instruction stringlengths 24 29.9k |
|---|
OWASP’s Authentication Cheat Sheet states unequivocally:
Do NOT allow login with sensitive accounts (i.e. accounts that can be used internally within the solution such as to a back-end / middle-ware / DB) to any front-end user-interface.
(Emphasis in the original. This advice is unconditional; i.e., without regard to... |
I have to give my computer back to my boss.
I want to delete all the data from my SSD. I found "ThinkShield secure wipe" which is implemented in the BIOS apparently.
It gives me two options:
ATA Secure Erase method or ATA Cryptographic Key Reset
Which one should I use?
Will it delete all my data and make it unavailable... |
So I noticed recently that despite iOS settings saying all DNS queries go through iCloud Private Relay's DNS servers, despite Private Relay using Oblivious DNS over HTTPS, and even despite dnsleaktest.com (and others) showing nothing but Cloudflare servers, I'm still redirected to AT&T's DNS Error Assist search page if... |
What's the difference between Reflected XSS (RXSS) and Reflected-DOM XSS (RDOMXSS)? After some research, I think it can be concluded that Reflected-DOM XSS is:
Similarities:
The value is reflected by the target application
Characteristics That Are Present in RDOMXSS and Not In RXSS:
Does not use include any HTML tag... |
What are the alternatives of storing tokens when password managers are discouraged?
Some of the ideas that come to my mind are storing in a text file and encrypting with GnuPG but that's asks for extra password.
Edit
Security team discourages the usage of the password manager. In the context of a company policy.
I agre... |
I'm seeking to mitigate CVE-2002-20001 by disabling DHE key exchange through OpenSSH on an Ubuntu instance.
I understand this can be achieved through editing the /etc/ssh/sshd_config at line
KexAlgorithms curve25519-sha256,curve25519-sha256@libssh.org,diffie-hellman-group16-sha512,diffie-hellman-group18-sha512,diffie-h... |
Often when I am signing into web sites, I am prompted for credentials in two steps. First, they ask me to enter my email address. I type it in and click a button. Then they ask me for my password. I type it in and click a button. (Sometimes, as on a site I just visited, the email is displayed again, as if I might need ... |
I was discussing with a non-IT friend after he came to me with a question regarding security and password change.
As he puts it: "Why do websites ask me to re-authenticate after a password change? I just provided both the old and the new passwords, I don't see why I need to put the new one again 2s after. Wouldn't it e... |
I recently read an article by the IEEE on Tesla's vehicle telemetry and after reading that, I also realised that Honda Civics also have vehicle infotainment systems, including in-cabin microphones.
However, I couldn't find any resources online regarding Honda's policy on vehicle telemetry (including GPS) being sent to ... |
The question is mainly stated in the title. I was wondering what kind of attacks can be launched on such a setup, where someone has access to a running OS with locked screen (needs password for the user to enter). One possibility I can think of is cold boot attack. What other types of attack vectors exist?
Clarificatio... |
I've been using Little Snitch on my Macbook and I have since a long time a rule to alert on any incoming IPv6 connection, which would be suspicious since I use IPv4 only.
Since a couple of days I've been getting regular alerts for incoming connections like this one:
When I deny the connection another alert pops up for... |
There's a website I have an account on, and I needed to change my username. They said they were unable to change that. I requested to just have my account deleted, and then I would create a new account with the same email (As the email I use is paid for privacy and business purposes).
They said that if the account was ... |
Apps like peer2profit, IPRoyal and PacketStream allow you to sell your unused internet bandwidth to others for passive income. Supposedly you could earn about 30 to 75 dollars a month from using these apps.
But are there any risks tied to running these apps on your smartphone or laptop?
If so, what are they?
|
I understand an attacker could perform MiTM on Rogue Access Points and capture cleartext traffic between a web client and server. However, is it possible that an attacker could do similar MiTM attacks on thick clients such as Outlook If so, how could they insert themselves in the middle?
|
NAT is so standard for IPv4 that nobody thinks about it but for IPv6 it's considered a really bad option. (Article from APNIC) Of course there's the stateless NPTv6 and the firewall can be configured such that the clients don't get unwanted inbound connections unless explicitly configured like with the IPv4 NAT. Also I... |
When visiting a website that uses HTTPS, we can see its certificate in the browser. But how can we know for sure which validation process the company or domain behind the website has gone through?
Validation processes: OV (Organization Validation), DV (Domain Validation) and EV (Extended Validation).
When I check a web... |
I am enhancing our login flow to include biometric verification via your phone. The user will log in to the desktop app but will have to verify their identity via their phone. We already have an app and want to now accept login verification requests.
I have things "working" as a PoC. However, I am unsure if our solutio... |
I am on a red team exercise and want to try wePWNise to create a malware document with an executable that I have created and tested and know to pass the target's AV.
Does anybody know how to convert a PE executable back to raw in the format that you would get from msfvenom -f raw set? Is there a script, tool, or someth... |
When a certification authority generates a signature, but if the message to be signed does not include the lifetime information (period of validity), what can happen in terms of security being compromised?
Am I correct to say that the CA could be duped into signing a message containing malicious code, which in turn can... |
Alice and Bob are communicating frequently via an encrypted overlay network. Eve can observe the timing and length of Alice's and Bob's incoming and outgoing ip traffic, but cannot read their ciphertexts. Additionally, the overlay network prevents Eve from determining who the traffic's remote transceiver is. With an ad... |
We placed a jump server in CDE to restrict the direct access to PCI in-scope devices (although I believe it should be outside CDE, please confirm)
Now, we have opened SQL ports 1433 and application ports from the jump server to the prod host in the CDE. If we allow them to run queries from the jump server itself instea... |
I am testing a publicly available site https://example.com/ebill/login.php where I fill the form with account number, like 34413271 and a cookie is assigned for later urls to use, then the above URL redirects to https://example.com/ebill/authentication.php and finally to https://example.com/ebill/billinformation.php. W... |
I'm reading this document: https://docs.microsoft.com/en-us/microsoft-365/security/defender-endpoint/exploit-protection-reference?view=o365-worldwide
In older OS, EMET injects a DLL into the process. On latest Windows EMET is implemented by windows directly. I'm wondering which DLL implements it? I'll then look into it... |
Someone I know ended up installing a sketchy authenticator app while going through Microsoft's SSO authentication flow, and I'm trying to understand how this happened exactly.
The user's organization started requiring 2FA, so the login flow requested setting up a second factor. Somewhere, a QR code was displayed in re... |
IP addresses can be spoofed. The Envelope-From and Header-From addresses can be spoofed as well. But is it possible to spoof all three at the same time to send a forged email that passes both SPF and SPF alignment in DMARC?
If it is possible, wouldn't this mean that a domain with only DKIM and DMARC set up would be mor... |
I am on Ubuntu 20.04 server running AppArmor 2.13.3 and I have downloaded two additional apparmor profiles, from the [official apparmor repository][1]:
usr.sbin.apache2
php-fpm
Because I am running such an older version of apparmor (the only one available from my repository) I had to do three things in order to get th... |
I have an MVC application that has undergone SAST. The scan detects a potential XSRF/CSRF vulnerability.
The application rewrites the .AspNet.ApplicationCookie setting SameSite=Strict:
protected void Application_PreSendRequestHeaders(object sender, EventArgs e)
{
if (Request.Cookies.Count > 0)
{
foreach... |
I have noticed that some server configurations put a clear command in the default ~/.bash_logout file, also with the comment "Clear the screen for security's sake". I can see that this behavior is useful if you have a physical TTY and you log out, making room for the next user.
But for SSH sessions this behavior annoys... |
I asked this at https://apple.stackexchange.com/questions/445343/macapps-link-possible-attack-vector-could-you-pipe-through-some-security-scr but I think this would be more appropriate place.
A work colleague said she is using https://macapps.link/en/ to help speed up software installation on company Macs. Choosing app... |
I'm trying to get information about CVE-2022-1175 which is corrected in gitlab versions 14.9.2, 14.8.5 and 14.7.7 (https://about.gitlab.com/releases/2022/03/31/critical-security-release-gitlab-14-9-2-released/)
However, in NIST: https://nvd.nist.gov/vuln/detail/CVE-2022-1175/cpes?expandCpeRanges=true they say that also... |
I was testing a website which does not have XSS in their scope. So I thought it would be a good idea to escalate XSS to a bug which is valid. I need to make a request to my server but the problem is closing tag > or forward slashes / are escaped but everything else works. The event handlers also work.
Is there way to c... |
Is it considered OK to "authenticate" via unverifiable plain-string headers simply asserting a principal name (User-ID: 12345), as long as this is behind an API gateway that does verify authentication?
In addition to their basic purpose as a reverse proxy (URL-based routing, SSL termination, load balancing, etc), API g... |
I have an old iPad Air 1st Generation with the latest supported iOS 12.5.5.
How may I maximize its safety against system and browser vulnerabilities? I guess I should not use Safari? So is Brave a better option and does it get updates?
|
I have an SPF record that has too many DNS lookups. Consequence is some mail servers will silently drop emails; RFC7028 says that over 10 lookups:
SPF implementations MUST limit the total number of those terms to 10 during SPF evaluation, to avoid unreasonable load on the DNS. If this limit is exceeded, the implemen... |
Let's say we have:
Publicly available HTTPS API (e.g. api.example.com). The web server that runs it uses a certificate from a publicly trusted CA (e.g. Let's Encrypt) with both server auth and client auth usages.
A database using mutual TLS to authenticate itself and clients (and encrypt communication, obviously).
Th... |
As I understand it, OAuth is the natural evolution of authentication protocols
I understand in a general way that evolution is as follows:
basic authentication
cookies
tokens, at this point you want to separate the front from the back.
OAuth, OpenID connect ... a centralized way of handling authentication and having a... |
I use gmail, and about 3 weeks ago I started getting a couple e-mails a day from random sources. All of the e-mails contain gibberish text like this:
6 5 4 8 2586 8016 70170
2 1 08 05 60 172 01 5463412 5410
the stinging did working interpret our Or fire sudden of they spurts
our together of
will they will worried... |
Suppose I have a resource that I want to be accessible only using a specific link. I could generate a link using a 256 bit random identifier, e.g. https://example.com/aMXtSQufIxntoMSnTQGdgMfs84VzM-ae7gog1hoqojS—then only the user in possession of the link could access the resource. Malicious users would be unable to ac... |
Assume an Apache server (http, no authentication just hosting static files) is running in my local network which is hosting some zip files. Assume User A is requesting a zip file from the Apache server. Is it possible for User B on the same LAN network to inject contents into the file transfer stream ongoing in the net... |
I'm looking for the name of a concept that works as follows:
I post a hash of a file publically e.g. on Twitter
Whenever needed, I provide the file with the contents that make up the given hash
The purpose is maybe to proof ownership or otherwise proof that something was known to me in the past before it became publi... |
I made some changes to my GitHub account security, notably I added two new hardware security keys and removed SMS as a 2FA backup method.
8 days later today, I randomly checked the GitHub's own security log and found that next to these 3 events, there's also a 4th one from the same day - two_factor_authentication.recov... |
I've been doing a deep dive into how products like Web3Auth work under the hood and wonder if this is a viable approach to building applications where a user can have the convenience of using oAuth to generate and manage a private key. Additionally no party, except for the client, would know what the final private key ... |
I recently flew with United Airlines and I used their free messaging wi-fi plan.
I could text my friends on Whatsapp, but I could not send (nor receive) multimedia content like images, videos or audio clips.
I'm wondering how this works and whether it is secure. Since they're able to selectively block traffic, I'm assu... |
I've always been concerned that my casual browsing of the web directly from Windows 10 could infect my PC.
How much added security (if any) could be obtained by using Hyper-V to run an Ubuntu 22.04 LTS virtual machine for web browsing? Is it any more secure?
|
Various ambiguous "middleboxes" exist at arbitrary points throughout the Internet between a Client and Server's TLS connection.
A possible intent of these middleboxes is to enforce protocol standards, which sounds great in theory but hinders quick adoption when updating to new versions of a protocol -- as is what happe... |
I want to accomplish the following:
Having a web application or mobile app authenticating users using openid connect.
Having a REST Api authenticated using openid connect using the same user as for point 1.
The user should not have to consent since the API is trusted (but not for SPA's)
For point 1 we have a working ... |
I had a hard time convincing a bug I reported that it was a bug bounty program. It seems to be more of a discussion than a question.
Scenario: Users shop on the shopping site. The categories of these purchases are drawn from an endpoint under the name of "favorite categories". Since the userId parameter is used here, a... |
I was performing SQL injection through sqlmap and it showed that the parameter is vulnerable but it is only extracting random bits instead of actual data.
I am pasting extracted material here.
[00:12:27] [INFO] the back-end DBMS is MySQL
back-end DBMS: MySQL 8 (MariaDB fork)
[00:12:27] [INFO] fetching current user
[00:... |
A few days ago, a colleague and myself were having a discussion specifically on site-to-site VPNs. My understanding, and how I was taught, are that all encrypted tunnels are virtual private networks because:
They use a virtual interface to establish connectivity.
They use strong encryption to ensure privacy of the co... |
While browsing the internet on my laptop, I've allowed an internet site to access my location data. What I had expected was that it will show the name of my city based on my IP. I was quite shocked when I've seen the precise address of my location, with the street name and house number!
You can try it yourself at:
http... |
I'm looking for a specific answer regarding the TLS handshake in a scenario of domain-fronting.
Following hensonsecurity and zscaler blogs I have noticed that a detailed description regarding the re-direct / routing scheme is missing when the CDN finishes the legitimate TLS hand-shake and it sees that the GET is to ano... |
I would like to create a secure chat application for multiple users on a device. The user have to login to the app before using the chat application.
My thought was to store a private key in SharedPreferences, check if the device is rooted. If this is the case, the app cannot be used. So if there is no root, a private ... |
My understanding of a scrubbing center is when a DDoS is underway, all traffic gets routed to a scrubbing center where traffic is analyzed and all legitimate traffic is then sent to the targeted network while the malicious traffic is not.
What happens to that malicious traffic and/or where does it go to?
|
A question came up when I was discussing that Man in the middle attacks can occur when certificates have subject names are not qualified (e.g. "localhost"). I was then told that MitM only happens when it's a TLS certificate with an unqualified subject name.
My question is, wouldn't MitM also affect other types of certi... |
I'm in a somewhat weird situation that I don't understand:
I use ufw as a firewall. It's setup to drop any input connections apart from ssh
I have a service running locally (managed through systemd) that accepts connections on port 9500
I have another service managed with docker-compose. It needs to talk to the servic... |
This "No Persistence" and having to re-infect again after every reboot seems so inefficient for IoT to be such pursued targets.
Also, most of the persistence methods I have seen tend to be model specific & rare.
|
Today I received an SMS
AusPost: Your package address is incorrect and delivery failed, please
update address information via the link.
https://auspost.requestupdate.com
If I do a whois auspost.requestupdate.com by https://www.whois.com/whois/auspost.requestupdate.com I get nothing. It either gives me auspost.com or... |
I'm trying to implement a toy project DNSSEC supported DNS resolver to learn about both DNS and DNSSEC.
Most of my implementation are finished. But for some domains it's not working correctly, and I noticed some differences when comparing with results from https://dnssec-analyzer.verisignlabs.com/
So the simplified flo... |
Recently I conducted a SSL server test to assess the SSL configuration of my server. While the overall grade A+ was pretty good, it was found that the server supports several cipher suites that are considered weak according to SSLLabs (actually only 2 out of 8 were ok).
These ciphers are reported to be weak according ... |
I have deployed a Certificate Transparency (CT) log server that uses Google's CTFE (named "certificate-transparency-go" on Github) and Trillian Projects. And I have issued a pre-certificate, submitted to my own CT log server.
I have this text information from the server (some information has been removed):
Uploading pr... |
I have an endpoint that accepts data as signed PASETO tokens. It has one problem - if someone "cracks" the TLS encryption or this signed token leaks then everyone can use it as long as the token isn't expired (signed token has a lifetime of up to 15 seconds). I don't want to use e.g. signed-then-encrypted tokens with e... |
Why are we replacing PSP with PSS? What are the motivations and changes in fundamental design?
Both PSS and PSP's objective is to only permit Pods that fulfill a set of secure criteria and conditions before they can be deployed. Examples would be running the container as non-root, usage of volume types, etc.
Both PSS a... |
In order for a server to be vulnerable to the LUCKY13 exploit, it has to use a ciphersuite which uses CBC and must not use the encrypt_then_mac TLS extension. However, if both these conditions are satisfied, is the server necessarily vulnerable to LUCKY13? Does openSSL mitigate this attack by adding random delays when ... |
What does default Seccomp, AppArmor, and SELinux in Kubernetes Security truly mean? Who and where provides the default profile? Does default mean it applies to containers, pods, or the Kubernetes administrator cluster itself?
I've seen numerous times that the default Seccomp, SELinux, and AppArmor profiles be enforced... |
Is it true that you can only decrypt data that was encrypted by a certificate using the same exact thumbprint? My thought was that you can decrypt the data using an updated version of the same certificate with just an expiration date that's further into the future. This certificate will have a different thumbprint, but... |
We are implementing clickjacking protection on our website as follows:
By default every page on our site has frame-ancestors self
We have a list of pages that are specifically designed to be embeddable in 3rd party apps, so those pages don't get frame-ancestors (or they get it with specific URLs configured by the cust... |
I created a service with elastic beanstalk in AWS 2 or 3 hours ago.
EC2 is in private subnet and load balancer is in public subnet.
When I look to logs I saw these requests.
What are they?
|
I am looking to figure out how to create an iFrame tag without any spaces. I have found an input on a Bug Bounty program that reflects my input back into the page, and allows me to escape double quotes and an angle bracket. The page has XSS protection so my next thought would be iFrame injection. With that said, sadly... |
I am increasingly buying IoT aka smart devices for my household.
All these devices need to be connected to WLAN and proprietary app (via bluetooth on iPhone). I do this initial step, but then block the internet access for the IoT device in OpenWrt router.
I can then control the device on the local network via app on iP... |
I am trying to understand how client certificate authentication works in an SSL handshake.
Can someone help to clarify the following bullet points below:
Do we need to have a Client Leaf certificate in Server truststore? Is it referred to at any given time during the two-say SSL handshake process? What if it is presen... |
I have the following scenario:
When the leaf certificate expires, the intermediate certificate is checked and if the intermediate is not expired, the application will keep running and will not be affected, while the leaf is getting updated.
It is like adding a condition to check the validity of the intermediate certifi... |
I was watching this DefCon talking about Solid State Drives (SSDs) destroying forensic and data recovery jobs. It was interesting to note, that the speaker did acknowledge that it is unknown how long deleted files will remain recoverable for.
I have read several academic papers which state it is unknown how long a dele... |
I am faced with a file upload functionality. We can upload docs and png's but cannot view them.
I have tested for several things so far and now would like to test for directory traversal via file name.
I.e if can I upload / replace files in other directory's using a modified file name.
From my understanding, in an inse... |
I've heard a lot of people say that the Web Crypto API is not very safe. For example: https://tonyarcieri.com/whats-wrong-with-webcrypto, Problems with in Browser Crypto. However, I'm looking to use the Web Crypto API for a completely different purpose.
I want to create a static website (html, css and javascript files)... |
I was having the debate of TOTP vs Push Notifications and found this claim online:
Is the 2FA method protected against phishing?
Chart Explanation: The most common method of phishing is persuading a
user to click on an email that leads them to a website that looks like
a legitimate site they do business with. The rog... |
Signal Messenger is basically state of the art chat when it comes to security and privacy: It uses only phone numbers for user identification, doesn't store user chat and the encryption protocol is tried, tested and proven. It is very sophisticated especially in regards to its encryption protocol.
But why wouldn't the ... |
I recently bought and downloaded Kaspersky. Since I downloaded it, after every reboot, it keeps detecting what seems to be a crypto miner. Every time it claims to delete it.
Should I be worried ?
Name:not-a-virus:HEUR:RiskTool.Win64.Miner.gen
|
I'm using a MacBook and want to store confidential data (financial documents, passwords, private photos, etc.) on an external HDD disk.
How safe is setting up APFS AES 256 encryption with disk utility?
Does HDD brand and model matter for security?
Are these models safe:
Toshiba Canvio Basics HDTB420EK3AA
WD 2TB Elem... |
Is there something I can do in this case? My ISP says they cannot assign me a different IP. At this stage a VPN no longer helps, correct?
|
If I lose my external HDD and somebody finds it and tries to hack, will he succeed?Is it possible to get data from encrypted disk by disassembling it and working with platters?
HDD is APFS AES 256 encrypted and has strong password.
|
What is the exact structure of a packet flowing inside a SSL based VPN? What parts of the packet are authenticated and what parts are encrypted?
From my understanding there are two types of SSL VPN: Portal VPN and Tunnel VPN. What are the difference between the two at a packet level?
In IPsec VPN there are AH or ESP he... |
My goal is to evade IDS/IPS detection and scan the target with nmap. If the scan is detected, the target seems to stop responding for 10s. I think that IP Fragmentation Attack is exactly what I need.
So I tried to scan with -f and -ff flags and have actually seen fragmented packets in Wireshark, but my scan apparently ... |
I'm a total beginner and im trying to solve Portswigger Academy labs. I'm studying on XSS right now and im stuck in somewhere.
Lab Details:This lab demonstrates a reflected DOM vulnerability. Reflected DOM vulnerabilities occur when the server-side application processes data from a request and echoes the data in the r... |
While learning SELinux policies in the Container/Kubernetes environment, I realized that there are other layers of controls that overlap with SELinux.
In these cases, what additional value can I can obtain from using SELinux?
Examples are:
SELinux applies labels to containers and objects on the host (host here means t... |
Running a container as root is a big "no" but are there times we really need to run privileged pods, or sometimes as root?
If so (and feel free to disagree), what are the mitigation controls we can employ?
There are some which I can think of:
For privileged pods, create an actual normal user (e.g. UID 1000) OR use "ro... |
On a server of mine, its local ESET firewall is blocking MariaDB's mysql process from accessing a blacklisted IP 154.12.54.163:1277. MariaDB is installed and expected on the server.
I've also tried netstat -a -o -p TCP but that doesn't show me anything connected to that IP (which makes sense because the firewall didn't... |
My work laptop is connected to my router via ethernet and personal laptop is connected via wifi to same router. Whenever I switch my vpn on on my personal computer, the connection icon becomes that of the ethernet connection (but has no hardline connection). Is there crossover somehow and my activity is able to be seen... |
I don't know how to mitigate iTLB multihit vulnerability.
/sys/devices/system/cpu/vulnerabilities/itlb_multihit | KVM:
Vulnerable
Found this: iTLB multihit,
But i have no access to the host machine where the VM is hosted.
Is it possible to fix or mitigate this vulnerability from the guest operating system ?
System s... |
I have a pretty good understanding of HTTP Request Smuggling vulnerabilities but one thing I still need some clarification on is if they are domain/subdomain wide or directory wide?
Here's what I mean: If HTTP Request Smuggling vulnerabilities arise because of a configuration difference between a front-end server and a... |
I'm interested in the status of OCSP respect in modern browsers (particularly the one I'm using right now).
Is there any website that will allow me to test how my browser treats the status_request SecurityPolicy?
I know that you can use SSL Labs to test your server for just about everything, and BadSSL to check your br... |
What are potential security implications of using older unsupported motherboards/laptops that do not get BIOS(UEFI) updates anymore, but run an up to date GNU/Linux distribution?
Do measures like using secure boot or setting up a BIOS password help mitigate any of the potential threats?
|
Apple and now Google are releasing products that are built on WebAuthn as a replacement for traditional username + passwords. Why did this technology beat out PAKEs?
|
How can I securely delete selected files so they can’t be recovered, but without the full format of the external HDD? Is this even possible?
I’m using Mac OS.
|
I would like to preface this with the information that I am clearly not well versed in crypto, so my understand so far may not be accurate.
CISA recently published an advisory Preparing Critical Infrastructure for Post-Quantum Cryptography which details actions in preparation for migrating systems to a post-quantum cry... |
I want to use a GPG key instead of an SSH key. Looking online I found several guides on how to do it. But these guides are about using GPG for convenience. I instead want to know the pros and cons from the security perspective.
Firstly looking at the archlinux wiki:
gpg-agent has OpenSSH agent emulation. If you alread... |
What options for secure browsing are available these days? I always used Tor, but since the DDOS attack, even simple sites like google.com need almost 2 minutes to load.
By "secure browsing" I mean that nobody can track your source IP address, not even governments if they would try (considering you do not make mistakes... |
We have a custom online service that is private. My company can access it via SSO but there is no other login mechanism.
We have a business partner that has its own online portal, which its own clients get access to with a username and password. The partner would like to give its clients access to our online service. W... |
Osquery is a great open standard for collecting data from endpoints, using SQL syntax.
Kusto is a new Microsoft language for collecting data from Windows endpoints, using syntax which is almost--but not entirely--unlike SQL.
Microsoft is publishing threat hunting guidance in Kusto.
Is there any easy way to translate th... |
I am tasked with auditing the default configuration (system configuration, default applications...) that is set for some computers before they are given to users.
Though I have never seen it anywhere, I feel it would make sense to check whether all its applications that use the network (internal or external) are proper... |
Recently I saw the Google Report about the DDoS Attack that they managed to stop. In the report, they said,
"They chose the ‘throttle’ action over a ‘deny’ action in
order to reduce chance of impact on legitimate traffic while severely
limiting the attack capability by dropping most of the attack volume
at Google’s ne... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.