instruction stringlengths 24 29.9k |
|---|
Do developers necessarily make good penetration testers & vice versa?
The reason I ask is that I find I have much more of a knack for figuring out how an existing piece of software works and can be manipulated than actually designing and developing things myself.
I can program and I'd say I have an intermediate level o... |
How to store a passphrase with a Java application that periodically needs access to its plaintext form? It is a strange situation, but I am wedged in it. If providing a decent security mechanism is impossible, any tips on deterring script-kiddies?
Elaboration on my situation (it rhymes):
It's an inconvenient (read "hor... |
I am a student,residing in a hostel,accessing internet,using College LAN,which is protected by Cyberoam Corporate Client authentication,and the bandwidth is equally distributed to all students but a student is illegally using netcutter to deny others of internet access.The network admin is unable to catch him because h... |
Recently I noticed a lot of traffic generated by automated bots that were checking for vulnerabilities in my web server. They were mainly looking for ways to hack into plesk/wordpress which I don't even have running on the server.
Now my question is, what are hackers trying to accomplish by hacking the server. I mean, ... |
We have many text files with ~all the words from a given language.
Does someone know a "full" list of methods a word/dictionary can be remaked? ex.:
testword
can be converted using leetspeak (https://en.wikipedia.org/wiki/Leet) to:
7357\/\/0RD
What other converting methods exists in the world?
|
If I wanted to make a bot that plays/issues automatic actions/moves in a online browser game, whose communication is realized over HTTP1/1 and WebSocket (https and wws respectively), all TLS encrypted, what approach would you take?
Additionally the following constraints need to be considered:
The bot should work while... |
Do the attackers use small but a lot packets or big and some?
e.g. 2 bytes or 512bytes?
Also , can packet size affect the size/speed of the attack?
Something more , how do the firewalls block dos attacks? Just checking the content of the packet e.g. A string 'aaaaaaaa' in bytes gets deleted or do they just have "cooldo... |
What options are available for implementing DLP within an organisation and what are the pros and cons of each?
|
Ok so what im actually trying to do is to bruteforce my own account on some website just to check myself .
This is NOT for illegal steps or use , im trying to crack my OWN password , and im trying to get help to see what im doing wrong with the software.
the thing is , when im starting the bruteforce , it doesnt recogn... |
I was wondering if anyone knew of a way of capturing and modifying the requests sent out by a Java application over HTTP. I can see them in Wireshark, but I also want to be able to modify them in transit (modify destination/POST data).
Many thanks.
|
What information is present in an Email Header that can be used to track a sent mail? For example, are some of these present?
Web Browser used?
Operating system
Type of Network (broadband/dial up)?
Type of system Laptop/Desktop etc.
|
Is legal to use contents retrieved from a not protected url (no authentication involved, just a public accessible URL) from the content owner's server?
Is legal to distribute urls pointing to that resources? Is legal to develop applications using that contents?
|
Is there any way (directly from a computer or device) to see the packets that pass the router from the different devices.
Thanks.
|
This is a snippet of a PHP script:
$useragent = isset($_SERVER['HTTP_USER_AGENT']) ? $_SERVER['HTTP_USER_AGENT'] : NULL;
$query = "SELECT `id` FROM `browser` WHERE name = '".$useragent."' LIMIT 0,1;";
$result = @mysql_query($query);
// The browser is visiting the page for the first time
if (!$row = @mysql_fetch_asso... |
I have come across a number of websites which include links such as www32.example.com and also www2.example.com.
Why is there a number in the www part of the link?
Are these sites not legitimate? Thanks
|
I've developed a web application (developed in .NET MVC 4) which have multiple users with personal login credentials. The web application holds a lot of content uploaded by the users.
My client would also like to have an offline version of the application, for Windows. This application should use the same information a... |
Some of you may have seen/hard of Western Digital's MyCloud NAS solution for home networks. This comes with a proprietary app suite for mobile devices and workstations alike. This allows the consumer a "dropbox"-like experience with a storage medium they themselves privately own and operate.
I've been toying with this... |
I want to create an Android app where users from an office (typical use) can upload scanned documents to the app backend service for later use.
e.g. A lawyer want to upload a sentence sensitiveDocument.png.
The guaranteed privacy for the user is a important sale point for the product. From the previous example, the law... |
In this document is detailed technique of exploiting Windows kernel. But writer is talking about accessing kernel memory & doing exploit from user-mode application at the same time. Can I do this from user-mode application, or do I need to do it from driver? Thanks.
|
It has happened to me several times that I've become so used to typing in a password I can't consciously remember it and it's purely muscle memory. This is particularly true with complex passwords that don't follow a pattern. It's a problem because if I'm using a different keyboard or am in a different environment I fo... |
I am working on a project that uses a combination of a web based framework (Django) and an installed app (Python) for the purpose of data entry/upload. I will have to send medical records over the web and I've been trying to come up with a way to make a system that is cryptographically sound. I figure I can use django'... |
This question may be related to this one, but I think we need to be sure.
My website implement login via OpenID (or Google, or Facebook, etc.).
On my website, authorization is based on user email adress. If user has email something@example.com, she gets access to the content linked to that email address. (Basically in ... |
I remember reading a news article of an incident where a hacker was able to use an image to infect thousands (maybe millions?) of computers.
Can anyone provide links to such news articles? I couldn't find any on Google. I would like to show them to a friend.
|
I am a PGP beginner, having just downloaded GPG for OS X. I created my first pub/sec key for my email address and uploaded it to the public key server.
GPG has several features available, namely: 1) encrypt, 2) decrypt, 3) sign, and 4) verify. Given these options: What is the most secure way to use PGP to send & receiv... |
do CAs offer service wherein an application can request someone's public key?
i am trying to do this but i am unsure if it is correct (suggestions of better ways to do it will be most appreciated):
someone with a certificate from a CA and is an authorized user in my application enters data to a web page (in a form)
hi... |
Scenario A:
A user points his web browser to https://users.server.com. The website completes the SSL handshake and continues with the HTTP protocol inside SSL.
Scenario B:
(server-side)
Now, let's say users.server.com is modified to run this socat:
socat OPENSSL-LISTEN:443,cert=path_to_cert TCP4:127.0.0.1:22
(client-s... |
I have one windows service and web service trying to make a web service call over TLS. I have setup the certificates in MMC and I am able to successfully connect using the web service. However, when I try to make the same call using same certificate from Windows Service it is unable to establish the connection. Both w... |
My understanding is that when using a client certificate for security one issues a private and public key cert (for example X509) of some sort and sends that of to the consumer of the service that one wants to authorize themselves before consuming.
But what's then the standard way of checking that it's actually a vali... |
What is the best way to handle spam on pages like user registration or password recovery? I am not asking about whether to lockout a user for a few minutes or how to put up a captcha. I'm interested to learn on how do I target the spammers.
Iv'e read that it is bad to target a user via:
IP since a lot of users share a... |
HTTPS is an end-to-end encrypted connection. Given this, does the website I am visiting know my original IP? The website is only available over HTTPS (not unencrypted HTTP).
|
I'm using gnupg and I've just seen that people can sign keys with an expiration attached.
The expiration of individual signatures can be seen in gpg --list-sigs <KEY> when setting this in your .gnupg/gpg.conf:
list-options show-sig-expire
However, I can't find any information on how to add such an expiration to a sign... |
Short version
How can I determine the Java version a remote server is running if I only have access to the server through port 443?
Long version
I am validating a pentest run by another group. They found an error message that provided the Java version being run by the remote server. The Java version was an old one.... |
I'm really interested in IT security and I would like to know how vulnerability reports work.
Is there a central database for those things? I often see CVE-XXX-XXX on disclosures, but I don't understand very well how the numbering works and which database keeps the information about that report.
What should one do to p... |
We bought some Magnetic stripe cards and I'm writing a program that will get talked to by a mag card reader. What I need help with is that I can't, for the life of me, find out what characters are valid on track 1,2, and 3. I have my program working, but I would like to have the program raise red flags if someone tries... |
Is using an HMAC in web service messages overkill if you are already using SSL and Access Tokens?
I’m thinking of further ways to secure a service, and HMAC message signing is one. But it comes with a cost, more complicated to implement, not as standard, etc. So I would need some really good reasons to recommend adding... |
I've recently been tasked with a research project to write a "secure messaging application" using "government approved protocols" (the government being the USA). I'm taking this to mean asymmetric encryption and government approved cryptographic algorithms, AKA FIPS 140(-1?), and hashing (FIPS 180-x).
Some Android dev... |
I am analyzing Snort alert log and cannot figure what [1:1071:6] means in
10/12-12:44:28.793118 [**] [1:1071:6] WEB-MISC .htpasswd access [**] [Classification: Web Application Attack] [Priority: 1] {TCP}
Or let's say [1:100000160:2] in other case.
I couldn't find what that means neither in manuals nor in rules.
How ... |
I am using Django which is a web framework for Python. I love it but the session handling is cookie-based. Now over SSL I'm sure it's reasonably "secure" but I don't think there is any kind of fail safe for if that cookie gets compromised. I should also mention I am using Apache2 with Mod_WSGI. For each Apache2 session... |
I have written my webservice with HTTPS. But as per my requirement I should provide authentication. So thought of going with HTTPS SSL. could anyone help me with steps like moving HTTP to HTTPS and SSL certification part with step by step
I did by adding below in service and axis XML files:
<Connector port="8443" proto... |
As per PCI-DSS we need to dispose the old keys after the timespan. After the cryptoperiod (lets say one year) time span, do I need to encrypt all (20k card holders) the data once again with the newly generated key?
|
In Jacob Applebaum's latest talk at the 30c3 conference, he advised all journalists to use Tails or similar OS for their laptops.
Does anyone know of a similar OS or functionality for Smartphones?
I know some businesses who have journalists who will be frequently travelling to Sochi, Russia, for the Winter Olympics. T... |
There was already a similar topic "Why AES is not used for secure hashing, instead of SHA-x?", but it was not about files specifically, and I, personally, am not convinced by the answers in it. "AES is not designed for this job" is not an answer.
What bothers me with those answers is, that they theoreticize about how A... |
Introduction: I am trying to learn the basics of Directory Traversal.
Question: While trying to understand the 2-Byte Unicode conversion of characters, I came across this_SANS ARTICLE that explains Directory Traversal vulnerability. It states that / is represented as %C0%2F but the representation %C0%AF also works whic... |
I have a client - server setup with TLS communication.
I want to be sure of mutual authentication.
The safety that certificates can offer assumes that the private key that links to the certificate remains private. But isn't this the same as assuming a pre-shared key remains private? Because both the client and the serv... |
As I remember from my micro controller course, the stack is at the end of the memory, while at the begin are some interrupt pointers, program code and later data. Since the stack is at the end of the memory it grows in the direction to smaller addresses. And at every function call a new stack frame is pushed onto it. W... |
If a java application makes a request for my MAC address can I block it in any way? Are there any security programs which can do this?
--
What I am asking is if there is anyway I can prevent Java applications from knowing my MAC address.
|
I have a mail server with a MySQL database back-end. The mail server and MySQL DB are both installed on the same Windows machine. Is there any benefit to using SSL connections between the two applications on localhost?
I think the connection is using TCP and not local sockets.
Based on this question about SSL on a t... |
I'm generating a Public/Private key pair in PHP with the following:
<?php
$config = array(
"digest_alg" => "sha512",
"private_key_bits" => 4096,
"private_key_type" => OPENSSL_KEYTYPE_RSA,
);
// Create the private and public key
$res = openssl_pkey_new($config);
// Extract the private key from $res to $pr... |
I purchased a Comodo SSL certificate (OV), and set up the Apache vhost config so that all traffic is forwarded to 443. Intermittently some users are being prompted to supply a client certificate; these users all seem to be OSX users, but it happens on both Safari and Chrome. Why does this happen? Why is it only OSX, an... |
If I have full disk encryption on my computer and want to decrypt it, but want to delete senstive documents before decrypting, how do I ensure they are unrecoverable post-decryption?
Edit: I suspect someone will mention a File Schredder type program. My understanding is that these still leave traces that can be recover... |
So if a provider has software that blocks you from using their internet to connect to, say, Spotify or Skype. Is there a way to block your computer from communicating that this program is running? Or to disguise it as another program?
|
If I change the extension of a Keepass database (i.e. change the .kdbx to something like .txt), Keepass is still able to open it. Is this an effective way for hiding the databases from an adversary?! Probably no. So, what methods are there for hiding such files? What do you experts think about OpenPuff?
Is there any m... |
My machine at work is behind a firewall. To connect to it first i need to connect (ssh) on another machine and then through this machine i make the ssh on my machine. In other words, there is a middle machine between my local computer and the final remote computer. How can i create an encrypted tunnel between my local ... |
In order to steer our future, it is important to understand our past. Now as the end of Windows XP draws near it would be interesting to see how the worlds most popular operating system fared security-wise. Specifically, how many known vulnerabilities were present in the original RTM version of Windows XP?
|
Can you please explain what's is the main difference between for this both DPAPI and
HSM? As far as I understand both protecting the data, the way of protection is difference HSM is physical device and DPAPI provide operating system-level data protection.
Which is the best method/way to protect the Cardholder data... |
I know a little bit about network security but it's only about enough to know there's a lot I don't know. My requirement is to add a 2nd wifi to my current setup (1 wifi emitted by a 1-physical-wifi-radio OpenWRT router; and a bunch of computers connected to the wifi) and to prevent users of the 2nd wifi from accessing... |
I was wondering that what make RSA Asymmetric Cryptography Algorithm special.
So I wrote a very simple algorithm that do the same work (Generate Public and Private Key)
Now I want to ask you that What is the excellence of RSA vs my algorithm ?
What's your idea?
This is my algorithm :
n = random
e = factorial(n) /* Pu... |
I'm working on a tool that exploits SearchIndexer.exe on Windows 7 x86 and connects back to a metasploit multi/handler, using standard metasploit reverse TCP stagers.
The exploit seems to function as intended in the debugger, and works for other processes such as calc.exe.
However, when exploiting SearchIndexer.exe, th... |
I recently learned a bit more about DNS cache poisoning, and my understanding of the basic way it works is by editing the DNS cache so that when the victim types in, say, www.google.com they get the attacker's IP instead of google's. So here is my question - is the following attack viable?
1) Take an address such as ww... |
I need to use an external service that can only be accessed by password.
I don't like the idea of storing the plaintext password on the server, but AFAIK there's not much I can do.
Considering this service will only be accessed by a client (that also can't know the whole password), my idea to try to make things a bit h... |
So I was watching some Backtrack learning videos and similar stuff, and noticed how there is always talk about getting people's information. For example if someone using unsecured WIFI you can see what pages he is browsing of even steal his Facebook session.
So as far as I understand, hacker cannot get any real value f... |
Reading about Silent Circle, and more specifically Silent Text, I learnt that by implementing SAS, the likelyhood of a MITM attack is greatly reduced. Could someone please explain how this works? If there really is someone intercepting your text-based communications, what is to stop them simply modifying the SAS exch... |
I was duped into believing a phone caller was a computer tech. I allowed him remote access and when I refused to pay a fee at the end of all his changes he hung up. My start up now has an unknown password. Is there anything I can do?
|
Let me first thank you all for the great info. you are providing.
My question is; Do files stored on USB once opened and viewed by TV, PC etc. have any footprint, backup or residue files left on the hosting device? If yes, are the files recoverable from the TV or PC it was previewed on alone without using or accessing... |
This is coming from a joke originally in French:
Enter your password.
carrot
Sorry, your password must be more than 8 characters.
carottegéante
(giant carrot)
Sorry, your password must contain a number
1carottegéante
(1 giant carrot)
Sorry, your password must not contain accented characters
50putaindecarottesgeant... |
I've just seen this article regarding the phasing out of intranet names on SSL certificates.
However, CAs such as this one claim to still issue them and it will be "Trusted by all popular browsers" even though they are listed as members in the guidelines document.
There is also a guidance document available regarding i... |
I'm currently studying Computer Science, where we're teached Java programming. I want to get into the IT-security field, but it seems to me that Ruby and Python are more relevant for that, so I have a hard time motivating myself to learn Java.
But do Java have a place in modern IT-Security compared to say, Ruby or Pyth... |
List-Unsubscribe email header makes it possible to recipient to automatically unsubscribe from the mailing list:
List-Unsubscribe: <mailto:list@host.com?subject=unsubscribe&body=qwe>
Free email service we build adds the "Unsubscribe" button in the UI, which will trigger sending a email to list@host.com with specified ... |
My question is regarding HTTPS form submission. One of our website is using HTTPS, we display the login page to the user via HTTPS protocol.
When the form is submitted, if we try to intercept the request using a tool called "Burp Suite" before sending it to the server, I see that the form Data is not encrypted.
Is th... |
Why are there recommendations to change passwords with certain intervals?
If I have a good password, e.g. a long wrongspelled odd sentence with a couple of special characters thrown in, why is the security compromised if I keep this password year after year?
To my knowledge there are two ways of getting trouble:
1) Bru... |
Is there a danger that a webpage could have a hidden form with a file upload input and js script that would try and take a random guesses at files on a users system and attach them to the form and submit it ?
The js for instance could try and and submit the form multiple times trying for files like /users/name/document... |
I'm updating a login system. The password is sent to the server as SHA512(password + long_string). I want to switch this to something like SHA512(username + password) in the future.
By doing that I don't need to add "please login again" dialogs when the login system changes, and the passwords can be updated to the new ... |
Is it possible to automatically search the Metasploit database for usable exploits based on information about the vulnerabilities on the hosts?
Searching in Metasploit for each CVE number to see if there is an exploit available can be quite tedious, so can this be automated in any way? I have filled my Metasploit data... |
In Samsung Knox, you have 20 password attempts. However, it is never explained what happens if you run out of attempts. Does it delete your Knox data, do you need to enter the recovery PIN or is it something else?
|
Has anybody seen a tool where you can collect Service banners from something like nmap, output them to a file, the vuln vulnerability checks offline?
|
Long story short - PC with kleopatra processor died, and I only have a backup of my public key.
I've gone into the HDD and tried to re-jig kleopatra in the hope it would remember everything for me on another machine but that hasn't gone well...
Do I just need to get this HDD into a new PC and boot from it, then export ... |
We're developing an application that has the ability to run across multiple top level domains, each with its own sub domain. (www.foo.com, www.bar.com, would each point to the same application on the same server, mobile sub domains pointing to a different application on the same server.)
Reading up on certificate creat... |
I have a client that does work in rural areas where there are no cellphone or internet connections. They need a way to take credit card information in the field, bring it back to their office where they can charge the client.
I have fairly significant background in databases, networking, and programming, but I have ne... |
Given the uncertainty about data being left in the clear, I've hesitated to use SSDs where I need full-disk encryption. While some SSDs employ hardware encryption, they're quite expensive, and there is inadequate transparency about implementation.
I've been wondering whether RAID6 arrays of SSDs could be encrypted secu... |
Our University recently had a case where some notorious fellows used a fake emailing service to send an email to all students on behalf of the administration. Although most good email services (like Gmail?) can warn us that the mail is likely a phishing attempt, many users not educated in security may fall in this trap... |
What pros/cons of WDF driver model vs. WDM for rootkits and antivirus drivers. From what I've seen and from personal experience (though I'm still a newbie) WDM is good in that you have to do most of the stuff manually and at the same time you are given the right foundation elements so it is like building a Lego. On the... |
Not sure if this is the proper forum for my question, but I've recently read over at Encrypt Everything that CTCP is a poor choice if you want to keep your chats secure. I'm beginning at security, so I'm not sure on why DCC would fall behind IRC (fewer possible leaks when direct contact is required, no?) but if this is... |
Is there a list of certificate authorities installed in popular browsers and mobile platforms?
I am considering a few alternatives for an SSL certificate, and I would like to make sure that the one that I'm buying is covered by all relevant platforms.
|
I'm working on a simple file encryption tool.
Basically, here's how my program works:
password = get_user_typed_password()
salt = uuid4()
key = bcrypt(password + salt)
cipher = AES(key)
for block in input_file:
output_file.write(AES.encrypt(block))
My question is about "how could I make a possibly short and weak... |
I found the following general advice from WikiHow in an article on changing password:
It is very dangerous to stay logged in as root for an extended period
of time. Log out immediately after completing this process.
If I have to perform a number of administrative tasks requiring root access, is it safer to log in a... |
My laptop BIOS is password protected. Probably the password can be bypassed using some hardware and software means. But is it possible that somebody having access to laptop but not knowing the password can bypass it without me knowing it when I log on at a later stage ?
I am trying to protect my laptop from malware / s... |
Someone just asked me:
How can I know whether a message or data is encrypted during a
transaction on trading website?
I know most (maybe all) online trading sites uses encryption techniques but I couldn't find a way to check if my data is encrypted or not.
|
Widespread ATM room designs are such that the machine faces the door which is less secure as compared to a situation wherein I face the door when using the ATM.
|
Say I open a .doc file from my UFD. I want to avoid leaving any traces in Windows (e.g. recent files, back-up files, swaps, etc) , or at least be able to delete all easily. So in this case, I want to isolate the MS Word and prevent it from having any contact with Windows, or gather all the traces in some virtual space ... |
I've been researching into some methods to ensure that disk encryption keys can't be stolen, and one that I've come across is called TRESOR. With this kernel patch, you can create a partition that is encrypted using AES, and the keys are stored in the CPU caches instead of in RAM. At first, I thought this was great, ... |
I want to encrypt a file with AES in CBC mode (maybe another mode is better for file encryption...I don't know, but suggestions are welcome!).
What I usually do is that I first write a few random data (256 bits, just to muddy the waters), then my salt and my IV (which are both uuid4...or generated from a secure PRNG) a... |
Wishing you all a great 2014. I hope this is the right section.
Basically we have a Dell Poweredge R520 server in our office, and we now want to install some accounting software that can be accessed remotely. Our local IT company is telling us that a new, separate server is needed for "Security reasons". It has been a ... |
I'm looking through old tests in an information security course - and there's a question about CCA and CPA security of RSA.
I can't seem to grasp how I'd either show insecurity or prove the security for this.
(This is not a homework question, it is for my own personal understanding)
The question is as follows (relates ... |
I have set up an Apache/2.2.22 (Debian) Server on my Rasberry Pi. Looking at my access.log, I see a bit of strange activity consisting mostly of GETs, which is quite disconcerting as I am a complete newbie in such matters. The strangest thing was a series of POSTs consisting of percentage signs and numbers. I know next... |
I'm attempting to build a SOAP client to consume the services provided by eMedNy. They've provided me with a client X.509 certificate along with their server X.509 certificate.
Their user guide contains the following sample SOAP request:
<?xml version="1.0" encoding="utf-8" ?>
<soapenv:Envelope xmlns:soapenv="http... |
DISCLAIMER: The vulnerable box that we are testing on belongs to us, and all the actions are under surveilence, hence we are not doing anything illegal here.
I'm testing a Ubuntu 8.04 box, it's known as having a vulnerability of weak OpenSSL keys. The script provided by Debian confirmed that the server is vulnerable:
$... |
Hack into their system and change the "Sell by" date so that it is immediately bad. How long do you think until they notice, if you pull it off?
|
I was told by a friend earlier that
Encrypting something that needs to be reversed is a bad idea as it gives the illusion of security
Is this true? The way I see it, it can't really hurt to encrypt data.
|
I have 2 questions regarding IPSec. This is the last 2 optional questions of my homework:
Scenario when combining AH and ESP can be needed?
Scenario when combining Tunnel and Transport modes can be needed?
These are the optional questions, but I am just curious and can't answer on my own.
|
A few weeks ago I've changed the password on my old laptop, I forgot the password as I wasn't using it often. Now I need to recover the password because I used it to encrypt some important documents. I've extracted the hashes of the laptop using Ubuntu, I wanted to crack them with hashcat but I'm not sure what type of ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.