instruction stringlengths 24 29.9k |
|---|
Bluebox have recently disclosed a vulnerability (Android security bug 8219321) in Android, that is getting a lot of coverage in the media.
The title of the post is "Uncovering Android Master Key" - I'm assuming this is just a media-friendly headline, and a master key doesn't come in to it.
From what they have disclosed... |
Recently I started to live without RC4 within my Firefox session. Discussion about it can be found here. While it is quite easy in Firefox (Enter about:config and then rc4), I found no possibility to do this in Chromium. So is it possible to disable or remove RC4 in Chromium or also Google Chrome?
|
I want to check my network intrusion detection system (physical intrusion like unauthorized gadgets or devices in wifi/ethernet). Until now everything is ok, but I was wondering if I block every query do my server with iptables my server will be still detect the intrusion. There is a way to test this or is just plainly... |
I am a newbie to the field of security. As I was trying to explore more about HTTP request and response headers, I came across this website which provides a detailed analysis of the request header that is sent by our system to its server. According to the website, by examining the Via or X-Forwarded-For header, one can... |
I am practicing Linux buffer overflow exploitation. when trying to exploit a vulnerability in crossfire, everything works well and I get the shellcode placed in the right place, and the program flow gets redirected to shellcode, however, when start executing the shell code, the program fails.
OS version (bt5 R3):
Linux... |
I am quite new to buffer overflows and I am practicing right now different types of buffer overflow attacks. The shellcode was not executed until it was padded with NOPs although it's set properly in memory and the execution flow works as needed.
After investigation, I saw some people who wrote the following:
"find th... |
Is it dangerous from a security perspective to put a line at the bottom of a website "Powered by Wordpress/Drupal/Django/WHATEVER" ? I know that certain platforms/applications have different security vulnerabilities that are more common/easily exploited. Knowing the ins/outs of a platform would definitely direct any se... |
When it comes to uploading images on a website. I know you can trick the php to believe that the file is an image by changing the extension to ".jpg" from ".php". Then once the file is uploading you can use Tamper Data to change the file extension back to ".php". The only way I can think of preventing this is comparing... |
I built a website from scratch using PHP and MySQL for my residential community and our budget is a big fat '0'.
Five days ago I discovered that there were 222 entries in a table in my database that looked suspicious. The I found another 196 entries in another table with similar entries. All these entries had been made... |
I have a PDF file that I want to embed an invisible and fragile digital watermark. What are the suitable algorithms available for this task?
|
Yesterday my WordPress website got hacked. I thought I had done all necessary things to make it secure. One of my colleagues said that with Greasemonkey we can easily hack sites. Is it true? How can I protect my site secure against it?
|
I want to manually get the NT hash from the registry (without any tool). Let's say just for the administrator. I know that it must be stored in the SAM area of the registry somewhere so I tried to extract it from there. I found the location HKLM\SAM\SAM\Domains\Account\Users\000001F4 (1F4=500=Admin) and there the value... |
I sometimes have to use my personal Gmail account from my company workstation, where I know for fact they are using content-aware firewall(s) like Palo Alto, and potentially other nasty things like transparent proxies.
Assuming:
the Gmail certificates that I installed in my browser are authentic, because...
the browse... |
I have the problem that I usually use 4 passwords that I use quite often. I use the first two strong passwords for very important services (e.g. Email, PayPal,..), and the other two not so strong for not so important services. The problem comes when I forget the password of something that I do not recall how important ... |
I would like to learn how to search a laptop/computer/cell for processes scanning the mic input. Additionally, short of physically disabeling the mic input, is there a way to make sure nobody is tapping the input signal?
Edit: I do trust neither the OS (Windows) nor the driver.
Edit 2: It is not an option to disconnec... |
When I try to connect to a remote desktop, a message appears which says something like "Make sure you trust this PC, connecting to untrusted computer might harm your PC". Why would it harm my PC? I can understand that if I am sharing local resources or something like that, but if I am just connecting to a remote deskto... |
Several partners and I have just started a small business and we would like to employ a good secure setup from day one. This is a problem however as there are many piecemeal packages, and I am stuck jamming them together and hoping there are no holes.
Are there any papers, tutorials, books, etc. that give use cases of ... |
One of our staff PC has a problem, the scenarios:
Specs: (Alias Names)
Company Name: Contoso
Staff PC under Domain Alpha
PC Name: Contoso1-PC
Local Users are: administrators and john
User profiles:
Operations (Contoso domain)
John (local)
Administrator (local)
MS Outlook connected to operations@contoso.com
Thursday... |
A client that allows to respond to the server with LM and NTLM, with a password which is simple,, is it insecure.
Isnt a more secure way is to have all the communication with NTLMv2 scheme? and in addition to that have a complex password.
is it true that a weak password can be cracked even in NTLMv2?
|
I encrypted (with TrueCrypt) all my hard drives and had the passwords stored in an encrypted file on my USB disk. The passwords are all (except one) 50 character randomly-generated ciphers, there's no way I could remember them. I decided that I wanted to securely wipe my USB disk real fast so I put the passwords file o... |
We have Ajax call to validate the UserID on create page so that user there only can know if their chosen ID is available or not.
We have this URL exposed : https://mydomain.com/validateId?id=<user enter value>
Lately some hackers are sending large amount of concurrent requests to this URL and we are observing very high... |
I just wanted to know what are ports. Can someone explain to me what a port is?
|
The answers to this question Is it okay for API secret to be stored in plain text or decrypt-able? are somewhat unsettling to me. I'm trying to wrap my mind around how storing a secret key in plaintext is in any way secure.
This is how I'm imagining an API access key / secret key based system to work:
Client takes tex... |
I have heard that HTTP use plain text communication. If it is so how can a hacker or someone tap it. From my little knowledge I know that if we sent a request to a web server it replies back to us using our IP address. So if an attacker wants to know what I am doing, how does he do it? Is it necessary to know my IP add... |
I've been drilling down in granularity for this question: Besides IP addresses, how else could one be identified? and I'd like to focus upon the internet browser.
What are the digital tracks an internet browser leaves behind? What tools can be used to recover these tracks and what level of access is required to use th... |
I use both Linux and Windows at work on a large enterprise LAN. The majority of the network configuration is out of my reach.
Certain SaaS applications that are hosted locally on the enterprise LAN, use self-signed SSL certificates. I am required to log into these on a regular basis.
Is there any sure way of knowing t... |
After the recent disclosure of several major email providers cooperating with NSA, is there any real security benefit of not using these email services and choose some alternative instead? Such as picking a local email provider or hosting an email server myself?
All emails are publicly visible as they pass through rout... |
I have noticed that, a HTTPS connection can be set up with the server configured to use a certificate, and when additional security is required, the server can ask the client to provide a client certificate, validate it and set up connection.
It seems that, if we ask all clients to provide their certificates, which con... |
So, I am implementing some X509 certificates in a backend service where we have our own self-signing process to allow different nodes (out of our control) to receive our blessing (as a CA of sorts).
So, my question is, as it pertains to this particular instance, (and in general, really), why would one care about hostna... |
Disclaimer: I realize that I posted this question on ServerFault, but I have not received any response there. I am hoping that this forum might be a more appropriate place to post this for a response. If I am incorrect, please let me know and I'll delete this post.
We have a need to enforce resting encryption on an i... |
I'm asking this because according to this article , Microsoft collects much less information than actually exists for Windows licensing (e.g. only 10 bits for MAC addresses, 6 for CPU serial number etc.) - perhaps this is because of privacy issues?
|
There is encrypted data in the database (asymmetric FYI). It is to be viewed as decrypted on the website. The data can be sent to the client as encrypted to be decrypted on the client's computer, or the data can be decrypted on the server and then sent to the client in plain text.
Now it occurs to me that I don't want ... |
Today, PCs (laptops, desktops, etc.) generally work under what I'll call the "open PC" security model. Users have full, system administrator/developer-level access to their own machine. Users can install arbitrary software of their choice onto their PC. That software can do anything, or at least anything that the us... |
On a server I control, I have disabled password logins (public key only), but still need to enter my password to access sudo. This is becoming cumbersome, as I use a long, automatically generated password. I find myself frequently having to copy/paste the password.
I gather that it's a Bad Idea to disable password chec... |
Let's assume that a legitimate torrent file has been safely and successfully downloaded over HTTPS and perhaps even OpenPGP verification was used to verify the integrity of the torrent file.
How good are torrent clients against attackers who want to add malicious content to the download?
Does torrent clients only catch... |
I found port forwarding entries in home router that I haven't manually configured. Is that because of UPnP?
Are applications simply able to tell the router to forward ports on their own? Are there any security implications with enabling UPnP?
|
If I really need to use these methods, how do i make sure they are secure?
Edit: Is there a link or source where I can see how to make sure that 'PUT' and 'DELETE' methods are not able to delete or update resource, but services and servlets are still able to use PUT and DELETE.
Following services are using PUT and DELE... |
I'm running a WAF infront of a bunch of Webapps and we have the Apps regulary tested, and we want to improve our Tests by presenting some kind of livelogs to the testers. What informations, from Server-View, could help the Pentesters?
The objective is NOT to keep the testers out, but to find any possible way to bypass ... |
This and this answer says that "once a certificate has expired, the CA ceases to keep track of its revocation status".
I'm trying to learn how OpenSSL works as a CA. If I have a revoked expired certificate in my index.txt, then this certificate is not automatically excluded when generating a CRL.
So my questions is:
Ho... |
The TPM specification mentions that some keys are migratable, i.e. transferable to another TPM. Does this mean that it would be possible to share (transfer) a BitLocker decryption key between several TPMs, and thus being able to decrypt the same encrypted hard drive on multiple machines? Or does the BitLocker keys fall... |
Nessus reports almost on any Windows machine "DCE service enumaration". With the metasploit module tcp_dcerpc_auditor I get the following information:
192.168.1.23 - UUID 99fcfec4-5260-101b-bbcb-00aa0021347a 0.0 OPEN VIA 135 ACCESS GRANTED 0000000somelongnumber0000
192.168.1.23 - UUID afa8bd80-7d8a-11c9-bef4-08002b1029... |
I'm not experienced in code signing but I was thinking about this: as you know, there are various tools for self-signing digital certificate generation (as makecert from Windows or OpenSSL). Now, It would be great if a malware developer could sign his malware's code from a trusted CA. He can only sign it in two ways:
... |
I'm working on some security for a website that is built in classic ASP and MS SQL 2000.
I've successfully found a couple of flawed forms that allowed SQL injections through the form fields by using Sqlmap with the following commands:
python sqlmap.py -u "URL TO FORM" --forms --level=5 --risk=3 --batch
python sqlmap.p... |
With obvious dangers of opening up a wide range of ips, does anyone know how I can get a source of IP ranges for Akamai?
When talking to Akamai they say 'not possible' which I find surprising.
I need a range of IPs that would be served in the USA/Texas/Arlington (area)
Thought on how to go about this? I cannot seem to ... |
For example, you are using Snort and you just got a serious event, which states that a certain service is attacked.
What do you do with the threat source IP?
What are the steps that network event analyst performs?
Edit: Narrowing the question down, how it is dealt with such threats, instantly block ip? Gather evidence... |
In our company, one of the software group is using a certificate from a trusted provider to sign their drivers manually on their local machine. My group wants to start to sign our installers and some administrator tools and we would like to use the same certificate.
The problem is each group is using its own build mac... |
If someone can please provide some advice about the following problem I am trying to solve it will be great.
Scenario: A standard office room, with (say) a couple of people in it
What I want to find:
(1) How many cell phones are in the room
(2) What are the phone numbers of the phones in the room
(3) When is a specific... |
Pretty much the title: If Alice sends a message to Bob that she encrypts with Bob's public key, is it possible for Eve to prove that the ciphertext was encrypted with Bob's public key, that the encrypted message is intended for Bob?
Update
Suppose the algorithm is RSA.
|
I have my business website through GoDaddy and there has been some weird stuff happening within my business over the past year costing me a lot of money and all of my free time trying to figure out what is actually going on. I have even tried hiring 4 different IT professionals and they swear it's fixed but it's not. I... |
The main question is should a building access card have the corporate logo on it?
In this organization, the employee ID card is separate from building access card.
We currently do not have the logo on it, nor a "drop in any mailbox" message.
All that is on it, is a photo, first, last, color-coded frame and the manufact... |
Say I have a few EC2 instances in an AWS VPC network, each assigned its own private address for the subnet at creation. Say one of them is a DB, and another one some kind of web app talking to the DB. The DB makes sure to authorize only a certain segment of IPs on that subnet.
How critical is it that the communicatio... |
Since GET parameters are passed in the url, how can they be secure from someone with access to network logs. He would be able to see what urls are accessed, even if he cannot see the request and response.
I ask because an api requires me to pass user data over https(their user's data ofc). The username and password ar... |
Is there a security reason to disallow a user to change their password as frequently as they want? I have found this security policy in a site and I am not sure why it is enforcing it.
One reason I can imagine is that the change password functionality is a 'costly procedure', and changing it multiple times in a row can... |
It is a well known security risk that LSASS stores clear-text passwords if a user has performed a keyboard-interactive logon on a machine - be it local login to his/her workstation or using RDP to a remote workstation.
There is also a classic fix to this - disable wdigest and tspkg. So far so good, but if Kerberos is s... |
Gamification, which is the use of game design elements and game mechanics in a non-game context, is a heavily discussed topic. Looking at the behavioral impact on Gamification, it has potential in educating users in IT security and rewarding secure behavior, especially in a corporate environment.
Applications that I fo... |
I'm 17 yrs old and I'm Thai. I have been in a military school and I really love computer stuff especially security stuff.
My question here is what should my career be and what could I study now as a fundamental.
|
first of all I'm sorry for my bad English!
I have a question about the security of NSKeyedArchiver, a subclass of NSCoder of Apple Foundation.framework (https://developer.apple.com/library/mac/#documentation/Cocoa/Reference/Foundation/Classes/NSKeyedArchiver_Class/Reference/Reference.html)
In my Apps, for management of... |
Is there a 'must read', comprenhensive book on native application exploit development?
Covering the process of finding vulnerabilities (fuzzing, reverse engineering, code analysis, etc...) & going from vulnerability to working exploit. Including coverage of ASLR & DEP and the methods being used to circumvent them.
Eric... |
It's probably dublicate but I can't figure out the correct keywords for search. You can help by just telling me those words, I'm rather good with Google :)
I want to develop somewhat like file storage with encryption of every file. There is only one user, and all the data (and code) is stored on his local machine. User... |
I am in the process of writing up a vulnerability report for a thick client application. One of the findings for the executable is ASLR being disabled. As part of reporting, I'm required to provide a CWE to the client that best describes the vulnerability. I can't seem to find a strong CWE that describes ASLR being dis... |
I was reading a Q&A on enabling + characters in URLs for Sitecore CMS, and the answer states:
ASPNET application does not allow using “+” from the security point of view e.g. preventing SQL or JScript attack via URLs.
Essentially a url such as http://example.com/foo%20bar is allowed in the system, while http://exampl... |
I am trying to integrate ACS to use in my application's authentication system.
Currently I have a Javascript client and a WCF so I had to use a REST architecture.
I am quite puzzled on how to do this but here we go :
On my log-in page I managed to get a token from facebook/windows live/google and then I want to send th... |
I'd like to utilise some of the free SIEM type products out there to increase the chances that I will detect attacks and compromises of any of the devices on my home network. Most of my home devices run Linux. I'm only interested in solutions that are possible without a large investment of effort (not more than ~5 hour... |
I have a server which hosts my own internal code among other things. Since it's only me using it, I've generated a self-signed SSL certificate and key, hoping that it'd give me a bit more security than just HTTP.
I would think that the main advantage of having a signed certificate is that someone else authenticates and... |
This question is, perhaps, a tad too abstract for a Q&A site. But it's been playing on my mind for a while, so I'm throwing it out there.
Modern systems seem to be increasingly centralised. An average user in the '90s would buy a computer from one manufacturer, have an OS by Microsoft, and then have a range of other su... |
I am using RSA to encrypt some text, so my system has already generated private and public keys.
These keys I would like to use to encrypt/decrypt a short text (16 chars).
The main condition is: the ciphertext should be as short as possible.
Minimal length of the ciphertext is more event more important than total secu... |
I found a site which is taking password letters from their users not the whole password.
Is this secure? Or do they have saved password as salted hash (MD5)?
|
Let's assume following workflow for logging in
a) On a device with keyboard:
I type my username and password
Press enter
[realization] I made a typo
Password field is cleared: not a big deal, I can type reasonably quick
b) On a device with touchscreen
I type my username and password
Press "logon"
[realization] My pa... |
My computer is currently running windows XP on a LAN Network. I'd like to use linux but I want to hide myself. I don't want to be the only linux system on a network full of windows XP computers. Is there something I can do? While browsing the internet I understand that I override the user agent (The server runs a squid... |
For now I read PCI compliance document and I don't understand any things.
I have a program, which takes sensitive and cardholder data as input (some of them are in encrypted form) and then returned back (some of them are in encrypted form).
I have 2 simple questions:
What elements need to be encrypted as input and out... |
By multi-level authentication, I am referring to the fact that the user makes use of a primary username password keypair to log into his account. Then, to perform some other actions, such as authorize a transaction, he is required to reauthenticate himself by providing a secondary password or passphrase.
So, what are ... |
Scenario:
We are in the position to offer a local appliance to run a version of our proprietary software, which is normally provided as SaaS.
Question:
What steps can be taken to mitigate trivial reverse-engineering in an untrusted environment, where they will have physical access to the box?
Clearly, it's 100% impos... |
For an iOS app that communicates with a RESTful service over HTTPS, should the session key be stored in Keychain or NSUserDefaults? Username and password are stored in Keychain, and it would seem trivial to also store the sessionKey.
But from a security standpoint, does that get you any added security? Presumably if ... |
The OWASP web site recommends this:
Use per user or session indirect object references. This prevents attackers from directly targeting unauthorized resources. For example, instead of using the resource’s database key, a drop down list of six resources authorized for the current user could use the numbers 1 to 6 to in... |
For a corporate network, is there a way to possibly encrypt all network traffic on the local network?
I would like to ensure that there is nothing left for chance to be packet sniffed. Not even e-mails or machine to machine communications with chat devices.
|
I have a small personal website which I wish to serve securely over HTTPS. At the moment I do not wish to use a third party CA to sign my certs. I was reading this document on generating a self-signed cert.
I have three questions.
The document shows two ways: (1A) Generating your own self-signed cert. and (1B) Genera... |
I recently acquired a netbook to play with, and I want to install Kali Linux so I can start learning about network security and exploit development. I want to use this to learn as much about security as I can.
What is the best way to partition a linux box so that it is most resistent to a security risk? Is a single pa... |
I need to restrict some webpages to certain users and I do this using a .htpasswd file through nginx.
The problem is I need to add other people's bcrypt password hashes to my .htpasswd file. Would it be possible for them to generate it using htpasswd on their own machine (could be windows, mac, linux), and then give me... |
Given that there are clear advantages to using some block modes of encryption over another, and I would like to ensure that all software used in the enterprise uses a certain "level" of security I'd like to issue a statement of assurance to my stakeholders that the most appropriate technology is being used. e.g.
Ban t... |
I've often read that MD5 (among other hashing algorithms) is vulnerable to collisions attacks. I understand the collision part: there exist two (or more) inputs such that MD5 will generate the same output from these distinct and different inputs. There are 20 examples of such inputs given here.
Fair enough, but how doe... |
Let's say I have two websites that live on separate domains, and their service providers both talk to the same identity provider on a third domain. I log into the first website and authenticate, and now I decide to visit the second website. The second website comunicates with the identity provider so I don't need to lo... |
What's the command line to generate a blowfish password hash? I can't seem to figure this out at all. Apache's htpasswd only supports bcrypt, and openssl passwd doesn't even do blowfish hahes (but it does do blowfish encryptions with openssl enc).
Most sites point me to using $2a$ which is bcrypt, not blowfish ($2y$). ... |
I am designing a .NET Web API-based REST API that would be accessed via a mobile banking-like app.
We plan to use OAuth 2.0 Resource Owner flow for authorization. All requests will go through HTTPS with server certificate and will include the signed refreshable access-token received by the Authorization Server.
What ... |
I was using Wireshark in order to check the activity of an unknown client in my home network, and to my surprise, I found some strange connections established by my own computer. I disconnected all clients from the network but myself, rebooted my computer, logged in as root, didn't start any programs and ran wireshark ... |
I'm a software developer working with hardware devices that are deployed on the field. Every now and then, I would need to update the hardware's firmware (upgrades, patches, etc)
I'm thinking of now, implementing a secure channel to upgrade this firmware, and for some checking to be performed by the hardware before acc... |
I checked my linux server with rkhunter, I got following warning messages,
...
[00:35:35] Found file '/usr/include/gpm2.h'. Possible
rootkit: Trojaned SSH daemon
[00:35:35] Found file '/etc/rpm/sshdOLD'. Possible rootkit:
Trojaned SSH daemon (original sshd binary)
[00:35:35] Found file '... |
If the application is not in production mode, there is no commercial contract signed with customer yet, and you just want to give a link to the customer (or give the demo yourself) so that they can experience the app themselves, then how important is it to use HTTPS enabled server?
SSL certificate comes with a cost, so... |
I'm writing some software where I have to encrypt all files that are written to a specific folder using AES. There is one password/key that is configured somewhere, which is always used.
I don't want to store a base64 string because that is too complicated for the person who might have to change the configuration. I wa... |
What is the purpose of the "Authenticated Users" group in Windows?
Under Linux it doesn't exist and I'm starting to think this is another idiosyncrasy or over-engineering of the Windows operating system.
Here is why:
Assume I want to know what rights has the user Mike on disk C:\, I will type:
net user mike
and will b... |
We have a site at work that is used for the following:
Our homepage, which is just some info and contact info.
Job applications are also handled on our site.
There is no place where you can login though.
I told management, seeing that we are a company that does software engineering, it would make a better impression ... |
The computer and the router are located inches apart in my study.
An Ethernet cable connects the router to the roof antenna.
The antenna talks to the ISP, 5 km distant.
I know from experience a hacker can access the router with ease.
The question is, can the hacker access traffic anywhere along the route between the a... |
My understanding is as follows:
To securely store a password (e.g. in a database), you use a hashing algorithm designed for this purpose (designed to be slow, e.g. bcrypt), and you use a unique salt for each password.
This makes it hard/slow for an attacker with access to the database to recover passwords, because th... |
Okay - so I have been extensively looking into US export/import laws relating to encryption software (5D992), however I have a few questions about the laws and their applicability.
So, the laws obviously apply to encryption software distributed online, say through iTunes or Windows Store, however "designed for install... |
I have an application which writes a logfile in /var/app/applog.log. This application has to be launched as root, but runs as app:app and can also be demoted to nobody:nobody
What exactly is nobody:nobody and what priviledges does it have?
Is it best to run my app as app:app or nobody:nobody?
The logfile has the same u... |
The context from which my question has arisen is this user script which locally removes ads from Ixquick.com, which is an anonymizing 'proxy' search engine that gives the results from Google's index while not giving any info of yours to Google at the same time.
But the script makes use of Google Hosted Libraries, with ... |
Suppose I have a public/private keypair, which I would like to use to serve HTTPS from a webserver. The part I'm worried about is this: the private key is encrypted with a passphrase, so that if an attacker gains access to my webserver he doesn't get the private key. But I want some automated system to launch the webse... |
Is it possible to create self-signed root CA certificate that Windows will import to Trusted Root by default instead of Intemediate certificate store ? Obviously, it won't do it without the big giant nag window asking if you're really sure - but it would be nice to not have to go the extra step of specifying which cert... |
I have a Mysql database where one table is meant to store user complaints/comments/suggestions. I am using Mysqli to connect to the database with a
$con=mysqli_connect("myhost","myuser","mypassword","mydb");
At this time, the "myuser" and "mypassword" are the same as the id and password I use as the admin to log ... |
I have a question about having users logon to my service using their Google Credentials. I've gone through the Using OAuth 2.0 for Login documentation provided by Google.
The documentation mentions an id_token (JWT token) as the primary authentication token that can be passed around and verified by the application.
On ... |
Say you boot into Linux from a brand new Live USB. The USB is write protected. The memory stick has never been exposed to the Web in its life. You surf all day on Firefox building your library of bookmarks. You backup your bookmarks to a .json file and send it to your Gmail account. You close down the computer and eras... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.