likely due to the fact that the vulnerable field stores the value somewhere else which
would only trigger the payload on another page e.g. page 'B... |
Suppose a company wants to implement 2FA for it's users using phone number OTP system, but does not really want to store their phone numbers as it could get breached and phone numbers are considered private.
What they intend to do is store some kind of hash of the phone number. When user logs in, they provide their ori... |
Normally if I insert values to an HTML form's input field element via the JavaScript value property and would send the form, the form would be sent just fine, just as if I would fill in the data manually by typing/pasting.
document.querySelector("#prcf_input_name").value = "X";
But, I have a scenario (in a website I d... |
I face a CSP header something like this -
default-src https:; font-src https: data:; img-src https: data:; script-src https: 'unsafe-inline' 'unsafe-eval'; style-src https: 'unsafe-inline';
So is this is secure implementation?
This includes https: so should I consider that https://anyurlallowed?
|
I'm creating a subscription-based desktop application, but there is no authentication on the platform as the "user" is the computer upon which the application is installed. This means no user sign up nor login.
I thought of an external website that did the following:
User goes to purchase a subscription.
A session is ... |
When performing a factory reset on Android devices, it is my understanding that the pointers to the data located in the SD card are simply erased while the data itself remains intact, waiting for future overwriting.
However, I have recently come across the concept of "wear levelling" in the context of SSDs which means ... |
I've seen some similar questions but maybe not exactly what I'm asking. Also I can't say that I've followed all the technical jargon in previous posts and am really after more of an intuitive understanding.
So let's say I'm allowed ten characters. The usual requirement is to use numbers, symbols, etc. But why is #^Afx3... |
Is there an application to create an archive (e.g. 7z, zip, rar, etc) that can be accessed with multiple valid passwords?
For example the password protected archive "example.7z" can be extracted using either "Passw0rd", "Passw1rd" or "Passw2rd".
When trying to create the archive with 7zip:
"C:\Program Files\7-Zip\7z.ex... |
I would like to know what encryption 1Password uses.
On the About the 1Password security model page, it says:
Your 1Password data is kept safe by AES-GCM-256 authenticated encryption. The data you entrust to 1Password is effectively impossible to decrypt.
But on the OPVault design page, it says:
The data – excluding... |
For work and other official matters, I am often forced to use websites and apps which clearly have some kind of cargo cult going on in their security department, given that they impose extremely foolish requirements on passwords:
Character requirements like "at least one number, at least uppercase, at least one lowerc... |
From what I know about QES, they come on smart cards and USB tokens and are password protected. When a site asks you for a client certificate, you need to have it plugged in and enter the password when prompted. Same when a desktop app tries signing a document.
Products like Adobe Sign say you don't need to hassle with... |
I'm designing a password vault that's accessible to clients through an existing web application. The clients are small, (and mostly non-technical) businesses that aren't using password managers, but are using this existing application that the password vault will be added to. The goal of this (sub-)system is to securel... |
I downloaded a crack file today, Idk why I thought its safe to run, now my pc is infected.
I already used Tronscript, kaspersky and hitman
what else do you guys suggest me to do?
thanks in advance.
VirusTotal: https://www.virustotal.com/gui/file/5fd3f17ef98f898595c8add5e11f193b577085e344d00527312e33a3ed56e29a
|
I am working on security analysis of jwt python libraries. I want to analyze how the libraries work and how they were used in development. Not the source code. Also I have to check the jwt libraries against known attacks like:
None algorithm
RS256 to HS256 key confusion attack
Weak symmetric keys
Incorrect composit... |
Suppose the UEFI BIOS is infected. The storage device is encrypted, there is no network access to the system, and RAM is encrypted. Is there any writable storage that an infected UEFI can write to where it can store the screenshots that it had recorded?
|
(note: VS Code is just an example, question is not specific to VS Code)
I would like to use Windows Credential Manager's generic credentials, say store git passwords when using VS Code, so I have not forced to retype them every occasion when I start VS Code and execute repository operations.
VC Code supports this via u... |
I've got several C++ and Python scripts containing proprietary algorithms, which are latency-sensitive and hence need to be on a system near the data center serving data to them. While a VPS is economical, I worry that the administrators may snoop. Perhaps a dedicated server (esp colocated in the data center) which I d... |
I have heard that "Security by Obscurity" is bad. And I have always agreed with it.
But today I had a coworker disagree when in consideration of links. He was arguing that a link with obscure values in it is as good as a password and is more convenient than needing a custom login. (More than just a Guid, he was argu... |
Is it possible to inject javascript inside of an HTML option tag?
For example, say you have the following html:
<select>
<option MALISCIOUS_CODE_HERE>Option Description</option>
</select>
If you were unable to break out of the tag itself, are there any attributes which would allow you to run javascript (or any oth... |
I'd like to implement a RESTful API service over HTTP that developers can call from their server side environments.
I intend to use a cryptographically secure pseudo-random number generator (CSPRNG) to generate keys and then convert the bits to a text-friendly encoding format (say base58). e.g. a random 256-bit number ... |
If a malicious user creates a tor bridge, does that compromise the entire connection?
I don't think so, because I thought they have to control both the entry and exit nodes. However, my friend is saying that it does but I'm unsure why
|
Have have four name servers that control many other domains:
ns1.domain-name-our-brand-example.com
ns2.domain-name-our-brand-example.com
ns3.domain-name-our-brand-example.com
ns4.domain-name-our-brand-example.com
We want to improve the security and redundancy of this setup. We also want the ability to white label the ... |
Blocking inbound TCP segments with ACK=0
Blocking inbound TCP segments with SYN=1
Both prevent external clients from making TCP connections to internal clients, but allow internal clients to connect to outside. How?
This came across to me while I am studying firewalls. How do these work and how do they conclude the i... |
Signing your applications with an OV code signing certificate enables them to build reputation together in Microsoft SmartScreen, rather than each binary building reputation separately. This allows developers to publish updated binaries without having to re-build reputation from scratch.
When you renew an OV certificat... |
I have been tasked with reviewing the settings of an SSH server, I'm currently trying to figure out what are the best practices, and I'm having a bit of trouble finding a good answer. I keep finding a lot of information related to web servers, but I don't know if that fully applies here.
These are the currently enabled... |
I recently bought a new laptop from a third-party seller on new egg. The seller states that it is "upgraded": "*We sell computers with upgraded configurations. If the computer has been modified (as listed above), then the manufacturer box was opened for testing and inspection and to install the upgrades according to th... |
I was reading this pdf and at slide number 23 and 24 I read "injected interception". What's that means ?
in my mind it should be a type of interception that are made by injection. I mean I inject something (for example an image) in a data stream that help me in decryption and interception.
My question is: what's mean "... |
It seems 64 bits adresses must end in two null bytes. But strcpy will copy only one null byte in the entire payload.
|
I have been trying to understand how CSRF tokens work and from my research, it looks like it is common for the server to provide both a CSRF cookie and a token to the end user. The user then returns it with the subsequent request and the server is able to validate the CSRF token against the CSRF cookie (by way of MAC).... |
I need to write a Python script to occasionally encrypt some small text files (~10 Kb)
in order to store them in an insecure environment.
Each file will be encrypted via unique symmetric key and AES 256 CTR cipher.
The key and CTR nonce will then be encrypted via RSA key and appended to the
encrypted file.
Could you pl... |
I recently signed into an account on a website using my Google account. I already have an username+password account on the website, where I have also enabled 2FA with a TOTP code. Upon signing in with my Google account, I noticed I wasn't prompted for my TOTP code (the website's - not for Google).
If I log in using my ... |
This question is about how efficient it is to bruteforce SASL authentication in the XMPP protocol.
I read the XMPP SASL authentication steps (stackoverflow link in case the first one breaks), and reimplemented a script that parses a network capture and extracts the parameters, and recalculates what the client and the s... |
Purchased a Dell wired keyboard scanned its QR code to check authenticity. The URL was http://dell.vt9999.com/fw.aspx?c=1670918927095916 and it says the product is authentic but link looks suspicious to me. I think I got a fake product.
I want to know is it safe to use this wired keyboard.
Can It contain any form of vi... |
We are currently shipping a product to our customers that is server-client-based running on Windows server 2016 (server) and Windows 10 (clients).
The server is installed on-premise in our customer's infrastructure.
We are always installing the server in our customer's network for our customer, but it runs on the HW fr... |
If one has a USB stick, originally from a trusted source and without hacked firmware, but one has used this USB stick with an unsafe system, then can it safely be plugged it into a Tails OS system and be overwritten by cloning Tails onto it?
By "safe", I mean that the system does not get physically comprimised (e.g. al... |
I need some help with an SQL injection at an API.
Webserver IIS 8.5
The GET request looks like this
...
https://example.com/api/Search?q=Landing
The Response looks like this
HTTP/1.1 200 OK
...
[{"pageId":1,"pageName":"Landing Page"}]
The SQL query where I tried to inject when I send a normal request looks like this:... |
Does Windows use Bluetooth Authenticated pairing with encryption automatically when you connect Bluetooth devices like earbuds to it? Is that Level 4? If it's not automatic, how do I get Windows to do that?
Is there any way to prevent other people from seeing and/or connecting to your Bluetooth devices like earbuds? An... |
We are currently shipping a product to our customers that is server-client-based running on Windows server 2016 (server) and Windows 10 (clients). The server is installed on-premise in our customer's infrastructure. We are always installing the server in our customer's network for our customer, but it runs on the HW fr... |
Is there a software or website that implements tests of randomness to check if my random numbers are of cryptography quality ?
|
This question has been asked and answered here, here, and also basically here. I'm asking again because the answers and information is conflicting.
LDAPS:
According to Wikipedia (and its RFC sources) LDAPS was LDAPv2, never standardized, and is deprecated as of 2003. The first answer also says that StartTLS is preferre... |
Maybe with SMTP servers edited?
|
How do you figure out Snort's source & destination IP and port if the question is so vague? For example:
Write a snort rule that detects a UK NI number sent from a client's web browser to a web server.
I understand how to write the regex to filter the NI number but it's the snort rule header that's tripping me. I'm als... |
I would love to gather some information on how to program my own password manager properly as I'm pretty new to security. Currently, I'm using pythons cryptography module and a sqlite database.
The data in the database is encrypted with MultiFernet using a fernet key and a PBKDF2HMAC key (created by password + salt). E... |
I'm developing a device that will require ownership proof to activate HOTP authorizations.
The HOTP codes will be used in the BLE bonding between the device and the owner's phone.
I came up with the following scheme:
Upon fabrication, the device will generate
HOTP context (Random key, and counter = 0) Let's call it C
... |
I use Firefox Monitor to keep me updated if my email ever turn up on breaches or data dumps. It curates breaches data from many sources and cross reference our email to check if our email turn up on some breach somewhere. For sometimes I feel comfortable with it. If my email do turn up on one, I simply follow the commo... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.