Find answers to your questions about Information Security or help others by answering their Information Security questions.
I have recently done two different hackable VMs and had to take, after reading walkthroughs, two different approaches. For Fristileaks 1.3, it was simple. I was able to get login...
Asked on 10/28/2021 by pdawg
1 answerFor security and privacy purposes, it's best to keep WebRTC disabled if you aren't using it. Firefox makes this easy by simply setting media.peerconnection.enabled to false. Due to COVID-19,...
Asked on 10/28/2021
0 answerI'd like to use JWTs for user authorization. My intention is use an auth server and an app server to keep them separate. This way my auth server will be...
Asked on 10/28/2021
0 answerLet's imagine a data link layer level MITM attack. Is it possible to fulfill all of the following points?you completely hide your identity by forging your own MAC addressyou create...
Asked on 10/28/2021 by user238715
1 answerI was taught horrible bad practice when I initially "learned" SQL, which baked in user-submitted input with quotes and attempted to "escape" this (in the beginning, I didn't even escape...
Asked on 10/28/2021 by M. Vencel
4 answerConsider a site for frontend devs/designers to host their portfolio apps - pages with arbitrary JS, each hosted on a user's separate profile. What attack vectors would that enable against...
Asked on 10/28/2021 by sellarafaeli
2 answerWhen I do online shopping where I use my credit card information to purchase, I clear the browser cache, cookies and only open that single site. After I am done,...
Asked on 10/28/2021 by NKL
3 answerI wanted to know if anyone had experience sensoring single flows that generate 90 kpps or upward of traffic. My conundrum is that I use tools which I would like...
Asked on 03/09/2021 by ReedGhost
1 answerIf I connect to my VPN and then run arp -a the MAC address of my router changes to 00:00:00:00:00:02. Is this normal behaviour? What is the reasoning behind this?...
Asked on 03/03/2021
1 answerIn Mr Robot season 3, the feds are set up in a safe house spying on Elliot's internet communications (with packet sniffers?) when they intercept an email from Elliot to...
Asked on 02/27/2021 by user610620
2 answerGet help from others!
Recent Questions
Recent Answers
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP