dialog listlengths 4 30 | title stringlengths 15 150 | category stringclasses 14 values | dialog_time stringdate 2016-01-21 01:59:30 2018-07-01 01:34:46 |
|---|---|---|---|
[
{
"message": "I use LastPass comprehensively, and for each new site/password I almost always have it generate a random password of the same number of characters, allowing letters, numbers, and symbols (except when prevented by password forms that disallow that length or certain symbols). Today, it occurred to m... | Should I vary the length of my completely-random passwords for the best security? | security | 2017-08-04T23:35:23.660 |
[
{
"message": "I read in the following passage in this <a href=\"https://www.digitalocean.com/community/tutorials/how-to-set-up-nginx-with-http-2-support-on-ubuntu-16-04\" rel=\"nofollow noreferrer\">DigitalOcean article, concerning HTTP/2:<blockquote> Even though HTTP/2 does not require encryption, developers ... | Must one have SSL certificates for each domain, to use HTTPS? | security | 2017-08-05T01:39:30.880 |
[
{
"message": "Are there any mechanisms in the TLS 1.2 protocol (not implementation) against timing attacks? For example, that the handshake response time should be padded to X milliseconds? Or should I implement such mechanisms manually ?",
"role": "user"
},
{
"message": "Yes. See <a href=\"https:/... | Are there any mechanisms in TLS 1.2 protocol against timing attacks? | security | 2017-08-05T03:32:37.647 |
[
{
"message": "I'm trying to understand how CA's operate.One question that came to my mind is that, according to my intuition, a single private key should have a limited amount of certificates it can issue. Given this,<blockquote> How often do CA's renew the keys, and under what circumstances (number of certifi... | How many certificates can a CA issue before its secret key is renewed? | security | 2017-08-06T10:16:29.920 |
[
{
"message": "Need to store encrypted user code in our database and get the decrypted form in return. Using the standard node module crypto to do so. Wanted to understand the strength of below encryption in terms of security. Does it offer enough security and how does choice of password affect strength of encry... | Strength of below aes encryption | security | 2017-08-07T07:20:35.857 |
[
{
"message": "Im am currently writing a project in C using OpenSSL/TLS and I am not very experienced in encryption. I have successfully established unencrypted OpenSSL connections and I am relatively experienced in C/C++. The Project involves the actuation of hardware so the data sent is very repetitive and not... | Which encryption method should I use when connecting multiple clients to a local server? | security | 2017-08-07T07:43:14.913 |
[
{
"message": "I was reading an e-book about different types of attacks and found this:<blockquote> A skilled hacker can intercept DNS replies from servers and replace the IP addresses for the requested names with addresses of machines that the hacker controls, thus providing an easy method for ongoing session ... | Does Session hijacking/IP spoofing happen in real time? | security | 2017-08-07T17:55:46.487 |
[
{
"message": "My aim is to tighten the firewall on my AD domain PC running Windows 10. Even though Windows firewall is already turned ON - I am not confident that it is blocking malware outbound trafficWhat is an effective way to determine which outbound traffic are malware and which are initiated by legitimate... | How to Determine Malware Outbound Traffic? | security | 2017-08-08T04:02:35.020 |
[
{
"message": "I've tried to find an answer to this question for a while now, but my efforts have been fruitless. I've found several articles and questions about offline authentication, but these are mainly concerned with storing login credentials locally after a user has already logged in once online.The reason... | How do I prevent users from using my iOS apps unless they have been authenticated on a server? | security | 2017-08-08T08:33:12.650 |
[
{
"message": "I've seen that user certificates can be stored on the user's computer just like machine certificates would.I understand it would be very secure if the user had placed his private key on a smart card or USB, cause then it would always be with him, like on his key-ring alongside his house and car ke... | Is there a point to using user certificates instead of only using machine certificates? | security | 2017-08-08T19:08:55.013 |
[
{
"message": "I'm running a windows 8.1 machine. On it I have bitdefender free av and Malwarebytes free that I scan occasionally. When I think a site may be sketchy to go to, I start my cyberghost VPN free version then start a virtual machine through virtualbox of a trial win 8.1. On that it has bitdefender fre... | How secure is a virtual machine and free VPN? | security | 2017-08-09T11:26:23.740 |
[
{
"message": "I have seen a couple of questions on here today that recommend DNScrypt for encrypting DNS traffic. However, I feel a little bit of gut inertia that this is not good enough for 2017. What tools do you recommend for encrypting DNS traffic? My real question is... what tools do you use. I really care... | How do you encrypt DNS traffic in 2017? | security | 2017-08-09T14:20:57.117 |
[
{
"message": "I have an application listening on the port 5000 that can be accessed to the internet through nginx with this configuration:<pre><code>upstream myapp { server 127.0.0.1:5000;}server { listen 80; location / { proxy_pass http://myapp; proxy_set_header Host $host;... | Is using X-Real-IP as a way to check for localhost access safe? | security | 2017-08-10T14:04:24.767 |
[
{
"message": "An online storage platform allows sharing files with anyone who does not have an account there by sending an https link leading to direct download of the file. The link is e-mailed to invited users.A part of the link is long key, probably random enough not to be successfully guessed by a human. Bu... | Is e-mailed cryptic download link considered secure? | security | 2017-08-11T11:29:09.860 |
[
{
"message": "Hello stack exchange community, I was wondering if i can generate a payload that connects using http . Because it will be faster and it will avoid all the problems of port forwarding and explloiting. Can i generate such payloads using metasploit?",
"role": "user"
},
{
"message": "Yes, ... | Can i make a http payload? | security | 2017-08-11T16:25:26.583 |
[
{
"message": "So i found a website(lets call it example.com)with a search bar that is not properly sanitized. I was able to pop a alert box with a payload.But i noticed that the URL doesn't change for valid or invalid search query .It always remains www.example.com/search . No query string is being send when i ... | Is this a non exploitable vulnerability | security | 2017-08-14T11:23:24.417 |
[
{
"message": "In my website I have a textbox where the user can enter whatever they want and the text is printed out on the next page. For certain cases, they can type HTML tags to format their message so that in the next page of the website things can be bolded, in a list, italicized, etc, but script tags are ... | Is it a security risk if the user enters html characters in a textbox and they're reflected on the next page in a website? (not script tags) | security | 2017-08-15T16:52:44.600 |
[
{
"message": "I have been reviewing my company's SPF record with a number of our SAAS providers.One service advised me to use 'include:amazonses.com' in my record to allow emails to be validated.I am rather hesitant in allowing Amazon's service API to be allowed in the record.Is this not delegitimizing the purp... | Email SPF record integrity | security | 2017-08-16T02:03:30.590 |
[
{
"message": "We are told to use password that are long with high complexity to prevent attackers from using brute force attacks on our accounts The thing is that many websites will pick this up and either enforce timings e.g. 30 seconds between tries or lock you out altogether. In this scenario is a high compl... | Do long password actually help protect your accounts on websites attacks | security | 2017-08-17T22:06:40.897 |
[
{
"message": "I know that MD5 is a poor choice for hashing passwords, but its not my ideia.Imagine that we would use the username as a salting mechanism, wich is also bad idea, but just for an example. First, we md5 or sha1 this username and then concatenate with the password as a salt, then hash it: sha2(md5(u... | Using MD5 as salt | security | 2017-08-19T01:25:40.070 |
[
{
"message": "<a href=\"https://security.stackexchange.com/questions/29106/openssl-recover-key-and-iv-by-passphrase/29139#29139\">This answer on another question on security stackexchange by a very reputed user explains why he prefers GnuPG over OpenSSL for file encryption. From what I understand, it can be sum... | Why brute-force the password instead of the key directly? | security | 2017-08-20T21:05:39.723 |
[
{
"message": "I had some private pictures and videos in a folder along with some normal wallpapers. I checked today, and was shocked to find out that only the private pics and videos were not present in the folder, but wallpapers were present.My wifi device remains connected to the laptop.What has possibly happ... | Can a hacker get access to files on hard disk drives of laptop if wireless wifi device gets hacked? | security | 2017-08-21T12:10:47.017 |
[
{
"message": "Does any one know if:X-Frame-Options X-XSS-Protection X-Content-Type-OptionsContent-Security-Policyare for HTTP and:Strict-Transport-SecurityPublic-Key-Pinsare for HTTPS?What I mean is that if I have a blog which serves pages on HTTP and has no HTTPS redirection, then only the first 4 headers are ... | HTTP Security header implementation | security | 2017-08-21T20:08:38.883 |
[
{
"message": "I provide free VPN access to a lot of people and often times have troubles dealing with abuse reports from stupid stuff like network scanning.I have been researching for hours now, but I am astonished that I can't find any open-source solution which is able to detect and block such traffic bi-dire... | Are there any open source firewalls for a VPN server? | security | 2017-08-22T06:58:28.193 |
[
{
"message": "Let's say I live in Russia and I use Gmail. My Gmail has my phone number for recovery in case I lost my Gmail password.Obviously if Russian police want to access my Gmail account then they can produce a SIM card for my name and receive the reset code.So, there is not much to protect yourself. You ... | Is a SIM card secure against governments? | security | 2017-08-22T22:59:44.950 |
[
{
"message": "Let's say I live in Russia and I use Gmail. My Gmail has my phone number for recovery in case I lost my Gmail password.Obviously if Russian police want to access my Gmail account then they can produce a SIM card for my name and receive the reset code.So, there is not much to protect yourself. You ... | Is a SIM card secure against governments? | security | 2017-08-22T22:59:44.950 |
[
{
"message": "The XSS vector is at the * but the function issue_type is not declared hence my payload is not getting executed.following is the instance of the vulnerable code:-<pre><code><select name=\"sub_subissues\" id=\"_subsubissues\" onchange=\"issue_type(this, *)\" style=\"height:30px;\"></code></p... | JS bug is stopping xss payload to exeute | security | 2017-08-23T13:46:28.767 |
[
{
"message": "So I tried performing a return-to-libc according to <a href=\"https://sploitfun.wordpress.com/2015/05/08/bypassing-nx-bit-using-return-to-libc/\" rel=\"nofollow noreferrer\">https://sploitfun.wordpress.com/2015/05/08/bypassing-nx-bit-using-return-to-libc/ .I found libc's address by using \"ldd vul... | return to libc- finding libc's address and finding offsets | security | 2017-08-24T07:33:50.197 |
[
{
"message": "I used CurrPorts to monitor TCP/IP network connections. This image shows when I don't connect to the Internet but I don't know why Avast Antivirus established this port. Is it insecure?<a href=\"https://i.stack.imgur.com/CqjzW.png\" rel=\"nofollow noreferrer\">This image shows when I connected to ... | Insecure/Obsolete TCP/UDP Ports? | security | 2017-08-24T09:35:22.057 |
[
{
"message": "I'll soon be working on upgrading a system which contains a MYSQL server and redis server on AWS It works by querying two entire tables decrypting all of the contents and then putting the result in redis, the application then queries redis from then on to retrieve results.The problem is everytime ... | UK healthcare encryption obligations | security | 2017-08-27T13:31:54.183 |
[
{
"message": "Update September 2018: The events described below still happen to this day though less often from servers of The Shadow Server Foundation. By now I have denied access to most of their IP addresses, but I get a lot more connection attempts from other services like Leaseweb and whatnot. However, it ... | The Shadow Server Foundation constantly trying to get access to mDNSResponder | security | 2017-08-28T10:08:22.927 |
[
{
"message": "I Want Some Books or somethin about windows / linux privilege escalation, enumeration.. tips etc i know the basic.. enumeration os version / kernel version etc",
"role": "user"
},
{
"message": "These are very good starting pointsLinux<a href=\"https://blog.g0tmi1k.com/2011/08/basic-lin... | Privilege Escalation (Linux / Windows) | security | 2017-08-28T16:48:45.520 |
[
{
"message": "A friend of mine was recently attacked by this new cryptolocker in an unusual way. I anticipate my question: what kind of cryptolocker is this, what could the attack vector be, and is a cure available to recover files? I know, and explained to the party, that the second is unlikely.My friend ran a... | Information on cryptolocker seeking ransom via email to certain email address | security | 2017-08-29T08:25:54.350 |
[
{
"message": "Hello I have an Intel® Core™ i3-2328M CPU @ 2.20GHz computer processor (I think Sandy Bridge).<a href=\"https://ark.intel.com/products/70927/Intel-Core-i3-2328M-Processor-3M-Cache-2_20-GHz\" rel=\"noreferrer\">https://ark.intel.com/products/70927/Intel-Core-i3-2328M-Processor-3M-Cache-2_20-GHzI ha... | Is Intel i3 CPU affected by the Intel ME vulnerability? | security | 2017-08-29T19:52:46.327 |
[
{
"message": "I'm looking for a security solution for my web-server Apache in windows enviroment for an authenticated services published to internet, I cannot setup a DMZ because it is heavily connect to all other servers of that network.My question is: can a reverse proxy protect me from apache exploits?I was ... | Can a reverse proxy protect from web-server exploit? | security | 2017-08-30T06:30:26.613 |
[
{
"message": "Assume that you have a web application. The backend API is deployed at <code>api.example.com</code> and your frontend SPA is deployed at <code>frontend.example.com</code>. When you open it you download all the resources to your browser. The origin is <code>frontend.example.com</code>, yet when yo... | Is a single page application naturally breaking the same-origin policy? | security | 2017-08-30T08:03:15.103 |
[
{
"message": "I am trying to understand how <code>certificates</code> works in <code>cryptography</code>. I have seen in my browser that is has a list of trusted certificates already. For example, when I want to connect with a secure server, I'll receive a server certificate during handshake comprising its publ... | What does the browser keep, the CA copy or CA public key? | security | 2017-08-30T10:07:38.183 |
[
{
"message": "We host sites for multiple companies and sites are hosted with custom domains.For Examplenews.CompanyX.comnews.CompanyY.comWe have complete control on hosted site but do not have control over \"CompanyX.com\" or \"CompanyY.com\" and emails of these domains. These companies add CNAME DNS entries fo... | Can I complete SSL Certificate Domain Control Validation (DCV) | security | 2017-09-01T08:34:34.867 |
[
{
"message": "We have a 2008 R2 virtual server that is only used for logon via rdp or from local console. No VPN traffic is required.The server was under attack for a couple of days, viruses where installed etc.Most of it is cleaned up now but i still see many failed logon attempts mostly for user administrator... | cyberattack by password guessing admin account logon type 3 | security | 2017-09-01T16:22:02.337 |
[
{
"message": "Will public key pinning completely avoids the default server authentication process by client?For example, by default server authentication process server checks for certificate expiry, By implementing public key pinning it means that only public key will verified, and the certificate expiry check... | Check certificate expiry along with Public key pinning | security | 2017-09-01T16:39:22.040 |
[
{
"message": "If my application uses JRE 1.8.0_6, that have currently 3 CVEs reported, all later updates' CVEs sums up to 216, and 34 CVEs reported in JRE 1.8.0 in general, what is the number of vulnerabilities my application is potentially exposed to 3, 3+34, 3+216, or 3+216+34, and why?",
"role": "user"
... | Does CVEs reported in a Java Update applies also to previous updates? | security | 2017-09-03T15:23:28.930 |
[
{
"message": "Recently, I saw some strange entries on my local-only webserver. The thing is I don't know if the attack came from outside the network or from an infected machine. I have read up a little on the <code>hnap</code> attack, but I'm still unsure what to do about it. Essentially, Cisco routers have vul... | /hnap1/ scans router compromised or worm? | security | 2017-09-03T22:54:06.907 |
[
{
"message": "The aim is to avoid article easily copied by Web crawlers.Cipher the text with a substitute cipher.Generate a font that counteracts the substitution and transfer to Web front-end. (This works by having text characters render as their substitute instead of their actual character.)When the browser r... | Is it practicable to use font to visually decrypt ciphertext | security | 2017-09-05T06:23:55.540 |
[
{
"message": "I have several timestamp token files that I think should have TSA certificates embedded within them because the \"Request TSA certificate\" option was selected when I requested them with <a href=\"https://github.com/disig/TimeStampClient\" rel=\"nofollow noreferrer\">TimeStampClient. Now I want to... | How to extract TSA certificate from tst file? | security | 2017-09-05T18:15:09.400 |
[
{
"message": "Even if this particular approach likely provides medium to low assurance, which approach is more trustworthy: Suppose I take a set of photos that I own, and crop all of them after I magnified by 25%. How reasonable is it to assume I \"own\" the picture if I share some or all of that cropping?Is it... | Which approach provides more authenticity of image ownership: cropping, or reduced resolution? | security | 2017-09-06T15:04:26.873 |
[
{
"message": "If i was to create a DNS server that is hosted at my home, so then i can use it for my VPS servers; am I creating any security threat that can be abused by unknown clients from around the globe?TL;DR:If i set-up a DNS server, is it safe to open port 53 to the internet?",
"role": "user"
},
... | Is allowing public access to a DNS server, a security threat? | security | 2017-09-08T17:01:17.697 |
[
{
"message": "If I want to check out a dodgy link from a friend, I've started opening these in a virtual machine. I'm assuming that if the VM gets hacked, the host where I do internet banking etc will still be fine. Under what circumstances does this assumption hold?e.g. I can imagine shared folders and a share... | What are escalation pathways from a VM to its host? | security | 2017-09-09T09:32:32.980 |
[
{
"message": "A vulnerability report states the following:<blockquote> The server is configured to support ciphers known as static key ciphers. These ciphers don't support \"Forward Secrecy\". In the new specification for HTTP/2, these ciphers have been blacklisted.</blockquote>From what I could find, the lack... | Static Key Ciphers and key persistence | security | 2017-09-11T12:41:12.567 |
[
{
"message": "I have two applications: One is Backend API and the second is frontend. I want to add SSL certificate.Both applications are visible via the Internet, one on port x (backend) and another on y (frontend). A client connects to frontend and then frontend connects to backend in order to get data.Where ... | Where should I put ssl cert (backend or frontend)? | security | 2017-09-11T14:38:30.850 |
[
{
"message": "I know the many benefits of SSL for the users of a website. It creates a contract whereby the user can be certain that the entity they're transacting with is who it claims to be and that the information passed is encrypted. I also have some idea about other benefits (e.g. speed benefits from HTTP/... | SSL's (security) benefit to the website owner | security | 2017-09-13T15:33:12.473 |
[
{
"message": "I have pulled the <a href=\"https://hub.docker.com/r/ismisepaul/securityshepherd/\" rel=\"nofollow noreferrer\">Security Shepherd Docker image and followed all the instructions for the Docker setup. I believe all steps were successful. Now I don't know how to run the Shepherd application, while th... | How to start OWASP Shepherd using Docker? | security | 2017-09-14T07:39:28.097 |
[
{
"message": "I know the general math behind using character-based and dictionary-based passwords/passphrases and how to determine the entropy of the result. But I am unclear how adding uppercase letters, numbers and other characters or words to a dictionary-based passphrase changes the entropy.For example, usi... | How to determine how entropy changes when using uppercase, numbers and special characters in a dictionary based passphrase? | security | 2017-09-16T01:58:17.577 |
[
{
"message": "I created a self-signed CA certificate, and then created a client certificate using this tutorial <a href=\"https://datacenteroverlords.com/2012/03/01/creating-your-own-ssl-certificate-authority/\" rel=\"nofollow noreferrer\">here. I am just trying to revoke the client certificate:<pre><code>opens... | How do I revoke the certificate and generate a CRL? | security | 2017-09-17T01:45:11.023 |
[
{
"message": "I've read the great post written by @Thomas Pornin<a href=\"https://security.stackexchange.com/questions/30974/which-properties-of-a-x-509-certificate-should-be-critical-and-which-not\">Which properties of a X.509 certificate should be critical and which not?and it raised my question. STORY:Let's ... | Not supported critical extensions | security | 2017-09-18T09:22:20.567 |
[
{
"message": "I have a question regarding source code review of Linux packages. I downloaded a package of Ubuntu lets say <code>samba</code>, I thought to review source code of <code>samba</code> to look for security vulnerabilities. I used <code>flaw finder</code> for code review of <code>samba</code> package.... | Source Code audit | security | 2017-09-18T09:52:47.800 |
[
{
"message": "I am confused about why websites use CORS. I know CORS provide some protocols through which website can call the resources from other domains, but is it possible to call the resource without CORS?If it is, then what vulnerability can it cause?",
"role": "user"
},
{
"message": "You can ... | Why do we use CORS? | security | 2017-09-19T07:51:44.340 |
[
{
"message": "I’m seeing many logins to my Stack Exchange OpenID account from the private IP addresses 10.7.2.16 and 10.8.2.15. Another of my accounts says that it was logged in from 10.80.0.144. I was under the impression that accessing webpages via the Internet requires a public IP address.So, can Internet lo... | Can Internet logins occur from the private IPv4 address range (10.x.x.x)? | security | 2017-09-20T23:06:02.080 |
[
{
"message": "where exactly is the difference in validation between OV and EV?both types of certs validate that a company exists in some way and that's pretty much it.I mean point 2.1.3 explicitly states that it EVs are not vouching forthat the company is activethat it is legalthat it's trustworthythat it's saf... | OV vs EV Certificates | security | 2017-09-22T12:33:56.587 |
[
{
"message": "If a 3rd party who is malicious manages to get a hold of a SSL private key for domain (ex: xyz.com), but does not have access to the domain registrar or DNS for the domain, how can the 3rd party utilize the SSL private key? Would they be able to man in middle? What are potential attack vectors?",
... | If SSL private key is compromised, what can they do? | security | 2017-09-22T23:00:39.040 |
[
{
"message": "Intel Management Engine (ME) imposes a security risk (see <a href=\"https://www.blackhat.com/eu-17/briefings/schedule/#how-to-hack-a-turned-off-computer-or-running-unsigned-code-in-intel-management-engine-8668\" rel=\"nofollow noreferrer\">here for example). As I understand ME is a part of <a href... | Intel Management Engine vulnerabilities in CPUs without vPro | security | 2017-09-23T12:38:12.047 |
[
{
"message": "From time to time, I perform a scan with <code>clamscan</code>. I'm on Archlinux. Clamscan database is updated before each scan.Today clasmscan reported 19 infected files:<code>./.cache/mozilla/firefox/qyq0onej.default/cache2/entries/3BCF117A4E950F91D6EB45E1DEDD93D42A0F4084: Sanesecurity.Malware.2... | Clamscan: infected files found | security | 2017-09-23T18:53:48.467 |
[
{
"message": "Before this gets flagged as a duplicate, I'm not asking a question about the <a href=\"https://security.stackexchange.com/questions/20598/what-are-the-disadvantages-of-single-sign-on-authentication\">disadvantages of single sign-on, I'm asking if the initial concept is flawed to begin with without... | Is the idea of Single Sign-On (SSO) a flawed concept without Two-Factor Authentication (2FA)? | security | 2017-09-25T19:15:17.993 |
[
{
"message": "Earlier I added bcrypt with cost 12 (15 is a bit too long for login, 12 looks about right). I'm also planning to add the <a href=\"https://howsecureismypassword.net/\" rel=\"nofollow noreferrer\">https://howsecureismypassword.net/ open source version but I'd rather not scare people signing up. The... | bcrypt cost 10/12/14 brute force time? | security | 2017-09-25T20:52:13.167 |
[
{
"message": "I have a Samsung S8+ and when I'm in the office, I often will log in to the internal WiFi to listen to the Pandora app or play the Netflix app in the background. We actually have 2 Wi-Fi connections we can log in to - one is for guests and the other is for the employees, which takes our login and... | Work WIFI connection and personal cell phone | security | 2017-09-26T00:31:36.817 |
[
{
"message": "Sourcefire detected a <code>SERVER-IIS multiple extension code execution attempt</code> event and captured a packet. It originated from a Chinese IP, AbuseIPDB has several records about its malicious activity. Some of the logs included a user-agent string mentioning Googlebot2.0, but doing a rever... | SERVER-IIS multiple extension code execution attempt | security | 2017-09-27T11:28:46.220 |
[
{
"message": "I am relatively new to cybersecurity and hacking and I aim to learn ethical hacking as a passion alongside my mainstream education(Electrical Engineering).My setup: I have set up my very own WEP WiFi network(intentionally made vulnerable by setting up WEP encryption). I have also set up a microcon... | Data sniffing on a WEP 128-bit encryption | security | 2017-09-28T10:18:16.243 |
[
{
"message": "I am relatively new to cybersecurity and hacking and I aim to learn ethical hacking as a passion alongside my mainstream education(Electrical Engineering).My setup: I have set up my very own WEP WiFi network(intentionally made vulnerable by setting up WEP encryption). I have also set up a microcon... | Data sniffing on a WEP 128-bit encryption | security | 2017-09-28T10:18:16.243 |
[
{
"message": "I have a basic question regarding fingerprints of https certificates, the specific case I wanted to check being my online banking service. With firefox on linux, I can visit the specific web page and then click on the green lock and go to inspect the certificate, more precisely I can look at its S... | methods to check https certificates | security | 2017-09-28T14:09:16.967 |
[
{
"message": "I have system X from another department in our company that sends basic user info (not passwords) to my system using RESTful API. Both systems are using subdomains of the same domain but reside on different servers/networks. I just want to confirm that the incoming API request to my system is vali... | How to secure handshake system-to-system in RESTful API calls without user/pass? | security | 2017-10-02T17:56:22.573 |
[
{
"message": "My partner and I have just moved house and we're waiting for our internet to be connected. We're living in a group of units and as you'd expect there are numerous WiFi networks, all secured... or so I thought.The other day I was using my phone as a wifi hotspot and my partners phone was connected ... | I connected to an apparently password protected WiFi without giving a password | security | 2017-10-04T04:20:51.897 |
[
{
"message": "As we all know that what is the SOP? As its very popular. But my question arises when, pentesting this functionality.AS SOP provide the website to call the resources only from its domain. Ex. http: //example.com/ have the SOP functionality then Only resources can call from this (example.com) domai... | Same origin policy pentesting? | security | 2017-10-05T10:44:57.967 |
[
{
"message": "GnuPG offers a set of different trust models, but the manual isn't sufficient (for me at least) to figure out which one to use.Ideally, I would like a trust model that accepts the trust I explicitly assign to a key using GnuPG's <code>--edit-key</code> and <code>trust</code> subcommand, and also c... | How should I choose a trust model in GnuPG? | security | 2017-10-05T19:02:13.313 |
[
{
"message": "How long should I wait before using a newer (hopefully improved) hash function? For instance:Is SHA-3 ready for use because of extra testing that went on during the NIST competition?",
"role": "user"
},
{
"message": "<blockquote> How long should I wait before using a newer (hopefully ... | How long should I wait before choosing a hash function? | security | 2017-10-06T18:00:45.887 |
[
{
"message": "I'm doing a simple host discovery on my LAN and noticed that CIDR notation does not report any hosts. I scoured <code>man nmap</code> with no findings in differences between using a CIDR range and any other range.<code>sudo nmap -sn 192.168.1.*</code> and <code>sudo nmap -sn 192.168.1.0-255</code>... | nmap Not Working with CIDR Notation on LAN | security | 2017-10-08T17:21:01.633 |
[
{
"message": "I'm doing a simple host discovery on my LAN and noticed that CIDR notation does not report any hosts. I scoured <code>man nmap</code> with no findings in differences between using a CIDR range and any other range.<code>sudo nmap -sn 192.168.1.*</code> and <code>sudo nmap -sn 192.168.1.0-255</code>... | nmap Not Working with CIDR Notation on LAN | security | 2017-10-08T17:21:01.633 |
[
{
"message": "I am designing an image upload platform to my website and was thinking about a few recommendations I found online which were NOT outlined in the <a href=\"https://www.owasp.org/index.php/Unrestricted_File_Upload\" rel=\"nofollow noreferrer\">OWASP unrestricted file upload list.Those security solut... | Should I change format and/or add data to image files in a file upload? | security | 2017-10-10T09:10:28.243 |
[
{
"message": "I've had a few complaints from visitors to a site I manage that they are unable to connect to their website due to TLS settings of their browser. When checked the devices in question were set to run TLS 1.1.Is it common for clients to not have TLS 1.2 or have it disabled in 2017? Can a LAMP Webser... | Is a hosting company right in disabling all but TLS 1.2 as acceptable protocols to do SSL with? | security | 2017-10-11T19:13:16.003 |
[
{
"message": "I'm in the process of obtaining a code signing certificate from a CA that requires the use of a smart card for the generation of the PKI key pair.However, I would like to be in the possession of the private key, and not depend on a physical device.So here comes the question, who decides if the pri... | When generating PKI key pair with a smart card, who decides if the key is exportable? | security | 2017-10-14T11:22:53.307 |
[
{
"message": "I am trying to understand the principles of asymmetric encryption, and have read the following in a book:<blockquote> One key is completely public and can be read and used by everyone. The other part is private and should never be shared with someone else. When you encrypt something with the pu... | Can data be decrypted with the public key if encrypted with the private key? | security | 2017-10-15T09:40:10.487 |
[
{
"message": "I have a business partner in China. I need connect to their server (in China) from time to time. In recent several months something I don't understand happened. I cannot connect to the server if I use computers with internet cable, but the server is accessible if I use cell phone's data. Here are ... | Strange internet connection problem | security | 2017-10-16T05:42:29.373 |
[
{
"message": "I'm working for an ecommerce website written in C#.net (no CMS used, quite a lot of code) where security hasn't been a priority for a long time. My mission right now is to find and fix any XSS breaches. There is a lot of non-filtered data written directly in the rendered HTML.What is my best strat... | Secure big, old ecommerce website from XSS? | security | 2017-10-16T08:47:15.977 |
[
{
"message": "When a client is forced to reinstall the key and to reset the nonce and the replay counter, what does it imply for the future communication between the client and the AP? There's a adversary in the MITM position who now can decrypt packets, but I'm thinking if the client can still communicate with... | Can the client communicate with the AP after a KRACK attack? | security | 2017-10-17T04:42:57.400 |
[
{
"message": "According to Draytek on <a href=\"https://www.draytek.com/en/news/news/2017/how-are-draytek-wireless-products-affected-by-the-wpa2-krack-vulnerability/\" rel=\"nofollow noreferrer\">their website, <blockquote> When DrayTek wireless products, such as wireless routers and access points, are used a... | How can Draytek products not be affected by KRACK as they claim? | security | 2017-10-17T12:50:58.417 |
[
{
"message": "I am really new into security and much more confused with the concepts going on, regarding the CA.Let's assume the following exists in a system:<pre><code> TA | CA_MID / \\ CA_INT1 CA_INT2 /|\\ /|\\END_ENTn1 END_ENTn2</code></pre>The topmost CA is t... | Certificate chain with intermediate CA communication | security | 2017-10-17T18:53:32.963 |
[
{
"message": "I'm creating a password vault, which is consisted of a bunch of HTTP services, a web client, and Android application, and an iOS application.There is a very simple table called <code>Passwords</code> that has these columns:<pre><code>IdUserIdUsernamePasswordUrlNotes</code></pre>A user logs in via ... | How to maximize security for a password repository? | security | 2017-10-18T10:34:59.003 |
[
{
"message": "I had some interesting situation: My Amazon account has 2FA enabled where my smartphone with google authenticator is my second factor.Due to issues with this phone my second factor basically broke (no longer produced reliable pins).Since I was on a machine which was marked as trusted I could shop ... | Amazon 2FA: Compromising the email leads to compromising 2FA, e.g removing the other factor? | security | 2017-10-19T12:55:07.650 |
[
{
"message": "I have a question about DSA and GPG. Suppose you are trying to verify a downloaded file is 'legit' (i.e., no malicious code and it is the intended file). I'll just use Ubuntu's 16.04 LTS ISO image as an example. Following through the instructions, I get the general idea (please correct if I am wro... | Can an attacker replace the hash of a download, a download, and the public key? | security | 2017-10-21T04:26:32.373 |
[
{
"message": "I wrote a program. I want to publish a compiled executable for downloading by the public. How can I compile and distribute it without contact with my (presumably insecure and infected) operating system? How do software vendors ensure that their software packages are malware-free?The absence of rel... | Building software safely for malware-free distribution | security | 2017-10-21T18:33:37.917 |
[
{
"message": "I'm developing a application which is not static for me. This means that creating a WebService for my connectionString will not work I guess.Because my application works a bit like Wordpress. First you tell the application your database connectioni nfo and then the application will connect to the ... | Secure way to save connectionString in .NET? | security | 2017-10-23T08:28:52.097 |
[
{
"message": "Is it possible to compose an attack vector in such a way that a remote victim will not be required initially to interact with an attacker? That is, if OS is vulnerable then you'll execute the vulnerability successfully without victim perception. So far in the blogs, articles that I've read, they u... | Metasploit exploit which doesn't require initial user interaction | security | 2017-10-24T10:29:33.863 |
[
{
"message": "A site I work on has a link that downloads and opens a PDF containing sensitive user data. The user's authentication cookie is checked serverside to ensure they have access to the data before generating and serving the PDF. However, I worried about the prospect of data being leaked by a CSRF attac... | Is CSRF possible against a PDF download that requires cookie auth? | security | 2017-10-24T13:59:21.217 |
[
{
"message": "Are wpa_supplicant versions prior to 2.x (e.g. 0.2.x, 0.4.x, 0.6.x, 0.7.3, etc.) also vulnerable to any of the KRACK CVEs? I've looked at the source code but it's different enough from the 2.x releases that I can't immediately tell if those old releases have the same vulnerabilities, nor what it ... | are older wpa_supplicant versions vulnerable to KRACK? | security | 2017-10-24T22:58:31.377 |
[
{
"message": "DMARC is used to tell receivers of e-mail what to do if SPF or DKIM fails in mails send from your domain. As far as I know this pretty much sums up DMARC, if this is not correct please correct me.My question:The situation is this, mydomain.org has DMARC policy none (p=none).The mailserver of somed... | DMARC none policy overwrites local policy | security | 2017-10-25T08:12:45.573 |
[
{
"message": "I was reading this question today: <a href=\"https://security.stackexchange.com/q/171991/87457\">Does KRACK mean that wifi cafes will never be safe again? and thought to myself.. OK I will just use mobile data instead of public wifi's.But then my next question was, how can I guarantee that my mobi... | Can mobile phone data be intercepted or compromised? | security | 2017-10-25T09:05:44.147 |
[
{
"message": "Is it an issue to send back the same sensitive (PCI, PII) information from the server in the HTML reply that a user previously posted to the server?On our webpage, the user enters some key info (name/address/card/account number/etc.), which is then posted to our server and we send back a page cont... | Same sensitive info in HTML reply that was posted before | security | 2017-10-25T12:25:53.880 |
[
{
"message": "I tried to dnsspoof the victim machine for say \"www.imdb.com\" (with the help of setoolkit and ettercap). But the site is ssl https, so <a href=\"https://security.stackexchange.com/questions/94331/why-doesnt-dns-spoofing-work-against-https-sites\">I read here that dnsspoof won't work for https si... | How to make dnsspoof work for https sites? | security | 2017-10-26T06:34:18.257 |
[
{
"message": "When encrypting a document with a public key I got a warning:<pre><code>$gpg --encrypt -r 6B7F10E4 file.pdfIt is NOT certain that the key belongs to the person namedin the user ID. If you *really* know what you are doing,you may answer the next question with yes.Use this key anyway? (y/N)</code><... | GnuPG warning for a signed key with trust level 4 | security | 2017-10-28T10:38:10.823 |
[
{
"message": "In a <a href=\"https://en.wikipedia.org/wiki/Cross-site_request_forgery#Cookie-to-header_token\" rel=\"nofollow noreferrer\">cookie-to-header scheme of sending the xsrf/csrf tokens, the server sets a cryptographically secure pseudo-random number as a cookie in the client's machine. The java script... | Is ensuring that a random string in a cookie and a header are the same enough to protect against XSRF? | security | 2017-10-29T01:52:30.650 |
[
{
"message": "I am thinking about building a Linux Snort machine that can listen to both WAN and LAN traffic. Setup I am thinking about:<br>Snort computer with two NICs<br>One NIC connected to hub/tap outside firewall (WAN)<br>One NIC connected to hub/tap inside firewall (LAN)<br>Management from the Snort machi... | Can dual NIC Snort machine cause threats to bypass firewall? | security | 2017-10-29T13:08:03.173 |
[
{
"message": "As far as i know, NIDS implemented in Network layer and HIDS in Host-based layer, Is it possible for NIDS( for example: Snort or suricata ) log that will included in HIDS(for example: OSSEC) log too ? Do the NIDS and HIDS are stand-alone system that cannot be integrated each other ?The assumption ... | Combine SNORT detection and log with active response OSSEC | security | 2017-10-30T03:16:21.290 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.