instruction
stringlengths
24
29.9k
Right so I'm developing very private systems recently, and I'm looking into admin login protection. I'm a PHP dev with essential knowledge of js/jq. While I handled most of the stuff so far, I'm looking to protect the login process itself. Now, from what I understand, only internet explorer is allowed to hook into a de...
Importing a GPG key with a KeyID or fingerprint seems to rely on keyservers. Doesn't this invite man-in-the-middle attacks, in which someone would alter the keys to allow them to decrypt the data? What measures are in place to prevent this, and what alternatives are there to using a keyserver to and a key to a keyring ...
I'm a part of a software start-up. I've the role of IT admin as well as requirement gathering (business analysis). Right now we're a team of seven people and we all are in the 'core team'. Now we're planning to lay down a email policy for the company. With my knowledge and experience I proposed the following things: E...
I want to experiment with web development (using django) for both desktop and mobile. Server, phones and desktops could all be part of the same virtual private network. The VPN will be from some professional, commercial vendor. I'll be the only user of the apps. I'm trying to find the easiest way possible to secure the...
When setting up clients with WPA2 EAP-TLS, most clients (ie: my phone, my computer) require both a client public/private keypair (for obvious reasons) and a certificate authority certificate. It's this second parameter which I'm not sure of the use for. My current setup looks like this: . └── root-ca β”œβ”€β”€ wifi-clien...
What are the characteristics of the ideal digital signature for cryptocurrency transaction verification? The reason I ask is because this answer about bitcoin signatures describes a potential vulnerability which makes this particular use of ECDSA sub-optimal with a possible solution in the comments. I understand that t...
I've been given an APK file, and before re-distributing to the "market" I want to make sure the given android app does not contain the malware. How can I do that ? Business use case is similar like : I am a "market provider" or :"reseller" to which developers will submit the developed apps. To guard my reputation : I w...
It's my understanding that the more bits an encryption key has, the longer it takes to break the encryption. What is the down side of having a larger encryption key or why don't we see keys of size 2^100 bits? Someone I worked with said it's the law made by the government encase they ever need to crack it, but this doe...
I have a pretty standard registration form. One thing I've decided to do away with is the requirement to enter the password twice, for usability reasons. In order to mitigate the increased risk of inputting a wrong password by mistake, is it ok to send the password in the welcome email to the user? This would happen in...
Most of the credit cards require PIN to authorize transaction. Recently upon a transaction the merchant required my signature and not my PIN. I understand this is another sort of authorizing the transaction. But this is more to held me accountable , if i denied the payment. It doesnt offer the security of a PIN since ...
In an effort to increase security of our website, I'm reading up on Gazzang zNcrypt, which claims to protect data in databases from breaches. Technically, it seems to do filesystem encryption. As far as I know, this is effective against hackers gaining physical access to the harddisk. If hackers manage to login to the ...
We have to setup a central auth for PCI compliance and I'm wondering if it's ok to allow anonymous bind or should I create a user to do the bind for the services needing ldap?
How would it be possible that if my password was 123abc that my bank also accepts something like 123abc12? Isn't that an extreme security flaw? If the password was hashed and salted, wouldn't the latter create a completely different digest?
Right off the bat, I'd like to know if there is a widely used library or standard that I could adopt to replace my "custom" scheme. I am certain that I, as one person, cannot produce something better than a community produced library. That said, I am a security novice, and while reviewing other implementations did n...
I'm working on a site that has a higher-than-normal concern for user security. I've recently been working on some CSS issues with older versions of IE (we support 7 and higher) and found that an easy solution to some of them would be the use of HTML Component files (.htc) to add certain CSS3 behaviors. http://msdn.micr...
I am currently writing a TOTP implementation in PHP (but this applies to other languages as well) and of course want it to be as secure as possible, what should be considered? After reading the relevant RFC 6238 and RFC 4226 my implementation currently looks like this: Every single used code is blacklisted for 2 minut...
I'm quite a bit of a traveller. So i tend to just stay with my smartphone and sometimes notebook. I'm not a security expert but i would like to check how to know if wifi is safe to use. For example, at airport or cafe. Sometimes, cafes or hotels offer wifi without password or some kind of login page before use. The on...
The general consensus I hear among security professionals is that USB drives are dangerous. In most organizations (that I have worked at), USB drives are either forbidden or employees are required to get official corporate drives that only work on corporate devices. I don't hear these same concerns over, say, SD cards ...
I'd like to learn the top-shelf methods for designing and managing a generic X509 certificate infrastructure. There's some books here and there, but I figured I'd ask if anyone here has any favorites. Books, web resources, etc? (or is this not the best exchange to ask?)
I'm trying to set up a hidden web service over the Tor network, and I was thinking of making a configuration where my Apache server and my database server are located on different networks. I know this will introduce a lot of latency, especially since no server will know where the other is (Tor will be running on both)...
I'm looking for some interesting ways to redirect URLs. For example, http://example.com:@example.org will redirect to example.org. Are there any other ways to redirect/spoof URLs in a browser like that? Any help is appreciated.
I was looking at this code and came across these comments which says encrypting without a salt is insecure. Why would it be insecure when you are already using a random IV for each value? I think the comment might be incorrect, but it is a popular gem so I wasn't sure. I think it is treating key really as a password, a...
Why is port 53 open on the WAN side of the router? And more importantly how do I close it? Port 53 is not one of my forwarded ports. Discovered by doing nmap -pT:1-64 <my-external-IP> -Pn Output: [...] PORT STATE SERVICE 53/tcp open domain [...] How can I close that security hole? (see Listing of DNS vulnerabiliti...
Assuming that an AS/TGS secret key has been compromised by a 'man in the middle' attack who in turn can monitor the network traffic, is an attacker able to find out the Client/Server session keys between clients and services and can they find out which clients are trying to access which services through service ID's?
There's the recent article NSA seeks to build quantum computer that could crack most types of encryption. Now I'm not surprised by the NSA trying anything1, but what slightly baffles me is the word "most" - so, what encryption algorithms are known and sufficiently field-tested that are not severely vulnerable to Quantu...
We have an app running where among other things people can send messages to each other. Obviously admins and content managers that have access to CMS can see what people are sending to each other. Is this usually encrypted and if yes, how, with what encryption? UPDATE The entire site is SSL encrypted, I'm specifically ...
The Wikipedia article about the Merkle signature scheme claims that it is very adjustable and resistant against quantum computing. What proof is there of this?
And having found a server IP that is controlling it. How can I find out the log-in credentials this client uses to log in to a IRC channel / server webpage / control panel. I have found out a python script the host gets. Just cant get myself to find the C&C server to mess around with it.
http://www.networkworld.com/news/2013/112513-bitcoin-robbery-276352.html In this story we can see BIPS got hacked, but I don't get how it was hacked when it was offline because of the DDoS.
I've done a lot of searching on SE and particularly here in regards to preventing issues or attacks for an image based website to accept image uploads, but I haven't seen anyone mention the idea of adding a limit on the number of file uploads per a period of time on the server, and wondered if this would be a good addi...
I see relatively many referrers such as the following (as reported by Webalizer) in a web server log. The server is located outside Russia and it's a small one. 8 3 http://tiandeural.ru/ 19 3 http://timetorest.biz/ 20 3 http://vigrx-original.ru/ 21 3 http://www.rukinolenta.ru/ 22 2 htt...
I'm building a secure system which stores messages on a server in a Postgresql database. The messages are stored encrypted with PHP's openssl_encrypt() function with the AES-256-CBC method. At the moment the key used for this function (lets call it the ApplicationKey) is stored as a file on the server with only read a...
On Windows Server 2008-R2, certain javascript files are exhibiting the same behavior. Text can be copied from other files and pasted into new ones. In both NotePad++ and Windows' default notepad, characters in specific areas will either suddenly be hidden depending upon what's next to it or even switch order. Is this ...
I get files with random extensions sometimes in order to bypass corporate firewalls. Usually I would just ask the other party what it is that I just received. Other times I get curious and open the file with notepad. Sometimes the file would have a plain text header which describes how to open it. Could this potentiall...
I'd like to find a way to block or restrict my access to the web-pages where my password is sent as a plaintext on the internet. Let's assume if I have the same password for all web-pages, is it possible to set this up with iptables? if so, how? I am a very new Linux user. Thank you for your help.:)
I'm confused by some terminology - reverse engineering seems to me to be pretty similar to exploit researching. I mean if you can reverse one program probably you will be able to find a vulnerability, but for this you need to be good with C and Assembly. A lot of people tell me that a pen tester should master python an...
I'm just curious if new version of backtrack Kali be hacked like back-doored or crack user password like the windows or mac
The URL filtering can block the HTTP traffic but not the HTTPS traffic in Internet Explorer. For example, the website http://www.facebook.com is blocked by the URL filtering while the https://www.facebook.com cannot be blocked. You cannot also block the HTTPS traffic during InPrivate browsing in Internet Explorer. Is t...
If someone discover an unknown vulnerability for a given online service or website, is there a decent way to sell it directly to the concerned entity.
I was wondering what the effect on strength/security is If I would use an aggregate of multiple hash-functions. For instance, I don't want to sent passwords in plain text (although it's over an SSL-connection) down the wire. So I hash the password client-side with javascript: js > hash = sha256(Password+Username); T...
I'm looking at Resource Monitor in Windows 7 and wondered whether a process could be hiding in plain sight by mimicking another process. For example I've renamed an executable file as chrome.exe and when I run it it shows up as chrome.exe under the Image column, the same as Chrome itself - but the Description is differ...
I am often getting DDOS attack from multiple IPs with simple HEAD requests. There are around 30 unique IPs creating such attacks. 201.230.167.68 - [05/Jan/2014:00:19:19 +0530] "HEAD / HTTP/1.1" 301 5.000 0 "-" "-" - - 77.121.228.31 - [05/Jan/2014:00:19:19 +0530] "HEAD / HTTP/1.1" 301 4.792 0 "-" "-" - - 186.64.78.24...
I am using Private Tunnel to do some tasks involving sensitive data like logging in to PayPal and online banking. Is my data safe or can it be retrieved by other users of the Private Tunnel service?
I've received a spam email that claims to be invoicing me for some service in New Jersey, USA with whom I've not had any dealings. The email includes a link to a zip file that is hosted on a greek restaurant website in the Netherlands. This, to my mind is a compromised website who are most likely unaware of their situ...
If I have a: router with stateful packet inspection turned on, plus WPA2 security on the wifi network an IP camera or webcam connected to this Wifi network Is there any way to ensure that: camera itself can't try calling some external service and bypass the SPI firewall only way to view the video feed is to ssh into...
I use Nginx compiled with the Naxsi module to protect against some vulnerabilities (SQL injection and cross-site scripting). Now I need to apply a layer of poor man's DDoS protection at this level. I read a lot to come to the conclusion that there are three recommended approaches: two modules for Nginx and the option t...
I am trying to understand the concept behind XXE (XML External Entity injection). I went through OWASP Guidelines on XXE And since I am new to XML and DTD, I went through the W3Cschools tutorials as well on these topics. Now as per my readings I tried creating a demo of XXE. So below is my attempt to do the same : - <?...
During client authentication, neither the secret key nor the password is sent to the KDC. If a user changes their password on the client, how is the password updated in the password database in the KDC?
I want to avoid people installing the app on virtual devices. Is there any way to tell this? What is best you could do? Ideally what i want to prevent as a whole is one person or entity creating many accounts to analyze my service easily. The app is only a portal and the processes are server only. I use captchas when a...
I just started teaching myself cryptography, I am reading this http://www.garykessler.net/library/crypto.html to understand the basics. I am confused by Sections 3.4 and 5.3. Section 3.4 details how to combine hashing, secret key, and public key crypto to get a secure connection over an unsecured network. To make the d...
Can anyone provide a good list of resources to learn network penetration testing? I am specifically looking for those having hands on exercises (kind of virtual labs/ISOs) which are free. I know web-apps like Mutillidae or even Google Gruyere are good resources for learning pentesting but these are good for web-app pen...
i'm getting re-acquainted with OpenPGP and noticed that GnuPG allows me to store a "preferred keyserver" URL in my keys: reuben@localhost:~$ gpg2 --edit-key 'Reuben NP Garrett <my-special-email@example.com>' gpg> help .. keyserver set the preferred keyserver URL for the selected user IDs this seems to influence GPG...
Recently I've been receiving in my SPAM folder, SPAM mails sent "by me". With "By me" I mean, that I am not sure if those are really sent from me. It has been happening since December, at around one email per week. I've changed password 3 times. The last time, two weeks ago, I enabled two-step verification, so I guess...
I would like to store data, and send it by mail. What is the best way to encrypt it, and being able to decrypt it? My guess would be RSA, but is there a better way? (Considering that the other person knows the algorithm and has the key)
Do current mobile cellular networks like 3G offer enough security? The article from Info-Security states that 3G encryption cracked in less than two hours. Could a eavesdropper or man-in-the-middle attack be launched on a mobile device? Should we be using a VPN such as Hotspot Shield?
Location services - such as https://www.lociloci.com - allow you to track any phone as long as the person replies to a text to allow the tracking to be performed. How do these services receive the location information from the phone networks and are networks legally allowed to share this information with other companie...
How effective signature-based Antivirus is, in detecting encrypted malware?
I've stumbled over some code in an application where (certain) users are allowed to input where conditions. In addition to this there is a part of the where condition that is set as a parameterized query. E.g.: select foo from bar where <user generated> and foo = ? (Besides this the user generated portion is run throu...
I'm working on a simple secure mirror for potentially untrusted services like Dropbox, Owncloud and so on. (Current code may be seen here: http://www.codeduce.com/extra/secure_mercurial) Currently I'm relying on 7zip for encrypting the individual files. So, I am encrypting every file with a password and mirror it to th...
Given two companies managing two separate websites, the client wants the user to be able to log in to one website, and then click a link to navigate to a certain part of the second website. The client wants to eliminate the need to log in a second time upon arriving on the second website. I'm thinking the solution is ...
My laptop has windows 7 installed. One Saturday night I couldn't fall asleep and was just lying in bed. Then suddenly at around 2 in the morning I heard the fan of the laptop start up and lights on the laptop started blinking. The lid was closed, and I didn't want to open it because I had a headache. The fan was on and...
I heard once from someone I trust, that the French governement is about to buy and certify a software to put on tap an internet line even for HTTPS connection. I don't really care about the legal issues it brings because this product will be use anyway by law enforcment, but I'm quite interested in how it is possible....
In the old days I would emphasize that people should not select the remember passwords option because (besides the fact you tend to forget what the browser remembers) a bad guy could display the password (if he knew how) and read it there, and then use it later. These days the passwords can be encrypted using a master ...
Is it feasible to authenticate users such that they should be prevented from creating multiple accounts, and that their privacy is not impaired (i.e., no personal information should be revealed to the application). I'm thinking client-side biometric authentication with hashing? I think biometric authentication might sc...
I seem to have a serious problem of being attacked and after looking up the attack source, 99% come from China, then Korea, Hong Kong etc. Here is a fraction of the report from my Router, which is a Cisco WRVS4400N router. 1 2014-01-06 14:53:32 CHAT GoogleTalk login attempt -2 173.194.73.125 2 2014-01-06 14:52:...
What technique is used to hide a process from Task Manager? I'm currently researching ways I can do this in C++. Is this process called hooking? http://www.codeproject.com/Articles/3978/Trap-CtrlAltDel-Hide-Application-in-Task-List-on-W The book I am self-studying from: RootKits: Subverting the Windows Kernel
I see nobody here has asked this question. What if one, instead of just using a single proxy, connected a proxy-to-proxy in a very long chain and downloaded something (illegal) using secure packets (so no one can see what OS, etc.) through the long chain of proxies back to them? Wouldn't it be too wasteful to go throu...
Is it possible to perform null byte injection on PHP code? And, how would vulnerable code look like? Could you give me some examples, as I noticed that: <?php echo $_GET['get']; Will not make code vulnerable. I want to know, what are possible security flaws in code that can cause this kind of vulnerability, if poss...
I work for this telemarketing company, and when I went to work this morning all my fax machines' outputs were jammed with black paper with the faded words "f*** you" transcribed on each of them. I looked it up and it says its an electronic attack called a 'Black Fax', what should I do?
Basically I'm wondering if a Skype video session along with audio could be logged (or recorded) over a virtual private network? I know whoever hosts the VPN server can log which websites you visit (or how often you visit them) along with other sensitive material such as user names, passwords, emails, and bank account n...
I have asked this question: False positive Apache version in scanner results on Centos I need additional clarification: Do you know if it is possible to configure Nessus to adopt Red Hat backport security updates? I want to prevent false positive reports from Nessus. Example of false positive report: Apache 2.2 < 2.2....
i designed code for uart module now i want to include Encryption code before sending the data which algorithm is better for me RSA or AES
I've spent many hours on whitebox testing to make sure my code was safe. From a theoretical standpoint, the code SHOULD be safe. I then used several widely known testing tools (including one that cost $3500) to test for SQL injections, cross site scripting, CRLF injections, file handling security, and more. All softw...
Correct me if I'm wrong, but for a node to participate in peer-to-peer, if it's behind NAT, it must port forward to be able to connect. Why is the port forwarding necessary? I know there are exceptions to this i.e. NAT traversals, but I'd like to understand the basic problem first. Can anyone explain in very simple ter...
Please excuse my ignorance as I am new to information security. Could someone please explain in simple terms what the difference is between key generation and key agreement. In which situation would I use which. Keep it simple please.
I want to test our DOS prevention system against http requests that are not have header and agent information. Is there any tool I can do that. I tried siege with this command siege -c 3 -b -H "Host: " -A "" http://10.0.1.2/ This command sends requests with empty host and agent values. What I want is to send request...
What are the windows privileges that deserve to pay attention to prevent a user (non-admin) to escalate his privileges to the local admin group ? I know SeDebugPrivilege, but what else ? Thanks. Edit for clarification : I am looking for a list of privileges that can be abused during escalation attempts. The goal is to ...
I am wondering wether a CSRF attack, will disclose the information being sent back in a GET request. I need to send a social security number out, to the client a few times, and it is NOT anyone else should ever be able to receive. The data is guarded already by HTTPS, but I know that won't stop a CSRF attack. The reque...
Background: I'm working with Node's crypto library. I'm using PBKDF2 to convert a variable-length binary "passphrase" into constant-length keys for an AES cipher later on. The underlying source of this passphrase data, for reasons out of my control, is encoded with base64. Out of habit, I decode the passphrase back to ...
I'm using Windows 7 and decided to learn Linux Administration (Centos 6.4) using Oracle VirtualBox to host the Linux system. In my network configuration I choose "Bridged Adapter". I set the VM's IP to 192.168.1.104 and my Windows host is 192.168.1.100. As I do not have much RAM I did everything using SSH. SSH was set ...
I was wondering, If I got infected with a Keylogger and I start my On-Screen Keyboard(from OS) and type things, will the symbols will be recorded (considering no Screenshots Keyloggers)? Since Keyloggers act on keystrokes I think this may work against Keylogger, correct me If I'm wrong.
So reading this blog post, I know how the password reset works and how it's exploitable, but in a real case scenario, how would XSS be possible? Is there a way to send a victim to a page with the host header edited? Thank you!
How well do the various biometric authentication methods currently perform in regards to precision and recall? Can anyone cite a relevant research article?
Found this rather detailed list of the NSA's latest spyware gadgets, with several different remote bios exploits that once installed are virtually undetectable and can survive reinstall of the OS: http://leaksource.wordpress.com/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-major-software-hardware-f...
I'm working on a project that would use bash and FastCGI to create a pseudo-CMS. Are there any kind of security concerns to watch out for within FastCGI itself over a well written bash script (for example buffer overflows, and the like)?
I'm wondering how to successfully detect malicious activity in my web server traffic? Could you point me out some popular solutions which can help me to detect attacks on my web application? I didn't find similar questions with sufficient answer. I will appreciate any answer. B
Disclosure - I'm not a security professional - but I have a security issue (I think) I need to articulate to a client. We have a partner organisation that has built an API for a mobile app we're building. Rather than use oAuth for the facebook login - we're required to POST a user's facebook ID to the API endpoint, vi...
I have a web application that sends "change password link" to user that wants to changhe his password. The link is something like this: http:// www.my-domain.com/changepass?uid=username&secretkey=some-hardly-encoded-secure-key Is it possible to change my email content before arrival? I have a scenario in my mind but ...
Lets say I have a self-signed root certificate called root-ca.pem created by openssl. It allows me to sign certificates. Is it possible sign new.csr certificate with root-ca.pem such that the issuer from signed new.csr would be different from the issuer who signed root-ca.pem?
I have been using a key pair at home with gpg command line tool on Ubuntu, to encrypt password text files for a few years now. I no longer have any record of the type of encryption and bit length used when I created the keys so I would like to identify it and decide whether the encryption is strong enough for the next ...
I've been SSHing into my VPS for months with no problems and this morning it returned this familiar message: The authenticity of host '[hostname]' can't be established. ECDSA key fingerprint is 05:39:ac:73:c3:ba:f4:16:57:74:66:c0:a1:81:6a:fa. Are you sure you want to continue connecting (yes/no)? ^C I have not reinsta...
If I had a website http://site.com redirecting to https://site.com via javascript (with a HTTP/1.1 403 Forbidden), what are the attack vectors I could be vulnerable too? Why is this not a good practise? (and the preferred way is to do a 301 from the server side) ok SEO while a 301 is preferred for the search bots. dis...
Is there any Guideline Doc. or Tutorials for writing Security Functionality Requirement (Common Criteria)for a product?
I was just wondering why there is a file on your computer implementing the trusted root CA's instead of something similar to DNS where there is a file on root servers that computers check against to retrieve the list of trusted CA's? Thanks again, Francis
I want to publish some information in my country that is in the public domain that is in a hard to read format. What are some reasonable steps I could take to help ensure I am not identified or make it reasonably difficult. Update: To elaborate a bit the Government won't be coming after me, its their publicly posted da...
I'm working on a project that splits large files into several encrypted fixed-size blocks (e.g. 4KiB). Those blocks shall be used to be stored persistently on a storage device. Blocks are encrypted symmetrically and each block has its own Initialization Vector. Unfortunately I am unsure how to "generate" those Initiali...
A few sources state that the DH keylength (bits of the prime) should match the keylength of rsa for TLS. For example SSL_set_tmp_dh(3) from openssl has example code on how to match the dh parameters to the key being used. Obviously, one doesn't want DH to be the weakest link in the chain. Using AES-256 and only securin...
I was wondering if someone can become a victim of a DDoS attack as home user when only his IP is known by the attackers but he is behind a router with no open ports or other known vulnerabilities? I'm mainly interested because this becomes more and more a topic in professional gaming (which I like to watch). But my fee...
During a penetration test for a client, having an infrastructure with multiple (5) Active Directory Servers (Win Serv 2008 R2)... I found a nice exploit to drop a system shell in one of the servers, and stole the domain admin account with mimikatz. But the problem is, I used quarks-pwdump to dump the hashes... And I am...
I don't get the correct results and I'm not sure what I'm doing wrong: $ ./hydra -l admin -x 3:9:a http://localhost http-post-form "/admin/login:j_username=^USER^&j_password=^PASS^:failed" -s 8088 Hydra v7.5 (c)2013 by van Hauser/THC & David Maciejak - for legal purposes only Hydra (http://www.thc.org/thc-...