instruction stringlengths 24 29.9k |
|---|
In expansion to my previous question what qualifies as public access? I'm trying to wrap my head around the intent of the points 1.3.1 and 1.3.2 and 1.3.3 of the PCI standard.
I have four DMZs at my current job (using a sidearm setup), and this is smaller than my past implementations. These are always built in a top d... |
Now that Blackberry received FIPS 140-2 certification for one of it's QNX devices, does anyone have technical specifics on how data is encrypted on both mobile phones or the Playbook tablet?
I'm interested in seeing the differences in how information is treated (technically) in the "Playbook" partition vs the "Enterpr... |
I'm currently looking to implement a VPN solution (based on a Checkpoint Connectra) purely to provide remote access to staff (no site-to-site, or customer access), but the one design decision I can't quite seem to reconcile in my own mind is the placement of the VPN appliance on the network.
I see that there are severa... |
I already asked this on StackOverflow but I was suggested this would be a better suited place and I found no way to "move" the question so I have to copy it.
Believe, I know, there are hundreds questions about this issue. I read looots of them to find the SAFEST way to store a password but every answer given gives me t... |
I know that FPGAS of Altera enables you to encrypt the RTL code while you work with it, what I can't understand is why it is really encrypted since once I have the FPGA, I can take it and with flash reader (theoratilcly) read the encoded RTL code, and read the KEY of the FPGA and then I have the code.
what do I miss?
|
Possible Duplicate:
Securing an E-commerce site
I'm developing an e-commerce site in a LAMP environment. Is it advisable to separate data on to different servers (i.e. to have one server as the web server and another server to house transaction and other customer data)? In other words, from a security perspective is... |
If the subject makes no sense to you, that's fine, it makes no sense to me.
I've been tasked with securing emails sent from some devices, and I'm looking for advice on intelligent questions to ask to clarify some requirements. Apparently the source and destination ip addresses need to be encrypted, along with the user... |
In "Some thoughts on the iPhone contact list controversy and app security", cdixon blog
Chris Dixon makes a statement about web security
Many commentators have suggested that a primary security risk is the fact that the data is transmitted in plain text. Encrypting over the wire is always a good idea but in reality “m... |
1 Does Ephemeral Diffie-Hellman support authentication?
Quote from www.rsa.com/products/bsafe/documentation/mesuite21html/dev_guide/group_EPH_DH.html
Ephemeral Diffie-Hellman does NOT provide authentication, since neither party has guarantees about the entity with which it is communicating.
However, Quote from the b... |
Regarding the concept of device (browser) fingerprinting, would it be possible for the user to spoof fingerprinting data by giving random information such that your fingerprint changes after every request?
If so, are there any plugins/browsers that have this capability?
|
Based on this question here:
Are "man in the middle" attacks extremely rare?
Is it possible to detect man-in-the-middle attacks, and if so, how would one go about it?
In addition, what if the attack is taking place via connecting into the local network, such as phone lines? Is there any way to detect it?
|
I am currently investigating using Linux Laptops for my development team. We currently run Windows. The one advantage that keeps coming up for Windows over Linux from a system administration / security perspective is the fact that if a laptop is stolen, it can be remotely wiped upon boot.
I have been trying to find inf... |
I am using .NET 4.0 to develop a Windows service that will temporarily store encrypted data in a database. The data will be encrypted when it is inserted, then decrypted, processed, and deleted once processed. This will probably be done as a batch process (thousands of rows at a time).
I've looked at Generating Keys ... |
I apologize if this is not the best place to ask my question on the Stack Exchange network, I couldn't figure out where to get enough attention and be relevant.
Facebook provides a SSL host, it can be accessed by https://www.facebook.com.
Basically, as I understand it, changes in the certificate should only occur when ... |
I've found this code in base 64 on all php files of one of my client's sites (wordpress) and I'm trying to understand what it does.
I'm also trying to figure out if it was an application exploit or a direct FTP access that past this code.
Everything starts with setup_globals_777() and ob_start('mrobh') setting the call... |
This is largely a question of how MTAs and different components communicate.
I'm curious that if I send an email using SMTP over SSL to my MTA, can it's next jump to the next MTA or MDA be insecure?
I'm guessing there's no guarantee after it's out of my communication channel, just want to make sure.
|
I'm currently trying to write a web service for customer and requirement is to use WS Security. On their server side, they have passwords stored as SHA-1(salt+password).
According to WSS spec, security header will contain nonce, timestamp and password digest as SHA-1(nonce+timestamp+password_user_entered). Then on the... |
I manage about 20+ Linux servers and I am considering using an md5 scheme similar to following to generate the admin passwords:
echo 'masterpassword' 'serverhostname' | md5sum
Which returns 4db2430f9b5f788077fd36636002e391 using the above example.
My question is: Given that I always put a space before the command to ... |
Section 8.5.15 reads:
If a session has been idle for more than 15 minutes, require the user
to re-enter the password to re-activate the terminal.
Section 8 Accompanying note reads:
These requirements are applicable for all accounts, including
point-of-sale accounts, with administrative capabilities and all
accounts ... |
Suppose there's systems A, B and C.
A has an trusted relationship* with B and B has one with C. How can B intermediate a request from A to C while still providing both A and C the guarantee that they are talking to each other?
Some options I have considered:
A can share a passkey with C and that key can be used to en... |
I am beginning to get involved in incidents, some of them are APT (Advanced Persistent Threat).
Despite the complexity available in the 'bibliography' and in the conferences or security e-zine, the techniques I've found used by intruders are for the most network break-ins, malware based break in through emails sended ... |
I've been thinking about bcrypt recently, and what I wonder is if there's a way to deal with the inherent (D)DoS problems with slow hashing functions. Namely, if I set up bcrypt so my machine takes 100 ms to hash a password, then it only takes 10 password attempts per second to make my server unresponsive. I could redu... |
I've read a lot of articles.
The client uses the information sent by the server to authenticate the
server. If the server cannot be authenticated, the user is warned of
the problem that an encrypted and authenticated connection cannot be
established. If the server can be successfully authenticated, the
client... |
I am using an Amazon Linux EC2 instance as a web server. My web app uses ImageMagick. Because the Amazon Linux (CentOS) repository doesn't include an up-to-date version of ImageMagick, I am compiling it from source. To do this I run:
yum groupinstall 'Development Tools'
Does installing development tools on a productio... |
I'm currently using AES encryption (at home) on GNU/Linux (one of LUKS AES-256 variants with xts) and on Windows 7 (Truecrypt) with a 15 characters password (alphanumeric lowercase only plus _).
Should this be enough or would it be better to change towards a longer password. How long should it be? Recently viewing the ... |
As I've been working on Windows machines most of my life I know most of the best practices and apps to keep them secure.
When it comes to security on Apple macs I'm clueless as to where to start.
|
My application is a .NET Windows Forms client, one of whose functions is to allow the user to send personalised mailshot emails to opted-in recipients stored in the database.
The emails are sent using the .NET System.Net.Mail classes, from the client computer on which the application is installed, directly to an SMTP s... |
"This vulnerability is located within the Dropbear daemon and occurs due
to the way the server manages channels concurrency. A specially crafted
request can trigger a use after free condition which can be used to
execute arbitrary code under root privileges provided the user has been
authenticated using a public key (a... |
While developing a Ruby on Rails application using a commonly used authentication library named devise, I noticed from the prefix $2a$ of the produced password hashes in the application database that it's using a bcrypt variant.
I read up about crypt and bcrypt on Wikipedia and noticed that newer variants of bcrypt are... |
I've been messing around with DVWA (Damn vulnerable web application) and w3af. I've been scanning DVWA with w3af, and have used the spiderMan proxy and http config to setup auth credentials to get past the login screen of DVWA, but w3af still doesn't seem to be finding any sql injection anywhere (which is guaranteed). ... |
I read the following about PKI:
Using a public key system, a user may encrypt a portion of a document
using his or her private key. This message will later be decrypted by
the recipient using the sender’s public key. Assuming that the
sender’s private key is secure, the recipient can assume basic
authenticity ... |
What are some of the practical risks that come with a server-to-server connection over http (not secured with https/SSL)? There are no users involved, just a server-to-server connection from one company to another.
Business A will call a web service endpoint at Business B. An API key will be included in the call to be... |
Does anyone know of a method to fingerprint machines in the LAN and find out what kind of AV software is installed?
|
This question is inspired by a bug/issue in recent Linksys router firmware. Essentially, something has changed recently that's preventing HTTPS access to the web admin on current generation Linksys routers (E4200 and E3000 specifically, although others might be affected as well). This problem shows up in IE, Firefox, C... |
I'm deploying a web-based ERP system for a customer, such that both the server and the client machines will be inside the customer's intranet. I was advised in another question not to use TeamViewer to access the server, using more secure means instead, and so did I. But now I'm concerned about whether or not TeamViewe... |
Possible Duplicate:
Are WPA2 connections with a shared key secure?
I have a WPA2-Persinal security type and encryption AES, If I use wireshark can I see what apckets other computers send to the router in my network? assume I have the Network Security Key.
I didn't see any handshake or key exchange while connecting t... |
I witnessed an interesting attack today. Someone was able to register a new Facebook account with the email address of a friend of mine. We don't know how it happened, because Facebook requires you to click on a confirmation link to use an email address. Maybe the attacker got access to the mailbox somehow.
The interes... |
Are there security tradeoffs to be considered in deciding between encrypting an entire flashdrive with TrueCrypt versus storing a file encrypted container? The security goal is to be immune to the problem that wear leveling can store data on unused areas of the flash drive, so that all the encrypted data remains secur... |
I have recently become very familiar with IBM Site Protector. As I understand things, Site Protector is in the top tier of IPS/IDS systems, used by some of the largest Fortune 500 companies.
I was surprised to see the high amount of false positives and the overall lack of tags that may be specific to indicating a targe... |
I hope it is legit question, similar to, for example, Why do law-abiding citizens need strong security?, et al. and it is tightly conected with user's security, privacy, etc.
The response I always run into for any complaint about inadequate or illegal Terms of Service (ToS, Terms of Use), Privacy Policy, etc. takes t... |
Everyday, in order to subscribe to certain services on the Internet we are almost forced to disclose private data even though those services don't necessarily require it.
For example, I need to expose my credit card number in order to register for iTunes even if I just want to browse through free apps, etc. This seems... |
Possible Duplicate:
Resources for data on security incidents
Do you know any websites where they put Information about Security Incidents that happened to organizations/people (e.g. breakins, data leaks, etc.) in a categorized/searchable way?
Thanks in advanced.
|
I have to find information that can be located in files on a hard drive.
Are there good tools to search for specific keywords (even in the hard disk free space area ;-), detect encrypted files, detect wrong filetype, etc.?
I currently use Windirstat to see all the filetypes and open each one manually. This process is v... |
I am running NOD32 on a Mac running Leopard 10.5.8. When I visited a website, NOD32 automatically detected it as a virus. For some reason I was taken to bing.com and I got a "page not found" error. Was this attack blocked or what? Upon further investigation, I looked into the history NOD32 had collected and multiple at... |
While downloading the latest version of Firefox for Mac, i took a peek at the source. The names don't look legit but i am not that familiar with how CDNs work.
I hit download multiple times and found these sources, which i got from the "from" portion:
http://mozilla.mirros.aarnet.edu.au
http://mirror.metrocast.net
... |
I have put together a portable apps USB stick for when I need to use random site computers, I also threw truecrypt on with an encrypted volume for some word documents.
The password I am using is much weaker than what is recommended (just a 4 digit number). The way I was thinking about it is this is still at least as s... |
I'm writing an application which recovers statistical data about a user. I'm still pondering about what would be the best way to encrypt the data. I haven't got any experience with mobile applications. But I was thinking of hardcoding an RSA public key and encrypting it in that way before sending it over the net.
Anot... |
For the field-based encryption of a database containing sensitive information, I was thinking of the following design:
Every user has a smartcard used for client certificate login.
After login the user gets the symmetric key (AES for example) encrypted with the public key of his smartcard.
The user decrypts the key an... |
In my new secret document encryption utility, the key for symmetric encryption = the hash of a random salt and a user provided password.
It is necessary to have a slow hash function in order to prevent brute force on less than optimal passwords. MD5 and SHA1 have proved immensely speedy, so that is obviously not enough... |
When I execute a netstat command i see several ip-adresses that have connection to my pc and I don't what they are for. These are the ip's.
TCP 192.168.1.20:1042 fa-in-f125:5222 HERGESTELLT
TCP 192.168.1.20:1238 we-in-f100:http HERGESTELLT
TCP 192.168.1.20:1281 bru01m01-in-f82:... |
Having a debate with a coworker about the merits & faults of public key authentication with ssh.
I'm basically wondering what all the possible merits and faults are, especially in regards to passwordless private keys.
In our environment, ssh is not accessible to the outside world. Meaning that you would have to get in ... |
Let's say I have daily files that need to be encrypted using PGP (and then emailed) and I want to automate this task. I would be using Windows PowerShell to manipulate the files (examine date/times etc), but how can I automate the PGP part?
I am using the PGP software manually, but I do not see any command line options... |
I'm trying to carve NAND flash raw dumps for SMS:s (for school, digital forensics), following the information on dreamfabric.com, but I'm having some trouble. First of all, the specification isn't complete as I'm seeing SMS:s that strays from this, and I feel there is a lot of noise in the data that conforms to the dre... |
After a recent visit to a hotel I was surprised to discover that they blocked access to my OpenVPN server. I often use this as a way to secure my internet traffic when I am on public wireless. Besides using only SSL based websites, or tunneling over SSH what options do I have to ensure that no one can sniff my packets... |
I have the following Wireshark log and I want to categorize the attack. I think it prints the user under apache runs and then prints the system information. From this log can we determine if the attack was successful? In my opinion it was not because of the apache's mod-security.
Request: 200.158.8.207-- [19/Jan/2012:... |
I have developed an application that send binary data between a .NET client and Java server via TCP.
I have recently implemented SSL for this connection and would like a way to demonstrate that it is actually secure for my college project.
What tools would you recommend? I've used Cain and Abel before but I don't think... |
Background
We have an IT staff who manages our server and a web developer who is not on the IT staff and has no root access to the server. All involved do very high quality work and I do not consider this lapse to be particularly grievous, given the relatively small consequences of not having this information secure. I... |
I have been hired to to penetration assessment (scanning,testing and so on) ( I am new to the industry and learned through Offsec pentration training.)
While training, I have been doing most of my pentest with vmware backtrack, installed the tools required, fix any issues with the wifi drivers, have a nice theme and s... |
My friend's company is trying to disable Internet access of programmer's primary development PC to improve security, while giving them another PC to connect to the Internet. He is a web programmer. I do not think this makes sense. It's going to be terribly annoying for web development. I think famous Internet companies... |
Now that Google's new Privacy Policy will combine data from their various services...
Will Google associate me to my activity on one service even if I am not logged in to that service? Did they always do this?
With the new policy I suspect that if I am logged in and Google search for kittens I may get suggested even mo... |
Could you please help me find a good file encryption tool? The target OS is Linux, but tools for Windows are welcome, too. FOSS tools are preferred. The tool must be reliable both for the recovery of the original data (on decryption) and security-wise. The encrypted file is to be used only by myself.
It would be very n... |
I came across Mobile-OTP, "a de facto standard for strong mobile authentication" (http://motp.sourceforge.net). The developers claim that it is very secure etc.
Reading through the implementation, I noticed that the scheme requires the user's PIN to be stored in reversible form on the server side. (the sourceforge impl... |
I have a very similar question to the one asked here (regarding Iran). However, I would like to use ssh and vpn while being in India. I found already this survey of cryptographic laws but I don't understand the implications for ssh and VPN.
Additionally it would be helpful to know whom to ask in the country. Do you th... |
I work with an organization that uses some very poor practices such as using default user accounts, default passwords (or passwords the same as user accounts), sharing password information between users, ect.
I've tried to keep my parts of our codebase/ect secure, my programs use proper database logins and permissions,... |
Is it possible, with a normal wifi adapter, to detect present wifi devices in the surrounding? Let's say, is it possible to detect an Iphone with wifi switched on in the range of my wifi adapter?
Perhaps it's possible to create a fake AP with an ESSID and encryption thats stored in the favorites list of the device that... |
Specifically, how are things like keystores handled, or other items needed to build or run an app?
In my case, I have a Chrome OS app that requires a keystore to build and publish to the Chrome Web Store.
I have several ideas, but I really want to know how others are actually handling this type of situation.
|
Possible Duplicate:
Which password hashing method should I use?
There are a ton of great posts about password security in databases on stack overflow and on other sites and as I am completely new to this I spent quite some hours trying to learn more about it in the last days. However, there are so many different sug... |
I just bought a new router, and as usual the router manufacturer make a big deal out of the firewall.
I have never understood why the firewall is needed, sure, stopping dos attacks (such as syn-floods) is great, but that's the only useful thing I can think of.
As long as the services I expose to the external interfac... |
I am a complete newbie in the reverse engineering world, and being able to decompile .exe files in my OSX is being a pain.
Does anybody know a good decompiler of .exe for OSX, or any hint about where I can find one? Have I got any conceptual mistake like "that things don't exist"? :P Google is being quite confusing abo... |
Are there any relevant resources, tools or documents about penetration testing of BlackBerry handhelds?
|
As time has marched on, it would appear that the Secure Internet Live Conferencing (SILC) client/toolkit have lost a bit of steam, I can't find any current mailing lists, their website doesn't seem to get many updates - and the latest client source code has a timestamp from 2009.
I kinda get the feeling it's dead - if ... |
I am right now working on a problem and looking for some papers / information about spyware, tracking and cookie problems. I am no expert in that area, so I lack the knowledge where to find material (papers, master thesis, specific blogs,conference material etc) about that kind of problems.
I'm not looking for trivial... |
I already know that this can be done on Linux, One can boot to a flash drive that is write protected. Live modify folders can be symlinked to to a swap partition, and this prevents viruses from being stored between reboots. All file storage would be temporary until next reboot, documents could be uploaded to an online ... |
I am doing some investigation on hosting sensitive data. Mostly finance and fund data but at a personal level. This will be a secure website where users will be able to login and view their fund data. Backups are needed but source data will reside in offline database and will be transfered to this site on a monthly/q... |
The Privacy Policy of DuckDuckGo.com mentions using HTTPs and POSTs affects the privacy of the search requests.
Since HTTPS is disabled by default, and POSTs is enabled by default, how does this affect my default search security?
Should the defaults be changed?
|
I just cracked the access-point (AP) of a friend of mine (Linksys E4200) and we were looking for a way to rid him of the vulnerability. Unfortunately, the E4200 does not disable WPS when you tell it to (via web gui).
While we are waiting for a firmware update (due beginning of March) Cisco recommends to disable wirele... |
I have some data that is symmetrically encrypted with a single key in my database. Rather than hard coding it into my code, I am looking for a safer way to store the encryption key. Where can I safely store it?
|
For your typical web app, should an admin superuser have the right to edit a user's password, or should only that user have the right? (Even with edit ability, the admin would never see the current password).
|
My notebook users need to travel a lot.
Quite often, they need elevated privileges on that machine, like when adding a printer or change network settings.
Should I give them local administrator's password for solving shuch problems?
|
I've been wanting to mess around some with BackTrack to get a better understanding of some of the tools out there for penetration testing. I have a Linux box that isn't doing much right now that I was planning to install BackTrack 5.0 on. Recently though I was reading about booting BackTrack from DVD or USB key.
My que... |
See title. Are there any sources where there are recommended validity times of certificates (based on length, algo, etc)?
I'm particularly interested in validity of RSA certificates...
|
I am trying to understand what is the best way to implement a credit card payment flow into a native iPhone app. From what I see on the market, most of the apps use a WebView to process the payment. I haven't found examples of native implementation of it. What are the drawbacks of a native solution? Is either one of th... |
Say I make a typo in the host name.
Are my credentials now somewhere in the wrong hosts server log?
Should I go about changing my credentials just in case now?
|
I use smoothwall express and also used IPCop. But now I need to have multi WAN support as I want to use a DSL and Cable internet connection together to increase my speed, specifically upload speed.
Any good user friendly recommendations out there?
|
I'd like to know if it's possible to burn a video DVD (not just a regular CDFS DVD with video files in it; I mean a DVD that you can play the video of using regular DVD players), without the possibility of people in possession of the DVD being able to track the DVD back to me or to the burner that burned it. There is a... |
I need to share information with my team, like passwords and credit card numbers.
The needs are pretty minimal -- just an encrypted "spreadsheet". Keepass is potentially a solution but
the user interface is horrible (all command-line would be fine)
It doesn't allow individual user access and revocation
it requires a m... |
The ubuntu docs on OpenVPN have this part in the instructions:
Copy the following files to the client:
/etc/openvpn/ca.crt
/etc/openvpn/easy-rsa/keys/hostname.crt
/etc/openvpn/easy-rsa/keys/hostname.key
/etc/openvpn/ta.key
Isn't it possible for a vpn scheme to only require an admin to install the client's public ke... |
For purpose of the quesition, I am going to paint a picture:
A system administrator maintains and backs up a production server for clients with sensitive financial information (account numbers, names, SSNs, etc). The machine is a Windows 2003 R2 64-bit Itanium server with Backup Exec 13d as the backup solution. The b... |
I am trying to accomplish the following and have been unsuccessful. I would appreciate any insight. Scenario: http://www.mydomain.com/filename.html is a webpage. On this webpage I am running a viewer script that calls up documents (.png,swf, pdf) and show these to my visitors when they visit the .html page.Right now ... |
I'm doing an exercise (exploit-exercises.com) that requires me to gain access to a shell running as another user.
My question is this: I can create application that is guaranteed to be run by the other user. How can I use this to get shell access under their privileges/account?
It's less useful for me to just be able ... |
The KASUMI is a block cipher used to encrypt UMTS, GPRS, and GSM SMS messages. The references section in Wikipedia says that a related key attack is possible in 3G systems.
Q: Has it been proven that the related key attack may (or may not) apply to a given mobile provider? If so which ones are (not)affected?
|
I have a set of geared-to-enterprise SaaS services I will be trying to sell soon to a number of large companies. In IT and Security reviews for critical software in the past, as a vendor you were dinged if you were running on someone else's virtual environments. It was expected you'd be running on your own, or at lea... |
Given that 2G is proven to be insecure (broken) at DefCon, is it possible for a Corporate IT department to work with the Telco and ban 2G connections for their devices?
Some cell phones are unable to disable 2G connections or exclusively use 3G, and so I'm trying to shore up this issue with the Telco if possible.
|
I'm looking at the results from the following URL and would like to know how does the Tor Project website "know" that Tor is being used or not.
https://check.torproject.org/?lang=en-US&small=1&uptodate=1
I would set up a packet sniffer, but since I'm not an exit node I'm not sure if that would make much of a differenc... |
I have a question of how aireplay-ng works when it deauths. I mean, it is really easy to disconnect another client from an AP: you just need to run the deauth command (in aireplay-ng) once, specifying to send deauths 100 times or so.
So how does deauthing actually work?
|
How is it possible to make a DOS attack from a single computer?
Let us assume two computers, one acting as server and the other as client. Both has 100/100 mbit bandwitdh.
How can then the client make a DOS attack on the server if both have the same bandwidth? I mean, why is that technically possible?
|
I have an EPSON PROJECTOR (model EB-824H)
And I would like to use it in our company.
As I know (but not sure) this kind of projector has no WIFI,no network card and there is no HD in this PROJECTOR
It also has 2 USB (one to PC)
What security threats or risks can arise from connecting this kind of projector to a network... |
Most companies use IE with an ActiveX control to create a CSR and submit it to the CA for approval.
Since many browsers either block or don't support ActiveX controls, how can I enroll them using a Microsoft-based CA?
In other words how can I issue browser certificates (for user authentication) from a Microsoft-based C... |
When I'm using the Linux software PackageKit, I get confused about what specific items of information I will need in order to decide whether to authorize software installation from a new software source.
I'm using Gnome in openSUSE. I think the question would be just the same for other systems that have PackageKit, suc... |
Are there any issues with Same Origin Policy (SOP) with TOR or *.onion addresses?
I'm thinking of
cookies
Plugins (Silverlight, Flash, Java, etc)
Javascript
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.