instruction stringlengths 24 29.9k |
|---|
I have a legacy system that collects and stores credit card numbers ( BAD! ). We are in the process of replacing that system in phases. We are going to integrate with a credit card processing system that requires us to be Level 4 Compliant. The new system will not do the bad stuff ( storing credit card info ), but b... |
According to findings by the EFF's SSL observatory, there are "tens of thousands of keys that offer effectively no security due to weak random number generation algorithm." My understanding of that problem is this: During the generation the large prime factors used by the RSA algorithm, a significant number of devices... |
was trying to consume an Web Services that I have published on the Web but I couldn't thing is that when I got into the server and check the "Event Viewer" I have a LOT of "Failure Audit" and they keep coming as we speak.
So I guess someone is trying to hack in my server. How can I solve this?
|
To pay off our users, they are asked to enter their IBAN and bank name and bank address. The users are mostly based in Europe.
As far as I know (see also this question) these details can not be used to withdraw money without verification (Direct Debit in Germany?).
Would you encrypt these details? Or in other words, is... |
My mail server has recently come under a very bizarre attack. Every five to ten minutes, a new IP connects to SMTP, attempts to try weird usernames (like pil, bennett, netscape, msfuser, desktop, fenix, clamav, emily, wwwrun, etc). Every attempt follows the same exact pattern, trying the username as the password, the... |
I understand that if you specify multiple contents then the rule triggers only if ALL the content conditions are satisfied.
But I want to create a rule that will trigger even if any one of the content keywords are detected. Note that it has to be in a single rule. Perhaps something like this:
alert tcp any any -> any 2... |
I'm making a few assumptions about basic email security, and I want to confirm or clarify some of these points to make sure I understand the big picture. Please correct me where I'm mistaken:
The answer to this question gives some insight, but doesn't cover all I'm looking for.
This is all assuming a traditional email ... |
I use a site on a regular basis so I wanted to make sure it was secure. One of the things I checked was that when I changed my first name to <img src="http://blah.blah/blah/blah.notanextension" onerror=alert(document.cookie);>Henry that it didn't give me the alert with all of my cookies (I had already determined that ... |
I've been trying to learn more about Digital certificates for the past few days and I'm struggling in order to understand how actually this concept is applied in the real world.
Anyways, as I visited the website https://google.com, I decided to view the site information and I came across this information called Certifi... |
Many games today are prereleased in an alpha/beta state and instantly overwhelmed by "hackers" downloading programs manipulating the game itself to become overpowered.
I guess they make injections into certain memory addresses in runtime but I have no clue of how to go about to create a program like that. Also, how do ... |
An aspect of security has bugged me for a long time: Why is there positive certainty about the importance of hashing algorithms and salts, but password strength is either never mentioned at all or considered a rather "philosophical" matter?
To me, there are three components of a correct hash implementation:
Slow and c... |
When I generate a DSA key with ssh-keygen -t dsa, the resulting public key will begin with ssh-dss.
How come? Why not ssh-dsa?
|
I'm using Windows 7 and Firefox 22, connecting through a regular residential wifi router.
In the last month, I've noticed that when I connect to the internet once in a while my firewall indicates that lsass wants to connect to different IPs.
example:
C:\WINDOWS\SYSTEM32\LSASS.EXE
Local Security Authority Process
Remo... |
How can I log attacks separately using snort. I basically want to log attacks invoked from different files separately. Like if I have 2 files, ddos.rules and log.rules, then I want logs generated from ddos.rules in one file and logs generated from log.rules in another.
Is it possible, and if so how can I do it?
|
While setting up the Dovecot IMAP service, I noticed that the default parameters are not optimal, it allows SSLv3 for example. Using Thomas Pournin's TestSSLServer.java program, I saw the following:
...
Minimal encryption strength: strong encryption (96-bit or more)
Achievable encryption strength: strong encryptio... |
If information_schema is not allowed in MSSQL , what is another method i can use to list the tables inside a database and ultimately the columns so i can dump them without using information_schema?
Thanks.
|
My wireless network protected under WPA-PSK/WPA2-PSK protocol.
Is there a good reason to change the default user/password for the router management interface?
What would it take for an hacker to get into my network?
Does the fact that I use default user/password would make it easier to hack?
|
I have a dedicated server running WordPress and have recently noticed that its been hacked and PHPShell a remote web server controller has been uploaded. This has let the hacker view and edit files including my database!
I have since deleted the PHPShell folder. Changed all possible passwords (database, user accounts, ... |
I am currently using a server 1 managing incoming traffic from users and a server 2 managing database requests from server 2. Both servers are accesible via Internet. Would IP whitelisting be a sufficient measure of protection to prevent any traffic on server 2 other than incoming from an application running on a serve... |
I chose SSL for registration in the game client. The client communicates with the game server which stores a salted/hashed password.
If I use SSL to authenticate users on login but the game does all of it's communication with UDP packets, how does the server know that the UDP packets it's receiving is from the authenti... |
I have an access point that subscribes in the list of connected devices all the devices that try to connect to it, even if they give a wrong password.
The device does not give them an IP address but they are saved as valid devices using their MAC address.
I reported it in my work as a critical security issue but I don'... |
Say I'm making a snapchat clone app for Android and iOS. Let's say that I get a snapchat from Baz. I want to pre-download the audio for this snapchat. However, as the developer, I want to secure this audio from being viewable outside of the app.
I've been thinking of encrypting it using AES with an IV and key that are ... |
A friend of mine purposed a method of making passwords where each has the same base and added to it is something indirectly related to the site or product being signed into. For example all passwords would start with "AXxY2" and then the one for hotmail.com adds on "any letters?" so the entire password to login to hotm... |
I recently got a new laptop. As I usually do, I removed the wifi module from it, since I intend to use it in public places such as my college and I don't need any sort of connectivity outside my home.
The reason I do this is because there is no physical switch for the wireless connection on the laptop and I feel insec... |
I understand that a hashing algorithm like bcrypt uses several rounds of hashing to make it computationally expensive for a brute-force attack. How does encryption work against a brute-force attack? I was wondering if a stolen encrypted file such as one encrypted with GnuPG can be cracked much much faster than a bcrypt... |
There is an application which shows a login page. However, I do not want people to login through any machine. I want to restrict login to a few Mac Ids. Is there a way to do this?
There is probably a way to get the MacId from a java applet or ActiveX control, but how would a call which spoofs the MacId in a modified Ap... |
I'm wondering if it's possible to increase the work factor of an already encrypted bcrypt password.
e.g. I have a password that was encrypted with a work factor of 5, is it possible to increase the work factor to 6 without knowing the original password?
If not, it seems to me to defeat the entire point of bcrypt, since... |
I want to delete a suspected malicious file from a server. For the purposes of this question assume that the infected machine is Windows Server 2003 or later.
Is there any risk in deleting such a file? Specifically, are there any logic-bombs that are known to execute when a file is deleted, i.e. the triggering conditio... |
I would like to know how secure is this code I made for a login form... because I'm new in this and have serious doubts.
$sql = "SELECT user_name, user_password "
."FROM users "
."WHERE user_name = '".mysqli_real_escape_string($db,$_POST['user_name'])."'";
$q = mysqli_query($db, $sql);
if (mysqli_num_rows... |
Is it considered bad practice to use the same password on separate sites, if so why? Even if the passwords to a site are compromised the attacker still doesn't know the user names or sites the same password is used on, or even if the same password is used anywhere again at all!
For example if the database to hotmail.co... |
Given, we want to crack a password.
With Time Memory Trade-Off Attacks one tries to find the right balance between time to compute hashes for all possible passwords. And the used memory to store all password hash tuples, where a lookup would be instantaneous.
(I know about some additional security mechanisms like salti... |
We are using WebRoles to host our api, Table storage to persist PHI and Blob Storage to persist MRIs and CT images.
What is required to become HIPAA Compliant?
-- Edit 2014-02-17 --
I just want to know where to start
|
A comment posted on one of my questions the other day raised a question in my head. I know that many site admins appreciate users reporting bugs and security holes, and as a user I appreciate people who do this. I often try to find and report them in sites and apps to which I use frequently or hand sensitive data. I am... |
I would like to understand how the packaged Linux distributions (i.e. Debian) ensure that their packages don't contain any malicious code. I know that packages are signed, and that I can download the package source and compile the package myself. But even when I do compile the package myself, the md5sum of that package... |
I just setup a test bed and i disabled information_schema from being accessed (a weak waf) and i've been trying to extract the table list from the database by using convert to spit out a conversion error with the contained information.
To extract the version we use the syntax:
+and+1=convert(int,@@version)
The result w... |
I'm looking for best-practices or suggestions to secure inter-server communications between VPSs.
Should I just run all traffic through SSH?
What about HTTP Traffic via something like mongo? Reverse proxy it on the same machine to https with nginx?
What about setting up a VPN? My concern here is both 100% reliabilit... |
I have a web-based application where users can log on with username and password.
I just implemented a new account lockout feature and was wondering whether it makes sense or I totally screwed it up.
The first 3 invalid login attempts just show my standard:
Incorrect user name or password
but I store each failed atte... |
I recently talked with my ISP about many things, basically related to my (little) company security, this guy is a networking guru to me, but he did a strange thing that worries me. Basically I have a web development machine located in my LAN, that has no port forwarding (is not reachable from internet), but he could ac... |
I'm looking to improve defense-in-depth on a system, primarily by closing some holes in injected DLLs. Certain applications installed on the system cause helper DLLs (e.g. shell extensions, BHOs, etc.) to be loaded into processes. Unfortunately, many of these were not compiled with ASLR / DEP opt-in flags. Since the af... |
I have recently heard that most of the PHP code is confidential, because if attackers know your database structure or the hash function used to encrypt the passwords, there is higher chances of a breach.
I was wondering, if it's so, then what about open source projects where everything is wide out in the open?
|
Can you break an encrypted volume if you know the source code of the crypto-tool used and the hash value of the secret passphrase? Why is it not possible to just reverse engineer the passphrase verification process of the crypto-tool by tricking it with the extracted hash value?
Specifically I was thinking about the po... |
As part of hardening a MySQL 5.6 server running on Ubuntu 12.04 LTS, unnecessary services and packages will have to be removed.
For a server that is serving only as a MySQL server, what services and packages should we remove? Is there a list of services/packages that we can use?
|
My computer has a rootkit of some sort and the attacker can see everything that I do on it. I need it to do something related to banking, so I have to secure my computer first. I have a CD of windows 7 (64 bit), but when I would format my computer and install Windows anew, can't the attacker gain access to my computer ... |
If a website is running on HTTPS only, is it reasonable to close port 80 of the web server and only leave port 443 open? Does this action provide more security for the website?
|
Looking at a lot of different security software on Windows, a lot of them rely on some settings on the computer which can probably be overridden by a local administrator.
For eg. some DLP software does some settings which prevents a user from using a USB drive. However, I think a local admin can always override this?
A... |
In the different NVD files which enumerates the CVE, which can be found here
There is from time to time the field <vuln:security-protection>
, containing often the value ALLOWS_OTHER_ACCESS or ALLOWS_ADMIN_ACCESS.
Do you know what this field stand for ? What does it means ?
|
Off-the-Record protocol employes Diffie-Hellman key exchange protocol (DH). DH protocol does not provide authentication of the communicating parties and, according to many sources, is vulnerable to Man-in-The-Middle (MiTM) attack.
How does it affect the security level of OTR protocol? Is OTR actually does not provide a... |
Curious about the major differences between Kali Linux and SecurityOnion. Do you think it would be easy or useful to replicate what has been done with SecurityOnion on Kali? Why is there such a dichotomy between security breakers and security defenders... and is this divergence visible through these two primary (and he... |
For a federated server-to-server protocol with domain-based identities, I am thinking of using TLS client certificates as authentication mechanism. I figured that re-using each peer's TLS server certificate as client certificate for connecting with other peers would be the simplest approach to implement this.
However, ... |
Over the last couple of years there have been a number of changes in what would be considered an optimal SSL cipher suite configuration (e.g. the BEAST and CRIME attacks, the weaknesses in RC4)
My question is, what would currently be considered an optimal set of SSL cipher suites to have enabled with the following goal... |
If I choose the paranoia option for EncFS and for TrueCrypt I create containers using the encryption algorithm AES-Twofish-Serpent and the Hash Algorithm Whirlpool. Are both methods equally secure, or is 1 method more secure than the other?
As based on https://defuse.ca/audits/encfs.htm, EncFS seems to have some issue... |
My question probably will be blocked. Anyway, my question is how much programming is there in the security field.
Useless:
I really hate programming, actually I can translate code from C to python and Java and a bit of assembly to C(and vice versa). But I can't write my program the only port scanner that I have write ... |
Does anybody know a CA company which allows me to put the bought CA certificate inside SoftHSM (the same as an HSM but without any hardware, it is pure software)?
Is it hard to work with the PKCS11 interface? I have a Java application which will sign documents. But I need to communicate through the PKCS11 interface.
A... |
I am trying to secure my network from some infected computers(the owners dont seem to understand what security means) So I have a second router to make a bridge. What would be the best approach at isolating the network?:
router(infected comps)>router(good comps)>internet
or
router(good comps)>router(inected comps)>in... |
I am selling some hard drives but my question is. How can I be sure that the information is gone?
Is there a good way to wipe the drives?
What are ways I use to attempt to recover the data to ensure that they are clean.
|
I have been looking for some kind of hardening guide towards PostgreSQL which I can use for a security audit of a PostgreSQL DB.
I came across this url, have checked the same. Anything more to this?:
PostgreSQL Security Audit
I am more specifically interested in the security flaws that could be identified from the sett... |
I don't want the server to ever see the raw input and would rather have the client do the encryption and then pass the data (over https) to the server for storage.
If I use a JS library to AES encrypt it what other things do I have to look out for?
|
I'm looking to use my smartphone purely as a portable computer, with no network functionality, in order to protect my privacy.
Is removing the SIM cards from it enough to airgap it? Or do I need to go further?
If removing the SIM cards doesn't guarantee it, would it be possible to remove the antennae? I imagine witho... |
Support for Windows XP is ending soon. Therefore, I am seeking a secure solution to continue with Windows XP.
When I access the web from Xubuntu in VirtualBox running in Windows XP, is the Windows XP environment secure? And if not, how can I make it more secure?
EDIT: I am asking for a level of security for everyday u... |
I'd like to ask which authorization flow is considered better or standard.
First approach (has role AND assertion is valid):
if (!isGranted(roles, permission) {
return false;
}
if (hasAssertion(permission)) {
return assert(getAssertion(permission), context);
}
return true;
Second approach (has role OR assert... |
I want to log and modify outbound traffic on a Linux machine. I currently have one program that sends requests out to the internet, I would like to process these requests and their responses via another script (mitm).
Current Setup...
What I Want...
MITM Script will log requests/responses into a database, and potenti... |
Will the "Tor Browser" maintain a safe & anonymous internet connection over a computer's sleep/standby-and-resume cycle?
Is it safe to assume that when the computer sleeps the (internet) connection sleeps as well? What about BIOS settings such as Wake-on-LAN?
What happens to the connection during the steps of said cyc... |
I own an application that grabs some Long-Lived Facebook Access token, in order to be use later according to the corresponding logged user.
Should I need to encrypt them before storing them, to avoid any leaks if database is hacked, or a Facebook mechanism already exists to prevent some malicious usage?
|
Consider you lost your laptop with sensitive data and your smart card that contains the private key for your GnuPG and Truecrypt accounts. The smartcard is secured with a 8-digit PIN.
1) Is it possible for an attacker who finds the smartcard to somehow extract the privat-key; resulting in decrypting all sensitive data... |
Are the private key Serial numbers and thumbprints the same as the corresponding public key Serial numbers and thumbprints for certificates (X509Certificates, Base64-encoded X.509), and are these good fields to compare on?
I am wanting to use this information as part of a validation process for a WCF web service, but w... |
I'm planning on doing some malware research for a research project, and I was wondering what would be a better option for keeping my system safe from viruses accidentally infecting it. I'm only planning on analyzing the binaries, not running them, but an errant click could happen. Should I be trying to do this analys... |
I have a RSA SSH public key which I have converted from a x509 certificate and I want to be able to convert the SSH key back into a x509 certificate to compare the values with the original certificate.
How would I got about doing this? And is this even possible to do with only the public key?
Thanks.
|
When I run my application on Centos the specific process opens port that listens for connections from localhost, but uses 0.0.0.0 in Foreign Address. Is it secured?
netstat -plunt
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/P... |
So, I want to start using pass, but I need a GPG key for this. This application will store all of my passwords, which means it's very important that I don't lose my private key, once generated.
Hard disks break, cloud providers are generally not trusted. Not that I don't trust them to not mess with my key, but their se... |
on my website i deliver an xml, whereas GET parameters will be added as (entityencoded) attributes somewhere in the xml.
stripped down example:
http://host/file.xml?x=y
leads to
<root>
<element x="y" />
</root>
note that the string is being html entity encoded so you cant really escape out of the quotes. a string l... |
I need to purchase and install the correct Verisgin SSL certificate(s) (X.509) on Azure. I have never done this before and would really appreciate some advice on how to go about it and what is considered best practice for production and testing environments. I'l explain the scenario.
Our Site
Is hosted on Azure. We w... |
I'm in a bit of a pickle.
I've got an IIS application which accesses an SQL database (on a different machine). This already means that:
a) the IIS application needs to have a connection string to the database containing the password
b) the IIS application needs to run using an AD identity which has access to the SQL da... |
I have a corporate web portal which is used for staff collaboration including a web-based mail interface connected to MySQL Database, corporate calendar, file storage, customer contacts data with phone numbers and emails and all kinds of other data. Of course some of that data is sensitive as it relates to internal cor... |
I was trying to pay for mobile phone credit online from a service provider. I selected the amount to pay and clicked next to continues. The following page asked me to turn on third party cookies if I wanted to proceed. I thought that this wasn't acceptable so I didn't go through with the purchase. Is it normal for a pa... |
My subject says it all - I am clueless as to how a file with permissions 0644 can keep getting iframe injections. None of the posts on this site that I saw quite described what I am experiencing. Every two days or so, an iframe gets injected into some files with 0644 permissions. Just as I think we've got it covered, i... |
I have a DMS system(alfresco) that needs to sign approx 50.000 valid signatures a year.
The signing certificate needs to be acquired from one of the affiliated sub-CA's.
So according to the Adobe CDS certificate policy, are they obligating me to use a hardware HSM or usb Token? I want to use SoftHSM instead. It is free... |
I have a parameter in a POST request which is in the following format:
ParamName= < r username="123" password="456" x="" y=""/>
and I want to test username and password which are two HTML input controls on the webpage using SQLmap. how should I use sqlmap for this kind of requests or for example JSON parameters which a... |
I have started looking into Crytography, and the obvious starting point is frequency analysis. As a task for myself I thought it would be good to compile a script which could be used for perform the process of frequency analysis. One thing I started to look at, was to get the stats based on a dictionary - I have subseq... |
I'm having a task in a computer security class in school where I'm supposed to scan a host for open ports in order to find out what services are being run there. I have found out (among other things) that the scanned host has an open port 8787 and "Msgsrvr" is being run there, along with Scientia-ssdb on port 2121. Wha... |
(Note that Facebook now does use HSTS. The question was asked at a time when they didn't.)
To force a browser to always go directly to HTTPS for a website (and not rely on 302 redirects from the HTTP version), HSTS (HTTP Strict Transport Security) can be used.
To tell the browser that a website should always be visited... |
I recently wrote a website for my company and have been asked to Pen test it as well as the server. Have run SQL map and no vulnerabilities there, however I want to check if my hash and things are good enough as well as any vulnerabilities to the server its self. When I trained we had a working copy of L0phtcrack. Down... |
I have tried to issue a certificate beginning with 8 to F but I have found it is impossible, mostly due to the RFC:
The serial number MUST be a positive integer assigned by the CA to
each certificate. It MUST be unique for each certificate issued by a
given CA (i.e., the issuer name and serial number identify a un... |
I have written an application (in C#) to communicate with one of our customers via a web service. Our customer requires us to use bi-directional SSL. The customer has sent us their certificate (in the form of a .p7b file). The client certificate was provided to me in the form of a .cer file.
I've installed the certi... |
To preface, I'm not an IT security person, just a layman intrigued by the logic. I had this question while reading about Ladar Levison turning a key to his email service on paper to the government. That means that he has this key on a storage device somewhere. Then that storage device must be encrypted somehow. Then th... |
I have a feature request to connect my PHP web-app to the users mail server. I have usually strayed away from this type of work as it will mean storing the users email passwords.
My question: is it secure to store a users third party email password, if the email password is encrypted using PHP's openssl functionality, ... |
I've been trying to use hydra (educational way) but with no success. The site method is http-post but performed by ajax (should it be a problem? I think not). After execute the command I got an output of passwords and username that allegedly valid. I saw that some people have asked about the reason for hydra giving wro... |
We are designing a web site for selling financial products online.
The following is a high level description of the components:
Our frontend will be a SPA built with AngularJs.
The frontend will communicate with an API hosted in Heroku.
The API will expose web resources which allows the execution of the
business proc... |
Multiple email addresses for my domain have been compromised.
My client forwarded me an old email which he sent me few days ago but I haven't received that email. That email was sent to an email address just like mine but with an O replaced by a zero. So I found out that another domain has been registered just like my ... |
I've been performing lots of speed tests lately due to, among some other random things, an Internet programming class and getting Google Fiber hooked up.
Then I realized that SpeedTest.net uses a Flash app; it kind of bothered me that I can't monitor the transmission contents in my browser's inspector tools like regula... |
I have a vendor who needs to connect remotely to one of our servers. What I thought I would do is setup a NAT rule in our firewall. I have a public IP address that I will have translated to the local server address so that then the vendor just needs to RDP to the public IP address. Is this a secure way to have the vend... |
I'm concerned that Home Network Administration Protocol (HNAP) is a serious vulnerability that exposes consumer network routers to remote management by malicious entities such as government organisations and hostile corporate actors.
My question is twofold:
Is it possible to disable HNAP on a D-Link ADSL router?
Would... |
The overwhelming majority of my banking is done online. As such, I try to be as cautious as possible. I am moving into a new apartment in a few months which offers internet. (I am not sure whether it is WiFi or direct wire.) Unfortunately, you cannot have your own service exclusive to your apartment: your choices are e... |
I am new to ossec. I installed the server and wui on a dedicated machine. I have agents running on my zookeeper and kafka servers to start.
Below are events I am seeing. I assume the are automated bots.
10 - User missed the password more than one time
10 - Multiple SSHD authentication failures.
5 - SSHD authentica... |
The Linux kernel has a few sysctrl's related to random devices packaged in a bin_random_table (http://lxr.free-electrons.com/source/kernel/sysctl_binary.c?v=3.2):
static const struct bin_table bin_random_table[] = {
{ CTL_INT, RANDOM_POOLSIZE, "poolsize" },
{ CTL_INT, RANDOM_ENTROPY_COU... |
I'm looking at a system that uses an unprotected Diffie-Hellman exchange to negotiate a key for the session encryption.
That Diffie-Hellman is not secure against man-in-the-middle attacks is textbook knowledge, but how much harm could an attacker do if he is only able to modify one or both primes in the Diffie-Hellman ... |
Whatever I and my family members do at 'Home PC' is visible in the history in Google chrome in my 'Office PC'. The two networks are entirely different!
I saw all websites visited on our home PC by my brother on my office PC. I notice it is mostly Facebook and GMail and Google search results.
I do acknowledge that I op... |
So I was wondering about something, but for the simplicity, consider this example:
You have a file with n encrypted files in it, of which one is called 'Note.txt'
You also happen to have another file (not in the RAR) called 'Note.txt' which is an exact copy of the file within the RAR, but this is not encrypted!
Is it... |
Is it possible to insert arbitrary data into UUID?
Let's suppose we have an MD5\SHA hash of something... can we encode that data into a valid UUID?
|
While reading this article: Does Skype use encryption?
I came to know that PSTN do not have encryption.
Why it is like that? More so since we have our PSTN phones now more powerful (in terms of hardware) and cheaper. Why not write a encryption application at the transmitter and receiver end?
|
I have a registration portal where user inputs his details and then a valid email account.
Currently I check the email is not used already and if it is I reply with the classic: "email already in use" and something like "recover your old password or create a new account with a new email".
I'm wondering how safe it is t... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.