instruction stringlengths 24 29.9k |
|---|
Is ECDSA secure from quantum computers? Will quantum computers be able to calculate it's private keys from the knowledge of the public key once there are working quantum computers?
|
I was trying to include script-nonce on my html file, but seems like none of the current browsers support it.
Is anyone aware of any version of any browser that supports this functionality?
I'm currently using Chrome version Version 26.0.1410.63 and have tried version 28 as well, but it doesn't seem to be working
A sam... |
I have a client/server simple program in C. I want to test the server running on different machine with random inputs. I have looked at 'Bunny-the-fuzzer' but from what I can understand It wont be much help when the target program/application is on remote machine.
Can someone recommend me any other available tools for ... |
The Windows CNG supports keys of varying sizes, e.g. RSA up to 16384 bits: http://msdn.microsoft.com/en-us/library/windows/desktop/bb204778(v=vs.85).aspx.
My understanding is that in crypto today we tend to top out at 4096 for most things because of the cost of processing and what not.
My question: what are the practic... |
So I've been toying with the idea of having non-deterministic salt values for hashes.
Let me explain what I mean:
Basically, I applied some properties from Bitcoin including a "difficulty" (ie, hashed value must begin with a certain number of 0 bits) and came up with something that could be used for password hashes.
... |
How are large tech sites such as LivingSocial, Zappos, LinkedIn and Evernote hacked? (i.e. how is their entire dataset of users obtained?)
LivingSocial - 50 Million Users Exposed
Zappos - 24 Million accounts accessed
LinkedIn - Over six million passwords compromised
Evernote - 50 million compromised
I don't understan... |
I'm in the process of creating a website and uses cookies to track user login. The only bit of information I store in this cookie is the users username.
Should I be encrypting the username even though it isn't sensitive information such as a password?
I've noticed other sites which use cookies to track logins have all... |
I used client side password hashing in my register and login project.
Its purpose is to prevent passive adversaries/eavesdroppers from discovering users' plaintext passwords when HTTP requests are in transit.
But still an attacker can perform a brute-force attack against the hash; And i think most or at least many pass... |
Recently my server has been attacked multiple times, after looking at my firewall I've come to the conclusion that the IP's are spoofed. (10,000+ IP's connect at once)
I'm running Win server 2012 x64 (can't go to Linux because some of my programs require Windows)
The attack usually is around 800MBps - 1GBps
My question... |
This came up while discussing Web & insecure HTTP - Using RSA for encrypting passwords on the client side
Is there any such situation possible when requesting an HTTP page where an attacker is able to read all the communications but is not able to modify/spoof the communications?
Till now I've worked with ARP spoofing,... |
What are the best asymmetric encryption algorithms out there? I am trying to use RSA in my project howoever I have read that it is not quite secure as other asymmetric encryption algorithms.
|
I've noticed that in order to 'illegally' crack certain applications, it is necessary to patch the host file to stop communication with the activation servers.
I've found that with several applications there are entries that don't match the rest. These entries seem to patch the certificate revocation lists (CRL) for Ve... |
Why is Ctrl+Alt+Del required at login on certain Windows systems (I have not seen it elsewhere, but contradict me if I'm wrong) before the password can be typed in? From a usability point of view, it's a bad idea as it's adding an extra step in getting access.
Does it improve security in any way, and if so, how?
|
Let me explain my situation.
I have a provider which is made up of a registration page and a web service. Online vendors (clients) register with the provider by providing details such as username, password, email address, telephone number etc before they can use the web service.
Now, in every web service method, I che... |
I understand what the two are so need to go into detail about that, however what I'm curious about is in what kind of situations would we use one over the other? It feels to me as if Public Key Cryptography is just safer and always more secure than Symmetric Key Cryptography.
Thanks for any help.
|
I'm asking two very related questions
As an admin what policies should be enforced regarding the frequency of password changing? I have an idea that users should be forced to change their password after a certain amount of time but a certain amount of login attempts. For example if 30 incorrect passwords were enter... |
My university provided me with the following slide which is confusing me:
From my understanding, what is happening here is that Trudy (Person in the middle) is pretending to be Alice. Bob then authenticates Trudy as Alice. Other than that however I'm really able to explain what else is going on here.
Also, can this h... |
Let us say that I have a client and a server communicating using SSL.
If a hacker sets up a proxy between the client and the server, will he be able to decrypt the data which is being sent?
|
This is a follow-up to my previous question: Prevent DOS against RSA authentication. This question is also discusses a similar problem: Prevent denial of service attacks against slow hashing functions?.
My setup is client-server with plain sockets and a custom protocol. The client programs are shipped a public RSA key,... |
So all my life I've been listening to people tell me to make my password complex: upper case / lower case / numeric / symbols. Recently though I've been reading / seeing that length above all seems to make for more secure passwords. Now I understand that some password strength checkers can be bogus or not very accurate... |
Given c1 = cipher text of m encrypted with n1 and e
Given c2 = cipher text of the same m encrypted with n2 and the same e,
Is it possible to figure out either of the n's or m?
I can't seem to solve for it myself, but I know that doesn't mean it isn't possible!
|
Can something happen to me (or my computer) if I respond to a suspicious plain text email?
I received an email from an unknown address, and I am not sure if this is a "real" person.
I would have never read this email if it would have had an attachment, but it is just 3 sentences in plain text. The content is somewhat ... |
When my clients create a password, they are shown a strength meter and I have set the requirements fairly high. However, the strength meter is essentially only useful if being attacked by a very dumb brute force cracker. I know for a fact that passwords can be created that are easier to crack with software like John th... |
Ok, long story short, I'm currious how long it would take an agency to crack a 10-15 character winrar password. The file names in the archive are also scrambled including a word at the start and numbers and characters. Roughly, should I have reason to believe this could be cracked within a reasonable time frame?
|
I am working on a web app that will need to have a secret key(s) passed from one server to another - I'll need to do this over PHP. Consider the following URL:
https://www.myserver.com/secure/somePHPFile.php?supersecret=bananas
Could a malicious person intercept the request and read the 'supersecret' argument?
|
I came across this advisory recently and I'm a bit confused by both exploits, but specifically the file upload vulnerability.
I don't understand how to actually exploit this condition (or even why this exists as a condition).
I tried using a shell like this and inserting it into the comments section of the EXIF data,... |
A question from a newby:
I have a USB or Standalone HardDrive with a TRUECRYPT hidden partition on it that needs one or more "keyfiles" and a password to access.
What tells the attacker what kind of file or even where to look for those "KEYFILES" on a generic innocent system filled with over 500,000 generic files on m... |
Quick intro: Small company, VERY limited resources. I pretty much do everything including coffee. I am a programmer, not a security guy. That's why I ask you...
We have an MS-SQL 2008 Database running on our server and several C# Applications that connect to the Database directly using a connection string like this
"S... |
In our company we have an internal CA certificate for signing various things including the proxied (MITM'd) HTTPS connections.
Suppose we use this CA to sign a key for "localhost" for use in automated testing (so we don't have to mess about with custom Firefox profiles). This key would be distributed to the developers,... |
If I run openssl 1.0.1e like this :
$ ./openssl speed aes-256-cbc (i.e without EVP API)
Doing aes-256 cbc for 3s on 16 size blocks: 14388425 aes-256 cbc's in 3.00s
Doing aes-256 cbc for 3s on 64 size blocks: 3861764 aes-256 cbc's in 2.99s
Doing aes-256 cbc for 3s on 256 size blocks: 976359 aes-256 cbc's in 3.00s
Doing ... |
Let us say that I have a Windows Phone application. If I hardcode a private key in the Windows Phone application, can people extract it once the application is released to the public on the Windows Store?
I am asking this because I have found no way of accessing installed certificates from the phone.
|
I have a server which is composed of a page and a web service. The web service is intended to be used by a Windows Phone mobile application that I will develop myself.
Now, my question is, how do I identify that the web service request is coming from the mobile application I developed? On normal web applications, one... |
From an answer this earlier question: Does adding dictionary words to passwords weaken them?
"...you have no way to recognize it as a password before testing it
(against a hash or an online service)"
This raises my question, for clarification: Can dictionary attacks and related tools get feedback about words or pat... |
I'm trying to do an sql injection in DVWA with Apache2 and MySQL that would create one more database.
This: 2' union select 1,2' create database kala;#-- does not give me any errors but it also does not create the database.
DVWA security setting is set to low.
|
My login form uses Ajax so it doesn't need to reload if the password is wrong. A PHP script process the request and creates the session if the credentials are right. My idea is to have the PHP script sleep to mitigate a brute force attack. At first it wouldn't sleep at all but after that I'm not sure.
How long does a f... |
Do Chinese, Japanese, other languages that can't be represented in ASCII get their passwords stolen? I figure there can't be some sort of bruteforce attack software for them, right? Their characters are so different the the usual ASCII or us keyboards.
|
So as security professionals, most are overly paranoid about external hackers, leaks, etc. I'm looking for ideas on how one would go about testing their own systems, without signs that they were testing them>
To give a more concrete example, If i was working in an area with highly sensitive information (government data... |
I'm guessing that HTML encoding the input would probably be a better solution, but I'm curious if just stripping out any < and > characters would be an effective defense against XSS attacks.
Will doing this keep a site safe against XSS?
UPDATE: If it won't protect me could someone explain what type of attack could get ... |
Assume I have a universe of U users. Every user has his private key.
I want to build user groups by adding a company sub key to his key set.
Now users can sign his company sub key with there company sub keys.
Now the user resigns from the company. He is lazy and will not revoke his sub key right away, or he plays not f... |
I have 2 portals(both are under my control & domain names are different)
In 1st portal, there is a link on click of which User can directly get logged into 2nd portal.
Link which will be hit in 1st portal to log into 2nd portal looks like below(Its a GET)
https://SecondPortalDomain/someServlet?param1=base64Encoded
This... |
This is a very good link that explains the different types of SSL certificates and level of trust provided by them. An Extended Validation (EV) certificate it is easily identified by the green color in the address bar and the name of the organization highlighted.
But what about the Domain Validation and Organization V... |
One of the things I need to do from time to time is to find subdomains of a site for example.
Starting with example.com
sub1.example.com
other.example.com
another.example.com
I'm looking for any additional ways to perform recon on these targets and I want to get a list of all the subdomains of a domain.
I'm current... |
based on my previous knowledge, I know that the iPhone has hardware encryption implemented on recent models. When we issue the "Erase all contents and settings" command, the encryption keys are destroyed, making the data within the device useless.
Android also provides encryption by using dm-crypt and I believe it enc... |
In the context of a web application, a user connects to this application and a session id cookie is set to authenticate the user for next requests. As the cookie is actually present before submitting the login form, there is no new value generated on login success but instead, the value present in the cookie is taken a... |
Is Javascript on a mobile browser more secure than Javascript on other types of systems? For instance, if I have a site that includes some client-side (Javascript) encryption code, with the intention that it only runs inside a Safari browser on the iPhone (standalone or embedded in an app) or Chrome on an Android devic... |
I'm currently working on Web application/service that (hopefully) will be used in a wide variety of ways. Of course I'm looking to attracting some commercial users as well, and as we all know, they care about certificates. So my question is:
What are the most recognized, most valuable certificates that a web applicatio... |
Here are some examples of the encryption:
J01A062YLMP1
J01A06OEPMP1
J08A07GSVMP1
J08A0625YMP1
K01A06IE2MP1
K01A06GRKMP1
W08A06ZTYMP1
I know the first letter corresponds to a brand, the last 3 characters never change MP1, and there is always an A as the 4th character. Any suggestions on what type of encryption this is?
|
My entropy gathering system works by serializing user inputs:
$entropy=sha1(microtime().$pepper.$_SERVER['REMOTE_ADDR'].$_SERVER['REMOTE_PORT'].
$_SERVER['HTTP_USER_AGENT'].serialize($_POST).serialize($_GET).serialize($_COOKIE));
only serialization is done. no unserialization is performed.
someone had said:
your seri... |
If an RSA private key of a root CA is stored offline, how does it revoke certificates it signs?
From looking at OpenSSL config the default_crl_days option seems to indicate that a CRL must be regenerated every x amount of days. For an offline CA, this would seem to mean that someone would have to manually do this on th... |
This was probably asked many times here, but I'm not finding any because I'm not sure what to look for.
I'm developing a simple payment gateway, where partners (consumers) can submit requests so their users can pay and return back.
I will give partners a public key (bound to their domain name), they will use this key ... |
I've created a few certificates to use myself, but I find myself stumped when it comes to creating a certificate which contains a digital signature. First, how would I go about creating a standard certificate which no longer contains only common fields, but ones containing a digital signature as well. And second, how... |
There is a command-line application that interactively prompts you for your password to a third-party service. Whereas e.g. sudo completely hides your input as you type your password, this application prints * for each character you type.
For a command-line application, does the act of masking a password pose any more... |
I am wondering, why web sites do not use one-time passwords generated by hash chain. By that I mean that a client chooses a secret and after being salted, he applies some secure hash function F() on it n times (e.g. n=1000000) in a row.
F(salted secret,n)=F(F(F(...F(salted secret)...)))).
Client then sends the result ... |
I live in a country which most website on the internet is blocked by government so we mostly use wide variety of proxies such Web proxies, VPN, SOCKS and most of them are free.
My question is: Is there any way, those proxy servers sniff our data even we use SSL on the webpage ? if there is , How ?
|
Can Penetration Testing be considered as a part of an exhaustive Vulnerability Management program?
P.S: I realise the difference between penetration testing and vulnerability assessment. But I want to know if both fall within Vulnerability Management umbrella ?
|
I know this question looks very silly, but, it has been bothering me for a while and I am unable to come up with an answer by myself. So, here it goes..
Packets in the TLS protocol consist of a 5 byte header followed by data which is encrypted once the handshake is done. The 5 byte header is always transmitted in the c... |
Google Authenticator is an alternative to SMS for 2Step verification, installing an app on Android where the codes will be sent.
It works without any connectivity; it even works on plane mode. This is what I don't get. How is it possible that it works without connectivity? How do the mobile phone and the server sync to... |
I work for a large-ish company (thousands of employees across multiple locations). I recently needed to know what the possible public IP addresses are, so that a vendor could identify us (presumably for their firewall).
The network guy I spoke with acted as if anyone knowing our range of public IP addresses is a signif... |
We are uncertain how to interpret a specific piece of NIST 800-57 - to wit, how long a symmetric key cryptoperiod should be when originator usage and recipient usage begin concurrently. The short version is, it's unclear whether the cryptoperiod can extend three years past the termination of originator-usage regardles... |
As a client computer, I am behind a router to which I have no access. Is it possible for me to know the domains or IP addresses that other clients visit?
I want to know which clients often download files because it really makes the network so busy.
My computer and other clients are in the same LAN (192.168.1.xxx).
|
I have recently taken a security course, and have learned a lot about, among other things, the way passwords are stored, etc.
Afterwards I was thinking about the way that passwords are stored for email clients. If we provide our email clients with passwords for our accounts, those clients must save those passwords som... |
Our organization has launched a training program for employees. the hosting server(internal), has YouTube videos embedded. we have YouTube blocked, and employees access the internet via proxy.
How can I allow these specific videos while keeping the YouTube blocked.
Our proxy is not capable of picking URLs of video so w... |
I have been looking at an online payment gateway, authorize.net, and specifically their Direct Post Method. This method would allow me to create a form on my server, then submit the post parameters directly to their server for processing. So you never actually leave my site as a customer, but my server can only see the... |
I have two scenarios and want to know if each is secure or which risk there are.
Number One:
If the User has the edit Link (edit/[md5hash]) he can edit a post. The editkey (the hash) is in an form hidden field to tell the Controller Action which post is going to be edited.
The user could edit the value of that field, b... |
Our company has a Xen-based instance on a VPS provider and we have some sensitive data stored on it. Is there a way for me to tell if/when employees of the hosting company have accessed my VPS (by xen consoling into it, for instance?)
|
I am doing a CTF flag for my school project with a PCAP flag based on this CTF write-up: eindbazen.net - Plaid CTF 2012 - Torrent
I setup a local torrent file containing an .mp3 (the audio is my flag's key) that is shared between two laptops. I followed the exact same steps as found in the write-up above using Tshark a... |
My dad is getting strange SMS texts to his iPhone 4
Some examples:
#PWD123456#WHL003=2308480298
#PWD123456#WHL004=2398480389
#PWD123456#WHL002
#PWD123456#WHL002
#PWD123456#STATUS?
#PWD123456#OUT1=ON
Googling reveals this GSM-Auto Controller user manual (PDF).This document discusses how the codes above can be used to ... |
I've found that walking past certain boutique stores in my city that some places have installed very loud high-frequency noise generators. These cause a fair amount of discomfort for passers by that are able to hear them.
My understanding is that younger people are able to hear these frequencies clearly but people over... |
Many files we download don't have digital signatures. Files may get infected or someone may intentionally modify them on our hard disk.
So I wrote a simple file hashing program in c# that creates a SHA-256 hash of each file & stores it in a signed XML document. The private key is taken from the Windows certificate stor... |
I'm currently researching a novel that has a crime element that centres around Internet-exclusive relationships and I would appreciate any help you might be able to offer regarding how much access the UK police have to ISP logs (and any other relevant Internet-based information) and what this information might tell the... |
I'm looking into encrypting with AES using a 256bit key, and I notice that a number of methods in various languages, for instance http://php.net/manual/en/function.openssl-encrypt.php, and I notice that the IV parameter is optional. Does this mean that I can fully implement AES encryption/decryption with a single 256bi... |
I would like to know if it is possible to remote monitor the incoming and outcoming network traffic of a specific IP from my network. I need to log the time, ip numbers and port that contact the computer as well the answers.
I cannot change any configuration/install of the machine. (so cannot install wireshark or a lo... |
I had read through several research papers that discussed the trend of existing automation scanners to produce false positive results. I also read through some articles that showing the manual penetration testing could be solution to false positive results by manually identifying each investigated exploits.
So, here i... |
Why does RSA use fixed-point numbers instead of floating-point? Are there too many floating-point implementations to choose from? Does fixed-point arithmetic increase the difficulty of factorization? Or is it something else?
Wouldn't the extra complexity of floating-point increase the security of the algorithm?
|
I came to my computer today and have not been here since monday afternoon. I am using windows 7. There were some error messages showing even on the log in screen about memory violations done by spotify and one more (I can't remember), and I just clicked them away, even though it is not normal on my PC. Sometimes it fre... |
Is the execution time for bcrypt independent of the length of the input string?
i.e.
Should the execution time of
bcrypt.hashpw('input_string', bcrypt.gensalt(12))
and
bcrypt.hashpw('arbitrarily_longer_input_string', bcrypt.gensalt(12))
be in theory the same.
Is this a something that is guaranteed by the bcrypt algor... |
Suppose we are in the field of desktop applications which need to store their data in a database. How do I store the password for this database avoiding the most obvious mistakes, which are:
1) hard coding the database password inside the code (cited as #21 coding horror under „Hard-coded passwords“ inside http://www.c... |
So I read this article about how the US Department of Labor's website was compromised and users were redirect to a site that installed malware:
http://threatpost.com/watering-hole-attack-claims-us-department-of-labor-website/
Now, I have two questions:
How could the JavaScript that redirected the users be injected int... |
I'm wondering if there's a way to get the functionality for Tor in Firefox (or my general OS) for "free", meaning that I spend 10 minutes setting up part of the functionality to work and skip the parts of Tor that will take an hour.
I'm completely aware that this is not an actual protection against tracking. I'm also a... |
Intel's Haswell architecture has support for several new Bit Manipulation Instructions. In Intel's own words,
Bit manipulation instructions are useful for compressed database, hashing , large number arithmetic, and a variety of general purpose codes.
Do the new instructions found on the Haswell processor make any dif... |
(Edited & added more information at the bottom of this question)
I've been tasked with "testing" a client's Linux web servers, running cPanel (which they own and mostly manage, until they come to me from time to time for help) for PCI Compliance. The client isn't doing anything with e-commerce now, but would like to co... |
I have a company supplied computer that I use from home. I log into VPN (cisco AnyConnect) when i need to access company email or internal company sites.
In the past the company has been able to "take control" of my desktop to make software updates (after i handed power over to them). A co-worker -- also off-site -- r... |
We are currently using HMACSHA512 in .net, with a 128Char (64byte) validation key
The salt is 64 char randomly generated string.
We allocated 2048 length on the database for the hashed base64 string result.
It will be a public facing website.
Is this approach reasonable or should it be changed to another approach such ... |
I'm messing with Mandiant Redline on Windows Server 2012 in a VM and I wanted to download a sample virus that spreads via USB and modify it to attack Mandiant Redline - I've never written malware before, so if anyone has a guide or a link to a download where I can get a sample like this I'd appreciate it.
Where can I f... |
We usually buy services like VPN, SOCKS, Kerio [Kerio Connect?]... to circumvent Iran's Internet censorship policy.
Recently, one of the shops started selling [one of] Kerio's products, for which I do not understand what it is.
My question is: Can the people that I buy Kerio's products from see my data? By these peopl... |
From time-to-time I receive "Unknown" caller on my mobile phone. I do not want to answer those calls as I do not trust the identity of a caller. I feel safer if I can see caller name or at least caller phone number.
I do realise that some businesses mask their identity, so they do not receive many return calls from po... |
Website security breaches seem to be a common occurrence, giving the attacker password hashes that he can conduct a brute force attack against, often given him a list of passwords that will work on other sites since users commonly reuse passwords.
Would it improve overall security by making the hashing algorithm slight... |
I'm doing some revision for an exam and I've made a note to look at how DoS attacks can be used to gain access to a system. I can't find anything online but I found a reference to the fact here.
I hope one of you can enlighten me
|
I needed to reset my password on a website that uses security questions for the purpose, and I noticed something strange. My hypothetical security questions are (not the ones I actually use) are:
What is your name? John
Where do you live? Chicago
To reset, I'm prompted to answer both questions; however, it doesn't ma... |
Recently I've been working on some data which, although not directly governed by any infosec laws, is sensitive enough to warrant being encrypted. I'm interested in finding out about best practises with regards to storage of such data, in particular whether encryption is best implemented at the OS / filesystem level or... |
Am I being stalked?
I was recently doing some basic Python development scripting.
Python has a nice feature where it can run a simple HTTP server that serves the contents of the local directory, on port 8000 by default, but selectable to any other port.
I went to serve the contents of my working directory using this fe... |
I'm trying to hack my own WPA2 network for learning purposes.
I have the *.cap file generated by aircrack-ng tools after a WPA handshake.
I've tested by including my own password and a bunch of incorrect passwords on a wordlist and aircrack-ng crack successfully. My password is 10 characters length, only uppercase let... |
This is in reference to Jasig's CAS software and I'm looking for a checklist to audit the state of security of a CAS implementation. While the Jasig site has a lot of documentation and their mailing list is active, is there any reference document or standardized checklist for security auditors to refer to?
|
A coworker claims that merely enabling IP_forwarding on a single homed Linux machine poses a security risk as he says it could then be used as a proxy.
I can't think of how this would work, except maybe if another machine on the same LAN set it as a gateway. Is there a risk here that I can't see?
|
Getting it out of the way: Not iptables!
What I'd like to do is block network access to certain IPs, subnets, and/or hostnames at the Linux kernel level, such that no user, including root, could bypass them once the system is running.
I actually do have a specific need for this, but I won't get into the details since i... |
Nowadays we see that countries like China and Iran detect and block all encrypted connections as a way to prevent their citizens from communicating over the Internet freely. Although encryption provides the highest level of data protection, still we can't hide the fact that the communication is encrypted due to the ran... |
If a user forgets his login credentials for a web site, is it secure enough to send users credentials by sms?
|
What it would be a decent setup to cover your traces on internet and still having a decent connection?
SSL?
Proxy?
Private VPN?
|
I want to be able to hide my IP packages at best connecting to my router that I am sharing with other people in my house.
Is it possible?
Can I encapsulate them and let them unreadable?
|
I installed CentOS 6 on a 3gb virtualbox disk. It hosts a web server which starts automatically when the OS boots. No user login required. When it boots, it is given an IP and the host machine can connect to the server.
The idea is to hand this to someone on a flash drive, let them install virtualbox on their computer... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.