instruction
stringlengths
24
29.9k
I hacked the WPA-PSK secured wifi password from one of the wifi network. If they track their DHCP Client IP, will I be caught? If yes, how? By my computer name or IP address or MAC Address?
I have just been reading an report that analyzed the Mega-D Botnet, but what I haven't fully understood is how they are used to send spam? What email address is the mail sent from? Does each bot send the spam through an SMTP server? Does each bot have an SMTP server installed on it? Can any one clear this up for me a...
I currently use my neighbours' WLAN (with their permission). It uses WPA2 and the DSL router is a Fritz!Box 7170 (see English manual). What information can a router admin user possibly see without using custom firmware? Is it possible to see which websites I use? (I don't use Tor. Would this even help?) Is it possible ...
Sorry for the long title :$ In a video speaking about attacks on the one time pad which uses psudorandom generators (PRG), It's said that Eve can retrieve the plain text of 2 messages that have been encrypted using the same key by XORing the two resulting ciphers . The lecturer said : "since ASCII has enough redundancy...
I'm experimenting with a Proof of Work system that tries to force the use of a browser in order to solve the client puzzle. Basically, instead of just handing off the puzzle as hash with a well known algorithm, I'm handing off the puzzle as actual JavaScript code which must be executed to get the solution (and also cal...
A while back I came across a browser extension (was available for Firefox and Chrome, maybe others) that showed you through a graphical 'node' interface how your browser session was shared with so many other servers and web services. Unfortuneatly I have forgotten its names, and because I don't know what the correct te...
I have a 10.2.0.5.0 Oracle Database and a list of users who i need to grant some privileges to (Mainly to generate reports and so on). I used impersonation, which means i created one Oracle user so that all application users access that Oracle user to be able to reach the data in my database. All privileges from here o...
Is it possible to limit BitTorrent Sync connections to a a specific network using the client software? Right now the closest I can come up with would be IP limitations imposed on each client using a firewall. This seems like it would work fine, except for if any client somehow ventures outside those firewall restrictio...
I'm curious about how time-limited (e.g. 30-day trial) software works. I know how serial keys are generated and designed, but the time-limiting part is more complicated to understand, because it is not simple to ensure that the system's time is correct (e.g. user change it manually). Full or "perfect" protection is imp...
My colleague just told me he can't make outbound SSH connections in his corporate networks, so I advised him to set up a server on 443 port and it worked. I then started thinking that the administrator could detect that it's actually an SSH connection using deep packet inspection and/or by connecting to the server, but...
I need some advice on MySQL AES Encryption. I'm developing an application which connects to various 3rd-Party APIs and retrieves the Access Tokens for the application users. These Access Tokens are long-lived and will be used in offline mode for performing a bunch of tasks. My Question is that since Access Tokens have ...
I'm wondering if packet sniffing is a risk on my VPS. Is it always a risk or are their precautions a host vendor can take? e.g. a switched network etc. If I wanted to ask my host what precautions they take, what questions should I ask? EDIT Thanks for everyone's feedback. I suppose what I was wondering if there are an...
Do non-MiTM Reverse SSL Proxies exist? Or do all proxies that do SSL-SSL mappings decode and then re-encode HTTPS traffic? If this is the case and I want to map https://mypublicdomain.com -> https://myprivatedomain.com how do I go about building a network where only the server at myprivatedomain.com can decrypt the HTT...
I have been thinking about creating a Wordpress vulnerability scanner that would look for plugins being used by a Wordpress site and then search osvdb for known vulnerabilities. I'm curious if there is an automated way to determine what plugins (and their version) a Wordpress site is using? So far the only idea I have...
I now have two websites - site A and B, both with SSL-certificate, and they have exact same users. So when a user log into site A and click the link to site B, I want to make him auto log in to site B. It will be easy if I just use regular POST and GET to pass the user id form site A to site B(more specifically I am us...
Does anyone know of a secure and transparent method of sending logs from a honeypot server on a DMZ to a logging server in a private network?. The logs must be encrypted and sent in such a way that a potential attacker would not be able to sniff the communication. I have tried sending my logs to a valid yet unused I...
I am a newbie in the security field, so sorry for the naive question. In my understanding, using symetric encryption, if attacker knows encrypted text, original message, and algorithm means he can calculate the secret pretty easy? As a prephase: I am implementing initial security for my small casino, and consider using...
I have been interested in implementing authentication method for a web app that is run in modern browsers, without having to send the password over the wire. Can anyone suggest improvements or even tell me whether or not I am going wrong. The authentication is done over an unsecured HTTP connection using AJAX. My curre...
According to the official complaint, on Page 28 they mention: on May 24, 2013, a Silk Road user sent him a private message warning him that "some sort of external IP address" was "leaking" from the site, and listed IP address of the VPN Server. What does it mean that an IP Address "was leaking" and when would this ...
How can I block Flash, at least in Chrome, from obtaining the list of available fonts in my browser? It seems that the combination of fonts available is the easiest way to fingerprint a browser.
I wanted to ask what are the risks of using P2P software. I found a lot of information on-line regarding the danger of file sharing but not about the software by itself. I am writing a mobile application which will connect users in to a p2p network to transfer some data to each other. The data transmitted over the netw...
I am writing full-stack server side software and I have been researching CRIME attacks and it's relation to SPDY header compression as I am implementing the server side codecs for it at the moment. The conclusion seems to be that compression and encryption should not mix. Having looked into both CRIME and BREACH. I am ...
I want to try something out, but I wanted to see other opinions from you guys. What I have: WLAN Access point, with WPA2, ESSID: testing. Home router, I can change the configuration and everything on it. windows computer (victim); backtrack computer (attacker); The backtrack computer has 2 wireless card, one built-in...
I have a situation where B2B and B2C communication needs to be sent securely and not visible to most SMTP hijackers. I don't care about conspiracy theories or NSA style attacks, but want to provide reasonable security for individuals who don't want their PII data exposed to less capable attackers. This business require...
I searched all over google to see how it would be possible to bypass the following (it's from the high level of security from DVWA): <?php if (isset($_GET['Submit'])) { // Retrieve data $id = $_GET['id']; $id = stripslashes($id); $id = mysql_real_escape_string($id); if (is_numeric($id)){ $getid = "SELECT f...
So I found a diagram online, that shows the 4-way-handshake: The way I understand it, when a station (STA) is trying to authenticate to an access point (AP), the AP sends the ANonce (authentication number, once). Then the handshake continues.. What I'm struggling to see, is where WPS comes into play? When you enter a ...
I have a plan to buy a SSL certificate for my domain. I don't have much budget so I decided to buy standard SSL with no support for sub-domains. I have a WCF web-service that works on sub-domain. This WCF service is consumed by the website on the main domain. So, I want to ask that if I add a SSL certificate to main do...
I tested on Ubuntu 12.04 (apache 2.2.22-1ubuntu1.4 and openssl 1.0.1-4ubuntu5.10) and Ubuntu 13.04 (apache 2.2.22-6ubuntu5.1 and openssl 1.0.1c-4ubuntu8.1). here explain how to do so, but I have the following problems: When try to use: SSLProtocol all -SSLv2 -SSLv3 -TLSv1 I got the following error: [error] No SSL pr...
Recently I have been approached by various SaaS (Software as a service) providers offering me different scenarios to deliver their solutions. One in particular has my 50 employees accessing the software via a remote desktop connection 100% of the time. Keep in mind that the software is the main tool our employees will...
My openssl ciphers -v 'CIPHER' output is the following: ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=AEAD ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD ECDHE-ECDSA-AES256-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AES(256) Mac=SHA384 ECDHE-RSA-AES256-SH...
I've been told in the past that you should never give out the host names of computers on your network. I can't think of any reason why this would be the case. Could someone tell me if they should be considered sensitive information and if so, why?
According to the Popular Mechanics article RFID Credit Cards and Theft: Tech Clinic, the fact that many new credit/debit cards have a RFID chip embedded on it, there is a risk (albeit, small according to the article) that the card would be 'skimmed' - from the article: RFID cards do have a unique vulnerability. "Your ...
When sending a signed message using GPG, it always includes a line that says Hash: SHA256 right at the top of my email. I was wondering if/why it's required, and if not, how I can remove it (in an effort to remove some clutter). I noticed that when attaching a signature using PGP/MIME, the Hash header is not included. ...
I know we use hash functions to check for the integrity of the files etc... but my question is how can we check for the integrity of the files being downloaded from some server?
Brazil has announced that they will create a secure email alternative in light of NSA spy programs. The company Correios will be implementing the contract over the next year or so. What are the security features that will be included in this email platform?
When you ned to confirm that an email address belongs to a certain visitor to your site, would it be insecure to do it as follows: When the user visits your site, you give them a session token as a cookie, and send them a confirmation email Within the email is an image, hosted by your site. The mail also contains a co...
With the recent takedown of silkroad, I am pondering on how anonymous you actually can be on the Tor Network. Other more legal or moral uses such as anonymity as a right, or avoiding censorship. These users do in fact face the same problem if it possible to get through the anonymizing layers of Tor. Note: I just read t...
Let's say that for some reason I don't trust CryptGenRandom. Are there any open source software Windows entropy collectors to get cryptographically secure random numbers from for seeding purposes? I'm looking for a software alternative here - I very well know I could hook up a physical RNG to my computer, however this ...
Is there a way via an CLI tool or some kind of API to extract the PGP key ID from the PGP public key block? I found the hexa value of the key in the binary file, but I guess the position is based on the key kind/size. Basically, I have the base64 formatted public key and I would like to retrieve the key ID from it, wit...
I need some guide to decide in which order I must put the following ciphers if I want prioritize security and in cases of tied, consider performance to decide. ECDHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=RSA Enc=AESGCM(256) Mac=AEAD ECDHE-ECDSA-AES256-GCM-SHA384 TLSv1.2 Kx=ECDH Au=ECDSA Enc=AESGCM(256) Mac=...
For a DHE cipher, nginx hard-codes the Diffie-Hellman parameters to use base 2 and a fixed 1024-bit prime (modulus) if no custom DH parameters are configured. These parameters are public (sent in plaintext in the TLS ServerKeyExchange message), does changing the prime value somehow increase the security of the TLS conn...
I'm designing a web-based notification framework (i.e. a user can subscribe to updates from a service or another user) where communication between users is encrypted. User-to-user communication on the web requires a server to act as a relay - the twist is that I'm running on the assumption that the server itself is com...
What I'm trying to archive is enable ECDSA and DSS ciphers in my site, but at the same time not depend just of self signed certificates, so I could sent to my client more than one certificate and them could select ECDSA and DSS over RSA if they can verify my self signed certificate, and if not, fall back to a CA signed...
Are there any good methods for authenticating that a user is a maint engineer, or at least trusted enough to use the maint access? The environment is code that is running in client sites, without internet access, and runs for many years between visits. Think of a vending machine as example, how do i know that you are f...
It has been known in the security community that a tool as versatile as Tor is likely the target of intense interest from intelligence agencies. While the FBI has admitted responsibility for a Tor malware attack, the involvement of SIGINT organizations has not been confirmed. Any doubt was removed in early October, 201...
I live with someone in the same house so we both use the same wifi. He knows the wep password because he set it up in the first place. He's not a hacker but he can set the wifi system at home. He has some computer knowledge from college. Can he actually see the websites I visited? The URLs? What else can he see? You me...
Some users on my network using wifikill or netcut to prevent other users from accessing the internet [ ISP's router: public IP ] - [ gateway: public IP eth1 - network eth0 (NAT) ] - [ switch and access point ] - [ clients ] all other computer connects to eth0 as gateway, using Wifi or LAN.. how to prevent one client p...
I just came across https://www.grc.com/sqrl/sqrl.htm With Secure QR Login, your phone snaps the QR code displayed on a website's login page . . . . and YOU are securely logged in. This seems like it would be pretty awesome - one of the problems that I can think of is if the QR reader is compromised, to display w...
I have a website running on a dedicated server (single IP) on apache. Multiple domains are pointed to the website . For ex: sub.abc.com, sub.bcdaf.com I have now purchased a single SSL certificate for one of the domains (sub.abc.com). Only SSL only works when user accesses https://sub.abc.com I want to force users to h...
While running airodump-ng in town, I have noticed an unusual type of AP or pseudo-AP. There is a steady stream of wireless beacon frames coming in on channel 6. The frames are valid, but have several odd characteristics: The destination MAC is broadcast (FF:FF:FF:FF:FF:FF) while the BSSID and source MAC are zeroed out...
Is it possible to autolock a drive with Bitlocker when the laptop goes on standby or sleep mode? Or when the user is changed? I want the drive to be accessible only by one user.
Probably a simple question, but I can't seem to find any actual best practices out there. I manage a handful of servers and I am really getting sick of tracking my passwords in pwsafe. I've been considering implementing using SSH keys for authentication, rather than passwords but I have concerns about the best way to i...
NOTE: in this question I am interested in discovering the actual method used by Google to track me -in my particular case- and in exploring eventual ways to circumvent it. This is completely different from the question is Google spying on us all. That question is asking "if" Google is tracking users and goes on to talk...
What are the main stream crypto algorithms that have been designed without known involvement from the NSA? I know that twofish has been designed by Bruce Scheier, but which are the other independently developed algorithms? Note that this is not a subjective question
How are GPU's provisioned for password cracking? Do all, if not most cracking programs have special GPU aware software or do they just function at the basic driver or API level of the device? Can it be as simple as plugging in a video card and installing a driver? Also, I have access to a lot of processing power from...
I was listening to a talk on Return Oriented Exploitation from the Black Hat 2010 conference. The speaker mentioned something about using the DLLs to exploit some of the memory corruption issues. I know that the DLLs are loaded into the memory only if required by a certain program. But, are they always loaded into som...
By default, GPG compresses text during encryption. Additionally, RFC 4880 says: 2.3. Compression OpenPGP implementations SHOULD compress the message after applying the signature but before encryption. We know that encryption does not attempt to hide the data length, and that in certain circumstances, this property m...
Skeuomorphic design is common in desktop computer and mobile telephone applications. Sometimes interfaces and cues from the real world are used to good effect (swiping to move backwards and forwards in a eBook) and sometimes to terrible effect (rotary dials that need precise circular mouse motions on oscilloscopes). Wh...
I wonder if it would be possible to detect a change of an SSL private key? If you change the key, then I think one must issue a new certificate, but new certificates could be issued without changing the key, right? Or is it possible to keep the certificate, and change the key? I'd assume, no. As far as I know, e.g. whe...
I was looking at the HTTP responses form https://twitter.com and https://encrypted.google.com. These two responses have interesting similarities and differences in their security definitions. Both Twitter and Google have these header elements in common for the purposes of security: X-XSS-Protection: 1; mode=block X-F...
Im using and IP Camera at home and I have the footage being sent to an online file storage service as well as my handheld device through the internet. If the wifi router at home is turned off or somehow malfunctions and is no longer working, will I still be able to view the footage from my handheld device or online on ...
I need to see if a site I am testing is vulnerable to any of the multiple Google dorks that are available at sites like this and this. Traditionally, one uses a 'dork' by searching "Index of/"+c99.php"" in Google and getting a whole stack of results. How can I search for all the dorks for my specific site quickly and...
For a web-site I'm using what I hope is the most secure password storage scheme I can find, which boils down to having a salt and hashed password stored in a database of contacts:- Byte[] lPassword; var lRNG = new System.Security.Cryptography.RNGCryptoServiceProvider(); var lSalt = new Byte[16];...
How can I prevent from an attack like this? http://www.youtube.com/watch?v=bgt98VajOv4 Edit: Sorry guys, I think I can't explain my question well. I don't want to secure myself from that trojan. I want to secure my users. There are lots of sensitive data in our pages and we need to secure these pages from trojans like ...
I found one of the website is loading all shopping websites in their own domain. Eg . www.domain.com having links like , www.shoppingsite1.com , www.shoppingsite2.com ,www.shoppingsite3.com .... if we click on shoppingsite1.com it leads to www.domain.com/iframe/shoppingsite1 and loads the shoppingsite1.com insid...
I would like to make sure that my working environment is contained (prevent data leaks meaning I don't want temp file or traces from files I have worked on). I am about to create a usb key with the full disk encryption provided by Ubuntu. Knowing that I will edit files stored on that key and I will not allow any other ...
If I understood the basic of password hashing and storing, what we need are: a "strong" salt a "real" random salt a unique salt per password a password hashing function with a high CPU cost We hash the passwords using 1, 2, 3 and 4 using PHP crypt() and CRYPT_BLOWFISH with a "medium" cost. We have a new need: we need...
My friend is currently running the default firewall on his mac with "Block all incoming connection" (except the basic ones like 80). I just scanned his mac for open ports and I found the following: Open TCP Port: 3128 ndl-aas Open TCP Port: 8080 http-alt Is it normal to have those ports open, o...
From what I understand using GET to submit usernames/passwords is a security issue because the username/password are part of the URL which can show up in browser history. Is this still an issue if the login GET request is made using AJAX?
fail2ban is a protection against brute-force that locks a user out after a definable maximum failed login-attempts. But if a user already has access to a server with another username already fail2ban is not active anymore from the inside, so you have infinite tries to brute-force with slogin otheruser@localhost into ...
The best method to prevent others from reading the data on hard drives is to destroy the drives physically: a sledgehammer is a cheap and effective tool to prevent the data from being read again. Since many types of hardware, including hard drives, contain toxic materials, it'd be a good idea to take them to some resp...
I have access in my neighborhood to an open, unencrypted WiFi signal but I am leery of using it because of security reasons. I don't want to let my username, passwords or credit card numbers available over an open , unencrypted WiFi signal. My question is this, I purchased a router that has the ability to "Bridge" to t...
The default Debian way of setting up a common web server (Nginx) is to run the main process as root and unprivileged workers as www-data. In order to allow for the worker processes to read/execute web application files, some users chown those files to the user www-data. I have recently read a good argument that states...
I would like to know if it is possible to read (or write) the canary values from %gs register. If "yes", how; and if "no", why? Also, I have been reading somewhere that the canary values are stored in some sort of TLS (I suppose it to be the "Thread Local Storage"). Can someone please shed some light on it?
Is it possible for someone to remotely manipulate the keys on my computer to make it look like I was typing?
we are trying to find a file server for us. we look for the best practices of the establishment of an efficient and secure server. Therefore, my question is: What is recommended: server as a PC or server as a hard drive disk.
I have two different web application. Services web app has REST Services defined. Client web app has JSP pages which makes call to REST services using Ajax to get the data and display in the UI. I want to implement OWASP CSRF Gaurd 3 for my REST services. How can I get CSRF token value in Client application so that it ...
I connected my phone to a protected Wifi network that is not my own. Can anyone accessing the same network be considered a threat on my mobile device? Is it easier for hackers connected to the same Wifi network to access my mobile data? If so, how can I protect my device? Unlike other questions I have read on this web...
Is using the "HTTPS" protocol is enough for website data security, or should I use another encryption algorithm (Elgamal, RSA or something else) as well? Does the BREACH attack described here affect this decision?
Questions about the strength of pass phrases frequently popup, as does: how to generate a strong passphrase? I tried to combine both in a tool. The free tool also includes recovery time estimations for some common cases and hardware. The tool is available here. As has been said over and over again, these strength & rec...
Hello everyone, I currently have a pcap file that contains an unencrypted Telnet session, and when I trace the TCP stream the password is in a format like so: pas...ord (please note this is just the format not the actual password). My question is, what can I do to be able to reconstruct the password fu...
I've been spending the morning playing with my routers and I've checked one thing: All of them come by default with an implicit deny configuration for incoming traffic, that is all packets should be rejected unless otherwise specified. Outgoing is either as implicit accept or does not have any rule at all. With that de...
I was reading this question about using Synchronizer Token Pattern to protect against CSRF and the comments of the answer intrigued me. Of course, as the last comment says, if your site has an XSS vulnerability, then CSRF is not your biggest concern. But what happens if the other site as a XSS vulnerability? Let me s...
I'm working on a machine which needs to store usernames and passwords for the various operators, technicians, and engineers that may be using and configuring it. It is important that some functions be accessible only by engineers, some be accessible by technicians and engineers, and some be accessible by everyone. The...
Is anyone aware of an analysis of the TextSecure protocol? https://whispersystems.org/blog/simplifying-otr-deniability/ https://github.com/WhisperSystems/TextSecure/wiki/Protocol It is a simplification of the OTR protocol. Instead of signing the ephemeral key, it uses DH over an ephemeral key (a,b) and an identity (A,B...
A packer is a way of obfuscating an executable program, i.e., transforming so the result is still executable and has the same effect when run, but looks different (so it won't be detected by static anti-virus). Bad guys often use custom packers to obfuscate their malware, to make it less likely that anti-virus will de...
If a session token is stored in a cookie that has httponly set, is there any way that a XSS vulnerability could allow a malicious user to steal a users session token?
Recently (shortly after midnight on 10/8/2013) I installed and ran Orbit Downloader. After learning that the latest version (4.1.1.8) has a botnet-like module included I immediately stopped the program and uninstalled. In total, the program could only have been running for a few minutes (5 max) after installation. I h...
My question arises from trying to understand new types of spyware that target the system bios and/or network card. Is the system bios and ethernet card both protected by an OS firewall set to deny all incoming connections? In other words, are these two components exposed to the network when connected straight to the i...
With 397 rolls of a fair 6-sided die (not my favorite use of time, but certainly not infeasible), I could generate more than 1024 random bits. Could I use those bits to generate a keypair that could then be used in encryption without ever touching a (p)rng again?
Public-key cryptography secures communications provided that you use pre-shared public-keys. The problem is how to share these public-keys while maintaining authenticity? How can we be sure that while sending the key an active attacker isn't replacing the transmission with their own public-key. The answers that I find ...
As part of an assessment I'm using mysql to poke around at a compromised hosts' filesystem. As I seemed to remember from the last time I played with it, some files can be read (eg. /etc/passwd) and others cannot (/etc/shells.) The mysql documentation specifically says: For security reasons, when reading text files loc...
If android os in a device is rooted , will it be safe to use it in public networks where possibilities of attacks is more.
I have been using CodeIgniter for two years and I am digging into penetration testing. I think that ActiveRecord does good job at preventing SQL injections, but is there any possibility of bypassing ActiveRecord's filter system by ASCII Encoded / Binary String SQL injection? If it is possible, then how can I prevent AS...
We have many scripts that we call "secure baselines" that allow our server/desktop installation people to install operating systems using best security practice. We test that the baselines have been successfully configured by using automatic compliance checking tools. The problem we are facing is that the Word docum...
I generate self-signed client certificates for a little Apache server hosted under my stairs. The script below was hacked together for this purpose - note it uses the 'mini-CA' x509 method, therefore recording nothing in an index.txt. Now I need to revoke one such client certificate, which entails generating a CRL and ...
I am designing a highly restricted workstation build for a secure environment. At the minute this is planned to use Windows 7, but I am considering Linux. The users will on occasion open documents from external sources, and I need there should be virtually zero possibility of these documents breaking into the workstati...
Is there a security advantage to requiring a request to conform to /api/1234 instead of /api/me? Both would obviously have access tokens. My guess is that api/1234 is more secure because if someone gets hold of an access token, they can't just see who's it is. They have to know which user id the token belongs to.
According to an article I just read, the functions printf and strcpy are considered security vulnerabilities due to Buffer overflows. I understand how strcpy is vulnerable, but could someone possibly explain how/if printf is really vulnerable, or I am just understanding it wrong. Here is the article: https://www.digita...
I was wondering if malicious programs are detected using a virtual system. For example a "canary" system would be set up in a virtual environment then unknown and untrusted programs would be executed in it, the operation of the unknown program would be highly scrutinized for signs of malicious activity. Could the virt...