Does a HTTP proxy assign a fixed egress port to a client, and if so, for how long?

Unlike a NAT gateway, a HTTP proxy have a fixed ingress port, that is, all HTTP clients will connect to a HTTP proxy via the same port. In this case, if there are two clients both requested the same domain through the same proxy, how would… Continue reading Does a HTTP proxy assign a fixed egress port to a client, and if so, for how long?

Is it possible to proxy USB and disconnect when a certain sequence is intercepted before it is (fully) passed to the real USB device?

Let’s assume:

I have a piece of software (with a webUI) that has access to a USB device.
The software itself can’t be changed.
The software has the ability to perform a firmware flash on the USB device, also remotely when uploaded through… Continue reading Is it possible to proxy USB and disconnect when a certain sequence is intercepted before it is (fully) passed to the real USB device?

Access the Information Superhighway With a Mac Plus

For some time now, Apple has developed a reputation for manufacturing computers and phones that are not particularly repairable or upgradable. While this reputation is somewhat deserved, especially in recent …read more Continue reading Access the Information Superhighway With a Mac Plus

can a tomcat application sitting behind a reverse proxy be exploited

I am trying to exploit a vulnerability in tomcat based on CVE-2020-13935.
I found online this interesting poc https://blog.redteam-pentesting.de/2020/websocket-vulnerability-tomcat/
In my case, the tomcat server is exposed through a revers… Continue reading can a tomcat application sitting behind a reverse proxy be exploited

Intercept calls to authenticated 3rd-party APIs, to automatically add auth keys?

Is this a good approach to preventing the leakage of secrets?
Say I had a simple setup where Alice holds the secret to access Bob, and Charlie has basic shell access to Alice (with a different auth method). Charlie echoing "$BOB_SECRE… Continue reading Intercept calls to authenticated 3rd-party APIs, to automatically add auth keys?