instruction
stringlengths
24
29.9k
Websites like http://www.cvedetails.com/ http://www.securityfocus.com This websites show information about vulnerabilities and exploits, which other sites are similar?
I am looking for a Linux based encryption system (like Truecrypt) that has the ability to do the following: Encrypt a partition or external drive that it can only be read from the same computer where it was encrypted. If the partition or external drive is brought to another computer it will not read the drive. Basical...
I have simple situation, we are in IT center and I need to develop a simple one form 4 fields that contains a salary field, I need the programmer of our IT center could not know the salaries of other employees when he checks the database and the application he created
I have a requirement for storing multiple symmetric encryption keys in a database. What I want to know is, are there any standard, accepted practices for storing these keys in a database ? To add a bit of context, I know that encrypting the encryption key itself is a bad idea because, then where would I securely store ...
In our small company we have very high traffic outbound from local network to server which is getting blocked, and slow downs our server respond time. Especially at night. I am not security specialist so I am not sure what where and how to check that. This information above I have from out IT partner which send email ...
I was wondering the difference in term of Security, Computational cost and Network overhead between the use of : A Key-Exchange Algorithm (e.g. Diffie–Hellman) to set up a symmetric key. The generation by the Client of a symmetric key and the send it ciphered (e.g. RSA) to the Server. Indeed, I'm designing a protocol...
PCI DSS Version 3.0, Requirement 9.5.1 says that we have to store media backups in a secure location, preferably an off-site facility such as an alternative or backup site or a commercial storage facility. I don't understand this requirement. What is an offsite facility for data protection? How do you store the media b...
I overheard the following statement today: We shouldn't use /api (e.g. in a RESTful URL like /api/v1/users/get) in our RESTful URLs anymore because it makes it easier for people to Denial Of Service attack our site. If we just give it a name like /users/get then people will be less likely to think it's an API and the...
My goal is to check if the password used by admin is the default password. I work on a Linux-based router. I know the password is stored as a hashed value in /etc/passwd. In generic Linux machines, /etc/passwd has a field to indicate which hashing algorithm is used (for e.g. $1 for MD5). Is there any way to get the sal...
I have been given an assignment from my school, in wich I have been given a Virtual image of a compromised system. The first thing I need to do is setup a environment to wich we can mount the image. I need to choose an OS, and I was wondering: What should I choose, and why? If anyone could give me any pointers I should...
Since encryption keys are session-based in WPA2 enterprise, if person A obtains person B's credentials, will person B's encryption key still be safe? Is there any way person A could use person B's credentials to find the encryption key for a given session?
I have a REST web service which already implements oauth authentication mechanism via browser. I would to expose my API to a number of mobile clients programmed by third parties. In this scenario 4 actors are involved: My Web application A The authentication Provider P (e.g Facebook/Google/Twitter/etc) The mobile app...
I'm working on a project that is creating two new, separate web modules (possibly even on different servers) to support a new web application, with one serving up a static JS-based UI and the other project providing an API. The API will be secured by role, meaning that you must be logged-in and have the right role(s) i...
There's a Classic ASP application at my job that is (I believe) highly vulnerable to SQL injection. I want to prove to management that this code isn't secure, but all I'm able to do is insert "SQLINJ" log records in the database: Public function preventSQLInjection(lstr) BlackList = Array("--", ";", "'", "/*", "*/...
Let's say, the HTTP security headers below are applied to all HTML pages of a site: HTTP Strict Transport Security (HSTS) X-Frame-Options (XFO) X-XSS-Protection X-Content-Type-Options Is it OK to not put those HTTP security headers on non HTML resources (images, JavaScript files, etc) but those headers are applied to...
Okay, so I am selling a smartphone, to the guy who lives in UK, or that is what he says. So for the money transfer he asks me these things. Name Bank Name Account Number Iban Swift Code. Is it okay to give them to him, BTW I live in the Latvia, and he already knows my email, whats connected to my bank account and he ma...
Given an authenticated user on A.com, we want to redirect the user to B.com so that she'll be immedaitely authenticated. The scheme I'm considering is very basic: A.com and B.com both share key S. On A.com, redirect the user to https://B.com/auth?userid=userid&time=current_time&mac=MAC where MAC is HMAC-SHA256(userid +...
I'm trying to work out a somewhat anonymous secure messaging system, and was hoping someone could validate my overall approach. Keep in mind, this all takes place over HTTPS. Authentication While the transport supports client certificate authentication at the protocol level, we don't want to have to issue certificates,...
Stack Exchange API 2.2 is finally out, (Yay!) Reading through the linked blog post, i notice the line: Login methods that don’t use OAuth can’t be made public for security reasons. Is this something to worry about? Seems kinda suspicious. Sounds like Security Through Obsurity. "If know one knows how it works they can...
I have had a GMail ever since it was created, so it's an email address that is easy to remember, but also easy for somebody else to get confused with. Since I'm not going to post my email address here, I'll put the format for it which is [first name][2 digit number]@gmail.com. Because of this, somebody unknowingly (or...
From the thread Does OpenPGP key expiration add to security? , we know that the faster the keys expire, the greater our security. The minimum expiration for a GPG key seems to be 1 day. Thus, isn't it much more secure to generate a new GPG key (that expires in 1 day) once per day? That means, we generate a new GPG key ...
I manage a couple of twitter accounts for businesses/websites that are separate from my personal account. For simplicity, I prefer to log in from an incognito window so that I don't need to log out of my primary (personal) twitter account. I was shocked when I recently logged into one of the secondary accounts in an i...
I just cleaned up a virus infection on my computer (running windows) by running an Anti Virus Scan. The malicious executable files are now deleted. However, the registry entries made by it remain. Also, this particular malware changed attributes on removable drives to make files and folders hidden. These files continu...
Here’s a quote from a reddit discussion: … for poker [a cryptographically secure RNG] is completely unnecessary. If you have an appropriate unpredictable seed, and you are throwing away a lot of the randomness, MT is perfectly safe. I’d normally write this off as ignorance, but this goes on: I've actually implemente...
I'm implementing a REST service that requires authentication. I cannot store any per-user state (such as a randomly-generated token) because my service does not have direct access to a database, only to another backend service. The solution I came up with is creating a JSON Web Token (JWT) when the user authenticates. ...
We can found on the debian's website CPE/Aliases List, CVE List related to packages. But I can't figure out where can we know which patch of packages correct which vulnerabilities ? For instance : bind9 1:9.7.3-1~squeeze11 corrects which problem ?
About one year ago, for about two months, lots of user accounts with unverified login email address started to pile-up. All addresses belonged to @yahoo.com. It appears (don't know for sure) some sort of Yahoo! Messenger vulnerability allowed some hackers to spread to many systems and then create accounts on our websit...
Now that Windows XP will stop being supported by Microsoft, it has become common knowledge that it should be abandoned for a modern operating system in most cases. However, I have the corner case where I am using Windows XP to run a point of sales system (POS). If I am not going to perform any tasks other than using th...
I have a ASP.NET/IIS server. I want to restrict my server to only accept request from Android and Iphone(IOS) applications. I have heard about HMAC. Can HMAC help me?
When I was changing my router my ISP technician told me that he has remote access to all routers provided by ISP. Was that true? If that is a fact it scares me...
usually in office or wherever whenever we are blocked with gmail and facebook websites,we used to browse the site with the proxy sites,we used to pass our login data through proxy sites,my question is since we are exploring through proxy servers,is it there any high risks evolve around while using proxy sites? is it po...
I'm working on a uni project where I will attempt to create a malware that uses some form of genetic algorithm to "evolve" itself out of being recognized by a signature based AV software. For this I will need to code my own small AV programmed to detect the strain of malware. So my question is, what patterns do signatu...
I am creating a site that will allow users to input their banking account number so I can pay them for their services. I am far from a security expert and would like some insights into the best practices for encrypting this data. So far I have gathered that at a bare minimum I should have 256 bit encryption with a sal...
When we are using a FPGA for file, container or full-disk encryption, we need to input a password for encryption/decryption process. How can we prevent side channel attacks to steal password for a stolen FPGA? Considering without such 'initiation password' an attacker with physical access would just need to take the F...
I would like to know if there was an other place to see if a debian package is fixing a CVE than the changelog of the packet. For instance the packet bind9 1:9.7.2.dfsg.P3-1 is fixing the CVE-2010-3613 here, can we see it somewhere else? To be more specific, can we see it in a place where we can compute the reading ?
With some colleagues we're having a debate regarding the randomkeygen.com website. I do think that there is a security risk using the generated keys of this (or any of this kind) website. Why ? Here's my thoughts: What prevents the owner of the website from storing generated password inside a database and releasing i...
"jmHMRWncShQ%3D" this is my encoded text , i want to know that in which format , this text was encoded , and also want to know that how i decode these types of code ??? this password may be encryptetion . .
I came across SAML and kerberos, both are used to establish identity using assertions (tickets) so is there an overlap in their use ? Can somebody highlight their differences and point which technology is a better fit where. thanks update to add some context, there are some web services in an intranet environment wh...
I'd like to make a webapp that would allow users to OAuth with Stack Exchange, so that they can perform actions like voting through the app. I'm stuck at one point, though: I know how to perform OAuth, but many users don't want to OAuth with my app if I can look in the DB and take their credentials, and possibly do bad...
I'm having trouble understanding how a particular XSS vulnerability might arise in the real world. Guides for two of the exercises on hackthissite.org: http://www.hackthissite.org/missions/realistic/9/ http://www.hackthissite.org/missions/realistic/11/ recommend XSS attacks to steal cookie information. In the first...
ASP.NET has a cross site scripting API by default, however does PHP have a cross site scripting prevention API?
Assuming that cryptography falls into one of three areas: Awfully weak protocols and algorithms, that are trivial to break with a low amount of effort and resources Cryptographically strong protocols and algorithms that require more time than the lifetime of the Universe to actually crack The grey area of unproven, ac...
As you all know, plenty of X.509 Certificates use (PKCS#1 SHA1 with RSA encryption) as the Certificate Signature Algorithm for generating the signature of 2048 Bits long. We know that SHA1 hash function generates a hash value of 160 bits, so this makes the 2048 Bits Certificate Signature Value a combination of (160 bit...
I am trying to understand if pinning a certificate essentially means pinning the CA or if they are different how so ?
I'm looking for a way to encrypt some data in such a way that I can later revoke a single person's ability to decrypt it. We have a store of database backups that are currently encrypted using GPG. However to decrypt them the team need the single private key. Instead, I'm wondering if there's a way to give everyone the...
I am looking to have a standalone compiled exploits for all local windows exploits that Metasploit has right now. I was wondering if somebody has done this before or know a place that has these exploits as an executables that are ready to execute on the vulnerable system. Here is a list of the exploits that I am lookin...
Is there any limit to the number bytes that an RSA key can be used before it can be exposed. In Symmetric encryption a Key is not recommended to be used to encrypt more than specific amount of data then it has to be transformed into an inactive state. Is this the same with RSA or asymmetric encryption schemes I didn't...
Some of my coworkers use Microsoft Outlook (I believe) and have it configured in such a way that mail attachments are encapsulated in winmail.dat files. Apart from the general annoyance and lack of interoperability, I would like to know whether there are arguments against this. Has the concept of winmail.dat encapsulat...
Mp3blaster is a terminal mp3 player running a UNIX-like operating system, e.g. Linux, Free/Net/OpenBSD, etc. I usually use this player for playing my music, but yesterday I found a blog which claim that there is an exploitable 0day. 1) The vulnerability is found in file main.cc. This is the code: void warning(const ch...
During writing some basic challenges, I discover that the exploits are not working if not launched in GDB. To test this behavior, the following program print register values and code address: #include <stdint.h> intptr_t esp; intptr_t ebp; void call_me() { asm("movl %%esp, %0" : "=r" (esp) ); asm("movl %%ebp, %0"...
I am currently in the process of designing a registration form for the users to register accounts. The accounts will contain a lot of personal information, so I want to ensure highest possible security. The biggest flaw/problem in the requirement is that username must be first letter of the user followed by his last na...
The Facebook iOS SDK only needs your bundle & app IDs of your iOS app to match those of your Facebook app. If I find out an app's app ID, can't I just create another iOS app with that app's bundle ID? Sure, I may not be able to distribute my app on Apple's App Store (since it requires every bundle ID to be unique), but...
I am curious in general if there are any reporting that collects statistics about the security breaches? like per country per industry and revenue losses? I am not interested in anonymized breaches like the ones of Verizon et al. I am interested in breaches admitted by their own companies, like (for example the Linked...
I'm developing an API which is planned to use simple user and password authentication mode. I have experience with HTTP requests and tended to think everything as HTTP request. As user name and password should never be exposed, would a cURL request hide authentication info or it would appear as any other post value at ...
A while ago (12 years old), I recognized my passwords weren't safe at all. Because I used the very same password everywhere, some grumpy admin could easily take over all my accounts (he got mail and password). The obvious thing to do is to change all passwords to unique new passwords. However, remembering these is cumb...
Encryption novice here so maybe this question makes no sense... Obviously if you know what the clear text is and it decrypts right, you have it. But if someone is running through keys to break the encryption how do they know they have it right? Would you have to check for readable text or can you tell from the math t...
When we go to websites that have generated certificates themselves you see this red screen that says do not go there!: However when it is trusted by some companies it's all good. So I have a couple of questions: Are certificates that are generated by these companies somehow better/different? If we take to account tha...
I work at a large company that requires employees to sign a digital certification saying that we recognize the right of the said company to monitor all data and communication on our work laptops, and that anything we do on the computer should have no expectation of privacy. What I wonder is, as far as standard enterpr...
How can i make a true/false statements in MSSQL without the following symbols: <,>,= ? Everything i can think of, e.g: or 1=1-- (true) or 1>1 (false) and 2<>3 (true) Makes use of those characters, is it even possible to do this? Via operators like & possibly? Thanks.
Many questions have already been asked about DNS cache poisoning (aka Kaminsky attack), however I couldn't find a clear answer to my question: Is DNS cache poisoning possible in a LAN, without executing a MITM attack? Clarification: It is normal that DNS cache poisoning is possible during a MITM attack. However, I don'...
The scenario: Data is sent to an application server and you want to selectively encrypt some data before sending it to a DB server for storage. All servers run some linux distro. This is a relatively high security situation where significant financial losses could be incurred if the data leaked, but at the same time th...
if i sniff all traffic leaving my router, if botnet traffic is present will it be IP traffic or does any malware use other protcols such as SSH, FTP, TFTP, etc?? do antivirus software programs routinely perform exit traffic pattern analysis? would it be useful to create a utility that does routinely analyse such traffi...
I am setting up a software security initiative at a small software company. Part of this is selecting a static analysis tool for early and automated detection of security vulnerabilities. Many languages have several incumbent static analysis tools. C#, our backend language, has a plethora of them, like HP Fortify or Ch...
I am going to install Linux on an external hard drive and my internal hard drive is currently running Windows. When I boot to my Linux and I still have my windows hard drive mounted is it possible for any malware on my windows hard drive to run or spread to the external hard drive even though I'm not booting to windows...
I am using the Pyro package to create a daemon which will, upon startup, prompt for a password, and then the daemon will store that password as long as it is running. Other scripts will then make a Pyro connection to this daemon and execute methods from the daemon, none of which reveal or have access to the password: ...
I'm creating a simple Android application which requires reading and writing values to the cloud. I intent to use PHP for the webservice. But I'm a little confused over the authentication scheme. I intent to host a script at www.mycoolsite.com/magic.php and POST data to it from Android. What is the best way to authenti...
I sort of understand what is meant by no security level beyond "cannot break it" but I have a much more involved question about having more than one form of encryption on a computer at once. Suppose your using Windows 7 and as we all know Anyone can encrypt and decrypt right within the explorer menu when clicking on an...
How should I handle authentication for a simple iPhone chat app? Backend I'm building the backend using two application servers: Sinatra REST Server It lists users & old messages. Node.js WebSocket Server It sends & receives new messages. Proposal When a user signs up or logs in, the REST server returns an access to...
I saw here that using the same key to encrypt and mac (in that order) a message could eventually be unsafe. What is the best way to generate two different keys from the same password (using a PBKDF with a password and a salt)? Generate a longer output and split it? Generate two keys using the same password/salt but wi...
A friend of mine installed a new firewall software at his company. Sometimes he works from home, and also has to maintain the firewall. The firewall management software is a web site. My friend made the management software reachable by https://firewall.company.org. Is this a good idea, or a bad idea? If it was up to me...
I'm working in a web agency, i have a request to made an home banking system for a little bank. I'm searching in internet for some information about security and a good pattern to start, but naturally i haven't found information. I'm a little bit confused, i know that a php web-portal is not suggested in most case (see...
It's possible for Tor exit nodes to sniff traffic on normal websites, unless you connect via SSL/HTTPS. But what about hidden services, they don't seem to support the HTTPS protocol. Can the exit node sniff/modify the traffic?
Is it possible to split the TCP/IP suite layers? I mean to get the original data packet with its all headers & trailers out of the Link Layer before delivering them to the physical medium, and then manipulating them in some way and then re-sending them to the application layer of the same IP suite? Sorry for my bad gra...
As we know, uploading of executable file is not safe. But if we change extension of file exe to txt, then file get uploaded. How to prevent this??
I could not validate malicious characters like ' .< > etc because these characters are required in my application. Also I could not encode characters because user supposed to enter HTML tags in my application so in case we encode characters, html tags not rendered on browser. So i have made a filter which blocked and ...
While in college I decided to have a randomly generated 16 character password. I used parts of that password in various sites. However, one of the sites was compromised so I had to change my password. I now have a randomly generated passwords per site. As you can imagine, it was difficult to learn the passwords and I r...
I've created a keypair with gpg2 --gen-key Then I created a subkey only for signing. If I clearly understand the process I have now 3 pub/priv pairs. The master, one for encrypting and one for signing. I exported public keys with: gpg --armor --export FINGERPRINT > pub.asc Now I have a file which seems to contain onl...
I have drawn an attack graph for a file-sharing application (eg. Dropbox) where a database stores details of virtual machines Eg. memory space left, etc. I've listed some possible attacks: The attacker can reduce the memory size assigned by some amount (eg. if I'm assigned with 2Gb of memory, the attacker can reduce i...
When I send a text message and/or an email, with or without location services turned on, what information is available to the recipient of that message if they know how to read the data behind the original message? IE: Location, my device, the service I use, etc. I ask because I would like to know what information I am...
How to check for different vulnerabilities mainly XSS, SQL Injection, CSRF manually??? We are not supposed to use any interceptor tool to read request and all. Is there any other way by which we can intercept any request without any tool or plugin??
There are several compliance and certification criteria that mention "multi-failure" disaster recovery. What exactly is the definition of this? A google search did not turn up a clear answer for me.
I'm playing around with certificates and encryption on a Windows system, but either it isn't working or I don't know how it should works. When I encrypt a file its name changes to green. But then, I can open it without any prompt or something. I thought "well... I'm logged with the same user that encrypted the file, le...
To repeat, "Why can't someone break email or https encryption by somehow getting access to the encryption key?" In other words, why can't someone intercept the key, or the algorithm to create the encryption key, using packet sniffing? After this, why can't they use packet sniffing to also get other data that is sent vi...
I need a client-side crypto library. I've seen https://github.com/digitalbazaar/forge linked many times on stackexchange. Forge seems to be the most complete and well-documented crypto library for JS. However, I have no way to confirm if their implementations of the crypto algorithms are proper and secure. I have not b...
I remember hearing something like this when I first learned the protocols that removed the need of a trusted third party, but I can't find this theorem or "law" anywhere. Any pointers?
I am in the process of creating a file/files containing all of my logins/password info for various accounts. In the event of my untimely demise this file would be sent to the appropriate party(s). What is the most appropriate and/or most secure way to encrypt this sort of file? I was looking into TrueCrypt or AxCrypt b...
1- what does "use NAME as default secret key" do in Kleopatra tool options? The reason why I ask this, is I have a looooong password for my certificate. And apparently this becomes a hassle when encrypting several files. So does the option in question replaces my long passphrase with my name? is that what this is? 2- O...
This question about RBAC implementation. Can a subject have a role in a certain realm? Suppose a university is made up of departments. Departments have courses. Courses have students. Students have grades in courses. Note that these grades are WITHIN the realm of a particular department, but they are not directly OWNE...
what will happen if us government shutdown Tier-1 internet backbone? Although Internet is designed to be quite resilient: Internet BackBone The Internet, and consequently its backbone networks, do not rely on central control or coordinating facilities, nor do they implement any global network policies. The resilience ...
I'm reading Jarmoc's Black Hat presentation on SSL/TLS Interception Proxies and Transitive Trust. I have a few questions on some of the key management practices. In the paper, Jarmoc states: To act as the server for the client-side SSL session, an interception proxy must have access to the private key that corresp...
i was wondering what actually causes wifi network connections to timeout. for instance, say my laptop is connected to my wifi and i yank the battery out such that my laptop can't send any proper 802.11 deauthentication frames. at which point will my router release whatever resources it had reserved for my laptop? is it...
After a nmap scan on my local host on my Windows 7 machine results showed a vast list of open ports. I'm using Windows Firewall. This machine was given to me by a friend. I've had my network crash occasionally. How can I stop or close these ports?
I am reading a book on security which suggest that if you have both development and production server and if you make some change, you should pull them from production server rather pushing them from development server via some means of automated scripts. Here is the whole excerpt: Content should move to the productio...
My question seems to be a mash up of two questions. The first is that over at TeX.SE there is a question about creating PDFs with crawler resistant email addresses. There are some good answers about creative ways that go way beyond just the boring name<at>domain<dot>com, but my question is, do these method cut down on ...
Looking for a bit of advice really, here's the situation: I currently have a security minded client who will be sending PGP encrypted files. I have to decrypt the files on my server before processing them. To achieve this I was thinking of using BouncyCastle with C#. Ok, so far so good... but... I was wondering what...
So I am working on a tool to detect any wifi device using Kismet. When I use Kismet, it works fine, but my problem is, it detects a device once, and until the MAC changes, it wont detect it again. However, I want to see, if the device is still around me and using wifi for something... I don't care if it is a access poi...
I own a web application (single page application with Angular), that asks for some data through a set of REST APIs based on my server-side application (using Play Framework 2.2.1). So basically, I'm not an expert in security and so I initially wanted to use a "tool" for implementing authentication easily. Thus I chose ...
I need to scan a range of IPv6 addresses with Nmap, but I'm not sure how to do this. When scanning for an IPv4 range, I would usually do this: nmap -sP 192.168.*.* or nmap -sP 192.168.1.* but if I need to do this with an IPv6, how would I do it?
Lets say a web application has four user roles. Standard, Supervisor, Manager and Administrator. Should a manager be able to promote someone else to a Manager, or only to a supervisor? I realize in the latter situation, an admin technically wouldn't be able to make any other admins, but administrators could always be a...
I own a REST API at server side and a distinct web application that would call those APIs. I want to secure my APIs calls. After some reading, I want to implement the OAuth 1.0a mechanism at server side. Indeed, dealing with temporary tokens, nonces etc.. is by far more secure than a traditional HTTP basic solution th...