TransWikia.com
  1. All Categories
  2. Information Security

Information Security : Recent Questions and Answers (Page 20)

Find answers to your questions about Information Security or help others by answering their Information Security questions.

PostgreSQL exploit not loading in MSFConsole from ExploitDB

Just trying to get a postgreSQL exploit (32847.txt - Low Cost Function ) from exploitdb to run in msfconsole. After pulling my hair out trying to figure out why it...

Asked on 12/25/2020

1 answer

Is splitting a REST API server from a Web server considered a security threat?

I am participating in a project that involves a JavaScript SPA that provides a service and is intended to interact via REST APIs with one of our servers....

Asked on 12/24/2020 by Acsor

6 answer

John The Ripper and PBKDF2-HMAC-SHA1

I am trying to hash a list of passwords with PBKDF2-HMAC-SHA1 and then crack them using John. However, John does not recognise the hashes and I get a No Hashes...

Asked on 12/22/2020 by Canine

1 answer

Filtering http responses for subdomain takeover

I try to automate a solution to check hosts for Subdomain takeover vuln. First I get all subdomain's responses, then use the loop to checking keywords:if grep -l 'Repository...

Asked on 12/21/2020 by kirill .z

0 answer

Sql map Manual Vulnerability Assessment

I am trying to do penetration testing for one of my client.The platform is Code ignitor.There is an endpoint /find/1The function queries the vehicle table where vehicle...

Asked on 12/20/2020 by Badddy

1 answer

Unknown folders in OneDrive

Today I opened OneDrive by accident, since I do not use it. To my surprise, inside there were unknown folders, in foreign (to me) languages. Namely, "document" and "photo" folders...

Asked on 12/19/2020 by user851

1 answer

Can I rely on the CSRF cookie to check if a user is authenticated on the client-side?

I have a website that runs on example.com. The website makes AJAX calls to my backend API which sits at api.example.com. I employ a double-submit verification strategy. The backend...

Asked on 12/15/2020 by turnip

2 answer

Quantify security strength from entropy and lifetime

Entropy or randomness is a quantitative measure of security strength for various types of passcodes, but in current times with digital technology, breaches, and cracking tools it seems that lifetime...

Asked on 12/12/2020 by gethopr

2 answer

Security risks from exposing ssh to a home server

I'm not sure if this is the right place to ask. My goal is to establish an external connection to my home server through ssh and tunnel some ports to...

Asked on 12/08/2020 by Nutle

2 answer

Man In The Middle Attack On File Uploads

I am using a web service (call it X) which allows files to be uploaded to AWS S3. The way it works is that an initial call is made...

Asked on 12/07/2020 by Mojo

2 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP