instruction stringlengths 24 29.9k |
|---|
On my server, I looked at all files containing log4j, and I only have an log4j-over-slf4j jar file.
SLF4J's page about log4shell states the following:
If you are using log4j-over-slf4j.jar in conjunction with the SLF4J API, you are safe unless the underlying implementation is log4j 2.x
However I don't find that cryst... |
Does receiving the HTTP 302 status code from a domain A guarantee in any shape or form that there was no JavaScript ran or any additional content (external or not) loaded from that domain A?
The hypothetical scenario where this might be useful to an attacker is a drive-by install (or any othe kind of) attack where the ... |
I'm stuck on the Heap1 challenge from Exploit Education.
After compiling the source code in a 64bit system, without any security mechanism, I try to overflow the heap in order to overwrite the main return address on the stack to control the program flow to the winner function.
I can't overwrite on the stack with the ... |
With TPM 2.0, it's possible to prove that the private key of an asymmetric key pair came from a TPM device (and thus is effectively inaccessible).
Is this possible with Apple's Secure Enclave on macOS?
|
I received a strange email from security@facebookmail.com. Sources on the internet seem to state that this is a Facebook-owned domain but I know the email is not legit because they do not address me by my first name, but instead by my email address. Also, I do not have a Facebook account with this particular email addr... |
I am trying to develop a website where I grab data using javascript and send it to PHP using ajax post. However, while researching, I found that the POST request can be modified using third-parties software such as Postman (I believe). However, if I use an HTTPS connection, will this be prevented?
If this isn't secure,... |
Let's say I am a member of a website. I always sign in from computer A, which is not linked at all with computer B, and I have always signed in from my home network.
Now let's say my ISP releases the old IP, and I'm given a new one (still using the same modem and plan). I do NOT sign in or connect to any servers associ... |
I opened Google, and a popup occurred briefly before I reflexively closed it. I then realized it had said something about a new password saved to the Google Password Manager, I think - which is weird, because I don't use Google's Password Manager. So I went and checked, and yep, there was one password saved to the ma... |
Yes, the transfer to the script via arguments is visible through ps -ax, /proc/<pid>/cmdline etc., BUT if someone has already gained access to your account from the outside (e.g. by hacking your browser) he will have no trouble looking not only ps -ax, but also periodically intercept /proc/<pid>/fd/0 (once intercepted,... |
After reading Why use random characters in passwords? it seems to me that one can solve the problem of how to remember a zillion passwords while each one remains secure by constructing each password from a high entropy root modified by the name or other information from the site or app being logged into.
For example, s... |
I'm told that Dylib Hijacking vulnerability exists on Mac applications.
And he told me that, in theory, it can also happen on iOS apps.
I googled a lot for any discussion about it, but nothing was found about iOS apps.
Now I'm wondering if it really can happen on iOS apps. After some investigation, my understanding is ... |
This is just a thought experiment. I am trying to get an understanding on when we need password hashing functions and when they don't bring any benefits (eg. to save on calculation cost).
I know that password-hashing-functions are to be used when storing password verifiers as passwords usually have low entropy. What ab... |
I wrote my first buffer overflow exploit and it worked well with
./vulnerable $(cat payload)
but when I tried to launch it from a Python shell it didn't work
import os
os.system("./vulnerable $(cat payload)")
This does a segmentation fault. Can someone explain why? Is there a difference in the memory when it's launch... |
I am new to WiFi and was trying to learn pentesting with the aircrack-ng suite.
In the following airodump-ng excerpt, any idea why airodump-ng is showing an access point with negative value -1 as the channel?
The AP seems to be hidden but I got a reasonable PWR reading, as opposed to the ones with PWR = -1 described i... |
I'm curious to check what could be some possibly secure and recommended ways through which I could send a password as part of a GET request in rails? Just to be explicit, we're using HTTPS in general.
High level overview of the use case: Our app helps generate a custom list of contacts that we'd like to share with exte... |
We have a production that uses our software (put on a chip) and a requirement that we need to limit the amount of chips produced for each customer (so they need to buy a license) - so they can't produce more than allowed. The production is not controlled by us.
I'm trying to come up with a good enough protocol to ensur... |
I have been thinking of implementing a new practice where local admin privileges are disabled entirely from all endpoints. For users who need to elevate privileges, they will have a separate admin account dedicated and restricted only to the local administration.
I am thinking about how the passwords will be managed. (... |
Whenever you visit a website without HTTPS (because for whatever reason there are still quite a few of them even in 2022) typically the browser will announce that you should not enter any sensitive information since it can get sniffed by third parties.
Can somebody explain to me how exactly that happens and what softwa... |
From the spec at https://www.w3.org/TR/permissions-policy-1/ it seems there is no way to whitelist features with a default blacklist, and each feature must be individually disabled in every single request - adding a few Kb to every complete page load after all assets are fetched:
Permissions-Policy: accelerometer=(),au... |
I was restarting a service and happened to notice that I had one service running that had no description. This struck me as curious. It's called "Session Detection" and is located at c:\windows\system32\drivers\SessionService.exe. I checked the file properties and it has no details; no publisher, no product name, etc.... |
So I am using JWT authentication, then I want to implement authorization. Some resources only available for users with admin role for example.
If I put the role in the token, is it a good idea to take that as a truth without double checking whether the user actually is an admin by making request to database? I was thin... |
Windows 11 requiring a TPM of some sort seems more like a DRM preventing me from duplicating a W11 Virtual Machine on multiple systems and distributing it versus any tangible benefit to the end-user.
What benefits does the TPM bring to the end-user, and are these justifiably enough to make the OS not even function if t... |
In most organisations, there will be watchers who will watch out for insider threats from the employees. e.g., Insider Threat Engineer.
But who will watch the watchers themselves in the event they turn rogue? What security controls exist to guard against the watchers?
|
I'm testing for vulnerabilities for a specific site using sqlmap. However, the site has a cloudflare firewall which blocks queries including for example *, ANY or OR. I sort of found a bypass while searching for people who've bypassed it. They basically used different characters for the same output so that the query wo... |
I'm planning to do a fresh install of Windows 10 on my mother's computer. Despite it has Pro version right now, I wonder if I should use Home version instead, which is also called Single Language.
After some search, I found that Home doesn't has some features like Remote Desktop or Local Group policies, which made me t... |
Since I am new to Linux, when writing scripts I always followed the rule "the less code, the less attack surface", so I try to write scripts with privileged access (sudo, root, etc.) in sh and use less third-party programs (grep, sed, etc.).
But for some reason many people talk only about POSIX compatibility, but not a... |
My company allows customers to upload PDFs, JPEGs and PNGs to our servers, which are then viewed by clients. We want to minimise the potential for attack on the clients. While the image formats are generally pretty safe, PDFs introduce multiple attack vectors. My understanding is that these attacks almost always explo... |
My case is I'm designing an app based on chromium browser powered by Electron .
And I need sometimes to log the clients in with some web apps. The password is only visible as dots in browsers by default.
I will have access to their computers by Remote Desktop Applications each time I need to authorize them in that web ... |
When I log into some web services, I need to send back a verification code contained in a text message that starts out with something to the effect of "You or someone claiming to be you is trying to do X on service Y. If you are trying to do X on service Y, the verification code is Z. If you realize you may have frau... |
We recently had a vulnerability scan that returned an information disclosure that I've never heard about before. The scanning company provided this information.
Our researcher used an open source tool called BurpSuite to intercept
an HTTP request to the vulnerable URL. He then used BurpSuite to
repeat that same reques... |
Hello I was testing on a private program where I was able to inject XSS but for some reason it is not popping up when I put the mouse over the input field.
<input type="text" onmouseover="alert(document.cookie)">
Note: First I created <svg onload="alert(1)">
Which did not work then I created the input field which was... |
Given a query such as:
SELECT * FROM users limit 1,$limit
Is there a way to exploit this when using MySQL 8 and the standard PHP MySQL functions (ie no multi_query)?
What I have tried (unsuccessfully):
1 procedure analyse(extractvalue [...]
1 union select [...]
ascii(substr((Select version()),1,1))
(select 1)
sleep(5... |
I have no advanced knowledge in cryptography.
Is it possible to recover the AES-256 key with the decrypted and encrypted message?
|
WireGuard does not assign dynamic IP addresses, which may be a privacy risk.
It is known that while WireGuard may offer advantages in terms of
performance, by design it is not ideal for privacy, because it doesn't
allocate VPN IP Addresses (10.*) dynamically like OpenVPN does;
instead WireGuard requires fixed ones in ... |
I created a bootable windows 10 usb from my friend's computer. I used the official tool from microsoft. I was dumb enough to not check my friend's computer beforehand (turns out he had Utorrent Web installed, a known PUPbundler, and maybe some other malicious programs)
I plugged in the drive into my PC and installed wi... |
Is there a way to prevent a Windows 10/11 system to access/modify/delete data from a secondary linux drive?
I understand I can encrypt the linux drive, but wouldn't the windows system be still able to see the drive, and a potential malware or ransomware can still destroy the data on it, right?
I would like to use 2 nvm... |
I'd like to know if this communication technique is secure enough against attacks, both on the connection itself and the password-storing procedures.
Both the client and the server have access to 2 pre-shared static keys:
Enc Key A (32-byte string)
Enc Key B (32-byte string)
The server has access to a static key:
DB ... |
We have automated a lot of things for server startup via cloud-config, and I want confirmation about whether there is any security concern in the following.
users:
- name: myuser
groups: sudo
shell: /bin/zsh
...
runcmd:
# change myuser password
- PASSWORD=$(openssl rand -base64 12)
- PASS_CRYPT=$(per... |
I am trying to understand cookies and the hijacking/mitigation methods. I have noticed that some websites are more secure than others.
For example, I have two browsers (Edge and Firefox). I have installed Cookie-Editor onto the two browsers. Let's assume that the Edge is the vicitm, and Firefox is the attacker. I have ... |
Given the increasing widespread adoption of Time-based one-time password (TOTP) in view of SMS OTP hacks, Is Time-based one-time password (TOTP) sufficiently secure as another factor of authentication, on top of username/password?
I refer to https://blog.malwarebytes.com/cybercrime/2019/01/two-factor-authentication-def... |
I want to use gpg from another user (user2), so that the primary user (user1) does not have access to the encrypted file, but only to the part the script will output.
Added a sudo rule for user1 to run /bin/gpg as user2. When I try to execute user1@host: sudo -u user2 gpg /home/user2/pass.gpg an error gpg: decryption f... |
It's been quite a few years since the last time I did web development and I realized many things have changed: instead of stateful server-side sessions with authentication cookies and CSRF tokens now we have localStorage/sessionStorage, Single-Page Applications, completely stateless APIs with JSON Web Tokens inside Aut... |
Recently I started receiving "Third-party application access to your Zoho Account" warning emails from Zoho.com regarding my Zoho email accounts, saying things like:
We noticed a third-party application(POP) accessed your Zoho Account associated with {my account email address} on Wednesday, January 19 2022 10:12:43 AM... |
Suppose malware lands and executes on a computer. Could this malware attempt to spread further by writing itself to data files (images, pdfs, docs) and hoping that the owner would transfer or upload these files somewhere. Like adding payload to images and targeting some memory vulnerability in a common image viewer. Or... |
I'm on my laptop at home and I wasn't logged into any Google account but I was on my school's Microsoft account. Can the school still see my searches?
|
In my application I've successfully implemented client authentication using X509 certificates
Here's what I've done:
Issued a self-signed CA root certificate with a private key
Issued a web-server certificate with a private key and signed it with the root one
Issued a client certificate with a private key and signed i... |
On the historical PSP (PlayStation Portable) console on firmware version 5.03 there used to be a thumbnail-based exploit called HEN-C. It worked (under a race condition I presume since it didn't work every single time) by viewing a picture thumbnail of an splashed egg and a binary encoded (?) picture thumbnail, which w... |
I'm trying to implement authentication for users on a web page using JWT tokens and, so far, I can create users and authorize them. I'm now trying to write the password reset functionality and I think I may be finished (per any examples and research I find) and the process looks pretty standard...
A user will click "r... |
Context
I was answering a question about how YubiKey can generate "infinite" keypairs for Fido U2F but doesn't need to store them locally.
This leads to my initial question:
Initial Question
Can I register with a FIDO U2F service more than once, with the same physical key?
Which I tentatively answer here:
No?
Gave gith... |
I was loading my sites front end and watching the responses in burpsuite when I noticed a response which contained a very verbose sql error
"message": "SQLSTATE[22P02]: Invalid text representation: 7 ERROR: invalid input syntax for type bigint: \"1test\" (SQL: select * from \"passengers\" where \"passengers\".\"id... |
I had enabled 2FA for GitHub using a mobile number. Today when I tried to log in from a different device, during the 2FA verification time, I received the code from a consumer phone number [ +91 7906173### ], stating the TOTP as "Github authentication SDT".
Being sceptical, I had opted to resend the OTP and then receiv... |
I have various servers on-premises on a private network. Some of these servers need to reach out to vendor websites to check for patch status, license verification etc.
Where should these servers be placed? Tn DMZ or can they remain on the private network?
If the on-prem servers are instigating a connection to a servic... |
I'm communicating with a job headhunter over LinkedIn and he sent me an e-mail containing information about a position. However, I noticed that all of the hyperlinks in the e-mail (even the one on his e-mail address) had very strange URLs. They all had the same format. Here's an example (with some details obfuscated... |
Consider a scenario where CSP is configured in response headers rather than using meta tag. And only one directive is used.
Content-Security-Policy: report-uri https://www.example.com
Does the above directive where only report-uri is used works fine and prevent any violations? Or report-uri is used only along with defa... |
Does the flatpak package manager in Fedora-based systems require successful cryptographic authentication and integrity validation for all packages?
I know that software downloaded with apt-get packages must be cryptographically verified because the repo's manifest files (synced with apt-get update) are cryptographicall... |
I've been researching on virtual machine security and found a lot of articles detailing how an infected VM is isolated (or not) from the host machine.
But I couldn't find any answers to the opposite side of the question. If my host is infected, can I safely run some operation inside of a VM? How would that work?
|
I would like to hear the best recommendations about where to apply rate limit on APIs. We use k8s (microservices) with an ingress controller that is behind an API gateway, that is behind a firewall.
The ingress controller and API gateway are on private subnets. Our VPN users can access both subnets by being members of ... |
I'm in my last year of university and for my honour's project I am tasked with comparing two intrusion detection systems, snort and suricata, hosted on a virtual machine on my PC.
As I have no access to networking devices such as switches etc, I was looking to use a pcap files containing malicious traffic and pass it t... |
We keep hearing of big enterprises (Garmin, Edeka) being taken out of business for days or weeks, due to ransomware encryption attacks.
One would assume that it can't be that hard to create versioned backups that can't be overwritten from the system that created them. (After all, most consumer-grade NAS can do it.) So,... |
Is it logical or recommended to validate the presence of a specific scope and/or claim against the issuer of the JWT?
For example, we will have a couple of different issuers of JWTs:
One for employees, controlled by Active Directory
Another for customer access, more of a custom auth mechanism
There'll be some sort of... |
I'm curious to know how mTLS works in more detail in regard to client authentication.
Firstly, I issued 3 certificates: root CA, server and client. The last two are signed with the root CA.
Secondly, I imported the client's .p12 (the client certificate and the private key incorporated) and the root CA (certificate only... |
So understand that torrenting over tor isn't generally a good idea, mainly because the speeds aren't high and it strains the network. Also that it doesn't support UDP.
But if we look at the old paper about this on the tor website, there are a couple more issues listed, that don't seem to me like a tor-only issue.
The ... |
Recently, a lot of my friends have been talking about botnets. They said they've created their own. Obviously, I know this is all illegal so I try not to take part in any of it.
But I've been wondering how they work. I've read some articles online and the basics on the control server and peer-to-peer communicating ... |
There is bug in pkexec program, CVE-2021-4034, which when exploited allows access to root shell.
Is the best way to fix an unpatched CentOS 7 server to just apply the temporary fix of running chmod 0755 /usr/bin/pkexec, and then patching it when a proper fix is available?
|
I wonder how Windows Bitlocker and other similar software works.
I know they differ in terms of security level as some software does not fully encrypt locked files, but I'm speaking of unauthorized remote access. Do they also protect against remote access even after the password is entered and the current state is unlo... |
The general consensus appears to be that TLS 1.3 in 0-RTT mode over TCP in Fast-Open mode (TFO) is secure in terms of CIA as long as you trust the CA system and treat the early data as being potentially part of a reply attack. In particular there are concerns regarding replayability for both TFO and TLS 1.3 0-RTT.
In p... |
My company is looking to allow Google Chrome to self-update, a necessity as we are finding it difficult to keep up with their release cycle in order to mitigate vulnerabilities.
On the pro side, letting the software auto-update helps us reduce the prevalence published Chrome vulnerabilities.
On the negative side, this ... |
Is there any way to detect injection into unencrypted http traffic, like files, js etc.
just by traffic analysis
from the client-side?
|
I've been using Chrome to save and sync my passwords across devices (and lately I am trying to switch to Bitwarden). Google warned me recently about a password I have used across multiple sites that have been found in data breach. However, if I check that password in HIBP it does not show up.
How could I find out which... |
So I have some data that isn't overly sensitive, but I'm still on the fence on whether or not we should invest the additional time into managing it as a private resource, vs just publicly available.
The data (images & pdfs) are to be hosted on aws' S3 bucket. They feed a web application that is private with a very limi... |
Most services that support it seem to have a standalone 2FA authenticator app (Microsoft Authenticator, Google Authenticator) instead of integrated authentication in their mobile apps (admittedly, these services are far larger than one-app products, so a single-port-of-call authenticator app makes sense from this regar... |
I have built a waf and using CRS 3.0, this waf can inspect the request body to limit the file size that upload to the server, I am wondering ,if I just disable this feature manually, it will cause any CRS rule work unproperly? really appreciated for the answer .
|
[As part of a ctf] I am trying to exploit a remote server through a tcp connection. The server is using snprintf() and provides user input as the formatting string. My goal is to dump the stack. Determine the address on the stack of a variable that is used as a guard and modify it in order to bypass the authentication.... |
While searching for an answer to the question "how to hide command arguments from ps/proc etc", I came across the hidepid mount option, which hides a user's own processes from another user (of course also command args launched from another user).
Why such a useful option is not used by default?
I want to remount mount ... |
Microsoft Authenticator requires an:
Outlook account
Verification account
iCloud account
The first two are required to set up the authenticator on a new device, the latter stores all the data to be restored.
Ideally, your "verification account" should be supported by a further "restoration account" that can be used t... |
I'm learning some hacking with Erickson's "The Art of Explotation". To try out the exploits myself, I'm using C on a virtual maching with 32-bit Debian on my windows laptop (in VirtualBox).
Many of the exploits rely on overwriting pointers with address via an overflow (i.e., using something like "\x32\xbf\xcf\x12" as i... |
A sim-pin safeguards against sim-swapping, which is the primary advantage of using an authenticator app instead of SMS, is this not so?
|
I am trying to utilize the SafeNet eToken 5110CC, which basically has the IDPrime 940MD with the applet 4.4.2.A., to generate ECC keys with lengths 384bits and 521bits to no avail.
The product brief says that ECDSA and ECDH of 384/521bits are supported through "custom configuration", but they are supported.
Before aski... |
For our web application we are maintaining some data, pertaining to our subscribers, on our server. Some of this data is sensitive and we would like to implement some "security measures" for this data. One is encryption, and we know how to do that. The other is non-repudiation of the content, and we don't know how t... |
I would like to ask for some directions to trace back to the original (malicious) script on my system (Ubuntu Server). I would try to be more specific if needed. If the question does not fit this stackexchange, then I will modify it.
In netstat's output, the PID/Program name only showed "-" and the one next to it 1441/... |
I have just logged into my router in Chrome, Win 10.
I got this warning.
I immediately changed the password.
But I have several questions.
Is the message reliable, in the sense that the breach occurred?
If so, how could that breach happen?
How could Chrome tell the breached happened?
Did I have any extension that c... |
I don't why we can decrypt the message using our private key if it's encrypted using our public key.
If a message is encrypted using my public key, then how can I decrypt it using my private key? It doesn't make sense at all.
The only way it can do that is that on my side, the private key can be generated using my publ... |
My MacBookPro doesn't get major updates anymore, but the hardware still works well.
I came accross OpenCore Legacy Patcher, which allows to install recent versions of MacOs onto older macs through patches.
How secure is it? Is there a bigger risk of being infected and hacked with this type of software than when install... |
This is a cryptographic challenge I was given:
I have a list of 1000 hashed email addresses where I know the domain name for them (eg. "@gmail.com").
According to hashes.com:
Possible algorithms:
SHA1, SHA1(UTF16-LE($plaintext)),
MySQL4.1/MySQL5, mysql5(mysql5($plaintext).:.$plaintext),
sha1(sha1($plaintext)),
sha1(sh... |
I got an event that something is wrong with, but I don't understand what exactly.
{
"EventTime":"2021-11-22 21:05:45",
"Hostname":"pc2",
"Keywords":-9214364837600034816,
"EventType":"AUDIT_SUCCESS",
"SeverityValue":2,
"Severity":"INFO",
"EventID":4688,
"SourceName":"Microsoft-Windows-Sec... |
HashiCorp Vault Agent creates a sidecar that talks to Vault server and injects secrets as files into containers. The agent presumably uses Kubernetes Service Account in some way. But ultimately there must be a secret zero somewhere, protected somehow, and I would like to understand how it works.
What does Vault Agent u... |
which rules I should choose for ssh algo selection, provided it will be used near 100% for git operations? I'm going to use it with git on linux laptops, often used on public wifi.
currently I have:
speed
modern (no need to serve old SSH servers)
and that leads me to Curve25519 selection, but do I miss something impo... |
The below table is making its way around linkedin and I've seen similar before.
Assuming this table is accurate enough I'd like to understand the economics of cracking the passwords.
For example, if an organisation has stolen a database of 20000 record what would it cost them to get the passwords out. I initially thoug... |
I am solving a lab related to serialization vulnerabilities. It deals with retrieving files based on the signature. The theory of the lab states as quoted, "Adding ./ will still give you the same file but the application will generate a different signature that may be loosely equal to 0."
ex:
curl -X POST -H "Content-T... |
Is there a way to disguise your PC characteristics from tools like NMAP and others on the internet? For instance if the OS you are using is Ubuntu is there a way to make it show up as something else. Are firewalls able to block PC's based on there characteristics rather then just there IP address. Lets say I tried t... |
Software supply chain focuses on software. How about hardware supply chain security? I refer to Compromise Hardware Supply Chain ("https://attack.mitre.org/techniques/T1195/003/").
I wish to know how can one detect if one's hardware such as CPU, memory chip has been compromised at the hardware level? Are there ways/too... |
I have a computer with Hyper-V installed and a virtual machine. I want to connect only and directly to the VM with Remote-Desktop from outside the network.
I have some good ideas to make the connection more secure, but the question is:
should I apply those measures on the VM, or
should I apply them only on the host?
... |
Been given a .docx file to check whether it has a virus or something, ran McAfee and SuperAntiSpyware on it and results came back negative so I though it was good and proceeded to open it, just a file with some text, few .jpg and .png files and a little draw on there.
Out of curiosity uploaded it to VirusTotal and it s... |
I have edited a PDF file in Acrobat, which left some metadata and I am wondering:
What metadata might be possible to discern from the end file if I were to send it to external parties?
What actions would be required to be taken to strip not readily visible metadata from a PDF file?
|
To protect me from ARP spoofing, I tried most of the programs spread here and there and read most of the scientific papers on this subject, but I found a lot of ignorance and evasiveness to hide a bitter truth.
According to my research, all the proposed solutions talk about protecting your computer only, but they compl... |
Today my grandparents connected to my WiFi, the password was given to them by my partner. Well, after looking at their PC, we established that they hired someone who has installed loads of stuff on the computer via remote access, which they accepted on their end when asked to do so.
Looking at the company that did this... |
I lent my mobile data to someone's computer and was not in the room while they were using it.
Suppose they wanted to gain control/access to my android device. How easy would it be? As far as I know, malware can infect android phones mostly through malicious apk getting installed. Would it be possible for the owner of t... |
Which password is harder to guess/brute-force:
onlysmallletters!
Ez65);k
And also, can you explain your answer?
|
I log repeated invalid login attempts on a small custom made e-shop (no open source system is used). Last year, I started recording repeated failed logins from a single IP address. That's why I started logging the passwords that this IP address is trying to enter. It is clear that this is a robot (or human) that repeat... |
I know that X.509 certificate signing process includes creating a CSR (certificate signing request) and then the following happens:
Some data's from the certificate to be signed hash is computed using a hash-algorithm, i.e. SHA-256.
The hash result is signed with the issuer's private key.
The signature gets embedded t... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.