instruction
stringlengths
24
29.9k
After reading @Iszi's answer to this question he states Viruses attached in e-mails do not only come in .EXE files. They can be any form of document - PDF, PPT, DOC, XLS, SWF, etc. Are there any formats that cannot carry malware, for example a text file? Is this a moot point because anyone can rename file extension ...
Is there anyway for the attacker to clear the cache of a DNS server in order to poison it? For example, if someone attacked my DNS server in an attempt to spoof Google.com, they will receive the response "Google.com is already in cache" - so does the attacker have a chance to clear the data in the cache?
I'm working on a small side project in PHP. I may yet include some sort of actual username/password registration down the line, but for now, for ease of attracting attention, my goal is to allow for any anonymous user to use my site without registering. Here's how it works, in general: User goes to the site, and creat...
Is it possible to make a living (say $75k+ a year) finding and selling vulnerabilities? It doesn't matter (for the sake of this question) whether it means selling purely to a bug bounty program or through a broker. Thank you.
Besides being able to mess up settings and having access to the personal SkyDrive account, what else might an attacker on the corporate network be able to do when the accounts are linked and settings are shared between work and personal computers? What about an attacker on a sync'd personal computer?
Justin Schuh defended Google's reasoning in the wake of this post detailing the "discovery" (sic) that passwords saved in the Chrome password manager can be viewed in plaintext. Let me just directly quote him: I'm the Chrome browser security tech lead, so it might help if I explain our reasoning here. The only stron...
Is it possible to convert a public key to a certificate using the public key only? I've seen the following, which takes a private key to form a cert request, which can then be self-signed: openssl req -new -key privkey.pem -out cert.csr But, given a public key only (such as in SSH, OpenSSL, PEM, PKCS8 format), how do ...
So, last night I looked at the Apache log of my shared hosting account for the first time. There was quite a lot of traffic that looked suspicious, specifically a lot of GET request from a domain, registered to some dude in China, that redirected to my server. I looked around and found that it's pretty common to have f...
POLi Payments is an Australian based online payment provider which has begun trading in New Zealand. They are supported as a payment option on some large eCommerce websites in New Zealand, including Air New Zealand, JetStar and The Warehouse. It basically facilitates the verification that, as a customer, you have made ...
If an SSL interceptor is installed for security reasons in an Organization, and a certificate from intermediate CA is installed on all domain machines, what kind of risks this setup presents?
I get some hits every then and there from different IPs, always the same scheme: GET /blah/Resources/Public/Css/data:image/svg+xml;base64,... HTTP/1.1" 404 795 "http://some.referer/" "Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 5.1; Trident/4.0; InfoPath.3; .NET CLR 2.0.50727; .NET CLR 3.0.4506.2152; .NET CLR 3.5.307...
What tool can I use to analyze Hooks (SSDT, Inline etc.) on Windows 7 / 2008? (x64 Platform) Rku (Rootkit Unhooker) is the only tool I know, which is not available for x64 platforms.
Can you see any obvious challenges to requiring 2+ users to confirm authentication requests using an association such as a friendship type of relationship. A practical application would be an Enterprise SAAS application that requires another user in the same company to authorize his login request within a short period ...
Today my friend demonstrated such a attack. I am using RenRen, a social networking website in a way very like Facebook in China. And I saw an article he wrote. Actually there is only an "image" embedded in this article, like this: <img src="http://somesite.org/x.php" ... > When a browser tries to request this URL, the...
When I want to decrypt mails on a public PC (café), encrypted with GPG, in e.g. gmail with the extension "Mailvelope" or equal - how would that be possible? I found tools to run from an USB stick where you need to store the gpg keyring and the tool. For "Mailvelope" I need to import the keys (also the private key) to d...
I've been studying how Tor works - including the great QA "Why can a Tor exit node decrypt data, but not the entry node?". I understand the concept of onion routing and multiple layers of encryption. My question is specifically how are the keys exchanged securely so the circuits can be built? This is touched on in tha...
So imagine the next situation: Alice wants to initiate OTR instant messaging session with Bob but Joe is Man In The Middle. Alice negotiates a shared secret 'X' with Joe (thinking he is Bob) using Diffie-Hellman. Joe negotiates another shared secret 'Y' with Bob (who thinks Joe is Alice) using Diffie-Hellman. Now Alice...
It is known that another way to determine the position is through WPS (Wi-Fi Positioning System). This uses the Wi-Fi networks available in the area, if any, to dermine the position. But according to this, it requires that the network had been previously gathered and stored in a database through a process called wardri...
I have two Arduinos using Bluetooth to communicate one with another. Is it possible to sniff the Bluetooth conversation between the two devices? An Android solution would be great, I heard of hcidump but I think that sniffs only the connection between the phone and a device. If with Android is not possible alternatives...
Each encrypted blob will have a well-defined, but different lifetime. Some will be around for 5 minutes, some for a day, some for a week, none for over a month. I would like to be able to "delete" the file by discarding the key, even if the file is no longer under my control, e.g. on a backup medium somewhere, or sto...
I'm in charge of a product security in our US based startup and I plan to use NaCl for encryption (well, Sodium, actually). I'm trying to navigate the labyrinth of US export regualtions - something I never dealt with before. By now I'm aware that encryption export from the United States is governed by the EAR and BIS....
Imagine Eve taking over the keyserver both Alice and Bob are using. By replacing Alice and Bob's public keys with her own, she can do a man-in-the-middle attack decrypting messages and relaying them re-encrypted with the original keys. Even if Alice and Bob sign their messages (by encrypting a hash with their private k...
As far as I know, the browser contains the certificates of several CA. When I access http://gmail.com, the site says it is Gmail, it exposes a certificate signed by one of the CA I have in my computer, that way it knows that the site is who it pretends to be since a CA back this claim. But, what if in my office comput...
Would one be able to have a telemedicine conversation with a patient with google+ hangouts the way one can over a telephone? In other words does the security satisfy the HIPAA regulations that say private health information can only be transmitted over secure channels? So my technical questions are, "Is video conferenc...
is It theoretically possible to hijack (I mean substitute on the fly) the fedora or ubuntu or windows packages upgrades if a cracker has owned the company's firewall/proxy ?
I understand CSRF and why cross-domain AJAX requests with cookies or other credentials can't be permitted without an Access-Control-Allow-Credentials header explicitly permitting them - otherwise I'd be able to do things like lure people to a site that hijacks their Facebook cookies to post something on Facebook in the...
I've been reading suggestions to use time-consuming formulas for checking passwords from login attempts, so that repeated attacks will be slowed down. Wouldn't it suffice to just sleep a bit in the function that does the password checking? Simplified example: function check_password($user) { usleep(1000); return cr...
I have a website with no ads and no external content. Everything on the page comes from the webserver in question. Some users on Google Chrome have reported that they see the following warning when they try to enter the site. Content that has not been developed by us include only jQuery, flags and the template (styles ...
For educational purposes, I want to see what packages are sent over my home wifi with VPN on and off. What program should I use for this?
Problem Statement I'm looking at ways to ensure that business partners, or emails from trusted senders, never get quarantined; ....in other words prevent "ham being seen as spam". Ideally this would guarantee delivery even if the sender was marked as a spammer (...see blackhole list). Since most email is going thr...
I was reading up on OWASP's page on CSRF and in their example they use a request where the sensitive parameters are stored in the query string: http://bank.com/transfer.do?acct=MARIA&amount=100000 On my site I make a request where nothing sensitive is stored in the query string: http://mysite.com/accounts/delete But ...
If I were to reign in the problem scope of this other question, is there any proposed or current RFC focused on preventing replies of previous messages from hitting SPAM quarantine? The previous question discussed using a special "reply to" address as a component of the dynamic whitelisting based on a HMAC. Example: A ...
To maintain the non-repudiation property of signing while still having escrow for the encryption key, it's recommended to have a separate certificates (and pub-priv keys) for signing (say CertSign) and encryption (say CertEnc). Assuming a certain Alice with Alice-CertSign and Alice-CertEnc, from a practical perspective...
Assuming I have a database of PHI that my web application needs to access, how am I required to secure the credentials on the webserver that the web application uses to access this database? Is storing a standard user/pass combo a HIPAA compliant method, or do I have to figure out something more secure? Config file exa...
It's common knowledge not to email credit card numbers or other personal information. How about emailing photographs that contain personal information, such as a photo of a deposit? Regarding plain text, hackers can easily scan emails for text that matches. Is it worth encrypting photos to be sent by email, say in an e...
As a learning project, I am trying to implement a secure way to share files with a friend over dropbox. (I am not looking for existing software, I am doing this in order to learn how to do this right.) Of course I will not try to invent my own encryption algorithm. I have a file that I want to send to my friend s...
As a follow up to Is saving passwords in Chrome as safe as using LastPass if you leave it signed in?, I would like to know how firefox's password manager compares, if you have a master password and also how secure is their sync feature
I hear rumors that double hashing is bad... like hash("sha512", hash("whirlpool", "string")) Is it bad and less secure? if so why? Thanks for any help!
I need to take input from the user of a simple bit of math, they want to solve. Rather than parse there input myself, I want to just use the lua, loadstring function to load their input and evaluate it. But I don't want to let them execute abaritary code, So I am passing the string though a whitelist to make sure they ...
I keep seeing "python-requests/1.1.0 CPython/2.7.4 Linux/3.8.0-19-generic" requests e.g. from Amazon's servers of my website. It's kind of creepy. Who would set up an Amazon server to scan websites? Should I just block them? Cheers
I am working in a project which we must count HTTP response size. I am getting chunk size like: crlf = g_strstr_len(chunkeddata , responceSize - responceHeaderSize, "\r\n") And than I had a simple check like sizeof chunkdata information should be 9 bytes most . Than it turns out that wasn't enough , while counting m...
A colleague of mine just received a (spam) sms with this message: Congratulations! Your mobile have won $1,000,000,00 Pounds with Draw# 294 64/2013. For more info & claims, contact our office on: mobilelotterydept101@rogers.com@ The smartphone automatically makes a link of the email address ofcourse. (up to the l...
Is there a way for me (non-expert in JavaScript) to detect JavaScript attacks from a website. I have done a lot of searching around and have not come up with a definitive answer. NoScript is a pain in the ass to use as more and more sites REQUIRE Java and scripting to be enabled (e.g. signing into this site). Every tim...
Well basically as an experienced user I am really afraid on the way that Adobe deeply resides into all my Windows based workstations. Basically in every machine that has some Adobe solution when we restart the explorer process (stops/start from task manager), the update flash (image below) prompts out of nowhere, even ...
To prevent adds and pop-up that seduce users to install or download viruses I have disabled Java. But I have noticed that even with Java disables Firefox is still running it. The pop-ups are coming up. I even tried switching it to Private Mode just to see and ti still allowed the Java to run. This happened since the la...
What is the risk of cross site scripting, if I embed javascript into a website? Quite simply, I am using a 'site builder', and they don't allow rotating images, but they allow you to embed code... So I thought I would do that. My site doesn't have a database or anything, the 'site builder' site may have... Is there a r...
I have a server that I want to use a wildcard cert on. It runs multiple services. I purchase a wildcard cert so that I can protect mail.something.dom, www.something.dom, im.something.dom, calendar.something.dom, addressbook.something.dom A few months later I come into several new servers. I now have enough servers t...
According to Postgres's documentation, Postgres's password authentication method uses MD5 hashing to secure the password: The password-based authentication methods are md5 and password. These methods operate similarly except for the way that the password is sent across the connection, namely MD5-hashed and clear-t...
As everyone knows each company wants to save as much money as possible. I have been tasked with pre-filtering logs on less important status/health messages before they get to the SIEM. Does anyone see the risks involved when pre-filtering before going to SIEM? Why would someone not do this and or is there a benefit o...
Are there extra measures taken by 1Password and KeePass, that make them more secure than an AES-256 encrypted text file? The database formats they use seem needlessly complex for my own purposes.
Most of the time when I am looking for 404 errors in my access.log, I see attempts to access something like /phpMyAdmin/scripts/setup.php. This does not bother me so much, but few days ago I was surprised because I saw this in my access.log 95.47.119.124 - - [19/Aug/2013:11:30:31 +0000] "GET http://server7.cyberpods.ne...
The iOS data protection API and its implementation are fairly well documented, but it is only really useful if apps actually use some level other than NSFileProtectionNone for their files. Is there any information on what protection level the stock iOS apps use for various data? Apple mentions that the Mail app uses th...
My daughter just discovered yesterday that a wire transfer of $12K had been made to her checking acct. at Chase. It said it came from a Wells Fargo in NY in the name of some name she didn't recognize. She called Chase and was told there was nothing they could do until it posted the next day. I'm afraid that this unkn...
I'm contributing to an open source project and we setup a testbed for security testing. We want to start a challenge to find security flaws and my question is: how do we attract hackers to participate? How shall the challenge be designed (except for a webpage that explains the why and how)? There is a very limited bud...
We have some devices which are designed to use standard frequencies/protocols, such as GSM, CDMA, GPS, Wifi and Bluetooth, among others. While our focus is not thought to be used for high-profile criminals (such as organized crime) who will often use jammers, we are aware that this is, to our knowledge, the weakest lin...
I fell in a scamming trap. It took me a while to figure it out. Blinded like an idiot. But it is what it is. I can only do as much as I can now. Tell me if there is anything else I should do. After realizing, I scanned everything for viruses but there where none. I used Macscan and ClamXav. I changed all of my passwor...
How can I understand if I am being targeted by a grey hat social engineer? And if I fail, what approaches exist to detect social engineering attacks being in progress within an organisation?
Recently I logged on to my bank account via the Chase app on my iPhone. I received a message that another device was currently logged on to my account and "would I like to end the session"? Of course, I ended it. I went directly to Chase Bank and spoke with their security department. There was another user logged on f...
A key consideration for most computer platforms is the availability of security patches for vulnerabilities which inevitably arise with them. Are there any available resources which provide information on what Android security issues have been patched/not patched for a given device?
Many security experts advise not to click on malicious URLs. How can clicking a URL affect a computer's security? If a malicious file was downloaded and executed, then a computer's security may be breached, but how can just visiting a URL do this?
I read this question on the process of generating a private S/Mime key. I looked at Comodo - which offer free e-mail certificates. I'm trying to find out whether Comodo generates the private encryption key on their servers or whether it was generated locally. The Mozilla-FAQ reads as follows: To obtain certificate fro...
I have downloaded and ran the programme Rootkit Hunter and the results are worrying. I don't know much about malware other than a malicious individual has persistently been installing it onto my machines via malicious emails - this time targeting my iPhone 4 (which I promptly got rid of upon discovering this individual...
Is this normal? Can any ports be "dangerous"? I have 9 tcp's in a listening state, 4 in a close_wait state, and 4 in an established state. Some of them route to odd procceses using PID such as default tab.exe. A lot of them are from IObit in states: close_wait and established. Something I am worried about is some of ...
I have been shown one regex which, per the one who wrote it, should protect against SQL injections on SQL server 2008. It doesn't really look like it, but I'm wondering exactly what code I can get past it to prove it doesn't protect. value = Regex.Replace(userInput, "[\n\r\t\']", " "); sqlCmd = "Select names from myta...
I was doing a network scan on my computer with Wireshark and came up with something very suspicious: I found a stream with the jabber protocol. I do not have a jabber server set up nor do I have any messaging client I am using. The weird thing is that it is saying that it is to and from my website domain, which makes n...
I have a column in my database that I need to encrypt. The column can contain any arbitrary data. What I am thinking is to generate a public and private key pair first. Store the public key in a configuration file and store the private key securely. After that, for each row of data that I need to encrypt, Generate a...
I was scanning a site with Nessus when the following vulnerability was reported: CGI Generic SQL Injection Nessus says that: "An attacker may exploit this flaw to bypass authentication, read confidential data, modify the remote database, or even take control of the remote operating system." So I continued reading a...
I am currently working on a service which offers a HTTP API for mobile clients. I want clients to authenticate in order to access my API. The server itself is doing the authentication there will be no external providers. Connection itself is encrypted through SSL/TLS. My question now is which mechanism I use after user...
I would like to discuss this scenario: There is a HTTPS service which responds with signed keys to an authenticated client. These signed keys can be used for another service to return very sensible data. Let's assume that because of some internal security hole (unexperienced internship, exposed ssh key on git server, ...
As far as I have read and understood STAT is a concept used to design a platform independent IDS. My question is whether there exists any compiler/interpreter for STAT Language as I am planning to do a project on IDS. My team was reading through some related articles and we actually couldn't find any method to impleme...
I have come across a site that on going through the password reset sends my old password to me via email. Now we know this is insecure I see here this question and here and no doubt others. However is there any well authoritative source saying that this is bad that I can quote to their customer services (ie quotes fro...
I am currently working on functionality that will allow users to reset their passwords. My question pertains to the security in putting user ID's (a.k.a the auto increment ID's from database) in the URL so during the password reset process I can use that ID to fetch their secret questions, their token, and to reset the...
I want to store all my email on a portable client on a USB drive if possible. My aim is to protect the stick with an encryption if possible so that if I remove the USB stick all traces should be gone. Is this a possible scenario including all the trace removal upon disconnection of the USB drive? If no, why not?
I'm currently developping a django application. I need to store user data. This data must be unavailable to any other user or admin I've created a dedicated user account system (no using dj auth). (Maybe I could modified it, but this is not the subject here..) User password is hashed with passlib. User data is encrypte...
I am planning to buy a VPN service just to circumvent the filtering applied by the government. However as I am planning to use OpenVPN on my dd-wrt router, all of my data will pass through this tunnel. My question is that if it is possible for the provider to go through my data. If so, is it also true about the SSL con...
I'm struggling to understand the (non-)use of Diffie-Hellman (DH) in TLS. DH has been around for a long time now, why does almost nobody use it, yet? DH is only being used for "key sharing", why does nobody use the DH secret to encrypt everything? Why do we need a symmetric key, when we already have a DH secret, that ...
While playing with old operating systems, I came across that there are no remote code execution exploits available for Win95 machines, running just file share (no IIS or anything else). Win95 neither has port 445, nor named pipes. My scenario is that a file share for the whole OS disk is world writeable (empty password...
When I import signatures or receive a key with gpg, it outputs some cryptic lines like: gpg: 3 marginal(s) needed, 1 complete(s) needed, PGP trust model gpg: depth: 0 valid: 1 signed: 16 trust: 0-, 0q, 0n, 0m, 0f, 1u gpg: depth: 1 valid: 16 signed: 115 trust: 1-, 1q, 1n, 1m, 12f, 0u gpg: depth: 2 valid: 105 ...
I just read a couple of very interesting discussions on Chrome password security strategy. Chrome’s insane password security strategy Showing stored passwords - Tim Berners-Lee The following is how Chrome, Firefox and Safari handle storing passwords and showing stored passwords: Chrome uses OSX Keychain to store passwo...
IMHO there was a Blackhat video about it, but cannot find it: Is it an existing problem that a mobile phone number could be faked? I mean when using internet banking: The attacker gained the password for the internet banking, but an SMS token is needed to log-in. Q: Can someone create a "fake mobile number" - for my...
I am deploying OSSEC architecture agent-server mode. I want the server to ban ip not only on agent but also on a remote firewall (dedicated iptables server). I've seached on the OSSEC's documentation but didn't find a way to do this so far ...
I have to implement a token based authentication for a RESTful web service. This is the first time I'm implementing security features in a software, and this is what I have in mind for now : The client first authenticates through a login form(in the client application) with his email and password. If the authenticati...
I would like to be able to prove that I wrote the article that resides at a given URL on someone else's blog. Is there a way that I can do this with public key cryptography? I know a bit about the topic and I am thinking that I could: use my private key to generate a public key which I will display on my own website f...
Sorry, It may be possible that few things are repeated in my question. I have gone through some documentation/discussion signing an API request and twitter signature documentation As per the discussion here signing an API request With a signed request the password is kept safe and an attacker cannot use the informati...
OFF Pocket: OFF Pocket is a "privacy accessory for mobile phones to block all signals". To use the OFF Pocket simply place your phone inside the case and close it. Your phone is now OFF. Untrackable. Unhackable. Undistractable. link: OFF Pocket on kickstarter Why better to use this accessory than switch off my mobile p...
Let's say I have a wireless network that is password protected. What procedures can an intruder take to gain access to my wireless network, or at least be able to decipher the packets I am sending into something understandable? How long would such a method take? For example, how exactly does aircrack gain access? This ...
I'm looking for a client-side encryption implementation that would be able to secure CardDav & CalDav data so that they couldn't be compromised even by the hosting provider. Server side: PHP or Python based Web application implementing CardDav & CalDav Client side: Desktop E-mail client & mobile client with CardDav ...
When developing Webpages, they say you should use POST for "destructive" actions, and GET for actions that only retrieve information. Is the same true for apps? Is it a total no-no to use GET for sending requests from an iPhone app over HTTPS to a Web server for actions such as: Creating games Updating scores Sending ...
What would be a security risk for a website feature that allows you to connect to your account without typing your password, given that you allowed such a login for the next say 10 seconds from a second secured device of yours. A simple use case is that your are trying to log in from an unsecured pc. You do not want ke...
I'm looking into Single Page Applications that are used for both mobile development (PhoneGap) and regular websites. Since the application can load from a offline copy, can run from http://localhost , or can be packaged as an app visible in the Apple App Store or Android Play Store (etc), the standard approach of set...
Lets say I have two racks with about 40 nix servers in them. I don't want to set all of the root user passwords all the same do I? If not how do you manage and keep up with all of the passwords? Is an LDAP server a viable option to use with root logins?
When Lotus Notes asks for the password, it displays a screen with a picture that appears to change after a new character is entered after the fifth character. I have noticed the sequence of pictures is the same between closing and reopening Lotus Notes. Is this to distract an attacker from looking at the keyboard...
In Google Chrome, I can go to chrome://extensions/ and click "permissions" to view the permissions that an installed extension has been granted. I cannot find an equivalent in Firefox. Is there such a resource? In Firefox, about:permissions has per-site permissions, which is a great resource but I need per-extension p...
My particular problem has to do with secure communications over a mesh network (http://en.wikipedia.org/wiki/Mesh_network), in particular man-in-the-middle (MITM) attacks. The difficulty is that mesh networks require intermediary nodes (that is MITM) to properly route messages. By secure communications I mean that any ...
I'm working on an .net app within aws. Basically our app pulls "generic" data from another organization for the purpose of building customized reports. The data is sent to us via ssl/tls and sent back the same...the processing is all conducted in RAM. It's only when the reports need to go into specific formats is there...
Is there any programing related reason why some password cannot have certain characters? If the idea in storing a password is to store it's hash, since a hashing function can take any input (ok at least I guess any reasonable hashing function can take punctuation) why would a program not allow some passwords? Does this...
I've got a laptop that is currently 'Air Gapped' that I want to further secure by locking down the USB ports and NIC. I've disabled the NIC from the BIOS, removed the WiFi and bluetooth modules. But I don't want to disabled the USB ports and when re-installing i need to use the NIC as well. I do however want to control...
Consider WordPress, which houses all of its admin functions in the /wp-admin/ directory. Accordingly, its admin URLs all begin with /wp-admin/. I'm wondering if it would be significantly more secure to have each installation use a unique name for the admin folder and URLs, For example, the admin folder for a particul...
For a non-public repository, are there any potential security concerns in sharing git commit hashes? For example, when I post a git-related stackoverflow question that involves git commits from private repos, I will change the hashes slightly out of paranoia. Or perhaps a website will serve a git commit hash in a heade...
This is what I understand so far from reading various knowledge bases and articles about DV SSL. Can anyone please help clarify if any of these is wrong? DV SSL (and SSL certificate in general) is only associated with a domain name, not the IP address configured under DNS for that domain. Hence if I change the IP on m...