it's quite likely that the installation of new Go version fails especially if you're on linux. so instead of directly deleting the existing Go setup, move it to old directory and install the new one.
if something goes wrong while installing the new version, itโs good to have the previous one around.
#tips #golang #linux
@Mi_Ra_Ch
mv /usr/local/go /usr/local/old-go
tar -C /usr/local -xzf go1.22.6.linux-amd64.tar.gz
rm -rf /usr/local/old-go
if something goes wrong while installing the new version, itโs good to have the previous one around.
#tips #golang #linux
@Mi_Ra_Ch
XEE Attack: Exploiting Timing Differences for Information Disclosure
XEE (Cross-site Execution) attacks are a type of side-channel attack that exploits timing variations in a website's responses to deduce sensitive information. These attacks rely on the fact that different operations take varying amounts of time to complete, and these differences can be measured and analyzed to reveal otherwise hidden data.
How XEE Attacks Work:
XEE attacks typically involve injecting JavaScript code into a web page that observes the timing of the website's responses to different requests. For example, consider a login form that validates a user's password:
An attacker might inject a script that iterates through a list of potential passwords, sending each one to the login form:
This script sends each password to the login form and measures the time it takes for the website to respond. If the response time is significantly longer for a specific password, the attacker might deduce that it is the correct one.
Exploiting Timing Variations:
XEE attacks can exploit various timing differences:
Database Queries: Different database queries can take different amounts of time to execute, depending on the complexity of the query and the size of the database.
Password Validation: Websites might take longer to validate incorrect passwords, especially if they involve complex hashing algorithms.
Cookie Processing: Websites might take longer to process and decrypt cookies containing sensitive information.
Defending Against XEE Attacks:
Constant Time Operations: Implement password validation and other sensitive operations with constant time complexity, meaning the execution time should remain consistent regardless of the input.
Timing Obfuscation: Randomly introduce delays in response times to make it difficult for attackers to measure accurate timing differences.
Secure Coding Practices: you gotta be aware of the potential for XEE attacks
Concluding thoughts
XEE attacks are a serious threat to web security, and require careful consideration with implementation of appropriate countermeasures.
#TakeAByte #XEEAttack #pentest
@Mi_Ra_Ch
XEE (Cross-site Execution) attacks are a type of side-channel attack that exploits timing variations in a website's responses to deduce sensitive information. These attacks rely on the fact that different operations take varying amounts of time to complete, and these differences can be measured and analyzed to reveal otherwise hidden data.
How XEE Attacks Work:
XEE attacks typically involve injecting JavaScript code into a web page that observes the timing of the website's responses to different requests. For example, consider a login form that validates a user's password:
<form method="post" action="/login">
<input type="text" name="username" placeholder="Username">
<input type="password" name="password" placeholder="Password">
<button type="submit">Login</button>
</form>
An attacker might inject a script that iterates through a list of potential passwords, sending each one to the login form:
// Example of a malicious script exploiting timing differences
function bruteForcePassword() {
const passwords = ["password1", "password2", "secret", "12345", ...];
for (let i = 0; i < passwords.length; i++) {
const startTime = Date.now();
// Submit the password to the login form
document.querySelector("input[name='password']").value = passwords[i];
document.querySelector("form").submit();
// Measure the time it takes for the website to respond
const endTime = Date.now();
const responseTime = endTime - startTime;
// Analyze the response time and try to deduce the correct password
// (e.g., if the response time is significantly longer for a specific password, it might be the correct one)
console.log("Response Time for password " + passwords[i] + ": " + responseTime);
}
}
This script sends each password to the login form and measures the time it takes for the website to respond. If the response time is significantly longer for a specific password, the attacker might deduce that it is the correct one.
Exploiting Timing Variations:
XEE attacks can exploit various timing differences:
Database Queries: Different database queries can take different amounts of time to execute, depending on the complexity of the query and the size of the database.
Password Validation: Websites might take longer to validate incorrect passwords, especially if they involve complex hashing algorithms.
Cookie Processing: Websites might take longer to process and decrypt cookies containing sensitive information.
Defending Against XEE Attacks:
Constant Time Operations: Implement password validation and other sensitive operations with constant time complexity, meaning the execution time should remain consistent regardless of the input.
Timing Obfuscation: Randomly introduce delays in response times to make it difficult for attackers to measure accurate timing differences.
Secure Coding Practices: you gotta be aware of the potential for XEE attacks
Concluding thoughts
XEE attacks are a serious threat to web security, and require careful consideration with implementation of appropriate countermeasures.
#TakeAByte #XEEAttack #pentest
@Mi_Ra_Ch
โก3๐1
had a human-contact outside of my family members today. such a milestone ๐๐
๐3๐ฅ2๐1
I'm hoping a lot from Barca and Arsenal this year. both got a match today
fyi i've been a diehard fan of Barcelona since i was 6 or 7 ๐ญ
fyi i've been a diehard fan of Barcelona since i was 6 or 7 ๐ญ
๐ฅ3
Mira
Jesus Christ!
i can only imagine how many different cases are not still known and many parents have been mistreated in front of Justice.
Robi makes stuff
im in my listening more than talking era
this part of my life is called growing
โค3