instruction stringlengths 24 29.9k |
|---|
With OS X Mavericks and iOS 7.0.3, Apple has introduced a new feature called iCloud keychain.
During setup, you can choose an iCloud Security Code. This code is used when you want to grant access to the iCloud Keychain on new devices.
Although Apple states that it does not have access to the contents of the iCloud Keyc... |
I received strange email from co-worker, asking me to click the link.
I did eventually follow the link, but thought putting in my gmail user/pass wasn't wise. What do you think? is this phishing attack? if yes where do I report it and get it taken down?
Link: www.collectablelegends.com.au/googledoc/Secure Login.html
Re... |
I have read quite a bit on the subject of securing MS Exchange - most notably the Client Access role. With the retirement of Microsoft's Threat Management Gateway many people seem to be looking for an alternative, as many people feel uncomfortable with putting their CA role in a position where it can be directly access... |
So, I saw this on a page:
(The redacted part says the name of the entity that owns the domain)
The page recently got SSL certs verified by GeoTrust. The image is on https://smarticon.geotrust.com/smarticon?ref=hostname and on clicking it we get sent to https://smarticon.geotrust.com/smarticonprofile?Referer=hostname, ... |
To quote the wikipedia article on Cold Boot Attacks:
In cryptography, a cold boot attack (or to a lesser extent, a platform reset attack) is a type of side channel attack in which an attacker with physical access to a computer is able to retrieve encryption keys from a running operating system after using a cold reboo... |
We currently access Active Directory via LDAPS internally for authentication and user data retrieval. Is it common, or safe, to expose this publicly over LDAPs?
Addendum 1:
Our business case, our Cloud based remote hosted web-application needs to authenticate end users with their local Active Directory.
|
I am just wondering, but how can I harden the security of jailbroken or rooted devices? I understand that SD Card can be still accessible, but how could potential adversaries compromise for example the password lock? Any other precautions I should take or disable some services such as the notorious USB Debigging (adb)?... |
I am just asking in case someone has already done the analysis. A customer has a large set of network drives that were mapped to a CryptoLocker infected machine. The infection itself has been treated. I am looking for a tool or just a binary pattern to match to verify that a file is not encrypted based on a header/iden... |
Are RADIUS and TACACS+ Ever Allowed in FIPS 140-2 Compliant Scenarios?
I understand that RADIUS uses the MD5 hashing algorithm and I'm pretty sure TACACS+ does too, and I do not believe there is any implementation of either RADIUS or TACACS+ that does not use the MD5 hashing algorithm. Please correct me if I'm wrong.
A... |
I am reading Computer Networks by Tanenbaum and Weatherall. In chapter 8 they describe secure communication using public key exchange via certificates. They describe a situation where Alice is sending messages to Bob and a man in the middle (Trudy) is trying to intercept Alice's messages. They describe what Trudy can d... |
From two different applications, I was able to send cross-origin requests. Though the browser returns a "cross origin" error my server is still receiving and executing the request. For example, from a remote site I can invoke cross domain request using
$.ajax({
xhrFields: {
withCredentials: true
... |
I'm developing a system that manages and shares user passwords (which are encrypted using user generated symmetric keys). But of course a big concern is the user losing their symmetric key and the data becoming unrecoverable.
Which has led me to thinking about a system generated symmetric key. So that the user merely... |
Out of curiosity and interest I was wondering if anyone had come across any web based services which offer users other forms of authentication, other than the standard password or PIN? Or if authentication on the web can even reach beyond these methods?
|
I recently was looking at Poker shuffles that were hacked and made to be guessable within a reasonable degree and this was because of the weakness of the shuffles. Is it possible to make a shuffle that is cryopgraphically secure, even if the code for the client and server is available?
|
I have just stepped into ssl domain and started exploring how to implement ssl. My question is i understand ssl certificates signed by CA actually allow the client or browser to validate that the webserver or webservice is actually the authentic web service what it says it is. But if in my mobile client i am actually h... |
I have a program with a heap overflow. It contains some code that is not randomized (is not using ASLR). I want to do a return-oriented programming exploit. Since this is a heap overflow, the first thing I need to do is find a stack pivot, so I can get RSP pointing to a known memory address where my ROP program live... |
I have my site build from a company. I read about website vulnerabilities on the internet and i did some test on my site. It throws these errors.
QueryString key:TutorialId was expected to be of type System.Int64 but was not.
and
A network-related or instance-specific error occurred while establishing a connection t... |
In the following PCI 2.0 requirement, I am not sure how to interpret computer access to internal machines (not remotely accessible):
Requirement 8: Assign a unique ID to each person with computer access
8.2 In addition to assigning a unique ID, employ at least one of the
following methods to authenticate all user... |
Scenario
You have a launcher for some software, it allows you to execute the software but it will also allow you to switch versions and upgrade to newer versions.
When the launcher is executed, it downloads a manifest file from a specific URL (built into the launcher) to fetch the current list of versions. If there is ... |
This question was also asked on StackOverflow, but with no answers, and I thought this may be a better exchange, since I have the same question.
https://stackoverflow.com/questions/9331984/using-c-sharp-aescryptoserviceprovider-iv-only-seems-to-affect-first-block-duri
Using AESCryptoServiceProvider, I noticed that bef... |
I'm trying to protect my applications from some bots that are either malfunctioning or trying to take my sites down (lots of requests from the same IPs in the logs).
Every time someone requests an expensive or security-related action, I save the name of that action, the IP, and the date. Then I check for some limits, e... |
I apologize in advance if this is the wrong place to ask this, I didn't know a better place to start.
I have a rooted HTC Hero (CDMA) that is no longer receiving service and is just kind of...sitting there. Would it be safe to use it as just a device for accessing Google Authenticator? If not, please explain why not. I... |
when confidentiality is implemented using encryption arises a problem: "how the receiver knows the message is really sent by the sent as it is claims?".
when authentication is implemented using encryption arises a problem: "is that anyone else, except the receiver can release the message contents ".
my question is: if... |
While conducting a pentest on a Linux machine, I have a limited shell and trying to escalate privileges.
One interesting thing that i have found is a binary called connect installed under /usr/local/bin/ that has SUID permissions. Here is the complete output for ls -al:
mark@serv1:/usr/local/bin$ ls -al connect
-rwsr-... |
I am looking into using the X.509 for mutual delegation where mutual delegation is bi-directional where an entity can only delegate a task or a set of permissions to another entity if the latter is also permitted to delegate back a different task or set of permissions to the first entity
the above is a theoretical seca... |
I have a desktop computer and a laptop computer both running Debian. All of the devices have encrypted hard drives. I also have a phone running Cyanogenmod/Android.
What is the best way to manage the keys?
Ideally I want to be able to list one Public Key.
|
The official ejabbered documentation instructs the user to generate a self-signed certificate like this:
openssl req -new -x509 -newkey rsa:1024 -days 3650 -keyout privkey.pem -out server.pem
openssl rsa -in privkey.pem -out privkey.pem
cat privkey.pem >> server.pem
rm privkey.pem
That is based on the jabbered 2 docum... |
What can a malicious user / attacker do if access is gained to a mobile device (smartphone/tablet) on a company network ?
|
I am practicing directory traversal attacks and found a vulnerability in a windows XP machine that is running a vulnerable HTTP server that is prone to directory traversal.
I can guess file names and read them successfully but can not execute commands. What are available options to execute code on the box?
I got a copy... |
Some time ago I came across this question on SO; it asks how to remove the passphrase from an existing RSA key using a PHP equivalent to the existing openssl rss command.
I've posted an answer with the solution, but inside the comment thread the OP claimed the following:
Encrypted key, which is later decrypted offers ... |
Suppose someone were to knick a "Login Data" file from a Windows computer's Google Chrome profile. They don't know the machine's user account password, but they may have some ideas as to what it could be, to try.
Is it at all possible for them to recover the plaintext passwords from the Login Data file? Is it encrypt... |
My hosting provider allows access to its SQL Server. When I connected to it by SQL Management Studio, all hosted databases were visible.
I can't get the details on these databases, I get this error:
"The database x is not accessible.(Object Explorer)
I don't know if there is a way to get sensitive information. Shou... |
I was querying my router(Thomson TCW750-4) over the SNMP and stumbled upon some interesting information.
I see that the router actually has five separate network configurations operational:
Loopback(Router IP: 127.0.0.1)
Local network(Router IP: 192.168.1.1, Subnet: 255.255.255.0)
Local network 2(Router IP: 192.168.1... |
Taking a look at this (now rather old) article about the generated rogue DigiNotar certificates, it states the following:
...Such is the case with that small company in the Netherlands,
DigiNotar. Reports from various sites indicate that hackers
compromised the firm’s servers and generated rogue certificates. With... |
In a blog post in response to the Amazon privacy controversy, Mark Shuttleworth wrote:
Don’t trust us? Erm, we have root. You do trust us with your data
already. You trust us not to screw up on your machine with every
update. You trust Debian, and you trust a large swathe of the open
source community. And most i... |
Just wondering: is entire traffic between me and the Jabber server I use encrypted, or only login and password? Given that the server supports encryption, and my IM client is configured to ask for encryption.
If SSL/TLS encryption is used for all traffic, please tell which encryption algorithm is usually used (asymmetr... |
As far as I know 'newer' versions of routing protocols support authentication between routers.
What about encryption and integrity checks? Some implementations like this one from Cisco use MD5, which I dont feel secure using. How do you protect against MITM tampering with your routing tables?
Is there any easier way to... |
I noticed that using the DestroyFVKeyOnStandby option for FileVault 2 in terminal no longer works since upgrading to Mavericks. Usually you type the following in terminal:
sudo pmset -a DestroyFVKeyOnStandby 1 | sudo pmset -a hibernatemode 25
The first command is suppose to cause the FileVault key to be destroyed when... |
i live in a country but i make a website for another country's users. The web hosting company has server in both of the countries. So where should i buy?
Does it affects where the server is depending on the user's country or it does not affects at all?
|
I am doing some research on man-in-the-middle focusing on SSL in particular.
I have been looking into generating a certificate on request when a client connects and requests a secured page.
Assuming that;
Client is connected to AP controlled by me and ignoring cert validation
AP is running airmon-ng and airbas-ng wi... |
I have a spring REST API and a client project. Client projects' HTML page uses jquery ajax calls to fetch data from REST API using json or xml format. My question is to avoid XSS attacks on a web page, where should i perform encoding of user input data (i.e. untrusted data)? Currently i am encoding data into my REST Co... |
I have recently been doing some research into kernel exploitation on X86_64. A problem I have run into is that I have found Intel's SMEP to be killing my contrived example of a kernel NULL pointer dereference which I have been working on.
Can you/how do you disable SMEP on linux? I have managed to remove SMAP (Security... |
I have used Small HTTP server in the past, years ago. I went to its website do download it again, but it has a dubious WOT rating: some say it is malware, some say it isn't.
I proceeded to check it on VirusTotal, where it got 20 positive identifications. Out of those 20, 8 list it as "SmallHTTP" or "Server Web", a lit... |
I'm working on a project where following constrains apply:
There's no remote database or any other means of storing extra data like random salt
When user logins in, only username and password are known and no extra information can be accessed until successful login
We decided to use scrypt and scrypt needs salt. Idea... |
I want to test a csr to see which extensions it is made by. specially I want to see if request is a Ca:False to CA:True one.
I try to view Csr using
openssl req -in a.csr -noout -text
but it isn't declared.
how to test it?
|
Working on setting up some new infrastructure and I want to configure everything so that it's as secure as it needs to be, but I don't want to worry too much about adding additional unneeded complexity. Is it a good idea to firewall off private network traffic on the private interface with the data-center, or will this... |
We have a website hosted behind WAF and we will be using HTTPS. The server already has a valid SSL. Do we need to install SSL on WAF servers also?
|
Which is faster, on average to find the original plain text of a hash: brute force in-order, or with random plaintexts?
|
I think I need to use a MAC for ensuring the integrity of a URL that my system will provide to an end user that will use it to download a content from another component of the system, i.e., an URL has to go from one component of my system to another component using the end user as a non-secure channel.
I had thought t... |
What steps need to be taken to protect a computer from quick attacks that involve physical access?
(Note unlike this question, I'm primarily interested in stopping the attacks, not detecting them; also I'm only interested in very time limited attacks in this question)
The scenario is protecting my devices (laptops, des... |
I know that OpenSSL needs to be installed and activated via apache and the config files, which can be cumbersome or even impossible, and that phpseclib is more flexible and easier to handle than OpenSSL (X.509 problem/ in certain situations the PHP implementation of OpenSSL needs a X.509 certificate in order to create ... |
I am hoping for a better understanding about SSL/TLS by setting up two devices, running two different applications, allowing communications to go over SSL/TLS.
With OpenSSL I have created a certificate and key which I installed on both, the server and the client.
On the client side, I can also choose from three cipher ... |
Are there any ram based VPN solutions that have options to keep no logs?
I've been looking to set up a portable linux distro, probably Debian, that I'd run from CD without any form of persistence. It would only be used as an throughput vpn by a small team of users. what are my options?
|
I am encrypting a secret in a db field.
I am encrypting using AES with a 256-bit key and a random IV per encryption.
They AES key is hard coded in the code. Each IV is stored in clear in another field in the row containing the cryptogram.
How can I improve this encryption? I believe I need to encrypt the AES key but I ... |
I am learning to use sqlmap and came across an application that has Clean URLs. Clean URL example //my url.net/project/public/#questions/question/edit/id/122/answer/1, here MVC framework is used.
How should I perform SQL injection on this application?
I have already followed the answers in Testing clean urls with sqlm... |
Is it possible to detect when a device has been MAC filtered on a Wi-Fi network?
I don't know if it's in the 802.11 standard, or if it's just implemented by ignoring the client network packets.
|
The problem is as follows:
In the local host machine (let's call it 'A'), there is a apache server hosting some web application.
A user use the local host machine to access a web application site hosted on a remote host machine (let's call it 'B').
The user notice that the apache log file keep on having the following ... |
I am working on security for an organisation, we have purchased some encrypted USB keys but wanted to stop any employees leaking data. is there any way to stop their laptop accepting any key but the encrypted one's and also stop the use of the encrypted keys on other PC's.
I do not want to prevent any specific attack, ... |
I'm learning more about security and in my search also using Google Search I found the following question and answer on Stack Overflow:
https://stackoverflow.com/questions/5459682/how-to-protect-session-id-and-cookies-without-using-ssl-https
So, to set it up, you'd create a server key k. Then, you'd create the
cooki... |
I am very confused the difficult jargon available in web about OAUTH, OpenID and OPENID Connect. Can anyone tell me the difference in simple words.
|
I am curious about the true efficacy of the browser private mode.
I did a bit of googling and stumbled upon the following page.
http://www.magnetforensics.com/how-does-chromes-incognito-mode-affect-digital-forensics/
Apparently someone with the Internet Evidence tool can scan my machine for traces of web browsing. It t... |
Considering this for the local loopback connection: -
It is implemented entirely within the operating system's networking software and passes no packets to any network interface controller.
If two applications on the same machine communicate with TCP/IP using the loop back address 127.0.0.1, will other applications o... |
OK, I came across tor browser couple of years ago. Then I have been using tor browser some some reason or another. Normally I use Firefox or Google chrome but if I want to hide my IP then I use tor.
Recently I came across deep web. I had previously knowledge about deep web but now I thought of doing some research on it... |
Professional penetration testers are usually good at finding all sorts of vulnerabilities, including logic flaws, that are highly-specific to the site being tested. However, being a manual activity, penetration testing is performed infrequently, so there is a desire for developers to do more security QA in-house.
In-ho... |
At my work we are given a computer to set up at home so if we ever feel like working from home we can do so.
The thing is that whenever it comes to developing for java I always prefer using windows or linux as long as it is not mac(it is just preference choice, I do not have a valid reason for liking it except that mac... |
I'm about to get rid of an older scanner and I want to make sure that no one is able to acquire any sensitive information that was scanned previously with the machine. I assume it does have some kind of internal memory. How long does it store scans? Until I turn the scanner off or unplug it? Can I check/erase it? Is th... |
I have run a penetration test on a web server. To generate session IDs with this Bash script :
#! /bin/bash
NUMBEROFSESSIONS=3000
for i in $(seq 1 ${NUMBEROFSESSIONS})
do
curl -s -c cookie 'URL' 1> /dev/null # URL is the address of my server
cat cookie | grep HttpOnly >> sessionIDs.lst
done
When this test is run on a... |
Is it possible to reverse the hashing of a block in a Datastream fed to an SHA1 if the plaintext for that block is known? If it is not possible (which I assume) does it make attacks to retrieve the state easier?
An example what I'm trying to figure out:
The following data is known:
suffix1
The result of SHA1(secret + ... |
I am writing an application to generate OTP codes for two factor authentication where I need to securely store data locally. This data must be secure from both the owner/user as well as intruders. I have been thinking of encrypting the data, but the key to that data is also stored on the mobile device. The application... |
I am trying to enumerate on of my lab machines. It seems that it has rate limiting enabled since I am getting blocked after the first few probes.
I need to scan the whole 65535 tcp ports. I tried nmap with "--defeat-rst-ratelimit" option and tried Unicornscan also but non of them works for me.
Any idea how to deal with... |
I'm currently trying to understand the difference between "regular" OFB with full-block feedback and OFB with 8-bit feedback and, in this context, the difference between this two modes regarding security.
Please correct me if I am wrong: Given an example using AES256 and a blocksize of 128 bytes, the general procedure ... |
Could my computer be compromised if someone knew my external IP? I know that when you type that in it just goes into the router page, but my computer is connected to said router.
If so, what is the attack vector? How can I protect myself?
|
First, I think it is the proper place to post my question (and not serverfault or networkengineering). If not, please tell me what's the correct place.
I used FreeGate. I configured the Firefox extension autoproxy for tunneling through FreeGate only the pages are banned (autoproxy uses a black list of banned pages).
I ... |
I am building a node / express app, and for testing https routes, I would like to include a dummy ssl private key and certificate in the repository. This is so that the other developer, who is mainly working on styling and markup, can run the app on his own machine without having to create and configure a key and cert ... |
Here is a real world case:
A chain of high schools (several hundreds) has many websites (~ 3x number of Schools) that are content driven by users (the students).
Every school maintains about 2-4 websites, and the total number of sites reaches few thousands.
They want to limit access to the sites to students only.
Give... |
I'm a complete noob about security, so please, forgive me if I say something wrong.
I have to develop a social network. The client will be an Android app and (probably) a web page for smartphones that will use a REST API. Because of the characteristics of the social network, if the info of an user is stolen, it's not v... |
If I have a subdomain, and I set my cookie's scope to be / instead of examp.example.com. How can it be insecure?
|
As the title asks. OpenSSL will pad stuff with PKCS5 if you encrypt something, however is there a way to access this feature without encrypting something?
|
Company I am consulting to wants to move all their servers from private IP space to public IP space. I'm am trying to convince them that this is a bad idea that it makes sense to move only certain servers but not internal services such as Active Directory, Internal databases, etc. According to their network guru's th... |
I've got an SSH server setup in a remote location, which I use to tunnel traffic from an android tablet. On the tablet, I have the Cisco AnyConnect app to connect to my company's VPN. We want to be able to detect that a proxy is being used by the tablet. Any ideas as to how I could go about doing it?
|
For example, lets say there are two people named, Bob, and Jim.
Bob wants to send Jim a long secret message, and he decides to use a OTP to encrypt his message. Both Bob and Jim know a secret password but it's only 8 character long, so they can't use this to encrypt the whole message. They are also unable to securely ... |
On OS X, when an application requests access to a Keychain item, the user is prompted whether to grant or deny that access.
Supposedly, the system saves not only the binary path, but also its hash in the ACL entry that is created after the user confirms the request; according to Apple, this protects against modified bi... |
As there are 24 PCR's in TPM 1.2 specification. Some of these PCRs are reserved and cannot be extended by user's code. Below are the PCR Index with their usage:
0 - CRTM, BIOS and Platform Extensions
1 - Platform Configuration
2 - Option ROM Code
3 - Option ROM Configuration and Data
4 - IPL Code (MBR Information and B... |
Can you tell me shortly how to fix this problem in Chrome?
Error 150 (net::ERR_SSL_PINNED_KEY_NOT_IN_CERT_CHAIN): The server's
certificate appears to be a forgery
|
Often when doing a pen test you need to hammer certain parts of the site that might be visible to other users. If, for example, you suspect that a comment section is vulnerable to XSS, you might submit 20 or more comments with very strange input to check that.
How should I minimize the visibility of a penetration test... |
Why did Chrome and Firefox disallow file:/// links? I can imagine an iframe opening a local resource, but which resource is the scary one? They could have just disabled iframes to file:///? Ajax requests don't work because of the origin issue, which makes sense. Local links used to be a very useful tool for intranets w... |
I'm no expert but I'm assuming that on OSX it's derived from the user account password. I'm more than open to the possibility of that being incorrect.
On iOS there is no user account password, only a PIN. Passwords and PINs are both optional, but are they used in generating the Keychain key? If not, is the key just sto... |
I am using Ubuntu 13.04. Something really strange happened. I was writing my homework for a Ruby course. I had Sublime Text 2 (a text editor like Notepad, Notepad++, Textmate etc.) opened and was working on some code. I was also surfing the web using latest version of Chrome. At some point I switched windows from Chrom... |
I have a WordPress install which uses the plugin Wordfence. I set Wordfence to block the IP of anyone trying to log in with a non-existent username.
For several months now, I have been getting many login attempts per day with username admin. The usual pattern is that the attempt is made on an IP, that IP gets blocked, ... |
Hello information security stack exchange!
I made a captcha application in PHP. It's certainly not a great idea to do so, but I was bored and I wanted to learn about Bézier curves and Bresenham line algorithms. Therefore let's disregard that my application is not really secure against serious cracking attempts that try... |
Someone mentioned here that asymmetric encryption might not be appropriate for bulk data and gave an example of RSA with 100 bytes. Of course, I understand that it was a rough example. But it made me curious - how much size of data can various public-key crypto handle in general and how much can a JavaScript library li... |
I found an SQL injection vulnerability in a Wordpress installation inside one of my lab machines and I am trying to leverage it to upload a shell.
I can get the admin hash but it seems that it is quite complex as JTR and HASHCAT are taking long times without luck.
Here is the basic output from SQLmap:
web server operat... |
I have the code below in my newsview.php.I want to know why the code below vulnerable to sql injection.I already test the sql injection in the code below.
$id = intval($_REQUEST['id']);
$result = mysql_query("SELECT * FROM newsevent where id = '$id' order by id DESC");
Example the website link is
mysite.com/newsview... |
As far as I know when a phone connects to a GSM (2G or 3G) network, the connection is encrypted. When I get in range of let's say an IMSI Catcher, I imagine this connection will not be encrypted in any way, so they can listen to all my calls.
Is there a way for my phone to let me know that it has connected to an insecu... |
When deploying an SIEM solution, what is the best practice when classifying the severity of each event that is being sent from individual devices?
I understand that this may be a little bit subjective and depending on the organization's monitoring objective but is there a starting point or common practices on how to cl... |
I would like to find an easy way to find out what headers are visible on my websites. For example PHP version, server etc.
I've looked around and can't seem to find a good explanation on the subject for a novice like myself. So what's the easiest way to get all the headers a hacker could use against me? Would prefer to... |
If a site uses https and transfers the customers credit card and ID in the url. Will an attacker be able to intercept those through a MITM attack? And through Sniffing.?
Can the packets be sniffed somehow to see the links?
|
I'm building a GUI Desktop application that will communicate with an API(http) in a webserver.
In the client side I have a GUI Desktop application and a GSM Modem(hardware). The GUI Desktop application will make requests to the API in the webserver and will get the SMS's to send.
My question here goes on how can I desi... |
From what I understand it seems that S/MIME uses PKCS #7 which can handle various different types of encryption. How is the choice of encryption method made by the e-mail client and how do I know what encryption was used for sent/received messages (e.g in Thunderbird)?
|
What are services of pgp? How is compression performed between hash function and encryption? How it can be applied in reality?
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.