instruction stringlengths 24 29.9k |
|---|
I'm a student and currently try to create demonstration of libzrtp mitm attack. I've spent hours searching trough google - and there is no any useful information. Does anyone have any experience with ZRTP? All sources just tell - oh ZRTP is so secure and protected from mitm attacks. But how exactly this can be demonst... |
I know that Data Encryption Standard (DES) provide strong security but I want to know how does it provides confusion and diffusion?
|
One of friends hacked my laptop and now whenever I come online he can tell what tabs are opened in my browser, so I think he is remotely monitoring me. I don't know how he did this, since I didn't take anything from him.
I use Ubuntu, the firewall is enabled, remote connections are switched off, so how can he see what ... |
I understand that when I send a message to my friend Bob using his public key, it's a 1 way encryption. However, if I add my own public key to the list of recipients, it allows me to later decrypt what I sent.
By adding my public key, is that any less secure?
|
I am trying to get access to one of the machines in my lab. it has 2 tcp ports that I am highly suspecting which are:
port 25 tcp
port 111 tcp
For port 25, it is supposed to be running SMTP, however, I think that it is running another service other than SMTP since nmap and Metasploit auxiliary smtp scanner were not a... |
From reading a lot of info on this website I came to the conclusion that if someone with enough skill really badly wants to gain access somewhere, then there is absolutely nothing stopping them from doing so. Additionally I learned that getting access to a company computer is much easier than a singular computer at hom... |
I am a taking a network security class at grad school, and I need a little help with my assignment question. I am trying to think this through, and just want to know whether my approach is right or wrong.
Question:
To deal with false acceptance and false rejection, multiple biometrics authentication
schemes can be ... |
The transaction ID for DNS queries can take values from 1 to 65,536 and my computer pseudorandomly chooses one for each DNS request. If I sents 1,024 false replies per request, how many requests should I trigger to compromise the DNS cache with probability 99%? or as close tot hat as I can get. Thanks
I'm getting a res... |
I want to use distributed cluster configured like: xx.resource.server.com.
xx - can be anything from aa to zz, most of the requests will be one time.
I need the connection to be secure between client and server, so I was thinking of using multidomain SSL certificate, to be safe from ears dropper, but from my understand... |
In the book named "operating system security", I read this paragraph:
"Protection domains can also be constructed from an intersection of
the associated subjects (e.g., Windows 2000 Restricted Contexts
[303]). The reason to use an intersection of subjects permissions is
to restrict the protection domain to permi... |
Among the requirements for a secure key exchange is the key confirmation. I wonder why is this step required. Even if the other party hasn't computed a correct value for the shared secret, it doesn't matter. It won't be able to decipher the information sent anyway. Why bother and make sure that the other party actually... |
I would like to stay out of the automatic filters in place by security agencies and not be accidentally placed on a no-fly list or such. Say I'm having a political debate with a friend about democracy and stuff, and terms like revolution, capitalism, freedom and such (oh, hello there NSA!) are thrown around a lot. Send... |
I am watching a tutorial on YouTube about how to include remote files or local through a standard include command.
Here is the code:
<?php
if(isset($_GET["language"])) {
$language = $_GET["language"];
include($language."gif");
}
?>
I got this on a local webserver (WAMP) and I do the tutorial tells me to do.
... |
I will receive some secret key from server which I will use as an authentication key for a MAC function in the future. But my question is how do I store this key securely on my machine?
Will I have to re encrypt it with some other key and store it like that?
|
Are there any services that like Tor let you have many IP addresses and change them quite often?
PS. The problem with Tor is that they list publicly their exit nodes, so its very simple to detect that user is behind Tor network and act accordingly.
|
I use LastPass to store and use my passwords, so I do not have duplicate passwords even if I have to register four to five different accounts a day, and the passwords are long.
How safe are password manager services like LastPass? Don't they create a single point of failure? They are very attractive services for hacker... |
I'm running VMware 5 and I have found that when I start up VMware I see two connections:
TCP 10.100.100.161:55555->as-40816.engx.vmware.com:https (ESTABLISHED)
TCP 10.100.100.161:55556->a184-85-99-51.deploy.static.akamaitechnologies.com:https (ESTABLISHED)
However I have set up my firewall to block the first one:
0010... |
I work for a web company that's undergoing a massive rewrite in order to separate our Data out into its own RESTful service application - the goal is to be able to sell access to third parties and quickly prototype internal applications without needing direct access to the DB.
We currently have three Applications - The... |
I am completely new to this field and am a college student. I am looking for a static code analysis tool that scans the source code of a web app ( NOT the URL) for security vulnerabilities. So far i have not found a tool that scans the code, it is only asking to paste the URL which is not what i am looking for.Could yo... |
We've all read about how Edward Snowden got access to thousands of classified documents and shared them with reporters. But how did he do it? He got access to tons of documents that he was not cleared for, i.e., that he should not have been able to access. What do we know about how he was able to access them?
Motiv... |
I have read on a few guides on "how to secure SSH servers" that it is a good thing to increase ServerKeyBits from the default of 768 to 2048.
Most of these guides seem to be for the entry level/novice server admin (which I am) to quickly protect themselves from scripted brute force root ssh login attempts and things li... |
Intel has recently added new instructions to their instruction set to support bounds checking. Intel calls them the Memory Protection Extensions (MPX), and they are described in Chapter 9 of this manual. In a nutshell, you can use the new MPX instructions to load a base and upper limit into special registers before d... |
Recently I realized that there are three thousand contacts with same name and email address in my Google contacts. The name belongs to an email that I have recently received and responded to, nothing special existed about the email.
Could this be an attack or simply a bug in the services which I use? I use my android s... |
What are the generic conventions and standards for storing and identifying biometric fingerprints out there?
Are there some RFC documents for that?
As a sub-question: suppose I want to preserve my own fingerprint on some digital media - is there a public format to do this?
Superficially, I know the market has both simp... |
I want to be 100% sure that my machine only connects where and when I want it to.
If I use a firewall that blocks all UDP and TCP packets but those that I explicitly allow to pass, can I be 100% sure that my machine does not connect anywhere without my approval?
For example, if I did not know about UDP at all and only... |
I'd like to know if it's possible to use openssl command to retrieve and decrypt the key for encrypting/decryptig email content. I know I can decrypt the whole encrypted mail by something like this
openssl smime -decrypt -in enc_mail.eml -inkey recip_priv.pem > dec_mail.eml
However, I'd like to see the steps in betwee... |
This may seem like a silly question to most, but...
I recently has some spyware infected on my machine, which I have since gotten rid of.
Using a couple of scanners (that come recommended on various sites such as c|net etc) do not show any more signs of viruses etc. Yay!
Being as paranoid as I am, I'm wanting to check... |
There is a lot of academic papers that use trust and reputation in an interchangeably manner. Is there any clear and concrete definition to distinguish these two terms in various contexts? Is these any clear border between them?
|
I've read in many papers something that looks an specialisation of the block ciphers calling them with a lightweight tag, but I couldn't found a definition.
If I understand correctly, those lightweight block ciphers are ciphers that due to their characteristics, are particularly interesting environments like embedded a... |
I want to configure VSFTP for ftps protocol and it has some choices to select the encryption type: tlsv1, sslv2, sslv3.
I read that tls version 1 has some security issues but in the man page it says that tls v1 is preferred. my question is why tls v1 is preferred and is it more secure to use ssl v3?
|
Would it be possible to create an online shopping service like Amazon (or Silk Road) but also to make it decentralized so there would no main server users would have to trust with their data?
I imagine p2p approach could work here, although I have no idea how would you maintain integrity of distributed data...
Anyway,... |
Rooting a server is done through uploading a shell on a target website and running a root exploit to gain root privileges on a server thus gaining access to sites that are hosted on that shared server.
My question is, what is preventing a person from just buying a site on a shared server and upload a shell himself and ... |
The OWASP Application Security FAQ recommends the use of JavaScript to produce a salted hash of the password client-side with JavaScript prior to sending it to the server.
Is this something truly advocated?
Should I go this route, how should the page behave should JavaScript be disabled? I imagine that signing in will... |
I am currently working on my SSL/TLS assignment and I got a question to ask. What is the use of a login password since it is not needed for establishing secret communication between your computer and a secure server?
|
Almost all the application regardless of their nature and purpose are using encryption to secure sensitive data to be saved to database, if the user using a method to encrypt a file (for instance an image) and save the binary data to database and later decrypt it to display it to end user, what are the best practice to... |
I've been working on a task to find threats in a social network called Skyrock. For which, I've managed to retrieve a significant amount of URLs by crawling various user profiles and parsing the data for URLs. These URLs basically are a part of data, that some of the users share publicly on the network. Now, I want to ... |
This design is for transport security between a client and a server. I'm planning on using it for a cloud storage system. I would like it to be secure against you-know-who.
I'm trying to prevent the anyone (like the NSA) from forcing me to hand over my keys to the data, so the goal is for even me not to be able to acce... |
What is the difference between "role based authorization" and "claim based authorization"? Under which circumstances would it be appropriate to implement each of these authorization models?
|
It certainly would be more convenient to store my KeePass database on either S3, Dropbox, or better yet SpiderOak. My fear is having my cloud storage account compromised then having the credentials recovered by either brute force or some other attack vector. How safe is this? What risks do I need to know about?
|
I have received a couple of emails recently from site owners saying that they are finding referrer links in their stats with their URL path but my domain. So if a website has a page www.theirsite.com/blog/article1, they would find a referrer www.mysite.com/blog/article1. So far I've always thought that this is spam, a ... |
I'm creating a cloud storage service and need to have the ability to provide reliable security for clients. In my previous question, I used a different schematic and said I would post a new question.
I'm still trying to achieve security against the NSA and the possibility of legal issues. I would like to have my users... |
I was looking at weibo.com (chinese equivalent of twitter). I was surprised to see that their login page (http://www.weibo.com/) or forgot password page(http://login.sina.com.cn/forgot/index?entry=weibo) are not secure i.e not using HTTPS. Are these pages really secure? Am I missing something here?
|
I'm new to security issues and I am considering buying a course at ELearningSec (beginners course,of course). I am planning to work in a company and want to learn about offensive and defensive skills to improve the company and myself, and I would like to know:
Is Kali better than Backtrack for Pen test and web exploit... |
I am using virtual box to run a secure machine. I am not fully confident in the hosts security. My assumptions are that of course the host can read the VM when the VM is running and that if the machine is not running and some one got into my computer ripping the VB image would not be useful if it was encrypted.
Is ther... |
I would like to use a CDN for the static content of a website.
But obviously I do not wish to share my SSL key with any external service.
What are my options?
An ideal solution would be to link to unencrypted static content but enforce (!) that browsers authenticate this content, for example by checking that it matches... |
I'm starting my first website for a doctor's office and I'm wondering if the website needs to be on a HIPAA compliant server, even if no patient health information is collected or stored on the server? There would be no storing or even collecting of any patient health information.
|
Every time I open my browser, I get tons of these bad header reports. What does this stem from?
|
I am familiar with single user mode on OSX. By holding down Command-S, you can boot into a terminal as root. Resetting the PRAM with Command-Option-P-R will disable any firmware protection that would otherwise prevent you from booting into single user mode. Basically, only full disk encryption can prevent an attacker f... |
I am trying to learn about format string bugs and I found the gcc option -Wformat-security to raise a warning when a potential format string bug is found. I would like to know if there is a way to evade this check and still have a format bug problem. For example:
#include <stdio.h>
#include <stdlib.h>
int main (int ar... |
My school uses the website WebAssign for online math and science homework. One of WebAssign's features is a "My Notes" section that allows you to input notes for a problem and come back to it later without actually submitting the answer.
The "My Notes" dialog has an <input> button to edit the text, and a <div> whose in... |
How long is the encryption/decryption key for an assymetric algorithm, such as AES? If I use AES 128-bit, how many characters should I type in for my key? What about AES 256-bit?
Edit: Here is why I am asking:
I am trying to use OpenSSL to encrypt some data using Node.js, PHP and command-line. I need to give in the key... |
Every return to libc buffer overflow attack I've seen uses the system function to execute commands. I have an executable with DEP enabled (I can't execute on the stack) and the system function isn't linked in (at least, I don't think it is. Running the executable with gdb and typing p system results in a No symbol "sys... |
In this bank site I read the following lines
Item #2 - You will also need to create a "Security Word". This allows you to verify that you have reached our Internet Banking site, and not some other site. Every time you attempt to log in to your accounts, we will send you a graphical representation of the Security Word ... |
So I've popped a shell on a primary domain controller (PDC) which has NT\SYSTEM permissions on the box.
I've created a local admin user account using the following commands:
net user myname myc0mpl3x password /add
net localgroup adminstrators myname /add
However I'd prefer to have Domain Administrator permissions as ... |
I am using randomly generated numbers as session variables to identify the sessions in a PHP application. To make further security proof what ways should I follow?
|
In the specification for TLS 1.2, it says the following:
If the client provided a "signature_algorithms" extension, then all
certificates provided by the server MUST be signed by a hash/signature
algorithm pair that appears in that extension.
However, when I tried the following command in OpenSSL (As a server) it runs... |
Money Toolkit is a smartphone app that can alert you to your balances and transactions across multiple accounts.
I was reading their site and whether their practises are as secure as they claim to be.
From their page at http://www.moneytoolkit.com/2010/09/secure-mobile-banking/, these paragraphs are of interest:
Only ... |
I want to create a new scheme for user identification, like X.509 certificates, but not X.509. Is it possible to use this new certificate over the existing Internet? and if yes, what are basic attributes that must be retained OR can be omitted?
|
Imagine that I am hashing the users' passwords with a random, long enough, salt, using key stretching, and a secure hash. Would it be more secure to finally encrypt the hash with a symmetric key?
|
The TrueCrypt website has some detailed information on how to backup (TrueCrypt non-system volumes) securely, summarised below:
Create a new TrueCrypt volume
Mount the main volume.
Copy all files from the mounted main volume directly to the mounted backup volume.
My question is: Why is this necessary? Why not simpl... |
So I'm trying to create and secure a mobile REST API on an existing server that runs our web app. We're not going to open the API to the public and we will be writing the client app using PhoneGap/Javascript/HTML. We could very well use HTTP Basic but I wanted something a little more advanced and secure. I do not want ... |
Friends of mine have previously had issues with VPS security.
The security was no fault of the operating system/services themselves, but mainly due to the "Control Panel" that gets forced upon you when purchasing a VPS.
I've seen flawless server setups fall to their knees because people have broken into the admin panel... |
From what I understand, a YubiKey stores a secret key which can be used to generate passwords to enter a server.
How does a YubiKey protect it's secret key?
If it is plugged into an infected computer, wouldn't the secret key be compromised?
Also, is it possible for a computer virus to "infect" a YubiKey?
|
If someone who knows about the BSD project has a moment to answer this, I'm wondering a few things about the encryption used. It's more than what I'm finding in the docs and on Wiki/Google (even the OpenBSD crypto page didn't seem to cover this):
1) Is disk encryption (TrueCrypt or whatever BSD is using, I know it var... |
I want to become a federal analyst of cyber crimes and I dont't know what's the right university course for me, I would like to know what's the cons and pros of choosing one or another course and why?
I would like to specialize in cyber attacks against organizations(servers,users,passwords) and so. Edit: Im also goin... |
I maintain a few webservers running ubuntu, apache, mysql, and python/django. I update all the libraries quarterly, but I'd like to update more often when a patch for a major vulnerability is released?
Is there any good service to sign up for email alerts?
|
Question from the Bouncy Castle development list:
At present we use the Windows certificate store as:
var store = new X509Store(StoreName.My, StoreLocation.LocalMachine);
store.Open(OpenFlags.OpenExistingOnly | OpenFlags.ReadOnly);
var certs = store.Certificates.Find(X509FindType.FindBySubjectName, subjectName,
true);... |
I currently have an XXS problem in this site.
https://bbcpanningen.cupweb6.nl:1311/servlet/OMSALogin?msgStatus="><script>alert("hello") </script>
But I don't understand how an attacker can exploit this.
The sites doesn't use cookies so that might be a problem.
I've read something about it, and they all said the at... |
We're learning nmap in my ethical hacking class. We got showed how we can use nmap to perform a zombie scan:
nmap -PN -sI zombieIP targetIP
and decoy scan:
nmap -p 135 -D decoyIP targetIP
I understand what they do, but the lecturer didn't go into details on how it works. I'm curious to understand, how exactly can nma... |
I'm interested in securing IP Multicast traffic for content that will be sent globally with several low bandwidth receivers.
I understand that simplified Broadcast encryption takes N public keys and encrypts a symmetric key N times. This is an O(N) operation, that needs to be refreshed any time the membership of N c... |
Are there any web application security standards that I can use as a baseline for the security related requirements for a web application, web service, and for applications supported/hosted by third parties?
How is security risk managed for web application and what are the preventive and corrective controls that I sho... |
Google, Yahoo, Facebook and several banks have a session summary screen that lists a variety of information, but they aren't consistent in what is offered to the end user. e.g.
Facebook offers a concise "active session" list, and enough information to determine if that session should be terminated.
Chase bank, for ex... |
In an extraction of com.facebook.katana/Database db files (fb.db and webview.db), I get:
fb.db
If I use an hexadecimal editor to open those files, even when there is no SQLite record named c_user, neither datr, nor lu, etc. at some offset of the file, there are these strings. Could they be the active Facebook session ... |
I know next to nothing about cryptography, and I'm basically just looking for someone to look over what I'm doing and tell me if I'm screwing up.
I have the user entering in some sensitive information and a password. I then use that password as a key for AES to encrypt the information and store the ciphertext. Later,... |
The scenario is that a client browser (eg: a user trying to log in to a bank website) needs to be able to view certain sensitive information that resides in a mainframe sitting in the Internal network via a web/application server that resides in the DMZ (The client should not be able to directly connect to the mainfram... |
I need to secure the communication between an application (runs on any PC and has been designed for Windows) and an external device (runs on UNIX). The application is running on Windows while the device is Unix-based. I can directly influence the application, but I cannot influence the device (I have to communicate wit... |
as you probably know the problem with SSL based DDoS attacks is, that the traffic cannot be analysed and filtered by a DDoS mitigation service provider such as Prolexic, Akamai, Radware, etc. without having the key to decrypt the traffic.
I recently spoke with on of the above mentioned companies employees (Lets say co... |
So as you may have heard, the Adobe user database with 130 million records was leaked recently. I want to find out what password I used for the Adobe account I created to make sure that I'm not using it anywhere else. But how do I decrypt the Triple DES ECB-mode encrypted password? Is there a way to do this without k... |
I'm suppose to have a large environment ( 500+ servers ) all Windows based joined to Active Directory domain.
Some domain accounts are used for application\middleware authentication that needs high privileges (domain admins).
I would like to secure such accounts as much as possible. The password is known to restricted ... |
There is a particular string (URL) that I need to send from my webserver to the browser. The browser will need to inspect the string and later send it back unmodified (aka request the resource that the URL is pointing to). If the browser could modify the string, it would be a security risk. So I need to make sure that ... |
In this interview with Bill Gates and Bill Clinton, they discuss their work with Digicel, who I assume is this company, to enable mobile banking with normal KYC protections.
This site is full of exploits for SMS phones, and so I can't conceive of it being secure enough to handle banking transactions... yet it seems to ... |
I use AES-128bit to encrypt files and I want to compute a HMAC for each one of the encrypted files to ensure their integrity.
Can I use directly the AES KEY to compute HMAC or should I used a derived form (eg. PBKDF2 sha256) ?
In other words I wonder if the HMAC can facilitate the recovery of the AES key or not...
Tha... |
I am looking at the authentication library Flexi_auth for CodeIgniter. To use the library you have to create a object one time in the controller before the lib is used
Like this:
`$this->auth = new stdClass;`
They then use the object to store information as a form of sessions management. They store log in data and... |
I'm toying around a distributed computing project. The client application asks for a problem to solve. The server returns a problem description from a "problems pool". When the client finishes, it sends back the solution.
I cannot trust my users, and so I cannot trust their solutions. I need somehow to validate the... |
Right now I am thinking for a way to create a secure video streaming server with the following assumption:
people can be trusted not to distribute the video they have rights to see.
(I think in the first edit of my question I was not able to articulate my thoughts. The thing that people are trusted is not a requireme... |
There seems to be similar encryption going into both. They both use asymmetric (RSA, elliptic curves, etc) for the initial key exchange, then go to some symmetric (AES, Blowfish, etc) protocol. I'm wondering if someone here might have a moment to explain the difference between the 2 and how they would appear differen... |
It is common for public APNs to use shared credentials - nearly all mobile networks in the UK use the same credentials across all phones (see here for an example).
In M2M applications such as intruder alarm signalling, remote plant monitoring and smart metering, it is common for private APNs to be used instead of the n... |
There has been some talk about the Lavabit's case. New info was published today, but not important.
I'd like to know how Lavabit worked. First I thought they just did something with OpenPGP. Then I realized that maybe it was not the case since the US goverment requested some kind of universal private key for all users... |
This is what I believe are the security implications of integrating Oauth using embedded webview vs browser in mobile application.
Embedded Webview
* Keep UI for mobile app
Security implications
* Makes phishing easy (especially since no address bar to show url and security)
Browser
* Different UI/Context switc... |
When doing a vulnerability assessment on a large network, it seems general practice to determine which hosts on the network are live.
This can be done in various ways. From what I have read it is good to do some ICMP scans, perhaps use a vulnerability scanner that has a discovery component, and perhaps do some TCP/UDP ... |
I have a directory service that can speak a number of protocols and is used for user authentication. Currently user credentials are stored using Bcrypt to protect them in case of a compromised database.
Unfortunately there are a number of services that I would like to point at this server that only support MS-CHAPv2 f... |
I tend to use Git for deploying production code to the web server. That usually means that somewhere a master Git repository is hosted somewhere accessible over ssh, and the production server serves that cloned repository, while restricting access to .git/ and .gitignore. When I need to update it, I simply pull to the ... |
I am developing an application that runs on Windows PCs. The application is able to connect to some kind of devices within a LAN. It can create multiple TCP-connections to the device it is connected to. I want to secure every single TCP-connection with TLS/SSL.
The naive solution for this would be to use TLS/SSL for ev... |
Security and usability are often colliding. When it comes to locking screens on workstations after a certain amount of inactivity this is definitely the case and complaints have to be expected from end users.
As far as my experience goes, locking the screen on a workstation after 10-15 minutes is considered best practi... |
How can I prevent someone from scanning my Windows box using Nmap? I used Comodo as my firewall but someone still can scan my box using Nmap and get some info like open services and OS detection.
|
In a scenario where you have a Wireless network provisioned as untrusted behind a firewall, using VPNs to reach the trusted Datacenter. Does anyone have an reason why this should/not be expanded to include the wired edge ports - essentially bringing the firewall around the datacenter and making the LAN untrusted. It wo... |
While building my website I put together a security class which includes two functions, one takes input and returns it as a string passed through htmlentities function of PHP. The other strips out common XSS tags etc, until now I've been using both in conjunction when outputting user inputted data to the browser Just t... |
Sorry if this question is absolutely stupid or irrelevant, but I can't help but ask.
I am just curious about different approaches hackers take in social engineering attacks, and clever examples of each one of the approaches that one can take. And what kind of defenses and strategies that companies might employ in order... |
Thycotic has a Password Reset Server that allows the user to select from several images.
What general guidance is there for an image-based password reset challenge question?
Examples may include
How many images should be offered?
How many should be selected as part of the reset process?
What types of images should be ... |
Eve has just discovered and decrypted the file that associates each userid
with its 32-bit random salt value, and she has also discovered and decrypted the password file, which contains the salted-and-hashed passwords for the
100 people in her building. If she has a dictionary of 500,000 words and she is
confident all ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.