instruction stringlengths 24 29.9k |
|---|
For example, if I am on stackoverflow and I refresh my page several times in a row, it starts to think I am a bot and blocks me.
How can I build something like this into my own site?
|
Is there a list of notable (i.e. those reported in the mainstream media) security issues such as hacks, viruses, worms and any other unauthorized or improper access or use of computers for malicious purpose?
A Wiki to keep track for posterity would be ideal.
|
Should WAF or any protecting method, block SQLi done on URLs?(eg GET /test/url'or 1=1--)
|
Can one use ipopts, and in particular IP source routing, to circumvent source-based blocking in pf or iptables?
For example, with OpenBSD's pf:
block in all # default deny
block out all
pass in on dc0 from 10.0.0.0/8 to 10.1.1.1
Can IP source routing of TCP/IP packets over dc0 be used to circumnavigate (so to speak)... |
Suppose I have a binary which is suspicious. How can I determine whether it is malicious, and if it is, reverse-engineer how it works and what it does? For example, maybe using static analysis?
Are there any documented malicious API calls somewhere? I couldn't find any in the papers I've read. I could submit it to a s... |
A few weeks ago I found that someone has posted admin account details for a certain website on a public wiki by mistake. As I found that data to be real (i.e. I could log into their website run by Wordpress), I immediately did the following:
I removed the sensitive data from that wiki, I asked the wiki admin to permane... |
On the surface bcrypt, an 11 year old security algorithm designed for hashing passwords by Niels Provos and David Mazieres, which is based on the initialization function used in the NIST approved blowfish algorithm seems almost too good to be true. It is not vulnerable to rainbow tables (since creating them is too expe... |
What is/are currently the most cryptographically secure hashing algorithm(s)? (available in PHP)
Speed is irrelevant, because I'm iterating the hash over a fixed time (rather than a fixed number of iterations). What I'm interested in is the mathematical strength.
My intuition tells me it's whirlpool, being the largest ... |
What's the best way to share passwords and credentials from the business's various accounts in a secure manner?
For example, email doesn't work because if someone gets into one of your employee's email accounts, then they'll have access to all your company's accounts.
|
I am behind a router(linksys that runs dd wrt on it) and I was infected with sality. I'm curious, can my router get infected too? If yes, how can I remove the infection?
I used the search bar but found nothing relevant.
|
I'm trying to get my users lat. and lng. from their address using Google's geocoding API but when mod:security is enabled, it prevents it and the script times out. How can I add an exception by IP or domain for this or just remove whatever configuration that makes mod_security do this?
I am using the OWASP ModSecurity ... |
Possible Duplicate:
Encryption strategies for multi users access in production systems
I would like to develop a service on wich clients would connect and retrieve informations. These informations could also be shared with others.
It's very simple but, I would like to encrypt the data as only the client would have a... |
If an external DNS server is leaking internal IP addresses are there any significant security threats associated with this information leakage?
Apart from most the obvious - gaining an understanding of the internal IP ranges in use.
Cisco.com for example: http://www.dnsdumpster.com/report.php?domain=cisco.com
|
I thought How can a system enforce a minimum number of changed characters... would answer my question, but it seems this is a different case.
When I sign on to my online banking account, I'm prompted for three random digits from a four digit PIN, and three random characters from my (long, random) password.
From my limi... |
Possible Duplicate:
What security resources should a white-hat developer follow these days?
A colleague of mine already has some understanding of security fundamentals but still needs "get in sync" with what is happening in the international security scene today. What online resources should I suggest?
My suggestion... |
FaceNiff is an Android app that sniffs Facebook session ids. You must be connected to the same WiFi as the victim. It is said to be working even when WPA2 is present. How is it possible? I can decrypt other connected users' communication in WPA2?
|
This question was asked here on Programmers Exchange, but it was suggested I ask here as well since most of the experts would likely hang out on IT Security exchange instead.
I find this to be equivalent to undercover police officers who join a gang, do drugs and break the law as a last resort in order to enforce it. T... |
We are a small company (< 20 ppl), have developed a fairly complex backend platform that exposes a web services API and we are currently productizing a SaaS-based offering that is a client to the backend. Both the backend and the SaaS-based offering are being marketed to enterprise prospects.
We adhere to security best... |
What are the track records of popular Hardware Security Modules (HSMs)? Have any been found vulnerable to hacking via creative use of the API, timing or power-monitoring attacks, etc?
|
AES_ENCRYPT uses a 128 bit long key to encrypt the data, but how MySQL handle longer or shorter keys? I found out that PyCrypto for instances recomend to transform the key by using MD5, SHA-1, SHA-2, etc. hashes and then using the the resulting key for encryption. How does it work with MySQL?
|
I have put much thought into this very simple algorithm and I have no clue if it was thought before... But I think it should have.
I also know nothing about other encryption algorithms so I can't tell whether this was already invented or not.
It is all sketched on this paper:
And this is a little C# function for th... |
I am working on some research regarding advanced persistent threats. Within this effort, discussion of cyber-warfare started. Looking further into the subject, I have found a plethora of links regarding the US and China when it comes to state sponsored initiatives when it comes to offensive cyber warfare but virtuall... |
Is there a way that I can use a RSA keypair with PGP?
What I mean is that I have 2048 length keypair and i want to use that to encrypt and decrypt data. But all I have found is that the PGP uses some keyrings and some pgp keys. And I haven't found anywhere why they are different?
Why I am asking is that I need to stor... |
Is anyone storing the PGP encryption key in a Hardware Security Module (HSM)? Company policy mandates this, so I need to store the private key to decrypt pgp file in HSM. But as much i know PGP uses its own keyrings what store private and public keys.
|
So, I think my email id might have gotten hacked. Can some one offer their comments and suggestions on this email ? It seems this email went from my mail id to my friend's email id. The subject is personal and I have not provided it. Also, this email is neither in my 'Sent' folder nor in my 'Trash' Folder.
Delivered-To... |
Does generating an encryption key using the random number generator on one's computer present a security risk? If so how might that risk be mitigated, specifically when generating RSA key pairs in .Net?
|
Given the amount of 3rd party plugins required to browse the web, I've been compelled to virtualize my online habits to gain an additional layer of security.
There is of course some obvious drawbacks:
1) Need to have a shared folder between the host and guest OS to move files back and forth.
2) Need to keep the guest O... |
Possible Duplicate:
Why do people tell me not to use VLANs for security?
This topic came up in a discussion about network infrastructure, where a company had moved from separate physical network zones to virtualized zones using vlan technology.
My colleague stated this was a security feature, where they trusted the ... |
If I want to be very good at security and especially web security, then must I learn languages? I mean things like PHP, C#, java, etc? If not then what should I learn exactly? and do you know any good book for a beginner?
|
Having no experience in computer forensics, I'd like to know whether it's possible for someone to track if a laptop's HDD/partition has recently been formatted OR had a ghost image deployed.
Any ideas/tools/methods would be appreciated.
|
In light of recent security breaches hitting the news, it's been all hands on deck at my work as far as security. I'm trying to pen test our network. I have a very basic question.
My Question
You can ping someone's website and grab their IP. I can scan that box of course for vulnerabilities. However, most public fa... |
We have a simple Blog system that allows users to input html and JavaScript to build a blog page. I'm aware that allowing javascript open up the door to xss attacks. We do however need to allow users to insert javascript, as an exmple would be allowing the user to insert a google ads code which contains JavaScript. The... |
Consider a setup where all HTTP/HTTPS traffic goes through a proxy. The certificate of this proxy must be trusted by all browsers (in this case, Firefox). This certificate replaces the original certificate for all HTTPS connections to hosts which are not in a whitelist maintained by the sysadmin. As such, all HTTPS tra... |
Possible Duplicate:
Can you secure a web app from FireSheep without using SSL?
Think of a typical web application where the users log in, and then the session is kept with a session key. Is it possible to protect it from all kinds of sniffing-based attacks without HTTPS or its equivalent?
Let's say I'm not worried a... |
Let's say in my database I store passwords hashed with salt with a fairly expensive hash (scrypt, 1000 rounds of SHA2, whatever).
Upon login, what should I transfer over the network and why? Password or its hash?
Is it possible to protect such login over an unencrypted channel like HTTP?
|
I just noticed that my 403 Forbidden (the default, not a custom one) page displays some server info:
Apache/2.2.3 (Red Hat) Server at ... Port 80
Is revealing this information a security risk?
|
Possible Duplicate:
Do non-keyboard characters make my password less susceptible to brute forcing?
Bruteforce tries cracking the hash with every possible combination of letters.
Then, If I'll use an special Unicode char, as ♥ or ¿, will it increase my security?
I'm talking about NTLM passwords.
|
Does anyone know of a comprehensive security guide about important basics / fundamentals which should be done to secure a web-server / website? A web link would do.
|
For a rich client web app, on the server I need to verify that each call comes from a legally logged in user. Obviously user ID is not enough, because that's easy to guess.
I have an idea I am skeptical about, but can't think of rational reasons not to do it.
Is using password hash protected with a sufficiently strong ... |
Does anyone know where to find test vectors for the GOST cipher? I have been looking around for quite some time, and have been unable to find anything. I know that the sboxes are dependent on the implementation, so hopefully the test vectors you know of has them too. the rfcs dont have anything
i have found this, but t... |
I have a couple of networks that have multiple IP addresses, and where I have absolutely no choice as to the equipment used for the network's edge router (the device that connects both to the LAN and the ISP). The system that is at the network's edge is inadequate for a firewall, and so I want to use a Linux box to pe... |
Suppose that I login to a website. When I type my personal data, aka, password and email, the password is sent in clear text to the server, correct? Then, a network card in promiscuous mode can capture the password?
How this can be avoided?
|
What are some areas of computer security that utilizes statistical modeling? I ask b/c I'm a studying statistics at school and have become interested after reading a few papers.. some of the areas I'm aware of are anomaly in network traffic, IDS's, spam filtering (though not strictly security)... one of the neatest on... |
Same question as Is a rand from /dev/urandom secure for a login key, but with glibc's rand function instead of /dev/urandom. And what would be a sufficiently secure seed generator?
|
We are looking to deploy about 15-20 Cisco 1131ag access points on campus. I have been reading up on different authentication methods, but I don’t know what will be the best long term solution that allows for a balance between simple management and future expansion.
The first option I have considered is to use Cisco AC... |
At our organization we have a single firewall sitting between our internal zones and the public internet. Currently all of our trusted zones are defined as different vlans on a layer 3 switch plugged into one physical interface on the firewall. The DMZ zone is defined on the firewall itself and is trunked to a layer 2 ... |
Scenario:
Attacker somehow compromises the DNS lookup for the NTP server used by the victim (a web application)
Victim sends DNS request for e.g. ntp.pool.org, which is responded to by attacker to direct the victim to another computer under their control
Attacker issues incorrect timing information via NTP
Attacker pe... |
NoScript is a great plug-in, both for security and for ad blocking. However, I've found it's not always easy to figure out what scripts need to be permitted on certain pages, to be able to use the features I want while still blocking unnecessary scripts. Many times, it's not simply sufficient to turn on scripts for t... |
I could not find a clear answer, but if I have the following situation:
I browse to a page let's say http://www.example.com/index.html
Now I use a form on this page to do a postback with jquery's ajax functions to the following URL:
https://www.example.com/login.aspx (aspx could be anything, mvc, webforms, php, ruby et... |
In Zero-Knowledge Proof where we take the analogy of Peggy (Prover) and Victor (Verifier):
In this story, Peggy has uncovered the secret word used to open a magic door in a cave. The cave is shaped like a circle, with the entrance on one side and the magic door blocking the opposite side. Victor says he'll pay her for... |
I need some information about universities that offer Master degree in Information Security with an emphasis on web application security Specifically things like web application penetration, code review course, defending web applications, etc.
|
A couple of websites with which I'm registered have, after a period of inactivity on my part, each sent me an e-mail to remind me that I'm still registered. In each case, that e-mail has included my password.
Is this a bad idea?
My thoughts are that, yes, it is, on the grounds that:
If they are able to send me my pass... |
It looks like someone is trying to hack my site. The following comes from my IIS log files:
#Software: Microsoft Internet Information Services 7.5
#Version: 1.0
#Date: 2011-07-03 00:02:39
#Fields: date time s-sitename cs-method cs-uri-stem cs-uri-query s-port cs-username c-ip cs(User-Agent) sc-status sc-substatus sc-wi... |
I was always taught never to invent my own crypto algorithm, and never to trust someone who has a proprietary algorithm.
I'm looking at Voltage SecureMail, which uses IBE (identity-based encryption) and I'm way over my head trying to work out whether this is very clever, or if it's snake oil.
The IBE algorithms it uses... |
First off...I passed the CISSP exam. WOOOO. I had to get that out. GCIH and CEH by Sept. 11'
So, while studying for the technical side of things, I see that there are rainbow tables. They are pre-hashed to compare the victim's hashed password (from shadow or SAM), but there are many different hashing algorithms out the... |
Possible Duplicates:
Hardening Linux Server
How to best defend against Targeted Attacks?
I read this news: Anonymous hacker group hits Apple, publishes data
My question: How do we proactively protect our servers from anonymous hacker? Proactively protect here means the ways to beef up security and hardening the serv... |
I have one question regarding this document:
ANSI X9.24,
Retail Financial Services Symmetric Key Management Part 1: Using Symmetric Techniques
In the chapter "Method: DUKPT (Derived Unique Key Per Transaction)", page 41, it says, that the receiver should verify that the originator's transaction counter in the SMID has... |
Due to a vulnerability in how PHP was installed (Shared VPS with PHP installed as an Apache module instead of CGI) and hence how OSCommerce was configured (with security of 777 on certain directories), I found a number of PHP scripts on a friends webserver which had been loaded by hackers. The actual code was hidden us... |
Smartphones apps transfer various types of data over the provider's data network (or wifi, if enabled). What security risks are there in this transfer, and how can the risks be mitigated? I'm not talking about cell phone security in general, but specifically the area of data transfer between the phone and some other so... |
Possible Duplicate:
How to securely store my passwords?
I have a lot of passwords to lots of logins across websites, SSH logins, e-mails and what not.
Is there one program that can secure this all for me, maybe reside on a USB Key and can automatically enter my password when its needed? So i just have to plugin the ... |
What methods can be used to bypass a signature which detects "xp_cmdshell"?
|
So I have a basic question on the SCADA operating system, which the manufacturers do not disclose. From my experience I can see VxWorks running in some of them, and Windows or Linux in some of them.
Is there any classification for a specific operating system used for a specific purpose ?
I would appreciate it if you a... |
The PHT seems so simple: b1 = 2*a1 + a2; b2 = a1 + a2. and yet, i am definitely missing something, since the paper for SAFER K-64 shows:
INPUT VECTOR is 0 0 0 0 0 0 0 1
OUTPUT VECTOR is 1 1 1 1 1 1 1 1
where each value is 8 bits.
can someone explain how in the world does 2 * 0 + 0 become 1??? i believe this is the o... |
I wrote a game which stores high score information on an ftp server.
In the the source code I need to write out the ftp link with the account name and password in it.
For example:
url = new URL("ftp://name:password@www.mywebsite.com/");
This is java, btw. In the class file strings are preserved as they are written in ... |
Recently I encountered the notion of "hashing the last block on-device".
It means that when computing a digital signature, the hash that serves as input for the actual signature computation is not to be computed entirely in software but neither entirely in hardware - in fact the first n-1 blocks of the digest computati... |
Okay, suppose I have been implementing paypal IPN, and my server will respond by verifying with "https://www.paypal.com/cgi-bin/webscr" and got the VERIFIED message back.
First, if my server connects to paypal using SSL, will it guarantee that there'll be no man in the middle attacks, such as someone sending the fake I... |
While reading the updated Top 25 exploits in the Common Weakness Enumeration I came across an exploit that I was not familiar with. It is numbered CWE-619: Dangling Database Cursor.
I was wondering if there are any tools, similar to a Sql Injection fuzzer, that I could use to test my server for possible exploits. I am ... |
I find it quite difficult to believe that the passwords in Active Directory for Windows 2008 R2 are still stored using the unsalted MD4 (aka "NT Hash") algorithm.
Can it really be true?
I've been revising my understanding of password storage recently, and learning how to use PKDBF2 properly. Then I thought I'd look up... |
The DES symmetric cipher is based on a Feistel network operating repeated on 32-bit halves of the 64-bit block. The usage of Feistel means that the "mangler" function used does not need to be invertible.
The "mangler" function operates by expanding a 32-bit word to 48-bits via a simple algorithm. This 48 bits is the co... |
The HowToGeek article How To (Un)Lock Your PC By Being Nearby (With a Bluetooth Phone) got me thinking.
Is there any software (or combination of software) that allows three-factor authentication for a Windows box? I'm thinking of something that would work well with commonly-available laptop hardware. So, the likely f... |
Well I've been working on coding LFSR structures for my research projects.
Being able to find sources on the subject, I've been able to test a single LFSR with different initialisation and TAP values, to convince me that the implementation is correct.
I'm now on working on asynchronous LFSRs structure (combination of ... |
Here is what I am trying to do and can anyone provide some best practice advice for authentication and security?
Each user will have their own private database on the cloud. He will have his local couchdb on iOS/Android. My iOS/Android app will replicate between mobile and the cloud. Users can also access their data... |
The news has been filled recently with the allegations that News of the World employees hacked into the voicemail inboxes of celebrities and crime victims. What flaw was exploited to accomplish this, and what is the risk to other cell phone users?
|
If an attacker obtains a private key that was created with no passphrase, he obviously gains access to everything protected with that key. How secure are private keys set up with a passphrase? If an attacker steals a passphrase-protected key, how hard it is to compromise the key? In other words, is a private key with a... |
Can someone explain to me how safer 128's key schedule works? there are many parts that make no sense because they were not described at all in the paper (pages 3 and 5 in the pdf).
The second paragraph in part 2 is basically the same sentence 3 times. he doesnt describe how the subkeys are put together, as shown in th... |
Basically I will be having to secure a connection between different hops. Therefore even if TLS is widely known to be the best in class, I am wondering that in such a case message based encryption wouldn't be worth more than transport layer based encrypion? If yes please help by listing some message layer encryption al... |
Usually it is advised, when one wants to secure an application, to "provide" as little information, or better yet, no information at all to unauthorized (possibly malicious) users. I'm thinking of information like OS, app version, etc.
My question is the following:
I have a web application that allows access only from ... |
I have pushed some code to GitHub to demonstrate the usage of symmetric key encryption in PHP. It is a small key-value storage library and it (optionally) offers ability to encrypt the stored information. I would like to hear your comments about a couple of design decisions I made:
Encryption is done using AES in CBC m... |
When generating SSH authentication keys on a Unix/Linux system with ssh-keygen, you're given the choice of creating a RSA or DSA key pair (using -t type).
What is the difference between RSA and DSA keys? What would lead someone to choose one over the other?
|
Why can SHA-1 be considered a secure hash function? That's something I still wonder about.
I understand the concepts of why modern asymmetric algorithms are deemed to be secure. They are founded on sound mathematical problems that are provably "hard" to solve, e.g. discrete logarithms in finite fields or integer factor... |
I was wondering if anyone had some insight into the best way to fake a web service response rather than setting up a web server. For instance, while doing dynamic analysis of malware it's useful to redirect C&C traffic to your own fake web server that can reply in the same way.
Right now I've been using a python librar... |
What are the most important security issues that developers of Android apps need to know about? What are the biggest pitfalls or kinds of vulnerabilities that they need to watch out for? One security problem per answer, please. I'm particularly interested in implementation-level issues, software flaws, etc.
Edit: I ... |
Edit: I'll put up this more clearly.
By the most simplest form, I'm asking that if I AES encrypt in CTR more with Mcrypt (using PHP), can I create the "IV" by just simply reading 16 bytes from /dev/urandom? Does that do the job properly?
I read the previous answer by D.W. and he said:
"In the simplest form, to encrypt ... |
I'm trying to drop logging packets that are destined for 10.0.0.255 by using the following rules:
$IPTABLES -A OUTPUT -d 10.0.0.255 -j DROP
$IPTABLES -A FORWARD -d 10.0.0.255 -j DROP
It doesn't seem to work. Packages are still flowing through this rule and the DENY of them are getting logged at a later rule. Do ... |
I am an (Ubuntu) Linux user. Sometimes, I have to use Wine for running Windows executables.
I would like to know if Windows malware (virus, trojan, worm,...), i.e. malware that was not intended to do harm when being executed with Wine on Linux, can do harm to my Linux system. I use a standard Wine installation. Wine i... |
Our network administrators forbid the usage of private routers in our college. They bought new Cisco equipment (routers, switches) which detect routers and automatically ban them (it disconnects the room from switch port).
I'm a bit in touch with them and they said it does not work if the student plugs in switch first... |
I get confused with the terms in this area. What is SSL, TLS, and HTTPS? What are the differences between them?
|
I understand the LDAP databases are more secure, but is it always necessary to use LDAP instead of MySQL for usernames and passwords?
|
I remember reading about an attack where the "location bar" in a user's browser displays a valid URL (e.g. https://www.paypal.com/), but the traffic is really being directed to or intercepted by an attacker. How can this be accomplished, and what can end-users do to ensure a URL they are visiting is what it claims to b... |
Overall question
What is preventing the uptake of MAC systems such as SELinux/AppArmor in corporate and desktop computing environments?
Why don't you think it isn't already widespread?
I do not count "available in the operating system" as "widespread". Windows actually has a native POSIX emulation layer, but very few ... |
I'm wondering which security model is behind the OpenID. Is it anything like kerberos?
|
This is a follow-up question to "When should I use Message layer encryption vs transport layer encryption".
I need to send a certificate from the mobile phone to the server. Regardless of all the details, my real question is how can I do a challenge-response step between the client and the server, when the communicatio... |
All the traffic gets to my IIS server through a proxy. I can't block or white list IP addresses because all the traffic comes from the proxy's IP address.
Can I use the X-Forwarded-For header with IIS?
|
I know that a good password hashing algorithm should be slow. MD5, SHA256, etc. are fast. So I've been adding multiple iterations of SHA-256 hashing to my web apps (around 50000). Getting the hash of a password takes about 150ms on my machine.
Is there any advantage of bcrypt over this approach?
Note: I know about salt... |
I want to set up a kind of personal wiki where I can store various sensitive information. However to make it 100% portable and and just plain convineant, I want to put it on the Internet. I'm sure at this point many of you are like "JESUS NO! ARE FOR REAL?" -- hence the question.
Would using a login prompt really be en... |
I'm about to encrypt two of my hard drives using LUKS, since I can't really do it myself I use the guide on the Arch Linux wiki (which can be found here). In an example in the guide the cipher specified is aes-xts-plain with a 512-bit key size.
Is aes-xts-plain the best choice or is there a better cipher to use? I'd pr... |
ok I was just reading this site: http://www.zdnet.com/blog/bott/stay-safe-online-5-secrets-every-pc-and-mac-owner-should-know/3542?pg=4&tag=mantle_skin;content
and thought of something I always wanted to ask but never did.
when people say a file has a checked md5 hash, what exactly does that mean? Did they seriously di... |
I am tempted to write my own which covers:
Checksum to ensure data is not tampered with.
Long and multiple rotating keys so that it is (practically) impossible to decrypt.
Will use /dev/random for the initial seed
Other more elusive items that likely won't be addressed:
Based on the size chunks of data and connectio... |
Is it not true that SSL can be decrypted by simply having listened to the network activity of a PC on a network? (for example, from the first time a random PC connects to a coffee shop, and keep listening until the user stops browsing and you no longer care for further data) Aren't all the keys there and the algorithms... |
There is some recent discussion of some sort of "multilevel" internet, with e.g. a level defined for banking in which access is only granted after special authentication with "true names", special credentials, and an explicit consent to permit packet searches:
Former CIA Director: Build a new Internet to improve cybers... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.