instruction stringlengths 24 29.9k |
|---|
If somebody can edit $("#field").val(), can they change the url property here to point to another location?
$.ajax({
url: "http://mywebsite/script?param=" + $("#field").val(),
dataType: "jsonp",
success: function(response) {
document.write(/*fields from response object*/);
},
});
If they can then my pag... |
How do you restrict user access to a corporate web site to a particular machine ?
including the following conditions :
Each user is meant to use his credentials ONLY from the assigned machine.
The website is deployed on the internet.
Static IP's are not affordable due to huge number of users.
The corporate web site ha... |
Possible Duplicate:
New XSS cheatsheet?
Can anyone give me list of ways to encode XSS payload , or to be precise what are the ways to encode XSS payload to bypass encoding of <> or ().
I know about double encoding bypass with %253c and Unicode , but I want to know all methods available. Thanks
|
I haven't been able to find much in the way of professional reviews for Secretsync - http://getsecretsync.com/ss/
But i'm wondering how it compares to Boxcryptor and Truecrypt. How secure is Secretsync really?
|
So it's an everyday thing... people don't want to turn off their computer while their going out to the toilet..., etc. So they hit "ALT+CTRL+L", and the GNOME-screensaver locks their Desktop. After they return they just type in their passwords, and the work could go on..OK!
BUT: There are usually problems:
NEW (today)... |
As mentioned in the title I'm looking for a tool that puts on a webserver some .html or .php files filled with popular malware like java drive-bys or other browser exploit payloads? Maybe there is something like this in Metasploit or on BackTrack?
|
A web application I've been developing has a new use case that has me searching for something easier than username/password authentication.
Current users don't sign up for the service themselves because it's a b2b service being used by their companies, so for standard username/password authentication we send them their... |
I'm trying to find a solid architecture for authenticating users against a database. I have a game client, which I plan to serve up a request with. The transport doesn't really matter, but at this point I'm thinking http and leveraging either SSL or ws-security to ensure the encryption of data over the wire.
I'd like t... |
Wired reports that there are many security issues with Programmable Logic Controllers (PLCs) and now there is an easy to use tool to scan and detect vulnerabilities.
They say it's so easy, the update for Metasploit make it analogous to Firesheep for PLCs.
What must IT shops do to prevent attack?
If the PLC controlle... |
My app creates an PDF file and uses an user entered info. How can I avoid all attacks with PDF vector?
Will htmlspecialchars be enough?
I don't want to enable JavaScript in PDF.
|
I'm having trouble with my SD card, and have been asked to inspect the output of tail -f /var/log/syslog, sudo lspci -v -nn, sudo lsusb, and sudo lshw. tail shows nothing when I insert the card, so there's nothing to post - no worries there. Inspecting the output of the other commands, I can't find any evidence of an S... |
I am implementing an IDS and just want to know that what are the possibilities with which the intrusion can occur. I am just doing a literature survey over the attacks possible so I want to know that what are the types of intrusions possible in host that can compromise the security of the system which can help make me ... |
I don't really know how to do either, but I was wondering if it was possible to have multiple firewalls / virus scanners installed at once, and use a 3rd party program to specify which one is running at a time. Example, if someone were penetration testing or something of that nature, one firewalls / scanner might pick ... |
I have a small server which only open ports are ssh, http and https. I have fail2ban installed and set up so that after 3 failed attempts someone gets blocked for 10 minutes (thats the dafault I think).
root login is disabled but people trying to access it don't get blocked.
cat /var/log/messages | grep ssh shows like ... |
I often see passphrase suggestions written as a sentence, with spaces. In that format are they more susceptible to a dictionary attack because each word is on it's own as opposed to a large unbroken 20+ character 'blob'?
|
What effect would there be if you used the same value you were hashing as the Key in an HMAC?
For instance given the following example:
message: "my secret message"
nonce: "0BHKK9IFbdF85KrzMFNpauyxWsM="
If I combined the message and nonce (message + nonce) and use that combination for the HMAC Key and that combinatio... |
In the wake of the recent database hacks, i.e. Sony, Gawker, etc.. where the hackers have access to the hashed usernames and passwords, i've been more keen in paying attention to the sites and services i regularly use, and am paying more attention to how my data is stored. I know that Gawker used DES, i believe, to enc... |
I had to use my utility company's online account information application and forgot the password. Going through the steps of resetting the password I was emailed the password in the open. I found this pretty insecure and contacted company with my concern, they basically said that they don't feel that hashing passwords ... |
It's common to encrypt passwords in the database, but I'm wondering what solutions are out there to protect emails in your database.
Not just from hacking, but from disgruntled employees or engineers losing a laptop with a copy of the database etc.
Unlike the password, we'd need to get the original email out periodical... |
I have a Citrix Netscaler and want to configure the appliance appropriately so that it can protect my hosts from a DDOS. Is this something I can do here, or must I take action on the host itself?
|
openssl_digest vs hash vs hash_hmac
I want to use SHA512 for storing password.
Which of the above methods are best to use? Why?
What is the difference between SALT & HMAC?
I just read that HMAC is built on top of hash function.
So is SHA512+SALT+HMAC really necessary or SHA512+SALT or SHA512+HMAC?
|
Looking for a template covering the disclosure information security practices that are standard in Business-to-Business partnerships that share data.
For example:
Access management
Password management
Data encryption in storage
Data encryption in transmission
Audibility and right to audit
Destruction of data
Notice of... |
I have both a couple of X.509 Code Signing certificates and a GPG keypair that I can use to sign against code I run on my VPS. Every now and again I write code for iOS, OS X and Windows and always ensure I sign my binaries with my X.509 certificates. However, I would like to ensure that anything I run on my VPS (in reg... |
Possible Duplicate:
Which password hashing method should I use?
I want the best cryptography algorithm for storing passwords in database, which one should I use and how can I implement using java code and please suggest available APIs for the same algorithm also.
|
I am using ECC algorithm for security. Now the concern is I am placing the data in web page after encryption of the data in hex format and transmit to server and then it decrypts the data, but when I encrypt the data then at that time then the method returns me the byte [] and then I will have to convert that byte [] i... |
Section 2 of RFC 2104 defines the key used in HMAC should be padded with zero bytes up to the block length of the underlying hash algorithm.
Isn't this a potential security vulnerability since any key ending in a zero byte would produce the same result as a key without that last byte?
The following PHP code illustrates... |
Palo Alto, and probably others firewalls will offer it too, has a feature to do malware analysis in a separate (cloud-based) process that does not impact stream processing. What I would like which risks could be related with this approach. Some problems that I thought:
Privacy: Which kind of data is sent to the cloud ... |
I am always confused by the way the word authentication is used in security literature (i.e., outside the crypto realm). Most of the time I understand that they are actually implying identification.
For example from Wikipedia: Central Authentication Service uses the term authentication to imply identification (if I un... |
Is a new website blocked by default in China ?
I just put online a new website dedicated to chinese people (a working days calculator in China, nothing subversive indeed).
However a friend of a friend living in Beijing told me that my web site is not reachable from there !
Is by default a new website not authorized i... |
My bank (and every bank I've come across) only ever asks for individual characters from my password when logging in. Is my bank storing my password in plain text?
|
My model is one where I have several clients which wish to speak with some (but not all) of the other clients.
All messages will be sent through a server.
Only the two clients communicating with each other should be able to know the message. So the server AND the other clients should not be able to work out what messag... |
BIS is a technology from Blackberry that allows end users to connect to an Exchange server without a BES server.
The problem is that BES asserts a security policy on the devices, and BIS does not recognise this, or support remote wipe functionality, local encryption (etc.).
How do I block (and optionally detect) BIS c... |
I'm trying to figure out a way to meet multiple business requirements that don't seem to go well in hand in terms of security:
store encrypted card data associated with customer accounts for recurring payments
store salted hashed card data to facilitate encrypted card lookup
store truncated card data to facilitate cus... |
One can configure Sql Server 2008 to run in FIPS 140-2 compliant mode, in the same manner as running Bitlocker in FIPS 140-2 compliant mode. Which is to activate FIPS 140-2 compliant mode in the Local Group Policy Editor dialog.
From Instructions for using SQL Server 2008 in FIPS 140-2-compliant mode:
...you must run... |
I am working on an IDS which has brought into the view of log analysis basically. I have to detect an intruder if there are any user behaviour anomalies present in the logs. I am having problems regarding setting rules for the Log Processing. So anybody with any suggestion about How to set the rules?
|
I've been reading more and more about just how much access browser extensions can have to your data. This is a little unsettling, so I'm curious if there is a way to Vet these extensions and make sure they're not sending any personal info back to their servers.
Is there a way to check this?
I know there is a Chrome Ext... |
I have a small number of different workstations (plus client devices like iPhone) that I use for to connecting to numerous servers using SSH.
Originally when I learned about PKI, I created a single key pair on my workstation, which I promptly started using from everywhere (meaning I copied it to my laptop, etc), and us... |
I am in the middle of setting up an ecommerce solution on a commercial website.
My system will store card number in the form of : xxxx-xxxx-xxxx-4000 (just the last 4 digits) and XXX (nothing) for the CVV code. The full details are sent to an external gateway (raven).
I would just like to know what level of PCI DSS com... |
So I'm in the process of working on part of our new role based site security system and have come up to the "nuclear missile" condition.
The system is based around the idea of grouping, with the ability for users to be implied to be in groups based on current groups, like so:
Tom is a master Cake Maker
by putting him ... |
Are there code scanners in the market that scan HTML 5 code?
Does anyone have a list of tags of specific CORS configurations that need/can be scanned?
|
What is the meaning of SQL injection? I am not able to understand the term. And what problems may be caused by SQL injection?
|
I want to check that my router is working like it should. For example that certain ports which should be open on the LAN side and closed on the WAN side really work that way. So I would like to run a few simple tools like nmap and netcat, from the outside. But from which computer should I do this? I don't think that mo... |
Is there any good learning resources for Scapy apart from the official documentation? I am looking for a good book about the Scapy
|
I read a lot of entries at stack exchange about bcrypt and why it is supposed to be better than PBKDF2 in terms of password storage.
I'm asking now if bcrypt is better than PBKDF2 in terms of key derivation? In my case, I only have to derive a symmetric key for AES encryption (e.g. 256 bits key length). This key doesn'... |
Lets say that I periodically change the pass-phrase on a truecrypt volume. The volume is regularly backed up, so my backup system has many copies of that volume, many of which have a different volume header due to having different pass phrases.
If an attacker gains access to my backup system, does having access to many... |
I need help understanding the dynamics of an sslstrip attack. I'm using it to test the security of a site that I own. I can successfully sniff the victim (in this case, myself) credentials over the internet but when the same attack happens against Gmail or MSN traffic I get no stuff back. It is completely static in tha... |
According to this article Iran has criminalized the usage of encryption and VPNs.
According to this blog post it is still possible to use SSH tunnels in Iran.
For me SSH is encryption and thus forbidden in the Iran, but I wonder how online banking, which requires SSL, works over there and if OTR (eg for pidgin) and PG... |
So Microsoft was partly responsible for taking down the Kelihos botnet back in Sept 2011. They used a variety of legal and technical measures to do so. I don't want to get into the global politics and legalities of what legal measures they took, but from a technical perspective, what makes up someone's toolchest when... |
I am toying with the idea of adding keyfiles to various things that I encrypt. However what's been keeping me from adopting them is guaranteeing that I don't lose the keyfile while still keeping security.
My issues is that with passwords if you think long enough and can try enough you will eventually remember it. Keyfi... |
Let say I use Eraser (or other tools) to erase my hard drive (using DoD standards which is 7 times or Gutmann which is 35 times),
These eraser tools just write random data on the hard drive many times correct?
Also if encryption looks like random data, how can anyone say its encrypted or not without you confessing?
If ... |
Assuming the systems that store the Gmail database is compromised what is preventing them from reading everyone's emails by looking at the data in the database?
I assume nothing, and in order for this to be prevented the email data would need to be encrypted (something which GMail presumably does not do). Is this a co... |
I'm doing my final year engineering project. I went through some ieee papers and came across something called colluded truncation attack. Can someone explain what it is. I'm planning to do the project in mobile agents platform using Aglets (java mobile agents). Concept is something like this - a mobile agent moves from... |
From what I can tell, the gist of the new Privacy Policy from Google is that they're making a blanket policy to allow using your data between all their services, however they see fit. So now one policy will cover all 60+ services they offer.
Learn more here: Google Privacy & Terms.
At first glance this makes me nervous... |
This is kind of an extension of my other question.. If you were not storing any of the passwords locally (caching disabled), would a user some how still be able to circumvent around this security measure? I am not quite sure how this all ties into the registry / SAM & other files.. So would someome still be able to use... |
I am using Splunk to centrally collect all of my logs for PCI-DSS. I'm running into my licensed volume limit and I need to know exactly what needs to be retained for regulatory compliance.
I am picking up a bunch of kerberos ticket events, mostly event 4769. Is there a specific reason these need to be retained? What a... |
My boss just asked me to create a fictitious log entry to say that a user's account was updated before it was, to win a dispute.
I feel this is not right because I am trying to start a career in working with data technology. Whether or not I get caught, the integrity of my data will be questionable, and my character co... |
I was watching The Girl with the Dragon Tattoo, and this female hacker was really good at hacking. My question is, how is it possible for her to crack passwords besides the brute force approach? I can't think of anyway besides it. And if that's the case, then why do movies make hackers out to be geniuses, if there isn'... |
In some of the posts I've read on this site such as Is hacking legal when a friend allows you to attempt to hack their system?, and Best way to test my home network from the outside, users who responded pointed out that testers should notify or request permission from their ISP to do testing. I have difficulty imaginin... |
I'm in the process of setting up a Ubuntu server on Amazon Web Services / EC2, which will need to host the following:
A relatively simple Java-based website (using the Noir framework)
A Java-based web service and REST API
Some method of logging in remotely via SSH or equivalent so I can administer the server
Before I... |
With relation to the necessity of a verifier being transmitted from the client to the server prior to any handshake steps, I was wondering how this is supposed to happen securely? To me this seems like a user registration before using the system, but doesn't that defeat the idea of zero-knowledge password proof?
I'm... |
I have what I think is a security IT question (I'm more of a programmer myself).
Assuming I am running a dedicated machine (say a PC) for a single program, meaning that the only port visible and open to the outside is the port this program is listening on.
Additional assumptions:
The program's code has no exploits, me... |
I can't understand why we commonly force users to come up with difficult to remember passwords.
* Your password must contain at least one number, one uppercase character, and one special character.
Is this to protect the user from themselves (someone logging in by guessing their password), or is it meant to protect o... |
We can devise the best technical solution to a security problem, but that solution needs to be applied by people, by a business, to an organization, and/or in spite of objections.
The barriers people have to implementing security interests me greatly because it affects me directly. I know others have asked about "how ... |
I am trying to add encryption functionality to a PHP script, modeled on an existing C# application.
The C# app uses the Rijndael algorithm with default constructor. From this I am able to determine that it has a key size of 256 and a block size of 128.
I am unsure about selecting the appropriate cipher for php's mcrypt... |
I am running a small website where I have published some articles.
I am also very interesed in security topics and tried sqlmap on my website. It found the database name, so my question is how it could find it.
The website is very basic and does just contain a very small number of php files and I have just tested on t... |
I have a problem I need to solve - specifically, how to hand out passwords to people in a variety of locations, and with a wide variety of access.
I've thought of some options, but there are drawbacks to all:
Email: insecure and travels in the clear, unless it is kept internal to the company. However, some mail is for... |
I ran across an odd notation in the jsfiddle.net generated pages
<script type='text/javascript'>//<![CDATA[
$(window).load(function(){
$('form, table').animate({
opacity: 1
});
});//]]>
</script>
I sometimes feed JSON data directly into a script. I personally do not use CDATA notation, but I am wanting to conf... |
I just read a paper about Local File Inclusion on exploit-db.com, it can be found here. One technique with LFI is log poisoning as you may know already. You do an HTTP GET request that contains PHP code. Since it's not a correct HTTP request it gets logged in the apache error.log. Now the attacker can execute the PHP c... |
Do token-based authentication solutions (such as RSA SecurID) mitigate tools like incognito and/or pass-the-hash tools?
|
I am wondering if IT Auditors use a methodology or framework to audit a backup policy.
Here is a example of a different kind incase my question does not make sence:
~~~~~~~~~~~~~~~~~~~~~~~~~
A programmer may use a methodology which refers to the 'Waterfall Method' in relation to their design/ approach.
~~~~~~~~~~~~~~~~... |
In our time of SOPA, PIPA and ACTA, I was wondering what could happen if a government wanted to remove the certificate of a website ?
CA are companies, so they would have to obey to instructions from their government. What could happen if they wanted to remove a certificate issued by a CA ? What would be the impact on ... |
I have been pen testing a random android app that uses POST method to send data to a remote server using HTTPS.
I have set up a proxy and am able to intercept the traffic, however the POST method appears to be encrypted and "url-encoded" .
What i want to know is .. is there a common encryption standard followed in such... |
I set up a new laptop recently and, after installing various developer tools, it started causing our Sonicwall firewalls to issue an alert email whenever the laptop connected to the network. The message (with an artistically modified source IP) was:
"Alert - Intrusion Prevention - Smurf Amplification attack dropped... |
A friend of mine just started a job at a security sensitive company. They've provided him with a laptop with Windows XP Professional installed. He's heard a rumor from other employees that the laptops may have key loggers installed. Is there any way for him to confirm or disprove this allegation? Will this be as simple... |
Is it possible to prevent network users from creating unauthorized outgoing VPN connections to avoid network policies?
Edit- What is the best way to detect unauthorized outgoing VPN connections while they are in process or after they have occurred? I assume there are software solutions?
|
Given a one-time password generator that is time-based (such as Google Authenticator), how many instances of (time, PIN) pairs would one need to significantly weaken the algorithm to a point where one would be able to narrow down possible seeds to the original function? If one were to send out PINs to clients via SMS o... |
We are thinking to move some of our intranet sites to public cloud.
Is there any way to keep using company SSO to authorize access to those sites from the company intranet?
|
When implementing a HTTP Digest server, there's the issue of nonces.
Server nonces (as opposed to client nonces)
must be issued by the server
may be re-used by clients as long as the server allows it
knows nothing about what user will use the nonce later
A naïve implementation is to remember all issued nonces in memo... |
I'm guessing that all guests would be screwed, if the hypervisor is hacked. I found this article, but it seems to be more focused on privilege escalation of guests. I'm more interested to hear about other exploits on hypervisor managers. Many providers use VM control panels like SolusVM. Wouldn't it mean that a securit... |
I want to make a security feature that will go farther in discouraging people from looking through a secure system or server than what I have seen being implemented.
Specifically, is there a way (or has it been done) that you can create a setup that will only allow access if a certain "tempo" is kept? More importantly,... |
Should I make sure that I get all of the uids associated to my OpenPGP key signed, or is it enough to have one of them signed?
If Bob can guarantee that alice@example.com belongs to Alice, I can't see any security problem in assuming that Bob also guarantees alice@example.org to belong to Alice as well, if alice@exampl... |
How would you go about reverse engineering malware W32/Malware!Gemini. Recently I found it installed on my computer and would like to trace where the data is being sent.
|
threat modeling would definitely help in determining the test cases and where to fuzz but my question is specific to code scanning. Would threat modeling help in focusing/prioritizing or any way static code analysis?
|
Why not? Seems like this is only used for clickjacking, the solution should be simple enough.
|
FINRA, the ISAC and IC3 issued an alert regarding e-mail based attacks that attempt to obtain client contact information. They then use social engineering / persuasion to complete the attack.
What should the IT Security department of a Broker/Dealer do to specifically address and mitigate these threats?
What technica... |
I want to implement PAP and CHAP based authentication in my Java project how can I implement ? is there any API available in Java for using that protocol ?
|
Is there any way possible to restrict user to make a connection to the FTP server on my Windows XP computer?
I have an FTP server established in Windows XP and now I want to make access to that FTP server restricted to deny brute force attacks.
If the machine was Linux then I would use an iptables chain to restrict u... |
How secure do you consider this process?
A drive has data from a previous OS installation.
A new OS installation is made on the drive, and Heidi Eraser is run on free space.
What are the chances of data being recovered from the original install?
|
Password Safe and Password Gorilla are both programs to manage passwords. Both store a list of user passwords in a file, which is encrypted using a master password. They use the same file format, so you can alternate between the two, using the same file, as Joel Spolsky recommended.
Password Safe was created by Bruce ... |
I came across http://userscripts.org/ and learned that it is popular among web-users to install something called "Greasemonkey" to allow client side scripts to run.
What are the benefits of Greasemonkey to the IT Security Professional?
Should IT Security be concerned about the growing use of Greasemonkey and related br... |
I know these are a common thing to do during the Summer semester for Computer Science students at large companies like Facebook, Apple, Google, etc.
Are there similar internships available for IT students? Security? Hell, even Business? I'm majoring in Management Information Science (Bachelors, falls under Business Adm... |
I guess the example can make it easier.
Assume each Client on a network has an identifier(some alphanumeric sequence) which identifies it uniquely on the network. Each time the Client corresponds with the Server over the network(encrypted), the Client sends its identifier to identify itself. Now if somehow this identif... |
I am creating an API service that is going to require authentication. this will be the first part of a project that will include a front-end service for my website, and also open up the api for 3rd party client front-ends to the service.
I have been planning out how I am going to split my site into the backend/frontend... |
Let's say that my password is a single character: "a".
Couldn't I chain hash it 1000 (or more) times and make it nearly invulnerable to rainbow table attacks and brute force?
Why isn't this preferred to salting and what are the problems with this technique, if any?
EDIT: Clarification: By chain hash I mean hashing the ... |
I'm deploying a web-based ERP system for a customer, such that both the server and the client machines will be inside the customer's intranet. I was advised not to allow the server machine to connect to the internet, but the clients won't have this restriction. However, I need access to both to provide support, so I'm ... |
Is there a way to basically have an allow all policy on your top level domain, and any subdomains disallow all? I would rather that my public facing app servers not get indexed, but from what I can tell, no robots are even polling for robots.txt when it hops from our top level domain to a subdomain through a link.
I'v... |
I noticed some HTTP Handlers in my Web.config that appear to intercept HTTP traffic and manipulate it.
Since there has already been an exploit with a similar component produced by Microsoft, what should be done with *.AXD's produced in-house and 3rd parties?
Should I treat servers with custom AXD's differently than oth... |
A client on a company can run commands and view the Group Policy settings applied to his own account and computer.
The commands are:
gpresult (and all of its variants)
rsop.msc
In my opinion, telling a user what is being enforced upon him can have a minor flaw, as the security administrators will sometime prefer obsc... |
I will be using scrypt to store passwords in my application. As such, I'll be using SHA-256 and Salsa20 crypto primitives (with PBKDF2).
Having that in mind, how big salt should I use?
Should it be equal to the size of SHA-256 output: 256bits or should it be equal to number of bits I'll take from this password stretch... |
I need to design a state machine model to solve conflict of interest in computer security. [I know Chinese wall model but it is an information flow model]
Are there any such existing models?
Any reason as to why we cannot design it as a state machine model?
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.