instruction
stringlengths
24
29.9k
Recent leaks about widespread NSA surveillance have brought privacy and security to the forefront of the public consciousness as we strive to determine best practices in governance for the Internet era. People are also concerned about network neutrality and how the Internet currently relies on protocols (such as DNS) t...
A web application I'm developing needs to store some sensitive data in a database. I need to be able to retrieve and use this data later on so hashing isn't enough. The web application might, at some point in the future, be load-balanced, so I'm trying to get things done correctly now instead of battling this later. I'...
I'm receiving e-mail from my PHP/MySQL application with certain links. I was thinking on including an UUID as part of the link, which would point to a Web Service that ONLY reads those UUIDs. Those UUIDs will be stored in the database and the Web Service server will understand what to do for each UUID (execute a SQL st...
Is there any danger of any of my computer's files being read or changed (mainly - infected by malware) in the following scenario (I'm using Windows 7): I have file sharing turned off (in "advanced sharing settings"). I connect to a public wireless network (such as at a restaurant), and surf the web. Assuming: No vuln...
A security scan result prior to the deployment of a web application on Windows Server 2008 R2 has raised the below message : Weak SSL Cipher Suites are Supported Reconfigure the server to avoid the use of weak cipher suites. The configuration changes are server-specific. SSLCipherSuite HIGH:MEDIUM:!MD5!EXP:!NULL:!LOW:...
Can we control the SSL version for ClientHello (like passing the lesser version then maximum supported)? I am using Java client to connect to App server. Currently my client is supporting TLSv1.0 and App server is supporting SSLV3, TLSV1.1 and TLSv1.2 but TLSv1.0 has been disabled due to its vulnerability to BEAST atta...
Assume I have root/administrator access to a given computer which is currently being controlled via LogMeIn from an outside location. I see a password being typed into a browser (as little black dots). Is there any way to extract the content of the password? The question is OS-neutral though I expect that some answe...
In order to protect a Windows administrator account from attacks such a Pass-the-Hash and other Token Passing tehcniques (e.g. via Incognito tool), can you tell me if it is a good idea to remove the privilege "SeImpersonatePrivilege" on which Incognito rely on ? If this privilege is removed, it should be impossible to ...
We evaluate using Windows EFS on Amazon EBS. There is a report about Windows flaw that allows you to copy data from an encrypted volume as described in this article: http://slashdot.org/topic/bi/the-windows-flaw-that-cracks-amazon-web-services/ Aside from the Amazon staff, can other Amazon multi-tenant customers mount ...
I'm looking for some best practices documentation for implementation of a reverse proxy. We need to allow an internal database / web server incoming access to the outside world and are trying to determine the most efficient and secure method to accomplish this. We already have a Red Hat 2 server running a mod proxy Apa...
With elevated SQL permissions, I am able to export a blob and retrieve a pdf with employee data (SSN) from a SQL Server database. This database is a backend to a third party web app we use internally (and are considering the option to allow external users access to the website), so I don't have a lot of options in ter...
I am testing my own wordpress blog against security issues with wpscan. Honestly I have never done that before and was shocked after I saw the result. One vulnerability of my wordpress site is: [+] WordPress version 3.8 identified from rss generator [!] 1 vulnerabilities identified from the version number | | * Title...
In a scenario where a client is reading data from a server over SSL/TLS and then encrypts that data using a client-side symmetric key before saving it to the disk, how susceptible is the data to an in-memory attack (e.g., by tools like SSLsnoop)? Would the client need to do anything extra (e.g., get the data encrypted ...
I made a login system. The user can login by: using a normal email / password (bcrypted). using a service like facebook, gmail, etc. So far so good. Now I want to store sensitive information (ftp credentials) in the database in a secure manner. This is very easy for the first users: when the user logs in with their e...
I know most, if not all, ISPs log the IPs you had tied to your network, but do ISPs keep logs of the IPs you have tried to connect to? For example, let's say I went to google.com, would the ISP be able to go through their logs and find whether I have ever connected to that site?
My fiancee was browsing a website (www.medievalbridalfashions.com) and about to make a purchase when I noticed something. During checkout, everything appeared to be getting sent over plain HTTP. I made a dummy account, went through the checkout process, fired up Wireshark and looked at the packet that was sent and the...
What are the best practices for thwarting DoS attacks for a WebSocket server? Is there a comprehensive site or document that can be referenced?
I need to know what all information a random website can get from my computer, and whether a website can tell which of my two computers on the same router I'm using. I know websites can determine what operating system and browser I'm using and the IP address of my modem, but I'm wondering if there is any machine-speci...
I'm currently investigating WPA2 enterprise security options, and I'm curious about PMK Caching. I've found lots of vendor information about it, and understand that the client does not need to reathenticate to the access point during the caching period. Does anyone know what the likely attack scenarios for this are, ...
Before I even ask the question - this is a hard question to frame, so I welcome edits to improve clarity. How do major browsers decide how to cache responses, especially if said responses are retrieved via AJAX, and have no explicit Cache-Control, or other cache related headers? The applications I am testing are both f...
There is a number of services online like RightSignature or SignHub that will let you sign online legally binding documents. I understand how documents can be signed digitally and this can guarantee that they were not altered, but I do not understand how they can guarantee non-repudiation. For example, I just created a...
I'm trying to identify what exploits to guard against when anonymous users generate reports with PHPword and PHPexcel (or similar libraries). Specifically, I'm worried about textarea inputs where the user can enter about half a page. The amount of text makes it hard to validate/ sanitise the data. The two contexts are...
I'm using .htaccess to control source IP of connections to my web application. My configuration looks more or less like this: order deny,allow deny from all allow from X.Y.Z.Q These days we can trust less and less things, every days some commonly used technique is found to be vulnerable. So I started to ask myself qu...
You use multiple computers in work, home and mobile devices (android, ipad). You want to share your files between devices and you use physical sources: an SD card, dvds, a usb stick etc. with every flaw that it implies: losing the physical storage device, you lose all your data. This can happen by theft, fire, loss or ...
I need to implement a classification system for my company, similar to the government's. I'm working for a company working with the government. The classification system in my country isn't public so we can't just ask them how to do. We're required to create classification levels like: Top-Secret, Secret, Confidential,...
Many companies have policy again writing passwords and paper and I wonder if there reasoning is sound. Is it always better to use a software password safe than writing passwords on paper? Here are some pros and cons I can think of: Software password safe pros - easy organization - convenient - can backup (however y...
I've noticed some very suspicious activity from my ISP. Sometimes I would notice that when I ping google.com it would resolve to an IP which is owned by my ISP. I currently don't have an example since it is resolving normally at the moment. However, here's a weird thing. My ISP's DNS servers (41.128.225.225), 8.8.8.8, ...
Are there any negative security implications of setting the private key password (DSA in this case) as a PKCS12 (and then JKS) export password (instead of generating/inventing a new one)? My use case is that I need to export my PEM private key as PKCS12 so that I can convert it into JKS to import it into a Java based s...
My application has an Upload Management Module and accepts Excel and text files to our server. I detected invalid data inside some uploaded files (the uploader put <script>alert("XSS")</script> instead of the original data). I verified inside the database and that data was stored inside it. I would like to know if my a...
Reading Preventing SQL Injection Attacks in Stored Procedures started this debate between my partner and I---and looking for the right approach is not as straight forward. I'm no security expert--but what do a person do when you take a look at the first few lines of this stored procedure....and you see this. We haven'...
I'm trying to put some anomoly detection in place and I'm looking at referrer data (I know that this is optional, and can be fudged in some circumstances). But I'm seeing too many cases of what I believe to be false positives. From rfc2616: The Referer[sic] request-header field allows the client to specify, for the ser...
I am curious about something; let's say someone randomly added me to Skype and tried to initiate a chat with me and I want to know more about them but I am worried if they can do some damage. My question is, how dangerous would it be to have a voice call with someone you don't know on Skype ? What can a potential attac...
Hello I'm a beginner into IT security. I want to become ethical hacker. So I know how to use metasploit to write exploits, and how to use different fuzzers, but I think this isn't enough. I can read and understand code from a lot of languages including basic assembly - I can convert simple assembly code to C code or Ja...
We have a data warehouse that stores prices for our products. Once every business day, new data points are added representing the day's price for each product. On the website, a user sees this information on a page load. There are currently 7 products; analytics shows that the amount of page loads is about 100 per day....
What do people mean by saying that X.509 certificates work in "top-down manner"? Do they say that because CAs can do cross certifications?
And know which are not default ones installed by Microsoft?
I have a set of bad URL's. I want to know the nature of infections affecting these URL's . Running an online scanner such as VirusTotal gives me some basic information from various engines about the URL in question like which engines tag a URL as bad, but the question of 'why' seems a bit unclear from these results. Is...
I'm interested in unique information that is beyond typical user knowledge or control. As of iOS 7, users can easily protect local physical tracking by controlling radios (cell, WiFi, Bluetooth) in Control Center. There are also now explicit privacy controls for Location Services, Contacts, Calendars, Reminders, Photo...
I accidentally typed my root account password on my google account login, I know google keeps their website quite safe but this question came in mind: Is there a risk if you accidentally type in another password in another websites login page?
Connecting via remote desktop to a Windows 7 machine today showed the last couple of seconds of a windows device installing and the "Your device is ready" popup for a Sony Xperia T. Going to printers/devices showed an image of the phone. There's no bluetooth on the PC, and there's no reason for such a device to have be...
I am not sure if I am in right forum. But i am having problem with this virus. On affected computer, If we use a USB drive, all the file become hidden. I am using HFV.exe for retrieve all data in pendrive, but still same thing happening for another pen drive. any solution for removing this virus from computer? tried ma...
Say you have a windows server that works as a PDC AD box. Is this a potential Attack Vector for a small 20 people buisness? Wouldn't it be better to simply have an encrypted database file with all the user info always with me? For example someone could enter the building and physically harm the server or gain access to...
I have been trying to make some extensions for chrome lately to block some unwanted stuff. I have also been searching for quite some time to find what a JDB does.So , the applet downloads a file , doesn't it?(silently) The java code I believe looks like that: (not crypted, sample file) public void init(){ try { in ...
I got a python script decrypted out of a pcap file it's communication from a botnet (proberbly the c&c) but when i start the script i ain't getting login or passwords. What does this script do? And how can i find the client controller? from twisted.internet import reactor from twisted.internet.protocol import Reconnect...
I'm researching certificate authorities, and I just have no idea what to think of the CA named x00Ax00-x00Tx00rx00ux00sx00tx00 x00Gx00ex00sx00.x00 x00fx00xFCx00rx00 x00Sx00ix00cx00hx00ex00rx00hx00ex00ix00tx00sx00sx00yx00sx00tx00ex00mx00ex00 x00ix00mx00 x00ex00lx00ex00kx00tx00rx00.x00 x00Dx00ax00tx00ex00nx00vx00ex00rx00...
I always hear conflicting things. Should I use a long sentence? Or is this privy to dictionary attacks? Or should I use a long string of random alphanumeric garbage with upper/lowercase and numbers/symbols/etc?
I would like to know briefly what are the best practice to protect corporate network from BYOD challenges nowadays? Thanks a lot!
Given a site that publishes unique content online and given that there are lots of site scrapers and persons stealing content and reposting it as their own, inevitably you will have the same content hosted on different sites. Is there any measure that can be taken to later prove, beyond any doubt, what the original sou...
My server gets base64 encoded passwords from the client, and I am going to hash them for storage in a credentials table. Should I decode the password and hash the clear text password, or just hash the encoded string?
My only operational computer has shown some wierd signs like disapearing logs, rotated logs gone random files getting updated and so on. Tho this is my only operational computer and I have decided to nuke it. My question is can I trust this system to download and burn my OS? If not what can I do to nuke this computer s...
I'm having trouble understanding how an encryption key works. for example: if the word was 'hello' its encrypted value could be 'GHSSDgsd2', what would happen to the encrypted value if the key was 'dog'? how would it change the encrypted value of 'hello'?
I've got an SSL certificate from GoDaddy, and it's time to renew. I ended up with a single "keystore" file, which I give to my webserver (Jetty). This is the process I went through to generate the original keystore file, which gets to my final point of confusion: First I generated my keystore file: keytool -keystore ke...
I'm having trouble understanding how an encryption key works. for example: if the word was 'hello' its encrypted value could be 'GHSSDgsd2', what would happen to the encrypted value if the key was 'dog'? how would it change the encrypted value of 'hello'?
I recently came across a paper called "Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries" (Aaron Johnson et al) ... which seems to be saying that adversaries (like the NSA) that can see large segments of the Internet can relatively easily de-anonymize most Tor traffic: "... previous work has thus f...
I see examples of AES (with a shared secret key) being used to encrypt shared secrets (e.g. nonce + counter) to produce a keystream against which the plaintext is XOR'ed to produce the ciphertext. What is the advantage of using this method over simply using AES to encrypt the plaintext? What is the advantage of using a...
I've seen people demonstrating the use of BackTrack to attack VMs. In one of the components of BackTrack, it shows the operating system of the targets. Since support for Windows XP is ending soon, I would like to know if it is possible for attackers to know that I am using an outdated OS and exploit its vulnerabilities...
I was reading about Google's usage of RC4 and an answer on stackexchange website stated the following: I know Google uses RC4 for most of its services, and this is the reason one shouldn't keep gmail opened all the time ;-) Is this true? What sort of attacks can be done if we're exchanging information for too long...
Let's assume both, my VPN client and VPN gateway has public and private keys. I encrypt my request with VPN gateway's public key. VPN gateway gets the request, decrypts it with private key. Then, VPN gateway encrypts the shared secret key it generated with my public key, then I get this request, decrypt it and now I ha...
I am convinced that it is possible to find out the real IP address of computer which has spoofed its address. I find it rather unlikely that no techniques exist against IP spoofing. How is it possible to find out the address of spoofed IPs? What methods are used? How do you detect spoofed IPs?
Currently I am saving LastLoginAt, LastActionAt, LastLogoutAt, and LastLoginFromIPAddress. I am not so sure about the value of logging/saving details of logouts and IP addresses, as I am not sure of what use they would actually be. What is the "best" practice here when it comes to saving info about user logins?
I have a cloud server that I am preparing for a small E-Commerce website deployment. I've used a RSA-2048 keys right before booting the newly purchased server, with the help of the Provider's Control Panel. I've quickly secured SSH Server before doing my first reboot. I've installed Ubuntu 12.04 64-bit Server Edition...
When Googling for the most trusted VPN provider (for keeping your anonymity), some users say that the best way to go is to just setup your own (e.g., OpenVPN) using a dedicated server. How is this more secure if the provider of the dedicated server and their ISP still has access to your internet traffic data?
If someone sniffs requests coming from my computer and my VPN's computer, there's no point using VPN, right? Because they can see the time when I made a request to my VPN and they can analyze all of the requests coming from VPN at the specific timeframe and they can guess which request was made by me, correct? That's j...
My home network consists of a router (with wired and wireless connections), and a separate access point used to repeat the router wireless signal. A device is further wired to the access point; it does not have a wireless interface. Is it possible for the device to determine the MAC address/SSID of the access point, of...
Let's assume that a hacker has already infected an X number of PCs , each one of them is online. How will he actually perform this attack? Just send ping requests or use his very precious tool to do it(Having the risk of it being revealed) ? I do not understand the actual way
I'm doing some exercises in the lab. My vuln. scanner detects MS12-020 on a few machines. The report indicates that this could be exploited to allow the execution of code remotely. To me this would mean that there must be some way to upload a persistence module to it (if I'm wrong forgive my naivete, I'm only second ye...
I am working on a fitness app, and it is going to have the following user data: email, first name, last name, birth date, height, weight over time, Body Mass Index over time and heart rate over time. This data is very personal and private to some people. I was thinking of using AES to encrypt their email address, first...
As the nonce bits would be used twice in that case, does that break EAX security? The examples I've seen using EAX have separated the nonce from the Associated Data, but to me it makes more sense to have the nonce be a part of it. http://www.cs.ucdavis.edu/~rogaway/papers/eax.pdf
I want to download and upload to the internet anonymously. I have successfully configured Forefox to access internet through a secure SSH tunnel service (and remote server). I use 'SSH Tunnel Manager' app to do this (like PuTty for Windows).I also access the Tor network using the Tor Browser Bundle. But I can't figure ...
I am using OpenBSD with a browser named Xombrero that doesn't have SSL certs by default. Should I get the certs from the /etc/ssl/certs.pem file? (ex.: I am not trusting OCSP and don't trust that my webbrowser auto-updates itself - if there were any - so the certs aren't updated) Question: are there any best-practises...
While it is theoretically possible to thoroughly examine the source code of Open Source Software to check for backdoors (neglecting a Ken Thompson hack), and given sufficiently adequate knowledge in Electrical Engineering one can probably figure out what a given observable circuit can do, how can one ever be sure an In...
I have been tasked been tasked by my boss to change the encryption system of our web application from MD5 to PBKDF2 as MD5/SHA1 has been shown to be breakable in recent years . I argued against it and thought we should allow users to attempt to login a maximum of 200 times a day , anything more would result in a lockin...
I'm planning to automate copying a large file to a remote server over ssh using rsync, using following command : sshpass -p '<PASS>' rsync --partial -av --progress --inplace --rsh='ssh -p 22' ${TAR_PATH} <SERVER_IP>: This command will be run through Jenkins. The operator will enter the password in Jenkins. I'm using ...
If a malicious application has found its way onto a computer running a localhost only WebSocket server, would it help if the communications used SSL? If so, how could SSL fail if a malicious app Had total control over the computer Was a non-root linux user Could only listen to communications
Numerous clients have told me that my suggestion on changing the algorithm on a web app does not increase security. I've tried reasoning that if the files have not been exposed, the attacker has to guess at the algorithm. A few days ago I was assessing a friend's site and pointed out a few SQLi vulnerabilities. I didn'...
This question is generally similar to past questions asked here, but I haven't seen one the relates to Linux. Case at hand: a PHP web app has a MySQL backend. As part of its functionality it accesses other, remote MySQL hosts and issues some queries on those hosts. To allow that, the PHP app needs credentials for those...
I am coding up the security for a website in express.js and postgresql database. Now I have been reading about salting and hashing and I have the code set up with pbkdf2 using the crypto module, but my issue is how I will structure the account table in the database. Should I create a login role which will have an MD5 ...
I am new to SAML2 and have a question. We have a customer that is saying that they want to encrypt the user data they are sending to us. Here is an overview of how I have this implemented today: User logs on to their Intranet site and clicks on a link to our company. They use PingFederate Single Sign-On (SSO) to genera...
I am pursuing a college project, in which I am running three fake services on three ports to protect the main service (say running at port 80). The concept is that if the user is malicious, he'll try to bring the services down and access the fake services. These ports adopt a blocking process of a connection request an...
The title pretty much says it all. It seems counter-intuitive to escape inside a <noscript> block because any js that an attacker is able to inject there shouldn't be executed. But, I'm still pretty new to this, so I thought it would be prudent to ask. For clarity, this is the context that I'm talking about: <noscript>...
What is is strength of the key derivation? Specifically, how many milliseconds or microseconds would it take a desktop computer to check a guessed password to see if it is a match? I am aware this varies by computer, so I want a ballpark, and I'd give a 3GHz single core computer as an example, but take your pick. Assum...
Let's say I'm trying to reverse engineering communctions between an Android app and a web server uing HTTPS. At beginning, I tried to do MITM using webmitm and a fake cert. But the app failed to start because the fake cert used by webmitm is not trusted by the app.(Let's say the app has its own way to decide what cert...
I know how a buffer overflow works on a local network against an application running on a TCP port, assuming it doesn't drop the connection, but I would like some advice on an "exploit" I would like to try to develop. I would like to do a buffer overflow on word by injecting the appropriate script into the macro of a w...
Assume that the server and the client both has some secret key K. Is it possible to have a key exchange protocol with authentication between them such that MITM attack cannot hold and if the key is exposed at some point in time the past sessions are still in secret? I tried it using the regular Diffie-Hellman key-excha...
The description of WinObj says: WinObj is a must-have tool if you are a system administrator concerned about security What kind of security issues can it detect and what is the rough usage?
Linux has multiple x86 ABIs: ia32, x32 and x86_64. ia32 and x32 both use 32 bit addresses for addressing and x86_64 uses 64 bit. Now, the question: Since the size of the memory space should affect how much addresses could be randomized, how much does this impact the effectiveness of ASLR, and how much does it matter in...
I think my employer uses Citrix product to supply VPN. I have files in My Documents folder on my home PC that I would not want my employer to be able to access when I am connected over their VPN. I am aware an obvious solution is for me to keep the personal files off my PC and store on a memory stick that I can disconn...
Are there any industry accepted standards for the false positive rates for a Network IDS based on Snort? Is there a way to check the false positive rates in a deployed IDS? (ideally without looking at every network record) . I read about the ICSA labs certification for Snort here http://lwn.net/Articles/6896/ but, it d...
I can connect to my server in practically every browser except for Internet Explorer and I cannot figure out why. I am resolving SSL on AWS Elastic Load Balancer (ELB), which is configured to use the following ciphers: DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES256-SHA256 DHE-RSA-AES128-SHA256 DHE-D...
I'm reviewing an Android app (consists of Java and C source). There are complicated obfuscation steps in the build process (for content protection). But it uses statically linked openssl library for AES encryption/decryption. I'm not a binary hacker but it seems ironical to me. Why use (almost) public open-source b...
I have a requirement to limit SSL certificates by source IP. Would setting a critical SubjectAltName limit this (server side validation is by OpenSSL via nginx)? If not, how could this be implemented?
In the Scouts, it is popular to use secret codes to write messages (which are simple ciphers). I want to introduce Forward secrecy to the kids so they can use it with these ciphers. So, if the competing team found a ciphered message and decoded it successfully they can't decode old messages too. My question, how can I...
I'm setting up a secondary guest wifi on my router and I want to make sure that it's impossible for clients connected to the guest wifi to access my primary network. Initially, I used IP filtering with iptables but I figure that a guest who spoofs his IP could possibly still gain access to my primary network. At the mo...
How do I restrict network access to LAN for visitors? In my organization's premises any outside visitor can come and connect to the LAN ports in our meeting rooms. We have seen that they are able to ping internal systems. How can I prevent this issue?
In this scheme , is confidentiality guaranteed? A sends to B an encrypted file which is encrypted by B's public key. Can you illustrate any variant, still RSA- based but also using symmetric cryptography (no pre-shared keys) and lowering CPU time?
I heard that during Christmas a lot of customer data was stolen using malware attack called Ram Scrapers. What exactly is a Ram Scraper?How would one infect a machine with it?What information can you take with a Ram Scraper?How to detect if you have Ram Scraper installed?And how to protect yourself against Ram Scrapers...
What are the main factors that influence information security effectiveness (besides top management support, employee training and use of security policies)?
I want to design a new crypto-currency, with an algorithm which is different from SHA-256 or Scrypt. But in order to do this, I need to know the hash algorithm which is the hardest to make specialized ASIC's or FPGA's for. First, is it difficult to make an ASIC for SHA-512? I head that it uses 64-bit operations, so it...
To simplify the user experience , if we want to design a system such that the user login password for the desktop account itself can be shared with various applications like chat/email/skype etc. How do we pass credentials across applications without asking the user to give them again / seperately? I understand it's n...
We're looking for help/advice from website security experts. Our company develops web-based process management software and hosts it for our customers. The software sends emails to users when they have new tasks in the system, or reminder emails when those tasks become overdue. We've recently started seeing probes in...