instruction stringlengths 24 29.9k |
|---|
Our client has a Windows workgroup LAN with a UNIX/Oracle database server. We want a tool which can log login/logout details of network users to the database server. The problem is that we can't access the database server, although that would have been the easier solution, due to some company policy.
Below are some fe... |
for a few days I was trying to extract the filesystem of a router firmware. Checking the image that the vendor provides I can see a SquashFS flag on it:
DECIMAL HEX DESCRIPTION
-------------------------------------------------------------------------------------------------------
52 0x34 uIm... |
When developing applications that require crypto routines, I know to use libraries like keyczar and libsodium rather than "raw" crypto routines myself.
However, for the specific case of using AES-CBC symmetric encryption of a block of text, I'm wondering what the pitfalls are that I may unwittingly run into.
(For a con... |
In the file structure of my site, I see some randomly generated files like 'justinbieber.asp', 'justinbiebershoes.asp','guccishoes.asp' etc. I tried deleting them but they are generated again. Can anybody tell me the cause of this? Is my site hacked? How do I get rid of these files forever?
Edit:
I found a site which a... |
A pendrive with some sensitive files were connected to a Windows XP computer. I'll have access to that computer, now it's turned off.
How can I analyze if some or all files from my pendrive were copied, moved or deleted? What kind of programs can I use, what files or clues can I have ? I don't know it log were enable i... |
I'm performing a penetration test against a company. Part of my social engineering procedure is to contact the IT department and try to convince them to that I'm an employee in the company and get them to reveal some sensitive information including passwords.
How can I make my call more convincing by making it appear a... |
In a wireless Ad-Hoc network, I have two computers which communicates in UDP together from 192.168.1.3 to 192.168.1.5
I have a third computer (192.168.1.6) which wants to listen to the packets which are not addressed to it. I can see the packets with tcpdump (which sets the wireless card in promiscuous mode).
To redire... |
Is there a specific location where the passwords are stored ?
Are they salted ?
|
I am testing my website with hydra brute-force software. But accessing my apache conf remote server file, it seems that an attacker can't log-in more a limited number of times per seconds. Does hydra systematically uses the same source IP to log, or can it spoof the adresses in order to attempt multiple logins alledged... |
In Wireless Networks, you can put your wireless card in Promiscuous or in Monitor Mode.
What is the difference between these two modes ?
|
I am interested in using a captive portal on a public network. After reading the wikipedia article and several questions here on sec.SE, I don't understand how I can secure it, or even, if I can secure it.
The bottom line is MAC and IP addresses are completely insecure. Without using them, how can I track my clients?... |
I'm currently developing a small project in PHP, and as it involves user authentication, I've been researching what options I've got regarding hashing. I've settled on PBKDF2 primarily due to it's iterative nature, flexibility with hash algorithms, and extendibility.
What I've been reading is that 8ms (or 0.008 seconds... |
In PHP scripts that communicate with the database I have the username and password to the database in plain text i.e. mysqli_connect('localhost:3306', 'root', 'PASSWORD!'). From OWASP
Do not include any credentials in your source code, including (but not
limited to) usernames, passwords...
How can this be protected... |
I've been playing around with Hydra and DVWA and I've hit a bit of a snag - Hydra responds letting me know that the first 16 passwords in my password list are correct when none of them are.
I assume this is a syntax error, but I'm not sure if anyone has seen this before. I've followed several tutorials with no luck so ... |
I'm in the process of implementing a public API for my web service. Security is a key concern as money is involved.
It seems the current common practice for "authenticating" users in API requests is by confirming message authenticity, having the user send along a HMAC of the parameters (including a unique nonce), for e... |
RE: Duplicate - Did anyone actually read my question? The question marked as duplicate is in no way, shape, or form what I'm asking. I specifically state that a DB compromise must not allow an attacker access. Storing a session ID that can be used to gain access via MITM is worse than no security. It totally bypass... |
i´m interested in how long time it would take for a super computer dedicated to crack
to crack a 100-letter long winrar password. The password contains Lowercase, Uppercase, Digits, Specialcharacters, Punctuation and Brackets by this i mean every character you can see on a ordinary keyboard.
Does anyone think they kno... |
The X509 specification allows a CA to issue a single certificate for multiple hostnames, by using the "Subject Alternative Name" extension.
From the spec:
The subject alternative name extension allows identities to be bound
to the subject of the certificate. These identities may be included
in addition to or in place... |
We're implementing a web application (US) that needs to exchange sensitive information with a third-party web application (THEM). The way we'd like it to work is that an end user clicks a hyperlink, navigates to the third-party web application and magically the sensitive information is available to the third-party web ... |
I have a client (a mobile app) and a server, the app connects to the server via SSL.
The server uses a self-signed certificate, and the client has a file (I'm not entirely sure what, something to do with bks and hostname verification) that validates the certificate.
From what I've read this should prevent MITM attacks,... |
Passwords (passphrases) that are taken from known texts (books etc.) are commonly considered to be weak, but what if they are employed in combination with random stuffs, i.e. in forms of AX, XA or AXB, where X is random and A and B are from known texts? Intuitively A and B should contribute something nontrivial to the ... |
So few days ago I started reading a paper about bypassing SSP/ProPolice and after I read it all I tried the bypasses but they didn't work. This is the code I used:
int f (char ** argv){
int pipa; // useless variable
char *p;
char a[30];
p=a;
printf ("p=%x\t -- before 1... |
Is there a specific location where the passwords are stored ?
Is it depending on which version is used ?
Are they salted ?
|
In addition to the standard best practices on password logins. Has anyone considered a captcha like system but instead of just typing out what is in the captcha, the captcha will be directions on what you must do to your password during the login.
For example if my password was "password123" on the login page if I used... |
I know this is not the right way to store passwords, but I'm asking this from a theoretical perspective:
Suppose a web site's passwords were encrypted with RSA asymmetric encryption and the private decryption key was discarded, effectively making it a one-way trip. Now these password "digests" were somehow leaked.
Woul... |
I have read this paper, which is answers part of the question. It answers, 'open wifi will help increase the spread speed and impact' but what I want to know is, can you 'plant' an open wifi access point/router and when any smartphone connects, it will be injected with botnet/malicious code ? Disregarding OS.
|
While reading about NScan tool, I came across the connect() method. This article about the NScan says
NScan itself is a port scanner, which uses connect() method to find
the list of the host's open ports.
So,
What is this connect() method? Is this method used only in NScan or is it in other port scanners too?
|
We have a scenario where we cannot connect to our stunnel server running on port 443 on our network, which only allows access to Internet via a proxy server. On the contrary, when we tried a SSL VPN using Adito, we could connect to the HTTPS site and setup a SSL tunnel to our remote server.
Stunnel and SSL VPN were ru... |
I'm curious, if one can upgrade the security Skype offers to avoid a man in the middle snooping in on the calls by both parties using a client side plugin? Does one exist for this purpose?
A bit of background reading:
The Daily Dot: New FBI surveillance unit focuses on Skype and wireless communications
RandomBit.net: ... |
I'm testing out John the Ripper (1.7.9 Jumbo 7) on a file containing MD5 hashes without any usernames. I've been experimenting with different rules and configurations – I am currently using a wordlist and I am applying the --rules=single command. As a result of running this command, I'm getting very good results with i... |
It would appear as though the tinfoil hat-wearing were vindicated today, as news broke of the true scale of the U.S. government's surveillance of its citizens' online activities, conducted primarily through the NSA and seemingly beyond the realm of the law.
If the reports are to be believed, metadata about virtually ev... |
I'm an IT consultant. One client has known me for a few years. He wants me to do some work on his kids' laptop again. I'll need to log into his kids' Windows user account. (I'm guessing that multiple kids share one account.)
This time, he wants to drop the machine off with me. He'll want to tell me the kids' password (... |
Would utilizing WebSockets cause an issue with obtaining or maintaining PCI compliance?
|
I am looking for bot detection ideas. I don't mind bots crawling my site, that's cool, the problem is when they start posting stuff. I recently had to erase 400 accounts because of a bad boy like that. I need to disable bots to post any data to my database, that being account registrations, comments, user messages etc.... |
I'm working on a PHP authentication and registration system following the standard salt+password = 'auth hash' and using the plaintext/unencrypted username as the lookup field on the initial query. For the intent of this question, let's assume I'm using a global pepper as well (I'll likely add one prior to finish, so l... |
I recently had all of my WordPress accounts on my server hacked. The only suspicious files I found are listed below. These were the only files edited in the last 5 days (June 3, to be specific).
Suspicious files found:
/host.txt - This file only had the wordpress installed domain name in text (e.g.: example.com)
/wp-a... |
Suppose a server use digital signature to prove the files it sends to users. If someone steals the secret key in the server, what should it do?
|
My mobile phone got stolen few days back. I tried all possibilities to track it, the only option is through IMEI. Can I know which SIM card is running on that specific IMEI?
|
Firstly, from what I have read so far, boolean-based blind SQL injection is when you can't see any error messages and rely on true or false responses to queries to milk the database. For example, you can craft a query that will ask the database whether the the first character of the table schema name is an "E" or whate... |
We are wanting to authenticate the user inside a webapp (JavaScript/HTML inside browser) running on a tablet, but want to be able to do this when the device is offline from the network. I realize this isn't super secure environment already, but I don't want to make it less secure by a poor authentication method.
The en... |
When you enable two step verification for google accounts, you get sent a code by SMS to enter in addition to your username and password the first time you log in with a new device.
How do they detect that you're on a new device? I imagine for security it's probably a serverside generation of a device fingerprint, howe... |
When you put a blank index.html into a given directory on a web server, web browsers will not display a file listing for that directory. But is it secure enough for other purposes other than preventing file listing? Are there other easy ways for unwanted people to display the file list, or access the files, in that dir... |
As a follow up to the Related Domain Cookie Attack question, I'd like to see if there are any servers that are able to detect instances where multiple cookies are sent from multiple domains.
In other words, what combinations of client software and server software can detect when multiple cookies have been issued for mu... |
Sender Policy Framework is a system to detect spoofed emails.
From http://www.libsrs2.org/overview.html :
WHAT EMAIL FORWARDING SERVICES NEED TO KNOW ABOUT SPF
To combat spams, worms, and viruses, the new anti-forgery standard
called SPF adds a layer of protection to SMTP. When an SPF-aware MTA
receives mail (from... |
I need to encrypt a file with a password that can be memorized. So I was thinking about running the password through some rounds of Bcrypt before using it for AES encryption, so every time I want to encrypt/decrypt I want it to take about 10 seconds in my machine (meaning brute-forcing it wouldn't be possible).
What I ... |
Would hashing the result of a regular random number generator produce a cryptographically secure PRNG?
For example, would sha1(rand()) effectively be a secure PRNG?
Assuming it doesn't, how would you go about attacking it?
Edit: Lets assume that by attack I mean determine the next value it will generate after seeing... |
I would like to note that I've read the other question with an embarrassingly similar title and it does not contain an answer to my question.
I have not used CodeIgniter as a programmer, but I have recently performed a penetration testing for a website that was using it. The site was very AJAX-heavy and as far as I und... |
I am currently examining Hypervisor firewalls for my graduate thesis, but I unfortunately don't have a lot of experience with IaaS environments. How are IaaS Virtual Machines network isolated from each other (if at all)?
Do IaaS Providers solely rely upon VLAN's for network isolation? Are IaaS VM's bridged onto a net... |
I have downloaded Arachni package. It is said in the README file to run bin/arachni_web to access to web interface of this scanner.
I run it but no web page appears. I just see these lines:
>> Thin web server (v1.5.1 codename Straight Razor)
>> Maximum connections set to 1024
>> Listening on 0.0.0.0:9292, CTRL+C to st... |
After your death, you want to make sure that a special someone gets a vital piece of information (like the password to your bank account), but:
You don't want anyone else to be able to get that information as long as you live.
You only want a particular person to get that information.
How would you do it?
|
I've heard from several people that Crypto Cat has some security flaws. Has anyone performed an analysis of the system and written a whitepaper? I'm curious what the flaws specifically are and what solutions could be implemented to fix them.
|
People Generally spoof their IP address by using any other device's ip address such as printer, scanner. My question is in this kind of particular attack why we are using these devices rather than traditional ones such as desktop computers, laptops.
I predicted that It is because generally scanners, printers and all th... |
As https://panopticlick.eff.org/ demonstrates, web browsers are very prone to fingerprinting, both active and passive (often you can fingerprint a web browser by simply monitoring the wire).
My question is: Is the same possible with BitTorrent clients?
My research so far suggests that DHT "address" may be persistent an... |
I was wondering about HTTPS security and how easily is compromised. I have already read the similar threads in here, but I have some more questions:
Let's say I am searching something at Google. Supposing I have a malware-free machine(but dont know if someone monitors my wire), who can view those data? Google? The Gov... |
if you change from a malware/spyware infected windows setup to a linux setup will infections migrate to linux if they were on the computer? (when you are hacked/infected is it the op system that is infected or the hard drive?
|
I am familiar with how offline brute-force attacks work. But for online accounts, assuming no social engineering, how feasible is it to brute-force attack a password? For example, is this dependent upon password complexity, or possibly some other vulnerability, like eavesdropping on SSL/TLS handshakes?
|
To help ensure uniqueness of IV's used in a CFB AES-256 cipher, software I know of gathers bits from various sources including the plaintext being enciphered, and runs that through an SHA-256 hash. The resulting 128 bits are used as an IV. I suppose, because CFB is used, this only occurs for the first block.
The plai... |
Our magento based e-commerce site was hacked over the weekend, the hackers managed to gain access to the magento files and embed some scrambled code into the get.php file in the root directory.
I managed to unscramble the code using this resource:
http://www.mobilefish.com/services/eval_gzinflate_base64/eval_gzinflate_... |
In a system where personal information stored in a database is encrypted, but one of the fields only contains data in a minority of cases, would it make more sense to leave the field empty, rather than encrypting an empty string?
On one hand if I choose to leave the field empty, I would be leaking information about the... |
When I learned TLS does not allow a connection to be created until it is has finished a secure handshake, i figured that would make it better for preventing DoS attacks.
However, all I seem to find on the topic is stuff about TLS Renegotiation DoS attacks.
Are either of these technologies more robust, specificially wth... |
I'm not a security expert, so I might be asking a silly question, but let me describe what I am thinking about.
First, I know that a lot of web sites store hashed/encrypted passwords which could be decrypted by brute force attack once the table on db is hacked. Hackers might even be able to use the passwords in other w... |
According to this there are compelling reasons for caution when installing obfuscated binaries. Knowing this, how can running binary blobs as a part of the Linux kernel be acceptable from a security point of view? There exists a blob-free version of the kernel. The motivations behind that project seem to be primarily i... |
(Note: I am not actually planning to do this. This question is strictly theoretical.)
TOTP is commonly used as the second factor in Two Factor Authentication. It is an open standard with available implementations in multiple programming languages and platforms. There is an easy to use client app for both iOS and Androi... |
I would like to obtain a trusted S/MIME certificate, but all the certificate authorities I have asked so far generate the keypair on their server, sign the certificate and send me both the private key and public signed certificate.
It seems to me that this unnecessarily exposes my private key to the Certificate Authori... |
For a web security app I'm working on, I want to list all the exploits that a certain Wordpress version have. (and hopefully the same for other CMSs)
I found some (open) exploits databases that list those kind of exploits:
National Vulnerability Database
CVEDetails
Unfortunately, their exploits database is not really... |
This is causing me major concern and i can understand it is for a lot of users as well. I have nothing to hide but it's the moral aspect of snooping which has ticked me off.
Can a VPN avoid the Prism Surveillance Programme?
Meaning will a VPN prevent the exposure and collection of personal data?
From my understanding... |
Jumping on the NSA/Prism questions bandwagon - There's been a lot more attention drawn to facilities such as Room 641A which indicate that the NSA has been, amongst other things, applying mass intercepts to communications through large US ISPs.
One thing that strikes me as odd in these techniques is that although they... |
I'm developing a simple secure file transfer protocol for a University project using openssl.
I have a Client (let be C) and a Server (let be S).
C will send to S messages like get, put, cd, … and S will send paths or files depending on which messages it has received.
I created a (public, private) key pair. The client ... |
For some time I have observed a strange behaviour when connecting to the internet through my WLAN. Depending on the computer I use on my network, the ISP assigns me totally different external IP addresses (some begin with 81. ... some with 221. ...). I have the strange feeling I get observed. Normally I always had a st... |
What are some things, one should know when setting up an SMTP server, which supports ESMTP protocol. I have disabled relaying, and only enabled TLS authenticated transfers.
when I telnet to my server, this is the reply:
250-mail.example.com
250-PIPELINING
250-SIZE 10240000
250-VRFY
250-ETRN
250-STARTTLS
250-ENHANCEDSTA... |
While I was walking in the street, somebody carrying a laptop bag bumped into me, and the next day I found out that my storage unit was burglarized and some important items were stolen.
My storage unit door uses a magnetic-stripe card without a PIN, and I have several important items there. The items don't include mone... |
All,
I have been googling around for different guides on what files to monitor that people would edit for malicious intent. In my readings so far, i have found the common files people edit.
so far i have found:
/etc/hosts
ufw config files
iptables config files
/bin/login
what other files do you guys monitor actively... |
I have a file which I edit and encrypt following this guide.
I'm a noob as far as security goes and thought that the point of including the line which specifies the cryptographic key to use
-*- mode: org -*- -*- epa-file-encrypt-to: ("my_key_email@foo.org") -*-
would therefore require me (specified by my email) to e... |
The Firewire DMA hack Inception allows for the password checking subroutines on a local Windows box to be overwritten, allowing any password to be entered for a locked computer. My question is about the impacts of this on a networked system.
When logging in to an Active Directory controlled system, the system is given... |
Following situation:
Application is only accessible via HTTPS/SPDY
nginx is sending the SSL session ID to the upstream server
Upon session start I'd like to use the first 128 characters of that string
In PHP: $csrf_token = substr($_SERVER["SSL_SESSION_ID"], 0, 128);
The CSRF token is stored on the server in the user’s... |
My impression is that mature Unix-like operating systems are less vulnerable to trojans that might be present, mainly because of well-debugged kernel code, including correct use of hardware memory protection. Is that correct?
Is any company or group known to be working on hardware architectures aimed at preventing vul... |
As far as I understand Wuala (so called secure cloud storage) is not using the original (user provided) password to encrypt data so what role does original password play in their system?
I think they are generating a symmetric encryption key and somehow encrypt it with the original password, storing it along with the e... |
There is a host of computers and one of them needs to Rsync a specific folder from each of the other computers.
The way its done right now is that this central computer has ssh access to all those other computers.
Is it possible to only gain access to a single folder in another machine?
|
I'm a big time user of cloud based password managing services like LastPass.
But in the light of recent revelations like various government backdoors in popular sites, programs like prism, etc. I'm beginning to wonder if services like Lastpass can be trusted.
To be more specific, how do we know what happens in the back... |
I have Window 7 and believe it has been hacked. On two occasions, as I was reloading my operating system, I got a message that my computer had been counterfeited. I get the impression that my computer is booting up to a remote server somewhere. Occasionally I notice that some directories have a lock icon on it and I ca... |
An example attribute would be "employee is currently located in the US" and is trying to access a document that requires the person to be accessing the document in US territory.
|
I'm studying a one-pass key establishment protocol.
Let be A client and B the Server.
A sends to B:
E_w(t,b,k)
where t is a timestamp requested for freshness, k is the ephemeral key that will be used for the communication.
My question is, what is b? I think an Identifier of the Server, but what is the utility?
I attac... |
I'm trying to set up a listener to check if an application checks the server's certificate (I'm strongly assuming it is not). So I've created a self-signed certificate fake.pem for a listener and am trying to connect to it from the application.
socat openssl-listen:443,reuseaddr,cert=./fake.pem echo
The packets I capt... |
I am looking for a tool for osx, that can convert this raw data in some readable format. Testing my wifi network, I began sniffing my packets, and ran
tcpflow -i en1 -c
I want to get the sniffed html page in a readable format (with tags and so...). How can I do that, knowing I got the following non readable text runn... |
In the light of newly discovered events like the NSA's PRISM program, I'm really concerned about the privacy & security of my personal emails. Chances are governments already have backdoor access built into most of the publicly available email services like Gmail, Yahoo, etc. Even if I'm using PGP to encrypt my persona... |
Is it possible for an ordinary citizen to trace source of nuisance calls to cell phone when caller ID has been blocked?
|
If so why is the difference?
I've tried to google it but nothing relevant was found.
|
With all of these news stories about the government reading emails and snooping information from other sources, what are ways to minimize or eliminate an organization's ability to actually track and measure you?
How to become anonymous through email? IP addresses? Password management?
My initial thoughts were to set u... |
Is it possible to create a secure chat web application using just HTML5 and Javascript?
What possible security holes would there be if the server doesn't store the messages, just relay them using websockets, and the transmission is done over SSL?
What prompted me to ask this was I was wondering why Cryptocat was implem... |
I'm from Canada, and I'd like to know one thing. I know a bug on one website. I'm not sure if it's legal here to search for bugs on a website and NOT use them; instead, tell its company about it.
|
tl;dr: I am wondering what the best way is to check a password when the client does not trust the server.
I know of two common ways servers can check if a user's password is correct:
The server stores hash of password, the client sends the password, and the server hashes the password and compares hash with stored hash... |
Older magnetic storage exhibited some data remanence, so a recommendation emerged to wipe data by overwriting it multiple times with varying patterns — the “Gutmann wipe”. More recent hard disk technology does not require such precautions.
What are similar known results for EEPROM and flash memory (whatever the differe... |
Summary
evil.example.com could use a hidden frame to request a CAS ticket from corporation.example.net, then validate it to receive the username of the hapless user. This effectively deanonymizes the CAS user to any malicious site they visit.
As a CAS server author/maintainer, how can I prevent deanonymization of my u... |
I want to know how phishing and malware protection features are implemented in modern browsers like Chrome, Firefox, IE etc. Are these features heuristic based, or do browsers maintain a list of blacklisted websites like in case of mozilla . Secondly, is there any security standard or specification the browser must be ... |
I want to use Elavon VirtualMerchant to make credit card payments on my website.
I don't want to do PCI DSS certifications other than SAQ A, so don't want to process or store card data on my site. I want to use VirtualMerchant payment forms so user enters sensitive data to fields of PCI DSS certified site.
It seems tha... |
Essentially my question is, why ASLR doesn't randomize text, bss and data regions of the process? Also in the newer version of kernels (such as Linux kernel version 3.x) along with process base, libraries and stack addresses, are the heap addresses also randomized?
|
I am using MySQL AES_ENCRYTP() and AES_DECRYPT() to store sensitive details in a database, and currently storing the key in a php file outside of the web root with read access only. The key file looks like:
<?php
define("CRYPTO_KEY", "SOME-LONG-KEY-HERE");
?>
After further reading, people recommend that the key sh... |
For example as the value of an attribute of a html tag.
<div cookie='id=1234'></div>
Then if the user deletes the cookies while at least one page of the website is open, a javascript script would regenerate the cookie by reading the DOM.
Do you know of any websites that are doing this already?
|
At the workplace I use the organization's network for accessing internet (well that's the only option).
I am not sure if the network administrators monitor what I browse, how frequently I access social media websites. But I guess they would/should be doing.
So here's my question - If I use Private Browsing Mode to acce... |
I am currently in progress in a MS in Computer Engineering program. I am looking around for thesis topics related to security (my specialization is in distributed computing). I've been given some ideas by my adviser such as the impact of security on a business, but I find this a bit boring.
I'm currently enrolled i... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.