instruction
stringlengths
24
29.9k
Scenario: I'm currently at a hotel and want to connect my Chromecast to the hotel's public Wi-Fi; however, it cannot automatically connect to it because it requires pressing an "Accept" button. I then use my laptop to connect to the public Wi-Fi and turn on the laptop's hotspot and then connect the Chromecast to the ho...
I created an unshadowed file to run through john, it worked fine. I created some additional users and created a new file with those hashes in there. I run john and get Using default input encoding: UTF-8 No password hashes loaded (see FAQ) I have read through several threads and not found the answer. I ran file -i on ...
I've taken a pen-testing course and for the final certificate, I have to analyze a server and make a report regarding the vulnerabilities. The server does multiple functionalities, It acts as a web application server ( as I can connect through ports 80 and 8080 to access two different web applications ), as well as a...
I have always been sceptical about contactless. It offers little security. I've even heard of cases where the RFID signal has been captured onto mobile devices. My questions are. Is there anything stopping actors who could capture the RFID signal using it a second time? such as a part of the data in the signal changin...
I'm making a simple multiplayer game in Python. No personal/important data will be transferred between the server and client. I am using the Python sockets library to communicate between the client and the server. However, I have done nothing special for security. I'm worried that someone could hijack the client-server...
Can a malicious WiFi router that doesn't have a login page open a malicious link without my consent to hack my computer by simply connecting to it? What about one with a login page? Can it open the login page without consent? (I connect to it because it shows as having no password on the WiFi list). I know that you sho...
Can I visit a malicious website by using Tor with settings set to safest or by using NoScript on an ordinary browser with settings set to untrusted? If not then is there any way to visit a malicious website safely?
I have observed that in some payment portals while making payments via credit/debit card the CVV/CVC number is masked out (hidden), but in different portals this is not the case. For example: USA & a few of UK based payment portals are not masking this field, while portals of some other countries are not, as far as I k...
All of a sudden I started receiving pop-ups on my Windows PC from this company IQ Option offering virtual money and demo time. Why are they messaging me through my Microsoft Edge browser? I didn't even visit their website or open an account. Some of their pop-ups say I have missed calls. That sounds fishy since I've ne...
Let's Encrypt offers free TLS certificates, including wildcard certificates. Is there ever a reason to pay for a certificate? Is it just "we have to pay for everything so we can sue someone if something breaks" corporate policies?
If I am using SHA-512 hash values merely as a means to search fields that have been encrypted elsewhere, is it cryptographically secure enough to hash without salt? For background, I have been given a non-negotiable requirement to encrypt personal data at the field level. This conflicts with another requirement to be ...
If I run an IRC server, and my friend and I connect over TLS and chat, is the conversation essentially end-to-end encrypted because all computers that see the plaintext messages are owned by one of the participants?
I tried dig +dnssec dig [domain name] +dnssec +short. Is RRSIG the only attribute to confirm if a name server has DNSSEC implemented or not? How do I identify a name server that has no DNSSEC implemented? Also, what tools can I use to test vulnerability to DNS cache poisoning?
I'm trying to brute force an Instagram account I created to play with Hydra. I ran the following command: Even though the correct password is in the list, it didn't work. This is the output I get: Why does Hydra not return the correct password and username? Could it be that I have the domain wrong? I tried changing t...
I use LUKS to encrypt all sensitive data on my computer. If I switch to using a filesystem with on-the-fly data compression such as ZFS, should I use its compression feature together with LUKS? Does compression here help the attacker as in case of TLS CRIME attack scenario?
I use LUKS encryption on my entire drive. Do SSD drives ship with any storage areas which store unencrypted data, even though the data is saved encrypted on user-available SSD storage? Maybe inside the over-provisioning area, the DCO (Device Configuration Overlay) or HPA (Host Protected Area)?
When I run fiddler with a proxy for the BlueStacks Android emulator (on Windows), many of the results are listed as "Tunnel to" a random IP address, with no headers and no information on the data sent. Clicking on one reveals "A SSLv3-compatible ClientHello handshake was found. Fiddler extracted the parameters below." ...
I'd like to know if it is possible to figure out if the USB charger of my smartphone (more info below) contains any operating system or firmware which could be infected by malware. Let's assume I charge my smartphone with my USB charger: How can I figure out if there is any firmware inside of that charger which might ...
Are older phone models inherently less secure than newer ones assuming you're still able to run the latest software? I am pecifically curious about older models of iPhones (e.g. ~2015 ish)
I know about the usual port sniffers and mass scanners that just pop up on any web server, but this one looks interesting to me. I figured out so far that those requests aren't really an issue for my Development Flask Webserver, but I am curious what they are trying to do. The .env etc. are obvious, but what is the me...
I have done some search here but I can't understand how phones and antennas share the keys used for encryption and decryption. As far as I understand, mobile phones today use LTE i.e 4G (sometimes they downgrade 3G, 2G etc because of coverage as well) and as part of the encryption protocol they use a stream cipher (SNO...
I'm trying to understand the effect of empty sets in permittedSubtrees in both, RFC 5280 and RFC 3280. There is something that doesn't compile in my head. Scenario: We have a CA certificate with the following Name Constraints setup: Permitted [1]Subtrees (0..Max): RFC822 Name=email@example.com [2]Su...
I have an Ubuntu server with a user "demo". The user has been setup to run a php script on login with usermod demo -s /path/to/php/script.php. The password for the demo account will be public, so anyone can use it. The PHP script does various things, but for the purposes of this post let's say it echoes "hello friend\n...
I have an executable, and I have the SSL certificates and keys necessary to establish the secure connection. The application performs self-updating by downloading and replacing itself with an updated executable. What is the proper way to distribute these credentials when I ship my executable? The keys themselves are us...
Multiple IPSec implementations I've run across support "AES-256" as an encryption algorithm. (pfSense has this, Checkpoint has this.) What block cipher mode of operation is this?
This really doesn't seem safe to me, and I am wondering if there is a MITM attack happening or if this is somehow legit. I am worried something might be happening with my company's payroll data. Here is my investigation so far: starting from a clean installation of ungoogled chromium, I go to https://tsheets.intuit.co...
I use GPG on awsLinux, currently version 2.0.22. Before exchanging a file with someone we exchange public keys, so signatures can be confirmed for the files transmitted. Their public key is imported into my keychain for this purposes. When decrypting the files I get a line like this one: gpg: Good signature from "John ...
Is it possible to swap them, so that the public key is kept secret while the private key is public? Or do they actually function differently? Thinking specifically about DSA though I'm interested if there is a general answer.
I am a website developer (mainly using MVC.NET). Recently, we have been contacted by a hacker. He claimed that he knows our admin URL. The problem is we do not publish or put the admin URL anywhere on our webpage. The only place where the URL is listed is in CloudFlare DNS as A record. So, when I challenge the hacker a...
I'm worried that my computer may have been infected by a virus. My Windows Virus Scan says that nothing came up, and a Chrome malware scan also turned up nothing. However, a process called Oracle RDBMS Kernel Executable is running on my computer now and is using a lot of memory (400 MB). This process is able to access ...
One-time passwords (OTPs) usually serve as the 2nd factor in a 2FA scheme. But, in isolation, I believe they are more secure than passwords, since they are ephemeral and passwords are still badly reused in the wild. Unless end-to-end encryption or some strict usability issue is involved, I can't really see a case where...
We use GCP Cloud Storage and Cloud CDN to deliver some static assets (html/css/js/.jpg/.png). The buckets used to store those are public with anonymous access (i.e. allUsers in GCP terms). On one hand Cloud CDN documentation seems to encourage this, but on the other hand we get findings of "Cloud storage buckets should...
Let's say we have an e-mail of 10MB, and we want to distribute this to 1000 users. Before sending the e-mail, I encrypt it. And all users have my public key to decrypt it. What encryption method can I use with less computational resources and produce as less possible e-mails? But compression methods are not allowed lik...
I want to generate 6 random words using Wiktionary and random numbers from /dev/random. I'll get a random number with /dev/random and then use the word from that index. I know /dev/random should be used to generate random keys, but if it's deterministic what prevents somebody from knowing the future bytes from the old ...
If I have session cookie or just cookie which is Secure, HttpOnly with SameSite=Strict and is never transmitted even in requests within the same domain and the page uses TLS. Is there any attack that could catch this cookie? If so, how can this attack be prevented?
I want to use a Telegram username instead of an email address in a PGP key. Is there an agreed upon standard for doing this? Do you know a software or service which acts as a bridge to connect a PGP email address to a Telegram account?
I want to add an extra layer of security/validation into our app/network. I plan to do some mTLS in which we will provide customers with a certificate to use in the TLS handshake. However, I want the customer to pass proof of domain ownership when they initiate the request. After successfully passing the checks (includ...
I today found some files created and deleted and edited on my website. I don't know how it is done. But I know it can be done by some PHP Functions like : mkdir('Folder'); file_put_contents();scandir();... But these codes only execute if I write in my PHP code. How anyone can run these commands from a $_GET Value Exa...
I'm trying to build a generic function to encrypt HMAC values with a single global secret key, but that can be "scoped" or salted by application/uses. For instance, an HMAC for a session token signature should not be the same as the HMAC used for a password reset token signature. Looking at, for example Django, they ju...
Everywhere I look, I only find explanations as to who can set who's cookies and who can access the cookies of whom. Why do we need these restrictions? More precisely: Why is it OK for a subdomain to set a cookie for a parent domain? Why is it not OK for a parent domain to set a cookie for a subdomain?
As far as I understand, end-to-end encryption is used to encrypt the content on the client (sender), send it to the server and decrypt it on the client (recipient). The clients store their private keys on the device and the Server stores the public keys for the encryption. My idea: Request the public keys from the serv...
I operate a blog using Google's Blogger platform about programming. I use highlight.js for syntax highlighting, and now on my posts I see the console warning: One of your code blocks includes unescaped HTML. This is a potentially serious security risk. I read somewhere that this has to do with cross-site scripting (XSS...
I'm learning SSRF. I learnt that typing &x= kinda turn off the rest of an URL (like https://some.website.com/user?id=9&x=.website.com/api/item?id=9) Everything that comes after the &x= part gets ignored. Why is that? Or, if it's not really ignored, then what happens?
This is a little bit crazy. A long time ago, I created a Spotify account using Facebook credentials. A few years ago, I stopped my premium subscription, deleted Spotify from all devices and didn't use it again. 3 years ago, I bought a used iPhone. Two weeks ago, I installed an application to track running called "Nike...
We're managing a shared hosting environment of Wordpress websites on a web server. Each site has its own database password and FTP password, both are randomly generated and stored in AWS ParameterStore (not secrets manager for cost reasons) We are now adding a caching database. It seems we should be able to re-use data...
The RSA_private_encrypt is deprecated in OpenSSL 3.x. It is not clear how to get the same functionality in 3.x without using the deprecated functions. And, before you ask, IEC_62351-9 Section 9.1.3.5.4 requires private key encryption and specifically forbids signing, "Therefore, RSA signatures MUST be encoded as a pr...
Can I use static IP address as a component of 2 factor authentication for SFTP login?
A while back I lived in shared apartments. One day I returned to my room and found my laptop screen frame open. Since then I keep get log in attempts to my accounts. I scanned my laptop with multiple anti-virus software but nothing is detected. Is there spy hardware that can be attached to laptops and if so how to dete...
When deleting a user on a Linux system, if you lock their password and kill all their processes, a logged in user disconnects and can't log in with his password anymore. But if they still have an authorized SSH key, they will be able to reconnect before I delete the key along with their home directory. No problem here,...
I have manually confirmed an SQLi authentication bypass in a user login portal. The payload itself is quite simple. Can this vulnerability be used to do anything else such as enumerate users or inject a web shell?
We have a private website for our clients which needs a username and password for login to see protected information. The users are created by ourselves by petition of our clients for some of their employees, and they must have a valid institutional email (not gmail.com, outlook.com, etc). Recently we have discussed wh...
Picture a state of the art implementation of a website registration and login system. I'm interested in analyzing what a defender gains and loses by feeding the user password to a key-stretching KDF function (e.g. argon2). Let's start from the basis. Given a hash function H and a password Pwd, performing h0 = H(Pwd) an...
To clarify: The FIPS module Security Policy lists using RSA keys for wrap/unwrap. FIPS is a moving target, and the state of the requirements when the CMVP approved module went through the process was such, that a given key's "usage" had to be a single purpose (sign/verify, OR wrap/unwrap, OR key agreement). So we hav...
On July 31 and a second time after around twelve o'clock at night (August 1) I received two E-mails, which asked me to confirm my E-mail to create an Snapchat account and the second one was stating that I "just logged in". I clicked "If this is not your Snapchat account or you did not sign up for Snapchat, please remov...
We have added HSTS policy at Akamai level (domain). When we Intercept the request using burp we dont see HSTS policy is getting added in response, in case we hit site with http. But with https we able to see the HSTS policy. Issue is to fix this on http also. Can any expert provide some solution around it from the know...
My website is being hacked for the last 2 days. I'm an amateur who built it back in 2007ish and it still has some poor code. Was a hobby project that suddenly became very popular and lived to this day fluorishingly despite php5 and no prepared statements, just mysql (not mysqli) queries. Maybe that's the end of the lin...
Is there any way to instruct sqlmap to perform normal injections without escaping and commenting? For example, it's confirmed that id=1111+or+(INJECTION_HERE)=1--+ is valid, so can I instruct sqlmap to use that as an injection point and extract the data? If id=(pg_sleep(10)) would result in a sleep, is there any tool...
A huge problem is PIN guessing from birthdays (dd/mm/yy lends to a 6 digit number that is easily guessed, dd/mm/yyyy for 8 digits). It's very often that a PIN number is taken from someone's birthday or year, either their own or relatives. There was even a case where a speaker had cracked the phone code of an audience l...
How much worse is encrypting a LibreOffice document with the built-in mechanism than using a cryptocontainer (LUKS, VeraCrypt, etc.) and storing the document in it? I am more comfortable using the built-in password mechanism that LibreOffice has, but I have a feeling that it is much less secure than cryptocontainers. I...
Can my employer see my private google history/”google activity” if I didn’t do anything on my work pc? For some context I logged in to my private google account on my work computer just to send a pdf file I couldn’t send on my phone. I logged into my google account on microsoft edge, but in private/incognito mode. But ...
I wonder if there will be (or is) a way to hide data such as passwords from the HTML/DOM structure? As, password fields can hide from external person other than the main user with something like "••••••••" but this does not prevent anyone or any extension that has access from inspecting HTML code. (I am not fully web-d...
In one of my university courses, the lecture materials (solutions to homework assignments) are not fully supplied by the university itself, but have to be created by the students themselves: The students create a pdf with the solution and distribute it via moodle. Since I don't know how trustworthy these students are, ...
Cleaning up my disk space, I found an encrypted file (*.bfa), which I encrypted with Blowfish Advanced CS (Version 2.13.00.002) about 15 years ago. I still have a copy of the original version of Bfacs, which I used for that encryption and which still seem to run with actual Windows. Not very surprising, I don't know th...
I have an Http web service running on IIS. The Http service will be exposed to the public internet, but only authenticated client requests will be processed by the web service. The service allows clients to write complex queries using query parameters like $filter=foo eq 5 or bar eq "abc"... to query the backend databa...
So I did this post before on a guest account but I had further questions so now I'm posing it on a real one. Can my employer see my private google history/”google activity” if I didn’t do anything on my work pc? For some context I logged in to my private google account on my work computer just to send a pdf file I coul...
I am new to SOC team and have been given the task to check Python packages from the security standpoint for any vulnerabilities or if that python package is safe to install on our laptop or not. So, for example: If a user type: pip install numpy in Windows cmd to install numpy library, What all steps or checks I can pe...
For any file on your OS you can get a md5 or sha256 value and if you suspect anything you get it again and compare. I was wondering if there is any way to do the same with the bios and bootloader and check their integrity manually. Can you for example create an image file of the bootloader and/or bios and get their sha...
I have a Python 3 program, and I’m having trouble finding an encryption method that will suit my needs. Suppose the program is on a thumb drive. I would give the thumb drive to someone else, and they will run it. It will ask them to input a number, and then close. When it closes, two files are made. An encryption key a...
I'm having some issues getting Honeyd to work properly on an external network interface on Ubuntu 20 LTS running on a Proxmox server. I'm fairly sure it's a configuration/setup problem on the VM I'm running it on, as the config file works okay when it's run listening on the lo interface with a route added to redirect t...
I was exploring SAN certs and was able to connect to the machine with domains specified in the SAN fields during CSR creation. But I was unable to connect to the machine with the common name specified in the CSR. Below error is what I get on connecting, even though the servers certificate has the common name: curl: (51...
What is so special about kali? Is there some suite that just run on kali and won't on other distros/mac? Is it just marketed better to the infosec community?
I have not been able to find a single page that actually explains how npm’s ECDSA signing system works. The closest I could find is the official documentation, but as far as I can tell from that documentation, this system is completely useless: a malicious source can simply replace both the signing key and signed data,...
I am testing my own flask application that should be vulnerable. I am using this in SQlmap: sqlmap -u "https://test.heroku.com/checkusername/student*" but the requests with payloads I am receiving contain student+payload. I think it's not working for this reason. I tried sqlmap -u "https://test.heroku.com/checkuserna...
My main tactic (amongst others, see related questions) of how I detect phishing emails are through the use of the obviously wrong sender domain. I see a trend that big companies start to use dedicated domains for their services such as facebookmail.com or encourage us to click on links such as https://epl.paypal-commun...
With most vulnerabilities, I see just summaries and not much detail about what is happening. Is there a good location where you can find demos of CVEs? For example, a CVE would say that the router login screen can be exploited to gain credentials, but I cannot find details on what header/cookie/post values to send in...
The intermediate sub-CA certificate is expiring mid 2023 and the root CA certificate is expiring in 2028. How to renew the intermediate Sub CA? Or is it auto-renewed? If Yes then how and where do I go to find out if it is auto-renewed?
I'm using Spring boot to create an application that stores user secrets in a database (I have to store the secrets); each secret is stored in the database after being encrypted with the user's password (I don't use the password directly, I use a hashing function like kerberos' stringtokey (just for example)). As the fi...
I'm writing a simple crawler with node.js, which searches for web pages and conditionally executes any JavaScript present. The problem is that in doing so, I execute code form untrusted sources in my node.js environment. Can running untrusted code on node.js in such a way be dangerous (i.e. when encountering malicious ...
Thunderbird does not load remote content by default, preventing pixel-tracking. However, if I forward an email, the links to remote content is still included in the forwarded email. Is there an option in Thunderbird to strip remote content when forwarding an email?
In the OWASP MASVS it says: Smartphones are like small computers, and mobile apps are just like classic software, so surely the security requirements are similar? But it doesn’t work like that. Smartphone operating systems are different from Desktop operating systems, and mobile apps are different from web apps. For e...
I want to inject the collaborator payload in the HTTP Host header (HTTP Host header injection). GET / HTTP/1.1 Host: payload.collaborator.net The Host header is used to reach the targeted webserver and fetch the vhost or any backend component, right? But if that's the case, how does my payload even reach the vulnerabl...
Related: Implementation flow of MFA with TOTP I'm trying to implement 2FA with TOTP in my web application. The implementation I've looked at (the ASP.NET Core implementation of 2FA) does something like this: Check if username and password are correct Generate a cookie that contains the userid of the user that just log...
I'm running an OpenVPN server and can use it normally; I know for a fact that the port is open. Running an Nmap scan on port 1194 (the one I'm using) says it is closed. What could be causing this incorrect response? Used this command: nmap -p 1194 <ip.address> Which yields: PORT STATE SERVICE 1194/tcp closed openv...
We have a process that encrypts a URL, it uses DES encryption. I suspect someone may have figured out the key and is decrypting it to crawl information. This was set up many years ago, I just want to make sure whoever set it up is did not use a common, generic, out of the box key. Is there a list of known keys not to u...
A long time ago, I signed up for Apple Pay Cash. After a bit of using the service, I was asked to input my name and birthdate to continue using the service. At the time, I was underage. I input inaccurate information signifying I was 18+ to continue using the service and after a bit I was told "my age could not be veri...
My website certificate is not recognized by all hosts. I already scanned here https://www.ssllabs.com/ssltest/analyze.html?d=eleicoesjustas.org. Is that because of Java trust store? Unfortunately some Android users are complaining about that and I still don't know how to solve it.
I've got a Mayan EDMS running on a computer on the local network. The Web App is exposed via HTTPS on the non-standard port 8001 and it uses an SSL certificate that is signed by our own CA. The CA is installed in my browser, but my browsers won't accept the certificate, saying: Firefox does not trust this site becaus...
On RedHat and derived Linux distributions, vulnerability warnings are available in form of security advisories which are usually derived from CVEs. The rules for the CVE numbering authorities state that The CVE Program expects separate CVE IDs to be assigned to independently fixable vulnerabilities. If one vulnerabili...
I have 2FA turned on for my google account. I was using incognito to log in, and google still recognized my device; I tried using a VPN to change my IP address, but it still recognized my device. I'm also pretty sure its not general device info like computer type or browser since that can easily be replicated using a ...
I am assisting another Data Scientist with helping a bank detect and prevent fraud via data analysis and predictive modeling (Machine Learning). It's a challenge because the proportion of known fraudulent cases is small and some fraud goes undetected. I need to combine my statistical modeling techniques with subject ma...
I'm new to the role and my operational analyst left a few days before I started, I'm his manager, now it's just me. I'm familiar with the tooling but have never had to operate it myself. I've had an alert from Defender for Cloud Apps confirming malware has been detected, the EDR has worked and the malware has been bloc...
Is there a downside to free online privacy protection? For example, Discover card has a new "Online Privacy Protection" that you can activate for free. It sounds good, but is there a negative aspect to it? Here is their spiel, Online Privacy Protection We'll help regularly remove your personal info from ten popular peo...
We are implementing SAML/OIDC-based SSO across our enterprise and wanted to get a feel for best practices when it comes to using Personal/Signer Certificates within our IdP. Historically we've utilised the personal certificate that came with our IdP, but upon reading their documentation, it seems as though they recomme...
I want to know whether it's safe to use a pirated software if during all of the processes including (downloading, running installer, installing, using and scanning installed files) the system's antivirus/antimalware doesn't detect anything, not even after performing a full system scan? OS is Windows 11. I know it's not...
After making requests to certain domain and their responses being either 4xx or 5xx status codes, the server response header shows Akamai Ghost. Is this response coming from Akamai's firewall or their CDN servers?
After looking at many explanations about the TLS handshake I noticed that sometimes the server starts with the change cipher spec command and sometimes the client starts with it. I'm wondering why. Is it due to the type of key exchange protocol? Like if it's DFH the server starts and if it's RSA the client starts?
When we encrypt a volume with bitlocker, it takes time to encrypt the data according to the amount of the data but Once the encrypted volume is mounted the contents are transparently accessible to software running on the device as if it weren't encrypted at all.why? I know if I want to turn off bitlocker on that volume...
Suppose a user is a member of a group, and they open (in the Windows API sense) a file whose DACL grants access to that group. Then, the user stops being a member of the group. Since access checks are performed at the time of opening the file, the user can still access the file, indefinitely, using the open handle. If ...
I'm looking at the functionality offered by Google Translate's option to translate an entire website. It opens in a new tab with the domain https://whatever-is-the-website-domain-com.translate.goog/. I wonder - if I fill out and submit a form while browsing in this way - will the information be available to Google? E.g...
Recently, while using the Tor Browser, NoScript popped up the following warning when I opened a stack overflow link in a new tab from duckduckgo: Potential Identity Leak You are about to load a page from stackoverflow.com. If you are a stackoverflow.com logged-in user, information about your identity might be acquire...