instruction stringlengths 24 29.9k |
|---|
I am building a Certificate Authority using Windows Server ADCS as a 'Standalone' CA but my application would be greatly improved if I can utilise OCSP.
Is the ADCS Online Responder Role Service appropriate to be exposed on the public internet?
Are there any best-practices to harden it, and reduce it's attacker surface... |
The (old) Secure Secure Shell guide suggests (re)creating /etc/ssh/moduli so sshd has safe prime numbers to use for Diffie-Hellman key agreement.
I've generated a 4096-bit moduli file with ssh-keygen -G -b 4096, and then filtered them with ssh-keygen -T - which ended up with 31 safe numbers.
The stock file provided by ... |
So I'm making a distributed recovery system which consists of a bunch of hidden usb sticks. I plan to have the file be an executable, probably in the form of a appimage, which will contain my encryption software and encrypted volume.
The only hole in this plan is if someone modified the file or swapped it out with malw... |
We recently ran a Veracode SAST scan on our application and discovered that it has a CSRF. However, I wanted to check whether this is really true or it's just a false positive.
Our application is a pure backend server. Serving JSON APIs to the users.
Users will be calling these APIs from their backend in 99.99% of the... |
Reading RFC3447, Section 8.2.1, primitive RSASSA-PKCS1-V1_5-SIGN requires an encoding into ASN.1/DER. Why not just sign the raw hash bytes rather then wrapping them as ASN1?
|
We sometimes get to see this behavior from a single IP address/logged in user -
There are a lot of hits on our server that have .png at the end of the URL which results in a 404 because we don't have any such URL nor a static file at this URL. Is this common across the web? Is there any extension that initiates this? o... |
I have come across a lot of guides and blogs about reverse engineering where they use labs to teach various techniques and methods to break binaries. My question is what actual use cases does reverse engineering have in the real world, as I don't think the labs you learn about would actual be emulating a real world att... |
If I work for a company that wants to sign its own certificates for its website, documents and software it writes, is it possible? I have read a couple of post on here from around 10/8 years ago but has it changed much since then?
Is it any more financially obtainable to acquire some sort of valid signing certificate t... |
In the near future, I will have about 50 remote computers to manage. These will be physical PCs running Debian 11, distributed all over the country. They will automatically perform a special kind of measurement repeatedly, and upload the results over the internet to 2 web servers.
I have already implemented the system,... |
I'm trying to make an app that can encrypt files and decrypt them on demand(for educational purposes)
I need a way to:
delete the file from where it was before
delete the file each time the app decrypts it and the user is done using the file
It's essential that the decrypted form of the files can't be recovered. I'm ... |
I always used to use a mechanical keyboard to type. Recently, I found a hardware trojan in my keyboard's firmware.
Can mechanical keyboard firmware be modified?
|
I've noticed that people don't use a user account for a specific task;
I keep thinking the concept is called a "service account"
But it causes a lot of issues surrounding security; for instance one should not use their general administrator account to browse the web, access email, and access a database for instance; be... |
I was browsing the ld.so man page and I saw an entry about Secure-Execution mode:
**Secure-execution mode**
For security reasons, if the dynamic linker determines that a binary
should be run in secure-execution mode, the effects of some environment
variables are voided or modified, and further... |
I wanted to explicitly define the referrer-policy as "strict-origin-when-cross-origin" in my web application. However, "strict-origin-when-cross-origin" is the browser's default policy when no referrer-policy is set explicitly. This is followed in almost all the major browsers such as chrome, firefox because it is a se... |
Is there a point in being MITM nowadays since HTTPS makes it impossible to make sense of sniffed data and HSTS prevents SSL stripping?
|
I have a lab I am dealing with and need help to get a meterpreter session on this win 7 system.
My buffer overflow works great back to the pivot box. However since my attack box is not reachable from the subnet I cant find a way to get the meterpreter session.
I tried adding a portfwd on pivot but then bg that process ... |
I have 4 SG350 (SG350-28 28-Port Gigabit Managed Switch) switches
I need to be able to do a Credentialed scans to the switches
The problem is when I try to scan it will not connect to port 22, from the log output it does not look like it is even trying.
SSH is enabled
I can SSH from putty
I can SSH into the switch from... |
After trying to connect to the server from a client, using ssh, I got the following message:
Does it mean the server uses private key for authentication?
|
I setup an IKE VPN server for road warriors. I actually have this working (YAY!) but took some shortcuts that are leaving me with a working yet not-right/secure setup. My setup is as follows:
My server (DNS name vpn.mydomain.com) contains certs for:
"mydomain CA" (certificate authority), LT, since i run my own CA
"vpn... |
I've researched this topic a few times and have not been able to come up with a definitive answer. It appears the threat may be multi-faceted.
I ask in the context of a standard Server/Client Windows network where end-users have shared network printers installed on their devices. Microsoft released a patch for CVE-2021... |
In the 2004 movie "Primer", the a character goes back in time, and there are two copies of him, both with a cell phone. The character receives a phone call initially, and then receives the same phone call again at the same point after going back in time.
Following this, the characters are concerned that they have broke... |
At the present time, the website "printfriendly.com" is not available in my work environment. I had submitted an appeal to our helpdesk to have this site reviewed. Their response: That site is a "proxy" and as such is insecure in our educational setting.
Printfriendly is a valuable tool. For example, printfriendly will... |
All machines are Linux-based.
I want to force ssh (or telnet) to the 192.168.100.20 server from the laptop through the SSL Tunnel. What command should I use?
|
I know that it's theoretically possible that a router can be hacked, and malware can be spread throughout a network merely by being connected to it.
However, I'm wondering what exactly the chances of this is, since, we never really hear about it often.
For example, universities share connections with hundreds of studen... |
I am new to ethical hacking and I often find myself really confused when evaluating and determining the danger level of information that can be found regarding a domain when performing OSINT. I'm not sure what information an ethical hacker should be looking for when performing OSINT which may place the web application ... |
Am I right in stating that SCrypt as an algorithm is useful where many passwords are stored in a database, but not against one specific encryption key derived from one password of one user?
For example, let there be a password, a salt, and parameters for the SCrypt algortithm.
Let key = SCrypt(password, salt, params).
... |
I am doing some web scraping for streaming files, .m3u8 mime type. In this particular instance, I can't create a functional request that does not end up with a 403 Forbidden error.
How to reproduce:
Go here in the browser: https://sbplay.org/play/0t689fl5boy8?auto=0&referer=# ( This is just an embedded stream )
Open t... |
I was given a PGP encrypted file, and have been told I can decrypt it using a public key. I don't think that will work.
Can anyone that knows for sure how PGP works confirm that what I've been told is not achievable ?
How I've done PGP in the past was:
Party A has private key (and password); A gives public key to Part... |
I have a pair of RSA keys where the private key is encrypted with a passphrase. Would it be a security risk if the public and private keys are committed to version control without any further encryption (like via using Ansible Vault)?
NB: The passphrase, however, is encrypted with Ansible Vault.
Context:
Why do you wa... |
I have a application, that can communicate with some other devices on local network and it has a possibility to turn on only HTTPS communication in its GUI. However since the application is specially made for communicating with certain device and the device has only self signed SSL certificate by default, to make thing... |
I'm using Debian + sddm + KDE with ONLY home directory encrypted with gocryptfs.
Decrypting is performed with gocryptfs as follows:
PC boots as usual and starts the sddm service
I enter my login credentials (which equal to my encryption password)
pam_mount decrypts and mounts my user's directory, and performs the logi... |
This site is the only piece of online presence I have in my own name. I also have two gmail addresses in my own name.
If a background check is to be made on my online activities, would there be a way to protect all my online data except this site from a search?
I have never done anything illegal but I would still prefe... |
I run a server on a hosting. I want to harden it, but ssh access is giving me a bit of concerns.
I usually access from home most of the times. I have a provider subscription with the usual DHCP setup which assigns some IP address to my home. Usually it's the same. But I know it has changed some time.
The server has ufw... |
If there is a program written by a normal user that requires root privileges (eg. a program that interacts with root processes) what is the difference between running this program using sudo vs. changing the program permissions with chown root and chmod +s from a security perspective?
|
What is the danger of setting IIS errorMode to detailed in webconfig? It helps me marginally with sanity checks on production, but it seems like it wouldn't really help a bad actor much. I'd like to set production to detailed errors, but I find people warning against that with little to back it up. Am I totally off ... |
I believe most new Android phones have full encryption enabled by default, so even if I just
download some PDF weather report from the internet, it will sit encrypted on my phone's SSD.
Now, suppose my phone breaks and loses power, such that just the SSD remains good and I eventually
get all of the SSD's raw bits copie... |
I am connecting to a fedora xrdp server from the built-in Windows Remote Desktop client.
I have access to the /etc/xrdp/key.pem and to the certificate inspection window on on Windows Remote Desktop
In this case I am connecting to a local IP, but is there a way to check if I am connecting to the expected server?
I have... |
When I search a site by its name on Google search engine, my Chrome browser pings the first search result, making a TLS connection.
For example, if I search "github" on Google, the first result displayed is obviously github.com, and I can see with my firewall a connection to github.com:443 (before clicking the result).... |
I have developed an Excel spreadsheet to compare lists of SHA-512 hashes from two separate drives. One drive is the source data drive on a Windows machine. The other is a backup of that drive, connected to a Linux machine. I obtain the hashes on Windows using DirHash, and I obtain the hashes on Linux using rhash.
The p... |
Or I open a video using vlc media player, and later delete it securely. Does vlc "retain" some of the parts of that video even after deletion?
|
We have closed all ports on our firewall except for port 5011 which is the only port that is required to be open on our server so that our server can receive price data and send buy and sell orders to our forex broker. We have restricted access to only 2 remote servers which belong to our forex broker, all other outbou... |
I was just taking a look at my registry editor when I noticed some strange folders in the bottom of the HKEY_CLASSES_ROOT section. These folders are named 칞ꊟጀ耀 (No translation), 縀䆁 (No Translation, but is pronounced Xiá gāo) and 䈍麉ᄏ洳祕ā (translates to "The Secret") which is rather eerie to me.
Windows defender has not s... |
I have Computer Networking in my course work this semester. Yesterday, I learned about P2P networking. To learn more, I searched the internet and found this article online, published by The Ohio State University.
In this article, they say...
Peer-to-peer networks can be very dangerous from a security perspective. When... |
I have implemented Certificate Pinning in a prototype of an android app. Here are the steps I followed:
Converted .crt file to .bks file
Added the .bks file to the asset folder in project structure
Loaded the above file during API call using trustmanagerfactory
The security auditor is saying this implementation is we... |
For a social networking site example.com, users all have their own domains. How can you keep someone seamlessly authenticated across all domains?
For the main site, example.com, I am currently using:
<?php
session_start();
//handle session data
?>
This creates the PHPSESSID cookie for the user. They remain log... |
I'm developing a React web app where the user can input a .csv of their transaction data, and the app will output useful analysis that will inform their future purchase decisions.
I'm planning to use an input component for the user to input their csv file, then I'll save it in the app's state and use it for analysis
co... |
I have a SAML offering for my clients to access my cloud based application. Should I have a portal for them to upload their certificates or should I go the easy route and just have them e-mail them to me? What would be the best practice for this case?
|
The ISP would still see the IP address of the VPN you're connecting to, but it would not be in plaintext compared to normal DNS from what I understand. Should one even bother or just let it be as it is?
Edit: I mean, instead of the ISP getting the domain name of the VPN server in plaintext, they'd only get the IP of th... |
I am trying to analyse some malware samples but I am trying to understand the differen between malware signatures and malware artifacts. As far as I understand (and from what I've understood from this other post: What is the difference between artifact and evidence) both terms can be defined as follows:
Signatures: Spe... |
Regarding Apple's beta feature of storing WebAuthn passkeys in the iCloud Keychain, does anybody know if the unencrypted passkeys ever leave the secure enclave, and get stored in RAM or anything?
With traditional WebAuthn on a Yubikey or similar device, my understanding is that the private key never leaves the Yubikey,... |
Say I have an RSA private key, if encoded in PEM, it usually looks like:
-----BEGIN RSA PRIVATE KEY-----
<base64 encoded bits>
-----END RSA PRIVATE KEY-----
If I encrypt the said key with a passphrase using AES, and then encode it in PEM, it should look like this:
-----BEGIN RSA PRIVATE KEY-----
Proc-Type: 4,ENCRYPTED... |
I am currently working on a cli application which uses AES encryption. For key generation, I am using the PBKDF-2 algorithm, along with SHA-256. I am providing a way to enter the password once and store the key, to enable the user to use the application multiple times without entering the password, till he decides to r... |
If the ISO file for an operating system is malicious, is it possible for it to overwrite UEFI code when booted (If secure boot is disabled)?
|
I have written a Python script to inject a payload through the requests library, but the payload is being added instead of injecting
xsstestscript=html.unescape("<script>alert(1)</script>")
the payload is being sent:
{'txtName': 'as', 'mtxMessage': '<script>alert(1)</script>', 'btnSign': 'submi... |
I'm currently trying to enforce regular users on a Linux SSH server to use 2FA (password + TOTP) while allowing power users to only use SSH keys for authentication. SSH keys are sufficiently secure for my purposes, but many of the users will initially be unable to cope with the use of SSH keys. For them, it should be o... |
I have been learning about DNS over the last few days.
For fun and learning, I wanted to try to set up an authoritative nameserver for my own domains.
I read that creating open resolvers is generally advised against.
I was wondering if it was also discouraged to make my own authoritative nameserver.
Are there any attac... |
A Wordpress security plugin notified me about login attempts to the Wordpress login but from localhost (127.0.01). This means the requests are triggered from my root server. The attempts were trying the username "admin". I believe this indicates a compromised server.
My question is: How can I identify the process or us... |
My goal is to make one of my android phones as secure as possible, hence the question: What is the most secure way for an Android phone to gain internet access? Options I (think I) have:
The phone has it's own physical sim card. Threat I see: The sim card could be manipulated by an attacker with physical access to my ... |
I need the best way to access a webserver to upload/modify a PHP script. The website contains very sensitive information, gaining unauthorized access to this server and modifying files would lead to an extremely huge financial loss.
I guess the best way would be to lock the access SFTP to a specific IP/IP range using f... |
A lot of websites tell that HTTP is insecure, but if I manually change the address bar URL from http:// to https:// in a website I visit does it provide security regarding the connection?
Because all the websites that I visited so far which were using the HTTP protocol and I did this worked. I know that major websites ... |
Statement (In Interview):
ARP spoofing attacks are more effective for UDP packets rather than
TCP packets since TCP establishes reliable communication channels.
I have opposed the statement saying that once ARP spoofing is done, then we are connected to the victim with a reliable TCP connection as the connection is b... |
We have closed all ports via our hardware firewall except for port 5001 which is open to allow our trading platform software (which does not have any publicly known software vulnerabilities) to communicate with our forex broker's trading server. Via our firewall all internet traffic is blocked except for internet traf... |
I need help with an sqli exercise. I used sqlmap to find a UNION vulnerability.
I managed to get the H2 version with this payload:
string') UNION ALL SELECT NULL,H2VERSION(),NULL,NULL,NULL--
But I would like to modify the database. I tried with this payload:
string') UNION ALL SELECT NULL,UPDATE ITEMS SET NAME = 'Hel... |
I am not a technical person. My company recently asked me to install FileZilla to transfer files to and from a server in my company. So I installed FileZilla and typed in the credentials my company gave.
Then the following message appeared.
I would like to ask whether the insecure FTP connection only affects the data ... |
I would like to know what are some safe and easy ways to play a media (in particular, video) file that I downloaded from the internet, from an untrusted source. I know that if I use an open-source media player, like VLC, one could craft the media file in such a way to exploit a vulnerability in the media player and pos... |
If I loan out laptops to my employees to work remotely, such as Dr's, Nurses and other healthcare workers that generate sensitive information on patients, how can I remotely disable the laptop's ability to power on/charge?
Are there any motherboard interfaces that can help me achieve this?
I am already encrypting both ... |
What is the preferred way to implement personal information encryption / decryption?
After some reading, the main options appear to be:
Encrypt/Decrypt it at the database level
Encrypt/Decrypt it at the backend level
Encrypt/Decrypt it at the client level
Encrypting it at the database level, PostgreSQL offers PGP Enc... |
I'm going through OWASP Cryptographic Storage Cheat Sheet and it says:
Encryption keys should be changed (or rotated) based on a number of different criteria: (...) After the key has been used to encrypt a specific amount of data. This would typically be 2^35 bytes (~34GB) for 64-bit keys and 2^68 bytes (~295 exabytes... |
I've configured the following on my IOS XE device.
!
ip ssh rsa keypair-name my-4096rsa-ssh-key
ip ssh version 2
ip ssh server algorithm mac hmac-sha2-512 hmac-sha2-256
ip ssh server algorithm encryption aes256-gcm aes256-ctr
ip ssh server algorithm kex ecdh-sha2-nistp521 ecdh-sha2-nistp384
ip ssh server algorithm host... |
I am familiar with the basics of CT and certificate pinning. However, I'm failing to understand how CT properly replaces pinning in mobile apps in a scenario in which, for example, an attacker steals a device or downloads the application from the app store, installs a trusted certificate belonging to a common proxy suc... |
I am planning on analysing some malware samples dynamically using a sandbox tool and a target Windows VM. The host (physical machine) runs Ubuntu and in it are the sandbox and target VM.
So far I only analysed benign samples, i.e. normal software. I store the samples in the Ubuntu host and use the sandbox tool to injec... |
I'm considering using Yubikey to log in to my Mac. However, in my threat model I have to assume that it will fall into the wrong hands, hence the question: does Yubikey have any mechanisms that prevent bruteforcing its PIN?
|
I have those two rules in UFW, but no idea what is the difference between [1] and [2]?
To Action From
-- ------ ----
[ 1] 22 ALLOW IN Anywhere
[ 2] 22/tcp ALLOW IN Anywhere
Should I... |
At this company that I am working for we are discussing the merits of have a DMZ in a production environment that interfaces with other partner networks. The platform in the production among other things downloads files over SFTP.
The platform uses Azure Data Factory SFTP connector to access files. The connection 'open... |
I have written a simple C program (~30 lines) that opens an internet socket and sends data to the client on every connection. The program never read()s from the socket; it just parses the /proc filesystem and write()s the output to the socket, then closes it.
I have almost no defensive programming skills, so we can ass... |
Say, you call Wells Fargo's or Fidelity's customer support number, from Skype. Example number: 1-800-869-3557
You use Skype because you're overseas and because Skype lets you call US numbers for free. You do not have a paid Skype account. It's a regular free account.
On the call, you type things like account number and... |
How do different secret-key algorithms generate the same data?
In the snippet below, I use PBEWithMD5AndDES to produce one key, and PBEWithHmacSHA256AndAES_256 to produce another key, but with the same password. How is backwards compatibility preserved between algorithms, but they are somehow also harder to reverse eng... |
Do you need physical access to hack a BT land line before an outgoing call is made (dialing tone)? I understand if you have physical access you could just put something in another phone socket. But, I can't easily find out whether BT have, at least in principle, access to my speaking voice while I am sent a dialling to... |
Is the call encrypted with something like HTTPS to prevent a corrupt government (or ISP) from messing with the DNS routing, sniffing, snooping etc? Can my ISP or government listen to my Skype calls?
I'm calling a bank's 800 number from Skype using my phone while being present in a random country.
By government, I'm ref... |
I upgraded my processor and now I get this message when starting my computer:
We detected a new processor which will change the data/structure of the storage space for firmware TPM. If you did not apply TPM function, please press Y to continue, otherwise please follow instructions below:
Press Y to reset fTPM, of you h... |
To properly assess password strength, I have been trying to research what the fastest known password cracking rig is in hashes per second.
HashCat claims that their software is the world's fastest, and the current version is v6.2.5. I also found a Blog report which claimed that there is a password cracker, which is an ... |
I'm pretty new to this world of security and I'm doing some challenges trying to solve puzles of security, the thing is I have a website that is not loading it throws a timeout if I do ping, but playing with nslookup dig I've found an IP that responds to the ping, and in the path of finding this IP I found that the web... |
I was quite surprised to find out that both Chrome/Chromium and Firefox share cookies between different windows, even in their privacy-focused modes.
This seems a huge threat since it gives an attacker the chance to silently launch a new window and get access to all of the current cookies/sessions.
Is there a workaroun... |
I noticed it becaue one of these exe's started running after a BSOD.
Putting one of the exe's into VirusTotal gives it a 3/70. How can I examine this further?
Edit: Other exe's are worse: VirusTotal 23/71 as Trojan, CoinMiner, ... Yep.
|
I currently have a g-mail address (example@gmail.com). I recently received a message addressed to example@aol.com. Looking at the header I see my correct address in the Delivered-To: field but in the To: and cc: fields it's showing the example@aol.com. How is this message getting to my g-mail account?
|
I just ran a security scan on a new server, and one of the lower-priority recommendations was to disable all key exchange algorithms that use SHA-1 (for example, diffie-hellman-group-exchange-sha1).
I started digging into the crypto-policies, and I see that name in the opensshserver back-end, but nowhere else. What I ... |
Do pentesting tools leave behind any information in order to identify the attacker?
|
I have developed a multithreaded server/client python application, my next goal is to encrypt the traffic between both parties but I can't tell where should I invest all my research energy in
Using SSL/TLS has a warning that is really not that easy to achieve proper encryption
This question has an answer but it is vuln... |
I was looking into the idea of port spoofing, and I came across this
GitHub repository. I'm mainly looking to disguise my computer as something else, whereas this program opens every TCP port and emulates a service on it. Could I use something similar to say, only emulate a printer service?
|
In a database table, I was running some phone number validations and I noticed that some unicode characters were inserted in a phone number field.
The characters are:
(U+202C): Pop Directional Formatting
(U+202D): Left-to-Right Override
The database cell is in the following format:
[U+202D]+35387123456789[U+202C]
I ... |
How to pipe a characterset to Hydra.
Something like this which can be done on hashcat
(crunch 8 8 123456789| hashcat -m 0 ce5cff0195a6b059a32411b6202ab49)
|
I want to know how my data is protected if I enable 2FA on my account on the back end side.
I am using a MDM service to manage our company phones. My company works with sensitive data of clients. I want to be as secure as possible and to know the risks of using such a service.
Is the company able to access my account w... |
I clicked an IP logger link. I am worried someone might send CP with my IP address and I would get wrongfully arrested. Will this happen? Or am I relatively safe?
|
When classifying data sensitivity I generally run into a few standard categories such as:
Public
Internal
Confidential
Restricted
Which do generally cover the sensitivity levels but don't make it necessarily easier to categorize the data. I'm generally really struggling with how data sensitivity regards towards the a... |
I asked a question about HTTPS encryption as it relates to developing a web app here. On the face of it that question has now been closed twice for not being focused enough, but if the meta discussion is anything to go by, it's more realistically because of my wrong assumptions about the topic. An exchange in the comme... |
Definitions
Grub is the second stage bootloader often found in Linux distributions.
shim is the first bootloader ran by the ROM firmware. It is signed by Microsoft.
ROM firmware is the code embedded in the hardware which implements the UEFI standard. It used to be called BIOS but after UEFI was introduced that isn't te... |
First, I realize trying to come up with your own crypto schemes is not a good idea. I'm a relatively new member of a team of developers utilizing such a custom scheme and I'm trying to come up with arguments to argue against that policy.
To secure communications between a client and a server, we have a standard Diffie-... |
Lately I've read a blog post for an advanced malware, that has a dropper that ensures that the victim machine is not used for malware analysis and if that's the case terminates.
So I'm thinking that it checks for installation of some software but I'm no expert, what it might be checking?
And how can I create a similar ... |
Context: There are many reasons for wanting a very trustworthy timestamp on a document, as discussed in many other questions here such as this one I wrote in 2010. E.g., in an election auditing context, one thing we're interested in is a cheap, quick, secure way to publish hashes of ballot images (or batches of them) i... |
Following on from Why do mobile devices force user to type password after reboot?, I've noticed that my Pixel 6 Pro can access data after a restart. e.g. WhatsApp messages come through and notifications with previews show before the device password has been entered.
On previous phones, like the Pixel 5, the device requ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.