Find answers to your questions about Information Security or help others by answering their Information Security questions.
What are the different ways / technologies used today (2020) to tap phones today?Are the technologies out there so terrible that the people being tapped know about it or...
Asked on 02/10/2021 by begs-the-hessian
0 answerI read this post: How does hacking work? and I saw that Chris Dale answered the question with some PHP exploit instructions. However, how does a hacker can read...
Asked on 02/09/2021 by Cronos
1 answerI am reading about an attack that occurred during August of this year conducted by the group MageCart through the use of "card skimming" to steal credit card info from...
Asked on 02/08/2021 by IntegrateThis
1 answerBackgroundI am trying to achieve a meterpreter session on a test machine (the "victim") that I already have a shell session on. When I run the command sessions -u #,...
Asked on 02/05/2021 by h f
1 answerI have AWS resources (e.g. EC2s, RDS instances) that I would like to isolate from each other so that if one is compromised, the potential damage is limited. I am...
Asked on 02/02/2021 by sdgfsdh
0 answerI created a android payload with public IP (android/meterpreter/reverse_https).The stdapi commands(ls,cd,webcam_snap etc) are showing when the victim is in the same network. But when I try to connect...
Asked on 01/28/2021 by kreysix
1 answerTake for example - AWS STS token or JWT tokens. Let’s say node A got a token for accessing a resource of account X on behalf of account X. Access...
Asked on 01/25/2021 by user855
1 answerI'm scanning a machine that has the UDP port 161 open and I'm not able to run snmpwalk against it as I'm returned with the error:Timeout: No Response from...
Asked on 01/21/2021 by 1afx0
1 answerFirst post, not a crypto expert. :)TLDRIs it wise to use SRP to implement app-level "passkey entry" pairing in Bluetooth LE? There are known issues with using fixed passkeys in...
Asked on 01/21/2021 by CompSciGuy
0 answerI am evaluating the above service design where I want to have mechanism to pass a user through multiple microservices. In...
Asked on 01/20/2021
1 answerGet help from others!
Recent Questions
Recent Answers
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP