instruction
stringlengths
24
29.9k
I'm looking for information on what NSA suggested for use in commercial systems in past times. 90's and early 2000's. I'm mainly interested in PKI and symmetric cyphers for SSL and file/disk encryption.
I need to generate a RSA key pair with Javascript. This key pair will be used for encrypting a one time blob of data (20-100kb), then discarded. This data can be reduced to a couple of hundred kb or less if I only encrypt data that needs to be secure and not other resources such as image files for the application. Shou...
This page says: self-signatures must not use SHA1 You can check this by doing: gpg --export-options export-minimal --export <keyid> | gpg --list-packets |grep -A 2 signature|grep 'digest algo 2,' If you see any ‘digest algo 2’ results printed, then you have some self-signatures that are using SHA1, as digest algo 2 i...
I recently read that NOT using loadable kernel modules could increase security. In my interpretation this consist about recomplying the kernel with only built-in kernel modules. (how to disable loadable kernel modules support? - in various os, like: debian, fedora, openbsd, etc.) Q: Is this true? Or are there any worka...
I am using Isolated Storage with the following flags: IsolatedStorageScope.User |IsolatedStorageScope.Domain | IsolatedStorageScope.Assembly How much security will this provide? Are there any vulnerabilities or gotcha's? Note: I am not solely relying on isolated storage. My application encrypts the data, but without r...
According to the documentation for the "diskscrb" command for wiping conventional hard drives: http://www.forensics-intl.com/diskscrb.html "Conforms to and exceeds the Government Standard set forth in DoD 5220.22-M. Can overwrite ambient data areas 9 times. (Each pass involves 3 separate writes followed by a verify pa...
I'm not so bad at mathematics: I know what are p-list and p-combinations, I know matrix algebra, I know what a XOR is, I know how to tell if number is a prime, etc: I'm not the programmer who hates math because he is bad at it, but I don't have a PhD eitherway. I'm not bad a computer sciences either, well at least in t...
Possible Duplicate: What is the difference between an x.509 “client certificate” and a normal SSL certificate? I'm getting really confused with WCF and certs. I have a WCF service which will run on a server w/ SSL enabled. Now, when i configure transport in WCF i have the option to specify a certificate. Do i need t...
I really enjoy computers - especially security. That's why I went to a school profiled as technical/IT. However, they teach crap. They don't know anything after the release of windows xp/2003. When one of our teachers told us about the dangers involved with a ping of death I gave up on trying to learn stuff from there....
Is AES a good choice for protecting a key stored on the computer of a user of my application? I have seen threads on hashing passwords that suggest using slow algorithms for defending against brute force attacks. Also, any recommendations on what parameters I should use for RijnadealManaged, such as padding algorithm, ...
Possible Duplicate: Do non-keyboard characters make my password less susceptible to brute forcing? Every article on password security that I read tells people to make the password more complicated by using a wider range of characters. They say don't only use a-z but also mix in some A-Z, numbers 0-9 and some punctua...
I've been tasked to setup a secure platform, where I've been asked to assign personal SSL certificates to administrators, and have the server only allow persons into the administration areas that have these specific certificates. We're running Windows Server 2008 R2 Web, with IIS 7.5. I know how to turn the SSL certifi...
A little background info here: I'm a self-taught web developer with very little experience outside of html/css, and the company I work for has hired a third party web development team to design us an e-commerce site. Anyway, I was beta testing the site today using the TamperData Firefox add-on, and I found two major de...
Possible Duplicate: What are the career paths in the computer security field? I've been called a "jack of all trades" guy, who has been working in health care and finance for about seven years. Most of my positions, including my current one of 3-4 years, has had a strong concentration in security. I've been trying ...
I am looking for a distance education program with the end product being a Masters of Science in Digital Forensics. I looked through the site and did not find any results, and was hoping since most people here are in the industry, someone might know a couple more. I only know UCF's Msc in Digital Forensics, and even t...
It seems as if most Linux systems use either /sbin/nologin or /bin/false as the default shell for service accounts. Many hardening guides, such as CIS benchmarks, recommend changing the default shell for these accounts to /dev/null. While many recommendations have an anslysis attached, this is one that I have never see...
I am sys admin working with a development team who is extending a publically accessible .net web app that currently uses forms authentication with usernames/passwords (hashed) stored in a sql database. The developers would like to move from crystal reports to SRSS and they tell me that AD authentication is a requiremen...
The Question: Are there any major security risks I should be concerned about, caused by installing Windows Server 2008 R2 onto a Linux Host in VirtualBox? I run an Ubuntu box, with a fully-secured iptables setup, which blocks all external traffic except for one or two ports which run an OpenSSH server (which requires k...
I know there are many security frameworks and "building" a security framework is a bad idea. In the recent project I have worked on, I used spring security to secure the web application. In the process, I over rided/tweaked some spring security classes to fit my requirement. My management now wants me to "takeout" the ...
I want to put some parts of my secret data into specific file with Steganography method. Is this method as safe as other encryption methods like RSA or SHA?
I run a small local gaming website with a custom admin panel I coded to let trusted members do administrative tasks through the software's API. Since their IP Address is dynamic, can I authenticate them to the admin panel through their MAC ADDRESS ? Or any other practical solution. Note: I run a windows server 2008 R2...
As storage technologies change over time, using different encodings and remappings to deal with sector errors, the best way to permanently erase/wipe/shred data changes also. Methods for flash drives and other solid-state drives are covered nicely at Jesper Mortensen's answer on SSD erasure. Various methods for hard dr...
All the FAQs, documents and statements published by AWS aside, did any Level 1 merchant or service provider actually achieve PCI compliance on AWS yet? We're evaluating moving some of our services to EC2/VPC, but our auditor is saying that AWS hadn't been cooperative when their other clients were trying to achieve comp...
The basic premise behind a "keep me logged in until I log out" feature is a cookie is stored with some identifier that is used to log the user in again when returning to the site. While these identifiers are generally quite long, isn't it conceivable that an attacker could - forging a cookie - randomly guess identifier...
I wrote some code that does PIN encryption/decryption according to rules in X9.24. It works great with examples provided in ANSI doc, but doesn't work with actual device from the client. Where can I find more sample data to run my code through, to make sure that my code is correct? Is it possible that some device manuf...
Suppose we have code like this: struct somedata { int a; int b; }; struct somedata *data; /* ... */ data = malloc(sizeof(struct somedata)); data->a = something; Now, as you can see, NULL pointer check is missing. The question is - does this have security implications in case malloc fails? Let's assume the proces...
I've been reading on various sites how PC get infected by viruses and I got: Email attachments (but of course, only if I get an exe and open or execute something, right?) Don't update windows Downloads (the same as email attachments, right?) Pros: I can't think of any worthwhile. Cons: Lose my time and attention w...
In the United States, there has been a lot of talk about creating a secure polling system that would operate over the internet. I have also heard that Securing a poll over the Internet is impossible. The system would need to be secure enough that politicians could make policy decisions based on voter decisions and be (...
I'm trying to figure out if it is possible to traverse across drives or shares. If I have a path that is concatenated in a web application, where the prefix is a drive, such as this: var path = "D:\" + Request.Params["directory"]; Is it possible to use special characters or any other methods to get a reference to the...
Ignoring the top 5-10% of port numbers for common services that are the commonly targeted by port scanners (i.e. ports 22-ssh, 23-telnet, 80-http, 139-smb/cifs, 443-https, 3389-rdp, etc.), are the balance of the port numbers scanned in a statistically random way? In other words, for a random IP (i.e. the IP of someone...
Possible Duplicate: In what scenarios is relying on source IP address as a security control acceptable/unacceptable? If a website has a page which only renders for certain IPs, is there anything an attacker could realistically do to access such a page?
I recently forgot my password for our cable provider online account, only to discover that they sent it to us via plain text in an email. I quickly sent an email to customer support asking them if they were storing passwords in plain text in their database. I actually got a quick response back from one of their softwar...
The company I work for sometimes intercepts employees ssl connections to https websites by making the ssl connection on their behalf from a proxy, and then using the own generated certificate to send the page to the user. Obviously this only works because they installed their own root certificate on the employees PCs b...
It is often shown that non-executable data segemnts are possible to bypass through return-to-libc attacks. It's evident on /bin/sh but is it also possible to invoke a remote shell?
Am I wrong to think that scrypt(bcrypt(password)) would be better than using sole (s|b)crypt? Especially when considering two different key for the two algorithms. I am also interested in some papers.
When looking up security risks on the net I find that all research being cited (if any is cited) always seems to come from the Anti-Malware companies. (just e.g., this article cites F-secure, AVG and McAfee). I mostly do "research" of this kind to check how dangerous the latest IT security headlines in the media really...
When the passwd command is executed, it runs as the root user. Can't this be exploited? If not, why?
I would like to get a live feed of botnet IP addresses delivered from a service and block them under certain conditions. Preferably community based/open source but open to looking at worthy commercial ones too. So far I have come across dshield (Internet Storm Center) and i-blocklist. What are others that I can conside...
Is the native rsync protocol (port 873) secure? Does it encrypt data or credentials? I'm planning on using rsync to store encrypted files in the cloud, I'm wondering whatever the password is transferred in clear.
If a server has a known public key and a Diffie-Hellman exchange is performed and signed by that key, is there any benefit to authenticating the client before establishing a secure channel instead of after establishing the secure channel? It seems to me that signing only one side of the exchange still prevents a man-in...
Possible Duplicate: Protecting WordPress installations anybody knows how to protect your WordPress website from online pharmacy spam, even after deleting all spam files and deleting spam records from DB it returns back after a while
I want to protect a couple of Apache webservers against forceful browsing. Lately there have been multiple scans querying for non-existent applications on them like phpMyAdmin, notably known for their weak security record. This is starting to decrease the performance of said servers and I'm searching for ways to protec...
I was trying to design an authentication system that would make it much harder to guess a password via brute force, and reduce the risk to a user if the hashed password was stolen through a snooping based attack. Also, since my client side code will be easily view-able by those wishing to see it (it is in an interprete...
I called customer service of a well known company and discovered that the operator had the ability to view my website password in clear text on her screen. I asked her about this and she defended the policy saying it was for FCC (Federal Communications Commission in the USA) compliance. I've never heard of this require...
Is it possible to test for SQL injection vulnerabilities with using sqlmap with a url that is using mod rewrite (or something like it) to make the urls clean? I know how to test my sites that have urls like: http://mysite.com/?id=1 But what about my sites that have clean urls, like: http://mysite.com/1
I've been watching more and more people jump on the idea of Telex as a way to prevent internet censorship (e.g. http://www.technologyreview.com/communications/38207/ -- not my comments at the bottom of the article). Halderman says the design is such that it doesn't matter if the location of ISPs employing Telex statio...
I recently learned about a plugin for Firefox called Fire Sheep, which was featured on the Security Now podcast. I downloaded F.S. and began examining it. To my surprise it includes C++ code that must be compiled for the plugin to work. My impression had always been that Firefox, unlike IE, does not allow execution of...
Do we have any good resources on WebServices Security? Any book, pdfs, articles and even the detail answers regarding the securing web services would be appreciated.
Let's say I have a computer. It's a personal computer - the one you'd typically find in homes. In this scenario, it's running Windows XP SP3, although it could run 7, Vista, etc. I have a USB drive which runs as a Linux Boot Disc - with something like Ubuntu, Puppy Linux, DSL... If that USB OS is loaded into the RAM at...
When OSSEC is installed and started, it starts analyzing configured logs starting the date it was installed. Is there a way to have it scan and analyze the full logs?
Going deeper into the previous question on Firefox plugins and add-ons malware risks: Could a Firefox add-on potentially decode and capture the encrypted websites' passwords saved in the browser?
I've observed that several of our users are ignoring messages sent from IT Security managers, and also the system generated "You just sent a virus" notifications. The problem seems to be among people who are not computer savvy, who are in no way hostile to IT SEC. They are simply not "computer" people. What guidance i...
Possible Duplicate: How can you become a competent web application security expert without breaking the law? I was reading this article earlier U.S. government hankers for hackers , and wondered how does one train now a days? In the article there is a quote: "They need people with the hacker skill set, hacker mind-...
I've been benchmarking my TLS performance, and I noticed that during the "write client key exchange" phase, there's significant overhead compared to all other actions. I'm wondering if there's anything I can do to speed this up? 40348.989720O ssl_info_callback SSL_connect SSLv3 read server certificate A 140348.989934O ...
Internet Explorer has a security feature called "Zone Elevation Protection", in which sites outside a list of trusted sites (which can be configured) are not allowed to navigate to the ones on the list. Is there anything similar to that on Google Chrome? I know a similar protection does exist for treating local files, ...
Possible Duplicate: How are browser saved passwords vulnerable? How secure are the password managers that are built into modern web browsers? Currently I use lastpass plugin as I believed the browser based password managers were not secure. It is also the solution that I promote when friends and clients ask me about...
One of my friends, she has a lot of friends on Facebook, and uses it for marketing. Her account keeps getting broken into. Her password gets reset and/or gets locked for changing resetting password too many times. So basically, what happens is this one user/virus/trojan whatever somehow manages to request a password re...
I am looking for a framework/solution for authentication/ user-login management/ security in java web application that can make the naive developer's job easier/faster and make the application relatively more secured against potential threats. P.S. : I'm using JSF 2.0 as the front-end development framework in my we...
As Powershell becomes more and more popular, it appears that using WINRM may end up being a better option than using PSEXEC from SysInternals for remote management. Given that WINRM is disabled by default, however, I wonder what type of security holes it would create to enable the service on all domain members. Obvious...
Help! I created a hidden partition within a harddrive encrypted using truecrypt, and instead of creating a second partition, it seems to have deleted all of my data instead. what did i do wrong? I simply followed the instructions on creating a hidden partition. my only mistake was using the same password as the outer p...
If you have an SSL certificate for a web site, is it necessary to make the ViewState more difficult to decode. Without any extra development, it appears that ASP.NET encodes it as a base 64 string. I found some sample code to easily decode this hidden field "__VIEWSTATE". Doesn't SSL encrypt this (along with other t...
Today, Moxie Marlinspike, a security researcher famous for his research on Android and SSL and related protocols (author of sslstrip/sslsniff), released "Convergence" which says is "an agile authenticity replacement for SSL" and attempts to address the problems the that are created by the idea of trusted Certificate Au...
I am attempting to sandbox some untrusted processes using Linux's MAC frameworks -- either SELinux or AppArmor. I see that both SELinux and AppArmor allow the selected granting of socket level access to the program being sandboxed. However, is it possible to perform finer grained control, such as restricting network ac...
Possible Duplicate: Which type of encryption algorithms android supports, and which would be better? I am confused about to use of DES. Triple DES, RSA and AES algorithms, I think I couldn't get more idea about them, so I am not able to think which algo would be better. My Task : I am developing an application who s...
Having learned a bit more about what add-ons/extensions can do in Firefox, I want to minimize my risk and use some safer mechanism to download videos (FLV in particular) for later viewing. Considering the question What are the security implications of people downloading addons, wrongly thinking that they are safe?, is...
I work in a growing, family owned business. The company has 300 employees and has landed some big clients who require major policy changes in order to give us their continued business. Among those changes is the development and implementation of a security policy. I work the IT help desk and since I just took and passe...
The NIST defines a vulnerability in RIM Blackberry encryption discovered last October. Apparently, Blackberry's flavour of PBKDF2 was weak. They say: The offline backup mechanism in Research In Motion (RIM) BlackBerry Desktop Software uses single-iteration PBKDF2, which makes it easier for local users to decrypt a .ip...
I am interested in finding an antivirus program for the Mac, but not one from Symantec, because I don't trust them. I wonder if perhaps there is an open source solution for antivirus for OS/X? Or how about just an open source program that can monitor the system looking for suspicious behavior, like outgoing connection...
I have a customer with an Access database (ugh!) in which credit cards are stored in plaintext (yikes!), so amongst other changes I'm doing in the app, I'm applying some encryption in there. I've used Rijndael as the algorithm of choice, but I'm struggling to find the correct approach to storing the encryption/decrypti...
In reference to this Network Computing Report article titled "'Operation Shady Rat' Perpetrated Five Years Of Long-Term Attacks On Government, Enterprises" The Cliff's Notes to the article is thus: it has been discovered that many countries and large corporations have been the target of long-term, concerted attacks. Th...
This question would be in the category of SmartPhone Sniffers. So we have sniffers that can show the packets that are being sent across a wired or wireless (802.11) network. I am just performing a basic research on GSM Sniffers and I would like to know if there are tools available for monitoring the space for specific ...
Does anyone have any experience with outsourcing security code review via freelance sites (like Rent-a-coder, Elance, Guru, Getafreelancer, etc.)? Is this effective? What are the best practices? Are there any pitfalls? Does anyone have any recommendations or lessons-learned? Are there any resources or readings to ...
Fuzzing is a convenient, relatively low-cost way to detect some kinds of vulnerabilities, particularly in C/C++ code. My question: How much fuzzing is enough? Are there are any standards or best practices? Example: Microsoft's SDL requires that applying fuzzing to security-sensitive code that parses file-based input. ...
First time poster here, hope to be around more often. I'm in need of a cryptographically secure 'stamping' system that allows not only time but also location to be attached to data, while still resistant to forgery. However, short of altering the very GPS protocol itself, I can't think of a way to do it! It may be enti...
3G, GPRS or other mobile-based connection. Because it seems like it's easier to intercept, than, say, land-based connection or encrypted WiFi. If it matters, the transaction I want to perform is Android Market/Google Checkout transaction. How do I know if it protect my data?
I recently setup VSFTPD on my personal server for sharing files over FTP. In the vsftpd.log file, i see hundreds of failed attempts to login with usernames like "adminitrator" , "adminitrator1", "adminitrator2", "adminitrator123" etc. I am surprised because i just setup my FTP server and i thought no one would know abo...
I know a few people with pretty weak passwords. What kind of systems exist to prevent dictionary attacks? Would it make sense to restrict the number of connection attempts in a certain timeframe? Obviously a strong password would be the best system, but most private networks do not take much consideration into setting ...
I was reading through the answers of the question "How can I ensure that I connect to the right wireless Access Point?" and was wondering how it is possible for an access point to imitate another wifi network assuming I use WPA2. I read the wikipedia article and it looks like that the PMK (Pairwise Master Key) is neve...
If young hackers can detect them, why can't security analysts get and patch them? Also, I dream of finding a vulnerability in a major software, like IE or Chrome. Is it easy? Is it systematic or is it random? What books do I need to read to detect them in due time? I now know how to program in C/C++/Java. I can easily...
In my other question, I explored whether to write my own encryption or use an existing one. I was advised to use TLS or AES or something that is established. This question is about key rotation. It seems that given enough resources, an eavesdropper might could decrypt information, but by the time he arrived at the decr...
I need to (try to) solve the problem of new account creation for a patient portal for a medical records system (electronic health record). That is, a way to activate a patient online and match her against her medical chart. Let's assume that most patients will not have an email address listed among the data that I alre...
As the company's security department, our system administrators ask us what they need to log for SIEM (Security Incident and Event Management). We don't have any prepared documents and are seeking something that combines the combined wisdom of COBIT, PCI, etc. in a way we can present to other departments.
I read on wikipedia that the AES with cipher block chaining and a 128-bit key uses blocks of size 128 bit to encrypt the data. However, it also said that with a 192-bit key, there were still 128-bit blocks. is this true? If yes, why is this the case?
During a Q&A period at DEFCON this year, one member of the audience mentioned that we're using "fake salt" when concatenating a random value and a password before hashing. He defined "real salt" as something seen in the original Unix crypt implementation that changed how the algorithm ran, thus requiring different code...
In the question about real vs. fake salt, the answers describe how real salt 'perturbs the encryption algorithm.' I know roughly how initialization vectors work; is this the same concept, or something different entirely?
Background My company is currently in the process of rolling out support for the iPhone. As a part of this rollout, they are requiring employees to install an application on their phones that allows IT to push out profiles to the device in order to enforce things such as password locks, backup encryption, etc. Howeve...
I know that obviously we must avoid sql injection attacks through user input validation and parametrized queries. There's already a firewall in place on the database server to limit remote connections to be accepted only from the web server. Would it also add value from a security standpoint to limit the actual dat...
Everyone says that you need to use a non-reversible hash when you store passwords so that even if your database is leaked, the passwords themselves are still safe. I'm wondering if there is anyway to use reversible encryption to store passwords. At the very least, you would need to require that any exploit that leaks t...
I am analyzing the traffic of a VOIP application. I started up wireshark, and made sure no other application was using internet, and then had a a voice call on the application. Wireshark captured some nice UDP packets for me. I did that three times for voice and three times for video. Now I want to analyze the traffic,...
Suppose in a C++ program I use a memory region for temporarily storing an encryption key and don't overwrite that region afterwards. Then my program wants to send a data packet over the network. Due to an error in code it reads not only the prepared data packet but also an adjacent memory region and the latter happens ...
My current understanding is that sniffing traffic on 4G (lets use Wimax and LTE for the purposes of this question) and 3G is not a simple matter and either requires you setting up a fake base station that people connect to or having insider access to the Carrier (physical or logical) Here is an article today on Defcon ...
I'm working on encryption techniques on SSD's and my question is: does the erase before write architecture of SSD's has anything to do with the encryption technique? What are the problems I might face on implementing hard drive encryption to SSD's?
There seem to be so many ways to create nefarious input that white-listing what input is good usually feels like the safer, simpler option. For instance, one can fairly easily craft a white list regex that includes good things [a-zA-Z0-9], but this seems to fall apart quickly when considering international content. ...
How accurate is this XKCD comic from August 10, 2011? I've always been an advocate of long rather than complex passwords, but most security people (at least the ones that I've talked to) are against me on that one. However, XKCD's analysis seems spot on to me. Am I missing something or is this armchair analysis sound...
Has anyone ever had to deal with an unauthorized laptop accidentally getting Top Secret level data on it? How did you quarantine the system. Were you required to turn in the entire laptop or were you able to destroy/format the HDD? NISPOM says that incineration or physical destruction of the HDD is required, but I just...
I want to save videos in my android mobile's SD card securely such no other application or user can use it, outside the application or on any other devices. So for this what can I do? I think about storing encrypted videos to sd-card. Can you suggest which encryption/decryption is better or any other method which I can...
Typing on a smartphone is tedious. Special characters are the hardest; lowercase letters are generally the easiest. But even a long all-letter passphrase like "correct horse battery staple" is difficult to type on a smartphone. I normally use LastPass on my computers, and let it generate long passwords with a mix of le...
I want to implement a security scheme in a new network configuration. There are two buildings for the client: Office Building 1 (OB1) with address 10.0.0.0 / 255.255.255.0, Gateway 10.0.0.1 ( Router1 Zyxel ). In OB1, is installed also the domain controller ( 10.0.0.250 ) where the users of OB1 have already joined to. ...
Is there some online forwarding service that I can give HTTP GET parameters to, and it would create a form with the parameters and submit it as POST? For example, I'd like to give someone the URL: http://imaginaryservice.com/http://reddit.com/post/login?username=guy&password=fawkes ...and when they click it, it should...
Some time ago, probably about 6 months, somebody hacked my email account and used gmail settings to forward my emails to him/her. I noticed that, removed the forward and changed the password. Now, I use another gmail account for my paypal account and I never had a paypal account on my hacked gmail account. I logged in ...