instruction stringlengths 24 29.9k |
|---|
Is it safe for a company not to use any encryption on customer's data when it is transferred between data centers on dedicated lines?
By customer data I don't mean passowrds/credit card info. Just simply hosted customer data (files).
|
There seems to be a lot of anti-virus apps for Android. On a desktop or server an anti-virus must run with super-user privileges, however I am pretty sure these mobile anti-viruses are running as an unprivileged user. That being said, real anti-virus companies like AVG and McAfee have released anti-virus apps for A... |
Looking at the Pwn2Own contest got me thinking:
http://arstechnica.com/security/2013/03/pwn2own-carnage-continues-as-exploits-take-down-adobe-reader-flash/?comments=1
If you have all plugins turned off on a browser, and all you have is HTML, CSS, and JavaScript running in the browser, can you still become infected with... |
The Safe Harbor website says the following:
The European Commission’s Directive on Data Protection went into effect in October of 1998, and would prohibit the transfer of personal data to non-European Union countries that do not meet the European Union (EU) “adequacy” standard for privacy protection.
Is there any map... |
I'm currently looking at performance optimization and am considering a way of speeding up cookie based session handling. There are advantages to having a session identifier in place when there is no server-side data referenced by it. I'm trying to work out if it's a good idea to attach an indicator to the session id wh... |
Can I 100% rely on $_SERVER[] to be a safe source of data that I do not need to sanitized like I do $_GET[] and $_POST[]?
|
my website admin area is vulnerable to sql injection . I tried using havji and it hacked successfully to database. But how is this possible. without login it breaked into admin panel.
mysql_real_escape_string is not used in admin panel.AS its used by me only.
|
Is there any advantage in changing the SSH port, I've seen people do that, but I can't seem to find the reason why.
If you have a strong password and/or a certificate, is it useful for anything?
Edit:
I should also mention that I am using iptables rules to limit brute forcing attacks, only 5 login attempts are allowed ... |
I'm looking to turn a new desktop (Ubuntu 12.10-64bit) I built into a virtual home lab for testing and experimenting with various security things. The first setup I would like to try running is the basic set-up shown in the Snort install guide. For reference, it has an internet facing router which connects to a switch.... |
Will a USB modem send my computer's MAC address to the Internet service provider when I am using it?
I mean, if two computers use the same USB modem will the Internet service provider know that two computers are sharing that modem?
|
I have read somewhere that it is better to have two different MySQL logins in order to prevent hacking. What I mean is having one MySQL login for read access (SELECT permission) and another login for write access (INSERT, UPDATE, CREATE, and DELETE permission). Is it beneficial to have it setup like this and would it w... |
I have raw image data that is XOR-encrypted with a fixed-size one-time pad repeated over the length of the image. I know what the format of the image data container is so I can successfully retrieve the first 6 bytes of the key.
But that's it so far, I have no idea how to proceed.. Are there relations between adjacent ... |
I'm looking to fully understand how to properly filter/escape dangerous characters from user input that will be interpolated into a DB2 SQL query.
The sanitization routing that I'm analyzing works like this:
Remove all backslashes ( s/\\// )
Replace all single quotes with double single quotes ( s/'/''/ )
My first in... |
At this moment I am being hacked and I do not know to stop it. Let me explain...
My website is hosted in a VPS where I am the only person who has access to it. The page is builtwith Codeigniter(updated), and Doctrine (updated too).
Once I browse to at index.php I see this code in source:
<!--
top.location="http://... |
I seem to be observing some odd behaviour whilst experimenting with Tor. It's entirely possible this is just my own ignorance as well, in which case I would appreciate some clarification/enlightenment!
I have two computers running at the moment (both behind my router), lets call them SENDER and RECEIVER. I have port fo... |
Can somebody help me with adding rule for packet retransmission.
I found some documentation about the snort rules, but I am confused how to use it. The rules which catches the packet retransmission catches the original packet .
These are the packets for which I am trying to add the rule
This is the rule which suppose... |
Is there a way to somehow 'protect' a native shared library (.so) for the Android platform against binary changing? E.g. someone could overwrite a JMP instruction with a NOP after reverse engineering the application, and distribute that library to rooted devices.
Is there anything someone can do?
What I'm looking for h... |
I have seen numerous research papers that claim it is "easy to detect network layer DDoS attacks" without saying why. Usually these research papers focus on detection or prevention of application layer attacks, which is why they don't go into detail about network layer attacks. Why is it easy to detect network layer at... |
I knew that XSS attacks (“non-persistent” and “persistent”) can hijack user session, deface websites, conduct phishing attack, etc.
However, I can't understand what is dangerous of DOM Based XSS if its not able to (Hijack session, click jacking, etc)?
I reviewed OWSAP DOM Based XSS and also This Page that outlines thes... |
In OO programming courses, teachers always tells us to set class members to private unless there is a good reason because it is more "secured".
How does setting members to private makes the program more secure? What are the potential threats for setting class members public?
|
Of the public disclosures I've seen from recently compromised sites, it seems common for only the database to be leaked, rather than the application code, or rather than a complete takeover. Is this because there is a class of common attacks that are limited to read-only database access?
|
I'm trying to develop an IDS/IPS system project to include these elements:
A router running OpenWRT running Kismet drone (Attitude Adjustment 12.09rc1)
A Linux server (Running Kismet server + client)
I have successfully installed Kismet drone/server on their respective platforms.
But I have heard that Snort is rather m... |
Right now we're using 1024 byte PBKDF2 with 256 byte user-specific salt and variable iterations. However, I would much prefer to be able to, perhaps once every year or two, to be able to flat out increase the rounds used in the algorithm. Neither BCrypt or PBKDF2 allow that, so...
Should I just forget about it, or impl... |
A lot of the people I exchange emails with use services such as Google Mail. Recently it occurred to me that Google must maintain a social graph based on who exchanges emails with whom. It bogs me that a Google employee can potentially point to a number of email addresses and say: "These are the individuals X is in t... |
Is it there any difference between the encrypted Google search (at https://encrypted.google.com) and the ordinary HTTPS Google search (at https://google.com)?
In terms of security what were the benefits of browsing through encrypted Google search?
Note that this is not a question about HTTP vs HTTPS. These are two Goog... |
I've got an idea as to how to defeat XSS so simple that it may work and was wondering if anybody had already done something similar.
The goal here is not efficiency but security. In other words I don't care about trading bandwith for security. My idea would be to serve every single character inside simple HTML tags.
... |
I'm working on a project basically a web application. It accepts code (java, c, c++) from client, compile and execute on server and return the results back to client.
As I'm going to execute code on server there are many security and stability issues.
like :
infinite loop.
code accessing local file system.
and much ... |
In the Nessus FAQ it says
Microsoft Windows desktop systems have network limitations that may
impact the performance of Nessus. The TCP/IP stack limits the number
of simultaneous incomplete outbound TCP connection attempts. After the
limit is reached, subsequent connection attempts are put in a queue
and will ... |
Usually while we browse Google through our IP we will be redirected to respective countries. I normally use tor browser for anonymity. Today while I browsed google I got redirected to encrypted.google.com.
Does this mean google can detect tor browser?
If yes, how do they detect our browser identity and IP?
Note: if we ... |
After learning more about PGP subkeys and how to split apart the roles of (S)igning, (E)ncryption, (A)uthentication and (C)ertification, I discovered that in most cases(?) a default master key has a subkey to separate out the job of encryption:
pub 2048R/AAAAAAAA usage: SC
sub 2048R/BBBBBBBB usage: E
Here, AAAAAA... |
I want to learn about security. How to monitor systems, mobile devices, computers etc. What sort of stuff do I need to research to get into my own devices and monitor/change things, be fluent in Linux systems and code?
Thanks
|
I wonder when is the best way to handle escaping user input.
Two options come to my mind
1) User sends data to server we escape it and then store it into database
2) we store data as it is and escape it when we send data to user.
To me it seems a lot easier escaping and then saving data to database but lets suppose so... |
I've been tasked with trying to find a way to secure a single page in our site if somehow, a hacker gets access to our files. This "single page" will be run on a different server.
Requirements:
Show the user something that lets them know they are definitely viewing the right page
That's about it actually.
The idea... |
A close friend fell for a phishing scam earlier today. His account's all squared up now, but I decided to do a bit of investigation.
The website he fell for was a very poor imitation of a Remax site hosted on what appears to be a compromised domain. The email address that the captured passwords were being sent to is pl... |
I need to outsource authentication to an IdP (Identity Provider) but I don't want that IdP to know of the calling site. The two major issues are the callback URL and the referer header.
Is there any way to "hide" or mask the callback URL, referer header and any other data that may exist?
Some ideas might include
Usin... |
I'm working on some code that attempts to identify files whose contents appear to be "random". As such, I'm looking for statistical measures that can be used to identify such randomness.
I've implemented the following so far:
Shannon entropy of the sample (i.e. -∑ p(xi) log2 p(xi) over the sample X)
Bytewise sample va... |
After an unsuccessful login attempt, should I inform the user about its reason? Or more generally, how much information about the reason for an unsuccessful login attempt should a web application give?
It's kinda obvious not to inform the user about an incorrect password alone, but to couple it with login - such as 'Em... |
I'm designing the security of a new application and try to figure out what the best way is to store the keys of the mysql AES encryption in the file system. I've seen several options like store it outside webdirectory in a restricted dir in the filesystem. Also you can store the key in system memory (how do you do this... |
In light of recent developments in computer forensics and "password recovery" utilities, can encryption technologies such as TrueCrypt still be relied on for a high degree of protection?
It would seem to me as though the ability to retrieve decryption keys from a device's RAM (even after shutdown) means that hardware-b... |
I'm totally new in the field of penetration testing, like almost no experience, only read lots of books and papers. I encountered lots of interesting tools during studying, many are famous like Metasploit, Nmap, OpenVas... etc. and other tools that aren't known or less famous, along with lots of code on websites like G... |
We have a vendor who sends us "secure" messages. The messages come as an email message that contains a link to an SSL encrypted website that has the real message. There is no username/password on the linked site, or any other form of authentication as far as I can tell.
I'm sure they do this so they can check off a bo... |
I've been asked to do a security audit on a Firefox add-on developed by a third party. I am a web developer with a reasonable grasp of JavaScript but am not a browser security expert.
What kinds of things should I be looking for in the source code which might represent a security risk. Also, are there any effective too... |
Statement 1
There is a start up called PixelPin. On the web site it reads:
The PixelPin solution is simple and quick to use, yet very secure.
PixelPin eliminates the traditional alphanumeric password by using a
picture based approach. The user chooses an image that’s personal to
them (e.g. a photograph of their family... |
I want to implement a private messaging system to my website, but I'm wondering if the content of the -supposedly private- message between Alice and Bob should be stored in plain text in the database or it should be encrypted prior to that, so that even if the database is hijacked, the attackers wouldn't be able to rea... |
At every office I have worked, links and files, both internal and external, are shared in emails.
Is the objective of an anti-phishing campaign that users never click on blind, or otherwise unknown, links? pdfs? Any file or link?
What is the expected recipient behavior? What should the average person do?
|
I have realized there are issues such as virtual machines being exposed to other VMs within the same system when they're connected to the VMCI socket interface. How do we prevent this ?
|
I am using various 3rd party libs like cordova.js, jquery, jquery mobile, mobilizer and so on, in a an android mobile app.. These libs are found to have various XSS vectors through insecure use of eval, settimeout, inner/outerhtml and so on. However, the modules which have these issues are not used/called in the applic... |
I was reading an article on "Protocol-Level Evasion of Web Application Firewalls" and the article insist on writing application specific rules in this manner:
<Location /index.php>
SecDefaultAction phase:2,t:none,log,deny
# Validate parameter names
SecRule ARGS_NAMES "!^(articleid)$" \
"msg:'Unknown parameter: %{MATCHE... |
Would it be correct to assume that encrypting a single file in a Windows environment, for example a simple text file containing login credentials for a variety of accounts, is inherently insecure?
It is my understanding that on most Windows systems, the creation of temporary files, caches and automatic backups means th... |
Consider following situation:
We have location A where we have our online store.
We have location B where we have payment processing. Server is dedicated to do only payment processing jobs
We can ask for credit card details at server A, and send it via POST to server B
- OR -
We can ask for credit card details at ser... |
Consider situation:
I made my own payment gateway and it passes vulnerabity tests.
My store redirects to this payment gateway. Card details is collected there. Payment is processed there (not stored) and user is redirected back to our store.
So this works basically same as all payments gateways/processors like Paypal, ... |
I have been told that generally speaking, asp.net web apps tend to be more secure than php, since asp.net has some automatic security measures, for example, by default it doesn't allow remote file inclusions. And when you code in php, you have to take care of those things yourself, so some developers might forget to do... |
I used various tools to remove Conficker, and I pretty much succeeded, but I've had recurring problems afterward.
It won't update anymore (with the following error message: 0x800706B5)
I tried everything I found on Google, such as forcing re-installation of the update utility and what-not. Funnily enough, it works on... |
I recently attached two usb-sticks of colleagues to my laptop and transferred a file from one to the other. The file was sensitive and was not supposed to be copied to my PC.
Never mind the background that led to this situation - suffice to say, my laptop was available for the transfer.
Question: did the act of transfe... |
See something like this:
https://stackoverflow.com/questions/10826293/restful-authentication-via-spring/10864088#comment21706215_10864088
Or more specific:
Token-based authentication - Securing the token
My question now is:
Man in the middle can just read the token and use it in is own request. I mean he doesn't need t... |
I am taking a computer security class, and have a homework problem which has the following setup:
Now assume a dynamic version of the Bell-La Padula Confidentiality
model that incorporates a suitable version of the low watermark property, where the
updates involve the lub (least upper bound) function.
First, to... |
Say I have a website and a database, both hosted on rackspace.
Since all communication with the database is from the web server and not the internet, is it safe to assume that I do not need SSL like I do for communication that goes from internet to web server?
|
Let's say that hypothetically someone had broken into a WiFi connection. We can't find any evidence of whom it is via sniffing the traffic or anything of the sort.
Is there any way to triangulate where the connection is coming from and find the general location of the wireless signal?
|
I am wondering if there exist a tools which can return the value of the one of the private key if the following are known:
1) Encryption Algorithm
2) Public key
3) Plain text
4) Cipher text
Or may be there a special methodology how to obtain that.
I am not sure how complicated and time consuming is to do that programat... |
From a theoretical standpoint, the very notion of an electronic notary - ENotary implies a host of problems related to biometrics, signature revocation, timestamping, keeping a reliable electronic journal of notarial acts etc. While it is instructive to learn about those (there are some - but not all - answers in the ... |
I'm trying to understand where the private keys are stored in the Persona system, and how they are protected.
Can anyone elaborate on where the crypto material is created, stored, and what is transferred?
|
I was reading another interesting article by Matthew Green today, saying that
if you're using RC4 as your primary ciphersuite in SSL/TLS, now would be a great time to stop
As far as I'm aware RC4 has been up'd on the list of ciphersuites to protect against BEAST and Lucky 13. (and hence why websites like Google use i... |
Is anybody on the nets keeping track of iOS methods that have been deprecated by Apple for security reasons? I have searched around but with no luck.
Going through all the deprecated methods and figuring out which ones have security implications would/will be a lot of work. I'm hoping this info is already being tracke... |
I was reading this
Windows 2003 Enterprise infected by Conficker; post-infection problems continue
And they talk about nuking it from orbit (which apparently means wiping out the system and starting over) or at least doing an OS reinstall with full format
How are the two things different? Or is it because it is a serve... |
Suppose my web server is on the public internet.
It's not behind firewall hardware.
It does use HTTPS, and it has its OS firewall software turned on - but this is the only security mechanism in place.
Are there published statistics of such a web server getting hacked?
Feel free to make any assumptions about OS, web se... |
Like a lot of people, I pretty much run my life on the Web these days. I use online bill pay, I shop at Internet retailers, I keep in touch with friends electronically, &c. I'm pretty comfortable with the standard home computer security setup for that stuff: physical router, antivirus suite, strong passwords, that sort... |
I've been pouring over the JtR ruleset documentation and making little progress. I understand how to use it to make various permutations from a given wordlist, that's fine. However, I'm trying to figure out how (if it is possible) to use them against XKCD 936 style passphrases
I've seen character classes:
?w matches w... |
in a setting where one has forgotten their password, I'd like to be able to limit the attempts of entering in email addresses to something like 10. My first thought was to use a cookie.
$attempts = 0;
if( isset( $_COOKIE['password_recovery_attempts'] ) )
$attempts = $_COOKIE['password_recovery_attempts'];
if( $pa... |
When bringing in an intern to help you in the IT world and with access to servers and client information, what kind of forms should be signed, especially when they work remotely?
|
Previously when I posted a screenshot online, someone told me to erase out my usernames, computer names, domain names, etc:
Is there actually a need to do so?
A quick Google search shows that many people in fact broadly publicize these info.
How can leaking these harmless miscellaneous info allow an attacker to penetr... |
I have a web-site written in nginx.conf — http://mdoc.su/ — which essentially accepts two parameters, an operating system and a manual page name, and does a redirect to a different site based on the parameters in the URL.
Since the intention is that the site is to be navigated and used directly from the Location bar of... |
Consider the picture below (taken from page 21 here). Is this possible? If so, how can I prevent it?
|
On the answer to my previous question about RC4 vulnerabilities in TLS, Thomas Pornin gave a great answer, in which he said:
One way to "fix" RC4, which has been suggested many times, is to drop the first 256 (or 512 or 1536 or whatever) bytes of output, since these are the most biased of them (the graphics in the sli... |
Recently one of my sites was hacked. The hacker used SQL injection to compromise the security. After getting SQL access he injected code in many places in the database. I cleaned up many of them. But I am still worried that it may contain any hidden backdoor.
How can I find such injected code?
|
How can we quantify the trade-off between password aggregation and convenience?
Password managers such as lastpass are convenient, but aggregation of passwords into a common store may reduce security. How do we evaluate the trade off between convenience and security? How much risk arises from password aggregation? How... |
One of my friends windows laptops (which I don't have access to right now) has in the recent past had a virus (where .doc files were converted to .exe files) which we dealt with.
Now when she right-clicks a folder to "send to compressed file" instead of creating a .zip file it creates an image file (jpg/png variety - ... |
I am implementing a password vault program with java. I have programmed a triple DES for encryption and a SHA256 for hashing.
My question is would it make any difference if I first hash the raw data (password) and then encrypt it, or first encrypt the data (password) then hash the encrypted data. I am mostly concerned... |
I'm working on implementing an Exchange 2010 solutions which includes Outlook Web Access, Exchange ActiveSync and Outlook Anywhere. These services use SSL and would be presented on the Internet so our users can access them externally. I'd obviously need to protect the server (CAS role) that these services operate on. M... |
So this question is delving into security and encryption and the problem potentially hasn't been encountered by many. Answers may be theoretical. Let me outline the scenario...
A website frontend is driven via a backend API. The backend has an endpoint handling a generic registration form with username and password. I... |
You probably heard about excellent report "APT1: Exposing One of China's Cyber Espionage Units" published by the Mandiant company (you can download it here). Report is great and I recommend it to anyone interested in computer security.
Together with the report Mandiant published SSL certificates used in communication b... |
I was wondering if there are any known attacks against PEAP used in wireless authentication/authorization?
I'm specifically looking for attacks that would allow:
bypassing the authentication
session hijacking
|
I am designing a RESTful API which is to be accessible from a web browser. The API is protected by Basic authentication.
I understand the concept of CSRF, and the mitigations proposed (I found both Wikipedia CSRF entry and OWASP CSRF page good explanations). They generally introduce some state that the client needs to ... |
I am working with several other people in writing software which requires authentication before it accesses resources. In order to authenticate, we devised the following strategy.
Client sends a SHA1 of a username to the server
Server responds with a user's unique ID, which is a public key in an RSA key-pair
Client cr... |
The Security Bulletin states that the "Maximum Security Impact" is "Elevation of Privilege"; however, the SRD blog post says code execution is possible. Additionally, SRD says "Other software that enables low-level pass-through of USB device enumeration may open additional avenues of exploitation that do not require di... |
Yesterday I discovered somebody had uploaded this PHP code to my server as a .jpg file via my asp.net MVC application's "Upload your profile picture" form. I believe the attack was unsuccessful for a number of reasons (the images are given random filenames, then resized, and they're stored in a non-execute directory).... |
This post on Securing Java Application Data for Cloud Computing offers a good introduction to using a Java KeyStore for securing encrypted data in the cloud. It neglects, however, to answer the fundamental question, as noted in one of the comments: how would you protect the keystore password on the cloud?
We are desi... |
Is this a security issue? Many big ecommerce platform companies use this feature. Where if you forgot your password, they e-mail you a temp password.
Could someone potentially figure out the algorithm they use to generate these passwords; also these temp passwords have to be stored somewhere in plain text, correct?
|
I am implementing a web api with which I plan to authorize access by accepting a username and password and system name and returning a sessionid which can be used on subsequent calls to authorize the caller.
The api is only available though SSL 3.0 or TLS 1.0.
What are the main attacks which would be possible in this s... |
I understand that SIP is an application-level protocol that is used to setup/modify/end communication sessions for things like VOIP and instant messenger. I also understand that users can send request messages (to other users?) and get responses back (saying that the other user will open a session?). I also understand ... |
I am having difficulty with my laptop right now. All of a sudden some partitions would contain a link to the previous contents of that partition. For example:
Before:
Partition T:\
\somefile1
\somefile2
\somefile3
Now:
Partition T:\
\autorun.inf
\Partition T:... |
I hope this question not same as this one:
E-mail can be made to appear like it came from a big organization?
I'm not asking how to protect brands and large organizations (Google, Yahoo, etc.), but how can normal users protect themselves.
As far as I know there are worms that can get an email's address books, and ther... |
I'm beginning to see more and more public device charging stations — okay, they're still mostly in airports — that include USB outlets, not just regular power outlets. Are these safe to use? Could someone with time, access and expertise rig one up so that it silently snoops in a connected phone's memory or loads a viru... |
I am currently setting up secure environment between 2 pc in isolated network.
Just wondering can we do file sharing based on that pc mac address instead of username?
The environment is OEM Windows 7
|
The Java Card 3.0 specification (draft?) came out in 2008. It is now 2013. Are there any existing smart cards that actually implement the specification? How about USB tokens?
The best I've found is Java Card 2.2.2 + ECC functions from 3.0.
If Java Card 3.0 seems dead in the water, are there any good alternatives? A che... |
I want to ask a query about snort parallelization.
1) Can snort detection rate remains same for all attacks after parallelisation?
2) As the parallelisation of netowrk traffic in each core is based on flow, what are the problems that can be faced in detecting multi session attacks ; because many applciation level attac... |
While going through some references about protection against XSS i found that it is a good practice to encode data (entered by users) before using it to generate a dynamic page. I was not able to find out a detailed explanation of this statement.my question is
How does encoding help prevent XSS?
Does it provide full p... |
Currently I'm building an authentication system using Linux PAM for a python daemon process. It will need to authenticate remote users from a variety of front-ends against the local user list. (Amongst other options but those I do not have trouble with) It will be used as a centralised management and configuration syst... |
We are about to launch a important webservice. We must test it for DDoS. From other questions/answers here I learned about LOIC. Downloaded, tried, but my apache refuses it.
What other ready made tools are out there so I could CRITICALLY test our serwice?
Any good tutorials on how to do it via shell/bash?
|
I have a personal certificate which is signed by a certificate authority. This certificate is unrestricted with respect to its allowed purposes. Is it possible to create a SSL server certificate on my own and sign it with my personal certificate?
Supose the root certificate authority belongs to the trusted ones of thos... |
I am writing an application App1. This application uses SQLite database and I plan to encrypt it using AES256. For symmetric encryption I need a key, which I need to store somewhere.
From a similar questions I have a few options, but none is applicable in my case:
Tie the encryption key to your admin login
I don't tr... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.