instruction stringlengths 24 29.9k |
|---|
I was reading http://www.symantec.com/verisign/digital-id and http://technet.microsoft.com/en-us/library/dd351044(v=exchg.150).aspx. The articles are treating ssl cert and 'digital id' as if they are two different concepts. I was under the impression that they were the same thing, just different names.
Are there any d... |
Is it possible to protect Windows like Linux?
I mean, I have Ubuntu installed on my laptop and when some program wants to install something etc. the pop up shows up and I need to type the password.
So, if I click on some file in my mail client in Windows and it looks like an image or rar file, but it is a Cryptolocker ... |
After enabling system log on my Asus DSL-N10E router, I've got this message:
DoS: Tcp SYN With Data Attack source=217.74.166.73
What does it mean? Is it a real danger on my network security? And how can I protect my network from these attacks?
|
What are some best practices for managing and deploying web app passwords and private keys? E.g. the password to access a database or external services like the Facebook API. I'm referring generally to using dedicated hardware or a general cloud provider and not any specific provider like Heroku or EC2.
Is the best you... |
My client physically makes online purchases (through various websites) on his customer's behalf using their credit cards. His clients have basically said "here's my credit card, buy what you need to." Currently, I'm assuming he has his customer's credit card details locally stored in a file on his computer.
He would li... |
A coworker asked me why I thought encrypting internal AD Bind communication was important. I said because I follow a standard security practice, but couldn't actually articulate how an attacker would grab the credentials over the wire. Would an attacker have to own a piece of our networking equipment or is there an e... |
I'm considering doing some research in to an attack vector which I think doesn't get enough attention. It's not an earth-shaking vector but I think I can demonstrate an attack where none have been in the past.
But once I've done this, and I have (say) some demo code and a ten-page PDF, what would I do? How would I get ... |
As the title states, why does MySQLi use question marks instead of sprintf() formatting? For example, why is it
$stmt = $mysqli->prepare("SELECT * FROM table WHERE column1 = ?");
$stmt->bind_param('s', $var);
instead of
$stmt = $mysqli->prepare("SELECT * FROM table WHERE column1 = %s", $var);
Were there some compli... |
I do have a problem, how do I remove a persistent MBR malware? probably the malware hides itself in HDD sector that an OS couldn't even access. Already tried to format it and remove clean all partitions. And also tried to change OS type from windows to linux. Got infected from an office PC. Symtoms are whenever I'm onl... |
Since OpenID officially furnishes email address to sites (with the user's permission) as a convenience rather than an attestation, is there any OpenID identity provider who'll allow you to authenticate to THEM for an unlimited number of sites with one email address, but upon registration with a new site, allow you to e... |
How safe is it to give sensitive information to someone over a phone line? Does it matter if the data was verbally spoken or if it was typed in?
Example: Opening an account with an internet provider and they ask for your SSN and/or credit card number.
|
Looking at all the people who question the viability of DNSSEC, it's no wonder that the adoption rates are so poor.
However, what about DNSCurve? It supposedly fixes all the DNS security and privacy problems independent of DNSSEC, doesn't suffer from the problems that are specific and unique to DNSSEC, and, should one... |
Burp suggests that there is a reflection.. It changes a value of a cookie named as x as x=<script src=abc.js> and in response this value gets injected to a javascript function..
<script type="text/javascript">
fnUseX('arg1','<script src=abc.js>');
</script>
I tried a few scripts and looks like characters such as / and... |
If the HTTPS webserver uses self signed certificate, the web browser
warns the user as follow.
http://www.sslshopper.com/assets/images/iis7/iis7-self-signed-certificate-8-certificate-not-trusted.png
I am curious how can browser tell if the certificate is self signed or not(in detail).
is there any technically detailed ... |
Are there any other ways of verifying the web server you're visiting is actually the correct one?
For example, if a domain name's DNS was hypothetically hijacked, and users were directed to a phishing site that took it's place; then they would be none the wiser.
I know SSL does this already. But are there any ways that... |
So there is an E-mail client. I can encrypt its database with a few clicks in its menu. But it's storing the opened attachments unencrypted in /tmp/foo/bla.xls. The bla.xls has 644 UNIX permission (since user's umask is 0022) and the /tmp/foo/ directory has permission of 750. The owner:group is the user that uses the d... |
I am owning an Android smartphone. I learnt that factory reset may not remove spyware as it might have corrupted the image being installed by factory reset. Is there a foolproof method which ensures there is no spyware left on the device?
|
I'm looking for a list of ports sorted according to the number of vulnerability you can find for that specific port (considering of course, the service installed in the default port).
Example: suppose that in this years we had 800 vuln in port 80 (30 apache, 30 iis, 20 nginx) than in this list we can have:
80 800
... |
We're setting up S/MIME so that we can send encrypted emails. However, I have a bit of a stupid (and maybe obvious) question...
If someone steals a password for either the sender or the receiver, wouldn't they be able to view those sent or received emails? If not, what's preventing them from doing so?
|
I recently came across a cool site for testing .NET code (http://dotnetfiddle.net/). In the FAQs they mention that they have two restrictions for security purposes:
No access to File System IO
No external internet access
Is this sufficient to prevent malicious users from exploiting the site? Is there anything that ... |
SAP Netweaver has its passwords hashed and also salted. But I read that a tool such as John the Ripper can bruteforce them.
So how does security varies when passwords are hashed, in particular in the sap system?
what if I have a password such is this... a12345 ?
Is it easy to bruteforce it, even though it is , lets say... |
I have a question about ssh tunneling.
Is it possible for the ISP to realize the destination server which I want to connect it via ssh tunneling? I mean the destination website which I want to visit it.
|
When using the Tor browser bundle, you load the check.torproject.org on start. It tells you when there is a security update to downloads, and let's you click a link to get it.
The way for users to know it's a legit site is to 'check for the hang lock'. It's there and green, and the certificate info is correct, so the ... |
We run a software as a service application that is used by medium to large companies. One part of our application is a messaging service that integrates into the customers own infrastructure.
At the moment, we manually generate a private/public key and hand these off to the customer to use for authenticating the reques... |
I'm reading about Extended Validation (EV) certificates and have a few questions. From what I understand, EV allows domain owners to pay extra for a especially trusted certificate (that the browser will honor with special display properties) and it requires CAs to do extra steps to verify that the issued certificates ... |
Every now and then a known website is hacked, such as what happened to Adobe or Cupid Media.
In such incidents user data is leaked, including usernames, encrypted (and sometimes plain text!) passwords. Users who reuse their password might have their accounts in other web applications compromised as well.
The company I ... |
If I'm using PBKDF2 to stretch a password into a suitable key for use in encryption with AES, should I be using a random salt (for PBKDF2, not the AES IV)?
|
I am using backtrack right now but i also wish to switch to kali linux if its more interactive. Because i am just a beginner pen tester. I tried with both bt4 and bt5, but novice in kali linux.
|
Github faced a brute force password-guessing attack recently that involved "nearly 40K unique IP addresses".
Passwords were also "stored properly" using bcrypt, (salt + hashed).
Given that bcrypt generates a random salt per password and that the Github database wasn't compromised, how was a "remote" brute force attack ... |
From a 2012 Smashing Magazine article quite a bold statement is made to avoid AES in MySQL itself. Or as they put it "Why Should You Avoid AES In MySQL?". However, if you search for SQL encryption, you often find the AES_ENCRYPT from (My)SQL mentioned. I am not saying that many search results mean the statement is untr... |
I wanted to see how many combinations of websites and browsers are still vulnerable to a tls stripping attack (like, by implementing HSTS or disabling cleartext HTTP altogether). To do it I wanted to see it firsthand by using the sslstrip tool, but I was unable to get it working (by following the instructions on the pr... |
I notice that in /usr/share/wordlists in Kali Linux (former Backtrack) there are some lists. Are they used to bruteforce something? Is there specific list for specific kind of attacks?
|
Does a corrupted pdf still become a virus if the binary for a virus still exists but the pdf structure is corrupted?
|
I am concerned that a SHA-1 PRNG cannot produce an AES-256 cipher key with the expected 256 bits of security, or indeed any secure cipher key where over 165 bits of security are expected.
The SHA-1 PRNG is the only pure-java secure random number generator provided by Java without third-party libraries. (I am fully awar... |
I am a Software Engineer currently and have done quite a bit of systems work as well. I love the idea of Penetration Testing and would love to work towards becoming a pentester/Certified Ethical Hacker. My question is: what are some ways one can learn basic skills in this field while remaining ethical/legal?
Self-teach... |
I'm trying to setup a system for pen-testing. I'm using the FreeRadius-WPE patch to collect Challenges/Requests from people who connect to my spoofed AP instead of the actual network. Here is the format that FreeRadius-WPE is returning me the credentials:
username: Domain\User
challenge: 57:82:23:55:cd:68:10:ed
... |
You can configure Windows to use only certain cipher suites during things like Remote Desktop sessions. Cipher suites such as RC4 56 bit, RC4 128 bit, Triple DES 168 bit, etc.
SSL/TLS is not in play here so I'm talking about RDP encryption.
You can see what I'm talking about here.
I thought to run a packet capture usi... |
Is HTTPS it based on private key on user side?
Where does the user get the private key in the first place?
Suppose the user gets the private key by downloading a browser (Chrome, Firefox), then isn't hackers able to intercept the key by man-in-middle attack?
Suppose private key comes from Windows OS registration number... |
I'm working on a project that requires me to tamper with/rewrite url parameters. I'd also like to add in something that finds request parameters such as
?admin=false
?debugging=false
?page=example
?url=example.php
or anything else along those lines. I was wondering, is there a list I could find of commonly used paramet... |
Is threat modeling useful outside of application development? Is it a useful tool for doing operational assessments of information systems already in existence?
I am confused how threat modeling methodologies like STRIDE correlate with risk assessment techniques such as defined in NIST 800-30.
Pretty much all if have... |
Some operating systems resp. desktop managers clear copied content from the clipboard when the "source" program gets closed.
Example:
copy (Ctrl+c) some text from a webpage in your browser
close the browser
paste (Ctrl+v) this into a text file
→ Nothing gets pasted.
I read somewhere that this is for security reasons.... |
I've heard that Ubuntu has some sort of "phone home" system that is enabled by default. The kind of stuff that passes along performance information and that type of things to Canonical. I don't know if this is true or not, but if it is happening, how would one disable it for a secure environment?
I'm not worried abou... |
Is there any advantage (other than usability) to using ufw, system-config-firewall-tui, or firewalld rather than just using iptables?
My understanding is that these other programs just simplify iptables.
|
For example it seems like anti-virus, anti-spam and firewalls have sort of merged into one product. Is there a downside to this? I don't know of any software firewalls that can be purchased without an AV, is there a reason this has happened?
|
Sometimes when I am doing an external security assesment, I run into hosts that have the following restrictions/configuration:
All ICMP traffic is blocked
An IDS or some device returns all ports as filtered when scanning with nmap, using sT, sN and sS scans.
Even running at -T0 or -T1, any port is returned as filtered... |
There is a lot of security related products for home users and it is becoming unclear what the difference is between them.
What is the difference between antimalware, antispyware, antiadware and antivirus and are all of them necessary? Are other security products such as firewall and anti-spam necessary, as they often... |
on a UNIX OS, ex.: OpenBSD (used as a desktop by me only), which one is the best choice in regards to security. I want to run desktop operations (like pkg_add) with root permissions.
1. having the root user and using it with su - root
2. having the normal user in the wheel group
3. having another user in wheel grou... |
A GitHub project I recently checked has a flawed security as they're using an unsalted md5() to hash the passwords. I opened a bug and they acknowledged it. However, the transition from md5() to bcrypt would mean that every user would need to log in so the password can be migrated.
So my question is, does using bcrypt ... |
In RFC 4226, the algorithm for HOTP is described as follows:
HOTP(K,C) = Truncate(HMAC-SHA-1(K,C))
TOTP is essentially the same algorithm as HOTP except for the fact that the counter "C" is replaced by an integer derived from the current time (in Unix Time). In the words of RFC 6238,
Basically, we define TOTP as TOT... |
I am setting up a server using nginx. I have it working with a self signed ecc certificate and if I connect it reports ECDHE-ECDSA which is what I wanted. But I was also wondering if I could use Camellia with this.
RFC 4492 specifies the ECC extensions.
RFC 5932 - specifies the Camellia Cipher Suites for TLS
but I ca... |
I'm trying to MiTM a device on my network and having some problems.
SSLstrip doesn't work because the URL is https://, and I can't use something like Fiddler because the device has no configurable proxy settings for me to direct traffic with.
What other attack vectors do I have?
|
I want to do inter process communication between Firefox (via extension) and my application. Both reside in "Program files" (of windows 7 OS). I also assume that malware is running in the system and have user level privilege (and not admin level).
Can I rely on windows security to make sure that Firefox or my applicat... |
I'm trying to setup OpenVPN with as much security as I can. I'm in the process of selecting a cipher for OpenVPN. Which is the safest one, tls-cipher DHE-RSA-AES256-SHA or tls-cipher AES256-SHA?
I've already configured it with these settings:
HMAC: SHA512 for auth option
DH: 2048 bit
cipher: AES-256-CFB
And password ... |
I recently came upon a program called Sonar power saving that uses speakers and microphone to put the computer in power saving mode as long as you move away from the screen.
http://stevetarzia.com/sonar/
This provides some sort of security level for the casual colleague who wants to get a look in your computer when yo... |
Since it's been requested that this question be rewritten:
Is SSL (or some other encryption equivalent) required in the below case? From a small local business website, is there any damage that an attacker can do with semi-sensitive customer information (e.g. the list of items below)?
Original:
I've started working on ... |
I currently have a simple backbone.js application served from my domain (example.com), which is provided an Oauth token. Specifically, I pass the Oauth token through my page template into the constructor arguments of my javascript class (Backbone model). The backbone.js application (running in browser) then uses the Oa... |
I am trying to understand how md5 authentication works between this 2 cisco routers. The password is cisco in both routers. In the output in the field Auth Data: the hash is different in every packet. Is this the result of a salt? Whats the reason of the field auth crypto sequence number? Does each router has a counter... |
When I look at my sendmail logs, by far the most common "error" I see is the following:
Nov 22 16:49:50 MyHostname sendmail[18832]: rAMMnj2u018832: [IP address redacted to hide the guilty] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA
This is not coming from poorly configured MUA's inside my small network.... |
I have a app which transmit the password in clear text. I was planning to use the hash of the password (SHA-512) as the key for encrypting the plain text password. Then send the encrypted text to the server.
the password length is minimum 12 chars (including special characters) and max 20 chars.
Is this is bad mechanis... |
If I set a rate limit (e.g. -T1) on an nmap scan that uses decoys, does the rate limit apply to all probes, or just each individual source? I checked the documentation, but can't see anything specific. I'm primarily concerned about this from a stealth scanning perspective.
|
I have security concerns over a web based application. I want to limit access to the application only to a whitelisted IP addresses. Here are my thoughts on that:
To host the application myself.
The application is only required to be accessible during office hours (8am - 4pm). I'll use an internet router to put it onli... |
The site is to be hosted on a shared internet server, to store non-commercial data and it will be clearly labelled as not for sensitive information.
I wish to offer a credible solution to the risks of any server admin simply being able to read the plain text fields in the database directly or via a backup and similarly... |
I have created my own X509 certificate with my own CA. I am able to import the CA certificate into Firefox, but when I try to import the user's certificates I get the following:
Could not verify this certificate for unknown reasons
I'm guessing I did something wrong while creating the certificates. Is there any way t... |
I was browsing this page, which redirected me to this vulnerability because I'm a Java developer and I'm aware of the affected library.
Basically the vulnerability says:
It was discovered that Apache Commons FileUpload incorrectly handled
file names with NULL bytes in serialized instances. An attacker could
use th... |
I send my gmail emails from thunderbird (on Ubuntu machine). I am wondering whether thunderbird sends out the IP? If so, how can I hide my IP from the outgoing emails?
|
Can someone explain what the Diffie-Hellman Key Exchange algorithm in plain English? I have read that Twitter has implemented this technology which allows two parties to exchange encrypted messages on top of a non-secured channel. How does that work?
|
I am a rookie hacker studying android vulnerabilities. My partner and I are studying "CVE-2010-1119".
Unfortunately there does not appear to be enough information online. Could anyone please help me describe the principle of the vulnerability, ideally in a similar way to how this has been explained?
|
There is an option under Tools>options>Advanced>Security Devices. How to use that to encrypt and digitally signed your emails.
|
Are there any know security flaws/hacks to gain access to the private storage(file system or SQLite database) of Android and iOS applications?
What measures do Google and Apple take to "prevent" these kinds of attacks, or is it up to the developer of the application to take care of that?
Update Are these file systems/... |
My understanding of how it works :
A victim asks for the public key of a server.
The attacker just forwards this request.
The server now responds with a certificate which contains the Public key.
The attacker modifies this to its own public key and sends it to the victim.
Something happens now that I don't understand:
... |
I am well aware of the fact that physical insecurity in principle means no security. But let´s say I own a root server with full disk encryption which is unlocked/booted via dropbear ssh. In which ways can an attacker with physical access (e.g. the hosting provider) gain access to my data and what countermeasures can I... |
I use Windows 8.1 Pro 64 bit and IE11. I have two personal certificates (with private key) of mine in the system certificate store. They are both set to require a password before they can be used.
This worked until a few days ago. Then I noticed that one of them is accessible without a password. How could that happen?
... |
Below is the SSLScan output, what does it mean with SSL Cerficate Version 2?
Aren't SSLv3 and SSL Certificate Version 2 the same?
=======================================================================
Prefered Server Cipher(s):
SSLv3 256 bits AES256-SHA
TLSv1 256 bits AES256-SHA
SSL Certificate:
Version: 2
Seria... |
I have an SQL 2000 database server which is not supported by Microsoft anymore. We have our information security policy applied and even PCI requirements.
What are the security risks that we might face in this case?
I could think of one example : Vulnerabilities. Can we fix any new discovered vulnerabilities if found... |
Why don’t SMTP servers just require all senders to be
authenticated before accepting mail?
|
I've recently discovered a backdoor shell that was created via file injection on a public facing website. After much digging, I found the creation date of this file to be around the same time pentesting was done by others in the department. Most of this was done by persons not completely experienced with pentesting, ... |
How can I download and install software and make sure that it is not infected with viruses, malware or a keylogger?
Also, I heard that Macs "don't get viruses". Is this true? Is it a good practice to run virus software on a Mac?
|
Problem: Hydra keeps giving me incorrect passwords every time.
I'm using brute-force via Hydra to guess the correct password on a certain website.
First of all I used BurpSuite to intercept the page request:
POST /abcdefg/ HTTP/1.1
Host: localhost:2000
User-Agent: Mozilla/5.0 (X11; Linux i686; rv:22.0) Gecko/20100101 ... |
hi I have a static ip and someone is hacking my computer trought it I tried to format my computer and making a clean install but he keeps penetrating it this time i tried to install the AV before pluging my computer to the internet but since it requires updates I asume he can use some exploits to bypass its firewall I ... |
I'm at work and having some issues here, so I found a lot of suspicious files involving the Flash, so I though that could be a keylogger. How do I find out if it is, and if truly is, what do I do to remove it? I'm worried about my security, since I'm a public agent.
|
atm I'm facing a problem with IE and Firefox because they don't redirect my Links correctly.
I'm requesting my application via:
https://myapp.example.de/context
In my webapplication I have links like that:
http://myapp.example.de:443/context/sublink
When I try to navigate to this link I get the following error
in ... |
When i use method Get and intercept the request with any proxy tool. then Cross site scripting because of absence of server side validations.
But in case of post method, as we know data flows in the body of the request and when i intercept any body parameter with the script, then again XSS executes.
I want to know do... |
I asked two pen testers what exactly it is that they do.
One of them has told me that all he ever does is try to find exploits in the software in order to gain access to internal servers and nothing more.
The other said that it is trying to find a hole in policies/social engineer the company in order to gain access to ... |
I am a tech lead developing web (Java/JEE) and mobile applications (Android) for the past 12 years (mobile in last year though). I am somehow interested in IT security.
Is it worth taking CISSP or CISA certification and enter into Security stream? Is it a common practice to move from programming/solution architecture t... |
In ASP.NET MVC, when I perform a HTTP post to /controller/action/UserID ...
and have a corresponding route /controller/action/{UserID} ...
and if I do a Form POST, the POSTed data UserID overwrites anything that the route was originally says. (at least it does in ASP.NET MVC4)
To me this says a few things:
Don't tr... |
I just came across this:
https://onlycoin.com/
A credit-card sized device that not only holds the info for as many credit and debit and membership cards as you want (they claim) but also can be swiped just like whichever credit card you select on its interface.
The convenience is obvious, but are there any reasons... |
I am new to iOS so I do have only limited knowledge about iOS in general. For self learning purposes, I would like to know several things as I am quite confused after searching the web.
I do know that that there is a sandbox for each iphone app. So what I would like to understand is comparing a jailbroken and non jailb... |
We are looking to allow users to log on with a smart card. The smart card reader can read the smart card ID and send it to us.
We are, however, not allowed to store the smart card ID. Not in plaintext, not in a reversible encoding. An irreversible hashing is allowed.
Then again, we need to make sure that each ID hashes... |
IS there a way to stop getting spam that is from my name but not my e mail address I am receiving many spam letters using my name but different e mail addresses.
|
Are there any standards which consider safe destroying of VOIP phones? I would like to prevent eventual data leakage after devices which have left the company.
|
I've heard that not using https is dangerous because of man-in-the-middle attacks.
Now, if I connect to a server from my home computer, I assume traffic passes through my ISP, so they could eavesdrop if they are malicious.
But how can a random IP address "order" my traffic to go through their IP so they can scan it, as... |
In case of no TLS/SSL available, why can't I use the hash of the password (SHA512) as the key to encrypt the password (with out any salt) to send through the network ?
MITM attacks I can understand, but what are the other possible attacks ?
|
Are there any reliable resources for finding whether or not a Metasploit exploit exists for a given CVE?
I have found CVE Details to be woefully out of date with regards to keeping this information up to date.
|
I hope that I have found the correct place to ask my question regarding unzipping files.
I would like to see if there is a way to restrict the locations available to the user to unzip a password protected zip file in order to ensure security of the contents of that file.
I believe this is useful for security if there i... |
Usually I use my root account when working with my Linux server, however, I created a user account which I use far less frequently. However, I would like to use it for a task today, but I forgot the password since I rarely use the user account. I know the password is encrypted and stored in /etc/shadow, and I would lik... |
It would seem like ICMP timestamping is quite a useful feature for troubleshooting networks with asymmetric paths.
Replies to icmp(4) timestamp requests are generated by the kernel:
On OpenBSD, the feature is controlled by sysctl net.inet.icmp.tstamprepl, which is enabled by default.
FreeBSD even has no option to di... |
I've just started receiving several emails per second and I think it's likely someone is trying to exploit my contact form. I've taken steps to protect my site, I'm just curious what it is they're trying to do.
Some examples:
..À¯
sample%40email.tst and sleep(7.738)
acunetix_wvs_invalid_filename
\";cat /etc/passwd;\"... |
I have a token that I want to use to prevent direct access of some php-files.
Some of these php-files are loaded via AJAX.
The token is used with a session to secure form submission AND to prevent direct access of the php-files.
Here's a diagram that I made to explain it a little bit better:
What is more secure? Versi... |
I found this string on a forum
HVrUyitih"fZnvWxbsQXrk6a61oxEWU0TvcagVKz1RvRTBbqpmuJ6zNWp5a5
ZO_ggA1ov6exdUTNREr"A5NthZt97Im60kBHn0sXUhwfN33ce5VvRfUItQyg
yH4EeQx"pIH5I6oaaYT3"IPn4lm_EuxfWN5xoOQRdaqttqvvC4c
together with these instructions on how it was encrypted.
ATOM-128 --> FERON-74 --> MEGAN-35 --> REVERSE --> RC4(O... |
I'm learning about buffer overflows and have this vulnerable code which I'm trying to start a shell from:
#include <string.h>
void myfunction(char *arg);
int main(int argc, char **argv)
{
myfunction(argv[1]);
return 0;
}
void myfunction(char *arg)
{
char stuff[8];
strcpy(stuff, arg);
}
I used gdb... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.