instruction stringlengths 24 29.9k |
|---|
My server is currently being attacked from another server. This is my log:
root@my-server:/var/log# tail -f auth.log
Feb 19 11:53:08 my-server sshd[3745]: Disconnecting: Too many authentication failures for root [preauth]
Feb 19 11:53:08 my-server sshd[3745]: PAM 5 more authentication failures; logname= uid=0 euid=0 tt... |
Note: I realize there is no legally binding talk hereinafter.
There are lots of leaked password hashes on the internet. Twitter searches for "hash dump" pull back tons of links, generally from "deep web" servers. As security yokels, we find it interesting to see how secure (or insecure) these dumps are; many are from ... |
I am not sure whether this is the best place to get my concerns addressed, but I hope it is. I went through some earlier questions posted on this site about Gmail and privacy but they don't seem to address my concern.
I use Google Chrome heavily as it's really fast and usable compared to other browsers. I also use Gmai... |
Q: For servers running Windows 2008 and up, what would be the most reliable whole disk encryption? We want to protect our data from unauthorized access.
Right now, we used BitLocker. However, the key is still resident in the system and/or MS can decrypt it because they have what it's called: Key Escrow. I've used TruC... |
I would like to change my pgp key because I have the same one 2 years ago. But, I want to warn my freinds that the owner of the old key and the owner of the new one is the same person (me). hwat is the way I can use to prove I am the owner of the new pgp key ? Include it on the revocation certificate of the new one ?
|
After telling my workmates and boss that we had a very critical lack of security controls, finally we got compromised!
They had a Joomla 1.5 which was exploited using a file upload vulnerability. WSO 2.5 web shell was uploaded.
I'm trying to find out where is the vulnerable parameter but I haven't had success. Running ... |
Consider the following theoretical webserver:
On any request, produce an html response that consists of 2 links,
which are each randomly chosen strings followed by ".html".
When the google bot attempts to crawl this site it will be presented with 2 more links. In the interest of mapping the site, it will attempt to... |
If only the server has an electronic certificate (User ID, Version, Public key), how can be possible the encrypted communication between the client and the server?
|
my question is that why I can not see some credentials in mitmproxy while the application connecting to, uses ssl connection? I actually installed the mitmproxy server on my PC and have set up my android smartphone to connect to that proxy before connecting to the main server. I have not installed the proxy certificate... |
I have posted this to NetworkEngineering.SE, as that seems the more suitable audience for this question.
I will leave this question open here but am happy to see it closed. I just did not want to delete it in case someone was working on a reply.
I am running pfSense 2.1 and having an issue with a Proxy.sh setup. In pa... |
Is it safe to accept the security certificate from AOL chat? Did they recently change their certificates? These images are from Pidgin.
|
From my understanding vlans create separate networks. If that is the case can you simply add routes manually and access those other networks?
Basically, I've always been under the impression that vlans were designed for seperating networks to keep them isolated and secure from more public access.
|
I have a client who wants to be able to have new customers who sign up with them online for a delivery service to be able to submit their credit card information as well. Once the information is obtained the client will manually enter this information into their POS system at their retail store. The client does NOT w... |
I think I already know the answer to this question, but I thought I'd ask the experts anyway.
A few months back, I created a password-protected 7-Zip archive which housed the source code of a simple program I was writing at the time. I was using the archive everyday, and so never wrote the password down. I've been rack... |
Every time I start my test-server and let it run for some days I get this in my log-files (in different variations):
111.241.26.165 - - [18/Feb/2014:22:16:45 +0100] "\x04\x01\x00\x19\xCBER!\x00" 400 172 "-" "-"
111.241.26.165 - - [18/Feb/2014:22:16:46 +0100] "\x05\x01\x00" 400 172 "-" "-"
111.241.26.165 - - [18/Feb/201... |
What I essentially mean to ask is, how is the scenario where a user who visits a website for the first time (the certificate for the website is not pinned in the browser) handled ? Additionally how is revocation handled ?
|
I want to show that if I modify one bit or byte from a given X509 certificate the signature verification results false (because this modification results different hash value from the certificate). I'm stuck in the case that how to do the modification on the certificate using getTBSCertificate() method. My following co... |
I'm concerned about microwave technologies nowadays and suspicious matter happend.
So, I have several questions. Could you tell me about my question in below if you know.
Question:
Is it possible to hack my encrypted session such SSL/TLS and
hijack (duplicate) the session by electromagnetic waves?
What will be possi... |
Surely we could just make it so a rainbow table says for each beginning of chain do 10k iterations, and then we wouldn't have to store both values?
Or does by doing it this way stop collisions?
|
I have a rails 4.0.1 app that allows locale as a request parameter. Here is what i saw when i tested my app on firefox;
http://localhost:3000/pages?locale=en_EN%22%3E%3Cbody%20onload=%22alert%28%27XSS%27%29
So Firefox executes body=onload when the page renders, if i run this request from Firefox browser sadly alerts x... |
For the sake of demonstration, I'm trying to perform a Ping Of Death sent from a Kali Linux virtual machine to a Windows 95 virtual machine (vmware) on a private network.
I've set both vms correctly, they are able to ping each other.
I've installed Windump on th victim Win95 and I'm able to monitor incoming packets.
I... |
Do you If there is a simple listing of which KB replaces which KB in Microsoft development because every report from Microsoft explain one by one which KB replaces which KB, but I can't find a place where this will be all gathered.
Microsoft Report Example here
|
In most of the companies, IT guys block some sites and by using TOR or other VPNs people walk around these blocks and gain access to blocked content.
My question is, assuming TOR is running on default set up (downloaded Tor Browser and hit run) is there a way to catch this? Could there be a default port that can be cou... |
I am a programmer by day and I am working on a project that is focused around risk management based on PCI-DSS controls within an organisation.
I have been thinking lately that a lot of PCI-DSS controls are focused on software patches, network diagrams and end of life dates etc but if the organisation create their own... |
I'm working with an Issuing CA that doesn't support name constraints that are defined at a higher level.
Assuming that it issues certificates that are compliant with the Name Constraints that are defined, would this be an issue with clients that validate the chain?
|
Let's say there is a web application needing a JavaScript support file .js to be loaded in the head of the html document.
<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<script type="text/javascript" src="file.js"></script>
<title>example</title>
</he... |
I have discovered that a web application allows the setting of certain cookie values through request parameters. Each request param results in a separate Set-Cookie header. i.e. a request like this:
/url?cookie1=first_value&cookie2=second_value
results in the following headers:
Set-Cookie: cookie1=first_value
Set-Cook... |
Mosh has been around for a while now. Although it's claimed to be "a replacement for SSH" by its authors, mosh does actually depend on ssh to do the initial authentication, after which an instance of the mosh binary is started on the server, the established SSH connection over TCP is abandoned (after serving its purpo... |
I am not sure if my wording is right, but if I attach a unique token inside email links which will authorize the user if clicked, would you consider this a vulnerability?
Password-reset partly includes this. That link authorizes you to reset your password, but here I am talking about a more long-lasting link.
I have no... |
I am currently designing a login for a web service. I will use a PBKDF2 implementation for hashing the passwords.
However, I intend to allow unicode for passwords, as I will have international users, which might want to use, for example, cyrillic characters. To avoid any issues with unicode ambiguity, I thought of usin... |
I had a Asus N82J laptop with a dual boot setup. I boot into Kali and Windows 7. Long story short because of my dual boot with Grub I corrupted my HDD the operating system kept moving blocks of memory around. I've obtained a new SSD and 2nd drive HDD and starting from scratch. I still want the functionality of Kali... |
I know there are many discussions on salted hashes, and I understand that the purpose is to make it impossible to build a rainbow table of all possible hashes (generally up to 7 characters).
My understanding is that the random salted values are simply concatenated to the password hash. Why can a rainbow table not be us... |
I am beginning a new project and I already know that I'll have various roles for various users, regardless of their access level. They just have different jobs to do.
With that in mind, I'm thinking that I'll have certain actions that can only be performed by those who have a certain role (like being in a group)
The ot... |
I was reading the wiki on magnetic stripe cards when I stumbled across this sentence: "Magnetic stripe cloning can be detected by the implementation of magnetic card reader heads and firmware that can read a signature of magnetic noise permanently embedded in all magnetic stripes during the card production process." (w... |
I'm working with the registry for .wiki, a new generic top level domain set for public availability in June 2014. We're going to be giving away hosted wikis to registrants of .wiki domains and I'd like to use only https across the board on these wikis.
Purchasing an ssl cert for each second level domain is cost prohib... |
I was wondering if two factor authentication is really necessary if you are using high entropy, long, unique passwords for each site. From my experience 2fa just beefs up security a little more, by adding another key necessary to get into a lock. But if the first key is sufficient(20 plus characters), does it really ma... |
I have a set of URL's which might be Zeus hosts / C&C servers since my security appliance says so. Is there a way to check if these really belong to Zeus?
|
This is my first question and I dont even know if it is the right place. If this is an off-topic just mark it as off-topic, don't go crazy and downvote. :P
But how can I detect if my browser is not storing my passwords in some server, for later use against me. :D How can I trust my browsers privacy policy?
And also I a... |
I'm not a computer guy, but just out of curiosity I've recently started to learn PHP for programming my own website and I've read about some most common vulnerabilities that exist in web applications. I know the basics about Cross Site Scripting vulnerabilities. So, an XSS attack happens when the input from the user is... |
I have a domain that is only used by me, with several inboxes in the format aep-x-company@domain, where I replace 'company' with wherever I sign up. This way I can detect when someone sells email addresses.
However, since yesterday I have been receiving spam on about 10 of them simultaneously.
The source are infected s... |
I would like to understand if this service is as safe and good as it claims to be: https://unseen.is
This is what they say:
... Many other services that offer
encryption keep the key, but getting a copy of the key from the
service is the easiet way to break in to your messages. With Unseen,
you control the key, ... |
I was searching around about CSRF attacks and I am thinking about the "random form token" prevention concept.
Let's say every form has a "hidden token" inside and the server checks the token before anything else. Now let's say there is a form http://myWebsite.e.x/acccount/edit and it's supposed to be submitted.
The att... |
I currently try to understand the Kerberos protocol. And I think I understand the parts of it. How Alice gets a ticket from the Authentication Server to authenticate herself to the ticket granting service. And how that one does the same, so Alice can authenticate herself to Bob.
But what I don't understand is, why aren... |
Some time ago i try Wireshark at my home local network just for see how it works. I scan the connection of my mac to the router and also to other external ips. The flow of connections were high when i was surfing on web and low when the browser was shut down. My question is: why also when all browser were turned off i ... |
Is it possible for an uploaded PDF file to harm an Apache server, if the filepath can't be found? That is, the PDF file can't be viewed from the browser or accessed by a known path once uploaded.
I have a feature within a Drupal site that allows anyone to upload a PDF file in order to have some ImageMagick processing d... |
"Keyset does not exist". I know that there are tons of question about this error, but mine is totally different.
I'm not gona use the key from windows certificate store, but load the public key & private key from 2 bare strings, using method "fromXMLString".
rsa.fromXMLString "<RSAKeyValue><Modulus>......"
then
rsa.Si... |
The fundamental idea is to load a blog comments plugin (like Disqus) from a domain someone is already logged into to save users time and increase engagement.
I like the facebook comments plugin because people are usually logged into facebook, but not everyone is keen on having their comments go through facebook and be ... |
What prevents an attacker from copying and pasting a Chrome packaged app (which is just a zipped web app) then distributing it on the Chrome webstore under a slightly different name?
|
I understand from a cryptographic standpoint that you want a password to be as random as possible to resist brute force or dictionary attacks. That is fine- but in what circumstances can those approaches actually be taken? Just about every system I have ever had a password to locks you out if you enter more than a co... |
I've been reading a lot about quantum computers and RSA. I know RSA security relies on the difficulty of factoring an extremely large number with just two prime factors. Apparently quantum computers claim to be able to factor them within minutes. I wanted to know about some viable alternatives to RSA, possibly somethin... |
I know that the best options to use for storing passwords are bcrypt/PBKDF2/scrypt.
However, suppose you have to audit a system and it uses SHA-512 with salt. Is that "fine"? Or it is a vulnerability that must be addressed, even thought your site is a discussion forum?
Of course, if it is weak, it must be addressed, be... |
I have my own domain, and a few email addresses on it, including a catch all address, with Google Apps. Recently, my catchall address has been receiving "delivery failure" emails from many different domains that are saying an email I tried to send to them was rejected or couldn't be delivered. But I didn't send any ema... |
Imagine you are developing a "free" app for android & iPhone and want to refinance yourself through using some sketchy ad service. Does an app developer have to worry that the ad content he embeds can access information such as the user's phone number or maybe even his phonebook? Furthermore, is there some danger that ... |
I have a public-facing web application where anyone can register an account. The passwords I store are salted and hashed.
When someone tries to overtake the account of someone else through guessing passwords I would like to know this. For that reason I would like to log all unsuccessful login attempts.
I think that it ... |
I work in a lab environment, and save data to a shared PC. This PC is not networked, and so the only way to get the data from that PC to my own, is through USB. The lab director has mentioned that the PC has been infected with malware many times in the past few years, and to be careful not to infect it again.
It's not ... |
I was reading about Impagliazzo's five worlds and I have some questions about cryptomania and minicrypt:
What is difference between them? I cannot find one?
How does cryptomaniac MitM protection work in SSL/TSL? Does it still need some level of trust?
|
Suppose one of my duties for a small organization is to send out statements to clients by email.
Suppose one of the directors / owners / trustees want to be able to audit the numbers. Specifically he wants the ability to check that I'm not keeping two sets of books (One set for the directors and auditors and one set fo... |
I'm trying to get a better understanding of the potential security holes my default filesystem permissions might be creating. It appears I am capable of traversing my filesystem, serving simple php pages that display info from files outside my /var/www Web Root:
echo file_exists('../../../bin/filename');
I don't know ... |
Apologies if this is not the right place to ask this question, I will happily move it to another Stack Exchange site if need be.
Before I explain the rationale behind the question, let me clear up a few things first.
I enjoy cracking software, for my own educational purposes.
I do not participate or work for any crack... |
How to use Scapy to overwrite a part of the TCP header information of the first fragment, which contained data that was allowed to pass through the firewall, with malicious data in subsequent fragments?
For example: overwrite the destination port number to change the type of service i.e. change from port 80 (HTTP) to p... |
Data Execution Prevention in Windows supposedly is a line of defense against malicious code by "by monitoring your programs to make sure that they use computer memory safely". However, I also know for a fact that not all programs are made for DEP, and crashes and other problems can result if a "safe" app is blocked an... |
A friend pointed out that putting virtual hosts as sub folders of the default /var/www was a bad idea. (linux example path; this applies to all OS)
I see that it's possible to reach the virtual hosts from another domain (or just the ip), but how's that affecting security? No source code would be displayed since all scr... |
With these reflection attacks, the source IP should be the IP of the vulnerable server. So shouldn't nodes which see abnormal amounts of NTP data be able to add the source to a blacklist and therefore mitigate the attack?
|
Facebook claims to allow restrict sharing to friends, certain network, or even custom when I upload photos.
But it appears that this security is only in effect for the page where the photo is hosted. One can use the "Copy image URL" or the equivalent in one's browser, and you can forward this URL to anyone, who will ... |
Can a file e.g. containing some random key that is generated by my web site/app be acceptable as the second factor (the first factor being a normal password) in 2FA?
Someone said so to me in the past, but i doubt about it, because i think a key in a file is not very different from a password in that it is stored on the... |
In light of the recent hack of the EC-Council site, where the hacker makes the point that he has access to passport data a general question arises.
What, if any, are the security/privacy consequences for people of their passport data being compromised?
|
I'm trying to implement an encrypted file-system.
The file-system consists of 512-byte sectors. I encrypt/decrypt the contents of a sector as follows:
Compute the SHA256 sum of the user password. This results in a 32-byte User Key.
Compute the ESSIV for a sector by computing the SHA256 sum of User Key and the Sector ... |
I'm trying to figure out if there's a way to figure out when files on my external hard drive were last opened. I'm using a Seagate Backup Plus, and it's both mac and PC compatible. BUT, I've also read that updating of the 'accessed' date is usually turned off by default on these drives to save space. This seems to be t... |
I might be totally misunderstanding the concept of web-of-trust, but imagine the following scenario: I generate my key, then go to a key signing party, and after, I import all the keys which fingerprint I have verified, and sign those. Now, this will make all those keys fully valid, but the default trust for each key w... |
I've made the below function to make a completely random 64 character long hash
function password_salt($password){
$salt = hash("sha512", mt_rand(1,100000) . strtotime("now") . $password . "ewuwmeqwjkeq 7689" . hash("sha256", strtotime("now - 10 days") . $password));
$salt = $salt . $password;
for ($i=0;... |
I was trying out a simple stack buffer overflow exploit by creating a malicious crash.m3u file.
as you can see the EIP pointer is overwritten by "A" but EBP hasn't changed.
isn't EBP supposed to get overwritten before EIP??
|
is there an XSS attack vector that allows the inclusion of a external .js file without having to use forward slashes?
let's say the path of the file is somewebsite.com/js/xss.js
Is there a way to pass it to a parameter that it works and without it containing forward slashes
An example that wouldn't work is:
<script src... |
I am trying to implement AES on an image of size 256x256 (65536 bytes) but AES works on 4x4 size of image (16 bytes).
What should I do? Can it be implemented or not? And if yes, then how?
|
My mum (on Gmail, using Chrome) received an email from a friend's Hotmail address. She opened the email (very obviously a phishing email) and clicked a link in it. This opened a webpage with loads of medical ads on. She closed the page and deleted the email.
She did not notice anything else happen when she clicked the ... |
We are trying to see who is using network VPN.
I used Wireshark to sniff the network, I gained some users and passwords. The usernames were in plain text, but the passwords were in two different encrypted types
One kind like this : NAME='PlainTextUserName', VALUE=0x9fe513a40a2e169f9930d21b6b0a669d
At first it looks lik... |
I am programmer by day and night, I work within security at the moment working on some security products. I have noticed a few non software engineering based roles which require security clearance. I was wondering is there any cases within software engineering / programming that developers require security clearance ?
... |
TLS Sign was proposed as an IETF Draft in June 2007.
I have not found further information, besides that the draft expired in November 2007. Can someone tell me what happened with this extension or can someone point me to an extension, or a mechanism that provides non-repudiation for TLS connections.
|
I'm building a web app that uses S3. In some of our operations, we're creating a file on S3 with a path that's directly dependent on user input, so an attacker might cause a file to be created on S3 with whichever path he wants.
Is there a way for an attacker to leverage this into an attack? (A few ideas that came to m... |
Source: http://www.infoworld.com/t/development-tools/bittorrent-sync-gaining-major-traction-peer-peer-alternative-dropbox-232144
and the average usage has hit 20GB per person.
How can they know that without using some sort of spyware to monitor and keep track on a central server somewhere? If it's P2P, they would ne... |
Does storing the actual length of the message in metadata make an encrypted message more vulnerable to attack?
|
Optimal flags to specify when using nmap to guess the OS on remote devices?
I'm currently using the following:
nmap --privileged -sS -sU -sY -sZ -O --osscan-guess -F -r 192.168.200.223
This seems to work ok but it takes quite a while to finish. Is there a more optimal set of flags i can use to balance performance and ... |
Most malware one hears about on the news seems to fit into one of two categories:
Windows viruses, trojans, rootkits etc.
Linux server "worms", backdoors and similar
How big is the threat of classical Windows Desktop-style malware (i.e. viruses, keyloggers, trojans) for a Linux Desktop user sitting behind a router ma... |
We have a Java application running on a Linux server and we are transmitting some files using a third party Java library which uses HTTPS internally to connect to external servers. These are legacy libraries and we have only .jar files.
How can I identify which SSL/TLS version is being used by this library? Is there a... |
Looking through my Apache log files ("combined" log file record format), I see a large number of requests for URLs ending in "wp-admin". This is pretty weird, as my server doesn't run WordPress. I also have a 404 document that's a PHP program that records $_REQUEST, $_SERVER, $_COOKIE and $_FILES. I have apparently del... |
Suppose:
A and B are initially configured to possess the same key.
-- the key is only known by the pair
-- no key needs to be public
A has an algorithm, a, that takes a message(plain text), m, mutates it with a key, k, producing an encrypted message(cipher text), c.
B possesses the same key, k, that lets its al... |
I'm looking at implementing a two-factor authentication system for my web site, utilizing a user's cell phone as the "something you have" part of a two-factor system. It seems like there are two typical approaches to do this:
Send a code via SMS or voice message to the user and ask them to enter the code on a web pa... |
I have heard many times that hacking .NET websites is different from others. What's the technique used by hackers to hack .NET websites, and how can we secure .NET websites?
|
I made a software and I would like to distribute it as a demo that can be registered. I would like to know if there is a site where I can offer some reward for some one try to crack my software and explain how it was done.
Thanks
|
I'm an amateur web application security enthusiast with what I would say is an intermediate level of knowledge at this point. I'm interested in finding full time work as a web app pen tester.
Up until now I've been working mainly on vulnerable web apps hosted on VMs locally.
I'd like to start doing actual vulnerability... |
In my app I'm using Facebook login and creating a local user in my DB after retrieving the data.
When saving the Facebook ID in the DB I need to hash it, as I don't want the ID to be in clear text if someone gets my DB data (I want to prevent, as much as possible, a way to connect the data to an actual person on Facebo... |
If I understand right, there is a "handshake" where both the server and the browser verify who they are and agree on an encryption key. Why cannot a hacker just watch the network for the keys going through?
Why can't a hacker just watch for the handshake, collect the data, and run it through a easy-to-write piece of so... |
When a user initiates a SSH connection for example, keys are exchanged and a session is established with a new "passphrase" each time. If an attacker were to attempt to brute force this connection, their chances of cracking the "passphrase" would be much higher if the connection persisted for a long period of time righ... |
As I understood it (correct me if mistaken); Wifi Positioning System has a network of routers of some sort, and when I plug in my new device, by using existing devices whose locations are known, they can locate my new router.
I have few questions about this;
How do they collect my info? Do they ask for permission? Can... |
I have a question regarding encryption and message sending.
There are 2 hosts, A and B with their own secret key kA and kB (assuming this is not PKI).
It is known that when A wants to send a message to B, they do this handshaking protocol:
A sends to B, an encrypted message in this form E(kA, m), where m is the message... |
I have been hired at a start-up where I seem to have become the de-facto admin despite being hired to do application support (to be fair I do have a background as an all-rounder).
Amongst the interesting things I have found is a lack on anti-virus on the domain's Microsoft servers the argument being that they are not t... |
as the topic says I am interested in learning more about anomaly detection in particular I am asking for good starting points and references both from a theoretical point of view and applied one. For the second one (applied) I am interested in tools to use and good "traffic packets sets" which I can use to start diggin... |
In Belgium we have electronic identity cards (eID) issued by our government. They can be read by a smart card reader. On the card are two certificates, one for signing and one for authentication.
I want to distribute my public key. Can I use my eID to sign my certificate so to let users know that it really is my public... |
I recently got updated by InfoSec that we need to be careful about ETags using Apache WebServer (HTTPD) as they reveal inode and can be exploited especially in NFS etc.
But I am moving to Tomcat 7. Do I need to care about all these ETag vulnerabilities in Tomcat also ? If Yes, how can I mitigate ?
Thanks.
|
We've been discussing a possible attack vector where a rogue app with root rights could hijack the legit ssl session of anther local app and transmit its own data over it without the server being able to detect it (Edit: our app uses ssl cert pinning).
What would the rogue app need to do to achieve that?
Are there any... |
After the Mt.Gox crash, and also keeping in mind recently published attacks on Target and Neiman Marcus, one is led to believe that sometimes so-called hacking is perpetrated by insiders.
What are the tell-tale signs of an insider-led compromise as opposed to break-in by outsider threats? Please limit your arguments to... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.