instruction
stringlengths
24
29.9k
At work, I'm used to sniffing and capturing on network interfaces by which client and server intercom on LAN in my domain so as to grab genuine business data, followed by my customized replaying to auto-testing business processing logic of certain software repeatedly. This is what I know to be a classic bottom-up metho...
I'm implementing an authentication mechanism using JWT tokens and exploring best practices for securely storing these tokens on the client side. My JWT includes a jti claim populated with random bytes to ensure the claims are not easily guessable. I'm considering storing the JWT payload in an HTTP-only cookie and the s...
I have found a lot of information on creating sessions, but I am still a little confused about working with them. For one, I am not sure how to handle updating the session on use. My understanding is that you will still have an absolute max lifespan, but it is OK to refresh the session on use? So if the user used the s...
Researching on this topic I found the answer of Conor Mancone for a similar question about whether Can an ISP detect or log specific devices connected to ISP-provided home routers?, which answer was that If you are using their device (router), then you don't really have a network of your own - your house is just an ext...
I'm building a tool and users will run it by downloading a binary. What I'm considering is good ways to secure this for the user. There's for me easy ways like "Recommend running this on a new temporary VM without internet access". I've added file hashes on recommendation but that's mainly theater. Are there other ways...
OpenSSL documentation says the following: (Source: https://openssl.org/docs/man3.0/man3/SSL_shutdown.html) It is acceptable for an application to only send its shutdown alert and then close the underlying connection without waiting for the peer's response. This way resources can be saved, as the process can already te...
I have a microservice which sole purpose is to serve as a cache for other microservices. The point of the cache is to speed up processing, but the strong password hash algo counter that purpose. (Company policy require all service to be secure even internal ones) I am considering to deliberately weaken the hash algo to...
I want to use bitaddress.org to create a wallet. Can you please verify my approach? Change the password of my router and wifi and unplug all devices from the network except my notebook. Go to https://github.com/pointbiz/bitaddress.org and download the project as a .zip file. Go to https://www.bitaddress.org and down...
I downloaded an Excel (.xlsx) file from the internet. Then I tried to open it by double-clicking on it. But it suddenly crashed. Could this mean it could've contained a virus or malware?
I am wondering if there is a practical way to establish a secure, encrypted network connection through an MITM proxy given the ability to communicate secrets out-of-band with a second, external proxy. Let’s say the MITM is part of a corporate firewall, a filtering ISP, or it’s set up by a dictatorial government. If th...
I am exploring how to use docker secrets, but all the secrets are visible in plain text format to anyone who can use the docker command. How do I ensure all secrets are sufficiently protected and not as readily accessible to unauthorized individuals? Here is what I did: I made a file called docker-compose.yml with the...
I am trying to analyze CVE-2023-34453. As per the NVD description, there is an integer overflow error in snappy-java, specifically in the method shuffle(int[] input) in BitShuffle.java. In a huge codeline this CVE was detected, and I want to assess if according to the usage of snappy-java in the codeline, if it is expl...
In any "recent" documentation regarding NTLM (Microsoft) I see it stated that the mechanism of pass-through authentication is done over a NetLogon channel, which should be secure. This secure channel is also used to pass the session key from the Domain Controller to the server. However, older information I have found, ...
I'm working on a Go application where I'm using http.NewRequestWithContext to make outgoing requests. During a recent Veracode scan, I received an SSRF (Server-Side Request Forgery) flag for the following line: req, err:= http.NewRequestWithContext(ctx, method, url, payload) Veracode seems to be concerned about the po...
My nginx backend server supports the following ciphers: ssl_ciphers "TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256" I allow the client to upload their own SSL certificate and key and...
When logging in to azure the login process emails me a short one time code to use and doesn't require a password. I am assuming it is a well trusted process in order to be used on such critical infrastructure, but I am not familiar with that pattern. What would you call it? Are there any special security considerations...
Here I have a malware sample that calls RegQueryValueEx quite frequently, without any time interruption. And as we can see, the result is quite often "BUFFER OVERFLOW". In another topic I read that this means that the allocated buffer is not big enough, e.g. the buffer is 12 bytes, but the returned value, i.e. string, ...
I dont understand this as you are either way going through multiple places in the world before you connect to the website or however it works. Does it really matter if i use an onion alternative link?
Is it possible to check against the CN (Common Name) or SAN (Subject Alternative Names) of each and every certificate in the certificate chain for a match ? I have 2 docker containers hosted on my VM, one of the containers (Logstash) connects to the other (ElasticSearch DB) and SSL is enabled for ElasticSearch DB. Logs...
Taking Microsoft's page on CVE-2024-20666 at face value, that Bitlocker vulnerability is darn serious in an "evil maid" attack: A successful attacker could bypass the BitLocker Device Encryption feature on the system storage device. Attack Vector Physical.The attack requires the attacker to physically touch ...
Does anyone know how to access the server command line and execute commands remotely in OWASP Juice Shop? Tried to find something with Burp Suite and I did not find any information on the Internet about this particulate matter.
I have implemented OAuth2 for a web app. Everything is stored in the session, and I am switching this to a database. This makes sense for the subject and roles, but it also includes the temporary values like state and the redirect uri that are only required during the OAuth process. Does it make sense to use a db for t...
My website has hundreds of thousands of html pages that are open to public. Each time a html page is requested, a call will be made to my database to get the correct data. Therefore the cost of each html request is not cheap (a call to databse is needed). I know there are rotating proxy services out there that let user...
I was asked the following question at a job interview recently: You need to reach a web server at the IP address 20.21.22.23 via browser using HTTP. Browser checks the IP address and blocks requests to the IPs that match the regex ^http(s)?:\/\/20\.21\.22\.23$. How can you bypass the restriction and gain access to the...
There is really not that great information on what the best practices are for auth in SPA/API solutions. Most of them just say use JWTs and auth code flow in the SPA. There is a ton of information regarding auth in a SPA where you are requesting third party APIs like MS Graph or Google Calendar, but NOT API's that are ...
Theoretical question - Say we have a randomly generated password with 80-bit entropy, stored as a single-round, unsalted SHA256 hash. For a determined attacker with current (2024) technology, what would be the cost of bruteforcing it, in terms of money and time? Now what if it's stored with 10 rounds of SHA256? Does th...
Does the OAuth client attach the client secret along with the access token for each API call to the resource server ?
I have a cron job which runs a curl command using .netrc to provide authentication needed to access the url curl is using. However the credentials stored in .netrc are currently in plain text. The .netrc file has 600 permissions. However, I have read that passwords stored in plain text is just plain bad. I have read...
Let's say we know as a fact that a php web application baked in telemetry to collection data. Without scanning through the codebase, any quick hack tool that we can force the telemetry become useless given that we have full access the hardware running locally. (if we can treat telemetry as data-leakage and sensitive-...
I have next code: if request.method == 'POST': exp = request.form['Expression'] for i in exp: if i in ascii_letters: return render_template('index.html', exp='', result="Only [0-9] and special characters") try: result = eval(exp) except Excepti...
I am studying malware development right now (exclusively WinAPI) and reached the topic of PPID spoofing. I understand the concept and why it is useful, however I do not understand why is it possible in the first place. Could anybody give me a few legit examples of why this is allowed and why isn't it something that wou...
Is it possible to use the symbols <, /, >, space, in the content option of a Snort rule? Or should I use URL encoding instead? Which syntax is correct? content:"%3Cscript%20" content:"<script src" content:"</script>"
So, our proxy server blocks all traffic except approved ones. Would allowing a URL shortening (aka.ms, for example) mean any URL will bypass the proxy? Or is it just a redirect and the proxy/security system inspects the original URLs (whitelisted or not)? Can we still be safe to allow the traffic to go to aka.ms?
I am logged in to my husband’s facebook account. Is it possible that I can hide my device on his phone so that he won’t notice that I am logged in there? In the “Where you’re logged in” section, there are the list of devices. Is there any way I can hide my device and still logged in on his account?
Through reading the WebAuthn spec and related MDN docs, I understand that unlike "certificate signing requests", FIDO/Passkey can have various different attestation formats and verification methods/algorithms during public-key credential registeration. The documents recommend against "profiling" authenticators. I find ...
We want to be 27001 certified and our company is based on one core application that is hosted in our cloud infrastructure but provided by a vendor. Is there a situation where an auditor needs access to the source code to be able to justify if certain levels of security are "built" into the application and that the appl...
[Originally posted on ServerFault, was told it would fit better here] Our vulnerability scanner (AWS Inspector V2) in the last couple of weeks started reporting ~10 High severity CVEs with the Linux kernel in our version of Debian (Bookworm, upgraded to latest available kernel version - 6.1.76) used by our app's Docker...
From yesterday on, all my sites (one and same hosting) has an elp.php-file in the root-folder of every domain. This file is publicly open and does show a list of all files, with possibility to edit all files (even config.php etc...) I am sure this was a hack... but how to find where it came from? I deleted all of them,...
Previously some good fellow explained the importance of verifying the public key created and offered by authenticators. As before, given the complexity of a FULL implementation of RP operation, I believe it's possible that some aspect may be mis-implemented for someone doesn't fully understand the spec (e.g. having to ...
I am trying to pentest a blazor server app but its very different to a traditional web app, client communicates to server via SignalR through web-sockets. The messages in web-sockets are MessagePack and in binary format which makes them unreadable and non-editable. Therefore, I can't intercept the messages and change t...
ULID is a specification for unique identifiers which is intended as an alternative to traditional UUID. Some of the major differences are: The creation date of the identifier is encoded into part of the identifier. Because of the above, the identifiers are lexicographically sortable. That is to say that if you create ...
My project has a csp policy Content-Security-Policy script-src 'self' 'unsafe-inline' https://*.mycompanycdn.com; report-uri mycompany.in/reportcsp In the violation logs I found with blocked-uri https://static.mycompanycdn.com/myscript.js What could be the reason for this?
I'm not entirely convinced of the importance of verifying the authenticator attestation, and I've asked a question about it, I'm open to it, and if you want, you can post an answer at that question, but this one is specifically about "section 13.4.9. Validating the origin of a credential". It says The Relying Party MU...
When HSMs are not accessible, we often need alternative methods for securely storing and managing encryption keys What open-source options exist for effectively managing encryption keys in a language-agnostic manner when HSMs are unavailable?
As I was listening to an interview yesterday, the journalist claimed that his Signal communications were being spied on by the NSA. Whether to believe him or not is subjective. Still, it is an objective truth that nation-states can break into your devices by installing malware or cooperating with the operating system r...
A typical usage pattern for me in application testing is that I will write python scripts to automate various attacks against endpoints &c. What I want to do is add a header each request of the form "Script-Name: sys.argv[0]". My burp configuration json file has an entry in .proxy.match_replace_rules of the form ...
I am testing the security of a Windows Server 2019 machine and have a question about remote access to the machine. The user on the machine has the permission "SeBackupPrivilege". I can therefore dump the "Administrator" user's SAM and SYSTEM. whoami /all ... SeBackupPrivilege Back up files and direc...
Please help me to check whether the following emails are spoofed or not since I'm receiving spoofed emails from bank and other websites I use frequently so I can raise a complaint with the bank. Delivered-To: theon@gmail.com Received: by 2002:a5d:6191:0:b0:337:4d85:da74 with SMTP id j17csp979050wru; Fri, 2 Feb ...
I apologise in advance for this question being very sparse in details and sounding rather hypothetical, reasons for this are hopefully explained below. I am not a security expert, but I am in a managerial position and find myself now arguing in defense of extra security measures for this case. My company is in the proc...
I'm a little bit of an amateur on API security. I'm building a browser-based puzzle with a leaderboard, and I'm wondering what prevents a user from simply hitting the /success endpoint with data that basically equates to { time: '3s' } automatically putting them at the top of the leaderboard without even actually finis...
I am building a pure client-side app. My users have a .kdbx vault stored in localStorage, and they can open it with a password. In order to add a biometric\quick open feature into the app I thought about creating a Webauthn entry and storing the user-hashed password into the id field of it. Later when calling verify, I...
Some email-tracking services use tracking pixels to detect whether an email was opened. The idea is to add an HTML img tag with an src attribute that links to a 1x1 or 0x0 pixel image to the email body. That link uniquely identifies the email. It looks like this: https://emailtracker.com/trace/mail/{randome-unique-id}....
I have video files stacked in zip and I forgot the password. I want to use hashcat, because john will take much longer, but the hash from hash zip2john isn't compatible and I don't know how to convert it Hash from zip2john: $zip2$*0*3*0*XX7486X3X6X2XX74ebba3e9f6119b6f9*5894*28e5fc64*e5c44a6a3ce075a7a6f1073d1d80b28e17...
I have developed a tool that can find Maven Central JAR artifacts that contain classes from known vulnerable JAR artifacts. This includes but is not limited to fat (uber) JARs, JAR bundles, and artifacts tagged with the -all identifier. In the course of my research, I have found a multitude (tens of thousands) of JAR a...
In the DNS rebinding attack, if the victim’s browser caches the IP address for any hostname used in HTTP requests for an hour, can the attack still be successful? Why? I know it is a question available in the Security course, but I did not see any satisfactory coherent answer anywhere.
In order to test data recovery apps, I have conducted experiments where I took photos and videos, deleted them permanently, then attempted to recover them immediately. The photos can be recovered perfectly, but the videos can not be recovered at all. I've repeated these experiments for days and this problem occurs cons...
Apparently, there are some problems with the new defaults that are set when one creates a PGP key using a recent version of GnuPG (2.4). I ran into this after generating a new ECC/ED25519 key to replace my "old" RSA one. The problem showed up when I re-encrypted my pass password store passwords with the new key: After ...
Firstly, a quote from a good article about the importance of memory safety by memorysafety.org: How common are memory safety vulnerabilities? Extremely. A recent study found that 60-70% of vulnerabilities in iOS and macOS are memory safety vulnerabilities. Microsoft estimates that 70% of all vulnerabilities in their p...
For example considering that ARM has TrustZone technology, and a potential reduced attack vector because it is based on a simpler RISC (Reduced Instruction Set Computing) based architecture instead of the CISC (Complex Instruction Set Computing) based architecture used by x86 and x64.
I was searching for reports about malware on the Apple App Store and only found minor ones (at least from a user's perspective) on the first few Google search results. Doing the same search for the Android Play Store leads to several severe kinds of malware. Where does the difference come from? The typical answer you f...
I have an offline network with 200 users. and routers, switches, 4 esxi servers and 1 netapp rack. After about a year, my team found out that we have a virus in the network called streamer.exe that is a coin miner but because the network is offline I think it's not really mining but is doing other things such as: cop...
Would it be possible to create a fake twin access-point for a router with a custom DNS-configuration in a way to fool mobile apps like for example Instagram to send authentication requests to my own server instead of the Instagram servers? Normally when someone opens an app like Instagram a request gets send through th...
OS is Debian. Imagine I have my own apt repo set up inside a private network. This repo is set up to provide a single package to other servers on this network. I can easily create a signing key for my repo, but this scenario got me thinking: As far as I understand, the key is needed so that whatever system downloads th...
I am tasked with moving away from implicit flow in a SPA. It is a basic solution consisting of a react SPA and a .net API, on the same domain. This web app is a case management solution that deals with medical data, running in a private network. I have landed on using Auth Code Flow in the backend with OpenID Connect a...
I.e., by comparing the dimensions of the screenshot and size / position of UI elements, without the aid of metadata?
I noticed that I seem to think of network services in three categories wrt the risk of exposing one to the internet (or a hostile network): "Low risk" services are extensively hardened. If a bad guy gets access to one, nothing happens. sshd falls in this category. Even though sshd runs as root with direct exposure to ...
Can I convert a PGP key to X.509, using OpenSSL or GNUPG? Aren't these only container/wrapper formats?
I am trying to figure out how to handle access and refresh tokens securely on the front end in a SPA. After doing a lot of reading, I still have questions/doubts about the proposed solutions I found on the internet. Basically, the internet say that the access token should be "in memory" only (not localStorage or sessio...
I'm attempting to come up with a detection for when devs commit/push changes to pull requests after they have been reviewed and approved but before they have been merged. There are various actions that I've found that seem useful like pull_request.merge and pull_request_review.submit which identify the pr and timestamp...
Maybe I'm overly cautious here, but I bought a 2nd hand IKEA Tradfri lightbulb. The package was opened so whoever owned it before had access to the bulb itself. My question is: Am I too cautious assuming there MIGHT be some form of malware on it? Background: A ZigBee worm was assumed to be possible a decade back (https...
Recently a bunch of Anycubic 3D printers have been hacked as reported in an article from bleedingcomputer.com. According to a wave of online reports from Anycubic customers, someone hacked their 3D printers to warn that the devices are exposed to attacks. According to the same text file, 2,934,635 devices downloade...
I don't remember my passphrase for my PGP key that was created several years ago. How can I decrypt my file.key to recover it? Or what should I do to recover it from my file.key?
I created a payload with metasploit and hacked my other computer. But this only works within the local network, right? I would like to know how hackers create payloads that work on targets outside the network? Even outside the city, the country, etc. Can anyone teach me? If instead of putting my local IP in the payload...
I implemented my own version of SysWhisperer2 to parse ntdll and dynamically resolve syscall service numbers in Windows 11 under the assumption that the methodology would still be able to process syscalls correctly. The program itself works to resolve syscall numbers from what I can tell by going between windbg and the...
If I take the following two commands, the results between the two are incredibly different: openssl speed -aead -evp AES-128-CBC-HMAC-SHA256 -seconds 30 openssl speed -evp AES-128-CBC-HMAC-SHA256 -seconds 30 The results for the first look like: 2 bytes 31 bytes 136 bytes 1024 bytes 8192 bytes 1...
I caught a virus because of an exe file I downloaded to my computer last week. I am replacing my modem, graphics card, motherboard, processor, ssd and ram components with new ones. What are the chances that my monitors are infected? My two monitors were connected to my computer via HDMI ethernet cable. How do I secure ...
While downloading a printer driver from the company's website, redirected to a google drive link. Google warning says it could be malicious. The company is MEPL- based in India, but it is using a driver of Pantum - based in China and distributing the driver through the google drive link. This seemed suspicious however,...
I have access to companies internal files through SSRF and Path traversal both but want to leverage it further to website takeover. Thus I can increase the impact and get more bounty then what they will pay now. I have access to files like /etc/passwd /etc/hosts etc similarly for SSRF - 127.0.0.1:22 , 127.0.0.1:25 thi...
I want my expresJS server to detect and stop any request containing XSS input before it gets saved in the database, as my website does not utilize any html input, and it does not need to. What is the best method for doing that?
I recently encountered a scenario where Mobile Application is generating CSR request, call a POST API request and in response, Ask Server for certificate. Server will respond with the temporary certificate and Mobile Application will use that certificate for further API communication to prevent MiTM. This certificate w...
If we consider that having a valid refresh token allows you to get a valid access token, then the two can be considered to have the same 'informational value' right? Then why are they treated differently in terms of security aspects like expiration time? It is often said that it's best practice to give access tokens sh...
I'm learning binary exploitation with the picoCTF challenges. I solved Stonks, but I'm trying to learn more about how the stack works. What I did was the following: checked out the source, here is the vulnerable snippet int buy_stonks(Portfolio *p) { char api_buf[FLAG_BUFFER]; FILE *f = fopen("api", "r"); fgets...
I am working on a project where I need to securely encrypt and decrypt files on a product without the ability for direct communication or key derivation after the product is sold. The challenge is that I can only store encrypted data on the product without any means to communicate with it post-sale. I've explored using...
To help developers with integrating with our SAML/OAuth/OIDC Identity Provider on their local dev environments, I'm thinking about configuring a demo client/app in our production IdP that has localhost configured as valid redirect url (OAuth/OIDC) or AssertionConsumer (SAML), publishing its client credentials and allow...
I sent an email to somebody with my personal email account (not my school email account). However, when using my personal email, I am doing it with a Chrome browser that I am logged in to using my school account. Can the school know who I am messaging and the content of that message? I did not turn on sync.
I'm doing some development work on an untrusted computer. I'd like to sign my commits I make from it, but I don't want my personal PGP key to touch this computer. Or maybe I'm using a PGP smart card and I can't present it to the computer because of a lack of smart card reader. Usually Git commit signing works by callin...
Let's say a user creates their primary gpg key pair for User Name <user@email.com> and selects an encryption and signing algorithm that isn't widely available (think goldilocks). For instance, let's say one would create a signing key with ed448, and encryption key with cv448. If the user goes ahead and submits such a k...
I know this might sound counter-intuitive, but is it possible to configure gpg to store public keys in encrypted state on disks? Such that when encrypting a message to someone, user would be asked to first enter a passphrase to decrypt recipient's public key. As we move towards a "post-quantum" age, one might as well e...
Assume we have a platform which has some crypto functionalities. the infrastructure is as follows: We have two nodes in a cluster, Computer A and Computer B. Computer A is the main server which handles many types of requests from clients including withdrawal requests. Computer B is responsible for accepting withdrawal...
What is the difference between a keyfile generated by KeePass and a keyfile that is chosen to be "any file" on the computer? "Any file" must have completely the same hash in order to unlock the database. It must be an unedited file, including timestamp, etc. Now I have opened the keyfile generated by KeePass(XC) in a t...
I am using auth0, and I have a setup a custom domain. As a result, depending on how I login, I can have multiple iss claims, for example : https://example.auth0.com https://auth.example.com So I have to configure all my backend services to accept both these iss claims. I was wondering, if I always check the jwt signa...
If I have a web app that is vulnerable to XSS in the url (reflected XSS), does CSP protect against this type of XSS? Ex: when I run www.example.com/<script>alert(1);</script> in the browser, this will trigger a popup message.
VPN encrypts your traffic all around. So let's say someone knows your VPN email/password. Would this give them the ability to decrypt all your communications?
Consider the following system: Stock Android 9, unrooted USB and wireless debugging unavailable screen permanently turned off So basically a headless Android device. Question: Is it possible to programmatically spoof touchscreen interactions on such a device, e.g. in order to force-close a firewall app without any ac...
Perhaps the opposite of an information security question: Consider a hypothetical where my associate and I have been accused of being the same person abusing multiple accounts on an online forum. Administrators have the power to look up the IP addresses of users. My associate and I are on different continents. With t...
Is there any example for data that has the same sha256sum value? Or is it impossible to find out with current computational power?
While I was doing source code review of API handlers for REST APIs, I found a security issue. This issue is that some methods have the annotation @PreAuthorize("permitAll()"). If I want to document this as a finding and give it a CVSS score, how can this be done? Should I consider this finding when calculating the scor...
Context I have a system where some of user's data is encrypted via AES. Each user has their own key K. When the user creates an account, the K is generated and encrypted with a key derived from password via PBKDF2 (let's call this key P). This P(K) is stored in database and taken when logging in to be decrypted by P ag...
My client says their API traffic must take the path WAF -> Custom Firewall -> Backend API. Also, mTLS must be terminated after the traffic has gone through the network appliance. I have created an Envoy proxy that can perform mTLS behind the network appliance. That traffic takes the path GCP External Network Load Balan...
I've seen people in security saying URLs with Cyrillic characters are dangerous. If you ever type such characters on a browser you'd see they break into crazy unrecognizable URLs that have nothing to do with the original name. Another attack would be to put them into the href HTML tag and another website in the link, b...