Skip to main content

Questions tagged [attacks]

An attempt to exploit a weakness in a system, either for nefarious or research reasons. Questions with this tag should be about designing, carrying out, or defending against the attack itself, rather than about the underlying weakness.

0 votes
0 answers
50 views

is it possible to insert hidden code using utf8 or utf16 that rearranges a sequence of executable ascii letters (first a utf16 character that rearranges the letters off-screen could be interpreted as ...
loud_flash's user avatar
0 votes
1 answer
166 views

I am working on a security-related project and have to make sure there are no OpenSSL attacks. According to my understanding, OpenSSL attacks can be at at hardware as well as software level. Currently ...
Arunabh's user avatar
1 vote
1 answer
159 views

HashiCorp Vault Agent creates a sidecar that talks to the Vault server and injects secrets as files into containers, where the files are located under /vault/secrets/. "render all defined ...
PatPanda's user avatar
  • 111
1 vote
0 answers
100 views

As we all know, SSL protocols as well as TLS 1.0 and TLS 1.1 are vulnerable to various types of attacks, such as BEAST, Padding Oracle Attack, Sweet32, Downgrade Attack, and others. But have you ever ...
Savetree Eatbeaver's user avatar
0 votes
0 answers
103 views

Each day I check the Log file on my UDMPRO for threats (Triggers), and everyday I have the same Public IP addresses being denied access. Currently I have firewall rules setup to block them. I also ...
Mustang65's user avatar
3 votes
2 answers
4k views

Is there a reason why an attack tree must be a tree (i.e. a graph with no loops) rather than joining repeated nodes (representing the same events) together? Have variants of the geometry (not being ...
Edwin Beggs's user avatar
1 vote
1 answer
586 views

Is it possible for an attacker to trigger a firmware download to another device by sending a malicious network packet that initiates a malicious download of a file that contains attacker controlled ...
HardwareNewb's user avatar
1 vote
0 answers
376 views

Over the past few weeks, I've observed a massive spike in suspicious traffic from IP addresses belonging to Microsoft servers in Ireland. These accesses are blocked due to attempts to reach specific, ...
dg_risk's user avatar
  • 11
4 votes
1 answer
1k views

A recent attack in the Middle East turned pagers into weapons; apparently, the attacker was able to let them detonate without physical access to the devices, at least not after the victims obtained ...
Peter - Reinstate Monica's user avatar
5 votes
1 answer
2k views

I friend of mine has had a subdomain takeover occur. I've taken a look at his DNS and he had some dangling entries, but they were A records, not CNAMEs. The subdomain was pointing to an IP address on ...
Trev's user avatar
  • 163
2 votes
0 answers
56 views

Url requested: https://site.azurewebsites.net/fky_7143_tczf_ohced.aspx?group=CON&branch=A&[email protected]&page=stocks/Bep_EQ32_agepbb_abfgjc_ctkdcem.aspx?veBjt=09983&...
JeffBusterCase's user avatar
0 votes
0 answers
207 views

Return-to-libc is an attack where the attacker, in most cases, returns to the system function, which it uses to execute shell commands. However, I am confused about two things: The command that the ...
Ronald's user avatar
  • 1
1 vote
0 answers
398 views

I implemented reCaptcha on my react native app to stop bots from creating accounts. However this reCAPTCHA got bypassed. and the hacker was able to create 10-20 thousand accounts in like a week. I ...
a_duck's user avatar
  • 73
4 votes
1 answer
267 views

Below is a sandboxed Lua script that uses FFI to execute malicious C code. A fixed memory address is used to load a windows function GetProcAddress which is subsequently used to run a powershell ...
Matias Vuorio's user avatar
2 votes
0 answers
165 views

I'm performing Overpass the hash attack @ TryHackMe > CompTIA Pentest+ > Attacks and Exploits > Lateral Movement and Pivoting > Task 3 > Let's Get to Work! I dumped Key of my target ...
Aryan's user avatar
  • 85

15 30 50 per page
1
2 3 4 5
85