Questions tagged [identification]
88 questions
1
vote
1 answer
does the --nack command do what I think it does in reaver and why won't it work?
I have a problem with reaver. I try the --nack command
reaver -i mon0 -b 00:01:02:03:04:05 -vv --nack --mac=00:BA:AD:BE:EF:6
for example. And I assume it will try a different PIN, even if it doesn't receive a negative acknowledgment but it tries…
![](../../users/profiles/59187.webp)
user3695903
- 35
- 5
0
votes
1 answer
How do API's authenticate a user?
I've read many documents about API's but they don't seem to mention API's for private accounts instead of publicly accessible information.
How does an API work to request private account data? How does it get the login details or session cookie?
For…
![](../../users/profiles/86081.webp)
John
- 1
0
votes
2 answers
What methods can be used to verify identity against a database?
I have a database with individual contact data for students... this data includes name, address, phone number, birthdate, etc. (no social... that would have made this too easy apparently, ha ha)
I would like to allow their parents to access their…
![](../../users/profiles/53051.webp)
xtraorange
- 103
- 2
0
votes
2 answers
What kind of information can be found from email?
When an average person sees an email, he can see only part of an information enclosed in the mail. To see full information one can look at the source of an email, which shows more. Example of an email source looks like this:
Received: via…
![](../../users/profiles/15912.webp)
Salvador Dali
- 1,745
- 1
- 19
- 32
0
votes
0 answers
Determining the efficiency of a biometric system
How can find the efficiency of any biometric system is there an equation to find it?
How is the efficiency of a biometric security system?
![](../../users/profiles/46269.webp)
nuha
- 21
- 1
- 3
0
votes
2 answers
How to identify a specific operating system with port scans?
According to the implementation of the TCP/IP stack an attacker is able to identify which operating system is running on a network device. Is there any paper or the like according on this topic?
![](../../users/profiles/29658.webp)
Tom Maier
- 125
- 1
- 6
0
votes
1 answer
Hack profile identification
What does it suggest about a "hack" when people I know get emails from me, but my email password hasn't been changed to lock me out? (Not a spoofed sender - I see some in my sent folder). If my password is known to the attacker, why would they…
![](../../users/profiles/12384.webp)
Jason Kleban
- 207
- 1
- 7
0
votes
1 answer
Fraud Detection - 2FA Bypass Methods and SIM Cloning
I am assisting another Data Scientist with helping a bank detect and prevent fraud via data analysis and predictive modeling (Machine Learning). It's a challenge because the proportion of known fraudulent cases is small and some fraud goes…
![](../../users/profiles/59231.webp)
Hack-R
- 213
- 2
- 8
0
votes
1 answer
How malware file signature is generated?
How is the malware file signature generated? Does it use a sequence of bytes in the beginning, size, PE (export, import, section), etc?
And can the MD5 or SHA256 be considered a file signature for a malware file?
Note: I know that there's YARA that…
![](../../users/profiles/150522.webp)
heaprc
- 103
- 4
0
votes
0 answers
Could "System Volume Information" be used to find out on which system the storage was used?
If one uses a storage device (USB stick or SD card) on Windows, then it leaves "System Volume Information" folder in the file system. Would there be a way so a forensic guy could definitely tell on which computer the storage device was used by…
![](../../users/profiles/270014.webp)
William
- 21
- 3
0
votes
0 answers
Are there differences on how storages are formatted between different OS?
If one formats the same USB stick (or SD card) to FAT32 file system on Windows, or on Linux, or on Android - would there be differences so a forensic guy could definitely tell on which OS or even on which specific machine the USB stick was…
![](../../users/profiles/270014.webp)
William
- 21
- 3
0
votes
0 answers
Which traces leave on a flash card after using it?
If one uses a micro SD card with a card reader on Windows, or on Linux, or on Android - would there be a way so a forensic guy could definitely tell on which computer the flash card was used by examining it?
I know OS can log which devices was…
![](../../users/profiles/270014.webp)
William
- 21
- 3
0
votes
0 answers
How reliable is a mathematical model of a human fingerprint for identification?
How reliable is a mathematical model of a human fingerprint for identification?
I am looking for a way to uniquely identify individuals that is very reliable and easy to use that does not require storing actual biometric data. Storing the actual…
![](../../users/profiles/257541.webp)
polcott
- 93
- 6
0
votes
1 answer
Can we prevent users from generating a QR code with edited information
Currently there is this design of two apps that work together:
Proof app: On customers phone, takes in a textcode and creates a QR code
Scanner app: On hosts phone, Scans the QR code and displays some information like birthday, initial and valid…
![](../../users/profiles/15756.webp)
Dennis Jaheruddin
- 1,715
- 11
- 17
0
votes
0 answers
Risks of Providing a Passport Number
Company A pays company B for enterprise software. Company A hosts it internally. An employee from company B needs access to servers at company A in order to manage said software
Company A is requesting very personal information of the employees…
![](../../users/profiles/91274.webp)
GWR
- 1,203
- 2
- 9
- 11