instruction stringlengths 24 29.9k |
|---|
I have this entry appearing constantly in my router logs:
[DOS Attack] : 5 [RST Scan] packets detected in last 20 seconds, source ip [xx.xx.xx.xx]
They just never stop. It doesn't seem to affect anything, so should I be concerned?
Is there anything I can do in my router to stop the RST scan?
|
The company I'm working in propose among others the following courses related to security
ISO 27001 Lead Auditor
ISO 27001 Lead Implementer Certified
Certified Information Systems Security Professional (CISSP) Exam Preparation Program
I don't work directly with security but I want to take one of these courses mostl... |
This had been added to our wordpress site, specifically in the footer.php.
hxxp://pkktjuchlrv.peguards.cc/02b31ac5iq/get.js
It is malware as defined by google, i belive it is tracking code.
We have complex passwords and use https for /wp-admin. We do not however block access to /wp-admin using htaccess - but that would... |
What is the difference between a Gateway and a Firewall and how do they relate to one another?
I am a developer trying to get a general understanding of network security.
|
I want to block adult sites not torrents and other.
Currently i am using "OpenDNS Home free". i set those free DNS
208.67.222.222 and 208.67.220.220 in router DNS fields and also i have "OpenDNS updater". But the problem is that i used my pc after office.
My router's IP changes 3 or 4 times a day(due to restart of ro... |
Is there any problem with outputing a user's password to the HTML in an hidden field (see use case below before flaming xD)?
The use case is a registration form with two steps. The user fills in the password in the first step, but in order to avoid storing the field's values somewhere in the server, the application sen... |
So, for a research project, I'm trying to use the HONE project on github, which creates during its module installation two pseudo-devices in the /dev folder. These are called hone and honet, the former containing the information it is programmed to receive in pcapng format, and the latter a human-readable text interpr... |
I'm implementing a REST-style (note: it needs to be more pragmatic than canonical) web API and I would like to secure it. The language I'm using is rather fresh and doesn't have a lot of high quality pre-made security modules like, for example, Rails' Devise, and thus I have to roll my own. I also think this is a very ... |
Is it possible to combine the security of full-disk encryption (e.g. Truecrypt) with the honeypot-like performance of anti-theft tools (e.g. Prey)?
In other words, is it feasible to have both strong encrption and a hope of locating one's laptop were it to be lost or stolen, or is this akin to "having one's cake and eat... |
How to capture a sequential stream of data between two machines, making no assumptions about network layer protocols? On wired network, one can do it by ARP spoofing and then sniff the network. One wireless network, could it be possible? Or could one disguise its MAC and receiving data from both S and D at the same tim... |
I understand there are a number of different motion sensor technologies out there, including Active Infrared (AIR), Passive Infrared (PIR), Microwave and Ultrasonic motion sensors.
I would like to know what the advantages and disadvantages of these different types of motion sensors are and what (if any) vulnerabilitie... |
The story...
As a group of rookie security researchers who deal with malwares, viruses etc., me and my team-mates sometimes do commit mistakes in handling the binaries. And so, I ended up infecting my own pen drive with one of the malware binaries I was dealing with- Sality.
Without realizing that my pen drive is inf... |
As a company we are performing daily backups onto RDX removable media which is fully encrypted (shows as unformatted drive) and the backup software also encrypts the files during the backup process, both encryptions are 256bit and different passwords. One of two directors stores the RDX removable media at their home in... |
I am wondering if there are any implementations of a filesystem (as in FUSE) that would allow me to host a file in chunks steganographically distributed all over the internet.
The way I imagine it, the user needs a master URL with the first block containing an encrypted list of the URLs for remaining chunks of data, h... |
I am interested in performing a penetration test of a Windows Phone 8 application for which I do not have the source code. While I can easily validate network communication security, it is more difficult to validate that the application is not storing any sensitive data insecurely.
Because there is no public jailbreak/... |
How can I set up my Windows PC and/or network, so that none of the programs on my actual PC have internet access, but i have a sandbox/VM, with a browser, which has internet access, but has no access to the actual files. Essentially, i want to slice my pc in half. The offline part has access to documents, but no intern... |
When I make a call on my cellphone (on a GSM network), is it encrypted?
|
As per the title, I'm attempting to configure Snort to detect and alert on a incoming Denial of Service attack.
Looking at the rulesets, which are primarily signature based rules, I can't see a logical way of looking for a flood of SYN ACK packets?
I've seen some of the examples from the following link, but they appear... |
I mean "normal" collisions not based on any attack.
How do i calculate it?
|
Being new to researching vulnerabilities in native applications (as opposed to web apps), I'm having difficulties understanding a crash in Debian's browser, Epiphany (version 2.30.6), and determining if it is exploitable.
I've discovered that the following HTML + CSS code causes a crash in Epiphany, when a redirect to ... |
I'm developing web application that uses database. I have to do some operations which needs database table names and db table schema. Will it be secure if I send this kind of information to client side (JavaScript via JSON) or should I keep those information on server side of my application?
|
For instance, Gmail has allowed remote logout since 2008. I think I have seen other sites that allow you to log out all other logged-in sessions.
What are the tradeoffs to consider in this session management strategy?
|
Do the Owncloud clients use encryption when transferring files to and from the server?
I understand that files are stored un-encrypted on the server, but I’m wondering if they are secured during transit to and from the server.
I’ve been looking at their website (http://owncloud.org/), but haven’t been able to find an a... |
I have recently installed the Security Onion distro for Ubuntu.
This distro does a great job of combining multiple tools like snort/Suricata, Sguil, Snorby, Elsa, bro ids, Squert, etc. Within my Security Onion the installation interface has been port mirrored, but all the alerts I have seen show the source IP of our lo... |
When you sign into Bank of America for the first time on a computer that you haven't used with them before, they detect this and force you to answer one of your security questions. I think I've seen BoA do this when I sign in under a different browser on the same computer. If I clear the browser cache, though, they don... |
I am currently learning some basic penetration testing using Metasploit. I have set up a reverse tcp meterpreter payload that I run on an Amazon EC2 Windows instance. Sometimes while moving a new payload the machine, the listener that I have set up in Metasploit will be connected to and successfully send a payload, res... |
I am interested in exploring a bit of the darknet, and I was wondering about the feasibility of running a Tor exit node from behind a local proxy like Burp Suite so that I could ID the destination URLs and look for hidden services, this could let me essentially develop the seed list for a "search engine" for the darkne... |
We have a network that is completely closed to the outside world. It needs to be.
Problem is we need to remote into a server on this network once in a blue moon for diagnostics.
We've discussed ways to go about doing this and one method approved by some is to have a router that is powered by a device that would cut po... |
A customer provided an external drive (USB 2.0 and Firewire 800 connections), and wants me to copy files onto the drive. The drive is not new. I have no particular reason to suspect the customer would intentionally send a drive containing malware, but I don't know that the drive is clean.
I'm using Mac OS 10.8.3; is ... |
I recently purchased a network attached storage for personal file storage and would like my family members to store files on the device from their computers as a remote backup.
I'd like to secure the port that's used to sync files so that only their computers will have access. The solution should be easy for them to i... |
I am wondering if there is any system that would change source code trees in subtle from version control systems in ways that are hard to discover (i.e. whitespaces at the ends of lines, perhaps even change some less variable names) to "watermark" the code so that it would be possible to find out who pulled it from the... |
We are going to be using a jump box to serve as an SSH bridge to our production systems. Assuming that operators are actually logging in to a shell on the jump box and assuming that it is possible to record the full terminal interactions, is it advisable to record full terminal interactions in this kind of scenario?
I... |
An angularjs application stores user input to local/sessionStorage and retrieves it later to fill the form fields or display that content later. If a javascript is submitted as user input, it gets stored in the web storage and is displayed back as required, but it doesn't get executed. I assume that angularjs does some... |
When you sign into Bank of America on a computer you haven't used with them before, the site prompts you to answer one of your security questions.
How exactly does this make the site more secure?
Is the assumption that if a person somehow guessed your password, they couldn't get in on their computer because they would... |
Since many of you already know the Iranian government aggressively uses internet censorship to block sites such as facebook, flicker, bbc, etc.
The Iranian people use various methods to bypass filtering like VPN (l2tp,pptp,ipsec) openvpn protocol, HTTPS, socks5, HTTP , kerio vpn ...
since the day before yesterday ever... |
I was researching on methods to avoid man in the middle attacks. I thought of using out of band authentication but i read the wikipedia article on the same topic which goes as follows:
"In authentication, out-of-band refers to utilizing two separate networks or channels, one of which being different from the primary ne... |
Since a potential attacker will exploit the services that are already open to public by firewall rules, how will a firewall help to protect my server from attackers?
|
When installing software on a remote server: Is it possible to let the admin (i.e. the user that installs the software) define admin username and password via a HTML page, in a secure manner?
Clarification: When one installs e.g. WordPress, parts of the installation scripts accept input via a web page see this example ... |
I am studying various disk encryption schemes (such as PGP, MS Bit Locker, BestCrypt and TrueCrypt) on my Windows OS.
I am interested to know how an encrypted partition/disk/file with a particular scheme (e.g. PGP) can be distinguished from other disk encryption schemes.
While studying I found that there is an inherent... |
I have some data on the server (running Linux) which needs to be encrypted (company policy). This data is being served by an application running on this machine. Now I consider a few possibilities:
1) Encrypt only the partition on which the data resides (by the OS).
2) Encrypt only the data in question (some 3rd party ... |
Setting up Firewall rule for HTTPS websites on basic stateless packet filter firewall
This seems like a stupid question, but how do I set up a firewall rule to allow HTTPS on a basic packet filter firewall? The purpose is I want to be able to browse to sites like https://twitter.com and have all images load etc. How ca... |
I often see RSA being recommended as a method of key exchange. However, the Diffie-Hellman key exchange method appears to be secure as well.
Is there any considerations one should take into account that would lead to using one algorithm over the other?
|
This paper proposes the concept of honeywords for detecting if a password database has been compromised.
As far as I understand it works like this:
You save n password hashes for each user, one that actually contains the real password and n-1 that contain so called honeywords (false passwords). The correct password has... |
I noticed that exploits which use Return Oriented Programming always find the gadgets in libraries. I wonder if it is possible to use gadgets from the executable (.exe) itself?
|
I thought hubs were layer 1 devices, and so would have no active role in IPSec. I am reading to understand crypto maps,
Dynamic crypto map policies are used in site-to-site VPNs when an unknown remote peer tries to initiate an IPsec security association with the local hub. The hub cannot be the initiator of the secur... |
I have a php website where everything is in the public_html\ folder, including an includes folder with config and classes. I told my developer to move it away from public folder but he said there is no risk as files are php files and even if someone types in browser the
www.example.com/includex/config.php
all they wi... |
A newbie question here.
I've just read through a short introduction to SQL injection on http://www.breakthesecurity.com/2010/12/hacking-website-using-sql-injection.html?m=1
It says to find a GET request path on a PHP application to see if it is vulnerable or not.
I have a website, with the following query URL.
http://e... |
I have a proxy server, it will have a captive portal page. Users will be required to sign in before gaining access to the internet.
So far I am aware of IP and/or MAC address based authentication.
Is it possible to use HTTP cookies to implement authentication? (Maybe third party cookies?) How does websense do it? (see ... |
I am new to Android. I am trying to figure out how exactly a soft keyboard on an Android device works. What exactly is the 'behind the scenes' process that takes place so that the application is allowed to receive user input and present it to other applications as keyboard input? Can any application do this, or does it... |
Is it possible to block access to phpmyadmin page over the network in XAMMP Windows? I want only localhost(127.0.0.1) to be able to access the page. Other people connected to the same network shouldn't be able to access it. Eg. if 192.168.1.2 tries to access 192.168.1.1/phpmyadmin they couldn't access it.
|
I have a site where the main database is interacted with via python scripts located in public_html\cgi-bin\. To run commands, various JavaScript scripts, located in \public_html\scripts\, use jQuery to call the different python scripts.
I have some python scripts, such as one used to delete and add entries restricted ... |
This is a little bit of a rant, but there's a real question at the end.
I recently installed a new perl script on a site (which will remain nameless) which failed mysteriously with an error 403. Eventually I found a clue in this error in the apache error logs
[error] mod_security: Access denied with code 403. Pattern... |
One of our coders is trying to get Windows Authentication to work on a new web app that he's developing (.Net 4.0, MVC, via IIS 7.0/7.5).
The application connects to a SQL Server database back-end via a single SQL logon account:
Domain\Computername$
It is mapped to a User account of the same name within a single databa... |
I'm implementing a salt function for user passwords on my web page, and I'm wondering about some things.
A salt is an extension added to a password and then hashed, meaning the password is stored in the database as hash(password+salt). But where does one store the salt? A salt is simply to make rainbow tables "useless"... |
In my organization, users have the rights to transfer files to and from servers using SSH File Transfer protocol for a variety of reasons; e.g. application troubleshooting, BAU, etc.
Although our servers are configured with logging to keep track of what users have done, we would still like to control the file transfer ... |
The scenario: coworker's Skype somehow lost his auto-fill password. He doesn't remember it anymore, and the account is hooked up to an email address that no longer exists. He's never purchased any credits so he can't use a CC to verify his account to customer service.
I know that Skype should have a saved AES-256 and S... |
For a commercial web site, is it important to impose some restriction on passwords to access the system?
Eg. special $char, Upper and lower case, numbers, at least a minimum length...
Can a CAPTCHA system be sufficient to substitute password restrictions?
|
EDIT: This question was dumb, I misread the quote that made me ask it. Sorry.
This is more of a follow up question from schroeder's answer to another question.
schroeder said that CAPTCHAs are vulnerable to automated attack. After looking around it seems like modern CAPTCHAs are not (as far as I can find), the closest ... |
In this answer, Gilles says (emphasis mine):
There's no need to hide the salt from the attacker: it needs to be unique (and not derived from the password) but it doesn't need to be more secret than the hash.
I'm wondering whether there's any additional advantage to be gained by modifying the salting based on some cha... |
On my Ubuntu server I have these services running:
netstat -tlnp
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 127.0.0.1:9000 0.0.0.0:* LISTEN 1340/php-fpm.conf)
tcp 0 ... |
Following up from this question: Should I bother teaching buffer overflows any more?
I am a it sec researcher and also security course instructor. Recently questions have been raised about the validity of buffer overflow, buffer overflow techniques and the like, given that the subject itself is involving over the year ... |
I've been wondering whether viewing a website offline increases the security risk.
The reason why I'm asking is that having been a short time java applet developer (for a small task) I've come to know that a java applet originating from the local file system has more privileges(like accessing the local file system) co... |
My website shows some files based on the get value in the URL. For example http://www.mysit.com/navigate.php?d=firstpage.html The thing is navigate.php knows which folder to look in and it's not in the web root directory. Are there any precautions I should take? For example what effect does . or .. have on a URL? If an... |
I am trying to understand reflection attacks but unfortunately wikipedia is too vague. I understand that in such an attack the attacker tries to authenticate with the target but does so in such a way that the target authentication system's challenge is sent to a spoofed client (instead of to the attacker). I also under... |
Let's say I want to create a protocol to securely communicate between two endpoints - each of the two endpoints know the other's public key and all data exchanged is encryted using one's public key and decrypted using the recipient's private key. My question is aside from man in the middle attack which can be avoid by ... |
From Wikipedia, I understand that circuit level gateways look at TCP handshakes to filter illegitimate traffic and that application level gateways somehow filter application specific traffic.
But I don’t really see the difference--beyond the obvious fact that application-level gateways seem to operate on a higher level... |
One of our web servers that is managed by a service provider (completely in their control, we have no login access) just failed PCI-DSS vuln. scan by TrustKeeper. The vuln scan detected the box as a Windows Server 2003 SP1 OS (extremely out of date).
I submitted the report to our service provider (along with an angry e... |
If a hacker gets into my PC can he steal my emails passwords? I use the windows live mail client to manage my email and I have saved my passwords when it asks me to save them. I run like 9 mail accounts and don't want to enter the passwords each time I open my PC.
|
I've found during a lot of recent pen-tests that companies will use passwords like
c0mp4ny@b(
for a company called "company abc"
Is there any quick and easy way to generate a list of passwords based on as many possible 'leet speak' letters?
So the input would be
company abc
and the ouput would be
c0mpanyabc
c0mpan... |
I recently encountered a situation where one site assumed that if two different people's credentials for the same OpenID network produce the same email address then they were they same person. Also, less recently I encountered a situation where one site assumed that if two different OpenID providers produce the same em... |
Lots of websites like Google, Facebook etc acknowledge the white hat hackers on their sites for reporting security vulnerability. But for the vulnerability reporter is it safe from legal perspective ? Also how can the company "trust" the reporter that the reporter himself has not taken up any "benefit" from that vulner... |
I'm searching for a solution to protect process memory at runtime level in Linux (just like GameGuard in Windows). I googled many times but didn't get any useful information.
Does anyone know any existing projects or research about this subject?
|
I am facing an issue where hackers are seeking to compromise two of my servers. They succeeded in wiping out both and stealing my backups. I had off-site backups and I am back online. Nonetheless, I want to close the back doors into my system. What should I do to make sure this never happens again?
The off-site backu... |
If you are looking to be careful and your passwords include all the types of characters, what is the ideal password length?
|
I am using Thunderbird as an email client for managing my different email accounts. Yesterday my friend sent me an email with a PDF attachment. Today when I tried to open the attachment I get the following error popping up:
This attachment appears to be empty.
Please check with the person who sent this.
Often company f... |
In the case of pirating multimedia, be it video or music, which problems may be caused by the video or music file itself? Could a video or an audio file be used to spread malware?
I'm talking about the file itself, not about vulnerabilities on the software used for download nor the media player.
If the file were a pict... |
I have downloaded the following function from the internet. It's a WEP Key generator for 64-bit from a giving passphrase. and I m wondering if a such algorithm is a standard algorithm? or it's an algorithm invented by the developer?
void wepkey64(char *passphrase, unsigned char k64[4][5])
{
unsigned char pseed[4] =... |
I came across this Intel How Strong is Your Password? page which estimates how strong your password is.
It has some advice on choosing better passwords including that you should use multiple passwords.
But then after it says this:
Step 3: Diversify your social passwords for added security
"My 1st Password!: Twitr" "... |
Is it possible to prove a date that you Deleted a file through the recycle bin? I delete a folder of pictures 2 months ago and somebody is asking to prove that I did it.
|
I am currently looking for a password generator which produces pronounceable passwords. I have used this random password generator a few years ago to generate a 42 characters long password and found it remarkably well to remember. Even after all this time (and I don't have to type that password that often), I can remem... |
Today, almost all desktop and most mobile operating systems and devices support some version of OpenGL. I'm wondering about the security implications of that:
In many cases, the GPU has complete and unrestricted access to the main memory (for integrated graphic devices) or at least the video RAM, where sensitive infor... |
Someone told me that showing your IP address in a URL (like http://192.0.2.34/default.html) is easier to hack. Is that true? I could trace any domain name and get its IP number as well.
|
How can I decrypt TLS messages when an ephemeral Diffie-Hellman ciphersuite is used? I am able to expose the premaster secret and master secret from the SSL Client. Using that, how to decrypt the messages in Wireshark?
|
I am currently dealing with permission issues with an IIS app pool. I am tired of clicking through window after window to set permissions on folders for domain and local users.
Also, I would like the ability to see what permissions are on sub folders and parent folders to see which permissions are inherited or not.
... |
Can a home computer, not wireless, be hacked from the outside and have pictures copied? Can I track and see if that happened?
|
After some digging on the Internet, I've been unable to find a satisfying solution for my curiosity... Here's the thing : using a shell script, I've been able to obtain a list of IP addresses connected to my computer (ss), along with the names/PID of the applications (netstat -pn) listening for those connections (Skype... |
So I consider myself a pretty conscious computer user.
I run Windows 7 SP1 Pro 64bit and I update it.
For surfing on the web I use Firefox 20.0.1 - I keep it updated. I also have NoScript and AdBlock - both up-to-date and running all the time. If I trust a site, I allow scripts from it (sites like stackoverflow etc.).... |
I was using sftp to give access to clients to certain folders so that they could modify their apache virtual hosts as desired. Until someone uploaded a php backdoor and erased all virtual hosts :).
I was wondering if there is a way I can get the ip of the attacker ?
I guess I will see nothing in access.log because mos... |
[PGP] can get paralyzed by excessive analness.
— Phil Zimmermann
Preamble
I am in the process of building my own web of trust. That is, I want people (PGP users…) to be—fairly—sure that, by using my public PGP key, they are actually communicating with the real me (which can be achieved by checking who signed my pub... |
I am at a student at a school which blocks the right click in Windows Explorer and the desktop, as well as on the taskbar. I don't exactly understand why they do this, since most of the commands on the right click menu are also avaliable in the File menu in Explorer (and they don't block that). While I don't mind, many... |
I am trying to get the MS-MPPE-Send-key and MS-MPPE-Recv-key from the MS-CHAPv2 challenge material. I am able to follow the RFCs 2548 3078 and 3079 to the step of getting the GetNewKeyFromSHA() it is 16 bytes long.
I can use the key to encrypt data as the example in 3079. The problem is that I am not sure what should I... |
My application installs for a single user on a Windows machine. Any user may install the application for himself, but the application will save some information common to all users in a separate directory (currently in the subdirectory of the hidden ProgramData folder on Win Vista, 7 and 8). The application will need r... |
I am planning to store the login credentials in Google Chrome content scripts. The content scripts will then use these credentials to login to a website when I open it in Chrome.
I wanted to understand the risks / issues in storing login credentials in a content script? Also, if this is not the way to go, is there some... |
Let me first say that I know it is a bad idea to store sensitive information in a mysql database, so please don't respond by saying "DON'T DO IT" or something to that effect. I am building a website for which it is absolutely essential to store Social Security Numbers, and I have to be able to retrieve that data back o... |
I have problems to understand what is the difference between the serial number of a certificate and its SHA1 hash.
The MSDN says:
Serial number A number that uniquely identifies the certificate and
is issued by the certification authority.
So can I identify a certificate by its serial number, right?
Wikipedia ... |
A question came up on the Unix & Linux SE site: Checking if passwordless ssh authorization is possible without permission for sshd_config?.
I immediately thought you could possibly infer this using the commands: ssh-keyscan -t rsa <server> and ssh-keyscan -t dsa <server>.
My logic is that if a server is returning eithe... |
I'm doing a state of the art on web services security. I need every bit of a solution out there that solves concerns about identification, access control, transmission related ones like data integrity, protection, non repudiation..
So I fetched some real world solution to fill those needs, I found those for SOAP based ... |
We've had some issues with compromised accounts due to users falling victim to phishing campaigns.
The possibility of us doing a phishing campaign against our own users to proactively shame them has come up.
Putting aside my personal issues with this, I have some security-related problems:
If we use an outside account... |
Some of my friends say that their cracked antivirus software updates regularly, and does the job as same as a legitimate software would do. Is this possible? How do they bypass the activation key checker, and do that?
|
I have an ASP.NET website serving up private PDF documents. The PDFs are stored unencrypted on a share on the internal network. The user logs in and navigates to the download page. The web server validates that the user has access to the file, loads it from the share and transmits it in the response.
Is this the "right... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.