instruction stringlengths 24 29.9k |
|---|
I know that there have been broken or weak SSL implementations. Do browsers actually have decent standards for what they'll accept and display "the padlock"?
Furthermore, are there any practical attacks from an eavesdropper perspective against a fully modern SSL connection?
Should the padlock make me feel warm and fu... |
Encrypting the file using same encryption algorithm using different Keys can increase the security or not?
|
There is a data flow of incoming files (from untrusted, external sources), that get whitelisted by a kind of application layer firewall.
Is there a common name for the state of the files before they get whitelisted? Can you provide some source like NIST?
|
I am implementing a web api with which I plan to authorize access by accepting a username and password and system name and returning a sessionid which can be used on subsequent calls to authorize the caller.
The api is only available though SSL 3.0 or TLS 1.0.
What are the main attacks which would be possible in th... |
I have a machine running Mac OS X and I suspect there may be a backdoor installed.
I know that I could take it to a professional security firm for analysis, or nuke it from orbit, but I'm interested in dealing with it myself.
What forensic techniques might I use to determine if any backdoors exist in the system?
Addit... |
Most of what I have seen on mutiifactor authentication (eg wikipedia or here on se) seems human centric. Ie it is a human interacting with a machine and the factors are associated with authenticating the identity of the human to the machine. The factors are related to a person:
something you know (pin, passwords, etc)... |
The email address I used to create Skype profile has been disabled and I can't get it back.
Unfortunately, I don't remember the Skype password now.
As the password is auto saved in my local machine I am able to log in to Skype account in only this particular Ubuntu[12.04 LTS] machine.
I need to retrieve the password, s... |
I have a True Crypt volume that's set as a file. When I mount the volume and delete a file within the container, windows asks if I'd like to send the file to the recycle bin. While the volume is mounted I see the file in the recycle bin but when it is dismounted the file is gone.
Could the file I deleted be recovered ... |
What recovery techniques (if any) exist that can recover data from a mechanical HDD if the user has filled the disk with a single run of dd if=/dev/urandom of=/dev/[disk]?
Or in other words: is this method of "wiping" the disk secure? If not then why not?
It would be interesting to know if any purely software based app... |
The Intrusion Prevention System is giving me an attack with signature 3032, TCP FIN Host Sweep on one of the ip addresses. I need a solution or recommendation on how to avoid the TCP FIN Host Sweep.
|
I've experienced some odd behavior lately (cookies being cleared in Firefox, forcing me to log in again). Antivirus scans (MS Security Essentials, MalwareBytes) aren't showing anything, but Process Explorer shows two instances of csrss.exe with no verified signer. Access is denied to these processes.
Wikipedia shows th... |
Some years ago a sysadmin of large computing centre (on a campus) enforced the password of every single user to contain the character $ at an arbitrary position. They soon dropped this policy but I always wondered what could possibly be gained by this. Would this actually make passwords more secure or would it make the... |
Suppose I have a team or organization managing a single twitter account and a single facebook page. Different users need to be able to post content to the same account. How can I minimize the risk of this account being compromised?
In my opinion, the ideal scenario would be (1) multiple users having posting permissions... |
"Your password can't contain spaces."
is a message I see from some websites,
including 1 .
Why?
(This question is very similar to Why Disallow Special Characters In a Password? , but the answers there don't seem to apply to the space character).
Some systems apparently strip out all spaces before hashing the password.
... |
I am currently engaged in a debate and I wondered what the community's opinion on this was.
We see REST APIs which just require basic authentication (perhaps HTTP) or OAuth.
We see REST APIs which also require a signature; containing secret(s), time stamp, perhaps a nonce.
We occasionally see REST APIs which also req... |
For an online banking application with SSL enabled, should card numbers be provided back to the user unmasked, when there is a failed login.
Would this be a violation of PCI DSS 3.3 or not as the validity of the PAN is unknown?
PCI DSS 3.3 "Mask PAN when displayed (the first six and last four digits are the maximum num... |
In many cases, there is a single master key that is installed in a HSM or similar device, but which should be backed up. The recommended method for this backup in many cases is to encrypt the master key to multiple smart cards from which there is a "n out of m" style setup required to restore the master key. Some HSM d... |
Does there exist cross-platform email handlers following these basic guidelines based on some very limited experience?
Generate new key at first startup, rather than asking the user if they have an existing key. "Use existing key" could be a button somewhere isolated on the form.
Secure defaults. Just stick with some ... |
I understand that there are many applications such as Snort that do the job for network layer 3 IDS.
From what I have researched, layer 2 wireless IDS seems like a field that is very slow in development? Snort-wireless and Openwids-ng seem like dead projects.
The most up-to-date and stable opensource software for WIDS ... |
Assume that we have a user that wants to connect to the server, for example with login page, when user submits the username & password goes to the server - if man in the middle reads the user & pass, can he connect to server or there are mechanisms that can prevent this?
|
Is there any way to build a script which detects or rates proxies like Maxmind's proxy detection software?
I have already tried to use this code, but it doesn't detect all proxies, in fact it detect quite a low amount of proxies, while Maxmind can detect a lot more.
if(
!gethostbyaddr($_SERVER['REMOTE_ADDR'])
... |
I am running Ubuntu 12.10 on my laptop and I would like to make a set up such that without a login password, no one would be able to login into my system. Currently it seems that one can, quite easily, login into Ubuntu operating system using the recovery mode, or using an Ubuntu Live USB. When I realized that the syst... |
While password guessing is a science, not every attacker out there is up-to-date with the latest advances or cares to invest in GPUs or FPGAs.
It's easy enough to test online password guessing attacks by opening a honeypot, and they mostly focus on trivial passwords and don't even target default passwords that much. Bu... |
I have encrypted an image using pixel encryption method. I just used a bmp image for that. What I did is, I retrieved each pixel value from the image and obtained the value of red, green and blue value individually and XOR-ed it with a pseudo random value. For pseudo random number generation I used the SecureRandom wit... |
From what I understand Google reads/scans all my emails so that they cab "provide" targeted ads and maybe for other reasons.
If a have a group of people who want to hide their emails from Google, how can they best do that in a simple way? Maybe the group has a topic that they are discussing that they don't want Google ... |
When you take ownership of a TPM in Windows 7 you encounter a screen like this:
Based on this document, it is my understanding that completing this dialog box somehow results in the generation of the Storage Root Key (SRK) based on the password:
Storage Root Key: The Storage Root Key (SRK) is used to wrap TPM protect... |
My iOS app has to handle storing private keys for the user. Normally I would just use Keychain Services for this as I would a password, but it would be great if I could sync the keys between the user's devices.
Apple's iCloud documentation says not to use iCloud for passwords, but is it safe to use for private keys? Ap... |
Apple uses a nice keychain. This is used by, for example, Google's Chrome browser.
Imagine a user copies all the keychain files.
Would that user be able to unlock the keychain, if they knew the master password, on a different Mac computer running the same version of OS X?
Does any software exist to allow a user (who r... |
I recently found that in Microsoft .NET framework an impersonated thread is not allowed to request "time at which the current process was started". This could be done intentionally or this could be some implementation deficiency.
Is there any security risk if any code run on a server is able to find when the process th... |
We are using IBM HTTP Server Version 7.0
Need help related to Cross Site Scripting Prevention in IBM http server.
Cross Site Scripting Prevention in Sun Java System Web Server 7.0 mentioned in following link: https://blogs.oracle.com/meena/entry/cross_site_scripting_prevention_in
Is there any configuration setting rela... |
I generate a random anti-CSRF token per session and store it in a cookie (with the http_only flag set). Then I add that token to forms (in a hidden input field) and links.
When receiving a request on the server, I check that the cookie and the anti-CSRF token field of the form or link exist and that the two values are ... |
If I use the following
openssl req -x509 -days 365 -newkey rsa:2048 -keyout private.pem -out public.pem -nodes
I get private.pem and public.pem
If I use
ssh-keygen -t rsa -f rsa
I get rsa and rsa.pub
Is it possible to convert from the format of rsa to private.pem and vice-a-versa?
Edit: To be more specific,
a) I... |
I need to scan several /16 and a /8 subnet to see what hosts are up and additionally, if any services are running on a select few ports. I've tried various tools such as angry IP scanner, Nmap, advanced IP scanner. But they all crash out after a while and none of them complete the scans as required.
Whats the best way... |
I was reading this interesting question:
Is my developer's home-brew password security right or wrong, and why?
It shows a weak home-brew algorithm developed by "Dave", and the answers discuss why this is a bad idea. (Actually hashing algorithm rather than encryption, but my question applies to both.)
It makes sense to... |
Background
Looking to create an anonymous voting system. The system must track whether or not a user voted on an item (public information), but only that user is ever allowed to know whether they voted for or against an item (private information).
Users must login with a unique identifier and a password.
Problem
All da... |
In my application, it is required to encrypt a user's data before inserting it into the mysql database. I am using AES algorithm to encrypt the data using a 256 bit hash (and is calling it Data Encryption Key, or DEK in short).
To make the system more secure, instead of storing DEK in plain text in the app server, it i... |
I have just started using a password manager and was wondering what is the best practice regarding where to draw the line regarding what is stored in the software.
Ideally I could store Windows/Unix user password, sudo passwords for remote servers, passwords for SSH keys, email account passwords and online banking pass... |
We are planning to use 2 way ssl instead of username/password token for authentication. Does anyone know what is the performance penalty for using 2 way SSL?
|
I have a locked administrator account. Other accounts are unlocked, but they have no rights. I want to get a password from the locked account, or maybe password hash, if possible.
|
The book:"Web Security Testing Cookbook
By Paco Hope, Ben Walther" is the only source I could find which covers the topic. They use cURL. I just want to write some scripts to automate testing for xss. I'm just gonna run it on a site like demo.testfire.net for example. I know there are allot of tools available for the... |
Device fingerprinting is one of the biggest privacy problems as explained because people think cleaning cookies, using proxy servers or blocking domains can protect them (when blacklisted trackers simply ask a whitelisted tracker to iframe their code from a new domain).
Tor might fix the problem but it isn't practical... |
What is it about GPUs that lets them crack passwords so quickly?
It seems like the driving force behind adopting good key-derivation functions for passwords (bcrpyt, PBKDF2, scrypt) instead of yesterday's cryptographic hash (MD*, SHA*) is that the later are vulnerable to programs that run on GPUs and guess huge numbers... |
TLS 1.0 seem to be vulnerable to Beast, Lucky13 and maybe other attacks and is simply outdated. Common workaround used e.g. by Google was to use RC4 which was also recently broken, but none of the major browsers seem to be implementing newer version of TLS, except Microsoft IE for newer Windows versions.
Is there a re... |
Using type- and memory-safe languages like Java and Scala for server applications gave me the confidence of having a basic level of security (e.g. compared to C). Now with the recent wave of Oracle Java vulnerabilities I noticed that most of them apply for applets in web-browsers and only a minority of them apply to se... |
I've been seeing the exact same injected script on several of my websites for the last few weeks. Today I realize these websites don't share the same hosting servers, yet the attacks (1) started at the same time (2) are identical.
Does this prove that my FTP passwords have been stolen (they're all stored in Filezilla X... |
I am not understanding CRIME attack completealy..
First an attacker runs a script to caputure the encrypted cookies later using the captured value an attacker try to bruteforce the next cookie value.All the encryped cookies have the same length.
In some papers I have read like there is compression before encryption in ... |
I recently worked on a web project that uses Javascript and PHP to load its content from flickr API.
I kept on getting this image show up and disappear immediately during first 2 or 3 seconds of the page load (http://www.yceml.net/0355/10883427-2.jpg) and couldn't find anything in the code that requests this image.
So ... |
Just reading I learned about the TPM technology and how it works.
However, it make me wonder... if the motherboard crashes, is the data lost forever? Because you can't use the drive in other system due to the unique RSA key used by the TPM.
|
Where can I find more details about identity disclosure attack and it's prevention?
If the adversary tries to steal the identity of an individual like mobile patterns and start appears in various locations. How can we detect them?
The intruder may change the data by listening to the victim for a very long time and try ... |
I've recently heard on some IT-SEC conference, that good idea to secure database (probably against privilege-escalation attack) is to remove superuser role, and leave only user roles.
I imagine that as removing eg. possibility of non-shell logging of database system account and leaving only databases and users where th... |
If Alice (sender) sends a private message embedded with public key of the Bob(recipient) through onion network, so in this key exchange, does Bob remains anonymous to Alice as Alice knows about the public key of Bob. So if we want to achieve mutual anonymity, how can we do that? Can we achieve mutual anonymity through ... |
Authentication
The authentication is going to be signature-based. The signature will be generated using:
HMAC_SHA256(SHA1(secret_key) + '#' + request_data + '#' + utc_timestamp)
The utc_timestamp will also be included into the X-Timestamp header or into the URL using the _timestamp parameter. The request_data will con... |
When creating a Truecrypt volume, there is the wizard page in which the user is told to randomly move the mouse (the longer the better) to generate entropy, and that it will significantly increase the strength of the encryption keys.
I have the feeling that the increase in the randomness of the keys will no more be rea... |
My client wants a photography site where users can upload their photos in response to photography competitions. Though technically this isn't a problem, I want to know the risks associated with allowing any user to upload any image onto my server. I've got the feeling the risks are high...
I was thinking of using somet... |
I'm creating my own openvpn server.
The Certificate authority is located on a separated host.
There is two kind of clients: which that just send a .csr and to which i send the .crt as an answer and the other which I build myself.
In the second case, I create the .key and .csr by using:
openssl req -days 3652 -nodes -ne... |
I'm a very security conscious (bordering paranoia) freelance web developer and I place a lot of emphasis on security with my clients, alas I've found this doesn't seem to be the case for the average web developer.
Something that's been bothering me lately is the thought that the people I usually hand projects over to m... |
I need a secure, encrypted environment for conducting text based interviews online. It's for academic research purposes where data protection is paramount so there cant be any data stored on 3rd party servers. I've looked through your older posts for help but can anyone offer any up to date info. thanks
|
I'm interfacing with a secure web service, and authenticating using a client certificate. I'm confused about step #3 in the client configuration:
Generate a private key into keystore
Generate a CSR to have your public key signed
Import the Certificate Authority certificate into your keystore so that a proper certific... |
I started a topic HERE on the stackoverflow site, but was refered here.
I did get some info there, but think it need's more indepth input.
So hopefuly people here can help.
I have a few domains that I use for sites and testing. Most are hosted with one well known domain site, the others with a small one.
Recently I no... |
Non of these two methods worked: http://googlesystem.blogspot.com/2012/01/new-google-accounts-require-gmail-and.html
|
If I need to employ Penetration Testers, what are the procedures to follow and how to examine candidates to know their skills and qualifications.
Also, I need to know what are the examinations/certificates that I should look for in the employee and for me.
|
I have a free webmail account that I have been using for around ten years now. Over the past two years I have almost phased out using this address.
I have concerns around accounts that I may have created on forums and other sites like eBay etc that I may have lost track of over the years that are either now inactive or... |
I created an encrypted but forgot the password. When I attempted a pattern based brute force it said it had over a 100 trillion passwords to check. And to my knowledge that could take a few years. Based on this it may be possible to use a padding oracle attack. That being said, how would I go about doing a "padding ora... |
I understand that with OpenSource software, my milage may vary based on the trust of the author and the distribution platform they use (Codeplex, Git, or private server).
Oftentimes a FOSS website will offer me a link to download the binary and another link to download the source code.
Under what conditions can I simp... |
I would like to manage my inventory using a barcode system, but I am afraid that people will be able to scan or copy my barcode and make duplicates.
I would like to offer a discount card that has a unique barcode for each customer. It is important that customers cannot rescan or duplicate the barcodes because each barc... |
Question
If one installs a VM with "high security" on a host machine with "low security", will the VM be only as secure as the machine it's installed on, or will the high-security aspects from the VM (e.g. latest service-packs and updates, anti-virus software, firewall, etc.) compensate for the fallibility of the host?... |
It is now common to use an API Key to identify an agent when dealing with an API. What are the merits of doing that over using a username specified by the developer? Is it simply that the API Key is harder to guess, or is there a deeper reason?
|
I'm getting a lot of flack and resistance from developers for not allowing a large (200+ users) roll-out of Oracle's JInitiator (http://www.oracle.com/technetwork/testcontent/jinit-084453.html) as substitute Oracle Forms clients. JInitiator is an old JRE version put out by Oracle to get around bugs in early versions o... |
I'm curious why an ATM computer is considered secure. The general adage of "If an attacker has physical access to my machine, all bets are off," seems to not apply in this circumstance (since everyone has physical access to the machine). Why is this?
I thought of the fact that many have security cameras placed over t... |
I received a pretty blatantly spammy email to my Gmail account. Attached to the email is a supposed HTML file. My first hunch was that it was probably one of the following:
A nasty executable file masquerading as a simple HTML file, or
An actual HTML file meant to be opened in a browser in a phishing attack
My guess ... |
Sites like Wikipedia and Google (among others) don't let you sign up through a proxy or Tor (at least with Google, you have to provide SMS verification if you sign up through proxy.) Somehow they detect it that you are behind a proxy.
Is there a workaround for that? I'm thinking of a service which tell these site you a... |
Currently I have 3 private GPG pairs which are all master keys.
I want to convert these keys into subkeys for a new key pair (and keep that in the vault).
I have read the following thread http://atom.smasher.org/gpg/gpg-migrate.txt which involes some sort of hacking the binary file to convert one master key into a sub... |
I am working with a company that is "PCI Compliant" and in order for them to give me any of their data (customer name, email) they ask that I be "PCI Compliant" even though this data is not credit card related. Very new to PCI but in reading I guess I fit in the SAQ D but not sure.
Edit: This is a spreadsheet with 2 co... |
Suppose I would like to use a very long string as a password. As an example we can just say this string is 100 characters in length.
However, suppose the application for which I would like to use this password only supports password lengths of 64 characters. Without going in detail, assume that simply truncating the ... |
I am trying to setup two way SSL to communicate with partner web service. I understand I have to provide server certificate on client side. However, questions are:
Is self signed certificate okay?
Should the client certificate be on web servers (1&2) or on outbound firewall?
The connectivity is as below:
web server... |
Well I don't know if this technique is still used, but about 5-7 years ago it was a popular way to deliver a malicious patch (Sub-7 , bifrost etc ..) to a victim.
There used to be a program that binds the malicious patch with an image or MP3 file.
How dose this happen on the binary level?
How can two codes of two diff... |
Over the past few days, I've received several spam emails coming from the addresses of a school district. I don't know much about email message headers, but since they contain numerous references like this:
Received: from ecb-mx-out1.example.com (ecb-mx-out1.example.com. [<ip_of_example.com>])
that makes me think the... |
The question title is... ugly to say the least. Here's an overview of what I've got:
I work on an online tool. Data is sent to it, it processes the data (an intensive task) and sends results back.
The tool is sold to organisations who want to include the functionality in their public websites and apps for their custom... |
I am using Tomcat 7, jsp to build a small website. I am new to security and it is a school project so using Spring Security is not an option. I am attempting to store UUID and Open_id in the clients cookies for the "Remember me ,User login" feature. Then just checking these two ids in the database, to see if it exist. ... |
I have an image upload php website. Users can upload images to my website. A user claims he can hack my website using an uploaded image.
I opened all the images that he uploaded to my server with notepad. The last line of one image is:
Àpa@ ;
<?php
echo "test ok";
?>
Can he hack my website using this image? How do I ... |
I recently used nmap online to test my firewall security on the WAN port. I purposely did some port forwarding but received inconsistent results. I opened ports 6881 to 6889 on the firewall and did 2 scans. In Scan #1, the range was set from port 1 through 16382. The result came back as all ports filtered. I found the ... |
I am looking to use PKCS#7 to sign and encrypt data (offline batch data files) that are exchanged with a 3rd party.
I need to write an interface specification for the 3rd party so that they can decrypt and verify the signature, but I'm wondering what that interface spec should contain.
So far, I have:
A specification ... |
I'm looking to protect zip files that I will be regularly sending to a 3rd party.
I need to ensure strong confidentiality and non-repudation. I would like signing/encryption to be based on asymmetric keys to simplify key management.
Is PKCS#7 suitable for the use case described above?
Updated:
The zip file can be sign... |
Say I have an internal server that I am using for source control. If I only access that server through a VPN connection, do I still need to have SSL setup on the source control server to ensure that no one can eavesdrop on my communication with it?
|
I'm writing a company policy on how employees should handle reports of information security related events and notifications that come from vendors, customers, and from people within our organization.
e.g.
If a customer calls and says their data has been compromised and we're to blame
Someone receives unsolicited or s... |
Say that my password is PASSWORD1 I have a 10MB jumbled text file. I hide my password in two parts in the text, between > and < so I can find it myself. Then I put the 2 parts together and add the 1 by keyboard. How easy is it for security experts to find it?
Ä)e÷>WORD<ÆiW+¯S¥\«…%‹&Ìâœê–f0ãídá¾Ûùvÿ²
åŒëÐ 8ïÙtFJÍÕ9"Å¡... |
I was thinking of creating an on-screen keyboard to protect against keyloggers. The main problem is that I have found that there is a category of keloggers, called screenshot key loggers, which are able to take screenshots of the screen every time the mouse button is clicked.
For this reason, I feel that my approach of... |
I'm trying to find some information on how cellphones discover which wireless networks are in range? Is it via ARP or DHCP discover? Also how often does a cellphone do this polling?
I can't find any detailed information anywhere.
|
This is a clone of a question I posted on Stack Exchange. Thought I might catch the eye of some different people who could help here.
We are trying to implement a hmac-based one time password protocol for use authenticating users over our api.
The idea is to encrypt a unique identifier for the user (uid) against a priv... |
I have a MS-Server2K3 domain controller that also serves as a Exchange server. Due to recent network speed loss and issues I began looking at event logs and noticed an exceptionally large number of faulure audits wich is an obvious dictionary attack with it cycling through users in alphabetical order. The workstation n... |
There is an 'Internet Weather Report' on the Threat!Traq video blog by AT&T security researchers. In the March 14th broadcast, at around 31 minutes in, they mention an increase of scanning activity on port 5904/TCP. The researchers mention they do not know what is being scanned for.
Does anyone know what vulnerability ... |
I have a project I'm involved in which needs to distribute a mobile app to a specific audience. Due to regulatory restrictions in the target market, only this audience is allowed to access the data within the app yet it will be served from public app stores (multiple platforms are targeted).
I'm looking for thoughts on... |
When displaying a page with content only logged in users should see, I simply check
if(isset($_SESSION['hasLoggedIn']))
{
//show content
}
else
{
echo 'you must log in';
}
In this article it recommends checking the IP address and browser each time.
$_SESSION['login_string'] = hash('sha512', $password.$ip_address.$... |
I got an e-mail (in my spam folder) from usercenter@idcenter.uc.cn which asks me to click a link to validate my login for their website. Obviously, I deleted this e-mail without clicking it's link. But, I am still wondering if this e-mail was sent by one of the many website where I had registered for some webinar or wh... |
I just put an old flash drive which i used with a windows machine into my linux. I noticed many files, mostly exes which were never visible in windows (my windows does not hide hidden files and extensions). Most of those strange files had malware like names. I changed the properties of these files so that linux would a... |
Many Yahoo!/SBC Global email accounts have been hijacked via an infamous XSS attack. The accounts are often used to send spam to random members of the user's personal address book. The spam often advertises a weight loss solution on a fake clone of a news site, which accepts credit card details, and possibly hijacks ac... |
I read a lot of issue [1] currently stating that RC4 is broken and is at risk.
I just checked my web server (nginx) and it is using the default settings, which is
DHE-RSA-AES256-SHA
How does this Cipher compare to the RC4?
Is it slower (I think so)
But it is more secure?
[1] http://blog.cryptographyengineering.com/20... |
I run a small business, designing and building websites. Currently our websites we build use Adobe Flash.
We are thinking about migrating to HTML 5, are there any security advantages in doing such a thing?
|
I'm absolutely new to this topic of ssl certificates, so please be patient with me.
My task is to install an AS2 communication with some business partner. Therefore we need message signing and encryption. Some communication partners are accepting self created certificates, which is a bit curious, since they cannot be ... |
I've had a look at several signature schemes (DSA, ECDSA for the most common ones), and am wondering about whether there exist a scheme that would have the following properties :
Be asymmetric (one need a private key to sign, one can verify with a public key)
Have a very short signature size (less than 50 bits)
Be sec... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.