instruction stringlengths 24 29.9k |
|---|
Question from the Bouncy Castle development list:
At present we use the Windows certificate store as:
var store = new X509Store(StoreName.My, StoreLocation.LocalMachine);
store.Open(OpenFlags.OpenExistingOnly | OpenFlags.ReadOnly);
var certs = store.Certificates.Find(X509FindType.FindBySubjectName, subjectName,
true);... |
I currently have an XXS problem in this site.
https://bbcpanningen.cupweb6.nl:1311/servlet/OMSALogin?msgStatus="><script>alert("hello") </script>
But I don't understand how an attacker can exploit this.
The sites doesn't use cookies so that might be a problem.
I've read something about it, and they all said the at... |
We're learning nmap in my ethical hacking class. We got showed how we can use nmap to perform a zombie scan:
nmap -PN -sI zombieIP targetIP
and decoy scan:
nmap -p 135 -D decoyIP targetIP
I understand what they do, but the lecturer didn't go into details on how it works. I'm curious to understand, how exactly can nma... |
I'm interested in securing IP Multicast traffic for content that will be sent globally with several low bandwidth receivers.
I understand that simplified Broadcast encryption takes N public keys and encrypts a symmetric key N times. This is an O(N) operation, that needs to be refreshed any time the membership of N c... |
Are there any web application security standards that I can use as a baseline for the security related requirements for a web application, web service, and for applications supported/hosted by third parties?
How is security risk managed for web application and what are the preventive and corrective controls that I sho... |
Google, Yahoo, Facebook and several banks have a session summary screen that lists a variety of information, but they aren't consistent in what is offered to the end user. e.g.
Facebook offers a concise "active session" list, and enough information to determine if that session should be terminated.
Chase bank, for ex... |
In an extraction of com.facebook.katana/Database db files (fb.db and webview.db), I get:
fb.db
If I use an hexadecimal editor to open those files, even when there is no SQLite record named c_user, neither datr, nor lu, etc. at some offset of the file, there are these strings. Could they be the active Facebook session ... |
I know next to nothing about cryptography, and I'm basically just looking for someone to look over what I'm doing and tell me if I'm screwing up.
I have the user entering in some sensitive information and a password. I then use that password as a key for AES to encrypt the information and store the ciphertext. Later,... |
The scenario is that a client browser (eg: a user trying to log in to a bank website) needs to be able to view certain sensitive information that resides in a mainframe sitting in the Internal network via a web/application server that resides in the DMZ (The client should not be able to directly connect to the mainfram... |
I need to secure the communication between an application (runs on any PC and has been designed for Windows) and an external device (runs on UNIX). The application is running on Windows while the device is Unix-based. I can directly influence the application, but I cannot influence the device (I have to communicate wit... |
as you probably know the problem with SSL based DDoS attacks is, that the traffic cannot be analysed and filtered by a DDoS mitigation service provider such as Prolexic, Akamai, Radware, etc. without having the key to decrypt the traffic.
I recently spoke with on of the above mentioned companies employees (Lets say co... |
So as you may have heard, the Adobe user database with 130 million records was leaked recently. I want to find out what password I used for the Adobe account I created to make sure that I'm not using it anywhere else. But how do I decrypt the Triple DES ECB-mode encrypted password? Is there a way to do this without k... |
I'm suppose to have a large environment ( 500+ servers ) all Windows based joined to Active Directory domain.
Some domain accounts are used for application\middleware authentication that needs high privileges (domain admins).
I would like to secure such accounts as much as possible. The password is known to restricted ... |
There is a particular string (URL) that I need to send from my webserver to the browser. The browser will need to inspect the string and later send it back unmodified (aka request the resource that the URL is pointing to). If the browser could modify the string, it would be a security risk. So I need to make sure that ... |
In this interview with Bill Gates and Bill Clinton, they discuss their work with Digicel, who I assume is this company, to enable mobile banking with normal KYC protections.
This site is full of exploits for SMS phones, and so I can't conceive of it being secure enough to handle banking transactions... yet it seems to ... |
I use AES-128bit to encrypt files and I want to compute a HMAC for each one of the encrypted files to ensure their integrity.
Can I use directly the AES KEY to compute HMAC or should I used a derived form (eg. PBKDF2 sha256) ?
In other words I wonder if the HMAC can facilitate the recovery of the AES key or not...
Tha... |
I am looking at the authentication library Flexi_auth for CodeIgniter. To use the library you have to create a object one time in the controller before the lib is used
Like this:
`$this->auth = new stdClass;`
They then use the object to store information as a form of sessions management. They store log in data and... |
I'm toying around a distributed computing project. The client application asks for a problem to solve. The server returns a problem description from a "problems pool". When the client finishes, it sends back the solution.
I cannot trust my users, and so I cannot trust their solutions. I need somehow to validate the... |
Right now I am thinking for a way to create a secure video streaming server with the following assumption:
people can be trusted not to distribute the video they have rights to see.
(I think in the first edit of my question I was not able to articulate my thoughts. The thing that people are trusted is not a requireme... |
There seems to be similar encryption going into both. They both use asymmetric (RSA, elliptic curves, etc) for the initial key exchange, then go to some symmetric (AES, Blowfish, etc) protocol. I'm wondering if someone here might have a moment to explain the difference between the 2 and how they would appear differen... |
It is common for public APNs to use shared credentials - nearly all mobile networks in the UK use the same credentials across all phones (see here for an example).
In M2M applications such as intruder alarm signalling, remote plant monitoring and smart metering, it is common for private APNs to be used instead of the n... |
There has been some talk about the Lavabit's case. New info was published today, but not important.
I'd like to know how Lavabit worked. First I thought they just did something with OpenPGP. Then I realized that maybe it was not the case since the US goverment requested some kind of universal private key for all users... |
This is what I believe are the security implications of integrating Oauth using embedded webview vs browser in mobile application.
Embedded Webview
* Keep UI for mobile app
Security implications
* Makes phishing easy (especially since no address bar to show url and security)
Browser
* Different UI/Context switc... |
When doing a vulnerability assessment on a large network, it seems general practice to determine which hosts on the network are live.
This can be done in various ways. From what I have read it is good to do some ICMP scans, perhaps use a vulnerability scanner that has a discovery component, and perhaps do some TCP/UDP ... |
I have a directory service that can speak a number of protocols and is used for user authentication. Currently user credentials are stored using Bcrypt to protect them in case of a compromised database.
Unfortunately there are a number of services that I would like to point at this server that only support MS-CHAPv2 f... |
I tend to use Git for deploying production code to the web server. That usually means that somewhere a master Git repository is hosted somewhere accessible over ssh, and the production server serves that cloned repository, while restricting access to .git/ and .gitignore. When I need to update it, I simply pull to the ... |
I am developing an application that runs on Windows PCs. The application is able to connect to some kind of devices within a LAN. It can create multiple TCP-connections to the device it is connected to. I want to secure every single TCP-connection with TLS/SSL.
The naive solution for this would be to use TLS/SSL for ev... |
Security and usability are often colliding. When it comes to locking screens on workstations after a certain amount of inactivity this is definitely the case and complaints have to be expected from end users.
As far as my experience goes, locking the screen on a workstation after 10-15 minutes is considered best practi... |
How can I prevent someone from scanning my Windows box using Nmap? I used Comodo as my firewall but someone still can scan my box using Nmap and get some info like open services and OS detection.
|
In a scenario where you have a Wireless network provisioned as untrusted behind a firewall, using VPNs to reach the trusted Datacenter. Does anyone have an reason why this should/not be expanded to include the wired edge ports - essentially bringing the firewall around the datacenter and making the LAN untrusted. It wo... |
While building my website I put together a security class which includes two functions, one takes input and returns it as a string passed through htmlentities function of PHP. The other strips out common XSS tags etc, until now I've been using both in conjunction when outputting user inputted data to the browser Just t... |
Sorry if this question is absolutely stupid or irrelevant, but I can't help but ask.
I am just curious about different approaches hackers take in social engineering attacks, and clever examples of each one of the approaches that one can take. And what kind of defenses and strategies that companies might employ in order... |
Thycotic has a Password Reset Server that allows the user to select from several images.
What general guidance is there for an image-based password reset challenge question?
Examples may include
How many images should be offered?
How many should be selected as part of the reset process?
What types of images should be ... |
Eve has just discovered and decrypted the file that associates each userid
with its 32-bit random salt value, and she has also discovered and decrypted the password file, which contains the salted-and-hashed passwords for the
100 people in her building. If she has a dictionary of 500,000 words and she is
confident all ... |
I've been reading a lot of online articles and blogs about advantages of using HTTPS (HTTP over SSL/TLS) and the performance issues involved in deploying a website over HTTPS. What I understood is that the performance overhead in using HTTP over SSL/TLS is because of the use Asymmetric Cryptography in the Protocol and ... |
I'm reading this and I'm little confused. What exactly is this setuid based script root spoofing?
|
I am a newbie in this field. I am confused with why SSL certificates cannot be free of charge. In my understanding the certificate is just a text file consisting of cryptic numbers installed on a server. What do the SSL certificates cost?
|
I am currently developing a game which will be run in a client, they will sign up for this game online and create their account there, their information will be stored into a MySQL database. I am creating the game using Lua + Love2D, upon launch of the game the user will be presented with a login and password field. Th... |
First of all, this question is not the same as is it possible to test out remote host by using nmap?, because on that question, the questioner is asking for something impossible due to NAT's nature.
My question has the same goal, but going a little further. If I know that a host has the port 12345 opened for some reaso... |
PPTP is the only VPN protocol supported by some devices (for example, the Asus RT-AC66U WiFi router). If PPTP is configured to only use the most secure options, does its use present any security vulnerabilities?
The most secure configuration of PPTP is to exclusively use:
MPPE-128 encryption (which uses RC4 encryption... |
Our office network bandwidth gets choked when an employee copies a large file into her DropBox, since it gets downloaded on several machines (of other employees).
LAN Sync is an option, but needs to be configured on each machine. So is the bandwidth settings.
Is there a way I can control via Firewall settings (iptable... |
I have an unlocked but not rooted Android device (Nexus 7 2013 WiFi "flo", legitimately unlocked using fastboot oem unlock from an x86 computer). Neither adb root nor adb shell followed by su let me gain root or write to /system/xbin/su. Installing F-Droid's Superuser app didn't help to gain an initial root (see http... |
I accidentally used my work's wifi to look at porn using my iPhone.
I refreshed a tab I had open from a session when I wasn't at work. Now I'm worried my firm will find out.
The network is password protected, but I didn't have to enter a username.
My phone's name at the time was set to my own name (i have since chang... |
I read that encrypted emails are secure, cause only who has your public key can decrypt it.
I also read that it's a common thing to upload your public key on a keyserver.
But if my encrypted email is intercepted, the spy just needs to go on the keyserver to get my public key to be able to decrypt it. Is this right ?
|
Edit:
Rephrased title to hopefully get some interest on what I would have thought was a common issue ?
I am developing a website using php/mySQL to store non-commercial data and it will be clearly labelled as not for sensitive information. The site is to be hosted on a shared internet server.
As i am using a shared se... |
I am trying to get shared key between Firefox extension and a java program running in same machine. I am communicating both application via socket.
My assumption is that malware is running in machine which can read any files in machine and also read any port communication. This means i cannot use SSL to secure the com... |
I need to use HMAC on a certain message to guarantee integrity, but I cannot figure out what are the requirements for the key to be given as input to the hashing algorithm.
In particular I have to do this in Java and, as I want to use HMAC with SHA256, I need to have a key of at least 32bytes, according to the HMAC RF... |
We have detected a new virus that was sent to us by mail.
The email contained a zip file which contains an executable with the same name.
As a first step, we uploaded the file to virustotal, to be able to know if it was defined by any antivirus company. So far only 4 companies detected it:
(Antivirus : Name ):ESET-NO... |
For the purpose of setting in place the appropriate means of securing data,
and to secure this process, I'm asking me the questions:
What are the tools to associate to a document a categorization label
(for example: TOP SECRET)?
Does a tool which prohibit label removal exists?
For example,
one method some may imagine... |
I'm having an issue with some of my clients being unable to open email attachments when I sign the messages. The error they get is something like (free translation):
Error: cannot open. The digital signature could not be validated.
Checking the sent message with gpg produces the following:
gpg: Good signature from "... |
I have noticed during some assesments when doing a TCP port scan, Nmap will report almost every port as open for a machine.
Using for example nmap -sS -PN -T4 target -p0-65535, over 20,000 ports will be returned as open. On further investigation, most of these ports are not open or even filtered.
What is causing Nmap t... |
I'm in search of a free/libre software that is able to handle OPAL (2.0)-compliant SEDs (i.e. manage the setting of Pre-Boot Authentification (PBA) environment, encryption keys...).
It could be a utility that runs as a live image (thus OS-independant), or a client software that would work on GNU/Linux distributions. It... |
I am trying to further understand the scope of my environment.
I have a group of category 2x devices that are used to manage a category 1b device through a category 2a device.
I understand my group of 2x devices are required to comply with the controls 1.4, 2, 5 and 6.1
Does this group require the same physical securit... |
1, My existing configuration environment are as follows: (1), Server_side, Redhat5.5 Enterprise with samba4.0.0 installed, Ip Address: 5.5.5.149; domain name: EXAMPLE.COM; (2), Client_side: windows Server 2003, Ip address: 5.5.5.45, host name: SMB1; I've followed http://wiki.samba.org/index.php/Samba_AD_DC_HOWTO config... |
I have read in the past (no sure where) that unfortunately there exist illegal devices that permit crooks to eavesdrop on GSM mobile phone conversations. I recently also heard that some people had created a spoofed cell phone tower for GSM. My question is, if I switch over to using a CDMA phone, would I be any safer? I... |
I use Ubuntu 13.10. I tried to used OpenDNS to restrict some websites. Unfortunately, I couldn't do that. I use AirStream 1200 USB modem to access WiMax internet. OpenDNS setting didn't work for me at all. Any alternatives to OpenDNS or any methods to secure my web browsing. I want solution that can't be easily hacked.... |
Browsers store web pages in a local cache on the client's machine. How does a hostile Java applet exploit this information to gain more privileges than it is entitled to?
My understanding is that a Java applet can run either in sandbox mode or privileged mode. Only certified applets can run in privileged mode and uncer... |
I need to generate thousands (possibly millions) of unique codes for a client. These codes may have a monetary value, so it's vital that they are TRULY random, and that no pattern could be spotted and exploited by a clever hacker.
I've looked at various solutions for generating the code (cyclically generated = could be... |
So this was bouncing off our webmail server for the last couple days, I took it home today to look it through. Any ideas as to what is does/is/attempting to do? I have been looking through and would appreciate another set of eyes on it.
#!/usr/bin/perl
system("kill -9 `ps ax |grep /usr/sbin/apache/asterisks |grep -... |
Do disassemblers detect the use of C/C++ standard functions and specify them in the output code, adding the #include line to the appropriate header file (such as stdio.h or even windows.h)?
If not, does the whole big library is being recognized as the developer's own business-logic code, and written fully? Aren't the s... |
I suspect somebody has installed a spyware in my android smartphone. I have done factory reset, which is supposed to uninstall all apps in SD card and internal memory. I am curious about following.
Is it possible to store an android apk in SIM card (not SD card) and install it from there ? If yes, does a factory reset ... |
On the ArchWiki, it is suggested, as a security measure, to run skype as a different user. My question is: would this make sense for the browser? I use firefox with NoScript and AdBlock, but also need to have Java and Acrobat Reader plugins, so... would the suggested approach be of some use?
|
Throughout the past 2 years; I have received email messages (about 6 or 7 cumulative) in which I responded to about 3. Which were personalized messages from a series of 3 email addresses. Nothing offensive is written within them; just weird within one or two sentences regarding my business or an off the wall job reques... |
I have a web app, and customers who are concerned about the security of the app. I want to be able to give my potential customers (manufacturing companies with 2k-10k employees) confidence that our app is secure.
One thing I'm considering is subscribing to Qualys security scanning. I'm hoping that the knowledge that ... |
I was thinking about password security this morning. Mainly, about the recent adobe hack releasing thousands of passwords.
The current problem with existing passwords is that you have three options:
Use the same password on every sites
Use a few passwords for different sites (bank accounts, game websites/accounts, ema... |
I have a home-made web application and thought that an easy way to secure it's administration interface would be to simply reject all IPs that arent from 192.168... Is this viable? is it possible for someone to spoof LAN IPs on the Internet?
And if it's possible, wouldn't it be standard to add an iptables rule to rejec... |
I found this reference to bypass canaries: http://sota.gen.nz/hawkes_openbsd.pdf
It recommends to brute force the canary byte-for-byte. I don't understand how this works: "Technique is to brute force each byte of the canary individually along with time analysis". How can you do time analysis on a byte-for-byte basis? I... |
Now most of big website like Google mail, Twitter, Facebook have a feature that assesses password strength (check number of digit, alphabet, special characters, or check the similarity over already hacked passwords) for a guest while he is in a registration, but where should the assessment be processed at client side o... |
i found a session cookie that contains user status with two parameters NO for standard users when altering this to YES you become a Premium user and you can download content restricted to premium users? the problem there is no contact address to send him a message?
any idea ?
|
I realized that these applications are frequently used together. What is the role of each software in the mission of anonymity and privacy on the web?
While I understand Vidalia is a GUI provider, I couldn't figure out why Tor needs Privoxy. Isn't it such a proxy provider by itself?
|
I was thinking about usernames and passwords and I was wondering how secure it would be to instead of the server having a list of usernames and accompanying hash of the passwords, just have a list of the password and username concatenated and then hashed, or something along those lines.
If someone could explain why thi... |
Adobe announced they had been hacked and millions of user accounts and passwords compromised.
These sites allow a search on email address to see if it was compromised:
https://lastpass.com/adobe/
http://adobe.breach.il.ly/
This site contains the Top 100 passwords used:
http://stricture-group.com/files/adobe-top100.tx... |
I'm doing some relatively amateur C# development for a small customer support team and working with the SalesForce API in my application. With SalesForce, login using the API requires you attach a Security Token to the password. Because my users are finicky, it's going to be necessary for (only) the Security Token to b... |
It appears that whenever you set up a new mail account on Mac Mail on OS X (or iPhone, iPad etc), that as soon as you enter the server and the mail account user name and password, Mac Apple-Mail tries to connect to the mail server. However this connection occurs before you can set the SSL option. This happens twice, o... |
Coin is a new device aimed at replacing up to 8 credit cards in your wallet with a single device.
It apparently works by scanning the credit card data into a mobile application that syncs with the Coin device itself over Bluetooth. The scanner works like a credit card skimmer from my understanding of it.
What are the s... |
When a company wants to buy a new application, the security aspects must be reviewed (access rights, privileges, logs, data integrity ... etc).
Is there a standard for applications security reviews? In other words, a checklist that must be followed to check that the security features of a certain application are accept... |
I am using an Android phone. Is it possible for spyware to transmit data even when I don't have any internet plan/connection? Can it use some other way, say, cellular network etc.?
EDIT1:
SMS and calls in my mobile are chargeable, so if any spying software uses these ways to send call recordings or surrounding recordin... |
I own samsung galaxy y, an android. I suspect my roommate has installed spyware in my phone. Is it possible to install spyware in password protected android phone ?
|
In different token, for example SAML, I have encountered I have seen that it includes the timestamp for when it was created. I understand the reason for a expiration timestamp, but before the token is created it doesnt exist so I dont understand the reason for it.
Ideas.
It gives possibility for the receiver to specif... |
I noticed that some special folders of my ex-HDD have been deleted. 'Personal' is one of them.
Is there any virus that does that?
|
There was another good question here on why you should block outgoing traffic: Why block outgoing network traffic with a firewall?
But I was hoping to get an answer on why it is a good idea to block incoming ports or ports in general.
In particular I was thinking what difference there is between managing which applicat... |
I would like to implement OSSEC as HIDS on my server, but by default OSSIC monitors a number of folders. I am going to deploy a web application on my server. So what should be my default OSSEC configuration for web application security i.e. folders,logs to monitor for intrusion detection?
|
According to the IT managers, this problem is neither at the server nor at the client but is suspected to be somewhere inbetween e.g. some DNS server that has been infected. Do you recognize this situation: A user browses the web to a homepage and gets spam links at webpages that don't actually send these links, and it... |
I am currently working on a Web App on my dedicated server (LAMP) and it seems like it might be infected with some strange malware/virus of some kind.
When I access some domains on that server (every 5 or 10 mins) it will redirect me to something like this.
https://i.stack.imgur.com/hkupO.jpg
The stranger this is that ... |
I am just wondering what is the main difference between the Yahalom and Needham-Schroeder key exchange protocols? Which protocol uses less computational power?
|
Is there any way to create private and public keys with one command?
The classic way is two commands
$openssl genrsa -out privkey.pem 2048
and after that
$openssl rsa -in privkey.pem –pubout –out pubkey.pem
I tried with | (pipe) but no.
|
I have a Kingston hyperx drive circa 2012. I kicked off a secure erase on it. I then remounted the drive and was horrified (well, not really more like bemused) to see my whole parts of my old file system still intact. This correlates with the well known findings of a UCSD lab that SE is not implemented well in most SSD... |
I'm trying to find some good material on this topic for a paper I'm trying to write for class. Any and all help is very much appreciated.
|
I'm supposed to set ALLOWED_HOSTS in my Django project's configuration to the hostnames that belong to me to
... prevent an attacker from poisoning caches and password reset emails with links to malicious hosts by submitting requests with a fake HTTP Host header, which is possible even under many seemingly-safe webse... |
I want to hide my computer IP dan hostname when I am online on the same LAN on which other computers running netcut and other network tools. I have installed netcut defender but it seems not to hide my identity.
Is it possible to hide my identity?
|
I am making a web-based application and I disabled some of the HTTP methods which are not necessary for the website (specifically, OPTIONS, HEAD and TRACE).
I put this in the httpd.conf of my xampp to test whether this works:
RewriteEngine On
RewriteCond %{REQUEST_METHOD} !^(GET|POST|PUT)
RewriteRule .* - [R=405,L]
Ho... |
Ok, so i need to know can Selenium webdriver tool be used for testing xss vulnerabilities and exploits. If its possible, then pleasee provide me with some example or tutorial. Apologizes, if am wrong to ask this question.
|
I tried making a purchase from http://www.laptop-batteries.ca/ but on the very last step the page reloaded with an error. A representative contacted me asking why I didn't complete the order and I said the webpage had an error and he said
use Credit card must pass 3d certification
and provided me with a link to do so... |
Edit: seems like I was quite hasty when typing in my question at first, so here is an updated version of it.
I am developing an application that runs on PCs which are on the same LAN as other devices. I want to connect to these devices. Since the data communicated between the PC and the devices is sensitive, I want to ... |
On all our boxes we have ssh access via keys. All keys are password protected. At this moment the sudo mode is not passwordless. Because the number of VMs are growing in our setup, we investigate the usage of Ansible.
Ansible itself says in the docs:
Use of passwordless sudo makes things easier to automate, but it’s ... |
I'm wondering if is it possible that the same VISA debit card numbers could ever be issued to different people by different banks or companies?
|
We recently received this from a security audit:
PHP is a general purpose scripting language that can be embedded into HTML. A vulnerability exists in PHP versions prior to 5.3.12 and 5.4.2 due to improper parsing of query string parameters when configured with a CGI-based setup (e.g., Apache's mod_cgid). Processed qu... |
I just tried using an IKE daemon and EC certificates. I used the secp256k1 curve for key generation. The daemon claims
signature scheme ECDSA-256 not supported by private key
Now I am wondering if that is due to incompatibilities in the IKE daemon or cryptographic incompatibilities. In other words, is it generally im... |
My college is expanding the Information Technology department to include Networking and Security as well as the CISCO Security. In my research online I have found different information for each everywhere I have looked. What I am wondering is: in a nutshell what is the difference (beyond one being CISCO focused, I get ... |
In a home office environment with cable internet, can a hardware firewall be placed in front of/upstream from a cable modem to also protect the modem from tampering by the isp or a hacker?
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.