instruction
stringlengths
24
29.9k
I got discussing this topic with someone recently and we couldn't reach a consensus so I thought I should ask here. There are commonly thrown around figures regarding the cost of buying a remotely-executable 0-day for IOS, Android, Windows etc. I've seen figures go up to $250,000 USD from companies like Vupen, however...
I just experienced a crash on my laptop. I was surfing the internet and all of a sudden everything crashed and a small blue screen (centred on the screen) popped up and was counting down. I didn't have a chance to get a photo. It rebooted and upon restarting and logging in, a "windows" window popped up describing the u...
It's been established that, thanks to our good friend Mr. Wear Leveler, wiping data from an SSD is very difficult. I understand that the one thing you don't want to do is actually attempt to shred files or zero out the drive. However, what if I wrote some simple program code to get the amount of free space left on an ...
I am presented with SSH log from a SSH server and the said SSH server only accepts connection from 2 known public IPs over WAN. The content of the log shows that a user was successfully authenticated. However, that user authenticated from an unknown public IP. Here is an excerpt of the log. Nov 23 06:32:46 SSHSrv-SFTP...
So, this big, reknown company (you all heard off) is sending md5 encrypted strings (with GET key: password) over HTTP. I accidentally came over it since I wanted to use jnlp on a non-windows machine. And I am curious. Is it by definition insecure to work like this, or can it be safe when one uses SALT and other stuff ...
I'm working on a penetration testing tool, and I have error-based sql injection pretty much covered, but I was wondering, is it possible to use timeouts, along with built in sql commands to detect an issue? In the application DVWA, I attempted the query ' OR 1=1; WAITFOR DELAY '00:00:05';# in the sql injection box, an...
I am setting up my own PKI, and I came across a question to which I couldn't find an answer. I want to specify CRLDistributionPoints in my server certificates but I am curious whether to use the same URL as I did for the CA or use a separate one for every server certificate. What is "best practice"/reasonable? I don't...
I am now learning keyed hash function, where A and B share a secret key k. I want to know if the ordering of encryption E and hashing H matters? i.e. Is there any difference between H ◦ Ek (m) and Ek ◦ H (m) ?
I am writing an application in Google APP Engine java which authenticate the user by its certificate. I have created a self signed certificate using keytool at client side. I also enable the HTTPS request in google app engine for my application. The flow of application is every simple. When the user visits the homepage...
I am curious of what all the security implications are if I set the following two HTTP response CORS headers; Access-Control-Allow-Origin: * Access-Control-Allow-Credentials: false The only security issues I see are DoS attacks and CSRF attacks. CSRF attacks can already be achieved with IMG and FORM elements. DoS atta...
The TLSSLed tool found that the host that I use has SSL connection that accepts 8 different TLSv1 and SSLv3 ciphers that are weak by their length (40 bits). How can an attacker exploit this fact?
I have network traffic details, which consist of client IPs accessing a web server. Alongwith that I have the session ids through which the client IPs access the web server. In the session details I have the objects which the client IPs access through the sessions.(objects combine to make a web page,for example there a...
I'm developing own protocol for secure message exchanging. Each message contains the following fields: HMAC, time, salt, and message itself. HMAC is computed over all other fields using known secret key. Protocol should protect against reply attack. On large time interval "time" record protects against replay attack (b...
Today I was trying to uninstall some application and I was very surprised to see this entry in my applications list Then I try to find what is this and I finally found it in "Program Files". After I opened the application and explored it a little bit I found this window The email address you see is my spouse's email ...
In this document on Security on NSC computing resources, there are several obvious pieces of advice (use a strong password, don't repeat passwords, etc.). One piece of advice I have not seen before, namely: To login to a system and then continue from that system to a third (as illustrated below) should be avoided. ...
I run a small e-commerce website hosted on a dedicated server with Debian 6 Squeeze. I need to become PCI compliant (the card industry standard for security). Therefore I have registered with TrustWave TrustKeeper which scans my site for potential security vulnerabilities. The scan reported plenty of vulnerabilities an...
I'm using a form-token to secure the validation process of my php-file. Basically the structure of the php-file looks like this: if ($_POST) {//form has been submitted? if (validateFormToken) { //process form-data } } else { //display form and generate token include 'includes/forms/form.php';...
I'm doing a bit of research on my level of PCI compliance, and I'm having a difficult time grasping where I'm supposed to be. I have a web service that has recurring billing. The site is created using PHP and Drupal. I accept and transmit credit card information through a form, and submit it via TLS encrypted POST to...
Many websites offer the option to log in with your existing Google or Facebook account (among others). For a long time I've resisted doing this because I use a password manager and I figured it was more secure to create a separate account for each website with a strong, pseudorandom password. The browser integration ...
Okay, so I am in a university class where we are using a server. Each student in the class has access to the server. We all share it. I can see their files and open them, and they likewise can see mine. However, the other day I was telling my teacher that me and a friend were poking around on the server and trying t...
I am using sqlmap for finding out sql-injection threat on our application. http://myurl.net/question/teaching/answer/sujan-justice?as=Course and i tried to perform the following: sqlmap.py -u "http://myurl.net/question/teaching/answer/sujan-justice?as=Course" --dbms=mysql --level=5 Here is the Console : [11:35:4...
Whenever we see a 403 forbidden access error page we think we have got to a place where some secret or private data is present. Now at this point bad guys know that this might be of interest and start to see if they can do something to get access to this secret data. So is it good to show this error or just redirect to...
So here's the situation: I have a Skydrive folder that is shared with all of my colleagues at work. For added security we would like to encrypt our Skydrives with TrueCrypt. But what will happen when I upload or change a file in Skydrive? Will my colleagues, that use a different password, be able to view and edit this ...
I thought I would learn a little bit of cryptography programming by making myself a simple password manager program that I can potentially even use to keep track of my passwords. The idea is that my program would keep a list of passwords in encrypted form and names of the services the passwords are used for. Then I cou...
I have a simple question. Is a web browser sends client certificate to the web server on demand(means web server is configured for client authentication and demand the client certificate) or just send all of the certificates that web browser has. If a web server send client certificate on server demand then how a web b...
I recently looked into SQRL and was intrigued by its simplicity. At first glance it seemed reliable and its author claimed it was inherently fail-proof against phishing and MITM attacks. But upon further reading at this stack exchange discussion I saw a comment (the 2nd reply by tylerl) that claimed it was highly susc...
After reading about language based security, it seems protocols that are defined using context-free or regular grammars are highly resistant to code injection attacks. Are there any good security protocols that are context-free or regular ?
How can I connect to a HTTPS website using a specific SSL cipher, and view the output? This would be useful when doing a vulnerability analysis and weeding out false positives, such as when a device advertises it supports a weak cipher but displays a page informing that a strong cipher must be used.
Is it possible for a attacker to spoof the Access-Control-Allow-Origin header? Or, is it secure enough to protect resource access via the Access-Control-Allow-Origin header? I'm trying to make an API key useless on certain domains, like the linked in JS API.
It seems to me that a useful alternative or supplement to traditional port-knocking, fwknop, etc, for a system requiring only occasional access, would be to: Set up a one-time pad of keys, and a pre-shared key. Store a copy of that pad and that pre-shared key on the server to be protected, and keep another copy of eac...
We have an application to save our customers data (some kind of CRM). This application has been written in Delphi and is a client/server application. This program apparently is sending out information to Internet but we are not entirely sure. The person who wrote it is not reachable anymore. On the data server we have...
I saw this function slowEquals() while reading Salted Password Hashing - Doing it Right, which uses a byte-level xor comparison to avoid timing attacks. I was wondering whether this is what Bcrypt also does to avoid timing attacks. I use Openwall PHPass which has its own CheckPassword() method which doesn’t seem to xor...
I am trying to ensure that all certificates in a chain for a host have a key length of 2048 bits. Using openssl s_client, only the key length for that host's cert is given, is there a simple way to list the key length for all from the command-line, or is it necessary to download all the certs and check manually?
I have a server which has an internal IP (Used to access from local) and an external IP (accessed from Internet and placed in the load balancer). And both will use the same URL https://www.abcdXX.XX.com. I have a common SSL certificate here. Should I bind the same certificate to both the IPs in the port 443? in the ...
I've run metasploit against my web-server and it found several opened ports that I didn't know. Please note that I have a firewall and IPSec configured but they were disabled just for testing purposes (servers should be secure even if firewalls are bypassed). Here's the list of open ports: It's a Windows 2008 R2 with...
What's the difference between Digital certificate's signature and fingerprint (thumbprint) ? I know that Signature: The actual signature to verify that it came from the issuer. and Thumbprint (fingerprint) : The hash itself, used as an abbreviated form of the public key certificate. But what's exactly inside both of it...
I've been contemplating the fundamental issue of stack overflows, from the classic shell code injection that doesn't work with NX bit to the newer ROP gadgetry. The first question I had was in regards to CPUs that have branch registers. It seems as though doing any of these sorts of attacks on a CPU that tracks bran...
If you have a website that need to store user's credentials for other sites, how do you store those credentials securely? An example is Mint.com where you give them your username/password for your bank accounts. Based on this quora answer, Mint.com uses a combination of software and specialized hardware which doesn't s...
My city has online billing for utilities. When you set up an account they email your user name and password to you. You can't change your password without them emailing it to you again. Isn't this insecure? Doesn't that mean my user name and password is being sent in the clear and someone can log on to my account?
My sister recently went on a sales call and when she told them what company she worked for they were upset. They told her that the company she works for is stealing their customers by intercepting and forwarding their phone calls. Sure enough when my sister dialed their number it was going to her company! I have loo...
I installed Firefox using a download site, rather than the correct site. After running and installing Firefox I noticed my Chrome had an addon called Swift Browser added to it by a third party. After thinking about what I downloaded recently, Firefox came to mind and when I checked the link again I realized my mistake....
Intuitively, running a non-exit Tor node should bring the benefit of plausible deniability that a packet originated from your device. Unlike exit nodes however, you would not have to worry about illegal content requested in the clear by your computer. So it seems that running a non-exit node would have only benefits (n...
Ok, many of you now the scenario: you login to developer.sayLinkedIn.com, create an app with credentials and define the domain in witch that key is allowed to "run". The question is, from a api provider perspective if possible: HOW do you make a key useless on domains other than the one you please. I have api available...
I was just wondering what would be the best way to stop a VPS from being attacked, bandwidth would be a problem in this case so methods that reduce the amount of incoming attacks and stop sending outgoing data would be great. I've been looking for some open source linux projects that can auto detect on an assumption of...
I've come across the following website hxxp://politie.nl.id169787298-7128265115.e2418.com/ [Possible malware] Whenever I open it in Firefox it prevents me from closing it, I can't even close the browser without using the task manager. The site asks for money for an unlock and I can imagine some people could fall for i...
Our institution requires disc encryption on laptops, but I'm uneasy about using full disc encryption without SECDED ECC DRAM. Is it safe to use full disc encryption on laptops with unreliable memory?
I use LastPass and love it. My girlfriend creates her own long, complex, unique, and thus difficult to remember passwords for every site. She frequently forgets them and has to rest the password. The passwords are "organized" on various post-it notes and scraps of paper in her notebook. LastPass is too complex for h...
If you are installing Joomla via cPanel's File Manager to your mywebsite.com (user mywebsite) account, you will upload the package to your server and extract the archive. All files will have the user and group according to your account mywebsite:mywebsite. You will have to change around three dozen directories and file...
In addition to achieving PFS with DHE, we want as little as possible to be revealed when the server's private key is revealed. So, what is RSA used for in DHE_RSA cipher suites? What does the server sign during the key exchange?
How its possible to detect authenticity Of Client and Server Certificate. For example, If server A has certificate and someone C stolen its certificate and send it to B then How we decide that it's send by A or some one else ? Same question for client certificate authenticity. I know that the private key is belongs to...
How can I detect if NAT is used in network or not? I know if you have a private address and you are able to connect to a public network or the Internet, then there must be NAT. But how can I detect that NAT is used in an internal network (which is not connected to Internet but uses NAT) or not? Is there any way that we...
What is Open Resolver Project and how does it give a solution for DNS reflection attack? I also read that Open Resolver Project follows BCP38. What is BCP38?
It has been reported in the media and some security conscious mailing lists that some IPMI-enabled servers, implementations and brands suffer serious security issues. When you go to a dedicated server provider to rent a preconfigured unmanaged server that has IPMI (whether or not it is enabled for your use), what are t...
Suggestions on easy distribution/installation of self signed certificates & roots to mobile devices I am a developer at a government agency in a developing country that has a web application with a number of web-forms for data entry through which customers can submit "electronic forms" to the agency. For legal purpose...
Couldn't an updated server/computer be completely sealed against attacks? Why can't you block any incoming request for running something in your server? For example, in my naiv view, a mail server could be getting emails (text files) sending emails, but never allowing anything entering the server to execute anything....
I am trying to understand the network behavior of bots. Are there any identifiable characteristics of callback requests from the bot to the C&C server which differentiates it from normal traffic? I have learnt of situations where there is a regular callback at a particular time of day,etc. Are there any documented reso...
we are maintaining our DNS account to GODaddy DNS Provider for our servers, Right now we have an problem, If some one have to register domain or sub-domain from any of other dns provider or godaddy dns provider it allow's to activated and those domains are pointing directly to our servers easily, how to avoid these kin...
I would like to have a physical key to decrypt Linux machines at boot. This is just an idea and I would like to know if there are already projects or established methods to achieve this. Let me explain better. I would like to have an usb device full of random data no partition, then make this thumb read only. First of...
I am developing bussines application based on php and mysql on ubuntu 12.04 lts server. I have closed all ports except :80 and php code can be executed only by security login and not using cookies but session. What other vulnerability can server have and what security precaution i need to take for hight security???
Assuming there is a LUKS volume that uses a keyfile and the keyfile is autogenerated before opening the volume and deleted after use, does changing the keyfile prevent it from being stolen from the RAM in this scenario? Creating the LUKS volume using a keyfile: Create a keyfile using an OTP algorithm, like HOTP with a...
I own a private business and a web site with a domain name hosted with Godaddy US. I live in Europe. I want to know if the various ISP of my customers in my country can find out who visited my web site (by seeing which user IP visited my website's IP). My web site has an SSL certificate, HTTPS, therefore static IP. My ...
It's frequently stated that EMV cards cannot be cloned. I'd like to know, specially with commodity smart card readers/ writers, why is this true? What specific data cannot be read using commodity hardware, and what type of hardware would be required to do so?
I've recently (over the last 15 minutes) had quite a few hits from the same IP, it's in a country on our blacklist so they just up up on our "Access Denied" page, but I was just interested in what benefit a would be bot/attacker could gain from this. All that seems to change is the referer, Has anyone seen similar beha...
I'm having issues traversing a proxy protected network and was wondering if there are meterpreter implementations which allow proxy awareness (automatically using windows AD credentials) or which can use DNS tunneling?
When accessing https://internetbanking.caixa.gov.br (site of a well known bank in Brazil), the server returns a certificate signed by "Autoridade Certificadora Raiz Brasileira" (Brazilian Root Certification Authority). This certificate is not in Window's list of trusted certificates before the access, but it appears th...
It is possible for a server to parse HTTP POST and GET data with a fixed encoding or one that is dynamic with the client's response. Consider the situation where a client uses UTF7,32 or any other encoding other than UTF8. The server is then hard coded to only use UTF8 when reading the data. Question What types of se...
It's my understanding that everyone on the same Wifi protocol has full access to each other host that it is connected to. Is there any Wifi technology that allows for partitioning and isolation of each individual client... at Layer 2? Ideally this will work even when everyone knows what the shared secret is. I'm thinki...
If I don't have SECDED ECC DRAM, is it possible or realistic that a bit could flip around sshd, and grant a lucky lurker access to my system without requiring a valid password?
IPsec is a security mechanism that provides peer-entity authentication, data-origin authentication, data integrity, and optionally data confidentiality. It relies on extensions to the standard IP header layout and an additional protocol. The security services that IPSec can provide are: Authorization–access control; Co...
I understand DDoS is a DoS assault from multiple sources, where a coordinated stream of requests is launched against a target. How is DRDoS different?
I am making a choice between StartSSL and positiveSSL($4.99/yr). I want to know the difference between them. As I know, SSL is used to encrypted the connection between client and server so that data transferred(cookie) will not be under 'man-in-the-middle' attack. Doing some searches on StartSSL, I found a website said...
I am doing a token based authentication but facing some security problems. In the system, a user will login as follows: Type username and password to login in a https login page If the login is succeeded, the server will be set a 'authentication cookie'. Otherwise, go to login page again The 'authentication cookie' in...
Here is what I tried: tshark -r test.pcap -T fields -e ip.proto > output.csv But this can only show all the protocols in the csv files. I want to show only the top level of protocol numbers such as 6(TCP), 17(UDP), 1(ICMP) etc. Any idea please. Your help would be highly appreciated.
I'm in the process of setting up a bunch of servers at the other end of the world (well, 8 hours travel time) in a co-location place. The servers and firewall all have a remote management port (KVM, DRAC, you name it). I'm wondering what is the best practice how to access & secure that. Obviously I could just put all t...
I need a brief explanation about the differences between antiviruses and firewalls
I'm fairly new to encryption, and I am investigating the different kind of encryptions. I want to encrypt passwords in a secure way. I discussed this with my colleague, and he said that BCrypt is the best encryption for our project. We have a PHP server, Android client, and iOS client as our setup. I am using a jBCryp...
I have come across a website, freshbooks.com, which uses base64 encoded urls for all purposes, ranging from POSTing sensitive data to a URI or just viewing some resource. For instance, a url to view an invoice on the website is (some part of url omitted for clarity): something.fresbooks.com/dmlld0ludm9pY2VGQjU1Mzc2 ...
Assume a requirement for creating a custom application for Android or iOS smartphones, which will send and receive data (documents, e-mails, etc.) to/from a corporate server, perhaps after local editing via standard applications (e.g., Word or Powerpoint). The data will have to reside at the smartphone for certain amou...
My System has the rootkit Rootkit.Sirefef.Gen. I would like to know how I can remove this rootkit.
I am storing the passwords of my college website in our own server. I am storing the passwords using the MD5 encryptor. But the doubt I got is since the decrypter is there I can also decrypt the passwords and use them. So how these passwords are secured with me.
How should I go about selecting a code auditing company?
I have read some papers about steganography using perfect linear codes. The aim is sending more hidden message bits with changing less cover message bits. For example using the parity check matrix of [7,4,3] Hamming code, we can embed 3 bits of message in 7 bits by changing at most one of them. It looks great. However...
Count this question as part of my ignorance on how authentication scheme is done on your typical VPN session. But here goes: We often advise the security-conscious user that if one must use an unsecured public wifi connection (say, at an airport, internet cafe, restaurant, etc), then always connect to a private VPN. ...
I have two web services A and B the requests between those services is http. I want so establish a secure connection between service A and service B to ensure the authorized and authenticate request from the source and insure data was not tampered. My Application running on PHP "service B -the data store (the server)-"...
If I uncheck the "use default gateway on remote network" to be able to browse local shares and the internet at the same time, does that void encryption?
What is the most efficient way of protecting small online business from outside threats. Everything too much expensive is not a solution. I've been looking for good web application firewall and at the same time not expensive, since the business is using applications, but other than WAF, I need hardware security.
Many VoIP handsets support client-side SSL authentication for auto-provisioning. Unfortunately, some devices must be programmed with their client-side keys. (Keys generated on low-entropy devices are poor, but lets not argue that detail). For this question, we have three players: The device (a phone) The server (some...
As Matthew Green puts it, "the NSA has been ... Working with hardware ... vendors to weaken encryption and random number generators." At this stage, however, there is little public knowledge of which specific hardware products have been compromised by such efforts, and in which ways. That makes it difficult to know how...
Veracode (http://www.veracode.com/) has certain parameter encoding libraries that it trusts. Others are labeled as flaws. If I'm satisfied with another method of parameter encoding that is meant to stop XSS, can I tell Veracode to stop listing uses of it as a flaw? If so, how?
Can my Website history be tracked by my work IT team if I am using my own home network with my work tablet?
I know that access control is a very important think when we want to protect our files and in security in general. Does anyone know what access control system is used by linux? In addition I just found the Bell-LaPadula model, which I find very interesting as a model, as it has top-secret flags etc. Does anyone know if...
FastMail.fm hosts my personal email account. Now they claim to have reliable backup services, but I'd like to have my own copy of my email archives. What I'd like to do is back up to my VPS, which has a very good internet connection and is always online, unlike my laptop. Some problems with this approach: The credenti...
I was working on my localhost in my computer but I was connected to internet. Recently I downloaded a few music files and since then advertisements are getting popping into my browser through which I downloaded the songs. Advertisements are being shown even if I open a webpage in the localhost. Is there any security th...
I am running a properly configured pf_config ( at least, sort of properly configured ) and have wiped my hard drive clean 3 times with a fresh install of OSX Maverick. I find it odd that my laptop is attempting to connect to any outside without me doing anything. This scenario brings me to the root of my question. How...
I am self training on using encryption. I am a php developer and in my spare time I am building an online app that provides basic cms features to help me understand encryption design more. I am using encryption to protect the data if stolen and having it accessible to public like what happened to adobe. My restrictions...
Similar to bots posting spam posts and blogs is it possible that bots with legible registered accounts go around the site flagging or downvoting everything on the site. If yes, what can I do to prevent this? For example, I understand there are numerous ways to try and prevent machine generate activities like CAPTCHAs,...
I'd like to encrypt e-mail messages so that multiple physically separated keys are needed to decrypt them. For example, I'd like to have three private keys stored on different media, as in: key A on a harddrive, key B on thumbdrive 1, and key C on thumbdrive 2. I'd like to have the messages encrypted successively to ...
Whats the difference between Anti-malware and antispyware ?
I am wondering what others do in regards to setting up their enterprise scheduled vulnerability scan policies. For example do you prefer to create a single scan policy and scan all networks regardless of the hosts platforms (windows, linux, SQL Server, Oracle, Apache, IIS, etc.) or do you end up creating multiple scan ...
I would like to know practical difference between TAP and TUN mode when use with OpenVPN. When to use TAP and When to use TUN ? What types of traffic will pass with both mode ?