instruction stringlengths 24 29.9k |
|---|
I am curious to know how secure my passwords are.
What password cracking software is commonly used?
Preferably open source.
EDIT: I am actually looking to crack my passwords used on services I don't own.
Obviously, this means that I don't want to actually attack the service..
Is there any piece of software that would ... |
What are some typical ways you guys retire hard drives? We have a hard drive that won't mount anymore (makes clicking sounds when it tries to mount). The data on it isn't necessarily sensitive (no financial records or the likes) but it does contain data that once belonged to an employee. We obviously can't mount it to ... |
Cryptographic primitives usually assert some security level given as number of operations to mount an attack. Hash functions, for example, give different security levels for collision attacks, preimage attacks and second preimage attacks. From these, "safe" key sizes are derived for different primitives.
There are many... |
So, I work in this small company (10 people) where we do stuff in programming, for various platforms. I started recently working there (2 months) right after I graduated. My work is not exactly programming related, but I have enough knowledge to do some intermediate level programming like writing scripts in bash (I use... |
A popular way to login to iPhones and other phones is to use a "connect the dots" password. For those unfamiliar, it looks something like this:
Is this kind of passwords secure from brute force attack (I'm excluding things like social engineering and just looking over their shoulder)? Note that this question is focusi... |
I was just reading a discussion about cracking passwords that said the person running the tool might know things about the target like the birthday of his first girlfriend's dog but the tool won't.
This got me thinking. Are there password guessing tools that can include as input a list of known facts about the target, ... |
I've been thinking about ways to focus brute forcing dictionary attacks on passwords and passphrases based on the assumption that certain words, combinations of letters, and combinations of words are more common in passwords and passphrases than in general text.
In combinatorial dictionary attacks it seems to make sens... |
Possible Duplicate:
Servers for penetration testing
I'm in a process of learning security of networks and websites.
I already practised code reviewing but I want to perform exercise.
Is there any online resources to get our hands dirty instead of just looking at code and word for learning web security or network se... |
I tried google search but I can't find good resources to learn how to use the metasploit framework.
Where would you suggest a beginner go to learn about using metasploit?
|
Does anyone know if there is any good reasons not to allow Dropbox installations on our client PC's? All the PC's have antivirus installed and running. I know it is an additional attack vector to spreading files, but the kind of risk I am specific worried about is automatic spreading due to synchronization of files.
Ca... |
There are a lot of questions on storing credit card information, and of how PCI SSC/PA-DSS regulations apply to such activities and systems. I have read a lot of these, but my question relates to a different question that may or may not have anything to do with PCI compliance.
My question is specifically, what are the ... |
If I click the signout link of a website, does this mean it is not possible for someone to hijack my cookie and sign in with it?
While I'm logged in, is it possible for someone who has access to my computer's hard drive to simply grab the cookie and then sign in?
Does something like Gmail's 2-factor authentication he... |
Well, about six months ago I had pleasure to meet Harald Welte and when he talked about m-banking (banking via smartphones) he said that the most people thing it's safe while, in fact, mobile providers reject all data which is unreadable to them (encrypted).
However, from several others sources which I found reliable, ... |
Possible Duplicate:
Resources to learn about security
What materials can I study to learn web development security. I'm a web developer, I use ASP.NET, Java, PHP, and JavaScript. I want to learn how to build strong and robust web sites that are not vulnerable. I want to protect my backend database.
|
I've pieced together this algorithm (if it can be called that) from various bits of code I've seen online, and I'm wondering how cryptographically secure it is. It's used to generate passwords:
function seed_random() {
$seed = crc32(uniqid(sha1(microtime(true) . getmypid()), true));
mt_srand($seed);
$n = mt... |
Possible Duplicate:
Resources to learn about security
I'm a software developer. I'm interested in learning Network Security, what is the recommended books, video courses, etc that I can study to learn security?
|
As a summer project, I'm looking to prevent any piece of proprietary software like many games I run from have access to my personal files. After looking a lot at sandboxing, I've decided that anything like chroot is far too complicated for me to use, as simplicity=security. I've created a user all these applications wi... |
Is there a file system providing a directory where everybody can write, but only the directory owner can read the files? In theory it could be done by encrypting using the public key while writing, but I see that it's much more complicated than symmetric disk encryption. The purpose is to allow everybody to have their ... |
We don't run any Microsoft products natively in our office, but there are a few folks who use a linux RDP client to access an application on remote virtual desktops with a service provider. Would it be worth the effort to tunnel the RDP through ssh, or should I not be too concerned?
We're currently using Remmina which ... |
In the olden days, one could trivially bypass BIOS passwords on most PCs by removing the BIOS battery and clearing the CMOS.
My question is: On modern PCs equipped with a Trusted Platform Module (TPM), how tamper-resistant are BIOS passwords and BIOS settings generally? Maybe TPM design specifications mandate a certain... |
In my organization, we have an IPS behind a firewall. Each time a security event is triggered, I am left to wonder if the attack is really successful. For events that are set to drop in inline, we can be assured that the attack is most unlikely to be unsuccessful. But how do we determine if an attack is successful for ... |
Most password policies require the password to be at least 8 characters long and contain symbols from at least 3 classes (lower case letters, upper case letters, numbers, other).
Problem is, that a password "pa$$w0rd!" will be passed through by such policy while at the same time, it will be found/cracked by a tool like... |
(I'm trying for a bit more precise answer, particularly with regard to multi-factor authentication, than I received for "Safe way to use a computer that has spyware/keylogger installed?" on SU.)
Let's suppose that I am using a computer that is, for contractual/legal/policy reasons, extensively monitored. For argument'... |
Right now I'm storing a salt and password_hash on the users table (pretty standard stuff).
The need arose to get a secure hash of another field for a user. Is there any risk in reusing the same salt used on the password? In other words, does using the same salt on several hashes make it easier to crack assuming the a... |
I've written some code to generate an SQL query in ASP classic. I'm not sure if it's secure or not:
Set adoCon = Server.CreateObject("ADODB.Connection")
adoCon.Open "Provider=Microsoft.Jet.OLEDB.4.0; Data Source=" & Server.MapPath(dbfile)
strSQL = "SELECT * FROM Table WHERE name_field LIKE ?"
Set cmd1 = Server.CreateO... |
There's a new* keygen element in the html5 spec. It's supported in major browsers excepting Internet Explorer and Safari.
Here's what it looks like:
<form action="processkey.cgi" method="post" enctype="multipart/form-data">
<p><keygen name="key"></p>
<p><input type=submit value="Submit key..."></p>
</form>
The cur... |
As a programmer and language enthusiast I've been very interested in Markov chains for some time. Considering the influence of natural language on password and passphrase selection (by humans of course) I would like to know the state of the art in applying Markov Chains and Hidden Markov Models to the task of guessing ... |
During traveling, especially in poor countries, sometimes you are going to need to use the internet at an internet cafe and you really can't be sure whether anyone has installed anything to listen to your keystrokes.
I've been told this method, although I'm not sure if this works, but if you're at an internet cafe, one... |
I'm creating a webapp, and part of my authentication method is password length.
Should I put one in place? (say, 50 characters?) Or should I just put a minimum length (Currently at 6).
Are there problems with not putting in a maximum length?
|
I've often heard it said that if you're logging in to a website - a bank, GMail, whatever - via HTTPS, that the information you transmit is safe from snooping by 3rd parties. I've always been a little confused as to how this could be possible.
Sure, I understand fairly well (I think) the idea of encryption, and that w... |
With passphrases becoming more and more common based on length being more important than complexity, I'm assuming there must be some work going on involving techniques aimed specifically at cracking / auditing passphrases which would differ to some degree from the traditional methods for attacking passwords, perhaps in... |
I kind of know that how a firewall's rules for IP/port work, but I have no idea how a firewall deals with individual programs.
In other words, how does the firewall know a program wants to access the Internet and stop it?
|
I'm surveying current techniques on flash memory security. I've learned that the non-in-place update of flash memories prevent us from adapting the same encryption techniques that we used on hard disks — see Do Flash memory (SSD) architecture impacts encryption techniques? —
and I was wondering what kind of mechanism ... |
I am developing an intranet application using Apache/MySQL. The server hosting it does not have a public IP address itself, but can access the internet through a router. There is not any sensitive information involved, but for good practice for future projects that may be more sensitive, I would like to make sure it is... |
A scripter sees on certain web pages it's technically possible to include markup like HTML and CSS/JS. It's technically possible to submit a javascript or iframe and have it display to the visitor running a javascript that could be any javascript. I didn't practically try it but I could include "bugs" that changed layo... |
I am wondering how can an end-user detect a maliciously implemented OAuth whether 2-legged or 3-legged. Particularly I am interested in those cases where the consumer requester is maliciously presenting to the user a fake resource provider page to enter the credentials. Typically if the consumer is expected to forward ... |
Possible Duplicate:
Are the encryptions "broken" with great computing power?
I just wondered which algorithms will be used once quantum computers become common. Are there already existing algorithms that don't rely on factorization problems and thus could replace RSA when the age of quantum computers starts?
|
In the last couple of days there were a lot of talking about passwords and passphrases, not only here, but on several blogs and forums I follow (especially after XKCD #936 saw the light of this world). I heard quite a few pros and cos of both of them and this got me thinking.
Why do we use password and passphrase at al... |
Hypothetical situation:
before I hire a web development company I want to test their ability to design secure web apps by viewing their previous client's websites.
Issue:
this situation raises a big red flag: with regards to viewing a website, what is and is not within the breadth of the law? Or in other words: at what... |
I recently found that a library I am using (specifically Apache HTTPClient) when is configured to verify the hostname of the remote server against the certificate's CN it just seems to be doing a string comparison.
I.e. if the certificate has been issued to an IP and the user types a name instead e.g. https://secureser... |
In the last several months there have been several publicized data breaches and public website defacements done by several different hacking groups (which the media loves to group under a single domain - "anonymous") most recently some attacks on BART and affiliated organizations following a controversial move by the t... |
A user of mine just received a phishing email claiming to be the IRS. What methods of reporting are available, and what should be included?
|
Possible Duplicate:
Why is it difficult to catch "Anonymous" or "Lulzsec" (groups)?
I think that something that Anonymous & other hacking groups do, is illegal and they should be arrested.
My question is - why can't FBI or IT police just get data from Twitter and trace their location? (I've chosen Twitter because th... |
My school currently blocks outbound SSH traffic. Users inside the network cannot use Port 22, and attempting to make an SSH connection over another port is also blocked. (I'm assuming the firewall drops any packets that seem to use the SSH protocol.)
The excuse given for this is that allowing outbound SSH traffic would... |
I work in a smallish company (100-200 computers and a handful of servers) and I am trying to come up with a checklist of things to check at a regular basis, such as weekly, monthly, etc. We use Windows servers and Lotus notes. I currently have: check logs, check for users in AD and Notes that no longer work here, che... |
After i saw many people using Chrome i wanted to inform myself on this browser and everything concerning it as i am a Firefox user since it existed. However i am always afraid of Google being a "data kraken" collecting as much information as possible and i want to know how this privacy issues influence the browser and ... |
Inspired by this question I came up with this weird idea of making what that user actually wants to prevent. So, bear with me for a little bit:
Let's assume that for some reason we could make the traffic sent from a specific application to another to travel to a router/routing device because the source device cannot de... |
Possible Duplicate:
Protect application from being modified
This probably belongs here as much as it does belong in gamedev.stackexchange.com, but I suppose I might find better technical answers here.
So I've been developing an iPhone game which has a replay functionality. The replay of the game is basically a seque... |
First of all, stock, not stack exchange.
I just read this post on Krypt3ia. In short, it says that HFT attack vector in combination with DDoS is possible new nemesis for stock exchange IT systems. Later on in article author describes how poor IT security is on stocks.
Anyway, as far as I know HFT is... Hmm, metodology?... |
I assume I can configure most routers to only assign IP addresses to specific MAC addresses, as is possible with wireless routers.
However what if a computer is connected via Ethernet and does not ask for an IP address? What can they skim off the network with a standard network card?
How can I prevent someone from skim... |
I'm a software developer but I'm marking my niche in secure development. It turns out that while using WebScarab, I discovered that a popular user group site doesn't appear to properly take care of web passwords: The login page is http, but the submit button links to an https link.
Using WebScarab I captured the pass... |
I realise this borders on sci-fi, but there's been some interesting demonstrations regarding security of various satellites.
What would be required to hack a satellite (in general terms, any hack really)? Are they all basically connected in the same way, or would I need different equipment, software, or otherwise. Are... |
To start with I am not a security professional, in fact I am on the other end of the spectrum. In the opinion of people on this site what would you choose for secure internet browsing. I will be accessing interactive websites and making transactions.
It is absolutely essential that my real IP remains secret and immune... |
Question: Is there a way to store credit card information on a shared hosting server AND be PCI compliant?
Here is the setup:
1) SSL is being implemented for the whole checkout process and for the client's site's admin section.
2) The credit card information is being stored on the server (a shared hosting plan) in a MY... |
As you know, deleting a file by pressing shift-delete or by using the Trash doesn't mean that the file is unrecoverable. It's data persists on your computer.
In day to day life, adversaries use recovery programs to attempt to undelete private data.
There are some program that provide secure erasure such as wipe and shr... |
What is the best way to browse the Internet safely? By safely I mean:
anonymously
having encrypted communication
Extra bonus for:
being able to do it with little or no performance impact
cheaply (without spending too much money on the connection)
I know about VPN which encrypts the whole communication (but which re... |
If an attacker turns on wifi but doesn't have the security key to connect to an access point in range, can he still sniff packets that travel between the access point and clients connected to the access point, and thus get the Mac addresses of the clients? If the access point is a public wifi and there is no security k... |
I'm diving to the world of penetration testing and I decided to port scan my server. My website is completely managed by a friend of mine but he lacks any knowledge of security.
PORT STATE SERVICE VERSION
21/tcp open ftp ProFTPD
23/tcp filtered telnet
25/tcp open smtp Exi... |
The Bitcoin network use SHA256 as a core component to it's design. I'm no expert on cryptography, but it seems to me it usually is only a matter of time before security vulnerabilities are discovered (MD5 for example as well as many others).
What are the chances similar vulnerabilities are discovered in SHA256 at some... |
I do web development for a living but my real passion is security. I have worked with countless open source web application/framework and I have found vulnerabilities in most of them. The main cause of those vulnerabilities is a lack of security education from the developers. I've been thinking about what could be done... |
I'm reading Google Hacking for Penetration Testers and in book it's said several times operator "numrange" is especially powerful and dangerous. However, they don't give example of using this operator. I found similar claims over the net, however, again, without any example at all how one can use it.
I'm little bit in ... |
I'm familiar with OpenVPN because my home router has a builtin OpenVPN server.
I would like to use OpenVPN all the time, but how do I deal with situations where I don't own the routers?
ex.: in a netcafe that I'm using to go through to reach the internet over OpenVPN
Can a router in a netcafe spoof an IP address when I... |
Who is responsible for a user's password's strength? Is it us (developers, architects, etc.) or the user?
As a web developer, I've frequently wondered whether I should enforce the minimal password strength on my websites/applications users.
I frequently meet regular people (not geeks or IT professionals) that hate it ... |
I see a number of companies offering "malware removal" services. I see some software that claims to be able to remove malware from an infected machine.
Is using a removal software tool to 'clean' an infected machine acceptable practice, or is the only safe method to reformat the machine and then carefully restore data... |
I would like to ask what happens when an email is sent from Gmail, Yahoo or Hotmail public web email services?
I don't understand email protocols in details, but as far as I know email traffic is unencrypted and the messages are passed along many mail servers (in plain text) before reaching their destination server. Ho... |
This question title might seem a little vague, and I apologize for that. Let me just begin by stating I'm an engineering psychologist—not an IT security or computer guru by trade. As luck would have it, my employer (a very, very big one) has placed me on a small team where I work on a mission critical server that can (... |
When generating a password, should it be "truly random" or should I make it a little less random by enforcing some rules?
If a password is generated at random, it could come out all-lowercase letters ("password"), or consist of only a few repeated characters ("abababab"). I'm thinking that this could be a problem, sinc... |
In XKCD #936: Short complex password, or long dictionary passphrase? Jeff claimed that password cracking with "dictionary words separated by spaces", or "a complete sentence with punctuation", or "leet-speak numb3r substitution" is "highly unlikely in practice".
However, there are certainly John-the-Ripper rulesets tha... |
I need to save random 16 byte keys to a database.
To encrypt these keys I currently use AES 128 with ECB Mode (because of smaller data to store, no IV needed), but now I read a lot about ECB being unsafe and should never be used.
I thought in this case (random data, just a single block) using ECB would be fine, but I'm... |
Three days ago, KingCope released a simple Perl script to DoS Apache, aptly named Apache Killer.
This script launches about 50 threads to request Partial Content from the server with optional GZIP encoding. This either will consume too much memory that the OS has to kill all other processes, or too much CPU that the se... |
The key space of DES includes some keys that are weak, which results in a ciphertext that is extra vulnerable to cryptanalysis.
Is TDEA (also known as TripleDES) invulnerable to those weak keys? Or, is it necessary to filter cryptographically-randomly generated TripleDES keys for the list of weak/semiweak keys?
|
Does Windows XP or Windows 7 encrypt saved passwords?
I'm assuming that the user uses local password to logon.
The user then uses his own computer to connect to server in work and sets the "remember password" box in the password dialog. The other password I'm interested in is the password to WiFi network, is it stored ... |
Our environment consists of about 80 users running Windows 7. Previous to me showing up as a full time IT employee, the company had contracted an outsource IT solution. As part of their set up, they gave every user full administrative access to their local machine, disabled UAC (their reason: "because those pop up wind... |
I've drafted some ground rules for a call for adversarial attack-review. I've tried to cover the following topics:
Link to the policy that I want to enforce.
Link to a minimal testbed and installation instructions if that proves cumbersome.
Some suggestions on how to demonstrate an attack.
What an attacker might gain... |
Can a NFS mounted file system be used for encrypted /home, and can the encrypted Home Directories be mounted/decrypted for the user when they login?
|
Possible Duplicate:
What are the career paths in the computer security field?
I am a software developer. Currently I am interested in IT security, but I have difficulties about learning pathways to IT security.
Is there a learning path for IT security such as for example the path to learn the Java programming langua... |
Is it safe for a small business to let customers use their wifi while waiting?
My friend is starting up a small dentistry practice (1 dentist), and I'm setting up his computers/wifi as a favor. He'll have a waiting room and wants it to be a pleasant experience for his customers and thinks the wifi password should be e... |
USB broadband dongles seem to be common everywhere now though I'm not sure what the most widely accepted name for them is. In case I'm using poor terminology I'm referring to USB sticks which contain a modem able to connect to telephone carriers mobile networks, generally prepaid in myriad varieties.
So I'm wondering i... |
Facebook seems to be alternately serving two SSL certificates, one from DigiCert and one from VeriSign. There are only two reasons for this that I can think of:
They're in the middle of a certificate change that hasn't propagated to all of their load-balanced servers yet. This seems unlikely as it's been going on for ... |
I want to know how WAF/IDS/IPS deals with Payload Transformations. Such payload transformations may be
base64Encode
html EntityDecode
url Encode
Remove whitespaces
I want to know how WAF/IDS/IPS deals with payload transformation Pipelines. Such as when multiple/different payload transformation are performed on the pa... |
There was a sudden unusual peak of outbound traffic from my hosted dedicated server (OS - Windows Server 2008 R2). The hoster threatened to block the server if the problem is not solved.
There are an ASP.NET MVC application and a SQL Server 2008 Express database installed on the server.
After that I've installed all mi... |
I have a PHP website and my question is:
If someone manages to steal my users' cookies via an XSS attack,
is it enough for him to be identified as the user?
Or does his IP also have to be the same as the logged in user?
My php.ini has session.use-cookies and session.use-only-cookies set to true
|
The legally allowable band for WiFI in the US covers channels 1-11. Europe goes to 13, Japan to 14. I suspect that most tools use the WiFi driver of the machine and only scan for the channels it is limited to. Do you know of any tools that scan higher channels by default? With configuration?
For some examples of things... |
Today I have looked at the desktop application framework - Pokki. The first questions were: how it works and is it secured. What I have found about security architecture: Pokki Security Overview. So my questions are:
1) Is the sandbox architecture secure?
2) How can I test that a pokki application (or any other) has m... |
I'm looking as some web analytics solutions, I know it sounds paranoid. but cookie-based web analytics need for you to paste their JavaScript code on your web-site.
I don't like the idea too much of just pasting scripts on my web-site that I don't know.So I want to check if these scripts send to another server the sess... |
For those that like to manage their own firewall and run IDS/IPS on their home networks, I'm curious - what are you using and is it power friendly?
I used to have a shelf full systems doing various things, but moving a lot had me trim down and I'm currently just using an off the shelf home wifi router, and need somethi... |
For reference, this is just for my home network. Anyway, I have quite a few of my neighbors ask me to share my internet with them. I'd really like to eliminate this "here's the password" portion though by just making my network publicly accessible.
Now my problems:
I don't want for them to take all my bandwidth
I don... |
To deposit money into your account, some websites require that you provide them with a lot of details about your bank account: name, complete address and IBAN which includes your account number and identifies the exact bank.
Can a skilled cracker use this information to steal money from an account? How safe is it to pr... |
How does a Blackberry device connect to BlackBerry Enterprise Server (BES) for the first time? What are the security mechanisms used to protect against a rogue BlackBerry handheld trying to connect to BES?
|
I'm doing some pen-testing on my home wlan with aircrack-ng and it got me wondering how programs like these(eg. aircrack-ng, cowPatty, pyrit etc) really work. Specially, when performing a dictionary-attack on the psk how do they know when the correct pairwise master key and pairwise transient key has been found?
As I u... |
Recently my organization wants to move into the smart card system instead of static password. We want to move the entire infrastructure to the smartcard system. we are looking for a single smartcard which provides physical and logical access. And also wanted to use the same smartcard for parking,cashless vending etc. (... |
I was just using Sql Server Management Studio on my WiFi, and I was actually wondering how secure the traffic/database communication is. Is traffic from querying secure, or is it easily sniffed for passwords and sensitive data?
|
I hope this is not a chicken-egg problem or reinventing the wheel but here goes.
I have a Java application that needs to access a password protected file (actually during the application startup).
The password protected file's path that it is supposed to be accessed is in a configuration file and the encrypted password... |
My PHP sourcecode and database (PHPMyAdmin Dump) has been leaked publicly and I believe that the web host I have used for this service are responsible for the leak.
On first appearances, the web host appeared to be very professional, although they were not a well known, large company. I have not had any issues with any... |
Good practice is not to unnecessarily restrict password length, so that appropriately-long passphrases (perhaps 35-45 chars for 6/7 dicewords) can be used. (See e.g. Should I have a maximum password length? where a maximum of 1K is suggested, to protect against DoS without restricting users' ability to set long passwor... |
[Edit] I did complete an analysis and framework of concepts
that were included into my thesis for extensions to existing frameworks. All of the information in this thread was useful. The direct link to an extracted and shortened version of document is below for the interested. I'm always open to critical review and im... |
For example: http://www.natwest.com/x-user.ashx?redirect=trusteer.interstitial.url&condition=trusteer.enabled2%3Dtrue
<input name="...." type="text" maxlength="10" id="ctl00_mainContent_LI5TABA_DBID_edit" autocomplete="off">
What are the security benefits of this, if any? Is it worth the sacrifice in usability?
|
I've come across several sites lately that have complexity requirements for usernames like "must be 8 characters long and contain at least 2 numbers". Is there any real added benefit to this from a security standpoint?
I would think that since a username is designed to be an identifier and not a secret that this is an... |
I'm doing some research into the privacy of various iOS applications. My main source of data is via wireshark or Burp (HTTP/S proxy). This has been rather successful for MiTM for decrypting HTTPS traffic, however the app I'm focusing on right now appears to encapsulate XMPP/Jabber traffic in TLS, hence it does not go v... |
I am developing software that will be used for data backup.
The server will run on Linux. Security in transportation is not an issue (HTTPS or SSH), but the data must be stored encrypted on the server.
The data is not tied to a single computer, so multiple computers should be able to access the same data, if given a ke... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.