Questions tagged [infoleak]
This tag is for any class of exploits that leaks information relevant to further exploitation, such as stack cookies, kernel pointers, and memory layouts. It is not used for mere disclosure or loss of confidential data.
16
questions
107
votes
8
answers
11k
views
Ex-contractor published company source code and secrets online
Just found my current company code on the plain internet.
We are talking hundreds of thousands of lines of scripts and configurations, including database schemas and a fair amount of internal ...
25
votes
3
answers
11k
views
Computer name naming convention for security
I've been doing a security audit and found out you can easily identify host roles and running services just by their computer name (using nslookup).
I would like to report this so that they use less ...
18
votes
2
answers
3k
views
Will this Account Lockout mechanism increase the severity of a information leakage vulnerability that leaks usernames?
I found an information leakage vulnerability on a company website and I found that the information includes all the usernames of the users.
I also observed that the application uses a lockout ...
7
votes
1
answer
855
views
How sensitive are acoustic side-channels to compression with a narrowband codec?
Assume sensitive audio emissions from a mechanical keyboard. These audio emissions are often sufficient to reconstruct the actual key presses that generated the sound. If the audio is compressed using ...
5
votes
2
answers
376
views
Why did I never see those "spy signal jammers" for sale?
I recently watched a 1980s computer television programme about the problems of spying. Basically, they showed how anyone could buy relatively cheap and common hardware and then be able to sit outside ...
3
votes
0
answers
196
views
Identifying kernel pointer infoleaks via static analysis
Leaking pointers from the kernel can be useful to an attacker. Normally, pointers are printed using a special identifier, %pK, which will sanitize them. However, there are times when a kernel pointer ...
2
votes
1
answer
466
views
Is super paranoid use of HaveIBeenPawned password API going to help?
They way I understand HaveIBeenPawned password API is that it's a safe system because the site "can't do much with my partial hash even if they wanted to". But is that really true?
Is the ...
2
votes
0
answers
185
views
Analyzing impact of leaked client_secret in Authorization Code Flow in Keycloak (CVE-2020-27838)
CVE-2020-27838 describes that Keycloak has an open endpoint where it's possible to obtain client_secret information, as shown in the example below:
/auth/realms/{realm}/clients-registrations/default/{...
2
votes
0
answers
23
views
Setting up VPN tunnel: what are the possible ways by which my true IP address could leak? [duplicate]
I bought a subscription to a VPN service and I set up the VPN tunnel using openvpn.
In order to avoid DNS leaks, I am using the DNS servers provided by my VPN provider by manually enforcing /etc/...
1
vote
1
answer
156
views
Verbose Headers/Information Leakage via HttpResponse Headers vs fingerprinting via named headers
I understand that a header like X-Powered-By can reveal details about the operating environment that can be used to find known vulnerabilities because you often get the language and compiler/...
1
vote
2
answers
1k
views
Cracking diffie-hellman public key to obtain shared key
I'm given 2 prime numbers, g and n, as well 2 public keys, ga mod n and gb mod n, as part of a leaked Diffie hellman key exchange. I need to derive the shared key gab mod n using the given information....
1
vote
0
answers
504
views
What was the recent non-Google data breach (April 2024)?
I recently suffered an unprecedented number of hacking attacks. The following accounts of mine were accessed:
Patreon
Amazon (both accounts)
Paypal (3 unauthorized purchases, 2 recovered, one denied)
...
1
vote
1
answer
154
views
How do hackers take advantage of apps that are known to be leaking personal information?
I'm wondering how apps that leak personally identifiable information can be taken advantage of by hackers? How would they have the infrastructure to capture all that information that come from ...
0
votes
1
answer
2k
views
Does Google Meet leak my IP?
My friend asked me if it possible to get somebody's IP from Google Meet just by being in the same meeting. He found a video that says it is possible.
But when I read about webRTC and STUN servers, I ...
-1
votes
3
answers
182
views
How is it possible that important databases keep getting put online with literally zero security?
The ANPR camera system's internal management dashboard could be
accessed by simply entering its IP address into a web browser. No
login details or authentication of any sort was needed to view and
...