instruction stringlengths 24 29.9k |
|---|
I started noticing this behaviour for more than a month. Whenever I connect my laptop to the WiFi router there are lots of RST and DUP ACKs up to the same TCP sequence, as given in the example below, where DUP ACK reached the sequence number 13396:
13398 TCP: [TCP Dup ACK 13396#1] 52466 → http(80) [ACK] Seq=89 Ack=150 ... |
When I submit an Customer Reference ID in an Android Application it POSTs an Encrypted String to an API Endpoint.
For example, if I enter the following CR ID :
"CR-13261150"
it POSTs the following Encrypted Data:
splainText : "vpEz/Vm8Yi9v5/fzNE+MDoMIQGZ0vNvjPuX8UNAi26c="
Count : 31
i can say count is based on... |
I was watching this video explaining how tor works: https://youtu.be/QRYzre4bf7I
It explains it with the example of 3 intermediate nodes between client and server. It says that each of the nodes can only decrypt one layer and therefore only the last node can see the message. Each node has only one key to decrypt the co... |
I have a user who has reported that they are getting a Windows Security pop up from Outlook that keeps showing up even after clicking Cancel and signing out/in shown below
Luckily, the user didn't put in their credentials.
Below are some things I've checked from a security standpoint:
Checked the URL in the image usi... |
We are using a truncation strategy to eliminate card numbers. In order to develop, I need the original pre-truncated data files. The test environment is not allowed to have live card numbers. I wrote a program that basically obfuscates the card numbers. The deal is that occasionally numbers are going to valid... |
I am just learning KMS and how granting encrypt/decrypt permissions on KMS keys works, but I don't understand what is the benefit of using KMS to encrypt data to send to another AWS customer, who then uses KMS to decrypt it -- when you could just use AWS infrastructure to send the data directly.
Conceptually what I und... |
I got an exception notification for a request from 92.118.39.180:61001 to: http://\localhost/admin/config.php
This is the notification:
-------------------------------
Request:
-------------------------------
* URL : http://\localhost/admin/config.php
* HTTP Method: GET
* IP address : 92.118.39.180
* Parame... |
Google is advising here to not use a super admin account for daily activities in Google Workspaces: https://support.google.com/a/answer/9011373?hl=en&fl=1
Unfortunately Google does not give any reason for this advice and I can not think about any attack vector in this specific case (in other areas that would makes sens... |
If I am already using
xmlInputFactory.setProperty(XMLInputFactory.SUPPORT_DTD, false);
then do I also need to use
xmlInputFactory.setProperty("javax.xml.stream.isSupportingExternalEntities", false);
to fix an XXE vulnerability?
|
I am trying to better understand and determine the impact and implications of a web app where data tamping is possible.
When discussing data tampering, I am referring to when you are able to use a tool such as BurpSuite or Tamper Data to intercept a request and modify the data and submit it successfully.
I understand t... |
I am trying to build a commercial encryption device. Ok, I know how to write code, how to transform encryption algorithms from the book into code and construct electronics. But my question is: what should I take care of in order to implement a commercial encryption device (ECC, RSA, AES)?
|
Why is my VM not vulnerable to MS08-067?
There are similar question on stack exchange, yes, but they fail to specify all relevant information and so non receive a meaningful, thoughtful nor thorough answer. And I am in need of one.
Problem:
I can not exploit the VM with metasploit's ms08_067_netapi module, and the vict... |
What is the difference between the exploitability score and the exploitability sub-score? And the difference between the impact score and the impact sub-score?
What are the relationships between the respective scores and sub-scores?
|
I plan to use Keycloak to authenticate / authorize various users and services across the organization.
These include:
Service-to-service
End-users connecting from public internet
Intranet users accessing internal services
I see two ways of doing this:
A single internet-facing Keycloak instance with realms for each u... |
I am trying to investigate openssl S/MIME in order to both sign and encrypt loads to be transfered over an untrusted network.
Loads need to be protected in authenticity and confidentiality.
I have already implemented a bash script rather long before discovering that all steps may be accomplished by a single openssl smi... |
There are lots of resources discussing the security of fingerprints but I haven't been able to find the answer to a very basic question.
In the simplest possible password authentication scenario, the password is sent from the client to the server, and the server verifies it is correct. therefore if someone doesn't know... |
I'm working on a mobile application, using django rest-framework as backend, and I'd like to archive the maximum security possible.
Now when the user log-in with email and password I generate a token, Token Authentication from rest_framework (https://www.django-rest-framework.org/api-guide/authentication/) and I save i... |
I use the following command to create your private key and CSR (using the ECC algorithm):
openssl ecparam -out ECC.key -name prime256v1 -genkey -noout
openssl req -new -key ECC.key -out ECC.csr -sha256 -subj "/C=VN/O=Custom Organization/OU=Custom Organizational Unit/CN=*.domain.tld"
After creating the CSR and the priv... |
starting with Burp Suite and trying to breach DVWA, I am bugged with this error: "Invalid Target".
Damn Vulnerable Web App is actually hosted on the private net as Burp shows:
Where am I mistaken?
|
While running some traces for one of our production servers, an interesting item kept popping up in our Wireshark:
[Malformed Packet: Laplink: length of contained item exceeds length of containing item]
This is consistently coming from a single source IP. When I geomap it, the IP sources from Zhigulevsk Cable Network... |
I'm having a hard time to find a clear and definitive definition of what a Message Digest is in regards to hashing algorithms.
Some sources state it's the hashing function itself. Other sources state it's the output from the hashing function after some input is passed through it (ie: the actual hash). Other sources sta... |
In kerberoasting , User request service ticket for any service with registered SPN then use the ticket to crack service password.
But in kerberoses authentication process , KRB_TGS_REQ request is encrypted with TGS secret key which is held by KDC(Ticket Granting Server ) .
I hope i am correct till now .
Question - How ... |
Ubuntu, openSUSE and Fedora can be considered mainstream. In comparison distributions such as Solus, MX Linux, antiX, Void and others could be classed as niche.
Mainstream distributions are typically backed by corporations such as Canonical, IBM or EQT. They may have mature security practices, dedicated teams and infra... |
Is it possible to change the severity of a rule using an OpenSCAP tailoring/customization file?
UPDATE (2022-04-13):
refine-rule seems like it could solve this but cannot find any documentation for whether you can use this in the customisation file.
|
We use Tomcat, and version Tomcat 9.0.62 is supposed to fix the spring4shell vuln. To what extent is it the case? Are we safe not to upgrade to the latest Spring version?
|
Is it possible to design a system with two passwords prompts?
The system will have to prompt for two passwords
The system would have to validate first password before prompting for second password
User cannot be prompted for second password until first password is correctly supplied
The two passwords are stored in the... |
I'm testing Angular application which uses Cookie-to-header token CSRF protection. According to Angular documentation https://angular.io/guide/http#security-xsrf-protection:
When performing HTTP requests, an interceptor reads a token from a
cookie, by default XSRF-TOKEN, and sets it as an HTTP header,
X-XSRF-TOKEN. Be... |
How secure and anonymous is the --tor parameter in Sqlmap?
Does it really send every request over Tor and does it have any IP/DNS/STUN requests leak loopholes?
|
Niche Linux distributions can/may introduce risks such as lack of updates, limited community attention and reduced testing.
Ubuntu, openSUSE and Fedora can be considered mainstream. Mainstream distributions are typically backed by corporations such as Canonical, IBM or EQT. They may have mature security practices, dedi... |
My partner and I are arguing about our auth system. They believe that obfuscating the existence of another account (by showing a generic error) is preferable to surfacing an error warning about account name collision. I argue that this is a way to get users to go away and not come back.
Relatedly, I suggest the pattern... |
I've been seeing our AppScan tools tagging cookie headers from Akamai in low severity.
Mostly tagged as missing attributes of "HTTPOnly" and "Secure" flag.
The question here is should I fully ignore those flagged issues as these are false positives? or should I set the issue "Informational"? Thanks in advance!
|
I like to know if hashing protects privacy enough, i.e., if a hash of PII is still considered to be personally identifying information (PII).
I found this article: https://www.johndcook.com/blog/2019/07/20/hashing-pii-does-not-protect-privacy. It states that it does not protect privacy because of the small space and yo... |
I've been asked to improve the security of my company's iot device, and encrypt a storage partition. It's a general purpose arm based device, and currently can boot from a variety of sources (USB, network, sd card, etc).
The company wants to add a TPM chip to perform the partition encryption.
Am I right in thinking tha... |
Normally, I avoid using any Bluetooth or wireless devices, especially HIDs, but for a project I am working on the only keyboards that will fit the size are Bluetooth and wireless keyboards, so I am stuck having to use one.
To that end, I am looking for ways to make using one more secure, if not exactly secure.
Here are... |
I have an architecture which requires a certain subset of data to be more heavily secured and encrypted. The main parameters which I believe meet the scope of the project are as follows:
Data should be encrypted in transit
Data should be encrypted at rest
The API Server should never be handling unencrypted data of thi... |
Is it possible to prove mathematically that a server is immune to denial-of-service attacks? Or is there some result in computer science journal that it this is an impossible task to do?
|
I have searched online and still do not fully understand. Some sites treat them as different and others treat them as if they are the same.
Can anyone please tell me if they are the same?
Thank you
|
New York times just ran an article titled "U.S. Says It Secretly Removed Malware Worldwide, Pre-empting Russian Cyberattacks" that stated
The United States said on Wednesday that it had secretly removed
malware from computer networks around the world in recent weeks, a
step to pre-empt Russian cyberattacks and send a ... |
I have a hosted a simple react website(testing) with nginx webserver and cloudflare as ssl provider.My website is down from few days with cloudflare error 525 "SSL handshake failed".I was pretty sure my SSL keys are not expired,so i checked nginx logs.Can you please help identify the issue with these screenshots ?
|
This question is purely theoretical, I have no intention of ever implementing this scheme in practice. I'm familiar with the shortcomings of sleeping as means of mitigating timing attacks. I'm more interested in this from the attacker's perspective.
Consider the following pseudocode running on the server side:
procedur... |
I'm pen testing a setup where I have an AP that I control (using wifipumkin3) and DNS spoofing to redirect the known endpoint for a firmware update. When the device requests for an update, I'm redirecting the request to an opened port that I control.
The problem is that I see the device is initiating a TLS handshake (C... |
I'm working on a mobile application and I need to create a token-authentication workflow.
So far I've pointed out main token:
Token by reference, that are store in database, like (https://www.django-rest-framework.org/api-guide/authentication/#tokenauthentication)
Token by Value, that after the user logs in, the back... |
Lots of questions!
I clicked a scam USPS link on my phone while half asleep. The website loaded and a small window popped up immediately and I quickly backed out of my browser but briefly saw the site - it was obviously not trying to look like usps so I'm concerned it contained a virus or malware. (I don't have the exa... |
Can voice input as a password be a useful security measure as an alternative to a strong password and biometrics (face, thumb, signature etc)?
The voice inputted as a password will be saved as a sound wave file in the system and while the authenticating end user has to input his voice with the same wordings he / she ha... |
If the password is hashed and then sent to the server where the hash is compared to the stored hash, this basically means that if someone had that hash they can still log in by sending the hash in the request, the password is just useless at this point.
I am talking with respect to Bitwarden. How does hashing a passwor... |
I have an app where I may choose to configure SAML2 login in the app with:
Public cert of IdP
IdP SAML2 login URL
IdP entity ID
I may also choose to, instead, provide an HTTPS metadata URL from which all of the above information is fetched. The latter implies less configuration but I'm wondering about the security as... |
The common thing to do in defense against XSS, stored or not, is to HTML-encode the payload. Encoding upon the upload/POST of the data is efficient for processing power and neutralizes it early to be stored in the database but the payload becomes active and dangerous for a long time if the upload defense is somehow byp... |
I'm curious what is the most widespread way nowadays to sign the telemetry message from a software program to prove its authenticity to the receiver?
Imagine the software (which can run on-premise, at customers PC) creates a telemetry record. With the customer's consent this record is send to the vendor server. The cus... |
In an effort to avoid having to deal with CSRF attacks, I'm trying to implement an auth flow that completely avoids using cookies. In most cases this makes one vulnerable to XSS attacks. However, according to this auth0 blog post, it can be safely done with access and refresh tokens with refresh token rotation and auto... |
I'm interested in buying a Yubikey but want to know if you can use a Yubikey to generate a symmetric key for file encryption on selected files on a PC. Or if you need some sort of extension like HMAC-secret to do so with a Yubikey.
|
I have gone through multiple questions but still I am confused. RFC X.509 also does not clarify it.
Conforming CAs MUST include this extension in certificates that
contain public keys that are used to validate digital signatures on
other public key certificates or CRLs. When present, conforming CAs
SHOULD ... |
How do GPG smart card devices (such as a Yubikey) handle large GPG operations? Such as signing binary programs.
My first 2 pet theories are:
There's some way to chunk up GPG operations or use some magic to stream data into and out of the device live.
You have to create a one time use subkey.
|
I am studying CREST CPSA where the syllabus is listed here.
There is a part of the syllabus which states I should know the Evaluation of responsive but unknown network applications.
I find this interesting, as with my limited experience in penetration testing thus far, every nmap scan I have done has been a well-known ... |
I'm trying to create a SCP to restrict member account users to create/modify security group(s) that have inbound rule for SSH/RDP with Source set as 0.0.0.0 or ::/0.
Basically, I want users to SSH into EC2 instances only using bastion hosts and not any other machines.
I'm not sure if what I'm trying to achieve is possi... |
I was wondering if it's possible to kick off a network call by manipulating the style tag on an element outside the DOM (which could lead to potential SSRF if this were done server-side). I've tried a number of ideas like setting content: url(foo.jpg) but nothing seems to load if it's outside the DOM. I've tried a numb... |
Privacy can mean different things to people. Protecting one's identity from autocratic regimes to ex-boyfriend/girlfriends/partners. Threat modeling goes some way in understanding actors and the potential options in mitigating these.
Guides such as Security in a Box, Privacy Tools, Privacy Tests, Privacy Guides offer t... |
The accepted answer to this question is now outdated, since Whatsapp web does not require an online smartphone to function anymore. How is the key exchange performed securely?
|
I would assume that if someone is daily crawling a website in a way which is heavily laborious on the server it may overkill that server.
Are malicious crawling bots a form of application layer DoS?
|
I am implementing a system where I need to store passwords in a database (hashed and all). My issue is that the business side requires me to not enforce any constraint on them except length (8 characters minimum), but highly advise to use special characters, uppercase characters or not use your first name. Not followin... |
I have a few drives that have been reformatted that I need to retrieve data from. A friend told me that an app like scalpel might be a good option for doing this. After some research it looks like a great tool if you need to recover common file types, but the problem is that I am looking to recover some obscure file ty... |
Today I found a website which generates a fake profile when asked if said profile exists. Example: www.site.com/user/mycoolname doesn't exist yet. But if I put it in the browser for the site I get a fake profile of mycoolname with no picture, a date joined from some time in the past 6 years, and the users two favorite ... |
My question is being asked in the case that I am currently infected. Many viruses are zero-day viruses, and in addition, I only occasionally install MalwareBytes, which seems to be the agreed-upon all purpose virus swiss army knife which gets prescribed by online forums when you request assistance with malware.
My ques... |
We have a web app which is used by many companies.
Each user of the web app could work for more than one of these companies.
We want each company to have the ability to enable 2FA for all the users in that company.
This will just be an on/off setting because each user is already associated with an email address and mob... |
My company provides a single SaaS product for corporate clients.
For one client we are implementing SSO with them as authentication provider (via Azure AD/SAML for now, but the library we are using is extensible).
The same client has asked us to implement MFA.
My gut reaction is that this would result in a weird hybrid... |
TLS 1.3 has a bit different handshake messages than 1.2 (and older) had. The client is supposed to send DH parameters directly in the first Client Hello message. How do browsers know if that's what they should do? What if the server supports 1.2 tops and it doesn't talk 1.3?
|
We were trying key export from Windows Certificate Store as part of a certificate module development.
The code is in C++ and mostly WinCrypt and openssl APIs are used.
I installed a certificate that has private key in my Local Machine certificate store (certlm.msc).
When retrieving, it was seen that the export is faili... |
let's say that someone sends me a business email on Microsoft outlook 365.
I save the email as an attachment (email.msg)
How a third person can make sure that the email attachment is not edited (sender name or content) when it's sent to him?
|
Context
On my website, users can upload their PDF files, and then some, other users can view the uploaded PDF files.
I was wondering if this could come with security issues.
The uploaded PDF are simply displayed on the website thanks to: <embed ... type="application/pdf"></embed>.
Question
Doing some reasearch, I stumb... |
I am thinking about using shadowsocks to bypass some Internet restrictions imposed by government. In order to do that I need to be sure that the traffic betweeen shadowsocks client and server is encrypted because at the moment, my ISP uses SNI to detect connection to blocked resources.
Searching on the Internet doesn't... |
I opened a website 99acres.com in incognito windows on two browsers on a Macbook. Following are the settings:
Chrome
Version: 100.0.4896.75 (latest)
Third Party cookies: Disabled
Firefox
Version: 99.0
Browser privacy: Standard
My observation
One difference I observed in the cookies is that Chrome did NOT block a co... |
Let’s say I created a deploy key with write permissions to repository A.
Let’s say repository A has a protected master branch that has " Require a pull request before merging " enabled and “Allow force pushes” and “Allow deletions” disabled for everyone including admins.
If a malicious attacker steals that deploy key, ... |
I was intrigued with AnonAddy and SimpleLogin. They provide an email address forwarding service to prevent leakage of your real email address.
I just want to ask if they really hide my real email address against motivated attackers?
https://simplelogin.io/
https://anonaddy.com/
|
I'm unfamiliar with coax broadband provisioning specifics with new (100/10) service in a residential neighborhood, and intermittently getting Internet disconnections and interestingly discovered the ability to also intermittently reach a neighbors NAT router management interface via my non-routable 192.168.x.x address.... |
I have found the hashes for the stored passwords on my mac, I do not have the administrator passwords, I do have the hashes coming from the /var folder. I have tried decrypting it using hashcat but it keeps failing due to multiple errors that I don't really know how to fix..
Hash '?d?d?d?d': Token length exception
I wa... |
A newly joined software engineer in our organization uploaded one of company's proprietary git repository on his personal Github public account, likely without nefarious intent.
How do I ensure this won't happen again in future? Apart from formal code of conducts, signing NDA etc. Are there any technical measures that ... |
Consider this scenario:
You have a central Git repository online (e.g. on Github, GitLab, etc.)
User1 and User2 have access to that repository
User1 is malicious and changes some files in a past commit (he does not add a new, normal commit)
User1 pushes the changes to the central Git repository
Will anyone notice thi... |
I'm learning about basic x86 overflows in C but normally I code with Python. Is there anyway that programs written in higher level languages can suffer from buffer/heap overflow?
|
I was logging into YouTube when Apple said my password was weak, and I should change it. Is this randomly generated password safe?
|
So, I have 2 Google Drive accounts. Let's say Drive A and Drive B.
If one day I login/upload to Drive A then log out, then login/upload to Drive B, can they notice that I have 2 different accounts? Or can they only know that I accessed Google Drive without knowing anything more?
And what if I login/upload to both accou... |
I mean, I can exploit the vulnerability using a substring function and without using an ASCII function like:
SELECT username FROM users WHERE id = 1 AND (SELECT substring(password,1,1) FROM users WHERE username = 'admin' ) = 'a';
And I can exploit the vulnerability like this:
SELECT username FROM users WHERE id = 1 AN... |
I was reading the VeraCrypt documentation about hidden volumes [[1]] (plausible deniability), and they recommend putting "sensitive-looking files that you actually do NOT want to hide" in the fake part of the encrypted volume (called outer volume). I do understand the point of making your "attacker" believe that they a... |
Want to know what happen to:
Bitlocker partition
Veracrypt partition
Veracrypt container
If there's bad sector appear in the encryption area.
Can I still mount/open the encryption to save non-corrupted data inside it?
OR
I cant open it at all and good bye?
|
I'm wanting to use hashbackup to backup one server (A) to another server (B).
Hashbackup can send the backup to server B, if server A has server B's key (public?) for passwordless ssh.
I haven't used keys prior. I prefer ssh'ing with password and 2FA. I guess that I generate the private/public key pair on server A. The... |
I have a certificate with a common name of "myApi.mycompany.com" and 3 SANs: "myApi-dev.mycompany.com", "myApi-uat.mycompany.com" and "myApi-stg.mycompany.com".
The problem is that when I try to use the common name "myApi.mycompany.com" it says that the certificate is only valid for the SANs? is that a bug or that's by... |
Many downloads offer an OpenPGP signature, which can be used to verify the file, but if a hacker manages to manipulate the file, then he can also simply change the signature key, or not?
|
Checked many blogs for 2 way ssl(Mutual Authentication) for magento api's or PHP but did not get end to end implementation details.
Below is my understanding.
Lets consider client (sslclient.com) and server (sslserver.com), both will communicate after verifying ssl certificate.
The client will verify server certificate... |
I am wondering about the effectiveness of no root firewalls as a solution against any type of spyware / malware. Particularly on an android device.
No root firewalls like this one here (aptly named) NoRoot Firewall is an application level firewall, which filters outgoing connections on a per app basis. It will by defau... |
I am a university student currently trying to demonstrate exploitation of the SMBGhost Vulnerability on Windows 10 (Version: 1903, Build Number: 18362.356). I need to provide evidence that the vulnerability exists. However when using Nessus (Community Edition) within my Kali Linux environment. The vulnerability does no... |
As I understand the original master key, which is used to encrypt the application data is never transmitted over the wire and it is calculated on both client and server individually using a hashing-alike function which takes the following as input:
Client Random
Server Random
Pre-master key encrypted with Server's pub... |
I am testing website security when I came across this:
When I enter the site URL, the user is given a session ID without any user input like:
7F746326038B30F51609423B2086BEBB
Scenario 1: Once I logged into the website by providing the correct credentials, it logs in but the session ID remains the same. In the same ses... |
I am passing the Cookie header of a valid authenticated, high privileged user to the unauthenticated or low privileged user using Autorize (Burp Extension).
So ideally, the Autorize says the requests are bypassed because the Cookie header is now changed. This can also be manually performed in the Browser's Application ... |
I would like to ask what encryption options are available for the following real scenario:
There is an unsecure, full-duplex communication channel between a server and client
There is also a secure one-way communication channel from the server to the client
From this it is sought to have secure full-duplex communicat... |
In the country I live in, most authentication for online banking or authorities (such as tax) is based on an app. It has two operation modes:
Enter personal number on website (the personal number is not secret). Enter PIN code in the app on connected phone.
Use phone scan QR code displayed by website. Enter PIN code ... |
While reviewing the suggested edits for the Personal Finance & Money Stack Exchange site, I came across some strange proposed edits:
Example 1:
Example 2:
This looks like some kind of attempt at attacking the website. Could you explain how this attack is supposed to work? I see a PostgreSQL-specific SELECT in example... |
My goal is to analyze the traffic of an Android application, to check if it contacts any IPs not associated with the server it is meant to contact.
Using PCAPRemote I created a connection log file and transferred it to the PC, where I am analyzing it with WireShark.
My problem is that there are dozens of different IPs,... |
After using PGP for a long time I have trained myself to write bland email subject lines that disclose little or nothing about the contents.
Some people I correspond with unencrypted have an annoying habit of writing very explicit subject lines, sometimes all in upper case. It is annoying on a human level in that it hi... |
Hashcat lists FPGAs as OpenCL device type in its help.
- [ OpenCL Device Types ] -
# | Device Type
===+=============
1 | CPU
2 | GPU
3 | FPGA, DSP, Co-Processor
Can you really connect and use an FPGA with hashcat?
|
I've read veracrypt documentation, but don't understand these 3 points.
• A VeraCrypt volume resides on a device/filesystem that saves data (or on a device/filesystem that is controlled or monitored by a system/device that saves data) (e.g. the value of a timer or counter) that can be used to determine that a block ha... |
I am looking for a secure (and as easy as possible) way to store my encryption key.
I have been looking at some services that will hold the key for you and then you can retrieve it with an api. The idea is that they store it safely and on another environment, making it harder to get the key than for example from a .env... |
So I'm writing a paper on sql injection for my db class and one thing I don't understand is this.
I assumed that one of the reasons a lot of sites don't allow duplicate usernames is that they use usernames as primary key and that's why a login using SELECT only has one result for it to work. But what happens when they ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.