instruction stringlengths 24 29.9k |
|---|
Question
In Saml Federation, can one Idp serve as a front-end proxy for authentication against multiple "back end" IdP's
Context
our multi-tenant application suports SAML for Authentation and user provisioning
...and allows "one IDP" per Company (i.e. customer's organization)
A new customer has a "main AD instance" a... |
I was recently notified by Guardio that some of my info was leaked to 'Combolist' and when I clicked on the link I was brought to this.. https://cracked.io/Forum-Combolists--297?page=2.
I'm completely horrified at what I saw and didn't completely understand. I'm wondering how dangerous this is exactly. From what I gat... |
So, in LibreSSL, say, I have a call like
openssl req -newkey gost2001 -pkeyopt dgst:streebog256 -pkeyopt paramset:A -streebog256 \
-nodes -subj "/C=Some/ST=Some/O=FooBar LLC/CN=John Doe/emailaddress=doe@foo.bar" \
-keyout /tmp/key.pem -out /tmp/csr.pem -utf8
and it pretty much does the job. But in OpenSSL 3.0 I have g... |
I recently came across a php file on a compromised website that had what appeared (in Sublime Text) to be a huge white-space gap. When I run a diff against the original source file I can clearly see the malicious code which is snagging logins and passwords and emailing them to someone.
The malicious code can also be c... |
First I will admit this machine isn't particularly well secured. It has an ssh port open to the internet, it accepts password login, it's OS and packages are not particularly up to date. I know many steps I can take to secure it and I will do so. However I am curious how I can learn more about this suspected infiltrati... |
For the consumer of the API to send and receive, encrypt and decrypt into that same API, wouldn't the client consumer also have to have the same public and private key as the server that provides the API?
Let's say the private key for the API is on server 1 at our company site 1.
And the same private key for the client... |
I read a lot of reports where 'hackers' potentially exploited a 'Hidden HTTP Parameter'. There are also tons of tools which are developed for this exact purpose.
Example : https://blog.yeswehack.com/yeswerhackers/parameter-discovery-quick-guide-to-start/
But what do they mean by hidden?
I could think of 2 scenarios:
... |
I was trying to use the gobuster tool but I came across this error that I can't find an answer no matter how much I search. How am I supposed to be able to use these two flags with gobuster?
──(kali㉿kali)-[~]
└─$ gobuster -s 200 -u http://192.168.56.8/amagicbridgeappearsatthechasm/ -w usr/share/wordlists
Error: unknown... |
I will be attempting my first real pentest as a junior pentester in a company (not a CTF). It will be on a web app.
For a first pentest do you think it is sufficient to just follow the OWASP Guide and just check the following list: This list? Is it the best methodology?
Plus I heard about a mistake that junior penteste... |
I'm looking for the relevant CWE's for specific attacks against prompt-based language ML models, such as GPT-3, GPT-4 etc.
Specifically:
Prompt Injection: Amending prompts with malicious input to change the output of the model in ways not intended by the model owner/operator.
Prompt Lookbehind: Variation of Prompt Inj... |
My computer (Win10) was running slow and hot, and I noticed that a process called vmmem was using 85-99% of my CPU. I became concerned when I tried to shut down the process from Task Manager, and it said I didn't have permission (I was in an Administrator profile). I ran wsl --shutdown in the command line, and shut dow... |
Lately I've been experiencing some crashes related to my internet connection, I'm on the process of pin-pointing what is causing the issue and one of those possible causes might be a DDoS attack, mostly because of the symptoms resemble what a DDoS attack does.
However, something that I don't quite understand is in how ... |
Let's assume we have this simple program:
void main() {
int x;
printf("%p", &x);
}
Assuming the stack is mapped something like this:
0x007ffffffdd000 0x007ffffffff000 0x00000000000000 rw- [stack]
I might get an output like this:
0x7fffffffd84c
If I calculate the difference to the base (0x7fffffffd84c - 0x007... |
First off, please don't turn this question into a LibreSSL vs OpenSSL holy war! I'm just trying to understand the functional differences between them, nothing more.
I originally asked this question on SuperUser but I think it's more relevant here.
I've encrypted a file on an Amazon Linux 2 VM using the default installe... |
I visited a website that requires me to create a password. One of the password rules was "7 to 15 letters". Is this a security risk, since many people would now enter a weak password instead? And is there any good reason to restrict a password to 15 letters (and not say 50, which would likely go unnoticed)?
|
I read about a concept that went something like "access equals authorization," the idea being that there is something secured, and if someone manages to get into it, then they have proven themselves to be allowed to see it. Essentially, the set of those authorized is equal to the set of those who have gained access.
Ex... |
In a Python Metasploit module that I'm developing, I am trying to use CMD as one of the options:
'options': {
'RHOST': {'type': 'address', 'description': 'Target address', 'required': True, 'default': None},
'RPORT': {'type': 'port', 'description': 'Target port', 'required': True, 'default': 80},
'CMD': {'t... |
I created an apk for Android with Metasploit. Started with host ip and port and opened the "receiver terminal"
A lot of things worked well when executing the apk but after some time the session died. Now I don't know how to create a new one.
Repeated the steps in the terminal but it does not work. Didn't change a thing... |
OP wants to back up his Blu-ray/4K collection to a HDD.
OP suspects that a very popular program that makes MKVs is actually a trojan horse that infects host computer's USB drives, which can later be used for anything else.
OP is considering purchasing a cheap, used laptop to run this program on and rip his collection,... |
In the old days, when signatures were used to sign cheques, there were people specialized in how to determine whether a signature came from a particular person or from a different person (forger).
Nowadays, signatures are often made out with an inkless pen (stylus) on a digital tablet.
I would like to know what techniq... |
I want to ask that does my ISP will be able to see that I am using username/password of someone else on my dialup PPPoE.
|
I need to rate the risk of not having secure boot for a specific embedded device.
It is clear to me that secure boot is an essential part of the root of trust of a system.
In the scenario however, I have difficulties describing the specific vulnerabilitiy the device is subject to (And I am pretty sure I am missing an i... |
It is possible to view the entire HTTPS session from start to end? Any command line I can run?
I am interested in understanding more about the exchange of the public key(s) in order to establish a secure connection between (for example) a client and a webserver (website).
I will be happy just to see the entire HTTPS (h... |
Is this how X509 certificates are verified to be valid?
The receiver receives the certificate
Look at the issuer of the cert, and find the public key of that CA (its hardcoded in the application or the OS)
Decrypt the signature using the public key
Compute the hash over the cert (not including the signature?)
If the h... |
Speaking hypothetically, if a person wished to secure their data drives and a "writeblocker" device was of concern, could a piece of encryption software be crafted to write to the drive in question with a failure state locking the drive? Something like reading the device ID of the host PC and using it as part of the en... |
Today I typed in a URL of a site I know. Unfortunately I missed one letter of the TLD. I typed .co instead of .com.
No problem, I'll quickly retype the URL. Unfortunately, this was not possible. The URL bar kept being reset because the page forwarded me over and over again. Ultimately I just closed the tab, because it ... |
Way back in 2016, our government's Commission on Election database was hacked. I am one of those 55 million people whose personal data was leaked and exposed including our fingerprints.
We are now at the age where smartphone apps are moving into using your biometrics/fingerprint so you can authenticate yourself faster ... |
I am trying to execute a simple shellcode by using a buffer overflow. The shell code starts executing but stops in the middle (even though it is fully copied to memory).
This is the vulnerable C code:
#include <stdio.h>
#include <string.h>
void foo(char *c) {
char buf[80];
strcpy(buf, c);
}
int main(int argc... |
I would like to open/decrypt an encrypted gpg/pgp file in the main memory without leaving any footprints on the file system including swap,etc.
what is the safest option on a gnu/linux debian from this selection:
tmp
tmpfs
ramdisk
ramfs
is there a better way?
|
I would like to know is there a need to implement data integrity measure given the scenario?
Clients send data/files (may or may not contain public keys) to the server via server side CA cert. The data/files may be static or continuous changing.
The data that rarely change in my case will be something like emails or si... |
I want to monitor systemcalls with bpftrace (https://github.com/iovisor/bpftrace/). For most systemcalls, this works without problems, but I have problems to monitor applications, where the suid bit is set.
Folowing syscalls are monitored (https://github.com/iovisor/bpftrace/blob/master/tools/setuids.bt):
setuid
setfs... |
Started to get to grips with the OWASP ZAP tool, and can't solve the problem related to the ZAP HUD.
Why does the ZAP HUD frames (on the left- and right-hand sides of page) on some sites (like Github) contain full set of tools, but on other sites (like google) it doesn't?
As example, at Google, nothing happens when I... |
Received the attached Network Connectivity Diagram with Network Security Components Integrated in the Network
Can some body explain how the Network Security is Applied for Threat and Intrusion Prevention for the attached Architecture Diagram
|
We're developing a new login screen for our system, we have a couple of million users and we're thinking about what to disclose to the user.
We currently:
Let the user know that the email or password was wrong, basically by saying: "Username or password did not match"
If they tried to login on an email that exists wit... |
I am not an infosec professional, but I'm working on a project that requires designing and implementing a permission system for a customer. The system the customer proposes is as follows:
Users are assigned to roles such as viewer, editor, contributor, and admin to determine their capabilities.
Users are organized in ... |
in our organization we have our own OpenId server (Identity Server) that we use to authenticate people into our applications, let me explain how we currently handle our web clients.
so we have an API that handles the authentication of users, the user calls an endpoint then they are redirected to the user's login page (... |
I am connecting to a wi-fi network and blocked all IP addresses in this network with a regular Windows 10 firewall. The only available IP addresses are:
192.168.1.1 = gateway
192.168.1.102 = my own IP address
Some people from the wi-fi security team told me we are working on hacking people with Windows Update here.
S... |
I know RSA is asymmetric (public / private) key.
But, is possible to generate only a
private key with rsa and using it as symmetric?
For example with openssl?
|
If I generate a large true random number and I seed a CSPRNG with it, then can the output of this CSPRNG be used anywhere where there is a need for a true random number?
For example, if Alice and Bob both know the seed, then could the output of a CSPRNG seeded with this seed be used to securely generate any number of o... |
After watching a video course about SS7 attacks and remote control flaws through WiFi adapters of smartphones, a question comes to my mind:
If an adversary can intercept your SS7 traffic and relate it to his own internet, he can obviously automatically inject malicious code into the flow of traffic, isn't that right?
T... |
I've heard that hardware keys like Yubikey are phishing resistant. But I do not understand where a phished man-in-the-middle attack, which tries to "forward" the whole communication, fails in that scenario.
I'm imagining the attacker opens a live connection to the target site and forwards every little bit of informatio... |
The spf record for my domain is:
v=spf1 a:smtp.(my-isp).com ip4:(my-static-IP) -all
I have recently added smtp.(my-isp).com to the spf record.
I have sent some test emails to gmail where the outgoing SMTP server was smtp.(my-isp).com but they were rejected by gmail. I receive dmarc emails from gmail:
<source_ip>rdns ... |
My company recently switched to an MDM solution to manage our Apple computers fleet. This is all good and well to maintain up-to-date software, and make handle lost/stolen laptop issues.
But I can help but wonder about how to mitigate a possible issue with the MDM solution (either with one of the admin accounts or the ... |
I read that Password Managers are a more secure option than remembering passwords. I am currently evaluating Passwords Managers with cloud synchronization and there is something that really confused me.
For cloud synchronization platforms, usually not free, you first need to create an account with a platform account pa... |
I am taking a security class and part of an assignment this week is to crack a given MD5 hash.
All the professor has given us for this task is the hash, the knowledge that the password is 6 or 7 keystrokes, and that it might contain the null terminator at the end. He suggests using any hash cracking program, of which I... |
I found some applications bundle an SSL certificate and associated private key signed by a public CA for a domain name pointing to 127.0.0.1, probably to bypass the certificate/mixed content warning on their local server. Example
I also found services like https://get.localhost.direct/ that provide a certificate for *.... |
I need to perform a public/private key generation on USB devices and store private key parts on at least 3 USB tokens.
Java javax.smartcardio allows to perform such an operation on Smart-cards that I plug into smart-card reader (key generation + splitting parts onto smart-cards, that are afterwards used to perform decr... |
When using MS Authenticator on a Microsoft account, the user fills in the email address or username. After that, the user presses one of the three numbers in the MS authenticator app and is logged in. All good.
My question is what are the workings behind it?
I can find a lot of information about hashes, 2FA, TOTP authe... |
From some posts I read here:
Regarding keygen protected software:
As long as the user has full control of the hardware where the software is running on (i.e. typical PC) it is impossible to fully protect the software.
Regarding password protected zip files:
No, as far as I'm aware, there are no current viable attack... |
How do environments like Active Directory determine if you reuse parts of previous passwords in a new password? I understand that it keeps a list of your last passwords, hashed. But how do they determine if I reuse parts of a last password only?
I thought that the passwords were never decrypted, and could not be viewed... |
I'm using Envoy as the gateway of my micro-service backend.
Envoy provides me the JWT mechanism, which means that with the help of a public key, Envoy can validate tokens generated with a private key.
It works as expected. However, my colleague just told me that this might has a bad performance because it's a heavy cal... |
I want to log IP addresses visiting my site, for aggregated statistics only and to see if the same IP address has visited twice. But I don't want to expose them.
My Idea is in my database.
$IP_Verifier = hash($IP + $CONST_Server_salt + $CONST_Client_salt)
Where:
$CONST_Server_salt is a hardcoded value in my applicati... |
I am experimenting with the volatility2 tool.
I have created a memorydump of a windows 7 machine where i had a batch script file on the desktop of the machine.
I used the mftparser command as :
volatility -f memdump.mem --profile=Win7SP1x64 mftparser | grep -i "desktop"
which resulted in :
-snip-
2023-02-22 01:38:18 ... |
I am performing security testing on a REST API and it is a POST method. I injected an XSS script in a body parameter and the API responded with '200 success' response with the actual expected data.
If the response is '200 OK' and response body displays with the actual response as result, then I would have concluded thi... |
I am initiating and doing a basic penetration testing course and have come across one doubt.
For example in this URL:
http://webapp.thm/index.php=?page=1
I get that I am requesting the index.php file in the server and I am specifying that I want to view page 1 as a value of the parameter.
But in this other URL: http://... |
I’ve seen this question being asked so many times, but I still have questions.
I know that to execute malicious code from non-executable files such as videos (mp4), audios (mp3) and documents (pdf), it requires an exploit in one of the software running the file.
My questions are:
What are the chances that a known soft... |
I'm making an SPA with Laravel REST API and trying to keep it stateless.
Right now I'm trying to achieve proper JWT authentication and 'remember me' functionality.
On successful login the client receives a bearer-token in the
payload (stored in redux state) which will be used for further
requests as authorization.
On... |
I'm developing an ASP.NET Core 7 MVC Web App. I'm using ASP.NET Core Identity library to manage user and role data. I am considering using SQLite for keeping Identity information, separate from my actual database which is a PostgreSQL database. I want to know how possible it is for this SQLite database to be leaked/att... |
Currently, I have modem with built-in NAT and DMZ. I have 250Mb of webspace and unlimited emails supplied by my ISP on WAN. I want to move the webspace to my own PC on a LAN along with the emails so I can change ISP to a faster fibre. BUT Security is the issue!
I want to know where to add a PC to supply webspace to be ... |
I am trying to learn how ssl chain of trust works with practical examples. I thought maybe openssl would be a good education tool. But I'm running into a few problems while practicing, and I'm at a lost on how to approach my education.
Below is an experiment where I'm trying to set up certificates for a Root CA, Inte... |
I don't know if what I'm asking is even possible, but I'll ask anyway.
I'm trying to get FireFox or Chrome to trust a self-signed certificate used on a website I'm running locally. I started up an ubuntu server and ran these commands:
# go to /etc/certs directory
mkdir /etc/certs
# make certificate for root CA
openssl... |
I manage a website for a club. I monitor the cPanel error logs to identify potential hackers that attempt to hack the website I maintain. Recently I have seen my IP address appear in the error logs and I know it is not due to my actions. I do not think that my router has been hacked so I believe my IP address may have ... |
Recently I saw hundreds of strange requests from different ip addresses in my server logs.
These requests were trying to bruteforce directories for example:
GET /admin/admin.php 404
GET /admin/controlpanel.html 404
GET /admin/controlpanel.php 404
GET /admin/controlpanel.asp 404
Also some requests contained some JavaSc... |
Forgive my Naivety on the topic, I was only recently (this month) pushed into the application & data security rabbit hole and am still learning.
I have a smart card issued by my organization, it allows me, as a representative of the org to sign emails, documents, authenticate myself, and encrypt/decrypt data. Said card... |
How can I create a fake desktop environment and file system, that automatically starts as default when booting up, and may be exited out of by doing a specific action? (Like a keystroke) to prevent physical access?
|
My friend who is a web developer implemented his session management in a totally new way for me.
He created a random sessionAPPID that is given to the user when he gives correct credentials.
He then created a HTTP header that has this form:
APPID: sessionAPPID 79299291724
He stores the sessionAPPID in the backend and ... |
I got caught up in a phishing scam where I conducted an automated interview with emails that appeared legitimate from real people within my college.
I did respond to multiple emails and the only personal information I provided was my email (which they had), my name (which they had), my physical address and my cell phon... |
The application allows user to enter a 30 character long username.
I tried the following XSS payload and it worked, but the triager is asking if I can alert cookie. But script tags and src keyword is blocked.
"><iframe/onload=alert()>
Any way to load javascript from a short URL, such as http://⑮.₨?
|
I assume most of the security issues with old software are
that scripts or .exe will run against the bugs in the software.
and that the firmware on the device OS bugs aren't patched.
Or some parts of the machine are accessible to the internet so can be remotely hacked?
Or when opening downloaded files from trusted or ... |
Our solution contains jquery and javascript files.
We want to integrate a scanning tool for these files.
We are already using one tool for static code analysis and it is unable to identify the embedded jquery code.
Please suggest what tool I should go for or what tool you use for such task.
|
As I understand, in a typical LAMP (or be it LEPP) setup, all PHP code is executed using the same user and group ("www" or similar). In a multi-user scenario (e.g. some variant of allowing Linux user accounts to propagate a public_html directory with PHP code), wouldn't this pose a significant risk of users compromisin... |
Imagine the following imaginary scenarios:
In order to browse the Internet, users must go through a central web proxy. It is authenticated and can enforce rules about who can access which URLs or which file types are okay to download. At the same time, it is configured to use TLS inspection to scan downloads for malwa... |
I have borowed a laptop from the library, and I am concerned there might be a remote access to check what the user is doing.
An antivirus would not detect that, since many remote access is "legitimate" like AnyDesk, TeamViewer etc. Or it could even be custom made, so lacking a signature to be detected.
Is there some so... |
I have a laptop, with Windows 7, no internet (with the wifi adapter physically removed). I want to use that machine for stuff like old abandonware, and don’t want to risk any type of malware or virus spreading (hence why it's offline).
I do need a way to download and load that abandonware and was thinking of using an i... |
Microsoft Edge, as well as other Chromium browsers, have a password sync feature built into their browsers, which look something like the image below.
Before I enable this feature for convenience and being able to sync my passwords across my macOS, iOS, and Windows devices, I want to be sure that it's safe. In particul... |
If you use inspect in the developer tools for Chrome the values for the two input boxes below will look the same.
<input name="test1" type="text" value="<script>alert('a')</script>"/>
<input name="test2" type="text" value="<script>alert('a')</script>"/>
If on the other hand you put the elements on ... |
I am currently working as system integrator for a banking company, that asked me to provide an authentication integration on a third party website on which the company would like to redirect users, but recognizing them as already authenticated.
For many reasons, they don't want the third party to be integrated on the o... |
Using VirtualBox is it possible for VM escape to happen while using Whonix Gateway to connect to TOR and then use another VM with, let's say, Ubuntu (that uses Whonix instead of directly using the host's internet access) as my workstation?
What is the probability of this to happen?
|
I installed the Android Pocket app and logged in. My default browser is Firefox, which is already logged in to my Firefox account. This meant I did not have to enter my Firefox account password. Presumably the Pocket login flow used a Custom Tab...
Wait.
Can any app do this?
If Pocket can harvest a login session out... |
I am experimenting with VBA stomping in microsoft word documents.
I have done it manually but also with the evilClippy tool aswell.
What i have noticed is that, although the original vba code stays hidden at first (the p-code in other words stays intact), as soon as the user clicks on "Enable Macros", if he navigates t... |
Is it possible to use both mTLS and regular TLS (as fallback) ?
I would like it to try to auth user with mTLS and fallback to standard login/password when it fail.
Is this a good idea in term of security ? The goal is to simplify life to regular users (mTLS) but without affecting guests (Login/password)
|
I don't know much about encryption and how internet work in general, so my question might be ill-defined... but I guess I will still try to ask a question here.
When you connect to a website directly through your standard ISP routing, the ISP will know that you connected to that website. The exact content of the connec... |
I'm trying to improve security in my single page application.
Before I had only one JWT that was stored in the browser's localStorage and expired in one day.
I've improved security by adding refresh token.
Right now access token lives for 5 minutes and is stored only in the browser's memory, while refresh token lives f... |
I have a custom Debian router installation which I'm trying to keep both secure and low-maintenance. I've therefore set some scripts which keep my Docker containers, blocklists, and OS (security updates only) actual by checking for updates and downloading the new files from the source (e.g. Github, Debian.org).
But whi... |
OK, I need some help with this:
I am creating a Node express API, and I want to support the following auth strategies:
Cookie or JWT based authentication that supports MFA (OTP, email, and SMS), for clients (web/mobile) that are internal.
OAuth2/OIDC (again with MFA), for third-party clients, combined with API keys fo... |
In 2017, I was running a local website on my own dedicated server in a professional data center. FreeBSD. Installed by me remotely. Maintained carefully by me. No other human users than myself. I was the only one with SSH access or indeed any kind of admin access to the machine.
One day, I got an e-mail from my watchdo... |
If the cybercriminal succeeded in gaining a foothold in the company's network, why are the whole network and other computers infected with ransomware except the one on which he gained a foothold?
|
I'm designing an app that receives sensitive data input from a user and that data needs to be saved securely in a database.
As far as I understand it needs asymmetric encryption but since this app has a login to authenticate. I need this previously saved data to be read again by the user without serious security proble... |
I have a problem with hiding the VPS IP using Cloudflare. My IP can be found on search.censys.io. I don't have any DNS leaks. I'm using nginx to reverse proxy a node.js server. Is it possible to hide the IP somehow to protect against DDoS and other attacks?
|
I've run a website for barely three months now and put my emails on there. I also run a catch-all address on this domain. Since my website is online, I haven't received a single spam email on the addresses provided on the website.
So I'm wondering if email scraping is still a thing. Spammers still need means to somehow... |
Given that I'm the only human who should have access to a Linux server, what are the major security risks associated with updating sudo to not require a password for my local user?
Are there other ways of making sudo less cumbersome without running everything as root?
I've already increased the timeout so I don't hav... |
According to NIST Key Management recommendation "8.1.5.2.2.2 Automated Key Distribution/Key Transport/Key Wrapping", it is required to use a key wrapping key or a public key-transport key to protect symmetric key distribution.
Is it still required if the symmetric key is distributed over https connection?
In addition, ... |
This is from the perspective of someone who had supposedly forgotten their password. We're doing this project wherein we "secure" an application that was given to us. We added this "forget password" feature that allows a user to change their password after providing answers to security questions. It was implemented in ... |
I would like a comprehensive explanation of the security and privacy risks that come with DNS prefetching. There are already other posts about this topic, but I want current information and feedback on my concerns. Thanks in advance.
The Helmet.js documentation says X-DNS-Prefetch-Control is turned off to improve user ... |
UPDATE : i know i modify the post significantly, will try to not do that anymore. Please read from scratch
Let's imagine we have a machine that holds customer private keys to various crypto assets, that is vital to secure and should it be compromised it's going to be fatal for the enterprise.
My goal as software engine... |
I'm creating a self signed certificate for a practice dev system data encipherment keystore and am unable to determine which OID I'm supposed to use.
Google result show the following as options:
1.3.6.1.4.1.311.80.1 but 311.80 doesn't exist anymore.
1.3.6.1.4.1.311.10 is for Crypto 2.0, but I can't determine which chi... |
I am trying to analyze the .vmem file from HoneyNet challenge 3: Banking Troubles (HoneyNet) using volatility3. But I can't seem to get past this error:
PS C:\Users\<user>\Desktop\HoneyNet\volatility3> python vol.py -f C:\Users\<user>\Desktop\HoneyNet\Bob.vmem -vv windows.pslist.PsList
Volatility 3 Framework 2.0.0
INFO... |
I have a domain that properly redirects as expected to protocol https://newhavendisplay.com, except for https://www.newhavendisplay.com, which triggers the "This connection is not private" security warning upon visiting. However, if I choose to click the "Proceed to the website anyway", it successfully and securely red... |
The number of devices in my home network keeps growing: Apart from my gaming PC and our home office notebooks, we have the kids' tablets, all our smart phones, a smart TV stick, some WLAN peripherals, etc. The more devices we get, the more I start to worry about one of them being compromised. An adversary could use som... |
I have created an open-ssh keypair using ssh-keygen with the defaults, and encrypted the private key with a passphrase. I already know how to derive the public-key from the private-key using ssh-keygen -y, for which I will need to enter the passphrase protecting the private-key. But, is it possible to extract the publi... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.