dialog listlengths 4 30 | title stringlengths 15 150 | category stringclasses 14 values | dialog_time stringdate 2016-01-21 01:59:30 2018-07-01 01:34:46 |
|---|---|---|---|
[
{
"message": "Hi I have a Lenovo laptop encrypted with Bitlocker, which I also use a fingerprint scanner with. Bear in mind I'm not working with super-secure information, more the level that a developer/manager for a business would have. What are the potential issues with fingerprint scanners and Windows 10 Hel... | What are the security risks of USB fingerprint scanners in Windows 10? | security | 2017-03-27T18:44:26.923 |
[
{
"message": "I'm trying to embed a secret watermark in a website so that I can link any screenshots to the user who created them. The page looks something like this:<a href=\"https://i.stack.imgur.com/BFiS1.png\" rel=\"nofollow noreferrer\">It has a custom background (user can change it by providing a link) on... | Hidden digital watermark in a website which can survive .jpg screenshots? | security | 2017-03-28T11:54:46.050 |
[
{
"message": "Suppose I have a Windows PC in a safe room, disconnected from the internet, with only 3 cables connecting to another room, to a mouse, monitor and keyboard.The computer contains highly sensitive data. The HDMI monitor cable is no problem, but the mouse and keyboard cables are USB cables, and could... | Allow only specific devices to be connected to USB | security | 2017-03-28T14:51:37.517 |
[
{
"message": "There are many posts and questions asked about what to do if you lose your private key for your SSL certificate, or about the best way of backing it up. But I couldn't find anything on why it's actually important to keep, especially if there is some danger of it falling into the wrong hands. If m... | Problems with destroying your SSL private key? | security | 2017-03-28T17:00:46.213 |
[
{
"message": "I'm building a site with Spring, which requires authentication in order for accessing certain pages.The site is actually composed of a client host, which render the views and handle the data binding, and a REST api host (built with Spring as well), it's responsibility is returning/manipulating dat... | Am I missing any loopholes with my current session managment? | security | 2017-03-28T19:17:06.663 |
[
{
"message": "I tried to get free internet bypassing my mobile network's ISP using a proxy setting in my mobile. I got the instructions in some trick I read and it actually works. When I browsed the proxy page, it opened.1) How my mobile network ISP is allowing packets to proxy?2) I read that they create an ssh... | how free internet proxy works | security | 2017-03-29T15:58:17.480 |
[
{
"message": "We're a small startup running a server inside the clients premises and certain files needs to be kept encrypted on that server. We want the decryption to be only possible when we plug in a particular USB drive (with the private key inside it). Are there any free implementations of this? I tried us... | Key based encryption for files with the key stored on a USB drive? | security | 2017-03-29T17:50:56.373 |
[
{
"message": "I found this report about a <a href=\"https://www.exploit-db.com/exploits/39882/\" rel=\"nofollow noreferrer\">buffer overflow vulnerability in <code>websocify</code>. I do not understand how this line<pre><code>$ curl http://example.com/$(python -c 'print \"A\"*5000')</code></pre>triggers the vu... | Understanding a proof of concept | security | 2017-03-30T15:29:34.573 |
[
{
"message": "Bad news: I forgot a GnuPG secret key passphrase.Good news: I do know the words it is constructed of. So, I can easily use <code>john</code> or similar to recover (too many combinations to do it manually, though).Problem: The secret key is not in the <code>secring.gpg</code> format that <code>joh... | GPG/GnuPG secret key passphrase recovery and/or .gnupg/private-keys-v1.d/ file format | security | 2017-03-30T16:57:09.470 |
[
{
"message": "This has something to do with a different post I made:<a href=\"https://security.stackexchange.com/questions/154599/bypass-x-frame-options-for-clickjacking\">Other postWhile researching this a bit further I found the following blogpost: <a href=\"https://blog.elev.io/getting-around-the-x-frame-opt... | Bypassing x-frame options possibility discussion | security | 2017-03-31T08:51:36.530 |
[
{
"message": "I'm working on an API that is intended to be consumed by another system. The data is not owned by the requesting machine and the user(s) that the data pertains to are not driving the transaction. You could think of it as the same use-case as a hospital web service that transfers sensitive data and... | Securing non-consumer machine-to-machine APIs with Encryption over SSL | security | 2017-04-01T05:48:37.467 |
[
{
"message": "Say I have 100 image files, all different names, I batch rename them <code>1-100.jpg</code>, I then change the extension of all the files to <code>.txt</code>. I then make 100 blank text files and over write the converted image files.I then split the 100 blank txt files and split them 50/50, renam... | How secure is manually over writting files? | security | 2017-04-01T06:36:33.190 |
[
{
"message": "I'm referring to this article here:<a href=\"https://www.yahoo.com/finance/news/watch-skimmers-atm-004452954.html\" rel=\"nofollow noreferrer\">https://www.yahoo.com/finance/news/watch-skimmers-atm-004452954.html\"In addition to using skimmers, thieves also obtain debit card information by install... | How are hackers still obtaining credit card information from database breaches? | security | 2017-04-03T11:21:24.033 |
[
{
"message": "I am working on a centos based network device , required to pass fips 140-2 level 2.I plan to use openssl in fips mode and CTR_DRBG will use as PRNG.will this be enough for meeting NIST SP 800-90 requirments ? Do I need to provide external source of entropy or the linux default /dev/random is enou... | use of PRNG in OpenSSL - fips mode | security | 2017-04-04T21:41:31.050 |
[
{
"message": "I just finished reading a <a href=\"https://www.wired.com/2017/04/hackers-hijacked-banks-entire-online-operation\" rel=\"nofollow noreferrer\">Wired article about a DNS hijack where the attackers redirected all bank traffic to servers they hosted on Google Cloud. What I thought was interesting abo... | DNS hijack redirect from one HTTPS hostname to another? | security | 2017-04-05T05:15:14.070 |
[
{
"message": "Say I want to create a cloud based private key storage for users, which they can use to sign documents.On the server side I would use a HSM to make the key storage more secure. One option is that the signing happens on the server side. But, this way the server knows the private key of the user, wh... | Cloud based private key storage for users | security | 2017-04-05T09:11:50.460 |
[
{
"message": "When signed data is packaged as PKCS#7, what all content PKCS#7 could be there(Ex. certificates, signature, etc.)?And what are the purpose of packaging all those contents?",
"role": "user"
},
{
"message": "You can embed any data within a PKCS#7/CMS structure.The Cryptographic Message S... | What all content PKCS#7 can have and what is the purpose of each? | security | 2017-04-06T08:54:08.567 |
[
{
"message": "Im getting acquainted with Buffer Overflows (BOF) and was replicating <a href=\"https://blog.techorganic.com/2015/04/10/64-bit-linux-stack-smashing-tutorial-part-1/\" rel=\"nofollow noreferrer\">a simple attack described by Techorganic. They create a simple C program called \"classic\", which cont... | Using (cat $file; cat) to run a simple BOF exploit | security | 2017-04-06T14:18:59.957 |
[
{
"message": "Suppose I own the <code>whynot.com</code> domain. Can I request a certificate for <code>google.com\\0x.whynot.com</code> ?",
"role": "user"
},
{
"message": "Since <code>google.com\\0x.whynot.com</code> is not a valid hostname you should not by able to get a certificate for it. But it ... | Issue certificate through CA that contains a different domain in it? | security | 2017-04-07T08:33:44.447 |
[
{
"message": "I am currently working on a Project where I am doing a downgrade attack from LTE to GSM. I am using OpenLTE and OpenBTS for creating the fake base stations. When the phone connects to the fake GSM Network, SMS and calls are not encrypted because A5/0 is used. When i setup Asterisk to communicate v... | Catch incoming SMS/Calls in a fake GSM Network | security | 2017-04-07T11:23:58.260 |
[
{
"message": "Is there a standard way for a PAM module to persist additional arbitrary data about each user, where that information is to be retrieved and updated in a later invocation of the same PAM module for the same user?",
"role": "user"
},
{
"message": "This should be a comment, but its a bit... | How best to persist arbitrary user data from a PAM module? | security | 2017-04-08T14:05:57.183 |
[
{
"message": "I visited this site where I was able to set the language in the main page. When I clicked on the language link I got an URL like <code>site.com/index.php?lang=us</code> and was redirected to the home page. On the navbar I could see the USA flag, and when I looked into the HTML code I saw the sessi... | Possible vulnerabilities from letting users set session values manually? | security | 2017-04-09T07:35:07.570 |
[
{
"message": "We have multiple desktop applications that are being used by clients on unconnected desktop computers. The application instances are being used by multiple users secured by username and password. The problem is that these users share the same windows account and thus have the same security level i... | Storing privacy sensitive data in a local application | security | 2017-04-11T11:06:09.753 |
[
{
"message": "I would like to create my own GSM network (base station with mobile devices connected to each other) and having voice/sms services.Something like demonstrated here:<a href=\"https://evilsocket.net/2016/03/31/how-to-build-your-own-rogue-gsm-bts-for-fun-and-profit/\" rel=\"nofollow noreferrer\">http... | create GMS base station with mobile devices | security | 2017-04-11T20:51:25.603 |
[
{
"message": "Recently, OWASP introduced two new set of categories as of 2017, April - to it's OWASP Top 10:Insufficient Attack ProtectionUnprotected APIsI understand, Unprotected APIs does have an immediate risk which involves proving a huge attack surface along with possibilities of data leakages, however, I ... | How is Insufficient Attack Protection a Definite Threat/Risk to an Organization? | security | 2017-04-12T05:43:02.263 |
[
{
"message": "Recently discover someone doing the following seacrch queries on my website!<pre><code>1 AND 1=2 UNION SELECT 0x6461726b31636f6465,0x6461726b32636f6465,0x6461726b33636f6465,0x6461726b34636f6465-- 2620 36212 1 AND 1=2 UNION SELECT 0x6461726b31636f6465,0x6461726b32636f6465,0x6461726b33636f6... | SQL injection - NEw attacks discovered on my site. Please advise | security | 2017-04-12T15:24:16.527 |
[
{
"message": "My initial reading of the GDPR doesn't seem to cover cases of consent with regards to inbound e-mails.If I run a corporate e-mail server and store all incoming e-mails on it, I'm storing private data of data subjects (natural persons).Am I in breach of GDPR if I don't get consent from the data sub... | Storing e-mails on private servers and getting consent from data subjects (EU GDPR) | security | 2017-04-12T21:28:30.020 |
[
{
"message": "Ok I know this is a stupid question but our one and only DBA get into a mess with our manager and rage quit today.As a small company, I (IT support guy who knows nothing about DB) was told to change \"password\" to protect the database from sabotage.We have this remote PC as a server with Allround... | Do I have to change my database user password in this situation? | security | 2017-04-13T13:20:29.307 |
[
{
"message": "<pre><code>SureSure = sjcl.encrypt(\"password\", GetUserInputSTUFF, { adata: \"{4687f36d-99d4-4223-ae53-46041297bef5}sbDU9DHzf0v3doe7aouZjEbW92750001489303Ktqr\"});</code></pre>Output:<pre><code>{\"iv\":\"a6J6pjHFos2HOIghbEkGLw==\",\"v\":1,\"iter\":50000,\"ks\":256, //.... }</code></pre>What is... | Wondering what "v" is, in SJCL Library encyption output | security | 2017-04-14T22:33:33.780 |
[
{
"message": "I've wondered whether a virus, originally written for 32-bit executable, can infect 64-bit executable successfully?All 32-bit instructions are valid 64-bit instructions, right? So, only the ABI may break things?How should a 32-bit virus be adjusted (if neccessary) to target 64-bit executable?I'm i... | Can a 32-bit virus infect a 64-bit executable in Windows or Linux? | security | 2017-04-15T15:44:08.183 |
[
{
"message": "I am trying to troubleshoot a bunch of flowbits generated by pulledpork from snortrules-snapshot-2990.tar.gz.WARNING: flowbits key 'file.pdf' is set but not ever checked.The line in the generated rules files by pulledpork reads:<pre><code>alert tcp $EXTERNAL_NET any -> $SMTP_SERVERS 25 (msg:\"F... | Troubleshooting Snort Rules | security | 2017-04-17T10:09:32.143 |
[
{
"message": "I was using wireshark and expecting to see a JSESSIONID in a HTTP request, but it did not seem to be there for HTTP requests. I could see my own JSESSIONID however. Would upgrade-insecure-requests help protect a query string form sniffing?",
"role": "user"
},
{
"message": "First of all... | Can a querystring in a URL be protected from sniffing without HTTPS? | security | 2017-04-19T12:06:53.810 |
[
{
"message": "How would one extract a non-exportable private key in Mac OS X 10.12.4?",
"role": "user"
},
{
"message": "Plenty of tools for this, I'll leave this here: <a href=\"https://github.com/n0fate/chainbreaker\" rel=\"nofollow noreferrer\">https://github.com/n0fate/chainbreaker but Elcomsoft... | Exporting non-exportable private keys in Mac | security | 2017-04-19T14:54:42.877 |
[
{
"message": "In 802.1x does the client authenticate with the certificate containing the privat e key e.g. is the private key stored on the device that is wishing to access a given resource network ?",
"role": "user"
},
{
"message": "<blockquote> is the private key stored on the device that is wish... | 802.1x certificate authentication, private key? | security | 2017-04-21T11:39:56.843 |
[
{
"message": "One website is <code>the....com</code> the other is <code>teh....com</code>. They display the same content. The whois data is radically different. Ping reports different IPs.TheGuardian.com hasn't responded to my request for clarification.How can I investigate the maliciousness, if any?",
"rol... | how to investigate diff between theguardian.com and tehguardian.com | security | 2017-04-21T22:10:57.343 |
[
{
"message": "I have my own VPN server on a remote server on VPS. On some websites, very unknown and small ones, I've faced up to a restriction stating \"It's likely that you're behind VPN or proxy, you're not allowed to use our website\". I don't want to change my VPN provider, meaning I don't want to buy VPN ... | How do they determine that "It's likely that you're behind VPN or proxy" if I have my own custom VPN? | security | 2017-04-22T02:14:06.350 |
[
{
"message": "Upfront, please overlook my naivety. I have a service app that talks to a web api. I only want the service to talk to the web api, nothing else. Means I need to secure it and I'm trying to understand why I should use a client certificate as opposed to a sufficiently long random shared key/string.T... | Would a custom random string do what I want? | security | 2017-04-22T08:13:09.280 |
[
{
"message": "If I have a bit coin address, how do I find out user info? I see there is a <a href=\"http://bitcoinwhoswho.com\" rel=\"nofollow noreferrer\">http://bitcoinwhoswho.com but I did not get any information back on my user.Here is what the address kind of looks like (some substitutions) 6cc711d3e7c71b... | Who owns this bit coin address? | security | 2017-04-22T17:28:50.227 |
[
{
"message": "I recently installed openVPN on my phone. I set it up at home and <code>whatsmyip</code> showed my vpn server's ip on both my desktop and on my mobile device (connected to home wifi)When I am on a mobile network, <code>whatsmyip</code> shows an ipv6 address. I connect to the vpn (using OpenVPN for... | OpenVPN on mobile | security | 2017-04-22T17:36:36.083 |
[
{
"message": "I have an image of an SD card and I am doing analysis on it. Is there any way to find that on which system this SD card was used last time.The image I am having is of a SDHC and has FAT32 as file system. does SD card saves the System information of the system in which they were connected or mounte... | System Information on which the SD card was used last time | security | 2017-04-24T02:19:21.417 |
[
{
"message": "I am in close proximity to the moment, where I will need to migrate from my old ssd and data hdd to new ones (wear and age), so I'm rethinking my environment. Please, give me suggestions about what should be improved regarding security and backups.Consider environment as described:In everyday use,... | How to properly store, encrypt and backup passwords for home and office use | security | 2017-04-24T12:59:29.147 |
[
{
"message": "I was looking through different methods of salting and tried to compare which is more secure for password storage. I know HMAC wasn't meant at first for password hashing but it is widely used for that purpose. I also know the more secure method is using key stretching. I looked through <a href=\"h... | Theoretical - Password salting with concatenation vs. salting with HMAC | security | 2017-04-24T19:29:39.953 |
[
{
"message": "Recently one of my servers has been hacked and it seems they got SSH access (logs are removed, ransom readme files created etc..). The account has a ssh certificate authentication (incl. passphrase for the private key) and I wonder if:there's any real chance for an attacker to brute force certific... | brute force ssh account with key-pair authentication? | security | 2017-04-26T06:14:19.597 |
[
{
"message": "After reading some of the latest research from NIST and some good summaries, for example: <a href=\"https://www.cisoadvisory.com/cai-blog/2016/10/24/nist-proposes-new-approach-to-passwords\" rel=\"nofollow noreferrer\">https://www.cisoadvisory.com/cai-blog/2016/10/24/nist-proposes-new-approach-to-... | It's well into 2017 - what's the latest best practise password policy | security | 2017-04-26T13:00:59.987 |
[
{
"message": "Maybe I'm just asking for the correct search terms.mod_nss and the NSS information/design idea is that if the key storage device (in this case, an HSM) is capable of performing a DH/SSL handshake, then the device will be used (the key is not extracted from the HSM, and then used on the host for th... | mod_nss vs openssl behavior vis-a-vis key storage vs use | security | 2017-04-26T17:36:24.197 |
[
{
"message": "Maybe I'm just asking for the correct search terms.mod_nss and the NSS information/design idea is that if the key storage device (in this case, an HSM) is capable of performing a DH/SSL handshake, then the device will be used (the key is not extracted from the HSM, and then used on the host for th... | mod_nss vs openssl behavior vis-a-vis key storage vs use | security | 2017-04-26T17:36:24.197 |
[
{
"message": "How is it possible to sniff the whole traffic within a network range even if it's beyond your subnet scope?For instance, consider your machine having the IP address of <code>172.16.96.25</code>, but you need to sniff the whole traffic between <code>172.16.96.1 - 172.16.111.254</code>.Machine InfoM... | Sniffing the whole traffic within a network range | security | 2017-04-28T05:51:19.373 |
[
{
"message": "Consider following example:We created own CA certificate (self-signed) and imported into browser trust store.We signed certificate by this CA certificate with SAN extension with following domains:DNS: *.devDNS: *.*.devNo matter if CN is present in certificate or even whole DN is missing.Still gett... | What are wildcard certificate limitations in SAN extension? | security | 2017-04-28T07:32:11.287 |
[
{
"message": "Is there a possibility for a skilled programmer to make an undetectable non viral trojan? infecting one system at a time, meaning that it'll never have it's signature be known by anti-malware makers, thus bypassing all security programs?I have windows 10 and KIS 2017, i share my USB key very often... | Safety from new trojans | security | 2017-04-29T21:27:49.330 |
[
{
"message": "I read that LUKS uses 256-bit AES with CBC by default. CBC, of course, has the disadvantages that if you change something in the plain text, you have to change everything that comes after it. In the case of hard drive encryption, that's usually at least a few hundred GB, often several TB. You don'... | Why does LUKS use CBC? | security | 2017-04-30T21:46:38.127 |
[
{
"message": "The system I am working on primarily use Google App Engine for my main web app and Amazon Cloudfront/S3 for hosting static data.Now as an audit exercise this question is out to me: <blockquote> Are the internet facing components of the service hosted in a separate network zone (DMZ) protected by ... | Do AWS and GAE use DMZ? | security | 2017-05-01T01:36:19.153 |
[
{
"message": "I would like to create a web app that runs on a server I don't physically control (e.g., on Google Cloud). I want to protect my users from the possibility of the server being compromised and sending malicious JavaScript code to the client.What is the state of the art for doing this? Is it even d... | How to protect web app users from server compromise? | security | 2017-05-01T04:16:01.933 |
[
{
"message": "I am trying to crack wireless WEP password of my wireless AP. When I enable monitor mode and issue this command:<pre><code>root#airodump-ng -w TESTFILE1 -c 1 --bssid 68:72:51:58:A3:14 wlan0mon</code></pre>No handshake is recorded. I disconnect or connect any client with that AP, and when I start a... | Handshake not recording | security | 2017-05-02T06:39:49.777 |
[
{
"message": "I want to make guillou quisquater authentication for a website with Laravel (PHP). The authentication is between server and client(user). In the references i've read (<a href=\"https://www.eecis.udel.edu/~mills/ident.html\" rel=\"nofollow noreferrer\">here and <a href=\"https://people.rit.edu/~bgl... | Is username and password needed to register and authenticate user in zero knowledge guillou quisquater? | security | 2017-05-03T05:14:16.867 |
[
{
"message": "I was looking into some papers regarding proof of data possession like <a href=\"https://www.researchgate.net/profile/Hongxin_Hu/publication/242538412_Cooperative_Provable_Data_Possession/links/0c960529295002bb5f000000.pdf\" rel=\"nofollow noreferrer\">this or <a href=\"http://citeseerx.ist.psu.ed... | Proof of data possesion in cloud storage where you cant do calculation to the object stored in the server | security | 2017-05-03T10:07:04.237 |
[
{
"message": "According to Azure support case #116120515025419, the public datacenter only supports the following<pre><code>TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384_P256TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256_P256TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P256TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256_P384TLS_ECDHE_RS... | Four ECDSA P256 CSPs are available in Windows. Which one should I use? | security | 2017-05-03T17:53:25.220 |
[
{
"message": "We have decided to use AES to cipher user data. So for every data chunk we have the crypted text along with the SALT. Now we have to store both of them in the database and we do not want to separate the SALT from crypted text in different columns. So I'm searching for some standard (like PEM for k... | Envelope formats to store (symmetric) encrypted text | security | 2017-05-04T07:42:14.543 |
[
{
"message": "Recently my AV has been detecting Trojan backdoors, Rootkits and Worms quite often. Some go unnoticed (I've checked suspicious files in VirusTotal a few times and they indeed turned out to be malware without the AV detecting them).I've tried cleaning up, but in the end I decided to do a clean Wind... | Can malware attach itself to user files? | security | 2017-05-05T13:07:44.733 |
[
{
"message": "From <a href=\"https://tools.ietf.org/html/rfc4253\" rel=\"nofollow noreferrer\">RFC 4253:<pre><code> Each packet is in the following format: uint32 packet_length byte padding_length byte[n1] payload; n1 = packet_length - padding_length - 1 byte[n2] random padding; ... | Why does SSH use random padding? | security | 2017-05-06T00:14:16.747 |
[
{
"message": "A customer found a couple of generated links pointing to private data on their website. After looking at the links and searching a specific part of the URL on Yahoo, I found dozens of other private links available, from all our other clients (all different and privately owned domains) - this is re... | Private generated and encrypted links show up in Yahoo search, but not Google | security | 2017-05-06T00:52:52.870 |
[
{
"message": "I have read Ivan Ristic, Bulletproof SSL and TLS. There its been said after 2 RTT, client start sending application data like for e.g. GET request.But I have seen when analysing packets through wireshark that in some sites clients starts sending application right along with ClientFinished message ... | Can Client send Application data in TLS 1.2 or earlier before getting server Finished message? | security | 2017-05-06T07:43:30.763 |
[
{
"message": "Let's say I've an hash of this type:<pre><code>test::::4e45c7bab093d7011e9b3a5df7d9fa88212beac5ac9c8c47:d6ff3373aa353f3b:123456</code></pre>I would like to bruteforce it using hashcat, but I'm failing to set the correct mask.Here's what I'm executing:<pre><code>hashcat -m 5500 test.txt -a 3 $MASK<... | Bruteforce with hashcat, how to set the mask properly? | security | 2017-05-07T12:14:50.773 |
[
{
"message": "I have a network dump (PCAP file) from a \"conversation\" between a web server apache (192.168.1.2) and some clients:<a href=\"https://i.stack.imgur.com/H1KgF.png\" rel=\"noreferrer\">What a should look for to prove that the server buffer (or TCP WINDOW) is full? I received 403 error (error.log). ... | How to prove the Apache web server is not accepting connections anymore because of an denial of service attack (Slowloris)? | security | 2017-05-07T17:05:11.977 |
[
{
"message": "While trying to work on incident investigation, I am seeing continuous https requests from website<pre><code>cdn.syndication.twimg.com:443/widgets/timelines/paged/callback=__twttr.callbacks.tl domain=www.kali.org</code></pre>These requests are continuous and are tagged as something (file with PDF/... | Unknown Requests on URL Web Filter Proxy | security | 2017-05-08T15:42:31.560 |
[
{
"message": "I understand that SSL connections already has its layer of encryption to protect data transmitted between a client and server.Assuming that my connection has SSL, does it still make sense for me to encrypt data that is transferred between a client and server using keys?For instance, I might be sen... | Does it still make sense to encrypt data over SSL? | security | 2017-05-10T13:44:27.987 |
[
{
"message": "assuming all emails sent to the clearnet from a specific email provider are tracked by country e.g. all emails from protonmail will have a link to switzerland and the NSA AI will scan and read them cause they are in the clearnet. If protonmail uses a .onion address, does the email exit protonmail ... | sending email through hidden .onionservice for email | security | 2017-05-11T09:41:30.797 |
[
{
"message": "I've read that the MVC anti-forgery token defeats CSRF attacks by storing security tokens in a form field and then comparing the default header/cookie value sent automatically by the browser to the field value set by MVC on every request. Since a malicious web site will not know what value to give... | What is the purpose of the default header/cookie in an MVC anti-forgery token? | security | 2017-05-11T21:55:24.750 |
[
{
"message": "Thunderbird still uses 3DES for SMIME encryption (<a href=\"https://bugzilla.mozilla.org/show_bug.cgi?id=1167857\" rel=\"nofollow noreferrer\">bug #1167857).Since 3DES is severely \"broken\" and uses only 80 bits of security, I would like to tell my Thunderbird, not to use that algorythm any more.... | Disable 3DES (Triple DES) in thunderbird | security | 2017-05-12T21:09:46.850 |
[
{
"message": "Due the vulnerability in Windows SMB Server (<a href=\"https://technet.microsoft.com/en-us/library/security/ms17-010.aspx\" rel=\"nofollow noreferrer\">MS17-010), how can I tell if it is running? I am using Windows XP. None of the services I have running has the word \"SMB\" in the title or descri... | How can I tell if Windows is running SMB? | security | 2017-05-13T02:56:34.657 |
[
{
"message": "I want to build a distributed software system with the following elements:A number of workers, which manage potentially sensitive data and execute code on behalf of a number of clients.A number of clients, which can send commands to the workers.A central trust authority, which grants the right to ... | Building a "Hello, world!" X.509-based system for establishing trust between servers | security | 2017-05-13T14:17:02.593 |
[
{
"message": "I am trying to find the reason that a certain webpage is not getting iframed even when X-Frame-Options header is absent.<br>Observation:<br>When I write an HTML with iframe tag pointing to the URL and save this file locally and open it, I can find the page getting loaded in an inframe. But I when ... | X-Frame-Options Absent but cant load the page in iframe | security | 2017-05-13T17:57:01.247 |
[
{
"message": "There is a website which I want to audit. That site must have a concrete Virtualhost configuration because if you access to it using the domain name the website is shown, but if you use the ip address the website is not shown. If I launch an exploit using Metasploit against a site with this kind o... | Metasploit. Is always replacing domain names with resolved ips on RHOST/RHOSTS? | security | 2017-05-14T19:59:24.917 |
[
{
"message": "The media keeps updating us on the number of WannaCry infected PCs. Are they all using the information from <a href=\"https://intel.malwaretech.com/botnet/wcrypt/?t=5m&bid=all\" rel=\"nofollow noreferrer\">MalwareTech? How does MalwareTech get this information?",
"role": "user"
},
{
... | How does MalwareTech make the WannaCry ransomware live map? | security | 2017-05-15T02:46:12.540 |
[
{
"message": "If a site requires you to authenticate with only a phone number and a one time login code, what safeguards can be put in place such that when I change my phone number and the phone company recycles it, that the person who has my old phone number doesn't accidentally or maliciously gain access to m... | SMS based authentication, handling recycled phone numbers? | security | 2017-05-15T22:24:33.910 |
[
{
"message": "Our team is trying to secure a native Android mobile app.Amongst other things we are using Dexguard for some checks such as tamper, root and emulator detection.Long story short: some of these checks fail in our debug builds - mainly because we want to keep the build times short for developers - an... | Android tamper resistance: BuildConfig.DEBUG spoofing? | security | 2017-05-16T08:47:39.633 |
[
{
"message": "WannaCrypt-like SMB spreading technique was widely used in Stuxnet, as docummented by Symantec and Kaspersky.Read this: <a href=\"https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwiD6aaO7_nTAhUT5WMKHb36DsoQFggnMAA&url=https%3A%2F%2Fwww.symantec... | WannaCrypt-style SMB exploits known since Stuxnet, circa 2008, but Microsoft hid fixes from us. So what is new now? | security | 2017-05-17T15:13:40.560 |
[
{
"message": "Recently, when I was subscribing to email newsletter on some website, I was surprised by not receiving confirmation email. Naturally I registered my mail alias to newsletter as well to verify that it was intended behavior. It was.And it leaves me wondering - what are the dangers and downsides of n... | Dangers of one step email subscription | security | 2017-05-17T16:38:57.073 |
[
{
"message": "<pre><code>$output = '';if(isset($_POST[\"query\"])){ $output = ''; $search = \"%{$_POST['query']}%\"; $stmt = $con->prepare(\" SELECT * FROM tables WHERE cat_name LIKE ? LIMIT 3\"); $stmt->bind_param(\"s\",$search); $stmt->execute(); $result = $stmt->get_result(); whil... | Is this code safe for search box or no? | security | 2017-05-19T01:08:22.903 |
[
{
"message": "Please let me know if any of my assumptions are incorrect.Say I had a database, where all of the rows of a database column is encrypted at the application level using a single passphrase, \"SECRET\", using password based key derivation:<a href=\"https://i.stack.imgur.com/IMDeG.png\" rel=\"nofollow... | Can I query on row-encrypted data in my database? | security | 2017-05-19T18:02:39.843 |
[
{
"message": "I recently was attacked by some cryptolocker (not sure if it's WannaCry) and now I am revising my network policies. For reaching this aim I want to disable all SMB-activity for infected PC. Surprisingly, even doing all according to <a href=\"https://support.microsoft.com/en-us/help/3185535/guideli... | Effective blocking of SMB connections on AsusWRT | security | 2017-05-21T11:26:45.347 |
[
{
"message": "With the recent breakout of WanaCry, how is it possible that we know on which hidden service it connects, we still don't know where the physical device is located and thus we cannot take it down.",
"role": "user"
},
{
"message": "<a href=\"https://www.torproject.org/docs/hidden-service... | How is it possible that we can't really trace C&C(or other hidden) server? | security | 2017-05-22T18:35:58.477 |
[
{
"message": "I registered for SSL certs for a domain, and got 4 files in return:interCert.crtPKCS7Cert.crtrootCert.crtX509Cert.crtI understand rootCert must be the root CA cert and interCert is an intermediate cert, but what are the other two? which one should I use for what purpose? I'm guessing one is a priv... | Types of certificates for SSL | security | 2017-05-23T07:58:14.433 |
[
{
"message": "I was wondering if this function would be vulnerable to XSS.<pre><code>var url = \"google.com\";if (url.indexOf(\"http\") != 0) { url = \"http://\" + url;}$(\"<a/>\").attr(\"href\", url);</code></pre>The 'url' is user input, and the <code><a/></code> would be placed on some webpage... | Is there a possability to inject XSS into the jQuery attr function? | security | 2017-05-23T08:04:38.950 |
[
{
"message": "I'm currently using two-factor between my Mac and iPhone. And I also use it for my Google account. (Those are the two only ones at the moment.)How I can protect access to my accounts if I don't have a mobile phone?First, I'd like to understand if two-factor on a mobile phone is stronger than using... | Understanding the strength of mobile two-factor and alternatives to this | security | 2017-05-24T13:24:45.193 |
[
{
"message": "Two closely related questions:1) My boss said it's ok for us to go on our personal email during our breaks. If I do this, can the company steal any information beyond what is viewable on the screen? Does this mean as long as I don't send or view any private/confidential emails this should be ok? S... | How safe is using personal Gmail and Google Account at work? | security | 2017-05-25T10:53:26.837 |
[
{
"message": "So I'm about to undertake Cyber Essentials as our first step towards nailing as best as we can our security. I have done quite a lot of work on locking down our network, however, I would like audit the internal network externally to see if anything is exposed or public accessible (Printers, Router... | Scan my network externally | security | 2017-05-25T11:11:39.360 |
[
{
"message": "I see that there are some APIs which exchange some sort public keys to secure the content of https connection using asymmetric encryption. Is there any added benefit to this? As far as I know, it should be impossible to man in the middle a tls connection which have certificate pinning.The benefit ... | Certificate Pinning vs E2E Encryption | security | 2017-05-26T13:08:26.280 |
[
{
"message": "I was reading about kerberos authentication and how the password is not transferred on the wire but it exist in the kdc database to encrypt or decrypt messages, and only tickets are transferred after validation. I wonder when the user changes his password at the client how will it update the new ... | Kerberos authentication question | security | 2017-05-26T20:41:18.740 |
[
{
"message": "I am training to be a pen tester and am having some issues obtaining a 4 way handshake. I use <code>airodump-ng -c -w file --bssid wlo1</code> followed by <code>Aireplay-ng -0 0 -a (Mac) wlo1</code>Here's all the steps I follow:<pre><code>Ifconfig wlo1ifconfig wlo1 downiwconfig wlo1 mode monitorif... | I am unable to secure a WPA handshake (4 way handshake) | security | 2017-05-27T01:07:39.383 |
[
{
"message": "Is there any way to prevent meterpreter process migration.?",
"role": "user"
},
{
"message": "Based on <a href=\"https://security.stackexchange.com/questions/90578/how-does-process-migration-work-in-meterpreter\">this question, process migration requires the SeDebugPrivilege to create ... | Prevent metasploit meterpreter process migration | security | 2017-05-27T07:19:15.067 |
[
{
"message": "I was wondering if perhaps it doesn't since enabling it slows down drive performance even on a Kabylake CPU.",
"role": "user"
},
{
"message": "Bitlocker started offering encryption offloading from Windows 8.However, it offloads to the drive. That means that your drive has to support th... | Bitlocker - does it use hardware acceleration such as AES-NI? | security | 2017-05-27T22:16:41.497 |
[
{
"message": "I need to encrypt large dataset files that may be in gigbytes of size. I can perform compression task on the dataset too. Which will be a good algorithm to use that is fast enough as well as secure enough?",
"role": "user"
},
{
"message": "Depends on what you're trying to secure it fro... | Which algorithm works well for encryption of large datasets? | security | 2017-05-28T14:24:54.587 |
[
{
"message": "I use Ubuntu with ufw enabled. I connect to the Internet directly without a firewall. Are there any risks ?",
"role": "user"
},
{
"message": "Everything is risky, the question is, how risky. IT security is mainly about the effective estimation of the risks and costs and manage them.The... | Is connecting to the Internet directly (without a hardware firewall) risky? | security | 2017-05-28T18:14:33.210 |
[
{
"message": "I'm learning about XSSI attacks and I'm wondering if the following dynamic JS can be used to access the content.Dinamic.js:<pre><code>if (window.location.hostname === 'Demo.site.com' ){ updateLoginHeader('Nick', 'IWANT-THIS-SECRET'); }</code></pre>Can the attacker retrieve IWANT-THIS-SECRET us... | How to get JS content fron XSSI vulnerability? | security | 2017-05-29T07:48:58.683 |
[
{
"message": "Let's say I only trust web applications that I tested myself with some penetration tests. What penal consequences exist for doing a passive scan (eg. building a map of a website site) or an active scan for vulnerabilities (with SQLMap or ZAProxy for instance) without asking its owner and damaging ... | What are the penal consequences for a passive or active scan on a WebApp with no damage? | security | 2017-05-29T09:45:42.720 |
[
{
"message": "I have the Netflix account in our family, meaning I have the password.It's a secure password, with 16 characters, including symbols, numbers and uppercase, for example <code>3?TeJ)6RK]4Z_a>c</code>, which has around 80 bits of entropy.However, I have to share this password with other members of... | Is WhatsApp or Facebook Messenger secret conversation a reasonable method for transferring passwords? | security | 2017-05-29T20:26:02.967 |
[
{
"message": "I'm trying to set up CSRF prevention by checking the Origin and Referer headers, and also blocking any action if neither are set. However, if the URL is simply typed or pasted into the browser, such a check will cause the action to be blocked since the Origin and Referer headers won't be set.I tho... | How to keep an origin / referer check for CSRF prevention from blocking URLs that are typed in? | security | 2017-05-29T23:53:43.397 |
[
{
"message": "I am developing an application to secure communications between a client and an embedded linux server. I am very new to the field of cryptography, so at this stage I am looking more for guidance - especially when it comes to vulnerabilities in my approach. The server will not be connected to the... | One-Time-Password securing an embedded server via OpenSSL | security | 2017-05-31T15:55:30.027 |
[
{
"message": "Is it possible to investigate if a pendrive has been connected to a specific PC? Are there any traces left on the device?",
"role": "user"
},
{
"message": "You could try USBDeview utility.<a href=\"http://www.nirsoft.net/utils/usb_devices_view.html\" rel=\"nofollow noreferrer\">http://... | Is it possible to investigate if a pendrive has been connected to a specific PC? | security | 2017-06-01T14:38:34.767 |
[
{
"message": "I was scammed and I thought those scammers were really from Microsoft so I let them remotely connected to my computer. I don’t know what they installed on it. After I realized that it was a scam, I reset my computer, cleaned all the drives and reinstalled Windows 10. I thought whatever virus I had... | Blocking DiagTrack outbound connection after malware infection | security | 2017-06-02T09:37:08.807 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.