instruction
stringlengths
24
29.9k
I've run metasploit against my web-server and it found several opened ports that I didn't know. Please note that I have a firewall and IPSec configured but they were disabled just for testing purposes (servers should be secure even if firewalls are bypassed). Here's the list of open ports: It's a Windows 2008 R2 with...
What's the difference between Digital certificate's signature and fingerprint (thumbprint) ? I know that Signature: The actual signature to verify that it came from the issuer. and Thumbprint (fingerprint) : The hash itself, used as an abbreviated form of the public key certificate. But what's exactly inside both of it...
I've been contemplating the fundamental issue of stack overflows, from the classic shell code injection that doesn't work with NX bit to the newer ROP gadgetry. The first question I had was in regards to CPUs that have branch registers. It seems as though doing any of these sorts of attacks on a CPU that tracks bran...
If you have a website that need to store user's credentials for other sites, how do you store those credentials securely? An example is Mint.com where you give them your username/password for your bank accounts. Based on this quora answer, Mint.com uses a combination of software and specialized hardware which doesn't s...
My city has online billing for utilities. When you set up an account they email your user name and password to you. You can't change your password without them emailing it to you again. Isn't this insecure? Doesn't that mean my user name and password is being sent in the clear and someone can log on to my account?
My sister recently went on a sales call and when she told them what company she worked for they were upset. They told her that the company she works for is stealing their customers by intercepting and forwarding their phone calls. Sure enough when my sister dialed their number it was going to her company! I have loo...
I installed Firefox using a download site, rather than the correct site. After running and installing Firefox I noticed my Chrome had an addon called Swift Browser added to it by a third party. After thinking about what I downloaded recently, Firefox came to mind and when I checked the link again I realized my mistake....
Intuitively, running a non-exit Tor node should bring the benefit of plausible deniability that a packet originated from your device. Unlike exit nodes however, you would not have to worry about illegal content requested in the clear by your computer. So it seems that running a non-exit node would have only benefits (n...
Ok, many of you now the scenario: you login to developer.sayLinkedIn.com, create an app with credentials and define the domain in witch that key is allowed to "run". The question is, from a api provider perspective if possible: HOW do you make a key useless on domains other than the one you please. I have api available...
I was just wondering what would be the best way to stop a VPS from being attacked, bandwidth would be a problem in this case so methods that reduce the amount of incoming attacks and stop sending outgoing data would be great. I've been looking for some open source linux projects that can auto detect on an assumption of...
I've come across the following website hxxp://politie.nl.id169787298-7128265115.e2418.com/ [Possible malware] Whenever I open it in Firefox it prevents me from closing it, I can't even close the browser without using the task manager. The site asks for money for an unlock and I can imagine some people could fall for i...
Our institution requires disc encryption on laptops, but I'm uneasy about using full disc encryption without SECDED ECC DRAM. Is it safe to use full disc encryption on laptops with unreliable memory?
I use LastPass and love it. My girlfriend creates her own long, complex, unique, and thus difficult to remember passwords for every site. She frequently forgets them and has to rest the password. The passwords are "organized" on various post-it notes and scraps of paper in her notebook. LastPass is too complex for h...
If you are installing Joomla via cPanel's File Manager to your mywebsite.com (user mywebsite) account, you will upload the package to your server and extract the archive. All files will have the user and group according to your account mywebsite:mywebsite. You will have to change around three dozen directories and file...
In addition to achieving PFS with DHE, we want as little as possible to be revealed when the server's private key is revealed. So, what is RSA used for in DHE_RSA cipher suites? What does the server sign during the key exchange?
How its possible to detect authenticity Of Client and Server Certificate. For example, If server A has certificate and someone C stolen its certificate and send it to B then How we decide that it's send by A or some one else ? Same question for client certificate authenticity. I know that the private key is belongs to...
How can I detect if NAT is used in network or not? I know if you have a private address and you are able to connect to a public network or the Internet, then there must be NAT. But how can I detect that NAT is used in an internal network (which is not connected to Internet but uses NAT) or not? Is there any way that we...
What is Open Resolver Project and how does it give a solution for DNS reflection attack? I also read that Open Resolver Project follows BCP38. What is BCP38?
It has been reported in the media and some security conscious mailing lists that some IPMI-enabled servers, implementations and brands suffer serious security issues. When you go to a dedicated server provider to rent a preconfigured unmanaged server that has IPMI (whether or not it is enabled for your use), what are t...
Suggestions on easy distribution/installation of self signed certificates & roots to mobile devices I am a developer at a government agency in a developing country that has a web application with a number of web-forms for data entry through which customers can submit "electronic forms" to the agency. For legal purpose...
Couldn't an updated server/computer be completely sealed against attacks? Why can't you block any incoming request for running something in your server? For example, in my naiv view, a mail server could be getting emails (text files) sending emails, but never allowing anything entering the server to execute anything....
I am trying to understand the network behavior of bots. Are there any identifiable characteristics of callback requests from the bot to the C&C server which differentiates it from normal traffic? I have learnt of situations where there is a regular callback at a particular time of day,etc. Are there any documented reso...
we are maintaining our DNS account to GODaddy DNS Provider for our servers, Right now we have an problem, If some one have to register domain or sub-domain from any of other dns provider or godaddy dns provider it allow's to activated and those domains are pointing directly to our servers easily, how to avoid these kin...
I would like to have a physical key to decrypt Linux machines at boot. This is just an idea and I would like to know if there are already projects or established methods to achieve this. Let me explain better. I would like to have an usb device full of random data no partition, then make this thumb read only. First of...
I am developing bussines application based on php and mysql on ubuntu 12.04 lts server. I have closed all ports except :80 and php code can be executed only by security login and not using cookies but session. What other vulnerability can server have and what security precaution i need to take for hight security???
Assuming there is a LUKS volume that uses a keyfile and the keyfile is autogenerated before opening the volume and deleted after use, does changing the keyfile prevent it from being stolen from the RAM in this scenario? Creating the LUKS volume using a keyfile: Create a keyfile using an OTP algorithm, like HOTP with a...
I own a private business and a web site with a domain name hosted with Godaddy US. I live in Europe. I want to know if the various ISP of my customers in my country can find out who visited my web site (by seeing which user IP visited my website's IP). My web site has an SSL certificate, HTTPS, therefore static IP. My ...
It's frequently stated that EMV cards cannot be cloned. I'd like to know, specially with commodity smart card readers/ writers, why is this true? What specific data cannot be read using commodity hardware, and what type of hardware would be required to do so?
I've recently (over the last 15 minutes) had quite a few hits from the same IP, it's in a country on our blacklist so they just up up on our "Access Denied" page, but I was just interested in what benefit a would be bot/attacker could gain from this. All that seems to change is the referer, Has anyone seen similar beha...
I'm having issues traversing a proxy protected network and was wondering if there are meterpreter implementations which allow proxy awareness (automatically using windows AD credentials) or which can use DNS tunneling?
When accessing https://internetbanking.caixa.gov.br (site of a well known bank in Brazil), the server returns a certificate signed by "Autoridade Certificadora Raiz Brasileira" (Brazilian Root Certification Authority). This certificate is not in Window's list of trusted certificates before the access, but it appears th...
It is possible for a server to parse HTTP POST and GET data with a fixed encoding or one that is dynamic with the client's response. Consider the situation where a client uses UTF7,32 or any other encoding other than UTF8. The server is then hard coded to only use UTF8 when reading the data. Question What types of se...
It's my understanding that everyone on the same Wifi protocol has full access to each other host that it is connected to. Is there any Wifi technology that allows for partitioning and isolation of each individual client... at Layer 2? Ideally this will work even when everyone knows what the shared secret is. I'm thinki...
If I don't have SECDED ECC DRAM, is it possible or realistic that a bit could flip around sshd, and grant a lucky lurker access to my system without requiring a valid password?
IPsec is a security mechanism that provides peer-entity authentication, data-origin authentication, data integrity, and optionally data confidentiality. It relies on extensions to the standard IP header layout and an additional protocol. The security services that IPSec can provide are: Authorization–access control; Co...
I understand DDoS is a DoS assault from multiple sources, where a coordinated stream of requests is launched against a target. How is DRDoS different?
I am making a choice between StartSSL and positiveSSL($4.99/yr). I want to know the difference between them. As I know, SSL is used to encrypted the connection between client and server so that data transferred(cookie) will not be under 'man-in-the-middle' attack. Doing some searches on StartSSL, I found a website said...
I am doing a token based authentication but facing some security problems. In the system, a user will login as follows: Type username and password to login in a https login page If the login is succeeded, the server will be set a 'authentication cookie'. Otherwise, go to login page again The 'authentication cookie' in...
Here is what I tried: tshark -r test.pcap -T fields -e ip.proto > output.csv But this can only show all the protocols in the csv files. I want to show only the top level of protocol numbers such as 6(TCP), 17(UDP), 1(ICMP) etc. Any idea please. Your help would be highly appreciated.
I'm in the process of setting up a bunch of servers at the other end of the world (well, 8 hours travel time) in a co-location place. The servers and firewall all have a remote management port (KVM, DRAC, you name it). I'm wondering what is the best practice how to access & secure that. Obviously I could just put all t...
I need a brief explanation about the differences between antiviruses and firewalls
I'm fairly new to encryption, and I am investigating the different kind of encryptions. I want to encrypt passwords in a secure way. I discussed this with my colleague, and he said that BCrypt is the best encryption for our project. We have a PHP server, Android client, and iOS client as our setup. I am using a jBCryp...
I have come across a website, freshbooks.com, which uses base64 encoded urls for all purposes, ranging from POSTing sensitive data to a URI or just viewing some resource. For instance, a url to view an invoice on the website is (some part of url omitted for clarity): something.fresbooks.com/dmlld0ludm9pY2VGQjU1Mzc2 ...
Assume a requirement for creating a custom application for Android or iOS smartphones, which will send and receive data (documents, e-mails, etc.) to/from a corporate server, perhaps after local editing via standard applications (e.g., Word or Powerpoint). The data will have to reside at the smartphone for certain amou...
My System has the rootkit Rootkit.Sirefef.Gen. I would like to know how I can remove this rootkit.
I am storing the passwords of my college website in our own server. I am storing the passwords using the MD5 encryptor. But the doubt I got is since the decrypter is there I can also decrypt the passwords and use them. So how these passwords are secured with me.
How should I go about selecting a code auditing company?
I have read some papers about steganography using perfect linear codes. The aim is sending more hidden message bits with changing less cover message bits. For example using the parity check matrix of [7,4,3] Hamming code, we can embed 3 bits of message in 7 bits by changing at most one of them. It looks great. However...
Count this question as part of my ignorance on how authentication scheme is done on your typical VPN session. But here goes: We often advise the security-conscious user that if one must use an unsecured public wifi connection (say, at an airport, internet cafe, restaurant, etc), then always connect to a private VPN. ...
I have two web services A and B the requests between those services is http. I want so establish a secure connection between service A and service B to ensure the authorized and authenticate request from the source and insure data was not tampered. My Application running on PHP "service B -the data store (the server)-"...
If I uncheck the "use default gateway on remote network" to be able to browse local shares and the internet at the same time, does that void encryption?
What is the most efficient way of protecting small online business from outside threats. Everything too much expensive is not a solution. I've been looking for good web application firewall and at the same time not expensive, since the business is using applications, but other than WAF, I need hardware security.
Many VoIP handsets support client-side SSL authentication for auto-provisioning. Unfortunately, some devices must be programmed with their client-side keys. (Keys generated on low-entropy devices are poor, but lets not argue that detail). For this question, we have three players: The device (a phone) The server (some...
As Matthew Green puts it, "the NSA has been ... Working with hardware ... vendors to weaken encryption and random number generators." At this stage, however, there is little public knowledge of which specific hardware products have been compromised by such efforts, and in which ways. That makes it difficult to know how...
Veracode (http://www.veracode.com/) has certain parameter encoding libraries that it trusts. Others are labeled as flaws. If I'm satisfied with another method of parameter encoding that is meant to stop XSS, can I tell Veracode to stop listing uses of it as a flaw? If so, how?
Can my Website history be tracked by my work IT team if I am using my own home network with my work tablet?
I know that access control is a very important think when we want to protect our files and in security in general. Does anyone know what access control system is used by linux? In addition I just found the Bell-LaPadula model, which I find very interesting as a model, as it has top-secret flags etc. Does anyone know if...
FastMail.fm hosts my personal email account. Now they claim to have reliable backup services, but I'd like to have my own copy of my email archives. What I'd like to do is back up to my VPS, which has a very good internet connection and is always online, unlike my laptop. Some problems with this approach: The credenti...
I was working on my localhost in my computer but I was connected to internet. Recently I downloaded a few music files and since then advertisements are getting popping into my browser through which I downloaded the songs. Advertisements are being shown even if I open a webpage in the localhost. Is there any security th...
I am running a properly configured pf_config ( at least, sort of properly configured ) and have wiped my hard drive clean 3 times with a fresh install of OSX Maverick. I find it odd that my laptop is attempting to connect to any outside without me doing anything. This scenario brings me to the root of my question. How...
I am self training on using encryption. I am a php developer and in my spare time I am building an online app that provides basic cms features to help me understand encryption design more. I am using encryption to protect the data if stolen and having it accessible to public like what happened to adobe. My restrictions...
Similar to bots posting spam posts and blogs is it possible that bots with legible registered accounts go around the site flagging or downvoting everything on the site. If yes, what can I do to prevent this? For example, I understand there are numerous ways to try and prevent machine generate activities like CAPTCHAs,...
I'd like to encrypt e-mail messages so that multiple physically separated keys are needed to decrypt them. For example, I'd like to have three private keys stored on different media, as in: key A on a harddrive, key B on thumbdrive 1, and key C on thumbdrive 2. I'd like to have the messages encrypted successively to ...
Whats the difference between Anti-malware and antispyware ?
I am wondering what others do in regards to setting up their enterprise scheduled vulnerability scan policies. For example do you prefer to create a single scan policy and scan all networks regardless of the hosts platforms (windows, linux, SQL Server, Oracle, Apache, IIS, etc.) or do you end up creating multiple scan ...
I would like to know practical difference between TAP and TUN mode when use with OpenVPN. When to use TAP and When to use TUN ? What types of traffic will pass with both mode ?
Dear SMTP and TCP/IP network security gurus: I'm curious about what is the realistic risk of sensitive information (such as a email pdf attachment) being intercepted/read by a hostile party from a regular unsecured SMTP mail message AFTER the mail is transmitted from a US-based outbound SMTP mail host to an outside rel...
I know how to use rainbow tables. I've already read the other questions this topic here. Well but there is still one question left. As an attacker, I usually have a hash value of a password and everything I read says that you have to start at the end of a chain and then apply the reduction function, the hash function a...
I'm working on a project where each each user will have a public/private RSA key-pair. Users will be able to send encrypted messages to each other using the each target user's public key so that only target users can read the message (similar to PHP's openssl_seal). Since we want the user to be able to use any device t...
I noticed while hanging in Microsoft Network Monitor that my computer is sending ICMP echo request to an arbitrary IP address 202.39.253.11. I looked for the owner of this IP and I found it is owned by some Chinese or Taiwanese communication business called HINET. They seem to have a website at this address, although ...
I was reading an article on .desktop files used to spread malware on Gnome and KDE. I just thought that the same could be applied to Windows. On Windows: Malware is disguised as a picture by changing icon. >> Funny pic User opens it. Copies itself to a place without UAC (Admin) like My Documents. Replaces a shortcut l...
Wherever I looked I only saw the description of NAT traversal for ESP protocol (for example: http://pic.dhe.ibm.com/infocenter/iseries/v6r1m0/index.jsp?topic=/rzaja/rzajaudpencap.htm) It's looks that encapsulation of AH will work the same way (as for ESP) in transport mode, and in tunnel mode another new IP (+UDP) head...
I have a Buffalo Linkstation Pro 2 Duo for home use. It has a web GUI for browsing the contents of the NAS (distinct from the admin interface). The idea is that you would expose the web GUI to the outside world and you could share files on the public internet. Internally the NAS is using some kind of LAMP flavor, I thi...
I used the Tumblr app on my smartphone to access some adult Tumblr feeds while on my home network. I also used my phone's internet browser to view some adult content. While all this is completely legal, the Tumblr feed and websites definitely would run afoul of any company's Acceptable Usage Policy. Later, I went to wo...
I usually use Debian-derivative distributions such as Ubuntu server. Most of them come pre-configured to use sudo rather than su and to prevent access to the root account at all possible. With this in mind, should root have a shell in /etc/passwd? If I cannot login as root, does it make sense to give root a real shell?...
Someone with the same name as my sister seems to have inadvertently created a Facebook account with her email address. The funny thing is that this person doesn't seem to have ever accessed my sister's Gmail account. My sister tipped me off that emails from Facebook were appearing in her inbox. I took a look, and saw t...
I developed a REST API whose clients are mobile apps/websites under my control (API is not open to anyone). Users log into my mobile app/website with their Facebook or g+ login. I'd like to secure the API so that either: (a) users can access it only after successfully logging into fb/g+ via my app/website or (b) on...
Should the router only store a hash of my encryption key or is it stored as plaintext? I believe (but not certain) that the WPA key is itself an encryption key, buy shouldn't that be encrypted like any other login credentials? I realize I have larger concerns if someone can interface with my router to get to wherever t...
I have a 192 bit data string and a 384 bit signature calculated with curve ANSIp192r1 as well as the public key. These readings originate from a SYM2 electricity meter and I would like to independently validate the authenticity. What is the best way to verify the message using the public key?
Is a DOS attack possible when uploading a big file. Lets say a website has a file upload control, and there is an attempt to upload a file of 1 GB size. If the connection remains open for a long time, does it mean that system resources are being consumed? Is it possible to upload a lot of big files that way? or does t...
I don't understand the flow of Digital Certificate with Email Encryption and Signing. For Example, There is 2 users, Sender A and Receiver B. Is Certificate required to encryption to A or just private key is enough? How B decrypt email ? With the certificate of Sender ?
What is the difference between bridge and routing firewall ? How they both works and what are the security advantages/disadvantages for both scenario ?
I have searched and searched but cannot locate an answer to my question so I am hoping the experts here can. When I read about symmetric encryption like AES I see mention of the key and key size such as 256 bit keys. When I code in PHP and use AES I provide a secret or paraphrase. Is the secret that I provide the key? ...
I have an Asp.net site. Which hosting system do I need to secure it adequately* against anyone reading private information that's on the server? This is assuming I'm not worried about the sysadmins getting it. Note: Even if no one gets control of the site - the problem remains of reading the information. Note 2: I am ...
The KeePass security help page talks about preventing dictionary attacks To generate the final 256-bit key that is used for the block cipher, KeePass first hashes the user's password using SHA-256, encrypts the result N times using the Advanced Encryption Standard (AES) algorithm (called key transformation rounds from...
When I do a google search, there's a lot of stuff in the URL for the results page: https://www.google.com/search?q=why+is+this+here&source=lnms&sa=X&ei=8G6gUtGnJIOh0QXt-4HYDg&ved=0CAgQ_AUoAA&biw=1239&bih=806&dpr=1#q=security https://www.google.com/search ?q=why+is+this+here &source=lnms &sa=X &ei=8G6gUtGnJIOh0QXt-4HYD...
Is there a way to put a self destroy password on ubuntu disk ecncryption ? Or self destroy after n bad password attempt ? When someone ask you to entre the password, you can enter the "self destruct" password who blank the disk... not a bad idea ;-) Best regards.
This is a follow up from this answer. The answer is very good, and it put me to thinking and doing some research. I have found another good explanation on this site. At some point, the author says: If the set of plaintexts is [0123456789]{6} (we want a rainbow table of all numeric passwords of length 6), and the hashi...
We are hosting an SaaS website and API with the https protocol, both of which are accessed by numerous users with a lot of different browsers and client-side apps. What would happen if I made PFS mandatory in my IIS Web Server's configuration? Could there be problems with incompatible clients which do not know how to h...
Can I read-write mount both a regular TrueCrypt volume AND a hidden volume inside the regular volume at the same time? The general idea would be to use the outer volume for non-sensitive stuff and the inner hidden volume for sensitive stuff.
Does anyone know of browser Plugins that make Composing, sending, and reading email basically effortless? Mailvelope doesn't seem to be working with the floating compose boxes in Gmail currently. In addition, a feature I didn't see in Maivelope was a lookup against public key stores for the email and favoring Encrypt...
From a data integrity standpoint, if I persist the following code into my database: <script> alert('hi'); </script> should I sanitize it before persistence, for instance making < into &lt and then on retrieval doing the decode? Or is it safer to only sanitize on retrieval, for instance in a UI?
Perhaps I'm being overly paranoid, but after reading recent news regarding network security I'm starting to believe that SSL isn't quite enough anymore for sensitive data transmissions. Ref: http://www.wired.com/threatlevel/2013/12/bgp-hijacking-belarus-iceland/ http://www.cloudshield.com/blog/advanced-malware/how-to-...
When connecting to a unknown public hotspot, I know that the data transmitted can be captured and, if unencrypted, easily analyzed. But that's not the question here. I want to know whether the information saved on the computers (company computers running Windows 7 - 8 or some Linux installations, some smartphones, Andr...
Do these rules appear to be an adequate start? _interface="en1" _linode="66.228.57.75" #lish-atlanta.linode.com _ssh=" { 74.207.224.182 66.175.210.225 } " set block-policy drop set skip on lo0 set state-policy if-bound set loginterface $_interface set require-order yes scrub out scrub in antispoof quick for { ...
I'm working on a RESTful API to work with my AngularJS application. Authenticating works by generating an ASP.NET FormsAuthenticationTicket. It is stored in a cookie using FormsAuthentication.Encrypt. This approach could result in the authentication cookie being stolen, however that problem is out of scope for this que...
Let's say I have a really simple mobile app with a server API. For example some kind of Q&A app, where users answer questions to win some points ('Who wants to be a Millionaire' kind of game). Users can download new questions from a server's API. Next, the users can upload new questions they made up to contribute to a ...
Is it a good idea to hash(SHA-512/whirlpool) some simple memorable string and use it for passphrase(for LUKS/TrueCrypt container), instead of using just a string like t4k#La93Fs(5w5) as a passphrase?
Although this is closely related to the recently closed question Evil maids in the server room [closed], I believe that it's more answerable. I'd like to unlock LUKS volumes on remotely hosted servers, using initramfs with BusyBox, and Dropbear as SSH server. In the answer to the closed question cited above, paj28 note...
Most of the sites will empty the password field when you fail the CAPTCHA, and often they reset all the fields as well. Is there any security benefit on doing this?