instruction
stringlengths
24
29.9k
IPv6 introduces a much larger address space than IPv4 and with it there are many new techniques in creating and mitigating DDoS attacks. What are some examples of risks and mitigations? For example, with the additional address space of IPv6 is there a new set of Bogon IPs that can be filtered? Is there any proof-of-wo...
My LUG on campus once in awhile holds a mock wargames on a VM. I'm trying to figure a way to get root access and make everyone else not be able to have root (king of he hill). I have a few ideas, but people on these sites always seem to have ideas far better than mine. In sum, how to, when root, become the only user wi...
On serveral websites I've run, I periodically see URLs run against my servers that look like this: /url_result?ctw_=sT,een_j...tdmlydXMtc2NhbS1lb........ Does anyone recognize it? I've tried to Google related URLs. I suppose I'm expecting to see "attempting to find a vulnerability in x CMS". But I don't see much.
From time to time, our premises and infrastructure is rented temporally for some conventions/meetings. One of these meetings requires an ordinary POS which would require a phone line or internet broadband connection to connect to payment gateway. My concern is, what would be our responsibility as owners of IT infrastru...
I'm expanding my understanding of Malware a lot more, as it's currently 0! I know how it behaves and propagates most times, but I don't have a clue about the latest threats out there, what it exploits, what ports it uses, etc. I did a quick Google and have come across the following sites: http://www.securelist.com/ htt...
The document NIST Special Publication 800-52 Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations was retired without superseding it with a newer document. In addition there is a Network World article that mentions the requirement of Mutual Auth TLS on Government websites and the possi...
Can any Security Researchers/Pentesters/Hackers point me in a direction to learn about becoming a Security Researcher and steps to take?
ATMs get occasionally stolen. How easy would be for the thiefs to retieve the PINs and other information of the users that have previously used the ATM? Is there a periodic wipe of all records/logs/traces on the machine within the ATM enclosure?
Two-factor authentication is growing in popularity as a security measure. For example, Google, Facebook, Twitter, and many other services all have two-step security options today as well as many banks and credit unions. I'm wondering whether using a Google Voice telephone number as the so called Physical device to whic...
Forgive me if this should be in the crypto sub, but sometimes the answers there are very mathematical and I would rather have an answer which is a bit lighter on the math. I was watching the Cryptographer's panel from RSA 2013 and at about 33 minutes in they mentioned that ECC is more vulnerable than RSA in a post-quan...
I'm coding GENERIC_WEB_SERVICE, which could potentially be running as multiple instances on multiple machines down the line. I'm using UUIDs as identifiers, and haven't settled yet on whether to use version 1 or version 4. In this case, I have absolutely no idea what the implications are of exposing the MAC address by ...
I used this command to password protect a zip file on Linux : zip -P 9000 hash.zip hash.py and it creates the zip file just fine, then I wrote a program to test every possible password on it from 1 to 100000, the problem is that program find two password on it, first is: 9000 and the second is: 79095 , and both passwo...
Normal user authentication is done by comparing "hash"-values. A simple example of this: The user password is hashed with PBKDF2 on the client using a salt (the salt is the hash of the user password concatenated with his username). That result is then sent to the server where it is again hashed with some unique per-use...
Suppose you done: gpg2 --gen-key ... gpg2 --keyserver pgp.mit.edu --send-keys ... Does such key have any legal meaning, e.g. to assert that it was really me that signed some message? What can be done to give the key mode weight in eyes of officials (especially in eyes of not crypto/PGP-aware people)?
I've been wondering about this. Assume a host with a strong firewall setup (for example only allowing port 80). That host has some virtual machines without firewall. Why the connections made on these virtual machines aren't rejected by the firewall in the host? At the end, the VM it's only a program running in the host...
I am looking for details on how to secure a windows laptop using smart cards. The scenario is that we have laptops in vehicles, which remotely connect (via https) to an application server over the internet. Scheduling and payment applications run on the laptop. The operator is often away from the vehicle when perform...
I type my password to login to Win or Linux. Case 1: I get it right. Almost instant reaction. Case 2: I misspelled it. It takes a while, and then rebounds. Why does it takes longer to identify a wrong password vs a correct one? shouldn't the time to identify be the same?
This is not my main anti-CSRF mechanism; I know that https requests don't have a referer header; I know users or firewalls can remove it or set to an arbitrary fixed value. I intend this mechanism just as a possible added security layer preventing CSRF in case my main mechanism is bypassed for some reason. My code will...
I was wondering if appending a double quote at the end of a query is considered a valid XSS filter. Let's say we have a search function and I entered: "><script>alert('hi')</script> If I look at the source of the resulting query I will see the following: <input name="search" type="text" value=""><script>alert('hi')</...
Nowadays no one dares to defend md5 for any use, and of course they should not! However, much popular software still uses md5 in applications such as password hashing (although it's not simple/plain md5 and probably uses advanced techniques such as salt + key stretching). I have heard, for example, that the Drupal CMS ...
Issuing monkeysphere subkey-to-shh-agent GPG warns me: gpg: about to export an unprotected subkey then it asks for the passphrase and everything works fine. What's the meaning of "export an unprotected subkey"? What are the security issues related to this warning?
We recently got hacked and after cleaning the virus from our machine we pushed out site to go through cloudflare. Although I've noticed scanning attempts on the site have dropped we do for some reason get hundreds of 404s to oursite.com/undefined or oursite.com/like When there is a 404 i get an email with browser type/...
I was going through the wikipedia article on Intrusion Prevention Systems. It states two of the four types of IPS as follows: Network-based intrusion prevention system (NIPS): monitors the entire network for suspicious traffic by analyzing protocol activity. Network behavior analysis (NBA): examines network traffic to ...
While authenticating, should attempts with invalid user names be logged? OWASP Logging Cheat Sheet says that authentication failures must always be logged. I can observe several programs doing this, including login on Linux: login[1234]: FAILED LOGIN 1 FROM tty2 FOR foo, Authentication failure It has happened that I a...
I'm looking into using a OTP solution. HOTP is a OTP solution that is based on a HMAC with as hashing algorithm SHA-1. The standards defines it this way. But... SHA1 (as we know) has been a weakness. So, now i'm looking into using a hashing algoritme from the SHA-2 family as the hash for my HOTP solution. any thoughts ...
I have developed a REST API which has been configured to only operate over HTTPS. The sole purpose of this API (at least for the moment) is to operate as the backend entry point for a mobile application. I have rolled my own token authentication protocol (see this question/answers) which is used for client authenticati...
I'm thinking about separating the static content from the dynamic content, and put the main www domain with the static content on Amazon S3. The main reason I want to do this is security. This site has a potential to be a target for hackers to break into. I don't have much knowledge in security, and I probably can't ha...
I wish to do 10,000 steps a day. Now searching for an accurate pedometer. I don't wish a cloud solution, data must be local and a nice analysis software. What do you recommend me? I am using a Mac.
The Question: How do I, as the victim, protect my site from being manipulated into doing something it's not supposed to, on a shared host? Same-Origin policy looks the other way. Most convenient would probably be if I could somehow say something like "my url = always unique origin". Background: I have freshly stepped i...
I'm having trouble getting Firefox to send an encrypted message using a certificate, and I've found that the only difference between this one and others that work fine are that this one has a DSA public key while the others have an RSA key. The signature algorithm still says "sha512WithRSAEncryption". I'm wondering if ...
Let's say we have a random basic blog or informational website: just some pages with information, a sidebar with an overview of the archives, the normal stuff. We know of this website that it's built with a CMS. How can we get to know which CMS built this website? So I'm looking for basic, general typicals of several m...
In theory, perfect software applications are possible but in real life, they don't exist. When attackers know the software, they can send payloads to exploit vulnerabilities and run any arbitrary code they want remotely. On the other hand, we have HSM (Hardware security modules), for example we program smart cards to e...
So I have two routers on my home network: one is provided by my ISP, and the other is my private router. Router A- ISP router: 192.168.1.x router B- private router: 192.168.2.x Clients on my router A's LAN network cannot ping clients on my B's network. However, clients on B can ping clients on A. Does this provide...
This is my rule: alert udp 192.168.1.1 4000 -> 192.168.1.1 7000 (msg:"This rule doesn't work"; sid:1234567;) I am running snort against a precaptured packet file where there are UDP packets that match the rule given above. However, they are ignored by snort and do not actually make it into the results file. Why does s...
What is the best way to protect a captive portal againt MAC spoofing? The MAC Address appears one of the only ways to distinguish wireless clients from one another, anything one authenticated client sends can simply be spoofed by a rogue client. The IP address, MAC address, and any other part of a request can simply be...
I'm not sure if this is the right site to ask, so I apologise if it isn't, but here goes. A while ago I started noticing some odd behaviour. My Gmail account was compromised, it seemed, and I had to change my password. So I did, and went on with my business. All fine and dandy, until about a week or two ago. My Skype ...
Many websites offering downloads also provide the MD5 or SHA1 hashes of the files which are available for download. An example- What is the security purpose behind providing such a facility to the end-user?
In a Drupal site, I get this error in my Debian's syslog: suhosin[9413]: ALERT - ASCII-NUL chars not allowed within request variables - dropped variable 'name' (attacker 'x.x.x.x', file '/path/to/index.php') I am wondering whether it indicates an attack, and if so how to avoid it?
I have install Snort & acidbase by this instruction and access it through this local address 127.0.0.1/acidbase/base_main.php The problem is after scan it with nmap by this command sudo nmap -p1-65535 -sV -sS -O [Snort Installed IP Address] by another computer in the network witch have ping connectivity, it show no...
I rent a server, and my provider seems to be blocking nmap. Is there any other tools I could use to test my home network from the outside? Also, does blocking nmap on a network provide any security? EDIT: If I try: nmap scanme.nmap.org - I get: 1 IP address (0 hosts up) scanned in 0.50 seconds nmap -sT -P0 -p 80 sca...
A number of encryption functions include their tuning parameters in the output. For example, SCrypt, which I've been considering for an app I'm building, outputs in the following format: $<version>$<params>$<salt>$<hash> It seems to me that if an attacker didn't know these values, it'd make life harder for them... but...
When i do online banking, i sign my digital transaction with a digipass. Ive been told that it uses a RSA-based digital signature scheme. But an rsa digital signature (1024 bit for the modulus) is a much greater then length of the code that my digipass generates. How does this work? Is it the PKCS#11 specification at w...
What are the common tools and methods used for analyzing and attacking Random Number Generators? I know what characteristics make a good RNG and what a good RNG should do but I do not know how to analyze a RNG when I treat it like a black-box.
Anyone heard of the "TidyNetwork" virus/malware? Is it possible to determine the origin of the ad that is created on web pages by Tidy by inspecting the element using developer tools? I am using chrome. or, of anyone knows of it, do you know to remove it?
According to this article, keyloggers usually make use of the FTP ports and email ports: http://rbmikrotik.blogspot.com/2011/07/how-to-block-port-frequently-keylogger.html My question is, can a keylogger software make use of other ports within the network so that it sends the information to the attacker?
I am planning to purchase a program that comes with an App that allows you to control the program via phone. The developer told me that the connection will be done via an extra WIFI box connecting to my computer. I plan to give this WIFI's password to friends and family. Questions: Does this open my PC to attacks? My ...
I'm going to purchase my own dedicated server service soon and run few python server scripts on it. Firstly, let me tell you that I am total noob when it comes to internet security and was unable to find answers to my questions using google. I want to have few python servers, listening on different ports and providing ...
HTML5 has the element that sends an SPKAC to the server (as I understand it). But how do you do it in IE? One CA's websites gives me the following prompt: This Web site is attempting to perform a digital certificate operation on your behalf: https://www.startssl.com/ You should only allow known Web sites to perform ...
Assuming that the password is stored hashed and salted, and that it is a string of random characters, is there a point where adding to password length doesn't add security? Since the hash will have a constant length, there are a finite number of possible hashes. So I would assume that at some very long length, the prob...
I'm looking at code for an old login form I'm redesigning. It's a simple table with two input fields for username and password. But just before the end </table> tag there's a blank iFrame which looks like <iframe style="height:0px;width:0px;visibility:hidden" src="about:blank">This is a security measure.</iframe> What...
I have found a flaw in a site where the password reset feature resets passwords in the following format [A-Z][0-9][a-z][0-9][a-z][0-9][A-Z] Eg: A0b1c2D I'm trying to determine how many possible password combinations there are for a system like this (where i can predict the 'password format' vs something random that use...
After a bad experience with FTP credentials hacking I decided to start using SFTP and stop having FTP credentials stored in clear on my computer (Filezilla). I now use FireFTP which encrypts credentials. However I was wondering how hard is it for a hacker to hack FireFTP credentials file?
I am part of a team which developing web app penetration testing framework, and I am taking care of SQLi detection. When I tested multiple known vulnerable local sites found Boolean Blind flaw always occur with Time Blind flaw. I want to know is my conclusion is correct or is there a situation where a Boolean Blind can...
From wikipedia link (cannot post due to stackexchange constraints). "http://www.yassl.com/yaSSL/Blog/Entries/2010/10/7_Differences_between_SSL_and_TLS_Protocol_Versions.html" and and also from the RFC https://www.rfc-editor.org/rfc/rfc5246 , I don't see any major differences in client authentication between TLS 1.2 an...
Our company policy is requires the local encryption of data for all email (in case the device is stolen) Does the Windows Surface (either version) support local encryption? Is the local device information sufficiently protected from offline attacks
We're planning on using JSON Web Tokens (JWT) for our authentication server, and I am currently evaluating which encryption approach to take for the JWE token. There appear to be two options for managing the symmetric encryption key: Issuer/recipient pre-share a symmetric key and encrypt all tokens using that; symmetr...
I just read about ECDH and while getting a overview over the process, I noticed that this key exchange method does neither provide any forward secrecy, nor does it protect against replay-attacks, because the shared secret will be the same for each session. Are there any common methods that extend ECDH to support these ...
I am currently helping my teacher create a curriculum around IT Security because it isn't currently implemented. Some previous question had decent responses but I was wondering if there was more. My goal is by the end of the class we can set up a server and have a Red vs. Blue competition to see which team can defend ...
My problem is a common one: I deleted my SSH key, and forgot to set rm to point to a .trash file. I have the public key, and I need to get in this server. I am not doing this on anyone else's server. I have enough resources to do it, I just need a program.
I wonder how long it will take to crack 16 character alphanumeric WinRAR password for a mini supercomputer. As far as I know graphic cards are preferred over CPUs to crack passwords nowadays. If we consider that the cracker (law enforcment) uses the latest technologies to crack the RAR password and has pretty much comp...
I am creating a web service, which handles various requests from web clients. The client and server share a big secret key S, and when one part wants to send data, it calculates the token as follows: T = HMAC(HTTP body || Request Timestamp, S) So when a part receives http request it recalculates T from the http body, a...
What is the difference between DNS Spoofing and DNS Cache Poisoning ??? It seems like there are little differences between two attacks, with an exception that DNS server is actually might cache the "fake" response from malicious DNS server.
I am doing a PHP website for a client who deals with third party financial information, and he is concerned about the developmers (me) having access to all the information, which is obviously a valid concern. I am currently hosting on a shared hosting environment, however, I am going to recommend a dedicated server for...
I have a .txt.enc file. It is an output of openssl enc. I need to open it. When I try to open it in Emacs, the first some characters(also known characters) are : 'Salted__C' . how can I understand that which decryption method such as '-aes-256-cbc' or '-cast5-cbc' I should use to open it?
How does Paypal store credit card numbers? Have they published any information this? As for now I would say that they encrypt the card numbers and store the key in an HSM, but this is just a personal guess.
I am looking for keyboards with a built in SmartCard reader, where the Smartcard can be unlocked directly without going via the computer. The keyboards I found so far connect the SmartCard reader via an integrated USB hub which opens the door for key loggers to snatch the PIN/password. Are there any keyboards where the...
I am wondering about the security implications of using email as the main identifier via which a user logs in (with an associated password, of course). Can I treat it as I would a normal username or should extra precautions be taken, like 'sanitizing' the email address before comparing it for uniqueness by removing any...
I'm not referring to any of the below: A spiteful partner sharing private photos of the other after editing themselves out. Someone stealing photos from a professional photographer/artist without permission. Enthusiasts leaking their own private photos/videos to make news. I guess they're stolen from an insecure syst...
I'm using disk encryption to protect my data and sensitive information - but only one partition. I used to suspend my computer instead of shutting it down because of very fast resume and very low battery usage. My question is: Is it somehow possible to access the temporarily decrypted data while my computer sleeps? or ...
I have heard a rumor that the WPS brute force attack doesn't work on newer devices. Is that true?
as RC4 is not secure and AES-CBC is same thing the only solution is using EAX mode for AES. but why mozilla NSS don't support EAX mod ? is there any secure EAX implementation ? and why wikipedia says "using CTR mode means the cipher need be implemented only for encryption" ?
Let us say that I send an email using Yahoo Mail or GMail. Can this email be intercepted using a packet sniffer? On which port does the email travel? HTTP, SMTP, POP3?
This morning, I was experimenting with some keyloggers and noticed that they have a feature to send e-mails to the attacker. How can these e-mails be intercepted? Let us say that I have a packet sniffer running, which port should I listen to? Note: The keyloggers I was using allowed the user to specify a gmail account...
I'm currently trying to exploit a simple program called basic_vuln.c #include <stdio.h>; int main(int argc, char** argv) { char buf[64]; strcpy(buf, argv[1]); } I'm using xubuntu 12.10 with 3.5.0-17 Linux Kernel, ASLR turned off and compiled with the current version of tiny c compiler. Now to the actual proble...
We are a development team within a state public university. Much of our development deals with working with private student and employee data. Some applications push data from internal databases out to cloud-based solutions via secure file transfer or web services. New rules are coming down from the state-wide Univers...
I know that some of the best keyloggers can't be viewed from the Task Manager. Where can one see if such keyloggers are running on the system? Will they be in the Windows Services or are they hidden from there as well?
I am trying to communicate with an SSL server whose protocol is non-standard. I want to insert custom packets into the handshake. I am using several SSL tools, so changing source code on every tool is a lot of work. Prefer to have a network filter which will modify (insert a custom packet) into every SSL handshake. ...
So, I was reading RFC 791, and got to the bit about options (here). Everything seemed to be decent and sensible, until I got to the 'levels of security' part. Now, I can understand how, internally, the DoD might want their packets to take special routes, but at the same time, wouldn't using an option like that simply a...
I am working on a Web platform that must-need-should have a good level of security. Therefore, I am interested in a good quality tool to test my Web platform QA on security. My main programming skill is Java. Is there a really good and open source tool for the website scanning e.g. OWASP, auto cookie check's and simila...
I implemented an applet in java to authenticate users at my website by the usage of MIFARE cards and everything is working good. However I am concerned about the applet's authenticity, in other words, how can I guarantee that is my applet who is communicating with my website ? and is not a script-kiddie that made an ap...
I have googled around for information about Web Apps or Databases running on AWS EC2 needing a IDS/IPS or not. I will present my findings so far here, but it will be good if you guys can confirm these findings, or comment on them. Netword based IPS/IDS systems are not necessary because: Packets are only delivered to...
Is the source IPv4 address lost when a person uses "loose source and record route" and the destination address is put before the end of the list of addresses through which routing should occur? It wasn't quite clear to me from RFC791 whether the first value on the list should be the source address, or whether the first...
More specifically, if a website is using an application already known to have a flaw as part of the larger service it offers (so, say it's using a version of Apache known to have a flaw, and the continued presence of that flaw has been confirmed by the researcher), does that fall under the definition? More to the point...
This may seem like a rather nefarious question, however, my motivations are quite the opposite-- I want to know how at risk I might be! A while ago a very MASSIVE database was leaked that contained the personal information of millions of people. Unfortunately, I'd peg my chances of being in that database at about 80-9...
Last week a news article went viral about a Dutch web hosting/data center company that was allegedly using a DNS amplification attack to DDoS an anti-spam company, because they blacklisting the former. Many news sites claimed that IT experts said that it could slow 'the whole Internet' down. My question is, would it re...
Does anyone have experience with any fax cloud services, which they can recommend from a security standpoint?
I work in higher education, and we have a server room with various server cabinets, mostly APC and Belkin. The room is secured via card swipe access, however each server rack has the same lock, which presents a problem as this room serves the college. I have searched high and low, and cannot seem to find a straight f...
I'm considering using modern techniques to protect my Javascript code and am studying how the DOCTYPE element selection may impact that. Specifically, the linked question used IFrames which are not permitted in certain selections of DOCTYPE. In taking a broader view of this question, not specifically linked to the IFr...
I'm going through a vulnerability remediation exercise for a client and am trying to figure out how to best mitigate this particular hole. There's a script on our site that calls up content into a new window using <%= %>. Essentially this takes a hard-coded link in an include file looking something like <a href="/path...
I tried writing a script that would display the contents of a cookie set by another website but it didn't work. <?php echo 'Website cookie is '.$_COOKIE['locale']; ?> But I get an undefined index error. Can cookies only be retrieved by the issuing site? I've got the add on Cookie Manager in Firefox opened and each c...
Is it possible to do a DOM based xss attack with window.location.protocol? How can we use dom based xss with document.title? How can we bypass the escape javascript function if it is used? thank you
zero knowledge proof, Where do we use it online? I thought we mostly use the RSA algorithm.
I need to find a solution for one of my clients who is asking me to implement a esignature solution. I was thinking of suggesting some solutions like DocuSign or EchoSign. But recently my client said he wants a closed system esignature. I searched some sites and i found out the basic difference between closed system a...
I have a requirement to set up a SSH tunnel between two hosts. SSH server runs on a Linux host, and the SSH client (PuTTY) runs on a Windows host. I have set up a separate user account (say 'tunnel') on the Linux machine to allow this. This user is not supposed to execute any commands but will only keep the SSH connect...
is that possible active adversaries who injecting malicious iframes (root kits), without Flash, Java or any other plugin detect that we using virtualization by javascript or timing differentials and hide their iframes for VM visitors ? Edit: does browser attacks effect QEMU as well ?
I want to use a hybrid encryption in my application, so after reading a lot of lines I ended with this implemantation, please critizie it ;) (I want to stick to .Net) byte[] aesKey = GetRandomBytes(256); // 256 Bits with RNGCryptoServiceProvider byte[] aesIV = GetRandomBytes(128); // 128 Bits with RNGCryptoServicePro...
This question is regarding common browsers, even though I may refer to Firefox settings. Not IE though, I wouldn't expect that to be in any way secure. I'm seeking to know how secure it is to let the browser leave data on the computer after I close it. For all it's worth, I'm regarding to security as malware not being ...
Is there any Pre installed light way OpenVAS Linux distributions Or any light way Linux witch Openvas Tested on it and work properly on that Linux distribution ? I have used Back Track (UBUNTU Version) , it is not light way Linux with all that services and software and 4 Gig size. I seen Openvas VM , it is about 4 Gi...
I need help about SAQ #C - Are quarterly internal vulnerability scans performed? What is target (scope) for those internal scans? Our configuration: Router with modem (WAN1/LAN1), DMZ, some office computers are connected there Wireless router, access point, which in fact is a bridge to LAN1, some office computers are ...
I'd like to perform a man-in-the-middle attack on SSL connections between clients and a server. Assuming the following: I've got a certificate that the client will accept, via poor cert validation or other means. I know the IP address of the server I'm trying to impersonate, and I'm in a position on the network to do ...