TransWikia.com
  1. All Categories
  2. Information Security

Information Security : Recent Questions and Answers (Page 16)

Find answers to your questions about Information Security or help others by answering their Information Security questions.

What types of modern phone tapping exist today?

What are the different ways / technologies used today (2020) to tap phones today?Are the technologies out there so terrible that the people being tapped know about it or...

Asked on 02/10/2021 by begs-the-hessian

0 answer

How does a hacker reach a back-end file to exploit it?

I read this post: How does hacking work? and I saw that Chris Dale answered the question with some PHP exploit instructions. However, how does a hacker can read...

Asked on 02/09/2021 by Cronos

1 answer

MageCart attack on Newegg

I am reading about an attack that occurred during August of this year conducted by the group MageCart through the use of "card skimming" to steal credit card info from...

Asked on 02/08/2021 by IntegrateThis

1 answer

How to set where the meterpreter payload is placed on the victim machine in metasploit?

BackgroundI am trying to achieve a meterpreter session on a test machine (the "victim") that I already have a shell session on. When I run the command sessions -u #,...

Asked on 02/05/2021 by h f

1 answer

Isolation AWS resources with multiple subnets vs multiple VPCs

I have AWS resources (e.g. EC2s, RDS instances) that I would like to isolate from each other so that if one is compromised, the potential damage is limited. I am...

Asked on 02/02/2021 by sdgfsdh

0 answer

Stdapi commands not showing in meterpreter session

I created a android payload with public IP (android/meterpreter/reverse_https).The stdapi commands(ls,cd,webcam_snap etc) are showing when the victim is in the same network. But when I try to connect...

Asked on 01/28/2021 by kreysix

1 answer

What happens if a secure token is provided to a trusted party that gets compromised

Take for example - AWS STS token or JWT tokens. Let’s say node A got a token for accessing a resource of account X on behalf of account X. Access...

Asked on 01/25/2021 by user855

1 answer

SNMP Enumeration

I'm scanning a machine that has the UDP port 161 open and I'm not able to run snmpwalk against it as I'm returned with the error:Timeout: No Response from...

Asked on 01/21/2021 by 1afx0

1 answer

Fixing BLE Passkey Entry with SRP

First post, not a crypto expert. :)TLDRIs it wise to use SRP to implement app-level "passkey entry" pairing in Bluetooth LE? There are known issues with using fixed passkeys in...

Asked on 01/21/2021 by CompSciGuy

0 answer

Security Considerations To Account for When Redirecting From Microservice to Another

I am evaluating the above service design where I want to have mechanism to pass a user through multiple microservices. In...

Asked on 01/20/2021

1 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP