instruction stringlengths 24 29.9k |
|---|
Here, several servers in the same DNS domain emit cookies under a variety of settings (scope, HTTPS, Secure) and another host emits a cookie with the same value.
Example
Suppose a user has the following cookie set at secure.example.com:
authCookie = SomeSessionToken (Scope example.com, Secure, HTTPOnly)
Then the use... |
Flash has a long history of ignoring MIME types of files and reading the file directly for executable content or for cross domain execution permissions. That means a malicious user can take advantage of this to create XSS flaws on the same domain as my other secured services.
Since I will not be serving flash from my ... |
Chrome Frame is an add in that integrates with IE and Firefox. Firefox has a similar component, and I hear that the .NET runtime finds its way into all the other browsers.
Additional integration points include:
Protocol Handlers (firefoxurl, cf)
Plugins like Chrome Frame
This integration greatly widens my surface ar... |
What is worth keeping in mind (security-wise) when choosing a set of hardware?
For example, might a cheap (or obscure) setup like a Raspberry Pi make for a less secure server than a more standard machine? Or does the security of a server depend entirely on the software it's running? (Please ignore physical security asp... |
DPAPI can be used to encrypt the secret data. We intend to use it in our web app to encrypt some data and store the encrypted data in database. When needed we decrypt the data and present them on UI(web page). It works well if we hosted the web app on a single web server. But the problem appears when we migrate it to a... |
How should I protect domain joined hosts in the same AD domain from the Related Domain Cookie Attack?
Suppose there is an AD forest called example.com. This company has a variety of internal and external web applications:
store.example.com (customer facing)
partnerPortal.example.com (internal/partner facing)
payroll.... |
I want to secure communication between simple C# WPF client and Java server. Now i have already implemented raw sockets communication, and my security is based on:
server send RSA public key to client ->
<- client send back encrypted with RSA public key, AES key for future communication.
but i'm not assured that someon... |
I am developing my site using server side sessions using redis as backend for saving the session.
Now the issue which is bothering me is of user leaving the website without logging out.
I mean user simply closes the browser which causes the cookie to be deleted.
Now session of that user still exists on the server an... |
Is there some kind of automated scanning tool which detects threats in Open Source Java Libraries?
I think the OWASP Orizon project tried to build such a tool, but it seems to be inactive for years now.
My goal is to find a metric which could act as a guide for the decision "is it safe to use library X in my project"..... |
As continuing research in Secure Software Development, I found the OWASP Top 10 project list Technical Impact such as:
https://www.owasp.org/index.php/Top_10_2010-A1
Similarly, CAPEC list impact in terms of CIA:
http://capec.mitre.org/data/definitions/66.html
For further details on technical impacts of various threat... |
The answer to this question about how cookies are potentially vulnerable between sub-domains sparked my curiosity.
As far as I know, if a cookie is set on a sub-path of the same domain (www.example.com/dogs), then it is not accessible to any other path, unless it's a sub-folder of the path. i.e. neither www.example.com... |
The essence of the problem as follows:
There is a server located on the side of our company.
There is a hardware client module, which is in a public place, which communicates with the server via a secure protocol.
The client module contains the key with which it is authenticated by the server.
We need to make sure ... |
A botnet is a collection of compromised computers, each of which is
known as a 'bot', connected to the Internet. When a computer is
compromised by an attacker, there is often code within the malware
that commands it to become part of a botnet. The "botmaster" or "bot
herder" controls these compromised computer... |
I am performing a code audit of an older VB6 application which uses dynamically constructed SQL to execute against the database. While I see this as a SQL injection point, the developer contends that since all the values are in drop-down boxes pulled from the database & there is no user input for these items, there is ... |
This question was originally asked on stackoverflow
I hope that here in this Security forum I find more people because hopefully some people are using the esapi stuff?
I have a little JavaEE project, and I have to secure it with the OWASP ESAPI
I integrated the ESAPI like this in Maven:
<!-- ESAPI Version 2.0.1 -->
... |
I am confused by this variety, perhaps outlined here. I am trying to understand the conventions.
Trend A: strength?
$2^8$, $2^7$ -- seems clear but why algo with 192 or 40? Referring to same issue? And it is?
Trend B: background?
aes? desx, des but with x? Is there some mother-algo? Major names: aes, des and rc, why?
T... |
I've researched this stuff a lot in the recent months but I can't grasp any solid basis on how they achieve running unsafe scripts in so many languages without a problem!
I'm sure they are running virtual machines since language specific sandboxes won't cut it, but what about white listing every language?
There has to ... |
I have a monthly newsletter. In my subscribe form I use a double opt-in method:
The visitor subscribes.
I send him a confirmation email.
If I receive a reply, I add him/her to my system.
In the event I do not receive a reply, how long can I store his/her email address? Are there any legal requirements related to tha... |
New server setup and the server admin decided phpinfo was too scary. I guess the fear is that a hacker could somehow get phpinfo() to run from injected php and find out all the extensions that are installed, their versions, etc. But, as a developer, it's nice to know all the extensions and their versions, etc. Is phpi... |
In this question, I want to identify browsers, servers, or implementations that are immune from related domain cookie attacks (e.g. a.example.com vs b.example.com).
Lacking any tangible solution, could this mitigated by software that tracks and verifies each cookie's "type" and persists that.
Update:
The answer is t... |
I was really interested in getting into performing exploits to install my own code on devices, instead of waiting for others. I figure its a great way for me to learn about security on devices like phones. Sadly there is nothing online about this. I hear about it, but no tutorials. Any advice on where to go to learn th... |
My FTP was hacked, a file has been uploaded and the host suspended the website temporarily. I'm only using an admin page that points to an .xml file (to load and modify the text of my website). I don't have any databases.
I'm going to add a htaccess/htpasswd, but will it be enough?
How can I protect my FTP so I don't ... |
I am a complete beginner in the security topic and I know that I should read this, but I have a small question to which I hope exists a short answer.
Let's say I have three components of a web-application 'talking' to each other:
a front-end;
a database;
a storage component.
Each of the components resides on a physic... |
What are the most relevant security events/incidents any company should monitor using event management tools? Related to servers, antivirus, networks, etc.
|
I was reading another post on destroying IDE drives, and how you could remove data, wipe it, or just destroy the drive. The removed data would still be there in some state, although not easily reachable without software. Wiped data is just removed data, but it has been overwritten and is essentially gone. A destroyed d... |
Is there any logging available that logs mysql connection attempts to the port, login attempts, and times succeeded with username, IP address and date time?
Im trying to detect brute force attempts.
Is there a way to setup a mysql automatic brute force delay?
|
I have one WiFi connection in my house which I use for my iPad, phone and computers.
I want to block adult sites, time consuming sites for every device that use the WiFi connection.
So I came across OpenDNS. BUT I'm worried because I use the connection for my banking actions, SSH, Adsense account etc.
Losing any of th... |
For the keynote at The Next HOPE a couple of years ago, Dan Kaminsky unveiled Interpolique (the talk is really fun btw). The problem he raised was how to defend against injection attacks, including SQL injection, cross-site scripting (XSS), and other injection vulnerabilities. For example, Unicode makes escaping char... |
As the title says, I'm wondering if there are any security/privacy benefits to managing cookies - that is, managing by deleting cookies you don't want or need.
I deleted all my cookies about a week ago and since then I've left a tab open in Chrome with the list of cookies. (chrome://settings/cookies) A few times a da... |
Is there any reasonable way to secure data on virtual hardware? What I mean by "virtual hardware" is the various hosted systems that one can rent from various online hosters, that run on top of XEN, KVM, VMWare ESXi and so on.
With actual dedicated hardware one can somewhat safely assume that the system itself has not ... |
When viewing some emails in Microsoft Outlook, if the sender has included images, I get the following option appear at the top of the email:
"To help protect your privacy, Outlook prevented automatic download of
some pictures in this message"
I am unsure how preventing the download of images in an email will prote... |
I'm pretty new to security, so forgive my basic question, but does SSL encrypt POST requests but not GET requests?
For instance, if I have two requests
GET:
www.mycoolsite.com/index?id=1&type=xyz
POST
site: www.mycoolsite.com/index
{
Params: id=1&type=xyz
}
Is it safe to assume that someone is able to intercept the who... |
I have a web service and an application that connects to it.
I do not expose the web service via any discovery protocol to the outside world.
I have two security mechanisms:
My software uses SSL and encrypts all messages using a public/private key mechansim.
I use WCF WIF integration username/password authentication, ... |
I want to store SSH keys (used to connect to some devices that have sensitive data) and the encryption/decryption keys of a database application. They will be inside a LPAR (logical partition) in our mainframe.
I'm worried about security: does the fact that LPAR resides in the same machine (same hardware) as other virt... |
Is it safe to install malware in virtual machines? I would like to investigate malware, but I don't want to infect my own computer.
Can I install the malware in a VMWare VM, maybe even without network access, without risking the integrity of my host system?
|
I am writing an application for smartphones to provide very limited SSH usage. The user cannot perform arbitrary actions when logged in. They can run a specific script(s) only.
For various reasons it is not possible to implement passwordless login so the password must be provided from the smartphone for login. However... |
An untrained end user who uses a mobile web browser is vulnerable to phishing and can't easily verify the the authenticity (or security) of a website among other issues. Also, it is very easy to prevent even a knowledgeable user from detecting MITM by hiding the HTTPS icon, replacing it with a favicon, or many other t... |
I was wondering which is the best way to secure/encrypt data in the hard disk on a laptop that runs Ubuntu Oneiric? Setting LVM encryption?
I am mostly concerned about having my laptop lost or what ever, and I do have some sensitive information on the laptop I usually carry with me. I am not worried about backing up th... |
Some in our infrastructure group want to upgrade to start taking advantage of the new features in RHEL 6. In the past, I have relied on the NSA Guide to secure RHEL 5 and CentOS 5 installations. I find this guide invaluable.
Does anyone out there have experience with securing RHEL / CentOS 6 in a similar way? If so, wh... |
I'm curious if there is a way to execute XSS via email.
I am not talking about using e-mail as a way to deliver a link that has reflected XSS in it.
I'm talking about sending an email from example.com and having javascript in that e-mail that executes as if it is executing on http://example.com (i.e. gets passed the br... |
I remember reading on this site a user recommending 10minutemail.com as a way to register or give email address to non-trusted websites.
Is there any similar site for disposable phone number for receiving a sms online?
I am trying to protect my phone number, while be able to still access websites without disclosing suc... |
I am becoming less and less ok with Google and Facebook collecting data on me based on my online activities and then selling that to companies. Is there a good email service out there that respects privacy and doesn't mine data about you?
|
I have been looking into various research on identity, PKI and access control trying to boil it down to a simplified methodology for IAM (Identity & Access Management).
One thing which pops up in lots of places is capability-based access control, as in: your current permissions are encoded in a ticket or certificate fo... |
Possible Duplicate:
What is the difference between a penetration test and a vulnerability assessment?
I am tasked with hiring a consultant to do an analysis of our infrastructure security for a one-time projected based contract. I would like to know if there is a known term for this type of work that I should be us... |
So I'm a little confused how X.509 certificate policy mappings work. So let's say the following depicts my cert chain:
root CA ---> intermediary CA ---> client cert
Would the root CA have a policy mapping? If so how could there be a subjectDomainPolicy? If the subjectDomainPolicy is supposed to match the parent cer... |
I asked another question about certificate policy mappings. This is a different issue. This is about Certificate Policies.
To quote from the X.509 RFC:
In an end entity certificate, these policy information terms indicate
the policy under which the certificate has been issued and the
purposes for which the c... |
The X.509 spec makes frequent statements like this:
(b) If certificate i is self-issued and it is not the final
certificate in the path, skip this step for certificate i.
How can you have a cert that is self-issued and not be the final cert in the path? Is the issuer and the subject are the same how are you... |
I got a link to http://61.19.247.192/~naowit/dustin.html, which was masked as a youtube.com link via email. Now I'm not willing to visit it because I know it's probably got some type of malware on it, or at the very least a scam/phishing attempt.
But... I'm always curious when I get these links. I want to visit them t... |
I fairly often happen across forums spammed with messages such as:
Arugula (Eruca sativa) is an quarterly green, pretended or roquette.
It's been Traditional times, overclever 20 flat has be useful to
"foodie" movement.Before impediment 1990s, thrill was norm harvested
foreign wild. Colour has naturalized reacti... |
Recently my php-based website got infected with malware (probably by a stolen ftp password).
Basically, every 30 minutes a file frame_cleaner_php.php was uploaded, a HTTP-GET was done on it to execute it and it was removed. I was able to intercept a copy of the file and analyze it.
It was not obfuscated in any way and ... |
Provided that the hacker knows the WiFi password if any (WEP or WPA), is he capable of sniffing network data of other hosts connected to the same access point?
|
I would like to ask for recommendations regarding the following issue:
As a company with a number of customers worldwide we supply our product to many different sites. We need to shape our policy regarding self-signed CAs and the certificates for our products.
Is it common to supply self-signed CAs to customers and all... |
I'm setting up a new CentOS 6 server and am looking into some security audit tools to validate my configuration and to point out weak spots in the server.
There are a lot of non up2date tools out there on source forge no longer updated
Which Linux (distro) is recommended for auditing and guidance in terms of security ... |
Why did secureserver.net (GoDaddy) access my Gmail account?
One day later... Gmail reports suspicious activity... really?
So... Why did secureserver.net (GoDaddy) access my Gmail account?
|
I'm currently trying to find my personal best solution for storing passwords and other sensible data. Recently I've used 1Password on iPhone and Mac but I'm not really satisfied with its predefined structure and storage scheme.
So I've decided to give a simple plain text file another chance... ideally a Wiki like edito... |
Before I ask for some advice, please don't assume I'm a script kiddie or such. This is for one of my wireless security class (CSS 1015).
It's a Saturday class and only 6 students are in the class since it starts at 8:30 AM until 10 AM. Next week we are doing a lab where we bring in switches and routers and set up AP i... |
I am a developer, and I am trying to get an insight into what could I do to enable my application to withstand a DNS amplification kind of attacks. Would such prevention methods help against DOS type attacks as well? What are the industry best-practices, guidelines for detection, prevention, weathering of such attacks.... |
I am trying to re-write a closed-source application, originally deployed on mobile devices, that lets you command and control a certain type of mechanical robots via bluetooth.
The new application I am writing should be able to control the same robots as the first one does.
How can I intercept the commands -sent via bl... |
TLS-OBC is an RFC proposal that increases SSL/TLS security by using certificates on both ends of the TLS connection. What's special here is that the client is permitted to dynamically create a local, self signed certificate.
It can also protect users from the "Related Domain Cookie Attack", more info here
Are there an... |
I know, I know, cleartext passwords are terrible and you should always store a hash!
However, I'm interested in all of the issues with storing cleartext passwords so I can make a reasonably secure choice. Are there any issues other than the obvious two??
Many people reuse their passwords and you're putting them at ris... |
Today I had to type the same password to connect to a WPA2-secured WiFi network several times, and got really annoyed with the length of the password. Especially since it is just a phrase repeated twice.
So, when using WPA2 with a WiFi router, is it always more secure to use longer passwords?
|
What security features and qualifications should we look for in an online backup provider for an Internet-exposed web server storing sensitive data?
In the backups themselves - encryption type, transport method, data center qualifications?
In the client software that runs on our server- What do we look for to determin... |
I am studying about OTPs (One Time Passwords). I have gone through all the methods: HOTP (HMAC-based One Time Password), TOTP (Time-based One Time Password)
I have no issues with HOTP. But according to RFC6238 in section 4.2, TOTP is defined as
TOTP = HOTP(K, T) where T = (Current Unix time - T0) ÷ X.
I have studied th... |
Let me throw out this problem I'm having to some of my technical peeps and see if you guys have any new suggestions:
We have a website that sends text messages and voice mails for our clients. Clients can buy credits and use those credits when sending SMS and voice calls.
We have this Nigerian scammer who has decided ... |
I have been creating selection boxes for years, yet I never knew you could modified it with firebug and submit them with nonpermitted values, of course this wouldn't happened if the code was secured.
Here is an example:
<select name="type">
<option value="1">Business</option>
I can open up firebug (firefox addon), and... |
Even since growing up, I've watched films in which the "bad guy" is repeatedly tracked down when they call the police or FBI or police force de jour. They always have "about 30 seconds". Regardless of whether those specific realizations are accurate or not, I've never understood what is going on technically when a ph... |
I have the following use case - There are two networks - internal network where the application server is deployed and has no internet access and external network that is accessible from internet but it cannot access the internal network. So the access looks something like this:
internet <---> external network <---- in... |
DuckDuckGo is a search engine that claims it will not share your results with others. Many of my skeptical coworkers think it may be a scam.
Is there any proof that any web search engine will protect your privacy as it advertises?
|
When attempting to sell a product online (for instance, on craigslist) there is a very good chance you will be the target of a social engineer; this is especially true when you are selling high-value commodities like cars or jewelry. Given the anonymous nature of the internet, it can often be hard to distinguish betwee... |
An ETAG is a HTTP header that is sent-behind-the-scenes between a web browser and an web server. This value is intended to control how long a particular file is cached on the client side.
There is an interesting side effect to this technology; ETAGs are saved on a machine even if cookies are deleted. Some people / so... |
Black-box penetration testing is one to check a web application for vulnerabilities. It can find some vulnerabilities, but not all.
What fraction of vulnerabilities does black-box pentesting find, on average? Is anyone aware of any data or evidence on this?
|
It is known that security vulnerabilities are common on the web: many web sites are vulnerable. Is there any data on what fraction of web sites are vulnerable, and what fraction are secure?
|
I am builduing a business to business website, and users are able to sign up with a personal profile and create a business (like linkedin).
I need to verify the following:
Business Name
Representative First & Last Name
Address
Phone Number
Other business sites such as Groupon (wikihow article) verify identity by cont... |
Earlier I asked a question on how to authenticate business identities, now I am wondering on the other side (the user side).
There is also How do I choose whether to trust a particular website?
How can one create trust with a user when you are a new site, and are requesting for some personal information like address, ... |
How could I know whether the eCommerce site I use uses SET (Secure Electronic Transaction). I know SET is a standard. But I see only an SSL connection
|
I am creating a web application that basically reads/writes/updates information from and to a database on a server. I am knowledgeable in computer programming, but while seeking security standards, I can't find how to determine what standards to look into. What approach should I take in determining some basic security ... |
I have a bunch of Linux machines that I wish to administer over the Internet. I currently use SSH keys, but have been advised to use 2-factor authentication. SSH Keys are something you know. Is an IP address something you have? (Yes, IP can be spoofed, but so can biometrics and so can atm cards).
Could I lock down SSH... |
I'm studying the TLS-OBC extension and would like to know if it improves security of non Web-based protocols?
Specifically, would it be of any benefit to SSH clients? (version 1 or version 2.x/secsh)
I'm just trying to understand the scope of applicability of this technology
|
I was pondering about this, sometimes people ask me to erase data on their drive. So I use a shredding program, which takes a long time. However what if instead of shredding all the files, I'd just use truecrypt to encrypt them. The disk would be useless then no? Would the data still be recoverable for someone without ... |
I have read the TCP Connection Establishment on Wikipedia
In brief the packets to start are
SYN, with a (hopefully) random sequence number A from the client.
SYN-ACK, responding, with A+1 and (hopefully) random sequence number B from the server.
ACK, responding with B+1.
Theoretically, a client cannot open a connecti... |
I am experiencing confusion regarding one-time pads. I have read that a one-time pad generates a key that has the same length as the plaintext. This is considered to be an overhead in sharing such a large key. So how could a pseudo-random key eliminate this overhead?
I have read of communication parties sharing a shor... |
OCSP stapling decreases the load on a PKI infrastructure's OCSP server by attaching a signed OCSP response to the target in a TLS connection. In addition it creates a more secure/private session since the CA doesn't know that your browser is accessing a given site. Some people have compared this behavior to Kerberos.... |
I was previously using OpenDNS on my internal network. I found out today that Comcast has switched over to DNSSec: Comcast DNSSec.
I've done a little research on DNSSec and its benefits. I understand the basics of DNSSec. Pretty much DNSSec signs your DNS request so you won't have man-in-the middle situation happen ... |
I know this is tin-foil hat fodder, but at least one judicial opinion referenced a bug that could track/listen in on the subject "whether the phone
was powered on or off," although that may have been a judge misinterpreting the technobabble spouted at him, or an FBI agent overhyping their tech to the judge.
It seems ... |
I was reading this post on Slashdot which talks about the process of gathering evidence from a computer as part of an investigation. The post mentions being able to see the history of devices connected to a computer when doing forensics work, as well as which files were transferred to which devices:
But as we dig deep... |
It was suggested over at stackoverflow that I try my question here. This is it verbatim:
So, it's impossible to do AJAX requests securely without using SSL. I get it. You can either view-source the data that's being sent via Javascript, or you can directly access the PHP page by spoofing headers, yada yada.
But let's s... |
What are the best tools to anonymize my port scanners and vulnerability assessment tools (like nmap , metasploit ) ...?
I have been using Backtrack and tor network with proxychains to do this, but tor has limits and I would like to know what other tools are there to do this. I want to run my tools and be hidden as pos... |
I was reading "A taxonomy of Coding Errors" and I have a doubt regarding the point mentioned in C/C++ >> API Abuse >> Often Misused: Authentication(getlogin).
I fail to understand the attack vector mentioned there. To quote a statement -
The getlogin() function is supposed to return a string containing the name of the... |
One of my clients is looking at allowing their employees to access Twitter and Facebook from work. I have highlighted the need for training, and I have material to present, but what do you think should be covered?
disclosing customer data
disclosing internal operations/employees
social phishing
malicious link awarenes... |
I have to back up some data from windows 7 machines over the internet, and I rarely use windows so am distrustful of it in general. Specifically:
Is there any sort of check that the server is the same as it was last time, so you have some assurance you are not being MITM attacked, before giving authentication informa... |
I am interested what features VMWare uses to protect passwords inside the virtual machine.
|
I found an unknown MAC address connected to my home router. How would I figure out what OS the IP or MAC address is running?
|
Thanks for taking your time to look into this question.
Background
I have my website hosted in a dedicated server in the cloud. The server is a Windows 2008 R2 machine. To publish I FTP files to the server. For general maintenance, I remotely connect into the servers using a RDP over SSL (My password is strong!). I al... |
To authorize user I'm sending salted hash over the air. My question it is more secure to obtain randomly generated salt (but send unencrypted), or have one salt on client (desktop application) and server?
|
Some folks have advocated that security should be integrated into computer science coursework, throughout the curriculum. Suppose we are going to add one lecture on security, to a first course on programming. (Keep in mind that it is a very basic introductory course, so advanced topics are not appropriate.) What are... |
I've heard that many DoS attacks and general "black hat hacking" attempts occur over the Tor network. Is it possible for me to dynamically block source Is by their presence in a botnet or similar list?
How effective would this in thwarting DDoS or black hat/covert activities?
How would I implement such a solution? (... |
Everybody seems to have their own meaning of the word "hacker". To some, it's the good-guy vigilante with some non-professional characteristics.
To others, it's the aggressor, bad-guy, cracker, or black hat that exploits for personal gain (money, pride, or other motivations)
Question:
What are different meanings of ... |
I am doing a penetration test, and i would like to know if i can decrypt passwords stored in LDAP. i tried some sites decrypt MD5 , they give me error message tells that the input is not MD5.
Could you please help
thanks
This is an example
userPassword: {MD5}KdScezWFVZxY7rHb5C4X1w==
|
I need to harden a windows 7 PC running in a kiosk type device.
Basically the hardware on the PC only needs to make outbount HTTP requests and communicate with some peripherals over USB(COM ports).
Can someone provide an easy way to accomplish this quickly and effectively or point me to some resources with a complete l... |
If we suppose that it is found that P=NP, how will security measures need to be changed?
I'd like to know the major security measures that are affected, and how they would need to be changed. We can suppose that passwords can be hacked in time O(n^4), for the sake of argument.
As an example of what I'm partly looking ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.