instruction stringlengths 24 29.9k |
|---|
I am building a multi-tenant application in a shared database model. I would like to encrypt sensitive data so that only a particular tenant could have access to his data. What is the best mode to keep/provision passwords and where should I keep them in a multi-tenant environment?
|
I have an API that needs user authentication. It is the same way Google authenticates when you use their API to access user data. I really don't want to setup an oauth2 server and I want user to login via OpenId providers (Google, Facebook,...).
Does anyone know if this is possible and secure?
User access client app w... |
SSL and TLS seem to be somewhat interchangeable. So much so that they are generally lumped together ("SSL/TLS") when referring to HTTPS and other services. Its almost as if TLS is version 4.0 of SSL. Why wasn't named that instead of coming up with a different name?
|
The SQL phrase looks like this,
"SELECT * from XX where id = '" + id + "'"
The id variable comes directly from the GET parameter named id.
And the Java web app explicitly disallowed single quote. If a single quote was found in that parameter, the server stop processing it immediately and returns an error.
So, is this ... |
Does a self destructing HDD (physically destruction) that will destroy after a certain time exist, or when I use some software to initiate its self-destruction?
I guess it need to be set in BIOS or on some other "lower" level?
I mean, a HDD that I can buy as a casual customer, and I don't need to be part of a governmen... |
How safe is it to make public the last four digits of a credit card?
Credit card numbers have a specific format. Digits tell you what type of institution issued the card, what bank issued the card, the account number, etc. The whole 16 digits must conform to the Luhn formula, a simple mod 10 checksum.
Attackers hav... |
A question with a similar title has been asked before, but it doesn't answer my specific question here. PCI DSS permits storage of truncated and encrypted data, or hashed and encrypted data. It explicitly states that hashed and encrypted data should not be stored together due to the possibility of breaking the hash.
Tr... |
I will be away for 1 month and during that time period I will have Internet access only via public wifi networks.
I tried finding on the net tutorial on how to safely access and handle paypal payments, but I found advises on either buying a VPN or using Hamachi to access always-on PC. I don't have access to always-on ... |
Our company recently announced a new IT policy that requires encryption of any personal smartphone used to connect to the corporate Exchange server. As far as I can tell, they're using Exchange ActiveSync encryption.
Part of this new policy is that in the event you lose your phone, you must immediately report it to IT... |
I have a business with an open Wifi router for my customers, I was wondering if I put the wifi router on a different subnet would help protect my wired network?
|
As a pretty dedicated anarchist, rule-breaker and malcontent, I often find myself at odds with the British police. I have been the subject of 3 searches (that I know of) over the last 8 months (including 1 warrantless search).
The last search was last week, where, as per usual, my computer equipment was seized. As I al... |
We're using a CMS that has a password reset function that works according to best practices out of the box.
Passwords are stored as salted hashes
Forgot Password works like this:
User enters either username or email address in textbox
System generates an email with a "reset password" link
User has x amount of minut... |
I am trying to figure out a way to limit access and also to establish processes to avoid any and all of my team members to compromise our entire production system.
We have a team of 10 developers, 1 QA and 1 SA.
Our entire team has direct access to our entire production DB for development and for support. They also h... |
I have been thinking of using http://tunlr.net/ for accessing "geo-IP banned websites" like netflix.
However, I have my concerns about safety of using some third party DNS server for everything. So, my question is. Let's suppose I use something like tunlr.net or some other third party DNS server. What "evil" they can ... |
From my understanding, one of the major reasons we recommend Diffie-Hellman Ephemeral (e.g. DHE or ECDHE) over non-ephemeral DH, for SSL / TLS, is that compromise of the RSA private key (i.e. private certificate) would allow an attacker to decrypt previously captured conversations. In contrast, ephemeral should prevent... |
How common is it for a bank to request you to make a user ID as well as password when banking?
Should they simply use a pre-determined number such as your credit-card, or are there advantages to have users make IDs?
|
Why are signatures considered valid methods if identification when paying with a check or credit card? For that matter, what do those credit card readers do with my signature when I sign them? Are they validated or compared to my signature stored at the DMV?
Extra points for people who can point to ways that companies ... |
I would like to implement a fairly basic but nonetheless robust key server for generating and managing symmetric encryption keys. Are there guidelines or best practices out there that I should peruse? What about open-source key servers? Thanks much.
|
If email is not secure while in transit, exactly how can it be read by unintended parties? Can an attacker read SMTP traffic while it is between the sender and recipient?
|
Using the "Console" app within OS X and viewing the "syslog" file I can see the user shutdown their laptop (it was a HALT operation) around 10:22PM. For some reason, 9 seconds after midnight (12:00:09) the machine would boot up on its own. I looked through the log files to see if it was doing something suspicious. I... |
Supposing I have an untrusted guest VM (e.g. I'm running a cloud data centre). If I set the network connection up to use NAT, the guest can still access the internet. But what's to stop them accessing the host LAN too? How does the NAT handling in the VM host manage to distinguish between say www.google.com (on the int... |
In the home automation scenario, smart gateway can bridge the many smart devices with Internet. In many cases, a server's public certificate is stored in the embedded system's ROM during manufacturing.
For example, in case of AlertMe gateway, each gateway device is manufactured with a unique ID. In addition, it also ho... |
I just started to use OAuth 2.0 as a way to authenticate my users. It works great - I just use the identity/profile API of each provider to get a validated email address of the user.
Now I read about OpenID Connect and am a little bit confused.
What is the difference between OpenID Connect and using the identity API o... |
I have a supposed opportunity to get in with an individual with advertising and a side business of his, renting IP addresses. He has asked me to set a dedicated DSL account at my house. Is there any risk for me? I have other devices on a separate DSL account and modem. I'm a novice at networking and not too advanced on... |
In a white-box attack context (e.g. PC, tablet, smartphone), there is no trusted entity, which can be used to guarantee some reasonable security. TPM is not considered a solution because it is not available on all platforms and is also disabled by default. This means that it is not possible to store a hash of a resourc... |
I have three participants:
A client A in possession of the public key Kpub
A login server S in possession of the private key Kpriv
Game servers B (B1, B2 etc)
S and all B may share a finite number of secrets before, but not after the exchange. This is basically a scalability measure. If S would need to send data to B ... |
I need to verify that two messages, that came over distinct channels, come from the same origin:
without knowing anything about the origin beforehand
the channels are one-way, only one message may be sent over each
the sender can have recipients public key
The sender has a random number that identifies them. Apparent... |
I'm currently working on a plugin for a CMS which should allow content editors to write inline style tags.
I'm looking for advice / links on how inline styles could be abused.
Part of the reason for the plugin is to allow for a strict content security policy (no inline javascript, but inline styles allowed) - which sh... |
Is there a best practice for security purposes requiring masking of both User ID and Password for online banking? Is there any rationale for or against masking both?
|
A few days ago, my Apache web server was hit with get requests, many of which had strange escape sequences. Can someone read the following sample log entries and explain what the person tried to do, and what measures can be taken to protect against this? Nothing was hacked yet, but I would still like to know the purpos... |
I've been trying to find some information on how Google Chrome detects phishing pages that are not already in their blacklists. The most relevant information that I've found from Google itself, states:
Second, Safe Browsing helps to protect you against targeted phishing attacks (sometimes called “spear phishing”), whe... |
Suppose I have a website such as www.myforum.mysite.com, can an attacker sit down and listen to or scan my forum and get everyones username and password when they try to log in to my forum or site?
Is SSL necessary to avoid such a thing or is there no need for this? I was thinking the attacker can't do anything about... |
How does StrongSwan enable different crypto libraries?
|
I read about Oauth2, mostly in the context of social media service providers like Google, Facebook, Twitter where they
Try to allow access to user data without giving password to third party applications.
Allow to use service without explicitly creating an account (StackExchange allows login through Google, Yahoo etc... |
What is the difference between role-based authentication and identity-based authentication? If a system uses ONLY a password mechanism to authenticate operators (different PIN for Admin and User) it is said to use “identity” or “role-based” authentication?
The system prompts the operator for a password (without asking ... |
In a recent interview† with Dave Kennedy, he in passing pegged the average effectiveness of anti-virus products as detecting approximately 3% to 5% of current active threats.
While AV comparisons will typically publish detection rates, those are always based on historical virus samples which are only mildly relevant i... |
What fraction of software bugs are security vulnerabilities? Obviously, software bugs can be security vulnerabilities -- but also obviously, many software bugs have little or no security impact. Is there any data (or rules of thumb) on roughly what fraction of software bugs are also security vulnerabilities? Or a ro... |
In a recent discussion about a security vulnerability scanner that returns false positives for XSS detection, I noticed that the scanner just inject a string like "this_is_my_string_" (without the double quotes) and if it sees the string in the HTML response it says that there exist an XSS.
Talking with the author of t... |
One of my friends has his own personal email hosting. Let's assume for the sake of argument that it is "secure", meaning that no third party can read the emails in his server either through hacking or a backdoor.
Does this mean that a government email surveillance system really cannot read his emails? Indeed, so long a... |
Have been playing around with the whole DNS spoofing thing. How can a rogue/phishing URL be masked with a legitimate URL in the address bar (without using images)? I was under the impression that this was doable, but so far the only way to pull this off is with superimposed JavaScript images.
I managed to trick my own... |
In a typical home user situation with a PC connected to the internet via a router, suppose we are not concerned with protecting the machine from people with physical access. Does setting a password on a Windows XP user account help secure the machine from remote exploits? (compared to a passwordless account).
With no p... |
I'm developing a web application for hotels that send offers to the guest's hotels.
I want to store the guest's credit card data in a secure way, through a third party service as I don't want to implement a PCI compliant solution myself.
I don't want (and I cannot) process the payments, as each hotel has its own paymen... |
I wrote a simple file encryption program as an example of how to do encryption correctly, but after reading a questions about encryption + MAC, I think I made a mistake by using the same key for both.
I'm about to fix my program to generate a longer key and split it, but I'm wondering, what bad things happen when you d... |
I have several systems that require PCI compliance, all of them are running CentOS 6.4 with all security updates applied daily. However, PCI compliance scanning will often reject detected versions of external services (Apache, PHP, MySQL) that it deems to be insecure. The measurement of security is simply the version n... |
I'm working on a proof-of-concept program to encrypt email with less difficulty for end-users with a process like:
To create an account:
Generate a random salt and IV, and get a password from the user.
Generate a 384-bit key with PBDKF2-HMAC-SHA512 (or maybe scrypt?).
Split that into three 128-bit keys (k1, k2, k3).
G... |
As far as I can tell, an SSL certificate for *.example.com is good for foo.example.com and bar.example.com, but not foo.bar.example.com.
Wildcards certificates cannot have *.*.example.com as their subject. I guess this is due to the fact that certificates like example.* aren't allowed -- allowing characters before the ... |
I'm not sure if the question is eligable for this board as I ask for concrete service providers which can be kind of advertisement, but there is also technical issue involved, so I give it a try.
My concrete scenario is as follows:
I want to use S/MIME for EMail encryption. My decision was made in terms of S/MIME as al... |
I have been browsing the web looking for some help regarding the following issue. I am currently performing an web application penetration test, and I had come accross a beautiful blind SQL Injection.
Using sqlmap, I am able to retrieve the whole database. I would like to jump into the OS level, by using the xp_cmdshel... |
The system of CAs with the root-CAs and their subordinate CAs are IMHO in principle
akin to the system of banks with their main sites and subsidiries. In the case of banks,
a customer of a bank commonly has trust for that bank but not necessarily trust for the other
banks of the world. Anything from the other banks ca... |
Usually when I read about SSL and HTTP it says that the certificate is set up to authenticate that the host is who it says it is. Is it possible to configure the host to prevent it from processing requests except for clients that have previously installed the right ssl certificate?
if this isn't possible, any suggestio... |
On stackoverflow:
'2048 bits, or 1400 decimal digits'
https://stackoverflow.com/questions/11832022/why-are-large-prime-numbers-used-in-rsa-encryption
On Wikipedia:
'RSA-2048 has 617 decimal digits (2,048 bits).'
http://en.wikipedia.org/wiki/Key_size
I don't understand how many decimal digits a 2048 RSA key has.
|
Can anyone please tell me which option is better, I mean whether I should encrypt my data at virtual machine level or guest level in cloud? I tried to investigate it but did not find best solution so i thought to start discussion here. Actually I was to protect my guest data but I am not sure what are the possible pros... |
I work at an IBM lab and there are some security policies that I do not understand the point of. When I ask why we do them my boss simply says it's policy and avoids answering the question.
We must keep empty drawers locked
When we leave work we must lock up writeable media
We must lock any notes up and erase white bo... |
Trying to understand how and why any virus, malware, worm or code injection is successful after all in a Windows Portable Executable format.
I was going through the PE structure documentation, Part 1 and Part 2.
What is it in PE executable, is it the headers, sections that let code injections happen? Why are they vulne... |
I'm currently struggling a little with the security layer of a web service I'm writing using WSS4J and CXF.
We obviously do not wish to store plaintext passwords in our backend, but would prefer to persist only salted hashes.
The service specifications, however, are preset by our client (who will be using the service t... |
Is it possible for a (malicious) (hardware) USB device to access all the data that is transferred through the USB bus and then read/store this information, essentially sniffing all transferred data? Or is the USB bus switched and only sends data to the correct recipient, i.e. only allowing the intended recipient to rea... |
One of the security expert here suggested me to apply encryption at guest(virtual machine) level rather than applying at host level with good reason. Before applying that I want to know what can be the possible performance issues in both cases. Will performance be worst in guest level encryption or vice versa? I want t... |
Assuming your PGP private key is protected with a password, and it "escapes", but the password does not, how worried should you be?
Obviously in the real world, you would immediately revoke the key and generate a new one. But on a theoretical level, does having a private key, but not its associated password, get you an... |
On one of our websites, we are seeing this code is adding itself. I tried to figured out but no success. One thing I have noticed when I removed the html, head and body starting tags, it's gone.
Our website is on wordpress but when I create subdomain with non wordpress this code is also available on the page so it's n... |
I've created an RSA key. Created a CSR. Got it signed and now I have my certificate. It's for a webserver running https.
The public key can be generated from the private key, so I guess I don't need to keep a separate file with the public key in unless my application needs it (it doesn't).
But can I just delete the CSR... |
Is using IPTables to only allow traffic between two servers considered an acceptable practice? For example TCP traffic on a defined port. I realize this is referred to as an ACL but how secure is this when an encrypted transport is not available? If it is not recommended, why?
|
On a normal data exchange of the address resolution protocol (ARP), which steps of the exchange are affected by the ARP Poisoning attack?
If anybody would be able to answer this or show me a link that can help, it'll be very much appreciated!
|
I recently starting using the Calomel SSL Validation plugin for Firefox to test the SSL security on the sites I visit. When navigating to American Express' log in page, I noticed Calomel reports the encryption is "broken and insecure".
I then ran an HTTP analyzer on the requests from the HTTPS AmEx log in page and foun... |
Where I'm currently working there is a policy where various assets (including laptops) have to be cable locked and in the tech support department we have so many transient assets it's becoming unfeasible to manage all the keys. I need a new system and perhaps purchase equipment.
The problem is it's the nature of the de... |
I remember all the passwords (and variations of passwords) that I use for various sites online. The problem is not that I forget a password, but that I forget which password goes with which site. And one usually only gets a few tries logging in somewhere.
So my idea is to create a file with the various places. For each... |
I am going to develop a simple CMS site on top of Google App Engine using webapp2. I am wondering how avoid malicious data scrapers to deliberately get the pages in order to make the app consume traffic beyond the free quota (I think 1GB per day) and hence cause Google to charge me for the junk traffic. Thanks
|
I have been advised that mixing firewall rules that are both stateful and stateless can lead to trouble when it comes to troubleshooting. Is there any truth in this?
Take the following two rule sets (iptables):
iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT
iptables -A INPUT -m conntrack --ctsta... |
This question is inspired by an experience I had today with online banking, as follows.
One year ago I opened an online deposit account. (Without naming the bank, I will say the company is currently a constituent of the Dow -- in other words, not a fly-by-night institution.) Earlier this month, they launched a redesign... |
Windows can do things that require UAC without prompting for UAC.
For example, Windows can change any file in C:\Windows without requiring UAC. Could a malicious program "pretend" to be windows and do the same kind of thing, but with worse results?
|
Has anyone noticed exploits involving the use of "X-Actual-Recipient" to covertly divert e-mail from an intended recipient to someone else? I have been told that only someone with root access on the recipient's mail service provider could insert an X-Actual-Recipient directive into the header of a message. It is not cl... |
Recently I came across a site called SecurityTube.net, which has a ton of amazing security stuff. I'm following their Python Scripting Expert videos which are totally worth it. I also came across the concept of 'Crypters', which evade antiviruses and can be used for Metasploit payloads.
I decided to ask here because t... |
I'm learning C in a tutorial and have reached the point where the term "buffer" s being mentioned regularly.
It has also mentioned how certain bad programming practises involving memory can be "vulnerable to buffer overflow". It defines the buffer as:
A small amount of memory reserved for the input source
and though ... |
As I watch a lot of tutorials, read answers, and just in general interact with the IT security community I find that a high percentage of them know assembly. I'm wondering why this percentage is so much higher than everywhere else and why it is so important to know?
*Side note - I'd imagine it is very hard to understa... |
I use ionCube to keep the code I write concealed for my customers.
If I would store a password inside the code and compile (not encrypt) it with ionCube encoder, would it be possible for a potential hacker to get hold of that password?
For example, is it possible to reverse engineer parts of the PHP code, that was comp... |
I created a Wordpress theme for my client. He told me that he scanned my theme with a vulnerability scanner, and that it has security issues with the GET and windows.location methods. Is this really insecure? How can I fix this?
The errors look like:
Risk Factor:
Medium / CVSS Base Score : 4.3(CVSS2#AV:N/AC:M/Au:N/C:N/... |
If you write a PHP application, where you have to deliver the compiled code to the customer, how could you include a functionality to send encrypted data from that application to others, and include those needed keys inside the code, so the customer cannot reverse engineer it so easily?
Just including the keys in the c... |
I'm starting a new website project where I have many passwords (root,sql,wordpress, etc).
I have a USB stick encrypted with TrueCrypt with a file of all my passwords. But I also want to be safe if i open the file and type it into the Internet. Of course it would be possible to store them on some paper but some kind of ... |
I was wondering!!
I like configuring my router so that I can access it over the Internet
even when am not home.
What are the most critical risks if a hacker got my router password?
|
How can Content Security Policy (CSP) significantly reduce the risk and impact of XSS attacks in modern browsers?
Is it possible to circumvent CSP in order to execute XSS?
|
Just gonna make this clear first, this is for class!
I have an assignment that requires to 1) modify a web server written in Java to accept file uploads and to use this to deface the homepage (did that no problem).
2) Take root ownership of the machine.
I'm hitting a bit of a wall with the second part. I used curl wit... |
I encrypted a file on my mac using openssl
openssl aes-256-cbc -a -salt -in one.jpg -out two.jpg
now if I try to decrypt it like that:
openssl aes-256-cbc -a -d -salt -in two.jpg -out one.jpg
on my original machine, it works fine. But if I perform the same operation on another machine, it doesn't work. Why is that?
|
Can I say that 128 bit using AES provide more security than 1024 using RSA?
|
The internet has many articles recommending ways to close a browser popup window without infecting your computer with malware. I've seen click the red X, use ALT-F4, go to the windows task bar, right click on your browser's icon and do a close window, click file-exit in the browser. I believe all of the above recomme... |
When testing live web apps that allow / encourage security research & disclosure should I be routing my traffic through Tor?
Is there a good reason not to?
Does it imply a certain malicious intent that I'd be trying to mask the source of my traffic? Or is it a good precaution to take in case someone misinterprets my p... |
Almost any browser addon/extension that I install on my Chrome or Firefox (be it Firebug, RESTClient, ...) warns me, saying:
It [the add-on] can:
Access your data on all website
Access your tabs and browsing activity
Now, practically speaking, I have no time (or the skill) to read through their source-code and veri... |
What are the potential vulnerabilities that might arise if a webpage is only partially encrypted.
I can think of 2 possibilities:
You can change the non-encrypted parts of the page (HTML, CSS, Images, JS) through a MITM attack to partially change the look of the page.
You could inject malicious JS through the insecur... |
I've been writing a high interaction honeypot which has required some interesting design decisions, for instance I want the honeypot to get attacked not the underlying infrastructure/ software. Fun stuff.
However I've got an issue and was looking for best practice advice.
Basically the honeypot is an insecure web appli... |
I've been looking at the EMV draft specification (pdf) for using Eliptic Curve Cryptography in payment cards instead of the currently used RSA. One thing I've noticed is that they've moved from using the RSA Digital Signature Scheme (DSS) giving Message Recovery to ECC DSS with Appendix. My question is why would this c... |
I recently stumbled on this post: XML Encryption Broken, Need To Fix W3C Standard
I was expecting to find lots of information online about it, but there isn't actually all that much detail. Since I'm using WCF with lots of message level security SOAP, I thought I popped the question.
Is the mentioned post the real thin... |
While I was studying the time consumed by some methods I found that encryption take more time than decryption. Is this right? I am using AES (the same steps will be taken during the enc and dec)
|
I am working on a Windows application that utilizes a MySQL database for its user authentication and data storage.
Within the application, the highest level of user (Administrator) can create and delete other users. Because of this, the application itself connects to the database with a MySQL user which has SELECT, INS... |
Problem
I'm trying to sell the idea of organizational patch/update management and antivirus management to my superiors. Thus far, my proposition has been met with two responses:
We haven't had any issues yet (I would add that we know of)
We just don't think it's that big of a risk.
Question
Are there any resources av... |
Exploiting the DVWA's stored XSS option, I'm using the following payload: <iframe src="url">.
I'd like to know why do some sites work but others don't when using this payload.
For example: <iframe src="http://usatoday.com">works, however <iframe src="http://google.com">does not work (it shows an empty box). This site d... |
ASP.NET offers an extra layer to protect your application from XSS attacks and injection in general which is called Request validation.
On their official topic, they mention that:
Even if you're using request validation, you should HTML-encode text that you get from users before you display it on a page.
Assuming tha... |
Is it possible to inject XSS in a JavaScript variable if a website inserts HTML encoded, user input in a double quoted string?
var userString = "perfectly "safe" input from user?";
|
Are there anti-keylogging programs that can keep you safe while you are using a public PC terminal? Do they exist and what are these? I like to know that I am safe when entering data on a public PC for example from malware or keyloggers, who knows where it has been. Or else, how can I keep my personal data safe when us... |
I am looking for a tool to rate the configuration of SSL/TLS settings in the browser. I have found a few sites that enumerate supported ciphers and the preferences but none of them seem to provide judgement for what should be enabled and what should be disabled. In fact most of the sites I have stumbled across merely s... |
After a lot of googling and searches on forums, it was apparent that certificates like CEH and CISSP incorporated a lot of theory in them and were useful as an added for a job.
Are there any certificates that give real-time practice with the system during training or a learning process that includes practical working (... |
So I read another post here about fuzzing local standalone applications. I have understood how to exploit basic buffer overflow vulnerabilities in standalone applications and am now looking on how to find such vulnerabilities.
I downloaded the CERT FOE framework, but found very little documentation on it. In fact, the ... |
I have a question regarding network firewalls and TCP traffic. When a firewall rule is set to block either inbound traffic, outbound traffic, or both on a port, does that only apply to initial communication requests?
Just as an example, if I have a computer that has outbound port 80 blocked, but inbound port 80 opened,... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.