• About
  • Disclaimer
  • Privacy Policy
  • Contact
Saturday, June 14, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Computer Networking

community – Can session IDs distinguish a malicious software faking a restart?

Md Sazzad Hossain by Md Sazzad Hossain
0
community – F5 Failing SSL Handshake After “Consumer Good day”
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


Closed. This query is off-topic. It isn’t presently accepting solutions.


NE is a website for to ask and supply solutions about professionally managed networks in a enterprise atmosphere. Your query falls exterior the areas our neighborhood determined are on subject. Please go to the assist middle for extra particulars. For those who disagree with this closure, please ask on Community Engineering Meta.

There have been a attainable assault found on a system (IVXV on-line voting) that relies on customers importing a malicious voting software which might pretend a failure then a restart to get the person’s credentials twice (this manner it should get the verifying QR code for the person’s selection,disguise it for a short time, then vote once more utilizing the second credentials it acquired through the faked failure)
.
My query is Can session ID monitoring detect this assault?
.
Particularly, this code they added in final Could?
https://github.com/valimised/ivxv/blob/revealed/voting/inside/sessionstatus/rpc/consumer.go#L103
.
Is the issue solved this manner?
I imply I do know this code is ready to detect a change in session ID, however will this forestall the malicious software from deceiving the person right into a second vote since it should have the identical session ID? Or a malicious software would have one other methods to beat this?

2- a second comply with up query: suppose it did detect and therefore prevented deceiving the voter right into a second vote, Can the server create one other communication channel to tell the voter that he/she is utilizing a malicious software?

Thanks

You might also like

5G is Shifting Downstream to Enterprises

AWS Summit Sydney – Accelerating AI from Prospects to Manufacturing – IT Connection

Is WiFi 7 Value It? Evaluating Early Wi-Fi 7 Adoption Advantages, Community Throughput & Extra.


Closed. This query is off-topic. It isn’t presently accepting solutions.


NE is a website for to ask and supply solutions about professionally managed networks in a enterprise atmosphere. Your query falls exterior the areas our neighborhood determined are on subject. Please go to the assist middle for extra particulars. For those who disagree with this closure, please ask on Community Engineering Meta.

There have been a attainable assault found on a system (IVXV on-line voting) that relies on customers importing a malicious voting software which might pretend a failure then a restart to get the person’s credentials twice (this manner it should get the verifying QR code for the person’s selection,disguise it for a short time, then vote once more utilizing the second credentials it acquired through the faked failure)
.
My query is Can session ID monitoring detect this assault?
.
Particularly, this code they added in final Could?
https://github.com/valimised/ivxv/blob/revealed/voting/inside/sessionstatus/rpc/consumer.go#L103
.
Is the issue solved this manner?
I imply I do know this code is ready to detect a change in session ID, however will this forestall the malicious software from deceiving the person right into a second vote since it should have the identical session ID? Or a malicious software would have one other methods to beat this?

2- a second comply with up query: suppose it did detect and therefore prevented deceiving the voter right into a second vote, Can the server create one other communication channel to tell the voter that he/she is utilizing a malicious software?

Thanks

Tags: applicationdistinguishfakingIDsMaliciousNetworkrestartSession
Previous Post

2025 IT Challenges Companies Could Encounter

Next Post

Don’t Fall for These Misconceptions!

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

5G is Shifting Downstream to Enterprises
Computer Networking

5G is Shifting Downstream to Enterprises

by Md Sazzad Hossain
June 14, 2025
That is Extending to GreenOps – IT Connection
Computer Networking

AWS Summit Sydney – Accelerating AI from Prospects to Manufacturing – IT Connection

by Md Sazzad Hossain
June 13, 2025
Is WiFi 7 Value It? Evaluating Early Wi-Fi 7 Adoption Advantages, Community Throughput & Extra.
Computer Networking

Is WiFi 7 Value It? Evaluating Early Wi-Fi 7 Adoption Advantages, Community Throughput & Extra.

by Md Sazzad Hossain
June 13, 2025
The right way to use ChatGPT to put in writing code – and my prime trick for debugging what it generates
Computer Networking

The right way to use ChatGPT to put in writing code – and my prime trick for debugging what it generates

by Md Sazzad Hossain
June 12, 2025
ArubaCX Can not Rely When Coping with VXLAN « ipSpace.internet weblog
Computer Networking

ArubaCX Can not Rely When Coping with VXLAN « ipSpace.internet weblog

by Md Sazzad Hossain
June 12, 2025
Next Post
Don’t Fall for These Misconceptions!

Don’t Fall for These Misconceptions!

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

U.S. Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason” – Krebs on Safety

U.S. Soldier Charged in AT&T Hack Searched “Can Hacking Be Treason” – Krebs on Safety

February 27, 2025
High Machine Studying Jobs and  Put together For Them

High Machine Studying Jobs and Put together For Them

May 22, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

The Carruth Knowledge Breach: What Oregon Faculty Staff Must Know

Why Each Enterprise Wants a Regulatory & Compliance Lawyer—and the Proper IT Infrastructure to Assist Them

June 14, 2025
“Scientific poetic license?”  What do you name it when somebody is mendacity however they’re doing it in such a socially-acceptable manner that no person ever calls them on it?

“Scientific poetic license?” What do you name it when somebody is mendacity however they’re doing it in such a socially-acceptable manner that no person ever calls them on it?

June 14, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In