instruction
stringlengths
24
29.9k
I felt this fit more here than SO, if not, please vote to migrate. We've been approached by a company who would like to use our platform to host their videos. The issue is that right now, we use the HTML5 <video> tag meaning anyone who is capable of opening the source of a page can see the actual location of the video....
What is the current best practice to secure an executive's laptop? The exec will be processing highly sensitive documents (high-value bids, merger & acquisition info, technical specs). As such they are a potential victim for a targeted attack or APT. They will primarily use web, email, and office. And they need to be a...
I've been looking for some decent documentation on Meterpreter shells, but I can't seem to find anything useful. I would like to know when to use what kind of shell for a certain situation. All I can find are guides that just mention what shell they are using but never elaborate why they prefer the shell. Do any of yo...
Do you think it’s a good idea to disclose your password encryption policies in your privacy policy or terms of service agreement? In other words, would you tell your users - and the world - you don’t store their passwords in plain text, and disclose the exact method you use to store passwords? For example, a privacy po...
Does a pair of (hashing) functions for which where neither g(x) nor f(x) are constants exists?
I've seen several implentations of CSRF tokens: The first one uses randomly generated CSRF tokens which uses a cryptographic strong random generator to generate the token. The second implementation I found uses HMAC which encrypts the session id with secret key stored in the server side config. The third implentation ...
I'm using SecurityOnion with Snort/PulledPork/Snorby. I am getting multiple "ET POLICY Pandora Usage" alerts a minute for the same source and destination. I want to threshold these to get 1 alert per day per source. The original rule: alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET POLICY Pandora Usage"; ...
i was wondering if this is a secure method for a hashing password.if it is not secure please tell me what to do in order to make it secure $pass='test'//the password $salt=openssl_random_pseudo_bytes(225);//generate salt $pre_hash_pass=hash('sha512',$pass);//pre hash the password $final_pass=hash('sha512',$pre_hash_pas...
I'm working on a project where I need to store and recover a password. I can't use a salted hash for authentication because the password is used to secure an HTTP connection via HTTP Digest. I'm not in charge of the protocol on the other end, so that means I need the plaintext password to perform the authentication. I ...
According to PCI-DSS requirement 3.5.2: Secret and private keys used to encrypt /decrypt cardholder data should be stored in one of the following forms at all times: Encrypted with a key-encrypting key that is at least as strong as the data-encrypting key, and that is stored separately from the data-encrypting key. W...
According to PCI-DSS requirement 3.5.2: We should store secret keys in a cryptographic device. Cryptographic devices: 1.HSM 2.PTS-approved point of interaction device My questions: I have some knowledge about HSM and it encrypts the KEK using Master key. Also read about Thales HSM and I'm aware about it. But when I was...
Following their tutorial, Stripe allows to save customer and charge them later. But, does one have to be PCI compliant? In their API Reference, it seems they give lot of information to be stored which seems to be a security risk. If someone gets hold of my API key and customer information, can they misuse the informat...
I've been asked to figure out how to get our company to comply with an "Industry Recognized [Security] Framework" where '“Industry Recognized Framework” means a global industry recognized information security management system (“ISMS”), such as ISMS standard ISO/IEC 27001:2005 – Information technology – Security techni...
i am storing the password using hash_pbkdf2 but now ive hit on a problem my code : 1.for register $salt = openssl_random_pseudo_bytes(125);//salt $final_pass = hash_pbkdf2("sha512",$pass,$salt,1,125);//where $pass is the password entered by the user 2.for login $found_pass=$row['salt'];//retrieve the salt ...
I am preparing a test plan for the security penetration testing of a software solution that manages patient information (HIPAA compliance) and allow the user to access to it from the web. Does anyone happen to know if there is any security standard for HIPAA that I can refer to as a blueprint for building the test plan...
A few years ago I have used S/MIME certs to sign (and encrypt) my mails. The reason for which I stopped signing was the following: My (class 2) cert was issued on Jan. 1st 2008 (just a sample). It was valid for 1 year. Thus it expired on Jan 1st 2009. During Jan. 1st 2008 and Dec. 31st 2009 I sent hundreds of mails. Ev...
Im trying to implement a better system to monitor checkins to our repository. We have some generic users everyone can use, I have recently disallowed them from checking in as those users however there is one user that is used in our builds who must be able to checkin. I would still like people to be allowed to become t...
I have a few sites that are using HTTPS (no mixed mode HTTPS/HTTP). The cookies do not have a HTTPOnly flag set. They do pass along session IDs. Also some of the sites do not have a "Secure"flag set in the cookie along with the HTTPOnly flag. Is running these sites in SSL a sufficient mitigating factor ? If not, what...
I realize how basic this question is, but I have relied for years on mechanisms built into .NET to handle log in for me. These days, most of my work involves using client-side logic and calling API services and I am now considering authenticating users that way. Should I be using oAuth, or is there something more simp...
In order to access my desktop or the hpc cluster at my university, I need to go though an intermediary server managed by the university. Currently I use the "netcat method" (ssh -W) to access the desktop and hpc cluster. I have also previously used tunnelling (-L) to access these boxes. What is the difference security-...
I recently acquired a Synology NAS (DS1513+). I am looking to expose SSH access remotely and to that end would like to harden SSH as much as possible. Is 2 Factor auth possible and if so what are the options that exist. Please note, I am aware of the PAM-based Google Auth module but wanted to know if there are alternat...
I am trying to recover login information of another computer. I have managed to copy the local/roaming profile credential files located in C:\users\%username%\APPDATA\local\Microsoft\Credentials\ and C:\users\%username%\APPDATA\roaming\Microsoft\Credentials\ when I try to copy these credential files in my credential st...
I would like to know about Multi-Factor Authentication is applicable for TEMPEST or not. Why I'm asking is I have suspicious matter every day also captured as log. My concern: It's possible to steal my account, password from my display or my keyboard tapping and also pass code for MFA from Smartphone such Google Aut...
I have obtained some credential files from another pc and would like to decrypt them. These are the ones found under local/roaming profile in Appdata folder C:\Users\%USER%\Appdata\Microsoft\Credentials Can ophcrack crack these credential files? I dont have any hashes, pwdumps or sam files.
I'm analyzing some malicious files on a VM and I'm noticing that every time I open a file, the host's antivirus detects it. Why does this happen? Is the malicious content escaping to the host?
Ive done a bit of reading on the subject of Hashes and Salts and I came up with an idea for a salting scheme but I wanted to check it with some people more learned than myself. My basic idea is to use the initial password hash as a salt for a second hash ie. password = 'foobar' final_hash = sha1( sha1( password ) + pa...
Decrypting the DEK using KEK under PCI-Standards, which are separated by Servers: Let say for example we have server1 and server2 Server1: It is in East US, called it as Application Server. Hosted my website and database. In my code I'm using AES 256-bit cryptograpy. Store the encrypted cardholder data in DB. This s...
Assuming a person gets his own domain address, say, theperson.com. He then goes on to create a vanity email address with that domain. e.g. me@theperson.com. me@theperson.com may be hosted by the person's own mail server, or somewhere else that offers vanity email services, such as Gmail, Yahoo mail etc. To the uninitia...
I use Cain to ARP spoof my host and the router. Then I use arp -an to show the ARP entries on my host. For a second or two, I can see the router's MAC address is changed to the address of the attacker, but it recovers to the router's valid MAC address immediately. Both Linux and Windows 7 are installed on my host, bo...
I have multiple web application installed in separeted directories in a shared hosting account. My worry is if one application get hacked, attacker can use it to attack other applications too. So, My question is what are the potential ways in which an attacker can exploit a application on a shared account using a diffe...
Although I understand the concept of a SQL injection and have done simple exploits (simple hack challenge sites and stuff) I'm wondering if one of the site run by my employer is vulnerable. Unlike my previous experience (relating strictly to forms open for injection) it seems as though the site is sending SQL statemen...
I am building an application in VB.NET (WinForms) utilizing SQL Server 2008 R2 as a Backend. The application is to track employee's money they defer each paycheck, or month, to deposit into separate 'fund' accounts. (Think of it like putting $200 of your weekly check into a few different stocks). The business side say...
Background: Implementing online casino, I would like to use a number of PRNGs with high throughput, like MersenneTwisterFast. I know it is not cryptographically strong, but quite unpredictable when used with a proper seed value (is it?), let's say, AES-CTR. Question: How secure would be the PRNG, initialized by a gener...
I believe that when adding a salt to the password you need to store the values so you can compute the hash again. But, what does happen if the attacker get the salt? How is it possible to add value or strength to the password if the salt is known by the attacker? What am I missing?
It's a given that users will choose bad passwords. Why not help them out? Using a securely-random choice from a large dictionary, choose one or two words and tell the user to write them down. When they log in, require username, password, and the words that were generated. The password hash is based on the concatenation...
We are thinking about switching from e-mail to instant messaging. Do you think, Apps like WhatsApp or Telegram provide enough security for that?
As a bit of a learning exercise, I'm trying to understand and implement a client for the Firefox Accounts Browser sync API. I'm up to the point where I'm trying to ask the server to give me a certificate validating my public key: https://github.com/mozilla/fxa-auth-server/blob/5c1354ecbc0c606d31e7db1b8ffd047808bdf6fa/d...
Does an issued X509 certificate have a thumbprint (hash) included as one of the items in the X509 certificate?
We had been testing an AWS instance accessing an internal Ubuntu 10.04.3 server, so had modified our firewall to allow all ports from that specific IP address to the server. We then released the AWS instance but forgot to remove the firewall rule. Yesterday, someone noticed failed login attempts in auth.log which were...
I am working on standardizing our server builds where we currently have three different functional pools. For web pools I use the same IIS RSA key across all machines. It keeps life easy and allows the application.config file to be copied between servers without issue. My question is, is there any issue of have al...
What threats can a firewall between an application server and a database server mitigate that would not otherwise be mitigated when both the database server and application server are behind the same firewall?
I've been tasked with doing a security review on a Firefox update, but we don't have any utilities that we can find. How would we go about running a security review on Firefox before pushing it to the other computers on the network?
this company claim Scrypt mining by ASIC (on crypto currencies who use scrypt hashing as proof of work) scrypt is made to keep ASIC/FPGA attackers away, is that claim expired?
According to the implementation of the TCP/IP stack an attacker is able to identify which operating system is running on a network device. Is there any paper or the like according on this topic?
Also: Is it something that can be achieved with limited funds? I ask because I am intrigued by the obstacles that are in place.
I'm doing a school project where we are building a simple web server in C. To implement this I read the first line of the request (all I need for my purposes) and parse the middle string as the file name using strtok. So a typical request would be something like: GET / HTTP/1.0 and my response code would be something ...
A recent scan of a .net web application detected an ldap injection vulnerability for a field that was used for a username assigned to an instance of a custom class named User. After stepping through the code, I found that the User instance was given the System.Security.Principal.WindowsPrincipal instance, and did in fa...
This question has also been asked on Server Fault, but was not taken seriously. I hope this is a better place for it I'm going to install Debian Wheezy on a KVM VPS. VNC access to console is enabled, and by sniffing network traffic when connecting, I see VNC password is encrypted but everything else is sent in plain te...
I use the PwdHash service (http://crypto.stanford.edu/PwdHash/) and plugins for pretty much all of my passwords. I believe this is safer because: No service gets the same password as another, so if one account is comprised my other ones shouldn't be. The hashed passwords should be more secure than unique passwords I c...
The update in question is the Mavericks combined update which, among other things, claims to fix the recent SSL vulnerability/gaping hole. This issue really annoyed me, so I decided to procure Apple's PGP key and verify it as best I could. And I snooped my traffic with Wireshark during the downloads. Here are my find...
My email-provider's website (http://www.gmx.de) recently started linking to the (German) site http://www.browsersicherheit.info/ which basically claims that due to its capabilities to modify a site's appearance, Adblock Plus (and others) might actually be abused for phising. Here's a quote from that site plus its trans...
Will sabotaging a shared web hosting account threaten the security of sibling accounts being that they are shared on the same server? Whether it it be through htaccess setups, posting login credentials and configuration specifics publicly, or the like, what are the main vulnerabilities a client on shared hosting can fa...
I dont see any record of CVE-2011-1571 being fixed in tomcat based on ASF' security reports for tomcat itself. Usually they specify the CVE number and information about the fix. This was 3 years ago so i guess it has been fixed but when it has such a high vulnerability score i would still like to know as im planning to...
I'm doing some studies/development for a security system that would use ECDH with ephemeral keys. In my code I'm currently using a 256-bit EC, so when the two parts compute the shared secret, I get a 32B (256bit) array containing the shared secret. Now, I would like to use this shared secret to compute a key for a symm...
As per the PCI-DSS 3.5.2 requirement Encrypted with a key-encrypting key that is at least as strong as the data-encrypting key, and that is stored separately from the data encrypting key. Does this mean: Storing the keys(DEK and KEK) in different servers(server1 and server2) or Storing the keys(DEK and KEK) in differe...
I work for an insurance broker that sometimes has to share our customer calls with the insurance company we are underwriting for. Generally this means retrieving the call from our call recording system and send this encrypted on a CD, recorded delivery to the insurance company for them to listen to. Is there an easier ...
To safely store a passwords, it is better to store them hashed using a hashing function designed to be slow like bcrypt. The goal is to trump brute force attacks. Are there any ciphers slow enough to prevent brute force attacks? I am especially interested about SSH private key storage. Would a brute force attack work i...
I am developing a web application. I am planning to skip CAPTCHAs for the initial signup by an IP so as to improve user experience. I was wondering if I am inviting any security risks by doing this. Is it possible for a malicious user to make many signups by using a new IP for each request? Also, How difficult is it fo...
I just changed a password on a Google account while using the Chrome browser. After doing so, I noticed that the https connection to Google was not highlighted in green signifying that it was an "Extended Validation Certificate". Does Google not use "Extended Validation Certificates"? If they do, then why wasn't their ...
I wonder if it's possible to develop a secure point to point encryption application (a pgp message application for example) on a proprietary software. If such an application was developed, let say on iOS or OS X or any proprietary OS, what are the chance that the OS could break it, intercept data, etc... That lead me t...
I have and android app that sends a encrypted sha1 salted message to a server, I know the message, is it possible to find the salt or it would be easier to try to reverse te android app?
If a post request is sent from a client on a website without SSL, is the request secure? For example, I visit a site badsecurity.com, and I login using a password: Will this password be encrypted if there is no SSL? (I am pretty sure it is not, unless it's https/ssl or there's some other encryption added to the form?)...
I have a php script that sends an email using mail(). The php script lives on domain.com, and it sends the email to info@domain.com. Is this a secure transaction? The website runs over https.
Spam emails went out for an hour earlier this week bearing my Yahoo account in the FROM field and going out to all my contacts. I changed the password, then saw (via rejected emails sent to my Yahoo account) that mail had gone out again with my email in the "FROM" field, to all my contacts. However, in neither case di...
I have the following rule: alert tcp $HOME_NET any > $EXTERNAL_NET any (msg:"This should not happen"; flow:established,to_server; content:"GET "; depth:4; content:"Set-Cookie:"; http_header; within:100; classtype:trojan-activity; sid:1000001; rev:1;) The header and general options are not the issue - it's the payload a...
The title pretty much says it. Do the security patches to address the gotofail security issue in multiple Apple products employing SSL change the User Agent string for the respective systems? And, of course, what is the demarcation point between patched systems and unpatched systems with the build number in the UA str...
Ive been called by someone, but when I answer the phone, it makes digital noises and then my phone calls some Nissan dealership. It will literally, after making before stated noises start ringing on my end like I am calling someone. The Nissan dealership will then answer like I called them. What is happening.
I created an x509 certificate using gnu certtool, in the certificate template i specified cn=myip Problem is that each time I change my network I need to remake the certificate because my ip changes...and from client side it is even worst:if I want to contact a server on my private network I need a 192.168 address, whi...
Can someone please explain how and why this struct.pack code is used in the below exploit? I'm trying to understand how it triggers the vulnerability. I understand the buffer overflow aspect, I'm referring to the below struct.pack method. I'm a ruby guy myself, and did some prelim digging into the sruct.pack code below...
Is there any way how to use Kismet data to locate rogue wireless access points?
Short Question: Question: Could any security vulnerabilities arise if a server runs htmlentities as UTF-8 but the client views the results as ISO-8859-1? Assumption: No vulnerabilities exist when one consistent charset is used Detailed Question: Question: Could any security vulnerabilities arise if the server htmlenti...
Is it possible to use internet without revealing my public IP Address? I feel I should have the choice to reveal my IP address or not. At the moment, it feels like I don't have a choice. Your IP address seems to reveal a lot about you, i.e. where you are, which ISP you're using and I feel that no one has a right to kn...
Is obtaining the value of a textarea/input with the jQuery function .val() XSS-proof? <html> <textarea id="t1"></textarea> <script> var toBeDisplayed = $('#t1').val(); $('#elem').html(toBeDisplayed); </script> </html>
When using the Windows Azure IAAS servers how does one setup IPS for all incoming traffic to these servers? How would a regular user who runs his whole environment within Azure make sure that he can monitor traffic for security? What are people doing now? Thanks in advance.
Background: We're in the process of integrating two web applications. The other one, application A, is a publicly accessible Internet service, which is provided by a third party and which offers Web Service APIs we'll integrate with. The other one, application B, is an old(ish) legacy application hosted in a company in...
I have a server that I want to restrict access to by allowing only one IP address to be able to connect to it through desktop and make http request through port 80. Now in my firewall I only have World Wide Web Services (HTTPS Traffic-In), Remote Desktop - User Mode (TCP-In) and Remote Desktop - User Mode (UDP-In) rule...
Are there any tools capable of automatically fuzzing Linux shared libraries, by automatically I mean detect exported function, determine function signature and finally inject random data ? Can frameworks like Sulley or Peach perform this type fuzzing if we provide it information like function signature ?
A professor told us today, that MD5 is weak. I understand his chain of thought but pointed out, that IMHO MD5 is a good way to go if you would use a long (even really long) dynamic salts and static pepper. He stared at me and said NO! IMHO the possibility to "brute-force" a md5 hash with a any dictionary is even simple...
For a user to defend against something like Don't understand how my mum's Gmail account was hacked , they should pay attention to URL bar before typing their credentials. But how can you make sure it's really the browsers URL bar that you are looking at? Phishing site could look non-suspicious by: Opening a popup with...
So, as far as I know, Chrome and possibly other browsers have a very low privilege process spawned for every tab. How do browser extensions interact in regard to this sandboxing? I'm not talking about directly compromising an extension, but compromising Chrome, and then escaping from the tab sandbox by compromising the...
cRLDistributionPoints is OID 2.5.29.31. Here's what one looks like under Gutmann's dumpasn1: SEQUENCE { OBJECT IDENTIFIER cRLDistributionPoints (2 5 29 31) OCTET STRING, encapsulates { SEQUENCE { SEQUENCE { [0] { [0] { [6] 'http://crl.example.com/crt1-crl.crl' } ...
Problem This morning I found that, what I thought was one of our proprietary artifacts, had been published to a public repository: http://repo.grails.org/grails/simple/codehaus-cache/com/ If you click on the link you see that there are tons of Artifacts from companies like Adobe, Amazon, AOL, BP, ... at least some of w...
Shouldn't this be a trusted certificate considering it's a wildcard SSL certificate? That is, shouldn't *.delaware.gov cover www.corp.delaware.gov?
There was an interesting paper in 2013 from the University of Pennsylvania called Familiarity Breeds Contempt: The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulnerabilities. One compelling example the authors discuss is the lack of known security breaches in voting machines, contrasted with the high numb...
I've been playing with John The Ripper (JtR) to try to crack/audit a salted password that was hashed with SHA-512, with 20 interactions according to the source (for the curious, this is a Rails app, with the authlogic gem). If I understood things correctly, JtR expects its hashes in a file, where each hash follows cert...
Just very curious, count my knowledge in cryptography, algorithms, and security in general as non-existent. Now I am aware that this might be a VERY broad question, but here it goes. What is the most secure and virtually unbreakable cryptography to secure data in today's standards (and of course tomorrow's). Tips and t...
Does the recent certificate gotofail bug affect me if I'm running version 6 of iOS, but only use Chrome as my browser?
On a theoretical level, is there anything inherently different about public vs private keys? During RSA key generation there are two keys generated, key A and key B. Key A is private and Key B is public. Could key B be private and key A be public? Is the choice of which key to be private arbitrary? Would either key wo...
I'm thinking about building a very anonymous forum, where people can comment and upvote each other's comments anonymously. People are supposed to remain anonymous even if the forum's database contents becomes publicly available. As one step to prevent vote fraud, I'm thinking about storing parts of the IP address. Only...
I'm writing a little webapp that demonstrates 2 factor authentication. I'm using the TOTP protocol as described in RFC 6238. In our scheme, we are storing, in addition to a b-crypted password hash for each user, a secret key, which is used to validate one-time codes. I'm using postgreSQL for a database backend. Let'...
You can see the link "Forgot Password?" nearby almost all login form. Since passwords are completely protected from outside access, I come up with this question. I accept that the forgot password process is highly secure. However, I want to make my application a little bit more users-friendly. I want to skip this whole...
I want to move from a shared hosting to VPS. I never used VPS or dedicated server, so I wanted to know if there are some security precautions that I should have in mind. Say, I create a ftp account or, database user, should I do smth to secure my account info, or it is something that the provider should take care of ? ...
What's the difference between normal sql injection and string based sql injection? An example would be appreciated. As far as I understand from the few readings around the net, string based sql injection is somewhat similar to blind sql injection in that, the sql injection occurs but a valid page is returned and we ca...
My skype password was recently changed. I've changed it back and found it in the internet on hacker's site. My password is pc-generated, like as2fZ12v. How did they manage to hack it, if I've never written it anywhere?
If all html in a site is generated in client side (attributes, urls, styles everything will be concatenated in javascript and set as innerHTML), is it doing only html escape enough for mitigating all xss attacks mentioned here?https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet
I have a program written in Python that checks the validity of its license key with a remote server. Am I right that an SSL certificate would make it possible to prevent spoofing (host redirects for example) of the remote server? And if so, is there a difference between using an official SSL certificate from an SSL pro...
I have a website, large amounts of this site can only be accessed if the user logs in. I would like to use the users IP addresses as a means to determine where they are when they access certain pages. I would like to use the users IP to determine if they are at a certain institute (company, university, school etc.). I ...
I work for an ASP that provides banking solutions Card Services Payments ACH Online Banking And others Back Story: Our company provides an "all in one" solution or parts thereof, we are constrained by regulatory agencies. One of the issues that we have run into, is retention. We are pulled in to investigate fraud, ...
KDC-REQ ::= SEQUENCE { -- NOTE: first tag is [1], not [0] pvno [1] INTEGER (5) , msg-type [2] INTEGER (10 -- AS -- | 12 -- TGS --), padata [3] SEQUENCE OF PA-DATA OPTIONAL -- NOTE: not empty --, req-body [4] KDC-REQ-BODY } I thought everything in square brackets was ...
Bitlocker doesn't support USB key + PIN (password). The reasoning was "the password is too weak to provide additional security". Isn't that flawed? With a USB key and password, I've got some level of two-factor, right? The USB drive contains 128/256 bits of key material, and the user could provide as large a passphrase...