instruction
stringlengths
24
29.9k
If a user was infected with a file altering virus is it possible that checked in code (files containing text) to the source control could contain dangerous properties. I ask this after this got me thinking: Installing a new version of the operating system over the compromised operating is not a good solution as file...
Today I found that ports 1-10000 were being forwarded on an Airport Express that I as well as a fair number of other people share. This was setup by another user. There are multiple machines and devices on the network, OS X and Windows, and I was wondering what having those ports forwarded means to the various computer...
I am trying to do a nmap scan on a machine in my home network. When I do the regular scan (using nmap 192.168.2.10 or nmap -sP 192.168.2.10), the results say host is down. However, when I use the option -Pn, I get the result saying host is up. What does this mean? I tried reading what the -Pn option does at nmap's web...
PHP finally removed safe_mode feature: Safe Mode Warning This feature has been DEPRECATED as of PHP 5.3.0 and REMOVED as of PHP 5.4.0. The PHP safe mode is an attempt to solve the shared-server security problem. It is architecturally incorrect to try to solve this problem at the PHP level, but since the alternatives a...
On March 2, 2013, the digital note taking system Evernote was hacked. Evernote has forced new passwords and have released new updates to Windows, Windows phone and iOS of their client software. Given what is known about their security set-up, e.g. Evernote encryption and Evernote forum discussion, of selecting strong ...
I'm trying to monitor the HTTP requests/responses made when performing a Windows Update. I have a Windows 8 machine configured with a proxy in IE. I've also imported via netsh for winhttp: netsh winhttp import proxy source=ie The proxy is running on another machine on port 8080 and is configured to intercept SSL. I hav...
On one hand, IT Security shops have been telling users to not click on links in email because they can do damage to your computer, or phish your personal information. Many of those issues are outlined in the link below: What malicious things can happen when clicking on links in email? Then again most of those same s...
Game guard is an anti-cheating application used with MMORPGs . I have read that such applications acts as rootkit over the pc. How dangerous it is to play MMORPGs that uses this application? How could it be exploited (either by the company it self or by a malicious hacker) who hacks into the pc or the main company?
I developed an instant messenger which uses TCP ports for its communication, and hosted the server application on a VPS account from some hosting company, but the first day I got attacked by a distributed dos attack, and the VPS hosters told me that the attack was of about 750 mbps. The VPS hosting providers told me ab...
In asymmetric cryptography, is it possible to ensure that public key derived from a given private key is unique, no matter the algorithm?
I've found this vulnerability (http://www.metasploit.com/modules/exploit/multi/http/jboss_invoke_deploy) but can't seem to set proper values for exploit to work , payload shown on site gives me worn payload error.Thanks
Does it make any difference which provider I get my SSL/TLS certificate from? In particular, what are the pros and cons getting an SSL certificate from Verisign vs getting one from Thawte? Which one can be used on more devices?
Is it a good idea to come up with a Javascript-based Proof of Work system to reduce spam on forums, and other websites? This idea would be similar to HashCash, but the computation would be based on the hash of the contents to be submitted + a seed.
Can i authenticate myself in SSL with a key, just like in SSH?
I just got locked out yet again from my university's system for typing the wrong password twice, then mistyping the correct one by accident. Now I have to call the helpdesk or go there myself to reset it. Now my question, is there really any value in doing this? I could understand a 5-15 minute lockout, but I simply d...
I have Win7 64bit. Have Cisco VPN Client winx64-msi-5.0.07.0440-k9. Now i try to install it. But after i click first "Next" button in istaller i get error: "installation ended prematurely because of an error" Google says that i shall uncheck all checkboxes into ICS (Internet Connection Sharing) in adapter setting but...
Given that Java 6 is now deprecated by Oracle and there recently has been notification of a 0day (that will exist forever now that Oracle is not patching JRE6), what can we do to prevent drive-by exploitation of Java within our browsers? We cannot remove Java from the browser as my organization relies heavily on it for...
So one of the Invision Power Board installations on my server was recently compromised. I found what seemed to be the attack (using PHP in the query string and carefully crafted cookies), and I blocked URL strings with PHP tags in the query string. However, the attack signature in my logs from the actual log looks slig...
Yes, this is 'yet another client-side hashing' question. But, don't leave yet, I think there is some value here. I'd like to do something to mitigate the affect on the community as a whole when my password hash database is stolen. (See: LinkedIn, Match.com, Yahoo, etc...) In those cases, statistical analysis of the lea...
Quite A few years ago (in middle school) I created some gpg keys, published them to a keyserver, etc. because I was l33test kid on the block. Now I have gone through a few new computers and OS's, etc. and lost the private keys and revocation certificates. It's a good thing that I didn't create the keys with any expir...
I'm an undergraduate student at Kaplan University and one of my projects in my Algebra class is to be able to identify two concepts that we've learned thus far and how they might apply towards my major which is IT Security/Computer Forensics. I'm struggling because I can easily see how some of the formulas, graphs, et...
On my machine there are web services which can be accessed from any PC connected to the same network segment (WiFi for example). I want to use IPtables on the machine to prevent any web services from being accessed by hosts on the Internet at large. What rules should I configure IPtables with? How can I protect a port...
I am the webmaster of some websites running Typo3, 2 of which are getting infected constantly. These 2 sites are being owned by the same client. Something happens on those 2 sites that causes literally all *.php files to be infected by some code. It gets inserted at the bottom. Luckily the infection doesn't do much bec...
In a website I'm building when I login, close FireFox, open FireFox and try to go to the website again I must login again (as expected) BUT if I select "Restore Previous Session" I am logged in again. I consider this a security threat as many users expect to be logged out after the browser is closed. I check for a vali...
I am filtering all images that attached to any content of my blog: Check for file extension. Check content type using $finfo = finfo_open(FILEINFO_MIME_TYPE); I also save the image temporary on my server and check the size using getimagesize() then I delete it if the function not returned false. But after these check...
I am trying to crack passwords on two Windows member servers (2003 and 2008). There is no Active Directory. Each user seems to use the same password across servers, workstations, etc. I have access to the servers via an account given to me by the company that owns the servers. We'd like to get the other accounts. With ...
I have a question about how to test the firewall rules. To be more specific, for academic purpose I have to set up a machine which will accept all kind of packets o a specific interface. I added an IP Table rule: sudo iptables –A INPUT –i eth0 –j ACCEPT I need a practical prove that this interface accept all kind of ...
I need to process data that is sent by users in a LargeNumber format. My current choices are BigInteger (.Net Managed Code) IntX (Managed Code, faster for some operations) GMP / MPIR (Unmanaged code, fastest with a wrapper 1 or 2) Since dealing with large numbers has the ability to create some floating point errors,...
A web API needs to store a 'key' for authentication, in much the same fashion as a password but at 128 characters. My concern is that the salted SHA1 hash for the key has less entropy than the key itself (40 characters vs. 128 characters). I understand that the hash is necessary in case the database is compromised, but...
A friend of mine has been cyber-stalked for 4 years now by an ex-boyfriend. He recently worked out her new job email address (via LinkedIn) and started sending her emails. She told me that the emails he has constantly sent her have a similar wording and subject matter. This made me wonder if there was a way to block em...
I'm working on a web application with simple API needing authentication. For my application nature, users have two RSA keys, for signing and encrypting messages. My protocol works based on it. The web application has access to public keys. One solution to achieve authentication and kill MITM is to build SSL over the a...
Each SSL certificate is valid starting from a specific date and up to the expiration date. What's the point in that "valid from" date? Why do we want a certificate to only be valid after a specific date?
I am going to store data in an encrypted SQL Server CE 4 database, where the database is doing the encryption. (Note that SQL CE is the embedded version, not the fully installed server.) When the data is decrypted does that only happen in memory or is it possible that is is logged or paged to disk in an unencrypted fo...
Scanning with nmap, I discovered that there are 3 open ports on my server. I want to deny any access to these ports from any machine, regardless of whether it is on the same LAN or via WAN. How do I write an iptables rule for this?
I'm still new to security, so I'm sorry if this question doesn't make sense or if I'm completely off base with something. I've got some messages I want to encrypt (probably with AES-256-CBC) and send to a variety of approved recipients. I know I should also use some sort of authentication mechanism so the recipient can...
I assume that GPG is very strong to crack, guess, etc. Since I have confidence in GPG, would it be appropriate to use my GPG key as the master key for a password manager or generator?
I searched the internet like this inurl:ftp -inurl:(http|https). I found many FTP hosts. I can add or remove files from some hosts. How does Google get information about FTP servers? How can one avoid indexing of one's FTP server(s) in Google?
Given that iFrames are used in many common exploits, I'd like to conditionally disable iFrames except for sites that require it such as GMail, or MasterCard SecureCode. I also suspect the <object> tag has related functionality. Is there any way to conditionally block the usage of iFrames (and/or <object>) on the clien...
I am being asked to perform a forensics investigation on a network. The reason being that for the past few months strange things are happening on the network. VLANs are being deleted, configuration changes are being made, and all sorts of modifications are occurring on the network devices. IT ranges from the Firewalls,...
My assumption: When a firewall is configured to drop spoofed packets, it tries to ping (not necessarily ICMP) the source IP and sees if it belongs to a real host or if it's up, and if not, it drops the packet. My question: What happens if the source IP of a spoofed packet belongs to a real and online host? Are there an...
So, I've been looking over various websites that don't handle confidential information per se, but do accept user authentication tokens (i.e. you can create accounts with them and associate an e-mail/username with a password). Specifically, I've been checking to see whether they implement any kind of protection with re...
Upon reviewing the Logs generated by different SIEMs (Splunk, HP Logger Trial and the AlienVault platform’s SIEM) I noticed that for some reason quite a few users tend to make the mistake of typing their passwords in the username field, either in the OS Domain logon, or within web applications. I am guessing those are ...
I'm working on an ASP.NET web application that will have to store sensitive information. I would like to encrypt the sensitive fields to protect against any possible SQL injection vulnerabilities. However, I also will need to report on these fields. For these reasons, I've excluded transparent database encryption (sinc...
So, basically I am trying to log a user in with a cookie and do not query DB to improve performance. Here is a brief idea: Transmit everything via SSL Set a Global secret key A and secret key B Generate a random verification string on registration and password change Encrypt the verification string with A, store it in...
I would like to know ways of detecting rogue laptops connected to Ethernet sockets not properly secured in a big organization that has a plain network segment. I know that this can be prevented using some techniques like MAC filtering, but suppose that in this company they don't use any of these preventive security mea...
The short version of this question is:  Is there a fix or mitigation for the ASP.NET vulnerability CVE-2008-5100, which allows attackers to bypass assembly digital signature checking? I'll give some background.  I apologize in advance for the length; this seems to be a complex subject. We ran a security scanner aga...
Maybe I am getting a little paranoid. Lately my MacBook Pro with Mac OS X 10.8.2 is behaving a little different the usual. The last strange thing that happend was that in iTerm2 when I tried to sudo I get "XXXX is not in the sudoers file. This incident will be reported". I just updated iTerm2 after being prompted of a...
I recently started playing Star Wars: The Old Republic, which for those of you who don't know, is an MMO. Before playing the game, I would always log in with my email/password combo. However, I got an email from Bioware (the developers) today, that said this: Beginning April 2, 2013, you will only be able to log in to...
If I'm authenticating an action, is it a bad practice to authorize the connection using a decryptable hash that does have a specific algorithm, but only the remote machine knows? Is sending decryptable data using HTTP bad practice in general?
It's been recommended to use OAEP when padding messages to be encrypted via RSA, to prevent known plain text attacks. Can someone elaborate this in better detail? I'd specifically like to know the weakness in the previous scheme, both from a theoretical as well as practical/real-world perspective.
Is there a maintained list of URLs that contain malicious content. These URLs may be involved in Phishing, Scams, Viri, or other Malware. Please indicate in your answer if the list is freely distributed or if there is a cost associated with it. One list that I have found so far is PhishTank.com URLBlackList.com also lo...
i'd like to know if WPA-Enterprise implementations have built-in anti-IP-spoofing. here's what i mean: it seems to me like IP spoofing should be easily detectable and handled under WPA-Enterprise. when you've authenticated, the router knows that your personal encryption credentials are associated to the IP it grants yo...
So, I keep finding the conventional wisdom that 'security through obscurity is no security at all', but I'm having the (perhaps stupid) problem of being unable to tell exactly when something is 'good security' and when something is just 'obscure'. I checked other questions relating tangentially to this, and was unable ...
Suppose if I am using the mysql database based encryption using AES_ENCRYPT function & insert records, is it possible to decode the row formatted binlogs generated by MySQL to obtain the actual statements consisting of AES_ENCRYPT?
I'm managing a huge forum (over 15k posts and 500 users) and lately some guy uses a VPN (probably) to spam my forums with topics such as: "LOLOLOLOLOLOLOLOL" Now, I'm pretty sure he's using Tor or a proxy, the IP and the countries are always changing but the posts have the same pattern - it is the same guy. However, I ...
I'm designing an API server and client pair. Typically, I want the client to be in a WordPress plugin. I'd like to use OAuth or something similar to secure the requests. However, as you know, OAuth depends on secrecy of the client credentials and especially the client's secret. However, WordPress is open-source, so I c...
I'm starting to study for Security+ using Darril Gibson's book. I took the pre-exam and one of the questions is “What is the most important security benefit of a clean desk policy?” The choices are: Prevent illnesses due to viruses and bacteria Presents a positive image to customers Ensures sensitive data and password...
As a fresh graduate I'm wondering what my chances are of joining a great pen-testing group. Is there a risk that a career in pen-testing may one day not be needed? If so, how applicable will skills from a pen-testing job be towards getting another job in the IT field?
I'm currently deploying TACACS+ with a Cisco device, I use a TACACS server from here: http://www.shrubbery.net/tac_plus/ My scenario is: I want to permit a user to configure my router but only for a specific interface, i.e to gigabitethernet0/0. After arriving at the router(config-if)# that user can do whatever he want...
I am performing multipart upload to S3 straight from the browser, i.e. bypassing my back-end. My JS code sends a hand-shake request to S3 (a POST), then uploads the file in chunks of 5MB (a PUT for each) and eventually, finalises the file (a POST). That works well. As you can guess, each request to S3 (hand-shake, par...
Language safety is not clearly defined while there're warnings about for instance Java. So how can you say that language is not safe while language safety is not clearly defined? If Java is unsafe now, is Java version 7 "safer" than Java version 2?
I have a file I'd like to encrypt with a symmetric key using AES-256 and then use an HMAC for integrity. So I don't "roll my own" scheme which I know is a big mistake, what are the standards for using the HMAC once I've created it? Is this what GCM is for? Can I just store the HMAC with the keys or should it be include...
I understand that a MAC algorithm takes a message and a private key as input and hashes them to a value. I understand that senders and receivers often use MACs to authenticate a message and check the integrity of a message. If a sender/receiver successfully computes the same mac, then (1) the receiver has assurance tha...
I have a basic to moderate understanding of VLAN's and their pros and cons as they relate to network segmentation but I'm wondering where to start as one moves into virtualized environments. From a security perspective, how does traditional VLAN segmentation stand up to products/solutions focused on virtual environment...
I'm just about to switch to a new SSD drive, so I figured it's a good occasion for a really, really fresh start. I reconsidered every installed piece of software, uninstalled lots of crap (surprisingly, my system started to be more responsive ;]), and checked for viruses and stuff (since I didn't want to transfer any m...
For a variety of reasons, I need to use digest authentication for a REST server that I have created. I have come up with an "improvement" that I believe strengthens the algorithm against MD5 attacks without being a burden on clients. What problems can you see with my algorithm? Introduction Client is a custom applicat...
I am planning to create a private web site where people of a very specific target group would keep private stuff. I am between two major roads for this. Road 1 -Build a trusting and personal relationship with the members. Above this apply htts sitewide and create a strong privacy agreement. Road 2 -Implement client s...
So I was experimenting with XSS using new line (%0A) character. So I got to the usual vector: '%0Aalert(/xss/)// and one thing came to my mind. What if you can't insert a quote? A new line will break the string so you can insert code. However, the syntax error (Unterminated string) will prevent the script from executin...
I have to test OCSP feature on a SSL server. Since it is a pretty standard feature now, I was looking around for tips on test plans/setting up OCSP responder etc?
In PHP, I'm not sure if I should start the session before destroying it when a user wants to log out. session_start(); session_destroy(); Is there anything else that needs to be done? EDIT: I reposted on Stackoverflow here but I'm still not fully understanding. Basically I'm asking, you tell me, what needs to be done ...
Suppose you have an application running Java web services in Apache Axis 2. Specifically, these are JAX-WS (Java API for XML-Based Web Services). Currently these web services are on the same Windows Server 2008 server that our web site (web application) runs on. Our web application, which is running in IIS using PHP...
I have a question for basic operating with certificates in emails and pdfs. Im familiar with public key cryptography. The scenario: In my scenario I want to send a confidential email to a person A from a server B. My understanding (no certificates): Keypair 1: private key AA, public key AB Keypair 2: private key BA, pu...
I am looking at ways to secure http communication using HMAC. My understanding is that in this scenario the client and the server both know a secret. This means the secret must be first generated on the client (or the server? Does it matter which side?). At this point only one side has the secret. How does the secre...
I have a pretty decent and new satellite dish on my roof (Direct TV) but have no receiver in use. It was still technically connected to my cable lines and I found RF signals all over that section of the house. There was no receiver connected (other than digital comcast boxes which doesn't work that way I believe). As...
I want to know what are the best practices to secure NoSql database like MongoDB. How is it possible? Any tips?
Consider a folder containing the following files: (file1.txt, file2.doc, file3.pdf) all zipped and password protected, if attacker had one of these file, can use it for decrypting all without knowing the password? Note: I used very strong password which is 100 in length for example: nZqQb=r07W.G'sZaHf$>&cC]3'9={1U1lPt...
I'm using Chrome on Ubuntu Linux to connect to Gmail. The connection info says that ECDHE_RSA is used for the https symmetric key exchange. Based on my understanding of TLS and Gmail, my client creates a symmetrical key, encrypts with Google's public key listed in its certificate, and then sends to Google. Since my b...
I would like to have more insight about when a server should install ssl, in particular when it is worth the money to pay for a valid certificate. As my clients often have little understanding of why they need ssl, and since a certificate is quite costly compared to renting a vps, I would like to know some statistical ...
I'm wondering about the best way to protect against CSRF in MVC or any other stateless web app. Due to the stateless nature, we can not keep a secret token in the session and compare it to the secret that accepted form client afterwards. My question is - how can we prevent a malicious user from attacking by CSRF? Note ...
What book is a best introduction to a computer systems security for a beginner in the field. One which covers the breadth as well as depth of security and finding vulnerabilities.
Is there a way to configure e-mail so that it can only be opened from one particular system? Or from multiple systems having some sort of unique key or particular static IP?
I'am writing some small security report about Android devices in general related to accessing information from RAM. Main condition is that device initially is non-rooted. Use case: User opens 3rd-party app, enters some password in password field. After that the device is lost with this running application. Source code ...
I was using Windows 7 Professional. I encrypted a few personal pics and videos on my hard drive. Unfortunately someone deleted the encryption certificate. Now I have installed Windows 8 and have formatted the previous Windows partition. My encrypted data is now available on the D drive but is not opening and I have no...
I am trying to send a CSR to a server and it is successfully signed when generated from the command line but fails with a (0 length ASN.1) error when generated programatically. I suspect, perhaps, its the long form of the curve params, but wont know until/if I can remove them from the one generted programatically. How ...
I am currently employing GNU Crypto in Java and I am now deciding on the best way to store the keys. The question Storage of 'secrets', keystores, HSMs and the rest has led me to believe the best course of action, without purchasing expensive hardware, is to use a password protected key store. I plan to enter a passwor...
I have installed an application that opens a named pipe that is accessible over the network. I would like to monitor/sniff what is sent to this named pipe, any idea how I can do that? Edit: Even though it is accessible over the network, the application talks to it on the local machine.
In creating a login for this site I chose a nondictionary password that would be extremely hard to guess, but easy to remember. I was told that it did not meet complexity rules. After several iterations of this, in frustration and just for the hell of it I tried 'Password1' -which was accepted. Raises the question ho...
I'm having a hard time figuring out whether this email a friend of mine got is legit or a scam. The weird thing is there's only one link to facebook.com, which is the one about facebook terms. All the others are linking to em.facebookmail.com with a very long funny characters to follow. Another thing that raised suspic...
Short question. The title says it all... is advanced mathematics (i.e. beyond the classic college level calculus sequence) relevant to any field of computer security besides cryptography? By relevant, I mean to be at the edge of the science one must have advanced mathematical training. If so, what branch of security an...
I've just started using Tor recently, and I'm not sure exactly what security issues come with the benefits. What should/shouldn't I be worried about (in both everyday normal-web browsing use, in visiting hidden services, and in running my own)? -- A bit of background for this question; what specifically prompted it -- ...
Now my windows 7 is too slow and crashing usually. I checked the start up folder. I get a file with extension .ini. The content of file is [.ShellClassInfo] LocalizedResourceName=@%SystemRoot%\system32\shell32.dll,-21769 IconResource=%SystemRoot%\system32\imageres.dll,-183 Is this dangerous?
What kind of hardware would I need to monitor data sent between a mobile handset and a base-station?
Assume I have a function encrypt(mes,key) where mes is the message, and key is the key. The length of key is 64 bits. Last but not least: assume the only way to crack my cipher is a brute-force attack. If I use double_encrypt(mes,key1,key2) = encrypt(encrypt(mes,key1),key2)), does definition of double_encrypt() mean th...
I am working mostly on C/C++ based enterprise applications. Now few modules are migrating to Java. Also in parallel, there has been stress on ensuring that the application has highest benchmark with respect to security. Now, My question is - Suppose same application is developed in all 3 languages (C/C++/Java), What...
http://blog.evernote.com/blog/2013/03/02/security-notice-service-wide-password-reset/ Evernote's official message says little about technical details of the attack and how it was detected. Questions: 0) Speculate: How did Evernote detect the security breach? 1) How can unauthorized database access with valid credential...
I'm a developer for a small website. There are 3 webservers (for load balancing) and a MySQL server. Today the webservers seem to be down, and, unfortunately, I cannot get hold of the admin (he's in a different timezone, probably asleep). But I do have some elevated priviledges, so I can connect as a full-permission ad...
Since key stretching basically boils down to hashing hashes over and over again (where salt, pepper and password individualize the hash function, but the principle remains the same), I wonder about this question. On the one hand, hashes should be as collision-free as possible. For hashes themselves, that is theoretical...
Want to know what all type of malware infections are their that hides themselves in a pendrive completly and infects machine silently.How to detect this type of malware as they cannot be seen. How to proceed for analysis.
(This is a continuation of my question on Ask Ubuntu.) My goal is I want to have a Xubuntu/Ubuntu dual boot, with a catch - I want the disk to be fully encrypted with the dm-crypt (native supplied) whole disk encryption. Now I know, out of the box the ubuntu installer is not going to make this simple for me, and maybe ...
We have a sample scenario and we would like to receive some feedback and some solutions regarding possible security schemes. First of all, lets imagine a real world scenario: Imagine that a user owns a locker in a university (owners) and the cleaners have the keys for every locker (encrypted data) in the university (au...