instruction
stringlengths
24
29.9k
I had a request to find a solution for making a log file secure from editing from the user (not root user) running the JBoss instance of an application (Linux environment) First idea I had is to use the 'chattr +a' from root user to allow only the appending of new raw in the log file. But the Log4j file is configured t...
I've been thinking about building a web-based keysigning robot. Mostly I want to do this to dip my toes back into working with PGP after quite a few years of ignoring it. The robot I have in mind would simply do email verification. Is this kind of thing useful for building a stronger PGP Web of Trust?
I have searched up whether a host is safe from its guest, and generally, it is said that, aside from vendor security flaws, a guest that is infected can infect the host over a shared network. So, what if a firewall is set up to block all traffic from the guest to the host? You don't need to be on the network to cont...
I've built a web app which uses the openssl_private_decrypt() functions. The rendering of a page with 15 messages encrypted with these functions takes remarkely longer as the ones without. (3-4 times) The application runs on a simple VPS with 1024mb RAM and 2.5ghz (1core). If I want to speed up the encryption/decryptio...
I work with sensitive sites that handle financial information, my code protects more than four billion pounds of assets. All of our sites have a logout button and in addition use HttpOnly, Secure, Session cookies to maintain a user's session. Although we expect users to click the "Logout" button, we also anticipate th...
I was wondering that if there is a Local Area Network and one public IP,through which various clients connect(which have been allocated private IP's).Suppose one of the clients spoofs his IP to try to launch an attack against a server(say Google).Does there exist a way that Google uses to secure itself against such att...
I use Hydra with the Web-Form (Http-Post-Form); and I'm trying to use a list of Usernames when some of the nicks contain a letter ñ. For example I have the following account in my list: Username: ñandu123 Password: asd123 The script that I run is something like this: hydra -L usernames.txt -P passwords.txt www.xxxxx.c...
I'm in the process of buying an SSL cert, and I'm confused by this part: Many CAs say they'll add www. to your domain, so that e.g. if you buy a single-domain cert app.example.com, they'll also add www.app.example.com as a matching domain name in your cert. A related example is that if you buy a wildcard cert, say *.ex...
This is kind of a social engineering question -- my local law enforcement agency sent out this email today: Help us by keeping identifying information about your valuables safe and accessible – Use ReportIt - it’s web-based and FREE. In just minutes, you can help the Police Department and other Law Enforcement Age...
I know, that my login credentials are sent in clear text for every body to read, when I log into facebook without using https from my mobile phone's browser in an public / non encrypted wifi. And I assume, that official app encrypts my login credentials and the content transfered between their servers and my device. Bu...
Consider an application where client certificates are to be used for authentication. The application web server requires SSL and client certificates for all users. In this case, it's IIS 7. I've used the built-in CSR functions within IIS. The server certificate has been requested, created, and installed. The Root CA is...
I read a couple articles on privacy/security but still cannot get a clear picture of the best practice to ensure that an attacker will not be able to access users' private information. For storing passwords or other data that will be checked only to verify authenticity, I understand that hashing algorithms like SHA-256...
I can understand why content from different domains is considered to be unstrusted for the same origin policy. But, how can be content from diferent protocols from the same site/domain be dangerous? Can somebody give an example of a situation in which this can be a security concern?
I am familiar with the cakePHP cookie and session settings but I am unsure as to why (when analyzing through the Burp Proxy Suite I am finding 2 separate Set-Cookie responses: Set-Cookie: DropZone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/ Set-Cookie: DropZone=spackr9fhhgod0lqk9glh3ch44; expires=Tue, 28-Jan...
It is good to know that ISP have legal boundaries for retaining a client's internet activity. Is it possible that individuals can hack the ISP and then have access to someone's web history activity?
I know that TLS (commonly but mistakenly called SSL) interception works by establishing two encrypted tunnels between a client and server, with the interception device (proxy) terminating both tunnels in the middle. To obfuscate that interception is occurring, however, the client's machine must be configured to accept ...
I recently setup a new Win8.1 PC while still working on my main development PC so it did not have all of the security tools that I usually install, e.g. malwarebytes, adaware, etc. Since it takes me a few days to fully setup my machines with coding tools and a myriad of other tools, I made the MISTAKE of accessing my b...
It's been happening more and more frequently I get viruses with no idea where they come from. I have recent backups, but I don't know if there's a point in restoring since I would just install the same applications and copy over the documents I've been working on. MSE didn't detect anything and I ran combofix and it se...
While discussing alternatives for asking the browser to remember your password, one guy suggested using a bookmarklet to store users' credentials. The original answer is in portuguese, but I'll translate here the protocol he used: The user, while logged in, has access to a bookmarklet [link] with a unique token He can...
For a REST API against which clients would be writing non-browser based, non-interactive applications, if OAuth2 is the authentication mechanism to be followed, then we would use the client credentials grant type for the authentication. Would that be the correct choice, and if so, how is it better than some other auth...
I've recently enabled 2-factor auth on a number of web apps, mostly using Google Authenticator. Does this mean that the importance of a strong password on each site is reduced? I would prefer to use passwords that are easy to type on a mobile device, if that doesn't compromise security too much. EDIT My particular need...
I am not very familiar with Blocklists so had a few queries around it. I have a sub-domain example.com which is used to send mass marketing emails i.e. emails are sent from no-reply@example.com. A SPF record has been added under example.com domain to authenticate a mail server to send emails with no-reply@example.com ...
I have the following problem: Alice wants to send Bob a message such that Bob knows it is from Alice but at the same time he cannot prove that Alice send him this message. The solution I came up with, using RSA, is: Alice picks a random key K, and encrypts the message M using this key K. M'= aes(K, M) Alice hashes K a...
I'm looking at using Theodore T'so's pwgen (on linux/ubuntu) with its sha1 (-H) feature to generate passwords that I should be able to recreate later using the same file and seed. I briefly looked to see what alternatives there might be if this particular app (pwgen in unix) is not available to me at any point. Is thi...
I couldn't find a better place on StackExchange for this question, but please point me in the right direction if there is a better place for it. My company is bidding for some work, and in the invitation to quote (under the Data Protection section) they state that there can be no "public or private cloud elements" to o...
I received a strange email which has some strange URL in it. I would like to know what is "behind" the url, but without the risk of running anything malicious. How can see the contents of the URL, the web page, without running malicious code? I am on a Linux machine.
I'm working on a Java Applet that used to be self-signed. Now that java 7u51 is being used, I am working to get the jar for the Applet signed. I used the certificate/key used for the apache2 ssl to sign the jar. In order to do this I had to create a new keystore using the key/certificate, and the Not Yet Commons SS...
I want to know if it's dangerous in any way to store the current logged user session id on the page generated source code. Why I wanted to do that? I'm trying to share the user session between two applications, one (the main) in PHP and another in Node.js. The Node.js one is used just for real-time data, but I just wan...
There are various ways to verify the validity of a file, usually checking the MD5 checksum or OpenPGP signature. Is it possible to do the same for a full USB Drive? I'd like to be able send a USB Drive through the post and give the recipient a way to ensure that it hasn't been tampered with along the way (à la NSA's Ta...
What does it suggest about a "hack" when people I know get emails from me, but my email password hasn't been changed to lock me out? (Not a spoofed sender - I see some in my sent folder). If my password is known to the attacker, why would they make themselves known (by sending emails like that) and NOT take over my w...
I have a client with a hacked IMAP-Account, and the attacker(s) made thousands of password-attempts, probably with a fixed set of passwords, from different IPs before they got in. After successful password guessing I see 10-15 different IPs connecting and pushing out spams, simply killing that little ol' post-fix serv...
I have been contracted to perform a security risk assessment that relates specifically to ICS and SCADA systems. I have performed many IT security risk assessments, however, I am new to assessing these types of environments specifically. I am familiar with ICS like devices and I believe I have a cursory understanding o...
I noticed most DSA private keys often start with the same few characters, MIIBvAIBAAKBgQD . For example, generate a private key on Ubuntu, by running: ssh-keygen -t dsa -N '' -f /tmp/id_dsa This results in a private key file that begins with something like: -----BEGIN DSA PRIVATE KEY----- MIIBvAIBAAKBgQD... The fir...
I've been looking around for an answer to this for some time now and I felt that this place would be a good venue to ask this. How can one improve the security in a MySQL database? The database that I am currently playing around with only has its data encrypted. This being the values in the tables are encrypted before ...
I have a bunch Raspberry Pis collecting data from behind client firewalls. I want to start sending this data to MYSQL server. Because the Raspberry Pis do not have static IP addresses, I obviously feel vulnerable opening up my database to the public. For SSH we have Fail2Ban, but for MYSQL I have found no documentation...
I want to play around with NTRUEncrypt and I found this tweet that NTRUE is now part of bouncy castle. But I cannot find any proof of the existence in the source code of the Bouncy Castle C# API, http://www.bouncycastle.org/csharp/ In the specifications http://www.bouncycastle.org/specifications.html, you can see the ...
While reading DOS detection and prevention http://staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-DoSSurveyComputerJournal.pdf I've asked myself: Even if a firewall detects a DOS attack and begins to filter it out, doesn't the detection and filtering (by IP etc.) still require a resource to respond to the attack (i...
I am configuring a HTTPS proxy, which I want to use for my laptop wherever I go. The idea is that since its encrypted, I should be safe from eavesdroppers, even on open wireless networks. Think of it as a easy to configure VPN for web browsing. My problem however, is that HTTP requests does not use my HTTPS proxy, but ...
I'm just struggling to get my head around this. In certificate signing with static Diffie Hellman the public key and certificate information is sent to the CA who verifies the certificate information, and encrypts the certificate information including the public key with his private key. The public key of the CA is di...
I'm finding myself on the inexperienced end of a discussion about where password hashing takes place. My coworker drew a schema from less to more secure, where the Public Internet was the least secure, and an internal API for user data was the most secure. The internal API can only be reached from within the network. T...
Given Dictionary containing 1000 three-letter words: dictionary=abc,def,ghi,jkl,mno,pqr... Randomly chosen words from the dictionary: 10-bits-passwords=abc,def,ghi Randomly chosen three words from the dictionary: 30-bits-password=jklmnopqr The 10-bits-passwords are encrypted using the 30-bits-password and the tabula re...
While I was looking at my browser's history I noticed there has been a Facebook login from my computer, there are some Facebook related messaging and profile links in my browser history (chrome). The login was not made using my account, so how can I learn the account information of the logged person (Facebook ID or ema...
I want to make a prediction about a future event, but only reveal that prediction after the event occurs lest knowledge of my prediction affect the outcome. For example, suppose Alice predicts that Bob will drink the spill his glass of milk on April 24th at 9:17 AM. She writes to a text file: Bob spills his glass of mi...
Say you purchase a domain on Namecheap, but want to host DNS on DigitalOcean. DigitalOcean, says to simply tell your registrar to use DO's nameservers, then set up your DNS for that domain on DO. However, there doesn't seem to be any verification that the DO account that configures the DNS for that domain is actually t...
One of the new features to Windows 8 is the ability to log in to your PC using your credentials from a Microsoft Account. How is this implemented, and what steps are taken to prevent hijacking of credentials in transit, falsified authentication or other such MITM attacks? I'm presuming SSL or another encryption & authe...
I want to encrypt data, but make sure that no single user can decrypt the data. Further, it is important not to require ALL users to be present to decrypt. This will allow for some flexibility and reduce the consequences if/when secrets are lost. It should be enough that 2 out of 3 secrets are provided, or a configurab...
Is it possible to find out if ips are from the same location and used by one person. We have a situation were three ips have been logged etc. We know for sure that two are from the same person this xxxxxxxxxxxxxxxxxxxxxx was the first in our data base. These two xxxxxxxxxxxxxxxxxxxxxxxand xxxxxxxxxxxxxxxxxxxxxxxxxx ca...
Is there a known variant of Zeus which attacks iOS based mobile devices? I have read about versions for Android and Symbian , wondering if iOS is vulnerable to it as well.
I've been doing some reading here about session ID handling, and have learned that it's generally a bad idea to include a session ID in the HTML source code, and/or on the query string. For example Is it correct to use form field(hidden) for storing Session Token and Why is passing the session id as url parameter insec...
I have logs from a security appliance from Damballa which has cryptic names for threats observed in a network which I am trying to make sense of. Some examples of these threats are "RedTreeBruisers" , "WeirdSideTroop" , "WhiteBikeScorpions" ,etc. which I do not know how to interpret . I have over a 100 of these unique ...
Situation I swapped out a dead router at home today. I setup the new router with the same SSID and encryption settings. The devices on my network acted like nothing had happened and are happily connected to the new router. Question If I swap out a physical host or VM using the same IP and using SSH for example, conn...
I was listening to Pandora as I logged in here, and the next commercial was about InfoSec. That set me wondering as to whether that was a coincidence (probably) or if they knew somehow. To make a long story short, I was wondering whether a webpage could access cookies that it didn't put there (thus getting a rather acc...
One of the security appliances we own reports a so-called "Industry Name" for the threats it detects on the network. I wanted to know if there is really such a standard and where I can find information about specific threats with a given industry name?
This is the first time I've had to handle personnel information and I want to make sure I have a good amount of security. I will be storing users' emails and passwords for their accounts on a MySQL table, so I was wondering if the password_hash() function is sufficient for hashing. For example would this be an accepta...
I have been reading some articles on WPA/PSK encryption and one said that the hash is calculated like this: Key = PBKDF2(passphrase, ssid, 4096, 256) Where PBKDF2 is a standardized method to derive a key from a passphrase. As you see here the key depends on the SSID, so if you have the same password with different SS...
So I have the document format as follows: { id : plaintext, date-created : plaintext, data : binary } The data entry needs encrypting and decrypting. My idea was to have a private key, and use subsequest hashes of the id and date created (which will never change) to form a unique password for each document...
I have a two-part question about question #570288 over on ServerFault. Question: Is it bad to redirect http to https? Accepted answer (185 up-votes): [...] Hell no. It's very good. Part 1 Is that answer, well... wrong? :) Am I correct that, from a security point of view, redirecting HTTP to HTTPS is a terrible idea...
Hello, I am a beginner looking for some information. My question is the following: In order to understand certain security concepts is it essential that I understand the underlying languages? For example, to understand XSS should I know Javascript? To understand SQL Injection should I know SQL? Or is it enough to ha...
The question is about a very specific SSL handshake scenario. I understand that some servers may request client certificates in order to authenticate connecting clients. However, as far as I can know, server only checks the authenticity of the client. Why would you not use client certificate to generate premaster key...
Emails from site such as Gmail and Yahoo are rejected from secureserver.net server and treated as a spam. Can you help me?
For example I have a WD Passport external hard drive. After installing WD security I can enable and disable password protection, however the settings basically get applied instantaneously. Does this mean encryption is not actually happening? If not, is there any point in using a password?
When we buy a new hard disk drive, what steps can we take to ensure that it is virus-free? For example, there are many vendors selling hard disk drives on Amazon. When we purchase one, how do we know that it is free of virus? Disclaimer: I'm pretty paranoid about security.
I have a problem setting where I want to contact a user by phone, and where I need to protect the integrity of the phone call as much as possible. I'm wondering about how to design the interaction in a way that best achieves this. I am worried about a very specific security risk: the person I'm contacting might be usi...
I am doing a project on Vehicular Ad-Hoc Network Security (VANET). The proposed scheme uses electronic signature as a means to authenticating the nodes. Most of the research papers I read suggested ECDSA because it says a "160 bit key in ECC is as secure as 1024 bit key in RSA, and is faster and occupies less memory" B...
I am going to be hashing user passwords on the client machine, and I would like the hash to be generated in 0.3 seconds. Do I need to find the number of rounds myself and make every user use this number, or should the number of rounds depend on the machine? For example, if I found that 10 rounds took 0.3 seconds on my ...
I am currently struggling with how to correctly implement storage of encrypted fields in a MySQL db, without knowing the encryption key. The result I am trying to achieve is to encrypt certain pieces of user provided information, which if I was legally obliged to provide to third parties would be encrypted without me b...
Hi I am using JSON on User Interface side. I want to protect that data. What are the possible ways I can protect my JSON. I have a scenario where I am having JSON Object with data on User Interface side. While performing update operation using jquery postback I am updating the JSON data and sending it back to the serve...
My Pebble smartwatch, like many (most?) other smart watches, uses Bluetooth Low Energy (Bluetooth Smart, BLE, BTLE, etc) to communicate with my smart phone. There's some security in the link, including authentication, data encryption, and signing, however last summer researchers suggested an attack that appears to comp...
If a password expires, the user can't access the account. If the account expires, the user can't access the account... So, what's the difference? Just that in the case of an expired account, I'd need to enable it back?
From what I understand, one of the benefits or Secure Remote Password (SRP) is that is does not require reliance on certificate authorities. In a scenario where clients need the ability to register as a new user how does this work? I can only imagine 3 scenarios none of which seem to be great: 1) Client sends password ...
We are an eCommerce website. I'm working on our PCI compliance at the moment, and I'm trying, if at all possible, to argue that our organisation falls under SAQ A rather than D. We do not sensitive card details in a database, physical media etc etc. We've passed numerous PCI scans. Our payment flow is as follows: Add ...
Is it possible if i use in address bar this host.com?<?php unlink("/img/bg.jpg");?> or host.com?<?php rename("/bg.jpg","bg.png");?> if not then is there any way to do that?
With the rise in cybercrime, I am slightly worried about my computer security. I have been using open sourced anti-virus AVG for years and it has been doing well. Are anti-virus software like Norton and McAfee worth the money to get? It would be good if there are reports that showed how much difference a paid versus fr...
As there is currently a move away from SHA-1 being used as part of TLS, we're examining moving our SSL certificates, used to protected traffic in transit to/from our webservers, to use SHA-2. However, I'm having trouble finding information on client support. According to this, Windows supports SHA-2 back to XP SP3, bu...
I recently discovered a website that I am in no way affiliated with linking to the files of my local website stored on an external hard drive. This unknown website is actually executing the scripts, even my local favicon shows as their favicon. When I disconnect my external hard drive, this website reports Object not f...
Currently I have heard a lot about differential privacy but I am unable to find out what exactly it is in a non-mathematicians language. Up-till now my understanding is that it add noise to the answer one gets for his query to database.
If a person uses VPN and authenticates herself to some social network through the VPN, doesn't she lose her anonymity for as long as the VPN session is used ? By losing her anonymity, I mean that her real name may be linked to the IP of the VPN and subsequently the IP of the VPN to torrent downloading (for instance). I...
If your computer has been hacked or infected, is there a way of cleaning your computer and have 100% sure that it's clean? I heard that you can safely clean your hard-drive with completely wiping tools, such as:Dban,but,today we have other types of virus like bios virus
This site says it is best to keep API keys in environment variable out of the code. And here Storing Credentials Securely You should take great care to ensure your credentials are stored securely. If someone obtains your api_key or an access_token with the send or all permission, they will be able to send all the bitc...
A month ago, someone posted an ad with my personal details, including my home address, my phone number and my photo on an ad with very a very defamatory write up. What followed was a week of calls from strangers and friends calling me up asking me if such a thing was true. It took forever for the admins of those ads to...
I’ve been applying to for some jobs and use one certain careers page somewhat regularly. I’ve started to notice that I don’t always get logged out even if I do click “log out” and see a message that says I have successfully logged out. After I log out, clicking the button that is supposed to take me to the login page...
I'm new to linux and nmap, and I am attempting to do a scan of my local network. Using nmap I find that there are 4 hosts on my network (10.0.2.2, 10.0.2.3, 10.0.2.4, 10.0.2.15). I am using VirtualBox and running a Kali Linux VM with a native Windows 7 computer. The network options in the Kali Linux VM are set as NAT b...
We have an internet connection that we need to audit: INTERNET ->> ROUTER ->> CLIENTS our idea would be to put a (enough big) HUB before the router (router, that logs in via pppoe to the ISP) and on that HUB put an OpenBSD* machine too: INTERNET ->> HUB ->> ROUTER ->> CLIENTS *I want to run a: tcpdump -i em0 -w ou...
I am creating a java application which is dependent on a server. On startup the application will transmit sensitive information (passwords and emails) which will be sent to the server and from there encrypted and never be touched again. My question is how can I secure the client>server transmission from MITM attacks o...
This is an extension of my question on UNIX. Let's suppose I create a file, map it to /dev/loop0, and create a LUKS partition inside dd if=/dev/zero of=myfile bs=1M count=1000 losetup /dev/loop0 myfile cryptsetup -c aes-cbc-essiv:sha256 -s 256 -v -y luksFormat /dev/loop0 I then open the encrypted partition cryptsetu...
We run an API service. We gave our customer a package for max limit of 12000 API calls / day. He reported to us that a user has been on purposely visiting his web page 12,000 times a day in order to max it out. We checked the logs and blocked that IP. A few days later, the attacks came again, this time, from 50 differe...
I am to release a system-on-chip device that, during its lifetime, will come to store sensitive data. I want to make that data hard to extract or duplicate. Encrypting is good for dealing with MiTM, but it doesn't solve the problem of duplicating the flash memory (and MAC address) of the chip and posing as the origina...
There is a new WhatsApp-killer application called Telegram. They said that it's open source and that it has a more secure encryption. But they store all the messages in their servers and WhatsApp doesn't store any messages in any server, only a local copy in the phones. Is Telegram more secure than WhatsApp?
I'm thinking out my password recovery logic for an ecommerce system. Some backround: Passwords are stored using bcrypt, password recovery involves the standard reset link, which then can be used to reset the password within a limited amount of time. I would like to add an additional step before allowing customers to re...
I'm going to implement a small crypto lib/tool. The "do not implement crypto by yourself" rule does not apply here, since this crypto system is new and not implemented yet. ;) So the first step is the choice of the implementation language. And my question here is, if there are reasons to prefer one over another. Since ...
If I download a file through Tor, will it be any different than if I download a file through a normal internet browser? I've downloaded stuff through Tor but it's always really slow. I was wondering if I browse through Tor, but then download a file through a normal browser, will it practically be the same thing or comp...
What are the parameters in play, and what is a rough estimate of the hardness of the task of reading the contents of flash memory off a microcontroller? Of course, it is assumed that there is no conventional way to do it.
I have a wifi shared connection with other flatmates and I'd like to know how can I protect my Debian pc from being sniffed. Should I use a wifi anti sniffer to detect if any wifi card is in promiscuous mode? in that case it's only to detect, but if no wifi cards are in promiscuous mode means that nobody is sniffing ri...
I understand the question of client certs and MITM attacks has been asked several times, but I don't believe this specific scenario has been answered. It was my (seemingly incorrect) assumption, that the presence of a client cert would allow the server to ensure the client was correctly consuming its server certificate...
Is there such a thing as a non-expiring SSL certificate? Our scenario is that we develop and sell embedded devices (think "internet of things"). These devices have little web servers running on them that allow for certain administrative functions (like a Cisco home router allows admin actions). We would like to have...
The context is network based load balancers. It would be nice if someone could explain how TCP ACK storms are generated in real life and practical mitigation strategies for them. Edit: Clarification on "mitigation strategies". The platform consists of nginx web servers/load balancers running on Linux. So would apprecia...
I am trying to clearly understand the HIPAA regulations a court reporting company must adhere to. Let's say the court reporting company does not directly contract with any covered entities but does contract with law firms who would be considered a business associate of the covered entity. Would the court reporting comp...
Is it at all possible to capture Dot11 headers under Scapy in Windows? I'm thinking Winpcap, but I'm not sure how I'm supposed to do that. Any clues?
Considering I use SSL the whole process. I have an IOS client that I want to use to enter the user's credit card details. I want to do the whole charging and processing on the server side, so I send the credit card details to the server where it is being used to process. I don't save the details there on any permanent ...
This isn't really language specific, but I'm wondering if anyone has any suggestions for a security model securely storing some user details in a way that could be accessed in an automated fashion. i.e. I want to be able to send users automated emails when certain events happen but I don't want to store that email addr...