instruction
stringlengths
24
29.9k
The case would be that someone with stolen credit card registers on my site, and uses the stolen credit card details to purchase services through my site. How can I protect my eCommerce site from stolen credit cards? What actions can I take to validate the card before it is used?
Would implementing signed URL's be an effective security measure to prevent URL tampering and poisoning on public facing resources accessed via a GET request. e.g. http://www.domain.com/:url_to_resource/:hash http://cdn.domain.com/:url_to_resource.js?:hash Hash in my case would correspond to my cache key for the resou...
What are some published industry standards about why revealing the password hash and salt are poor or bad practices from a security perspective? I am dealing with a vulnerability where anyone can anonymously obtain the password hash and salt remotely. The fix is to use a secure and long password (12+ characters). The...
Given that the security "zone" varies based on the TLD, how will the new TLS be handled? For example: A browser may permit cookies to be shared and SSL certificates, and wildcard certificates company.com ( two layers deep) company.co.uk ( three layers deep) local ( one layer deep) However cookies, cross sit...
How secure is the data stored on iOS devices, specifically app data like notes, pictures, etc.? Are there any ways to make it more secure?
For the following scenario in which victim has a WIFI access point at home (AP-HOME) through which he surfs the net and a client (CLI1) connected to "AP-HOME" via WPA2. The victim also has "FREE-AP" in his list over preferred WIFI networks. "FREE-AP" has no encryption. The evil hacker has a battery driven mobile rogue...
Lets say that some certificate authority changed her security policy and we don't trust her new certifications. Is there any convenient way for an organization to remove this certificate authority from his trusted CAs list, yet still keep track and trust it older valid certifications that were issued ?
When multiple keys exist on a given smartcard, how can a user choose between them for a given identifier ... ideally without a loss of privacy? For example suppose I have a government issued ID that stores a set of keys for encryption and another set for non-repudiation. I then store an additional 3rd party key on it....
Suppose I have an office door that has decorative glass on one side of the door. The risk to me is that the window pane could be shattered and a gloved hand can manually unlock and open the door from the inside. Question What terminology and type of lock is appropriate for securing this type of door (as much as poss...
When users change their email addresses within a web application's user account, I see the following problem: An attacker (who has access to your session) could change your email address to a new one (the attacker's one), logout and request a "forgot my password" reset. From that point, he owns the account. To my surpr...
Assume one day you receive the following error from TrueCrypt: is that a reason to worry that someone may have removed the disk (in my case disk 0) and used it offline and then put it back into the laptop or am I too paranoid? Note: the above option fixed it, but the question is what would disable the automatic mounti...
After a user registers an e-mail is sent to them with a link they must click on to activate the account. I know other sites have a limit on the amount of time the user has to click the link, else the link expires. Come to think of it why is this necessary? Is it to prevent an attacker from creating accounts to which he...
The question is related to session-ID management in a particular php-based web-app. The web-app uses the same session-ID for each session for a fixed user. So, after logging-out of the application, next time the user is logged in, the same session-ID is released as a cookie. However, while the user is not logged in, th...
There are a few interesting Bluetooth door locks on the market that use version Bluetooth 4.0 however there seems to be a few issues with this E0 Encryption flaws Risks during pairing Attacks unique to operating environment (temperature, installation, nearby RF) I'm opening up my mobile device to various Bluetooth at...
In one-way hashing its common to prepend or append the salt to the secret and then hash it: (salt + secret) or (secret + salt). I was thinking of this metaphor as salt falling on a plate of food. It of course doesn't all fall either at the beginning or all at the end of the plate. Is there any security benefit if inst...
I'm testing an application that only skips < and > symbols. The user input being validated is always inserted between html tags like <b>, <span>, <div>, etc. and never passed to the page as an attribute. Is it enough protection or there is a way to bypass this kind of filter? Example: <a href="http://www.site.com" styl...
Is it possible for someone to remotely/covertly scan for Bluetooth devices? If so, what is the operational range of this scanner? My concern is that a Bluetooth based door lock will emit a signal that will draw too much attention to my home.
In London, there are trash bins that track a phone's MAC address and monitor the users movement from one location to another. I want to see if there is any best practice for collecting private information like this that allows for analysis, but also anonymity. Imagine the scenario where a MAC address, location infor...
Would it be justified for a business that is behind a SOHO router\WIFI to run a firewall such as PFSense, or is the firewalling capabilities in the router "good enough". For the most part the router acts as an NAT with all ports locked down unless explicitly forwarded. Most of them even allow you to block outbound por...
According to the PGP network FAQ While a number of key servers exist, it is only necessary to send your key to one of them. The key server will take care of the job of sending your key to all other known servers. Quite convenient. Let's say Bob, despite the advice above, decides to upload his public key to two server...
I noticed that Facebook sends out a "Forgot password" code of six digits, which is very short for a validation code, so I assume they are doing the following: Set a session variable which is linked to the code so no other clients can use the same code Possibly also, set maximum number of attempts of entering the corre...
I have found on my web server the file wp-conf.php which when you call it from the browser with a url parameter like wp-conf.php?t7831n=any value shows an interface where you can control the entire server. I am using Joomla 1.5 on the server which has a lot of vulnerabilities. The code for this WSO thing that I decoded...
While trying to install Parallels on OS X I looked into Activity Monitor to find where is the installed Parallels located (it was weird that it stays invisible in Application folder). And than I found this: So Parallels installer opened a Chrome's Cookies file. I googled for this but no information found. It is a "lit...
e.g. curl -v -H 'Accept-Encoding: gzip' 'https://cdnjs.cloudflare.com/ajax/libs/Colors.js/1.2.2/colors.min.js' As you can see, result is gzipped. My assumption is since they are serving from 3rd party domain, it is safe for me. I only need to disable when it is served from my own domain, right?
After reading about the 'imminent cryptocalypse' etc, I started thinking about a cryptographic protocol that would not depend on complexity of mathematical operations (e.g. factorisation, discrete logarithm) for privacy. I made a proof of concept that works by round-tripping the locally encrypted/decrypted message at b...
/////////////////////////////// Updated Post Below //////////////////////////// This question has received a lot of hits, more than I ever thought it would have on such a basic topic. So, I thought I would update people on what I am doing. Also I keep reading in the comments that I am storing passwords as plain text....
I want to know how to generate working RSA key pairs, with the correct syntax. Let's say I have already generated somehow my numbers for a 512bit key, which are: e = 00065537 d = 2a3ff2f501835d7d0f7ccad34265525b0c91f800fc252324e4bb5668392ba55a65d812d658b7065725c259a12115918dbdbbea6cead9225a91c3fcc6b43f1cb3 m = 4bb26cf2...
Quite recently someone had maliciously stolen my pictures and created a fake Facebook and Instagram in my name, with abusive captions under my pictures. However, with the advice from the police, I had contacted Facebook and Instagram and they had closed down the fake accounts. Now the problem is how can the police tra...
I'm wondering if it would be a problem to split up a 256 bit AES-Key into two 16-Byte blocks and distribute it, to implement some kind of a four-eyes-principle (you need two persons to decrypt a message)? I know there are some encryption schemes which use multiple secrets, but none of them are part of the .NET Framewo...
Let's say I'm running a BitMessage node. One possible attack against me would be to upload illegal content to my node, and once someone knows it's there, to tip off the authorities, who would then search my computer and discover illegal content. However, all the content is supposed to be encrypted, and unless you have...
I am using Google's OAuth2 for authentication for a website which also has a RESTful API component. I would like to support connections from clients which are not within a web browser. Also, I'd like to avoid maintaining a list of usernames and api keys. I'm contemplating this scheme : User logs in to the website u...
I am currently pentesting a site for a client of mine and I found a very strange 'bug'. They have a search box on the home page which if I enter te\tst and hit search, it redirects to the search results page (not via ajax), and in the title it shows the keywords which I searched for, however, the control character actu...
A previous developer I have used has got upset and start compromising the files of my website on daily bases (such as changing the index of the site with weird messages, deleting the .htaccess, renaming folders, modifying DB tables). I suspect while he was working on the site, he placed some where in the files option t...
I came across the Lavabit High Scalability Writeup and got curious. Do you use any particularly cool technologies or algorithms? The way we encrypt messages before storing them is relatively unique. We only know of one commercial service, and one commercial product that will secure user data using asymmetric encryptio...
We're developing a Client/Server C# .NET application that needs to be FIPS compliant.Im reading a lot about FIPS online, but am having a bit of difficulty determining the difference between the compliance of the encryption algorithm chosen, and what data needs to be encrypted for compliance. I understand that the follo...
From what I have read, using a wildcard SSL/TLS certificate is not advisable, how do you do certificate issuing & management in your SAAS application(linux) where each client has a user selected subdomain?
What is the difference between signing a user ID and a whole Key ? Which behavior is the best as to signing user IDs and Keys ? How and when to use "Local signatures" (non exportable) ? (I was told any keys except for people I really know. However I can trust some people without knowing them in real life.) My system se...
In the X.509 specification it sais that the issuer name is to be signed. Since we verify the certificate with the authenticated issuer's public key, it seems infeasible to forge the issuer name anyways. A different issuer name would lead us to choose a different entities public key which would never match the signature...
I understand how DH key exchange is vulnerable to a MITM attack. When Alice sends Bob g, p and her public key, if she also sent a value H that was a hashing of the values g,p, and public key all concatenated together, could she and Bob then have a phone call where they verify that H is the same value for both of them, ...
I'm interested in what (if any) the practical security implications of a company making use of a Private APN are as opposed to using a standard network provided APN and VPN connection back to the main corporate network. On the face of there's some benefit in that VPN software might not be needed but I was thinking that...
Didn't Tor create a local socks proxy? Why doesn't all the Web traffic go over this local socks proxy and why is JavaScript disabled in the Tor Browser bundle? If you would connect with firefox for example to a normal socks proxy, could javascript still reveal my real ip?
Based on recommendations, we recently attempted to harden our Nginx SSL configuration against BEAST/CRIME/BREACH attacks with the following stanza: ssl_prefer_server_ciphers on; ssl_ciphers ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-RC4-SHA:ECDHE-RS...
I know from experience that reading from /dev/random blocks when the Linux kernel entropy pool runs out of entropy. Also, I've seen many articles and blog entries stating that when running on Linux, java.security.SecureRandom uses /dev/random as its entropy source and thus blocks when the kernel entropy pool runs out ...
I'm creating a communications protocol for a custom device, and originally I planned to simply use Transport Level Security (TLS) as the means of security/encryption. I've been instructed (this is for a job) that Application Level Security (ALS, which I believe would have to be defined by me) must be used instead, with...
If I have a website that is only accessible by authenticating at a login page, is it possible for a non-authenticated person to get access to static assets (images, css, javascript, ...)? I imagine the only way they could do it would be to brute force the urls somehow or somehow know where the resources on the server a...
I'd like to validate the ability to own a DNS domain and am already considering validation that is currently in use by others such as Email validation of Whois contacts Access to the "postmaster@domain.com" or "admin@domain.com" email addresses A special CNAME entry that is set to an arbitrary value Question Since c...
I've just bought a new dedicated server. Should I install fail2ban if I am only using SSH keys to login? What else does fail2ban protect? What are the advantages and disadvantages of fail2ban? Is there a better alternative? I have also disabled root logins and installed sudo. It is an Arch Linux server supplied by OVH....
What are the known limitations with browser addon/extensions that do in browser encryption vs a native implementation in the browser. The addon would expose cryptographic primitives for use in JavaScript. The browser addon would act as an interim solution to "The web cryptographic API" under development by the W3C.
I'd like to safely analyze and test a T-Mobile UMG366 USB cellular modem. Clearly I'd like to know about this specific device, but more generally I've no idea how to deal with a complex USB dongle that may be compromised. Do I just use a throw-away OS install/PC for the job and try to keep a close eye on what happens...
How would applying hypervisor (e.g. xen) principles in the development of a web browser offering isolated browser tabs (virtual machines) improve or reduce security of existing web applications (good or badly coded). A web app in this context would be a tab, with a cross origin policy using a whitelist approach and jai...
For the fourth time in over a year, Exchange OWA has put our internal network at risk due to a remote code execution flaw that exists on the server runtime. This risk is compounded by the fact Microsoft won't support OWA in the DMZ. The issue has to do with the CAS server's (also known as Outlook Web App / OWA) "Outsi...
Looks like nmap could fake source IP address, and getting a valid response, but only in LAN environment. I'm not sure how it works, here's my thought, You created a packet with fake IP address and a fake MAC address (associated with the fake IP), so that you both spoofed the packet source and being able to get the resp...
I am trying to understand why do we really use those pre-shared keys when creating a IPSec tunnel. From all the reading that I have done the DH group creates the keys that are used to do the actual data encryption, hope I am correct. If yes, the pre-shared keys are used only for the authentication?
I am building an information recording system (WCF based) for a business that is accessible by staff over the internet. This software will not be distributed and there will only be a handful of users with the client application installed. Due to the fact that the stored information is highly sensitive, I would obvious...
If you set up a rogue AP with the same SSID as a commonly-known wireless access point, what prevents you from forging DNS queries answering with your own web server and stealing people's login credential cookies?
I have heard that we can create ip-packets by our own and send it to a network or a host. How this Can Be Done ?Please Explain step by step??
So I need to get a block of text sent to me over email from a friend, but before he sends it he wants a public RSA key from me. Am wondering what is the simplest way for me as a newbie to generate this pair and then use it to decrypt the message that gets sent to me? I've been messing about for a while now tonight wit...
Help me guys please i'm having an problem with my google account. I can't log in it keeps saying : Error 150 (net::ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN): The server's certificate appears to be a forgery. How do i fix this please?
Long story short: Got 1 TB HDD. Created one fullsized (non-system-)partition on that. Encrypt via TC. One time, via boot, Win presumably formats that (and maybe writes some bytes on it). I manage to restore TC-Header, now TC can mount the partition. But Windows says "Must format drive to use it." "Filesystem not detect...
I have a friend who's has a site hosted by a company in the states. They think that someone has gotten access to their email account because any requests for support submitted via their website automatically ends up in their deleted email folder. They also receive what they feel are bogus inquiries for their products....
Someone told me it shouldn't be possible for someone to detect if a certain email address is used by a registered user on a website. So, for instance, when the user asks to reset his password, you should say "Password sent" whether the email exists in the database or not. If not, people can use this function to check w...
Is it possible for a person who has your ATM/debit card number and PIN, to withdraw your money? If so, how?
I understand that Azure ACS acted as a STS that had the ability to redirect users to a given STS (OpenID, LiveID, Facebook) or authenticate using a local user/password account. In a passive situation ACS would use redirects and either respond with a SAML token, and could be a User STS holding user accounts, or a resour...
My company missed to extend a domain name by few days, so it went to grace period. From what I know, if it went to grace period, people would still be able to access my website. However, the site was actually showing a porn site with domain name header. My boss quickly paid the domain names and few minutes after that t...
I've recently been employed as a junior web and software developer for a small company, and noticed that their Home page has had links to completely unrelated sites added like spam to the index.html which have been hidden (display:none) with JavaScript. I wanted to know how this was preventable in future, or how it wa...
Since DDoS is simply a group of subjects coming together to send requests to a particular server, is it true to say that a voluntary DDoS is perfectly valid and legal in US? By that, I mean that a program (e.g. Low Orbit Ion Cannon) is running openly on the user's computer and not trying to hide it's tracks using unscr...
In my office there are approaximately 25 systems are connected through network and all having internet accessibility.but some people are missusing this facilities like downloading films from torrent websites and accessing facebook during the work time. so iwant to block the websites like facebook,twitter and torrent we...
I am running encrypted communication with ping tacked on after decryption and deserialization is complete. I.e. incoming data -> split into packets -> decrypt -> deserializer -> actual message or ping outgoing message or ping -> serializer -> encrypt -> send I would prefer ping be handled before any decryption happens...
I met a strange issue that the TLS connection is always torn down by Chrome after received server ChangeCipherSpec. The sequence is as following: Client Server SYN--> <--SYN, ACK ACK--> ClientHello--> <--ServerHello, Certifica...
When I send an email from my gmail account to another mail server (apple, microsoft, yahoo...), is the connection encrypted in the path between the two servers?
I can't recall a website that after resetting my password I was automatically logged in, I had to type the password again - which seems quite silly. From a security perspective, why do websites do that?
Say I want to write a top secret document (yeh, I'm a secret agent), and I use the method in the title...more specifically 1) Write a document on TextEdit on a Macbook Pro 2) Do not save it 3) Print it through a wireless printer 4) Close the document without saving it What are the various ways a hacker could actually o...
What are the relative advantages of Heimdal and MIT Kerberos now MIT is freely exportable? Ones I've come across so far that might be relevant to my particular project is that it seems MIT supports constrained delegation in the GSS-API layer and Heimdal doesn't yet, and that Heimdal has a --with-openssl config option t...
I have a mobile application and a server. The mobile application communicates with the server through a web services framework via SSL. The mobile application allows customers to pay for transactions. The server authenticates the mobile application on every web service call via a username, password, device id and dig...
Let us assume that I have a web service in an ASP.NET project. If I turn off the WSDL documentation protocol, will other users be able to: add a service reference to the web service? discover the methods and parameters of the web service? This is the code that I am using to turn off the web service protocol: <webServ...
I have no idea if Linux is more secure than windows. I think Linux is more secure but I want to know what is going at kernel level. Somebody told me that Linux have only one main kernel and has it root password on it. Is it true? I Google it and I found many confusing answers : Linux does not run .exe (executable file...
If a salt is not stored along with the hashed password in the database, is it possible that the password is salted? I ask because in a system I am working on there is only a password column, but when I review the code it appears that whoever wrote this is attempting to salt the password. From what I understood password...
I am working on a web application, security is high priority. So, if a user has failed to login more than 3 times, the account will be locked. Should I display a message to the user saying "your account has been locked"? It would help to attacker to get the username.
If I manually change my DNS setting in the router or in Windows settings from the provider's one to, say, 8.8.4.4 by Google - will it mean that my ISP has no idea which sites I am going to? Maybe it is possible to figure out where I am going to just by analyzing my traffic? And 1 more question. If my DNS is manually ch...
The Question I was reading a forum last night discussing the idea of emailing a user a login link, much like a password reset link, so they don't require a password. Their email address is already verified on sign up using a similar such link and I see them as being fairly similar in principle to a reset password link....
I know that my question has been responded lot of times, but most the responses addresses functions that I don't even use (like use include with images) and that makes me worry because maybe I'm not doing something that I should be doing. When I'm validating the images, I first check for the size (2MB or less) and then...
What command and control channels might a botnet use? Which would be most effective? I found good info on IRC, what are other possibilities? (Exam preparation - no harm intended :-) )
I'm trying to write a secure code that can keep my site users passwords as safe as possible. Now I'm fairly new to encryption and would like some professional opinions and suggestions. As well as a raw estimate of how long it would take to brute force my current encryption method. So my encryption begins with creating...
My company has applications on cloud and intranet. Also, we have various roles such as employee, customers, partners etc. We would like ID federation between services hosted on public cloud and internal applications. Following scenarios are possible Employee accessing cloud services from intranet Employee, customers, ...
I've noticed that some web services use a security scheme in which log-in attempts that have some unusual characteristics trigger extra authentication steps. For example when I try to login to my Gmail account when I'm abroad it sometimes makes me solve a captcha, or asks me what is the location I usually log-in from...
My server has been repeatedly attacked in the last few days. Here's the observations: The ISP server traffic monitor shows the incoming traffic goes up to 300Mbps (with no outgoing traffic), and holds for 10 minutes. I've got fail2ban turned on, and ICMP echo off. I've got port 80/443, 22 open, and this is an Ubuntu 1...
In terms of application layer authentication, it is common to track failed login attempts to existing user accounts. However, I have not seen anyone tracking failed login attempts of non-existing user accounts (meaning those that cannot be identified using public identifier, e.g. email).
I have a pretty simple HTML page that submits a username and password to the server via POST method: <doctype html> <head> <title>SQLMap dynamic parameters</title> </head> <body> <form id="sqliForm" action="sqli.php" method="POST"> <input id="username" type="text" name="username"> <input id="pas...
I want to add a password blacklist that would prevent the 1000 most common passwords from being used in order to mitigate shallow dictionary attacks. Is there any negative implication of storing this blacklist in the database?
Where is a secure place to store a "secret" in a web browser that a User has access to and JavaScript does not? Thinking was along the lines of web history, bookmarks, built in password manager & cache. Edit: Secure: HttpOnly Cookie as below is an option, but unless a User uses an addon (firebug), they cant easily acce...
First time posting here; apologies for any mistakes I've made, please edit, retag, migrate as appropriate. I have a simple homepage whose purpose is (essentially) to contain my contact info and some pdf's. Over time this has become a bit of a side project for me, adding content and making it fancier with Javascript and...
I thought it'd be a neat idea to do a wireshark capture on my own login to a website and try to figure out where the packet containing the password is and decrypt it. So I logged into a website which uses SSL RSA with RC4 128 md5 to encrypt the password. I'm not asking for someone to tell me exactly what to do, that w...
I'm looking into monitoring a Windows VPS by sending Syslog messages to a Synology NAS, which can generate email alerts and such. I also would like to use SNMP to generate health stats, and see trends over time. Its supposed to provide intrusion detection as well as health monitoring. After evaluating many Syslog Windo...
Usually in a well controlled environment, Database Admins are granted specific rights like Read, Modify...etc. No one has the right (ANY) to perform on any Database. Certain requirements dictate to give some users (ANY) permission to the Database they work on. Q: What are the risk associated with the kind of permissio...
Whenever I'm programming in C++, after I run a new executable, Avast suspends it informing me that "not much is known" about the file and asking if I'd like to continue execution or terminate the process. It's done this to a few files I've downloaded from the web too. Sadly, I just got a virus. So how is it while it's ...
How much memory is needed if I want to generate a dictionary of all possible combination of length 6 with a-z and 0-9 characters? Is it a good idea to go for cracking password if I know password includes no other character then these and length is 6. I want to know roughly how much space will be need to write these all...
If I wanted to brute-force decrypt data, I would try decrypting it with a key and see if the decryption returned nonsense. If the decryption returned meaningful data (ex. something that a natural language processor deemed English, if I was trying to decrypt an English language email), I would assume I had the key. If i...
I'm looking for a way to secure MySQL data in particular tables for example settings table. Ideal solution would hook up to database and log all INSERT, UPDATE and DELETE requests to particular tables, preferably on low level. I believe on one of INFOSEC events there was some solutions that allowed to monitor requests ...
If a computer is directly connected to the internet, it is vulnerable to attacks. So we attach a hardware firewall between the computer and the internet. But doesn't this new setup mean that now our hardware firewall become the one vulnerable to attacks? If that's the case, wouldn't the hardware firewall itself be infe...
Assuming you're not running on a compromised machine and you're following common recommendations (long random passwords, etc.), who specifically (name and affiliation) asserts that TrueCrypt is secure?