instruction
stringlengths
24
29.9k
I am using Volatility Framework 2.2 to anlayze a Linux memory dump. This memory dump was taken from an Ubuntu 12.04 LTS x86_64 machine with the kernel version 3.5.0-23 I have the profile for it and you can find it at the link below. http://www.sendspace.com/file/pqyipd I have placed this zip file in the location: /vola...
(If the consensus is that this question belongs on crypto, rather than here, please feel free to [tell me to] migrate it.) From what I have read (looking specifically at AES in Cipher Block Chaining mode), initialization vectors should be non-repeating, or better, under some circumstances at least, totally unpredictabl...
In my firewall settings there are options for "Allow VPN connections via PPTP" and "Allow VPN connections via L2tp-IPsec". All of my internet traffic goes through a VPN. Should I have these settings enabled or what do I need to find out to be able to tell?
When I scanned my site for Vulnerabilities I found this error. Various SQL errors were disclosed within the application source code or other files. I have checked for sql injection and confirmed that it's not injectable.So how severe is this vulnerability? How an attacker could exploit it?
I have read this article on how a scripted web page is able to obtain the visited history of a user browsing the page. However, I can't find any clear information in the article describing the extent of who or what can access the user's browser history. By using a script that tests for differences between visited and u...
There might be flaws in the following method for anonymous signal reception that I'm not seeing: Alice doesn't know who Bob is. Bob wants to Alice to notify Bob of a particular outcome without discovering who Bob is. Bob doesn't want to rely on a narrow broadcast window. Neither Alice nor Bob want any other party (Caro...
A lot of parents when they get smart phones (Android) for their children ask me whether I can install some kind of parental control app on the device (Even though I'm barely out of high school myself ;) ) And I usually say that these so called "parental control apps" or even spy apps will need basically unrestricted ac...
If a user registers an account on my Website with Facebook authentication, can I safely skip the "verification email" that is usually sent to users who sign up without Facebook (that is, from a regular "personal details + email + password" registration form)? Or is there any purpose to sending this verification email (...
Two separate discussions have very recently opened my eyes to an issue I had not considered – how to confirm the Open Source binary one uses is based on the published source code. There is a large discussion thread on cryptography-randombit based on Zooko Wilcox-O'Hearn's, founder and CEO of LeastAuthority.com, open l...
I've tried 3 AES 256-bit CBC encryption programs, and I seem to be getting different results for each one with the same 32-character password, which consists of all @ signs. They are: Polaris SSL AES-256 (C code) OpenSSL "enc" command (command line) Some random website that uses Javascript to implement AES (website) I...
Assuming I generate random bytes with a secure PRNG, how many bytes do I need to make authorization tokens secure? Specifically, when users log in to a website, a token will be generated and stored in a cookie to authorize future requests. Server-side, the token will be stored in a database and looked up when a reques...
I have deployed a PKI server and successfully able to generate the ECC based user or client certificates. but non of the web browser support ECC as public key. I have tried different tools and also trying to work this with MS CAPI through openssl but haven't get succeed. Can some one recommend a utility for any of the...
Problem Behind question : I own an blogspot site and people used to come and comment on my posts. In recent days I can see a spammer who comments anonymously on my every blog-posts. The comments were posted under the name of anonymous. Is it possible to track the IP or some stuff related to spammer whom makes comments ...
I've been trying to find out exactly what a pepper is. The only things I could accurately determine are that a Pepper: Is theoretically unique from site to site and hard-coded in the site's source Is usually the same random string and used in every hash But I haven't been able to figure out it's purpose in adding sec...
Maybe a duplicate: Bruteforce on 10 characters length WPA2 password So I am trying to get into home network security for the fun of it. More concretely, I am trying to reproduce the scenario of cracking my home router's WPA2 pass-phrase. It was trivial to record a handshake with my AP. Now, to cracking the (already k...
What would be the best practices for storing access tokens of another api for your users? In particular I'm developing an application with some friends that let's user log into Facebook to both authenticate to our internal REST api and make it able to fetch their friends (and other things). I was thinking of generating...
From Technical Spec http://uri.etsi.org/TrstSvc/eSigDir-1999-93-EC-TrustedList/SvcInfoExt/RootCA-QC a Root Certification Authority from which a certification path can be established down to a Certification Authority issuing Qualified Certificates. Only to be used as an extension, if the servicetype is http://uri.etsi....
DIRECTIVE 1999/93/EC at ANNEX I Requirements for qualified certificates states that one requirement for qualified certificates is (a) an indication that the certificate is issued as a qualified certificate; What is an example of this indication? Could a qualified certificate fullfiling all the requirements in DIRECTI...
The authentication was triggered by certain event (like approving button) on the form. In the process of client certificate authentication (in IIS), user was asked to use their PIN (private key) and after authentication, a certificate information is accessible (through x509). If I place an image of the user signature o...
. . .better solutions have been proposed and will be worth considering once they have withstood the test of time (i.e. “5 to 10 years in the field, and not broken yet”). -From Thomas Pornin's excellent blog post on password hashing. The quote seems to me to be a case of the chicken and the egg. New solutions need fie...
Almost all agree that during a pentest it is impossible to guarantee the integrity of the target (Is it acceptable that a skilled professional pentester deletes or modifies sensitive data in production unintentionally during a pentest?) because you are going to use unexpected input and automatic tools to see its respon...
I would like to implement a lockout mechanism that not only protects against same username and many passwords attacks, but many usernames and same password attacks too. To implement this I figured I need a table to store every entered password that caused a failed attempt. Then, at every login attempt, I check if there...
Seems like it wouldn't be too hard to determine if someone is using all lowercase, special characters, or even the length of their password. In fact, the length might be discovered from audio only. After years of typing, I find that I type common English words much faster than random strings. Again information availabl...
And if it is possible, why has it been decided to keep using a smart card for this task? I will be grateful if you can provide some practical examples on how to bypass the use of a smart card (if possible).
Consider the following scenario: Alice wishes to browse Victor's website while on the job at Initech. Victor's website is hosted on an alternative domain name system to which Initech's DNS does not peer. Eve (wishing to facilitate the free and open exchange of knowledge) hosts a webpage containing JS that performs do...
What are the threats to having the KDC accessible via the internet for remote clients? It's my understanding that the authentication is a challenge/response protocol and that the password is never transmitted. Are brute force attacks the reason this isn't common? Is this because the kerberos authentication is more va...
I'm designing a RESTFUL API that will always be used over HTTPS, what security advantages over the use of HTTP Basic Auth could be brought to my system by using such kind of message authentication codes? Example of HMAC could be this one of AWS.
Suppose that we produce a sensitive document on a Windows 7 box, NTFS filesystem. As we write the document, it grows longer, and we keep saving it, which means that the editor overwrites it from the beginning, truncating it to zero length and re-creating new content. Assuming that the editor itself re-uses the same fil...
I am behind a firewall in France. I connect to proxy A, in Ireland with Dante via SSH port 22 and make a tunnel forwarding port 1080. The proxy works as expected but still having a port range blocked. I suspect the firewall does deep packet inspection. But where is the blocking happening? At what layer? Do you reco...
I'm working for a high school. We have given every student their own laptop. Some of our students have figured out how to bypass our web filter using a program called Ultrasurf. If you're not familiar with it, Ultrasurf is sort of like a proxy service. It basically goes online and downloads a large list of proxy server...
Suppose that we create a sensitive file as a HTML document, and then view that file with a web browser such as Firefox, or other. Is it possible that the file is treated as if it were a document fetched over HTTP or HTTPS, and stored in the browser's cache? If this is the case, we have to wipe the browser's cache and s...
Last night some one exploit some vulnerability in my site and then upload php script in my images folder. I have the Amazon EC2 server with centos. Now the Hacker downloaded 600GB and increased my bill. Can this be DOS attack. How can I check it. When hacker was downloading then I see CPU usage being 100% I saw many a...
Some high level risks with DLP that I can identify (with the monitoring componant): 1- Abuse of authority: people with access to the system can look into other users private data. 2- Loss of service availability: Specially within large organizations where DLP is unable to keep up with network traffic demands. 3- loss...
In any residential building, there is a multitude of WPA2-protected wireless access points. Yesterday I was at a friend's and attempted to launch aircrack-ng against their AP (with permission). I was assured that there is a linux laptop currently connected. However, I was unable to acquire the device's MAC, to pass to ...
Suppose there are three devices: WPA2 protected AP linux laptop, accessing internet through tha AP linux laptop, not connected to the AP I own the third device and do not know the AP's password. I have sufficient signal strength. Can I port-scan the authenticated laptop? Provided there is an open e.g. telnet port, ca...
I want to create a web service that can only be accessed by a specific type of entity: my own mobile application. Is there any well-accepted methods to do this? I'm thinking about embedding a secret into this mobile application, but it seems to be susceptible to reverse engineering and can be easily sniffed on network....
This article describes how to fool nmap in it's OS fingerprinting detection. In short, nmap sends malformed packets to open and closed ports and listens to the responses. Because every OS implements it's own TCP/IP stack, the response can be matched against a database of known signatures and the OS guessed. The two wa...
Someone has sent a sensitive email from my Gmail account. I wanted to trace the IP address by checking out the Received: by X field in the header of the sent message. However, every message that is sent from Gmail and that I check the header from has (the same) private IP address in the Received: by X section. The fie...
For the last 2 weeks I have been reading many blogs about website security and hashing passwords. Many sites have mentioned the pro's and cons about different ways of doing this, which has left me a bit confused about how secure my code is. If possible, can anyone have a look at the code below and let me know what they...
I want to open and forward SSH port to one of our internal computers. Problem is - it will use the same IP address as PCI-DSS environment (where the HTTPS payment gatway is running) Basically firewall will forward port 22 to ssh server, port 443 to PCI-DSS environment Is it compliant with PCI-DSS?
I have a web app without TLS (I know it's not good, I try to take it as a challenge). The login has two steps: first, the admin sshs into the server and runs a maintenance companion program that provides a one-time (securely) randomized link. The one-time link leads to a login form. The one-time link is good for just 1...
Let's say that I have one Database, and several separate web applications that share the database. If hashes are to be unique and generated on the server-side, how can I ensure that I am generating a unique hash across several applications?
I was arguing with a friend about logs in user logins. I think that logs means a big audit source for IT audit professionals. Why should I log successful log-ins to my server? It's so important log fail attempts to log because I can realize if some malicious person wants enter to my system using brute force, but why re...
I'm looking for a class project that (1) is scalable to large classes, and (2) teaches secure design. This is for an undergraduate course on computer security. Hopefully, it would be educational and fun for the students. The first requirement is that grading of the class project needs to be scalable. The course has...
Just had a vendor tell me that because their PCI auditors did not recommend banning the use of unsalted MD5 to store sensitive data at this time with with their current level of PCI compliance that they're not going to ban the use of MD5 to store sensitive data. NOTE: The vendor declined to say if the auditors: (1) d...
I'm loading untrusted code at runtime and for this reason I'm also writing a custom SecurityManager. This untrusted code however lazy-loads some JRE classes that I do not want to block. Would it be safe if I granted "read" permission to the whole JRE directory (System.getProperty("java.home");)? Otherwise, what are the...
This question is meant as a canonical question in regard to the US and UK spy agencies compromising end nodes and encryption between nodes to spy on people they suspect to be terrorists. However, this has the side effect of significantly elevating the risk of exposing innocent people's personal data. Recently an articl...
Regarding the Guardian article about NSA control over encryption, there was this gem deep inside: Independent security experts have long suspected that the NSA has been introducing weaknesses into security standards, a fact confirmed for the first time by another secret document. It shows the agency worked covertly to...
While browsing for SSL certificates, specifically domain validation type (the cheapest), I noticed that they advertise as valid for a single domain/subdomain, but then I noticed that they are valid for a single subdomain along with the root domain. One of the certificates advertise as Secures 'www' & 'non-www'. Is that...
I am building a project a part of which involves performing static analysis for Android applications. I know of Androguard and its tools that help in analyzing Android apks. But I am stuck and don't know how to proceed after this. For example, using androaxml tool of Androguard I can convert binary Android xml to read...
I have recently been performing a security audit at work (sanctioned of course) and have seen some interesting behaviour from Cain and Abel. I've purposefully avoided using APR so that my co-workers won't freak out at security certificate errors and have only been using the "sniffing" functionality. Somehow, Cain is st...
I have read this article about the revelation that in 2010 major encryption mechanisms including big four (hotmail, facebook, google, yahoo) and other encryption mechanisms were broken by NSA and GCHQ. The agencies have not yet cracked all encryption technologies, however, the documents suggest. Snowden appeared to ...
According to Der Spiegel: SSL should be cracked Exactly how much the two intelligence agencies can actually read along from the encrypted traffic in the network, is not entirely clear. But the reports can imagine that a large part of the communication and data transmission in the Internet is not secure, at least...
Hello I am using outlook with ssl security to connect to a mail server but whenever I launch a MIM attack and accept the fake certificate my password is shown. How is this possible? Shouldn't I be connecting securely with ssl where the attackers wont be able to manipulate the certificate? And if the certificate of outl...
Which public-domain encryption libraries would you prefer to use with .NET? I found http://www.bouncycastle.org/csharp/, but I don't how trustworthily The Legion of the Bouncy Castle is. Its seems not to be maintained frequently. Which cryptographic primitives do I want to use? Symmetric key cryptography Public key cr...
Let's assume an organisation that generates ~100 Passwords a week; these Passwords are 32-Characters long and randomly generated. The consultants that need passwords generated use a Password-generator that generates 20 Passwords upon request the consultant then chooses one out of 20 suggestions One requirement from ...
I have an issue with Hydra when I use it. I have tried the same command lines given in guides directly supported by the Damn Vulnerable Web Application (DVWA) v1.8. Ok so.. here is my attempt output... root@kali:~# hydra 192.168.1.2 -l admin -P /wordlists/500-worst-passwords.txt http-get-form "/DVWA-1.0.8/vulnerabilit...
I have been working on the payment side with RSA and AES encryption which I got a fairly well technical understanding of encrypting credit card details. Recently, We adopted a new chip and pin device which supports DUKPT and combined with 3DES seems to be stronger than RSA and AES. DUKPT is something completely new for...
A client of mine has a managed VPS with dozens of websites on it, maybe even hundreds. Now his server keeps getting infected on a regular basis. The webhost / server admins keep digging in the dark. They run a monthly scan, remove infected software, but can't say from which sites it originates as the log files seem t...
Is there any way to find out if someone who is connected to my network is sniffing packets? There is a way with nmap if his card is in promiscuous mode but what if it is passive?
I'm playing around with scapy and wireshark and I have sent a packet to a destination that does not exist (10.0.2.14). Wireshark shows an ARP attempt to resolve the address but as its not there the ICMP packet sends to 10.0.2.14 anyway (what happens here? is it forwarded to the gateway and left for the gateway to disca...
I just read the article written by Bruce Schneier, the crypto guru. In the article, he says : Prefer symmetric cryptography over public-key cryptography. But, he doesn't shed any light as to why. Now, I thought that public key systems avoid problems with some man in the middle attacks & key distribution which are the...
I suspect that someone is monitoring my internet connection. Said person has revealed information about sites I visit and online conversations (Facebook) even when I am not using his/her network. What software or techniques could I could use to figure out how this person is monitoring me?
From what I've read, PGP only uses the pub/priv keys for encrypting/decrypting a symmetric key used for actually encrypting/decrypting data. I'd reasonably assume that longer asymmetric keys wouldn't be much slower than shorter ones, since they would only be needed for encrypting/decrypting the mentioned symmetric key....
These days, there's pretty much three forms of authentication in general use on the web: Single-factor authentication, e.g.: PIN or password. Two-factor authentication, e.g.: Single-factor plus a software- or hardware-generated token code, or a smart card. "Two-step" authentication, e.g.: Single-factor plus a code sen...
What are the consequences if an attacker is able to modify the /etc/ssh/moduli file?
I have a malware sample. I want to know what vulnerabilities does it exploit (and of which software). I tried analyzing it in IDA Free and it seems that the code was developed in Visual C/C++ runtime. I know that C/C++ code is hard to decompile. Can anyone tell me how do I find what vulnerabilities does the malware exp...
I seem to find myself doing this a lot. Maybe there's something about colleges and universities contracting out to bad webdev firms, but I've emailed 3 different firms to complain about them holding passwords in plain text. One of them, UCAS has the majority of my personal details, and refuses to acknowledge that it's ...
Suppose, a server hosts https://www.master.com/ and thus is equipped with a (single domain) SSL certificate. Furthermore, suppose there are some web apps below master.com: http://wiki.master.com/ http://docs.master.com/ http://cal.master.com/ ... To protect those web apps, one could use a wildcard cert...
As we all know, JavaScript loaded inside a website A gets restricted to access the domain itself [same origin policy]. Unfortunately, same origin policy does not apply to newly created DOM nodes, that for example link JPEGs of third party domains. Thus, using this media link, a malicious script could pass sensible info...
How can a ARP-Poisoning attack work in a mixed (wireless and wired) network? Assuming that the attacker is connected to the network via wireless connection and the target is a computer connected to the network via wired connection, how would the ARP poisoning traffic go across the wireless to the wired network? Why wo...
Microsoft makes the Windows source code available to certain third party organisations such as the US and foreign governments, universities etc. This is their Shared Source Initiative Is this a complete set of Windows source files and is it possible to build the whole OS with it? If so, are the resulting binaries the e...
So, I clicked on a reasonably-looking LinkedIn invite, not thinking about hovering overing the link first, since usually the e-mail client warns me about such things. Once I realized I landed on an exploit page, I quickly copied the source (containing some obviously guilty JavaScript), closed the window, and deobfuscat...
As a home internet user, why does my ISP block my communication with any other client on the same subnet as mine? It is done for security obviously, but what is the risk? Update: as clarified by Tylerl, the issue is related to non broadcast nature of the end user connection to POP. Users are only able to communicate wi...
I've always been curious about understanding how virus carry out their activities. For that reason, I've read a lot of books and articles about different types of viruses and the way they operate in a system. One thing that I have never found anywhere and I am really curious about is this: For instance, let's say I hav...
I have heard on TV (tg5) that some devices exist, that can be connected to a USB port on a PC that is turned off and get data from the hard disk. I am wondering if (and if so how) this is possible; isn't the hard disk turned off when the PC is turned off? How would a USB device be able to read data from the internal ha...
I am implementing an application using bouncy castle crypto API it uses AES-CBC to encrypt files and i have some questions regarding the development of my application. I dont want to use a static IV (due to security reasons) how do i go about it? do i have to append the IV to the file and then when decrypting extract...
I'm currently running a webserver from home accessible on the public internet via a static IP. What kind of risks are there in doing so? From what I understand, the setup will not allow connections besides port 80 and thus my network and computers are safe from attacks, but is that right? What are some steps to take ...
I created a Squid proxy and a self-signed SSL certificate. The SSL certificate on the server is a private certificate linked to the ssl-bump feature. I am using tshark to dump the SSL traffic, but I can't sniff with tshark. For example my tshark command is: tshark -o "ssl.desegment_ssl_records: TRUE" -o "ssl.desegment_...
I've been reading up on SSLstrip and I'm not 100% sure on my understanding of how it works. A lot of documentation seems to indicate that it simply replaces occurrences of "https" with "http" in traffic that it has access to. So a URL passing through such as "https://twitter.com" would be passed on the to victim as "h...
Captcha jacking is an attack to bypass a captcha by coercing a human into solving the challenge response. Prof of concept code that uses a proxy can be found here. Is there a good method of preventing this type of attack? How can an application prevent bruteforce attacks or automated account creation in light of capt...
I was thinking about implementing a symmetric cipher - just for the knowledge, no intent to use in my code in production. I often find diagrams like this: (From IDEA cipher wiki page) I can get each "node" means an operation like XOR, but is there any reference about what each kind of symbol means?
Most software and services seem to have low "burst" settings, like 3 to 5 login attempts before a temporary autoban for a couple minutes. Especially banks have a very low limit before access is denied. I find this very annoying and, when possible, I always set it to allow 15 (or more) login attempts. My password are no...
Do privacy protection laws within Germany/EU protect students from gross invasions of privacy? I have reason to believe that through some either permitted or unsanctioned channel my teacher was able to information about my criminal history [Editor's note: OP does not note if his legal record is public record in his for...
We are crackers who get our hand on an encrypted file. We know the whole file is AES-256 encryption of the original plaintext file. We also know that PBKDF2 was run 1000 times on the original plain password to make the key and IV. In this case, we know how to bruteforce crack this: Generate plaintext password Run PBKF...
A robust outgoing firewall will protect against desktop applications directly connecting to the internet without your permission. However, as the browser is a generally authorized application for internet access, I have begun to see more applications circumvent this by forwarding a URL request to the browser. This is e...
I made my friend go to this web site and it immediately infected his machine with malware (AntiVirus SecurityPro). It happened just by going to the front page. It seemed the malware started up, but that Microsoft Security Essentials quickly recognized it and offered to remove it. It took several reboots before it was f...
I've had an employee leaving the other day and he's told people in the business that he might have taken some sensitive information. It's likely to be via cloud storage (e.g. Dropbox, Box, Evernote, etc.) Is there a way to track this down? We use Citrix Xenapp Thanks in advance
I just read AlephOne's paper on smashing the stack, and implemented it on my machine (Ubuntu 12.04), it was a bit old so had to take a lot of help from the internet but I enjoyed it. Now, I want to learn how is that prevented in real life. It would be great if you can suggest me some papers or online resources that dem...
Suppose two parties S and D would like to protect a communication channel. Therefore, S and D exchange two sufficiently long key sequences SB und DB of random bits over a secure channel [e.g not over the internet]. After this exchange, both know each other's keys. For example, S and D might (physically) exchange 64 GBy...
We want to send an encrypted message to Alice. We can ask her a public key over the network, encrypt with it a message and send that message back. It is bad, because someone can pretend to be Alice and send their public key. The solution said to be PKI. So, we connect to PKI service (for example Verisign) and get the p...
I scanned a file (virus) on VirusTotal and 3-5 antivirus labelled it as Generic.KDV.549626 Is there any central "KDV" database where all the entries related to a virus are stored?
How can I securely render SVG documents in a media sharing application? I think the same-origin policy might help a bit if I host the SVG documents on a separate domain and render them inside an <iframe> element, but I'm not sure the same-origin policy will catch something similar to <script>window.top.location = 'http...
from basic research my understanding is: it is vulnerable in TLS 1.0 in SSL 3 Attacker can inject javascript and pass some known text to some server where attacker will get the encrypted version of known plain text and this is how the encryption mechanism can be known. Please clarify if I misunderstood anything. Questi...
I'm new to cryptography. While reading about symmetric key encryption, it was mentioned that it requires secret key exchange so that 2 parties can decrypt the ciphertext. Now, using some encryption software like GPG, we can use symmetric encryption by gpg --symmetric abc.txt It asks for password there. Is the key gener...
Suppose a client C wants to transfer form a service provider P, who collected data on behave of C using a web-application. Additionally, suppose the amount of data is larger than 100 MByte and contains privacy related information. Thus, the data needs to be protected against third party access. C and P operate within t...
If someone has access to the physical Visa card (and with that comes the number on the front, the expiry date, and three digits on the back) would it be possible for them to program a NFC-enabled device to emulate the physical card? In reading "What prevents people getting charged over NFC in crowded places?" it seems ...
When OpenSSL generates keys you'll always see a series of periods/dots (.) and pluses (+). openssl dhparam -text -noout -outform PEM -5 2048 ............+........+...............................................................................................................................................................
I'm working on encrypting a web application's cookie. Using symmetric AES/CBC, I encrypt the cookie data before writing it out, and then decrypt it when reading it back in - the standard stuff. The problem is that people may use load balancers to host this web app. For that reason, the secret key used to encrypt cookie...
Say someone drives up and parks in front of my house. They get a list of all SSIDs they can pick up. My phone is configured to save the WPA2 password and automatically login when the SSID is in range. Is it possible for someone to follow me when I leave my house next, and then once we are away from the vicinity of my ...