Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: MechMK1

How to set up two YubiKeys to have the same secret?

Posted on February 3, 2021 by MechMK1

A lot of services offer authentication with FIDO2, such as Twitter, but only allow the user to set one "security key". This is problematic in case the key is lost or breaks. The ideal solution would be to allow a user to set up m… Continue reading How to set up two YubiKeys to have the same secret?→

Posted in FIDO2, yubikey

Are libhydrogen’s Gimli permutations production ready?

Posted on January 15, 2021 by MechMK1

I’ve recently had a situation in which a recommendation for an easy-to-use, hard-to-misuse cryptographic library for Java was required. The first choice was Google’s Tink, since it was designed specifically for that purpose. Given it’s ass… Continue reading Are libhydrogen’s Gimli permutations production ready?→

Posted in Cryptography

Is this nginx config suitable to enforce proper authorization?

Posted on December 30, 2020 by MechMK1

Scenario
I have a website secret.example.com, which contains information which must not be disclosed to third parties. In order to protect the information, TLS client authentication was chosen. Whether or not a client is authorized depends… Continue reading Is this nginx config suitable to enforce proper authorization?→

Posted in certificates, Nginx

How is it possible that a <script> tag was injected, but not executed?

Posted on November 2, 2020 by MechMK1

I’ve recently tested a web application and found out that it was vulnerable to Stored XSS attacks. However, a peculiar behavior left me a bit puzzled. When I inserted John <script>alert(1)</script>Doe, my browser showed that th… Continue reading How is it possible that a <script> tag was injected, but not executed?→

Posted in web-application, xss

What is the risk of having a 2FA key permanently plugged into my device?

Posted on June 12, 2020 by MechMK1

Yubico offers the YubiKey Nano, a 2FA key designed to be left inside the device more or less permanently.

While it does add comfort to be able to just leave it plugged in, what risks would there be if the device was stolen with this st… Continue reading What is the risk of having a 2FA key permanently plugged into my device?→

Posted in multi-factor

Why does Wireshark not recognize WCF traffic as TLS encrypted?

Posted on May 13, 2020 by MechMK1

In a .NET application, communication between client and service can be implemented using various different bindings, NetTcpBinding being one of them.

The class defines an attribute named Security, which, according to this article, default… Continue reading Why does Wireshark not recognize WCF traffic as TLS encrypted?→

Posted in net, TLS, wcf

Can the Host Header be used to hide the existence of a service?

Posted on April 23, 2020 by MechMK1

Imagine a web server running on 93.184.216.34, usually reachable via the public DNS entry example.com. Web servers usually allow the distinction of multiple “virtual” servers, based on the Host header received via the HTTP request.

Now im… Continue reading Can the Host Header be used to hide the existence of a service?→

Posted in web service

What are the dangers of not setting the HSTS header on every response?

Posted on April 10, 2020 by MechMK1

A web application only sets the HSTS header in responses to requests to /assets/*. Any other response does not include the HSTS header.

While it does seem insecure at first, any browser opening the index page will quickly follow up loadin… Continue reading What are the dangers of not setting the HSTS header on every response?→

Posted in HSTS

Are there any reasons for Kerberos being based on symmetric cryptography?

Posted on March 13, 2020 by MechMK1

Kerberos is an authentication protocol that is famously built using only symmetric ciphers.

As a direct result of this, there are several attacks possible, such as

AS-REP Roasting
AS-REQ Roasting
Kerberoasting
Silver Tickets
Golden Tick… Continue reading Are there any reasons for Kerberos being based on symmetric cryptography?→

Posted in kerberos

Are there any standards or guidelines tamper-evident devices can adhere to?

Posted on February 4, 2020 by MechMK1

Tamper-Evident devices and measures are devices which in some way indicate that an event not intended by the developer or manufacturer has occurred. Examples of tamper-evident devices are stickers that leave specific residue or are destroy… Continue reading Are there any standards or guidelines tamper-evident devices can adhere to?→

Posted in standards, tampering

Post navigation

← Older posts
Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • Win95-Tracker-CYD is a Cheap Yellow Mod Tracker with I2S May 8, 2026
  • Does Fidelity’s Reorganization Signal the Beginning of the End for ‘Small-Team Agile’? May 8, 2026
  • Google Releases Snapseed 4.0 for Android, iOS May 8, 2026
  • Micron Ships Gigantic 245TB SSD May 8, 2026
  • OpenAI Brings Codex to Google Chrome May 8, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up