Tag Archives: Information Security

Review on encrypted data storage algorithm

I’m building a small command line tool (mostly for fun) that is meant to store data (such as passwords or files) encrypted into a local database, with a user supplied password, pretty much the same functionallity as KeePass. I’m looking for some review to what I’m doing to confirm I’m not leaving any security hole… Read More »

Root privilege using Return-to-libc attack

I’ve been working on Return-to-libc Attack Lab from SEED (Lab Description and Tasks). The environment is Ubuntu 12.04 32 bit. Please consider the following code: /* This program has a buffer overflow vulnerability. */ /* Our task is to exploit this vulnerability */ #include #include #include int bof(FILE *badfile) { char buffer[12]; /* The following… Read More »

hashing API key with a timestamp?

I’m working on a project where the initial dev decided it would be a good idea to disguise API keys by md5’ing them with along with the current minute, and grant clients a three-minute window to send that value. So the client does: headers.authKey = md5(ACTUAL_API_KEY + current_minute()) And the server does: // allow for… Read More »

Extracting public key created by an UWP app in KeyCredentialManager

I know of an app that is using https://docs.microsoft.com/en-us/uwp/api/windows.security.credentials.keycredentialmanager to generate a key pair (supposedly stored in a TPM), and sequentially uses the hash of the public key obtained from https://docs.microsoft.com/en-us/uwp/api/windows.security.credentials.keycredential to encrypt the app’s secrets. The API linked above does not allow other apps to access non-owned public keys which makes the above scheme… Read More »