Category "security"

How to hide my security features in wordpress

How can I hide the power to see wp-includes from my wordpress website, try the Hide My WP-WordPress Security plugin and it totally ruins my website, someone who

GKE Cluster Audit

What are the points to be reviewed while auditing a GKE cluster? We have a production cluster and I would like to what all points need to be reviewed while audi

Return fingerprint and save in firebase

I am trying to write an app using flutter or android studio. The user will login to the app using his fingerprint. I want to read the fingerprint and save it in

Error with ruby version on termux when I try to install metasploit

I was installing metasploit with termux and it said: termux output ~ $ ls <br> metasploit-framework storage wiki-termux<br> ~ $ cd metasploit-fram

Is it safe to use uid to store data in firebase database? [duplicate]

I plan on creating an application on flutter that uses firebase auth and cloud firestore. My plan is to create a user and the use the user's u

Blazor WebAssembly Application fails to load due to integrity errors

We have developed a Blazor WebAssembly Application that has already gone into productive usage for a certain group of customers. The Application works well in a

Spring Security 5 sha256 encoder

I have a problem with Spring Security 5 Basic authentication. I've configured Spring like this: @Configuration public class SecurityConfig extends WebS

MobSF: Solve @rpath violation

We tested one of our iOS app with MobSF and the report highlighted that the binary has Runpath Search Path (@rpath) set. In certain cases an attacker can abuse

Security & Pyscript

I am coding a Python editor, which can execute python codes and returns the output. My initial idea was to code a backend service for it, that will run the Pyth

XSS attack still works despite htmlspecialchars() doing its work

hi i am trying to filter outputs of users who will put free text and wanna prevent XSS attacks so i tried this function i made to check <?php $patterns = [

How to add the username and passwords to a request in java spring

I'm currently trying to add security to my spring application and just want to know how can i add the credentials to the request so that it has the security acc

Bitbucket: Show value of variables marked as secret

For one of my repos I need to see the value I set to a secure property of a deployment (created as described in https://support.atlassian.com/bitbucket-cloud/do

Is there a way to prevent basic auth from popping inside iframe other than white list?

I'm looking for a way to forbid basic auth from popping inside an iframe and the only option I see is the creation of a white list inside the CSP but it doesn't

Handling the token expiration in fastapi

I'm new with fastapi security and I'm trying to implement the authentication thing and then use scopes. The problem is that I'm setting an expiration time for t

Safe regex patterns from ReDos attack

I've recently faced with some redos attack issues. Explain in simple steps: Regex denial of services: it means the attacker can put some malicious/crafted input

Allow non-root user of container to execute binaries that need capabilities

I need to run a container as non-root user by default. However a specific process inside this container needs to execute a binary that needs cap_net_admin capab

Best practice: Generate email link to bypass authentication

I've got standard oAuth model for authenticating users via email/password combination. I would like to implement my own mechanism to generate one-time token, st

TFS 2018 - Set permissions for single dashboard

In TFS 2018 on-premises server, is it possible to set permissions for a single dashboard, separately from the other dashboards in that project? I have multiple

Asp.Net Client Certificate Authentication - Issue with website re-prompting for client PIN

I have an ASP.NET 5 web application that is setup to use client certificate authentication, specifically a DoD CAC. I followed Microsoft's guidance (here) to se

OAuth 2 can i use Post Form Response and PCKE at the same time?

I am trying to secure an SPA, now there is recommendations to use PCKE which is fine, there is also a lot of articles which suggest use post form response, howe