Find answers to your questions about Information Security or help others by answering their Information Security questions.
Just trying to get a postgreSQL exploit (32847.txt - Low Cost Function ) from exploitdb to run in msfconsole. After pulling my hair out trying to figure out why it...
Asked on 12/25/2020
1 answerI am participating in a project that involves a JavaScript SPA that provides a service and is intended to interact via REST APIs with one of our servers....
Asked on 12/24/2020 by Acsor
6 answerI am trying to hash a list of passwords with PBKDF2-HMAC-SHA1 and then crack them using John. However, John does not recognise the hashes and I get a No Hashes...
Asked on 12/22/2020 by Canine
1 answerI try to automate a solution to check hosts for Subdomain takeover vuln. First I get all subdomain's responses, then use the loop to checking keywords:if grep -l 'Repository...
Asked on 12/21/2020 by kirill .z
0 answerI am trying to do penetration testing for one of my client.The platform is Code ignitor.There is an endpoint /find/1The function queries the vehicle table where vehicle...
Asked on 12/20/2020 by Badddy
1 answerToday I opened OneDrive by accident, since I do not use it. To my surprise, inside there were unknown folders, in foreign (to me) languages. Namely, "document" and "photo" folders...
Asked on 12/19/2020 by user851
1 answerI have a website that runs on example.com. The website makes AJAX calls to my backend API which sits at api.example.com. I employ a double-submit verification strategy. The backend...
Asked on 12/15/2020 by turnip
2 answerEntropy or randomness is a quantitative measure of security strength for various types of passcodes, but in current times with digital technology, breaches, and cracking tools it seems that lifetime...
Asked on 12/12/2020 by gethopr
2 answerI'm not sure if this is the right place to ask. My goal is to establish an external connection to my home server through ssh and tunnel some ports to...
Asked on 12/08/2020 by Nutle
2 answerI am using a web service (call it X) which allows files to be uploaded to AWS S3. The way it works is that an initial call is made...
Asked on 12/07/2020 by Mojo
2 answerGet help from others!
Recent Answers
Recent Questions
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP