Find IP address of Gmail scammer [closed]
Is it possible to find the IP address of a scammer who sent a fraud attempt with Google mail? This is the mail header (I had to put as image because when I paste the header the site says it is spam)
Collaborate Disseminate
Is it possible to find the IP address of a scammer who sent a fraud attempt with Google mail? This is the mail header (I had to put as image because when I paste the header the site says it is spam)
A new critical issue was discovered in the character definitions of the Unicode Specification through 14.0.
Does it only affect code compiled from sources with disallowed unicode characters?
RHEL describes that it is relevant only to GCC.
… Continue reading Does CVE-2021-42694 affect only compiled code?
I believe that this question was answered already, though I couldn’t find it.
I have several strings that include hash. Each string has hash and some random (or not) add-on.
How can I identify the type of hash that is hidden inside a strin… Continue reading Identify hash pattern inside a string [duplicate]
I’m using JWTs as part of an URL in order to direct a user to a specific site. I could have just used a UUID, but it’s nice to have an expiry date in the link, as well as knowing whom the link is created for.
This has been working great, b… Continue reading Can a JWT be all lowercase?
I need to receive emails and put them in different "inboxes". Identifying and validating an inbox involves a database hit in order to search for the to-address.
I would like to not hit the db if I know that the to-address is not … Continue reading Possible to generate short signed strings?
How can we disable sudo on CentOS 6 to prevent CVE-2021-3156?
We cannot remove RPMs or similar.
We can only change a configuration.
Do we have another fix for CVE-2021-3156 on CentOS 6, except disabling sudo?
Will we be able to execute su … Continue reading How can we disable sudo on CentOS 6 to prevent CVE-2021-3156?
A quick and dirty nmap scan (nmap -p 1-65535 hostname) lists many ports as open. However, a more involved scan (nmap -T4 -A -sS -sU hostname) does not list the same ports as open. Some report as open, and others I’m guessing get thrown int… Continue reading nmap giving different scan results based on scan type
According to my understanding there is upgrade to the WebSocket protocol during the WebSocket handshake.
We use HTTPS connections (we do not use HTTP).
Should we configure the WebSocket protocol in a firewall between a browser and a server… Continue reading Upgrade to the WebSocket protocol and security
Our product is a product that uses Apache HTTPD, Tomcat and MonodDB.
We use OpenSSL for HTTPS connection and Bouncy Castle library for the encryption of data in the database.
What does it mean to be FIPS 140-2 compliant ?
Is it enough to u… Continue reading What does it mean to be FIPS 140-2 compliant?
I am learning information security. On the internet, majority of exploit code gets crashed after running shellcode.(for example, cve-2018-8174, https://www.exploit-db.com/exploits/44741)
How to avoid crash after running my own shellcode? A… Continue reading How to avoid crash after running shellcode in browser exploit