instruction stringlengths 24 29.9k |
|---|
I'm creating a web site that lets people create their own site using a subdomain. Are there any security implications by letting people add custom javascript to their pages? If so, which ones? XSS? Cookie sniffing? Could I make it work by sanitising the html?
Right now I'm disallowing it, but it'd be great to let peopl... |
The standard advice for HTTP applications wanting to prevent Cross Site Request Forgery is to include a random token on each state-changing request (usually POST) which is verified by the server before allowing the state change.
Do the same considerations apply for WebSocket connections? Should web applications using ... |
I lost my lumia 800 mobile two days back. If the sim and battery are removed, can it be traced with the IMEI number by the cops if I lodge a complaint? Or can the location be traced if a new sim is used in the lost mobile..? Please tell me a good way to trace my mobile. !
|
Given that it's possible to fake ID cards and fake social security numbers are created, I need to ensure that all users of my site are US or UK based citizens, and don't have more than one account.
A few examples where one human may have more than one identity would be
Getting married (name changes, SSN stays the same... |
What is the difference between Trusted CA Certificates and Trusted remote Certificates?
|
plaintext: CANDY VERY CRANBERRY
ciphertext: TXOtWjYhVk 8&O$4AmSA
plaintext: http
ciphertext: cZf.
plaintext: http
ciphertext: r5Hz
This is definitely somehow decodable from ciphertext.
The ciphertext is always the same length as the plaintext.
Frequency of letters in the ciphertext doesn't match the plaintext.
The ... |
I was wondering what would cause a firewall to block a TCP Java socket from connecting. What would trigger that?
|
Today I've found interesting site that output your cookie value directly to the page, so if I modify the cookie value I can XSS myself.
e.g <span id=statistics>Last visit: Cookie_Value_Of_Something</span>
So my question is, do you think this is vulnerable or can I exploit this?
It looks like useless to me so far.
|
First off, let me say that I currently live in Mexico, a land filled with petty theft. I had a group of friends over last night, and they were looking at the photos on my camera. Today, I looked at my camera and saw that its SD card was formatted. But then I realized that it was formatted in FAT, and the camera doesn't... |
This question is derived from my previous question on Isolating Web application where two approaches were recommended.
Apache Chroot Jail
Isolation through Virtualization
My question is if one of the VM on which application is hosted is compromised will the virtualization layer be enough contain the vulnerable web a... |
I am trying to find the live hosts on my network using nmap. I am scanning the network in Ubuntu using the command sudo nmap -sP 192.168.2.1/24. However, I am unable to find the live hosts. I just get the network address of my own PC as live. When I see the DHCP client list through my browser (my router can be accessed... |
I heard that it is possible to use EnCase to recover IE InPrivate browsing history. Is this really possible?
If so, suppose that a computer has been shut down right after usage of InPrivate browsing in IE (e.g. there are tabs opened, and users just shut down the whole computer without shutting down windows.) How much w... |
As curiosity, according to my knowledge, hibernation basically moves memory data from memory to hard disk. First of all, is this true? And if so, is it possible to recover the deleted hibernation data and use it to access memory data before hibernation? So if I hibernate, then wake up, then close an application, then t... |
I've found many posts on StackOverflow and other sites using Google, but since security is always changing, and what was safe a few months ago not me anymore... I felt the need to ask on here.
Unfortunately my server does not support Blowfish.
I am looking for the most simple way possible to store passwords safely.
|
KeePass is a program in which you can store your password and copy and paste them into websites. Does anyone know if it is safe against key logging software? Does key logging software pick up what you copy/paste?
|
My goal is to create a simple one-way intercom using B Speech TX2 and B Speech RX2, an Audio2Bluetooth and Bluetooth2Audio converter.
My question is, how secure is the audio(in my case voice) being transmitted via AD2P using this setup? Can other people in bt-range easily listen to what I say?
Or in other words: How do... |
I'm interested in sending a remote wipe command to stolen IT devices, such as a cell phone, or wifi connected device. However most remote wipe technologies require that the cellular service (or wifi) be connected in order to receive the command.
This requirement is self-defeating since the Wifi device will most defini... |
Is it possible to validate an XML message (with XML-DSig or XAdES signature) by a Data Validation and Certification Server (RFC 3029)? Should it understand XML signatures or not? Could it parse XML? Or message must be in a specific format to be validated by DVCS?
According to RFC 3029:
DVCSRequest ::= SEQUENCE {
... |
A 5-word Diceware passphrase gives an entropy of 7776^5 = 3E19 = 19 Bans (or ~64 bits). Apparently monster cracking systems can currently guess passphrases for MD5 at a rate of 180 billion/sec (2E11). See monster system
That system would find my passphrase with an entropy of 19 bans in at most 3E19/2E11=1.5E8 seconds.... |
I am using and authorized_hosts file to authorise certain keys. One of those is restricted with the prefix from="1.2.3.4", the others are valid from anywhere.
When accessing from a machine that has an SSH key, but whose key is not in authorized_keys at all, and therefore logging on with a password, this message is gene... |
What is the impact of having a routable domain name in windows network infrastucture ?
Having example.com in place of exemple.local as domain name have an critical impact ? if yes what should I keep in mind during the installation of the infrastructure ?
Thank for your help an advice.
|
Question: When drafting an information exchange agreement between governmental agencies what security related sections should be considered for inclusion? Example agreements?
What is the security perspective of an information exchange agreement? Unfortunately my research into the subject have revealed close to nothing ... |
I need a process to allow only certain computer systems access to the website irrespective of the network they are using.
Much like a Licensing system, I can provide a private key or something similar to the user, which the host server should identify that key by matching from a list of private key. Alternatively could... |
I have spam that looks like this:
мy вυddy'ѕ мoм мαĸeѕ $74/нoυr oɴ тнe lαpтop. ѕнe нαѕ вeeɴ lαιd oғғ ғor
ѕeveɴ мoɴтнѕ вυт lαѕт мoɴтн нer pαy cнecĸ wαѕ $19420 jυѕт worĸιɴɢ oɴ
тнe lαpтop ғor α ғew нoυrѕ. нere'ѕ тнe ѕιтe тo reαd мore
something.com
Obviously this is using Unicode to avoid spam detection. Are t... |
I'm an avid fan of file system forensics but I'm an amateur so far. I've been reading up on NTFS forensics and I've noticed you sometimes can know if a file was on a certain volume even if it was deleted and the free space shredded with a tool. You can find it either in the USN journal (if it exists) or in the slack of... |
Ok so when a hacker has the wifi network's password and gets on the network, he can do things like monitor traffic, catch passwords, even access PCs, etc.
But what I'm interested of knowing is what can he do to my computer once he gets access. I have 4 questions for this:
If he's doing something to my laptop, will I ... |
Below is an example profile I've created for web apps, in which I've limited files / commands it can access. It includes profiles to nginx, php-fpm and mysql, no commands is allowed, only few directories / files for read / write / flock access, and network socket.
(The rest is located in my github repository)
/usr/bin/... |
I've read the advice (example: store them in php file in a location inaccessible as a URL) but can't help thinking there must be a better way of storing/accessing database credentials.
Ideally it would be impossible for someone with access to the webserver files to obtain the database credentials. This leaves the chall... |
I've recently taken an interest in SQL injections - it (for some reason, correct me if I'm wrong) seemed like a good place to start (I am pretty much a beginner). Anyways, I want to make a site that I can practice on. In other words, basically maybe one content page, a login page, and a database with say admin, users, ... |
The other day I got the password for our school's Wifi but even though that's the case, I still can't connect. So I visited the guys at my school's IT department and they said they need to borrow my laptop so I can connect to the network. I gave it to them.
Few minutes later it was returned to me and true enough I was ... |
Doing some testing against two IP address in the scope I find one web server in each one. Both host what it seems the same web application.
They are different public (accessible through Internet) IP addresses and there are no explicit redirects (30X) between them.
What I'm looking for are indicators that can help me to... |
I just spoofed my MAC at my school and connected to router. I got past the firewall, but now I don't have internet access. I am using windows 7.
|
Here's my network configuration:
My network configuration http://daveden.files.wordpress.com/2013/05/network-configuration.png
The proxy server is running Ubuntu with Squid on port 3128 and DansGuardian on port 8080.
I'd like to force all clients to use the proxy server - specifically, port 8080 - for any TCP/UDP acces... |
I do not normally deal with internet security problems but this one has got me interested.
The issue is with a specific site, lets say example.com, and how it it visited.
If the address is typed directly into the browser, the website works fine.
If the address is searched in google/bing/yahoo and followed, a 302 red... |
I'm looking for a pattern to store a config file containing sensitive information in a semi trusted hosting environment. Semi trusted in this case meaning I trust them in general, but not with this info (passwords).
In this case I'm writing a simple daemon to watch a folder for changes, and push those changes to a da... |
I opened a SQLite database file, and it seems to have many rows that aren't readable.
The data has got weird symbols including "question mark diamonds". Is it data that iPhone encrypts when it goes to the database and decrypts back? Is there a way to read the data?
What are my chances of decrypting it? Where do I sta... |
After I read this link, I tried to understand how they manage detect Tor traffic
The most understandable source for me was this paper
He is saying Tor traffic can be detected by port, cipher suite length , extensions and validity duration of certificate can be use. I tried to implement that and I saw Tor corrected all ... |
I performed a recent security audit and was wondering if anyone has heard or run across any known exploits against any commercial multi-function print/scan device whereby you can bridge the incoming fax line and network? These were all commercial grade equipment and I did some extensive google'ing on the topic, but I d... |
I wanted to install the Linkedin app on my Android phone and I was shocked when it asked for nearly all possible permissions including reading all of my private data and calendar data.
Why does any application like Linkedin which is probably implemented as a simple webview possibly need access to such sensible data? Ca... |
Summary: I would like to show a proof of concept of a Java exploit using an old JRE on an up-to-date machine to cut short discussions on the "but we are patched so why removing older versions" subject.
(I am not a developer - apologies for possible unfortunate expressions below.)
Details: When patching Java (at least o... |
I want to store the username for a web site in the coockie, is it secure?
What an hacker can do with this info?
|
Studying for Security+ with Darril Gibson's book he says that "A full backup is the easiest and quickest to restore"
Now I've been looking for another test exams and I found the MasterExam of the CompTIA Security+ All-in-one book. One question was A disadvantage of a full backup is? and the right answer was It takes th... |
So, I'm currently 16 and am considering a career in IT when I finish school. The thing that has intrigued me the most while growing up is malware. I've come across it so often and have often had to clean it up for family and friends (I also did it temporarily at a PC store I worked at).
Sometimes I reverse engineer mal... |
A client of mine is concerned someone is retrieving data and intercepting text-messages from his iPhone and his home network. He has told me that he has seen one of the text-messages he sent to his mother on his neighbors phone.
They have been sharing their wireless for sometime but not any more now that he's changed ... |
Just to say it, the four tenets are:
Confidentiality - The message the recipient gets can be proven not to have been read by anyone else since it was encoded.
Integrity - The message the recipient gets can be proven not to have been changed since it was encoded.
Authenticity - The message the recipient gets can be pro... |
Let's take a look at the basic OAuth workflow:
The basic idea is that the Consumer (App) asks the user to grant him access to the Service Provider. The service protects the user by asking him each time the app wants a new access key.
The real problem here is that the service doesn't know much about the consumer.
In th... |
According to this and this, seems even 128 bit encryption should remain secure for a much longer time than what security organizations say.
I saw the standards with this: http://www.keylength.com/en/compare/
For example NIST apparently says 128 bit encryption is considered secure up to around 2030. (it is written '> 20... |
I am sniffing a client side application traffic and I found some encrypted data. I am not able to decrypt it. Information which I have is
Public Key:
MIGeMA0GCSqGSIb3DQEBAQUAA4GMADCBiAKBgHfIm5pYrEMUuJUevmED6bUFx8p9G/5vF+ia+Qnrn8OeMpIJ/KS2nqDLxXx/ezNKlFArWK1Wer4diwQJ2cdiCqNorubAgnOXMV+/FsiATQjMT2E2lI9xUWqqNq+PfgyCPILRli... |
I have a web application running on Glassfish 3.1.2 servlet container and I need a way to protect the compiled java classes. I have tried to obfuscate the source code but it didn't work.
The project contains a lot of classes using java reflection, annotations, generics and some other things that makes the obfuscation ... |
What is the best place to go for security news? I am looking for everything from news updates to editorials to guides and research. Anywhere considered more reliable or particularly hard-hitting?
Also I am looking for good Twitter feeds!
|
I'm writing an iOS app for private use to act as a client for a PHP server. To secure the connection I'm using a self-signed SSL certificate.
Since the server is self-hosted, on the first connection inside my LAN I could be pretty sure that no MITM attacks were happening.
So I saved in a file the certificate that the s... |
Brute-force password cracker programs which claim GPU support include John the Ripper, ighashgpu, oclHashcat, and others. oclHashcat appears one of the more popular, but I am not sure which AMD/ATI GPUs it supports. (I have an ATI card.)
Which of the password cracker programs has the greatest ATI GPU support?
Which ... |
My company runs a webshop. We work with a partner that gives discount vouchers to our customers after they buy (the vouchers can be used in other online shops) and also gives vouchers for our shop to customers of other shops. For this purpose, the partner asks us to send them some data about our customers and their res... |
We create PDF files as relevant to a customer's e-mail communication. These PDF's contain some personal information, specific to the client.
The client is emailed a link to the PDF. The link to the PDF contains a 40 byte unique string specific to this communication to ensure uniqueness and to avoid guessing.
Is there a... |
I have setup an ejbca pki and integrated certificates in MAC OS for S/MIME signing and encrypting. I have also set up a CRL distribution point and put the CRL online available on an HTTP server.
Unfortunately, it appears that when I revoke a certificate and update the CRL, neither outlook or Mail clients seem to detect... |
I'm about to do my master and I need to make a decision on what course I should take now I have two options either computer forensics or information security
What I want to know is:
What is the difference/gap between these two disciplines?
Are they somehow related so if I take any of them I can still go and practice t... |
I am quite new to the DMZ concept and working on a project as part of my master thesis where Remote access is required for the Development environment. However, there is a functional requirement for minimum latecy in the connection since video playing slow or getting stuck is not acceptable. So I have this thought of m... |
Is it possible to encrypt a virtual machine using virtualbox, and not leave accessible to the users of the machine where it hosted, and not allow any file to be extracted it with some program ?
The scenario is that I need to allocate a java web project on a customer where the internet access is very limited. Today thi... |
I have to implement a solution to share some xml files between a frontend server in a DMZ and his backend in an internal network. Both servers are Solaris 10 boxes. What is the better way regarding security?
The backend server has a oracle database and both servers creates xml files. So, I have two process:
1. When the... |
What is the rationale behind writing a self-decrypting virus? By this I mean a virus that has it's payload encrypted, decrypts at runtime and runs it.
How does this protect the virus from antivirus software?
Is it still a viable technique by itself nowadays or can modern anti-virus counter this kind of malware?
|
I am currently working on a little project.
I am trying to generate an AES key with that I would like to encrypt a private RSA key. I have to do it this way. However, I do not want to save the AES key, but generate it everytime when I would like to decrypt my RSA key.
I wanted to use AES in CTR mode with random IVs. ... |
For the purposes of my own research, I have a very modest budget to set up a modest WPA2 brute-forcer supported by GPU(s).
I've done some homework:
Brute-Force GPU Password Crackers
How to setup GPU for Cracking WPA/WPA2?
oclHascat? No.
But I am still left with some questions on how to proceed.
Is Pyrit a good WPA2... |
My friend downloaded LogKext on my computer, so I'm guessing he can see every keystroke, but I've reset my computer so that it's in a condition when I first opened from the box.
Can my friend still see my keystrokes? Is he the only person that can uninstall it?
|
So I completely understand that routers and local networks need to be kept locked down, etc. What real security threats can come about from an attacker who has remotely accessed (telnet or web gui) your home router?
Out of personal interest, I have set up a few test scenarios on my personal network where an attacker ma... |
I just wonder how some website like WhatIsMyIP find out what your real IP address is, even if you use proxy server. It said :
Proxy Detected
and then they give your real IP address.
Is it possible they use JavaScript to send HTTP request for not using web browser proxy settings(How could it be implemented by Java) ... |
We have developed an ASP.NET Based Enterprise Application which is is soon to be released. Now, we are concerned about the security aspects of the application. I've been looking into Backtrack 5 and visited a lot of websites about pen testing too but it was not very helpful. I wish to test the developed application for... |
I am trying to create a phishing email for a project I am on. In the email I want to link to a site that will collect IP, browser, date/time of when visited. nothing malicious but to just prove that users clicked the link.
Can I do this in social engineering toolkit or is it not possible?
|
We're currently doing PCI compliance, and one of the requirements is that mobile devices that have access to systems involved in processing card data have personal firewall software installed which can't be disabled by the person using the computer.
The only mobile computers we have which that requirement applies to be... |
I am trying to view an NTFS master file table. Each tool I have used so far extracts all of the entries, but puts non standard headers such as STANDARD_INFORMATION_ON instead of say $STANDARD_INFORMATION.
I have tried MFT2CSV, ntfswalk64, and MFT_Parser, but I would like a tool that gives me the MFT in a rawer format, ... |
Is it safe to display images from arbitrary domains? I.e. let's say I have an image on my page:
<img src="http://badguy.com/image.gif" />
What if image.gif will return some js attack vector, but not the image? Is there any known vectors?
I've tried to serve javascript:alert(1) or the same, but base64 encoded. But with... |
I came across this website today that implements SMS based authentication that works "opposite" most SMS authentication methods.
In typical SMS authentication, the provider sends you an access code that you use to log on to the site. The TextKey system works the other way around - when you log on to a site, it displays... |
It's been shown that a brute-force attack on WPA2-Personal is possible in a reasonable amount of time. These successful attacks appear to be limited, however, to researchers who have the budget to afford the hardware, or the few experts who know how to debug and run their own WPA2 program in the cloud.
Assuming the res... |
My 21-year-old college sophomore daughter's SECU checking account debit card was skimmed 2 weeks ago at an ATM. She realized it the next day when she tried to use her debit card for a gas purchase.
She withdrew $20 the night before at an ATM with her card and somebody else withdrew $200 right after her. She reported ... |
I have a server with these properties :
cat /etc/lsb-release
LSB_VERSION=base-4.0-amd64:base-4.0-noarch:core-4.0-amd64:core-4.0-noarch:graphics-4.0-amd64:graphics-4.0-noarch:printing-4.0-amd64:printing-4.0-noarch
Recently, I read an article about local privilege escalation - CVE-2012-0056, so I decided to test it on my... |
I'm a bit confused with some different network security techniques.
Say we want a secure communication with a particular mail server in a remote company network. Reading and sending mails should be possible.
What (good or bad) options do we have?
I'd say this:
IPsec: but wont get past the NAT
SSL/TLS: good I guess?
SS... |
I was reading about return-to-libc attacks at Wikipedia.
According to what I read and understood from the article, ASCII armoring means that binary data is converted into ASCII values by grouping them into 8-bit chunks.
The article quotes:
Indeed, with ASCII-Armoring, all the system libraries (e.g. libc)
addresses... |
There are lots of guides online which suggest that using a VPN or proxy will gain better speed or 'free internet' however this seems unlikely.
If my ISP is performing packet shaping on my connection. How does using a VPN or proxy speed up my internet connection?
Is this just a trick or is it actually a way around traf... |
I am in the process of writing a thick client web app using Angular.js (single page app) and was wondering what are the best practices for securing the app using a CSRF token.
Should I send a CSRF token when the app is first loaded then re use that token on every request? Should I have a mechanism to refresh the token?... |
First: I asked this question on stackoverflow and was kindly asked to post this here again. See the original question here.
According to the [early] doc pages of the new PHP 5.5 password hashing/encrypting API the used algorithm CRYPT_BLOWFISH is "strongest algorithm currently supported by PHP" (please do a full text s... |
I am a .net and php developer and since java has been in the news recently thanks to the string of zero days, I decided to brush up on security.
In regards to the java zero days, this question has been very helpful: Security of JVM for Server. My understanding is that the vulnerabilities exists on the java applets run... |
(I'm not sure if here is correct place for asking this question)
I've come across a strange virus that changed contents of all MS Word, Excel, PowerPoint and image formats. It places this ASCII string in all files:
Because fuck you! Thats why
How do I recover information?
Updates
This computer is not mine. (I don't ... |
It is possible for virtual machine guests to bypass the software expiration timers for paid software. This example shows one way to do this on VMWare. A simpler method is for the user to "revert to snapshot".
How can a software publisher still protect their content and enforce the expiration of the software installed o... |
Does the md5 (or any hash for that matter) of a string include the null terminator in its calculations? That is does the hash of a string equal the hash of the sequence of bytes that represents the string minus the null terminator.
|
Are there any known instances of malware persisting past a drive wipe and reinstall, through modified bios, or firmware on one of the machine components?
|
My development server is on my local machine (127.0.0.1). I have created an A record in my DNS settings that points dev.mydomain.com to 127.0.0.1 so that I can use this domain name for accessing my local web app. I know I could use my /etc/hosts file but I feel it is easier to manage by using DNS and when we want to ad... |
Imagine a situation where a rogue CA creates a certificate for your site. Since the user's browser trusts the CA, it will accept the certificate without any fuss. However, the site's real certificate doesn't expire for another year, and there's no CRL entry for it.
Why do we allow the browser to accept such a situation... |
Which algorithm is generally considered to be more secure, and is AES-192/AES-256 still considered to be secure?
After reading this it's lead me to belive that the Rijndael algorithm would be a more secure choice, but is this actually true?
|
The New York Times recently has an article that talks about how scalpers are using bots to programmatically buy up lots of concert tickets, making it harder for ordinary fans to buy up tickets. For instance, it says that they may buy up more than 60% of tickets to some popular concerts, or up to 200,000 tickets each d... |
OK here is a big question. Interpreted languages have many advantages over the compiled languages when it comes to web application.
But what is the ftp server is hacked or the web hosting company views the source of your very popular web application.
Now they can easily see our code. What about trust factor. There are... |
I can only place a single network sensor somewhere within my network. Would it be best placed between the border router and firewall, or between the firewall internal LAN?
|
Whenever I open MS Word documents from my email, they open in "Protected View" with edit options disabled by default.
As per my understanding, the hyperlinks used in the main document would be linked with spyware/malware so enabling the edit option will lead to the spread of malware. I have also heard about Macro virus... |
I get some hash like:
username sowainformix
salt 7307821250330563328
hashed_password HaHvvzanjp_lPZgHLu0KHquN.Q4t98EF48csXk1QTJs
hash_type SHA-256
updated
flags 2
min_change
max_change
inactive
ac_expire
Who can tell me some information about the algorithm of Informix, that I sho... |
Right now I'm setting up an API, to be consumed on the client-side to set up a directory site. I'm wondering what extra steps I need to take just to prevent people from gaining write access to the data.
Some notes:
The API / database has no private information. All information is available and none of it is PII etc. I... |
Is it possible to determine the encryption or hash used if I know the original input and final output? There is a similar post here: Determine encoding/hashing methods used based on knowing the input and output only?
However I feel it is lacking, I mean there must be a way. Is there a program that could take the input ... |
To be clear, this is in the interest of ethical testing to secure an application on behalf of my work.
Now that that's out of the way, here are the details:
Un-sanitised GET params are used in a PHP script to dynamically modify a HTML page.
Only the param substring before a / is written to the HTML file
I am trying t... |
First, let me apologize if any of this question is naive or beneath the scope of this board. Bear in mind the context and that I'm asking as an attempt to exhaust all resources.
Also, I understand if not all of my parameters can be met, but having more facts and knowledge is just as helpful as a silver bullet, as I'm d... |
LinkedIn now offers the ability to take a real user and password from the end user and connect to Exchange Server for the purpose of importing contacts into their system. (To do this yourself, click contacts.. add contacts)
My concern about this is that LinkedIn will not only have access to contacts, but also corporat... |
I'm curious as to just how secure the Windows event log is, and exactly what security measures it uses.
Does it include any defenses against tampering - for example, does it use digital signatures or hash chaining?
|
I ran a vulnerability scan against a server and it is pulling back a lot of Adobe vulnerabilities. I ran a Wireshark capture on the scan but I can't seem to write up a Wireshark filter on the packets. Does anyone know how to look for the versions of Adobe in Wireshark? (or any tool that will remotely pull the versions ... |
My computer is connected to my Netgear router which is also the switch for my network, this in turn is connected to my cable modem which is just a bridging device.
My router is blocking scans and fragmentation attacks but I believe its processor and RAM is getting hammered doing so because my LAN speed is very slow bot... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.