instruction stringlengths 24 29.9k |
|---|
I am doing ARP Spoof experimentation with arpspoof and have successfully set up a man in the middle between two machines.
We set up IP Forwarding using:
echo 1 > /proc/sys/net/ipv4/ip_forward
This allows us to analyze communications using, for example, Wireshark. In theory, we should be able to modify traffic as well... |
I am specifically talking about web servers, running Unix. I have always been curious of how hackers get the entry point. I mean I don't see how a hacker can hack into the webpage when the only entry method they have into the server is a URL. I must be missing something, because I see no way how the hacker can get acce... |
I have a server that is protected with a firewall with URI filtering rule.
So if you go http://x.x.x.x/URIFilter/Something you will get to the server, but if you don't put URIfilter into URL or use different protocol (not http) FW will block you.
I would like to run FoundStone against this server via FW.
(It's apache s... |
I am working on a system that can connect to any number of different systems. Someone inputs the credentials for a system to connect to, and my system remembers the credentials and uses them to authenticate and communicate with it at a later date (which will happen without user interaction).
All of the other questions ... |
I am looking for the best approach to recognizing a specific computer and saving that computer as a "safe" login machine. My intuition points me to using cookies, but what value do I store in there to make sure it's safe? What data do I cross-reference to make sure that cookie wasn't stolen off of another computer?
Som... |
Platform: Windows 7 x64
Development: .NET 4
Web Server: HttpListener (IIS not installed, will not be installed :) )
Can Machine A generate a Certificate Signing Request for Machine B and have the cert given back by the CA (Machine C) installed on Machine B? Is there any magic that happens during CSR generation that t... |
I just started reading a little on QR code, so I'm not entirely familiar with QR Code capabilities, but a thought crossed my mind today.
I scanned a QR Code on a postcard I received, and it immediately took me to a website.
Just like URL shorteners, is there any protection from obscuring a malicious site in the QR code... |
I was just visited by some door-to-door salesmen from a local ISP/TV/Phone provider. During our conversation, I raised some concerns about the fact that I knew their help desk techs had back-door access to the home gateway devices. This access allowed them to update the router's firmware whenever they wanted, and eve... |
I work for an e-commerce website in my country and this is the second time we suffer an attack. At least, looks like one.
We have a search functionality in our website and the supposed attacker is sending a lot of requests directly to our search. Right now it is taking us down as this is a bottleneck (database). We ar... |
In software reverse engineering, we use a dissembler, a debugger, and a code patcher. OllyDbg includes all. One of the differences between actual execution of a program and debugging through using OllyDbg is, in OllyDbg the instruction pipe-lining is not used.
How can we take advantage of this fact to make the software... |
I have been wondering about his for awhile. I have Linux running on a PC at home. I had a jailbroken iPhone. They both have attributes that make them very attractive, and they are also FREE! But I haven't been able to find anything that discusses how they are kept secure from Trojan horses. I don't suppose I can run a ... |
In this particular case, the webserver turned out to be a shared 3rd party system and was not tested.
Examples:
We do express grave concern at the overall security posture of that webserver and the possible exposure to $client
In general, it is our feeling that $client is a low-profile, yet high-value target for attac... |
I am building an ASP.NET MVC 3 app which will run in Azure. Everything was working well, until I switched to https. Now most of my jQuery plugins and some other javascript are not secure.
I'm using the Datatables library as well as jsTree, watermaks and breadcrumbs. Most of this script is to make our site look appeali... |
These are the following objectives I have in mind:
Make the app hard to crack, as the binary will hold some secret tokens.
If it still can be cracked, is there any way the app can tell someone or its own self that it has been cracked (like checking against some checksum or certificate or the OS doing it for the app) a... |
What are the relative benefits of BlackArch or other Arch-based distro over Kali?
Are the tools broadly the same, or does one have better functionality in a particular area?
Are there any other pen-test distros that are based on a Linux OS that is not Arch, Debian, or Ubuntu? The only one I can find is -- http://netwo... |
Two questions.
Where does one download the PHP version of OWASP's CSRF Guard? The following URL says to check Git:
https://www.owasp.org/index.php/PHP_CSRF_Guard
All I see on Git however is *.java files and *.js files. If there are PHP files where in the directory structure are they?
phpBB prevents CSRF by adding tw... |
E.g. http://www.dailymail.co.uk/sciencetech/article-2094982/Threat-new-virus-infected-emails-PC-DONT-open-attachments.html?ito=feeds-newsxml
Assuming that the user clicks no links and opens no attachments in the email or anything of that sort — just opens it.
|
There are a few questions which ask for inputs on the wisdom of storing (possibly salted) username hashes for the purpose of authenticating end user access to some information resource. Most of the answers I see are pretty down on the idea, but none of them address what seems to be a vulnerability this approach may mi... |
The hack was a failure, as they were not able to put the created page as the home page. But we found recently a manipulated page on our website (via the rss).
So I looked in the Apache2 logs and found the IP which has done this. But I don't understand what did I do. Could you help me to understand this ?
The-IP-of-the-... |
The auditing company found a bug "The Auto-complete form attribute is set in password field". They suggested to disable autocomplete for this field to prevent disclosure of it "when working on shared environments such as Internet Coffee shops"
But disabling autocomplete attribute doesn't prevent browser from storing pa... |
How do you destroy an old hard drive? To be clear, unlike questions Secure hard drive disposal: How to erase confidential information and How can I reliably erase all information on a hard drive? I do not want to erase the data and keep the hard drive, I want to get rid of the hard drive for good. It's old, small, may ... |
I'm designing a web application. I need to make sure all my customer's SSN data is secure. Now I know HTTPS with SSL, I'm wondering what are its weaknesses? What else I need to provide a perfectly secure web interface? I'm going to host the server via Amazon EC2 or some other cloud service.
|
If a site uses .htaccess file to rewrite the URL for e.g. better SEO. Is it possible to find out what is the "real" URL?
|
currently I thinking about on-the-fly disk encryption using Truecrypt/dmcrypt LUKS with key stored on smartcard.
I would like to use openPGP v2 smart card, respectively GPF Cryptostick which is based on openPGP v2 smartcard and my question is:
On the card you can store 3 GPG keys (encryption, signing, authentication) ... |
DoD 5220.22-M specifies the following methods for destruction of hard drives with classified data:
Disintegrate
Incinerate
Pulverize
Shred
Melt
I've seen shredders of the type that might be used on a hard drive, and can probably imagine what incineration is like. But the options of "Disinitegrate", "Pulverize", and ... |
I need to clarify my question. I'm wondering if there are any apps for smartphone that can log each 'keystroke' (i.e. key pressed on touchscreen) that a user does. Performing a google search brings up some links to sites like this and this. These apps do not record keystrokes, they 'only' forward sms messages, call log... |
What is most secure data storage currently available and suggested by specialists, to store digital data in digital medium (without making hard copy of data onto paper or other type of medium, than digital).
I mean, secure from EMP bombs, magnets, and other digital world threats, like hackers or physical property thief... |
Possible Duplicate:
What to do about websites that store plain text passwords
When using a system as it was designed to be used, and the system provides proof that it is storing and/or transmitting passwords in plain-text...
What are best practices in dealing with that system, and the owners of that system, while mi... |
Cisco routers are able to generate NetFlow flows that can be captured and then analyzed in order to manage what is going on on your network. Unfortunately, I don't have a Cisco router in my toolbox so I'm looking for a opensource/free solution to generate the flows (act as a Cisco router) and to capture them.
I've alre... |
UPDATE: The question is seeking real research based on behavior analysis of a significantly large sample people using well defined experiments. Posting answers based on opinions, or ad-hoc observations, does not address the question, nor does it add value to the question.
Reading a PCWorld article titled, "VeriSign Ha... |
Many suggestions on transfering emails securely can be found in this answer. But many of them (e.g. PGP) need support from recipient. I want to provide SMTP email server that will route emails of it's clients in the most secure way.
By security I mean:
Presense of proof that is me who send this message
No one man in t... |
While developing TeamMentor I implemented a number of WebServices (consumed via jQuery) and now on its final push for release I want to double check that they are not vulnerable to CSRF.
There isn't a lot of good information out there and it seems that in .NET, *.asmx are protected by default to CSRF, with a possible e... |
I'd like to test a server specifically for vulnerabilities related to BEAST. What command line switches should I use?
What should I see (or not see) in the output?
Update
The intent is to scan a non-Internet connected web server, or to scan a server that is running on a non-default port. In all other cases I could use... |
Possible Duplicate:
How anonymous used UTF-16 ASCII to fool PHP escaping
(Reposted here as per request). A few months ago, anonymous took down a child pornography site using SQL-injection. I read in this article that anonymous claimed that "the server was using hardened PHP with escaping," but they were able to "byp... |
I received an email the other day purporting to be from a bank I hadn't even heard of, so I decided to poke around. On some quick investigation, it looks like something has just latched onto some poor Joe's WordPress based site and has dropped a whole bunch of pages designed to look like those of this bank.
Included al... |
My question is three-fold.
Background
I was asked to do some vulnerability scans on a website with some holes (I think). On a particular page, I was able to escape the text field and write on the site. If I left the site, the text I entered left.
Questions
1) How can I recommend a text field be secured (as far as valid... |
Recently I have been getting more and more interested in the security (privacy and anonymity) issues of my online life. Not that I have anything to hide, or that what I do online is so interesting to others, but I just want to know what I can do to remain as safe (and anonymous) as possible.
I feel it is my right as a ... |
I have a site, where people can upload graphics, you might think of it like an image hoster or a forum for pictures.
Now, I allow upload of raster graphics to a certain size, but no vector graphics as of yet. I'd like to allow SVG upload as well, but there are two concerns circling my head:
Could an SVG be constructed... |
In many places and tutorials I see people add this line to their iptables:
-A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
And they do it only and only for "INPUT". What about OUTPUT and FORWARD?
For OUTPUT: Is it due to the fact that normally everything goes out (OUTPUT) will be allowed? (-j ACCEPT)
For FORW... |
A few months ago, Anonymous took down a child pornography site using SQL-injection. I read in this article that Anonymous claimed that "the server was using hardened PHP with escaping," but they were able to "bypass it with with UTF-16 ASCII encoding." What does that mean they did, exactly? How do I protect my site fro... |
Lets say I was foolish enough to press on a YouTube video on Facebook that ended up being what I suspect is a phishing link. What can they potentially get?
I had three tabs open: (1) my phpMyAdmin control panel, (2) another random site logged in, and (3) the Facebook session which I navigated away from when I clicked ... |
My university provides a VPN service to gain access to internal services to all members. They are apparently using an L2TP/IPsec solution by Cisco.
I'm able to connect just fine, but I'm a bit worrying about the security:
In the configuration manual for various operating systems, they mention the "IPsec shared secret" ... |
For a presentation (10-15 mins) purpose what is the simplest demonstration of "crashing an application" on a machine can be done.
|
"An image resizing utility called timthumb.php is widely used by many WordPress themes....The utility only does a partial match on hostnames allowing hackers to upload and execute arbitrary PHP code in your timthumb cache directory... Also recursively grep your WordPress directory and subdirs for the base64_decode func... |
My site has a news subscription system. When an item is updated, a notification email goes out to everyone subscribed to that item.
You can un/subscribe via a form on each item's page.
I wanted to include a direct unsubscribe link in the notification emails. Then I figured people might be logged-out, or viewing the ema... |
Assuming I have a defenseless client computer running Windows 7 that will happily allow any javascript code it comes across on the internet, what's the worst damage that could be inflicted?
I'm unclear on javascript's "reach". Could it erase files on the hard disk? Could it change user access permissions? What horrible... |
I am developing a small LAMP online app, and so far I have been doing all the development online.
I am considering installing Apache/PHP/MySQL on my Ubuntu machine to be able to develop locally as well, but I am wondering if by installing Apache on my machine I would open some security holes, considering it's a web ser... |
Can anybody explain to me how proc_open() is affected when PHP is running in safe_mode?
As far as i have noticed, the command to execute is appended to a '/' - is there anything else and is it possible to bypass this modification? If i concatenate commands in the shell, i can bypass the forward slash:
[inserted by safe... |
On a Cisco PIX firewall, I wanted to check if SNMP is enabled:
pix# sh snmp-server
no snmp-server location
no snmp-server contact
snmp-server community public
no snmp-server enable traps
Is SNMP enabled on this device?
|
I run Reflector to de-compile some program and it seems to be obfuscated.
I got following output, it’s not very useful.
Any ideas how to decompile obfuscated code?
[CompilerGenerated]
get
{
// This item is obfuscated and can not be translated.
}
[CompilerGenerated]
set
{
// Thi... |
We have a secure web service running Apache that requires client certificates for access. This service has a problem with running out of entropy. We have several other sites that use TLS that get similar amounts of traffic but have never had any problem with a lack of entropy.
I am wondering if requiring a client cert... |
There are a lot of cipher suites defined in the in the specifications itself of TLS 1.0, 1.1 and 1.2. And furthermore, there exist RFCs which add even more cipher suites to a specific version (e.g. RFC 4492 for ECC or RFC 4132 for Camelia).
Is there an official organization like for example NIST or BSI Germany that has... |
recently i was browsing a site, and i noticed that at the end of the URL it said id=168, which is a common indicator that the site is vulnerable to an SQL injection attack. i did some tests and found that i was right, that the site Was vulnerable and that any hacker that wanted to could do some serious damage. i sent t... |
Sorry if this is incredibly basic, but I'm not very familiar with how SMTP works.
I have a mail server (running Postfix with Dovecot) with an SSL cert from a well-known/accepted CA installed and configured properly. There are 2 clients who connect to this server from different locations - each configured to use SMTP +... |
I am interested in learning ethical hacking or penetration testing to head towards a career in that direction.
I have a strong knowledge of linux and unix, basic computer theory and practice and basic programming knowledge (arrays, methods, loops).
I have looked at gruyere and webgoat, however I find these to be too ad... |
Here's the scenario, part of a wargame/CTF type exercise. There is a vulnerable program running as a service on the remote host. I have access to a copy of the binary, which has a stack overflow from an unchecked scanf.
I am able to trigger the overflow and execute code, but I'm having trouble figuring out what to use ... |
Can a compromised mobile phone be used to penetrate a desktop or server, such as when you plug the phone into the server or desktop for plug and play?
I don't know what protocol the transfer is there. Can a malicious program automatically transfer once the plug and play is going?
I'm new to this stuff, but I would be ... |
Since one of the 10 domains on the CISSP is legal/governance, I figured this would be the best place to ask.
I recently did a security assessment for a non-profit. I found that their systems needed some attention. I want to make it clear to them that just because your network has no sensitive data on it, you are still ... |
(coming from stackoverflow)
Are there any standards (or certified solutions) to expose a (Web-)Service to the internet from a very security-sensitive network (e.g. Banking/Finance)?
I am not specifically talking about WS-* or any other transport-layer security á la SSL/TLS, rather about important standards or certifica... |
I would like to ask about the procedures for a given CA to get one of its root CAs (SSL issuance CA) to get accepted and installed as a trusted root CA in operating systems and browsers.
|
There are articles on the Internet (e.g. this) that claim that the FBI/CIA injected security backdoors into OpenBSD.
I'd like to know if there are any other references to this issue. This would help in my Thesis addressing this or similar issues.
Could you recommend reliable resources, preferably academic papers?
(BibT... |
I think it would be nice to teach security concepts by giving practical examples. I am looking for some practical cases for x509 certificates, kerberos and SET.
How could I know an ecommerse site uses SET? Or is it the defacto standard?
How could I explain kerberos from a practical view point
|
I'm looking at a series web browser histories from various browsers (IE, Chrome, Firefox, etc) and need to do some analysis. All of these browsers store data much differently, but I was wondering if there was an open-source tool suite out there that would help me to analyze all of them. If this is just wishful thinki... |
In pidgin there is a plugin that we can use to encrypt our messages in chat windows .. Is there anything simular for voip (pc to pc) ? any client that support manual encryption for voice data?(linux)
|
In RFC 4347 for DTLS, I am unable to find the cipher list to be supported. The RFC mentions it as a set of changes from TLS 1.1 (RFC 4346). TLS 1.1 prohibits use of export ciphers.
Are export ciphers disallowed in DTLS also? How to confirm?
|
Today my car got stolen from my house, and it is possible the person who did it has access to my home. I try to take secure measures online to maintain security, yet it seems I never paid attention to my house.
As an IT Security practitioner and fan, I am interested in applying my knowledge to secure my house. What are... |
A lot of two-factor authentication mechanisms use SMS to deliver single-use passphrase to the user. So how secure is it? Is it hard to intercept the SMS message containing the passphrase? Do mobile networks use any kind of encryption on SMS?
I found an interesting article regarding two-factor authentication and the way... |
Yesterday, I got an alert from a client's IDS that a Base64 auth packet was detected. Looking at the ASCII decode, I can see that it is for their OWA (Outlook Web Access), and indeed, the auth info was Base64, easily decoded to the username/password of a user.
What is odd, is that this company's Exchange server is set... |
The PGP Universal server is a fairly complex piece of work that provides several different services. When constructing firewall rules I am trying to determine what implications there are for opening up the various components.
For example, it stands to reason that the key server bit (ports 389/636) needs to be open fai... |
I've been digging for the past few days into storage of sentitive data. If I store this data in a database, I believe the general accepted practice is to store sensitive data encrypted, for various reasons out of the scope of this question.
Encrypting data, however, means I have to manage the 'secrets' to this data. I'... |
What ports on my home router should be open, say if I'm only using it for browsing the internet. Right now these four are open,
23/tcp open telnet
53/tcp open domain
80/tcp open http
5000/tcp open upnp
Should I close the other ones besides 80? What do these other ports do and if I should close them, how d... |
I'm a recent computer science graduate. I like computer security and want to be a security architect.
I googled it and saw that the start point is to be a system administrator, but system administration is not my dream job; I especially love to develop software.
Can I be a security architect if I start as a software d... |
I know it might seem a bit too much theoretical, but I was wondering if there was some list of known open problems in security?
In a similar way that there are open problems in Theoretical Computer Science, it would be interesting to get a similar list in security, especially for research purposes.
Note that I am par... |
I'm under the impression that the TLS/SSL renegotiation hack has been fixed. I'm not sure if the software has to be deployed on the server side, client side, or both.
Based on this blog, TLS renegotiation is a good thing, but only if done securely... and disabling TLS renegotiation is only a temporary workaround until... |
My understanding is that COMET implementations of WebSync and SignalR do not directly use IIS and are a few layers lower on the ISO model.
After reading Qualys's blog regarding slow TCP reading, I was wondering if this had any effect on COMET implementations since some are already using "long polling", websockets, or p... |
I created a certificate with OpenSSL and following commands:
openssl req -x509 -nodes -days 365 -subj '/C=DE/ST=state/L=city/CN=hostname' -newkey rsa:1024 -keyout mycert.pem -out mycert.pem
openssl pkcs12 -export -out mycert.pfx -in mycert.pem -name "My Certificate"
And installed it with my Windows 7 machin... |
We are building an application where users can upload resumes in our system for our administrators to download. We are having a debate about restricting the content type of the files that can be uploaded.
I'm having a hard time piecing together exactly the security concerns I have with allowing any content type to b... |
An answer to a recent question has given me an idea for a school project (security CS program).
Also, an active attacker (with a fake base station) can potentially force a mobile phone to use another variant [of encryption]...
This sounds very cool, and I want to implement this on an at-home basis.
This article talks... |
I've read various opinions about whether Bcrypt or PDBKF2 is a better key derivation hashing method. The answer seems to depend on a lot of complicated factors that are not easy to analyze. Would using both of them (presumably in a serial way one before the other) accrue the benefits of both and thus achieve an optimal... |
Possible Duplicate:
Where can I find a list of un-patched CVEs for a specific piece of software?
MS Exchange 2003 is no longer supported by Microsoft since April 2009.
However the Exchange 2003 server that I currently have is working just fine for me.
Is there a list of exploits in Exchange 2003 that are not patch... |
Is there a way to identify a person's IP address in Skype, when you're chatting with them? Does this depend on their Skype settings? And if you've recorded chat messages, can they lead to the actual person IP address, or their ISP's?
|
Previously I asked Who (which process) is calling curl? and I got very good answers (this answer in particular)
which basically replace the curl binary with a shell script that logs each call to curl and then calls the renamed curl and passes the parameters along.
Now I am again in a similar situation, I know if som... |
Based on information from this site, DNSSec is needed to protect us from a number of DNS and SSL / TLS hacks, including:
DNS spoofing, especially on wifi or shared medium
Registrars that abuse their trust and insert invalid data into the root servers
Fundamental flaws that allow attacks on SSL & HTTPS connections
I ... |
Hi does any one knows any DNS alternative Protocols ?
If so what is the most used ?
Is easy to setup ?
Is easy to have two DNS protocols one where you connect to the Common Internet and the other to the 'Inernet 2.0' ?
EDIT I mean if is there like a p2p network or something else that is not easy to control by the gove... |
What industries require multi-factor authentication?
Please include the following information:
Country
Industry
Regulation name
Additional information as you see relevant.
Some additional information I'd like to know is how the regulation "defines" multi-factor. This is of concern because the 2005 FFIEC regulati... |
When should email be protected by 2 factor authentication?
Suppose a given company is in an industry where two factor authentication is offered to some or all of its clients. Does this mean that it should also offer (or require) two factor authentication to its employees?
If the roll-out of two-factor authentication ... |
I need to check vulnerability in my polling system. So I need to send GET requests but every time with different IPs. Can anyone suggest something?
|
Is there a concise set of rules that describe what 99% percent of DNS responders accept?
Conversely, are there are set of rules that define when DNS queries are invalid?
I would think that the answer I'm looking for is like this:
If the DNS server encounters a FQDN that is not equal to the current traversal location, ... |
I'm trying to search twitter for evidence of near-realtime alerts or updates regarding security issues.
What hashtags are common or popular in the IT Security world?
|
With FileVault 2, you can encrypt the hard-drive such that users on the computer can decrypt it with either of their passwords
How does this work?
|
I've read in various places to not mount your truecrypt volume in the same place as your Dropbox or Sugarsync folder. I believe this only matter for Mac/Linux, but I need some verification.
On a Mac, when I mount a container, it states that it's mounted at '/Volume/Container_Name'
Does that mean it's mounting inside th... |
Possible Duplicate:
How can I reliably erase all information on a hard drive?
I'm looking to see if there's a method that can completely wipe out the content of a HDD, so that nothing previously on it can be recovered by any means, even by a professional. I'd like the HDD to be useable afterward by someone else.
I'v... |
Is there a way to scan the entire drive including auto-run and all partitions, including the master boot record (MBR)?
|
A vendor is asking me to change the PSLanguageMode from within IIS on my Exchange server(s).
What potential vulnerabilities am I opening myself up to?
I'm surprised to see this option present within IIS. What other locations can I set PSLanguageMode? (Machine.config, etc)
|
Which is the most vulnerable to MITM attacks, SSL or SSH?
Here's the scenario, you have 20 minutes to set up a web proxy like this:
Laptop -> Chrome Browser -> Web Proxy -> Internet
You must secure the connection between the Laptop and Web Proxy Server, nothing after the proxy matters, it's just the laptop to proxy con... |
I have configured my first publicly accessible nginx server. I have configured it to use a /tmp/nginx folder to store temp files. This includes the body of http requests, proxy files etc. The /tmp folder is on external partition with nosuid, noexec and nodev privileges. Is this configuration potentially dangerous?
|
I'm trying to understand what would have to be updated to make Windows-based systems support multifactor authentication.
Possible things that might have to be modified:
Active Directory / Domain Controllers
The application itself (IIS, Apache + the web site)
The server or workstation's Credential Provider (the new GIN... |
The New York Times had a front-page article today: Traveling Light in a Time of Digital Thievery, aka "Electronic Security a Worry in an Age of Digital Espionage".
Former director of US national intelligence Mike McConnell is quoted as saying
“In looking at computer systems of consequence — in government,
Congress, ... |
WinRM has a very difficult to use command line interface and that leads me to believe some settings will be easily reconfigured, overlooked, and eventually exploited.
In other words, insecurity though obscurity.
What security settings should I pay attention to when configuring WinRM on a server?
|
From the X.509 RFC, in the "Implicitly Tagged Module" section:
CRLDistributionPoints ::= SEQUENCE SIZE (1..MAX) OF DistributionPoint
DistributionPoint ::= SEQUENCE {
distributionPoint [0] DistributionPointName OPTIONAL,
reasons [1] ReasonFlags OPTIONAL,
cRLIssuer ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.