英豪斯健身教练为留人称可陪睡 主管:过嘴瘾
百度 第8分钟,张伯伦远射被佐特封出。
An attempt to exploit a weakness in a system, either for nefarious or research reasons. Questions with this tag should be about designing, carrying out, or defending against the attack itself, rather than about the underlying weakness.
1,269 questions
3
votes
3
answers
5k
views
Securely changing Veracrypt password
How can I change a Veracrypt (master) password efficiently and securely?
Based on the answers here, it is not safe to use system --> change password due to various reasons.
I cannot simply image ...
1
vote
1
answer
1k
views
SMSC spoofing attack
I attended a seminar on Telecom networks few day back and there I came to know how vulnerable our signalling network (SS7/ SIGTRAN) is.
The speaker discussed an attack in which a spoofed SMSC is ...
0
votes
1
answer
199
views
Is ZipSlip possible in Java without two dots?
I'm testing a Java application that tries to prevent ZipSlip by simply checking whether the filename contains ".." or "./"
Since it's not a web application, I guess encoding is not ...
0
votes
1
answer
125
views
Securing OpenSSL for my Android project
I am working on a security-related project and have to make sure there are no OpenSSL attacks.
According to my understanding, OpenSSL attacks can be at at hardware as well as software level. Currently ...
2
votes
3
answers
4k
views
What is a quantum computing attack?
As far as i know, a quantum attack is a brute force attack performed by a quantum computer. source: wiki
Is this very simple definition correct ? or the scope of a quantum computing attack is bigger....
3
votes
1
answer
449
views
Centralized brute force login detection using netflow data
Is brute force login detection feasible with netflow data?
With the netflow data one could check the number of incoming packets to a specific destination port (for each flow). If the number is below a ...
4
votes
1
answer
1k
views
Where can I find the launcher for this virus that uses Powershell?
On my Windows 10 PC after about 30 minutes of being turned on I always get a powershell window that immediately hides and consumes a lot of RAM.
So I went to the powershell directory:
"C:\Windows\...
1
vote
3
answers
2k
views
Refresh token replay detection
I'm trying to detect refresh token reuse / replay.
A typical approach:
send refresh token (on login or refresh)
create refresh token as opaque value (e.g. buffer from a CSPRNG)
base64 encode value ...
0
votes
2
answers
744
views
Getting a couple of remote login and calls into Ubuntu server?
I have a ubuntu server (Ubuntu 22.10 x64) on Digital Ocean. And I am using fastapi, uvicorn, gunicorn and nginx as I used it for my backend api calls from my frontend and my frontend IP is dynamic.
...
2
votes
1
answer
426
views
Based on these HTTPS requests what type of attack is this?
I'm seeing over 1000 attempts to hit my API endpoints with many 500 responses. It seems clear that the would-be attacker is attempting to poke around the APIs, but it isn't clear to me what type of ...
1
vote
3
answers
657
views
Accidentally downloaded a Trojan.Dropper which Malwarebytes picked up, how to ensure system is clean?
So I was trying to download an arcade game, everything seemed legit and I guess I was too excited to play it I started running it - only after clicking it I decided to run a scan on both Avira and ...
26
votes
5
answers
11k
views
Should I be worried about unusual SSH login attempts from unknown IP addresses?
I've been monitoring my server's SSH logs and noticed a steady stream of login attempts from unknown IP addresses, mostly from different countries.
Heaps and heaps of account names are tried, and with ...
1
vote
1
answer
132
views
Root takeover attack on Kubernetes host despite Vault agent
HashiCorp Vault Agent creates a sidecar that talks to the Vault server and injects secrets as files into containers, where the files are located under /vault/secrets/.
"render all defined ...
2
votes
1
answer
388
views
SNMP trap by legitimate program?
Is there any way to tell if this SNMP trap is something created by a legitimate program?
Update: Hex Dump
0000000: 30 82 00 ec 02 01 00 04 06 70 75 62 6c 69 63 a4 82 00 dd 06 82 00 09 2b 06 01 ...
2
votes
0
answers
296
views
Exploitability of Heap Vulnerabilities
I'm researching memory safety vulnerabilities and noticed that in non-browser applications (for example the Linux kernel) the CVE details entries for use-after-free vulnerabilities almost always list ...