instruction
stringlengths
24
29.9k
A developer managed to open a console application with NT Authority/System rights at the startup screen before logging in. From that command prompt it is possible to execute arbitrary programs like Notepad, Internet Explorer and even Explorer to get a start menu. With those local System rights, is it easy to acquire do...
I have to read http/https messages sent from a client system and see that the messages are not being modified within system by any malware and the server receives what exactly the user wants to send. For Example, a User in an online Banking Transaction wants to send Amount $100 to Account 'A' and lets say that the mess...
Considering the classic scenario of Eve trying to listen in to Alice and Bob's conversation, if Eve can intercept messages between Alice and Bob but with no access to their computers would Timing attacks be possible? Am I right in saying it isnt possible because say Alice sends a message to Bob how will Eve listen in t...
We have a public ftp server that is being probed by the usual Chinese brute-force scans. They are probing vsftpd. Notmally a failed login to vsftpd looks like this in syslog: Mar 17 15:56:07 cache0001 vsftpd: ftp_set_login_id - unable to esd_decode: root Mar 17 15:56:07 cache0001 vsftpd: ftp_authenticate failed - inva...
I have the following situation and want to know what are the best practices to do such things without exposing myself to security issues I have two servers both use the same private key for login. Server 2 copies files to Server 1 via scp (currently I save the private key on Server 2) If any hacker ever gets control...
With today's technology, is it possible to locate a cellphone's location just by ringing it, kind of like what we see in movies?
I am trying to perform a simple penetration test on the DVWA (the web application that has been specifically designed to be vulnerable to some of the most common web application attacks). I want to use ModSecurity WAF to protect this web application from SQL Injection attacks. I am using Apache web server to host my we...
I need to embed a unique ID hash string in many types of files, and then verify the hash string inside the files later on remotely. Is there a best practice for doing this?
I've created a C# program that encrypts and decrypts a file. The encryption method is DES. The program is exactly the same as in the following link, except that the part that removes the key from memory has been commented out: How to encrypt and decrypt a file by using Visual C# My question is, after running the progra...
Is there a way to trigger alarms in an Intrusion Detection System with something similar to the EICAR test virus? Maybe some special packet that is harmless to the environement, but will trigger IDS? I am asking this in the context of a SE rogue device dropping senario, where the device trys different tunneling protoco...
You probably know that even when you use a VPN service, browsers like Chrome and Safari can still somehow provide your real location to Google Maps etc (if you give it a permission). My question is: how to hide my real IP from the browsers? Maybe some additional security software can be used to achieve it?
I have looked for the answer to this question to no avail, apologies if I missed it. I would like to know how effective iptables would be against MitM attacks - in the following setup: ALLOW INPUT {only one IP address} DROP All Else Anywhere I guess what I am asking is, would it still be possible for someone to masq...
There are very few websites that hash the users password before submitting it to the server. Javascript doesn't even have support for SHA or other algorithms. But I can think of quite a few advantages, like protection against cross-site leaks or malicious admins, which SSL does not provide. So why is this practise so u...
If I got an SSL certificate for my website and use an SSL secured connection (HTTPS), is this safe enough to send my login and password data or should I add some encryption or hashing? And how safe is SSL against Man In The Middle attacks? Can they grab or even modify the data sent and received over HTTPS? And what abo...
Background: I have little knowledge of hashing and encryption, so please bear with me. I have posted a related question here: https://softwareengineering.stackexchange.com/questions/232261/options-for-client-side-encryption-of-local-web-databases for the programming perspective, which may give some background. That qu...
From my understanding of Intel TXT, the technology can be used to put the processor in a trusted state where measurements can be performed. My understanding looks something like this, where I believe TBoot is typically used to launch SINIT. However such that SINIT is not called and the OS is brought up in a miscellan...
I have a C++ application with an algorithm, whose usage I want to protect. The application needs several input data files to work (those may change for each client). My goal is to allow only unaltered input data files which were registered for use. My current thoughts are: The client has the input files as text Calcul...
I have a login system created in PHP. It currently doesn't have the "forgot password" feature and I would like to implement the feature. For this I'm planning to do the following: When user submits the form with email on "forgot password" page, an email with a unique token of 50 characters is sent. The unique key gene...
We have many Linux servers in several co-locations over the world. By design, these machines generally should not be able to access the Internet. Depending on location and role, some sites may have very limited Internet access (e.g. default deny with one or two sites white listed). So depending on the circumstances,...
I'm currently studying the A5/1 algorithm used for GSM encryption. I understood how thanks to the symmetric private Key and a public counter frame one can encrypt the communication between A and B. However, what I don't really understand is how the symmetric private key K is managed ? If A wants to communicate with B. ...
I am developing a script to perform an a buffer overflow for an assignment in school. However, I am stuck at a point where my payload works injected through the commandline, but not injected through my python script. When I inject my payload from the commandline: user@ubuntu:~/Documents/$ /home/user/Documents/easy $(...
Assuming I have a server/client topology, currently I'm facing the problem that I want to generate some key on the client side and somehow make the remote server get it securely. I'm using AES on both parts, so basically what I need is to generate a random IV and a random secret key, but how to share it with the serve...
I am using Explorer as my browser. What do I have to have on regarding the TLS and SSL protocols. There are several of each one.
I'm reading this pki article and as you can see near the bottom, the quick animation and description: The sending computer encrypts the document with a symmetric key, then encrypts the symmetric key with the public key of the receiving computer. The receiving computer uses its private key to decode the symmetric key. ...
Is it possible that a neighbour could see my traffic (*), when we both have cable Internet? Or: Under which conditions might this be possible? I would assume, "Never!", but after reading these two answers, I’m unsure. At the Server Fault question ISP broadcasting all IP-packets, so I can see traffic of other clients fr...
An answer to this question says Facebook generates a bunch of password guesses to see if they hash the same as a previous version of the password. Why bother? If a service forces every password to have sufficient length and complexity, why should it care if the changed password is similar to the previous password, sin...
128-bit entropy is required http://nxtra.org/nxt-client/js/passphrasegenerator.js With all new browsers (Chrome, Firefox, IE 11) it uses crypto.getRandomValues which should be safe, but with IE 10 (and older) it uses random mouse input from the user combined with Math.random $("html").on("mousemove", function(e) { ...
right now I'm thinking about how to secure some data inside an Application... Now i have the following problem: Is it possible to generate the passpharase from a decrypted message and the same message encrypted with AES and the passpharse? Example: The decrypted message is : "Hello" The passpharse is: "you" And the enc...
Using the following files, I have attempted to restrict the SSH remote login. Having lack of knowledge in linux environment, I don't know the drawbacks and vulnerabilities between the following ways. So I want to know the internal works between these files and process. Experts please share your experience with me. SSHD...
I am new to mainframe security testing practice. So far I have read a few articles on that even security of mainframe can be compromised. I would like to know if there are any such checklists that the security tester follow while testing a mainframe application.
I recently had a situation where I lost an old private key (write error; realized this too late). In regenerating keys and replacing the public keys on various sites, I noticed that the public keys were identical. I did use the same key size, algorithms, and passphrases as the older set, but I thought that there was su...
The UK is getting a new £1 coin. Its designers, the Royal Mint, claim that unlike current coins, it includes built in technology for high speed authentication and verification everywhere from ATMs to vending machines and point-of-sale. How does this work? Something like RFID? Does this mean the coins (and therefore ...
What are the problems that Chip card technology solve? and what are the problems EMV solve? I understand that EMV is a standard where as chip card is a technology, It's pretty hard to tell them apart (can we refer to EMV & Chip Card as the same thing?) What are the problems that having a chipcard or an EMV standard c...
I know many banks using Windows XP on almost computers for staff working, WinXP has many security vulnerabilities. But rarely seriously problems occured with thier system. Is there good Firewall and IPS Solutions was seperated thier system from outside? Any kind of attacks in real time could be affected this systems? T...
I try to design a system which reads events comming from devices, stores them and exposes API to various applications. Originally I wanted to introduce a module Id translator, so I would store only anonymous device id in a database. It would be then protected from unauthorized data harvesting. Then I wanted to have ano...
Absolute persistence technology amounts to a persistent rootkit pre-installed by many device manufacturers (Acer, Asus, Dell, HP, Lenovo, Samsung, Toshiba, etc) to facilitate LoJack for laptops, and other backdoor services: The Absolute persistence module is built to detect when the Computrace and/or Absolute Manage...
As I'm sure many of you have heard, the end of support for Windows XP is the supposed apocalypse for ATM's worldwide. I am cognizant of the fact that this ensures that no more patches are issued, and that banks need to take that threat seriously. I'm having a hard time identifying potential attack vectors and to me it ...
note: Title edited to make the answer more useful to a wider audience I'm reading source code for encrypting files with AES GCM and see the following binary output. AdditionalAuthData IV Encrypted Data Tag (16 bytes) --------------------_____________------------------..... -----------...
I am trying to build correlation/ potential red flag rules to detect if passwords are being shared or stolen... the primary driver for this is guidance from our compliance team, that much of our frauds in payments have arisen because of deliberate sharing or theft of a co-workers credentials (e.g. in maker checker etc)...
I understand that non-repudiation is based upon public key cryptography and the principle of only the sender knowing their own private key. However, what is a condition, if any, of non-repudiation that can never be proven through digital analysis? This digital analysis would include inspecting the message and logs. I a...
I've been considering proxying all web traffic on my network transparently through Tor and dividing up my bandwidth to share with the rest of the Tor network. Practically speaking, what are some of the reasons why one shouldn't do this? Obviously bandwidth is a concern, but apart from this, are there security concerns?...
I'm seeking to understand how Perfect Forward Secrecy (PFS) works for non SSL applications. More specifically, I'm interested in how Moxie Marlinspike accomplishes this in TextSecure and other applications. I've heard that they use a "racheting" protocol which gives each session its own specific key which prevents a co...
I'm interested in learning about secure system design - the whole stack. Currently, I'm an expert .net/C# developer and I know about the differences between different hash functions, public/private key encryption and similar techniques, but my application is only a small part of the system as a whole. For example, publ...
Is there a way in metasploit to add a custom exe/script as payload to a file (exe/pdf/doxc)? I'm asking this in the context of a SE media dropping scenario, where a file when executed, sends data to an internal server, to register that the file has been executed.
I am designing a REST Api for a mobile application and have some worries over properly securing access to accounts. I am writing the API server in nodeJS and it will primarily be consumed by a mobile client (although a web client may be added in the future) There are 2 main side aspects I wish to incorporate in the aut...
I am creating a log in system. The easiest system would simply check a database for a log in and password, then same a session var which states login=true I am interested in other things that I can do to make it more secure. Here is a general list of things that I have already found. Feel free to use some of these it...
I have a site running on a VPS. I set up the LAMP stack and a few other programs personally. This is only the second time I have set up a VPS and I am a bit worried about security. Are there things that I should be aware of (regarding my Linux install and LAMP stack) which people could use to gain access to my VPS a...
I have used PCs for most of my life, and I am very aware of the fact that they can catch a variety of viruses. I have owned a MAC now for two years, and have enjoyed a pleasant (perhaps too pleasant) experience with it online. Lately, I have been hearing that MACs can become infected with viruses, which makes me wond...
I store my OpenVPN profile (keys) in an encrypted drive but I run OpenVPN inside an OS that is not encrypted. When I finish my OpenVPN session and disconnect, the connection profiles are still there (until I delete them). Is it safe to assume that my keys are not cached anywhere or do I need to go about securely delet...
Suppose I have a script that contains my PGP private key in plain text and requires me to manually type in the key passphrase to decrypt some data. Later, I decide that my passphrase is compromised and use gpg to change the passphrase. Would someone that has my old PGP private key and captured somehow my old passphrase...
Over the past few days, I'm noticing that the log of my wireless router is showing an ACK flood attack from various IP addresses. I use a D-Link DIR-600L. I've searched through the internet, also through this question. But I cannot come to any solution. My ISP advised me to change DNS IP addresses and enter them manual...
Noticed it here https://twitter.com/wikileaks/status/446263047812702208 wwwwwwwwwwwwwwwwwwwwww.bitnik.org Is this some security feature?
I was tasked with finding the security features of JRE 1.8 and compare it to JRE 1.7 update 51. When I try to look for new security though, it only shows ">JDK< Security Enhancements" (ie. Not ">JRE< Security Enhancements") for 1.8. Is that what I'm looking for? If not, is it ever documented? So, I'm just looking ...
Recently I've been reading about Web application firewalls and the fact that they protect against most frequent attacks like injections, XSS or CSRF. However, a good application should already be immune against these exploits, so why do companies prefer buying those expensive devices to try to protect (WAFs aren't perf...
I'm thinking about playing with/learning about firewalls. It is easier for me to learn by building, so why not build a firewall? If I run it alongside my normal firewall, I'd get the normal firewall's protection right?
Can you please provide a clear definition for procedural security controls? Are operational and procedural security controls synonyms? Thanks
I've seen many instances where a company or organization generates and uses a PGP keypair for a team or group of people. Most likely they all have a copy of the private and public keys on their individual machines or sign on to central server and use the gpg utility there (all knowing the shared secret key password). W...
I live in a country that the government blocks most ways of accessing to the uncensored Internet (like blocking VPN pptp, l2tp), Luckily there are some very fast services still available like Kerio VPN. But as I found out, It does not seem to be very safe as the person running the service could easily track your activi...
To prevent cross-site request forgery attacks, I'm considering the following scheme: For each user, store a random key. If the user submits any "dangerous" information, include a security token and a creation date in the upload. If the creation date older than T (I'm currently leaning 5 minutes), the request is conside...
We are going to deploy our service, it's drupal based with some additional REST APIs. The drupal servers will be (loadbalanced) put in the DMZ. We think to deploy the REST APIs on an app server in the DMZ as well, including authentication/authorization. We'll have an additional firewall, behind which the database serve...
On some websites, the login page (where you enter your login details) is served by a regular HTTP connection with no encryption. However, once I login, the page immediately switches to a secure HTTPS connection when displaying my account details, etc. It seems that using SSL after the password is entered is pointless, ...
I'm recently interested in having an paranoid level of privacy but there is little question in my mind for which I cannot find an answer. I know there is fingerprint of my browser which it gives away to every website it visit. Being a fedora user with bunch of browser extensions, I'm completely unique according to Pano...
I'm working on a project whereby a certain level of anonymity is required for users. One of stipulations is that no email is used at all, as it makes the barrier to entry too high for people who want anonymity in this service but don't have an anonymous email account to hand. One of the issues with this is that account...
When registering for an SSL cert, I was able to validate that I "owned" the domain I was creating the cert for by having a valid @domain.com email address. If I worked for a large company, say Microsoft or something, and have a valid me@microsoft.com email address, how am I prevented from being able to create a valid S...
Is it possible to keep several files and programs on windows OS after re-installing it? because of someone can steal the device that uses windows OS, then just removes the windows and install another one (cracked or even bought). So you just lose your device and all of the security applications! I think it is really se...
Ok I understand from my research that the Chip Card creates an AC Key(MasterKey+AccNumber) to communicate with the authorizing server securely (3DES key to have encrypted communication) but I don't understand the following.. What's the difference between having the card talk to the server directly and having the card ...
What is the optimal way (cost-wise, too) to secure page forms (https) on a large number of domains&subdomains? Are certificates required for all domains? Is putting all the page forms on a single secured domain -and than redirecting frm all sites to this one- a solution?
What do you think it's the best method to secure a string in PHP? I speak of hiding its content and avoid malicious changes by the user, but be able to recover the information. We can use the open_ssl functions, but I prefer using a simpler solution, more platform-compatible, quicker, and without the need of public/pri...
In most protocols I have encountered in which a passphrase is used for authentication it is stored not in plaintext, but a PBKDF digest of it instead. This is obviously good. However what does not seem to be standard practice is to compute this PBKDF digest on the client-side while registering/updating a passphrase. In...
Let's say that you create a system where a secret is hidden and revealed by a particular key. As well, the key can be broken, but it would take thousands of years. If you keep switching the keys frequently enough that no computer is able to break the key in time, is your system secure? ...well, apart from getting th...
Using proxy software, I was able to bypass a file upload control file-checking for an asp.net system I am pen testing. I noticed they are saving the file into the database as bytes, and it is available for download in my own portal at any time after upload. The thing about this is that no one else can see files I've up...
I have an instance where we have an application that requires the ability to set up sftp commands that are specified by administrative users. They are configured through the front-end of the application. Veracode has correctly identified a directory traversal attack here. I work for a B2B company, and this sftp pro...
Let the diagram below be a representation of a LAN. - let R be the interface between the LAN and the internet. - H be host connected to the LAN. - F be a firewall implemented using a virtual machine controlled by H. - V be a virtual machine controlled by H. - F is also the interface between the LAN and V. - F also bloc...
SSL typically makes use of MAC-then-Encrypt technique instead of Encrypt-then-MAC (which is usually considered ideal for most of the scenarios). I myself don't have a full insight knowledge about the merits and demerits of both the techniques, but based on what I'v read and understood so far, I think using Encrypt-then...
I'm building a desktop app. I'd like websites to be able to communicate with the app over HTTPS. The general idea is that a website could run a JSONP call to https://127.0.0.1:8844 and send data to the desktop app. The problem is that most newer browsers won't let you run a call in the background to a non-authority-rec...
People often recommend PBKDF2 over using hash functions directly, but typically they compare PBKDF2 to a single unsalted hash. What advatages are there to using PBKDF2 over multiple iterations of a cryptographic function with the password and salt appended to the previous hash at each iteration? Pseudo-code: password="...
I got scanned yesterday, and I'm seeing a bunch of entries in my logs like /'\"\\'\\\");|]*{%0d%0a<%00>/photos or /'\"\\'\\\");|]*{%0d%0a<%00>/resources. What specific vulnerability was this bot looking for? The next thing was a bunch of requests for urls like /1%c0%00xa7%c0%a2/about. Not sure what vulnerability was b...
I have a WCF service configured to use two-way certificate authentication on the messages. The server is also locked down through a firewall to only allow traffic from a single IP:Port that the client is also using. Is SSL for the transport layer still a good idea, or overkill?
Use-after-free bugs are a particular class of memory safety bugs. How often are they exploitable, in practice? When you find a use-after-free bug in a program, is it often exploitable, rarely exploitable, or does it vary based upon some other factor I'm overlooking? I'm particularly interested in how often use-after-...
Is the following algorithm, using RNGCryptoServiceProvider & Rfc2898DeriveBytes, sufficient to implement a FIPS 140-2 password hash on Windows Server 2008R2? var provider = new System.Security.Cryptography.RNGCryptoServiceProvider(); byte[] salt = new byte[8]; provider.GetBytes(salt); var iterations = 100000; var pbkd...
I am part of an in-house development team that provides the software that is used in our company's factories across the world for production as well as for order management, and which also enables the sites to share data with each other across our WAN. I have been recently tasked with the following objective to be com...
Every once in a while (when I think out loud and people overhear me) I am forced to explain what a buffer overflow is. Because I can't really think of a good metaphor, I end up spending about 10 minutes explaining how (vulnerable) programs work and memory allocation, and then have about 2 sentences on the actual exploi...
I have a public Single Page Application (SPA) that is calling my backend REST service via JavaScript. How can I secure the REST service so that it will only accept calls from my SPA and no other clients or users? Basically, my SPA should be the only allowed user of the service. Any way that I can think to secure it wou...
I am creating an application that allows a user to create an account, with a password, and have a set of public and private keys symmetrically encrypted with the password, so that they can be retrieved later when necessary, but only if the password is correctly entered. For both the password and the key pair, I am cre...
Okay, suppose that I have 2 computers: Computer A and Computer B, connected with this setup: A->switch->router->internet / B->router/ and the closest router to computer B is configured to block connections from Computer As switch. If computer A is desperately trying to attack computer B, sniffing packets, Mi...
I have a very straightforward question. Is there any downside to logging in as an administrator all the time in windows 7? I mean, it asks you whenever a program asks for permission to do something as an admin so how is this any less secure than logging in as a regular user. One shortfall I see is that as an admin it...
I have tcpdump installed on my iPad which is connected to WiFi (WPA2). How do I capture packets sent/received by other devices on same network? UPD: iPad 1st gen, latest (5.1.x) iOS available.
Parting from the reasonable supposition that "everything can be hacked", I am sure the answer is 'yes.' But is it something possible, or even feasible? I know that aeroplane computer systems are proprietary, but that would be a pretty weak security by obscurity policy, so I assume they have other security measures to p...
We run a mail server (postfix/dovecot/centos 6.4). The hardware is based on a supermicro chasis with IPMI features. It also runs a web interface for accesisng mails(Apache web server ) Recently our DC said that we are sending outbound DDOS attacks which touched upto 1.3Gbps as per their saying. They nulled the IP. Afte...
As a bit of a thought experiment, I've been thinking through how one might design a web application where a user's data (say, from a form on a webpage) is stored, encrypted, on the server, using a per-user key. The decrypted data is shown in a form on the webpage when the user logs back in. I've come up with two potent...
I am aware of the problem of drive-by downloads, which happens when one visits a malicious site and a malware is downloaded to the PC. I want to ask that when such a program is downloaded, how does it manage to execute?
I have written a script to check a given password against a ~65 million long list of passwords collated from various lists released after hacking attempts. I am thinking about incorporating it into the password checking process when a user chooses a password - notifying them that a password is on a list used by hacker...
I am using LastPass for managing passwords on multiple computers. However, LastPass extension (at least the chrome version) is running some opaque binary code through Native Client, and I just feel that I don't trust the company running LastPass anymore, since it's based in USA ( https://lastpass.com/about-lastpass/ ...
I am using following link for arp poisoning our Wireless LAN. http://www.irongeek.com/i.php?page=security/ettercapfilter But the thing is, it is working only for some sites. Even some some http sites are not modified with this. What is the reason behind this? Does the sites any mechanisms to prevent ARP Poisoning?
I get this warning while I decrypt a Twofish-encrypted file in GPG. WARNING: message was not integrity protected. From what I found online, this warning should only come up for CAST5, not for AES256 or Twofish. Why does this occur? And is there a way to prevent this warning? I use GPG on Ubuntu 12.04 GNU/Linux.
I currently have Implementing SSL / TLS Using Cryptography and PKI Joshua Davies. It is very recent and covers even newer TLS version 1.1 and 1.2 and ECC. It is based on many C sample that are dedicated for this book and apply more for people wanting to develop or extend a tls stack understanding deep internal crypto,...
As far as I know, SOAP services have security standards recognized by OASIS and W3C, such as: XML-Encryption XML-Signature SAML Are there any security standards for RESTful services?
I've already assembled a lab consisting of Kali, Metasploitable, and a Windows XP machine, but are they're any premade lab solutions available that offer up a bit more complexity or even predesignated goals? I am aware of different services that will allow you to VPN into a network, but is there a free/cheap alternativ...
one of my friends wants to deposit money into my other friends bank account. obviously she needs the bank account number to do this. Can she access any other information in with just the bank account number, like the balance or anything? Also does online or in-person deposit make a difference?
In my website, a user can upload his profile picture. After analysis of some pictures, I have found some pictures with malicious PHP code, just like the upload script. As an example, I have found a single line code of PHP: <?php echo $_GET['a']; ?> So by using this code, if he can upload this picture as a .php file, su...