instruction stringlengths 24 29.9k |
|---|
Facebook Pixel and Google Analytics for example give you an API key to identify tracking requests from your website. But what is to stop someone from grabbing the key, spoofing your domain and submitting their own tracking requests?
|
I ran Clamav on an Ubuntu 20.04 machine and it identified ten Certbot files as infected.
/snap/certbot/1670/lib/python3.8/site-packages/pip/_vendor/distlib/t32.exe: Win.Malware.Generic-9937882-0 FOUND
/snap/certbot/1670/lib/python3.8/site-packages/pip/_vendor/distlib/t64-arm.exe: Win.Malware.Generic-9937882-0 FOUND
/sn... |
What is the relationship between fuzzing and buffer overflow and does fuzzing leads to buffer overflow? Is buffer overflow a subset of fuzzing?
|
I am having a discussion with friends and my point is that the older a feature-frozen operating system is, the fewer security bugs are left unpatched and therefore the cost for the company to fix them decreases with age.
My assumption is: there are a finite number of bugs in a code which is not changed except for fixin... |
I'm looking for some guidance regarding security best practices for Infoblox BloxOne.
What I'm looking for specifically are recommended security best practices based on experience using the product.
|
I'm trying to understand openssl and some cert issues I was trying to track down. These certs were issued from Let's Encrypt. I will use their site as an example because I see the same behavior there. First, I run openssl (OpenSSL 3.0.1 14 Dec 2021)
openssl s_client -showcerts -connect letsencrypt.org:443 -servername l... |
I'm pentesting a system (call it X) which uses an internal secret key. Due to weaknesses in the crypto, I can determine:
The SHA1 hash of the key (stored as a checksum)
With high probability, the value of any byte of the key
The len of the key
That the key consists only of printable ASCII chars
#2 is probabilistic, ... |
I did some port scanning of the local network, as a bit of security due diligence, expecting the first 1000 to be stealthed. However, the results are mixed, when running the scan with different scanning tools.
ShieldsUP!
https://www.grc.com
'All Service Ports' button
It consistently states that 1 - 1056 are all stealth... |
If I want to run untrusted code inside a Docker container, or an untrusted Docker container for that matter, how can I restrict it?
I'd like to make sure it has no access to the host filesystem. Ideally I'd like it to have limited network access: listen on local ports only, nothing on WAN, nothing outbound even to LAN... |
I found a report on hackerone which is being awarded $200 for XSS via forwarded host header.
It is a reflected xss and I was wondering how an attacker can attack the victim?
Is there any way in network side like from proxy or other? Is it possible to set this header from client-side? I think this header doesnt come und... |
I am trying to assess the security implications for a session handover between an app and a website in the same company ecosystem.
The Setup
Mobile Application A and Website B use the same company OpenID Connect (OIDC) provider to login their users independently from each other with completely separate session handling... |
For my website that is currently in development, I am trying to figure out a way to handle authentication. I am using mysql as my database and nodejs for my server. Currently, my website does the following: Whenever a user signs up, the username, password and email are sent to the server and the password is hashed with... |
I learned about gVisor from https://security.stackexchange.com/a/259275/133925 . It runs containers under a custom kernel, written in Go, with very intense security.
My question is: The whole point of Docker is to use the host kernel. How does gVisor run it under a custom kernel of their own?
|
I have a SSHA256 hashed password. Below is the plaintext and hashed password for it.
PlainText -p@ssw0rd
Encrypted -{SSHA256}LGkJJV6e7wPDKEr3BKSg0K0XDllewz9tvSNSaslDmIfPFmyuI5blUK/QsTXjvgFKLlMQm1jPC7K7z/KaD4zoHQ==
How can I extract salt from this password. The salt is 32 bytes long. And using SHA-256 algorithm to gene... |
I have been playing around with the DVWA stored XSS page and wondered if someone could help.
I used XSS Validator in Burp and found numerous payloads that give a prompt, indicating that XSS is present.
One of the payloads that was successful is below, so I thought I could just insert my own payload into the javascript ... |
I want to use Windows Admin Center, but I don't want to install a SSL certificate.
If I were to forward packets from 80 to 443 using firewall rules would they automatically be encrypted?
|
I need to set up an ssh port forwarder on a server (jump host) in a manner that the ssh client does not know the target destination.
client machine --> jumphostserver --> targetserver:port
I can set up an ssh tunnel locally on client machine which has credentials to jumphostserver. Then the client machine needs to kno... |
I'm familiar with the concept of cold boot attacks on laptop and desktop computers, where the goal is to find hidden encryption keys in the memory. I also think it's done on certain mobile phones. I also know it's hard to do, and some products like VeraCrypt now encrypt keys in memory in order to mitigate this attack.
... |
What are the security implications of mapping a host folder to a Docker container ro? For example -v /usr/local/bin:/usr/local/bin:ro.
Of course, the container can now read the host folder. But, assuming the mapping is of data that's public, does the ro mapping increase the attack surface? It would seem to me that any... |
I'm currently working on a task where I am trying to suppress some Path Manipulation warnings that have been raised from running an analysis with Fortify on my team's source code. The issues are being raised due to the fact that we are trying to read/write from some files given in a user's specified directory. Here is ... |
I read that port scanning services like nmap will conduct a "TCP Connect Scan". They'll attempt to make a TCP connection to each of the ports within the range provided. But because each of these connections will be logged, it is easy for a system administrator to notice that someone has scanned their ports. So a more s... |
When I try connecting to wireless networks (with no RADIUS server), I enter the password and it goes through an authentication process. After the station successfully connects to the access point, a 4-way handshake is done to generate PTK, GMK to encrypt the traffic.
In this case, I want to know how the authentication ... |
I am struggling with the question how to store a security key in a secure way. I have done some research and there are multiple options.
Option 1) Storing the key on the same server (not recommended, because an attacker might easily get access to the key if the server is hacked.
Option 2) Storing the key on another ser... |
I am currently generating a salted SHA 256 passwords in the below format
$hash = "{SHA256}".base64_encode(hash('sha256', $password . $salt) . $salt) .
Using the below libraries of Java classes to generate.
java.security.MessageDigest
java.security.SecureRandom
I am not sure if the random salt generated via SecureRand... |
During a pentest some time ago, I came across an interesting functionality, and upon research, it appeared that I had partial control over the starting value in an MD5 hash.
With some more digging, the final hash was a result of md5(secret-key:my-value).
After I realised this, I moved on as the implementation didn't se... |
This resource (and others) mention that OAuth2 Password flow doesn't provide mechanism for multi-factor authentication.
Does that mean other flows do?
How does MFA fit in the OAuth2 framework?
What is stopping you from using MFA with password flow?
OAuth2 always confuses me. I would appreciate answers and/or links to... |
I’m currently in need of the following:
I want to use Keycloak for user authentication
I want to use the user’s password to derive an encryption key, preferably using PBKDF2.
This key will be used to encrypt/decrypt yet another encryption key, which will be used to encrypt/decrypt data of that user
So, if the user au... |
I read an article about SSH-keys. The author says that they are stronger than password-based authentication. All you need to do is just to create a pair of keys (public key and private key), move your public key to the server and you are done. I know that assymetric key cryptography come in handy when encoding data, bu... |
I was thinking of using gpg4win to encrypt files I'll upload to cloud storage services. I already use 7-zip so if I just wanted to password protect my files I could have easily done it, but I wanted to implement TLS style asymmetric encryption for my files so that one has to acquire both the private key file and the pa... |
As far as I understand, it is possible to have multiple TLS certificates per domain name. Let's say I own example.org website and have a certificate for it. If an attacker gets a certificate for example.org, couldn't he/she perform a MITM attack on my website?
This situation seems analogous to MITM attack in Kazakhstan... |
Assuming the attacker can read all the traffic (he cracked my WPA2 for example), is there still something he can do if i'm only connecting through TLS and similar protocols ?
|
This family member is an iPhone user. I am an Android user. The messages look normal until a short while ago, when it appears the connection was switched to iMessage. They immediately used another messaging app to send me a screenshot and suggest my phone might be compromised ("hacked").
The conversation in question is... |
I'm writing an API which is running on my own web server written in Go. I have a local environment set up to run it all under HTTS using a self signed cert and it all works great. It all works and I can see that the traffic is indeed encrypted and it all looks good to me.
My questions is this though:
I'm trying to unde... |
My current setup up is for pseudonymous communication on a smartphone. I need help to know if I am doing anything wrong.
GrapheneOS
all traffic over tor using (orbot)
using Signal with anonymous number and conversations xmpp
phone is strictly used for messaging only, nothing else, no browsing
I'm using a router, with... |
I saw a network setup recently that looked like the following:
The ISP provides two static public IPs on a specific VLAN and one is used for an internet network and the other for a server exposed to the Internet.
They wanted the server to have access to the internal network as well but without depending on the interna... |
As I understand it, the basic idea is that you have accessToken (15 minutes), and refreshToken (1 week), a few moments before the accessToken expires, you need to ask the server for a new accessToken.
If the user closed the browser before the 15 minutes ends, and the client didn't refresh the tokens, you need to re-log... |
I'm researching our options for securing access to a single-page web app and a mobile app. The apps communicate with a REST API which, based on the authenticated user's identity, will return potentially sensitive information. The apps can be considered Clients in OAuth 2.0 terms.
Looking at Auth0 and Firebase there are... |
Does HTTPS have any unique mechanisms that protect web servers from exploits run by a malicious client (eg. SQL injection, specific browser exploits etc.)?
My current understanding is that HTTPS is simply a HTTP session run over a TLS 1.2/1.3 tunnel (ideally), and wouldn't protect against any vulnerabilities of the cli... |
Assuming I have a service running with elevated privileges on a host, and another service is listening on a UDP port with access for everyone (0.0.0.0) is it possible to craft a spoofed UDP datagram from localhost so that appears it comes from a remote address? Is there some limitation because different network interfa... |
I'm working with some middleware that requires username/password authentication. The middleware uses MD5 hash for the password. The MD5 hash, of course, is not fit for the purpose of storing passwords. We need to address this.
We tried modifying the middleware to use a newer hash but it is a crap system we can't really... |
I am designing an account system that will use salting/hashing to securely store and compare passwords. For now, I'm looking at using bcrypt for password hashing. Somewhere along the way I'll need a way to ensure that users can store secrets in their account. These secrets will need to be encrypted using a key derived ... |
I saw that using SSL on AWS RDS can reduce the performance of the database by over 10%. Let's say that an RDS database is on a private network and only accessed by applications on other private networks in the same VPC. The security groups of the database allow only inbound rules from the security groups of these appli... |
I'm planning to implement (nginx) ssl_session_tickets in addition to ssl_session_cache between a proxy and upstream. They're not located in the same DC so TLS must be in place.
My questions are : 1) as handshakes will only be made between servers, is the key rotation critical as it is when configured for establishing c... |
I was wondering if it is possible for openssl to check the server public key size. Currently, I am connecting to the server using:
openssl s_client -connect "ip address":"port" -key client.key -cert client.crt -CAfile myCA.crt -verify 10 -verify_return_error
This is on the client side.
The server has been set with a w... |
I am looking for the differences between the ISO 19794-2 and ANSI 378 fingerprint templates.
If there are differences, for what types of applications are each of these standards most suitable?
|
during playing with nginx "ssl_verify_client optional_no_ca" i made the discovery that it does not very the cert signature of a self signed cert. I think this is the intended behaviour, since a cert is supposed to be signed by someone else with mutual trust.
However, if it's merely a file that gets passed around, what... |
The thing that helped me to understand what is a "public key" was to parallel it with a door lock:
The door lock is public in the sense that anyone can try to unlock it and the door key is the private in the sense that generally, only certain user or people should use it.
Virtualwise, what is the essential difference ... |
I have a web server running on an IoT device, more specifically, on an ESP32.
This web server serves a website that is used for managing the device and can contain some sensitive information, hence I need to serve the website using HTTPS. The problem is that a client who uses our device will have to accept the usual er... |
Paraphrasing this:
Symmetric cryptography is like a door lock. Everyone that has a key can lock and unlock.
Asymmetric cryptography is like a common lock or handcuff. Anyone can lock it but only the (private) key unlocks it.
I assume that "private" here doesn't mean "just for one person", rather that it means only-un... |
My understanding after reading other questions here is that an attacker would need control of the nameserver or the ability to forge responses from it to exploit this. Could it be abused in other ways?
For context, we have an application that connects to an LDAP server, optionally over SSL, to retrieve info about a dom... |
Screenshots are generally held to be dubious evidence when presented in court because they are susceptible to alteration, especially when it comes to pages rendered in web browsers. You can use the browser's dev tools to alter the content, you can modify the resulting image with MS Paint, you can even be victim to an ... |
I have read that they used previously breached machines, but to try to gain access to those machines they also needed some kind of protection right? How did they do it then?
|
I'm working on implementing a protection for a WordPress pie register plugin vulnerability being called:
WordPress pie register 3.7.1.4 auth bypass / RCE
I've conducted a research on the pie register source code (it's an open-source plugin) and on the published metasploit exploit for this vulnerability, and figured ou... |
Is it really that simple?
I guess having a master password will prevent that, but the drawback is that it is asked each time I open the web browser.
|
is it safe to read the jwt token before validating it?
my colleagues are implementing a "check jwt for aud value and route accordingly".
this means that:
First payload is being read by the code of our application
Then route to the correct validator
Validate the token
Load the payload in our application
I argue that t... |
Restrictions:
Access token will be short lived (2 minutes)
Access token will be one-time use only.
Given a strong random algorithm, would it be considered good practice to generate an opaque access-token by generating 256/512 random bits that is afterwards base64 encoded for transmission?
The bit-size and randomness ... |
I was wondering: are there attacks that target a load balancer's choice algorithm?
For example, if an attacker takes control of a load balancer, the traffic could be redirected to a single server and provoke a targeted denial of service.
Do such attacks exist? Are they common? The only thing I found so far talking abou... |
I have two servers (server1 & server2)
Server1 needs to send a file to server2 for it to process.
How can I make a secure connection between these two servers so I'm sure that the file is sent only from server1 and no one is impersonating that server and sending other files?
Since these two servers use nodejs, I'm thin... |
To facilitate consulting work, a client has suggested that they allow me to connect directly to an in-house remote desktop server, via a firewall pinhole which allows connection from my IP address only. My IP isn't static, but it hasn't changed in years, and if it did they would update the firewall rule.
Their solutio... |
I am trying to learn OAuth and I keep reading that "OAuth is only used for authorization." However, if you add an email or profile scope, doesn't that identify who the user is? So can it be used for both authorization and authentication?
I understand this overlaps with OIDC's scope, but I'm simply adding a scope to OAu... |
I'm trying to create a mobile app which helps to connect with my mobile app. While going through authentication I used JWT. While authenticating it, it returns access token and refresh token to the client but if both of them are sniffed so there can be a concept of account takeover. Though I'm using HTTPS the attacker ... |
I've read a number of posts regarding changing the algorithm used to encrypt my private PGP keys. However, nothing I have tried seems to work. I am using gpg4win:
gpg (GnuPG) 2.3.4
libgcrypt 1.9.4
Copyright (C) 2021 g10 Code GmbH
License GNU GPL-3.0-or-later <https://gnu.org/licenses/gpl.html>
This is free software: yo... |
Our need is to allow users to log in to their online workplace (e.g. using Citrix), and have access to their office applications, as well as some of the internally hosted applications the servers in the same datacenter.
Suppose this remote workspace environment is on a platform that is shared by other external organiza... |
I have a mobile app that connects to a IoT device over port 8888 to send commands. I'm not sure how to intercept this. MITMproxy was not able to capture the data as the app would not load behind a proxy. I own the devices and a router to try capture this data.
Any advice?
|
I am reasoning about the following scenario:
A server listening on a port
A client (always the same) that sends messages
When the server receive a message, it performs an action and then responds to client saying success or failure. The only requirements of this simple communications are integrity of client messages ... |
OAuth providers like Google's are nice but they don't guarantee that the user on the other end hasn't created thousands of spam accounts with different email addresses. Some financial services like P2P lending services require that the borrower or lender upload a government issued ID and even in some cases do a short v... |
The standard for TR-31 (and Thales) Key blocks (ref) have a field for "Key Version Number", which is only defined in the spec as
Two-digit ASCII character version number,
optionally used to indicate that contents of the
key block is a component, or to prevent reinjection of old keys.
Using it as a way to indicate a k... |
I'm using ServerSocket to create a listening port on Android, so that other clients in my local network can connect to it while the phone is providing a personal hotspot. I probably can't specify the IP of the personal hotspot interface, because there seems to be no reliable way to determine this IP on Android. Therefo... |
I read in the book that you cannot use True Random Number Generator (TRNG) to generate key stream in Stream Ciphers:
We
need some type of random number generator to derive the key stream. First, we note
that we cannot use a TRNG since, by definition, Alice and Bob will not be able to
generate the same key stream. Inst... |
We have an IIS webserver hosted in Azure. We want to monitor this server via our cloud SIEM hosted in AWS. To monitor, there is a requirement to open outbound 443, on the VM, to a few hundred AWS external IPs. Without this, the webserver can't talk to the SIEM.
Within these AWS external IPs are huge network ranges from... |
openssl verify can be executed with both flag -CAfile <FILE> and -trusted <FILE>. The explanations from OpenSSL 1.1.1 manual:
-CAfile <FILE>
A file of trusted certificates. The file should contain one or more certificates in
PEM format.
-trusted <FILE>
A file of trusted certificates, which must be self-signed, unless... |
Trust anchors and (root) certificates authorities are often used interchangeably and it's easy to think that they are the same thing. The answer in Can an intermediate CA be trusted like a self-signed root CA? contains some nice discussions about the difference but I was hoping that it could be further explained and nu... |
root@e8c1b013eb50:/# # let's make encryption first
root@e8c1b013eb50:/# echo -n 123 | openssl enc -aes-256-cbc -e -K 7 -iv 1 -a -p
hex string is too short, padding with zero bytes to length
hex string is too short, padding with zero bytes to length
salt=73C782D6357F0000
key=700000000000000000000000000000000000000000000... |
Recently my organisation has been flooded with phishing e-mails with different approaches: pretending to be Reddit or LinkedIn information about a new follower or package delivery status/problems, etc.
Every malicious e-mail is delivered from a different domain, they contain slightly different message body and subject,... |
This webpage will exploit your LG webOS smart TV, gain local root
privileges, and install the webOS Homebrew Channel.
rootmy.tv
I really hate the constant ad breaks on YouTube and have rooted my LG TV to install an alternative YouTube client (with adblocker).
However, this RootMyTV blocks updates from the manufacture... |
In recent days, stackexchange has been hit by a series of DDoS attacks , leading to the blocking of Tor exit nodes.
I'm curious how a DDoS attack would be more effective when routed over Tor. From what I understand, it would only lower your output due to needing to route over the network, and then you are constricted t... |
I have a partner that is asking "Do you use breach detection/prevention tools?".
I host my service on managed hosting (Heroku) and currently migrating to Google Cloud. Should I be using "breach detection/prevention tools" or is that already handled/managed by Heroku or Google Cloud?
|
My Suricata IDS is generating this alert when starting Thunderbird:
ET INFO Observed DNS Query to .cloud TLD
You can analyze a json log:
{
"_index": "suricata-1.1.0-2022.02.11",
"_type": "_doc",
"_id": "Uvxd6X4Bz6KASDsJzj8a",
"_score": 1,
"_source": {
"src_autonomous_system": "private",
"src_ip": "19... |
Please forgive the vagueness of the question title.
I am currently working/designing an opaque storage of immutable files. The purpose of the service is simple: storing files and being able to retrieve them by their identifier.
As the service is explicitly designed at storing immutable data, I had the idea of making th... |
At the moment, there are 2 cryptographic setups in place on the devices I use daily:
First, I have an OpenPGP key that I use to sign email, authenticate over SSH, and various other little things. Put simply, this key is used to authenticate me, personnally (some manual operation that I am performing like sending an em... |
I am trying to bypass a filter on a black-box SQL injection CTF that likely looks like /or/i. I suspect the filter is in a WAF somewhere in between me and the target.
To get the OR keyword, I use ||.
Instead of using the ORD() function, I use ASCII().
But the DBMS is MySQL, how can I use INFORMATION_SCHEMA which contai... |
I am working on a project that requires users to set up 2-Factor Authentication. As an additional option (apart from the Authenticator app), users can choose their WhatsApp number as an authentication factor.
Now I have two options - send an OTP to the user's WhatsApp (in which case the business could be charged), or s... |
My question is about the general security of using Bluetooth in a
highrise apartment building. I am not a software developer, a network
administrator, nor do I work in IT. When needed, I "code", loosely
speaking, but using 4th generation languages for data analysis, and
not in a way that is relevant to my question. ... |
I have got to upload a sample bank statement PDF online which is going to accessible to everyone. I have obviously edited out all account details, names, codes, transaction particulars and the metadata from properties. The transaction amounts are still the same, and it's important they remain so.
Now, before uploading ... |
Background
I am looking to have a Cloud Storage bucket that is not publicly accessible for images. Then my plan was to sign any image URL on the website to authorize it for a short period of time (~30 seconds) when the user loads a page. This would be for an image host style site running on App Engine (standard environ... |
I know that similar questions has been asked several times, but this question focuses on one aspect I did not found answered yet.
Recently when I was connecting my iPhone to my school wifi (eduroam), it asked me to trust a wifi certificate. How do I differentiate between those that are able to MITM me and those that ar... |
Consider the diagram in https://en.wikipedia.org/wiki/Kerberos_(protocol)#/media/File:Kerberos_protocol.svg depicting the Kerberos protocol.
I'm wondering how the authentication server (AS) is useful.. Couldn't we drop the messages A, B, C, D and simply use the client key K_c (green) instead of K_C-TSG (red) to encrypt... |
I had a debate with a friend about the security model in new OS X versions. OS X El Capitan and newer have the System Integrity Protection security feature which protects aspects of the OS even from root users.
My friend claimed that it's secure by design to the extent that a root user can't read protected files, for e... |
Row-level security is often an industry requirement in secure environments, such as those dealing with payment cards.
It's supported by most major relational databases, including PostgreSQL, Microsoft SQL Server and Oracle. It works by introducing additional WHERE clauses in SQL statements attributing the query to a pa... |
i have a program named x. The program x have one modules which is dep disabled and all other modules linked with dep enabled.
What will be the state of the program x , when developing an exploit , do i need to bypass dep or is there any other way around as one module is dep disabled.
Or is there any advantage if one of... |
Situation
I am learning about phishing attacks using OSINT, social engineering and some Kali tools to send a mail to a dedicated target, which contains an 'appealing' message and an ngrok link leading to a fake website (a fake Instagram login page in my case) where the target should enter their credentials (Username an... |
I asked this question in money about telling my bank about using a second hand or grey market mobile phone. The the implication of some of the comments is that any worry is misplaced.
It seems to me that one could be exposed to financial risk by the previous owner or intermediary dealer leaving some form of hardware o... |
Recently I came across a website and when clicking on one of hyperlinks it displayed a HTTP 500 error page as shown in the image, which indicated that it is using Java Server Pages and on line 23 the code read as
Connection con = Drivermanager.getconnection(conStr,"some_username","some_password");
Have they hardcod... |
If you have connected your iPhone to the school's network by using your user name and password, can they see text messages you have sent while connected to their network? In addition, can they go back and access text messages you've sent while not on their network once you have reconnected?
|
It it possible to execute a malware just by unzipping a malicious zip archive? Like a malware would target some vulnerability in zip decompression routine. How common such an exploit would be in the wild?
|
I keep my laptop backed up using Google Desktop. It's how I keep my things like notes, pictures, etc., backed up. I recently have been reading about ransomware attacks increasing and I wanted to protect my files further. I settled on copying my Google Drive files to a flash drive and, the hope is, if a ransomware attac... |
I have an EC2 Webserver on AWS which has a MYSQL database. The login data is stored on AWS using the Secret Manager. I have added an IAM role for the Server to get access to the password and an encryption key which is stored in the Secret Manager on AWS. This implies that I use the Secret ARN to get the key. I have imp... |
My friend asked me if it possible to get somebody's IP from Google Meet just by being in the same meeting. He found a video that says it is possible.
But when I read about webRTC and STUN servers, I got conflicting information. One side told that leak is possible and this is a weakness of this protocol. And on the othe... |
I know I might take a lot of flack for asking this basic question, but I hope you'll be patient with me. I was looking at a few websites and analyzing the payload when sending a POST request to login.
ON GitHub, for example, I can see both username and password when sending the request.
Whereas, on ProtonMail, which i... |
My task is to find asymmetric cryptography that a private key will be associated with a monitoring unit. The monitoring unit will connect to a tablet device which will show a live feed from the monitoring unit camera. I am to find an asymmetric encryption technique to securely protect the feed that comes from the monit... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.