Skip to main content

All Questions

0votes
0answers
161views

IP Address 47.128.16.39 has been going through our site for more than 4 days

This IP address has been going through everything - every image, every page. How can we know who this is and whether they are doing any harm? Is this abuse? Should we report this? If yes, to whom ...
emgee's user avatar
1vote
0answers
123views

MS-CHAPv2 Auth protocol downgrade

I'm researching about PPP (Point to Point protocol) and it's security aspects. While exploring PPP Authentication I've noticed possibility for security downgrade attack. Generally authentication ...
Zduniusz's user avatar
3votes
1answer
598views

Authentication flow leading to wrong authenticator app - what happened, and how to prevent?

Someone I know ended up installing a sketchy authenticator app while going through Microsoft's SSO authentication flow, and I'm trying to understand how this happened exactly. The user's organization ...
Cedric Reichenbach's user avatar
0votes
1answer
743views

I'm testing an app that uses only v4 UUIDs as a cookie for authentication. What are some attacks I can try?

What are some attacks I can try against this form of authentication? How do I test if they are cryptographically secure as well?
study man's user avatar
1vote
2answers
1kviews

Refresh token replay detection

I'm trying to detect refresh token reuse / replay. A typical approach: send refresh token (on login or refresh) create refresh token as opaque value (e.g. buffer from a CSPRNG) base64 encode value ...
lonix's user avatar
1vote
0answers
127views

Problems understanding the use of Distance Bounding against Man-In-The-Middle attacks

I currently have to write a paper for university in my Network Security lecture about methods of secure location verification. Therefore, I chose to write about several distance bounding protocols, e....
Samaranth's user avatar
0votes
1answer
171views

What should I do during the Man in the middle attack? [closed]

I have a question about Man in the Middle attack. What should I do during the Man in the middle attack? In case I am already connected with a friend of mine on the net, but I suspect that there is a ...
theantomc's user avatar
68votes
6answers
62kviews

My email address is being used to enroll for online services. Should I be concerned?

Just before Christmas I received the following message in one of my GMail accounts: Sign-in attempt was blocked ********@gmail.com [redacted by me] Someone just used your password to try to ...
Wes Sayeed's user avatar
2votes
2answers
1kviews

What should I think about users with huge numbers of successful login attempts in a short period?

What to think about a user making thousands of successful login attempts over a short period? What are the dangers of such a behavior and how to protect against them? A couple of examples of dangers ...
Heschoon's user avatar
1vote
1answer
371views

Protect admin page using proxy

I want to protect my admin page not only with a login and password, but also with IP filtering as described here: https://security.stackexchange.com/a/30649/68841 But I have two questions: Can I use ...
konstantin_doncov's user avatar
3votes
1answer
439views

Centralized brute force login detection using netflow data

Is brute force login detection feasible with netflow data? With the netflow data one could check the number of incoming packets to a specific destination port (for each flow). If the number is below a ...
fitcfitcfatc's user avatar
1vote
0answers
128views

How can this Authentication/Authorization flow be improved?

I am currently building a full stack web app mainly as part of an exercice. This app is made up of a back end on a server (written in Go), and a front end written in Angular (so on a user's browser). ...
tomfl's user avatar
1vote
0answers
380views

Dovecot in auth.log suspicious entry analysis [duplicate]

I am wondering is this entry in auth.log something that I should be concerned about Feb 22 12:18:25 host1 auth: pam_unix(dovecot:auth): check pass; user unknown Feb 22 12:18:25 host1 auth: pam_unix(...
Aleksandar Pavić's user avatar
1vote
0answers
128views

What current methods are there to gain access to Azure?

I'm currently working with our development teams and trying to build a threat model for the Azure environment and how attackers may gain access to our instance. So far I haven't found much in the way ...
McMatty's user avatar
  • 3,315
6votes
3answers
5kviews

How secure is E-Z Pass?

E-Z Pass is an American company that allows people to electronically pay tolls without having to carry change or come to a stop at toll booths. Instead, you have a device that you attach to the inside ...
Stella Biderman's user avatar

153050per page
close