instruction
stringlengths
24
29.9k
I am looking at different VPN protocols. L2TP does not provide encryption so require IPSec to encrypt the data IPSec tunnel provide encryption to the tunnel What is the difference in terms of the packet that get sent through the link? Can you describe the two types?
Currently the company I work for uses Sun Java System Web Server 6.1 SP9 and Java 1.4.2. I know this version of Java reached its EOSL around 2008. The Sun Server still seems to be supported but it's a headache to do real development on. Can anyone provide some good [security or otherwise] reasons why this server shou...
I recently received an email from a popular graduate job website (prospects.ac.uk) that I haven't used in a while suggesting I use a new feature. It contained both my username and password in plain text. I presume this means that they have stored my password in plain text. Is there anything that I can do to either imp...
It has been said, over and over, that disabling dynamic kernel module loading on Linux increases security. I understand why people give this advice, but I've always assumed that a bad guy could directly modify memory if the module interface were unavailable. (After all, the loadable module interface is for the good guy...
Possible Duplicate: What are common/official methods of reporting spam/phishing/nasty-grams to organizations? My production application receives a lot of emails and I can easily detect spam from it. From that spam, I can parse the dangerous URLs found in the emails. What can I do with this list of hacked sites? C...
I'm currently using WIN+L, and sometimes Kid-Key-Lock, to prevent anyone from checking my storaged passwords but if I forget doing it only once, all of them are vulnerable of theft. How can I protect my passwords from this glitch or is it not possible?
I have a website with a webhost company. I wrote a little php/mysql application - no file uploads, just administering data from the DB and creating pdf with TCPDF. There are folders like css and js but nothing else. As I have limited control on the shared host, what would be the best practice to keep the files safe but...
A "soon to enter beta" online backup service, Bitcasa, claims to have both de-duplication (you don't backup something already in the cloud) and client side encryption. http://techcrunch.com/2011/09/12/with-bitcasa-the-entire-cloud-is-your-hard-drive-for-only-10-per-month/ A patent search yields nothing with their compa...
Particular case An (unnamed) vendor of an open source product also sells commercial licenses and support. One of the advantages of the commercial deal is that you get notified of security vulnerabilities immediately (even before an official release has been made), and access to a pre-release security build including th...
My question today come from my homework question from class ethics in IT. Our question states roughly that I'm IT guy in in big company and I am asked to hire few hackers to to find vulnerabilities in the system. Hackers would take a role in finding out what's wrong with security and alarm company what need to patched....
In many places, there's a policy that force the user changing it's password once a few months. The logic here is, that even if the password have leaked somehow, it'll be abused only for a relatively short period of time. So that a note with your password you threw to your bin now, will not come and hunt you in five yea...
Is it normal that when I use Double DES secret key to encrypt a string in DES3 CBC mode then I always get the same cipher text? For testing I'm using IVC=0.
I'd like to keep some private data (photos, notes, ...) and my browsing data hidden. The rest is not so important. Most of the time I just put the laptop to sleep and don't shut it down often, making disk encyption a lot less usefull. The laptop is typically used at home where it is relatively safe and only sometimes t...
I've just realised that facebook accepts 3 forms of a password: Source: Facebook actually accepts three forms of your password: Your original password. Your original password with the first letter capitalized. This is only for mobile devices, which sometimes capitalize the first character of a word. Your origin...
With the recent discovery of the Mebromi BIOS firmware virus/MBR rootkit in the wild are we now actually in the age of Advanced Persistent Threats (APT) for personal computers and does that imply the malware solutions of the last two decades are obsolete? The APT term has been thrown around for some time in reference...
So when it comes to security, when I have an idea that seems good, but no one else seems to be doing, I try to assume that I'm overlooking something obvious or otherwise significant. This is one such case... The context of this question is an authentication system that I'm beginning work on. I've implemented similar ...
I'm trying to set up any mail client to have a secure connection to Network Solutions' email servers. I've been talking with Network Solutions' email support people, who will repeatedly state that Network Solutions email is secure, even immediately after confessing that SSL is not supported, nor is STARTTLS, nor is sec...
I thought the strength of a password depended on the total number of possible combinations. Therefore, allowing longer passwords should be safer because you then have more possibilities. But why do some systems set a minimum number? Doesn't this simply reduce the number of possible combinations?
Are there any simple steps one can follow to verify if a notebook is clean from hardware spyware? What should be looked for? How should it look? If any visual tutorials with photographs are available, that would be wonderful. One note is that the person who would do the search has not much experience in identifying ha...
Is formatting the disk and reinstalling the system from scratch (to Ubuntu) enough to remove any potential hidden software spyware, keyloggers etc.? Or can something still persist installed in the bios or something like that? What to do then? To be clear, not concerned about common malware. The question is more specifi...
If the user knows that other people will repeatedly have physical access to her notebook - running Linux - while she is absent, and that there is no way around this, what are best practices for protection? The obvious one is to lock the login screen - ok. Still not sure how to protect from live CDs, live USBs and most...
I am currently taking a Principles of Information Security class. While talking about different encryption methods, a large number of my classmates seem to believe that Asymmetric Encryption is better (more secure) than Symmetric Encryption. A typical statement is something like this: Generally asymmetric encryption s...
I'm looking for a program that can use any GPU (ATI\NVIDIA) and can brute force a vBulletin hash - md5(md5($password) + salt)). I have the salt and hash. the password contains the symbols - a-zA-z0-9 the, length is of 7-8 charcters. I'm going to run it on a windows platform (would like to use a freeware) if you're aski...
Is there an automated tool that takes a list of hosts and figures out which common web applications (such as Wordpress, Mediawiki, Joomla etc) they are running and - if possible - which version and which plugins are installed?
I'd like to measure queuing time, similar to what they're doing in Finland. Instead of detecting bluetooth (which is disabled in most phones) I thought of detecting EDGE/3G. I'd like to log the following information: Phone 1 entered the zone at 14:00 and left at 14:30 Phone 2 entered the zone at 19:05 and left at 19:3...
Using Passware Forensic Toolkit you can extract the bitlocker key using live memory dumping through Firewire (either by using an existing Firewire port, or by inserting an pcmcia/expresscard firewire card). No need to logon to Windows there... Source: http://www.securityfocus.com/archive/88/516661/30/0/threaded So OS...
When I read about a password being secure and stating that it would take X amount of week, years, etc. isn't that referring to the worst case? What happens if the brute force method is successul in much less time than the 'worst case'? The recent event with LastPass where they noticed a lot of traffic leaving their ser...
I've seen many people saying how some sites can infect your computer without actually clicking anything. They said that it was a "Flash Drive By" and it would use flash to download a file of any kind. Does that really exist or could it be something else?
Can a virus really inject its own code into a process so it stays on your computer permantly? The only way to actually remove it is to reinstall your OS. My question is how can it do that without damaging the file or process?
I haven't really heard anything on how the Soild State Drives are doing out in the real world and I was wondering if they are better than traditional hard drives. Is a SSD more secure or less secure than the traditional hard drives.
Possible Duplicate: Online backup : how could encryption and de-duplication be compatible? I just saw an article on Techcrunch wherein a startup company was describing their new cloud storage service. They've claimed (in a previous article) that everything is encrypted client-side with a key that only the user has, ...
Data on external storage devices are not secure, I understand that. Despite hardware modifications they can still be hacked etc. However files can be hidden (steganography) or encrypted. I'm wondering if there is any way of hiding a collection of files from an OS so they cannot be deleted (at least from an OS GUI). R...
Can Process Explorer ( Windows apparently) detect a virus? Is it even possible?
Watching this article: http://www.exploit-db.com/exploits/13474/ I can see this: /* * NetBSD * execve() of /bin/sh by humble of Rhino9 */ char shellcode[] = "\xeb\x23" "\x5e" "\x8d\x1e" "\x89\x5e\x0b" "\x31\xd2" "\x89\x56\x07" "\x89\x56\x0f" "\x89\x56\x14" "\x88\x56\x19" "\x31\xc0" "\xb0\x3b...
Recently I found that Netscape used quite simple algorithm to generate random number for Message Authentication Code to establish an HTTPS connection (Netscape used time, process identification number, and parent-process identification number). So now I wonder what source of seed do modern browsers use to guarantee tr...
Is it ever appropriate to use real-world passwords to encrypt files to be sent via unsecure means. By real world, I mean a password that is memorable and memorisable by a mere person? I am implying that in order to securely encrypt a file you must follow this guidance: Use a long random password with enough bits of en...
Short of powering down and maintaining physical security for sufficient time, what are effective strategies for keeping keys from being disclosed by cold-boot attacks, and can anything be done without hardware designed to prevent such attacks? http://citp.princeton.edu/memory/
I have designed a REST web service which requires authentication. It handles authentication in a manner similar to Amazon Web Services, namely: the user has an ACCESS_KEY (say, 'abcd') and a SECRET_KEY (say, 'aabbcc'). The SECRET_KEY is used to create a TOKEN: a SHA-1 using the request information, for example: GET pat...
There has been a lot of news recently about certificates being falsely issued (due to the issuing authority having poor system security!). Apparently the targeted users were mostly Iranians, but it's not hard to imagine this happening to anyone. My browser comes pre-loaded with hundreds of certificates. Is there any ...
I'm interested in understanding what security considerations there are around implementing a payment gateway. I have, so far, thought of: having a SSL Cert is a MUST. logging actions is critical. a database separate from the internet. Any other recommendations? As background, my application is selling product to ...
If I suspect my computer or cellphone is being monitored by an unknown attacker, what tools or techniques could I use to detect or identify such monitoring?
Every time I try to connect to a site through HTTPS from my office computer, there is a Certificate Error thrown 2-3 times before showing the login screen. Till now I use to ignore this and click continue. But recently one of my collegue told me the possiblility of Man in the middle attack. All I want to ask is, is it ...
As with any tools purchase part of the outcome is in how good the evaluation criteria are, so it is important to understand the criteria people might use when assessing Security static analysis tools. Obviously the weighting on each criterion would be down to the individual companies priorities but the list could be re...
From what I have read and known, SEC compliance is quite vague. It is best to be addressed in a strong manner, but when it comes to hosting in third-parties, the only way for you to prove their compliance is via audits. Since there are no concrete rules (ex: "all third parties must be SAS 70 compliant"), what serves a...
If we look at how statistical engines run on-line translators, and how they are built, we see that they look at a new language and run a statistical model over it searching for what's probably the correct translation for, lets say, Russian to English. Granted, encryption isn't exactly a translation (which might be akin...
From Hackers break SSL encryption used by millions of sites: The vulnerability resides in versions 1.0 and earlier of TLS, or transport layer security, the successor to the secure sockets layer technology that serves as the internet's foundation of trust. Although versions 1.1 and 1.2 of TLS aren't susceptible, they r...
In IT Security and computer power users there seems to be an excessive amount of distrust. They don't do anything or use anything because of this distrust, or use what seems like an excessive amount of protection. Note: I am writing this from the point of view of a person living in the US. The following assumptions obv...
What is a SSDP protocol request with notify http/1.1 ? How can I find out what this network traffic is?
I'm sure there's plenty of obvious reasons for this, but why can't an SSL session be started with one round-trip? It seems like this would be enough: Client sends their public key Server responds with: Its certificate (public key + whatever is needed to verify it) A symmetric key to use (encrypted with the client's ...
For example the SHA256sum of an Ubuntu ISO image, or an OpenBSD amd64 image. Are there any sites? It's important that the site must use HTTPS or at least it must provide GPG check for the hashes.
I need to know on what basis I can assess the trustworthiness of application usage (accessing private accounts) on public networks. As an example, I'd like to play Diablo 2 LoD while I'm at an Internet cafe, but I'm worried about someone sniffing my network traffic and capturing my battle.net credentials. How can I te...
I'm a Java EE developer and I was wondering if anybody has had experience with the OWASP Project and could weigh-in as to how it measures up as a security standards organization. They have a huge website with multitudes of documents, sub-projects, frameworks/APIs, etc., and I just want to be sure that they are well-reg...
Why should the firewall be outside the server, excepting these two items Take the performance impact of noise off of the server. Add a physical layer between devices so they can be on separate subnets, then use ACL to prevent IP spoofing. This way, the IP address can be dependably used to verify which internal network...
I have a poor knowledge in the world of cryptography, I'm just starting to learn it so I'm a newbie :) As a project for getting into the field of cryptography I want to write a client\server program that can send and receive data in a secure manner (i.e encrypted). Let's say I want to encrypt the traffic between a clie...
While looking up methods for creating secure session cookies I came across this publication: A Secure Cookie Protocol. It proposes the following formula for a session cookie: cookie = user | expiration | data_k | mac where | denotes concatenation. user is the user-name of the client. expiration is the expiration time...
For example, a server might have some encrypted logs or storage or whatnot, that would only be used for reference later. This way even if the server is hacked, everything is still OK until the hacker comes up with a way to intercept the data before encryption. Another example is the basic browser HTTPS/TLS model where ...
I had a file which contains images and videos, I was using the windows 7 ultimate and I had encrypted the file. Now I have copied that file to my hard disk and format that operating system and again. I installed a fresh copy of operating system windows7 ultimate, now when I want to see my file which I had saved in hard...
The recent article featured on slashdot http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/ says that connections secured with TLS 1.0 are susceptible to man-in-the-middle decryption (the BEAST exploit). I have an app hosted on Google Appengine, which seems to use TLS 1.0. It relies heavily on javascri...
I have been trying to understand how ssl works. Instead of Alice and Bob, lets consider client and server communication. Server has a digital certificate acquired from a CA. It also has public and private keys. Server wants to send a message to Client. Server's public key is already available to client. Assuming that s...
I have to select a secure file transfer protocol, to be implemented in a pre-boot system. I have access to libraries with the basic network functionalities (IP, TCP, UDP, etc...). I might also have access to the OpenSSL library. I need to know which would be the easiest one to implement, in case I have the OpenSSL libr...
Note: This is for my personal use. I'm not going to hack someone else's website. I have several websites, and I'd like to learn how to hack them so that I can secure them. Where can I find some good resources for learning how to hack my websites? I already know about Hack This Site. Could someone please change the tags...
Although many SSL certificates have been boasting extravagant guarantees -- typically around $10k minimum to $250k per breach -- to ensure their certificates are valid, to this date, I've heard that there has never been a single payout due to the fact the certificates limit the warranty to just data transmitted en-rout...
Microsoft has long promoted the need to separate administrative accounts from regular use accounts, as shown with this guidance MSFT even went to far as create ADMINSDUser rights to put administrative accounts in a separate "class" than regular accounts. They intentionally made it tough to be both an "Administrator" a...
There are many great questions that ask what is the best certificate to use for a website; but once the certificate is purchased, there is also the possibility to choose or edit the Cipher list. Although each vendor may call this setting something slightly different, my understanding is that the Cipher List is used to ...
I found a very nice SSL Threat model on this web page and would like to find more on different topics. How would I go about locating more images like these? Is there an organisation or website I could go to?
I recently helped a client who had their server hacked. The hackers added some PHP code into the header of the homepage redirecting the user to a porn website — but only if they came from Google. This made it slightly harder for the client to spot. The client would see the website fine. Only new website visitors from G...
With the alleged SSL/TLS vulnerabilities used by the BEAST exploit, there seems to be a security gap between TLS versions; TLS 1.0 being the problematic one but still the only option for many sites. If indeed there is a problem with older TLS versions, what measures should we take, at the user end, in order to prevent ...
I'm thinking about adding per-customer subdomains to my web app (which would mean a wildcard ssl certificate and some extra code). It's an app to help small companies with their cashflow. Customers won't be able to upload their own content to the app, at least not at the beginning. What does it bring in terms of securi...
Security folks often encourage people to build security in from the start, and architect systems that are secure by design. What are some readings you would recommend for someone who wants to learn more about how to go about doing this? I'm particularly interested in reading about secure-by-design languages and APIs,...
What do monitoring services like Mcafee Secure actually provide? It's about $1000 per year and I'm trying to judge what they actually do, as their benefits and technology pages might as well be the sales pages for just about any software as a service. https://www.mcafeesecure.com/us/products/mcafee_secure.jsp?tab=3 I ...
Where do operating systems (e.g. Windows) save their passwords? Do they store them in plain text? Do they use hardware modules such as TPM? Are these methods generally considered secure?
I'm developing a big project to monitor a remote machine's performance parameters like CPU, memory, disk space, and etc. through C# WMI. I want to use the minimum possible credentials to connect the remote machines since I don't want to bother my client to ask for the superuser credentials. While it is true that if I d...
In some password-authenticated sites, you are asked to enter a random selection of specific characters from your password rather than the whole word/phrase. For example, it might say 'Enter the 1st, 4th and 8th letter' and provide three separate input boxes. From what little I know of security mechanisms, I would have ...
I've often wondered why facilities do not require authentication as a default on exit. Beyond the oblivious reasons: Fire safety policies would require a panic mechanism to override the access control. Additional cost of authentication mechanisms at an exit point.
I use ssh a lot to connect to a variety of servers at my university. The machines are administrated by students, so assume they can't really be trusted;-) What are the risks in making a ssh connection to a host I have no control over? What information can be gained about an ssh client from the server side? Is there a ...
I can understand Java, Perl and JavaScript code very well. The rest, I have not studied, but I guess I could figure out how to read/translate. I would like to know what the simplest of Asymmetric routines are. Is it really too complex to want to worry about? I am just really curious how it is possible to have an encryp...
While there is the possibility that this is just to prevent people from viewing offensive images against their will, somehow I don't think that's the reason why pretty much every email client defaults to making the user white list every single email address that sends them images. This level of paranoya screams "securi...
Theoretically, ICMP redirect messages (IPv4 and IPv6) and source routing (IPv4) / routing headers (IPv6) are very dangerous. However, I'm curious as to if attacks using these features really work in the wild. The issues have been known for a long time, routing headers have officially been deprecated (RFC 5095). So my q...
We allow users to upload a number of files, all of which we either send over to scribd (doc, xls, ppts, etc) or display as a video ourselves (flv, mov, mp4, etc in flowplayer). To avoid users uploading unsafe files, we check against a set of known "safe" file extensions and then check the output of the file -i -b comma...
Extended Protection (link) (link) is a feature in Windows 7 and Windows 2008 R2 that prevents certain MITM attacks. Does anyone have a primer (or explanation in plain English) what this feature is, and if there are any other benefits besides MITM protection? How do I audit, control and verify that my applications are u...
Bob has a password (for his WPA encrypted wifi) which is 8 characters, all lowercase, and not a dictionary word. Eve lives next door to Bob and wants to illegally hack his WPA. The number of possible passwords is 26^8 (is that right?). EDIT: The ssid is not common, and there is no rainbow table available for it. How ...
For companies that have implemented their own internal CA, is there any benefit to configuring that CA to issue an EV certificate? Do any SSL Proxies (like Bluecoat) mimic the EV certificate of the external site (paypal.com), and pass that on to the internal user? What other use cases, assurances, or benefits could an...
The layman's counter-argument I run in to for any complaint about inadequate security seems to always take the form: You don't need security if you aren't doing something illegal. This kind of response is frustrating to say the least. In part because it's not constructive, but also because it's blatantly false. How d...
There is definite security value in having DNSSec-verified connections, however I have yet to see software indicate if the connection is secure. Ultimately I would like my users to recognize that DNSSec is a more secure solution, and prefer it or demand it when handling our business transactions. It would give us the ...
I've been looking for ways to improve security and security awareness for both internal and external clients and I happened upon the idea of generating a one-time, random "password suggestion" on the registration and password-change screens, similar to the following: Assuming that: The password is generated by indexi...
At least one web-server, nginx, has the ability to "close the connection without sending any headers", by configuring it to return a (nonstandard) 444 to various malformed HTTP requests. Is there any actual security value in this, or is it just security theater? How are attackers likely to respond to getting no respons...
I believe that eavesdropping in a man in middle attack and the message is passing from the client to server the man sitting at ISP or network hackers can look at what message I am sending. Heard that this can be easily done with wireless networks. Well, how can I prevent from eavesdropping without SSL? Does encryption...
This is a high level question regarding some recent posts about enhancing web browser security from an end-user perspective. What business/organisation(s) would have: Sufficient technical skill to evaluate technologies needed for safe, secure web browsing The capacity to publicly recommend a set of technologies to a...
This question is about storing the third party credentials in the database/some secure place so that it can not be accessed by only authorized user. Our system connect to the third party system using specific username and password. They are using the basic authentication require the nonce value and plain text password ...
I was listening to a story about Stuxnet and was curious if anyone knew what language it was written in? Is the source code for Stuxnet available anywhere?
I am wondering where I can find a good site with resources on reversing web malware like javascript, flash, html5, and any other stuff that is designed to attack the clients. Does anyone have any good resources on this?
Possible Duplicate: Google App Engine Security I am writing a master thesis concerning security of certain applications, and as a part of it I want to write a web app on Google App Engine and test how secure it is. Does anyone know if there was any study done on the security of GAE in comparison to other servers for...
I am writing a master thesis concerning security of certain applications, and as a part of it I want to write a web app on Google App Engine and test how secure it is. Does anyone know if there was any study done on the security of GAE in comparison to other servers for web apps? What would you say are the most likely ...
How do I get and set digital signatures with the 21 CFR part 11 standards as defined by the Food&Drug Administration of the USA?
Does anybody have experience with securing/hardening MongoDB server? Check lists or guides would be welcome.
Ah. This is a bit of a soft question, but I though there might be some here that can share some insight. I'm a developer. Sometimes I need to send a (bugfixed) DLL or EXE file to a customer. If this customer is in a big company, here's what I do: Rename the executable file (module.dll -> module.d__) zip the file with ...
Possible Duplicate: Does an established ssl connection mean a line is really secure When I visit a website -- say, https://ebanking.pick-your-bank.com -- my browser (fully patched version of Firefox or IE8/9) will display if it finds everything OK with this https connection / website. How secure am I that everything...
I have a Point of Sale System that's a web application. I also have a separate reporting system that's a web application and a separate inventory system that's a web application. It's necessary to use all 3 to run the business. I want to have single sign-on to make life easier for the users. Would adding single sign-on...
I have a few web applications that I'm trying to tie in via CAS, but I'm a little confused about the authorization, which I read CAS isn't supposed to do. Yet, I see something like groups, but don't know what they are. Anyway, my scenario is pretty common, and is as follows: We need to restrict access to each of our a...
With regard to this answer, I have a question about Key Usage in an SSL certificate. Most SSL server certificates have a RSA key which is not restricted through a Key Usage extension, so you can use both "RSA" and "DHE_RSA" key types. How do I determine if my certificate has a key usage restriction? Do all SSL...