instruction
stringlengths
24
29.9k
I am building a Ruby on Rails API that posts to webhooks that the API user can create, whenever a resource that he manages is created, updated or destroyed, using the HTTParty gem. This got me thinking: I am validating that the webhook url is indeed a valid url, but that's it. What if, for example, the API posts to a w...
Scenario: There are two computers running GNU/Linux, U and T. U is untrusted and T is trusted. A non-executable file F (which may however have been infected with malware) resides on U. (For instance, an H.264 video file in a .mov wrapper.) It is needed to copy that file to T and to view that file on T, with minimal ri...
I'm considering trying out yubikey and I've recently discovered that the (crucial m500) SSD I recently bought supports hardware encryption. I think it should be possible to use a yubikey to provide the password for HDD encryption as it appears as a usb keyboard as far as I know. I've never used hard drive encryption ...
I need help with understanding how to manage security release notes for our product. We create major release of our product about each half years and security or maintenance releases each month. What should I consider regarding what we tell our customers about security? Should we tell them that we upgrade our 3-d part...
I've noticed that on a lot of login forms in websites and applications that there is a "show password" check box. Why? I myself have seen some hacks that an attacker could hack the input password box. Doesn't enabling the "show password" box constitute as a security risk?
I often send confidential documents to others using encrypted PDF files (i.e. files with a user password, and typically with an owner password as well) to prevent both accidental forwards and snooping. These are typically generated by LibreOffice's export PDF function. I understand that the PDF format for Acrobat 9.0 ...
Edit This post has been marked as duplicate. While I have read the referenced thread I see some differences in the descibed situation. My scenario below is a non-server home network with both machines connected via Wifi. As both are connected via standard router software to the internet I have trouble understanding whe...
I am working on a project which requires Integrity measurement of OS (Linux). One way to do that is using IMA but I am not sure if it fits in the scenario below. The scenario of the project is some what like this: The systems boots up and measurement is done using trusted-grub. So the PCR 0-7 are filled up. Then the OS...
Playing devil's advocate, Let's assume I purchase a Linux server from a hosting provider. I am given a password for the root user and am told I may login using SSH. The only purpose this server has is to host one or more websites, possibly with SSL properly configured and enabled. My initial login will be to install (v...
I have a couple of machines that I use for purely automated stuff, with home directories encrypted using ecryptfs. So even if the machine is powered on, those directories aren't decrypted unless that user logs in (desired behavior). Now, I'd like to be able to run a server using one of these users (data stored therein)...
For HTTPs I saw the URL was configured in https://test.com/xml/Transformer=TEST&UDIAuthToken= < string of alphanumeric chars, 160 in count > << this a dummy hostname, with dummy parameters used for example >> This set up was done to send xml file via HTTP. I am new to such configuration and I am not able to figure out ...
I've finished building my wordpress website and now, I'm concerned about the security of the website. To improve security, I'm using Google two factor authentication plugin while also password-protecting the wp-admin folder besides the default username-password login of wordpress. My question is, does it make sense to ...
I play on this game thing - it isn't important but it is a roleplay game. I am roleplaying a criminal - a smart one. Now the fake FBI in the roleplaying game sent me a message. They have made the IP untraceable (in game) so I was wondering if I could roleplay another way to trace where the message came from? Like broad...
What are the steps you would follow in order to identify in an email is a SPAM/SCAM/Phishing attempt? The reason I am asking this question is that sometimes very well crafted junk emails manage to bypass the automated AntiSpam tools, so further investigation is required. Usually I review the sender IP reputation using...
I couldn't find the answer for the reason anywhere, even the wiki page doesn't explain it. This seems like using a PRNG for seeding an another PRNG. The first one (/dev/random) may itself be seeded by a PRNG. I can 'understand' why the-randoption can't be used directly for generating keys, but I can't see the reason fo...
In our system, every resource has an access control list (ACLs), which list entries (ACEs) that have a specific kind of access to that resource. The ACE can be for end-entities (eg: users like "Mr Q") or group entities (eg: "North Atlantic"); the inclusion of the group entities makes this a hybrid ACL/RBAC system. ACL ...
I have asked about security release notes Considerations for security release notes I need additional clarification about security vulnerabilities announcement. We create major release of our product about each half years and security or maintenance releases each month. Our product is Java Web Application that runs on ...
I'm really into hacking and security aspects. But I'm wondering about several things that is stopping me from pursuing this passion for the time being. One of the them is actually Programming language. As we all know that programming in general is an open-ended field, and what I mean you can't just by learning the bas...
I'm building a simple web application for encrypted chat. Each message will undergo 256-bit AES encryption on the client side, using the Stanford Javascript Crypto Library. No unencrypted data or password information will ever leave the user's browser. Is it safe to implement this scheme, using client-side encryption,...
I have a new (first time) CentOS 6.5 server being used for a web server. Our security team has identified the following weakness: The SSH server is configured to allow either MD5 or 96-bit MAC algorithms, both of which are considered weak. 

Note that this plugin only checks for the options of the SSH server and does n...
Suppose I have a (bluetooth/usb) device which needs to displays information on an external pc/phone. Is there a simple and effective method to garantuee that the information displayed hasn't been altered by malware on that PC or phone? One possible solution I thought of: the device could generate an unique picture once...
I was looking at this website and trying to understand how this XSS is possible, but I just can't figure it out. Here's the URL: http://www.domxss.com/domxss/01_Basics/05_jquery_html.html?681973661 <script src="../js/jquery-1.9.1.js"></script> <script> function setMessage(){ var t=location.hash.slice(1); $("div...
How much can someone see from my iPhone by connecting to my wifi and can they copy my messages files documents etc
I have logged into SQL Server 2008 Database and executed following query: select * from USER_Main_INFO_Name where userid ='' or 'x'='x' After executing the query Database has given total user list. Using Burp Tool I have done SQL Injection at front end my application has given proper error result. Is my application st...
Is there a security app I can download so I can keep another device from being able to see my iPhone messages and documents when they are connected to my wifi
I'm looking at a few VPN providers and many seem to offer L2TP VPN but they seem to share their shared secrets publicly on their website, for example : Goldenfrog https://www.goldenfrog.com/support/vyprvpn/vpn-setup/iphone/l2tp Witopia https://www.witopia.net/support/setting-up-and-using-your-vpn/apple-ios/ipsec/ Astr...
You already know google started new service which is related to gmail. http://gmailblog.blogspot.com/2013/11/attachments-in-gmail-now-with-power-of.html When we send new mail to friends.If it contains any attachment(photo etc ) , photos will open directly with mail. Is there any security problem with this subject? Can ...
I am making an app in Python for linux as a front end to the router (to automate some tasks). But I need to log in to the router before I can do any operations on it and since it uses a http-auth I need to send it the clear text password and hence the clear text password need to be stored on the system. What is the be...
I want my Mac to be as secure as possible, but I don't know if the send all traffic over VPN option is safe or not. Please can someone explain if it is more secure to enable it or not.
Most Desktop As A Service providers store their virtual hard drives and the VMs RAM in a way that allows them to access their contents. Choosing a provider who offers a 'no-knowledge of server' option looks like the easiest solution. However, companies rarely choose those, and there are significant financial considera...
I recently posted a question about recovery of website from XSS attacks, https://stackoverflow.com/questions/20759081/how-to-recover-a-site-after-an-xss-attack... Doing a bit more digging online, i found that the site is vulnerable to XSS if it allows user to give input or in other words, have any sort of input box in ...
For the past week our company's IDS has been blocking 100-200 meeting invite emails per day from a specific client that are loaded with buffer overflows targeted at Exchange 2003. The payloads are harmless to us, but the flood of logs is annoying to say the least. I have been in contact with the IT manager at the clien...
Why load assets such as images, javascript, css etc, over HTTPS? Is it possible for these assets to be tampered with if I use HTTP? The only way I could conceive of tampering with HTTP loaded assets is to ARP poison the network and then inject packets for certain requests, but that kind of goes over my head. Can someon...
How can I be sure now that I no longer work for a certain company that they are not accessing my computer from their side. Strange things happen ( someone remove a certain set of my friends on Facebook, then put all but one back). I also see the screen flicker like when you are getting online help. Please help if you c...
Being on the company security email list, I get emails with some regularity complaining about email discovery on various forms on my employers website. The reporters are complaining about things like our login form returning a specific message like "You password is incorrect." rather than "The email/password provided a...
A few minutes ago I attempted to ssh to a server I have at my office. Since it is a new server my public key has not been set up there so I had to type my password in manually. After three times of trying to log in unsuccessfully I notice that I had typed the domain name wrong -- two characters transposed. The serve...
I need an XSS vector that doesn't use forward slashes nor spaces. I've gone through lists of hundreds of vectors, but they usually have one of those two. The space gets URL encoded, and anything after a slash gets deleted. I've tried things such as <script\src=*>, but you'd need a forward slash to make it work from my ...
It is clear to me that using the same password for different websites is a bad idea because if an attacker manages to get a hold of your password, then he can gain access to the other websites in which you are using the same password. However, I was wondering if it would be safe to have the same base string in all pass...
The Information Security goals - Confidentiality, Integrity and Availability (CIA) - are often referenced to as the CIA triad. As I am writing my master thesis, I am wondering to which resource I should put my reference on the CIA triad?! I've done some research on this, but it's still unclear where it originated.
The Play Framework for Scala has support for signed session cookies. In the application configuration file is an "application secret" that is set as a secure random number when the application source code is initialized. This secret is shared between multiple copies of the application running in a web server farm so th...
I cribbed the public domain TEA source from wikipedia ( http://en.wikipedia.org/wiki/Tiny_Encryption_Algorithm ), looks like this - uint32_t v0=v[0], v1=v[1], sum=0, i; /* set up */ uint32_t delta=0x9e3779b9; /* a key schedule constant */ uint32_t k0=k[0], k1=k[1], k2=k[2], k3=k[3]; /*...
Recently I need to care a lot of false positive vulnerabilities in scanner results on Apache version. Example of false positive vulnerability: Apache 2.2 < 2.2.16 Multiple Vulnerabilities Our customers run scanners and they check Apache version related to the official Apache version numbering. We use Centos, and the A...
I've created an algorithm I think I'm going to use for a cloud storage service I'm developing- if there are no issues or vulnerabilities with it. It's this along with TLS and forward secrecy implemented. Also when logging in on a new device you must confirm it through your email account. To create account: Generate tw...
I'm working on converting an application that uses the traditional Page Controller pattern to start using the Front Controller pattern. One of the potential problems I'm thinking about is that with a Front Controller it could be possible for an attacker to directly call arbitrary functions. For example, requesting a U...
According to Guide to the Secure Configuration of Red Hat Enterprise Linux 6, there is this policy: "In certain scenarios, it is beneficial to remove certain httpd modules to limit the functionality of the HTTP Server. To do so, simply comment out the entire line which loads the module you wish to remove in the /etc/h...
I've been thinking for a while about whether or not ask this, as it may be a opinion-based question, but as I have seen a couple of non-closed questions about recommended books, so I think this is the same case. Is there any app for Android which be useful during a security assessment?
Given the recent confirmation of weakened and broken encryption schemes and implementations, how does the community feel about the security of SSH? It seems there has been very little discussion relating to SSH in the context of these leaks. Additionally what configuration would be recommended to harden SSH?
I am not sure about that. It should run in kernel mode in order to avoid some user-mode program to kill/suspend the firewall and do its dirty job. The malware would not be able to kill the firewall even if it was able to get higher privileges. Hope in deep explaination for both Windows (consider a generic firewall) and...
I am currently reading the "Green Book" (http://csrc.nist.gov/publications/secpubs//rainbow/std002.txt) of the "Rainbow Series" and have a question on chapter "C.4 Password Space". From this chapter: S = password space A = number of alphabet symbols M = password lenght S = AM To illustrate: If passwords consisting o...
If a WiFi pineapple does a karma attack and a client connects to it, would you get the password (for the original WiFi) or would the client just connect to you? Is there anyway to stop it?
I've got a Linux desktop that will be a gateway between my private network and the open internet. I'd like it to capture and store all network traffic passing through it continuously, 24/7 (until the HDD fills up ;). But it has to be more sophisticated, than just a one big packet dump: 1) I'd like to have some white-li...
I've been using Terminal under Mac OS X for years but somehow missed to spot this feature: I'm now wondering how does this actually work, and is it 100% safe? If it isn't, what technique could be used to still get the keystrokes?
If you have a random block of data and you encrypt it with a key, how can a brute force script tell when it has found the correct key? Is it possible without some sort of reference to the original plaintext? In a normal situation, an encrypted piece of data like a file or etc. would have some sort of recognizable struc...
I teach at an academic institute. We have decided to add a mandatory course: Introduction to Cyber Security. We know that most of our graduates won't stay in academia, but will go to work in the industrial sector. Nevertheless, we believe that at least basic knowledge in information security is a must today. The course...
Reverse Path Filters are generally used to disable asymmetric routing where an application has a different incoming and outgoing routes. So idea is to prevent packet entering from one interface leaving via the other. But there is a conflict of opinion regarding security risk of disabling reverse path filtering. My ques...
I understand the ssl handshake flow, but still need few verifications: If I'm trying to forge another handshake the client will fail because, and only because the certificate I'll send him back is not trusted? I understand that the session keys (symmetric) are used to decrypt/and encrypt the data. Where are those sto...
I want to learn Pen Testing and already know Java and have been learning Python and am fairly comfortable with Python syntax. I also have some knowledge on Linux and TCP/IP. My questions are: How can I learn to script tools in Python for Pen Testing as I have no idea where to begin, at present I have only used it to so...
I'm looking for ways to send private messages over a public channel, and in doing this I stumbled in asymmetric encryption, which is just perfect for what I was looking for at first - A and B communicate directly, over a public channel. However, it is now my concern that the security of the message might be compromised...
I was considering adding HOTP as an option to my website (alongside things such as SMSed one time tokens which I already have). But I was considering one issue that HOTP inherently has: Things such as the iPhone usually get backed up along with all app data. That would mean, say I'm using Authy to generate my OTP token...
I'm writing a paper for class and one of the things I'm writing about is internet security. I know that SSL certificates can be easily obtained and are supposed to encrypt data on SSL certified pages. I know that people experience issues with making their site fully secure even with purchasing SSL certification - so j...
I am in the process of writing a Scope for the information assets - in preparation for writing an ISO27001 compliant ISMS. I am confused as to if a VPN network is considered to be in Scope? as well as things like the Wireless access point for clients? The word information asset is confusing to me. Any information th...
So I'm doing my undergraduate thesis, I would like to explore how cross site scripting sql injections occur. And for the purpose of the thesis I'd also like to create a fictional website that is vulnerable to cross site scripting and sql injection and then evaluate the different ways that such attacks could be prevente...
I have a web application that is exposed to the Internet, and am interested in creating alerts, or prioritizing the manual review of failed logins to the web application. What thresholds, or formulas should be used to determine when a failed login should be reviewed in more detail? (Assume that an alert could be tr...
I have a Master Identity key (which is detached from my daily-use keyring) and both encryption and signing subkeys (all are RSA). I sign documents with the signing subkey: GnuPG selects this key automatically from my daily-use secret keyring (possibly) because the master key isn't present. I'm not sure whether I should...
let us say, I use program "x" for my e-mail security. through them I have a public key and a private key. My friend uses program "y" for their e-mail security and consequentially have a public key and a private key. The question is when I use my friend's public key (not from my program) to send them an encrypted e-mai...
So far as I know, in iOS there are three techniques of function hooking: preload library using DYLD_INSERT_LIBRARIES imported symbol table redirection using fishhook patch the functions when they are already loaded - i.e. already in memory using substrate MSHookFunction These expose security issues so I wanna be able...
I once heard the NX bit was a panacea, then that it was not. One detail I've wondered about though: Does the NX (no execute) bit protect against code inserted into the stack and executed there? It seems to me that the stack, because it's not the heap, might not be protected by NX usually. THanks.
Lately, I've noticed that many web server configurations reflect the method of an HTTP request sent with a non implemented method in the body of the server's response. For example, A request sent with the method GETTT will be responded with a 501 "method not implemented" response code, while the body of the response an...
Has anyone tried to do secure renegotiation on OpenSSL and verify it using WireShark? I can't seem to do a secure renegotiation as far as RFC 5746 is concerned. I tried to issue the connection command "R" as suggested here. However, when I look into the packet captured by wireshark it shows the message is encrypted. In...
Recently I put some hidden links in a web site in order to trap web crawlers. (Used CSS visibility hidden style in order to avoid human users accessing it). Any way, I found that there were plenty of HTTP requests with a reference of browsers which have accessed the hidden links. E.g : "Mozilla/5.0 (Windows NT 6.1) App...
Whether I use openssll or gnutls's certtool, I end in a single threaded part which take several minutes. When I try to compile the libraries with auto-parallelizer advanced efficient tools. It sill stay single threaded. I would like to understand more before diving in large part of code for manual rewrite...
Recently on stackoverflow I've seen many discussions that mysql_*_escape_string is deprecated and instead recommending PDO. The way I've been doing it was to allow only letters and ' in the name field , allowing all the characters in the password field (but then hash it ) and then using mysql_real_escape_string to esca...
I recently stumbled on descriptions of the 'QuantumInsert' attack (mainly used by the TAO group from NSA). This technique seems to be massively used to perform man-in-the-middle or man-on-the-side attacks to insert viruses on specifically targeted computer systems. Bruce Schneier has several notes on it (see here and t...
I'm reading up on the Cryptolocker virus, and I came across this comment, it says: And one additional measure: disable the default "Hide extensions for known file types" check box in Explorer. I still consider this one of the stupidest moves MS ever made in Windows. The comment has 17 thumbs up, and comments below ag...
I'm new to OAuth (1 & 2), and I'm developing the server side of a mobile app that has a form with a "Fill Details from Google account" button. I don't need any long-range authentication\authorization. From here (Listing 2) I understand that the server should have a controller that: When called without a code in the qu...
I was requested at the login page of a website to first change my password. After typing in a new password, the web page told me the new password did not differ enough from the previous one. Does this mean the company that manages the website does not store the passwords in a safe manner? Or is there a way to store the...
I've personally seen it recommended that every time a user inserts a USB thumb drive into a computer, that the thumb drive be scanned for potential malware and malicious code. However, if all that's on the thumb drive is an empty FAT-32 or NTFS filesystem, does the threat remain? Is there a way to manipulate firmware ...
(Cross-posting this here on the advice of a user at stackoverflow...) Got a philosophical security question for everyone. I'm sketching out an ASP.NET web application design where sensitive data for different organizations/clients will be stored in a SQL Server database. User authentication will use ASP.NET Forms Authe...
If you have an HTML file that contains the following code : <!doctype html> <html lang="en"> <head> <meta charset="UTF-8"> </head> <body> <script type="text/javascript"> var a = '</script><script>alert("xss")</script>' </script> </body> </html> when openin...
I have a little problem with encryption. I have this cipher text "AA969CF9657F77C597C8EAFF1594D59374E4977F" and i know that correspond to "http://jogos.meo.pt/". I have another samples, but i can´t find any analogy or logic, with the intuit to discover the algorithm of encryption. Can anybody help me??I really need thi...
I was required to create key exchange module for custom Rest framework which supports document level security in REST requests. Framework has its own security module which allows to encrypt parameter entities in rest request when keys available. I have done some research and found that ECMQV key exchange algorithm can ...
I tested a web application with a commercial tool (IBM AppScan) for penetration test. I found a bug which is related to Missing Secure Attribute in Encrypted Session (SSL) Cookie. The web application is written in .Net so I have added this content to web config: <httpCookies requireSSL="true" /> After that I checked ...
There was a lot of news in the past year about exploitable weaknesses in cryptography which originated from weak random number generators. In some cases it was negligence on side of the developers, in others it was intelligence organisations intentionally sabotaging standards for secure RNG generation. What about the i...
I'm getting my masters in cyber security. I have a bachelors in criminal justice. I would like to do missing and exploited children investigation. I'm relocating to Georgia. What kind of job should I apply for?
ISP can detect DNS requests for a web site, ie www.google.com . If I have a website ie www.mysite.com, and a webpage ie www.mysite.com/mypage.html and inside www.mysite.com/mypage.html , the web site www.google.com is embedded ( by using an IFRAME tag ). In this case, what ISP can detect ? DNS request for www.mysit...
I have an application with a user database. The database stores the password using a bcrypt hash with a randomized salt. How can I implement a password history set (to prevent password reuse) in a case like this? If I have the traditional 3 field password reset (enter current, enter new, confirm new) I could store ...
I checked my internet setting today and it seem that everything has being going through some proxy server for the last few weeks. How screwed am I? Could they get my internet login password? All my files on Dropbox? I buy things online too, is my credit card compromised? EDIT: The IP of the proxy is 85.214.85.193, b...
When you search the PCI website for validated payment applications it shows a re-validation date and an expiry date. There is also two categories of payment applications, "Acceptable for new Deployments" and "Acceptable only for Pre-Existing Deployments". There are applications listed that are past the Expiry date. Th...
I have some secure data created in my client app which I wish to store on the server as backup for the user. The user already has a password to authenticate with the server. The password is never sent to the server (I use SRP6 to authenticate the user). So here is my thinking... Use Fortuna PRNG with multiple event in...
For example, websites that are built in ASP,PHP,Ruby?
This is a follow-up to the following question: Can a website determine what OS or web browser a visitor is using if the useragent is blanked/changed? If I have understood the answers correctly, a website can't determine what OS the user is using if he's running NoScript, so that no Java applets or Javascripts gets exe...
I was at work using my phone. We have an open WIFI, but I did not use it to go online. I was wondering, can my information be viewed or was I transmitting data even though my phone said I was not connected to their WIFI?
For this I am assuming we have a server that is of a client or a friend, so we the helper are not innately familiar with exactly how things should be be. What are good commands and ways to check to see if anything bad has been going on? I know we have: the 'history' command, to see commands that have been entered and t...
With their permission, I am selling a company laptop that I used, but I had been using iTunes and syncing my iPhone on that PC. Is it possible for a forensic tech to retrieve any of the browsing history of safari through the stored back ups of my iPhone? And retrieving any emails or messages I have sent out? I had the ...
Can the data be easily intercepted when (or after) the card is swiped? My main concern is at a trusted vendor. There are two possibly different situations: 1) a typical point of sale scanner with a land line or internet connection 2) a standard reader on a smart phone, using the supplied software Does the typical syste...
I thought I knew how two-factor authentication works: I enter the password. Server generates a random number (token) and sends it to me via SMS. I enter this token. Server checks that the token I entered matches the one generated for my earlier 2FA request. But today, I discovered Authy, and it looks like I don't kno...
I may be asking for something impossible here. I want to know if it is possible to set up a 3rd party storage system where the service provider cannot decrypt the clients files, but can de-dupe the files if two clients upload the same file. I think I'm right in assuming that this would require that the two clients uplo...
I'm trying to find self-contained encryption solution for USB drives while at the same time being platform independent. For example, Windows' BitLocker only works on Windows and not on OS X or Linux. If I'm going to use TrueCrypt to encrypt the drive, it will need to be installed on the host computer somehow. (On OSX a...
Question As a regular Internet user, how do I check if my current HTTPS connection to some website is using perfect forward secrecy? Example I've taken two screenshots from my HTTPS connection to Google. Can anyone help me to interpret the information?
Or is authentication essentially incompatible with anonymity? If we have the idea that authentication is proving that someone is who they say they are and anonymity is essentially having an unknown identity, could you have a system that could authenticate you but that you could still use anonymously? Would adding a 3rd...