instruction stringlengths 24 29.9k |
|---|
I've been reading a lot of online articles and blogs about advantages of using HTTPS (HTTP over SSL/TLS) and the performance issues involved in deploying a website over HTTPS. What I understood is that the performance overhead in using HTTP over SSL/TLS is because of the use Asymmetric Cryptography in the Protocol and ... |
I'm reading this and I'm little confused. What exactly is this setuid based script root spoofing?
|
I am a newbie in this field. I am confused with why SSL certificates cannot be free of charge. In my understanding the certificate is just a text file consisting of cryptic numbers installed on a server. What do the SSL certificates cost?
|
I am currently developing a game which will be run in a client, they will sign up for this game online and create their account there, their information will be stored into a MySQL database. I am creating the game using Lua + Love2D, upon launch of the game the user will be presented with a login and password field. Th... |
First of all, this question is not the same as is it possible to test out remote host by using nmap?, because on that question, the questioner is asking for something impossible due to NAT's nature.
My question has the same goal, but going a little further. If I know that a host has the port 12345 opened for some reaso... |
PPTP is the only VPN protocol supported by some devices (for example, the Asus RT-AC66U WiFi router). If PPTP is configured to only use the most secure options, does its use present any security vulnerabilities?
The most secure configuration of PPTP is to exclusively use:
MPPE-128 encryption (which uses RC4 encryption... |
Our office network bandwidth gets choked when an employee copies a large file into her DropBox, since it gets downloaded on several machines (of other employees).
LAN Sync is an option, but needs to be configured on each machine. So is the bandwidth settings.
Is there a way I can control via Firewall settings (iptable... |
I have an unlocked but not rooted Android device (Nexus 7 2013 WiFi "flo", legitimately unlocked using fastboot oem unlock from an x86 computer). Neither adb root nor adb shell followed by su let me gain root or write to /system/xbin/su. Installing F-Droid's Superuser app didn't help to gain an initial root (see http... |
I accidentally used my work's wifi to look at porn using my iPhone.
I refreshed a tab I had open from a session when I wasn't at work. Now I'm worried my firm will find out.
The network is password protected, but I didn't have to enter a username.
My phone's name at the time was set to my own name (i have since chang... |
I read that encrypted emails are secure, cause only who has your public key can decrypt it.
I also read that it's a common thing to upload your public key on a keyserver.
But if my encrypted email is intercepted, the spy just needs to go on the keyserver to get my public key to be able to decrypt it. Is this right ?
|
Edit:
Rephrased title to hopefully get some interest on what I would have thought was a common issue ?
I am developing a website using php/mySQL to store non-commercial data and it will be clearly labelled as not for sensitive information. The site is to be hosted on a shared internet server.
As i am using a shared se... |
I am trying to get shared key between Firefox extension and a java program running in same machine. I am communicating both application via socket.
My assumption is that malware is running in machine which can read any files in machine and also read any port communication. This means i cannot use SSL to secure the com... |
I need to use HMAC on a certain message to guarantee integrity, but I cannot figure out what are the requirements for the key to be given as input to the hashing algorithm.
In particular I have to do this in Java and, as I want to use HMAC with SHA256, I need to have a key of at least 32bytes, according to the HMAC RF... |
We have detected a new virus that was sent to us by mail.
The email contained a zip file which contains an executable with the same name.
As a first step, we uploaded the file to virustotal, to be able to know if it was defined by any antivirus company. So far only 4 companies detected it:
(Antivirus : Name ):ESET-NO... |
For the purpose of setting in place the appropriate means of securing data,
and to secure this process, I'm asking me the questions:
What are the tools to associate to a document a categorization label
(for example: TOP SECRET)?
Does a tool which prohibit label removal exists?
For example,
one method some may imagine... |
I'm having an issue with some of my clients being unable to open email attachments when I sign the messages. The error they get is something like (free translation):
Error: cannot open. The digital signature could not be validated.
Checking the sent message with gpg produces the following:
gpg: Good signature from "... |
I have noticed during some assesments when doing a TCP port scan, Nmap will report almost every port as open for a machine.
Using for example nmap -sS -PN -T4 target -p0-65535, over 20,000 ports will be returned as open. On further investigation, most of these ports are not open or even filtered.
What is causing Nmap t... |
I'm in search of a free/libre software that is able to handle OPAL (2.0)-compliant SEDs (i.e. manage the setting of Pre-Boot Authentification (PBA) environment, encryption keys...).
It could be a utility that runs as a live image (thus OS-independant), or a client software that would work on GNU/Linux distributions. It... |
I am trying to further understand the scope of my environment.
I have a group of category 2x devices that are used to manage a category 1b device through a category 2a device.
I understand my group of 2x devices are required to comply with the controls 1.4, 2, 5 and 6.1
Does this group require the same physical securit... |
1, My existing configuration environment are as follows: (1), Server_side, Redhat5.5 Enterprise with samba4.0.0 installed, Ip Address: 5.5.5.149; domain name: EXAMPLE.COM; (2), Client_side: windows Server 2003, Ip address: 5.5.5.45, host name: SMB1; I've followed http://wiki.samba.org/index.php/Samba_AD_DC_HOWTO config... |
I have read in the past (no sure where) that unfortunately there exist illegal devices that permit crooks to eavesdrop on GSM mobile phone conversations. I recently also heard that some people had created a spoofed cell phone tower for GSM. My question is, if I switch over to using a CDMA phone, would I be any safer? I... |
I use Ubuntu 13.10. I tried to used OpenDNS to restrict some websites. Unfortunately, I couldn't do that. I use AirStream 1200 USB modem to access WiMax internet. OpenDNS setting didn't work for me at all. Any alternatives to OpenDNS or any methods to secure my web browsing. I want solution that can't be easily hacked.... |
Browsers store web pages in a local cache on the client's machine. How does a hostile Java applet exploit this information to gain more privileges than it is entitled to?
My understanding is that a Java applet can run either in sandbox mode or privileged mode. Only certified applets can run in privileged mode and uncer... |
I need to generate thousands (possibly millions) of unique codes for a client. These codes may have a monetary value, so it's vital that they are TRULY random, and that no pattern could be spotted and exploited by a clever hacker.
I've looked at various solutions for generating the code (cyclically generated = could be... |
So this was bouncing off our webmail server for the last couple days, I took it home today to look it through. Any ideas as to what is does/is/attempting to do? I have been looking through and would appreciate another set of eyes on it.
#!/usr/bin/perl
system("kill -9 `ps ax |grep /usr/sbin/apache/asterisks |grep -... |
Do disassemblers detect the use of C/C++ standard functions and specify them in the output code, adding the #include line to the appropriate header file (such as stdio.h or even windows.h)?
If not, does the whole big library is being recognized as the developer's own business-logic code, and written fully? Aren't the s... |
I suspect somebody has installed a spyware in my android smartphone. I have done factory reset, which is supposed to uninstall all apps in SD card and internal memory. I am curious about following.
Is it possible to store an android apk in SIM card (not SD card) and install it from there ? If yes, does a factory reset ... |
On the ArchWiki, it is suggested, as a security measure, to run skype as a different user. My question is: would this make sense for the browser? I use firefox with NoScript and AdBlock, but also need to have Java and Acrobat Reader plugins, so... would the suggested approach be of some use?
|
Throughout the past 2 years; I have received email messages (about 6 or 7 cumulative) in which I responded to about 3. Which were personalized messages from a series of 3 email addresses. Nothing offensive is written within them; just weird within one or two sentences regarding my business or an off the wall job reques... |
I have a web app, and customers who are concerned about the security of the app. I want to be able to give my potential customers (manufacturing companies with 2k-10k employees) confidence that our app is secure.
One thing I'm considering is subscribing to Qualys security scanning. I'm hoping that the knowledge that ... |
I was thinking about password security this morning. Mainly, about the recent adobe hack releasing thousands of passwords.
The current problem with existing passwords is that you have three options:
Use the same password on every sites
Use a few passwords for different sites (bank accounts, game websites/accounts, ema... |
I have a home-made web application and thought that an easy way to secure it's administration interface would be to simply reject all IPs that arent from 192.168... Is this viable? is it possible for someone to spoof LAN IPs on the Internet?
And if it's possible, wouldn't it be standard to add an iptables rule to rejec... |
I found this reference to bypass canaries: http://sota.gen.nz/hawkes_openbsd.pdf
It recommends to brute force the canary byte-for-byte. I don't understand how this works: "Technique is to brute force each byte of the canary individually along with time analysis". How can you do time analysis on a byte-for-byte basis? I... |
Now most of big website like Google mail, Twitter, Facebook have a feature that assesses password strength (check number of digit, alphabet, special characters, or check the similarity over already hacked passwords) for a guest while he is in a registration, but where should the assessment be processed at client side o... |
i found a session cookie that contains user status with two parameters NO for standard users when altering this to YES you become a Premium user and you can download content restricted to premium users? the problem there is no contact address to send him a message?
any idea ?
|
I realized that these applications are frequently used together. What is the role of each software in the mission of anonymity and privacy on the web?
While I understand Vidalia is a GUI provider, I couldn't figure out why Tor needs Privoxy. Isn't it such a proxy provider by itself?
|
I was thinking about usernames and passwords and I was wondering how secure it would be to instead of the server having a list of usernames and accompanying hash of the passwords, just have a list of the password and username concatenated and then hashed, or something along those lines.
If someone could explain why thi... |
Adobe announced they had been hacked and millions of user accounts and passwords compromised.
These sites allow a search on email address to see if it was compromised:
https://lastpass.com/adobe/
http://adobe.breach.il.ly/
This site contains the Top 100 passwords used:
http://stricture-group.com/files/adobe-top100.tx... |
I'm doing some relatively amateur C# development for a small customer support team and working with the SalesForce API in my application. With SalesForce, login using the API requires you attach a Security Token to the password. Because my users are finicky, it's going to be necessary for (only) the Security Token to b... |
It appears that whenever you set up a new mail account on Mac Mail on OS X (or iPhone, iPad etc), that as soon as you enter the server and the mail account user name and password, Mac Apple-Mail tries to connect to the mail server. However this connection occurs before you can set the SSL option. This happens twice, o... |
Coin is a new device aimed at replacing up to 8 credit cards in your wallet with a single device.
It apparently works by scanning the credit card data into a mobile application that syncs with the Coin device itself over Bluetooth. The scanner works like a credit card skimmer from my understanding of it.
What are the s... |
When a company wants to buy a new application, the security aspects must be reviewed (access rights, privileges, logs, data integrity ... etc).
Is there a standard for applications security reviews? In other words, a checklist that must be followed to check that the security features of a certain application are accept... |
I am using an Android phone. Is it possible for spyware to transmit data even when I don't have any internet plan/connection? Can it use some other way, say, cellular network etc.?
EDIT1:
SMS and calls in my mobile are chargeable, so if any spying software uses these ways to send call recordings or surrounding recordin... |
I own samsung galaxy y, an android. I suspect my roommate has installed spyware in my phone. Is it possible to install spyware in password protected android phone ?
|
In different token, for example SAML, I have encountered I have seen that it includes the timestamp for when it was created. I understand the reason for a expiration timestamp, but before the token is created it doesnt exist so I dont understand the reason for it.
Ideas.
It gives possibility for the receiver to specif... |
I noticed that some special folders of my ex-HDD have been deleted. 'Personal' is one of them.
Is there any virus that does that?
|
There was another good question here on why you should block outgoing traffic: Why block outgoing network traffic with a firewall?
But I was hoping to get an answer on why it is a good idea to block incoming ports or ports in general.
In particular I was thinking what difference there is between managing which applicat... |
I would like to implement OSSEC as HIDS on my server, but by default OSSIC monitors a number of folders. I am going to deploy a web application on my server. So what should be my default OSSEC configuration for web application security i.e. folders,logs to monitor for intrusion detection?
|
According to the IT managers, this problem is neither at the server nor at the client but is suspected to be somewhere inbetween e.g. some DNS server that has been infected. Do you recognize this situation: A user browses the web to a homepage and gets spam links at webpages that don't actually send these links, and it... |
I am currently working on a Web App on my dedicated server (LAMP) and it seems like it might be infected with some strange malware/virus of some kind.
When I access some domains on that server (every 5 or 10 mins) it will redirect me to something like this.
https://i.stack.imgur.com/hkupO.jpg
The stranger this is that ... |
I am just wondering what is the main difference between the Yahalom and Needham-Schroeder key exchange protocols? Which protocol uses less computational power?
|
Is there any way to create private and public keys with one command?
The classic way is two commands
$openssl genrsa -out privkey.pem 2048
and after that
$openssl rsa -in privkey.pem –pubout –out pubkey.pem
I tried with | (pipe) but no.
|
I have a Kingston hyperx drive circa 2012. I kicked off a secure erase on it. I then remounted the drive and was horrified (well, not really more like bemused) to see my whole parts of my old file system still intact. This correlates with the well known findings of a UCSD lab that SE is not implemented well in most SSD... |
I'm trying to find some good material on this topic for a paper I'm trying to write for class. Any and all help is very much appreciated.
|
I'm supposed to set ALLOWED_HOSTS in my Django project's configuration to the hostnames that belong to me to
... prevent an attacker from poisoning caches and password reset emails with links to malicious hosts by submitting requests with a fake HTTP Host header, which is possible even under many seemingly-safe webse... |
I want to hide my computer IP dan hostname when I am online on the same LAN on which other computers running netcut and other network tools. I have installed netcut defender but it seems not to hide my identity.
Is it possible to hide my identity?
|
I am making a web-based application and I disabled some of the HTTP methods which are not necessary for the website (specifically, OPTIONS, HEAD and TRACE).
I put this in the httpd.conf of my xampp to test whether this works:
RewriteEngine On
RewriteCond %{REQUEST_METHOD} !^(GET|POST|PUT)
RewriteRule .* - [R=405,L]
Ho... |
Ok, so i need to know can Selenium webdriver tool be used for testing xss vulnerabilities and exploits. If its possible, then pleasee provide me with some example or tutorial. Apologizes, if am wrong to ask this question.
|
I tried making a purchase from http://www.laptop-batteries.ca/ but on the very last step the page reloaded with an error. A representative contacted me asking why I didn't complete the order and I said the webpage had an error and he said
use Credit card must pass 3d certification
and provided me with a link to do so... |
Edit: seems like I was quite hasty when typing in my question at first, so here is an updated version of it.
I am developing an application that runs on PCs which are on the same LAN as other devices. I want to connect to these devices. Since the data communicated between the PC and the devices is sensitive, I want to ... |
On all our boxes we have ssh access via keys. All keys are password protected. At this moment the sudo mode is not passwordless. Because the number of VMs are growing in our setup, we investigate the usage of Ansible.
Ansible itself says in the docs:
Use of passwordless sudo makes things easier to automate, but it’s ... |
I'm wondering if is it possible that the same VISA debit card numbers could ever be issued to different people by different banks or companies?
|
We recently received this from a security audit:
PHP is a general purpose scripting language that can be embedded into HTML. A vulnerability exists in PHP versions prior to 5.3.12 and 5.4.2 due to improper parsing of query string parameters when configured with a CGI-based setup (e.g., Apache's mod_cgid). Processed qu... |
I just tried using an IKE daemon and EC certificates. I used the secp256k1 curve for key generation. The daemon claims
signature scheme ECDSA-256 not supported by private key
Now I am wondering if that is due to incompatibilities in the IKE daemon or cryptographic incompatibilities. In other words, is it generally im... |
My college is expanding the Information Technology department to include Networking and Security as well as the CISCO Security. In my research online I have found different information for each everywhere I have looked. What I am wondering is: in a nutshell what is the difference (beyond one being CISCO focused, I get ... |
In a home office environment with cable internet, can a hardware firewall be placed in front of/upstream from a cable modem to also protect the modem from tampering by the isp or a hacker?
|
I was reading http://www.symantec.com/verisign/digital-id and http://technet.microsoft.com/en-us/library/dd351044(v=exchg.150).aspx. The articles are treating ssl cert and 'digital id' as if they are two different concepts. I was under the impression that they were the same thing, just different names.
Are there any d... |
Is it possible to protect Windows like Linux?
I mean, I have Ubuntu installed on my laptop and when some program wants to install something etc. the pop up shows up and I need to type the password.
So, if I click on some file in my mail client in Windows and it looks like an image or rar file, but it is a Cryptolocker ... |
After enabling system log on my Asus DSL-N10E router, I've got this message:
DoS: Tcp SYN With Data Attack source=217.74.166.73
What does it mean? Is it a real danger on my network security? And how can I protect my network from these attacks?
|
What are some best practices for managing and deploying web app passwords and private keys? E.g. the password to access a database or external services like the Facebook API. I'm referring generally to using dedicated hardware or a general cloud provider and not any specific provider like Heroku or EC2.
Is the best you... |
My client physically makes online purchases (through various websites) on his customer's behalf using their credit cards. His clients have basically said "here's my credit card, buy what you need to." Currently, I'm assuming he has his customer's credit card details locally stored in a file on his computer.
He would li... |
A coworker asked me why I thought encrypting internal AD Bind communication was important. I said because I follow a standard security practice, but couldn't actually articulate how an attacker would grab the credentials over the wire. Would an attacker have to own a piece of our networking equipment or is there an e... |
I'm considering doing some research in to an attack vector which I think doesn't get enough attention. It's not an earth-shaking vector but I think I can demonstrate an attack where none have been in the past.
But once I've done this, and I have (say) some demo code and a ten-page PDF, what would I do? How would I get ... |
As the title states, why does MySQLi use question marks instead of sprintf() formatting? For example, why is it
$stmt = $mysqli->prepare("SELECT * FROM table WHERE column1 = ?");
$stmt->bind_param('s', $var);
instead of
$stmt = $mysqli->prepare("SELECT * FROM table WHERE column1 = %s", $var);
Were there some compli... |
I do have a problem, how do I remove a persistent MBR malware? probably the malware hides itself in HDD sector that an OS couldn't even access. Already tried to format it and remove clean all partitions. And also tried to change OS type from windows to linux. Got infected from an office PC. Symtoms are whenever I'm onl... |
Since OpenID officially furnishes email address to sites (with the user's permission) as a convenience rather than an attestation, is there any OpenID identity provider who'll allow you to authenticate to THEM for an unlimited number of sites with one email address, but upon registration with a new site, allow you to e... |
How safe is it to give sensitive information to someone over a phone line? Does it matter if the data was verbally spoken or if it was typed in?
Example: Opening an account with an internet provider and they ask for your SSN and/or credit card number.
|
Looking at all the people who question the viability of DNSSEC, it's no wonder that the adoption rates are so poor.
However, what about DNSCurve? It supposedly fixes all the DNS security and privacy problems independent of DNSSEC, doesn't suffer from the problems that are specific and unique to DNSSEC, and, should one... |
Burp suggests that there is a reflection.. It changes a value of a cookie named as x as x=<script src=abc.js> and in response this value gets injected to a javascript function..
<script type="text/javascript">
fnUseX('arg1','<script src=abc.js>');
</script>
I tried a few scripts and looks like characters such as / and... |
If the HTTPS webserver uses self signed certificate, the web browser
warns the user as follow.
http://www.sslshopper.com/assets/images/iis7/iis7-self-signed-certificate-8-certificate-not-trusted.png
I am curious how can browser tell if the certificate is self signed or not(in detail).
is there any technically detailed ... |
Are there any other ways of verifying the web server you're visiting is actually the correct one?
For example, if a domain name's DNS was hypothetically hijacked, and users were directed to a phishing site that took it's place; then they would be none the wiser.
I know SSL does this already. But are there any ways that... |
So there is an E-mail client. I can encrypt its database with a few clicks in its menu. But it's storing the opened attachments unencrypted in /tmp/foo/bla.xls. The bla.xls has 644 UNIX permission (since user's umask is 0022) and the /tmp/foo/ directory has permission of 750. The owner:group is the user that uses the d... |
I am owning an Android smartphone. I learnt that factory reset may not remove spyware as it might have corrupted the image being installed by factory reset. Is there a foolproof method which ensures there is no spyware left on the device?
|
I'm looking for a list of ports sorted according to the number of vulnerability you can find for that specific port (considering of course, the service installed in the default port).
Example: suppose that in this years we had 800 vuln in port 80 (30 apache, 30 iis, 20 nginx) than in this list we can have:
80 800
... |
We're setting up S/MIME so that we can send encrypted emails. However, I have a bit of a stupid (and maybe obvious) question...
If someone steals a password for either the sender or the receiver, wouldn't they be able to view those sent or received emails? If not, what's preventing them from doing so?
|
I recently came across a cool site for testing .NET code (http://dotnetfiddle.net/). In the FAQs they mention that they have two restrictions for security purposes:
No access to File System IO
No external internet access
Is this sufficient to prevent malicious users from exploiting the site? Is there anything that ... |
SAP Netweaver has its passwords hashed and also salted. But I read that a tool such as John the Ripper can bruteforce them.
So how does security varies when passwords are hashed, in particular in the sap system?
what if I have a password such is this... a12345 ?
Is it easy to bruteforce it, even though it is , lets say... |
I have a question about ssh tunneling.
Is it possible for the ISP to realize the destination server which I want to connect it via ssh tunneling? I mean the destination website which I want to visit it.
|
When using the Tor browser bundle, you load the check.torproject.org on start. It tells you when there is a security update to downloads, and let's you click a link to get it.
The way for users to know it's a legit site is to 'check for the hang lock'. It's there and green, and the certificate info is correct, so the ... |
We run a software as a service application that is used by medium to large companies. One part of our application is a messaging service that integrates into the customers own infrastructure.
At the moment, we manually generate a private/public key and hand these off to the customer to use for authenticating the reques... |
I'm reading about Extended Validation (EV) certificates and have a few questions. From what I understand, EV allows domain owners to pay extra for a especially trusted certificate (that the browser will honor with special display properties) and it requires CAs to do extra steps to verify that the issued certificates ... |
Every now and then a known website is hacked, such as what happened to Adobe or Cupid Media.
In such incidents user data is leaked, including usernames, encrypted (and sometimes plain text!) passwords. Users who reuse their password might have their accounts in other web applications compromised as well.
The company I ... |
If I'm using PBKDF2 to stretch a password into a suitable key for use in encryption with AES, should I be using a random salt (for PBKDF2, not the AES IV)?
|
I am using backtrack right now but i also wish to switch to kali linux if its more interactive. Because i am just a beginner pen tester. I tried with both bt4 and bt5, but novice in kali linux.
|
Github faced a brute force password-guessing attack recently that involved "nearly 40K unique IP addresses".
Passwords were also "stored properly" using bcrypt, (salt + hashed).
Given that bcrypt generates a random salt per password and that the Github database wasn't compromised, how was a "remote" brute force attack ... |
From a 2012 Smashing Magazine article quite a bold statement is made to avoid AES in MySQL itself. Or as they put it "Why Should You Avoid AES In MySQL?". However, if you search for SQL encryption, you often find the AES_ENCRYPT from (My)SQL mentioned. I am not saying that many search results mean the statement is untr... |
I wanted to see how many combinations of websites and browsers are still vulnerable to a tls stripping attack (like, by implementing HSTS or disabling cleartext HTTP altogether). To do it I wanted to see it firsthand by using the sslstrip tool, but I was unable to get it working (by following the instructions on the pr... |
I notice that in /usr/share/wordlists in Kali Linux (former Backtrack) there are some lists. Are they used to bruteforce something? Is there specific list for specific kind of attacks?
|
Does a corrupted pdf still become a virus if the binary for a virus still exists but the pdf structure is corrupted?
|
I am concerned that a SHA-1 PRNG cannot produce an AES-256 cipher key with the expected 256 bits of security, or indeed any secure cipher key where over 165 bits of security are expected.
The SHA-1 PRNG is the only pure-java secure random number generator provided by Java without third-party libraries. (I am fully awar... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.