instruction
stringlengths
24
29.9k
I'm writing a new website in PHP and I will be using cookies to track user session data. Before I finalize the design, I want to make sure that the site is not vulnerable to attacks. I have written a list of attack methods and came up with countermeasures for each one. Can anyone think of any more attack methods and if...
I'm hoping an expert with PCI compliance knowledge can help answer this question. We're looking at integrating mobile payments with our application which is HTML5-based for cross-platform reasons. After considering native apps, Square, and others, we're considering simply inserting an HTTPS page that is pulled directly...
I wish to covert my PGP key (RSA) to be used performing SSH authentication. After some searching, I found openpgp2ssh, which appears to be an appropriate tool. Everything works swimmingly for my pubkey: $ gpg --export "$key" | openpgp2ssh "$key" ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC51Cw3ZxO5TSncaDLzQ89SSZAF7Z9cFR5mv4...
Planning to deploy a remote hosted mailer (Zimbra based) I need to make sure the local data on the machine is encrypted. Currently, the plan is to use the built in LUKS to encrypt /opt/zimbra and leave it at that, however, since I have no experience with encryption, I am on the lookout for additional options or ideas, ...
I would like to know if sniffing packets of a remote IP address is possible at all, if yes I would like to know: what is the success rate, I mean how much percent of the packets you would capture? What are the benefits of securing the local LAN if someone can capture all the packets from that LAN simply by sniffing t...
I scanned a router and found that the community string is public. The write access is also enabled. Now I want to change the configuration of the router. Can anybody tell me about tools and tutorials by which I can know how to change the configuration? Thanks in advance.
I'm developing some software for schools. I've found severe flaws with the current popular school LAN protection that I feel needs fixing so I plan on releasing my own software. One the those problems was that if a student managed to log onto a teachers computer, they would have access to all of the teachers tools in...
Why types of media are Write Once Read Many (WORM) other than CD-R, and DVD-R, say, something in the 100GB range? Are there such devices? What would it take to read them? Are the devices like this that can do their one write, and all their reads through a common standard interface like USB? Note: I cannot create tags y...
Active Directory offers a feature called Service Connection Points to publish information to applications so they can discover the relevant server; however the documentation is sparse and I have trouble understanding Where the information is stored (Configuration partition?) What information is shared? How is it secu...
I have played with DNS a lot lately, and I have found that some big companies' web sites use the Akamai NS as the Name Server for their WWW servers, for example: $>nslookup > www.redhat.com Server: 192.168.43.1 Address: 192.168.43.1#53 Non-authoritative answer: www.redhat.com canonical name = www.redhat.com.ed...
Most browsers provide an option to save login-data for later use. Suppose a Windows workstation is located in a well-protected corporate LAN and only a well-defined set of application can be launched with a well restricted set of changeable in-app options. In other words: No one is able to run arbitrary applications. ...
Microsoft, Rackspace and other hosted providers allows people to RDP into that server. Here are a few examples: Microsoft has something called "Azure Connect" it is very easy to expose a domain connected terminal server to the Internet by simply pressing F5 to compile in Visual Studio (albeit with certain prerequisi...
I'm calculating loss expectancy (SLE/ALE) but where or how does one get data on annual rates of occurrences for various things? From simple hard-drive failure rates to something complex like the exploitation of client browsers? Or how about the effectiveness of controls and how much they can reduce the exposure factor?...
ESET detected this trojan, but I cannot find any information on the Internet on what it is. Google is only returning links on how to remove it, or what files have been detected to contain it. Semantec's threat database doesn't have it listed. Same thing with Mcafee's Threat Library. What website can I go to that will...
Each person in the company has a unique username/password, and nobody should log in with his username/password but him. I want a program that would inspect the logs that includes a list of all the people that came to work today, and inspect the list of the logged in users (from the AD or wherever is), to find if there ...
Im' renewing my certificate every year. Since I have to make a CSR, should I also renew my key pair at the same time, or is it ok to get a new cert with the same key ? Please supply any security standard backing up your answers. As I'm now going to renew my SSL cert for my domain, and wonder which approach I should ta...
we know that we have to create Private key on server and generate its public key and create a certificate. But what if we get a private key which someone already has. Isn't the security becomes weak in this case.
Amid all the discussion about password length vs. complexity (summarized by the famous xkcd strip and the followup dicussion) I am trying to make up my mind about passphrases made up with dictionnary words. I understand the various calculations for brute force attacks -- would you know of a reasonable study about passp...
Let's assume I have a PGP message and I want to know who sent it, is it possible to do it if I have the RSA encrypted message, two possible senders (and their public keys that they signed and encrypted with) but I don't have the private keys? It isn't just a signature, the header says: --BEGIN PGP MESSAGE--.
My website has been hacked lately and it has been defaced. Now I have weird files, don't know where they coming from. I just want to know, what of these files are harmful or can cause that I get hacked again. The .htaccess contains the following code: <Files 403.shtml> order allow,deny allow from all </Files> deny fro...
I'm trying to persuade management to purchase two factor authentication for securing VPN and terminal server access. I've made significant progress by demoing TSGrinder, but would like to list other utilities as well. What other similar utilities exist for the same purpose, but for a different software stack Nortel VP...
I've read a few things to indicate that restricted shells can be broken out of if not implemented properly (even wikipedia, for instance). I'm looking for some guidance on what causes security holes in restricted shells and how to solve these problems. I assume the main problem is the binaries that you allow the user t...
Earlier this year I was playing around on the schools computers and found out the administrative password to a computer in my classroom. I realized how XP stored their passwords, booted into Ubuntu, and took the SAM and SYSTEM files. I was wondering if it was possible to store these passwords on a remote computer and u...
The target users would be portable/embedded devices or resource limited code (i.e. javascript). The idea being that the devices could poll the service for validated primes and use them for encryption functions.
I have 2 Zyxel PLA407 powerline adapters. Router is downstairs connected to one adapter, other adapter is upstairs about 30 feet away connected to a desktop. I have a house, not an apartment or townhouse. I've noticed the speed is much faster when i just plug and play, rather than going through the encryption process -...
I want to securely connect to an API, but I'm not sure how I should obtain the CA cert for the verification step. I've seen some people get the certs using e.g.: openssl s_client -connect graph.facebook.com:443 -showcerts Is this method for obtaining certs secure? Should I use some other method? Edit: since there are ...
Is it safe to transfer Facebook access token via TCP? What is the worst that can happen if someone gets the token?
my friend and I are trying to make the most anonymous setup for a computer to do things across the internet without being known the location from which it came. Our setup is as follows: A windows machine, with linux running in virtualbox, with a spoofed mac address using tor to do internet things. Will this setup prov...
I just want to know if digital certificates use the kerberos session key algorithm.
Currently running a LAMP instance that developers are using for a variety of webapps. I have the following scenario: Multiple developers need access to create and modify files under /var/www/html The developers need to be able to access each other's code in case they are out on vacation, sick, etc. My thoughts ...
I have recently had random spam links inserted into 3 ASP.NET websites. The links are inserted into the physical file so it is not SQL injection attack. The websites have very little in common other than they are ASP.NET, 2 of them are MVC and 1 is webforms, 2 are c# and 1 is VB, etc. The server is Windows 2003 with I...
I have a web site where people fill medical syndrome questioners. They can see how their condition changes during the time period. I am not storing ANY PII information, just user name. I can store in encrypted (if I have to). My question is – Do I have to be HIPAA compliant? Remember NO PII. If I would store email addr...
Are there any security guidelines for development and assessment of (native) iPhone applications?
I have the following code in an SWF file that a vulnerability scanner marks as XSS: // Action0 { var __callResult_6 = getURL(_root.thankYou, "_self"); var __callResult_7 = stop(); } How can it be exploited and how can it be patched if exploitable?
I'm a part of a small company that is going to be implementing HIPAA compliance. We will be seeking legal counsel, etc so anything heard here will not be taken as legal advice, etc. I just want to bounce some ideas off of you guys. The basic spirit of HIPAA from what I have read: Ensure only authorized people can acc...
Possible Duplicate: How do i log all my internet-connections I have a program that connects to the Internet, this program apparently is sending out my mac address and computer information to a server but I am not entirely sure. The program is not a virus or a trojan, it's actually a tool for a game. Is there any too...
Sometimes I connect to the Internet using a VPN connection to be able to access the blocked websites. I've got a few questions regarding this: Are my important data (like my credentials) vulnerable to be eavesdropped on the VPN server? What if the protocol of web site I am connecting to is HTTPS? (like gmail) Is the o...
We're planning to give the possibility to write community-driven extensions in javascript for our public webapp and let people to customize their instances of the application. The problem is to monitor the quality of extensions. What would you suggest to automate this process? Or how to scan Javascript for malicious ...
What is the best protection against a "chosen-ciphertext" attack when transmitting (=streaming) secured (=crypted) data via networks using the TCP protocol?
I am developing an application which will run untrusted code. I have been designing it for linux, thinking that I can just run it in a virtual machine on windows when the need arises. The linux security features are that the untrusted code is in an interpreted language running under seccomp, with syscalls mediated by...
I am currently writing a paper on the future security challenges of Cloud Computing, and possible solutions to these problems. After many hours of reading articles on the internet (my nearby library have no books available at the moment about the subject) I have certainly learned a lot, but also gotten a lot more confu...
Assume a Windows 7 system (probably whatever home version comes with the machine), with the latest OS patches, latest IE and latest Firefox. Also assume that the user uses only Firefox for browsing, never IE, and that uninstalling IE is impossible or impractical. In the context of "safer" usage while browsing, is it su...
I run Windows with a pretty hefty c:/windows/system32/drivers/etc/hosts file obtained from http://winhelp2002.mvps.org/hosts.htm. I update this file as regularly as I remember and layer it with appropriate add-ons in my modern web browser of choice, A/V, and firewall solutions. Basically, I realize that a large (gener...
Is it bad not to validate length of user input to text field at server side. May it lead to such vulnerabilities as buffer overflows and other? I think it depends on programming language of application. So, please describe it for PHP, Java, .NET, Ruby etc.
I am creating a windows service that sends email to a user. It uses a Gmail account to send the email, so it needs a password to access the account. It also needs to do this automatically, without user interaction. How do I securely store the password so that the application can authenticate with Gmail? So far the opti...
A sniffs B while B is sniffing C. What's the traffic in A? Does A catches both B and C traffic or only B's?
I want to be able to offer ssh accounts on my Linux server for people to be able to use for SSH tunnelling. All accounts will be locked down with no interactive shell, for tunnelling/port forwarding purposes only. My problem is that I don't want them to be able to access services that are bound to localhost only by doi...
Completing an assignment for my Ethical Hacking unit at University at the moment and the first task I have is to crack some passwords. Decided to use backtrack to crack some passwords from a Windows XP box I set up. I'm using bkhive and samdump2 to get the encryption key to unencrypted the SAM file and dump it into a...
It's been argued that a GUID doesn't do a good job of being a one time security token , and it makes sense because GUIDs aren't random. In my scenario: suppose a given company is using GUIDs as a security token, and needs to see the math behind the possibility of a security breach, before they will consider it a securi...
Is this normal? Why is the Add-on named "x"? - not just this one, any add-on that I want to install named "x".. Why? p.s.: from the https://addons.mozilla.org/en-US/firefox/ site
How can one make sure that when PXE is being used to boot a remote operating system, that the data being sent is encrypted (or at the very least that integrity is maintained)? Would it be possible to fetch the iso with ssh?
I'm trying to find info regarding how format string exploit can bypass the PaX protection mechanism. As I understood PaX just features ASLR and NX protection. So I wonder if an attacker should use string format exploit to bypass PaX. Is it because you can print out the stack with format string? However it doesn't neces...
Let's say that I have a website that allows users to upload files (much like Dropbox), and I need to encrypt those files so that only the users that have access to them can view the file data. Users need to be able to view the file names/sizes via a web interface (but nobody else should be able to), and download the u...
I'm hoping this question will be appropriate for this site. The ServerFault people didn't think it applied to system administrators. Certainly I think it can be answered from a security perspective, if nothing else. Ever since the passage of Sarbanes-Oxley (SOX), IT departments around the US have used "SOX compliance...
What are the different aspects to consider for Enterprise Encryption policy? So far the resources I have are: https://www.owasp.org/index.php/Cryptographic_Storage_Cheat_Sheet http://esj.com/articles/2008/07/01/8-best-practices-for-encryption-key-management-and-data-security.aspx http://securosis.com/reports/Securosis_...
In response to SOPA and a number of high profile security breaches at certficate authourities in 2011, the EFF has released a soverign keys proposal: https://www.eff.org/deeplinks/2011/11/sovereign-keys-proposal-make-https-and-email-more-secure As a security community can we see any design flaws and proposed changes in...
Before I ask my question, I would like to make sure that I understand the settings correctly. So, the given: A client, using some web browser (firefox, for instance) - the Client The bank server - the Server The Client establishes HTTPS connection with the Server An SSL certificate signed by a well known CA is used Th...
Today at work, we brought out some PCs that were not used for a long time (were not in use when I joined this company so I have no idea about their history). After booting one of them (Windows XP Professional), I found that the system time is not set, so I tried to use NTP and sync the system to a time server. I used t...
I am writing an open-source Java application for Google App Engine (GAE). The application will let users create content that is intended to be private. I want to provide reasonable assurances that no one (including me, as the site administrator) will be able to read private content that belongs to someone else. What...
I would like to build the following project: public REST API back end which can be accessed by any authenticated client. front end with static files in HTML/CSS/Javascript with Backbone.js jQuery calls to the REST back end. In fact, there are three parties in my architecture : the front end, which is a client of the ...
On two websites which I host for a friend, I found that there is an iframe at the bottom of each site's index.htm file. <iframe src="http://www.kunstsalen.dk" width=1 height=1 style="visibility: hidden; position: absolute;"></iframe> This isn't something that should be on his home pages. It is causing a security warni...
How can I go about killing IP connections that seem to be sending a lot of requests to the same url? Let's say I have someone who requests the same url for more than 10 times in 5 seconds, I want to "cool" him off. Any ideas on how it's done?
I had a long discussion with my co-workers whether key-based SSH authentication (particularly for OpenSSH) is more secure than authentication using passwords. My co-workers always connect to servers with passwords, while I prefer to log into a system without having to enter a password every time. They fear that it is n...
Imagine the following scenario: I go to login to MyApp.com, but realized that I forgot my password. I request a new password sent to my email. The email arrives with a link to change the password (but no password is sent). Clicking on the link takes me to a change password screen, but it also logs me in to the account...
For SVM or VT-x, the set of conditions which trigger a vmexit to the virtual machine monitor is pretty complex. Can an unprivileged process trigger any of these without assistance from the kernel? The documentation for VMMCALL and VMCALL both say they only work in ring 0, so I assume they're OK. This is a followup qu...
If I store cardholder details (PAN, Expiry etc.) in a Memcached data bucket, is that something to worry about in terms of PCI DSS compliance? Our database is in a data center and is encrypted. Our web server is also in this data center. If I cache cardholder details on a Memcached server node which is running on the sa...
Could someone please point me to a link with some information on multibyte character exploits for MySQL? A friend brought them to my attention, but I've not been able to find much information on the Internet.
I have a LAN network with three computers connecting to the Internet both through wired and encrypted wifi connections. Is there a way I can check who is connecting to the Internet via the wifi connection?
If the following is the code snippet, what would be your suggestions? <script type="text/javascript" src="<%=request.getHeader("Host")%>/XXX/xxx.js"></script> Is this a clear example of XSS? If yes, what are the attack scenarios which can be used by an attacker?
We have implemented/are implementing a network vulnerability scanning process, and we have chosen to use Qualysguard. Qualys supply a scanner appliance for the internal network scanning, which obviously connects to the network. Our internal network is segmented into multiple subnets, each firewalled from the others. We...
Can somebody explain to me how a wireless AP denies access to the network if the client does not have the correct MAC Address. Does it not send a probe response when a client has not got a correct MAC. Or when the client tries to authenticate, it gets denied. please can you include reading sources as well, if you know ...
google.com's X.509 certificate issuer: http://www.flickr.com/photos/31717414@N06/6543437881/ The certificate authorities installed in my browser: http://www.flickr.com/photos/31717414@N06/6543437849/ I see plenty of Thawte stuff but no Thawte SGC CA and Thawte Consulting (Pty) Ltd. stuff. Shouldn't the name of the iss...
One of Blackberry's strongest assets is the "network" that it uses. Can someone explain, or link to technical information that covers what this secure network is, and what it does better than the rest?
It has been said Common Criteria solves a "Compliance problem, and not a security problem". Can someone explain where CC certification is required or benefits an industry? Is it simply a marketing angle that helps sell a product to less-informed VPs/execs? What are the practical benefits of it, or where is it benefi...
I've written a scriptable IRC Bot and I want to harden it against exploits. To that end I've already written it so that it ignores its own messages (so that, for example, even if it echoes back valid commands for itself it won't execute them) and restricted certain features to a list of "authorized nicknames" so that s...
Is running an OpenBSD** using QEMU on an OpenBSD safer then running just natively an OpenBSD? ** = only used for apache + scp + ssh I'm thinking about running the OS/webserver in QEMU because then I could be "more flexible" to use the securelevel configured to 2: http://www.openbsd.org/cgi-bin/man.cgi?query=secureleve...
Anyone know of good format string vulnerability tutorials/videos that demo how to test on a web app, such as modifying the URL. I've watched Vivek's videos from securitytube and another from CarolinaCon, but am looking for a more detailed/visual demo of how to apply it in web app pen-testing. In addition, I have seen o...
In the case of a rooted phone, what are the various options to stay anonymous and keep your data secure? I've seen the guys at The Guardian Project work towards this: https://guardianproject.info/apps/ And Whisper Systems: http://www.whispersys.com/ Is there any means to individually protect each application with a pas...
The whole idea of a signed boot image is to prevent replacing the boot image with something customized or malicious. However, the entire process seems to be reliant on a single point of failure: the verification of the image signature. The boot loader will need to verify that the signed image has been signed by the pr...
http://www.thoughtcrime.org/software/sslsniff/ If I have a domain on my HTTPS Everywhere list, so that theoretically it could be only visited via an HTTPS connection in my Firefox, then could an sslsniff attack be successful against me? Could the attacker get information because the sslsniff degraded the connection fro...
https://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.2_.28SSL_3.3.29 and http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/ when will the webbrowsers have TLS 1.2 support?? BEAST was in 2011 September!!
I would like to make an application similar to RedPhone on android. I took a look at SipDemo from developer.android.com and at the android.net.sip package. My question is, when you make/receive a call, how can you get the audio stream to encrypt/decrypt it before is being sent/played back to the user? Is there a tutori...
To be more specific, I would like to get some help, either through a tutorial or through a book, on how to configure an apache server to run securely and minimize the risks for commercial use. -Important to note, I am not asking how to install it or minimally configure it, as I have learned to do this. I would like to ...
I have code to encrypt data using a public key and decrypt it using a private key. This is useful when a client wants to send data to a server and know that only the server can decrypt it. But say I want the server to encrypt data using the private key and decrypt it using the public key, as a way of distributing data ...
I'm working on a solution to identify if a machine is a member of the domain or not. We are using Checkpoint R75 Identity Awareness with two possible methods to retrieve machine identity. AD Query to pull out machine authentication from logs. Identity Agent (software) to log on to the Domain Controller via the firewal...
Suppose if there is some code like <a href="<%=request.getHeader("Host")%>/xxx/abc.do>SignIn</a> Can an attacker fake request.getHeader("host") to point 'SignIn' anchor to attacker's URL e.g. attacker.com/xxx/abc.do? If yes, how? If no, why not?
I'm looking for something like a known proxy servers IP list (text, comma seperated or database based). Do you happen to know if anything like that exists? Free would be nice. I doubt it because these things change every day, but as various websites contain big lists of available proxy servers I think it could be a pos...
I'd like to learn more about how a captive portal works, especially the management system regarding usage, security monitoring, billing, security architecture etc. Does anybody know any good resources for this? I either find cheap sales-talk, or installation guides...
I'm currently going through the logs on my apache install for potential intrustions, and I'm finding a lot of hits for SQL injections and exploit testing, from 173.212.195.* . I'm now trying to find out how I could find who owns the block of IPs which these IPs sit in? I've looked at Wikipedia's list of assigned Class ...
The first time each day that I attempt click on the 'Mail' link from the Yahoo home page, my browser (Seamonkey) throws up a dialog with the title 'Secure connection failed'. The content in the dialog reads - ak1s.abmr.net:443 uses an invalid security certificate This certificate is only valid for search.dnsadvantage....
I am a member of the local ACM student chapter in my university and as part of our activities I am scheduled to give a talk on current issues on Web Application Security (and possibly secure coding measures). The talk will be presented at the students of our computer science department and will last around one hour of ...
Imagine the following scenario: User is at attacker.com and plays a game there. Just before he clicks at some point he is rerouted to victim.com using browser's history. User thought that he clicked at attacker.com but really he clicked at victim.com thus involving undesired operation. See demonstration of it at http:/...
What type of captcha will you recommend? I am looking mainly at usability, ease of use (development too), relatively secure Usability I find that those captcha with very curly words/numbers are sometimes too unreadable. What I start to see in many applications are simple calculations "Whats 5 + 15". seems simple, but t...
I'm getting a lot of hackers spamming my domain with requests for files that just don't exist. This is eating up a lot of my allotted bandwidth and I'd like to blacklist these IP addresses. Is there is a way to automatically blacklist IP addresses in Apache once they have requested X number of files that 404 in a speci...
I haven't read much about such a technique, but I'm wondering if there's any sort of best practice around the use of "canaries" to detect certain types of intrusion: Create a bogus account that should never be logged in -- if someone attempts to access that account, report an intrusion attempt. "Seed" the database wit...
This question might be vague, that is because I am not sure where to start. There are a lot of books and courses on pentest focusing on networks, systems, and OS such as windows, yet I haven't been able to find anything on mobile platforms such as iOS/Android. I am very interested in learning on how to pentest and secu...
I see the main reasons for a firewall on a web server to be defense in depth and extra cushion for a possible admin error of running an unnecessary daemon. I'm trying to see if I am overlooking something. I am thinking that in a situation where you have a small infrastructure (a few servers) that you control it's not f...
Some of you might be familiar with this attack called Self Contained XSS. I recently stumbled upon this article about it. So how bad this kind of attack can be, even though this doesn't have access to the current DOM elements? Has anyone seen this in the wild? Does this affect mobile browsers too? Another useful link...
For example, say an unsuspecting visitor gets a link security.stackexchange.com/.... Then it re-opens the login page, with or without an explanation as to why they have to log in again. (this is more likely to be a problem for place like Cooking or Music than a community of Security enthusiasts) At least in StackExchan...
I always use strip_tags to prevent XSS attacks, but today I saw a post which was telling it's horribly unsafe. As the manual says, it doesn't check for malformed HTML! Is it true? What can I do to prevent XSS?