instruction
stringlengths
24
29.9k
Do they lie? I mean companies something like AV-TEST, AV-Comparatives, Virus Bulleting, ERG Effitas, etc.
You potentially use a variety of scanners and processes (e.g. Threat Modelling) which produces a set of overlapping outputs. How do you avoid repeated findings which are duplicated across toolsets?
Extracting private keys directly from the card is nearly impossible. With some acid package destruction and electron microscope work, a skilled team, and enough time, money, and luck you can in theory extract keys but it involves not only physical access but a scenario where the card will be physically destroyed. –Ger...
To preface this I have full permission to do anything I want to any service I can find on this network as it's part of a course I'm doing in Ethical Hacking. I also want to mention that I'm quite the novice when it comes to information security and hacking in general but I'm familiar with a lot of the methods used on a...
We know that when you use a VPN, your ISP can't see what data is going inside the tunnel, but they can see that you are visiting the VPN server. Is it possible for the VPN to somehow configure your internet so that your ISP can't even see that you are using a VPN?
I was working on PayPal gateway integeration on my website using Javascript SDK and then I came up with this thought that, what if someone changes the value of amount in the code below through selenium or directly injecting Javascript? Is it possible? paypal.Buttons({ createOrder: function(data, actions) { // Thi...
I'm reading this article: https://research.nccgroup.com/2022/09/06/sharkbot-is-back-in-google-play/ and quote: Besides this, the dropper has also removed the ‘Direct Reply’ feature, used to automatically reply to the received notifications on the infected device. This is another feature which needs suspicious permissi...
I am starting to learn STIX, and the exact meaning of some of the SDOs is not really clear to me. In particular, can someone give precise guidelines or examples of the differences between the tool, infrastructure, and malware SDOs? Naively, I understand that: malware = a software package that does harm infrastructure ...
I have a web server that will be used to manage the stock of a warehouse in a factory. The web server will be accessed only locally so the clients can update and view the available stock. The server can be accessed by 192.168.0.10/index.html and all clients connected to the local network can view it without https. The ...
How secure are Android smartphones when someone gets physical access to the phone, in other words, someone stealing my phone and how to improve this security? I'm especially worried about all the accounts that I am logged into on my phone such as my google account, and my bank account which solely uses my fingerprint a...
I'm a beginner to Web security and I recently started reading about Same Origin Policy and it's usefulness in preventing a malicious website from interacting with a secure website being used by a user. (For example, a bank website that a user has logged in). My question is, if the Bank website (or any other legitimate ...
I am learning pentesting, currently studying Server Side Template Injection. I understood there are two types of SSTI - plaintext context and code context - but struggle to understand what exactly is the practical difference between them. For posterity, I'm using the OWASP Web Security Testing Guide as source here. Reg...
I am testing a web app in which there is a section where it is possible to view all the users who can access it with their passwords in clear text. Is it normal this thing?
I'm testing an application that sends JWT token in the request body (in JSON) instead of the header. Is it less secure than sending JWT token in the request header (like Authorization header), which is more popular?
What is the correct name for the 2FA device that is printed codes on a wallet card? These codes are sequentially numbered from 001 to 224. The log in screen displays 2 numbers in that range and the user is to map those numbers to codes which become what is effectively a second password.
I've been pondering some potential cybersecurity applications for enclaves. One of them being the problem of password hashing. Some clients have enclave support, meaning part of their CPU can securely execute code in an encrypted and authenticated channel, where the session keys are kept by the enclave. One must only t...
I'm trying to understand how SPF and DKIM can be used to prevent email spoofing. One of the things I find confusing is that the SSID/AUID of a DKIM signed message can be different from both the envelope From and header From. For example: Say I receive an email via mailer.com with an envelope From: foo@bar.com, a header...
I have some questions related with user context and auditing for background job execution for SaaS application. Let's say an admin user scheduled a background job through UI. When the job start running, this job requires to run with a user context, for such case I have following questions: Question 1: should this job u...
I've recently started configuringn and using DMARC reports and I have the following question. How can the DKIM domain not be my domain (and pass)? I have the following report <record> <row> <source_ip>185.53.XXX.XXX</source_ip> <count>1</count> <policy_evaluated> <disposition>none</disposition> ...
I wonder if this is the right place to ask about the specific functioning of viruses / worms. We all receive fishy mails all the time. And generally I never click on anything, especially not attachments purporting to be quotes, letters, sipping bills, etc. But I wonder how this ZIP file attachments exploit works? Does ...
This is a serious question and I have thought about it a lot. Not a newbie question. I am unsatisfied with the common answers they try to sell things they try to scam you they try to do phishing they make you click on something malicious Those are all obvious and reasonable motivations for sending spam email, and the...
I'm trying to check if it's possible to bypass a two dots verification to perform a Path Traversal, downloading files out of the allowed folder. The problem is that it uses rawurldecode when validating the submitted file, so URL Encoding techniques didn't work. This is how the application tries to prevent Path Traversa...
I am doing some security research on Kubernetes and I found something still mysterious to me, concerning capabilities. Example of simple pod: apiVersion: v1 kind: Pod metadata: name: my-pod-httpd spec: containers: - name: my-pod-httpd-c1 image: httpd:2.4 command: ["/bin/sh"] args: ["-c", 'sleep 60m'] ...
My plan is to create rootCA.crt and sign newly created server.crt. Later server.crt should sign newly created child.crt. As result I will get small chain. Now I would like to test if child certificate was signed by server one: openssl verify -CAfile child.crt server.key Got error: PEM routines:get_name:no start line:....
I have a desktop app that takes a file format and parses it to get some JSON data that is then send to a server. My problem is figuring out if it is possible to somehow parse the data on the client and then send this JSON data to the server while being somewhat sure that this JSON data was not modified by the client ma...
Relatively new to the DFIR scene. We have an assumed breach scenario playing out right now and I noticed that there were some GET and POST requests coming from a malignant dll in a users temp directory. Cool, the strange thing is that the domain the dll is making requests to will be something like cnn.com or businesst...
I was able to grasp how CT works by reading this explanation, but one thing remains unclear for me - how CT may protect ecosystem from hacked CA server. For example, someone hacked Digicert, and now from it behaves issues EV or regular certificates to malicious domains that end up in CT logs and as consequence browsers...
I am working on an e-commerce website, wherein make use of mobile OTP authentication for new signups. We have a fair bit of protection against bots and malicious actors by using aggressive rate limiting and firewalls to protect our APIs and pages. Recently we are facing a challenge wherein the malicious actor: Is maki...
Before anything, please excuse my clear confusion over what is probably a non-issue. Computer security is definitely not my expertise, so any and all help is appreciated. I recently installed a Python package through pip that does not have many github stars and from a relatively unknown author (https://github.com/reali...
I am fairly new to container image vulnerability scanning. There seem to be a lot of tools (Snyk, Trivvy, Clair, e.g.) that can identify vulnerable packages in container images. They also do a good job identifying the fix version for the individual package (example: for CVE-2022-32207, upgrade from curl 7.80.0-r1 to 7....
I need to extract an RSA private key from an ssh-agent core dump running on ubuntu 20.04. I believe the ssh version is the latest. I have tried many Linux tools with no luck. I also wrote a python program to return the section of the core dump with the highest entropy (inconclusive). I have access to the ssh-agent bina...
I would like to know how feasible an attack on a web browser is. Is that something that occurs frequently or is it difficult to manage for a malicious website to steal sensitive data using remote code exploits? Also is it secure enough to have several Chrome profiles to prevent theft of sensitive data if a malicious we...
I am wondering what happens when I log into an encrypted Windows PC - could an attacker steal data from the PC while logged in or is it encrypted and to access the drive he would need the Bitlocker key? Does it actually prevent data breaches?
Many banks I have worked with require between 4-6 characters passwords. Some even force to use only digits. Such a poor password is protecting your financial information, because MFA is usually not available. It's truth that when you want to perform an operation, you get a confirmation either by SMS or the mobile app, ...
I'm trying to replicate the vulnerability CVE 2022-21661 on my own website that is resulted vulnerable as according the versions involved, as according wp-scan. I'm trying to submit a POST request with Burp as described in the POC on Exploit-db https://www.exploit-db.com/exploits/50663 This is my request POST /wp-admin...
Apparently, some enterprise firewalls can block specific browsers. I have an example of one blocking all browsers except the ones based on chromium recent versions (Chrome and Edge work) but Firefox is blocked (with a message when loading any page). Knowing that user-agent switching does not unblock Firefox, I was curi...
So, suppose a person accidentally typed their complex encryption password into Google search. They weren't logged in to any Google services so the search was anonymous, and they continued to use this password afterwards. What I am curious about is, suppose at a much later point LEA was to seize hard drives of a suspect...
I'm currently reviewing/reversing a software (coded in C) and it has a line like this : time_t var = time(0); My goal it to get this time(0) call to return -1. (I cannot modify the parameter.) Looking for any hints/POC methods to achieve this, with a high preference for solutions which do not require root perms. But I...
Short I known 0x02135 gets encrypted to -> NzY4MzY5 0x02136 gets encrypted to -> NzcxMzc0 ...etc I want to know 0x02137 will get encrypted to -> ??? (in same enc. pattern) Brief I was testing a website listed on a bug bounty program and found out that it's password reset functionalit...
Rather primitive Malware using Python3 and similar already available software on the victim's machine (which can also be compiled using PyInstaller/pycom if not) has the capability to override the user's processes in memory while they're running. There's even a library for that. You can of course even use integrated st...
When doing local development, I have to export a token needed for downloading dependencies from a private repository. For example: export NPM_TOKEN=token_value I want to make sure that this token is not stored in the shell history (that's an easy part, I don't ask about that) and that it comes from a secure place, wit...
Can we create a true random generator whose entropy source is the loss of electrical signals that a binary architecture cannot detect? If we have a system that let's say could do this, could we be able to encrypt data in a way that makes people unable to decrypt with the current resources? Of course, as far as security...
We know that every user in Windows has a password hint. This password hint is stored in the SAM hive, more specifically in the SAM\Domains\Account\Users path. Is there a way to extract this password hint of a user with volatility if we have a memory dump of that computer?
Assuming my router is compromised and someone has full access to it, which is easier to intercept: WiFi or Ethernet traffic? We're talking about only SSL traffic here.
My loan lender accepts emails from their customers. They share their contact details including their customer service email address on their website with the public. So, they apparently regard incoming emails (from their customers) safe but outgoing emails (from their customer service) not so safe...However, this does ...
I would like to know how difficult it would be for an attacker to reach a subnet behind a router once he gained access to the router. For example, the router would be on 200.1.1.3 and the subnet on 200.1.1.4
I received a CrowdStrike Alert where a particular user was using Chrome and the process was connected to the web browser but the user does not know what he did to connect to the malicious IP address that triggered the alert. How to determine what process accessed the web browser? Is there any way? I tried a solution by...
As the title says, in the rules of engagement I have my scope, used method, etc. but I've been wondering if I should also include a list of tools (such as NMAP, Dirb/Ffuf, etc.) that might be used. And if not, how should I be transparent with the client about the way I'm going to perform the pentest? My concern is that...
I read about "pam_ssh_agent_auth" in combination with sudo, which can use a ssh agent to authenticate instead of using the users password: https://manpages.ubuntu.com/manpages/jammy/en/man8/pam_ssh_agent_auth.8.html Is using a forwarded agent with only one dedicated key and SSH-ASKPASS for confirmation more secure than...
I visited stackoverflow.com and found in Chrome that its certificate is valid and has Common Name (CN) *.stackexchange.com. After that I checked a fingerprint for stackexchange.com and it matched the first one. I thought that Chrome would show me a warning that the domain didn't match, as stackoverflow.com doesn't re...
As I understand a webserver shall serve SNI first and ignore HOST header from HTTP 1.1 as TLS handshakes occurs before HTTPS, to test I came up with this example: two domain names under the same IP address stackexchange.com and stackoverflow.com: (echo GET / HTTP/1.1 echo Host: stackoverflow.com echo Connection: close...
Several Windows apps come in both "installer" and "portable" forms, with the latter having the advantage that you can just download and run it from anywhere in the system. Doesn't being able to run them from anywhere in the system mean that such apps are inherently vulnerable to binary planting since an attacker with a...
I have a question related to the correct interpretation of RFC 5246 (TLS v1.2), in particular concerning the fragmentation in the record layer. "6.2 Record Layer" states that the record layer receives data from higher layers. "6.2.1 Fragmentation" states that multiple client messages of the same ContentType may be coal...
Say I want to do source $VIRTUAL_ENV/bin/activate in my bashrc whenever the VIRTUAL_ENV is defined. In general, the idea of running a script pointed by an environment variable seems a bit fishy as it can by writable by other users. So it would seem a check of permissions is desirable, in a fashion similar to the .ssh/c...
Recently started turning my phone on airplane mode and it got me curious. Airplane mode is supposed to turn off all radio signals. So, I won’t be able to receive or send messages (emails aswell, and so on). Once airplane mode is turned off, I can send messages again and I receive all messages I would have gotten otherw...
Technologies like Zero-knowledge password proof and PAKE seems to be pretty mature but almost all modern web-sites still send passwords over HTTPS to check authentication. At first glance, this protocols look like a magic pill, but still not adopted, I'm wondering why.
On Campus we have free Wi-Fi, specifically, Eduroam which needs student credentials to be accessed (each student has its own credentials). One thing that triggered me was that no certificate is provided when connected to the Wi-Fi (possible Wi-Fi impersonation). I don't feel safe connecting my laptop in this network. S...
I'm researching information about HTTP/2 from a cybersecurity point of view for an article, and i wanted to include a section about attacks exclusive to HTTP/2 or were this protocol have a key role. I already got information about request smuggling in HTTP/2 but I have difficulty to find other types of attack related t...
If a potential attacker was able to upload a cross-origin <iframe> element to your website as a post of some sort, what could they actually do through it? I know that cross-origin <iframe> elements are able to do simple stuff like using JavaScript's alert() method, but what else could they do to the page it was uploade...
I'm trying to grasp which benefit can KDF like PBKDF2, scrypt and bcrypt (I know that bcrypt is technically not KDF) may bring over hashing in loop like sha256sum(sha256sum(sha256sum.....(salt + master password))) - N times, where N equals to some big number.
I'm building a note-taking app, when a user writes a note an id is generated and I redirect them to a page where they can see its content with a URL like /note/DXSt832pS5iLuos6uxBn. What are the security risks of not double-checking that the user has access to this page, and simply trusting that if they know the id the...
I am testing an app and I found a link in source code that permit me to access a document without authenticating to the application on which that document is present. The url has a key in the get and it is that key that allows me to access that resource without authenticating I can classify it as "Broken access control...
I am still studying kernel credential management (https://kernel.org/doc/html/v5.9/security/credentials.html) and I have encountered a use case I cannot explain. I am in a VM (Kali). ❯ uname -a Linux cactus-ths 5.18.0-kali5-amd64 #1 SMP PREEMPT_DYNAMIC Debian 5.18.5-1kali6 (2022-07-07) x86_64 GNU/Linux My UID is no...
I am trying to learn about cipher lists and how to order them. I am new to this. I have gone through this doc. I don't get some of the things mentioned in it. Maybe this post can clairfy it. I want to create a cipher list that doesn't contain AES and CAMELLIA ciphers. Does the following cipher string cover my use case?...
Lets say I have the following setup Two teams: TeamAlice and TeamBob A command that requires admin access: admin_command Two sets of computers: TeamAlice_Computers and TeamBob_Computers Only TeamAlice has login access to TeamAlice_Computers, and only TeamBob has login access to TeamBob_Computers Is it acceptable to p...
For the past 2 weeks, I have observed 4-5 spikes in 5xx responses. After looking into the logs, I found a series of: > 51.159.150.125 - - [16/Sep/2022:06:37:55 +0200] "GET /some-legitimate-page-path/?bb=uNiX:AAAAA...AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA...
I've matched with this girl on Tinder. She still lives in war-torn Ukraine. I've sent her 80$ to take a bus to central Europe, according to online data, the price checks out. Sending money to people I hardly know is a red flag. However it's only 80$, for me that's not much. So I sent her the money via Paypal. She then ...
Can someone please explain what is meant by the following analysis provided in the overview section of the OWASP Top 10 A03:2021 – Injection page: Injection slides down to the third position. 94% of the applications were tested for some form of injection with a max incidence rate of 19%, an average incidence rate of 3...
Based on the documentation here https://docs.docker.com/engine/security/, it does not seem that there are any built-in features to restrict the current logged-in user to run certain Docker commands. For example, I'd only want to allow a user to build images instead of running them. Hence, I'd want to allow 'docker buil...
We are developing a lottery platform, and we are discussing what the best way to implement it would be. As we have it right now, the system pre-generates, using a TRNG device, all the winning numbers for the day (about 400) and store it encrypted in a database table. Then, at the specific time that the draw is to be ex...
I'm going to a deploy a web app (angular static frontend and node backend in docker) to digital ocean droplet. Deployment is done from Github Action by essentially loging via SSH to the droplet and pulling code from Github, spining up docker and moving static assets to Nginx. Now I intend to leave only port 443 open fo...
I am trying to learn more about Nmap but it seems like it can only really give any information if you're actually connected to the network you're scanning on. For example, a friend and I gave each other our public IP addresses to see what we can do with it, but even if you try to scan that IP address it only tells you...
The question is a thought experiment. Junior works in IT at Finsurance Corporation™. He works from home now, and has to VPN into work but hates it because they've blocked Gmail and Reddit. Junior discovers ssh -J but has a new problem: he's too cheap to set up his own jump. Googling around, he finds free to use SSH ser...
I've just seen a Youtube video with an advertisement for NordVPN in which they claim that NordVPN would protect passwords when people are on potentially malicious coffee shop WLAN. That seems strange to me as basically all websites use HTTPS today. At least all I care about (e.g. banking, email, e-commerce, ...). I ass...
Do we know exactly whether and for which parts of the packet confidentiality and integrity properties are guaranteed using SSTP VPN? Specifically confidentiality is enforced on the header of the original packet? Integrity is enforced on the header of the original packet? Is integrity enforced on the header of the encap...
I want to use WPA3 alone, but it seems that a lot of devices I have only support WPA2, so I have to enable WPA2 in one way or another. Currently, I have created two Wi-Fi networks on the same router: one for WPA3-SAE and one for WPA2-PSK with different passwords. I have heard that WPA3 is securer than WPA2, but if I us...
I'm currently learning how to discover web applications running on a machine using port scanning, vhost bruteforcing and directory fuzzing. When it comes to port scanning, there is one thing I can't wrap my head around. Let's say I have scanned all ports on a host and discovered a HTTP service exposed. To validate it's...
Let's for a moment forget about the possible drawbacks of SEDs themselves. One of the upsides of SEDs is that the encryption key never leaves the drive but wouldn't using eDrive negate this advantage because the key is also stored in the TPM and can be accessed on Windows? If I'm able to back up the encryption key on ...
I wrote a NASM program that uses the execve system call to run wget inside a newly spawned shell and execute the retrieved page: [bits 64] global _start section .text _start: xor rcx, rcx push rcx ; first 4 mov rcx, "/bin//sh" push rcx ; second 4 (8) mov rdi, rsp ; /bin/sh ...
I am unable to identify certain public keys on my keyring because the key owner generated their public key using a UID that contained no identifiable information. For instance they're completely lacking of an identifying email address that many will use as the the key UID when generating their key. I would like to be ...
Can we be sure that a cleartext message that becomes encrypted by pgp or openpgp which is intended for one-or-more specific recipients doesn't also get secretly decipherable by a third party? Since i understand we can target multiple recipients when ciphering, how do i know software isn't adding extra recipients for, l...
Yesterday, a ransomware hit my PC. I didn't pay the ransom and didn't comply with what the attackers were asking for and I wiped everything and every drive on my PC and then reinstalled my stuff from a backup I made previously so everything is fine. But before I wiped everything, I backed up some of the files that were...
My company uses Anyconnect VPN of Cisco, and any company PC device is required AD username/password to access the network. I'm thinking about the case when an employee copies the whole windows (copy the whole disk) and put on a non-company device. Is there a way to detect this case? If yes, how to configurate to fire a...
One of our company sites redirects all bad URLs back to the login page which is required to even access the site. Is this insecure? It feels like it may cause some weird issues as I have never seen this before or at least be bad practice. For example https://www.google.com/fndnandas would redirect to https://www.google...
We have a service running behind https and we are using SSL certificates from Let's Encrypt. The problem is that one of our clients distrusts Let's Encrypt CA and on certificate renewal it requires to us to send the newly generated certificate in order to add it to the trust chain. Is this a common practice? Which are ...
Is it OK to just use a client's TLS certificate as a way of logging in to a website? What are the drawbacks? Is there any real system doing it? Normally, there is mutual client/server TLS authentication plus the user's username/password for the webpage. I am asking if username/password can be replaced by a client certi...
OpenSSH 8.2 added -sk key types that allow for FIDO/U2F hardware authenticators (like a YubiKey, etc.) yubikey-agent allows for the same functionality, except it (a) requires an additional client on top of OpenSSH, and (b) is scoped to only YubiKeys. Is there any advantage to using yubikey-agent?
As far as I understand, the only purpose of PGP signatures is to prove your identity. Assuming your email account is secure and has 2FA, haven't you already proven your identity by sending an email from that address?
I had a discussion with PenTesters at my company today, who have said that security headers, like for example Content-Security-Policy, Strict-Transport-Security, Referrer-Policy and Permissions-Policy, should always be sent in the subsequent requests within one page (e.g. Images, Angular), even if they were sent alread...
Consider the following scenario OpenSSL and x.509v3 is used. You have 2 CA's: CA1 and CA2. Both CA's have cross signed each other, meaning CA1 has signed CA2 and CA2 has signed CA1. When CA1 signed CA2, it added a CRL and OCSP entry into the certificate. When CA2 signed CA1, it added a CRL and OCSP entry into the cer...
I want to make my career in cyber security, but am confused which field to choose. According to this Burning Glass report, https://www.burning-glass.com/wp-content/uploads/2020/10/Fastest_Growing_Cybersecurity_Skills_Report.pdf Cloud security is 2nd most demanded field with least supply. I don't care about Application ...
I'm not talking about showing them a popup upon api key generation, where the user is specifically warned about the fact that This is the only time you will see it. Make sure to save this to a safe place. Instead, I'm talking about platforms, like RapidApi, where the ApiKey is automatically filled-in for each Api in ...
When to use application layer encryption? Is it important in backchannel communication (machine-to-machine) without users? And e.g. when we create state in OpenID Connect's client and redirect the user to an identity provider, shouldn't we encrypt this state parameter? Or when the identity provider redirects the user t...
I know that a ssh id_something.pub key by default contains a comment user@host for where it was created. But is it also contained in the key itself? On one host it seems that ssh -vv somehow got the original comment even when I removed it from the line in authorized_keys on the server and the .pub file on the client an...
If I sign up for Gmail I probably agree to give Google the right to use all my content for whatever purposes they want. We know they have incredible research going on into data mining and machine learning to identify and predict sensitive and personal information about our desires and behaviors that they use for their ...
For the Mint Linux live CD the login is "mint" and the password is blank (there is no password, when asked, simply press Enter). It appears that the live CD is in root or superuser mode by default. For over a decade I have been using TENS Linux for banking. They closed. I am looking for a trustworthy replacement. I gue...
I have the following injection: DELETE FROM table WHERE id IN('[injection]'); And I can use these characters: !#$%&'*+/=?^_`{|}~.- . So I can exit the single-quoted string via ', but I can't exit the IN clause because I don't have ). My idea was to exploit this as blind SQLi while staying inside the existing IN clause...
I need a sample malicious file that I can work with but does not harm my system. When I checked through the internet I found there is a file called EICAR test file. I am using Ubuntu 16.04 LTS. Can I safely use this? These are the references I checked https://en.wikipedia.org/wiki/EICAR_test_file https://www.eicar.org/...
I try to attest my vm running on a kvm+qemu host using qmp and this command: echo '{ "execute": "qmp_capabilities" }\n{"execute":"query-sev-attestation-report","arguments":{"mnonce":"ZBaOEOsVmenc5q34VJb9jw=="}}' | socat - tcp:192.168.123.1:4444 | tail -1 | jq This results in { "error": { "class": "GenericError", ...
Today I was visiting a website, using HTTPS obviously, that firefox gave me a certificate error and said that the certificate did not match the website's information. After a bit of investigation, it seems to me that my DNS provider is probably causing that. I suspect that my DNS requests are first resolved to an inter...