instruction
stringlengths
24
29.9k
I had to add 'insecure=very' configuration to a SIP trunk on my freePBX box for it to register. Does this configuration open possible threats for my infrastructure?
I am looking for ways to Authenticate on a mobile device. The mobile application is connecting to a WCF Service which in turn connects to a Database. Before the application retrieves any information from the WCF Service I will need it to authenticate against a different server which would use AD Records to confirm the ...
I recently learned about the existence of the Evercookie. Is there any way I can prevent an Evercookie being placed on my computer without disabling JavaScript or cookies entirely? I don't want tracking cookies constantly on my machine that I can't get rid of. Apparently even though my antivirus finds and removes th...
I'm a web developer with a login system (in PHP) that I would like to extend to allow those with a smart card to sign into the system. But I have no idea where to begin and I don't have a massive budget to just throw at this. I'd like to keep the cost under $50. Here are a few areas I've researched but can't seem to...
I don't know if I should ask this question on security.SE or stackoverflow, so please move my post if necessary. I want to store my (C#) application data in a way that the user cannot read or modify it. If I encrypt the files, I will need a password to be able to decrypt them when my program has to read them. Where wou...
Consider an election web site that will be used for voting over the Internet. What steps should the administrator of such a web site take to provide adequate security against man-in-the-middle attacks and spoofed web sites? Can anyone suggest a checklist of top-priority items that should not be overlooked? Assuming t...
Whenever I read about a cybersecurity competition, I always wonder, since almost everyone involved is a security professional, can such exercises ever be realistic? One of the weakest links in any information system is the user; how can a competition simulate the effects of social engineering? Do they find a bunch of r...
Some security vulnerability scanners as Ratproxy detects a vulnerability called "MIME type mismatch on image file". Thanks to the CAPEC project we can see that Cross-Site Scripting Using MIME Type Mismatch is possible, but the explanation shown is not clear for me. What I undestand is that where this vulnerability exis...
Up to a few days ago, I always received Facebook auth tokens from numbers +181338477XX, except a few times from +85294985XXX. Problem is that lately I've been receiving codes directly from Italian numbers, which wouldn't be strange since I'm located in Italy, but there are two odd things: 1. they are much much slower t...
I live in a rental house, and use the house-owner's wireless network to connect to the internet. The owner can see who is connected to his wireless network and I had a few questions regarding this matter: Can he see which websites I visited? Can he crack my email password and see my email contents? Can I know if he is...
When SSHing to a host that has been compromised (or outright replaced using the stolen server keys) by an attacker with root permissions, what is the worst that can happen to the client? It is well known that X forwarding poses some risks, and agent forwarding is obviously a bad idea in that scenario, but are there mor...
I have a website and I have email reports when 500 errors occur. Many of these errors occur because "hackers" are running scripts to look for common vulnerabilities or access to admin interfaces - attempting to get to pages such as /admin/config.php. This has happened 3 times in the past week and I can see that one's I...
I'm trying to gauge password strength assuming that the attacker has a hash of my password. Can anyone cite some realistic contemporary rates at which someone could perform various hashes? I know most sites use unnecessarily weak hashes like MD5 of SHA-1, so rates for these would be the most relevant.
It is common knowledge that password cracking attempts can greatly benefit from specialized hardware such as large clusters of GPUs or FPGAs. Are there any implementations of the commonly recommended password hashing algorithms (PBKDF2/bcrypt) for common or popular programming languages and/or frameworks such as .NET t...
I have read some times that hashing is a one way function, that is you can make the hash of a message, but you can't recover the original message from the hash, just check its integrity. However, if this were true, why can we decrypt MD5 hashes and get the original data?
This is the situation: client-server login is done via SRP3, hash used is single SHA1. Client cannot be modified but server can (open source). Because of this, all hashed passwords in the database are only SHA1. Server got hacked several times already and whole database leaked, passwords were broken. To my understandi...
Just some time ago I had this unusual popup from Malwarebytes Anti-Malware (MBAM): I did a quick Google of the IP address and found this thread where the OP is complaining of MBAM blocking svchost.exe from this same IP. I am wondering why is vmware-hostd.exe` connecting to that IP? Earlier today I had this: after wh...
I tried downloading and updating malwarebytes from https://www.malwarebytes.org but their certificate seems to be incorrect. This is the warning: This is probably not the site you are looking for! You attempted to reach www.malwarebytes.org, but instead you actually reached a server identifying itself as gp1.wac.e...
Making it simple (no security at all), when we want to detect whether or not a GET parameter is vulnerable to SQLi, we could just type a ' as the value (?id=') and check if there is any error. (No blind SQL) But in the case that the parameter is sent using a POST method, how can I detect if it is vulnerable? And then h...
I have been asked to test out any security holes for a company. I created an email account that looks similar to their IT department's address and everybody is complying :) I have only asked them to send me some simple things like their WAN IPs. I want to take it a step further though, perhaps some backdoor access? or...
I'm a trainee who writes malware samples to later be tested. A basic piece I wrote in C++ kills explorer.exe, taskmgr.exe and repeats this every second. I used a bit of code to add my application to the registry under HKLM\Software\Microsoft\Windows\CurrentVersion\Run so that it runs automatically when the test mach...
U-Prove allows for anonymous authentication and authorization without the involvement of an IdP. When a client generates a presentation proof 3 values can be optionally included, but I can't find intuitive documentation on how or why to use them. The values are: Pseudonyms Commitments Scope I examined the sourcecode...
The U-Prove SDK has the following comment: (link) // 1: CA-RA split (a party trusted by the issuer provides the gamma value) Given that the Gamma value (if provided) overrides the Attributes value, does that mean the issuer can be separated into two IdPs that can have dedicated purposes? e.g. One secure IdP to veri...
I know that a hash is a one-way-function and that therefore there isn't a reversal function. By reversing a hash I just mean to find some plaintext that gives the hash. I think that I understand that to reverse a hash one can use dictionaries, that is, one generates a list of pairs of plaintexts and hashes. Given a ha...
In one of the U-Prove documents, I remember reading something that compared Subgroups versus ECC and it went something like this (paraphrased): Subgroups Requires a bigger key to achieve equivalent ECC security Unclear: What aspect of the UProve protocol does this affect? When compared to ECC, I'm not sure if this gr...
I am currently a programmer with 4 years of experience. In the past I have done tech support for a few years and was an instructor at an IT trade school for a few years. I have a good balance of IT knowledge and would like to enter the world of security particularly doing penetration tests as an external auditor. I'm ...
I have two pieces of ciphertext encrypted with a stream cipher using the same key. How do I recover the plaintext of both ciphertext messages without knowing the key used?
I created one software which written in c#.net and when i created setup file .exe file will be the output but in this .exe file is ex tractable by some software and easy to access the codes.How to prevent this?
There is a way to retrieve a router admin password without hard reset? I'm loggen on LAN and know username and local ip address... TKS
In a dual-boot environment (windows? and linux mint 15) What would be best best way to prevent access to the linux partition(s) when the system is booted into windows 7? The goal would be to prevent windows malware from modifying the contents of the linux partitions while the system is booted in windows. Both systems...
I am using AES and CBC to encrypt a local files separately. I don't plan to transmit them over any network. What are the risks of using a fixed IV for my encrypting application? The only problem I can see, it is that two files encrypted with the same key would have the same starting characters if both plain texts start...
My attack machine is running Kali and the server is running CentOS 6.4 with DVWA. I'm trying to write a shell through an SQL injection. The payload is ' UNION SELECT '', '<?PHP system($_GET["cmd"]); ?>' INTO OUTFILE '/var/www/html/dvwa/shell.php';# When submitting I get the following error: Can't create/write to file...
I'd like to find out the IP address of a given .onion address. Is it possible for me to simply assign an exit node (that I control) to my client and just monitor it to determine what IP address that exit node uses? If no, what are other solutions in determining what the IP address of the .onion is? If none of this i...
As I understand it, with any encryption system based on a trust chain / CAs (eg SSL, TLS, S/MIME), it would be possible for a nation-state adversary (such as the NSA) to compel the CA to issue them with fraudulent certificates enabling the adversary to perform a MITM attack against all visitors to that website. Is this...
I'm setting up a node.js server: https.createServer({ ... ciphers: 'ECDHE-RSA-AES128-SHA256:AES128-GCM-SHA256:RC4:HIGH:!MD5:!aNULL:!EDH', honorCipherOrder: true }, app).listen(443); This is a able to achieve a SSLLabs A rating, which is good. Now, it appears that all of the negotiations in the handshake s...
I am facing a big problem since there are many msbuild.exe files in .Netframework and winsxs folders and I don't know if it is required to set all of them as trusted in the antivirus. The path changes server to server and hence it makes life harder! Thanks
There are quite a few SSL certificate companies out there that offer free email S/MIME certificates. There are also paid versions as well. I need about 6 email certificates for some company email addresses (the company has yet to start trading hence the requirement to keep costs low) so what advantages does getting pai...
If I were to write a web application using openpgp.js (http://openpgpjs.org/) for creating PGP encrypted/signed messages and if I stored the user's private key in localStorage, would this be vulnerable to the same complaints about JavaScript cryptography on Matasano's webpage (http://www.matasano.com/articles/javascrip...
There are several papers from 2012 that say it's possible to factor several moduli by factoring shared primes. The link above includes python sourcecode to verify and test for this fact. Given this knowledge, what should I do as an IT Security Professional with regard to all my server's SSL certificates, and other enc...
I'm working on an automated backup solution to protect my files on my Linux servers. However, I'm not sure about how to securely encrypt the resulting archives. I am using 64bit linux, and I am looking for a solution that would have a separate key/password for each individual archive backed up. I've seen solutions suc...
I'm trying to think of a good security method to secure a web service consumed by a google extension. As known, google chrome extension's source code is open to anyone. My extension mainly deals with the user's fb content and sometimes send requests to the web service. How would it be possible to secure the web service...
Does Apple maintain the security of the Ruby implementation that comes by default in OS X? I recently heard about CVE-2013-4073, but when I ran "Software Update..." on my OS X Lion box, it didn't update Ruby. Also, I've never noticed a Software Update that changed the Ruby that OS X supplies. I checked the version of R...
I was wondering what you guys are doing to detect attacks like Pass-The-Hash within your network. I've read about Breachbox http://www.darkreading.com/monitoring/researcher-to-open-source-tools-for-find/240156749 and would be interested to hear your thoughts how to detect the attack. For those who haven't come across...
I want to know more about clickjacking. I have been reading an article about clickjacking, where the HTML code to test for clickjacking vulnerability was provided. I tried the same as described in that article, and I got the message “You’ve been clickjacked!” at the top of the page, indicating my web application is vul...
In my application first time I have given valid credentials and then login into application at that time i saved the response using burp tool.next time i have given wrong credentials and click login button,while clicking login button at that time i changed the response using burp tool.finally i have logged into my appl...
As the exploit isn't sent to the server (using #payload), can I say that a DOM XSS is a vulnerability in the browser rather than the web application?
We have to build a product that will have a network. Users will be able to connect to this network by downloading a client. However, before allowing them to access the network we want to check if their hardware, for instance, supports certain characteristics. I had thought that by sending to our server the result of a ...
My application has a user management module which uses fields like username, first name, email-id, password,.. . I tried scanning these fields and filling in malicious JavaScript to test for cross site scripting like anil<script>alert(1);</alert>. The modified data is stored in the database, but when I refresh the page...
I've been trying to research malware techniques lately, as malware analysis intrigues me. I've got a pretty heavy background in .NET, and based on my more than seven years experience in .NET, I feel that I could write a pretty complex piece of malware rather quickly if I was so inclined. Everything that I've seen sugge...
I ran openssl speed on my Ubuntu computer. Some results: Doing md4 for 3s on 16 size blocks: 9063888 md4's in 3.00s Doing md4 for 3s on 64 size blocks: 7105157 md4's in 3.00s Doing md4 for 3s on 256 size blocks: 4507884 md4's in 3.00s Doing md4 for 3s on 1024 size blocks: 1809773 md4's in 2.99s Doing md4 for 3s on 8192...
I have a virus scanner installed (avast on Windows 8) and it blocked the access to malicious websites in Chromium. There's no proxy activated in Chromium so how is the scanner capable of rejected a connection to some websites? Is there some kind of kernel module that has a low level access?
I've been searching Google for a bit and I'm having difficulty finding credible White Hat forums. For example, when one wants to discuss bitcoin they go to bitcointalk, is there a white hat equivalent? Edit: My goal is to assemble an appendix of communities that an individual learning about cybersecurity can integrat...
OP: I'm curious how else an actor seeking to identify someone online could accomplish this task besides just using an IP address. What methods would they employ? What knowledge must they have of the target? What technology would they need access to? Edit: Let's break identity into domains and lets discuss each domain t...
I have logged into my application and I received a session token. When I navigate to another tab, the application pertains the same session token. Is it normal behavior that the session token does not change when you navigate to another page after logging in?
After my house mate experienced consistent ping spikes whilst gaming, he asked me to check/set the wireless router password. I did and I found two intruders from obviously nearby. How can the data they send to my wireless router be captured for analysis?
I thought that all key derivation functions would do a key stretching phase, by iterating some kind of process. But I can't see that process in HKDF. HKDF doesn't do key strengthening? If I have a passphrase as input, and I need, let's say, 1024bytes derived from this passphrase (some bytes for encryption, some bytes f...
Web browsing metadata provides a lot of insight on person's habits. How can I reduce that insight? Is there something like "Detachment 2702" (http://en.wikipedia.org/wiki/Cryptonomicon) plugin for browsers? Some basic things adversary should not be able to do: serve reliably relevant ads/product/youtube recomendatio...
Can I use a Tor browser session and a regular Firefox session side by side without corrupting the security of the Tor session? E.g. when I download a new Eclipse version or when I'm searching for code snippets I think the NSA won't find out more than if I'm a mediocre programmer or not. But for more sensitive searches...
I need help listing the specific risks of embedding an HTTPS iframe that enables credit card checkout inside of an HTTP page. Are there security issues with embedding an HTTPS iframe on an HTTP page? provides some high-level concerns, but I'm looking to be as specific as possible about potential attack vectors. Click o...
I've seen data on the cost of a breach including lot of surveys and research by Verizon and the Ponemon Institute. But in terms of an actual vulnerability, what are the factors to consider to determine the cost? Few things I had in mind are: Risk factor: SQL Injection vs Reflected XSS Cost to detect manually or by a...
I am developing a Google Chrome extension which encrypts/decrypts emails for Gmail users. So, I detect encrypted emails when the user opens an email on using tags. Once an encrypted email has been detected, the user is asked for a password and the plain text is displayed in a pop-up. I want to use Jquery UI dialog to d...
I have downloaded the "Clickjackingtool" and done the followings steps. Step 1:- I have opened the clickjackingtool and paste the URL and click GO button(Image 1). Step 2:- I have opened the clickjackingtool and paste the URL and set the width and height and click GO button(Image 2). When i set the frame size(Width a...
Risks of backdoors in software are evident ever since Ken Thompson's Turing Award Lecture "Reflections on Trusting Trust". Certainly this applies to hardware just as well. Limiting ourselves here to software, what are the genuinely good solutions of protection against backdoors? Owing to certain recent reports in the m...
We facing slowness issues with out Web start application when upgraded to the Java 7 update 25, (very slow to open the login screen). After our investigation we see that now Java security has enabled the OCSP and CRL check for signed certificate and this is what is causing slowness as each jar download is making a tri...
I wonder, if I am allowed to develop an SSH client for distribution through Apple App Store without breaking any export regulations? I don't really know much about the encryption algorithm. Below is a screenshot from App Store:
I have different results as of my open TCP ports. When using nmap -sS 127.0.0.1, I get some 5 usual open ports, but when using osx built-in tool as stroke, I get those 5 ports plus 5 extra ports. How can it come ? first nmap -sS 127.0.0.1 Starting Nmap 6.25 ( http://nmap.org ) at 2013-07-03 12:00 CEST Nmap scan report...
I sell some .pdf files online. But soon they are all over the web because after someone buys the .pdf and puts it on various websites. Is it legal to hack those websites? Are there other ways to protect materials like .pdf files?
I've found two mentions on Wikipedia that Elliptic Curve Menezes–Qu–Vanstone (ECMVQ) was dropped from NSA's Suite B however they seem to imply different reasons. One mention is preceded by talk of how some Elliptic Curve algorithms are covered by patents which suggests this is why is was dropped however the other menti...
I suppose that if a file is executable by anyone, in other words, if a user has enough permissions to execute an executable in Windows, it will be possible to read the contents of the executable and copy it in another directory in one way or another. However, I have tried to give just execution permission and not read ...
According to something I spotted something in a set of directions for connecting to a hidden wireless network from windows 8 found here (located under Step 1 > "Troubleshoot connection problems" > "How do I connect to a hidden wireless network?"): A hidden wireless network is a wireless network that isn't broadcasting...
I am planning to develop (make some minor changes) to asymmetric encryption (i.e. RSA). Any suggestions please?
I have a few private repositories set up on GitHub for some of the projects I am working on for my company. These applications connect to databases and I have database authentication credentials stored in a file called config.php (in plain text). How risky is this, given that my code is on GitHub's servers? I know that...
I would like to use the best algorithm to hide 1024-bits inside an image. What is the best option to implement this? Is it by using Steganoraphy (i.e. LSB) or Digital water marking?
What is required to become HIPAA Compliant? Do I need to take a test or do I just need to follow a certain set of guidelines? EDIT: Just to provide my background. I am a small IT Firm and we would like to expand into the medical field and work with all the smaller medical places.
What would happen if a kernel-level process sets some of its memory pages as PROT_NONE with mprotect and another kernel-level process tries to read one of these protected pages? What is the equivalent of mprotect in windows? What are the main differences?
I am working on creating an android mobile application which needs to connect to a server from time to time. The application makes use of sensitive data which I would not like to get into the wrong hands. So far I have been able to come up with a model to protect sensitive data both on device and server. However I am s...
If someone got hold of the hashes of all passwords for a website, how do they get passwords from the hashes? As far as I can tell, everything seems to say do a dictionary attack/brute force attack, but if you did that how could you know that you extracted the password? Wouldn't you still have to test all the passwords...
In pharmacy the safety of drugs is under fairly tight control by national authorities, e.g. FDA in US. The risks of patients taking drugs are thus very effectively minimized, though understandably impossible to be reduced to zero. Which national authorities similarly control the safety (security) of software and hardw...
I am using the Stanford Javascript Crypto library and i'd like more information about it. 1.) I have an ASCII text and a random 128-bit key. I want to concat those two things, so I convert the ASCII text into hex and then to a BitArray. Example : var text="kheil" ; var textHex=asc2hex(text);var textBitArray= sjcl.codec...
I have some malware on my computer at work that I'm having a hard time getting rid of. I'm only interning there over the summer, so I'm guessing that it was downloaded by the previous user because I noticed it as soon as I opened my web browser for the first time. Whenever I'm using a web browser (this occurs on all we...
I was wondering if it is at all possible for a hacker to perform an SQL injection attack using just letters and numbers. For example, let's take a look at this PHP code which uses regular expressions instead of the builtin PHP functions: <?php $id = preg_replace('/[^a-zA-Z0-9]/', '', $_GET['id']); $result = $mysqli->qu...
At DEFCON 17 (2009) Moxie Marlinspike gave a talk were he was able to use a malformed certificate signing request to get SSL certs signed for domains he doesn't own. The gist of it was that for the common name put something like www.bank.com\0.iownthisdomain.com with \0 being a null byte. Is this attack still generall...
I'm working on an implementation of HMAC-SHA-256 in classic ASP (legacy code). I currently have it working, and the resulting values are correct compared to some test cases I came up with along with test cases found in RFC4231. Does NIST have published test vectors for HMAC-SHA-256? And where would I be able to find th...
openssl ca -revoke signed/0A.pem -config caconfig.cnf What does this do which requires the CA's private key? Does it do anything except updating index.txt?
If I use JQuery from Google APIs: http://ajax.googleapis.com/ajax/libs/jquery/1.10.1/jquery.min.js Is there a privacy risk to my site? E.g. does this link enable Google to read my pages, track my site usage, etc.?
My question is about the difference between usual security expectations from a web application (intended to browser navigation) vs SOAP web service. For a web application, an acceptable solution for secure communication is HTTPS (tranport level). However, in large companies, the web application is behind a reverse-prox...
We have a client facing web site. A certificate is required to land on the login page, where upon you then need a username and a password to further login. System has Apache servers acting as load balancers up front, and then Tomcat servers serving the application. All OK so far, but we now want to provide file upload ...
I am going to protect an image file (ancient manuscript) which will be available online for everyone to download. I want to protect the file in these situations: When it's on the server, I need to protect the file from any alteration (I mean should previously apply digital watermarking to the file and digital signatur...
A layman's question: If I don't err, with remailers or analogous systems one sends a message to a node of a chain of nodes, which collectively perform the entire transmission. However, the message to the first node of the chain must IMHO contain a valid IP-address of the sender. So, if the agencies have access to that ...
This is past experience, and is not the case anymore since I am a programmer now and have nothing to do with security anymore. However in the past I had a person constantly trying to make comments of spam type (definitely a troll and not a bot). So I have blocked his ip. Lo and behold he comes back saying that I can't ...
If you have large distributed network that is known as being infected with viruses and etc.. and you cannot format the computers becuase its large scale. What are the best ways to handle this situation from the cso viewoint?
I am using the BigInteger Javascript library to create a symmetric key using Diffie-Hellman protocol. I want to create 128,160 or 192-bit keys. After some research, I have found out that I should use Diffle Hellman 2048 bits, but : What bit-length should be the D-H parameters : p, g, a (and b) ? I am currently using p...
I recently logged in to my Facebook from other PC and got notice. Please login from the PC you previously logged in. I want to know what information Facebook uses to determine this change? I changed my ip to previous PC IP and got same thing again. Then i tried to make my UserAgent same as previous PC. But again Same. ...
Is it possible to check the integrity of the GnuPG files inside of the downloaded installation package of GPGTools? I know how to check the integrity of the .dmg file (compare the SHA1 hash), but I don't know how to check especially that the GnuPG binaries inside of the installation package is safe? Of course I know I ...
I have an Android device with the Gmail app installed. This app can access the mailbox so there must be some kind of authentication data stored on the device (possibly an application specific password?). Is there a way to use the installed Gmail app to recover/reset the password for the associated Google account or set...
Is it possible to protect my site from HTTrack Website Copier or any similar program? Without setting a max number of HTTP request from users.
It seems like there is no practical way to verify the full integrity path of precompiled and packaged software? I can check the downloaded package itself by hashes, but I have no verification if the compiled binaries really represent the public source code? Is there not even a theoretical solution for this problem? In ...
I asked my host to switch on the log file, and it have increasing a lot since then. Its have been increasing with 700 mb for the last week. It’s filled with error messages related to Mod Security. Most of them look like this: [Thu Jun 20 16:49:01 2013] [error] [client 157.55.33.88] ModSecurity: Warning. Match of "withi...
We currently maintain several linux servers and are looking to employ sub contractors. However, we wan't to keep tabs on who does what on each server. Other then creating sudo accounts on every server, is there a centralized user management system that a user must log into and then are able to access or send commands t...
I need efficient way(possibly as strong as AES or AES itself) to enrypt (only) aplhanumeric data and get out only alphanumeric data, using some known library (i don't want and intend to implement AES myself).