instruction stringlengths 24 29.9k |
|---|
I have a WD My Passport hard drive.
There is an option that allows you to lock your hard drive with a password.
How secure is this lock?
They don't give details about the encryption algorith or the way the hard drive is beeing locked.
|
I know I can use the php.ini open_basedir directive to limit the directory trees where files can be opened by PHP.
But in a directory structure such as this:
├── application
│ ├── index.php
│ └── www
├── logs
└── uploads
└── malicious.php.jpg
Is there any way to prevent malicious.php.jpg from being evaluated a... |
I have this idea about building a social network that stores all its data encrypted. The idea is that a member's data is stored on multiple 'base servers' (of the member's choice). Each member has 3 datasets and 3 encryptionkeys.
keyP for his own private data and settings
keyF for his profile (posts, photos, friendli... |
I'm looking for ways to defend against common fingerprinting techniques used by hackers to identify what kind of setup my website is running on.
I understand this is a complicated topic, and every setup probably has it's own solutions. I'm new to security so I don't even know where to start really.
To help narrow out t... |
Web servers such as Apache and nginx support virtual hosting. To the users of websites on a shared server, they will not know that another websites exists on the same server. I have been wondering for a while now how reliable this is.
There are online tools which can attempt to find other sites hosted on the same serve... |
Is there a hash algorithm that will help you identify similar files or strings? For example, the hash for ABC and XBC would be similar rather than radically different as is usually the case. I know of one measure of similarity, Edit Distance (http://en.wikipedia.org/wiki/Edit_distance). But this doesn't give you a hash... |
The well-respected security consultant Dragos Ruiu is reporting that he has been infected with mysterious malware that can survive re-installation of the OS and re-flashing of the OS. In other words, he has taken an infected machine, wiped it, airgapped it, reflashed its BIOS, replaced its disk drive, installed a fres... |
HIPAA requirements seem to state that a disaster recovery plan is a required implementation, defined within the HIPAA Contingency Plan standard in the Administrative Safeguards section of the HIPAA Security Rule.
What about if the application in question is non mission critical, uses a copy of the system of record and... |
I have recently got a Mac which I have started using already without any encryption while looking for the best solution. I have come to the conclusion that using Mac's own file encryption technology FileVault will be meet my requirements and easiest to use.
What I would like to know is by encrypting the drive now, will... |
Reading this post, titled "Fixing Unix/Linux/POSIX filenames", I came across a VERY interesting phrase by the author, which says:
Oh, and don’t display filenames. Filenames could contain control characters that control the terminal (and X-windows), causing nasty side-effects on display. Displaying filenames can even c... |
I really like the Chrome extension Vimium. It significantly speeds up surfing for power users. However, when you install it, Chrome warns you because this extension injects JS code on every page you visit (which is potentially unsafe).
The author responds to this with "Don't be alarmed. Vimium never talks to any server... |
I've been exploring the gamut of free Windows firewall applications recently and have encountered the following problem:
The better firewalls are excellent at stopping other apps from phoning home for user reporting, unsolicited patches and other suspect behaviour; but the firewall apps themselves can and often do wha... |
I'm running apache on 192.168.56.178, which listens on port 80, 8090 and 8095 (configured as <VirtualHost *>).
Now If I open my browser and point to any of those 3 ports, e.g 192.168.56.178:8095 I will get a It works page.
Then I try to determine which port runs HTTP service with nmap,
%> nmap -p 80,8090,8095 192.168.... |
Is it possible to detect S/MIME content types (enveloped or signed) using OpenSSL CMS API? I would prefer to avoid pre-parsing S/MIME headers and let OpenSSL to detect whether message is signed or encrypted.
I'm looking for a method that would extract smime-type from CMS_ContentInfo.
|
My question refers to the following article on Wikipedia: MAC Filtering.
The article states:
MAC filtering is not effective control in wireless network as attackers can eavesdrop on wireless transmissions. However MAC filtering is more effective in wired networks, since it is more difficult for attackers to identify ... |
I'm trying to configure my webserver for perfect forward secrecy.
I'm using
ssl_ciphers EECDH+ECDSA+AESGCM:EECDH+ECDSA+AESCBC:EECDH+aRSA+AESGCM:EECDH+ECDSA+SHA256:EECDH+aRSA+AESCBC:EECDH+aRSA+RC4:EDH+aRSA:EECDH:RC4:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS;
the problem is that, at least on mac os 10.9, all maj... |
In the book, Applied Cryptography by Bruce Scheier, in the foundations chapter he defines symmetric encryption algorithms as
algorithms where the encryption key can be calculated from the
decryption key and vice versa.
Then he goes on to say (caps added by me):
In most symmetric algorithms, the encryption key and... |
I've created a free server on a website, but I'm a bit cautious on connecting to it. Are there any potential security risks in connecting to a Murmur (Mumble) server?
|
My question is a bit of weird one and doesn't apply to me so much as I'm just curious.
My question is:
If a large company (say, Google, Facebook, or a bank) were to have its private key stolen, how long would it take to re-secure communications? How long does it generally take to detect an intrusion like that, and onc... |
I'm new to this site. I have a question concerning the upload of dynamic java code into an application running on Tomcat 7.0.34.
I'm doing a penetration testing of a java website and found it's possible to upload arbitrary files with a certain upload functionality. I managed to upload an HTML file for example, which th... |
Can they be used together? ....or are they two separate protocols that may or may not be useful depending on the context?
The reason I ask is because I'm trying to implement the following:
User "Bob" goes to a Client implemented as a User-Agent only application.
The protected resources are controlled by the same domai... |
As we know that on most of the processor architectures, the stack grows downwards. Hence, memory exploits involving smashing of stack and buffer overflow and their explanation make sense.
Just wondering whether it is possible to implement such attacks involving stack smashing on systems like HP's PA-RISC, where the sta... |
A site I frequent has a policy to make you change your password every 90 days. That's a cool policy, but I stumbled upon an old xkcd and facepalmed myself, because lots of doxing happens on this site. It just never crossed my mind that something like this could happen to a more reputable site (silly I know). The site r... |
The Wikipedia article about CryptoLocker says:
In late-October 2013, security vendor Kaspersky Labs reported that with the help of a researcher, it had created a DNS sinkhole to block some of the domain names used by CryptoLocker.
The Wikipedia article about DNS sinkhole says:
A DNS sinkhole, also known as a sinkhol... |
I am getting slammed hard by bots, and I am not sure how to stop them without blocking my legitimate traffic. I created some iptables rules that say, if X connections in X seconds, block, but that doesn't do me much good when the bot is only making 2 or 3 requests every 30 seconds.
Ideally, I would like to identify the... |
I have been reading about SSL/TLS for the last few days and looks like it has never been practically cracked.
Given SSL/TLS is used for all communications between client application and the server, and given the password/API key is random and strong and securely stored on the server-side (bcryted, salted), do you think... |
Many registration forms prevent you from choosing a password that includes your username. Is it a reasonable restriction from security standpoint? I can see that if your username is "foobar" and password "foobar1" it's easy to guess, but shouldn't it be allowed if the password is otherwise strong enough?
Is n)_h322">L... |
Today a Belgian MP claimed (backed up by a security expert) that her email headers show that her email was read during routing (text in Dutch).
The published screenshot of the headers highlights the final line in the extended headers:
message opened by mailclient 6.73.3.0
The IP resolves to a US DOD military base (Fo... |
In real life it would be like putting two items at the opposite sides of a revolving door, you turn it and they can be exchanged safely.
Not only that, if the door is made out of glass, you can pretty much guess that the other person either has the actual item you requested or put a considerable amount of effort to cre... |
Assume there are two servers; server1.com has a standard SSL certificate installed and server2.com has a wildcard SSL certificate (*.server2.com) installed.
Next, assume you make from server 1 via SSL connection an API call to api2.server2.com...
If someone eavesdrops on the connection, which URL of server2 would the s... |
I'm studying how WPA-TKIP works. As I understand, there are two parts to authentication.
Using EAP messages the client authenticates itself to the access point or authorization/RADIUS server. I believe this is using EAP-TLS, is that correct?
Using the four way handshake, the client and access point calculate temporal ... |
In a post that reads like science-fiction, a security researcher claims that malicious code was being passed between computers. A few quotes:
... "badBIOS," as Ruiu dubbed the malware, has the ability to use high-frequency transmissions passed between computer speakers and microphones to bridge airgaps.
... It's also ... |
I have an application. Which works on http, http://normal.bank.com. But for log-in, performing any action, etc. I am rediecting user to https://secure.bank.com, where user can login and perform action. Is this is still vulnerable to MIM attack? What are the precautions?
|
Suppose that http://example.com/<foo> systematically redirects to https://example.com/<foo>. I enter http://example.com in my browser's URL bar, and I see a page load and the URL bar now displays exactly https://example.com/ (no Unicode hack, no whitespace hack, etc.). I verify that this is the case (most users won't, ... |
Is it possible to encrypt (encrypt traffic) WiFi connection from my laptop to my router?
If anyone of you did it?
How I can do this?
|
There are a few things that I dont understand about the injection.
The injection is something along this line
> .
MAIL FROM: mail1@gmail.com
RCPT TO: mail@gmail.com
DATA
EMAIL data
.
Here are two ways to inject in an inline fashion:
%0aDATA%0afoo%0a%2e%0aMAIL+FROM:+%0aRCPT+TO:+%0aDATA%0aFrom:+%0aTo:+%0aS
ubject:+t... |
I am trying to compile the following exploit:
http://www.exploit-db.com/exploits/10613/
But get the following error:
local.c:12:22: fatal error: asm/page.h: No such file or directory
compilation terminated.
|
I'm a small business operator and I'm looking for ways to provide security and reasonable privacy for my own business communications and communications of customers. All these businesses operate outside the U.S. and have no need to export their data to U.S. servers.
All the smartphones I've seen seem awful. Before so... |
My question is based on the answer on that question:
Can the Gmail password be recovered from the Android Gmail app?
So, as I understand when we setup Google account on Android devices, it stores just token for it. But do Google restrict access to own services for that token? As I know after we setted up credentials on... |
When logging in to a site with wrong user/password credentials, the displayed error is most generally a generic "username or password is incorrect". Looking into some PHP code that handles such login I found a MYSQL request constrained on both the user id and the password hash, making it indeed impossible to determine ... |
I am reading about Facebook Connect and it looks a lot like OpenID Connect. Are these two similar enough that the Facebook Connect secret key is an OAuth Client Secret and therefore the same attacks apply?
Or put another way, what could an attacker do if he stole a Facebook Connect secret key from a web application?
... |
I've been researching LAN recently, and I came across a post talking about viruses spreading over LAN, and I was wondering, how is this possible? Would it not be a huge security issue to allow files to automatically be installed over LAN?
|
Googling the subject "sniffing out / spying on SSL secured communications" one finds many references to being able to make some good guesses about the "target destination" once the path length is known/guessed.
Would it help if one just would make the length (in terms of number of characters) unusually long, which is ... |
I am looking for a way to do multi-key encryption with the set number of decryption keys. The goal is to take a file, encrypt it and generate several decryption keys, in order to decrypt several (not just one, but all either) keys must be used.
Use case:
Receive image.jpeg
Generate an encrypted image.jpeg.crypt, image.... |
What are the security implications of asking users to provide password hints? What are best practices for storing user hints? What research has been done on using user-supplied password hints to guide password cracker applications?
Note - it looks like Adobe's astonishing fail with 130 M reversibly-encrypted passwor... |
I was wondering how the concept of shared folders work with Lastpass. As I understand from their site, Lastpass has a master password, which acts as the encryption key (say MK) for all data stored in Lastpass. However this key is only available on the client side. In addition the users can generate their own key pair (... |
I am setting up a OSSEC on existing running machine. From my research I find that I should be running the following command to check for previous intrusion.
zcat /var/log/*.gz | /var/ossec/bin/ossec-logtest
Secondly it will automatically run the syscheck and store checksum in /var/ossec/queue/syscheck/ . Is there any... |
I am wanting to develop a web service (classic client/server) where the server is not trusted, so is kept (cryptographically) ignorant about the actual content/messages.
Obviously, if you don't trust the server, then you shouldn't trust any client that server hands you. So our client would have "no moving parts" - tha... |
Why do some websites (especially banking sites) display more characters in the password field than were actually typed? This is sometimes apparent just after clicking the login button.
|
I'm working on a simple project that implements DUKPT. I've tried searching the web for more specific information than on wikipedia and it seems that the algorithms are only covered in ANSI X9.24 part 1. Are there any more sources (prefered free ofc)?
|
Specifically, we're using fwm logexport piped to logger to dump the audit logs in real time via syslog to our SEIM. It works great if the command is run manually (in the background) from the "expert" command line, but then we have to remember to go back in and re-start it after a reboot.
The "Job Scheduler" allows f... |
I'm working on a glorified click-jacker which uses CNAMES for navigation (example.bit -> example.speech.is) and I want to allow cross-domain access to the contents of an iFrame. The child iframe has headers set to:
Access-Control-Allow-Origin: *
Content-Security-Policy: default-src 'self' 'unsafe-inline' *.speech.is h... |
The differences between an IDS and a firewall are that the latter prevents malicious traffic, whereas the IDS:
Passive IDS: the IDS only reports that there was an intrusion.
Active IDS: the IDS also takes actions against the issue to fix it or at least lessen its impact.
However, what's the difference between an IPS ... |
Can somebody tell me what program can mess with pockets and enlarge them for Ping of death attack? (i need it for lab)
Is there anywhere step-by-step instructions of this attack? I'm not a hacker (embedded systems), don't know where to look.
|
I have a p7b certificate(DER encoded) which I need to convert to a PEM encoded certificate so that I can import it into my keystore.
I see that the openssl command below does the job of the conversion
openssl pkcs7 -in infile.p7b -inform DER -print_certs -outform PEM -out outfile.cer
Is there any equivalent keytool co... |
Would malware be able to hide itself in the controller somehow or otherwise be able to effectively hide files itself from both windows and Linux?
|
Let's say, for example, that I accidentally entered my Microsoft account password instead of my Google account password when logging in to some Google web service. After getting an error message, I entered the correct password. Since the connection is HTTPS, only the Google authentication service¹ should have "seen" my... |
A mate pulled a quality prank on me the other day by sending me a SMS via a Spoofed number. He's bought a SMS gateway and can set the message ID/phone number to be 'God' (or whatever he wants(letters or numbers)).
I wanted to see if i could determine the original SMS gateway that it came from, I vaguely remember this ... |
I'm running Linux inside of VMware on the Mac, and on the Linux guest, I'm running a program that has connections open to perhaps 4 different machines.
On the OS/X host, however, VMware has only 1 active network connection: To a184-85-99-51.deploy.static.akamaitechnologies.com. And what is also strange is that in my f... |
I'm about to distribute a dll library (there's also a linux version) to my users but I'm afraid of dll preloading attacks (i.e. someone substituting its malicious dll to get called by mine and gain privileges).
I'm looking into digitally signing my dll and all the other dlls that my library loads with LoadLibrary/LoadL... |
I work in commercial telecoms and one part of our business is the leasing of computer equipment to call centers. If the customer for whatever reason gives us the equipment back (non-payment, out of business, downsizing) we lease out these same computers to the next customer.
Making sure the computers are ready to be sh... |
I have found that my connection decreased suddenly when downloading torrents. I diagnosed it with bit torrent and the answer is that i should do port forwarding on my modem/router! Is it risky?
|
OpenSSH allows to show a visual representation of fingerprints with the VisualHostKey, see announcement at O'Reilly and here. The output looks approximately like this:
# Host github.com found: line 53 type RSA
2048 16:27:ac:a5:76:28:2d:36:63:1b:56:4d:eb:df:a6:48 |1|LCbDN2wZEUdf/m4pYL7OUiOk2RM=|QZw5k6xHgVjYct4Ja7VUUK0Z... |
I have a PHP-included form that tells me the URL the customer was visiting when they fill it out. The content of the message was either jibberish or poorly handled by the form. (it looked mostly like this: Утром ÑÐ...) The URL that was reported was URL encoded, I had to decode it twice and this is the (anonymized ... |
I've received a recent security review of a website which mentioned it had a cross frame scripting vulnerability. In short, it mentioned that a malicious site could load the page up in an iframe, fooling the user to think the are on the legitimate page for the application, while overlaying controls and such to gather ... |
According to this answer, it's possible to send a network packet with a forged source IP address.
So, what methods a server administrator can take to prevent/block a countless requests from faked IP addresses, assuming they have no known regularity (except that they are a lot), and he doesn't intend to prevent some leg... |
These are not my lines they are by someone else on the internet. I also want to know is that malware that unique? How will it work in GPU and is there a way to sandbox such application?
"HERE GOES THE MALWARE........
1 More than 80% part runs only on GPU.......
so its useless to run that under sandbox
2 Around 90% ... |
Why is the site doing this? Is that a security flaw? In general, I'd be wary about using a http site instead of a https, although regarding truecrypt specifically, I came to trust it. I wonder why not use the higher standard of https.
|
Recently, I have got a few 404 errors where the user has requested PHP pages.
The URLs are range around the cgi-bin and php versions, eg, /cgi-bin/php4. There is also some query string as part of the request.
%2D%64+%61%6C%6C%6F%77%5F%75%72%6C%5F%69%6E%63%6C%75%64%65%3D%6F%6E+%2D%64+%73%61%66%65%5F%6D%6F%64%65%3D%6F%... |
Does it really matter what the permissions are on a symlink as long as the smymlink target is configured correctly?
|
Trouble seemed to start after upgrading to OS X 10.9. I stopped receiving email in an account I'd set up over a year ago. I removed the account and when I attempted to add it again, I was served a message about the identity of my domain name not being verifiable. Not suggesting it has anything to do with the OS X up... |
I would like for my application to enable users to save their programs to Pastebin through the Pastebin api. This requires a developer key, which is automatically created with each account. Keeping the developer key secret would be an inconvenience, both because my project is open source and because the most natural ... |
I'm using Kinvey as backend but because it doesn't provide the ability to run custom code I have set up another server. So basically when x happens on Kinvey server, I send a call to my rest api on external server, do something, when done do a call back to rest api on Kinvey.
I'm not using any sort of secure layer like... |
If my mobile phone is infected with some malware and the only connection I have to my corporate network is that the email client in the phone is configured for mail (pop/imap), what would be the risk of getting my corporate network compromised ?
Or, what would be the attack vector for an attacker who wants to compromi... |
I'm IT in a small company. The network is about as ancient as most of the staff (at 30, I'm the company's youngest), and the staff also is notorious for spreading viruses around the network despite our best efforts of warning, virus prevention, and education.
And then ground zero finally hits. Our first machine is infe... |
I need to design an application for internal corporate use. The application must be hosted externally. Ideally I'd like that application to be able to authenticate and authorize against the corporate ActiveDirectory.
However 2 problems here:
Authentication must work even if corporate network is unavailable.
I'd prefer... |
We've heard a lot about badBIOS and how low level rootkits can be used to exploit/bypass traditional security but can this story be true?
bypass operating system security
hide from the system
communicate with speaker/mic
Also, if true, how would this change the way we do security?
|
I'm looking for any guidance around testing a service I've found running on a target server. I'm doing a 'black-box' pen-test and the company is one of those 'I-don't-want-to-tell-you-anything' types so they won't tell us what service is running.
NMap picked up an open port and suggested it was a SIP service, however a... |
I have read this article http://jaspan.com/improved_persistent_login_cookie_best_practice
i intend to implement cookie theft detection mechanism Barry Jaspan devised in it.
but a problem seemed to me.
i sent a letter about it to Jaspan several days ago, but he hasn't replied yet.
the problem is:
a user may open severa... |
I need to develop an application security strategy for a web application product. Do you have any recommendations as far as procedures and policies are concerned?
Any inputs / guidelines or relevant URLs will much be appreciated.
|
Note: Question updated to narrow the scope a bit.
Scenario
Client <-> Application server <-> Data server
Users use the client to connect to the application server and build queries for execution.
Application server handles authentication and authorization.
Application server sends query definitions (not SQL) along wit... |
I'm seeing some odd behaviour on my proxy server logs since I started blocking direct outbound connections to port 443 (thus forcing applications to use the proxy server for HTTPS connections).
I'm seeing lots of low-traffic (in the range of 0 to 20K bytes), long lived (in the range of 1 to 25 minutes) outgoing connect... |
This answer (incorrectly?) states
No, as long as the CORS Access-Control-Allow-Origin is at its default restrictive value. This prevents the outer website from accessing the framed website via Javascript/etc.
However, I was pretty sure that a framed website cannot be accessed unless it is the same domain, regardless... |
I have a hand built website, and am triying to build a cms/admin-panel, and my username and password, are not stored in a database, but, in a two setup file like seen below.
index.php
<?php
session_start();
define('DS', TRUE); // used to protect includes
define('USERNAME', $_SESSION['username']);
define('SELF', $_... |
Here's my case. We have written app for Android smartphones which allows users to exchange secured cipher messages. For key-exchange we're using elliptic curve 112 bits, for messaging we're using DES 56 bits. We have chosen weak enough cryptography in order to satisfy all kind of limitations applied to cryptographic me... |
When entering your email address publicly, a practice is to replace . with text dot and @ with text at. I assume that the reasoning is that this way automatic email-collector robots won't match your address so easily. I still see updated websites using this.
However, this practice is not very hard to workaround with a ... |
If I had two firewalls, I could put a web server within a DMZ and then with the second firewall restrict the access to the DB server.
However, If I only have one firewall, how could I accomplish this? Because if I use the following scheme the web server would have full access to the DB server, right?
Internet -- Route... |
We are designing a web API - accessible via https only - but two schools of thought seem to have arisen among our team:
Group 1 wants to adopt an approach that is more concerned about data leakage than MITM attacks:
Passwords will be sent in the clear in requests (but a MITM would therefore be able to recover a user'... |
I've recently seen a youtube video, which is advertising an iphone app which will unlock your mac computer by knocking on your iphone. The ad is claiming that it is faster and safer than typing your password. I am concerned about the security of this method. Can anyone tell me if it is really safer to do so?
|
If you enable 2FA for Google Apps the shared secret is 160 bits. The google_authenticator PAM module on the other hand seems to use 80 bits for the shared secret.
According to RFC 4226:
R6 - The algorithm MUST use a strong shared secret. The length of
the shared secret MUST be at least 128 bits. This document
REC... |
Ari Juels and Ron Rivest propose a technqiue to strengthen password files called honeywords . Basically for each valid password they insert fake passwords (honeywords) and if somebody tries to bruteforce it can be detected .
The basic idea of obfuscating real data among fake data is crux of k-anonymity , l-diversity an... |
This is a fascinating document: top 100 passwords from adobe breach
I have a question about one part of it:
However, thanks to Adobe choosing symmetric key encryption over hashing,
selecting ECB mode, and using the same key for every password, combined with a large number of
known plaintexts and the generosity of user... |
I'd describe myself as an average tech savvy computer user. I have many accounts in forums, shopping sites, etc where I recycle two moderately strong password with small variation. These are account where I don't care if anybody gains access to them and that's why I have them saved in the browser's password manager. Fo... |
This is a follow up to this question. I've finally tracked down the file Avast keeps detecting and it's C:\Users\Jacob\AppData\Local\Updater.exe , I've no clue what this file is for , but am wondering if i should delete it or how I can get Avast to stop detecting it?
Not sure why people are jumping to conclusions and t... |
Well i need to know is it possible to enter xss script through console of developer's tools(e.g. : firebug of firefox)? Is this a proper way ?
|
Can ISPs presumably use packet sniffing applications such as wireshark and monitor my unencrypted data? Are they "allowed" to do so?
|
Let's say, I have a friend far from me and I want to send some secret messages to him. I have to say, I'm pretty newbie in security. That's why I'm wondering, does the Diffie–Hellman key exchange protocol allow me make a secure communication with him by sending a public key to him and them after all necessary computati... |
I have a web application that allows users to add mobile devices to their accounts (using mobile app).
Each device is uniquely referenced by its UUID. Mobile client is developed using PhoneGap, so it uses device.uuid variable for this purpose. An app written in PhoneGap can be run on many systems, but my application t... |
As mentionned in the title, I have KIS 2014, Malewarebyte Pro and Spybot installaed on my windows 7 (regularly updated). I regularly scan my pc for viruses and spywares and clean it with Glary utilities pro and Ccleaner. I also blocked Javascript in my main Chrome browser (for unknown websites).
Are these practices suf... |
I recently bought a Yubikey Neo which can act as a OpenPGP smart card. I'd like to use this to store my private GnuPG key. I've gone through the initial setup and I am able to use the smart card to sign and encrypt files. After the setup the smart card's key shows up in gpg --list-secret-keys output.
If I lost the GPG... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.