instruction stringlengths 24 29.9k |
|---|
I recently stumbled across customer machines (windows server) that were part of the customers active directory domain and also had IIS applications accessible for the www.
I only have the vague feeling that this is a bad idea. I am thinking of an attacker compromising a web application and then being able to read infor... |
I am in the process of learning PGP (GnuPG more precisely).
I am trying to figure out which is the best strategy for my encryption ([E]) subkey in terms of expiration/revocation/renewal. Could you please tell me if the following affirmations are correct ? Because I am not sure I understand everything correctly :
Strat... |
Let's say I made a platform called the HelloWorld Platform. The HelloWorld Platform consists of one RaspberryPi that hosts PHP based REST API and one RaspberryPi that has temperature sensor that relays data to a self-hosted bash script which then sends information via curl to the RaspberryPi with the PHP REST API ove... |
Let's say there's a keylogger secretly installed in an employee's computer. The keylogger recorded a bunch of information, but the well-configured firewall blocked the keylogger from sending that information to its server.
Attacking the firewall directly might be too difficult, but what about manipulating the software ... |
When I use multiple search criteria in Metasploit it shows the results as an "or" rather than an "and". I see that this was asked several years ago so now I am wondering if this is a setting rather than the default.
msf6> search rce linux http
The results return the intersection of all those search terms.
|
It is not clear to me how the Common Name affects a certificate authority and the certificates that are ultimately created. For example, I have this simple script that creates some files for a certificate authority auto-generated/ca.* and an ssl certificate for hello.test.com.
#!/bin/bash
ORG="ABTEST"
CN="blahblahthi... |
I am reading about how certificates work in the context of X.509, SSL/TLS/HTTPS. According to Wikipedia, the client (e.g. a browser) is supposed to check the revocation status for each non-root certificate as a part of certification path validation. The preferred way (see comment) of doing this is an OCSP request or OC... |
Suppose you need a laptop repair, so you bring it to
A big box store where you have some sort of coverage (who will have the computer for 2-3 weeks)
A small chain of repair shops
a small independent repair shop
All in the United States. Now, we are going to assume you cant practically perform the repair yourself with... |
I am attempting to inject a carriage-return + newline in a HTTP request header value. My understanding is that this is possible with HTTP/2 and HTTP/3. However, when I send a request with Burp I get this error:
RST_STREAM received with error code: 0x1 (Protocol error detected)
Does HTTP/2 support newlines in header v... |
I use a passphrase on my SSH key used for git. I wanted to be able to use the same git for a few scripts I run to clone/pull a bunch of my repos.
I discovered that I don't have to repeatedly enter my passphrase if I configure my system to use the OpenSSH Authentication Agent.
I am curious if this is secure. I noticed t... |
This may be just an academic question, but I have been wondering about something, OK so for this purpose all we care about is AuthN, not AuthZ. Also, there are no users at all, just daemon-to-daemon communications.
So of course we're all used to the scheme where a client, that has been assigned an identity on an IDP, ... |
I've just added a card to my Apple Wallet and noticed that I didn't need a PIN. Now since Apple Wallet is apparently already "secure", I don't need a PIN to use it either.
Is this a loophole or am I missing something?
|
I'm looking for a standard solution to the following problem. I've been unable to find how something like this is normally accomplished. Even a key word that points me in the right direction would be helpful at this point.
Imagine two devices connected to the same WiFi network:
Device 1 - standard network host (smart ... |
Given a Wireguard client configuration file, I guess some of the fields shouldn't be shared with just anyone, like the private key, right?
Is there any other field that should be treated as a confidential value? I want to add the client config file to a repo for automation in my environment.
|
I use Conversations, and my interlocutor is Monal (or another application for iOS (you can tell which is better)).
I plan to use OMEMO for encryption. Are files and photos encrypted or not?
Are calls encrypted only using TLS and how secure is this?
How can I check that everything is working correctly?
How can I improv... |
I found a HTML injection on a markdown although it seems odd as the user already can use html in the box
So I tried to turn it to XSS but after a day with trial and error I concluded that the website has a whitelist that allows only and with specific attributes
<img src=#> anything after it will results in removing ... |
I have read up on compressed folders of file types such as .zip, .rar and .7zip being the malicious file itself (excluding cases such as an .exe file being disguised as a .zip file etc...), only requiring the user to open the file in their choice of program without even extracting the contents. How is this accomplished... |
I was reading this security advise, which says:
The neovim process binds itself to 127.0.0.1, so malicious actors on your LAN should be unable to interact with either your webextension or your neovim process.
There is a typo there, as "unable" should be "able", right?
|
Can somebody explain simply why crypt of a password with a salt (the hash result) is equal to crypt of the password with the hash result itself ?
Surely there is a simple mathematical explanation. I asked Bing AI Chat and she said :
When you use the crypt() function to hash a password, the resulting
hash includes the ... |
Nowadays, 2FA apps usually require you to insert a number which you are presented with when trying to authenticate. For example, the following screenshot is from Microsoft Authenticator:
This is called number matching, and is in contrast to notification-based 2FA which would simply present the user with a notification... |
I have a mobile app deployed to millions of user in both Android and iOS.
My Security dpto rotates our certs once a year.
Our certs are issued by GlobalSign.
I would like to pin the certificate without having to worry about the rotation of those, so I would like to:
Pin the Root public key
Pin the leaf FQDN (CN)
The ... |
We have an application that holds a bunch of passwords in an encrypted vault for various purposes. What is the best practice for storing the key for that vault? There feels like there's a bootstrapping problem where the master key needs to be in our source code or accessible unencrypted somewhere, hence the bootstrappi... |
I am trying to understand in detail how does one "express" trust in someone else's public key in PGP.
As far as I know, in PGP you associate uids (for simplicity, say that these are emails) to public keys, and this trust assignment process says (or should say) something like "I trust that key 0x1234 belongs to user ali... |
So what I want to do basically is what BDFproxy does on the go, I want to modify a file (on the disk) to embed another PE in it and have both working, it does not matter if they work concurrently or when the main program finishes the embedded program works I just want to embed them in any way possible and if the Metasp... |
I am currently working on an open source project to securely store notes, payment card numbers, etc. I would like to implement a zero knowledge encryption method so that no one but the user can decrypt this data.
Unfortunately, I am stuck on 2 things.
How can I securely store the derived key in the browser? I want to ... |
I'm trying to build an endpoint protection software on MacOS, apart from ESF or OpenBSM, I need to block and detect malicious softwares.
I found xprotect to be useful,
https://www.sentinelone.com/blog/macos-security-updates-part-3-apples-whitelists-blacklists-and-yara-rules/
https://support.apple.com/guide/security/pr... |
Can the hijacked browser's history and saved information be viewed?
Is it possible to create a backdoor in the browser? In other words, can it be secretly redirected to any site or downloaded and opened any file without the knowledge of the other party?
Can any changes be made to the browser's settings? And for these,... |
From what I understand, argon provides a delay between password attempts. Does luks allow increasing or reducing the delay?
|
How does a timestamp prevent use of a leaked expired certificate to sign a malignant executable?
If it is supposedly fine to share or leak expired certificates then why is it safe to allow use of such certificate to sign code if the signature is timestamped? Should not verification reject all signatures that were creat... |
I recently looked into the topic of MFA in combination with some hardware authenticator (USB keys like Nitrokey/Yubico) to potentially improve the overall security of my digital daily activities (web email, online banking, etc).
For this, I read several articles and watched some videos on the topic, but I still do not... |
I decided to move to self-hosting because it is cheaper.
What I want to host:
My personal website
Some apps for fun
Maybe later a Honeypot
I have my old laptop acting as the main host. It has Ubuntu installed with virtualbox.
What I plan to do is create a VM on the main host. For the OS I think it will be Alpine Linu... |
If we buy for instance a laptop with an OS pre-installed e.g. Ubuntu and but the original seller was not reputable and there are doubts with the preinstall.
My question is: if we use the laptop to download Ubuntu and create a USB bootable iso to wipe out and re-install the OS, is this process safe if we assume the inst... |
Let's assume that the only attack to be feared on a computer is one via the network in which the machine is embedded.
What options does an attacker have if the machine has no open incoming ports?
(For example: NMAP cannot find a service with an open port.)
|
What are the main kinds of hacks that can be used when passing user input from the command line, and what are the key techniques to prevent against them (like to prevent against browser XSS attacks, you typically escape the HTML before rendering in the DOM).
But for the command-line, I've only just started to think abo... |
As I understand it, a sandbox is an isolated environment on a machine, used to protect the host from the programs in the sandbox.
Is there something similar but in reverse, for running important programs on a potentially hostile host?
For example, you need to run some very important program on a potentially hostile hos... |
I am verifying the Whonix Linux Installer bash script.
I imported the GPG key first following the instructions from the wiki using the Debian procedure.
I could successfully verify the Virtualbox image.
Although when verifying the dist-installer-cli from here using option B with
gpg --verify-options show-notations --ve... |
I have received many security emails from LinkedIn over the past few weeks. An example is shown below (redaction mine)
I do not live in the USA and I did not try to access LinkedIn at the times these were received.
Two things suggested to me that this could be a phishing email
A slight grammatical mistake "to prevent... |
I just stumbled upon this fedramp document: https://www.fedramp.gov/assets/resources/templates/FedRAMP-Moderate-Readiness-Assessment-Report-(RAR)-Template.docx
It contains the following note in 4.2.2 Transport Layer Security:
Note: DHS BOD 18-01 disallows TLS 1.2 via HTTP Strict Transport Security (HSTS).
I am genuin... |
I have submit the following text <script>javascript:alert(document.domain); in a feedback of a restaurant listed on a website and feedback is sent to website not restaurant.
I want to verify but I am not sure if the code is valid or not according to javascript.
|
Modern laptops and mobile phone platforms are built around a main, beefy SoC, which generally supports Secure Boot for its firmware and also has a unique hardware identity that is used to attest to a remote management system that it is genuine and not tampered. Yet there are a plethora of chips, many coming from a 3rd ... |
I have my personal accounts that I have setup on Thunderbird. I have also setup my work account which uses GMail via OAuth2. My question is, do these accounts share data of any kind between them or are they isolated? Should I use for example another Thunderbird profile or E-mail client for my work account and another f... |
I am trying to follow the example of how a hash length extension attack works using the article here: https://www.skullsecurity.org/2012/everything-you-need-to-know-about-hash-length-extension-attacks
In this, the author has a concrete example running:
$ ./hash_extender --data data --secret 6 --append append --signatu... |
Due to certain circumstances, we are forced to keep some copyrighted data in an external hard disk. due to privacy concerns, we want to allow this data to be accessed only from a trusted/office provided device. if this external disk is connected to a personal or untrusted device, data should not be accessible.
we tried... |
I would like to better understand the mechanism of rotation of EMV keys used for payment cards.
Assuming that it intends to provide a rotation of the keys used for the production cards:
just recycle the keys under Master Key and get a new cryptogram to use?
generate new keys and replace the old ones?
In the event of ... |
I recently learned about the feature in Windows 10 called Windows Secure Mode (https://learn.microsoft.com/en-us/virtualization/hyper-v-on-windows/tlfs/vsm). I'm trying to understand what exactly it is trying to achieve by sandboxing itself from the operating system kerenl? The main thing I am struggling with is that i... |
I am trying to analyze HTTP traffic of our application.
Application has two accessible portals, one accessible by admin.localhost:3002 and the other accessible by localhost:3002
I have Burp Suite proxy on 127.0.0.1:8080, certs configured in firefox and localhost hijacking enabled in config.
Access to localhost:3002 wor... |
If we want to enable an authenticated connection via BLE the passkey method seems like a good idea. A 6-digit PIN is generated randomly on one device and has to be entered on the other - these 20 Bit of entropy should be a reasonable countermeasure against authenticated connections and MitM attacks, taking into account... |
What are the privacy implications of using an MDM "work profile" on your own Android 14 device? First, an MDM app such as MaaS360 must create the work profile while running in the personal profile. During this phase, could the app apply invasive device policies without informing the user (online searches, which may not... |
Let's say that there's a known digital signature issued by a trusted CA.
Normally, digital signatures need to be evaluated: checked if they are expired, revoked, if there's a problem in the chain of trust. However, if these aspects are a given, is hashing a digital signature for quick (but incomplete) validation a know... |
Whats wrong with my exploit? I'm trying to attack a Linux machine using Kali. I cannot seem to get the meterpreter session started.
|
A while ago I wanted to deploy a service using a OCI (docker/podman) container, and I noticed to me, what seemed like a possibly distributing trend. In the build file for a lot of the containers, the password is put there in plain text in docker-compose files during the build process and stored in environment variables... |
At Travel.SE, we have an HNQ: How to make my credit card "less" secure for travel? about how to reduce the number of false credit card declines when traveling abroad.
The current top answer suggests (among other ideas):
When you arrive in a new country/region, open your banks mobile app and login. Ideally do this whil... |
I was trying to encrypt and sign MIME data using openssl smime command.
I have below MIME data -
From:"=?ISO-8859-1?B?3M0SEg=?=" <abc@dcc.final>
Subject:=?ISO-8859-1?B?yNA==?=
=?ISO-8859-1?B?3IDE4?=
=?ISO-8859-1?B?OjE0?=
To:<abc@gmail.com>
Message-ID:<FFCFac8b3-9160-4dc7-9263-220e87abd@hostn>
MIME-Version:1.0
Content... |
I am writing a simple server for file uploading. I want to be able to rename uploaded files (including the file extension) and download files.
For validating the file to upload my plan was to check if the mime type, the file extension and the magic number match. Only then the file will be uploaded to the server, assign... |
In the TPM architecture, we know that after a "Measurement" procedure is performed, it is followed by a "PCR Extend" procedure, in which the resulting system configuration metrics data (20 bytes) are appended to the value that the PCR in the TPM currently stores, which (in case it is not zero, i e. "Measurement" is per... |
With Bitlocker, is there only one "master key" that is used to encrypt/decrypt for both HD and USB data?
I saw this article today which talks about sniffing the encryption key to get access to Bitlocker data on an HD. https://www.hackster.io/news/thomas-roth-breaks-microsoft-s-bitlocker-in-under-a-minute-with-a-4-raspb... |
I am not confident in my understanding of Certificate Authority and signing certificates. I'm wondering how do you verify the authenticity of an issuer when inspecting an entity certificate.
Here's the scenario that I am using to improve my understanding of Certificate Authority and TLS/SSL certificates.
Let's say Al... |
I read through the answers from this question here:
https://stackoverflow.com/questions/21297139/how-do-you-sign-a-certificate-signing-request-with-your-certification-authority
But my comprehension on the matter is still weak. I am trying to understand the difference between making a CA certificate and key with the -s... |
At work, we are deploying a new VoIP solution, and as part of that, we are supposed to install a custom root certificate on our computers and mobile devices. The manufacturer of that VoIP solution has the private key to that. The certificate is suitable for e.g. validating TLS connections.
While I have no reason not... |
Scanning my router using the private IP address using nmap reveals the open ports:
Obtaining the public IP address of the router can be achieved by executing the command:
nslookup myip.opendns.com resolver1.opendns.com
If I scan my router using the public IP address, I get a whole more open ports than those revealed ... |
While studying the XSS vulnerability, I encountered a significant doubt. I noticed that when we include " in a URL, it gets encoded as %22. Therefore, I believe we can utilize the decoded version of ", ensuring it remains as " even after URL encoding. Please correct me if I'm mistaken.
|
I am trying to work on an example for my class on how double submit cookie works and how attackers can bypass it
The idea i have is I have two domain att.com and victim.com. The login functionality on victim.com creates the session and also creates a new cookie for csrf protection that will be included in all next requ... |
I was wondering how threat actors actually test their exploits without them being automatically detected and added to the library of an antivirus detection system, thereby being marked as useless and shared with different vendors.
The simple answer would be turning off these detection methods, but how would they actual... |
Does lssas.exe store local and domain account user hashs and if lssas.exe store hash on memory, when I reboot computer attacker could not get older login user hashs right? But when I dump lssas.exe with crackmapexe I got domain admin hash but I was logged in 20 days ago and I rebooted machine a few days ago. How that ... |
While doing an internal assessment, I stumbled upon a very weird looking NTLMv2 hash (I will not use the "Net-NTLM" terminology but I'm talking about the NTLM protocol ) while using Responder with the --lm option (which afaik/what I read in the code, forces the uses of legacy NTLM authentication server) :
For this cli... |
I am trying to implement measures against csrf in my client spa.
I have the following question, since it is difficult for me to use the Signed Double-Submit Cookie.
It is possible to implement a csrf preventive measure, where the client generates a random value that it stores in memory, generates a hash of that value,t... |
I have forgotten the exact password to a locally installed Windows application I use. There is no password reset function.
What I need is a way to use a source file of the various words/characters and then pass them to the single field in the pop-up window, this should cycle through the various words/characters combina... |
I was going through this link https://medium.com/@renwa/bypass-samesite-cookies-default-to-lax-and-get-csrf-343ba09b9f2b to understand CSRF using samesite. Does that mean that the LAX+POST issue has been resolved by Chrome, which means that now there is no 2-minute window by default that would prevent user from making ... |
I was under the impression that an antivirus for Linux makes sense only for installing in business computers. Checking Norton/BitDefender/Karpesky I don't see any Linux option for the first or any non business specific solution for the other two. This is consistent with what I was thinking that an AV for any other user... |
I am trying to calculate a CVSS score for a vulnerability. In my case, to exploit the vulnerability you should have network access to the server, which is sitting behind a firewall. This server is serving an application that only computers with network access can benefit from, so it's not on the Internet.
I assume from... |
How can SMS spoofing be detected? I know we can find it by message centre, but what if in the case of multiple routing?
|
I would like to know how to wipe a SSD securely to remove virus malware and all data on it in a way that it could be reusable and can be used again.
|
I am trying to send "de-authentication requests" with Mac but all the previously used tools don't work
I was using bettercap before, now it says that deauth packet
was sent but nothing is actually happening to my own devices, so I
have to manually reconnect to wifi for it to capture a handshake
Also one of the popular... |
Following the advice in my previous question here I currently have a Rust-binary that gets executed by my main-app using std::process::Command.
The executed binary first gets validated by a hash.
The main-app should not have any limitations. But the executed child-binary should not be able to access network or denied f... |
I have done a code scan and fail to understand whether there is a real problem. For both cases I get "Vue HTML escaping is disabled.".
Case 1: <a :href="return.url"> doesn't this simply embed the value of return.url? Is this vulnerable to a XSS?
Case 2: <span v-html="htmlTemp"> I read in the Vue.js documentation that ... |
You'll see stuff like the first comment here that adding the --no-sandbox flag when launching puppeteer "is a giant security hole" (upvoted many times). Puppeteer troubleshooting docs say "running without a sandbox is strongly discouraged". Yet, it appears that you must run with this flag on Google Cloud Run and AWS La... |
I'm doing some research on .onion websites and was trying to verify an onion URL.
I got a public key from two different sources: side by side they are identical until about ten lines before the end. Which suggests to me that they're different.
But when I tried importing them both into Kleopatra it treated the second as... |
In the past few weeks I've seen periodic attempts of someone logging in to my linkedin accounts. They appear to use some sort of one time login link feature that linkedin has, which allows passwordless sign in if you know (and can access) the email address. Basically I get some one time instant login link in my inbox, ... |
We noticed FTP service going down intermittently in the server and we found an FTP user was used to DDoS the server. Then we deleted the specific user from the server. After that the user "anonymous" was hitting the server with 1000s of connections as seen here https://prnt.sc/JtCx7n1ok3Xv . Things we have tried so far... |
I have a Rust-app which uses PyO3 to execute arbitrary Python code. The Python code should only be able to do basic math operations and in now way should be able to access the network (except UnixSockets) or have access to files except a few paths.
I was able to configure AppArmor to deny network access. But now I want... |
I asked an experienced person about the needs of malware analysis. He told me:
"Learn x86, C/C++, Win32 API, Windows internals, PE file structure basics... Then when you are comfortable with these, try tools like ollydbg and IDA Pro."
But I have a question.
How much "Network knowledge" is needed for a malware analyst? ... |
All recommendations related to user authentication in mobile applications indicate that we should use oauth2 with pkce, in this case we have to use the custom tabs solution, but no browser redirection is used in any financial application (wise, stripe, paypal, revolut) authentication is done in the existing client appl... |
My environment consists of 2 docker containers, one running Logstash and another running Elasticsearch on the SAME host & SAME docker network.
I am trying to setup SSL between the 2 of them (this is because Elasticsearch needs SSL and can be reached out to by sources outside the network, thus Logstash also needs to com... |
I am not a security expert, so please forgive me if the question is too obvious. We have been working with Blowfish to encrypt some of our files. We recently updated our very old OpenSSL version from 1.1.1 to 3.0.12 and we found out that Blowfish is considered a legacy algorithm and according to them "strongly discoura... |
Yesterday I received an odd message on MS Teams (a phishing attempt) that I've not seen before.
The message is made to look like it includes 2 parties; 1 internal and 1 external, in addition to myself.
However, the 2 parties are actually 1 external party - with a display name set to make it look like this message may ... |
Is there a possibility to decrypt TLS data encapsulated within TDS Microsoft TSQL protocol?
The TLS handshake seems to occur within TDS data, right after the TDS pre-login
The handshake itself is missing the client Hello (starts directly with Server Hello). The server picks the cypher TLS_ECDHE_RSA_WITH_AES_256_GCM_SH... |
I am not very experienced nor do I have acceptable knowledge, that is why I have signed up to work on a small project to gain some experience, where they don't seem to care about security much.
After running a scan, I noticed that they have many unnecessary open ports (including MySQL server: 3306) and are horrifically... |
I'm trying to get into bug hunting. I found the following requests on one of bug bounty programs:
httx://example.com/api/news/?filter=%7B%22date_end__gt%22:%222024-02-14T13:52:45.646Z%22,%22check_news%22:true%7D&order_by=-important_news,-date_start
It looks familiar to me since I'm a coder. I recognized django QuerySe... |
I came across this article. In there the author suggests to use PKCE which is recommended by RFC 8252. But what I am a little bit confused about that the author also uses an application server that has the client_secret.
Are both client_secret and PKCE both adding security?
Or is PKCE just the replacement for the clien... |
I've searched all over to get the correct format to add the otherName SAN - with no luck. I'm trying to generate a client certificate to use with FreeRADIUS.
The following work as it relates to DNS and IP:
DNS.1
DNS.2
DNS.3
.
.
.
IP.1
IP.2
IP.3
But the following generates an error:
otherName.1 ... |
We have a WordPress form that collects data on what marketing source (UTM) the user came from and upon submission, sends that UTM data to a 3rd party. Recently, a client asked me to have a web session to remember this session data for up to 10 days (default was 15 mins). I have a few questions. ...
is there any securi... |
ESP in IPsec v2 only provides integrity of the payload, not of the header. So my question is about that. The possible dangers in not having integrity of header, while having ESP active for payload.
What are the potential risks if an attacker attempts to modify a packet header, given that there is no integrity check, bu... |
In an IPsec Secure gateway setup, why is tunnel-mode used when an external laptop wants to access an internal service protected by a firewall? Is tunnel-mode necessary or could transport-mode be used instead? Why can't a gateway perform access-control if it was transport-mode communication?
|
So if I got this right from my intense research, the following procedure would be preferrable:
Use the PBKDF2 key derivation function to derive a secret key from the users password on the client side.
Use the derived key, which was generated using PBKDF2 and hash that key with Argon2id on the server side, and store tha... |
From my understanding:
I can emulate many different architectures and systems with qemu as a user(mode) process.
There is separate user address space per process.
If a malicious process were to escape emulation it could compromise the user of the process and then get root from there.
Due to the high privileges needed ... |
I'm researching the topic of detecting registry dump from disk shadow copies and realize that I don't see any specific events in the Windows and Sysmon logs.
I tried a simple copy with the command:
copy \\?\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\Windows\System32\config\SYSTEM
Also tried PoC of the HiveNightmare vu... |
Basically, as the title says.
Neither keytool nor openssl allow that.
EDIT: apparently, pkcs12 doesn't support that. So, use JKS, which you can easily create with keytool.
|
In our development context we have a lot of different tokens. If a developer gets "permission denied", it is often not immediately clear which token was used.
I would like to improve the error message and show a prefix of the token.
Imagine I have a token like this:
aragq29uFDgfDdgf44SdfgfSSgfdRsgdDG45
I would like to... |
First of all, I must say that I'm using a VM with an emulated TPM 2.0.
I've created an LUKS2 encrypted partition and configured the TPM 2.0 to unseal the key only if the PCR 7 has a certain value.
For what I've understood so far in the PCR 7 are stored the secure boot policy, so while secure boot is active the sha1=F7.... |
I've been testing trying to deauthenticate my kindle from own wifi network. I created the following python script using scapy:
from scapy.all import(
RadioTap,
Dot11,
Dot11Deauth,
sendp
)
from argparse import ArgumentParser as AP
from sys import exit
def deauth(iface: str, count: int, bssid: s... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.