instruction
stringlengths
24
29.9k
I live at a student dorm, where we are connected to a student network. The administrators of this network have forgotten to disable STP broadcast on non-infrastructure ports. Periodically, I lose my network connection, and I decided to see if the STP configuration might be the issue. This the normal packet I receive ev...
According to https://www.rfc-editor.org/rfc/rfc2617#section-4.9, having the server chose a nonce but not having the client chose a nonce opens up Digest Access authentication to chosen plaintext attacks. My question is two fold... Is this a problem with SHA1? Digest access authentication uses MD5 so maybe the client ...
Do you guys think salting password with the first 8 bit of the password itself will have same result as using stored salt to hash password? [Clarification] I am not storing salt but creating from the password itself during authentication. Followup question, instead of using first 8 bit how about the first (length of th...
So there are so many pen-testing tools that perform a memory dump on the system. How exactly do they work - what exactly happens ?
I have an acccess/entry card chip I want to copy for demonstrational purposes. However I am not sure how I can find out what type of RFID reader I need to get a hold of. Does anyone have a suggestion how I can figure out what type of chip it is and thus what type of reader I need to be able to copy it? Possible use c...
I'm currently making my first experiences with a CMS called "DokuWiki" (Link). This CMS needs only PHP and writes the information to files (seems to be /dokuwiki/data/pages). At the moment I gave the whole dokuwiki-folder + subfolders and files the rights 777. I am the owner of the files / folders. Which access rights ...
Can a hashed password be recovered if the hashing is done with DES based crypt function in PHP and both the hash and salt are known by the attacker? Consider the following example: $salt = 'mysalt'; $pass = 'mypass'; $hashed_pass = crypt($pass, $salt); // $hashed_pass = myDUAMR/WMo7. I know that John the Ripper can br...
I was wondering if there was (and I hope there is) a standard for public key size for ECDH (Elliptic Curve Diffie-Hellman) and ECDSA (Elliptic Curve Digital Signature Algorithm) for every curve type over prime fields (192, 224, 256, 384 and 521).
Possible Duplicate: What security risks does IP spoofing bring? I found this article, which seems pretty good but was written in 2003 so I'm not sure how up to date it is. Can IP address spoofing still be used for: Denial of Service attacks Man in the middle attacks Are there other types of attacks this can be use...
I am connecting to a VPN server that has been compromised and is under the complete control of an attacker. The virtual network itself contains numerous attackers waiting for a new target. What steps should be taken to protect myself in this hostile environment? (Yes, I have to use a VPN that is the point of the ques...
I haven't read it myself but a colleague told me that the end-user can revoke his/her OAuth token. I searched but I couldn't find enough docs on: is this true / is the end-user the one to revoke the token? can you point me to a tool / code / script or even a discussion on how the end-user could do that? thanks!
I am a software developer with little network security knowledge and almost no knowledge of the current network architecture for the environment I work in. If I had any, I still would not want to divulge any information as such could be a security risk. Currently, company policy prevents any server communication outsid...
I'm a professional Windows system administrator, but I've been caught off-guard (or maybe some malware writer has been very clever) and I caught some unknown malware on my home computer (Windows 7 x64 SP1); it must be a very recent one and/or of a rootkit kind, because no antivirus/antimalware/antitrojian/antianything ...
mathematically / theoretically, what is the chance that 2 different inputs would have the same results of 2 different hash functions? As an example, i will use 2 weaker hash algorithms, the MD5 (Collision Vulnerabilities)and SHA-1 Collision Vulnerabilities. So I have a password. I hash it with MD5 then I hash it with S...
I already know I"m going to hash the user's password n times in either sha512 or n*x in sha1 before it is sent to the server. Once at the server, I'm going to use bcrypt set to use ~1/100th of a second. Before I move on, onto my reasoning behind using sha512 instead of sha1, I'd like to state a few things. First, I kno...
I'm using a Diffie-Hellman key exchange to encrypt data using AES-256. The prime number I'm using is the one from the 8192bit group specified in RFC 3526 (page 6). Page 7 suggests that, with a 620 bit exponent, that's an equivalent key strength of 310 bits, so, large enough for AES-256. It also suggests that the 6144b...
Some days ago I got infected by a malware, probably something new and very clever, as it went in unstopped and no scanning tool was able to detect it afterwards (see this question). It was a two-stage infection: first an obvious malware went in via Internet Explorer (fully patched, so there probably is some still unkno...
I need to provide two means for securing data within my application. First is using the Operating System sandboxing model (I am talking about Mobile Phones OS) and the second using the OpenSSL AES encryption algorithm in addition to the sandbox model. The best is to allow the application user to configure data to be c...
Currently I’m working on a certificate manager that allows our product to securely connect to remote web services (over TLS/SSL). For security, we use Certificate Revocation List checking (or CRL-checking) to find out whether a certain certificate has been revoked. Still, some issues are unclear to me: Must/should I f...
I understand the NIST hash function competition candidate Skein comes with a built-in block cipher, Threefish, that is turned into a stream cipher by using Unique Block Iteration chaining (is that right?). The pyskein implementation makes this particulary easy to use: import os import skein data = b'Hello World!' key...
I realise it's very hard to generate suitable prime numbers and generators for the Diffie-Hellman key exchange. What is the best way to generate them? And if I have one, can I use it twice? According to Wikipedia, they are considered "public".
Do the U.S. export laws around AES-256 apply to applications hosted in the cloud?
I'm interested less in the tools of the trade (there are many questions here already about that), and I am interested more in the process by which you would go about using those tools. So for instance, OWASP has the following testing guide: https://www.owasp.org/index.php/OWASP_Testing_Guide_v3_Table_of_Contents Do you...
Here's the scenario: Alice and bob use Off-the-record messaging to communicate over IM. The have: Encryption Authentication Deniability Perfect forward secrecy They communicate after authenticating, being reasonably sure of each others identity. Now a rogue party breaks into Alice's house. Alice knows that they might...
for debugging why my router wasn't connecting to pppoe i've tried to connect via the pc, it worked, then i started wireshark just to see what was going on, and i've seen that i can read all the PADI packets from ISP's other clients, now i'm thinking, is that a security problem? Can another user respond with a PADO pack...
When considering what Windows event logs to incorporate into a SIEM solution, should I be looking at just the Security event logs, or all categories of event log? How useful are the other categories in detecting and responding to security incidents?
I know one systems administrator who runs SSH Server on his workstation to push files to it and check things from a phone but I think it is a bad idea for several reasons: An operations workstation is a sweet spot for the adversary. Once she is in, she won't find a better place to get access to other places. If you ge...
I'm looking to extract interesting information from webserver logs and I wonder which HTTP status codes should I filter out? For example, 200 hits can be considered to be 'regular behavior' whereas lots of 404 hits from a certain IP probably means someone is up to no good (automated scanning).. So, which of these that...
This seems to be a fairly easy question to figure out, but I wanted to make sure. I've got about a thousand entries on one of my web servers with phpmyadmin in the connection criterion, but as I don't have phpmyadmin installed, it always 404s. They originate from several former-Soviet-bloc countries, which makes me c...
A client is asking my company to write up internal standards that open source software must meet before we will approve it for use on our workstations. Our policy has always been subjective and hard to quantify. We use very popular, highly reputable products like GPG, Ruby, and 7-Zip, and are wary of new, unproven pr...
I have been working on a program that uses MS Access and ODBC to connect to an SQL server. One of the requirements is that the user need not know the password for the connection to the SQL server, so I checked the 'Save Password' check box when linking my SQL tables. Does anyone know where the password is stored and ho...
If I want to download the ubuntu11.04.iso then: UBUNTUMIRRORSRV -> ISP -> ISP -> etc. -> MYPC I just want to ask that how difficult is to spoof the original MD5 sum (e.g.: the md5sum would be reachable through HTTPS!). So we have: - on the ubuntumirrorsrv: XY md5hash, and XZ ubuntu iso - on mypc (the downloaded iso fro...
With the News of The World Phone Hacking scandal spreading globally amidst allegations that as well as celebrities, victims of September 11 and other major events in the news have had their phone voicemails hacked into. With this in mind, many people are wondering: How can I stop my phone being hacked? This being secu...
I am looking for an encryption algorithm that would allow me to know if the password supplied is the correct one or not. This question can be considered as a follow-up for Q. In particular the answer from bethlakshmi: When you want the server to use the key, I'm guessing the process is this: user gives the system his ...
Mozilla went live with a new service called BrowserID/Persona (announcement, background). It is intended to replace current single-sign-on solutions such as OpenID, OAuth and Facebook. One advantage is that a future integration into the browsers will reduce the phishing risks. Also, the identity provider will not be n...
As this question on voicemail protection got answers veering more to protecting the mobile phone, I thought I should add a specific question on this topic. There is already a question on protecting your Android phone There is a wide range of attacks including the THC femtocell attack so all pointers welcome.
Suppose I have a file with records, and I have two options to encrypt it: encrypt the file as a whole encrypt each record separately and store them together. Which way is generally preferable and why? For example, I think the second approach is worse because being implemented naïvely it would disclose information abo...
In security discussions, the topic of sandboxing often comes up. What is application sandboxing? How does it work, and what security vulnerabilities does it prevent?
What resources exist to research data on actual security incidents? I would prefer an online resource but offline resources are acceptable. The cost of access should be less than $100 (US) for access to a statistically significant number of incidents. I would prefer databases that include more than just media reported...
Are there any flags/attributes, that I can see when buying an ethernet switch? I mean does it has a little message on the box of the switch, or any tech specs, from where i can see that the given switch is going to survive a CAM attack? CAM table attack in 2011?
I'm tasked with creating database tables in Oracle which contain encrypted strings (i.e., the columns are RAW). The strings are encrypted by the application (using AES, 128-bit key) and stored in Oracle, then later retrieved from Oracle and decrypted (i.e., Oracle itself never sees the unencrypted strings). I've come a...
Dropbox (the online cloud storage provider) was recently in the news for some security and privacy vulnerabilities. What was the problem, and what has been done to resolve it?
After reading about the recent Dropbox issue I'm starting to wonder if they could legally keep their initial promise. Lets say that you're like Dropbox or Lastpass and you store users' information in such a way that you can't open a user's files. What do you do when you're subpoenaed for a user's files? (I'm looking fo...
I only have 2 spare machines and both are very old, but I really want to set up an environment so that I can start practicing security. One of these machines has a Pentium 4 processor and 512 MB RAM; the other is older (and I don't know the specs off the top of my head). I want to set up a VM environment on these ma...
I have created a VPN service using Routing And Remote Services on Windows Server 2008 and I haven't configured any Server Network Policy yet. There is only one user for connecting to VPN and all of our members use that single username. Yesterday while we were surfing the web (checking mails) using that VPN connection s...
I don't understand the real world usage scenarios of these cryptography methods. Can any one please explain how they work, with examples and also their usage in the real world?
What are the main advantages and disadvantages of webid compared to browserid? This question is inspired by this answer which got a number of upvotes despite being very vague on the topic of that question. Webid is basically a fancy name for SSL client side certificates with a profile url in it. Some topics: Hows are ...
Imagine something like TrueCrypt where user A can decrypt his files, or any 3 of the 10 directors in his organization can decrypt user A's files. As I understand it this is similar to the way the DNSSEC Root Keys are secured. Obligatory wiki entries. Does anyone know of any commercial or open source implementation of f...
I was under the impression that MediaWiki, due to its nature as "open for all Wiki platform", is not tailored towards managing sensitive information. I found some warnings about this on the MediaWiki FAQ and some user account extensions as: If you need per-page or partial page access restrictions, you are advised to...
We are going to design and implement a UI for a big website. Owner of the site is really cautious about security issues. I wonder if there is a check list for security issues at the client-side ,while designing and coding in Javascript.
I assume this is impossible, but I need to find a barcode (that can contain a url, i.e., a QR style one). It has to be photographed by our smartphone app, but the image will not be changed over a period of weeks or months and has to be on paper. No matter what we put in the barcode, we always come up with the same fla...
I would like to get some outside opinion on this if possible, although I do not know what to ask. Sun ILOM is an Out-of-band management system. I understand it is a separate OS on the box that is always on. It is able to access Keyboard Monitor Mouse and other hardware interfaces as well as power on and off the machine...
We bring in hard drives from un-trusted sources and would like to ensure that they will not contain any harmful content. What kind of risk is there for Solaris? As in, if Solaris is running, and I attach a drive, I would run format and then check there is only one fdisk partition and it covers the whole drive, then I w...
Are there any resources that analyze the purpose or goal or the major viruses/malware out in the wild today? For example, what percentage are used to construct botnets (for DDoS or something else)? For sending spam? For keylogging and collecting passwords or financial information? For destroying information on the mach...
While discussing buffers overflows, somebody told me that compiling your own binary for an application (with specific compilation flags) instead of using the "mainstream binary" makes it more difficult for an attacker to leverage buffer overflows. Apparently because it "changes memory allocation" compared to the mainst...
I need to send some sensitive information to a client. I thought I would email a password protected zip file I created using Windows XP and then call them with the password. Presuming I pick a good password, how secure is this approach? Specifically, how difficult is it to decrypt a password protected zip file?
Ok so i need a technique (could be a system or just an algorithm) to generate a hash/digest of a string on a client app without me (admin of a server app) being able to determine what the original string was. The twist is that i know the format of the string so it would be quite easy to generate a lookup table of SHA, ...
I read this documentation, and I have written an algo to encrypt and decrypt a string. But I don't know how many types of algorithms android supports. Regarding DES and AES (As wiki documentation) there are many types of both, so which one will be better?
I work for a virtual organization (we're all remote) that uses a lot of freelancers/subcontractors. Very often I need to exchange SSH login information with developers working on projects for us. How do I do this securely? Most of them know nothing about GPG / Public Key encryption, nor how to integrate GPG into their ...
I've been in charge of systems administration for a small company for a couple of years and am now training some new collaborators to take over. So far, there has been no security policy, but I would like to leave behind a good security policy that clearly states: a code of ethics agreed upon by all and the direction ...
What is the validity of this article which claimed that IE is more secure than Chrome?
Gmail doesn't give the IP address of the sender in its mail headers for security reasons. I'd like to know whether there is some other way of getting the IP address of the sender. Since Gmail specifies the IP address of its email relay server, which the sender first contacts, is there any way of querying the relay ser...
I know there have been a few questions about this already, but I just wanted to know if anyone can take a look at my design plans to see if there are any gaping security holes. I am in the process of making a web application which securely stores sensitive information that can then be retrieved by staff members who hav...
Does standard AES with RSA (reported by Opera as TLS v1.0 256 bit AES (1024 bit RSA/SHA)) provide perfect forward secrecy? Which SSL3.0 and TLS1.0 ciphers do provide forward secrecy? Which ciphers in openssl provide forward secrecy and are regarded as secure?
I'm looking at password manager solutions and came across LastPass. I see that they also support two-factor authentication using YubiKeys. How secure is this combination for password management? What are the "weak links" in this scheme that could be targeted by an attack?
My system uses AES-256, 4096bit RSA CA key and 2048bit RSA keys for servers together with SHA-256 signing. Does using 1024bit DH key exchange lower its security? I read on one mailing list that 1024bit DH provides about 70-80bits of security, is it true?
In one local magazine I read interview with Adrian Porcescu, who is a technical consultant that works for Kaspersky Lab. Among other things, he says their anti-virus uses behaviourism and heuristic control to detect malicious software. I wonder - what is behaviourism and heuristic control in anti-virus software and how...
I learned that the Sun guys used the login name as salt for password hashing. Is this a common approach? What are the most common salt values?
Steve Gibson of Security Now fame claims that viruses can attack a video card and infect it. I assume that he means it can infect the Video BIOS. However I'm skeptical. BIOSes are so numerous and different, what are the chances of someone writing a virus to infect the Video BIOS? Any clues?
Some sites, as seen in the report for www.mbank.com.pl [ssllabs.com] or report for aliorbank.pl [ssllabs.com] do not support "Session resumption", either because IDs are assigned but not accepted (first case) or because IDs are empty (second case). It's not related to secure renegotiation, as visible in report for pocz...
I'm part of a small group of people who manage a website and the server it runs on. We have many accounts with third-party websites or services that multiple people on the team need to access. What is the best practice password policy to use in this situation? The policy needs to accommodate many accounts on other site...
Reading about the SSL renegotiation problem CVE-2009-3555 one knows that servers supporting old type of renegotiation are vulnerable to data injection. We also have tools to test them (openssl s_client and Qualsys SSL labs). But what's the situation with clients? After checking the https://ssltls.de site using few brow...
I am new to using a VPN service and came across the past at How do I pick a VPN provider? however am unsure if I need to use a personal VPN service or if OpenVPN fits my needs which are as follows; No logging whatever so e.g. encrypted servers, no tracking of originating IP address, etc Minimal or next to no impact on...
I am about to start an evaluation process for firewalls. I have experience with Checkpoint and Juniper, but I don't have any information on Palo Alto networks, other than their marketing stuff. So I would like to hear from IT analysts/network administration the pros and cons of Palo Alto in areas such as: Ability to ...
Given the ability to read (but not write) arbitrary kernel memory as an unprivileged user, what approaches might one take to gain additional privileges on the system? Ignoring the 'trivial' method of scanning through the page cache, finding /etc/shadow or equivalent, and cracking the passwords. For concreteness, say it...
I've been using Backtrack for a while now. I was wondering if there is anything better, or on par with, that is worth looking into. Thoughts?
So I received an email from my system administrator who wants me to secure a server I own that seems to have a vulnerability in port 443 (which is Windows RPC over HTTPS). Disabling it I know causes some problems with the UI of Windows so I don't want to mess with that. They are saying it is not SSL enabled so it is in...
Possible Duplicate: From a security point : Is it OK to tell your password to an admin? I am working in a small company (20 employees) as a senior SW engineer. After having some email problems, our newly employed IT administrator asked me for a password to see with hosting company why exactly. Without any thought I ...
I'm working in a small company (20 employees) as a senior software engineer. After having problems with my email, our newly employed IT administrator asked me to write my user password to someone in our hosting company to help them identify the problem. Without any thought I gave him my user password. After 30 minutes...
What are best practices, recommendations, required reading for securing/hardening an Oracle internet directory? note: OID is compatible with LDAP version 3.
I was using Lotus Notes today and I realized that the program asks password is encrypted in many ways. even without access to the stored passwords notes I can say that they are at least as recorded in 3 different ways: replaces the characters as you type your password: Type A but he writes in the field abc123. Generat...
I'm rolling my own, personal threetags.com-style 'encrypted data in the cloud' webapp (I didn't like the UI, and lack of non-browser client). However, I have absolutely no experience with security and encryption, and cobbled together this scheme after reading up on threetags' security, Wikipedia articles, and documenta...
Android's security manual says that it is not safe to keep market public key just as a string and it should be hidden/encoded somehow. I am new to android Can somebody please provide me with example how it can be done? I don`t know, but this would be quite common task related not to Android, but to other apps also.
I am a programmer, doing mostly web development now, dealing also with securing the web applications in my line of work. I have reasonable knowledge of security matters, though not always staying up-to-date on the latest developments (mainly due to laziness and lack of time). I'm not doing any pen-testing and not plan ...
I have a question about how to detect a program/binary modification assuming the program is able to communicate with a remote validation server. More specifically I'm asking for android APK file, but it can be for any other program as well. I imagine the following hypothetical scenario: There is an APK installation fil...
I've been wondering what max-age should the HTTP Strict Transport Security header have. Both paypal and lastpass sites leave it very low: 500 (seconds = bit over 8 minutes) market.android.com has it set much higher: 2592000 (seconds = 30 days). Do I correctly guess that the value should be at least few days? Doesn't a ...
I'm looking for a theoretical definition of Software Security. And I need to quote some book in an article. Most of the books starts already assuming that the user knows what that is, and they're probably right. My question is the most accepted definition of software security.
I'm developing a web application for mobile devices on my local server in my laptop. My laptop is connected to company network via LAN. And, my project manager, wants to check the web application which runs on my local server via his phone through WIFI. Further, I'm using fedora 15, and don't have any anti-virus softwa...
What's wrong with this code? $password = "hello"; $password = md5($password); for ($i = 1; $i < 20; $i++) { $password = md5($password); } I don't think an attacker with access to the hashes storage would be able to decrypt any password using more than 2 characters. The attacker would have to decrypt this list of has...
I'm writing this post as I'm facing a personal, ethical dillemma and I would like feedback on the best way to approach this situation, particularly from a philosophical point of view. I work for a small-business. I'm part-time, doing "grunt" work type stuff while I pay for college. I worked in this particular field b...
Is there any list of specific courses that the NSA suggests to be taken at the schools that they have designated CAE/IAE? I have a general knowledge of what courses I should take, but I still want to see a list of suggestions from the NSA (for B.S, M.S, and PhD).
This question made me start thinking about password hashing again. I currently use bcrypt (specifically py-bcrypt). I've heard a lot about PBKDF2, and scrypt. What I'm wondering is if there are any "more modern" password hashing methods that I might not know about (because they're new, so people don't talk about them a...
If I've connected to a https url, how can I determine the cipher strength of the connection? My understanding is that after the asymmetric public-key handshake the information is encrypted using a symmetric key with a given strength but I can't seem to find that number (128-bit etc). Please let me know if I am misunder...
How often do websites (and their databases) get hacked? Hacked as in user accounts stolen, tables flushed, and all in all, damage done to the database. I'm talking about e-commerce websites, and moreover, anything besides major financial institutions because I always hear about those hacks on the news.
Which password-based encryption method should I use in Java 6? It should be as strong as possible, but work with the default security policy file (not the export restricted one which you have to download and install separately)?
After reading this article from symantec I got to think how much all these social engineering techniques rely on the authentication system of users, a password. Considering three different additional methods of authentication, smartcard, mobile phone and biometrics, how much do these make social engineering harder? A s...
I think it definitelly isn't, because XSS which isn't saved anywhere would damage ONLY attacker. Am I right or are there any cases where XSS could hurt non-db-application? (I mean datas are not saved anywhere)
Given a Solaris machine with two network interfaces corresponding to the separate ethernet ports in the back. 0: 192.168.0.5/255.255.255.0 1: 192.168.1.5/255.255.255.0 with /etc/defaultrouter set to 192.168.0.1 If a connection (either TCP or UDP) comes in on port 0, but it is from 192.168.1.6 (obviously spoofed), doe...
I take form input all over my site, and use query parameters to sanitize data. When an invalid data type is passed, a simple (not detailed) notice is thrown and I receive an email with what was passed. It appears that in this automated attack, one of the dropdown boxes is reinjected into one of the fields and iterated ...
The login page is the starting point to any web site and the most important thing to authenticate the user. When I begin to build any web application, I take a lot of time to think about how to design a login page with flexible interface and so secure. Is there any common advice, tips, or a "must do" list to take into ...