Recently Active Questions

0votes
1answer
560views

Assigning memory address of shellcode to buffer (for buffer overflow input)

I am attempting to exploit HEVD kernel driver buffer overflow challenge: https://github.com/hacksysteam/HackSysExtremeVulnerableDriver However when running the below code my windows 7 machine doesn't ...
1vote
0answers
16views

How worried should I be about firmware level persistance after a security breach?

One of our developers had a security breach a few weeks ago. He had been tricked into downloading a repository which we later learned was laced with malware that phoned home regularly to a C2 server ...
0votes
1answer
15kviews

Why hydra showing this error [ERROR] could not connect to ssh://192.168.0.1:22?

I am using hydra to bruteforce my router admin page. By scanning with nmap it is showing port 22 ssh is open and when i use medusa it is bruteforcing properly but with hydra i am using this command : ...
0votes
0answers
14views

Are secrets from automatically unlocked keychain in Ubuntu 24.04 Seahorse accessible for any application?

I am familiarizing with Ubuntu 24.04 and Seahorse. I recently connected to a password-protected network drive, and the password is now stored in my "login" keyring, which is encrypted with ...
0votes
0answers
9views

LinkedIn website automatically gets my email address in Edge without consent, can all websites I browse silently get my email? [migrated]

I'm using Edge 135 browser on Windows 10. I am currently logged in my Gmail account, but not logged in LinkedIn. When browsing to https://www.linkedin.com (I never logged in on this website since I ...
0votes
1answer
543views

OAuth alternative for two-party scenario?

I'm trying to come up with an authentication/authorization system for what seems like a really simple scenario, but as far as I can tell it's virtually unsupported. There are two parties, total; ...
1vote
1answer
287views

Using AWS System Manager Parameter Store SecureString in config file in ec2

On an ec2 box I am running a service that reads vars from a config file. One var's value is stored in AWS System Manager as a SecureString. I want to use that value in the text file securely. I can ...
0votes
0answers
17views

For AES-GCM, why do protocols not use the nonce to prevent replay attacks? [migrated]

For protocols using AES-GCM, it appears to be common practice to store the sequence number in the additional authenticated data (AES_GCM and TLS sequence number). I have not found any instances of ...
1vote
1answer
5kviews

Can I create an SSL certificate on windows signed with the machine's certificate?

From MMC > Certificates I can see there's a certificate for the current machine under 'Trusted Root Certification Authorities > Certficates'. e.g. on my workstation called 'RoryWorkstation1' there's a ...
2votes
0answers
56views

Impossible optimization in IKE Intermediate RFC?

RFC 9242 - Intermediate Exchange in the Internet Key Exchange Protocol Version 2 (IKEv2) describes a new IKEv2 exchange type called "IKE_INTERMEDIATE". The purpose of this type is to allow ...
3votes
1answer
609views

How to detect malicious actor altering DNS responses?

I am trying to detect what is causing my DNS to return fake IP addresses for domains like apple, orange, etc. which obviously don't exist. If I do following on my Windows machine: ipconfig /flushdns -...
2votes
1answer
2kviews

Apple Mail versus GMail app content security

I am trying to determine if there is a benefit to using the GMail app over the built in iOS one when it comes to security. I know that both store data locally on the phone, but the question is whether ...
-3votes
0answers
90views

How to know whether a plate number is being faked or not? [closed]

I’m not sure whether this question fits better under AI, Cryptography, or Security. I’ll place it under Security for now, since AI Security has become a new and growing domain. I have developed an ...
2votes
1answer
125views

Extract CRT and KEY from signed PEM file without the openssl tool

Is there any way to extract a private key from a PEM file without the openssl tool on Windows? Windows MMC won't do the trick as I cannot export to PKCS#12 due to my work laptop security restrictions ...
10votes
2answers
3kviews

What are the preferred ways to exchange public keys physically?

Suppose I have the privilege to being able to physically meet a person that I want to communicate with beforehand. Suppose the person and I have minimal trust --- it could be the first time we get to ...

153050per page