instruction stringlengths 24 29.9k |
|---|
Does anybody have experience with securing/hardening ActiveMQ?
Check lists or guides would be welcome.
|
We've recently ran into trouble while reinstalling one of client's desktop computer.
Disk was split into two master partitions named C: and D:. We wiped out C: and reinstalled system (Win XP SP2 Professional)
Right after we realized there was folder with photos but protected by ciphering (EFS)
That means we have fo... |
I like to upload photos to various internet services, but I prefer not to share my geographic location. I understand Facebook and other services strip out the geolocation data, but they still have the data. I want to keep that data to myself and not share geolocation.
What are some tools that can find if geolocation... |
I'd like to implement multi factor authentication on a few projects.
Now the first factor would be username and password, for the second factor I would like to use a token generator.
These tokens would be 6 characters long and generated by a device that the user carries (like a phone or special device)
But... I have no... |
The NSA has a page that intercepts redirections off the primary site. (click "TLS: "Suite B Cipher Suites for TLS," RFC 5430" for an example).
I've seen this used in Exchange Outlook Web Access (OWA) to prevent information disclosure through the referer: header.
What type of information would be risky to disclose v... |
I always hear that it is best to use salts on top of stored passwords, which then somehow gets concatenated and hashed afterwards. But I don't know what to use as a the salt. What would be a good salt?
|
We operate an e-commerce website, and we're facing some big problems with payments. Very often, some customers get credit card data and use those in our store. So when the real credit card owner gets their bill, they cancel this transaction, and we lose the money and the products.
We don't have access to the customer's... |
I have heard that the PHP function mysql_escape_string has security vulnerabilities related to mult-byte characters. Are there any vulnerabilities if all tables are using Latin1 encoding?
|
You may remember: X-XSS-Protection: 0
http://hackademix.net/2009/11/21/ies-xss-filter-creates-xss-vulnerabilities/
Has this been fixed in IE8? IE9? IE10? Is it implemented in IE7?
|
I am not able to understand that how the digital signature is verified. I know that digital signature will be attached to the message and sent by sender to receiver. then receiver uses the public key is used to verify it. Here are my questions:
where did this public key come from?
and how it is distributed to the re... |
As far as I understand, AES is believed to be extremely secure. (I have read somewhere that it would certainly not be broken in the next 20 years, but I am still not sure if the author was serious.)
DES is still not so bad for an old cypher, and 3DES is still used (maybe not so much, but at least I see 3DES in about:co... |
I have a few questions regarding IPv4 and IPv6 spoofing. Might as well just list them to be concise:
What's the usual routing policy for ISPs' routers in regards to spoofed source addresses? i.e. if an ISP's router manages the 123.123.123.xxx /24 block and a machine sends it a packet claiming to be from 99.99.99.99, d... |
Is Windows Firewall suitable for running as the sole protection on a production web server? Is it hardened enough? Robust enough? and tested enough?
I'm running a VPS with Rackspace on their cloud offering. It's running Windows Server 2008. I don't believe there are any other firewalls between it and the outside world.... |
The idea behind security tests is easy. You want to know what a hacker can do - you hire a security expert who acts like a hacker to see how far he can get. You want to know what an evil admin can do - your security experts gets admin privileges and does his job that way.
I am aware that there are other and maybe bette... |
This question is about the economic model employed by NSS with their ExpoitHub exploit marketplace (site link) and whether it jives with the white hat claims of the company. The company has made news this month by offering bounties of hundreds of dollars for weaponizing a dozen known vulnerabilities (company offer).
T... |
This is very similar question to: If someone breaks encryption, how do they know they're successful?
Basically, the answers to that question is that an attacker doesn't know when decryption was successful.
So then how do encryption programs(e.g. gpg) know when you have decrypted something successfully? Do they have a m... |
I read several articles saying some of the command and control fleet for the US robotic attack planes may have been infected with a virus.
Does this command and control system communicate with the planes using the internet on a giant VPN of sorts? What systems are in place to prevent these robot planes from becoming... |
I'm developing a web application with a database backend using Django that will be accessed from the Internet. The database will contain sensitive information and I'd like some advice on the approach I should use to secure the data.
Approach 1: Encrypt the information using RSA-2048 bit encryption using the public key ... |
We have many restraints we put on users when they set up their password. These restraints include password length, characters they can or cannot use, the use of numbers and letters, capitalization requirements, etc. These are enforced so a password cannot be created unless all restraints are met.
On a form that require... |
We have a system (e.g. purchasing) where there are multiple access points. One is a back-end desktop application only accessible by employees within the LAN, the other is an Internet accessible Web Application by a subset of employees as well as customers. Both require authenticating with a Username and password.
The... |
I'm a programmer and I'm working on a Single Sign-on project using SAML. I want to do all I can to make this as secure as possible. Since making a secure Single Sign-on/SAML solution requires signing xml messages over https and creating various keys/certs etc etc I think I better know about this stuff! I don't want to ... |
Consider the following URL http://mysite.com/form?date=x. Suppose that if x is in an incorrect format, that a page is returned with <p>x is not a valid date</p>, where the page author has forgotten to escape the variable x. Assume that x is properly escaped in all other locations.
It is possible to create a malicious l... |
I realize that is a loaded question, but it is not an unreasonable one.
given a hex key/iv, what mode of operation is most secure from offline attacks.
I defaulted to aes-128-cbc. Partly because of schneier's 128 > 256 article. cbc because friends don't let friends use PBE or ECB
CBC
PCBC
CFB
OFB
CTR?
http://en.wikip... |
Let's say I sign a SSL certificate for myself, and I'm not using a certified CA. What are the risks and/or threats of doing it?
|
I wanted to know if its generally possible to inject executable code into files like PDFs or JPEGs etc., or must there be some kind of security hole in the application?
And if so, how would one do that?
I often hear that people get infected by opening PDFs that contain malicious code, that's why I ask.
|
Several people are claiming that you should turn off pop3 in gmail because it allowed bruteforce attacks on the password.
Doesn't Google prevent this kind of attacks? What is the truth on this claims?
IMAP is so slow with Outlook that I really want to keep using POP. I have a strong password in place.
|
I know of many companies that will sell ability to lookup IP/URI reputation. Be it DNSBL, json/*, returnpath, threatstop, surbl, ..., will let me perform lookups for a reasonable fee but, in case of this particular project, the lookup introduces unacceptable latency.
Do you know of anyone who offers a dataset that is m... |
How do experienced users test stateful firewall with TCP/IPv6?
My test case includes:
echo reply without request
tcp ack without syn
Are there any more test cases, especially with IPv6?
|
I copy-pasted a function that implements the PBKDF2 hashing algorithm in PHP. The function asks for the amount of time that I would want it to loop in order to produce a hash.
Now, I'm wondering, what would be a reasonably high iteration count that ensures a very secure hash, while at the same time does not cause the s... |
https://www.grc.com/x/ne.dll?rh1dkyd2:
To safeguard your privacy we have disabled the browser's "reload" or "refresh" facility while you are in sensitive areas of our web site. Reloading pages will function normally once you have left this area . . . but until then please refrain from "reloading" pages.
I'm not under... |
I've just tested my computer with Gibson's port scan test:
The test results stated that my system is "uncommon". It also said that my computer deliberately chose not to return. But I did not do any settings with my computer so I was wondering what is the reason that the probing tests had passed?
Or rather, what settin... |
Can anyone explain or post any link to a simple example and introduction about the
Security Token Service (STS)?
|
My friend was asking me what would be the best way to exchange documents with clients.
He was trying to tell me that just sending the documents via email was sufficient and I told him he was insane. I think the only solution is PGP. It seems like there should be some slick way to do this. Any thoughts?
So I have two ... |
There is a desktop client A connecting to website W in a https connection
A --> W
Somehow between A and W, there is a proxy G.
A --> G --> W
In this case, will G be able to get the certificate which A
previously got from W?
If G can get the certificate, does that mean that G will be able to decrypt the data?
|
error.log - Apache/2.2.17 (Unix) mod_ssl/2.2.17 OpenSSL/0.9.8g mod_fastcgi/2.4.6 mod_fcgid/2.3.4
[Mon Oct 10 22:35:18 2011] [error] [client 91.212.226.95] (36)File name too long: access to /forums/index.php++++++++++++++++++++++++++++++++Result:+%e8%f1%ef%ee%eb%fc%e7%ee%e2%e0%ed+%ed%e8%ea%ed%e5%e9%ec+%22immultusa%22%3b... |
In the case of the recent find by CCC, how exactly would the malware used by German police for internet wiretapping work? In default mode, it takes screenshots of active windows, it logs data and forwards the data for remote pickup. It is also capable of spying on Skype, and messenger conversations, and executing code ... |
It has been suggested that for security reasons it's a good idea to change the boot order to prevent booting from a live CD or USB. But if you lose the passwords to unlock hard drive and bios, and you cannot boot your laptop from live CD, are you in trouble?
How can you even wipe and restart your machine?
|
Is it necessary to have hard drive and bios passwords if you also have full disk encryption, or maybe at least the hard drive password is unnecessary because there would be two passwords protecting essentially the same thing?
|
I was told it's a good idea not to use your ISP to resolve DNS, both for privacy issues and because it can be slow. So I wanted to change, but I've read criticism on using OpenDNS (who makes money on your mistyped domains) or Google (privacy).
So I wonder: are there better alternatives? Something with less privacy conc... |
Why are hand-written signatures still so commonly used? Can they actually prove anything?
Two assumptions:
If anyone wants to forge my signature I'm sure they will be able to do it. Even my own signature looks a little bit different every time I sign a document.
If I commit to an agreement by signing a contract not wi... |
Hypothetically, what could an attacker achieve if they have a copy of of /etc/ssh/moduli?
|
Can someone explain why the BEAST attack wasn't considered plausible? I saw an article quoting the creator as saying 'It is worth noting that the vulnerability that BEAST exploits has been presented since the very first version of SSL. Most people in the crypto and security community have concluded that it is non-explo... |
I am trying to secure my application which is built using JSF2.0.
I am confused about when do people choose to go with security alternatives like Shiro, Spring Security or owasp's esapi leaving behind container managed security. Having seen some of related questions on Stack Overflow, where I realized that container ba... |
Ok say I have a brand new laptop that was is brand new.
Is it true to say that as long as I keep the bluetooth turned off, and I am not connected to the internet, and only copy files that are 100% verified (we can here, assume that it is 100% verified) from a 100% verified hard disk,
And never plug anything into the U... |
PGP and openPGP use different encryption algorithms. As I understand, PGP uses IDEA to encrypt a message, then RSA to encrypt the IDEA key. If openPGP doesn't use IDEA, how can it read PGP-encrypted messages?
|
I know this sounds like a dumb question, but whats wrong with it? Assuming that all private data is encrypted (by the client) using PBE AES256, then is this scheme more vulerable than storing keys on your local computer?
Pros:
all of your devices (smartphone, laptop, camera?) have access to the same keys without havi... |
I have a Linux web server running Rails and each time I check the Nginx logs I find attempts to access PHPMyAdmin, database and admin directories such as this:
190.196.161.110 - - [16/Oct/2011:23:37:31 +0100] "GET //PHPMyAdmin/ HTTP/1.1" 404 728 "-" "Made by ZmEu @ WhiteHat Team - www.whitehat.ro"
The attacks are comi... |
I don't know if this question fits into this forum or not.
Is there some template documents that comply with the EU regulations for Data Protection and Privacy that I can reuse / (get them signed by the data subject) in order to collect some their personal related data?
The idea is that I will pass over these templates... |
We are working with personally identifiable information that needs to be de-identified. Is there an existing hierarchy or taxonomy of different kinds of re-identification properties?
|
Are any applications (off the shelf, or internal) leveraging Active Directory's Confidential Attributes?
Would you store sensitive information here such as a private key, or a salt here?
I'm planning a demonstration of this feature, but would like to cite as many real world usages, or implementations as possible.
|
I have a question about a Local File Inclusion (LFI) vulnerability on a Windows system. When it's possible to download any file from the operating system (OS), which file should I download first?
I'm currently only aware of this vulnerability and no have no further information about directory structure et cetera.
A few... |
My small high street laptop repair/service/maintenance shop has been up and running for about 3 years. It's doing quite well so I'm looking to expand into other areas of the PC market.
One area I have decided to invest into is the loan of laptops to customers for a fixed monthly fee.
I want to be able to connect to it ... |
I'm discovering OpenSSL, and already used it to diagnose a faulty SMTP TLS connection, but I'd like to get a better / full understanding of the tool and how to use it.
What resources should I use to get started learning this tool?
I'm interested in anything from sample commands, to any guide how to understand and u... |
If one is to spend some time away from home and work in a hotel environment where neighboring users can at least be presumed to be mischievous (if not actually malicious), what are some measures that can be taken to stay safe from said users while still staying connected?
Available resources:
Spare laptop
Spare Window... |
My computer is telling me that my MP3 file is blocked:
I have no problems playing the song, so I was wondering what exactly does it mean for my MP3 file to be blocked?
|
In a comment on this answer, AviD says:
"There are numerous security issues with wildcard SSL certs."
So, what are the problems? I understand that the same private key is being used in multiple contexts, but given that I could host all of my applications under the same host name I don't see this as a 'new' issue introd... |
I am aware that even after we have cleared our cache and cookies, websites can still save files/information into our computer using Flash (Flash ever cookies),
I was wondering does other plugins like Silverlight and Java have this problem?
Effectively, the question is:
When I use Incognito, what technologies will allow... |
As far as I know, the autorun.inf problem (the possibility of automatically executing code when a USB stick is plugged in) was solved through Windows Updates for XP, and on 7 it is no longer possible at all.
But there is still some auto play dialog popping up, when a USB stick is plugged in.
Can this be exploited, woul... |
There is an url that is normally operated using POST requests (i.e. POST request is sent when user submits form). But attacker can form GET request with parameters that are sent in POST request. This request will be approved by server and associated action will be done. I know that it's recommended not to allow GET req... |
Under what circumstances could two completely different machines receive packets at the same class C IP address that is not within the IANA-reserved private IPv4 network ranges?
|
I have seen posts that insist that OAuth is an orthogonally different thing from OpenID, because OpenID is about authenticating users, while OAuth is about giving access to certain services to a third party.
However, I know a lot of people uses OAuth as authentication anyway, as illustrated here, Wikipedia calls it "p... |
I consider implementing a Secure Remote Password (SRP-6a) verifier that omits the username from the x key hash. The intention is to allow authentication with multiple alternate user identifiers such as uid and email.
The verifier is normally computed like that:
v = g^x mod(N), x =H(salt || H(username || ":" || password... |
Can I get some advice on what I should do next? Laptop was stolen yesterday and they tried to log in my facebook today like 20 minutes ago.
|
If I encrypt a file for multiple users how does the file size change?
Does the size of the output double for two users. How about 10 or 100 users?
|
Since I'm hashing all passwords with each their own salt, is there a benefit to the salt being really random, or would an incremental counter or a guid be good enough? Also, is there a benefit of having a bigger salt vs. a smaller salt?
EDIT:
Since it is established that hashes shouldn't be too small: What is a suffici... |
I've just used a security vendor's automated PCI scanning tool to scan my web server.
It only has the ability, out of the box, to scan URLs as an un-authenticated user. This means it is only scanning my login page and any other URLs it can crawl/guess, and only in one mode (that is, all of the pages have significantly... |
Are there any proven concepts or "installers" to get up and running based on the best practices securing and locking down a CentOS installation?
I'm hoping for an automated tool that would scan the system, give suggestions, change security settings, install a good network intrusion detection, and have some simple admin... |
I once saw JavaScript code which was only written as multiple brackets (). Does anybody remember this kind of code? There was also an online converter to convert "normal" JS into this style of code. I want to show it while a presentation as an example of state of the art XSS. Or what are other really surprising XSS exa... |
I can't really fully understand what same origin domain means. I know it means that when getting a resource from another domain (say a JS file) it will run from the context of the domain that serves it (like Google Analytics code), which means it can't modify the data or read the data on the domain that "includes the r... |
Are there any tools out there or methods available to download a suspect file for analysis without having to worry about being infected?
|
Are there any applications, JIT frameworks or operating systems that focus on encrypted virtual memory, or perhaps virtual machines that do something similar? I know there are processors (albeit old, slow and weak) that allow for systems that are entirely encrypted, but I've yet to see any OS or application come up wit... |
A friend's work Blackberry is configured so that phone and Internet access are disabled while the device is charging. I assumed this was a fault, but apparently it's a deliberate security policy.
Has anyone encountered this kind of policy before? And does anyone know what the security benefits are supposed to be?
|
I am facing the following problematic: I want people to send me softwares they develop, then I want to share them to other people, in sandboxed mode, that is to say with no need to have a sandbox software...
For example, you have softwares that can manage archives, and you have auto-extracted archives.
I'd like to know... |
If I connect to my e-mail server via SSL (SMTP/SSL) and the recipient also only checks his e-mail via SSL (web/https or IMAP/SSL), does this - generally speaking - increase the security for the message content in any way?
That is, will the communication between my providers e-mail server and the recipients e-mail serv... |
Hello, programmers, security professionals, hackers and everyone who is interested in information security. I am taking security courses in my university but I found there is only lab so I have to learn by myself, there will not be any tutorials. So I want to ask you. Can anyone recommend any ethical hacking, it securi... |
A website I visit allows this kind of attack, to be implemented with GET in the URL
<SCRIPT SRC=http://ha.ckers.org/xss.js></SCRIPT>
Along with many others on this page: http://ha.ckers.org/xss.html
The site requires an account (usually paid) to access that page, but still.
How serious of a concern is this? And what k... |
How secure is the data in a encrypted NTFS folder on Windows (XP, 7)?
(The encryption option under file|folder -> properties -> advanced -> encrypt.)
If the user uses a decent password, can this data be decrypted (easily?) if it, say, resides on a laptop and that is stolen?
|
On a server running Java, can a JRE vulnerability be exploited even in cases where the named subcomponent is not used by the application?
See CVE-2011-3545, for which the vulnerable subcomponent is "Sound". My Java app does not use the Sound subcomponent.
|
So ok, right now my windows 2003 dedicated server is under attack by some guy who's flooding UDP packets (~90.000 packets/sec) on my 100Mbps server for the last 8 hours.
I'm on a shared port, so I'm guessing there is one 100Mbps router, or cable shared with about 50 to ~100 other machines on the same network. (I guess ... |
So I know how to secure delete files. But at our company, we have a laptop which had many important documents, which now have been deleted, but not in a secure way.
We can't perform a full format of the disk since it would be a complex task to restore everything again. I would like to ask if there's a way to do a "secu... |
Is it legal to store/log mistyped passwords?
How many of you have seen this happen in a log file or DB?
|
Disclaimer: I'm aware my question is a bit far from IT security practices but here is the most appropriate place I can think of to post my question within the whole stackexchange.
Let's say, many companies and websites post their privacy policy, normally in a link named 'privacy' or similar at the bottom. In such a pri... |
The Open Data Protocol or OData is a great protocol created on top of Web Technologies.It uses the URI convention for the data exchange using Atom, JSON and XML. You can use the URI convention (parameter &) to perform your query:
?productCode=14&date=20110101&$format=JSON
Let's suppose that this is the query to retrie... |
I sometimes do reverse shells on metasploit but I'm not sure when my target will actually execute the payload. I would like an alarm of some sort to tell me when he does. this can easily be done in a script.
Is there a way for metasploit to execute a script once he connects to my terminal? I am using that "exploit/mult... |
Some wireless networks, such as those offered by hotels and hotspots, are not encrypted (they don't require a pass phrase to connect) but have an authentication web page. For example, you connect to an unsecured airport network, and it asks you to login using the credentials you were given when you paid with your credi... |
I'll readily admit I'm pretty clueless when it comes to cryptography, so there may already be some false assumptions in the question title itself :-)
Still, I "heard" that it is more secure to store the hashes of the username/password combinations than only the hashes of the passwords. (Salting?)
If so, are windows use... |
There are many key exchange mechanisms that can be used in TLS. Among them are RSA, ECDH_ECDSA, ECDHE_ECDSA, ECDH_RSA, ECDHE_RSA and others. Which of these are more cryptographically secure and can be used for securing connection with web site?
|
I recently found out pdf's can contain viruses, and from the impression I got its more than a buffer overflow error (I heard it may visit urls automatically but the person sounded unsure)
What are some formats that I should be wary of until everything is patched?
I remember at one point there was something in a vb6 pro... |
I'm given the assignment of testing one of our web-servers in regards to security. One of the servers run IIS 7 and its application relies extensively on XMLRPC calls. I found the API for those calls was publicly available on the web-server which got me thinking.
Does this need to be exposed? (I.e. does the application... |
How can I protect access to an SD card, so that only authorized users can read or modify the content of the SD card. Currently everybody who has physical access to the SD card can read or modify everything.
|
Am I right in thinking that SSL certificates from a CA are purely for identification purposes and serve no purpose in the actual encryption of data? In other words if I were to create a self signed certificate, would https communication be just as secure as using a certificate from a trusted CA even though the user wou... |
I'm trying to find the most recent RFC on HSTS in DNS (or rather said DNSSEC), but can only find this year old one in expired draft status
Where can I find the most current guidance on STS in DNS? If it's not available yet, how can I keep informed of the latest developments?
|
So I've begun learning to penetration test and I want to try it on a real system, (apart from my own), and so I have asked a friend if I can hack their computer. He is as interested as I am on the subject of computing and has agreed. I'm just wondering if it is strictly legal, and if it is likely for anyone else to be ... |
I have a linux server running centos, and while hardending the SSH server, I asked myself: Is there a reason to disable root login, when only I (assuming my IP address is static, and i have direct access to internet i.e no routers etc) can access the server (ssh daemon running on port different than 22, tcp connections... |
I would like to know if generating a PGP key with a number of bits higher than 4096 is possible and if so how?
|
I am trying to solve a problem with a password system. I need to figure out the probability of the password being guessed.
If I have an 8-character alphanumeric password.
it cannot be all #'s, meaning it must have a letter in it
it cannot have character's in sequence (ex. abcdefgh or a1234567)
it can not have the word ... |
When redesigning an organizations DNS infrastructure, the question of using Forwarders instead of Root Hints comes up. What kinds of issues should I be aware of when the admins and designers start asking for my input? Are there any particular gotchas that I need to make sure they address?
|
What are the security implications of an expired SSL certificate? For example if an SSL certificate from a trusted CA has expired will the communication channel continue to remain secure?
|
Is it legal or illegal to use the cloning site option within the social engineer toolkit (SET) or any other tool that clones websites? I was under the impression that if performing a social engineer exercise with a signed document from a client, I would be legally allowed to clone their site (with their approval), but ... |
What is the best, most secure, easiest way to:
store unique, strong passwords for every service which requires authentication
make the system resistant (total loss of security is avoided, breaches are contained) to multiple potential points of failure including:
loss of the password list
loss of any master password p... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.