instruction
stringlengths
24
29.9k
I am trying to perform DOM XSS attack to exploit a vulnerability of localhost webpage. I am able to perform the attack successfully on IE-11 and Chrome. But Firefox is preventing me to perform the attack by encoding the script I put in URL. I am performing the attack as explained on official OWASP page. In order to by...
The "Phone State" permission on Android is widely requested by many apps. The explanation often given by the developer is that the app needs it in order to determine when you're on the phone, to stop doing stuff or making noise or the like. However, it also provides an application with your IMEI, phone number, and remo...
On our views in a Java web application, currently I am using hashCode as Id's for objects so that at server end I can get the same object back. However, I am wondering how secure Java's hashCode really is so that someone cannot hack it to retrieve other person's objects. I am not very inclined towards Encryption-Decry...
I am reading OWASP Testing Guide v3: Example 1: Magic Parameters Imagine a simple web application that accepts a name-value pair of “magic” and then the value. For simplicity, the GET request may be: http://www.host/application?magic=value. To further simplify the example, the values in this case can only be ASCII cha...
I want to use MD5 function (JavaScript library) to hash password before send it to server during logging in to website and during registration proces. I want to ask is it a secure method? I can't use https, and I wonder if this method will be safer? If someone has some remarks about this I will be grateful for advice...
I am trying to get a deeper understanding about the inner working of WiFi Protected Setup and its active attack using reaver, bully and other utilities. What I am really unable to realize is why it is necessary to set the network card on the bruteforcing device in monitor mode. Monitor mode allows to inspect traffic fr...
All (almost all) web browsers have TLSv1.0 enabled by default, moreover TLSv1.1 and even TLSv1.2 can also be enabled by default. What version of TLS will be used to connect to web server (e.g. Apache) with all SSLProtocol enabled? What order of protocols will be used for browser with TLSv1.0-1.2 enabled by default? For...
I have set up a remote ssh server on the cloud. I am newb at these things and have managed to bypass the required firewall using SSH. Now I plan on giving the access to only 2 more friends of mine so as to share the costs of data transfer so that only 3 users at max can connect and only the friends. So my question is t...
When visiting a url in Chrome, I saw in Fiddler, after the responses, calls to: http://api29.datarating.com/related http://api29.datarating.com/service2 For example after going to http://www.google.com I have this in Fiddler: http://api29.datarating.com/service2 with body: e=Y3oweE56azNKbTFrUFRJeEpuQnBaRDF5VlRselNXe...
I'm asking myself which one is better: Use the same PGP key pair for use with both private email addresses and business email addresses Use two separate PGP key pairs, one for private and one for business email addresses From a cryptographic standpoint there should be no difference (assuming that I keep my private ke...
I'm currently attempting to track down a problem with a Websense Web Filter breaking SSL connections for sites in a conditional forward. To do this, I need to know exactly how a conditional forward works. How its been explained so far is that a request is made of my company's DNS from a host within the private network...
I got that question on an exercise and I'm not sure what to answer. Without conventional brute-forcing and without a rainbow table, how could I find out the password? An improved brute-force algorithm is acceptable, but how could I improve it?
I am trying to pentest a webapp challenge. Is the following control code vulnerable to file upload? I would like to upload a php shell... I am able to upload shell.php.jpg file but I receive the error when I load the file location. function limitText(limitField, limitNum) { if (limitField.value.length > limitNum) ...
Imagine I have a website with user accounts. I want to authenticate users, so I need to know if the password they provide matches the one stored in my database. To protect the passwords from prying eyes, I want to obfuscate them, I decide to use AES in CBC mode to do so. I know that I shouldn't use AES-CBC to do this, ...
I want to use an OpenPGP smart card for signing releases, but I'm not sure what to do if I ever lose the card or it breaks. My idea is to generate the key using GnuPG on an isolated computer, encrypt it and backup that file. Then transfer the key to the smart card (is there a way to do this in GnuPG?) Any better ideas...
Assuming that the user is accessing/publishing related sensitive information over this period, and also assuming that they would take additional precautions in both scenarios, such as a Tails live USB, and an on-screen keyboard to prevent keylogging where it may be a risk. The main aim is to remain anonymous. Thank y...
Infosec has recommended us to use this header : Access-Control-Allow-Origin:http://domainA.mycompany.com,http://*.mycompany.com But I also own domain : http://domainB.mycompany.com So, if i just use Access-Control-Allow-Origin:http://*.mycompany.com Will this be enough ? or it needs to be domain specific ?
In relation to an openpgp key on a smartcard: Besides revoking the key, is there anything else it can be (ab)used for? Can I just ensure it's reliably stored but not worry about it's confidentiality?
Apparently, a third party knew the contents of an email I sent to someone within an hour after I sent it. The following possibilities come into mind: The recipient forwarded the email to the third party. (I doubt this though as the email was sent to a business address on a non-business day.) The third party has access...
We are planning to deploy HSM with our application. The solution we are thinking is : Mobile applications talks to server application, Server application talks to HSM for authentications, encryption, decryption Clients are mobile application(Android, J2ME etc.) which communicates with server application. Every tr...
My girlfriend is an admin on a German speaking site that for some time has been harassed by what we presume is a disgruntled user. At first it was merely an annoyance but a couple of days ago the person started sending child pornography in PMs and in eMails to the board. The police have been alerted but yesterday they...
This is the first time I face a mobile app deployment at big scale. This app needs to connect to a remote server where to store and retrieve data. I discarded connecting directly to the MySQL database as it would be a very bad idea, so I put some PHP scripts in the server side that receives data from mobile devices as ...
When I try to create a virtual machine on Azure, and use the password P@ssw0rd I get an error message saying The password you provided is too common. Now, from my basic understanding, a provider should be unable to determine the most common password since the hashes will be different even if the password is the same du...
If I search stack overflow for how to safely encrypt data, one of the first hits is someone's custom encryption scheme. I've seen several similar questions on this site, and in general they are all doomed to be severely flawed at best. Most people naive enough to even try to invent their own encryption have no idea how...
I am new to this and want to ask a basic question. Suppose I used my password (say "ABC123") to generate a key using the PBKDF2 algorithm (or any such algorithm). For encrypting a file I'll input my password and a key will be generated. This key will be used to perform encryption. Now, suppose if I want to decrypt t...
We are deploying multiple copies of the same system (some devices behind a gateway with NAT), and we need to have continued access for some of those devices. Right now our strategy is to have a set of non-standard ports that are configured to route to specific IP addresses behind the NAT. This setup is essentially repl...
It's my understanding that using "normal" passwords, such as an easy to remember sentence, is bad practice. Is that because such a string will not be random enough, or something else? From Ruby's OpenSSL documenation There are a lot of ways to create insecure keys, the most notable is to simply take a password as the ...
I see that the new login mechanism used by some banks in UK and also used by visa debit authentication is to ask for three random characters from your password at login (for example second, ninth and forth) but this surely mean that the password is not hashed, right? Maybe encrypted at best... This is very bad, right?...
Below is my encryption implementation in PHP. It's based on mcrypt, and uses AES-128 in CTR mode along with a RIPEMD-128 HMAC for integrity checking. For brevity, I've inlined the functions for calculating HMAC, verifying HMACs, directly int encrypt/decrypt functions. On the other hand, I've added more comments below t...
When clients (which are using both Linux and Windows) block all incoming traffic in a network, and the router is also blocking all incoming traffic, are we (almost) 100% secure? Maybe excluding silly stuff, like when the user runs something in his PC that he found online, or got through email from an unknown source. Ad...
Could somebody please explain to me the differences between the following attacks? sniffing snooping spoofing My professors used them all in his documents, but I'm not sure, if those are 3 different attacks or just synonyms.
0xugm5chUcCO+KqKV58YwSwh3kMOHDFju8wtSIuZCbBAAFJaHkYDloRXz9qLEz3unGiAwZEyTvlRhnt6slOFZQ== Im wondering how to figure what this is and how to decrypt it.
There are many great articles explaining how SSL/TLS works on this site, but I would like to bring in the performance issue. The thing is that I am serving my web content over HTTPS and the SSL handshake takes a lot of time. As much I understand at the moment the connection thru HTTPS is created as follows: TCP hands...
From wikipedia article on password strength: NIST recommends 80-bits for the most secure passwords Is there any estimation of entropy for FIPS-181 automated password generator? Recommended length? It generates pronounceable passwords like erinthec therglaz adentory denybier taillass alkhoray malteake
I have a Ubuntu 13.10 live usb. I gave it to somebody so that he can install ubuntu. Now I have received it back. I was wondering if it is possible to infect a live usb with spyware or virus ? If yes, how to detect it ?
Let's say my application connects to my database. This requires me to have the username and database in my config as follows: postgresql://scott:tiger@localhost/mydatabase I have an automated deployment to set this up and I don't want to store the database both in the application and my deployment script. Therefore my...
I really like this upload package and want to use it, but from the time I set it up on my server, I've been hacked twice by something called the AnonGhost virus (anonghost.com). I tracked the malicious files back into the jQuery-File-Upload-9.5.6 folder, which I downloaded from my hosting server back to my local direct...
I created a windows/meterpreter/reverse_https powershell payload using the python script provided at the end of this article. In the first run, the meterpreter session opened successfully, when I closed it and tried to execute the powershell command again, I got a "Windows PowerShell has stopped working" error. Any ide...
Here is a few questions revolving around the same core problem. Let's say I generate a PGP keypair. I now get the keypair signed by person A at signing party X. In the evening, I give my now-signed public key to person B. Next day I get my public key signed by person C at signing party Y. In the evening, I give my now...
Page 183 of Secrets & Lies on countering denial-of-service attacks: Some researchers have proposed defenses that force the client to perform an expensive calculation to make a connection. The idea is that if the client has to spend computation time to make a connection, then it can't flood the target with as man...
My machine along with several other machines are connected to wireless router. When i open some http page on same machine(M1) where wireshark is installed, it captures the packets such as HTTP GET or POST but when i open same http page from other device(M2) which is connected to same router, i see the entry for it in ...
We are going to secure our software development life cycle and have been researching for a good model to start with. I have found 3 major models (methodologies?) which are : Cigital SDLC (7 touch points ) Microsoft SDLC OpenSAMM SDLC BSSIM I couldn't choose either of them since i have no idea which one is best cho...
How come I'm allowed to reboot a computer that I don't own, put in a USB, boot ubuntu from it and then access all files stored on the drives available (even critical files such as system files on C drive in Windows)? Isn't there a way to prevent people from doing this, without putting up a password on the BIOS?
As a blanket approach to dealing with XSS attacks, rather than having to remember to escape user-generated code, is there a way to instruct the browser not to execute any script or script-function which isn't signed with a particular public key (embedded in the top of every page, but not necessarily authenticated. Thi...
If I do a fresh installation of ubuntu from an uninfected cd, will it remove all the existing rootkits/malwares/spywares/viruses etc if any ? Is formatting the hard disk required before reinstalling or these malicious programs will be removed even if the disk is not formatted before reinstalling?
What's wrong with you, you crazy fool, you're not supposed to be able to retrieve a password in plain text! I know. Hear me out. Assume I've got a service that's similar to Mint.com. For those that aren't familiar with Mint, it works like this: User signs up to Mint.com much like they would any other online service - ...
The Bitcoin alternative, Litecoin uses a different algorithm to protect the block chain, namely Scrypt (not Sha256). Given that GPU accelerators exists, and ASICS are due to be released, does the widespread implementation of the Litecoin network affect the implied security of my hashed password database? Does the mere...
I'd like to purchase a domain name from a country that does not require citizenship, since they can make nice urls, they are more available and sometimes not too expensive too! But few things annoys me and it could compromise services under that domain name. DNSSEC Not everyone uses it and sets it up properly but many...
tl;dr sleep() costs my servers resources. Using it to delay response to the attacker might cost him/her time, but allows for DOS. Is it possible to keep him/her waiting without costs of mine? Long Assuming I can tell (or at least very well estimate) that data send to my via POST method is an attack. First in a fit of a...
I need to find some materials about how Security Accounts Manager(SAM) works in windows 7+. I am confused with the storage format of hashed value. Many materials (such as, 1) tells me that it uses NTLM(or NTLM v2). However, as far as I understand, the security level of NTLM is very low. Most OS(such as unix) will provi...
So there is an application that accepts some data from the outside. Assuming that it accept only finite number of different POST/GET parameters and the application is correctly handling all the data sent with these parameters, is there a way to exploit an application sending additional parameters. By this I mean the fo...
I’m currently trying to improve the security at our work. This sounds very broad, but, for example, I’m penetrating our systems and checking whether servers are vulnerable to certain exploits. As an example, SMTP gave me this telnet result: 220 [redacted] Microsoft ESMTP MAIL Service, Version: 7.5.7601.17514 ready at M...
Background info: About 50% of the ADSL and cable internet access in Germany (and presumably parts of the EU) goes over AVM Fritz routers, either verbatim or rebranded as e.g. "1&1 Home Server" or "T-Online Box". These are embedded MIPS systems with a couple of ethernet ports, an ADSL or similar plug, and other optional...
My Corporate Network was always being monitored, but a few days ago they started to block and censor all HTTPS traffic. Recently IT guys forged certificates for all major HTTPS web sites and acts as a man in the middle. The rest of the HTTPS does not work at all. I cannot and will not connect to a secure site knowing t...
I'm trying to lookup all call rax instructions with msfelfscan, but %> msfelfscan -j rax /bin/ls Invalid register "rax" Was it not supported?
I'm working on a specific (hypothetical) situation, where I have two client machines attempting to perform a public key exchange, via a server. There's no possibility for a direct connection between the two clients, as the exchange is asynchronous. The server cannot be completely trusted. As it is facilitating the key ...
I'm setting up a small code-hosting web site, in the vein of github or bitbucket. I would like to allow users to specify an arbitrary URL from which my site's server will initially clone their repository. I'm using mercurial, so cloning essentially just means negotiating a simple HTTP-based protocol between the client ...
Some companies build their own software. Others outsource software development by hiring contractors or other companies to build software they need. When we need to build new custom software, is there any evidence whether the choice to develop in-house vs outsource software development has an effect on security? All ...
I use bcrypt (32 rounds) and once the hash is produced, I get the sha512 of that hash and I then hash that with blow fish and once that is done, I hash it again with sha512 with a salt that has been hashed with bcrypt (94 rounds) that is 33 characters long to each user password. So is that secure or not?
I'm running Snort version 2.9.6.0 and I'm not able to log events from the sfportscan preprocessor using the unified2 file format. This is the conf (actually is the default one): preprocessor sfportscan: proto { all } memcap { 10000000 } sense_level { medium } If I add logfile { /var/log/snort/portscan.log } the event...
I recently had a malware issue called "mysearchdial" that installed itself into my home computer's browser because someone didn't pay attention to what they were installing. I RDP'd into my work computer before this malware was completely removed, and I found that this malware had spread to my browsers at my work PC. N...
When the subject of password hashing comes up, a lot of developers get exasperated by people using outdated, broken, or hand-rolled hashing schemes, and I frequently hear "just use bcrypt!" repeated like a mantra. But when I mentioned this to another developer recently, he said that bcrypt is based on Blowfish, whose ...
Suppose I have a password made of n alphabetic characters. An attacker is given the hashed password and will attempt a brute force attack on cracking it. I can envision a naive password cracker trying all combinations starting with AAAA...A then AAAA...B then AAAA...C etc until ZZZZ...Z. For this attacker, a password ...
I have noticed many website going to a two-page (not two-factor) login system - where you enter your username on page 1 and click submit, and then enter your password on page two and click submit. What are the benefits to doing this vs having username and password on one page and clicking submit? Is it only to avoid pa...
I'm reviewing a website a friend developed, and was looking for general errors and concerns. In reviewing I noticed he is very heavy on ajax calls using JSON to a RESTful API that he maintains on a different server. While some calls are simply things that return content, some are more sensitive to get attributes of a u...
I am using EncFS with a USB drive. How secure is this if my USB drive gets stolen? I ask because the .encfs6.xml file is saved in the USB drive and I can open it with a normal text editor. Do I need to be concerned that the .encfs6.xml can easily be opened with a text editor if the USB drive is stolen?
I'm doing some pentesting against a machine the lecturer set up in the lab. NMAP shows port 445 to be filtered and Nessus confirms the ms08_067 vulnerability is present on that machine. I tried running Metasploit against it the normal way: use exlpoit/windows/smb/ms08_067_netapi set RHOST TARGET_IP set PAYLOAD windows/...
I am building yet another website which requires user and session authentication. This time I want to be complete security paranoid and actually care if the passwords or sessions are stolen. I have few requirements for the security of password authentication: The passwords are not stored in the server as clear text. B...
I got a DVD with copy protection enabled on it, but the problem I am facing is that it loads extremely slow. I have seen such happenings with other kinds of protected DVD's as well. Can anyone tell me why they are slow in loading as compared to the other DVD's. I know that such kind of DVD's utilize Content Scrambling ...
If I'm an OAuth provider and I want to empower the user to restrict apps to only a subset of resources (for example, only resources in folder X), what is the right mechanism to do this? Scopes would seem to be it, but I find little to no precedent for this. I often see scopes implemented as different permissions, e.g. ...
I feel like I'm asking a fairly obvious question here, but with it being so easy to make mistakes in this space, here goes. From wikipedia: DK = PBKDF2(PRF, Password, Salt, c, dkLen) dkLen is the desired length of the derived key How do I decide which is the "desired length"?
After two recent Slashdot articles (#1 #2) about questionable Root Certificates installed on machines, I decided to take a closer look at what I have installed on my machines. (I use current versions of Chrome on Win7, which I understand uses the Windows list of CAs) What I found really surprised me. Two relatively cl...
I'm implementing a mobile app which uses AES encryption algorithm to encrypt some critical values being sent to a remote server (basically, the user password), and then decrypted on the server side using the same private key. This works perfectly now, but I'm a bit concerned about how to store/get the private key. Curr...
My Server is Windows 2008. Mr. X is accessing my web server using Mr. X's certificate. In that time, an outsider is also trying to access my server using Mr. X's certificate (somehow he got it). Is it possible to disable multiple access using one certificate? N.B: I mapped 900 certificates to my SSL-enabled server whi...
maximun key for MCRYPT_RIJNDAEL_256 ? mcrypt_encrypt( MCRYPT_RIJNDAEL_256, <<==hash_hmac using sha512==>>, $text, MCRYPT_MODE_ECB, $iv ) Warning: mcrypt_encrypt(): Size of key is too large for this algorithm in C:\xampp\htdocs\natabuana.com\cpanel\encryption.php on line 18
Do you know what does RHSA, RHEA and RHBA stands for in RedHat Errata ?
I have just started educating myself about cryptography, and while it is mostly making sense, a few things are still eluding me. One being: In systems that take a user's pass-word/-phrase in order to derive the encryption key, what is the relationship between that password's strength and the key's strength? I know pass...
Tomcat gives a configuration sessionIdLength to be configurable, but does increasing the session id increases its security or its just security through obscurity
I was going through a study of IPsec and I found that there are redundant sequence numbers: one in the AH or ESP header, and the other is in the TCP header for a communication. Is it not an inefficient use of sequence numbers as we are using the same number again and again? What is the need of this redundancy of seque...
Does Active Directory Certificate Services support accepting requests for, and generation of, Card Verifiable Certificates (TR-03110)? If so, in which version of Windows Server was the functionality introduced? I have been unable to find any reference to Card Verifiable Certificates in the Active Directory Certificate ...
After reading about STARTTLS and SSL and performing a scan/pentest at our server I have the next question regarding security: Is this STARTTLS warning below a security-vulnerability? And if so why? As far I understand STARTTLS, it means: Encrypt if both sides support encryption, else use unencrypted connection and SS...
I'm going to buy a new ADSL wireless modem, and what really matters to me is security. So, what are the criteria I should consider, and which security features should I look for? How should I compare the modems in terms of the security (for example, WPA2 > WPA > WEP !!!)?
I have a website, using an ads service (qadabra). Yesterday some users reported me that the ads service sometimes redirects to a site containing malware. the url is this: PLEASE DON'T OPEN IT, IT MAY DAMAGE YOUR PC!!! http :// download.abocde.com /Flashplay /APX/ IT/ auload.php?installer= Flash_Player_11_for_Other_Brow...
Imagine you have a server that is at a location which is not trustworthy. People might have physical access to the machine who are not supposed to look at the data stored on it. In this scenario I thought about setting up a server with full disk encryption. This means that the key needs to be entered before the system ...
the PCI DSS document states: 11.3.2 Perform internal penetration testing at least annually and after any significant infrastructure or application upgrade or modification (such as an operating system upgrade, a sub network added to the environment, or a web server added to the environment). 11.3.1 Perform ex...
I have just deployed a Turnkey appliance which comes configured with a self signed certificate. This is a server that only I will be using, so I don't want to pay for a certificate. If I add this certificate to my web browser's Trusted Root Certification Authorities store: Will it protect from a MITM attack if the atta...
Say I have a computer with 2 operating systems: one secure, one... not so much. Now say I want to use the insecure system to do some work I can't do on the secure one. What is the best way to isolate the 2 systems so that if one system goes completely nuts the other system cannot be harmed in any way, shape, or form?
I recently registered for a website and received an email that said "Thanks for registering, here's the username and password you used to sign up". The webmaster assures me that plaintext passwords are not stored in the database, but even if the plaintext is only kept long enough to send the email, that's still a bad s...
I've read that a malware found by kaspersky was compiled at the moscow time zone. How they know the time of compilation ?
It's my understanding files kept on Google Drive are not protected. I would like to have them encrypted so that to be able to view or modify them one must enter a password. I foresee a potential dilemma: the computer must have the encryption/decryption tool to do this, thus defeating the portability of Google Drive. A ...
What are the security checks that I can make on a PDF file being transferred between server and the client?
I am reading up on PHP's crypt() function. I have a few questions on it - What is the significance of the trailing '$' sign at the end of the salt string that I see in most examples. The manual doesn't specifically say anything about ending the salt string with it. Is there anyway I can extract only the salt portion ...
I'm trying to implement, as an exercise, a protocol based on the cipher suite ECDHE-RSA-AES256-GCM-SHA384. As I understand things, ECDHE is used for the key exchange, RSA for the authenticity of the ECDHE public key, AES (in GCM) for encipherment, and SHA to get a random-like key to use with AES from the ECDHE derived ...
Wanting to go a step further into reducing the attacking surface from my "register new user" form I think on using reCAPTCHA (the one Google offers). Having bots sorted out from being able to register and hence not being able to easily break my website seems good. And to what I understand reCATPCHA helps with keeping a...
I own a set of REST APIs and some of them don't require users to be authenticated. Example could be: api/items/index of an e-commerce". Currently, I use Cookie-based tokens from my application, but only for secured API like edition of an item: api/items/2/edit for instance. What could prevent anybody to track...
As with a large amount of open-source softwares, (Debian, Eclipse, PHP) you can apply to become a mirror of their site/downloads. I fully understand that this helps them with bandwidth and distribution. However, what stops people uploading malicious copies of the software to their mirror? I know some sites offer MD5/SH...
I would like to know why, by default, Windows set an audit rules on svchost.exe ? While it's used only when auditing is active, i don't understand why there's a special treatment for this file since auditing is disabled by default anyway.
Consider a scenario where my service is using a keystore made of self signed cerificate and the load balancer which is balancing traffic for service is binded with a CA approved certificate. I would like to know when communication starts between Client, who responds to client with the certificate ? will Service respond...
I view certificates of https://www.google.com.ua/ So I thought, when requesting via cURL, if I point by CURLOPT_CAINFO to those certificates (GeoTrust Global CA and Google Internet Authority G2 in a bundle or whatever), the validation of google's certificate would be passed. But the only CA that does it is the Equifa...
I'm trying to learn some things about REST apis and one of the topics that I'm having some trouble is security. I'm using angularjs for web interface ans slim framework for the php api. I've read some articles (I liked this one) and started to implement HMAC following this tutorial (not exactly the same steps). I would...