instruction stringlengths 24 29.9k |
|---|
Per the OpenSSL 3.1 documentation for the x509 subcommand, the -sigopt flag allows one to pass signing options. The documentation for that flag currently states:
-sigopt nm:v
Pass options to the signature algorithm during sign operations. This option may be given multiple times. Names and values provided using this o... |
Is there much information about hardening libtorrent usage, or perhaps other bittorrent flavors? I'm curious about denial-of-service attacks in particular.
I could narrow down the bittorrent protocol suite considerably, like probably just uTP. All sending peers have TLS or Noise keys known in advance, so the transpor... |
I have a file that is encrypted on the server with a private key. I need to transfer the file through a users phone to a device that does not have an internet connection. In order for the offline device to decrypt the file I need a way to send the private key securely. Is there a way to do this that does not blatant... |
I have a default KQL below which is used to detect when Cisco ISE failed backup, it fires an alert in Sentinel.
But it is not working as expected - it does fire an alert, but returning a timestamp only.
Nonetheless, I can see it is also supposed to return the hostname and IP of the device that actually triggered the '6... |
I am developing a TCP-Proxy in C#/.NET using dotNetty (Port of Netty). The proxy is translating messages between two different systems. It will be hosted on a server in the company network, so it is not exposed to the internet.
I am wondering what precautions I should take regarding information security. I thought of u... |
I'm wondering about different types of malicious USB charger attacks that work on Android devices when USB debugging option is disabled and if the USB option is set to "charge only".
I'm not talking about Badpower attacks that aim to destroy a device. I am talking about infecting Android phone firmware with viruses. Is... |
I'm currently learning about LFI attacks.
I have coded a simple example and tried to get the content of secrets.txt with an unsafe input ($_GET['extension']).
I have tried the following payloads with no success:
/../../../private/secrets.txt
/../../private/secrets.txt
docx/../../../private/secrets.txt
pdf/../../../pri... |
I really like macapps.link as it helps me to quickly install a bunch of software after a fresh install. However, it doesn't have the transparency such Windows alternatives, like ninite or winget have.
|
I have been studying Differential Privacy (DP) and there’s something I do not understand: why is the variance of the noise in most DP schemes constant across all individuals (assuming a one-to-one relationship between individuals and data points). Some individuals may be close to the statistic that DP allows to compute... |
I'm reading this and it has the below (excerpt).
# Certificate Authority Section
[ ca ]
default_ca = CA_default # The default CA section
# Default CA configuration to sign a Certificate (Public Key)
[ CA_default ]
dir = $ENV::CADIR # Where everything ... |
Can one remotely log my IP, browser history, and saved passwords?
I think the IP should be easily done if one of the extensions load a remote JavaScript to run in my browser. I'm not sure about other stuff within the browser.
|
I am doing an NMAP port scan to a remote IP present in a different subnet. NMAP initiates an ARP request first to the remote IP instead of the default gateway(even if the ARP entry is present in the ARP cache).
I want to understand the following things:
Why is NMAP sending an ARP request even though we have an ARP ent... |
I'm new and I'm trying to understand default_crl_days. The default is 30 days thus does it mean after 30 days, the CRL list can no longer be trusted? If so, do we need to generate a new list before 30 days is up?
And what would be the recommended default_crl_days for CRL?
|
Is it possible to send a TCP payload to an open port that executes a specific arbitrary command on the target device using Metasploit or any other program? For example with Windows 10 Server OS?
I searched for any answers to my question, but i didn't find any (they where all reverse TCP handlers and yes they do work, b... |
I was trying to simulate a DoS attack on the CORE network emulator using hping3 (Ubuntu). The topology is like three PCs connected by a router. The client's IP is 10.0.0.20/24, The server's IP is 10.0.1.20/24 and the attacker's IP is 10.0.2.20/24.
I ran a script to turn on services for the server and a looped curl comm... |
I was wondering why people can't just use fingerprints to retrieve all necessary documents where required.
What would be the problem with such form of authentication, which could be used via fingerprint readers with screens, at all point where ID was required?
|
Can I extract a dictionary list from the keepass password generator as my senior forgot his master password?
|
I'm building a sharing protocol where users share data. To make it so only those authorised to read the data can do it, I'm using AES256 encryption. Every authorized person has a keyset (IV & key) to decrypt the information. The same keyset (key & IV) is only used for one data.
The thing is, the data can change, like a... |
Try following this link to a folder in my OneDrive — it's set to "Anyone with the link can view".
Times when Microsoft Word's grammar checker has been abysmally wrong
You'll notice that you can see the absolute path of this folder: Mr. L. Sawczak > Teaching > _Templates > ENG2D > Materials > Grammar > pics > word
Thi... |
Posted this first on stackoverflow but was suggested to repost it here.
I am planning on using envelope encryption for data stored in a database in a multi-tenant solution. Envelope encryption suggest creating a separate DEK (Data Encryption Key) for each piece of data and then encrypt the data with the DEK and store e... |
I have a web application that retrieves HTML snippets from the server and places them on the page, using JavaScript. The server responds with a small part of a HTML document. What Content-Type header should I use? Marking it as text/html may lead to attacks where the snippet is accessed directly by the browser, without... |
I'm training on a test network. I managed to snatch some ssh credentials and spawn a shell with msfconsole. Turns out a connection via ssh to 192.168.0.3:2222 forwards me to 192.168.0.4:22. So I have the shell on 192.168.0.4.
Now I want to upgrade the ssh session to a meterpreter. I saw that meterpreter is able to bind... |
I'm doing an educational project and I need an executable to try different DLL hijacking techniques in Windows 10.
Obviously, there are no such vulnerabilities in Windows 10 by default, so I thought about creating an executable in C and compiling it just to try this kind of attack, but I am not sure how to do it cause ... |
I read a lot of articles about self signed certificates and I'm not exactly sure if I'm getting near to what I want to actually achieve.
I'm trying to implement a self signed certificate so that the end users will not be seeing the "not secured warning" when they try to access the site (we are accessing the site throug... |
Intro
Trying to send encrypted backup of in productions filesystems, I was interested by the ability of using gocryptfs in reverse mode!
The idea is to
use gocryptfs --reverse from any existing (unencrypted) folder, for mounting an encrypted version of my folder.
then backup the encrypted folder using rsync, tar or an... |
I am trying to check the port status of a external IP using NMAP, I am getting different result on different interface to same destination (destination is a public IP).
When NMAP tried from the internal interface 10.204.59.166
localhost2:/$ /usr/bin/nmap --privileged -sS -p 443 -S 10.204.59.166 --max-retries 1 --max-r... |
I came across a PGP public key that seems invalid. The key is a secp256k1 public key that supported by GPG. In fact, GPG allows importing that key even if it has an invalid secp256k1 public key inside.
Running --list-packets on the key shows that the pkey starts with a 46 prefix. All other secp256k1 public keys I gener... |
I am building a token-based authentication API, and I have three main methods:
Register Method: It takes credentials (email, password, phone number) and creates the user, then sends an OTP message to the phone number provided in the credentials input. At this stage, I haven't implemented any login, session or token cr... |
I have an app with token-based authentication (stateless).
for specific endpoint that serves an pdf file, it was ideal for me to authenticate via cookie.
so I creates a cookie with my access token, with 1 second lifetime , just for the use of this endpoint:
// Set one-time cookie only for this action
Cookie.set("token... |
I am trying to develop a scheme for publishing a message to a group of recipients. Any recipient needs to be able to verify who the message was sent by.
There may be tens of messages generated each second, and the senders may be low power, embedded devices.
My understanding is there are two ways to achieve this:
Use a... |
I'd like to define a TPM access policy that allowlists multiple different values for certain PCRs. Hence, i'd like a policy like this:
(PolicyOR(PolicyPCR(value1,pcr4),PolicyPCR(value2,pcr4),PolicyPCR(value3,pcr4)) AND PolicyOR(PolicyPCR(value4,pcr7),PolicyPCR(value5,pcr7)) AND
PolicyOR(PolicyPCR(value6,pcr9),PolicyPCR... |
According to the JellyFin documentation
Podman doesn't require root access to run containers, although there are some details to be mindful of; see the relevant documentation. For security, the Jellyfin container should be run using rootless Podman. Furthermore, it is safer to run as a non-root user within the contain... |
What are the risks to allow a "blob:" directive to the script-src CSP? Is it safe?
I have a list of allowed domains defined in script-src, but nonetheless I got an error specifying the violation of the CSP directive when trying to access a resource blob:myURL/my-id.
There is an example that showcase good practice and b... |
I've been struggling to find very simple, low level explanations of federated authentication protocols. Previously I've seen SAML and oauth, but they both seem to be very high level and far more complex than just authenticating a simple server. I've come up with a rough idea of how it could work but I don't know if I'v... |
I'm on a mac using kali linux.
Why aren't any specific devices showing up despite two devices currently using the wifi?
|
Is a passkey (plus auth code grant) a reasonable/ appropriate replacement for JWT grant flow?
I'm currently using JWT for an autonomous app (user not present).
Does passkey require web browser interaction? If so, then the answer to my question is "no" since the autonomous app does not have a web browser interface.
|
I have reason to believe that there may be ongoing audio/wireless/Bluetooth hijacking occurring in my network environment.
The issue appears to involve unauthorized access to Bluetooth and wireless devices, potentially leading to audio interception.
I've been monitoring network traffic and have observed patterns of unu... |
How can I keep data preserved between ECALLs? (not nested ECALLs) I found two ways: a global array 2)seal data, transfer them outside the enclave and transfer them back inside with the next ECALL, unseal and to recover the current state. Are there more ways? I saw that some implementations use a global pointer and init... |
I have recently observed that the home page of Google Chrome on my Xiaomi Android phone has been altered to a website called "Mintnav". I did not update any software. How is Xiaomi able to change my home page and what else can they potentially do without my approval?
|
From this question, it is said that when creating a CSR, we attach the public key and fill in other data.
When creating a CSR, you attach your public key to it and fill in other needed data; you then send it to a Certificate Authority (CA). The CA takes the data from your form, and if you pass all their validation tes... |
I have been trying to generate a payload using msfvenom:
msfvenom -p php/meterpreter_reverse_tcp LHOST=10.0.2.15 LPORT=1234 -f raw > shell.php
I keep getting this error:
"error: unloadable payload: php/meterpreter_reverse_tcp"
|
I am trying to do a proof of concept where I use technique T1574.010. In this technique, I should rewrite the binpath of some service in Windows 10 so that when the service starts again the payload that I want is executed, which in this case is calc.exe.
My first question is which service should I use in Windows 10? I ... |
I understand session hijacking has been a widespread attack vector in the past months.
If an attacker steals a user’s session cookies, they can bypass 2FA and login/password.
If this is the case, how can the victim identify they’ve been session hijacked?
I suspect I’ve been a victim of such an attack, but I do not see ... |
One of the touted features of passkeys is that they depend on a biometric in order to use them. However, on an iPhone, if the finger-print scanner isn’t successful, it offers you the option of using your passcode. Couldn't one then brute force the passcode?
|
I was testing an internal application recently, that had fully permissive CORS, i.e. it echoes the Origin header into Access-Control-Allow-Origin, has Access-Control-Allow-Credentials: true and handles OPTIONS properly. All the pieces were in place - but I couldn't get a POC to work. Both Chrome and Firefox were simply... |
I'm setting up a Jenkins server, and ran across a reported vulnerability, SECURITY-3033, also identified as CVE-2023-37954:
Rebuilder Plugin 320.v5a_0933a_e7d61 and earlier does not require POST
requests for an HTTP endpoint, resulting in a cross-site request forgery
(CSRF) vulnerability.
But from what I know of netw... |
I was surfing Google and by chance the corporate GitLab domain came up in the search results. I tried to access it, but it gave me a DNS error. That is, this gitlab is deployed on the company’s internal network and employees access it either via a corporate VPN or on the internal network. My question is how could a sea... |
I'm trying to check whether or not an injectable parameter I found is actually exploitable in a bug bounty contest my college is holding. The code base is open source so I have access to the exact SQL queries being used.
The issue is this - the injectable parameter is used in 2 select queries before it is used in the v... |
I recently found out that, due to a mix-up at Australia's National Broadband Network, the connection to our Internet Service Provider had been swapped with a neighbour's. It doesn't look like the neighbours used our ISP, but we unknowingly used their ISP for a couple of months until the situation was discovered and rec... |
I've been using Ninjafirewall on WordPress websites for a while.
I recently installed a new caching plugin on my main website and I noticed the firewall log which usually has around 5000 blocked threats per month has less than 10 so far this month when I would expect to be over 1000 so far.
Everything appears to be run... |
Say I have a remote machine (something like a VPS) that I have no physical access or physical authority over other than a user on it (with root access). However, I'd like to do Time Machine backups on it.
Time Machine is a mac tool for incremental backups.
Now I understand that Samba isn't secure, but hear me out. The ... |
We have recently engaged an external party to undertake a pen test on a recently implemented API. The API is considered internal although it itself is on AWS and is consumed from on-prem resources, the connectivity between the 2 is using multiple security devices to effectively create a single network.
The API is secur... |
I am an independent technology consultant, and I am running into a worrying and recurring issue with my customers regarding sharing account information. Many solution we use I am able to be added as an account to work on their systems, but some are limited either by billing or by an inability to allow outside email dom... |
Is it possible to use a tool like netcat to create a listener on the attacker's device with a specific command that when the target device or machine connects to this IP and port, it runs a bash shell or command (/bin/bash) on the target device?
|
A few days ago, I contacted LinkedIn support for an unrelated issue.
They didn't provide any help with the issue at hand and instead responded with this :
Do we have your permission to log in to your account and where necessary, take action on your behalf to address the specific issue you are reporting? If yes, we won... |
We have a service running as a container for which there some reported vulnerabilities in OpenSSL. Our service is behind the Application Load Balancer, which ideally should terminate the traffic at the load balancer before decrypting the traffic and sending the request to the appropriate target group. But we are unsure... |
I am trying to make sense about the caution wirtten by Microsoft's engineers about EAP's Authentication method configuration settings.
Caution
If a Network Access Server is configured to allow the same type of authentication method for a tunneled EAP method (e.g. PEAP) and a non-tunneled EAP method (e.g. EAP-MSCHAP v2... |
I have this configuration:
________
| |
Internet -----> | Server | ----> All intranet server
port(443) | |
port(80) --------
So I can put a php code and run command line. Then, I can access any intranet website with a curl command. But a website... |
ATT&CK defines process injection sub-technique 012 Process Hollowing different from sub-technique 008 Ptrace system calls.
With this in mind, if I write some fancy shellcode into the .text segment in a suspended process, which, unless I'm wrong, is considered process hollowing on Windows, on Linux using ptrace, is it w... |
I have developed a web service for customer. The web service is written in Python and running in Docker containers. It is managed by docker compose.
The customer wants my web service to run on their own Ubuntu servers, but I have control over those servers. I can reinstall them, manage them, and only I know the login c... |
I'm using my university's PAC proxy file to reach academic websites and research papers. The pac file provided contains a list of sites, in which if i go over to these sites it asks me for my username and passwords, but not for other websites. My question is, if i say, go to stackexchange.com, will my university see wh... |
I'm learning the basics of network security and am trying to really understand the single origin policy. I was wondering what the vulnerabilities would be if an origin was only defined by domain, as opposed to the normal trio of scheme, domain, host. I know it would be more insecure, but how exactly?
My thinking was, f... |
I'm new to cybersecurity and learning about pen testing Android security. I need tools for this. I found a website with a list of 75 tools (https://gbhackers.com/android-security-penetration-testing/). But I'm not sure if they're all meant for this kind of testing.
This got me thinking about what Android security testi... |
cybersecurity professionals! I'm a researcher at a large danish university, and I've been fortunate to secure funding for a project aimed at enhancing the visualization of threat investigations in cybersecurity - e.g. visualization tools that can utilized with the purpose of closing or escalating incidents. The thing i... |
The ssh-keygen program has -h flag for creating a host key. What is the actual difference between keys created with and without -h? Is there any reason I could/should not use a host key as a user key or vice versa?
|
According to this newly published article:
Now, it appears that the LastPass hack has led cybercriminals to steal over $35 million in cryptocurrencies.
...
Nick Bax, director of analytics at Unciphered, has been reviewing a huge quantity crypto theft data unearthed by Metamask's Taylor Monahan and other researchers. I... |
I understand that the idea of a session was conceived originally to improve user experience with Web applications. I also understand that session implementation can introduce attack vectors if not done securely i.e., if session ID can be spoofed because it replaces authentication.
Does having no session ID introduce an... |
I'm implementing a refresh-token rotation mechanism. For the sake of simplicity in implementing the frontend I would like to remove the need for requesting a new access token when an old one expires.
The idea I have goes:
User logs in via Email and password.
The server generates a pair of tokens and sets them in the h... |
I'm currently researching network security measures for my company, and I'm trying to understand the advantages of using a VPN (Virtual Private Network) compared to a combination of HTTPS (Hypertext Transfer Protocol Secure), DoH (DNS over HTTPS), and ECH (Encrypted Client Hello) for protecting our corporate network. I... |
I have a problem. I'm using Wireshark 4.0.8. I created my ssl file to store my "(pre)-master-secrets". I can thus decrypt TLS from my browser or from different python libraries without problem. But I cannot decrypt the TLS when my requests are made with the TLS-CLIENT python library (https://github.com/FlorianREGAZ/Pyt... |
Is there any professional consensus on what the optimal password minimum length requirement should be?
The University of Michigan recently implemented a 15 character minimum for all users.
To me (complete layperson), this seems foolish because this is difficult to remember and so now even more will record their passwor... |
I have worked as a system administrator mainly on Widnows Server for some years now.
Over the course of time I've always had a hard time trying to fully understand how Kerberos work.
For about 3 weeks as of now I have been informing and studying ethical hacking, this involves Kerberoasting of course.
Now, one of the th... |
Without knowing more details, I can't suggest to our security guy that we should use RDP along with a Remote Desktop Gateway.
One person says to that VMware Remote Console is more secure than using RDP with an X.509 certificate but another says the opposite.
Which is more secure?
|
Is using multiple interchangeable IDs a PCI DSS complaint? Facebook and Twitter uses the same method for sign in.
multiple interchangeable IDs such as sign in with email or mobile or username.
|
In TLS separate implicit sequence numbers for sent and received packets are used to calculate the HMAC in the record layer. The RFC 5246 says:
Each connection state contains a sequence number, which is maintained
separately for read and write states.
Why do I need separate sequence numbers? Why can't two parties shar... |
I'm developing an IoT product's software, where it runs HTTPS client.
Given that the certificate of servers are renewed every year, it's not that issue while we're authenticating against the Intermediate Certificate (as Let's Encrypt).
Given those certificates have also a lifetime, so a solution might be to select a CA... |
Is it possible that for example there is a TCP packet, and using a proxy, you intercept it and using a tool you change the protocol entirely? Like for example from TCP to UDP or any other custom protocol?
|
I've been reading countless articles about login flows and what's the best for user auth, but it's all even more confusing now.
My scenario:
I have a simple app (capacitor spa) that has a simple username/password login. I essentially have my own backend where the user details are stored (express, postgres and passwords... |
I have two private keys with the same UIDs in GnuPG, and would like to use the newer one in preference to the older.
When no key is specified, the default-key option takes care of this, but several of the Debian tools explicitly specify my email address as the UID to use, which makes gpg select the older key. I can wor... |
Is it technically feasible for China to stop all VPN use within its borders?
A slightly narrower goal might be to stop all new users of VPNs within its borders while doing nothing about temporary visitors that are travelling and carrying their own computers and phones. Is the narrower goal technically feasible?
|
While pentesting a website I came across yarn.lock file that contains an application dependency and I found this vulnerable library y18n v4.0.0 to CVE-2020-7774.
How can I reproduce the vulnerability or how to use the PoC below?
const y18n = require('y18n')();
y18n.setLocale('__proto__');
y18n.updateLocale({polluted:... |
I am doing some research into scam websites (particularly the ones where you receive a text message telling you you have an undelivered package, or unpaid tolls etc and they provide you with a link to click).
I am using Burp Suite to look at one particular site the victim is sent to. The page itself does not have any c... |
I have a PDF file that has been sent to me as part of a suspicious email. I viewed the email as message source from within outlook. This gave me all raw text within the email. I copied this to Visual Studio Code. I know the email is suspicious because of the sender ID etc.
There is a PDF file attached to the email... |
I wonder if the NSA can force Yubico (or their secure element chip supplier), a US company located in Palo Alto, California, to hand over the private keys stored in the secure element of the yubikey by means of a national security letter?
Or is that impossible due to the hardware design of the secure element?
|
Have some confusion regarding safe sinks in javascript.
The DOMpurify library linked in the OWASP article does not explicitly mention the .files and .valueAsDate of an HTMLInputElement as safe sinks, but the more common .value is a safe sink. I was wondering if these are safe sinks and how to tell if some property/func... |
Session IDs aren't exactly secure, you can copy them from one device to another just by copying the browser's temp files. Techniques to tell apart one device from another have existed in browsers for a while, for example this here.
Sure you could change your mac address, make the browser spit out different information ... |
Regarding turning on MacOS' FileVault after it was not turned on for installation, it says here...
If FileVault is turned on later — a process that is immediate since
the data was already encrypted — an anti-replay mechanism prevents the
old key (based on hardware UID only) from being used to decrypt the
volume. The v... |
I've looked around and not seen any solutions to this problem
I work for a company as an automation engineer keeping a network behind a DMZ. I have an AD, switches, etc. We have local passwords for our switches, special accounts for vendor supplied software, the AD admin (which is required to be logged in for some vend... |
When considering external drives for secure long-term storage of sensitive data, what are the pros and cons of using the same password for encrypting all files versus using random passwords for each file (or junk of files), and how does this compare to disk-level encryption in terms of security and usability?
My priori... |
We are seeing port scans coming from many of our company devices and scanning our internal network over the VPN. The events are not reproducible and are not regular.
Scans always follow the same pattern - ping, TCP 22,80,443,445 and UDP 65534, and several hundred host addresses are targetted for each scan.
But we canno... |
Context. I am moving in to a building where neighbors share WiFi. There are several routers connected with each other, and residents connect to one of the WiFi networks. I was told it's cheaper that way and the speeds are good.
Concerns. I don't know who set those routers up and with what settings (like isolation or lo... |
I am trying to understand the risks of configuring passwordless decryption via TPM of a LUKS/dm-crypt system with something like:
systemd-cryptenroll --tpm2-device=auto --tpm2-pcrs=0+1+2+3+4+5+7+8 /dev/disk/by-uuid/XXX-XXX
The idea would be to use systemd-boot and a unified kernel image on a system with full disk encr... |
For TLS 1.3, the client hello record version is 0x0303 (TLS 1.2). If the server negotiates to TLS 1.3 (because 1.3 version is in the supported_version), do the application data records use 0x0304 as the version?
|
I have a non-browser client (Desktop app) that makes HTTP requests to my API.
I have the desktop client configured to use RFC-8252 (spawn an ephemeral HTTP server to handle the auth code flow's HTTP redirect) so that the user enters credentials only in the browser and my desktop app can get an access token and ID token... |
Working on a CTF challenge and the coordinators hint suggests that one of the vectors to inject shellcode is via pathing. Looking at debugging prints does show the cwd and filename are passed onto the stack and a quick test shows creating a symlink and using that the pathing is reflected on the stack. I took a shellcod... |
I want to see only monitored device's visited websites not the methods and the redirects how can I filter or can I?
|
Given a situation where I want to be anonymous by default, how can I use GPG to prove that I'm the original author once, on-demand, and for a specific user?
|
Our product stores voucher data in a database.
These voucher data can be retrieved with our app to display a voucher that can be used for payments.
Obviously, these voucher data are extremely sensitive because who ever gets access to them can use them for payments.
Common attack scenarios are:
DB breach where an attac... |
As an experiment, I attempted to setup a CNAME for mail.mydomain.com pointing to mail.myisp.com, and using mail.mydomain.com instead of mail.myisp.com in setting up email clients connecting to that using TLS (aka SSL) for IMAP/POP/SMTP
One client (Thunderbird) accepted that without a warning. Another (Outlook) complain... |
I would like to ask how I should go about securely transmitting the password between two applications. I have two projects that work with each other. The first one is a project called AuthApi, which authenticates the user and creates tokens. Here I get the email and password and if they are correct, I generate tokens. ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.