instruction stringlengths 24 29.9k |
|---|
Me -> Node A -> Node B -> Node C -> destination
The documentation on Tor always states that only the exit node C can see plain text data. How is this possible without me talking to Node C directly?
If I have some plain text data, and want to send it encrypted to Node A, I'd usually do a Diffie-Hellman key exchange, and... |
I'm looking for some standard pieces of advice on how to integrate external JavaScript into a website. For example, on mywebsite.com:
<script src='//externalsite.com/js/script.js'></script>
The thing is: if externalsite.com gets hacked, mywebsite.com is at risk. And this JavaScript does not require access to the myweb... |
Could somebody tell me what can this malicious code do?
I see that in the beginning it turns off the error reporting and logging.
Then something with get post method and files stuff. But I am not sure.
Could somebody help me explain what this script does?
@error_reporting(0);
@ini_set("display_errors", 0);
@ini_set("lo... |
So last night I was using openVPN via my personal cloud server to watch some Hulu.
About 15 minutes into the movie I noticed my network stats were
download: ~250 MB
upload: ~1.8 GB
This is according the the openVPN software.
I paused my movie and the download stopped but my upload jumped from 1.8 to 1.9 and stopped at... |
Suppose I use a proxy and a different virtual machine each time I visit a particular website, will a website still be able to detect my MAC address and/or uniquely identify me?
Assume that the website owner does privacy violations like inserting cookies etc.
|
I've been made aware on many answers and some comments that an attacker can read memory while a system is still running by attaching some sort of connection directly to the ram bus.
Can linux inherently detect an attacker connecting to the ram bus in that way?
If not, is there any open source software with this capabil... |
My ruby on rails web application is hosted on Linode. Linode opened a ticket and blamed my Linode server for attacking other servers. The logs revealed that it's a SSH brute force attack which originated from my server. I have studied my source code, checked if there is any malicious script on my server but I found non... |
Let's suppose I have a web server X, listening on port N for instance and configured as a Tor hidden service.
How and where is implemented its' hiddenness from public access?
|
When I attempt to log in to my bank, an SMS code is sent to my phone. I then type this nine-character code into the bank's Web site, to login to my account.
Is this vulnerable to attack, without hacking the bank's software or server, or without access to my telephone/SMS communications?
How could it be exploited? So fa... |
When someone go to eBay's website, they use an unencrypted connection between their PC and eBay's server. If they sign in, they are redirected to a secure site identified by its certificate and may submit login credentials. After the user is logged in, they redirected again to the insecure connection.
I'm wondering... ... |
I've tried to secure all information going to the server to make sure there are no SQL injections.
However there are new folders on my server with weird names.
One of our online services is such that with certain inputs, directories are made with that name, but only after using mysql_real_escape_string.
These are the k... |
I've been looking at SSPI recently, as it is used for authentication in a variety of Microsoft products. From the looks of it, it's based on GSSAPI and provides an abstraction for wrapping various authentication mechanisms (e.g. NTLM, Kerberos, etc.) for use in application protocols.
What attacks, if any, are possible... |
What are the benefits of a single sign-on implementation from the point of view of security?
From my point of view, if the account is compromised the attacker has access to any resource, so according to this, SSO is far from secure.
|
I'm testing a web application and I found a XSS vulnerability. I can break a tag and inject some code to the application but nothing potentialy dangerous for the client.
The application has a filter wich detects special characters and some strings, as well I can bypass the filter for the string recognition injecting nu... |
I want to do an asymmetrical file encryption:
openssl genrsa -des3 -out private.key 4096
openssl rsa -in private.key -pubout -out public.key
openssl rsautl -encrypt -pubin -inkey public.key -in a -out b
But I already have a key pair in my ~/.ssh directory, so how do I use this instead of generating new keys? Simply sw... |
No matter what technique is used to store encryption keys & logins, it seems that all roads lead back to program memory (as far as I know), as an unencrypted version of the keys & logins will be stored there to perform encryption and logging in, and an attacker can physically read from RAM.
Is this true? If so, is the... |
OpenIOC.org has several schemas defining Indicators of Compromise.
The Schema is defined here:
http://schemas.mandiant.com/2010/ioc/ioc.xsd
While under IndicatorItemContext/search says it is xs:string, the actual list of search terms is listed here:
http://openioc.org/terms/Current.iocterms
Is there something similar... |
I have a new WordPress website that has been installed on a server not managed by me. Its admin has enforced a few rules in order to increase security, I'm not entirely aware of its entirety but it includes:
Placing apache's www folder in a separate, noexec partition
Running apache as a user with read-only access on t... |
In the context of protecting access to local encrypted files or devices against a determined (and competent) adversary, is there any reason to believe that the use of a key file actually presents a significant hurdle that a strong (pseudo-random, long) password does not?
I've been using them myself for a while as a poo... |
Suppose this is the only mitigation used on a server:
Dim IDPerson
IDPerson = Request.Querystring("id")
If IsNumeric(IDPerson) = True Then
IDPerson = IDPerson
Else
IDPerson = 0
End If
IDPerson is then used to write the query. The "id" is the GET variable.
I know IsNumeric will accept Hex as numeric.
Could a whole qu... |
IPSec is most commonly used to secure VPN traffic. Where else is this protocol suite used? What else can it be used for?
|
A very sensitive application has to protect several different forms of data, such as passwords, credit cards, and secret documents - and encryption keys, of course.
As an alternative to developing a custom solution around (standard) encryption and key management processes, the purchase of an HSM (Hardware security modu... |
From the FreeBSD handbook:
Even with the logging facility enabled, IPFW will not generate any rule logging on its own. The firewall administrator decides which rules in the ruleset will be logged, and adds the log keyword to those rules.
So my question is, should I enable logging to any rules for IPFW for sshguard-i... |
My company has some real security issues and I am wondering if using Chrome OS can be some solution to my problem. Typical Windows computers seems all to vulnerable to attacks from malicious images and websites which download keylogger software and remote access systems.
From my understanding, Chrome OS does not allow... |
According to the OWASP testing guide a CSRF token should not be contained within a GET request as the token itself might be logged in various places such as logs or because of the risk of shoulder surfing.
I was wondering if you only allow the CSRF token to be used once, (so after one request it's invalidated) would t... |
I was reading about Windows Local Policy of "Shutdown: Clear virtual memory pagefile". I need some clarification on this brief policy description:
What do it mean by operating system that allow booting to the other.
Why OS has to make sure that the system pagefile is wiped clean when its shuts down.
How can a unauthor... |
I just bought a Galaxy S4, and it didn't connect to the WIFI in my house (I have a 14$ router). After a bit of testing, I've decided to leave my connection open without a password, but added the devices manually to the whitelisted MAC addresses.
Is that safer than having a regular password, that can be broken with br... |
While studying a security course I have been asked this very question:
Why are CRL periodically renewed, even if there are no new revoked certificates to add to the list?
Honestly I can't find the answer, if any of you could be so kind to shed some light on it, I would be very grateful.
|
Work provides people from my company that 'work at home' with a separate VPN router which will be plugged into my existing home router.
They have also asked for the router model, username and password etc of my home router. They said that this info was needed so that they could program it to work with the VPN router s... |
Two organisations I frequently deal with (including my bank) ask me my password to authenticate myself with them... well... they ask for "random" characters from my password.
As I understand it, this means that the password cannot be being stored salted and hashed? It has to be being stored in a retrievable format. Whe... |
Why does this vector :
<svg><script>alert(/1/.source)</script>
works in http://jsfiddle.net/ZgPY4/2/ and
this one
<script>alert(/1/.source)</script>
doesn't. How is <svg> making it work?
|
After reading the question and answers of this and this, I left with an overall impression from the last one that zips were considered not safe and insecure way of sharing data.
I still think password-protected compressed files can be made secure. So let me get this straight with this very
Specific scenario
You're u... |
Basically what the title says, you'll find many buildings have these types of door locks
which can usually be opened by using a RFID token. While this example photo is glass, lets assume that the door is steel/unbreakable.
In the even of fire what does/should happen to them?
From a security standpoint, any condition ... |
The main reason why reusing a password for different accounts is not recommended is that if the password is compromised, all accounts are compromised.
This question is about vulnerabilities other than that.
For example you may want to generate two different PGP keys, one for signing, one for encryption, that you gener... |
Compressing your files as tar.gz or zip for storage or backup saves space and is faster than handling thousands of files. But it looks like small corruptions in the archive, for example because of damaged media, may make irretrievable many more files than the one damaged by a single bad block.
Is that true and should i... |
For example this one disables function if AdBlock plus is detected, and it works. Is there a way to circumvent this?
|
This appears to be hot news today, Motorola announced a form of pill that a user can swallow which is activated and powered by stomach acids and transmits a signal back which can be used to authenticate a system via "an 18-bit signal".
Is this some form of RFID? If it is, how is this any more secure than any other form... |
These are some ways of disposing of hard drives: Special firms, degaussing, hammering, pulling apart.
Can this be accomplished more quickly by drowning it? Fill a bucket with water, maybe add some aggressive cleaning products, throw the drive in, let it sit overnight, then dump it in the garbage.
Will the data be irret... |
When you use a GPS device, satellite signals are used to give you your position. It seems reasonable to assume that information about the device you're using may be transmitted to the satellite as well.
The question is whether this information is logged and if it can potentially identify you.
It seems that if you regi... |
Should I escape numbers in django to prevent XSS attacks ?
The numbers are stored in db and of "decimal,float,..." type.
Should I escape these values or is it useless to prevent XSS attacks ?
|
For example:
Accessing a website with javascript enabled can expose information such as browser, fonts and local time. Can it, theoretically, expose your Windows or Linux username?
Will saving a file or attaching a file (as normally done by webmails) expose your Windows or Linux username, by accessing your directory t... |
We have a firewall policy that prohibits MS RPC through firewall, particularly from internet facing DMZ's back to the internal network. There is a business unit requesting an alternative method to transfer their files to the internal network to make files available to users on the internal network.
Anyone have any good... |
The two words have a similar meaning and I'm having difficulty adequately explaining the difference to someone. You verify a person's identity by having them show a form of identification, such as a passport of driver's license. You also check for signs that the document is not a forgery. If it all checks out, you'd le... |
So I'm at place A, see this sign:
and I'm writing the fingerprints to a piece of paper (this website is just an example):
Ok. Then, I go to place B (other country, etc.) then I check this site. The sign (for the self-signed cert) shows up again, OK. But: I get my paper out, and check the fingerprint of the site. It... |
I like the way that OAuth/OpenID can authenticate/identify a user from another domain, but only if the other domain allows it (presumably on the user's instructions).
I would like to do something similar, but using CORS AJAX or an alternative like JSONP. The problem is that when using a whole-page redirect, the "login... |
A friend told to me the following:
I don't use Anti-Virus software at all, I am just careful about where I go and what I click on.
I've also heard this from other people as I've repaired their PC's and cleaned up the malware/viruses they've received from browsing to the "wrong" sites. Finally I found this blog post ... |
While studying computer security at university I have been asked this question:
There are three desirable properties for cryptographic hash functions: Preimage resistant, Second preimage resistant, and
Collision-resistant. For each of the following applications of hash
functions, explain which of these three propertie... |
Hello i want to know if this auth token is secure enough for a site of millions of logged in users:
BAQAAAT7Y/BHPAAaAAJ0AAaAKLZowMDAwMDAwMAFkAAJTii2aI2EACAAeUdCHGjEzNjk4NDUyOTl4MzIxMTMzOTcyMjA0eDEwMXgyWQAzAAlTii2aNjUwMTAsSVRBAMsAAVGpASIxABAADlOKLZpyb2JlcnRvcGFzc2VyaQBAAA5Tii2acm9iZXJ0b3Bhc3NlcmkA8wAiU4otmiQyJFA3enZoS2x... |
I have a question on the following scenario:
Lets say, we have a normal LAN network with 192.168.1.1/24 gateway, DNS, DHCP servers all running on 192.168.1.1 ;
There is only one client: 192.168.1.200.
Now, for me, as an attacker, is it possible to use (any) IP ( just assume ip pool is 192.168.1.x is allowed), which ... |
When performing a security audit of one's own site is one of these methods of testing generally considered better? Would I be wasting my time by doing blackbox testing when I have access to information about the underlying system or are there benefits to blackbox testing one's own site?
|
So, in my brief research in PHP security, I have been guided toward two important functions to remove forbidden characters from forms. One being "htmlentities" and the other being "mysql_escape_string" - what I am wondering is if there is a common way for hackers to insert malicious forbidden characters in to the forms... |
So I did the ultimate silly thing: I lost my domain admin password for my Server 2008 R2 box.
Sure, I could just re-install but that's going to be a huge pain. I tried rebooting with the Windows Install DVD and replacing utilman.exe with cmd.exe, but switching to C: displayed no files.
I can still log into the machine... |
To establish trusted SSL connection I need to create a certificate request. For example, if I use openSSL I can do it by the following command:
openssl req -new -key privkey.pem -out cert.csr
Anyone can do it.
I wander how CA ensures that a certificate request is coming from me?
Maybe somebody else create a certifica... |
I have the following system:
2 application servers. At the beginning is installed the first server and later is installed the second one.
A client access from a browser to both servers
Application servers communicate between them using Client Certificate over HTTPS
Requirements:
A browser should trust application ... |
I have a question about a encryption protocol, if it is good or not.
Bob and Alice communicate over an insecure channel( a possible attacker can listen). An expert suggests the following protocol to confirm that they have the same segret key without revealing this segret key to an opponent.
1) Alice creates a random st... |
I'm taking over as a system administrator on an existing LAMP server for a site with a number of individual applications. The person I'm replacing has done a pretty good job with security as far as I know, but I'd like to take any preventative measures I can.
With the OWSAP top ten web vulnerabilities as a good place ... |
For an online chat that allows basic HTML, what happens if they leave an open way for a potential hacker to execute javascript on everyone who is in the chat?
What is the worst thing they could do?
|
Lately I've been thinking to get rid of some old smartphones; among them an Android device and a Blackberry. Not selling or recycling them is the ideal solution, however, I still would like to know how can I minimize the possibility of recovering data from them after the obvious wipe-out/reformat.
So my questions are... |
I'm a newcomer to cryptography and was wondering how often systems are attacked by cracking cryptographic systems in the real world. Is it practical to study cryptography as a hacker?
|
I'm running OS X 10.8 and have Tunnelblick set up so I can connect to my OpenVPN server at home. I've also used this at $WORK in the past.
When I'm out and about and want to jump on a public network, I'd like to prevent any network traffic before the VPN is connected.
However, when connected to known "safe" networks, c... |
It is 'common knowledge' that unpatched, older browsers and operating systems are dangerous, but when I tell people that they should not do their online banking in IE 6 on a pirated XP service pack 0, nobody listens. Is there a website URL that I could point people to which will demonstrate an 'attack' but actually do ... |
With the proliferation of low-cost automated CAs what can be done to mitigate the attack of someone doing a spear phishing attack to get a login to our webmail system, then using an automated service like RapidSSL to issue a new certificate for widgetco.com to OverlyTrustingReceptionist@widgetco.com?
I am sure some eye... |
I'm thinking of following OWASP's AppSensor project to build application-level intrusion detection into an existing open source web application.
I think there is some value in using AppSensor to detect generic, automated attacks. However, AppSensor seems less valuable against attacks directed at this application beca... |
I've read that every good web application should hash passwords. I found many articles about hashing.
So I started implementing hashing on my website and then I asked myself why should I do it? When a user sends his or her login (name+password) to the server, the server loads the password of the given user name from da... |
What would be the difference between Adobe APSA and APSB security bulletins / advisories?
|
I'm currently in China, and accessing the Internet via a VPN in the USA. When I access Google maps or other location-based web services, they all show my location as that of the VPN server. However, when I accessed a web site - http://www.ikea.com - the site redirected me to the local China site.
I've installed NoScri... |
If I copy a username/password from an email and paste it into an FTP client or an online form in the browser, can keyloggers capture this private information?
And does it make any difference whether using:
CTRL+C and CTRL+V
vs
Right-click > Copy, Right-click > Paste
Or are both equally vulnerable to keyloggers?
|
I am attempting to analyse my WiFi network with on Mac OS X, is there a tool to reassemble TCP stream from Wireshark capture. I would like to see the entire HTML pages that are passing through the WiFi
|
Using tools like Wireshark, it's possible to decrypt SSL traffic as the client by logging the (pre)master secret, without using a mitm attack or the server's private key. But I found that for some websites, the ssl session id is being stored by the server (evidence: the ServerHello message contains the re-used session ... |
OK: a forward. I am not a security expert. I am one of four kids at a high school working on a project. I don't have any experience with real-life situations where security is a concern.
I have a project that's for automated program grading. Students upload code and we compile and test it. Obviously, there's a threat o... |
I'm using phpass (bcrypt) to hash the password and SSL when it's transmitted, and using PDO (with PHP) to stop injections, is it worth padding the password, so that if the user enters "123456" as the password before it's hashed a prefix and/or suffix are added, so for example
123456
becomes
abcZYX123456£%$£@&$%
(pre... |
I am following an online class from a local institution. Recently, I've noticed they don't hash passwords because they sent me my password by e-mail in clear text.
The website has a lot of personal information so I've decided to test how secure it is.
After a few minutes of testing the private message system, I've fou... |
I know that this question is a little bit on the side of Opinion/Discussion, but I think there's a provable answer to it.
I think the common view of "Security Through Obscurity" is that the security will only hold up as long as an attacker cannot guess the way in.
In environments where massive attacks or common attack ... |
I wonder how SQL injection works through URL with SQL in the parameter. Assume I have a database with a table named mytable. When I get an ID from method POST I put it in this query:
SELECT * FROM `mytable` WHERE id='POST[id]'
Even if the user puts SQL like:
SELECT * FROM 'mytable'
It became something like this:
SEL... |
So, reading through this article: http://crackstation.net/hashing-security.htm it says that storing the salt is fine in plain text because it renders the lookup/rainbow tables ineffective. I get that, but why not generate the salt from the submitted password and then never store that separately either?
Something like t... |
In a registration form the user is asked for his e-mail address. The e-mail address will be validated for the correct format (e.g. at the least contains @) and I'm considering checking if it's already registered. Would this pose a security risk as it would allow attackers to verify e-mail addresses of users with accoun... |
How can I attach a crlDistributionPoints parameter when signing a CSR I've generated as follows:
openssl req -new -key /root/ca/private/private.key -out /root/public.csr
I usually sign with:
openssl ca -extensions v3_ca -days 730 -out /root/ca/certs/public.cer -in /root/public.csr
When I attempt to use -extfile to as... |
we have a server, on which we host about 30 sites.
these are test sites for our customers. most of them are not even indexed by google.
some run on php, some on nodejs, some on ruby.
all of them that run on php have been infected.
on 27 and 28 of may in a lot of directories (not only the root ones) the following where ... |
One-Time Passwords look like they can play a helpful role in a layered-security system, yet their use, especially paper-based TANs seem like clients could be vulnerable to getting out of sync with the servers. Is this a common problem with One-Time Password schemes you've seen implemented and, if so, are there best-pr... |
In my school everyone must change their password every six months.
The new passwords cannot be the exact same as the old one, this make sense, however many of my peers often complain that they need to use a different password almost entirely because they cannot choose a new password in which only a few characters diffe... |
I'm looking into setting up a forum for a writers group I attend; this would be for sharing stories amongst ourselves. In order to retain first rights, this has to be within a hidden forum, where the wider internet can't gain access to it.
Assuming that the server it's hosted on is trustworthy, are these forums actuall... |
For one who doesn't know, .html_safe is rails method, which outputs strings as part of html document.
The problem is that string is user inputed. What did I do to prevent some bad actions - regexp inserts after every < or > invisible symbol, which breaks all tags, that could be part of html of document.
But still feel... |
I regularly perform pen-tests against web applications, operating systems, etc. Occasionally, I'm luck enough to do a 'red-teaming' exercise and get to attack at all conceivable points of a network (people etc as well) which is good fun and usually goes quite smoothly.
However, a client recently mentioned that they'd b... |
I have been reading about certificates and often is said that self signed certificate should not be added to the trusted authority store and even if you did, remove it after usage immediately.
MSDN How to: Create Temporary Certificates for Use During Development
Be sure to delete any temporary root authority certifica... |
I have my kids cell phones attached to my router. What can I install to view what they are browsing and the media they have? I want to make sure my kids are safe
|
In RSA encryption it is said that ensuring the authenticity of the public key can be as important as the protection of the private key.
An effective way of doing this is to have key custodians receiving the key (KC2) manually confirm the fingerprint of the public key with the original owner (KC1) of the public key via ... |
I've been studying the Websocket protocol (RFC 6455). Section 10.3 specifically talks about frame masking, which is prevents cache poisoning from http proxy servers.
How does frame masking prevent cache poisoning? How is a proxies cache "poisoned"? Why is the masking only applied to messages from the client to the serv... |
I used openssl to create a X.509 certificate but I don't quite understand the relationship between a X.509 and a SSL certificate. Are they the same? Is a SSL certificate just a X.509 certificate that is used for SSL?
|
So, I am trying to obtain a cookie without the secure flag enabled over HTTPS.
After reading about it, I came across an answer:
You visit https://secure.example.com/ which drops a cookie on
your browser.
You then visit http://www.msn.com/ however a MITM inserts:
<div style='visibility:hidden'>
<iframe src='http://s... |
We've got plenty of argument that CAPTCHA can easily be beaten, and that they introduce usability problems to users. People say that because they can be broken, they shouldn't be used.
So if you've chosen to deploy CAPTCHAs on your forms, do you keep track of the number of users who fail (and who are therefore either r... |
I'm investigating device encryption for my Android, but what is the impact on internal storage and external SD?
Also, if the device is used as a flash drive or livedisk (DriveDroid), will I run into an issue accessing storage from another connected device?
|
I'm working on a web application along with a web API and I've been warned against what seems to be a basic vulnerability: not checking that the user making an action has sufficient privileges on the resource being accessed. I can't find resources or any best practices.
Here's a scenario:
The URI to access a bank acc... |
We have a single switch that routes all our different offices around the country using Meraki VPN. We have a VM on the switch (to the extent it can see all subdomains and different IP addresses in our other offices) running Kali. I'm trying to figure out the best way to pick and choose our networks in which we want to ... |
I was scanning a machine from inside the same LAN which is running and up to date Windows XP Home Edition which I suspect may be running some malware.
The target machine has an up to date antivirus running (AVG free), but has no other firewall than the one which Windows provides, which provides an option to configure t... |
I am working on a very old and messy site, which doesn't have a CMS, or a database. However, it has a lot of .htm and .php files. I need to add some PHP code to some of the .htm files, but want to leave the URL as is.
Long story short, is there any problem, or security concern, when enabling PHP script execution for .h... |
I read some slides from the Black Hat USA 2012 conference, and I stumbled across the term
non-linear/backward overwrite, mentioned on slide 5 of the Exploit Mitigation Improvements in Windows 8 by Ken Johnson and Matt Miller, Microsoft Security Engineering Center (MSEC) (PDF) presentation:
Im... |
Quick Question
Is it possible that I could call a mobile number, but have the call forwarded through another number active on a different phone that someone else has? I have had unlimited access to the other person's phone prior to this.
Is there any way of that happening without the person with the other phone realisi... |
I am trying to improve the user experience on registration by not requiring the user to retype their password if validation on other fields fail. There are a few ways to implement this, example using session cookie and storing a hash of the password on the server side. I am exploring this alternative of storing user pa... |
I have a website which is managed through CPanel. I know that remote database connections are disabled by default and I have tested that it is indeed disabled.
I know that many people have some of my database passwords, but they cannot connect to it. Should I be worried about it? I know they should not know the passwor... |
Is it stored in plain text or not?
Where can I find the file that contains the username and password for my accounts in Ubuntu 13.04?
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.