instruction
stringlengths
24
29.9k
I have seen around some 5G cellular kits that can be connected to SBC (Single Board Computers) in order to make a WIFI hotspot. From the one side, they provide 5G cellular connection and from the other side, they support WIFI connection. Do the SBC continue to provide security to signals coming from the 5G cellular sid...
TLS 1.2 session tickets are encrypted by the server with the session ticket encryption key (STEK). This key is shared with all the servers doing TLS termination. The session ticket contains all the information the server needs to resume the connection without having to store any state. In TLS 1.3 the server creates the...
I was recently participating in a CTF with a challenge that required contestants to find two .pdf files with the same md5 hash, and that got me thinking about how that could be a potential vulnerability in some systems (though not necessarily a large one). But that could be easily avoided by using multiple types of has...
The new router I was given by my internet and phone provider can only be configured via their website. I logged in and went to the page where you can set things like the SSID and password for the WiFi signal, and changed some of the settings. The changes were accepted and everything works fine. However, later I noticed...
I could not find any checklist for pentesting apps on HarmonyOS. I know HarmonyOS is based on Android, and all Android applications work on HarmonyOS if I use hms instead of gms. So would an Android static analysis checklist be the same for HarmonyOS?
When I was trying to do a deauth attack, I was getting an error even though I entered all the information correctly. However, when I add the -D parameter, this problem is solved. I don't fully understand the function of the -D parameter. Can anyone explain this in detail?
Scenario: There is a network infrastructure with IT and OT subnets and DMZ. I can only place 2 scanners in the whole infrastructure. Are there any recommendations or best practices for how to plan the scanner placement? (maybe guides/books/handbooks on this topic?) Where must firewalls be placed in this case and how it...
Laravel Passport implements OAuth2 flows and does the usual thing of issuing access tokens in JWT format, and an opaque random string as the refresh token. These refresh tokens are enormous - around 710 hex bytes, 2,840 bits – which seems really excessive. They are not stored at all in the server-side DB, only a hash o...
Let's say Mobile device A sits on Network A, and I want to monitor their HTTPS traffic remotely, how might I go about doing this? I know that locally, on the same network, a proxy debugging tool can help (Charles proxy, Fiddler, etc.). But how about if I want to do this remotely? I have full access to Mobile device A a...
I am trying to run tests on the TLS 1.3 protocol and I would like to generate alerts (as seen in TLS 1.2) that have a structure of the type ALERT:FATAL UNEXPECTED MESSAGE. So far, I have tried to use fuzzers, load generators, and custom scripts to generate alerts, but I honestly can't figure out what i'm doing wrong. C...
PassKeys is a new way to sign-in to web-apps and mobile apps by FIDO alliance. I looked at it and could understand how it works; However, I'm unable to understand difference from using touch-id to login (biometrics login ?) which many of the banking and other applications already support (ex: 1Password). For PassKeys, ...
When a user logs in with their email/password combo and gets authenticated to our website, the backend sends the web browser an encrypted cookie based off of their memberId with us. While this encrypted cookie has not expired, the web browser transmits it to the backend, where we can decrypt it and figure out the memb...
When I conduct a mobile pentest, I have run into payload encryption in HTTP traffic. In general, the AES key and IV ( initialization vector) are located in APK, and can be used to encrypt the payload using Burp suite extensions such as AES killer. However, it is known that the AES key and IV can also be stored in a sec...
When I see examples of CSRF attacks, it is almost always explained with someone entering some external API url in an <img> tag, e.g. <img src="bank.com/transfer?amount=10000?recipient=badguy">. Or it involves a form which when submitted executes a POST request to bank.com. My question is why not just include the API ca...
As a picture show above, how do hackers use PC0 to hack into PC1? They are in different private network. As far as I know, we can use VPN to communicate two different private networks, so do hackers use similar VPN technique to hack in?
Here's what happened: I was transferring a quite large number of small files (.CSV, .PNG above all) from an old USB stick that never gave me any problem from one (allegedly safe) laptop (win10, win defender) to another one (also allegedly safe, win11 with Sophos home). I get a warning from Sophocle that says that it bl...
I'm trying to set positive trust attributes to a certificate, however, in openssl's documenation there is no information about how to set them: From the OpenSSL perspective, a trust anchor is a certificate that should be augmented with an explicit designation for which uses of a target certificate the certificate may ...
Any tool that can prevent ISP from knowing which websites we visit? beside tor? while https can help, but still ISP knows which domains/websites we visit. There is no way around it? Also believe that IPS know when we use VPN.
When I try to WinRM into a Windows host (with a tool like evil-winrm) into the and when I do qwinsta, it says "No sessions exists for *", however, when I do RunasCs.exe x x "qwinsta" -l 9 it lists out the sessions correctly. Note that the command is literally x x, i.e. I typed x as username and x as password. As appa...
Is it possible that an attacker puts machine code on a TCP packet? In a way that before passing to the CPU and getting an error that such a function doesn't exist on the application, it first needs to pass through the RAM, and when it's in the RAM (electrical signals), it executes the code?
I received an odd SMS message from xfinity earlier. The message looks real, and the link they provided is real, but they said I ordered a movie through their service, which I did not. I am wondering if spoofed SMS messages would show up in the same chat history, or if it would show up in a new chat history.
I noticed that in my website I only check that the Origin string ends with "mysite.org". Meaning that for this request: GET / HTTP/1.1 Host: mysite.com Origin: https://evil.com#mysite.org Access-Control-Request-Method: GET Authorization: bearer $TOK will return as header: HTTP/1.1 200 OK Access-Control-Allow-Origin:...
The luksFormat command accepts iteration time as a parameter, not iterations. That obviously leads to quite different number of iterations depending on the hardware doing the encryption. However if I am protecting the same data on systems of vastly different performance, the security is as weak as the slowest machine...
I'm hosting a simple MariaDB/mySQL server on my Raspberry Pi. I would like to know whether or not this code is secure enough to reject an injection attempt made by login/signup, etc. function secureUnInject() { const str = String(arguments[0]); return encodeURI(str.split("\'").join("").substring(0, 250).replace(/(\...
The FIPS draft for Dilithium signature scheme (official name ML-DSA) had just been released not long ago. In the specification for skDecode (which is the subroutine that loads the private signing key) mentions that this procedure must be performed on trusted input only. What I want to ask has nothing to do with cryptog...
Suppose one hosts a web application that does not handle any sensitive data (e.g. passwords, session cookies, etc.), without using HTTPS. What potential security issues arise as a direct consequence from this? Assume that man-in-the-middle attacks are useless, as there is no valuable data to extract from an attackers p...
I've come across a webpage that uses Iron cookies. These cookies have the exemplary format: Fe26.2**0cdd607945dd1dffb7da0b0bf5f1a7daa6218cbae14cac51dcbd91fb077aeb5b*aOZLCKLhCt0D5IU1qLTtYw*g0ilNDlQ3TsdFUqJCqAm9iL7Wa60H7eYcHL_5oP136TOJREkS3BzheDC1dlxz5oJ**05b8943049af490e913bbc3a2485bee2aaf7b823f4c41d0ff0b7c168371a3772*R...
Today I learned of the existence of crt.sh. I typed one of my domain names into the search box to find out what it returns. I found a lot of certificate entries for domains that I don't recognize, and which appear spammy to me. Many of them use a subdomain of mail. Is this something I should be concerned about? Is ther...
I'm working on an article that involves flash memory cards being put into machines that process and track sensitive information. The machines scan data from forms, then input the data into a database. Supposing memory cards went unchecked and were put into these machines, what sorts of vulnerabilities might this system...
The answer provided to this question by forest has a good summary explaining the types of attacks that a malicious USB can do. Does USB redirection in a VM provide any protection against any of these attack vectors (e.g. confining an exploit in USB class drivers or filesystem drivers to the VM)? I use KVM/QEMU USB red...
A website allocates random file names to uploads and I am trying to enumerate through the folder that the files are uploaded to using Gobuster. I know the extension of my file type, but not the file name. Is there a way to invoke the -x flag to look for file extensions without invoking the -w flag? Or some way to invok...
I'm wondering this. I am planning to resolve Vulnerability Assessment and Penetration Testing reports. Do I need to learn how to do such attacks in order to harden the server? Or don't I?
A number of similar questions have been asked about this general topic before (e.g. How to store user credentials in browser securely?), but I wanted to seek some clarification on a specific scenario. I have what is essentially a stateless web application (it's a webmail client). As such, when a user logs in, the appli...
I have a personal id "U1KFhYtMqZhCYya6sy31PVLM8DlM5HLCkwy3", I have checked some hash functions but cannot make sure how this generated? Is this just random string generated with [a-zA-z0-9]?
I was on my laptop at home using my network but I was on my school Google account I searched for TikTok and when I was on TikTok, I used TikTok's search function for some inappropriate things. I am worried the school will see what I searched for on TikTok, but I am not sure. I deleted it from the search history on my l...
I am using bcrypt.js for basic login. I have found that the below code runs noticeably quicker when no user is found, since it exits immediately, and no check is done on the hash. This could give an attacker insight into whether a username exists in the database or not. Is there a way to mitigate this using bcrypt.js l...
As far as I've seen, the Secure Boot process is described like so: A firmware stored in read-only memory and therefore considered secure starts. It verifies the next software component (e.g. a bootloader), loads it and - if the check is successful - passes control to it. The bootloader is now responsible for verifying ...
The other day corporate or the vendor used their cloud deployment tool to replace some of our DLLs, and it got me wondering; does anyone still use hashdeep when they initially roll out a server or important workstation, store the hashes to immutable media and then periodically check the hashes to make sure they still m...
How can I check for malware embedded in an MP4 video? It was sent over WhatsApp and I have played the video on my Android phone. Norton scan came back clean.
Is there way how to enforce nmap waiting for replies longer (10 seconds)? I want to scan an embedded device which utilizes some sleep modes and it process packets from wi-fi module with very high delay of several seconds (pings shows delay in range 3 - 8 seconds. If I run nmap using following parameters (which are insp...
I know that wget and curl can mitigate fingerprinting (aside from http header and user agent), but will yt-dlp give away more data?
I did not like how my password and other credentials could be viewed in the browser developer console when passed from a form to my api authentication service. So I'm now base64 encoding using atob() before posting. Am I too paranoid? Is there a better way?
In South Korea, I've seen a couple of public Wi-Fi networks advertise a "secure" option. Stickers on public buses in Seoul and the captive portal login page for unencrypted Wi-Fi instruct users to connect to a secure option (e.g., KTX-WiFi-Secure instead of KTX-WiFi-Free). Those networks appear to use WPA2 Enterprise. ...
In the book Javascript for hackers, Gareth Heyes overwrites the window.onerror method with eval, used to execute a function. From my understanding, the following snippet run in a browser console should pop up an alert with the number 1337. However it doesn't work and none of the examples in that section work for me. on...
User verification in WebAuthn can either be required, preferred, or discouraged. The last two are a hint to the authenticator that may be ignored. I see how they could be used to prevent client-side user verification if the server has already asked for a password in a previous step. Required does sound like a requireme...
I'm going off of this answer, but asking a new question since that's quite old. It seems to be becoming more common for banks or other "legitimate" institutions to want your banking username and password in order to verify account information quickly. This flies in the face of the age-old security advice: "No legitimat...
In this sense, I understand the encryption needed between say client and server and all communications that are external. But for a scenario where for all VMs are in the same VPC and not exposed to the external world... Is VM-to-VM communication necessary here with TLS? For eg an entire Kubernetes cluster has all its w...
Here is my situation : we've got ID, named TIP, from remote and large databases. We want to store all the data, but laws prevents us to store the TIP directly, but rather anonymize them, for security reasons, as these TIP are, indeed, identifying a person and their personal confidential data. However, as we reconstruct...
The context is described in another of my question, and is as follow : i've got to securely store identifiers, called TIP. We need (1) a method to derive always the same UID from a TIP, so that no one can do the reverse operation, except (2) our Data Protection Officer that would be entitled, in some cases, to access ...
I see why it is obviously bad to store a secret key and client ID in the source code for a web application. However, how do you go about the alternative? Surely, that information has to be stored somewhere. Is it stored in a local text file on, say, an EC2 instance which is running the server that gets read by the appl...
What measures can be taken to safeguard against ZeroFont phishing attacks (setting font size to zero), and how can email security settings assist in the detection of ZeroFont elements and the identification of malicious characters?
There is two different passwords for a single user. I'm hashing both for future validation. I'm currently using a single unique salt for the user, but each is hashed with a different algorithms (PBKDF2 with different algorithm and different interation counts). Is there any benefit to also use separate salts for each of...
As a hobby project I'm thinking about how to write a secure chat where even all metadata are encrypted so that it is impossible to leak any (meta) information by design. My basic idea is right now: Each chat is split in blocks identified by an UUID just the last hex digit count up so that there are at max blocks of 16 ...
I've tried to harden my Windows 10 by using an unprivileged account, which I know reduces the attack surface a lot. I'm running Ableton (a music program) which is running after UAC has given admin privileges, and Ableton calls plugins, which are basically a bunch of DLLs which should be run also with admin privileges, ...
I'm working with an HTTPS API that requires me to include a Signature header, the signature is calculated as codeBase64(hmacWithSha384(key, body)). I'm wondering if it provides any real-life benefits or if it's just security theatre, as opposed to providing simple API keys My thinking process: an attacker shouldn't be...
Yes, I do use a password manager. Yes, I do use complicated long passwords, a la XKCD. However, sometimes I fail repeatedly when entering the master password to my password manager. Which has no "show" button, presumably due to security concerns about cameras. Cameras that are just not there - I don't this in public....
I am building a web-based software as a service (SaaS) platform for engineering simulations that run on the cloud, and wish to prevent my access to user data by design. The user designs a 3D geometry (I have a simple CAD interface) along some simulation properties, and clicks a button to run the simulation on a cloud i...
This IP address has been going through everything - every image, every page. How can we know who this is and whether they are doing any harm? Is this abuse? Should we report this? If yes, to whom should we report it? Thank you.
This is a "should I be worried" question. I access a website on my laptop via my home network/router. My Edge browser gives me a "Your connection isn't private" warning page and a NET::ERR_CERT_AUTHORITY_INVALID error. When I check the certificate it looks ok, at least within validity period, hasn't been revoked and...
My understanding is that Strict is the best as, admitting you have a recent browser, it completely replaces the need for CSRF Token. Strict is however a big hit on usability as things like SSO or just having a link in email to go to a logged page will load the page without the cookie. Would it be viable approach if :...
I started reading on apt and the security changes to always use GPG signing keys, but further saw that it by default uses all configured GPG signing keys, this seems like a small but unecessary loophole. It looks to be standard for custom repositories to restrict the signing keys to its corresponding key. However, I ca...
I recently started work with an IT Vendor and we are STIG compliant. Just last week a customer requested proof of compliance & my company sent them an excel sheet of RHEL STIG V1R2 with ~300 vulnerability ID's, as well as a note of which ID's we were not compliant with. Some non-compliance were on vulnerabilities with ...
The video from Okta says that it's possible to hijack the access token when on public wifi. But if HTTPS is used, the headers are encrypted. And therefore the Location returned by the Auth Server won't be visible to the attacker. Replay attacks won't help the attackers either - again because the headers are encrypted. ...
Let's say there is a webapp where users can upload files with sensitive data and view analytics generated by the backend. Does using a reverse proxy like nginx or Apache actually help with the security of the website? I have seen this claim, but I can't see a reason why this (functionality beyond load balancing) would ...
I'm curious in an enterprise network running Windows, what information is available in the SAM of a standard user's endpoint machine? I understand (and correct me if I'm wrong) that when logging in to a network managed by AD that an endpoint user will authenticate by way of Kerberos with the DC and the domain account d...
Is sending emails between Gmail accounts encrypted, can ISP read gmail content in transit??
RFC4122bis specifies UUID v7, a version which contains 74 bits of randomness. Assuming I use a CSPRNG to generate the random bits: Are these UUIDs considered to be unguessable and are enough to prevent attacks such as IDOR?
DigitalOcean offers managed databases. From what I can understand, the advantages are: You don't have to worry about management tasks such as set-up, updates (including security updates), and backups. They store and move the data encrypted. Certain redundancy options. What I'm trying to understand is: From a security...
I have an application that encodes data when writing it to a database, and unencodes it when reading from the database. The encoding is done with a symmetric algorithm using a fixed secret key. I'm imagining a situation where an attacker has gained access to the machine running the application, and assume for simplicit...
I am a junior pentester currently working for a secure messaging app that includes a webclient. Only the subdomain is in scope and other subdomains are off-limits. Social engineering is also off limits as this is a staging server that mimics the live server and is only used for pentesting purposes. I tried using nmap t...
I currently try to implement progressive profiling with auth0 according to: https://auth0.com/blog/using-redirect-with-actions-to-gather-user-info-and-increase-conversions/ to gather first name and last name of a user after a succesful registration. Since I am using the new universal login mechanism I can not just add ...
I have a desktop application with JavaFX and I need to connect it to the server in a safer way. Right now, the program connects by mysql and FTP without TLS. I've thought to connect it by VPN, but the clients have the Java application installed on their personal computers and I can't control the end device security. Is...
OpenSSH sshd enforces mode 0600 for authorized_keys when StrictMode is enabled. How is mode 0644 more vulnerable?
I am a sysadmin, though not security-specific. I was recently stunned to receive an automated email from my physician's office (in USA) containing an HTTP link to their website for the completion of preregistration forms. Starting on a clean browser and a different computer, I followed the link to their website forms,...
I have a bind shell written in python: s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) s.bind(("127.0.0.1", "710")) s.listen(1) conn, addr = s.accept() print(f"[*] Connection established from {addr[0]}:{addr[1]}") while True: command = conn.recv(1024).decode() if command.strip() == 'exit': ...
Introduction: We heavily use external libraries, such as DataTables, in combination with interpolation. In Angular, we've identified two primary XSS prevention strategies: Interpolation ({{ }}) Direct Sanitization with DomSanitizer.sanitize Concern: Concerns arise if these libraries misuse interpolation, leading to v...
I have a bunch of REST APIs which would be consumed by frontend applications created by customers using our product. I have suggested to only use last 2 versions of Chrome for running frontend apps. They would be using Angular. I was going through Angular's security guide which says, Cross-site script inclusion, also ...
ASLR allows to randomize the base address of userspace applications. In Linux, the length of the randomized part of the mmap address can be specified via the kernel build config. It is bound by the minimum and maximum values of the respective target architecture. For example, on arm32 the rand-bits can range from 8 to ...
Academic literature describes a method for distributing benevolent patches "in which every newly patched node forwards the patches to some or all of its neighbors according to a well-designed protocol" [1]. This is termed distributed patch dissemination [1], countermeasure competing strategy [2], epidemic vaccine propa...
I have an IoT device which is failing to establish a connection with the cloud. The problem is related to the device X509 certificate (to the best of my understanding). I've posted a version of this question in the general stackoverflow to appeal to AWS specialists, but thought it could be rephrased in more general ter...
We have to sign in and out using the school's network. I have the ssid and the password and the ip addresses. Is there a way to use my home network and make them think I am using the school's network? I think it might be possible but can't figure it out. We all sign in on time but they make us stay 2 hours after everyo...
Related: Are WPA2 connections with a shared key secure? Is a public WPA3 network secure against eavesdropper who knows the password? The specific use case would be a public WiFi using WPA3, but with a common password posted for everyone (including the hacker) to know. The question is if the users traffic is protected a...
I'm looking into the differences between stateful and stateless key management. I understand that stateful key management means that I have a database that tracks my keys, and can become very large. There are obvious security implementations as well - if that database is compromised, well...that's what we call a "resum...
Company policy states that all internet-facing components must be protected with a WAF. However, I have an Azure Blobstorage that stores public web assets. I don't think putting it behind a WAF makes sense. What are the benefits of putting a WAF here? What are the risks if we don't do that?
I am looking to be able to scan bluetooth addresses around me, and then get info on the devices from the address (i.e. if its a phone/speaker, or maybe if there is a public registry of device addresses). I found https://www.macvendorlookup.com/, but when I put my phone's bluetooth address I get 'Bluberi Gaming Technolo...
Let's say: alice@example.com sends an email to bob@bob.com. Bob owns the domain bob.com but doesn't manage an emailing server. Instead he uses an email forwarding service (provided by his registrar / DNS service, for example Cloudflare does this), redirecting every email arriving on bob@bob.com to bob@yahoo.com. Let...
I'm trying to understand the difference between generating a private key using openssl genrsa and adding -newkey to req. I found a 2014 answer saying the underlying code is the same, one from 2015 saying the encryption is different, and a 2017 mailing list answer saying genrsa "creates keys in a legacy RSA algorithm-sp...
Question: I am working on a password-based file encryption and decryption system in Python using the PBKDF2 key derivation function and Fernet encryption. I have a specific requirement: I want to verify a user's password without storing the hash permanently. Here's my approach, and I'd like to know if it's safe or if t...
You can try this one for yourself... Generate a new GPG keypair. Create a large junk file. Maybe 5G or 10G in size. Encrypt the file and use the new key as the recipient. Delete the privkey which will render decryption impossible. Try and decrypt the junk file. I get a message from GPG immediately telling me gpg: dec...
I bought a new 2 TB SSD (NVMe). I want to turn it entirely into a veracrypt volume, nearly all of the drive being for a hidden volume. First, I told it to do a "quick format", which was done instantly. Because in https://sourceforge.net/p/veracrypt/discussion/general/thread/38c20fbe/ someone wrote I would still avoid ...
I've been diving into the world of penetration testing regarding PM, and I'm curious about how you all define the scope of such tests. I often hear terms like "small scope," "medium scope," and "large-scope" thrown around, but it seems somewhat subjective. So, I'd like to hear your thoughts! When it comes to penetratio...
The server is based on Linux and applications are based on Android and iOS. I was looking through "Linux Hardening Guide" as someone recommended it to me in order to harden Linux servers. I looked at the syllabus of the book, but that's not what I want. I want to learn to protect web servers from various attacks. For e...
What protections does TLS use in the above scenario? In the picture, the client asks the attacker for the address of Google.com, but the attacker gives them a different ip address which redirects to a domain that looks like Google.com.
In general, I understand that nonces are used to prevent replay attacks, but in the case of a TLS 1.3 handshake, the Client/Server Hello message contains their public keys. Considering that keys are randomized every time (as in the case of Ephemeral Diffie-Hellman), don't they act as a "nonce" for the communication alr...
My management requested to investigate about security of HSM Thales Payshield. Have you ever heard of any security bugs on the HSM Thales Payshield? I mean, except for the known bugs reported in their documentation, it seems impossible to find other information. I am aware that due to their peculiarity of use and softw...
I remember seeing an encrypted messaging app a while ago that offered using QR codes to exchange encryption keys between the users. Of course, this only worked when the people met physically, but added an interesting layer on top of the usual key-exchange protocols. However, I cannot recall which app it was and am unab...
I am trying to understand how an attacker is able to use the halflm challenge rainbow table to obtain the first 7 characters of a windows password that was used to authenticate a user using LM/NTLMv1. To help you understand my confusion, consider this illustrative example: Suppose a user(U) intends to authenticate on ...
There is plenty of discussion on how USB thumbdrives can be used for malicious purposes if one decides to go down that rabbit hole. One mitigation that is discussed in that context is to completely disable USB storage devices. Are there any alternative strategies? In a normal business context, not being able to use USB...
I am living in Germany and when you get a phone call the phone number of the caller on the display can be faked. For example you can get a call from 110 (police phone number) but it's a scam. And that happens often in my area. I wonder if the same applies to the IBAN of the initiator of a SEPA direct debit. Let's say I...
I was wondering if a stored cross-site scripting attack is possible if the user input is not saved. If a website is vulnerable to an xss attack, can someone put in a code or something that stores a script?