TransWikia.com
  1. All Categories
  2. Information Security

Information Security : Recent Questions and Answers (Page 14)

Find answers to your questions about Information Security or help others by answering their Information Security questions.

Help Understanding PHP Reverse Shells

I have recently done two different hackable VMs and had to take, after reading walkthroughs, two different approaches. For Fristileaks 1.3, it was simple. I was able to get login...

Asked on 10/28/2021 by pdawg

1 answer

What, if anything, are the consequences of temporarily enabling and then disabling WebRTC in Firefox?

For security and privacy purposes, it's best to keep WebRTC disabled if you aren't using it. Firefox makes this easy by simply setting media.peerconnection.enabled to false. Due to COVID-19,...

Asked on 10/28/2021

0 answer

Refresh token using a separate auth server?

I'd like to use JWTs for user authorization. My intention is use an auth server and an app server to keep them separate. This way my auth server will be...

Asked on 10/28/2021

0 answer

Is the perfect MITM attack possible?

Let's imagine a data link layer level MITM attack. Is it possible to fulfill all of the following points?you completely hide your identity by forging your own MAC addressyou create...

Asked on 10/28/2021 by user238715

1 answer

Why did "terminal commands" never get a version of SQL "parameterized queries"?

I was taught horrible bad practice when I initially "learned" SQL, which baked in user-submitted input with quotes and attempted to "escape" this (in the beginning, I didn't even escape...

Asked on 10/28/2021 by M. Vencel

4 answer

What attack vectors does arbitrary JS on a user profile allow?

Consider a site for frontend devs/designers to host their portfolio apps - pages with arbitrary JS, each hosted on a user's separate profile. What attack vectors would that enable against...

Asked on 10/28/2021 by sellarafaeli

2 answer

How safe is opening any website on new browser tab?

When I do online shopping where I use my credit card information to purchase, I clear the browser cache, cookies and only open that single site. After I am done,...

Asked on 10/28/2021 by NKL

3 answer

Processing Exceptionally High Volume Singular Flows

I wanted to know if anyone had experience sensoring single flows that generate 90 kpps or upward of traffic. My conundrum is that I use tools which I would like...

Asked on 03/09/2021 by ReedGhost

1 answer

MAC address of router changes when i connect to VPN

If I connect to my VPN and then run arp -a the MAC address of my router changes to 00:00:00:00:00:02. Is this normal behaviour? What is the reasoning behind this?...

Asked on 03/03/2021

1 answer

Extrapolating home address of a visitor when they click on an e-mail phishing link (Mr Robot)

In Mr Robot season 3, the feds are set up in a safe house spying on Elliot's internet communications (with packet sniffers?) when they intercept an email from Elliot to...

Asked on 02/27/2021 by user610620

2 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP