instruction stringlengths 24 29.9k |
|---|
This question is directed at the .Net framework, but would hopefully be answered to encompass many languages & frameworks.
Let's assume I have a two methods, one which actually decypts data and one which takes the decypted data and returns it to the user:
private string Decypt_Data(string encryptedText, string Encrypti... |
From https://en.wikipedia.org/wiki/Capability-based_security
Capability-based security is to be contrasted with an approach that uses hierarchical protection domains.
From https://en.wikipedia.org/wiki/Protection_ring
hierarchical protection domains, often called protection rings, are mechanisms to protect data and ... |
In Linux, do sudo and su belong to Capability-based security ?
For example, when editing a system file, we usually need sudo or su to temporarily switch to user root. Does this example belong to capability-based security, or to protection rings? Does this example need some system call to the kernel, or just the privill... |
I have a Service written in c# which uses asymmetric Encryption to Encrypt Data, and a client application which Decrypts the Encrypted data received from the service.
How can I do the following things ?
I need to save the private key in a secure way that no one can read it (preferably in DB).
Transfer the public key ... |
I am planning to implement diskless clients for booting Windows 7 clients. I am trying to determine whether to use PXE with TFTP or iPXE with HTTPS or iSCSI.
Are there any vulnerabilities with using PXE and TFTP that may justify using iPXE instead? Does TFTP provide any sort of security?
|
Reading up the XSS attacks on wiki I see that it says an injected script could send data/cookies to the attackers site. How is this achieved? Are there no checks/restrictions on cross origin requests like this from a browser? I thought the CORS spec was specifically done for this purpose and the original site must set ... |
I found this article that claims asymmetric crypto signature of DH-obtained key prevents MITM:
http://www.gremwell.com/ssh-mitm-public-key-authentication
Key idea:
The value of 'signature' is a signature by the corresponding private
key over the following data, in the following order:
string session identifier
by... |
Like when I browse a website using SSL from my laptop that is connected to my router using WPA2. My router talks to my ISP using IPsec.
Is that more secure or do these types of encryption have nothing to do with each other?
|
I am looking into setting up a secure Ubuntu server with daily backups to two different external hard drives that will be swapped with the external hard drive that is stored in a safe deposit box. The hard drives will be encrypted.
My question is, is there a way for Ubuntu to detect the serial number of the external h... |
I have two internal servers that are going to communicate with each other; they speak HTTPS. Is there a best practice for authenticating communications between internal servers?
Short of a best practice, my current idea is to have both the server and the "client" (really another server, but a client in the HTTP sense) ... |
Looking for a link to what I believe was recent research that was similar to "RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis" - but instead of being based on acoustic emanations, the research used electrical signal processing. Physical access to the system was required.
|
I have a bunch of applications, where users need to log in. Not everyone can be a user, each user has to be approved of by an admin. The authentication should be a SSO solution, where user accounts are created and managed in a central application.
My idea is to use OpenID. The central application acts as OpenID-Provide... |
What is the best practice for choosing GPG user id(s)?
I've read various bits of advice, which sometimes even contradict each other. For instance, I've read that one should not use comments, because they are not part of your identity. But strictly speaking, neither is your email address (as it likely will change, and ... |
I know that Tor is used for anonymity while browsing in the Internet. I heard that by using Tor, it is possible to hide my IP. But is it possible to hide my MAC address also?
|
For all of my hobby web projects, I have coded a login system that these projects share. There is no critical data in these projects, the only critical data could be reused passwords. So I try to hash passwords in a very secure way.
My current password hashing algorithm is nothing I would call really secure. And as I ... |
As part of a project that my company is doing, we need to setup a development server.
Let's say our company's main domain is example.com
We need to be able to access the dev server through dev.example.com but unfortunately, company policy does not allow dev servers to have subdomains for the example.com
We need this du... |
Firefox 19 ships with pdf.js as the default PDF reader.
One of the main stated goals is to reduce the exposure of users to the often vulnerable Adobe PDF reader/plugin.
So what new risks does pdf.js bring?
An attacker that can get a user to browse to their malicious PDF could also get the user to browse to a malicious ... |
What type of hands on tests should I expect in a interview for a entry level penetration tester?
And what do examiners expect a candidate to accomplish (i.e. full compromise)?
The reason I ask is that I went for a pen test interview and I was given a 4 hour exam. I was not presented with any guidelines or expectations... |
I want to provide basic defense against brute-force attacks against a simple HTTPS web service. The web service provides a login method (let's say at http://example.org/login) which gets passed a username and password as HTTP GET parameters or as fields of a JSON object given by HTTP POST. The service returns HTTP stat... |
So I found this explanation for a vulnerability on some cms :
The XML parser at /WorkArea/Blogs/xmlrpc.aspx is vulnerable to XML
external entity attacks which can be used to Scan behind perimeter
firewalls or possibly include files from the local file system e.g.
]> &test;
How can that issue be exploited . I ha... |
On this page:
http://www.ruby-doc.org/stdlib-2.0/libdoc/openssl/rdoc/OpenSSL/PKCS5.html
they make a statement that strikes me as rather weird:
Key Length
Specifies the length in bytes of the output that will be generated. Typically, the key length should be larger than or equal to the output length of the underlying d... |
I'm trying to practice penetration testing on my home network. The target system is my desktop computer, which is connected to the network via ethernet cable. The attack system is my laptop, which is connected via Wi-Fi. My laptop is running Ubuntu Linux 12.10.
I'm simulating an attack by someone who has gained access ... |
Just spotted a Reddit thread about Kim Dotcom, of MegaUpload fame, planning to produce a secure webmail system that allows people to communicate securely, without the worry of having their messages sniffed by three-letter agencies.
Considering the debacle over MEGA's crypto, this makes me nervous. Some people in the Re... |
We determined that a number of our account lockout issues are related to Activesync devices using old/expired passwords.
One way to remedy an account lockout issue is to issue and deploy certificates to our ActiveSync users. I believe this will give us stronger security with Mutual Auth TLS.
Before we implement thi... |
I have two related questions as to what happens when a user tries to log in to a website
If the entered password is wrong what should happen?
I have two ideas:
Redirect to a page saying "wrong username/password, click here to try again"
Always redirect to the members section since it checks already if the variable s... |
With web browser plug-ins like Firebug, it is easy to manipulate the source code of client-side language such as HTML and JS. Then are those languages more vulnerable than server-side ones ?
When one is building security for his site, is JS alone totally useless ?
|
I'm trying to set up a digital signature solution which would work with a internal PKI.
We have considered Microsoft Certificate Services, but we don't want to rule out any other option to set up a CA.
Do you know what other open-source options do we have?
|
I'm trying to do two things here.
The first is poison the cache of a target DNS server. A scan has suggested the network I'm attacking is vulnerable to CVE-1999-0024.
My understanding of this vulnerability is that it allows me to to 'tell' the DNS server on the target network that: myevilsite1.com = 1.2.3.4 and that ... |
Something that's never made much sense to me is when environments have DNS servers which are publicly accessible (on the internet). This more often than not seems to leave them vulnerable to Cache Poisoning/Snooping/Amplified DoS attacks.
The only types of clients I could think of that use DNS servers externally for ... |
I've been reading about it. This article helped me a lot. But the more I read the more complicated it seems. For example:
Is it better to use bcrypt, or PBKDF2, sha2 or something else for the salt?
How do I add HMAC encryption passwords?
Suppose I have to store passwords (all information, hashes, salt .... ) in a sin... |
If I use a Tor router to browse the regular internet, my traffic must leave the Tor network through an exit node. Apparently the exit node can see the data originally sent.
Is this true?
If an adversary wanted to deanonymize me, wouldn't they just have to subpoena the exit node owner or hack it?
Does this mean a pro... |
Since most key types can be used for multiple purposes, namely certification, authentication, encryption and signatures, one could simply use one key for everything - which is a bad idea, as elaborated e.g. by Thomas Pornin. So one should use different key pairs for different purposes, with different backup methods (de... |
We are currently working on implementing the PCI-DSS ruleset in our IT environment, where all of the inhouse software we use is Perl. We have a Perl dev team of about 10 people (inlcuding me) and running large applications, mostly legacy.
Now the advisor we pay to help us implement the PCI stuff is not very well verse... |
I'm using owasp EnDe web-based tool to understand nibbles and encoding in general. This online utility in my knowledge is the best free resource avaiable for anyone who is interested to learn encoding techniques.
I'm testing a sample input which is abcdwxyz.
Now, the results of encoding it based upon first nibble and... |
I recently created a reverse connection shell in C#. I tested it with some computers and I noticed that some computers connected back correctly and I established connection with them but another computer running Windows 7 doesn't seem to work or establish a connection back to me.
I was using port 3001 as a communicatio... |
I've been using Burp Intruder (part of Burp suite), but in the free edition of Burp Suite the Intruder functionality is Time-throttled. As a student pen tester however, I can't justify the cost of $300 a year for the Burp Suite Professional Edition.
I know there are other great intercepting proxies out there (OWASP ZA... |
We have lots of embedded TLS clients on the field. TLS Servers must be authenticated.
Because long power cuts may reset clock of those devices, we have requirement to use certificates with validity period: from 19700101000001Z to 99991231235959Z.
How to use openssl to create certificate requests with those kind of vali... |
gpg2 generates keys with one or several of the (S)igning, (E)ncryption, (C)ertification usages set. However, e.g. Enigmail creates a primary key also set for (A)uthentication, which GnuPG then shows. How can this be set/modified using gpg2? I can't find any command in --edit-keys, and when I create a subkey the only op... |
The LastPass password manager stores One Time Recovery Passwords locally in each browser you use the plugin with:
http://helpdesk.lastpass.com/account-recovery/
My question is, how can you have more than one password?
I thought LastPass derived the encryption key from your master password using a variant of PBKDF2 and ... |
I have searched this site for RSA1 with no results. From multiple google searches I have understood that RSA1 was used in SSH1 (which isn't recommended). However if its a single algorithm why are there two different ones?
A bit of background on my setup/understanding:
I recently implemented OpenSSH on Ubuntu to script... |
I am using iptables to allow the icmp traffic in/out of my host. Please find below are the entries from my firewall (linux based):-
[root@localhost ~]# iptables -L
Chain INPUT (policy DROP)
target prot opt source destination
ACCEPT tcp -- anywhere anywhere tcp dpt:ssh sta... |
I'm trying to test the security features of different types of OSs available, and I decided to narrow this down to the Windows Phone 7 and iOS operating systems. I will be testing both my Nokia 800 and iPod Touch 4 to see which one has the better features. The issue I have now is figuring out how to test them. To be bl... |
What is the best method?
Assumption: I have a function that generates a number of medium-high entropy bytes
Step1:
I generate 3 of these medium-high entropy bytes.
Step2:
I hash these bytes using a known crypto-strong algorithm (sha256)
Step3:
I cut a substring from the result.
Step4:
I use this string as my salt (3 b... |
Some websites, even the StackOverflow asks for atleast 1 digit, 1 uppercase character in the password. Does this really matter when the developer uses a password-hash algorithm to store the passwords in the database?
I am building a project where the security really matters, but the users are stubborn to use weak passw... |
SIP has a practical need to be widely available, but its services are prone to being spoofed as reflectors used in DDoS attacks.
A freeswitch server I manage has seen heaps of registration requests on UDP (~300/second), each one generating a 401 unauthorized response. We only caught these when performance issues led m... |
Is there a practical way to predict previous/next C rand() output if i have some of the values? How many values do i need? Do they need to be consequent? If it depends on compiler - for which implementations is it possible and how?
|
I know that GnuPG follows the OpenPGP standard, but if I generate a public/private key pair using GnuPG and upload the public key to a key server, i.e. the one at MIT, or use it to sign files, packages, etc. will other users who use OpenSSL, GnuPG, Putty, etc. be able to use it or descrypt the signed packages? Or do I ... |
I noticed that if you have a 3rd-party Twitter app, you get an access token, and an access token secret, to communicate with Twitter.
Why are there two codes? Shouldn't one be enough?
Does this mean every 3rd-party app needs to have their own server that adds the token secret to the request? (Because if it were stored ... |
I'm TAing a particular course on system security. A specific example is transitting the password in plain text when developing a web application (as part of a class project).
Over the years a bunch of students don't really 'care about encrypting the passwords' or avoid using SSL as a possible solution (i.e., an SHA-128... |
I'm a bit confused with AES-256, CBC, and how it works with padding (PKCS#7).
Whenever I encrypt data of multiples of 16 bytes (the block size), extra 16 bytes are always padded at the end.
For instance, a 1600 byte file turns into a 1616 byte encrypted file.
If I look into the file with a hex editor, the last 16 bytes... |
How can I test for HTTP TRACE on my web-server?
I need to train a Tester how to verify that the HTTP TRACE method is disabled.
Ideally I need a script to paste into Firebug to initiate a https connection to return the web server response to a HTTP TRACE command.
Background:
Our security Pen Testers identified a HTTP TR... |
A few times now, I've received emails from contacts with subjects along the lines of "hi!" and message bodies of only a link to some website. I've checked the ip of the sender of these emails, and it's always a verified sender from their email provider. My assumption here is that something found their password and is u... |
We have this as the PKCS#7 encrypted message. We would like to open this up for review and analysis here, for people to poke holes. This sample is generated via test certificates and keys. The concern isn't about the certificate info but that the encryption and signatures are alright. I'm not expecting cracking the cry... |
I keep getting spam emails from myself (and I am sending them to others as well) on my Yahoo Mail account. I have already went through two password changes which I thought were secure. My very last one had 14 characters (although it consisted of two dictionary words) and a symbol. Is it just a case of my password consi... |
I have searched IT Security and Google for something similar to this, but wasn't able to find anything remotely related to what I'm doing.
I'm developing software which has 2 parts - a C# program run on a single, secure, trusted computer, and PHP software running on a server. This system deals in sensitive data, namely... |
I was using Active Sync on my Android Galaxy S2 and as a result it enforced encryption of the phone and SD card.
Phone did a factory resync and now data on SD card is still encrypted.
Is there a way to recover the data off the SD card?
Is the key required to decrypt the SD card stored on the card?
Is there any external... |
I am planning to add iframes to my webpage to sites such as www.dropbox.com and was wondering if the security of the site would be impaired if i did this. As in, could peoples account be hacked if they used my site to access it?
|
I am thinking of working in cybersecurity since a while now (I am doing a bachelor degree in computer science and I have one in mathematics). However, I don't know what it really looks like. And before considering what kind of future studies I should take, I would like to have the opinion of the people who are working ... |
I want to use Mod Security as transparent mode. Mod security WAF should be between server and client and client provided with only server's ip address to access the site. The client should not aware about the presence of Mod security since it provided server's ip address unlike in reverse proxy mode.
Is it possible ... |
A few days ago one of my webhosting customers had their FTP login compromised, and the attacker modified his index.php file to include some extra code, and roughly twelve thousand other bots have been trying to access it via a POST operation since
I'm okay at PHP but no genius, but from what I've been able to garner it... |
A user has a PowerShell script that does some things that require administrative access on Windows Server 2012 with UAC enabled.
When they run the script as a Local Administrator, it fails with access denied. But if they elevate their permissions and run the script as an administrator, it works. So far, so good.
Now,... |
I'm researching various buffer overflow techniques, one I encounter and is pretty interested in the moment is Return Oriented Programming (ROP), and the use of small groups of instructions known as gadgets.
The question: There are certain gadgets that are popular and used extensively in many exploits, for example the P... |
I have a number of files encrypted with a key derived from a password. In line with standard practice, I use a random salt and password and do many PBKDF2 iterations to obtain an encryption key and IV. I then use this to encrypt the data with AES-256 in CBC mode.
In what ways could the security of my data be compromise... |
we're currently in the design phase of a new "Gateway-Server" which we want to develop. Our server has a REST-Service. My task is to find viable options to protect the access to the aforementionend REST Service (auth/auth)
This server is going to be used in a business environment which means we have an LDAP/Active Dire... |
Is there a Dynamic application security testing (DAST) tool which can run over dynamic html /JavaScript ajax applications? An open source option would be ideal - or if that does not exist, then a feature of an Enterprise tool would be the silver medal answer.
I have an ExtJS(JavaScript) application and tried using HP ... |
As the name suggests, im trying to dump the data section of the packet,
man would suggest that its something like tshark -r file.pcap -t fields but im not having any luck
|
I am taking a security class. The slides say that smartcards usually use one of three types of authentication protocols: static, dynamic and challenge response. What is the difference between these?
|
I recently found out that active attacks are a threat against AES-256, CBC mode, padded with PKCS#7 (the CBC mode in particular. I should supposedly change to EAX to guard against these attacks).
However, I'm confused about whether such attacks are effective against a particular encrypted local file that a cracker has ... |
Can I make assumptions about minimum and maximum key sizes if all I know about a TLS server is the fact that it uses DHE_RSA for key exchange?
Can the server be configured to use weak key sizes for RSA and/or DH (e.g. 512-bit public key size) and still have a sucessful TLS connection?
|
I read that 128-bit encryption takes millions of years to break. But if I encrypt a file using say winzip that uses 128-bit encryption but the password I use is only one character long (for example the character "A") why would it take you millions of years to break in and decrypt my file? Or does 128-bit encryption m... |
I'm wondering if a fuzzy password system would be in any way beneficial to users, or worth implementing.
The idea would be that a certain margin of error is acceptable for allowing the user to log in.
Things would be kept track of like what the user remembers best about the original password and what they obviously nev... |
I believe that VeriSign has issued a big share of world's SSL certificates. Many corporations and governments use them. Is it possible for a person that has access to Verisign private keys to sneak a couple and start many undetectable man-in-the-middle attacks? Isn't it too much of a power for a single person to (poten... |
I was recently asked to help make a few modifications to an old ASP Classic website.
At one point I was looking at the page source while debugging some JavaScript and noticed a div full of links to a few spam-like sites selling knockoff handbags and shoes etc! This div was absolutely positioned over 900 pixels off the ... |
I am looking for an encryption algorithm for one of my current papers. The basic requirement is that, suppose I have two keys k1 and k2, and the E(k1,t) means encrypt t with key k1.
Are there any encryption algorithm satisfy that E(k2, E(k1,t)) = E(k1, E(k2,t))?
I know that Caesar cipher satisfies the requirement. But... |
Passwords of end Users are stored in Database which is encrypted (using one way hash like MD5). Apart from me, there are 'other' people belonging to other teams who have access to Database which means access to schema and the particular table where passwords are stored. By other teams, I mean Database Administrators wh... |
I'm a newbie (Script kiddie) and I want to learn more about Metasploit. Not for fun, but to understand what exploits are, how they are used, and deployed. I've heard a lot about the Metasploit framework being good. I've even started reading the Offensive Security with Metasploit tutorials but I'm finding it somewhat ha... |
The other day, there was a web developer mailing list thread about a fundraiser page.
One person noted that the page with the credit card form was HTTP, not HTTPS.
In response, one person said that since the target of the form was HTTPS, it's not a problem
Nah, the form's submitted via https, served by Stripe. The sit... |
I suspect that my system has been hacked into. I see huge drops in free hard disk space for a while and then the space returns to near old values. A few days ago, when I clicked "my computer", I saw the properties of the computer instead of "my computer". Start menu showed me the same thing. I rebooted my system and th... |
I am currently working as a Software/Web Developer with around eight years experience, however I have always had an interest in IT Security and am now hoping to move my career in this direction.
I was wondering what areas of IT Security might make for a natural progression from software/web development and what certifi... |
I am a sys admin of our system, we are running zimbra as email server in our environment. I got the following message from the CEO.
"Everytime I send or receive an email - I get a SPAM ads a few minutes later related to the keyword. There is something planted in our email system that is 'listening' and causing that to... |
While doing some research with SSL certificates, I found some weird certificates containing nul bytes in their Subject field. One example is www.refah - bank.ir (did the Iranian government fake this CA? It looks very similar to a Spanish CA except for location...).
Another example is mcafee.com which looks more trustwo... |
So I read on wikipedia that digital signatures need padding (like PSS) and I know this is true for RSA.
But now I ask myself does DSA also need padding?
|
How to generate a secure random number bit length is 256 bits using Java. What is the different between:
SecureRandom random = new SecureRandom();
and
SecureRandom prng = SecureRandom.getInstance("SHA1PRNG");
|
An eMail signed via S/MIME also contains the X.509 certificate chain containing the public key in order to directly verify the signature (assuming its issuing CA is deemed trustworthy). The chain does however by default lack the root CA. How can it be included other than manually attaching its certificate file?
|
How does one go about safely write a temporary file to a location within an application server that is publicly accessible?
|
I Wireshark'ed a Firefox 3 request, because I couldn't find the curve names documented:
Elliptic curve: secp256r1 (0x0017)
Elliptic curve: secp384r1 (0x0018)
Elliptic curve: secp521r1 (0x0019)
What are the supported curves for other browsers? Does someone want to extend this list?
You can view your supported curves he... |
So for an assignment, we need to create a scheme (and eventually also the set-up) of a couple of servers in a network.
The 'networks' are:
Internal network
DMZ
The internet
And the servers we need to place are the following:
DNS Server
Active Directory ([multiple] DC's)
MSSQL server
Webserver
MS Exchange 2010 Server... |
I am using Advanced IP scanner to view all the machines at my home. However, it just shows me only one machine but not the other. However, I am able to ping to the other machine. The network discovery for that machine is also on. Can anyone point out what the problem may be?
|
How can I best normalize our Windows Advanced Firewall rules while implementing network segmentation? I want them to be as clear and concise as possible for audit purposes. What few examples I've seen have centered on locally defined firewall rules or had dozens of group policies.
I have been thinking it would make se... |
I have a webapp running using Django. I recently activated some middleware which is supposed to alert me of 404's where the referrer is within my domain (supposedly indicating a 404 that is my fault).
However, today I got 34 requests for urls which don't exist, all of the login variety. Some examples:
/signup
/user/reg... |
I want to learn nmap and its various options. What can I do or setup in order to see examples of issues found by nmap - e.g., something with security holes on purpose.
|
There is a website that tenants can use to pay their rent. That website uses an http address but apparently uses a third-party product, which embeds an iframe into the page. The source of that iframe is https and all forms within the page are within that iframe.
I'm wondering what are the security risks of this type o... |
I started to read a metasploit guide book so I set up 2 Machines in VirtualBox for pen testing (host - BT 5, the second - WinXP SP2). When Im trying to scan open ports with NMAP on the Windows machine, it appears that all ports are closed, even if I turn off the Firewall. Ive tried to open SMB port through network conn... |
So, as it stands I'm a 21 year old recent Bio-Chemistry graduate looking for a path into InfoSec.
Without a background in any computing discipline I assumed that it would be seen as compulsory that I attain a degree in some related field, so I applied to several MS programs in both CS and IS. I have acceptances to seve... |
I've found an xss bug inside user-agent header on one popular buy/sell site , and after reporting it to them , they answered that it is not dangerous as it can not be exploited without user interaction(changing user-agent header manually).
So I wanted to ask , is there any way to send user-agent and request that same p... |
Great! I made a post recently where I mentioned that my system might be infected. Now something new came up. When I search for Stack Overflow on Google, I see that the URL is www.doioig.gov/. When I click that link, I am taken to a redirect page that says:
If you are not redirected automatically, please click the link... |
I think that as a windows user, I have no where to run and no where to hide.
In the windows world no matter how many precautions I take, I can get infected by -
1 - Drive by on legal and popular websites due to malicious scripts and browser bugs.
2 - Lame malware protected by crypting, packing etc.
3 - Malicious adve... |
While reading an article I encounter an interesting thing I did not know about:
if(!isset($_SESSION['usr_id']) || !isset($_SESSION['usr_name']))
{
header('Location: index.php');
}
...Which is all well and good if the client respects the Location
header. The crawler apparently doesn't, because it doesn't really ... |
for example here they put a gpg signature to verify what you download is what they really made. but why they just don't put a SHA256 hash value ? because its much more faster to check it and sometimes gpg may not be installed on our machine but SHA is something everywhere available also you even can upload the file on ... |
Our servers seem to be commonly hacked, mostly injecting malicious codes/frames to our web pages or changing downloadable files with backdoors and so on.
Is there any tool that can crawl our website pages, codes, files etc and make a hash database and if anything changed inform me by email instantly so I can fix it as... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.