instruction
stringlengths
24
29.9k
OpenSSH just introduced a new protocol, chacha20-poly1305@openssh.com, which combines the two algorithms from DJB: ChaCha20 and Poly1305-AES. It was inspired by a similar proposal for TLS, which seems to have actively been backed by Google in the recent months. But most SSH installations are inherently different from ...
I have recently been introduced to OpenVAS for scanning our network at work. I am familiar with nmap, and I am happy with it's performance when used stand-alone from the cli, through iptraf I can see it is scanning at speeds upwards of a thousand packets a second, however when scanning through OpenVAS I can't seem to b...
I tested web site application with commercial automated tool.There are some blind sql injection.I want to retest this results .Is there any good method for test blind sql injection with tool or anything else ?
I receive a lot of requests like this: ip-10-80-XXX-XXX.eu-west-1.compute.internal:80 110.249.208.XXX - - [11/Dec/2013:10:27:17 +0000] "GET http://mn.sina.com.cn/news/xianchang/2012-06-07/212535.html HTTP/1.1" 200 9515 "http://mn.sina.com.cn/news/xianchang/list.html" "Mozilla/5.0 (w3660t by Kev++)" I don't understan...
I understand that the TPM can be used to store an unlimited number of keys. However I am left with a few questions: Presuming the TPM is connected on the LPC what protects the data travelling across that interface. If I follow the SRK key approach what is used as the root key, i.e. is the SRK key hard code inside the...
I am trying to get my machines to be force through a MiTM and the MiTM to redirect them to a server of my choice (which happens to be the MiTM on port 17002) I am running ip tables: sudo iptables -t nat -A PREROUTING -s 192.168.0.0/24 -p tcp --dport 80 -j DNAT --to-destination 192.168.0.2:17002 I am then using ettercap...
Does QuickVPN create a secure tunnel or how does it work to provide encryption and security? When I did a see my IP it was using the remote locations IP and not my office network's IP so does that mean there is no tunnel? Is it safe?
When i turned on my pc at the office this morning i found a file (text document) on my desktop saying that my secret santa salutes me and gave me a clue for where to find my gift. The weird thing was, when i opened the file details (using the file properties) i found that i was the owner of that file, 2 seconds later ...
Trying to follow up this post How to trace a (mobile) phone? , the answers on how to prevent being tracked while you own a mobile phone are: You cant. (even if you use disposable phones etc) 1) Why a similar concept as Tor project wont work in this scenario? (all the nodes /towers are controlled by people/ a company th...
I was unable to find any good documentation or anything on mXSS. Can anyone give some info or give a link? I found a video and a PDF of the video's presentation: http://www.youtube.com/watch?v=Haum9UpIQzU https://hackinparis.com/data/slides/2013/slidesmarioheiderich.pdf
The introduction of the new top level domains (TLDs) such as .music, .books, etc. will increase the number of people and organisations adding and removing entries into the root DNS servers (.) for their own TLD. Given the TLDs "me." and "in.", this means they will have different protections in place to create and man...
I have recently started a project to code a secure password protection algorithm to be used on both computers and mobile devices. As I have never done anything like it before, I am a bit unsure of where to start. This code needs to be extremely secure, but also flexible on the front end. I am familiar with Java, C, and...
One of the dangers of using WPA2-PSK is the possibility that an attacker may setup another wireless network with the same SSID and even use the same access point MAC address via MAC spoofing. The attacker then may use a deauth attack to cause an internal computer in the network to have to reauthenticate, allowing the a...
I use Gmail to exchange confidential and important documents with my customers. The documents are read by an unauthorized person (during sending the email) that I don't know him/her. How can I solve the problem?
Well lets assume that someone is intending to build a website that will contain THOUSANDS of sensitive records such as credit cards etc. What would be a good checklist that would ensure that the website has the maximum of the security necessary to operate such a website safely?
I encountered an error in a Nessus result. Error: No host data is available for this scan. I want to scan IP 192.16x.x.x with Nessus. I scan this IP with nmap and only 2 TCP ports are open. Essentially, the results say the host is up. I checked my firewall rules. Nothing seems wrong with them. I also checked t...
In some (web) applications there is a minimum length for usernames, usually there is a restriction for a minimum of 6 characters length. For example, free gmail accounts and miiverse (Nintendo social network). Why is there a minimum username length? And why a minimum of 6 characters?
I've noticed when updating a blog, that sometimes refreshing the page won't actually fetch it again, because it is still in the cache. Now, even when I open it in incognito in that same browser(say Chrome), it still uses the same cache, at least for some time. My understanding is that the site can "tell" my computer ho...
After a penetration test made upon an intranet application I'm developing, in ASP.NET MVC, one of the concerns raised was that the application supports concurrent user sessions and it is recommended that the application is reconfigured to support only one session at a time for any given user account. Windows Authentica...
According to http://nginx.org/en/docs/http/ngx_http_auth_basic_module.html nginx can read password hashes of these types: crypt(), apr1, SHA1 & SSHA. This is how I understand how these hashes work and what the problem with them is: crypt() discards everything after the 8th character, so if my password is 12345678UltraS...
Webcams can be turned on without the indicator light: to prevent unwanted use, I wonder whether there exist applications warning that the webcam is being used, or any other kind of protection. Since I cannot answer to my question since it gets closed for whatever reason, one possible solution beyond shitting on my web...
I need to re-work our current security model for desktop computers, and would like some insight as to what changes can be made as well as best practices. Currently we have the helpdesk role that is published via GPO to add it to the local admins group on computers. For users that require to be local admins, we deny the...
I don't know much about content injection so I'm hoping to draw on the experience of the community here. I'm writing a tool that evaluates public web proxies. I want to know if the proxies are being used for content injection and other attacks. I.e. to determine if they are injecting malware, phishing attacks, or spam ...
I have a wordpress website always updated. I'v developed a theme from scratch for it, so my theme is clean as it was always. I use strong passwords generated by specific tools. Last 3 days my website is infected by a code that redirect my website to linkbucks ads. I'v found that this was coming from a code injected int...
I have noticed that despite having configured Skype to not access video, during startups it continues to access the webcam momentarily. Skype is not a user, so I am unsure how to modify its permissions. Is there any simple way to truly disable it from accessing video?
I have a django web app serving restful api endpoints and a javascript web app communicating with those endpoints through ajax. They are under the same domain but in different ports. server api ---- www.example.com:9000/api/endpoints web app ---- www.example.com:9001 Now, we save two types of cookies. user-session-co...
Has there ever been a known case where a machine acquired spyware like a browser toolbar, or plugin but that spyware also deployed more dangerous malware like a trojan, botnet, or worm?
Have any of you security professionals been able to get security performance metrics into reviews that managers conduct for their employees? If so, are there any helpful resources you could share to make that happen?
I made a backup of the old Win 7 Pro then did a clean install. But I forgot to export my EFS encryption certificate, so when after I restored the encrypted files from backup I could no longer access them. Up to here, no surprise. I then researched and discovered that certs are stored in the C:\Users\username\AppData\Ro...
Google have decided to show images in Gmail messages accessed via the web, iOS and Android by default: Instead of serving images directly from their original external host servers, Gmail will now serve all images through Google’s own secure proxy servers. Also, on this page they explain why they think that this is sa...
OK - I'm trying to design a system that can provide personalised/differentiated content at minimal expense to the server. One of the designs I'm currently exploring is where the request is somehow signed using a key/value pair where the value is secret, e.g.: Original URL: /posts/foo?format=json Secret pair (known to ...
Just a small question: I know it is common for one to use asymmetric encryption in order to encrypt his private key, when using symmetric encryption. Is there a name for this process/method of encryption?
I notice security companies such as Rapid 7 prevent people signing up with either free email accounts, or accounts provided by ISPs: https://www.rapid7.com/products/metasploit/metasploit-pro-registration.jsp To prevent software license abuse, this field requires an email address from a domain you or your employer owns...
I'm using Thunderbird with Enigmail. It has both encrypt and sign options for sending PGP emails -- but why is an email signature needed? It just looks overkill to me! Alice and Bob can use PGP to exchange a symmetric key then use this key to encrypt emails via AES. When Eve doesn't know the key, she can't modify ciph...
I'm using the example given in msdn article about the DSACryptoServiceProvider Class. The problem is that I get a different signature each time I run the code. I tried OpenSSL and didn't get this problem but I need to work with System.Security.Cryptography this time. This is some source code: this is the hashed value ...
Several known vulnerabilities affect BIOS (Reference URLs below). So my question is, are the Vulnerability Management tools (such as Nessus, NeXpose, Qualys, etc) technically capable of highlighting BIOS and driver-level vulnerabilities? Is this something that can be detected for example via an authenticated Windows sc...
I have multiple snort sensors in my network and i would like to handle the rules of each one remotely. Is there any software that do that ? thanks in advance
I'm a federally employed senior executive assistant with a user-knowledge in computer programs and software. I'm trying to change my career and am looking for my employer to pay for my training. I'm interested in cybersecurity; it appears to be challenging and fascinating too. My employer is requiring me to submit a re...
I know that the RC4 cipher when used with SSL is vulnerable to certain attacks, which in the worst case scenario could result in authentication tokens being stolen. But RC4 is also recommended as a cipher to mitigate the BEAST attack. Is it a better strategic decision, to disable RC4 and perhaps be vulnerable to BEAST,...
Does it still make sense to scan using a source port with Nmap when doing host or service discovery? This would have made sense back in the day, but with statefull firewalls being prevalent, where source port scanning would not help, does it make sense to do source port scanning as part of a penetration test to help in...
I discovered that someone had gained access via FileZilla server software to my Windows 2012 Server. It seems like they had created extra accounts and were trying brute force attempts to get in nearly constantly. At any rate, any PHP pages running on any of my sites on this server have had an iframe with a link to a m...
Are there any websites that collectively track one computer based on its IP address alone? Browser extensions such as Ad block plus, Do Not Track Plus and Ghostery modify the client side script but is it not conceivable that a server would just associate your IP address with the page you requested and share it with som...
Just found out that the primary & secondary DNS servers have been changed to 95.211.156.101 & 5.45.75.11. I had the following setup in place. MAC filtering and WPA2 for WiFi. Administrator password was left at default. (Suspect this was the loophole exploited. Clickjacking I bet?) NAT & IPv4 All the Services were tur...
In section 2.3.1 of the the OAuth 2.0 Authorization Framework it states: The authorization server MUST support the HTTP Basic authentication scheme for authenticating clients that were issued a client password. It goes on further to say: Including the client credentials in the request-body using the two parameters i...
I wrote a java program to encrypt and decrypt files using AES algorithm in CBC mode and a random initialization vector. but there is something fundamental I'm not understanding:first I generate a random iv and load it to the cipher in the encrypt method. then when I want to decrypt the file,do i need to load the same i...
I see that Apple patched OS X to mitigate against K. Chen's famous Apple keyboard firmware hack. However: Apple keyboards can be used with computers running other operating systems; and in any case, other manufacturers' keyboards may be similarly vulnerable. What protection does Linux have against: A remote attacker...
I think several of mails are classified as spam.But Gmail and other Public Email providers has no issues. It might be a false positive cases with the associated tools Is there a tool or a way by which i can verify this.
TeamSpeak 3 VoIP communication system uses a concept of so called identities to identify the client to the server. These identities are basically public/private key pairs. In order to prevent people from just generating a new identity after being, e.g., banned, they added a feature called security levels. Increasing se...
I've read several Wifi security related questions on here. There are two things related to the SSID which I don't fully understand. Is there a best practice for SSID naming? I know that changing the SSID from the vendor default is recommended and that if two APs have the same SSID but different encryption/ passphrases...
We have a hard time getting VMWare to work in bridged mode. We can get it to work in Bridged mode. Why is it so important to run it with host only or NAT?
Say I connect to a specific proxy that I know will not keep information/data about who connected to it, and I go to a website and do something deliberately illegal. If the "middle-server" doesn't have any linkbacks or possible ways to determine who connected to it, can law enforcement still find out who did the illegal...
Say I have these URLs: https://example.org/ https://example.org/criticalpath I want the first one to be served with a domain validated commercial SSL certificate and the second one with an extended validation SSL certificate. Is it technically possible? Is it supported by SSL/TLS (and HTTPS?) standards and browsers? ...
I'm trying to solve an dom xss challenge where filter used is : var anchor = window.location.hash.substring(1); if (window.location.href.match(/(script|javascript|src|onerror|%|<|>)/g)) { alert('xss detected'); After filter is bypassed location hash is written on page through document.write. I can't think of w...
Since using www.dnsleaktest.com I have found that any VPN service using Open VPN will leak my DNS through the tunnel. I have tried and tested several VPN providers, even those who say that they have a solution to the DNS leak problem, such as Mulvad for example, and they all leak. In addition to dnsleaktest.com, I hav...
PROBLEMRULE #1; SecRule REQUEST_URI "^/(|(.*)/)(lpt1|lpt2|lpt3|lpt4)(/|\.|\?|$)" "t:none,t:htmlEntityDecode,t:lowercase,t:removeWhitespace,block,msg:'X',id:'1000'" PROBLEMRULE #2; SecRule REQUEST_URI "^(.*)//(.*)$" "t:none,t:removeWhitespace,block,msg:'X',id:'1001'" // I also tried those, but no success. SecRule REQUE...
My company owns a domain A.com , and subsdiary is on B.com B.com redirects their users to A.com for accounts registrations. Post successfull registration , A.com logins that user ( User doesnt get to know this), creates a token and needs to pass that token to B.com so that B.com shows that user logged in. What should b...
In many cases where a Trusted Platform Module (TPM chip) is employed, it is soldered directly onto the motherboard. Ostensibly the motherboard manufacturer is then solely responsible for integrating the BIOS and TPM module, and the overall tamper resistance of the solution. TPM modules are also available as add-on daug...
I have no real knowledge about this stuff so I figured I'd ask here for some answers. So I started to get this "Security Certificate not issued by a valid authority" error when using my email client yesterday when attempting to connect to the STMP server of my ISP. I haven't changed anything in my Android phone or my...
I'm writing a security architecture for the application I'm working with. I'm struggling in finding a framework to follow for this task. I can find a lot of frameworks like TOGAF and SABSA that works with enterprise security, but my task is more specific to an application. Have anyone worked with such a framework?
I have to think of this everyday when I close the doors of the shop I work in: A year ago we used to close the shop and arm the alarm using a key fob. This means the worst case scenario was that I get robbed. A few months ago my boss decided that we need a password to set the alarm. This means thugs will kidnap me and ...
There is a person who wants to establish a system which allows her/him to publish texts anywhere and make it verifiable that s/he is the true origin of that text. Only the first message is not verifiable but will establish the system. Example: "Hi, I am Mrs X and I am going to whistle you some interesting stuff. To pre...
Apologies if this in the wrong section, not sure if it should go in Server Fault or not. I am preparing to launch a new web app. We have put a lot of effort into offering good security. From a PR perspective, I need to mention some of what we are doing - security is a fundamental part, and selling point, of this projec...
My question is about the encryption between me and my mobile operator. My mobile operator uses A5/1. I use Samsung. Sometimes I see the symbol G on my phone which means GPRS. I don't know whether it means that it uses a secure connection or not (for voice calls). Note: I know that government can go to the mobile operat...
I am new to using Burp Suite. I am trying to learn how to use it with Mutillidae and DVWA. Whenever I right-click on any particular application the "Actively scan this branch/host" and "Passively scan this branch/host" appears disabled. Also, when the "Scanner" tab appears to be disabled. Can anyone tell me the reason ...
I've started thinking about how to approach analyzing my network traffic for information relating to SSL and browser usage for my web server farm. I also suspect there are some shadow (legacy, unknown) web servers running on our network and I'd like to try and capture connections to them as well. Basically I'm looking ...
I've been reading about identity theft recently, and I'm wondering about some possible solutions using the techniques of asymmetric/symmetric/hashing in encryption. My idea is going to cross those 3 subject areas, so bear with me as I try to explain my question. I'm wondering whether it is/isn't viable to have somethi...
I frequently hear about the security risks of using Android. But few people who write articles on this subject ever identify what parts of Android are at fault, nor do they identify design flaws. Can someone please point me to any sober and level headed explanation of what is ultimately wrong with Android security at t...
Short version: Are you aware of any proxy or firewall device which will permit outbound SSL connections to hosts with approved* SSL certificates only? Long version: Consider the following scenario. I have a server farm which is protected from the Internet by a firewall. Let's say HTTPS is allowed in from the Internet...
I came across this interesting device called SurfEasy Private Browser. Here's the company's webpage and here's the product page on Amazon.com. I assume it's just a USB stick with a VPN client and bookmarks stored encrypted. According to their webpage it can be used "at work to prevent IT from monitoring personal browsi...
When I have a website run on https and there is no certificate, there is wrong certificate or out of date like here does encryption still work or not?
I am building a site where people set up small, private, social networks. For ease of administration and portability, I would like each network to be stored in a different MySQL database. I understand that there is no artificial limit on the number of databases a MySQL server can handle, and in my basic tests there is ...
I use Check Point Full Disk Encryption, but hope that this question can be answered generally. Is it possible for me to get, or extract, my own 256-bit AES key? By the way, I don't use any special password for the decryption itself, so this key must be based on my Windows login password alone (which you can assume is...
I've seen many friends getting clickjacked on Facebook and similar sites. How does one detect and prevent clickjacking? How should I teach my friends to do the same?
I'm looking for an easy way to set up a simple IM infrastructure that protects messages in transit as well as avoids having logs in places that neither I nor someone I trust controls. I'm based in Germany and according to Mr. Snowden, my traffic actually gets sifted through and analyzed, and I'm not comfortable with th...
So far, I haven't seen any PoC or real-world attacks against WiFi Direct, but I see the potential because it relies on WiFi Protected Setup (WPS) for establishing the connection. Tools like Reaver already exist to attack WPS during the connection establishment phase and compromise a traditional infrastructure network...
I am using SSLStrip against my own computer, but am not being redirected to HTTP. Skype automatically starts up and logs in at my computer's startup, so I was wondering whether the fact that port 80 is already in use (by Skype) defeats SSLStrip. It is my understanding that except for the fact that they are being redire...
I have a website that lets users submit a form without having to create an account and log in. However, in order to keep users accountable for their submissions, the form requires them to provide their school-issued email address (which follows a known, constant pattern and can be used to derive the user's real name)....
I haven't had to clean up PCs in a while but it's this time of the year when you go visit relatives and they ask you about this and that, malware and trojans and other delicious things that pop up in computers. What's the standard set of tools you use to get rid of trojans? Is there a good website reference I can turn ...
I was wondering if its possible to prevent 3g sniffing. Its not about the security of the information sent over 3g, but being able to use your 3g without anyone able to see traffic. There are machines that can detect any use of network nearby (Pockethound:http://www.bvsystems.com/Products/Security/PocketHound/pockethou...
Some assistance/advice needed to research this. First: I am not sure if this is the right place to ask this. If it isn't please note and I'll close. Over the weekend my email accounts (yahoo & corporate) were locked because of invalid password. Looking at one of my laptops (Windows XPSP3), using ProcessHacker.exe I see...
I believe that it was leaked recently that the NSA has a long list of zero day exploits on various software "for a rainy day," ie: for whenever it would be useful to them. The question is, how do they find these zero days? Does someone have to physically sit at a computer and try a whole bunch of random things (ie: rem...
Not long ago, the common wisdom was that passwords should be at least 8 characters long. These days, the most common minimum is 12. Where did these common values originate? Interestingly, 8 is exactly the number of characters in "password" - did that have anything to do with the first? Was there someone in particular w...
Online articles mention the importance of a strong password and suggest that hacking tools allows bad guys to attempt millions of passwords per second. I am wondering why OSes and websites and such are not throttling attempts. That is, if 3 bad attempts happen why wouldn't additional attempts be rejected for say at l...
After clicking in a fake "download here" button in a webpage for film downloads, a computer has got infected with what I believe to be an adware. I have located the file, VirusTotal gives this analysis of it. One wierd thing that makes me uneasy is that when I launch Norton's complete check, it freezes after a random n...
Please help us with this NGO site running Joomla! 1.5. They can't pay a security professional right now, so maybe you guys can help isolate the problem? If you go to http://casatrespatios.org you get redirected to some openDNS page http://www.website-unavailable.com/ There is a javascript tag at the bottom of the page:...
Does the United States Government Configuration Baseline allow for IIS Express installations as part of a software install (self-contained in the user's home account)? Is there a waiver process?
My laptop (modded 2007 Macbook Pro) was stolen 2 days ago when I didn't pay attention to my backpack in a tourist spot in Europe and while I'm quite certain they won't have much use for it (the apple is orange :) I'd still like to make sure I'm thinking of everything. What are the next steps, what can I ignore? This is...
This considers the route where somebody does not use the SMS option, but rather using TOTP, and the site offers a generated seed to input. Two factors questionably at use: password: something KNOWN TOTP: does this count as something you HAVE? What proof is there that I am using my cell phone to generate the TOTP code...
I've been trying to see how to properly protect important content that's passed in ajax calls with java script. Considering JavaScript can be viewed at any point, it is inevitable that some of your ajax parameters will be exposed as well. I know for a fact that obfuscation serves no purpose and protecting web content s...
I have a case where I have a set of low compute capable processors connected to a gateway processor. I need a way of authenticating these processors to gateway processor. The main things are: I need to prevent some other processor from connecting to gateway processor I am looking at a way where after authentication, I...
I am work in small company. I am Java Developer and Sysadmin of remote servers. I have problem with store password from several servers. How to best way to manage passwords in company?
If a browser has been used to visit a few sites and has active logins and then the user turns on private browsing, can the sites still access data such as cookies and cached files that were created before private browsing was turned on? For example in Opera's Private Browsing help page it says that no trace of the webs...
I've got an SP0/unpatched Windows XP which is vulnerable to the Conficker worm. I'm using metasploit to use the Conficker exploit with the purpose of opening a remote shell/command line. My Metasploit script is the following one: use exploit/windows/smb/ms08_067_netapi set RHOST <vulnerable_win_xp_ip> set PAYLOAD windo...
Using SQL Inject Me Firefox add-on,I have selected the check-boxes then click on Execute button of SQL Inject Me tool. After getting result, it has displayed following responses Server Status Code: 302 Moved Temporarily Tested value: 1 UNI/**/ON SELECT ALL FROM WHERE Server Status Code: 302 Moved Temporarily Tested val...
I have created my own Certificate Authority and installed the certificate on a few computers. Now I have generated a server certificate with common name *.mydomain.com and Subject Alternative Name (SAN) DNS mydomain.com to match all first level subdomains and the root domain. I signed the server certificate with the CA...
I currently have a VPS in a data center, I asked the admin to open a port to install a ftp server. It opened port 3345, at first I tought the port is not forwarded correctly, because I ran nmap as this : nmap 194.110.xxx.xx Starting Nmap 6.00 ( http://nmap.org ) at 2013-12-17 14:33 EET Nmap scan report for host-194-11...
Quite the simple discussion this one (one would assume): If I'd hash the email and password, and then hash the hashes, whould this be considered safe enough or would this just be a waste considering you could just salt them both? What should the salt be, could it be the username-part of the email?
I connect two TP-LINK APs (TL-WA901ND) together over bridge-mode. It's all working fine but there is no option to set up some wifi-security (WPA/WPA2). Do I need wifi-security over bridge-mode? Any ideas, tips or tutorials are welcome.
Lets say a secret word is say, the name of your first pet. Mother's maiden name is also a common one. When does it make sense to challenge the user with this? Or, what actions should be secured by a secret word? I'm just not sure I know the security value of a secret work, what its intrinsic value is over a password.
I want to use a commercial, automated tool but it cannot login successfully because the website requires a two factor authentication process using SMS. For testing, the SMS message is sent to another website, though in normal situations the SMS is sent to a mobile phone. I clicked many buttons in target site. After tha...