instruction
stringlengths
24
29.9k
When you receive an email, most email programs will display the sender as a name (chosen by the sender) and hide the actual email address behind it. Spam emails often abuse this by sending mails from something like 'Microsoft (john.doe@aol.xyz)' so the name looks legit but the email address shows the fraud. Today I rec...
I have the following problem: A service provides a REST API. Different kinds of clients (desktop applications, mobile applications, web applications) connect to this API and send and receive data. In front of the REST API is a web server (nginx) acting as a proxy. It is also used for load balancing. Both connections, f...
I'm using an email service with encryption option and I need to send an encrypted email. So if I need my letter to be sent encrypted, I need to take my receiver's public encryption key and apply it to my letter with an encryption function. The point is my service has built-in encryption, thus generating my own private-...
So I've found a way to get the IP address of a user on a popular website without taking them out of said website (i.e. without making them click any links) by making them (the user) send a request to an arbitrary url, and by doing this you are able to get their: IP address User agent (on mobile it will show their oper...
I've recently eradicated Active Directory from my network. However, I'm having trouble verifying there is no issue with sharing files using a local account instead of a domain account. I have exactly one server I was unable to convert to using OneDrive/Sharepoint. This server has one folder that I will need to allow sh...
I have been using Touch VPN for a few months to view social media accounts because I worried I was viewing them too much and would be flagged or something. I just learned, however, that VPNs keep logs and store info, especially when accessing social media sites, and especially the particular VPN I used. I downloaded an...
I have a Word document that is password protected. Am I wrong in assuming that if I know nothing about the password that it’s basically a waste of time trying to crack it? I do remember it’s two short words put together. My problem is I have no idea how to make a list of all those word combinations. I’ve tried using th...
Since PHP has loose type comparison, we have: php -r 'var_dump("1234e03"=="1234000");' bool(true) And since MD5 hashs are often reprensented as hexa string like 713f44b3d2c680df02eb5a0bde86fcd7 Are there two already known values that make a MD5 collison for PHP loose type comparison like md5($value1) == md5($value2) ?...
I have found a tool that requires me to compile it with Visual Studio. I am not sure if I can do it without the risk of malicious software being installed during the compiling process. Is that possible? Or would only the resulting exe file be malicious?
See the screenshot below. A friend asked me about this. Person #1 had a group text thread with Person #2 and Person #3. At the top, Person #2 sent a photo and a message. Person #3 replied. Then there appears a rude reply from Person #1 just a minute later. That reply was not sent by Person #1. Person #1 does not see th...
Forgive my inexperience with encryption, I've been researching this for the better part of the morning and still cannot find a smoking gun answer. A vendor is requesting that we verify a website we utilize is secured using a specific cipher: ECDHE_RSA_WITH_AES_256_GCM_SHA384 On checking the site I see it is encrypted u...
I am writing a cloud backup system, and want to use a checksum to know if a file has been modified, and accordingly sync it with the server. This question shows that xxHash is super fast, and this shows that it is significantly worse in terms of collisions (albeit this uses 64bit and I plan on using 128bit xxHash) is i...
There is user1 and user2. All work is done from under user1. user2 is only created to store important information. If important information is stored in RAM, but in the session of user1, which is easier to access for an attacker: the RAM from under user1 or the home folder of user2? What is the threat model here? Sup...
I understand that to "encrypt" something means to "code" it, to make it understandable for two parties, giver and receiver and generally only for them, but I don't know what it means when this is being done symmetrically or asymmetrically. What are symmetric and asymmetric encryption and what would be a good example fr...
Here's the scenario: I have an external harddrive encrypted with bitlocker. I disconnect that drive from the PC that encrypted it, and connect it to a different PC. Surprisingly, when I do this, all that is required to unlock the drive is a password. I figured I would need the recovery key. I was under the impression t...
In a web app, would storing a users IP address in a session be more secure then storing it without it? I think that if I store a JWT in their cookies that includes their IP address for session authentication, it would prevent attackers from being able to use another user's session token as their own because my server w...
Another thread addresses the question of what can count as "military-grade encryption." In this case, I see that CyberLink Power2Go software boasts "advanced military-grade 256-bit encryption." TechRadar clarifies that Power2Go uses AES-256. The Power2Go webpage says that the software is useful for "movie disc authorin...
Is there a convention or safeguard to show malicious URLs in a paper if they are relevant to the topic? Some PDF viewers parse the text for URLs, which makes removing the hyperlink alone insufficient. How can (accidental) clicking be prevented?
For example, a password consisting only of lower-case characters [a-z], but a length of 10 (26^10), will always be better than all characters, but a length of 7 (95^7). That is, how much is it correct to take into account only the number of combinations?
This can be seen as a rather dubious question but let me explain. I'm a 22 year old still living with my father and his wife (my stepmother). I've been living here for over a year now and ever since the beginning I've been suspecting that they monitor my internet usage. This is not a particularly hard thing to do. All ...
Let's say I had an "NT AUTHORITY\SYSTEM" command shell on my locked Windows computer (at the login prompt) and I would like to get log in as user X (as if I logged in normally with their username and password). User X is a Domain user and the computer can't connect to a domain controller. How would I achieve this?
If I took a picture with my mobile phone and wanted to publish that photo without any artefacts connect to me, the first thing I would do is strip all of the image metadata with 'exiftool': exiftool -all= IMG_1234.JPG ... but it is well understood that even without the exif data, the image size, resolution, compression...
I have a wordpress plugin that helps create an organization chart/tree and then generates a URL where the chart is available to be viewed by the public? Inside the plugin's view in WordPress dashboard. After we create a chart, we click generate URL button to generate URL. The URL generated is: wordpressExampleApp.com/{...
I'd like to ask for advice reg. protecting the state-altering HTTP API endpoints of the API that I'm owning (POST etc.). I'm owning a web application that exposes some HTTP endpoints to the world. Architecture-wise it's very similar to Google Analytics: there's a JS snippet that our clients integrate into their website...
Do we need to carry out separate pentest for apps that are written in language that supports multi platform compilation like fultter? How much value it will bring since backend and major chunk of code is same and some OS specific configuration are different.
I have bought a online service which allows me to send SMS messages by making a call to the provider's SOAP-API. This is the WSDL I need to send a message: <?xml version="1.0"?> <soap:Envelope xmlns:soap="http://schemas.xmlsoap.org/soap/envelope/" soap:encodingStyle="http://www.w3.org/2003/05/soap-encoding"> <s...
From official ASP.NET Core docs, namely Routing in ASP.NET Core § URL generation concepts: Use GetUri* extension methods with caution in an app configuration that doesn't validate the Host header of incoming requests. If the Host header of incoming requests isn't validated, untrusted request input can be sent back to ...
I pay monthly for a VPN. However, I browse online while connected to my university WiFi which requires authentication to use. The WiFi is open (no password directly) but when someone connects to it a page pops up and we have to input our university NetID (which is linked to our names and info) and password. So my quest...
I found this string b2335332-d28f-449b-8d00-80a550b43046 Do you think it´s a hash? If yes any idea which one and if not any other ideas what it could be?
It is well known that running programs inside your docker container as root is bad practice. As far as I can tell, the reason for this is because root on the container is rather similar to root on the host (eg the answer to this question), and escaping a container is well documented. The particular infrastructure in qu...
While I was learning about file upload vulnerability one question come to my mind. What type of file do I use while hunting file upload vulnerability ? Do I need to detect which programming language is used on the backend ? Php extension files are used in most examples.
I created an id_rsa key in my server with ssh-keygen -b 4096 without a passphrase. I added my id_rsa.pub into .ssh/authorized_keys and downloaded my private id_rsa key into local PC and changed it into a pem file. I tested the SSH access with my pem file in a terminal and Filezilla SFTP. It worked. The next morning I r...
I have been developing some applications lately where the content on the web app is rendered based on the request's response. For example, a user with a "free" plan has limited access, whereas the user with a "premium" plan has access to paid features. I noticed with Burpsuite that I could modify the request's response...
We are developing an MVC web-application in Django and having concerns about image uploading. First of all, here are our business requirements: Our users can upload images (like profile pictures, etc). Only authenticated users can upload images. Image uploading is done through HTML-form using POST method. Users can...
Suppose we have a site that has public and private areas. The private areas require login. For example "www.site.com/about" is publicly accessible. But "www.site.com/message_inbox" requires authorization (valid login). So what happens when someone who is not logged in, tries to access a private area like "www.site.com...
I am looking into databases of compromised passwords in order to ensure that passwords on a system I am responsible for are not already compromised. To have complete peace of mind, I prefer to get access to the data, and check passwords locally, rather than sending hashed passwords to an API. HaveIBeenPwned is an obvio...
There is a well-known threat named compression bombs. Such image formats as PNG and JPEG use compression methods, and therefore and in theory PNG/JPEG images might be a compression-bomb. I've found an example of PNG, and many mitigations guidelines (1, 2) for PNG images. But what about JPEG? How to protect against a JP...
Here is the scenario, just wanted confirmation that I am understanding it correctly. I have a TLS certificate that will expire soon; Upon renewal, I paid the CA, and they reissued me with a new public key (AKA certificate), which has a new date into the future. Given that I did not supply the CA with a new CSR, can I a...
Maybe I'm misunderstanding the purpose of k-anonymity, but I don't see the why HIBP uses it when checking user passwords. This website, which explains HIBP's implementation of it, says, "The client will then truncate the hash to a predetermined number of characters (for example, 5) resulting in a Hash Prefix of a94a8. ...
I'm managing a small remote team. We care about security and I want to be sure that our MacBooks comply with at least basic security standards, such as CIS benchmark. These are the ways I see I could approach this: Writing up policy documents describing security practices and then having everyone read them and apply t...
I have a company laptop which uses a Cisco VPN to log in to the company network in order for me to work. How do I configure internet I'm using at home in a way where Cisco VPN logs, or another log that can be taken from the company laptop, show a different country that I'm logging into my company network from than the ...
OpenVPN allows the use of their 'reneg-sec' option to renegotiate keys for the data channel at a specified interval. This helped protect against exploits like Sweet32 with 64 bit block ciphers a while ago. Apparently, only 32GB of retrieved data is needed on a 64 bit block to reach the birthday bound for which the ciph...
In a web-based SaaS product, one of the configuration pages allows users to set credentials for system-wide integrations with other products. These include usernames, passwords, and API secrets. The sensitive fields are set as type="password", but when loading the page, any existing values are provided by the server in...
My client has an android application requirement. The users of the application are workers who might have to work at places where internet connectivity is unavailable. So an offline login feature is necessary. At the moment, it is implemented by setting a pin code during the first sign in by a user into the app for a d...
Is lateral movement and horizontal privilege escalation the same thing, what would be the key difference to these two ?
I was setting up firewalld on an enterprise server and came across their concept of firewall zones. I figured I can easily use them and their source property to restrict access to SSH to only the internal network and my home public IP address. Yes, it is not an extremely strong defense, it's just another layer in front...
Is it possible to crack a JSON Web Token (JWT) using HS-256 algorithm with hashcat on a normal PC? hashcat password.txt -m 16500 -a3 How can I calculate how much time it will take? JWT first section for example eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.
Is there a burpsuite-like framework for Windows Desktop applications? I.e. I'm looking for something that would allow me to intercept user-input data sent to my application for manipulation to test specific payloads. I'm assuming this would be debugging related (like in Visual Studio). Is VS the best approach? Or is th...
I was reading about proxy vs VPN, to summaries that one could say that VPN is similar to proxy with the addition of encryption for better security. So I have a question, wouldn't it be better to use proxy instead of VPN? Why we only hear about VPNs like: express vpn, nord ... while we never hear about proxies? Do we re...
A company are saying they sent an email to me. I have gone through all of my inbox, junk, and deleted files and the email still doesn’t exist. They have asked me to prove the email never got to me by asking my email provider to send over log details but I have looked into this and it is impossible. Is there any other w...
What’s the most secure way to obtain (purchase) & then use a computer/device? I.e. even if I pay cash for a Mac at Apple. Right when I put in my Ethernet cable wouldn’t Apple see my IP address and be able to link that to a person?
I want to configure roles (least privilege) on my CA instance (EJBCA) and I'm trying to find what are the best practices to do this. I've tried to read the ETSI EN 319 401 - V2.3.1 standard and try to implement this on EJBCA but it is not that obvious. I'm thinking of implementing the following: SECURITY OFFICER ROLE ...
Encrypted Client Hello hides Server Name Indication (SNI). However, looking at the TLS Handshake (https://tls12.ulfheim.net/). Wouldn't it be possible for a middle-man to inspect the TLS Handshake and sniff ServerHello to see the x509 certificate (before the Handshake completes)? It should contain the subject alt names...
I am doing my bachelor's in computer science and I have the chance to take multiple cybersecurity courses. Of course, before taking these course, I did some research about jobs in the field of cybersecurity to see what one does in day-to-day tasks, what paths exist, etc. I found jobs that seem to mostly do documentatio...
I have a site where I need to get a logo from the user, they can click the input form and upload only .jpeg or .png files. After this the file will stay client side and be used to automatically create a pdf with their uploaded file. My question is if this can pose a threat to the website. I am thinking it could be poss...
I have a PAYG basic Nokia mobile, not a smartphone, and have noticed on my EE A/c there is a transaction for a Text Service with a charge of 15p, appearing every so often, which is nothing to do with me. I'm in my 70's and wouldn't even know how to set up a Text Service. I have reported it to EE and they have confirm...
We have Azure Information Protection (AIP) configured for our organisation, we have 4 labels defined (public, internal, confidential, secret). The default label set for the organization is to "internal". Is it possible that a user can change the default setting by themself, e.g. setting the default to "confidential"?
If I have DNS over HTTPS and DNS over TLS activated simultaneously (router has DoT activated and smartphone browser has DoH activated, so I see on https://1.1.1.1/help DoH: yes and DoT: yes), which one is used?
While doing web application security in startup companies, I am exposed to some backend APIs that integrate with the client web app, but testing APIs is a completely different procedure that I do not yet understand. I want to know if there are any common vulnerabilities that exist in development or production APIs.
I'm setting up an server, the default configurations allow for connections with deprecated TLS versions. Should I remove deprecated TLS versions from my server? What is the difference between a deprecated and insecure algorithm?
I have a Linksys WRT1200AC with DD-WRT v3.0-r48865 std. It's connected to the Internet through the ISP's modem in bridge mode. My syslog reports continuously, many times per second stuff like this: kern.warn kernel: [18453.515784] DROP IN=eth0 OUT= MAC=c0:56:27:73:3d:d4:2c:0b:e9:15:a0:19:08:00 SRC=65.9.190.202 DST=94.2...
I sometimes see API keys in page sources, such as the following: <span class="nf">init</span><span class="p">(</span><span class="nv">location</span><span class="p">:</span> <span class="kt">String</span><span class="p">)</span> <span class="p">{</span> <span class="n">apiKey</span> <span class="o">=</span> <s...
I was recently sent a .torrent file from what I had thought was a trusted source, but when I opened it with qBittorrent, the computer automatically rebooted. I had already scanned the file with Kaspersky and Windows Defender, which both showed it was clean. After the reboot, I tried to open it with a different client, ...
is it practically possible to ensure that the integrity of an ISO image for an OS is legit with 99.999% certainty? I was thinking of buying a bunch of DVDs of Ubuntu 22.04 on eBay and comparing the checksums. Would the checksums match up if the DVDs were burned using different methods? Is there a better way that I'm mi...
I'm currently attempting to setup my personal GPG key suite for the next few years, and I'm running into a question I don't have a ready answer for. I own 3 yubikeys, Primary/Secondary/Offsite Backup. I'd like to put a different GPG key on each so I can revoke a single key at a time in the event of a key loss. The plan...
I would like to know if there is a way to only trust a CA only when a specific domain is being accessed, eg. wikipedia.org. I'm using Chrome, and I'm not really tech savvy so the simpler the solution the better. I'm the end user and not the owner of a website. Thank you!
I clicked on a suspicious link with cross site scripting vulnerability. Redirected me to youtube's home page. Anything I can do right now?
I am relatively new to security and I would call myself an amateur researcher as I do not even work in IT. However, I remember having a MS605 card reader / writer / encoder and I loved playing around with it and reading data off random cards I had laying around my house. It had always dawn on me if it were possible to ...
I have a web app that I use to run exe programs but the exe programs require a password to be passed. Currently this password is hard coded into the web app file in clear text. Since this is not secure and I have seen other web apps do this. I am wondering, how do I securely store the password in a file or database tha...
My IP can be seen by a Whatsapp contact using the netstat command. Can a VPN hide my real IP to them? Or their netstat will still show my real IP?
I am injecting: -35' and updatexml(null,concat(0x3a,(0x0a,(select database()))),null)-- - and I am receiving: Error 1 - Operand should contain 1 column(s) Any idea how to fix this? I am trying to get the database type. References: http://www.securityidiots.com/Web-Pentest/SQL-Injection/Error-Based-Injection-Subquery...
Using Linux is a different beast entirely but sometimes malware can blend as seemingly harmless system binaries like this post Bpfdoor Like this post which documents a highly evasive Linux malware. In this case running wireshark will mostly likely not be genuine as the traffic will mostly likely be tampered as it uses...
I opened the access to a certain directory via SSH/FTP. Some adjustment to my web project is necessary, so I have organized an access for a programmer. The problem is that the command "cd" is available without any limits. I mean that several "cd .." may lead up to the topmost directory. Then you can change directory to...
How does putting the alert function '-alert(1)-' into a search field, where it ends up inside a script tag actually break out of the script string? Wouldn't this just be interpreted as an empty string before and after the alert? And how do the dashes even work to break out?
I want to filter user input like this: $data = file_get_contents('php://input'); if ($data != null && $data !=='') { $parsedData = json_decode($data, true); } // find quickmodule name $moduleName = $_GET['module']; // validate name if (! preg_match("/^[0-9a-z]+$/i", $moduleName)) { die("Invalid quickmodule n...
For example Microsoft Outlook web based email service can be configured to require both a username/password combination and a time-based one-time password (TOTP) generated by the algorithm described in RFC 6238. This will frequently be implemented in software applications, TOTP's from something like google authenticat...
Multi Factor Authentication is obviously a lifesaver for passwords, so things that can easily leak (peeking, guessing, stealing, ...). A second/third/... factor of another kind considerably reduces the risk. This is less obvious for hardware tokens/cards (the "something you have") - they can get lost or stolen, but you...
I have a development web server that I need to add trust certificates on my local machine. Http connections to server https://machine-name.a.b.local/ show an SSL issue. This is the cert chain: ABCD-CA EFGH-SUBCA-CA *.a.b.local From a web browser, I can install the EFGH-SUBCA-CA cert but don't have the option to...
I'm doing a binary challenge from pwnable.kr and I'm examining a some ROP gadget. Until now I've always used gadget ending with ret or syscall/int 0x80, but now ROPgadget gave me a gadget ending with ret 0. What's the difference wrt ret?
In a private area of a website, I need to create a folder tree containing documents belonging to different clients. The contents of these directories can only be accessed if you are logged in, but I want to avoid that a client can deduce the path where the documents of another client are stored. My idea is that each cl...
I've seen this question: Is it possible to determine if the BIOS has been modified between two points in time? On my Linux PC, I've made a script that checks the MD5 hash of the boot partition to prevent evil maid attack. Also it check the infos of the SSD firmware and the BIOS. For dumping the BIOS info I'm using dmid...
I have a application where users can log in by providing a username or email address (both case insensitive) and a password. In the users table in the database, the relevant account information is stored in three columns lowercase_username, lowercase_email, and password_hash_and_salt. There are indices on both lowerc...
If the default value for the samesite directive in the Set-Cookie header is lax, then surely the only way for a CSRF attack to work, is if the website's developer, for some reason, puts a less restrictive value for samesite. Or, is there some other way a CSRF attack could work?
I have had some binary executable files (.exe) for Windows signed, I have checked the signature of the signed files, but I would also like to check that the file that I sent for signing is indeed identical to the signed file that I got back. Obviously, the sha-256 hash of the signed and unsigned version of the executab...
I tried to search for the phases of penetration testing, but I found lots of articles, and each article defines this in a different way, some have 5 phases, some 6, and others 7! What I am looking for is an official or standard definition of penetration testing phases. Is there such a thing?
During my pentest of a client's websites I stumbled upon the WP with vulnerable WP Statistics plugin installed. To exploit this vulnerability, I should send a JSON-API request to endpoint /json-api/wp-statistics/v2/.... The problem is I must send correct _wpnonce along with my request. I found a cool explanation here: ...
Let's say I want to protect the contents of my Desktop PC which I use in quite many occasions remotely. I want to use Bitlocker with a startup key that only "activates" at a specific moment in time. The setup I am thinking would be a Raspberry Pi Zero emulating a USB flash drive connected permanently to the PC. This Pi...
I am working on a project where I want to store end-user private data, but immediately this brings up the trust question of why a user would trust me to hold their data. I don't actually want to hold their data, but rather run an analysis on it and give the user the final result. To that end I still need to have a stor...
I was browsing this website and tried to look at the network calls from the API which retrieves the data. As you can see, the response payload is encrypted but the browser still shows the necessary data correctly. I am assuming that there is a key that is somehow derived over at the client to decrypt the payload. Does...
How are: change management patch management configuration management related to each other and what is the security team's role in them?
I have a parameter whose value is injected in the HTML as the following <script src="/dir1/dir2/dir3/dir4/INJECT_HERE"> </script> I was able to traverse back to just / but when I enter my xss hunter payload (let say its https://bla.bla/xss.js) the page actually requests https://targeet-company.com/https://bla.bla/xss....
I saw a PGP/GPG key of a dude on the internet with different sub-keys. The reason is that when one sub-key expires, he creates a new one. Now, from a security protective, is it better to create a new key-pair every time or create a sub-key. What I want to achieve is that no one impersonate me with a fake key-pair.
If deleting files just removes the references then why not just delete the actual files instead of just removing the references? Just removing the references leaves the file intact until it is overwritten, but deleting the whole file is better since it makes more space available immediately. So why are OSes removing th...
I need to validate and store credit card information (name, card number, expiration date, CVC) for retrieval at a later date. Once retrieved, the data will be used for manual processing on a separate system. I have been told countless times that storing credit card data in a MySQL database is a terrible idea, even if e...
I have read in innumerables articles that „Passwords must die“, because they are blamed for being the cause of most cyber attacks. But why no just issue random generated passwords, with the added benefit that brute force and distributed brute force attacks. Throught sure they will be more likely to write it down or for...
I am designing a system which will have one main process/service (master) which can potentially offload part of it's work to N number of external remote processes (workers). I want the worker deployment to be simple, yet the the master-workers communication to be secure, with authentication and authorization on both si...
I am currently implementing new auth schemes for a site, and decided to implement an "I forgot my password" email looking at this guide for inspiration. My Flow The flow I have designed is as follows (three phases): Saving the email The user clicks the "I forgot my password" link on the login page A Modal appears pro...
We have a micro-services architecture, where many microservers need to talk to each other for data. These services are inside a VPC. I need to understand if the HTTP APIs of these microservices need not have any authentication if they are no active clients(mobile and web) talking to/connected to these services. Our cur...
If I have sensitive HTTP routes that could be subject to timing attacks (trying to guess an ID, user, etc.), is there a way without modifying the application code that it could be wrapped with a network tweak, proxy, or some other program so timing attacks could be obviated? Best I've been able to find, and it's not id...
I want to hash email addresses so that they are anonymous but still unique in my database. I was thinking of using scrypt for this and creating the salt as a sha256 of some secret stored on the server + their email address. Implementation in Node.js looks like this: const crypto = require("crypto"); const secret = "sec...