instruction stringlengths 24 29.9k |
|---|
This answer describes how DNSSec might permit "Zone walking"... where a bad guy can extract all the DNS records from a DNSSec enabled zone. NSEC3 is an update that prevents this. (See bottom of this article)
How can I determine (externally) if a zone is using NSEC or NSEC3?
|
My question is, for a "normal" site, what do you think is enough to secure against methods used by "script kiddies"? For example, SQL injection, XSS, and stuff like that.
Same question for password hashes. Do you think it is enough to hash with MD5 + random salt, or minimum SHA1 + random salt, or should something even... |
I read somewhere that adding a salt at the beginning of a password before hashing it is a bad idea. Instead, the article claimed it is much more secure to insert it somewhere in the middle of the password.
I don't remember where I found this, and I cannot find any other articles saying the same thing. I also don't unde... |
Am doing a Firesheep Demo in a few weeks as a security awareness project. However I can't seem to get it working, and I'm wondering if it's just because the handlers it ships with are now outdated because everyone has fixed their sites.
I am going to continue to troubleshoot from the promiscuous drivers etc. side of th... |
Can someone whose Linux system is under DDoS attacks give me exact data on the effects of the Low Orbit Ion Cannon (LOIC), the High Orbit Ion Cannon (HOIC), Slowloris, PyLoris, Hping etc. on memory use under Linux? Basically, I'd like timestamped physical memory, buffers/cache, and swap usage statistics in 1-second int... |
Does someone know of a project or a way to "fingerprint" an access point (a router)? Fingerprinting should be done irrespective of broadcastet BSSID and ESSID. BSSID and ESSIS may be included in the fingerprint, but they should not be the only indicators.
|
I was checking the article hosts file on Wikipedia, and I found this:
Blocking access to servers of unwanted content by redirecting them to the local host (127.0.0.1) may have security implications. As 127.0.0.1 is accessible only by the host itself, connections might be trusted. The link to be followed may be crafted... |
Opera blocks the user from making http requests over very low ports (below 1024). Why does Opera not allow the user to override this setting?
What is wrong with running a web server on, say, port 70 and why does Opera feel the need to prevent the user from doing this?
|
I believe that most people here are familiar with OWASP and their Top 10 project. When it comes to information systems these days it appears that there is a big focus on web application security and rightfully so. Recently I was tasked to perform a Risk Analysis on an Information System (SQL Server 2005) that has user ... |
I don't know if such a question is allowed on this site, sorry if it's not
For educational purposes I am asked to write a small virus running on Linux, which should just be able to inject itself into other binaries (but not anything else).
I thought of injecting its code with a technique described here: http://www.secu... |
Guessing they're the same, but not 100% sure.
UPDATE: My mistake for not clearly stating the it would be assumed the keys per-file, or for a whole volume, would be the exact same -- not to mention the encryption method use would be the exact same. The only difference is if it's executed on a per-file basis, or on a col... |
I just ran nMap against my IP address and got the following result:
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23/tcp open telnet
80/tcp open http
443/tcp open https
3389/tcp open ms-term-serv
Which of these are ok to have open, which aren't? If I close 80 and 443 will this afftect my abili... |
I'm configuring Snort on Windows 7 with the help of this guy and I'm stuck at the following line in the config file:
List of DNS servers on your network.
I have multiple, how do I separate them? Spaces, tabs, commas or something else?
|
How do I find an encrypted disk to buy?
What factors should I be aware of in selecting one?
Is there any proof that buying one likely to draw any attention?
How do I know there's not a backdoor?
|
From my point of view and with my rather poor knowledge of iOS, the principle of a sandbox in iOS is the following:
each app and its data is installed in a private area within the partition, but each app runs under the same user 'mobile'
the sandbox only allows restricted and controlled access to system ressources (i.... |
Is it a good and/or frequent practice to sign a file (with your own private key) without encrypting it (with the intended recipient's public key?) I haven't really been able to find a direct answer to this question anywhere.
|
Is doing something like this
sha256(sha512(password+salt))
Less secure then just doing
sha256(password+salt)
I've heard it will increase collision chances.
I can think of 3 reasons to do this
A hacker is less likely to have a rainbow table for it
sha256 returns a shorter string then sha512 (save space in database)
I... |
As a spin-off of my question on "Advice on buying an encrypted disk" -- and in an effort to address the question "how is hardware based disk encryption better?" -- I've started a new question.
My understanding is that hardware based disk encryption is more secure because the keys are embed in the system, require physic... |
Thinking about adding a fingerprint based authentication layer, but then I recalled the MythBusters beat fingerprint security system episode -- is this a common issue, and if not, how do you tell if a fingerprint authentication system is easy or hard to bypass?
|
Is ezNcrypt's transparent encryption technology the only way to get a big boost in performance? Are there other good solutions out there we could be looking at for encrypting the entire database with marginal impact on performance? From what I know. a lot of Linux MySQL databases are left unencrypted because of the per... |
Recently, I have been getting a string of emails from yahoo with people trying to create accounts or add email addresses @mydomain.tld to their account. I was wondering if anyone else has seen this type of behavior and if they know what type of attack or scam the attackers are trying to implement by doing this?
The ema... |
February 14, 2012 UTC:
Yesterday, I connected to a website of a VPN provider for which Firefox 8.0.1 on Windows 7 Ultimate x86-64 stated that its' SSL certificate is invalid. I saved the received certificate in a PEM file and e-mailed it to the site admins several hours later (they don't have a contact e-mail address, ... |
One of the most frequent errors that DOM Snitch finds in sites is Untrusted code. He finds it in google.com for example. Here is an output of this tool:
Is it a vulnerability?
Edit: This report of DOM Snitch was caused by enabled Skype Click to Call extension that sends requests while page is loaded
|
When you have a website that's hosted within the Tor network and one accesses this website with a Tor browser, does this person still use an exit-node ?
Or will this be an encrypted connection between the server and the client's browser?
(I'm talking about the Tor encryption that's used, so intermediary nodes can't de... |
I am working as a tester now. I am planning to move to the domain of security such as a CEH or CISSP. But many say that to be a great hacker you need to know at least one programming language well. I already know a bit of Java. But I just wanted to know which language is closer to network security and related domains. ... |
I have a file - test.pem - with the following contents:
-----BEGIN CERTIFICATE-----
MBIwEKAOoAwwCqMIMAZhBEFCQ0Q=
-----END CERTIFICATE-----
openssl asn1parse -inform PEM -in test.pem -i returns the following:
0:d=0 hl=2 l= 18 cons: SEQUENCE
2:d=1 hl=2 l= 16 cons: SEQUENCE
4:d=2 hl=2 l= 14 cons: con... |
I saw this question:
Suppose a university with address block 12.1.0.0/16 has a link
connected to AT&T, where the AT&T router forwards packets destined to
12.1.0.0/16 to the university router. Suppose the university router has three forwarding entries: 12.1.1.0/24 out the link to the math
department, 12.1.2.0/24... |
Why can't a password hash be reverse engineered?
I've looked into this ages ago and have read lots on it, but I can't find the explanation of why it can't be done. An example will make it easier to understand my question and to keep things simple we will base it on a hashing algorithm that doesn't use a salt (LanMan).
... |
DuckDuckGo is a search engine that has a Tor Exit Enclave and hidden service. This site is focused on the safe, secure searching of its users.
Since DNS is not used in Tor, it appears that HTTPS is less secure due to its reliance on DNS
Considering that the Tor Hidden Service protocol encrypts traffic end-to-end, doe... |
I'm graduating with my bachelor's in computer science in December, and I'm looking to get an internship in a security consultant firm for the summer, or apply as an analyst/associate in October. I've got a pretty even spread of security topics from academics and independent study (including crypto algorithms, protocols... |
I want to remotely log in to my Linux server with SSH. Public/private key authentication is more secure than password authentication, so I have disabled password-based authentication for SSH on my Linux server.
Now I still need to provide a passphrase to unlock my SSH private key. To save me having to memorize yet anot... |
What's the difference between a tiger team and a red team? Are there any other "color" teams out there (relevant to IT security)?
|
On a large scale (~1500 workstations, ~100 servers, ~50 network routers and switches, etc), what should a vulnerability management system be scanning? Should it scan everything, or just samples?
I know that ideally the VMS have to scan everything, but I'm not sure if that is feasible.
|
As it says, I want to become a Security Architect and I'm not sure of the career path to follow! I've already asked a few questions about certifications and got great help from this community. Deciding a career path is not easy, after all (at least for me).
I've looked at a lot of certifications list.. a few threads,
h... |
Does Google record search / source IP [/ user] pairs? What if my Search History is off?
|
I would like to know what are the good way to identify users on a large lan party when you manage network ?
I had the idea to make the users register them self at a desk, they give us Firstname, Lastname, MAC address, then we give them an IP linked to this mac address (permanent lease on the DHCP server), but how could... |
By personal, I mean for one person that's not sharing the workflow of data access with any other users.
Appears based on the feedback I got on "is-hardware-based-disk-encryption-more-secure-that-software-based" that it might be more secure, but due to a lack of disclosure on the hardware implementation makers part, it'... |
Let's say I develop an application that,
Allows any user to upload a file of only white listed mime content type and extensions (word and pdf).
Serves those files with the allowed extension and content type.
Is this a security risk? Why?
Will any browsers infer the content type from the file bytes (using magic heade... |
In my research, i am attempting to develop a simulator that mimics the output of a vulnerability scanner, given a set of parameters (e.g., Network IP ranges, number of machines to scan, typical machine configuration, etc).
do these types of simulators exist?
|
One defense that developers use to protect against a CSRF attack is to implement a CAPTCHA in critical steps. A CAPTCHA ensures that a human is at the keyboard approving the activity. But I've heard that CAPTCHAs have been broken. Sure, I can see how the CAPTCHA-defeating software could be used by bots to post spam... |
My computer does a lot of queries to strange domains such as:
56cea5c2b408989ab067adcb787d0f99209bbe07.mydomain.com
The strange thing is that 56cea5c2b408989ab067adcb787d0f99209bbe07 is the SHA1 of the string "Ebay.com"
Is it a malware? It seems to build hidden queries to well known web site.
---- EDIT ----
This is no... |
Reading into "Operation Satyagraha", one would have to believe give all the resources used that the investigators had some reason to believe there was data to decrypt, even though in theory and in practice TrueCrypt volumes should offer a "deniable file system".
What are possible sources of TrueCrypt data leaks that mi... |
Possible Duplicate:
Detecting Steganography in images
Is there a way to detect and extract hidden data from picture which altered by steganography?
For example, If someone tried to spill confidential information through a picture which contain data attached on email from pc within a company, is there a way to detect... |
This answer to a similar topic describes in a detailed way how vulnerable SMS and voice calls are in terms of decryption. In order to do so, an attacker needs to set up a fake base station located relatively close to the victim's device.
Assuming this scenario, I have the following questions:
Is the attacker able to ... |
I'm new to .NET programming, and I'm wondering - from a security perspective - whether the strong naming scheme used in .NET assemblies completely removes the need for other commonly used techniques such as packing the assembled code?
To be clear, I am talking about .NET applications running on the client side and my g... |
I recently read this article about how a lone hacker (The Jester) conducts, amongst various other things, his DoS attacks over layer 7 instead of layer 4. It also mentions at one point he was able to successfully DoS a website using just a 3G enabled phone as his attack platform.
I'm curious as to how this was actually... |
On our site, we use google analytics and we have to put the GA cookie in the URL since we have a two letter domain and IE imposes some cookie limitations on those. This means that when going between subdomains we get these long URLs with the cookie string appended after a hash:
http://test.ab.la#_utma=what_have_you&_ut... |
I recently was in charge of fixing our server at work, and cleaning the sites on it. We were infected with some malware that injected some code into some of our clients websites. Apparently, there was some other activity on the server, as well. It included:
Brute Force Hacking (I can verify this with the Auth logs)
Re... |
I have a Windows 7 computer which currently has a large working Microsoft Access 2007 database on it containing some tables with confidential data. I would like to securely delete/remove the tables with the confidential data. I'm looking for a good protocol on how to do this.
Does all the data live in the *.mdb fil... |
This is a multiple part question, which all really come back to the main question:
How best to protect data in a Hadoop (wikipedia) cluster.
(Current version, vanilla main-branch distro - though I'm open to hearing about others).
After much searching and researching, I have not come up with an awful lot...
My sce... |
I am wondering what notable events in XSS attacks we saw in 2011. What big events hit the infosec community in regards of XSS?
I am thinking of specific events like for example the Samy worm in 2007 or the HBGary SQL Injection attack in 2011.
|
I heard this can really speed up encryption performance, but I can't find any good information about how to implement it.
|
I think someone is using my cookie info to log into my Facebook account on a public Wi-Fi network. How can I determine if this is happening and from what IP address?
|
We have network which users (mostly management, it, and the presidents) use VPN to remote into their work desktops or to use their laptops from home.
After some users took it upon themselves to install their own remote access software, I suggested we write up a remote access policy that explains to the users what is ac... |
Background:
The company I will be working for as a consultant has developed IP which could potentially be worth billions. The confidentiality clause in the contract has penalties for breaching the clause which are essentially open ended, a six figure penalty plus loss of earnings, loss of future business etc...
The con... |
In the news that comes from Iran, you hear that Iran has succeeded in making fake ssl certificates, so that they can find people's gmail account credentials.
Some analysts are saying this is possible but difficult, I wonder why it's difficult, where does the difficulty lie in, why can't your ISP do that to you?
|
I mean, is it just a matter of "how difficult is it to reverse the function with the current technology"?
Or is there a mathematical concept or property that makes them different?
If it is a matter of "how difficult is it to reverse the function", then is it correct to say that with the progress of the technology, some... |
If I own a private IP address, 192.168.2.1 for the sake of it, and I am physically connected to my router, which it's internal interface is 192.168.2.254 and it's external interface is some public IP address which it got from my ISP's DHCP server.
Obviously my IP is being translated over NAT so I can surf the internet.... |
I've just read the following advisory at http://www.securitypentest.com/2011/02/facebook-url-redirect-vulnerability.html. In its solution section, I found a strike-through text: "Only works when your login to Facebook". What's wrong with it? If it requires users to be logged in to exploit, so is it still a vulnerabilit... |
I found one online, which I wanted to try out at my house and see if it actually worked. It's written in C, and it is not very big at all considering half of it is just a bunch of cases for which key is pressed, ex:
case VK_CAPITAL:
fputs("[CAPS LOCK]",file);
fclose(file);
break;
and it also does a bit with the regis... |
Is it safe to store data such as account log-in information (for vendor websites, not administrative accounts), settings policies, activation documentation, and operating system keys in a public folder on microsoft exchange and setting the permissions for only members of a specific security group are allowed to add/edi... |
Our current site is easily DOS'd. I can perform an AB test against it from Apache and it disappears for about 5-10 minutes. We have been having problems with others DOSing the site - to the point where we had to shut it down for 8 hours (recommended by the server host).
The server is hosted by Rackspace. They recommend... |
Inspired by a question I saw on Twitter:
As the title says, what items would you include? And to what depth?
Are there obvious topics everyone should be thinking of, or is it important to advise on areas they may not have considered but can take action on?
|
I've got an interesting dilemma. I have a large (50+ users) office that is going to be on the campus of a local university. The purpose is to foster collaboration, etc, but the open environment is going to play merry hell with my network security.
Basically, I have physical security on my demark/server room, and that's... |
I'm having trouble determining whether when using a hosting company that uses Xen virtualization and Intel processors with AESNI embedded encryption, I would have access to AESNI (i.e., is it an available hardware resource in such environments).
|
My development staff is in the process of automating our end of month process.
There is a small manual step that needs to be executed.
We have been thinking about the PCI ramifications for making this accessible over the net. Looking at the PCI standards, notably 1.1 blocking public access to cardholder environment f... |
I guess the title says it all. There seems to be no obvious difference between directory traversal and file inclusion vulnerabilities.
But I guess there must be some difference, since the www.cvedetails.com use the following categorizations:
Bypass a restriction or similar
Cross Site Scripting
Denial of service
... |
It was demonstrated that dram modules can retain information up to 10 min after power off in certain conditions. My question - are there memory types which will retain data 10 sec at max even if being frozen (aka cold boot attack)?
EDIT. I want to secure my code on a colocated server and avoid cold boot attack and perh... |
I understand that it is not possible to secure your software if a third party has physical access to the box (eg colo). So may be I can install some sort of hardware (like a seal) which only need to be physically broken to get access to certain server components (eg RAM). So if it is broken I get compensation through l... |
I have been reviewing code for various internal apps that handle secure transmission of data with external systems. These follow the following process:
RSA encrypt data with 3rd party public key
RSA encrypt again using our own private key
Transmit data
3rd party decrypts using our public key
3rd party decrypts again u... |
I am an application developer in MNC with 2 year experience. What are the basic certification or course should I do what can help myself to shift in security field?
|
I'm doing a research on fuzzing and I would like to know the answer to the question in the title. The cvedetails uses the following categories for vulnerabilities:
Bypass a restriction or similar
Cross Site Scripting
Denial of service
Directory Traversal
Execute arbitrary code on vulnerable system
Gain Privi... |
I work for a major publicly traded company and we need some external black box pen testing done on a Win32 executable. This exe is used in a large client server infrastructure and is a central piece of our core business. It handles monetary transactions so it is vital that it is secure. The scope of work we would want ... |
Let's say I want to move my 1U Dell server to co-location site with a hostile company who will try to steal my code (this is almost 90% probability if I dont take steps)...
The limitation for their hostility I see (or hope) - they can't remove the box completely and tell me, "oops, it got lost in mail", they can't hir... |
Keychain entries of a 3rd party app are protected according their 'protection class'. For example, assigning the class 'kSecAttrAccessibleWhenUnlocked' to a keychain entry means that the entry is only accessible when the device is unlocked.
Regarding this scenario, I have the following questions:
Am I right in assumin... |
In the DefCon video "Three Generations of DoS Attacks (with Audience Participation, as Victims)", the speaker demonstrates how it is possible to crash a variety of devices by flooding them with IPV6 'Join Network' commands.
2 questions:
Can somebody explain what is going on here to me in more detail
How do I prevent t... |
I need to proof that a user of my app is in possession of the correct SIM card.
On android devices, this is possible by simply sending a challenge within an SMS to the corresponding number (the proof that a user belongs to a specific phone number is not discussed here). As an android app can receive SMSes programmatica... |
It's only an idea. I've recently logged that my server is scanned by w00tw00t tools.
I found many solutions to this, such as use of apache mod-security, fail2ban, etc..
The one I want to speak about, is usage of iptables to block such IP's, based on apache log matching.
If I would use any presented idea, about how to ... |
Local buffer overflows are relatively easy to understand: throw some input at an interface and see if the process fails with a core dump or similar. However, in my mind, this kind of exploit works well only when the attacker has had unlimited access to test the interfaces and see how their input affects the process.
H... |
I've recently finished book The Art of Deception: Controlling the Human Element of Security by Kevin Mitnick
The book was released on 4th December 2002. Not talking only about techniques described in this book, but are the ways used by social-engineers still a threat today?
I think that now, as we moved at least 10 ye... |
While there is a vast trove of vulnerabilties, threats and their corresponding countermeasures, the amount of information on Infosec Economics (Specifically for web applications) seems scarce.
What are the resources and tools that I should look into to make implementation of a Secure Software Development process or ev... |
Recently I found one of my web servers hacked with malicious code injected to websites hosted there. It wasn't exactly my fault, as I shared the server with other people and someone put some unsafe script/website on the server. Luckily to me there was no damage or data loss. But it got me thinking. I found out about th... |
I want to write a patch for a two factor authentication system that someone else has started. The code is a module for a PHP content management system and sends an SMS message to a user's phone, after they successfully enter a username and password. If the user then types the code into the site, they get logged in.
The... |
I am new to this field. Currently I am using Linux OS and
my question is how can I find the OS of another machine to
which I do not have a direct access.
I am interested in any possibilities which can lead me to
this information.
Also I need to detect the OS precisely.
I used nmap -O before.
|
We have a server side API that is completely REST based. We are coding to secure them with two legged oAuth type authentication. We are planning to iPhone and Android apps in the future, but for now, we have a client application that will be allowed to connect to our server APIs. The UI and back end (REST) may be on th... |
I am looking for a simple but reasonably safe way to secure my home pc (and laptop, nas, etc.) with a hardware token. I would like the system to be secure, but practical enough to be used on a day to day basis.
I am thinking of using the hardware token for logging on etc. (i know using just a hardware token is not that... |
I'm developing a web based application. I want to create it so that it could be adopted by teams within corporations and large organisations that have tight IS standards.
The initial organisations targeted are not in specifically regulated industries, but will need to adhere to regional data protection and usage regula... |
I would be traveling soon and I am looking for all kinds of ways to encrypt the data transfer (usernames, passwords, emails ...) between the new networks to which I will connect my Laptop, that is running Ubuntu Oneiric (11.10), and my server, my accounts, my everything that I will connect to.
So, what do you recommend... |
What is the benefit of having certificates expire at some fixed date?
|
I'm looking for a standardised set of tests or scoring measures I can apply to my web site to be able to quantify it's standard or level of security. I can do some research and compile a check-list myself, but I am hoping there is something standardised, something independent of me that my client and the users of our s... |
As a hosting company we have gathered a busload of information over the years that are pretty much confidential. This information includes code, graphics, ERD diagrams, SEO strategies and so much more. As our company expanded, we have now reached a point where we need to store this information for the entire company to... |
I'm trying to understand this vulnerability.
How can I reproduce this?
|
Not specific to any particular industry or requirements, but in general - are there currently commonly accepted standards regarding cloud-based applications?
I* am developing a system that will be deployed in the "cloud" (i.e. hosted by an IaaS/PaaS provider, ala Amazon EC2).
Besides any regulation or standard that ... |
Suppose I am setting up an IPsec VPN for Apple iOS clients with the requirement that the iOS clients need to know that the server is legitimate and vice-versa.
I create a root CA and issue a certificate for the IPsec server. The CA certificate is installed on the iOS device.
In the case of a man-in-the-middle attack w... |
I recently set up my own home server, running Ubuntu linux. The intent I'm having for this is to have a private wiki for my family, so we can have a place to collect information like phone numbers, and other relevant information. Currently, access is limited to my LAN, essentially prohibiting outside access, but I'm co... |
If I created a folder /tmp/me with permissions 700, and started a process under me that starts a listen socket under /tmp/me/socket.
I currently assume that a connection to that socket originated from a process that is running on the very same server (malicious or otherwise), and was not a connection from another serv... |
I know some people that, in regards to network security, argue that because the firewall on the router into the building is on, that makes the network secure and therefore, the firewall on Windows PC's can be switched off. These people work in IT.
I disagree with this and I need a solid argument to go back with. I am t... |
I located an issue with a site where I can insert a script tag into the href of an anchor tag:
<a href="<script>alert(8007)</script>">Click Me</a>
What I am trying to determine is, what is the chance that a browser, even an older one would execute this JavaScript located withing the HREF?
I understand that this value ... |
after reading the data from the request as Stream i needed to convert it to Image so i used this Method:
Stream inputStream = HttpContext.Current.Request.InputStream;
Image img = Image.FromStream(inputStream)
so while im unable to know what was in that inputStream (file format is done already but still..) there may be... |
My website will be hosting documents for end users and I would like to make this as secure as possible.
Question
Assuming that I have a need to share documents on a website that may contain hostile code, what should I do to protect myself and my end users?
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.