instruction
stringlengths
24
29.9k
I'm interested in the recommended course of action for when you find a (Windows) system infected with the ZeroAccess botnet. I've seen various blog posts online recommending that the user download and run a script, which will remove the botnet, but in your opinion is this enough, or is a full re-install recommended? Th...
There is this password system called S/Key I saw on the Internet. Can someone give me a brief description about S/Key and how it works? Can S/Key be an alternative solution to the UNIX password system? Or is there another better alternative? Something that would not be vulnerable to brute force password guessing attack...
I understand how mutual authentication works between a client and a server, however I am unsure how I would be able to get mutual authentication between two clients A and B? What would be the best method for this? Is the SSL/TLS PKI implementation secure or is there a more secure method in theory? I have read about T...
So with all of the FUDD (fear/uncertainty/doubt/disinformation) going around about RSA in light of Snowden leaks and other discoveries about backdoors into PRNG, I'm uncertain what this means to me... I'm currently working with many systems that use RSA to digitally sign things … license files, tokens, etc. Assuming ...
I am having a thought experiment. Can you help me? Two clients who both use PGP. They initiate a WebRTC call using DTLS-SRTP via a 3rd party server. Is there any benefit of encrypting, via their PGP, the handshaking ... Q1: ... when the communication is peer 2 peer. Q2: ... when relay server is required due to routi...
On page 3 of this U-Prove document regarding toke revocation, the author says the benefit of Accumulator-based revocation schemes is A cryptographic accumulator allows the aggregation of a large set of elements into one constant-size value, and the ability to prove that an element has been aggregated or not in the ...
I'm designing an API in PHP/MySQL that, by its design, will not store a user's password in the database and thus does not generate authorization tokens for the client to hold. The reason for this is to prevent any possibility of sensitive, unencrypted information being obtained in the event of a database compromise. Th...
if anyone is available to give me advice on a VPN situation I'd appreciate it. So the story is, I have one Swedish VPN which I trust not to log, and which I've connected to with my real IP, and I've connected to things like Facebook with the VPN. The problem is that this VPN uses a fairly weak symmetric cipher and no ...
I want to restrict access to a particular resource based on time (configurable). So suppose user A has time t configured from him. He can access the resource only once every t time units. The values of t can be from a fixed set but not a very small set. I was thinking of using multiple hash chains to encrypt the data, ...
According to http://gaganpreet.in/blog/2013/07/24/kwallet-security-analysis/ , the KWallet password management system is quite weak, it uses key splitting, Blowfish 56, and no salt. The key generation can be described as – break up user password into blocks of 16 characters each, and apply SHA1 2000 times on each of t...
It comes to my attention that not all installers are aware of each other (Windows Update, vs some hotfix and service pack installers) and block concurrent execution. For example, I'm able to run Windows Update Security fixes and Exchange Server Rollup updates at the same time. Given that example and that it's entirely ...
I tried searching online but can't seem to find whether or not OpenSSL support both NamedCurve.arbitrary_explicit_prime_curves and NamedCurve.arbitrary_explicit_char2_curves? As far as I can tell bouncy castle are the only SSL/TLS implementation that supports it, any others that anyone known of?
Objective A secure Arrow of Time with unpredictable future behaviour to stop attackers or DDoS BotNets from pre-calculating proof-of-work and other gateway protections for P2P/F2F. A distributed solution in so far as there isn't enough free centralised timestamp servers to pick randomly amongst them to foil attackers. ...
Most of the time, when an intruder is detected, we would disconnect it at once. However there are certain cases where the intruder is not disconnected. What are the benefits of not disconnecting the intruder? Can I say something like, some organizations would want to trace the intruder's identity and by not disconnect...
Let's say hypothetically I am writing a web application targeting technically inclined, security-conscious users who have no problems generating and using GPG or SSH keys. Is it possible to use said keys to authenticate with a web application in a secure fashion to replace traditional password-based authentication? If...
I would like to know what does this particular rule of the packet filtering firewall ruleset do: Source Address: Any Source Port: Any Destination Address: 192.168.1.0 Destination Port: 1023 and above Action: Allow
I was doing research for a college research paper and I got bored and opened up CMD. I don't really know more than the next guy about computers, so i figured id just play around. I googled the commands for the command prompt and started trying some out. (I was connected to a college wifi network) I typed net statist...
Assume that I'm using bcrypt with a unique salt (or some other best practice) to hash user passwords before storing them in my database. Is there any security advantage to be gained by character-shifting the password before encrypting? (i.e. A -> B, a -> b, 9 -> :) Is there any security advantage to be gained by char...
Are there any benefits from disabling Ping/ICMP requests on servers? I've read where people say to do it but I can't seem to find any real benefits with it. Only more likely to cause more problems. EDIT: All types of ICMP packets.
I know that if you discover a vulnerability in a open source product you have the option of fixing it yourself, creating a bug report or other methods to prove that you have contributed to the internet (read society if you like) as a whole in some way. If I have found a vulnerability and submit it to Microsoft (and t...
I have a Dual PC setup. Two PC's are networked together via crossover cable. The Windows PC is running Windows 7 SP1 64-bit and the Linux PC is running Slackware 14 64-bit with iptables. My firewall and routing is essentially: {DROP All protocols and ports} {ACCEPT specific protocols and ports} # Rules to route from W...
when SIEM is already implemented in a enterprise network; does it not do all tasks and report like network forensic investigation? Or can we do away with SIEM and have only Network Forensic tools installed in a enterprise network
From EFF's Web Bug FAQ(point 6), What information is sent to a server when a Web Bug is viewed? The IP address of the computer that fetched the Web Bug The URL of the page that the Web Bug is located on The URL of the Web Bug image The time the Web Bug was viewed The type of browser that fetched the Web Bug image A p...
What are the (dis)advantages of re-salting a user's password regularly, e.g. weekly (or at their next login once week since the last re-salting)? The basic idea would be that users who regularly log in would suffer a lower risk of someone exploiting a hash collision after somehow obtaining the salt and hash, since most...
I don't know whether it's appropriate to post this question here but I desperately need help. I've been receiving ping requests from 18 different IP addresses so far. Some of them are local, some are from US and Russia. In half an hour, my router dropped 220 ping requests. And last night, my router logged that there's...
Throughout my readings on cryptography, Eve is always assumed to have the capability to be a passive listener and obtain every message exchanged between two communicators. How can one demonstrate this? I have a presentation and would like to know if there is a software I can demonstrate to the audience and show them th...
I'm wondering how to use NAT with IPv6. It seems that you don't even need NAT anymore. What exactly is the concept behind firewall configurations in IPv6 environments?
Just wondering about this. Does it need a PKI to work?
I have read that Dropbox encrypts all the files that are uploaded with a single encryption key. Where is this key stored and why do they bother encrypting the stored items if they just store the key as well? It seems like if someone got a hold of the data, they could also get a hold of the key. Why is this not the case...
I have received the following advise to set cipher suites to suitably mitigate Beast attack on a newly setup Apache HTTPD server. Preferred ciphers: RC4-SHA, RC4-MD5 Must Have Ciphers: AES256-SHA, AES128-SHA, DES-CBC3-SHA, RC4-SHA, RC4-MD5 I want to confirm my understanding of the differences between "preferr...
Password managers like KeePass often have an option to use a key file in addition to a master password. I don't understand how this increases security. (Note: KeePass also allows using a key file instead of a master password, but in this question I'm asking specifically about using one in addition to a master password...
I am using my virtual machine and run there a few programs that may be malicious. Is there a risk of my host getting infected? Can a virus migrate to my host considering that I dont allow file sharing and clipboard pasting.. Do I need to use programs like deep freeze, anti viruses, firewalls to protect the guest machin...
I know that one shouldn't rely on "obscurity" for their security. For example, choosing a non-standard port is not really security, but it also doesn't usually hurt to do so (and may help mitigate some of the most trivial attacks). Hashing and encryption relies on strong randomization and secret keys. RSA, for instance...
"The connection to www.google.com is encrypted using RC4_128 with SHA1 for message authentication and ECDHE_RSA as the key exchange mechanism". This is on my google search bar. Is that o.k.?
This may be a stupid question, but... Why are security-crucial software written in languages such as C and C++? I understand why, say, an embedded system might need a low-level language to make the most use of limited resources, but it seems foolish to write security software in low-level languages. I'm asking this bec...
I'm running Zenmap on my Windows 7 laptop. I ran an intense scan with UDP targeting my router 192.168.1.1.I realize that I'm probing into the back end of the router from the inside and that any open ports are nothing to be concerned about. At the time, my iPod (on standby/not turned on) and my laptop were the only conn...
Does anyone know of any work/papers/articles comparing the relative strengths and weaknesses of NSS and OpenSSL? EDIT: In case there aren't any existing documents/articles, I would certainly appreciate some information from your own experiences on either libraries. The primary context is FIP-140-2 certification ...
I want to keep my personal documents in cloud e.g. Dropbox. But I want some of my documents be encryted and password protected, such that: 1. even if my Dropbox gets hacked, those documents still have one more security 2. I can still access the documents from another computer when needed I looked about and found truecr...
Suppose for some reason, you and your peers absolutely positively have know that a server is acting honestly. Could the server behaviour be audited remotely through some mechanism of randomly polling portions of server memory and disk content to check against the predicted result derived from publicly cross-signed dri...
When using a modern web browser, if you hover on a link, the browser will show you the link in a little display on the bottom left corner of the browser screen. Can I trust this? Can this display be spoofed? For instance, can Javascript display something to make it look like the link is to URL A when clicking on the ...
I would like to ask about how can someone adopt certain security model in the organizations what are the criteria that controls how I can pick the best security model for my organization For example I have set up an security services (pentest- vulnerability assessment- secures network desing) and security training org...
I would like to know why nowadays Stack Guard is used everywhere (example: ProPolice in GCC, /GS in Visual Studio), instead of Stack Shield. Both the approaches (i.e. Stack Guard & Stack Shield) provide an equal level of security. Any specific advantages of Stack Guard over Stack Shield ?
I would like to seek for another way to save the credentials, which is used to verify the user trying to login, into my database. I came up with this idea. Since I believe that even knowing a plaintext, and a corresponding ciphertext derived with the AES-256 cipher should not lead to the revealing of the key, when the ...
Everybody knows making your own cipher really sucks. Everybody also knows using existing cryptosystems, such as TLS, totally doesn't suck. But when is the line drawn? For example, would I be rolling my own if I use established algorithms, but design my own TLS-like protocol? How about if I reimplement popular protocols...
Let me explain with a nifty diagram: IP/RP <-> bunch of Tor clients/node (Tor circuit) <-> Tor hidden service Wouldn't the last Tor client in the circuit knows that the message is for the Tor hidden service? I know that the communication is encrypted, but there is an IP address associated with each packed (i.e. send th...
As I was reading about the advanced exploits such as Return Oriented Programming (ROP), Retun-to-libc, etc., I came across many defenses to these attacks including techniques like ASLR, kBouncer, ROP Defender, etc. But when I went into details of each of these techniques, I found out that each of these defenses can be ...
The text is taken from the famous answer: Lessons learned and misconceptions regarding encryption and cryptology: Don't use encryption without message authentication Alternatively, you can apply your own message authentication, as follows. First, encrypt the message using an appropriate symmetric-key encryption scheme...
I am currently studying the most basic SQL injections that are possible. Pure and solely for the purpose of teaching myself the basics before advancing to more advanced ones. I am recreating this situation with the following statement: $result = $dbConnect->query("INSERT INTO UserTable VALUES (NULL,'$name','$email', '...
I am developing a game for Android. The customers using the game will have to send their information to a REST web service that, behind the scenes, will be connected to a MySQL database. I would like to encrypt the data that the client will be transmitting from the app to the web service and I am just wondering what ty...
I have created a web application for a client and I'm hosting it on my own server behind a domain I own. I have purchased an SSL certificate for this domain and the web application runs nicely over HTTPS. The client has now created a CNAME record for his domain, pointing to my domain. But users who visit the applicati...
Are there sha 512 rainbow tables available for download or what kind of dimensions and processing power would be required to generate them?
Most web apps perform authorisation checks at the controller layer. This is basically ok, but complex apps tend to have repetitive checks. For example, there might be ten or so controller actions that operate on an Order, and every action needs to check that the current User is authorised to access that Order. Some app...
I wanna know that weather a site having XSS vulnerability can lead the hacker to access database? I know that he can get the username and password from the cookie stored but can he completely access the database?
I have a REST API which is running in one domain and I have a client in another domain. To prevent CSRF I have configured REST API to accept request originated from client application only. I have added proper encoding as per owasp XSS prevention cheat sheet to prevent any XSS attack on my application. Can I say that m...
Currently we are using ReadyNAS by NETGEAR to hold all our images from all our machines. My question is can viruses expand from the machines and infect the NAS drive and the backups? We are using AOMEI Backupper. EDIT: Basically, I want to keep my clean backups clean. I keep Daily, Weekly, Monthly achievable backups, m...
nice to meet you all! I'm newbie on this stack. Sorry if I did anything idiot :) Well, I'm very curious about browsing on the web completly anonymous. I would like to hide the websites, e-mails, messengers, downloads and most of the basic services from my ISP provider and the NSA/CSA/NORAD/USGOV/BRGOV etc etc etc. Ther...
Today I received a spam email from juliew@mchs.org.au requesting to contact Harry Black about a charity project. His email address is harryblack2013@rogers.com. After I had done so and fallen for the bait, Harry Black replied to my email that he wants to give me $1,000,000,000 blah blah. What bothers me is, I Googled r...
Do the Antivirus / Wireless controls within PCI v2 apply for the entire organisation, or just for the PCI scope?
Are they impossible to detect? Seeing as the attacker has admin rights and could modify anti virus software that might otherwise be used to detect or circumvent a root kit. Are there certain red flags that point to a root kit? Can they see everything you do?
I'm fresh new to the field of security, so I'm sorry if this question seems stupid to you. What are the main differences between the network-level and the application-level regarding information security ?
People boast about OSX Security, yet I find it very hard to find a comprehensive manual in regards to any equivalent Services and the ports they use. I am aware of lanchd and launchctl and Lingon is quite a handy utility, however the information is quite overwhelming, as there are so many different agents and daemons r...
The OAuth 2.0 specification's authorization code mechanism includes redirect URI checking from the site you redirect to. See steps D and E in section 4.1 of the spec. Also, section 4.1.3 describes in detail that the redirected-to client needs to transmit redirect_uri, and that it needs to match that of the initial auth...
I have written a very simple/basic crypter in C++ and I would like to test it. How would I go about writing a simple MessageBox program that is "tainted" so that my Anti-virus will attempt to quarantine it upon running the file? Right now, I just have a MessageBox outputting "Hello". I need a suspicious signature. P.S...
If a website has multiple web apps, each of them connected to different tables in a database and all of the apps are protected from SQL Injection except one; can that one web app be used to read/modify/attack other tables in the database through SQL injection?
I've been recently searching for a backup solution for my Windows desktop. That's when I came across this free software called EasyUS Todo Backup. (I know it's a mouthful but English doesn't seem to be their first language.) So I downloaded a copy and tried it in my VM before deploying it on the actual computer. What i...
I've seen something like: sshd[***]: Invalid user oracle from **.**.**.** // 1st line sshd[***]: input_userauth_request: invalid user oracle [preauth] // 2nd line sshd[***]: Received disconnect from **.**.**.**: 11: Bye Bye [preauth] // 3rd line and I know that's someone tries to log...
Our application needs to generate secure keys for long term storage on AWS using openssl. But I've seen some instance where entropy falls dangerously low on AWS machines and this doesn't appear to be 100% safe. People have reported low entropy in some situations. What is the easiest way to ensure you are generating s...
I am learning about XSS vulnerability. I need to know what sort of XSS attack can be done on clean URLs. Clean URL example : //my url.net/project/public/#questions/question/edit/id/122/answer/1
I have seen some of the algorithms which are used to detect if a file is a stego-file or not, but all those algorithms check for specific patterns and are not universal. Maybe there are universal detection systems, but I have not seen them yet. Situation: When a message is hidden in an image, I want to check for all th...
Does anyone know how to use OpenSSL to generate certificates for the following public key types: DSA - For DHE_DSS key exchange. Diffie-Hellman - For DH_DSS and DH_RSA key exchange. ECDH - For ECDH_ECDSA and ECDH_RSA key exchange. ECDSA - For ECDHE_ECDSA key exchange. Most that I can find online teaches you how to ge...
Is there a PCI-DSS rule that a merchant cannot capture the funds for an order until we have actually shipped it? I can't seem to find an official reference that describes this as a PCI DSS requirement. Is it one? If so, where can I find it?
I am wondering whether there is a way to defend against USB Keyboard Keylogger (obviously other than physically checking the keyboard every time after leaving my computer unattended). These days, people can buy cheep hw keyloggers, such as the Keyllama USB Keylogger, which are small and quite hard to discover unless y...
I'm building a JavaFX 2.0 standalone application (it'll be distributed as an .exe) and it opens a connection to a MongoDB instance. The connection is just a standard Mongo connection using the Mongo wire protocol. Is the Mongo wire protocol secure enough, or could users examine it to see the data being passed back and...
I disabled SSL2 and SSL3 in my Firefox browser, version 24. I only enabled TLS 1.1 and 1.2. Unfortunately when I went to my bank's website, I found that it didn't work until I re-enabled TLS 1.0. Additional information: my bank site uses RSA encryption. Does that mean my bank's website is less secure than is should be,...
I'm writing a mobile app that communicates with my server using REST. Upon every launch, the app makes a call to the server api to check whether there was a change in the user details (using a lastUpdate parameter), the api returns the updated user object in case there was a change. Problem The drawback to this approac...
This might seem like a really vague question however I am studying a networking course. One of the many aspects requires the use of a packet sniffer software - in this case I chose Wireshark, which I have used before when trying to find what ports that need to be opened... One of the questions posed is "What networking...
I'm curious, in theory, how can one know if for example kernel that is distributed with Ubuntu Linux is really what is on https://github.com/torvalds/linux and not some modified kernel which contains tracking code etc... I mentioned Kernel just as an example. The real question is, can you be sure that distributed open ...
If the ISP carries my data, why do people seem to think they cannot see the contents? Wouldn't they be holding the key?
I am aware that you can execute a POST request using CSRF using the method below: <form name="x" action="http://site/index/dosomething" enctype="text/plain" method="post"> <!-- stuff --> </form> <script>document.x.submit();</script> But this redirects the browser to the target site. Is it possible to execute mult...
Good Evening, Since the USA does not mandate data retention with law, and since one has a right to privacy, could you make your ISP delete IP address logs?
I'm looking for answer on such question. Imagine that CPU bugged on the factory simply like Blue Pill, but for the network's interconnections. How exactly firewall of OS could protect station against Hardware Trojan Horse intercommunication? E.g. iptables blocks any new incoming packet. iptables -A INPUT -p tcp -m stat...
When I formatted my whole drive and installed Windows XP SP2 (fresh installation, , no drivers were load on my system). Then I connected an empty 4GB pen drive which was already formatted, and the system showed me pop up message "Installing USB drivers..." Since there were no drivers on that pen drive or on the system,...
Today while I'm reading about the RSA factoring challenge. I thought to myself that if whoever depends on RSA-512 (By using TLS_RSA_xxxx) to secure their TLS connection years ago, the info they wish to protect will not be secured anymore today. Therefore, if someone manage to crack it in the future, I think the same go...
Seeing as phishing is getting more popular and users are becoming less concerned about security, I am trying to come up with a solution for a new site of mine that can stop phishers. For instance, any one can create a new site that looks exactly like Gmail and phish users to it in order to obtain their UN/PW. However, ...
We all know that if you carry a GSM terminal with you, its location is being tracked and stored in operators' databases without any need of cooperation from the terminal itself. Is tracking user's geo location possible with WiMAX, or is the technology safe from operators tracking subscriber stations? I've seen a paten...
Can an SSL client send CLIENT HELLO with version 3.2 and NOT negotiate 3.1. For sslv2 and 3, one could do that by sending ssl23 CLIENT HELLO or SSL3. Please provide input on how one can support 3.2 but NOT 3.1 or if it is even possible.
I would like to clarify the consequences of not supporting export ciphers. When I run a qualys ssl test on ebay.com, I notice that the following cipher suites are supported. TLS_RSA_WITH_RC4_128_MD5 (0x4) TLS_RSA_WITH_RC4_128_SHA (0x5) TLS_RSA_WITH_3DES_EDE_CBC_SHA (0xa) TLS_RSA_WITH_AES_256_CBC_SHA (0x35) TLS_RS...
I understand what a time-based SQL injection is, and I understand how it works (at least how it's detected/exploited). However, is there anything in specific which makes this type of injection any different to say boolean-based blind injection? What I'm saying is if you take the following code: <?php $x = 'admin" AND S...
I use VPS hosting. Installed CentOS 6 and ZPanel according to this tutorial http://www.zvps.co.uk/zpanelcp/centos-6 Received warning from hosting provider: This URL has been identified as a phishing site and is currently involved in identity theft activities. URL: hxxp://111.11.238.177/www.connet-itunes.fr/iTunesConne...
We believe a Crypto Locker virus may have found its way into our network. We're having trouble identifying which computer was responsible for originally bringing the virus in. Does anybody have any experience identifying the source of a crypto locker virus on a network?
A few basic questions around self-signed certificates Question 1 Does a self-signed certificate has to have a CA? I realize that a "real" certificate must as it otherwise can be chain validated but what about self-signed? Question 2 If a self-signed hasn't got a CA - should it still go in the trusted CA store to not c...
While installing a new XP machine that had not been connected to the domain I was browsing to a UNC path and was not prompted for authentication. I then went to the different mapped drives and found that I had full access to all files and folders on the network. I was logged into the machine as a local administrator a...
What are some good anti virus evasion techniques when using ps_exec? As a pentester I often encounter situations where you can't, for one exploit a machine as they are running anti-virus software on their machines. I'm mostly talking about binaries which get saved on the victim's machine before being executed. What ar...
I have a basic simple question for which I couldn't find anywhere. Is is possible to use Google Cloud SQL services and still retain the regulations from ICO and other similar requirements? I will not be storing any credit card or bank account information, will only store the PayPal (as current confirmed payment pr...
Related: Local Admin has Domain Admin rights "Pass-through authentication" on Windows systems allows for the possibility for user accounts with the same name and password to impersonate one another, even though they may not be intended to have the same privileges. Example: Say we have a standalone PC, not joined to ...
If my true passphrase is used only to generate a hash which is used as the cipher's actual key, doesn't that mean it's possible to try and brute force the cipher itself? I know it would take an impossibly long time either way, but at what point would it be faster simply to brute force the key itself, rather than going ...
What's the best way to go about generating a fast stream of cryptographically strong pseudorandom data without installing uncommon packages? Drawing from /dev/urandom is far too slow. I had an idea from reading the 'wipe' manpage: will use the fresh RC6 algorythm as a PRNG; RC6 is keyed with the 128-bit seed, and the...
At the moment we are encrypting our server passwords and other important data internal via PGP. Every coworker has got his/her own private key/pass combination set up on their workstation. The problem is now, when a new coworker comes into play, we have to decrypt and encrypt everything again, including his public key....
There are two password generators on ss64.com: The standard one [Edit: now retired] The strong one How they work I made standalone versions of them, plus copy of the original HTML/Javascript versions, if you want to study them, but here is how they work: This section explains how the passwords generator work, such th...
Private network access security can be defined by a unique WPA2 passphrase to grant access to devices and MAC address filtering to control authorized devices. Nowadays mobile devices are legion, so if one is stolen, the WPA2 passphrase is easily recoverable. So the router admin has to change the passprase and ask all u...