instruction stringlengths 24 29.9k |
|---|
I'm using the example given in msdn article about the DSACryptoServiceProvider Class. The problem is that I get a different signature each time I run the code. I tried OpenSSL and didn't get this problem but I need to work with System.Security.Cryptography this time.
This is some source code:
this is the hashed value ... |
Several known vulnerabilities affect BIOS (Reference URLs below). So my question is, are the Vulnerability Management tools (such as Nessus, NeXpose, Qualys, etc) technically capable of highlighting BIOS and driver-level vulnerabilities? Is this something that can be detected for example via an authenticated Windows sc... |
I have multiple snort sensors in my network and i would like to handle the rules of each one remotely.
Is there any software that do that ?
thanks in advance
|
I'm a federally employed senior executive assistant with a user-knowledge in computer programs and software. I'm trying to change my career and am looking for my employer to pay for my training. I'm interested in cybersecurity; it appears to be challenging and fascinating too. My employer is requiring me to submit a re... |
I know that the RC4 cipher when used with SSL is vulnerable to certain attacks, which in the worst case scenario could result in authentication tokens being stolen. But RC4 is also recommended as a cipher to mitigate the BEAST attack.
Is it a better strategic decision, to disable RC4 and perhaps be vulnerable to BEAST,... |
Does it still make sense to scan using a source port with Nmap when doing host or service discovery?
This would have made sense back in the day, but with statefull firewalls being prevalent, where source port scanning would not help, does it make sense to do source port scanning as part of a penetration test to help in... |
I discovered that someone had gained access via FileZilla server software to my Windows 2012 Server. It seems like they had created extra accounts and were trying brute force attempts to get in nearly constantly.
At any rate, any PHP pages running on any of my sites on this server have had an iframe with a link to a m... |
Are there any websites that collectively track one computer based on its IP address alone? Browser extensions such as Ad block plus, Do Not Track Plus and Ghostery modify the client side script but is it not conceivable that a server would just associate your IP address with the page you requested and share it with som... |
Just found out that the primary & secondary DNS servers have been changed to 95.211.156.101 & 5.45.75.11.
I had the following setup in place.
MAC filtering and WPA2 for WiFi.
Administrator password was left at default. (Suspect this was the loophole exploited. Clickjacking I bet?)
NAT & IPv4
All the Services were tur... |
In section 2.3.1 of the the OAuth 2.0 Authorization Framework it states:
The authorization server MUST support the HTTP Basic authentication
scheme for authenticating clients that were issued a client password.
It goes on further to say:
Including the client credentials in the request-body using the two parameters i... |
I wrote a java program to encrypt and decrypt files using AES algorithm in CBC mode and a random initialization vector. but there is something fundamental I'm not understanding:first I generate a random iv and load it to the cipher in the encrypt method.
then when I want to decrypt the file,do i need to load the same i... |
I see that Apple patched OS X to mitigate against K. Chen's famous Apple keyboard firmware hack.
However:
Apple keyboards can be used with computers running other operating systems; and
in any case, other manufacturers' keyboards may be similarly vulnerable.
What protection does Linux have against:
A remote attacker... |
I think several of mails are classified as spam.But Gmail and other Public Email providers has no issues.
It might be a false positive cases with the associated tools
Is there a tool or a way by which i can verify this.
|
TeamSpeak 3 VoIP communication system uses a concept of so called identities to identify the client to the server. These identities are basically public/private key pairs.
In order to prevent people from just generating a new identity after being, e.g., banned, they added a feature called security levels. Increasing se... |
I've read several Wifi security related questions on here. There are two things related to the SSID which I don't fully understand.
Is there a best practice for SSID naming?
I know that changing the SSID from the vendor default is recommended and that if two APs have the same SSID but different encryption/ passphrases... |
We have a hard time getting VMWare to work in bridged mode. We can get it to work in Bridged mode.
Why is it so important to run it with host only or NAT?
|
Say I connect to a specific proxy that I know will not keep information/data about who connected to it, and I go to a website and do something deliberately illegal. If the "middle-server" doesn't have any linkbacks or possible ways to determine who connected to it, can law enforcement still find out who did the illegal... |
Say I have these URLs:
https://example.org/
https://example.org/criticalpath
I want the first one to be served with a domain validated commercial SSL certificate and the second one with an extended validation SSL certificate. Is it technically possible? Is it supported by SSL/TLS (and HTTPS?) standards and browsers?
... |
I'm trying to solve an dom xss challenge where filter used is :
var anchor = window.location.hash.substring(1);
if (window.location.href.match(/(script|javascript|src|onerror|%|<|>)/g)) {
alert('xss detected');
After filter is bypassed location hash is written on page through document.write.
I can't think of w... |
Since using www.dnsleaktest.com I have found that any VPN service using Open VPN will leak my DNS through the tunnel.
I have tried and tested several VPN providers, even those who say that they have a solution to the DNS leak problem, such as Mulvad for example, and they all leak. In addition to dnsleaktest.com, I hav... |
PROBLEMRULE #1; SecRule REQUEST_URI "^/(|(.*)/)(lpt1|lpt2|lpt3|lpt4)(/|\.|\?|$)" "t:none,t:htmlEntityDecode,t:lowercase,t:removeWhitespace,block,msg:'X',id:'1000'"
PROBLEMRULE #2; SecRule REQUEST_URI "^(.*)//(.*)$" "t:none,t:removeWhitespace,block,msg:'X',id:'1001'"
// I also tried those, but no success.
SecRule REQUE... |
My company owns a domain A.com , and subsdiary is on B.com
B.com redirects their users to A.com for accounts registrations. Post successfull registration , A.com logins that user ( User doesnt get to know this), creates a token and needs to pass that token to B.com so that B.com shows that user logged in.
What should b... |
In many cases where a Trusted Platform Module (TPM chip) is employed, it is soldered directly onto the motherboard. Ostensibly the motherboard manufacturer is then solely responsible for integrating the BIOS and TPM module, and the overall tamper resistance of the solution.
TPM modules are also available as add-on daug... |
I have no real knowledge about this stuff so I figured I'd ask here for some answers.
So I started to get this "Security Certificate not issued by a valid authority" error when using my email client yesterday when attempting to connect to the STMP server of my ISP. I haven't changed anything in my Android phone or my... |
I'm writing a security architecture for the application I'm working with. I'm struggling in finding a framework to follow for this task. I can find a lot of frameworks like TOGAF and SABSA that works with enterprise security, but my task is more specific to an application.
Have anyone worked with such a framework?
|
I have to think of this everyday when I close the doors of the shop I work in:
A year ago we used to close the shop and arm the alarm using a key fob. This means the worst case scenario was that I get robbed.
A few months ago my boss decided that we need a password to set the alarm. This means thugs will kidnap me and ... |
There is a person who wants to establish a system which allows her/him to publish texts anywhere and make it verifiable that s/he is the true origin of that text. Only the first message is not verifiable but will establish the system.
Example:
"Hi, I am Mrs X and I am going to whistle you some interesting stuff. To pre... |
Apologies if this in the wrong section, not sure if it should go in Server Fault or not.
I am preparing to launch a new web app. We have put a lot of effort into offering good security. From a PR perspective, I need to mention some of what we are doing - security is a fundamental part, and selling point, of this projec... |
My question is about the encryption between me and my mobile operator. My mobile operator uses A5/1. I use Samsung. Sometimes I see the symbol G on my phone which means GPRS. I don't know whether it means that it uses a secure connection or not (for voice calls).
Note: I know that government can go to the mobile operat... |
I am new to using Burp Suite. I am trying to learn how to use it with Mutillidae and DVWA. Whenever I right-click on any particular application the "Actively scan this branch/host" and "Passively scan this branch/host" appears disabled. Also, when the "Scanner" tab appears to be disabled. Can anyone tell me the reason ... |
I've started thinking about how to approach analyzing my network traffic for information relating to SSL and browser usage for my web server farm. I also suspect there are some shadow (legacy, unknown) web servers running on our network and I'd like to try and capture connections to them as well.
Basically I'm looking ... |
I've been reading about identity theft recently, and I'm wondering about some possible solutions using the techniques of asymmetric/symmetric/hashing in encryption. My idea is going to cross those 3 subject areas, so bear with me as I try to explain my question.
I'm wondering whether it is/isn't viable to have somethi... |
I frequently hear about the security risks of using Android. But few people who write articles on this subject ever identify what parts of Android are at fault, nor do they identify design flaws. Can someone please point me to any sober and level headed explanation of what is ultimately wrong with Android security at t... |
Short version:
Are you aware of any proxy or firewall device which will permit outbound SSL connections to hosts with approved* SSL certificates only?
Long version:
Consider the following scenario.
I have a server farm which is protected from the Internet by a firewall. Let's say HTTPS is allowed in from the Internet... |
I came across this interesting device called SurfEasy Private Browser. Here's the company's webpage and here's the product page on Amazon.com. I assume it's just a USB stick with a VPN client and bookmarks stored encrypted. According to their webpage it can be used "at work to prevent IT from monitoring personal browsi... |
When I have a website run on https and there is no certificate, there is wrong certificate or out of date like here does encryption still work or not?
|
I am building a site where people set up small, private, social networks. For ease of administration and portability, I would like each network to be stored in a different MySQL database.
I understand that there is no artificial limit on the number of databases a MySQL server can handle, and in my basic tests there is ... |
I use Check Point Full Disk Encryption, but hope that this question can be answered generally. Is it possible for me to get, or extract, my own 256-bit AES key? By the way, I don't use any special password for the decryption itself, so this key must be based on my Windows login password alone (which you can assume is... |
I've seen many friends getting clickjacked on Facebook and similar sites.
How does one detect and prevent clickjacking? How should I teach my friends to do the same?
|
I'm looking for an easy way to set up a simple IM infrastructure that protects messages in transit as well as avoids having logs in places that neither I nor someone I trust controls. I'm based in Germany and according to Mr. Snowden, my traffic actually gets sifted through and analyzed, and I'm not comfortable with th... |
So far, I haven't seen any PoC or real-world attacks against WiFi Direct, but I see the potential because it relies on WiFi Protected Setup (WPS) for establishing the connection.
Tools like Reaver already exist to attack WPS during the connection establishment phase and compromise a traditional infrastructure network... |
I am using SSLStrip against my own computer, but am not being redirected to HTTP. Skype automatically starts up and logs in at my computer's startup, so I was wondering whether the fact that port 80 is already in use (by Skype) defeats SSLStrip. It is my understanding that except for the fact that they are being redire... |
I have a website that lets users submit a form without having to create an account and log in. However, in order to keep users accountable for their submissions, the form requires them to provide their school-issued email address (which follows a known, constant pattern and can be used to derive the user's real name).... |
I haven't had to clean up PCs in a while but it's this time of the year when you go visit relatives and they ask you about this and that, malware and trojans and other delicious things that pop up in computers.
What's the standard set of tools you use to get rid of trojans? Is there a good website reference I can turn ... |
I was wondering if its possible to prevent 3g sniffing. Its not about the security of the information sent over 3g, but being able to use your 3g without anyone able to see traffic. There are machines that can detect any use of network nearby (Pockethound:http://www.bvsystems.com/Products/Security/PocketHound/pockethou... |
Some assistance/advice needed to research this.
First: I am not sure if this is the right place to ask this. If it isn't please note and I'll close.
Over the weekend my email accounts (yahoo & corporate) were locked because of invalid password.
Looking at one of my laptops (Windows XPSP3), using ProcessHacker.exe I see... |
I believe that it was leaked recently that the NSA has a long list of zero day exploits on various software "for a rainy day," ie: for whenever it would be useful to them.
The question is, how do they find these zero days? Does someone have to physically sit at a computer and try a whole bunch of random things (ie: rem... |
Not long ago, the common wisdom was that passwords should be at least 8 characters long. These days, the most common minimum is 12.
Where did these common values originate? Interestingly, 8 is exactly the number of characters in "password" - did that have anything to do with the first?
Was there someone in particular w... |
Online articles mention the importance of a strong password and suggest that hacking tools allows bad guys to attempt millions of passwords per second. I am wondering why OSes and websites and such are not throttling attempts. That is, if 3 bad attempts happen why wouldn't additional attempts be rejected for say at l... |
After clicking in a fake "download here" button in a webpage for film downloads, a computer has got infected with what I believe to be an adware. I have located the file, VirusTotal gives this analysis of it.
One wierd thing that makes me uneasy is that when I launch Norton's complete check, it freezes after a random n... |
Please help us with this NGO site running Joomla! 1.5.
They can't pay a security professional right now, so maybe you guys can help isolate the problem?
If you go to http://casatrespatios.org you get redirected to some openDNS page
http://www.website-unavailable.com/
There is a javascript tag at the bottom of the page:... |
Does the United States Government Configuration Baseline allow for IIS Express installations as part of a software install (self-contained in the user's home account)?
Is there a waiver process?
|
My laptop (modded 2007 Macbook Pro) was stolen 2 days ago when I didn't pay attention to my backpack in a tourist spot in Europe and while I'm quite certain they won't have much use for it (the apple is orange :) I'd still like to make sure I'm thinking of everything. What are the next steps, what can I ignore? This is... |
This considers the route where somebody does not use the SMS option, but rather using TOTP, and the site offers a generated seed to input.
Two factors questionably at use:
password: something KNOWN
TOTP: does this count as something you HAVE?
What proof is there that I am using my cell phone to generate the TOTP code... |
I've been trying to see how to properly protect important content that's passed in ajax calls with java script. Considering JavaScript can be viewed at any point, it is inevitable that some of your ajax parameters will be exposed as well. I know for a fact that obfuscation serves no purpose and protecting web content s... |
I have a case where I have a set of low compute capable processors connected to a gateway processor. I need a way of authenticating these processors to gateway processor. The main things are:
I need to prevent some other processor from connecting to gateway processor
I am looking at a way where after authentication, I... |
I am work in small company. I am Java Developer and Sysadmin of remote servers. I have problem with store password from several servers. How to best way to manage passwords in company?
|
If a browser has been used to visit a few sites and has active logins and then the user turns on private browsing, can the sites still access data such as cookies and cached files that were created before private browsing was turned on? For example in Opera's Private Browsing help page it says that no trace of the webs... |
I've got an SP0/unpatched Windows XP which is vulnerable to the Conficker worm.
I'm using metasploit to use the Conficker exploit with the purpose of opening a remote shell/command line.
My Metasploit script is the following one:
use exploit/windows/smb/ms08_067_netapi
set RHOST <vulnerable_win_xp_ip>
set PAYLOAD windo... |
Using SQL Inject Me Firefox add-on,I have selected the check-boxes then click on Execute button of SQL Inject Me tool.
After getting result, it has displayed following responses
Server Status Code: 302 Moved Temporarily
Tested value: 1 UNI/**/ON SELECT ALL FROM WHERE
Server Status Code: 302 Moved Temporarily
Tested val... |
I have created my own Certificate Authority and installed the certificate on a few computers.
Now I have generated a server certificate with common name *.mydomain.com and Subject Alternative Name (SAN) DNS mydomain.com to match all first level subdomains and the root domain. I signed the server certificate with the CA... |
I currently have a VPS in a data center, I asked the admin to open a port to install a ftp server. It opened port 3345, at first I tought the port is not forwarded correctly, because I ran nmap as this :
nmap 194.110.xxx.xx
Starting Nmap 6.00 ( http://nmap.org ) at 2013-12-17 14:33 EET
Nmap scan report for host-194-11... |
Quite the simple discussion this one (one would assume):
If I'd hash the email and password, and then hash the hashes, whould this be considered safe enough or would this just be a waste considering you could just salt them both?
What should the salt be, could it be the username-part of the email?
|
I connect two TP-LINK APs (TL-WA901ND) together over bridge-mode. It's all working fine but there is no option to set up some wifi-security (WPA/WPA2).
Do I need wifi-security over bridge-mode?
Any ideas, tips or tutorials are welcome.
|
Lets say a secret word is say, the name of your first pet. Mother's maiden name is also a common one.
When does it make sense to challenge the user with this? Or, what actions should be secured by a secret word?
I'm just not sure I know the security value of a secret work, what its intrinsic value is over a password.
|
I want to use a commercial, automated tool but it cannot login successfully because the website requires a two factor authentication process using SMS. For testing, the SMS message is sent to another website, though in normal situations the SMS is sent to a mobile phone.
I clicked many buttons in target site. After tha... |
We have older firewalls that don't allow for scheduling up/down times of VPN connections, and we're working with a client that will need to connect to it at different times each day. What are the security risks (if any) of leaving open a VPN connection to a client?
We have the profile completely locked down to accessin... |
I've developed a client application which talks over a REST API to a server. The way the application works is to send the username/pwd pair in the initial login to the server and then respond with an auth token in the form of a newly generated GUID.
The client uses the GUID to talk to the server for the remainder of th... |
Suppose I want to port scan my network. Normally I'll use a tool like nmap or nessus.
What if we don't have any tool to perform a Port Scan - how can we find open ports?
|
I currently use QuickVPN, however, it does not seem to route my web browsing traffic through a tunnel. Am I correct? It only opens up a tunnel for accessing windows shares and documents back at the office, right so only they are secure?
If I wanted to also mask or make my internet browsing secure and private I would ne... |
The new Firefox private browsing mode allows for both non/private browsing windows
at the same time. So if a website pops up a new window (which will be in non
private mode) can it read stored data?
I know we can block pop-ups, but some websites seem to be able to bypass that. Wasn't it better the old way where privat... |
I have been working with programs like Kali Linux, Cain, etc., and I have noticed that for the most part the biggest password stealing attacks must be performed on the same network as the victim (for instance, MiTM and most of the attacks on Metasploit). What forms of attack (especially designed to steal passwords) cou... |
I would like to get a few opinions on whether it would be safe or not to use PBKDF2 to generate a hash of a password. For my purposes I'd like to assume that the hash itself will be posted on the White House Twitter page (in other words it will be public).
Would I be better off using a massive number of SHA-256 iterati... |
Apache Web server as a security measure relinquishes its system privileges and runs as a normal unprivileged user before accepting clients over a networks. My Question is
How this measure prevents or restrains bugs to be exploited by malware.
What is idea behind this approach
|
I'm looking for a way to find Struts2 OGNL vulnerabilities (specifically http://www.cvedetails.com/cve/CVE-2013-4316/
and
http://www.cvedetails.com/cve/CVE-2013-2251/. )
I know that attackers have such tools, and there is a Metasploit module for use when you already know the exact location of the flaw. What is a good... |
This paper:
https://www.usenix.org/legacy/events/sec01/full_papers/song/song.pdf
Explains how SSH can be compromised by analyzing the timing of the keystrokes to guess what the user is typing. It's about 12 years old.
I heard that this attack vector was solved in SSH long ago by sending keystrokes at random intervals.... |
Django sets a CSRF protection token on the user's machine via a cookie. It then asks for the token on POST requests. If these two don't match, it returns a 403.
If I change manually both the cookie and the token value I send in the request, the request is accepted. Django does not verify that the token value was set by... |
I have heard several people say that you shouldn't even open e-mails that look suspicious, as you might be infected by a virus of some kind. Is there any validity to this? I suppose that some e-mails show a web page, which could be infected, but I don't think most e-mail clients would allow the page to run scripts, wou... |
I'm setting up EAP-TLS on my wireless router, and am currently generating DH parameters for FreeRADIUS.
First, what do these parameters do? Also, what size should they be?
I've been generating the current parameters for some time:
openssl dhparam -check -text -5 4096 -out dh
The tutorial I was following recommended a... |
I was looking at this question:
How can you be caught using Private VPN when there's no logs about who you are?
and everyone who read it and responded seemed to be taking for granted that every single proxy mentioned was a website. It seems to me that even programs that connect you to proxy servers don't route all of y... |
My application is running an API authentication that uses tokens rather than cookies.
This leads me to ask a few questions :
What is the most secure way to store the token ?
By using random tokens you eliminate the issue of CSRF attacks but on the other side there are no Secure and HTTPOnly flags.
I thought of maybe ... |
I know the real answer to the auditor.
We are a smaller company under 40 total employees that is also PCI level 1 compliant. We've always used ssh keys on internal servers. You can't ssh in from the outside and have 2 factor auth on the vpn. Our auditor has always been ok with us using ssh keys since he said we are a s... |
I understand that one of the requirements (and a major drawback) of OTP is that the key has to be as long as the message is.
What happens if I have a key that is shorter? The message would only get encrypted partially, right?
For example if my Key was "The" and my message was "Hello, there" the resulting ciphertext wou... |
I am developing a Java game and money is involved. As such, I want to prevent people from modifying the client if at all possible (I'm a game designer, not a security expert). I know that it is impossible to prevent people from modifying the client, so what is a way that I could detect if people have changed the client... |
I was stumped when I saw the following lines on my Apache server error log this morning:
[authz_core:error] [client ::1:37317] AH01630: client denied by server
configuration: /var/www/styles/style.css, referer:
http://bd.adm.ijinshan.com/adm.html?adm=somehexdec&t=timestamp
[authz_core:error] [client ::1:37317] A... |
Note: I know how HTTP Splitting works.
Note 2: I am not working in WebGoat. I am trying to make this on my own.
I am trying to imitate the HTTP Splitting attack on my machine. For that I wrote this php code:
<?php
header("Location: " . $_GET['page']);
?>
And then I enter the following URL:
http://localhost/webgoat/htt... |
This link describes my problem better:
https://code.google.com/p/webgoat/issues/detail?id=42
I was doing the HTTP Splitting exercise in WebGoat. In this exercise, when you send a malformed URL, you are supposed to get TWO headers back. One header is the original header. The second header must be the attacker's malforme... |
From what I read here, if the intermediate CA has been compromised, a fake cert can be issued and the privacy of the end-users could be compromised as well. In order to remediate this situation, someone have to report this and have this cert be revoked by the CA that issue the intermediate cert.
At the end of the artic... |
I was just going through the OWASP's Cheat Sheet for CSRF Prevention. Regarding the double submit cookies method, it says:
the site should generate a (cryptographically strong) pseudorandom value
This method completely relies on the fact that Cookie/Header can not be injected by the attacker.
An attacker cannot rea... |
I am based outside of the US, but I still want to watch Netflix. So I am thinking about signing up a DNS service such as unblocked-us, but I worry that as I am now querying an unknown ( relative to Google DNS, that is) DNS server, my details over the internet may not be secured, as the DNS service provider, or hackers ... |
I am learning PHP+MySQL and observed that mysqli_real_escape_string function in PHP requires a identifier to a MySQL connection. From some research I found that it has something to do with charset and multibyte characters but I don't get it fully. So my question is how database connection helps in making mysqli_real_es... |
To verify this, I boot my PC from Kali Linux live distro. Before establishing ADSL/PPP connection, I start Wireshark and listen on any pseudo device. Then I create the connection to ISP network. Wireshark shows PPP handshake as expected.
Then, suddenly, I see incoming packets. This is a clean Kali Linux boot. I hav... |
Couple days ago I gave noticed that almost all php files on my server are infected with some encrypted code and in almost every file is different. Here is the example from one of the files:
http://pastebin.com/JtkNya5m
Can anybody tell me what this code do or how to decode it?
|
My site has a search form, which queries a few tables for whatever my end users want to find.
What permissions should I give my MySQL user in order to search the database and update the 'times searched for' column if needed?
Feel free to ask for more information or let me know if this is a duplicate. I did spend a goo... |
I have a program that generates a fixed-length 32 byte (256-bit) password using RNGCryptoService provider and then uses Rfc2898DeriveBytes on that password to arrive at an encryption key.
However, to save system resources, I was thinking about just using the original password. Am I right that there is no benefit to usi... |
First off, I don't know how hackers get at an entire password table and steal them.
I don't know if the owners of the website are to blame or what, but I am wondering if it involves logging into the DB or not.
Assuming that hackers steal passwords by logging into the DB with application or admin users, what about putti... |
If we are accessing a public wifi network, does changing mac address at certain intervals of time keep us anonymous forever? Is there anything other than mac address to identify a user in an AP?
|
Does the Oracle Database Built-in Password Protections prevent pass-the-hash or replay attacks?
Reading the "What Are the Oracle Database Built-in Password Protections?" from http://docs.oracle.com/cd/B28359_01/network.111/b28531/authentication.htm#DBSEG30031 I see AES encryption is used as well as SHA-1 hashing.
I und... |
My setup looks like this:
In the interest of security, I'd like to separate the wired network (where the Workstation is plugged in) from the wireless subnet. I don't trust some of the devices in the wireless subnet - they are vulnerable to malware and risky because torrenting warez.
I'm not interested in the network i... |
So now that I have to implement "secure transport" as defined by The Direct Project (not to mention reinventing a bunch of wheels, but that's another story for SO), I find myself staring down the barrel at having to create several dozen internal users' S/MIME certificates since (for obvious reasons, I think), I'd very ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.