instruction
stringlengths
24
29.9k
Consider a Internet Based Website which does authentication. The Web Application can do the authentication by calling an Authentication Server which is not connected to the internet. The Authentication Server is not in the DMZ. However if 2 Factor Authentication needs to be done via One Time Password over SMS then the ...
I use WPA2 encryption. But I know even that can be cracked with the aircrack suite. And a lot of users may not use strong passwords. I've read that while cracking WIFI keys the only noticeable difference is the rate of traffic. So is there a way to detect whether my network is under attack from such tools ? P.S: A sol...
I have a home network and I would like to implement a VPN to the cloud. Is this possible without the ISP's cooperation in port forwarding? In other words, is my only option to use a 3rd party VPN service or can I set it up without the ISP's cooperation? I doubt that they will do any custom configurations for me.
I recall hearing there is a range of attacks one can mount against a page which mixes HTTP and HTTPS loaded content (say, https://Secure-Site.com loading an image from http://Not-A-Secure-Site.com) but I don't remember the specifics. Could anyone list some common attacks that can be launched through this vector?
I have the headers from some emails I've received. There are several IP addresses in these headers. Which one belongs to the sender? Is the address in the headers reliable? Example 1: Delivered-To: highballer906@gmail.com Received: by 10.60.17.1 with SMTP id k1csp74699oed; Mon, 17 Jun 2013 23:56:20 -0700 (PDT) ...
I am using Windows Server 2008, Plesk 9.5, IIS 7, SQL Server 2008, and recently I have received and email claiming this server is vulnerable, and sent me the following URL: /scriptresource.axd?d=QivxuR3S70uO2-sZID2TL45AtoGwC4WTODQ6W4h3ca0AAAAAAAAAAAAAAAAAAAAA0 Using this URL on any website that I hosted on the server, ...
I dont really get it what exactly block size in openssl speed output means. Here: How can I interpret openssl speed output? I found the answer that it is the length of the input message. So, should I understand like this: I want to measure performence of md5 for 512 input-size message, should I do it like this: // ass...
I just read this about the security about Basic Authentication over SSL: Is BASIC-Auth secure if done over HTTPS? And I don't get it. I just installed ProxyDroid (http proxy) on my rooted android device, and started up BlurpSuite on my Ubuntu Machine. The first request I saw was some Exchange ActiveSync call to a corpo...
I am thinking there must be some alternative better than passwords, but not so complex and difficult to administer as a full PKI infrastructure with client certificates on every device. My primary concern is to prevent malicious users from spoofing a device that belongs to someone else and then guessing the password. ...
Where I'm currently working we use full disk encryption and after a laptop transfer owners we use a secure erasure program. This is quite time consuming and I'm wondering is it necessary? For the disk encryption program we use what we refer to as PGP, but I think it's actually Symantec Drive Encryption (am I right, the...
Would turning an iPhone off when charging from an untrusted charger make it safe from juice jacking?
I've noticed that there are a lot of different payloads to choose from in MetaSploit, and the choice (assuming there's enough room in the target) usually depends on what you're trying to do. However, from what I understand the payloads vary in size greatly. How can I determine the size of each payload so that I'll kno...
I have a basic understanding of private/public key cryptography and have been using it for SSH logins and GPG encryption/signing for a while now. However, I have always kept the private key/keyrings in the default location, in my home directory (.gnupg and .ssh). Obviously, I can transfer the keys to a usb drive, wh...
As per title... The malware can easily be de-obfuscated if it was obfuscated using common and known XOR techniques. Why don't malware authors use any other method that make it much harder to automatically de-obfuscate and identify malicious embedded code? My thoughts: Malware authors actually do use other encryption m...
I want to implement secure communication for my application. The A sends a message/data and B receives it. The message should be encrypted so the internet provider would not be able to read it even if it gets intercepted. Conditions: I cannot use https (but should be included for completness) It's possible to use ot...
According to the documentation at http://docs.mongodb.org/meta-driver/latest/legacy/implement-authentication-in-driver/: The driver then runs the authenticate command for the database on which to authenticate. The authenticate command has the following syntax: db.runCommand( { authenticate : 1, user : <username>, nonc...
Im just wondering ... Lets say, I want to compute an MD5 hash from a given buffer which is an empty (memset(buffer, ' ', sizeof(buffer));) buffer with size of 512. I also want to compute MD5 hash on same-sized buffer but non-empty one: memset(buffer, 'a', sizeof(buffer));. Am I right that the speed of computation shou...
I want to design a system that hinges on ECDSA. All messages are signed using the algorithm, and this is used to prevent spoofing. However, if a user were to somehow lose control of their key, they would be forced to create a new key to sign their messages. Is there any mechanism that can be implemented to transition p...
I need to encrypt something on my server and save the result. Since I am not a security expert, I want to implement as much existing code as possible. I found a fully build function on php.net but it says that "is not protected against padding oracle attacks." What are "padding oracle attacks" and what should I do abo...
Windows 8 has a feature to "Reset your PC" so that if someone needs to give their computer away, the recipient won't be able to recover data. How secure is it?
Is it a requirement to also disable SSL v2 and weak ciphers on client PC's? I have seen quite a few posts for disabling them on servers, but nothing about a regular client PC, say, running Windows XP or Windows 7.
I am trying to understand how SSL certificate and signing and the chain of trust works. I know about root CAs and that they are used to sign intermediate CAs that sign the end certificates that are issued to a website. I also understand how the chain of trust works and that because a ceritifcate signed for X.com is sig...
Whether I'm using a normal internet connection setup, or tunnelling it through an anonymizing VPN or through TOR, what information of mine is revealed to whatever DNS server that I choose (e.g. Google Public DNS)? Would I gain any privacy benefits if I created and used my own DNS server (either on my own dedicated linu...
I am connecting from my home Windows 7 machine to a hosted server Windows Server 2008 R2. I am connecting to it using Remote Desktop on a non-default port. I am wondering if I should go to the effort of setting up a VPN connection for Remote Desktop Access with something like OpenVPN. I'm not a security professional, I...
I am trying to use my PC to capture, decrypt and analyse traffic from SSL sessions on my android tablet. So far, I have a ZAP proxy server set up, with a CA generated. On my android device, I have ProxyDroid set up, that transparently routes all web-seeking traffic through the ZAP proxy I've set up. Browsing https site...
I have just recently started to delve into the topics of malware. In my hunt for malware binaries, I came across certain responses that it is not easy to grab binaries based on malware names like Nugache, Storm, Waledac, Conficker, Rbot etc. from the various databases. These names are, after all, just used to refer a p...
I have been working on providing the security related to the XSS attacks. My website only allows following mime-types: XML, CSV, HTML, PLAIN, VND_WAP_WML, APPLICATION_ZIP, APPLICATION_PDF, APPLICATION_VND_FDF, APPLICATION_MS_WORD, APPLICATION_OCTET_STREAM, APPLICATION_VND_MS_POWERPOINT, APPLICATION_X_VISIO, IMAGE_GIF, ...
I'm currently investigating the Mifare DESFire EV1 card and would like to know if there are the same issues with the UID as there were with the classic? Are the DESFire UID truely unique or have so many been made that UIDs are being duplicated? Thanks.
I'm using NMAP for Network scan ; The output does not contain the full traceroute details. Can I view all intermediate routers/hosts using the NMAP GUI? A simple VPN connection IP traceroute... Thanks your answers...
Suppose my .Net application which is installed in the client encrypts a data. I want to use a different key generated randomly for each client so each client doesn't know the key of the other. Someone told me that storing it plain in a file is not good enough, and it's better to use a certificate to encrypt this key be...
I received a mail about illegally sharing copyright-protected material on the Internet; I never did it. I checked my router's configuration and noticed that the MAC address of one of the connected devices doesn't match any of my devices. I'm afraid that somebody somehow hacked my wireless network and used my Internet c...
My question is, can you make a digital signature using the receiver's public key and then have the receiver verify the signature using his private key? I always thought that in order to create a digital signature, you must use your private key and then the receiver uses the sender's public key to verify it. However, o...
In the Thales HSM documentation, 40 LMK keypairs are listed but the following keypairs are not shown in the keytype table: 00-01 02-03 08-09 10-11 12-13 Am I correct in thinking that the keypairs above are only used internally by the HSM?
What is the purpose of "Variant" LMKs? The JPOS project (http://jpos.org/wiki/HSM_basics) gives this description: To make things more secure HSM's use variants. A variant is a hex value for each type of key. Q1) How do variants make things more secure? Q2) Is increased security the only reason why variant's are use...
How can I listen to a remote IP's traffic using Wireshark? (Man in the Middle)
This question was derived from my off-topic questioning here: Does Centralisation Decrease the Probability but Increase the Damage of Exploits? Like before, I suspect this may be overly abstract as a question. But the excellent responses to my previous question proved me wrong before. One of the tenets of security seem...
My iPhone has sent/received 900MB in 15 days from "com.busuu.japanese.a" I got this information from Onavo, which 'compresses' my data. I have never heard of Busuu until today. It is a language learning service. My iPhone is not jailbroken. I have used Chinese wall chargers, if that was actually a real thing. How is...
I am testing a webserver[proprietary] which offers SSL support and they say it supports TLS 1.1 and 1.2 which i have verified by firing requests from IE with only the target protocol enabled . However , how can i check if the TLS protocols implemented in the server are free from known security issues ? what are the key...
I am trying to debug a TLS handshake between two SIP trunk endpoints: .75 and .82. Mutual authentication is being used. .75 sends: Client Hello Certificate, Client Key Exchange Certificate Verify, Change Cipher Spec, Encrypted Handshake Message Encrypted Alert .82 sends: Server Hello, Certificate, Certificate Req...
We know that testing input parameters for lack of validation is one part of a black box web vulnerability assessment but, is it necessary to test ALL input parameters (parameters, cookies, HTTP headers, URLs...)? If we don't test one it is possible that that parameter is the one vulnerable to a SQL injection or the XSS...
I have a device which should lock and unlock something after receiving a signed server response. So in the best case a loop would lock like this: User locks device User wants to unlock device User authenticates to a webservice User receives a key User sends key to the device Device checks if key is valid Device unlock...
I have a table where all columns need to be encrypted (aside from the PK). This will be achieved using AES at the application level. However there is one particular field that needs to remain searchable. For example a Message table has: MessageTitle (Encrypted) MessageBody (Encrypted) SenderID (Encrypted but matchabl...
Ok first of all this is legal and I have it in writing my friend and I are attacking eachother to get better and not break the law. Setup I have a VMWare image running BT5R3. It uses VMWare's NAT then my network is behind a router using NAT. From there I am VPN tunneled into work which also uses NAT (I believe). I've ...
I have some experience in building PHP based websites with MySQL access, storing encrypted user details, but all other fields being plain text. My most recent project will require sensitive data to be stored in the database. I want to set up a system where a user can access his own entries and see the plain text result...
I have token made as sha256("public text" + "secret value"), or any number of such tokens with the same "secret value" but different "public text". sha256 that is used is not salted - so that sha256-ing the same text will always produce the same hash. Can I construct a valid token with my own "public text" (or even re...
There are a lot of books on encryption. Is there a must read intro, something like Smashing the Stack for Fun and for profit, that more or less everyone reads?
I'm interested in the number of vulnerabilities over time, not in specific information about the vulnerabilities. I also don't expect any list to be completely authoritative. But what list could I consult to get an idea of the number of vulnerabilities for a specific software over time?
Suggestions to make a good password all focus on creating a string that a computer (or more likely, a network of computers with multiple GPUs) can not guess. Putting a password meter for when users create passwords can help against this a little, e.g. by enforcing a password at least 8 characters long with a mix of cas...
The question is in the title. I have been reading about DNS spoofing. What if I were to save the IP addresses of websites I consider sensitive and then just enter the IP address when I am using a suspicious connection to prevent myself from DNS spoofing attack? Will it work? Why or why not?
I want to secure site which is locally used for Prepaid Services, the site has been hacked many times, for the first step, I implemented SSL and its now working fine, however, I want to be sure that attacker can't get user data in transit because many users connecting to the site from restaurants or public places. One ...
I've had an idea kicking around in my head for a while, and am wondering if there are problems with it or it just has no value. What if a Database server (such as Postgres) had a column that could only be used for INSERT or as part of a WHERE clause? I'm thinking of its use for storing password hashes, such that even...
Just musing to myself, what is the preferable access control mechanism in high security environments? Locks and Keys or RFID tags? Going under the assumption that the locks/keys are not knoow to be pickable and that the RFID tags are not currently known to be vulnerable, how should one choose the appropriate system? ...
For example, if I want to apply to a job based in UK which requires security clearance, can I only do so if I'm a British national? What if I'm from another country belonging to the EU?
How secure are PGP/GPG encrypted mails? I realize that it's probably fine for regular e-mail scenarios, but what about the security over longer time periods (>30 years)? Is the 4096 bit limit for RSA keys of GPG going to be an issue (given that there is no way to use symmetric-only encryption)? Also, if I'm not misund...
In MS SDL Threat Modeling, there is an External Interactor and Process. While the meaning clearly shows a difference between them, when threat modeling, one can't really threat model an external interactor as it impossible to enforce anything on it. So why do we need an external interactor? In case we can analyze its t...
I have come across a field that is vulnerable to XSS. It accepts and tags however keywords script,alert, msgbox, prompt are blocked. I have tried every encoded version of these keywords but its not working. Is there any way that i can show a POC (XSS popup) without using the above keywords. I successfully injected a ...
I recently installed Kubuntu and I noticed the option for having an encrypted LVM. The behavior suggests it's full disk encryption since I need to put in a password before I can boot. This article and others I have read suggest it's full disk encryption. Is this actually full disk encryption? If so what type of encrypt...
I found an issue related to Forced Browsing in my web-application.And I was able to verify that my static content(like text document...mainly help documents) can be accessed by simply hitting the URL like, Example: http://www.example.com/example/example.txt User was able to do that without authentication. I have a sim...
I am interested to hear what the community's thoughts are on detail provided by a software vendor along with a fix and a security advisory. For example, let's say that some kind of severe vulnerability was privately brought to a vendor's attention. It was fixed it, a new release made, patches and published a security a...
After creating a simple login system and trying to protect it against things like SQL injection, Session Hijacking, XSS, etc, I've found that I really enjoy doing this type of thing. I'd like to pick up a book and dive into all the details regarding PHP / database security and intrusion prevention/detection tactics. Ba...
I'm a software engineer, and I've written several discreet utilities that run at specific times on Windows Server 2008. Generally speaking, they are console applications, need to access SQL Server, are configured for trusted access and are running under a service account. Our security folks tell me I need to re-archite...
In my chrome browser if I google for Windows Update the first hit is windowsupdate.microsoft.com/‎ When I click on it I am redirected to http://www.update.microsoft.com/windowsupdate/v6/thanks.aspx?ln=en&&thankspage=5 Now this to me looks like my machine has been hijacked and somebody with bad graphics ability has re...
Today I experienced a situation where a person responsible for the security of a company required a pentesting company to withdraw a clause in the contract that says that: "during the pentest there exist the possibility to delete or modify sensitive data in the production environment unintentionally due to the executi...
I'm researching NTRU cryptosystem and started research based on source code from sourceforge and bouncy castle(java language). Currently I'm reseacrhing attacks on NTRU, based on CVP and SVP. But I'd be very grateful if anyone could give me a link to source code of attacks on NTRU, at least on short length, if any exis...
If there was a communication protocol that encrypts at the very low-level, this would solve the problem of wiretapping entirely and for all.
I have an XP laptop with Wi-Fi issues - it connects / disconnects intermittently. Anyway, I bought a USB Wi-Fi that works well. My security question are: Is there a way to completely disable the built-in laptop's Wi-Fi adapter? I have disable Wireless Network Connection from Network Connections. I do not see the Wi-...
This Credentica- UProve paper describes how Verisign issues (or did issue in the past) certs with encrypted attributes: "VeriSign issues certificates that contain encrypted attributes that can be unlocked only by verifiers that meet the qualifications necessary to receive the required decryption key from a trusted th...
Clipboard abuse from websites Many websites use JavaScript or CSS to stealthily insert or replace text in the user's clipboard whenever they copy information from the page. As far as I know this is mostly used for advertising purposes, but PoC for exploits have been demonstrated. However I discovered that one does not ...
It is always recommended to disable Avahi daemon, for security reasons, when not in use. So, by what ways it is possible to exploit a system which has avahi daemon service running? And how can we secure it?
Google Chrome has a feature that allows different users to use Chrome on the same computer in a completely separate space. The support page is quite light on information. Is there information available about the security of this particular feature? What sort of measures are in place to prevent attacks against a particu...
I am Always Hibernating my Laptop, for faster booting, I encrypted sensitive drive by BitLocker, what if my Laptop stolen and attacker knew that it was in hybernate mode, can he decrypt my hard?
I've tried to replicate the workflow presented on this blog in OpenSSL: http://farid.hajji.name/blog/2009/07/27/public-key-cryptography-with-openssl/ However, authentication seems to fail despite many variations. What's going wrong? Please see the code below you can copy and paste into OpenSSL. Note that I am using the...
Let us assume that I have the following code: namespace MobileApp { public class Storage { public Storage() { } public bool Save() { bool success = false; try { var settings = IsolatedStorageSettings.ApplicationSettin...
I am building a REST API to store security sensitive data for both my client and third-party partners. Each request is validated using an HMAC of certain data which is keyed on a temporary key assigned for a short duration after the user is logged in. Of course everything runs over TLS. Every request gets logged, alo...
Many places today such as restaurants, malls, and other public places have free and open WiFi that does not need a password or login information to access. That means that anyone, even people outside the building that contains the router, can easily access the network. Since there are no accounts or similar, even with ...
I was wondering if there is a PHP implementation for Elgamal algorithm for website data security ? I found that for EC, Diffie-Hellman but could not find any about elgamal. Thanks in advance.
It seems that every time I have a new 'binge' at using the likes of VirtualBox or VMWare (the Type II version), they've introduced even more high-level features, often ones that remove layers between guest OSes and the host system. They realised early on that emulating the x86 was too slow, so they pretty much gave the...
I do not know if it's the right place to ask this question. But I find that this site is the closest site in the exchange sites to ask a such question. I m working in a company and in my job contract there is confidential clauses concerning codes, documents,... In the company we are working on an open source project (G...
In one website I had to manually enter first hand data, which is a really tiresome job. I am concerned if I return such data in json, it would be too easy to parse and incorporate into other's database, render my previous effort futile. In this case would it be justifiable for me to return the said data in html code, e...
Given a setup with multiple SSL-terminating load-balancers in a failover configuration, is it a bad idea to have a unique TLS private key for each one of the hosts? They would all share the same FQDN.
If I have a laptop with full disk encryption it's turned on, the screen is locked and it gets stolen. How would an attacker get my data? It's not encrypted at the moment because it's turned on but the only ways that I know of grabbing a password requires you to boot to a cd/dvd/thumbdrive which requires restarting or r...
Why do car makers rely on physical start keys, which can be stolen by home burglars and then used to start the vehicle? Why don't they use more secure methods such as a personal PIN, or a pin code to unlock the private key which could be stored as a token in the car key?
I'm sure you've heard of gatt.org being the fake website for the WTO. What I'd like to know is, when I'm on the Net, how do I discern the authenticity of the website? I was thinking something like Alexa, but where I don't have to pay to get extra details.
There is a utility called tcptraceroute, and this enhancement called intrace that is used just like a standard traceroute, but it works over TCP. How is the syn flag in TCP used to achieve traceroute like functionality (when ICMP is off) What information can be disclosed (or other risks)? How can this be mitigated? (...
Apologies in advance if this question is a bit vague. I just joined a stock trading group. A guy set up a server for me, and it's racked in their building. I ssh into it, and run my algo remotely from my house. I just started worrying about intellectual property, though. How do I prohibit any kind of access by anyone b...
john /etc/shadow look like working, because john will use many-many CPU for it. But why is unshadowing needed? Why isn't it enough to use "john /etc/shadow"? Because of the salting? Can someone explain why is unshadowing needed? UPDATE: the unshadowing looks like this: unshadow /etc/passwd /etc/shadow > /tmp/unshadow...
Currently OpenBSD supports these architectures ( http://www.openbsd.org/plat.html ): alpha Digital Alpha-based systems amd64 AMD64-based systems armish ARM-based appliances (by Thecus, IO-DATA, and others) hp300 Hewlett-Packard HP 9000 series 300 and 400 workstations hppa Hewlett-Packard Precision Architectu...
Router 1 is setup with WPA and a 32-character PSK. A Linux desktop is connected to it via Ethernet. Router 2 has an 8-character PSK and is connected to Router 1 by Ethernet cable. Router 2 is used only by Android phones which connect to it by WiFi. If an attacker compromises the weaker PSK on Router 2, is Router 1 a...
I got an email from Amazon that my Amazon EC2 server is being used for DDoS attacks and they have closed all ports except SSH. This is tragical for me but I have not been able to find out how and where this attack is running. I can not find anything in cron jobs. I am using ssh key-pairs to connect to the server so it ...
We all know the two most important problems related to a “one-time-pad”: The one-time-pad needs to be truly random (which I think is logic, as pseudo random generators are quick but predictable). The practicability of being able to transmit the number of keys securely to the receiver. When only having a numbers stat...
When working with servers on the internet and doing monitoring is there any dangers using SNMPv2? I am working with observium and have the following: /etc/snmpd.conf com2sec readonly default public group MyROGroup v1 readonly group MyROGroup v2c readonly group MyROGroup usm readonly view ...
I am used to version control most of my dot files and push them to a repository on GitHub. I would also like to add ~/.ssh/config to have an up-to-date configuration on all machines. Could an attacker benefit from having the host names listed in a publicly available ~/.ssh/config?
I suspect that one or more of my servers is compromised by a hacker, virus, or other mechanism: What are my first steps? When I arrive on site should I disconnect the server, preserve "evidence", are there other initial considerations? How do I go about getting services back online? How do I prevent the same thing fro...
I use the avast free antivirus ... and i sort of noticed a very strange occurrence. Whenever I scan a document from avast, the application scans more data then there is on the document. For e.g., if the document size is 1 GB, the scan results will show that the total data amount tested was around 3 GB. This really conc...
Here is the structure we have, 3 servers in location A (172.22.25.X) and 3 servers in location B (192.168.140.X). One of the 3 servers in each location creates an SSL connection to the other 4 servers, like this: A1 connects to A2, A3, B2 and B3 B1 connects to A2, A3, B2 and B3 When A1 connects to any of the servers, t...
Is a session cookie set without HttpOnly at first, but added before the client browser finishes rendering, still considered vulnerable? The scanner test I need to satisfy believes so, but is this a false positive?
I am getting a bit confused with the PRGs employed in cryptography. Basically, a PRG is used to expand a random sequence (mostly a key) of length s to a length n>s, still looking random. Now while this is obviously not possible in a mathematical sense, the idea is that we achive reasonable randomness, meaning that an e...
For Windows, Firefox/Chrome, Java, Flash critical updates are issued each couple weeks, and as far my understanding goes, it is REALLY bad not to install them ASAP. For my 3 year old Samsung smartphone, however, there isn't a single OS update. A brief research shows that in most cases you can't upgrade your Android ver...
If I have a good random number generator that gives me a byte of data at a time, and I want to extract a random decimal digit of 0 to 9 from that byte stream, what is the correct way to do that? At first I naively assumed that a simple (randomByte mod 10) calculation would be sufficient, but since 256 is not evenly div...
I created a slideshow and mentioned that user must not trust URL based on file extension, however, I got some claims against that, because URL's like this should be safe: example.com/images/pic001.jpg example.com/files/cv.pdf example.com/media/track2.mp3 As I knew using Apache Mod Rewrite attacker can redirect any UR...