TransWikia.com
  1. All Categories
  2. Information Security

Information Security : Recent Questions and Answers (Page 22)

Find answers to your questions about Information Security or help others by answering their Information Security questions.

How to send cookie to API on seperate domain in safari

So basically with my app, I keep users access tokens in memory for the duration page load (e.g. once they refresh the token dissapears). To prevent them from having to...

Asked on 10/29/2020 by Harrison Lucas

1 answer

Pentesting Webserver Dead End (MySQL White Listing Bypass)

I am currently pentesting a webserver running MySQL, managed to obtain its db configuration (w/ login credentials) but the hostname is in a Local Area Network. The server has white...

Asked on 10/25/2020 by Cromwell Rosalin

1 answer

Proxying MetaSploit through BurpSuite

I was wondering how I would be able to proxy MetaSploit through BurpSuite. I was to reverse engineer a packet being sent to my ChromeCast, but I have no way...

Asked on 10/16/2020 by Python

1 answer

Brute-Forcing a Chrome Login Data file

Say I have a "Login Data" Chrome file that is encrypted with the user's Windows password. Is there a way I can brute-force the file and try to decrypt it...

Asked on 10/12/2020 by Safwan

1 answer

Why does my digital bank need my phone date and hour to be correct?

I'm not from Information Security or any IT related area. But I want to know if there is any security reason for my digital bank to demand my phone to...

Asked on 09/10/2020 by RA828

8 answer

Why would hackers attack a DNS server with a DoS?

I wake up this morning to a rebooted server. The DNS server was running at over 100%. After a little bit of work, I got fail2ban in place to block...

Asked on 09/01/2020 by Alexis Wilke

1 answer

OIDC Hybrid flow

I'm trying to understand the Hybrid flow of OIDC. Am I correct in thinking that an authentication request is made to the authorization endpoint, which then responds with the authorization...

Asked on 08/21/2020 by PDStat

1 answer

How to use DPAPI under load balance environment

DPAPI can be used to encrypt the secret data. We intend to use it in our web app to encrypt some data and store the encrypted data in database....

Asked on 08/18/2020 by Robin Xing

2 answer

Protecting a website from being kidnapped

I have a MediaWiki website in Hebrew;As common with MediaWiki websites, it has lots of content and rebuilding it in case of a disaster isn't feasible. I chose to...

Asked on 08/10/2020 by George

1 answer

Chance of guessing any valid credit card data

What's the chance of guessing valid credit card data that could be used to make a payment online? To me, it looks like it's not extremely hard to guess, but...

Asked on 08/08/2020 by reed

1 answer

Ask a Question

Get help from others!

© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP