Is it possible to crack a CRC value for short text validation when someone tries to change a readable text?

I’d like to validate message texts with CRC-8/16/32 but I’m afraid that they could be changed to another one (for example, adding a “No” at the beginning). There will be no special characters besides the usual ones (? , . ; ª º + =…) and the number of bytes will be counted as well. The messages will not be encrypted.

How is it possible to scan the internal network to perform lateral movement without being detected by a firewall?

How is it possible to scan the internal network to perform lateral movement without being detected by a firewall? I’m trying to do a decent scan on the internal network for days. I have a meterpreter shell, add subnet, set proxychains port 1080 and do a slow scan with nmap. I would like to know what other techniques that Pentesters use in their day to day that are effective.

WebServer is an ubuntu, but the internal network is packed with Windows and Linux machines, thus bringing a realistic environment for training. I am doing these studies in a controlled environment.

SharePoint 2010 Workflows – Is it possible to call rest api

So here is my situation, I am working in a SharePoint 2013 Environment, but they only have SHarePoint 2010 Workflows enabled. I see lots of questions and blogs that describe making rest api calls in workflows. Yet, when I attempt to do the same things I do not see the same options. So I am hopeful, maybe there is a 2010 way of getting around that.

Direct Question: Is it possible to make rest api calls in SharePoint 2010 Workflows? if so, please show me your secret sauce.

End Goal: I want to setup reports that pull from several lists and email those to Management. I currently do this with a Powershell script that calls rest api , then emails the report. I want to automate this process. But I am a user, I dont have access to servers and can’t setup timer jobs. So I am trying to figure out some other way to accomplish the same thing to run on a monthly basis, without me having to push the button or manually run it.

What is the most damage possible in a single round of combat?

The rules are:

  1. The character can be any level up to 20, any class, and any race, using any spell, weapon, ability, or item, provided they are all available in an officially released capacity (so no Unearthed Arcana).
  2. This character gets a single round to inflict damage. Movement, Action, and Bonus Action (if needed). No reaction.
  3. The character can be buffed prior to this turn with either their own or another character’s spells or abilities, again requiring these buffs to be available in an officially released capacity. For example, Haste and Bless on a Fighter is fine. Assume there are allied characters with these spells, items, or abilities to allow for these effects.
  4. Assume unlimited amount of turns to prep for this round in which you deal damage. You can buff as much as you want, or cast a spell that requires multiple rounds, just as long as the turn you actually deal damage is the final turn.
  5. The character is assumed to hit (if it is an attack), or the enemy is assumed to have failed their saving throw (if it is a DC effect such as a Fireball spell). Assume no damage resistance from the enemy.
  6. The character does max damage with their attack. A 1d12 greataxe would do 12 + STR. Fireball would do 48 instead of 8d6. Assume no criticals. For Rogues, assume Sneak Attack.
  7. No insta-kill spells or abilities. Power Word Kill technically doesn’t deal damage. It just lowers the HP to zero.
  8. You can include an additional round for any/all in-game companions, provided they are acquired via the character’s abilities, spells, or items. So a Ranger’s animal companion, a Wizards group of zombies from Animate Dead, and a Sorcerer’s familiar with Dragon’s Breath are fine. An NPC Knight that swore an oath to protect your character as a quest reward is not allowed. You can assume the same rules as above for the companions: they all hit and do max damage. You can assume these companions can have items equipped, provided that is legal in the SRD (so no giving your bear a sword).
  9. The only environmental effect you can consider is max fall damage: 20d6 for 120 damage. But your character has to cause the enemy to fall during their attack. For this purpose, you can assume the enemy is standing 5 ft from the edge of a cliff. Otherwise, assume you cannot setup or alter the environment in any way outside of spells. No setting up traps.
  10. Ignore effects like Wild Magic Surge or items that cast random spells, as they are too unpredictable for the purposes of this calculation.

Firefox bug permits stealing encrypted passwords: How is this possible?

It’s my understanding that passwords I save in Firefox’s Password Manager are encrypted and that setting a Master Password encrypts the encryption key used in this process. The Google hit for “Does firefox encrypt saved passwords?” returns this Mozilla Support forum article in which the chosen answer (posted by a moderator) states:

The passwords stored in logins.json are encrypted, but the encryption key is stored in key4.db (previously in key3.db) and without a master password you merely need to place the two files is Firefox profile folder to see the passwords in the Password Manager.

(Note that logins.json is where FF stores passwords.)

This Information Security question posted by a high rep user assumes the encryption of the passwords, even before a user has set a Master Password, as does this well-received question.

But according to the Sophos Naked Security article, Firefox fixes “master password” security bypass bug, Mozilla released a security fix to resolve an issue where an attacker can copy saved passwords to the clipboard without entering the Master Password:

It was found that locally stored passwords can be copied to the clipboard thorough the ‘copy password’ context menu item without first entering the master password, allowing for potential theft of stored passwords.

How is this possible if the passwords are encrypted?

Isn’t the Master Password, needed to decrypt them before access? I’m very worried now that an attacker that gains access to my logins.json and key4.db files would have all my saved passwords!