instruction stringlengths 24 29.9k |
|---|
I am trying to determine if there is a benefit to using the GMail app over the built in iOS one when it comes to security. I know that both store data locally on the phone, but the question is whether that data is encrypted? I cannot find a definitive answer for either one as to how the data is stored on the phone itse... |
I want to install a few banking apps for my bank accounts. I also have modded or cracked games/applications installed on my phone, but my phone is not rooted. Will adding a banking app increase the risk of it getting hacked?
|
I'm worried that there could be some particular private information about me be leaked somewhere online.
I'm already aware of haveibeenpwned.com and doxbin.com, but what other sites exist there where I can look, especially deep websites?
|
This is a close matchup for If someone knows your wifi password can they hack your router?
I gave someone my general (not the guest-specific) wifi password, but they flew home to another continent. My partner is concerned about whether that's a risk. I have no reason to suspect the person of anything, but I can't vou... |
I want to host some websites served from an isolated VM which is on my home network through port forwarding.
Although I believe this is reasonably safe, I want to physically segment internet-exposed VMs from my main home network. What is the best way to do this in a virtualized setup? I am using proxmox with a bridged ... |
I've got an application that isn't very robust and, as a result, is very sensitive to anti-virus scanning. I tried both the basic/free Windows Defender and a NextGenAV (i.e., SentinelOne). Both had negative performance impact on the app's servers during business hours. I tried putting scanning exceptions in based on th... |
I'm trying to reproduce some of the Tomcat 9.x.x vulnerabilities from this list, in particular the HTTP smuggling vulnerabilities. However, so far I haven't been able to reproduce any of them. Currently I'm running Tomcat 9.0.0.M1 behind an nginx 1.22.0 reverse proxy on Ubuntu.
Can anyone here point me towards a resour... |
I'm learning how to exploit a tiny web server based on a well written post here: https://blog.coffinsec.com/2017/11/10/tiny-web-server-buffer-overflow-discovery-and-poc.html
I am very close to successfully exploiting it, but I am stuck on properly packing the libc's exit function address into the byte format to overwri... |
NET::ERR_CERT_COMMON_NAME_INVALID
This is the error that we're getting.
And it also says that "adguard has blocked access to this page".
What's the solution to this?
Would ssl pinning fix this issue of very few clients getting ssl errors?
https://developers.wultra.com/components/ssl-pinning-android/1.3.x/documentation... |
I have a requirement to extend a quality assurance process in the customers CRM system so that when the user enters some data he or she is prompted to a screen with username and password and the already logged in user is again verified. You can think of it as a means of signing a document. We have to be sure that the p... |
I've always given two-factor authentication a wide berth because of my experience with it; with Dropbox, for example, they want an e-mail confirmation when I log in, but eight minutes pass until I receive the e-mailβif at allβand then the login attempt is already timed-out. The only still working login is from my dropb... |
I am trying to ascertain if Google Cloud Pub/Sub supports OAuth 2.0 with Mutual TLS (mTLS). Despite conducting an internet search, I couldn't find any pertinent information regarding mTLS support (it currently only supports OAuth 2.0). Does anyone have experience with this?"
|
Edit: It has been observed that my question may already have an answer here How to check whether a link is safe or not? [closed] and here How do I safely inspect a potentially malicious website?. Even if I find the suggestions therein very useful, I believe that my questions below are somehow different. Let me try to r... |
Why does FIDO2's spec not mention FIDO UAF as a related standard? I wonder if FIDO UAF is still relevant. Will FIDO UAF be deprecated eventually in favor of FIDO2? Why do they co-exist if they fulfil the same purpose?
What I already know:
FIDO2 consists of two standards that together enable a web app to communicate wit... |
Say that I have generated an RSA keypair, which I intend to publish only for use with RSA-KEM; I can see that this is provisioned for:
The intended application for the key MAY be indicated in the key usage certificate extension (see RFC 5280, Section 4.2.1.3). If the keyUsage extension is present in a certificate that... |
Can you be tracked even with a vpn? If a sophisticated eithical hacker really wanted you will a vpn save you?
|
I was very disappointed to hear that my friend, who had his Android phone seized not too long ago, has had his phone broken by police forensics.
As far as I know, it was a few years old, Samsung, and had a 20-digit password.
It seems that encryption meant nothing, however, as he has received court documents notifying h... |
I need to protect a private RSA key using a passphrase but using AES-GCM for the actual encryption.
This is normally done using various a combination of openSSL library calls. However, I now need to support using AES-GCM instead of AES-CBC that is usually used. But it fails with following error:
error:0300007A:digital ... |
I am writing a mobile application for an already existing web app.
In the backend, I implemented the usual cookie-based session ID authentication. with a CSRF token generated on login and sent with each request in a custom header.
the problem is that I want to use the same backend for both the mobile app and the web ap... |
Suppose that I have an external storage (such as a USB memory stick or an SD card) which contains some files (such as documents or images).
Suppose that I am running an antivirus which scans drives and devices on access, such as Kaspersky Internet Security.
Can potentially malicious code be hidden in a file in the exte... |
I have a replica of Huawei B535-333 LTE modem. While I was working from home on my computer I randomly got a security alert saying that certificate for connection with outlook.office365.com was issued by untrusted company and the certificate name and site name are not the same.
When I checked the certificate it was is... |
A popular new idea at the company I am working for is to remove worldwide access of web applications and restrict them to the internal network only, allowing remote users to work with them through VPN only.
As we have thousands of users, one major problem with this approach is that VPN resources have to be ramped up qu... |
I have completed a few Bug Bounty tutorials. All of them use Kali Linux installed on VMs. Either VirtualBox or VMWare. Is there a reason why Web App Pen testing would be done from a VM? I'm just wondering if just installing Kali on my machine is a bad idea for some reason I don't know.
Kali Linux provides ISO specifica... |
I am on the very last functionality to implement before launching my app. I have the same requirements someone like Fanduel or Draftkings does. When my users cross the $600 threshold for prizes in the year, I need to store their ss number so I can generate and email them a 1099 tax form for the next year.
I would be th... |
I'm trying to create a persistence module for OSX systems but first I need to create a reverse shell that spawns and binds on the same computer over a LAN. I'm having trouble creating an executable with msfvenom, the system I'm developing on has an M1 chip and I'm not sure how to generate a payload for this system. I'v... |
Apologize if this is a newbie question. Say the PC hard drive with Windows installed is un-encrypted (no BitLocker, etc); and someone gets physical access to the hard drive but does not know the (Windows) login. Can that person get information stored in WCM?
I am aware of this post but (perhaps due to me being a newbie... |
I need help in controlling my ISP from Ddos attacks it's happening for almost a month almost everyday bringing down the isp for 4 to 5 hours sometimes for the whole day anyone can help it guide what is the best and cheap solution to a kid this Ddos attacks on my isp
Kindly let me know what u need to have technical info... |
This question was inspired to a degree by How secure is R and RStudio?
It had a very reasonable answer and looking at the possibilities I thought a small system of R scripts (about 10 scripts) would be reasonably safe if we are reasonably sure that scripts and settings (.properties) files remain the same. So everything... |
TLS unique value is present in TLS 1.2 version.
In Golang, I can get the value of the TLS unique value from the http response through the field TLS.
I'd like know how I can get it from Apache.
Is there an environment variable that already exposes it?
Should I change the apache configuration?
I have secured my EST enrol... |
I've long since been storing credentials to databases and services in local configuration files during development. Sometimes these need to be to production systems, which makes this a security issue.
I'm wondering what the best practice here would be. I don't want to manually enter credentials on each startup of my ap... |
I bought a second hand HP Compaq 8100 Elite SFF PC several years ago with Windows 7 home basic preinstalled on it.
Occasionally a weird suspicious notification sound is played once for a session on it which I cannot find its source... I don't know exactly why but it seems to me very like a remote login/access notificat... |
I've recently upgraded my computer security by encrypting all the drives on in with BitLocker (I'm using Windows 11 Pro).
Unfortunately, I ran into a rather fastidious bug that prevents me from converting the local user I was using to a Microsoft one. After spending a couple of evenings trying to get a solution to the ... |
i want to generate a 12 bytes authentication in AES-GCM. my code only give me an output tag of 16 bytes. i have tried to use the min_tag_length but it rises an error.
can i get your guidance, thank in advance.
import os
from cryptography.hazmat.primitives.ciphers import (
Cipher, algorithms, modes
)
#f(StoC)= SC |... |
I read on this topic that, after performing a payment, websites can store and read:
Your PAN
Your zip code / cardholder name / any information you input on a website that has fillable informations within the website itself (like Tinder)
Is it still true in 2023?
Is it legal for them to store and read these informatio... |
If you are using a scripting language like for example Python for the back-end of a web-service, is there a risk connected to this which is not present if you would use a compiled language?
Take for example this pseudo-code:
password = request["password"]
if password == "abc123":
print("Welcome.")
#...
else:
... |
I am using the note taking app Color Note (www.colornote.com) on my mobile phone that is using Android 7.1.1 to take some notes (old device). I am not using their cloud sync capability, and my email/any personal accounts aren't connected to this app. I opened a note I was recently using to find that some text was inser... |
Is there anything that works like the opposite of a hash algorithm?
Today we know many hash algorithms, which take an input, perform some math on it, and output a value which is different than the input and can't be used to determine the input.
Is it possible to turn an input value into an output value, without being a... |
We got hacked.
Our setup:
DigitalOcean VPS, Apache, multiple domains & WP websites, Elementor Pro, hopefully safe plugins.
Known facts:
It's phishing.
The virus infects all the websites on our VPS.
They like to play hide'n'seek. It randomly injects client files (mostly minified plugin files) with random code. (On one ... |
Since 2FA exploits are increasing, and most end-users are hellbent on using the least secure passwords available, are biometrics the only real security left?
|
Besides Security IR tracking & workflow that is available in SIEM platforms, what are other tools that can do this such as standalone products like ServiceNow SIR or Everbridge xmatters? I found Resolver and RTIR but don't know anything about either. Any others? Thoughts on these tools or others in terms of effectivene... |
HMAC signatures are very commonly used for webhook authorization from service to consumer.
Examples:
Stripe
Slack
Twilio
Twitter
GitHub
and hundreds and hundreds more. This seems a near universal design decision.
Yet, the other direction (consumer to service) never uses HMAC signatures. The mechanism varies, but in s... |
I am learning how to improve email deliverability. Along the way, I'm learning about DMARC reports, SPF and DKIM. I have a friend with a small business who said I can practice with this email service which is hosted with Google Workspace. For now, let's say his domain is friendbusiness.com.
For friendbusiness.com, I... |
I am running a Audit and Scan Deep Scan of a website using Burp Suite Professional v2023.10.3.7. I have entered the Settings for the scan and went to Application Login, entering credentials for the login screen.
While the scan is occurring, if I click the "Live Crawl View" tab, I see that the login succeeds, but after ... |
In the OpenID Connect "authorisation-code flow" what security vulnerability is exposed, if the application relies on claims in the ID Token without validating that token?
For example, Google suggests that validating the token is unnecessary in this flow:
Normally, it is critical that you validate an ID token before yo... |
Alice and Bob use the same password which will be used in a KDF like PBKDF2_HMAC or Argon2id to generate a AES-key. The problem is that Argon2id generates a different output for the same password, resulting in the AES-key being different for Alice and Bob.
Pseudo-code:
password = "abc123"
# For Alice
salt = randomsalt... |
In this question: Is FIDO2 authentication vulnerable to a social engineering replay attack?
it was answered that no, not vulnerable because "the keypair used to by the FIDO device to authenticate with the credential harvesting site would be different than the keypair used to authenticate with the legitimate site".
But... |
(I likely didn't use correct keywords, but I was not able to have a complete info about below question).
Working on a IoT device, capable to connect to our own server, using MQTT and HTTPS connections, both utilizing TLS handshake. We want to make sure, that only our devices can connect to our server, the procedure we ... |
A while ago Twitter made changes to their API that prevents the use of third party clients. Reddit apparent did something simmilar. How is that possible on a technical level?
The way I understand it, if you open the official twitter app or visit the official twitter website it makes a API call to retrieve the content i... |
I see there are forums about this question, but everywhere, I fail to see the answer I am looking for.
I have a stored procedure which its purpose is to execute dynamic SQL statement.
It uses a cursor which makes it a single point where only a single REPLACE() is made.
Here is, simply, how at the end it goes.
Here is a... |
If you have a client-side script (e.g client.py) communicating with a server-side script (e.g server.py). Using SSL certificates the identity of the server is automatically verified.
But how do you verify that the code of server.py isn't tampered with? When for example using a VPS you never know if a employee of the ho... |
I'm implementing SPNEGO-based Kerberos authentication for a Linux client application for authenticating requests to a Windows IIS server.
I've read RFC4559, which describes how authentication should be performed:
https://datatracker.ietf.org/doc/html/rfc4559
My questions are as follows:
Should I create a new security ... |
How to know if a device comes into my WiFi network range even though it does not connect to my network?
Here my business model is that when someone comes into my Wi-Fi range if I can know the count of it for suppose I run a restaurant every time I cannot be there but when I can know the count of the people, then I can ... |
We have separate WordPress installation directories in one webspace on the same User. (Wordpress_01, Wordpress_02...)
It is possible to block PHP script Actions between the directories? (is the best method using .htaccess?)
A few weeks ago 1 WordPress installation was infected and the script scans and changed files in ... |
I have seen whats's in the image.
But i don't have any printer.
OS: Windows 10 22H2
|
We don't normally worry about old school viruses breaking out of emulators; but sometimes we worry about targeted exploit code breaking out of emulators.
8086tiny is an 8086/80186 CPU emulator. The active development repository seems to be here: https://github.com/ecm-pushbx/8086tiny
Some analysis:
We can corrupt the ... |
I'm currently working on an international marketplace website and trying to decide the appropriate timeout lengths for access and refresh tokens.
We try to do the timeouts to be as strict as possible to make it more difficult for bad actors but also try not to worsen user UX too much.
What timeout settings did you fin... |
I'm exploring the possibility of implementing OpenID Connect (OIDC) with an HTTP-only cookie to keep my frontend code completely authentication-agnostic, instead of passing the Authorization header around through Javascript code.
The idea behind this is that front-end developers don't have to worry about authentication... |
an attacker manipulated the IBAN of an invoice.pdf attached to a received email. The question remains, can said attacker manipulate/change such a pdf client-side and cause an IMAP synchronization with the webmailer provided by a hoster?
I couldn't find a solution to this attack scenario, maybe you guys can provide a hi... |
I went online with a new WhatsApp account earlier (with a new number), and the first thing that happened was that I received a threatening message from a number with an ISD commonly used by scammers and other unsavory figures, that included an image file. Maybe that message was supposed to go to a different number, or ... |
Consider clientA which wants to verify payments and serverB which verifies payments.
ClientA sends around a million requests to serverB's API in 1 day.
However, only 1% of the requests from clientA succeed and give a 200 response. The rest end up with a 400 response.
I looked at the API documentation and the way reques... |
I am setting up a brute-force with hydra, and receiving valid responses for almost all requests from passwords list. But on the web form I am still getting an error that credentials are wrong. What am I missing in the script?
System set up on the nginx, and the login/password pairs should be correct.
I tried
sudo hydra... |
Looking on how to best advise someone who continues to have phone hacking issues. She changes devices, carriers nothing stops it. Local law enforcement have been no help. Very detailed personnel information is getting out. What should She do? Someone is stalking her she is afraid but also lives a very normal life. Noth... |
new here and a noob but need some help identifying some things I find very strange on my device. Anybody willing to try help figuring out some problems with me, your help will be greatly appreciated.
|
The reason I was curious is because it provides a feature that saves the SSH password and allows me to not have to enter the password the next time I connect through VLC. If someone else gets access to my physical device (computer, smartphone, etc.), can they get these passwords?
In my opinion, since 'plain text' must ... |
100 employees of a company received an email with a phishing link, How can I tell who clicked on the email phishing link and how many got infected with malware? 3 logs were given, email log, web server log and I believe firewall log (but not sure).
This was a question on the CompTIA CySA+ exam
|
Is there any tool providing information such as exploitability state (i.e., None, POC & Functional/Active) and automatability data for a specified vulnerable component name and version?
|
I am new to SMACK and trying to explore SMACK64MMAP attribute and how it works. Basically, I want to control which process can map my shared library.
Hence, I am adding a label to SMACK64MMAP attribute of my shared library file. After this, no process can map my shared lib which is expected as per SMACK behaviour.
Now,... |
I have been using lots of various APIs in my frontend lately and they all have to be properly configured with CORS and the browser always do extra OPTIONS request that only make debugging harder.
I was wondering if there could be a way of disabling cookies for these requests for an application, would that work as a sec... |
I'm using Rust to create a program to attempt a timing attack on a network resource (a printer I lost a password to). I'm wired directly into it. What Linux environmental constraints can I optimize to minimize noise and variability?
Currently, even over 100,000 runs on a single threaded process I do not see a statistic... |
The following code should be exploited and I need to exploit it in such a way that it runs my command (l33t) and there should be shellcode and exploit included, so that it runs my command. I believe I need to use GDB and it has something to do with the global offset table and is potentially a string format vulnerabilit... |
I have created a data science model pipeline in Python which ingests some data (user transactions) and then runs some models to generate a report. The models that I have created are proprietary and so far I have only been working on a sample of the client's data.
The client is a financial institution and due to regulat... |
Problem
Users in my application are being blocked (by the AWS WAF) from uploading files with certain names. In the specific case I am trying to solve, the problematic string is .* System (.*).*.
Background
The block is coming from the PHPHighRiskMethodsVariables_BODY rule that is a default inside AWS-AWSManagedRulesPHP... |
I'm learning Active Directory attacks and in one of the labs we are given the example of gaining the initial foothold in an AD system via NetNTLM by performing a password spraying attack. For the purpose of the lab we are given a custom python script which performs the attack but told we could also use Hydra. The login... |
I've been using multipass to quicly spin up vm's on my mac for my some CS courses which required a linux distro, but I'm getting into pentesting and will need a solution. Any advice or opinions on the tool welcome. I wouldn't want to start using it and then 3 months into it realising I need to rethink my setup.
Cheers
|
Chance is one gets an invalid certificate warning when one follows this link https://www.cnss.gov. As explained there (same warning) this is on purpose, and the solution is supposed to be to install1 extra root Certification Authority certificate(s) in the machine or browser.
Is there support in the X.509 certificate f... |
Environment:
A multi-tiered Active Directory (AD) where tier-specific admin accounts are restricted to log on to only their tier servers.
Microsoft's Certificate Services (CS).
Let's say the CA tier is A and the admin requesting a Code Signing certificate is in tier C. The Code Signing certificate is a user-specific ... |
The vulnerability test from Nexpose scanned the HP printers and last scan shows
"Blind SQL Injection / Remedation plan: Ensure that the Web
application validates and encodes user input before using it in a SQL
query.", CVSS 9.
Can someone explain how a printer can have this vulnerability? Is it a false positive? Firm... |
A few days ago I found a vulnerability in a site of scope using the Burp suite scanner with the command nslookup xxx.burpcolaborator.com exploit with the following feature:
Issue: OS command injection
Severity: High
Confidence: Certain
the vulnerability only responds when using "`" and only responds to the nslookup... |
Say there is a web page with two 3rd party javascript URL scripts embedded in it. One creates a support chat window and the other creates an iFrame within which a user enters payment information into a form.
If the support chat script was compromised and could it get access the payment information? e.g keystroke loggin... |
Microsoft Excel supports Python scripts (source).
VBScript Macros within Excel are known to be a security risk (source). If I read this emotet article right, then VBScript macros allow arbitrary code execution.
Do the included Python scripts have the same security issues as Excel VBScript Macros? Are the Python scripts... |
Morning, I recently had need to check for malware on my PC by dumping the memory and searching for unwanted processes which could be malware, my question it's, is it possibile for malware to detect memory dumping, I am going to analyze the memory dump with volatility.
Will I be able to detect every process and don't le... |
In ISO 27005 Annex C "Examples of typical threats", under "Unauthorized actions", I do not understand the example of "Fraudulent copying of software".
From my point of view this is kind of a "disclosure/information leakage"? I'm not sure what it means.
|
I am exploiting CVE-2015-8249 on metaploitable 3, but reaching https:/targetip:8383 it says 503 error why?
These are the sources I am following to exploit:
https://www.hackingtutorials.org/metasploit-tutorials/metasploitable-3-exploiting-manageengine-desktop-central-9/
https://era.library.ualberta.ca/items/ada5c209-9f7... |
True random number generator quality can be checked with statistic tests like the NIST suite or DIEHARD suite but after time, how we can check for its durability and whether it still possesses the same quality of randomness ..no temperature effect or hardware trojan-like entity disturbed it.
|
I believe this question is covered as the problem is straightforward. But, as I am building a web service from scratch, I'd like to have some advice on how to do it better.
Let's say my web service gives some bonus tokens to any new user when they click a button "Get my bonus". As they can collect and transfer these to... |
Should I worry if my "serial number" is leaked? What could an attacker do with it? Social Hacking? Real Hacking?
|
link to questionable installer
this is the legitimate page to download spybot by the way (the manufacturer's website provides 3 links and i chose this one)
upon installing it opera was automatically launched on my device even tho i had never installed it and i found this
there is also the theory that some malware migh... |
We're experiencing an issue, where SSL server-certificates issued by our own internal PKI will show as invalid in the browser, when accessing the site.
The error is NET::ERR_CERT_INVALID (Tested in Edge and Chrome). IE shows Mismatched Address, which is peculiar since it does in fact match.
We have tested also in Firef... |
I first wanted to simulate a WEP wi-fi network using virtual machines and then intercept data/crack it but it seems that I need actual wireless interfaces which I do not have and using my own in my actual pc also seems like it won't work with VirtualBox. But if you know a way please do let me know.
I then found this: H... |
As per the recent jabber.ru MITM attack:
The attacker has issued several new TLS certificates using Letβs Encrypt service which were used to hijack encrypted STARTTLS connections on port 5222 using transparent MiTM proxy.
My understanding is that (allegedly) the hosting provider (Hetzner) simply rewired the networkin... |
We are integrating our application with SSO using Entra ID App Registrations and configuring OIDC.
When our application receives the ID token from Microsoft Entra, the iap and exp values seem invalid. This has been occurring for a few months now consistently, ever since we first started to integrate with Entra ID.
The... |
A guy asked to borrow my phone to make a call. Instead of giving him my phone, I asked what the number was, put it on speaker and made the call. Someone answered but barely talked, she sounded maybe confused? I hung up and told the guy she didnβt answer never mind, and he then tried to tell me he knew me? Iβm confused ... |
How can we detect a malware which is fragmented across many packets , do we have to do some prefix /suffix matching kind of approach?
Does tools like snort,Suricata support this ?
|
If an SVG file with an XSS payload is hosted on say cdn.example.com and is loaded as a display picture on say mainprod.com, can the XSS payload within the SVG file access and steal cookies from mainprod.com despite the Same-Origin Policy (SOP) being in place or would SOP prevent it?
|
Today I wanted to visit https://scp-wiki.wikidot.com/scp-4999 to conduct some scientific research. Upon loading the page, I was greeted with a text saying Russia (the country I'm in) and Belarus are blocked from visiting this website.
This is all cool and completely understandable, but it made me wonder how exactly the... |
I am trying to perform XSS but to get out of the context and write the payload I need to use Angle brackets and the angle brackets are html encoded. I tried double encoding technique with url encoding+html encoding, url encoding+url encoding and html encoding+html encoding but none worked. Can you help me with this?
|
I am using VirtualBox, Kali linux as the attacker vm and xubuntu as the supposed AP. However, I only have my wireless pcie card on my actual pc and it seems that making a virtual interface card doesn't work unless I am doing it wrong.
Is there any workaround or a way to use my actual wifi card? Thanks.
|
I used to use a program for a long time, but then I found out the program (allegedly) had a virus so I went into Programs and deleted all of its files (without an antivirus).
But I really like that program so I'm wondering if I could run it safely.
One of my ideas was to download the program, run my antivirus, hopefull... |
Are the most modern CPUs still susceptible to attacks like Spectre and Meltdown?
Is it worth enabling the fixes in kernel (which hit performance) ?
Lets say high end laptop CPU such as the AMD Ryzen 7 7840U Processor.
Is it fully immune in HW, or does it still require software mitigation in the kernel?
|
Assume a website whose Common Name of SSL certificate is this
myonlinebank.example.com
Assume a website whose Common Name of SSL certificate is this
*.example.com
Users are using adguard dns.
dns.adguard.com
And when they try to access the first site(the one without wildcard certificate), they get this error:
NET::E... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.