instruction
stringlengths
24
29.9k
I am trying to establish 2 way SSL connection with remote server and I have received certificate to connect. Can somebody explain behaviour described below. I am able only to use it with SOAP UI which uses Java SSL libraries. However all other software such as browsers and .Net applications fail. Chrome returns this er...
I use the Spring security for Java web applications and I have written an authentication provider which is working without salt and now I want to either add salt or alternatively use the built-in algorithms with Spring security that appear to be SHA and that can use salt that is specified with XML. In my case I didn't ...
During a penetration test‎ (exercise) on a IIS web server + MYSQL DBMS, I have found an Unrestricted File Upload vulnerability for which I can upload a .php file. So I have tried to upload a php shell using a passthru or an exec command but I have received the famous response "Unable to fork..." because, as far as I un...
I'm a software developer with an interest in and basic level of knowledge about security. I've come across an authentication system that "smells bad" to me however I lack the expertise to know what if anything is wrong. The software system involves web services for downloading and uploading data from/to a database over...
They way I understand DeAuth-ing a user on a wireless network is this: The attacker pretends to the AP he is the user and to the user he is the AP. He then tells the AP (as a user) "I need to re-authenticate!" and the user (as the AP) "You need to re-authenticate!" So why aren't networks set up by default so that only ...
For an Authenticode signed file to be verifiable by Windows after the original signing certificate has expired (typically 1-3 years after issue), the file also needs to have a cryptographically signed timestamp that Windows can verify. There are a number of Authenticode timestamping services that will sign your binary ...
With data mining tools like Maltego and other correlation tools for large data sets, if we conduct any transactions online assume that these can all be collated to build a good picture of what we do, buy, read etc (hence Google etc). If a normal person, with a large online history decides to go off-web, is there an eff...
I'm looking into increasing my use of signed and encrypted "things" - LibreOffice Documents, Off-the-record chat, PDFs, emails, etc. I'm finding that some things only support x509 format-certificates, and others only support OpenPGP format-certificates. I also like that OpenPGP is not CA-dependent, and dislike that the...
One of my friends used to boast about how long his passwords are. One day, I decided to play a prank and social-engineered it out of him. I was pretty surprised as to how effortless the entire procedure was, and how oblivious others can be. Many of my acquaintances don't seem to understand the dangers of social enginee...
What is a technical difference between "grey padlock" and "green padlock" in URL bar in browsers? As an example we can take: Green padlock: Bank of America Grey padlock: Google Search Both of them are signed by proper CAs. So my questions are: What is a technical difference? How does it impact my browsingsecurity? ...
A very interesting Debian security advisory was released yesterday. Genkin, Shamir and Tromer discovered that RSA key material could be extracted by using the sound generated by the computer during the decryption of some chosen ciphertexts. How does this attack work? What are some possible mitigations?
Scenario I have many set top boxes that feel sluggish when accessing HTTPS websites. I would like to find out which SSL cipher suites are most appropriate to use for our websites, so that the boxes perform optimally. Unfortunately the OpenSSL command line tool is not available on it so I cannot benchmark it that way. I...
i need bcrypt to create encryption keys and also for authentication hashes, but entropy of delivered output from password has to be >256bit (which clearly can't be achieved by hashing 196bits with SHA256). is there any bcrypt implementation that use SHA256 in KDF? if not please help me how to do that myself Scrypt is ...
/GS compiler option Micorsoft developed added an extra cookie before the return address and before returning the cookie is checked, if it is intact then return address is safe why ever would this assumption hold ? In my understanding this just makes hacker's lives a bit harder to now keeping the cookie intact.
It is a known fact that your laptop camera can be hacked to spy on you. While the most often mentioned remedy is very low tech yet effective, everyone seems to omit the fact that the microphone can be used to spy on you too. I have no proof but it seems probable. Is there any remedy to this except for the general "ma...
First off - I usually target my questions to StackOverflow since they're programming related, and I usually login with my work account - so this will be my first post from this account, as well as my first post to this site - so I apologize if this question belongs elsewhere. I have Eset installed on my Windows 7 machi...
We need to implement seamless SSO with ADFS SAML 2.0 using OpenSSO & we plan to go with IdP initiated GET binding. The user in client network will log in to ADFS with Windows credentials once every morning. Thereon, whenever he accesses our application hosted in SaaS environment (different network/domain than that of t...
How does an IDS identify a computer on the network. I mean do IDS' actually check whether a device is actually what it claims to be ? If so what factors does it check (MAC etc) ? For e.g. if a device was banned from the network due to malicious activity (My friend claims that when he tried ARP spoofing in his college;...
Situation: An e-commerce system (specifically: PrestaShop) which is used to sell virtual products (specifically: product license keys). To accelerate order processing, a cronjob is supposed to be regularly executed which looks for new orders. Each of this order is checked against a list of criteria, if it passes the te...
If I follow the reasoning of a colleague it seems you should never run Apache Webserver or Tomcat on a Windows server if you want to keep the https certificate safe. Let me explain before this question evolves into a Windows vs Linux troll battle. For example when using Apache Tomcat for a https website the private key...
So I'm working from a local cafe, doing some web development, and need to see something in my Apache's access log. And to my surprise, in the log I see, every 30 seconds or so, a request for my root web page, coming from 192.168.1.1 -- the cafe's Verizon router. Is this a normal or known behavior? Or is it Bad? The we...
In a software project, a software vendor is responsible to deliver a piece of software. Everything else, including the infrastructure setup, database and application server installation/configuration/maintenance, etc. are not the responsibility of the software vendor. Contractually, the software vendor is to provide BC...
I've been wondering lately if RC4 is so flawed in all its forms, why is it that it is still being supported by all major browsers per default? Why does the typical chrome browser prefer ECDHE-ECDSA-RC4128-SHA over ECDHE-ECDSA-AES128-SHA?
For someone who has a key and ciphertext, is it possible to find out what encryption algorithm was used?
I am wondering if it is safe to send "id token", which is one of the items that are result of authenticating a user using Google Open Id Connect, to the client and use it for further authentication. The other item that is significant is the access token. My idea was to send the id token to the client, and keep access ...
We use Google Authenticator and SMS for two factor authentication. Should we allow the administrators of the site to turn off TFA for users? Google Auth uses SMS as backup option but SMS does not have a backup and when the user cannot receive SMS for whatever reason he/she cannot login. I know we can backup SMS with vo...
Is it possible to steal a non secure Cookie (Secure Flag is false) when the Web Server (IIS) only allows Https?
I'm wondering if my ASP.NET Web API had an XSS vulnerability as my controller didn't have a method to handle the default GET call. Without the GET method being handled in the code a call to /api/mycontroller/?<script>alert('hi');</script> would result in: {"Message":"No HTTP resource was found that matches the reques...
I'm trying to XSS a search field and my attack vector is getting reflected like this: <input type="text" id="txtRpHiddenKeyword" style="display: none;" value="ATTACK VECTOR HERE" /> Only double-quotes are allowed and angle brackets are encoded therefore I can only use eventhandlers to execute my JavaScript. Problem is...
I have a hash thingy I am trying to decode and I have done relatively little with encryption, though I would like to try to learn some more. The hash is: 1YMTpavsFq7ykllC3CCsg3e1li31re1nROxuW1wqIqpk and I have no clue what to look for. I already tried MD5 (it failed) and I am going to try AES256, SHA-256, and AES-CBC. ...
There's a recent report in the news of a Harvard student who emailed in a bomb threat so as to postpone year-end exams. According to the report, he carefully covered his tracks using the best technology he knew about: he used a throw-away email account, and only accessed it over Tor. It turns out that this last point ...
So I am trying to find out how easy it is to crack a password using some great Linux tools. We all know about John as a password cracker and how great it is. But how about specifying a pattern. Let's assume the following policies. A password must start with a capital letter followed by 3 small letters A password must...
We have a website which stores hashed passwords in the database. During logins we hash the password entered by user and compare two hashes. This is quite standard so far. Our client which is in finance domain now wants us to implement a feature where we would ask users to enter few random characters from their password...
Is it possible to have OpenSSL trust a non-root CA such that a certificate signed by that non-root CA can be properly verified? I've noticed that the default behavior for OpenSSL is to only verify certificates when it can build a complete chain, up to a self-signed root CA. Can this be overridden? I specifically do not...
If Apache is configured to parse PHP and not allow to index files, are there other ways users can see PHP source code, either with or without intention?
I have been attempting to run a MiTM on a very old XP SP3 computer. I have attempted it with 3 products, as listed below: Wireshark: Traffic from the computer did not even show up. (I did see traffic from multiple IP's, so I think I have the right adapter) ARP Spoof: (with and without SSL Strip): As soon as attack took...
I have a BlueCoat ProxySG 810 appliance and want to use it as both an HTTP Proxy Server for clients on the Inside interface of a PIX 525 Firewall (OS Version = 8.0(4)) and a Reverse Proxy Server for my Web Servers on the DMZ. Should I place the ProxySG 810 on the DMZ? If I do so, does the ProxySG 810 need to be allowe...
Today like many other times in the past, signed for a new service and got a common error message: Your user name or password is invalid This time I am wondering how useful it is to notify "invalid password OR user" versus a less common but more useful two message schema with the real problem: "unknown user", "invali...
I am wondering how could a zero-knowledge host such as mega.co.nz prevent users to just upload files in clear, and, for example, to discredit the site by uploading a large quantity of illegal material and then telling the authorities. Ideally, the server should refuse unencrypted uploads. However, what's a definition o...
I found myself looking at a stock and forex search page when I try to access Chinese Stackexchange using my FireFox browser today. This is what the page looks like: And this is the HTML of the page: <!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Frameset//EN" "http://www.w3.org/TR/html4/frameset.dtd"> <!-- turing_cluste...
So http://en.wikipedia.org/wiki/SHA-1 SHA-1 produces a 160-bit (20-byte) hash value and As of 2012, the most efficient attack against SHA-1 is considered to be the one by Marc Stevens with an estimated cost of $2.77M to break a single hash value by renting CPU power from cloud servers With a theoretical attack tak...
Suppose I'm suspicious that one or more (pseudo)-random number generators is cryptographically flawed, perhaps even deliberately backdoored. The RNGs in this case might be either PRNG algorithms, hardware random number generators, or some OS-provided primitive whose source might be either of these. Can it ever be a ba...
Are scripts coded only using the default API of a high level, interpreted language for generic and meticulous gathering of network device and host software information that are already available through common network security applications able to go unnoticed at times that common network security applications would se...
Current full disk encryption on mobile devices rely on low entropy passwords like PIN numbers or pattern locks. Being able to use a smartcard with such mobile devices is a tempting idea. I know that some implementations of smartcards are weak against physical attacks like using acid to recover the key or other side cha...
So I have been hearing that using WPS Pin is not secure at all and that there are available downloads that can brute force attack the pin until it uncovers it depending on what encryption you use. I have done a little digging but I cant conclusively discover what is the most secure encryption to use. I was wondering if...
Assume that a visitor to a website has changed his useragent to something like the following, but he's using linux: Mozilla/5.0 (Windows NT 6.2; rv:20.0) Gecko/20121202 Firefox/20.0 Assume that the website is in the hands of an evil hacker. Is this trick enough to make the expolit-kit nonfunctioning, or is it possible ...
The Raspberry Pi has a built in hardware random number generator but there doesn't appear to be any public documentation on the hardware, and even if there were it would be questionable (what company is going to publically admit that there might be problems with their own hardware if they can get away with it?). So the...
I have noticed recently on OS X Mavericks that running sudo will not only allow one to run it again in the same window or even the same application, but will permit any application to run shell commands as root. This would mean that any application continually trying to run sudo without a password in a loop would gain ...
In the last few weeks I have been getting an increased HEAD traffic to my website of the form HEAD / HTTP/1.0" 200 0 "-" "-" This just returns the details of my web server, right? The IPs are from all over the world. Any idea on why this started suddenly? I do get the usual attacks infrequently, but this HEAD traffic ...
In this thread, Tom Ptacek explains what Password-Authenticated Key Exchanges are, and it got me really interested in them. If I'd like to start learning about how to build them into real world software communication protocols, where can I find a starting point for information on understanding and implementing TLS-SRP?...
I've recently read Ned Batchelders article on UTF-7 XSS-attacks. I tested his examples, but could not get any UTF-7 attack to work in modern browsers. I tried recent versions of Firefox, Chrome and Safari so far. I know that Chrome has some XSS-attack prevention mechanisms but to my experience, Firefox has a more "gene...
Is the ARM processor used on the Raspberry Pi vulnerable to standard buffer overflows? That is, if a program that has a BO vulnerability is run on a Pi, will it be vulnerable to exploit? How does the unique architecture of ARM and SoC affect the vulnerability, or the exploit? Considering the lower footprint and sm...
I'm using a TP-LINK TD-8817 ADSL home router with a customized firmware from my ISP. When using the modem in router mode, I often redirected to a specific link owned by ISP. This is interesting because I never have this problem in my old router. So I used tftp to retrieve router firmware (a file called ras). Then I ...
I'm new to encryption and still learning about it; I overheard someone this weekend mentioning that 4096 bit encryption was "cracked" by listening to the CPU and searched for this to confirm it because it sounded a little hard to believe. However, at least if this article is legitimate, it appears to be true. Accordin...
If you are exchanged email messages with people using Linux, Windows and some odd Mac and want to implement some really basic security, encrypting all messages, just trying to avoid some non-sophisticated attacker. Is there a tool already installed on these systems by default? Alternatively, a compatible procedure that...
The haystack theory is the recommendation to put repeated characters in your password in order to make it harder for brute force to reveal. Does this have any mathematical basis? Or is it snake oil?
I have transmission-daemon setup with RPC enabled using a whitelist. The whitelist contains only 127.0.0.1 and my virtual private network range of IP addresses. I connect most of my devices through an openvpn server, and so I am wondering why I would need to enable standard auth (user/password) for services that are on...
VPN service providers such as ProXPN offer a service in which you pay a monthly subscription, allowing you to download an app for Windows or Macs so that your traffic goes to the internet via this protected tunnel. The problem with this is that I don’t want to have to install the app on every box at home. I have an ol...
I want some advice on my Authorization/Authentication scheme that I will be using for my Web API that I am writing. Firstly the Authentication : 1) When a user first logs in and they are authorized, I send back a unique token back to the client. This token is used in subsequent API requests in order to authenticate th...
PPTP is not an open, ratified standard the way that, for example, SSL/TLS is. (see: http://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_1.2 and http://datatracker.ietf.org/doc/rfc5246/ ) The most popular (most widely deployed) implementation of PPTP came from Microsoft, in WinNT. This implementation was also used...
The scenario I'm trying to address is this: There is a web application Y which has an authenticated user. Inside Y, web application X is hosted (which belongs to a different domain). When X is launched from Y, we want the authenticated email address from Y to go to X. X is launched by hitting a url belonging to domain ...
Let's say I have an encrypted message. I want to make it so that someone is able to decrypt it. The only way of giving it to them is online. For the purposes of this question, I can't call, mail or meet them in person. I want to ensure that only they are able to decrypt it. I know that the method of communication (wha...
I recently began configuring our production server for a new Drupal site. Up till now, I've always used the default PHP handler mod_php, and removed write privileges for any directory/file except where image uploads, etc may occur. The vps we purchased is from a company that actually removes this from the WHM configu...
Excuse me for question name, but I couldn't find any other suitable title. I want to validate client connecting to the server. My algorithm looks like that: Clients sends his login - plaintext Server sends random big integer AES encrypted with password corresponding to the login Client decrypt number using his passwo...
All the clients in my wireless network send continuously arp requests to a host that doesn't exist (I've checked its absence with nmap -PN [IP]). The clients use windows 7 and windows xp (here the requests are sent with less frequency).What does it mean? I think that this behavior is the reason of my network congestio...
With Windows 8, Microsoft introduces the Metro Apps which run in a sandbox environment, and therefore should be more secure. I would be interested to know if this higher security that the metro apps bring to the Windows OS also apply to the Chrome Browser, that is I want to know if there is any advantage from a securit...
I am building a Ruby on Rails API that posts to webhooks that the API user can create, whenever a resource that he manages is created, updated or destroyed, using the HTTParty gem. This got me thinking: I am validating that the webhook url is indeed a valid url, but that's it. What if, for example, the API posts to a w...
Scenario: There are two computers running GNU/Linux, U and T. U is untrusted and T is trusted. A non-executable file F (which may however have been infected with malware) resides on U. (For instance, an H.264 video file in a .mov wrapper.) It is needed to copy that file to T and to view that file on T, with minimal ri...
I'm considering trying out yubikey and I've recently discovered that the (crucial m500) SSD I recently bought supports hardware encryption. I think it should be possible to use a yubikey to provide the password for HDD encryption as it appears as a usb keyboard as far as I know. I've never used hard drive encryption ...
I need help with understanding how to manage security release notes for our product. We create major release of our product about each half years and security or maintenance releases each month. What should I consider regarding what we tell our customers about security? Should we tell them that we upgrade our 3-d part...
I've noticed that on a lot of login forms in websites and applications that there is a "show password" check box. Why? I myself have seen some hacks that an attacker could hack the input password box. Doesn't enabling the "show password" box constitute as a security risk?
I often send confidential documents to others using encrypted PDF files (i.e. files with a user password, and typically with an owner password as well) to prevent both accidental forwards and snooping. These are typically generated by LibreOffice's export PDF function. I understand that the PDF format for Acrobat 9.0 ...
Edit This post has been marked as duplicate. While I have read the referenced thread I see some differences in the descibed situation. My scenario below is a non-server home network with both machines connected via Wifi. As both are connected via standard router software to the internet I have trouble understanding whe...
I am working on a project which requires Integrity measurement of OS (Linux). One way to do that is using IMA but I am not sure if it fits in the scenario below. The scenario of the project is some what like this: The systems boots up and measurement is done using trusted-grub. So the PCR 0-7 are filled up. Then the OS...
Playing devil's advocate, Let's assume I purchase a Linux server from a hosting provider. I am given a password for the root user and am told I may login using SSH. The only purpose this server has is to host one or more websites, possibly with SSL properly configured and enabled. My initial login will be to install (v...
I have a couple of machines that I use for purely automated stuff, with home directories encrypted using ecryptfs. So even if the machine is powered on, those directories aren't decrypted unless that user logs in (desired behavior). Now, I'd like to be able to run a server using one of these users (data stored therein)...
For HTTPs I saw the URL was configured in https://test.com/xml/Transformer=TEST&UDIAuthToken= < string of alphanumeric chars, 160 in count > << this a dummy hostname, with dummy parameters used for example >> This set up was done to send xml file via HTTP. I am new to such configuration and I am not able to figure out ...
I've finished building my wordpress website and now, I'm concerned about the security of the website. To improve security, I'm using Google two factor authentication plugin while also password-protecting the wp-admin folder besides the default username-password login of wordpress. My question is, does it make sense to ...
I play on this game thing - it isn't important but it is a roleplay game. I am roleplaying a criminal - a smart one. Now the fake FBI in the roleplaying game sent me a message. They have made the IP untraceable (in game) so I was wondering if I could roleplay another way to trace where the message came from? Like broad...
What are the steps you would follow in order to identify in an email is a SPAM/SCAM/Phishing attempt? The reason I am asking this question is that sometimes very well crafted junk emails manage to bypass the automated AntiSpam tools, so further investigation is required. Usually I review the sender IP reputation using...
I couldn't find the answer for the reason anywhere, even the wiki page doesn't explain it. This seems like using a PRNG for seeding an another PRNG. The first one (/dev/random) may itself be seeded by a PRNG. I can 'understand' why the-randoption can't be used directly for generating keys, but I can't see the reason fo...
In our system, every resource has an access control list (ACLs), which list entries (ACEs) that have a specific kind of access to that resource. The ACE can be for end-entities (eg: users like "Mr Q") or group entities (eg: "North Atlantic"); the inclusion of the group entities makes this a hybrid ACL/RBAC system. ACL ...
I have asked about security release notes Considerations for security release notes I need additional clarification about security vulnerabilities announcement. We create major release of our product about each half years and security or maintenance releases each month. Our product is Java Web Application that runs on ...
I'm really into hacking and security aspects. But I'm wondering about several things that is stopping me from pursuing this passion for the time being. One of the them is actually Programming language. As we all know that programming in general is an open-ended field, and what I mean you can't just by learning the bas...
I'm building a simple web application for encrypted chat. Each message will undergo 256-bit AES encryption on the client side, using the Stanford Javascript Crypto Library. No unencrypted data or password information will ever leave the user's browser. Is it safe to implement this scheme, using client-side encryption,...
I have a new (first time) CentOS 6.5 server being used for a web server. Our security team has identified the following weakness: The SSH server is configured to allow either MD5 or 96-bit MAC algorithms, both of which are considered weak. 

Note that this plugin only checks for the options of the SSH server and does n...
Suppose I have a (bluetooth/usb) device which needs to displays information on an external pc/phone. Is there a simple and effective method to garantuee that the information displayed hasn't been altered by malware on that PC or phone? One possible solution I thought of: the device could generate an unique picture once...
I was looking at this website and trying to understand how this XSS is possible, but I just can't figure it out. Here's the URL: http://www.domxss.com/domxss/01_Basics/05_jquery_html.html?681973661 <script src="../js/jquery-1.9.1.js"></script> <script> function setMessage(){ var t=location.hash.slice(1); $("div...
How much can someone see from my iPhone by connecting to my wifi and can they copy my messages files documents etc
I have logged into SQL Server 2008 Database and executed following query: select * from USER_Main_INFO_Name where userid ='' or 'x'='x' After executing the query Database has given total user list. Using Burp Tool I have done SQL Injection at front end my application has given proper error result. Is my application st...
Is there a security app I can download so I can keep another device from being able to see my iPhone messages and documents when they are connected to my wifi
I'm looking at a few VPN providers and many seem to offer L2TP VPN but they seem to share their shared secrets publicly on their website, for example : Goldenfrog https://www.goldenfrog.com/support/vyprvpn/vpn-setup/iphone/l2tp Witopia https://www.witopia.net/support/setting-up-and-using-your-vpn/apple-ios/ipsec/ Astr...
You already know google started new service which is related to gmail. http://gmailblog.blogspot.com/2013/11/attachments-in-gmail-now-with-power-of.html When we send new mail to friends.If it contains any attachment(photo etc ) , photos will open directly with mail. Is there any security problem with this subject? Can ...
I am making an app in Python for linux as a front end to the router (to automate some tasks). But I need to log in to the router before I can do any operations on it and since it uses a http-auth I need to send it the clear text password and hence the clear text password need to be stored on the system. What is the be...
I want my Mac to be as secure as possible, but I don't know if the send all traffic over VPN option is safe or not. Please can someone explain if it is more secure to enable it or not.
Most Desktop As A Service providers store their virtual hard drives and the VMs RAM in a way that allows them to access their contents. Choosing a provider who offers a 'no-knowledge of server' option looks like the easiest solution. However, companies rarely choose those, and there are significant financial considera...
I recently posted a question about recovery of website from XSS attacks, https://stackoverflow.com/questions/20759081/how-to-recover-a-site-after-an-xss-attack... Doing a bit more digging online, i found that the site is vulnerable to XSS if it allows user to give input or in other words, have any sort of input box in ...
For the past week our company's IDS has been blocking 100-200 meeting invite emails per day from a specific client that are loaded with buffer overflows targeted at Exchange 2003. The payloads are harmless to us, but the flood of logs is annoying to say the least. I have been in contact with the IT manager at the clien...
Why load assets such as images, javascript, css etc, over HTTPS? Is it possible for these assets to be tampered with if I use HTTP? The only way I could conceive of tampering with HTTP loaded assets is to ARP poison the network and then inject packets for certain requests, but that kind of goes over my head. Can someon...
How can I be sure now that I no longer work for a certain company that they are not accessing my computer from their side. Strange things happen ( someone remove a certain set of my friends on Facebook, then put all but one back). I also see the screen flicker like when you are getting online help. Please help if you c...