instruction
stringlengths
24
29.9k
I have a web server with each web application running as it's own machine level account. The server only hosts the web applications, no other services, dbs, etc. Apart from the web server processes, nothing else should execute as these accounts. I keep thinking that if I triggered an alert should any other process be c...
Bootloader of the BitBox02 crypto wallet verifies the main application with the public keys that are attached to the firmware update itself. Next to that, there are signatures of the public keys, signed by the company's private key. Device holds 3 root ECC public keys (Github permalink), embedded in the bootloader and...
I'm looking for a program for Windows that can securely store my code. The program should be able to encrypt my files on-the-fly, such that only the file I'm currently using is kept decrypted (mainly the current source file(s) I'm working on in Visual Studio 2022 for confidential projects). Once I'm done with the file,...
Four discrete organizations wish to share calendars, files, and folders for collaboration purposes on multi-year projects (including regular online and in-person events). Each one has their own separate environment (MS 365 and proprietary), with strict data sharing protocols (outside users cannot simply be added and th...
I'm digging into proxies and VPNs to wrap my head around their security aspects. Wondering: can a proxy server sneak a peek at my raw requests and maybe even tweak them a bit? my connections are HTTPs
I'm currently working on a UWP app that involves validating redemption codes against a Cloudflare KV storage backend. That's all the backend server is for. I want the app to check the redemption code against Cloudflare KV using an API token. However, I don't know how to handle this API token securely. I want to avoid e...
We wan't to prevent attacks comming in from src attribute "javascript:" but still allow lnline script tags. Currently the only option is to add sha-hash's but there are too many inline scripts to do this. Unfortunately we can't modify external software to fix the input validation but we can add headers to it since it's...
I have captured a memory dump of recent Ubuntu 22.04 kernel 6.2.0-39-generic. captured image with LiMe and analyzed with volatility3. did a yarascan against all known rules and found a suspicious amount of matches for spyeye. Here is the output Now I'm checking these results against a clean install of Ubuntu 22.04 with...
Windows has offered the ability to download updates from machines in the local network for some time. My gut feeling tells me this would be a great attack vector for Windows security vulnerabilites. Have there been security vulnerabilites (be that remote code executions, information disclosure or other) in this feature...
I have to scan 2 API requests and for the second API request to be successful, the first API request must be successful and vice versa. Each time Burp Scanner sends a request, it should go in this order: Request 1 Request 2 Request 1 Request 2 and so on. How to order the requests?
After applying web vulnerability scan on a site that I have, I found a vulnerability called Cookie SQL injection, and applied on the requested cookie. What is this vulnerability? and how can I solve it?
I am having a hard time understanding the different methods of e-mail verification. I know about DKIM, SPF and DMARC. If I would like to know whether an e-mail I received actually came from the e-mailaddress that is shown to me in my e-mailclient, how would I go about that? For example: I receive an e-mail from user@ho...
We have a situation of the session_state param on an OpenID Connect/Oauth app is sent on GET. We asked the developers to send it on POST. Developers claim that because standard OIDC/OAuth use 302 redirects, GET is the only option and they cannot use POST? Is that correct? If yes, can you point to the standard doc expl...
If I have a system where I have 100% control over the client operating system and the server operating system, is there any use case for enabling more than one cipher suite (or any of the options that something like openssl will let you configure)? Given the fact that I want to take advantage of processor extensions in...
I'm reading an article on Okta's engineering blog, which contains the following paragraph: Some of the disadvantages of cookies include: Cross-site request forgery attacks (XSRF or CSRF): CSRF attacks are only possible with cookie-based session handling. The SameSite attribute allows you to decide whether cookies shou...
I’ve been using NextDNS to monitor DNS lookups on my devices in an effort to figure out how they’re being remotely controlled and I notice that ns.sipgeo.t-mobile.com is simply able to bypass both DNS and VPN settings on my iOS, iPadOS, and macOS devices. Instead of using the DNS resolver app (i.e., the NextDNS app), (...
I am not very skilled at linux and besides reading about clone and unshare I would love to have some second opinion on the situation: The setup A process I intend to run is an automated "chrome service" that visits sites. These sites may be potentially unsecure. Chrome itself runs in a sandboxed environment, which is q...
I'd like to do Cloud, Security, and Programming, ideally in Python/Golang. To move from process automation towards asynchronous, distributed, autonomic systems. Security inspired by DevOps/SRE practices. That's my ideal trajectory. I've been doing mostly SOAR and related stuff within Security Operations - a little clou...
I know that in Active Directory environments passwords are stored in the form of hashes depending on encryption types used in the environment. I understand also that when using AES as a symmetric encryption type, the user password goes through PKDF2 first which generates a key derived from the password, salt included. ...
It is known that an authenticated encryption scheme is better than just encryption because, in the latter, an attacker can alter the ciphertext, which cannot be verified. In the former, altering the ciphertext can be detected by authentication tag verification. However, it appears to me that in an authenticated encrypt...
When Telegram downloads files to internal storage cache, does the ISP see the data that was downloaded? Or can they not see that at all or due to encryption?
I have a question regarding Active Directory Security. I can export Active Directory Object information by any 3rd party LDAP Export tool from any workgroup computer which is connected in my network. For example: I used LDAPDomainDump tool. I installed it in a linux machine which is connected in my network but not in m...
I have an issue where I have an iOS app which is pinned to a root certificate of GlobalSign which is due to expire early February. This is their G2 root AlphaSSL cert. We currently have a site certificate coming off of it which is due to expire on January 1st (10 days away) we have renewed the certificate and because i...
If someone hacks into your WiFi and comes through an unlocked networked and knows your password and IP address and learns the specs on all your devices, the computer and cellphones, the smart TV, are all these devices now compromised forever with his knowledge now of the specs on devices? Also if you have bluetooth ena...
Question 1: Which is more secure between an up to date custom ROM and an outdated official ROM ? Question 2: If an up to date custom ROM is more secure, why is Google making it harder to pass SafetyNet on them than on outdated official ROMs ? Details: Up to date custom ROM: Android security patch: latest Google Play s...
i wanna execute ls command inplace of the output being "your name is ls" is there a way to do it ? read -p "name??" name echo "your name is $name"
my goal is to upload photos such that I preserve anonymity (not so concerned about WHAT is being uploaded, but trying to conceal WHO is doing so). I came up with the idea of taking a screenshot of the photo on my computer, pasting it in MS Paint, then saving this as a PNG. Then upload the PNG onto Postimage. Could some...
A worldbuilding technical question! I am an extremely evil power-mongering country government. There is a company S under my jurisdiction, physically located completely inside the borders. This company provides services worldwide, including a customer in a country Y, which I am in a hostile relationships with. I have z...
I understand that a rooted phone exposes its user to security issues, because a malware could do more damage in a rooted environment than in a non-rooted one. But why target up-to-date, non-rooted custom ROMs like Lineage ? In this answer, it is said SafetyNet, etc. aren't about keeping you secure. They're about keepi...
I have just signed into google using my browser, and google two step authentication has just started. When signing into google on my browser, it informed me that an authentication had been sent to my YouTube app on Rich’s iPhone. How does google know the name of my device? I don’t believe this is included in the user ...
I've observed that React can HTML encode specific characters to prevent XSS vulnerabilities in certain contexts. For instance, consider the following code in App.jsx: function App() { const XSSProblematicChars = "><'\"()&:`"; return ( <> <h4>Displayed: {XSSProblematicChars}</h4> ...
A couple of my friends have been in a kind of pickle recently. There have been attempts to hack their Telegram accounts and hackers somehow learned their one time pass codes but the login attempts were thwarted because my friends had long passwords (second-step verification). My friends have wildly different setups: th...
There have recently been several reported security issues with OpenSSH (Terrapin, double-frees, remote execution, X11 forwarding vulnerabilities..). How safe is it for a server to expose OpenSSH (using public key authentication) to the internet? For example, if the server were significantly (e.g. 5-10 years) behind on ...
I'm reading https://drive.google.com/file/d/1aeNq_5wVwHRR1np1jIRQM1hocrgcZ6Qu/view?pli=1 On page 44 it mentions about a way to exploit IIS servers, I tried to reproduce it but it didn’t work. I created a Windows 2016 IIS server and add a virtual directory /test/ and placed a file in it, and I can access it via hxxp:/...
Some of you might know privacy.sexy. It gives you plenty of options regarding your Windows privacy and security settings. However, after a major Windows update, those settings will be reset by Windows. I developed some code to keep my settings persistent even after those updates. For now I started by creating a Service...
Gopher protocol is used a lot when exploiting SSRF, but how? a Gopher URL takes the form: gopher://<host>:<port>/<gopher-path> but let's take this example: gopher://10.10.10.3:80/_POST%20/login%20HTTP/1.1%0aContent-Type:%20application/x-www-form-urlencoded%0aContent-Length:%2041%0a%0ausername%3dtest%26password%3pas...
Is PSD2's Strong Customer Authentication requirement possible to satisfy with secure 2FA solutions, such as TOTP and WebAuthn? For the purposes of this question, I'm classifying all systems where an OTP has to be transmitted as "insecure". It seems that the most common way to satisfy the PSD2's SCA requirement is with ...
I have an iPhone SE 2020 running ios 16 that got water damaged and now doesn't even switch on. It has some Signal messenger messages on it that I want to recover. Signal ios app version was up to date as at October 2023. On the damaged phone, Signal was protected by a pin code. The phone itself also had the pincode an...
I've had some arguments with people about securing RDP access to servers: Team 1 (including me) suggests that direct RDP access should only be possible with an (separate) administrative account. Team A suggests that one should do RDP login with a normal privilege account and then escalate privileges locally (run as ad...
The scenario is: you have refresh token that is valid for a longer period of time and an access token that is valid for a shorter period of time. The setup: There is a client, application server and authentication server. The client stores the access token in browser. The application server stores the refresh token. Th...
I know the safest bet If I want to remain anonymous is having 2 separate computers, but I was curious if having 2 OS in different hard drives (both encrypted) but on same computer the same? Is the hardware linked? Like if I were to use one OS to do sketchy stuff could that be linked to the other OS where I would normal...
Some companies such as Github suggest passkeys replace both passwords and 2FA: passkeys satisfy both password and 2FA requirements Github thus allows logging in with a passkey without any second factor, even if you have one enabled (like a authenticator app). Consider a example scenario where a user's passkeys are st...
In a small company, we have an issue suspecting a former employee has forged an e-mail to our company from his Hotmail account by changing its date and recipients in the EML file, claiming that the recipients were aware of the content by the date that he is showing. However, we have never seen that email. We may reques...
My very superficial understanding is that for SOC2 compliance, every change must be reviewed so that no one person can make production changes without someone else being involved. How would that work in a company with one person? Similar if you have two people but sometimes one person is sick. Are you meant to just not...
The Intel Management Engine (ME) is a security risk which I would prefer not to take. I do not trust it, it seems to be a backdoor, and there are reported vulnerabilities on it. I do not trust the neutering process to either partially, or fully, remove it. Additionally, it is also becoming more difficult to find CPUs w...
The majority of virus/malware is stored and persists on the hard drive, Therefore by formatting the hard drive or re-installing the operating system, the virus is removed. However, the average laptop also provides other means of infection persistence, possibly via the CPU(cache), Graphics card, RAM, and Motherboard. Ho...
Running the following code on a linux machine returns the partition tables and partial config of the hard-drive and USB devices. fdisk -l returns Disk /dev/nvme0n1: 238.47 GiB, 256060514304 bytes, 500118192 sectors Disk model: PC300 NVMe 256GB Units: sectors of 1 * 512 = 512 bytes Sector size (logical/...
I have a Rust application receiving a lot of data. The programmer can make different Python files to test different algorithms on that same data. He uploads the Python file and in Rust the Python-file is executed using PyO3. So the purpose of the Rust application is to execute arbitrary Python code, it is an internal a...
At the moment to log into (for example) Paypal I type a password then the code from Google Authenticator. If I understand correctly having a passkey installed on my phone eliminates the password. It would be like a website requiring only the code from Authenticator and no password. This is certainly more convenient, bu...
Apple provided the capability of using TOTP within iOS itself and I noticed there was a section for Use a verification code on a website or in an app which bypasses the QR Code. My question is whether that the setup key in the setup verification code dialog is the same as the HOTP Secret like the one used in https://w...
I use this tutorial to spoof with Kali Linux on VirtualBox: https://www.geeksforgeeks.org/ssl-stripping-and-arp-spoofing-in-kali-linux/ However got some errors ip route: Route information 10.1.80.121 dev calie682995647a scope link 10.1.80.122 dev calie71c7941af4 scope link 169.254.0.0/16 dev virbr0 scope link metric...
i have tried this command hydra localhost http-form-get "/DVWA-master/vulnerabilities/brute/?username=^USER^&password=^PASS^&Login=submit:F=incorrect:H=Cookie\:security=low; PHPSESSID=rch1oft4bbq68a3k656kla2geg" -l admin -P passwordlist.txt i have installed dvwa project on my windows machine and i am testing this coma...
Whenever the topic comes up, almost every source recommends to never store authentication tokens in a place where they can be accessed by client-side Javascript. The recommendation is almost always to store them in an http-only cookie to protect them. My interpretation of this advice is that this is meant to limit the ...
In TLS we have such an extension as EMS (extended master secret). It has been applied to protect the master secret. But I don't understand how it helps against triple handshake attack. I assume that attacker can use two master secrets (one with client, second with server). So attacker can read all messages. Where is my...
Twice now, seemingly randomly, I've been redirected to an ad site. I believe it has occurred both times when I have a new tab open, type what I'm searching for (Google is my default search engine), press enter and then end up on the ad page. As these links could be malicious, I'd advise against visiting them without pr...
I have been looking around at various encryption schemes, and I haven't found anything exactly like what I want in terms of user experience. If what I want isn't a thing, I assume it's been thought of, but other approaches won out. So can someone help me understand what would be wrong with a security model that works l...
I have an Android application distributed to my users through an .apk file. That app collects some data, and my goal is to upload that data to a cloud service, like BigQuery. To achieve this, I am using my BigQuery's service account credentials, and at this moment, they are hardcoded into my code. I thought about encry...
How do I indicate that a specific document or transaction associated with a particular signature should no longer be considered valid? I'm talking of recalling a signed document, not revoking the private key, because with the private key I can sign two documents and I need to recall/invalidate only the one.If revoke th...
I am trying to understand NSEC3 record when querying for existing domain name, for NXDOMAIN I understand how it works. RFC has example about WildCard, NODATA & NXDOMAIN So I fired these queries using dig for google and netflix and noticed that fist NSEC3 record(CK0POJMG874LJREF7EFN8430QVIT8BSM.com.) is same , is that ...
I have to transfer some files such as movies, TV series and other large stuff (so I can not to use a cloud) from a virtual machine to the host. I read that an infected virtual machine can spread malware to the host using the shared folder, so I didn't create any shared folder between host and guest because I'm using th...
Context I'm working to make an embedded devices safe against physical access. (publicly accessible device and can be easily stolen) I already made the following action : secure boot is enabled on cpu, bootloaded is signed Image is also signed and verified at boot the base rootfs is protected against modification by dm...
I have a desktop from ~2009 and a laptop from 2014 (Samsung NP700Z7C) that I'd like to give away so people can reuse parts if they wish to. However, I don't want to take any risks regarding personal data (both were my personal PCs, with all my life on the drive). Is removing the hard drive enough of a security measure ...
As an avid proponent of "don't mix work and pleasure," I have been using Microsoft Authenticator for personal use, and my company uses Duo mobile for enterprise security. This solution is clunky, and I really like the Duo interface much better than Authenticator. How safe is it to use Duo as the sole authenticator for ...
I have been assigned an application that is a few years old now, written by people who are no longer at the company. There is little-to-no documentation on processes or code. It signs firmware for a System to accept, while digging through its source code it appears to sign and verify with the following commands: Sign: ...
Generally, for a TGS request, we are required to have the corresponding TGT ticket, the user blob encrypted with TGT session key, and SPN service. It means that the attacker should know the TGT session key to proceed with the PTT attack in order to request for the TGS ticket. If the TGT Session key is not required, the...
While analyzing a web application, I identified a path of the type https://example/remove/123, which allows a user with lower privileges to remove a report created by a user with higher privileges. In theory, the user with lower privileges shouldn't even be able to view this report, but in reality, they can even delete...
I want to use my PC both for gaming and for stuff like keeping cryptocurrency wallets, online banking, etc. I need to install games as admin but of course I don't want them to be able to access my wallets data in any way even if they have keyloggers. Also games require full performance. The only way I see to achieve th...
Recently I have been facing an error while using Metasploit. I was trying to exploit Windows 7 with eternal-blue vulnerability. After creating a meterpreter session I was trying to maintain a persistent connection. So, to do this I used exploit/windows/local/persistence_service. But whenever I try to exploit with this...
I'm working on idea for a project the goal is to allow a user to share their encrypted content with friends while ensuring the server and none friends maintains zero knowledge of the actual content. Here's an example structure of a user: User: { name: String, content: String (Encrypted), friends: List[User...] } ...
I was considering using passkeys as a 1FA. I wanted users to login/register without email or password and without logging their IP. But being anonymous would probably bring very bad things to any site. So question is: is using passkeys anonymous? Can users be traced back to their IP or cloud accounts in case of them do...
I was talking to my friend who is building an AI startup, and his premise was Deep Learning, can somehow be used, to predict, when fed the correct data (input) and run for multiple (n; n = large) iterations, can predict break encryption, whereas I said, that something like Elliptic curve would be hard to predict and be...
I use two computers every day, my home server which is a desktop system and my laptop. Both systems run xubuntu and, being mostly a command line user, I use ssh to connect between the systems, to connect to various headless Raspberry Pis and Beaglebone Blacks and to connect to remote servers. At present I have a sligh...
During remote attestation, a device sends the server the EK certificate, AK public, AK name. By using tpm2_makecredential/tpm2_activatecredential, the attestation sever can confirm that: the EK is resident in the device TPM, and the AK that the "AK name" used in tpm2_makecredential referring to is resident in the devi...
The EU eIDAS Dashboard serves as a repository for trusted "trust providers" in accordance with the eIDAS regulation. The provider's certificates are listed within the dashboard. You can find an example here. To retrieve the certificate in DER format, it can be obtained as a base64-encoded string by clicking the "Base 6...
Let's assume we're running on mbed system with internal and external RAM. Dumping external RAM is much more easier for attacker on such systems when debug ports are locked. I'm wondering if the context passed to mbedTLS APIs carries any sensitive data that could be used to get the secrets(ie. private key)? Should it be...
i am trying to print the output of HELP command not the output of me connecting to the SMTP server that is how my code looks like **import socket s = socket.socket(socket.AF_INET,socket.SOCK_STREAM) s.connect(("localhost",25)) s.send(b'HELP') print s.recv(1024)** that is what i am geting that is what i want to see
I have now done the tedious work and enabled 2FA for all accounts in my gopass (if the site offered an option). Some only offer insecure SMS or a proprietary app, or even nothing at all. What is noticeable, however, is that discussion forums do not offer 2FA. Did I miss an option? Some hidden feature? Stack Overflow /...
The existing system involves storing the bearer token in a cookie to fulfill a customer request of not only downloading an attachment within the application but also opening it in another tab. This is achieved by utilizing the client application, which operates in SPA (React), with Spring Boot as the backend. Security ...
I’ve been exploring options for device isolation within MDE. I have Windows 2008 R2, Windows 2012 (they do not support device isolation at all), Windows 2012 R2, and Windows 2016 (they DO support it, however one would first have to migrate to the Unified Agent). How to isolate these old servers? One way of addressing t...
I want to solve an apprentice-level lab on PortSwigger.com focused on file upload vulnerabilities; the lab is called Remote code execution via web shell upload. The labs on PortSwigger.com encourage the use of Burp. However, while Burp is convenient, I've been able to complete most of the labs with Firefox's Inspect El...
A URL is followed by a number. Changing the number will change the content of the web page. Now I know it's insecure direct object reference (IDOR). What should I do to fix this vulnerability?
The OAuth2.0 Implicit Flow allows to obtain an Access Token directly with just one call to the Authorization Server (AS), without the need of a second POST request to the same AS. According to this article, the OAuth2.0 Implicit Flow was conceived as: The Implicit flow in OAuth 2.0 was created nearly 10 years ago, whe...
GTK is transferred at 3 message. https://www.wifi-professionals.com/2019/01/4-way-handshake What is for GTK key in 4 way handshake while PTK exists?
On our company network, suricata just raised the following (single) alert: { "timestamp": "2024-01-05T12:42:28.511703+0100", "flow_id": 1276412390854359, "in_iface": "igb0", "event_type": "alert", "src_ip": "10.1.1.13", "src_port": 53670, "dest_ip": "188.114.96.3", "dest_port": 443, ...
For software that process untrusted data and have an option to use hardware acceleration, does enabling hardware acceleration increase the attack surface of the software? Examples of situations where typical software process untrusted data: using a web browser to access websites on the internet, using a video player to...
I want to create a server where after the user logs the server gives them a randomly generated access token that is hashed using SHA256, that I store in the database a long with an expiration date, I thought this was secure, until I remembered that the access token basically acts as a temporary password, which a hacker...
I've gone through a related question on how to protect data in case of unauthorized physical access to a server, where the consensus seemed to be that preventing data access when someone has physical access to the server (the machine is turned on and running applications) is nearly impossible. Despite this, I'm still e...
Is there any way I could inspect the traffic from an untrusted device connected to my network? I would like to get a router that has ssl inspection capabilities, where I could check the https packets sent through it, to check if cheap devices I have pose privacy or security risks.
This "correct horse battery staple" XKCD comic #936 was a topic discussed here already. However, I saw no one suggesting combining the second method of using dictionary words with an "injection" of extra non-alphabetic characters. Wouldn't that make it the best of both worlds without sacrificing the rememberability too...
I found several new folders, each containing 10 small files with random content ( a chaotic picture, an rtf of random letters, a corrupted doc file etc...), all the files were created at the same time, owned by administrators, and accessed later. Comodo scan found no threat and I couldn't find any info about this. The ...
I have a RDS database on a VPC which is public with a password. I have some lambda functions (that are not in a VPC) that communicates with this database. To be able to do that I had to modify the security group of my database that allows all trafic for any IP adresses. For me it's the easiest solution, I don't have to...
i have a question many people asked in the last years but there seem to be no answer. So i will reask that. i am running "airodump-ng --essid [MyAP] -c [MyAP-Channel]" and getting no info about connected stations. I do receive some unassociated devices but my own devices don't show up and there should be at least 3 act...
How can iplocation.net know my country if I use a VPN thru Opera Mini on Android? Accessing myip.com it says "no country". But accessing iplocation.net shows my real city and provider! And a different IP address from myip.com, of course. What's the point of Opera mini VPN at all?
How can a hacker steal my session where my form does not have CSRF tokens but my session cookies are HTTPonly? how would he get my session cookie in this case? is this possible? for example, to be clearer, I have my session authenticated in the cookie (remembering the form does not contain CSRF token) but it "cannot" b...
I looked at the documentation for cpe Naming Specification Version 2.3 http://csrc.nist.gov/publications/nistir/ir7695/NISTIR-7695-CPE-Naming.pdf Specification says, "*" or "-" is explained as "ANY" or "NA". (6.1.2.2 Summary of algorithm) But the "?" is simply a special character that can be handled by other CPE specif...
We are using TOTP(https://datatracker.ietf.org/doc/html/rfc6238) for a web application to enhance the security. TOTP works on UTC. if system clock drifts OR NTP is not synced, TOTP generated by application (like MS Authenticator, or Google authenticator or https://totp.danhersam.com/) will not be same as of OTP generat...
A definition of qualified and advanced seals can be found on this page https://europa.eu/europass/en/how-issue-european-digital-credentials at the section "Advanced or Qualified eSeal" A more detailed specification of these two types of seals can be found at https://web.archive.org/web/20180115001229/http:/eur-lex.euro...
The Subject Public Key Info field can have a value like ECDSA_P256 or ECDH_P256 when ECC is used. Why is it not sufficient to specify "ECC_P256"? In other words, why is it not enough to specify just the curve parameters (like prime p, generator point G, etc.). This would sufficiently describe the key mathematically. De...
I would like to protect a Gmail account from being hacked. Suppose I use the following approach for login/authentication: Username, Password 2FA via security stick the stick is in a place that is not accessible to the attacker Is there a realistic attack to be feared under these conditions?
This question is out of pure curiosity. I know I can send multipart formposts using curl's --form/-F option. However, I was curious to see if the same can be done with the --data-binary option? For example, if I run the following script to send a request to a PortSwigger Lab titled Web shell upload via Content-Type res...