instruction stringlengths 24 29.9k |
|---|
Being on the company security email list, I get emails with some regularity complaining about email discovery on various forms on my employers website. The reporters are complaining about things like our login form returning a specific message like "You password is incorrect." rather than "The email/password provided a... |
A few minutes ago I attempted to ssh to a server I have at my office. Since it is a new server my public key has not been set up there so I had to type my password in manually.
After three times of trying to log in unsuccessfully I notice that I had typed the domain name wrong -- two characters transposed. The serve... |
I need an XSS vector that doesn't use forward slashes nor spaces. I've gone through lists of hundreds of vectors, but they usually have one of those two. The space gets URL encoded, and anything after a slash gets deleted.
I've tried things such as <script\src=*>, but you'd need a forward slash to make it work from my ... |
It is clear to me that using the same password for different websites is a bad idea because if an attacker manages to get a hold of your password, then he can gain access to the other websites in which you are using the same password.
However, I was wondering if it would be safe to have the same base string in all pass... |
The Information Security goals - Confidentiality, Integrity and Availability (CIA) - are often referenced to as the CIA triad.
As I am writing my master thesis, I am wondering to which resource I should put my reference on the CIA triad?!
I've done some research on this, but it's still unclear where it originated.
|
The Play Framework for Scala has support for signed session cookies. In the application configuration file is an "application secret" that is set as a secure random number when the application source code is initialized. This secret is shared between multiple copies of the application running in a web server farm so th... |
I cribbed the public domain TEA source from wikipedia ( http://en.wikipedia.org/wiki/Tiny_Encryption_Algorithm ), looks like this -
uint32_t v0=v[0], v1=v[1], sum=0, i; /* set up */
uint32_t delta=0x9e3779b9; /* a key schedule constant */
uint32_t k0=k[0], k1=k[1], k2=k[2], k3=k[3]; /*... |
Recently I need to care a lot of false positive vulnerabilities in scanner results on Apache version.
Example of false positive vulnerability:
Apache 2.2 < 2.2.16 Multiple Vulnerabilities
Our customers run scanners and they check Apache version related to the official Apache version numbering.
We use Centos, and the A... |
I've created an algorithm I think I'm going to use for a cloud storage service I'm developing- if there are no issues or vulnerabilities with it. It's this along with TLS and forward secrecy implemented. Also when logging in on a new device you must confirm it through your email account.
To create account:
Generate tw... |
I'm working on converting an application that uses the traditional Page Controller pattern to start using the Front Controller pattern.
One of the potential problems I'm thinking about is that with a Front Controller it could be possible for an attacker to directly call arbitrary functions.
For example, requesting a U... |
According to Guide to the Secure Configuration of Red Hat Enterprise Linux 6, there is this policy:
"In certain scenarios, it is beneficial to remove certain httpd modules to limit the functionality of the HTTP Server. To do so, simply comment out the entire line which loads the module you wish to remove in the /etc/h... |
I've been thinking for a while about whether or not ask this, as it may be a opinion-based question, but as I have seen a couple of non-closed questions about recommended books, so I think this is the same case.
Is there any app for Android which be useful during a security assessment?
|
Given the recent confirmation of weakened and broken encryption schemes and implementations, how does the community feel about the security of SSH?
It seems there has been very little discussion relating to SSH in the context of these leaks.
Additionally what configuration would be recommended to harden SSH?
|
I am not sure about that. It should run in kernel mode in order to avoid some user-mode program to kill/suspend the firewall and do its dirty job.
The malware would not be able to kill the firewall even if it was able to get higher privileges.
Hope in deep explaination for both Windows (consider a generic firewall) and... |
I am currently reading the "Green Book" (http://csrc.nist.gov/publications/secpubs//rainbow/std002.txt) of the "Rainbow Series" and have a question on chapter "C.4 Password Space".
From this chapter:
S = password space
A = number of alphabet symbols
M = password lenght
S = AM
To illustrate: If passwords consisting o... |
If a WiFi pineapple does a karma attack and a client connects to it, would you get the password (for the original WiFi) or would the client just connect to you? Is there anyway to stop it?
|
I've got a Linux desktop that will be a gateway between my private network and the open internet. I'd like it to capture and store all network traffic passing through it continuously, 24/7 (until the HDD fills up ;). But it has to be more sophisticated, than just a one big packet dump:
1) I'd like to have some white-li... |
I've been using Terminal under Mac OS X for years but somehow missed to spot this feature:
I'm now wondering how does this actually work, and is it 100% safe? If it isn't, what technique could be used to still get the keystrokes?
|
If you have a random block of data and you encrypt it with a key, how can a brute force script tell when it has found the correct key? Is it possible without some sort of reference to the original plaintext?
In a normal situation, an encrypted piece of data like a file or etc. would have some sort of recognizable struc... |
I teach at an academic institute. We have decided to add a mandatory course: Introduction to Cyber Security.
We know that most of our graduates won't stay in academia, but will go to work in the industrial sector. Nevertheless, we believe that at least basic knowledge in information security is a must today.
The course... |
Reverse Path Filters are generally used to disable asymmetric routing where an application has a different incoming and outgoing routes. So idea is to prevent packet entering from one interface leaving via the other. But there is a conflict of opinion regarding security risk of disabling reverse path filtering. My ques... |
I understand the ssl handshake flow, but still need few verifications:
If I'm trying to forge another handshake the client will fail because, and only because the certificate I'll send him back is not trusted?
I understand that the session keys (symmetric) are used to decrypt/and encrypt the data.
Where are those sto... |
I want to learn Pen Testing and already know Java and have been learning Python and am fairly comfortable with Python syntax. I also have some knowledge on Linux and TCP/IP.
My questions are:
How can I learn to script tools in Python for Pen Testing as I have no idea where to begin, at present I have only used it to so... |
I'm looking for ways to send private messages over a public channel, and in doing this I stumbled in asymmetric encryption, which is just perfect for what I was looking for at first - A and B communicate directly, over a public channel.
However, it is now my concern that the security of the message might be compromised... |
I was considering adding HOTP as an option to my website (alongside things such as SMSed one time tokens which I already have). But I was considering one issue that HOTP inherently has:
Things such as the iPhone usually get backed up along with all app data. That would mean, say I'm using Authy to generate my OTP token... |
I'm writing a paper for class and one of the things I'm writing about is internet security. I know that SSL certificates can be easily obtained and are supposed to encrypt data on SSL certified pages.
I know that people experience issues with making their site fully secure even with purchasing SSL certification - so j... |
I am in the process of writing a Scope for the information assets - in preparation for writing an ISO27001 compliant ISMS. I am confused as to if a VPN network is considered to be in Scope? as well as things like the Wireless access point for clients?
The word information asset is confusing to me. Any information th... |
So I'm doing my undergraduate thesis, I would like to explore how cross site scripting sql injections occur. And for the purpose of the thesis I'd also like to create a fictional website that is vulnerable to cross site scripting and sql injection and then evaluate the different ways that such attacks could be prevente... |
I have a web application that is exposed to the Internet, and am interested in creating alerts, or prioritizing the manual review of failed logins to the web application.
What thresholds, or formulas should be used to determine when a failed login should be reviewed in more detail? (Assume that an alert could be tr... |
I have a Master Identity key (which is detached from my daily-use keyring) and both encryption and signing subkeys (all are RSA).
I sign documents with the signing subkey: GnuPG selects this key automatically from my daily-use secret keyring (possibly) because the master key isn't present.
I'm not sure whether I should... |
let us say, I use program "x" for my e-mail security. through them I have a public key and a private key. My friend uses program "y" for their e-mail security and consequentially have a public key and a private key. The question is when I use my friend's public key (not from my program) to send them an encrypted e-mai... |
So far as I know, in iOS there are three techniques of function hooking:
preload library using DYLD_INSERT_LIBRARIES
imported symbol table redirection using fishhook
patch the functions when they are already loaded - i.e. already in memory using substrate MSHookFunction
These expose security issues so I wanna be able... |
I once heard the NX bit was a panacea, then that it was not.
One detail I've wondered about though:
Does the NX (no execute) bit protect against code inserted into the stack and executed there?
It seems to me that the stack, because it's not the heap, might not be protected by NX usually.
THanks.
|
Lately, I've noticed that many web server configurations reflect the method of an HTTP request sent with a non implemented method in the body of the server's response.
For example, A request sent with the method GETTT will be responded with a 501 "method not implemented" response code, while the body of the response an... |
Has anyone tried to do secure renegotiation on OpenSSL and verify it using WireShark? I can't seem to do a secure renegotiation as far as RFC 5746 is concerned.
I tried to issue the connection command "R" as suggested here. However, when I look into the packet captured by wireshark it shows the message is encrypted. In... |
Recently I put some hidden links in a web site in order to trap web crawlers. (Used CSS visibility hidden style in order to avoid human users accessing it).
Any way, I found that there were plenty of HTTP requests with a reference of browsers which have accessed the hidden links.
E.g : "Mozilla/5.0 (Windows NT 6.1) App... |
Whether I use openssll or gnutls's certtool, I end in a single threaded part which take several minutes.
When I try to compile the libraries with auto-parallelizer advanced efficient tools. It sill stay single threaded.
I would like to understand more before diving in large part of code for manual rewrite...
|
Recently on stackoverflow I've seen many discussions that mysql_*_escape_string is deprecated and instead recommending PDO.
The way I've been doing it was to allow only letters and ' in the name field , allowing all the characters in the password field (but then hash it ) and then using mysql_real_escape_string to esca... |
I recently stumbled on descriptions of the 'QuantumInsert' attack (mainly used by the TAO group from NSA). This technique seems to be massively used to perform man-in-the-middle or man-on-the-side attacks to insert viruses on specifically targeted computer systems.
Bruce Schneier has several notes on it (see here and t... |
I'm reading up on the Cryptolocker virus, and I came across this comment, it says:
And one additional measure: disable the default "Hide extensions for known file types" check box in Explorer. I still consider this one of the stupidest moves MS ever made in Windows.
The comment has 17 thumbs up, and comments below ag... |
I'm new to OAuth (1 & 2), and I'm developing the server side of a mobile app that has a form with a "Fill Details from Google account" button. I don't need any long-range authentication\authorization.
From here (Listing 2) I understand that the server should have a controller that:
When called without a code in the qu... |
I was requested at the login page of a website to first change my password. After typing in a new password, the web page told me the new password did not differ enough from the previous one.
Does this mean the company that manages the website does not store the passwords in a safe manner? Or is there a way to store the... |
I've personally seen it recommended that every time a user inserts a USB thumb drive into a computer, that the thumb drive be scanned for potential malware and malicious code.
However, if all that's on the thumb drive is an empty FAT-32 or NTFS filesystem, does the threat remain? Is there a way to manipulate firmware ... |
(Cross-posting this here on the advice of a user at stackoverflow...)
Got a philosophical security question for everyone. I'm sketching out an ASP.NET web application design where sensitive data for different organizations/clients will be stored in a SQL Server database. User authentication will use ASP.NET Forms Authe... |
If you have an HTML file that contains the following code :
<!doctype html>
<html lang="en">
<head>
<meta charset="UTF-8">
</head>
<body>
<script type="text/javascript">
var a = '</script><script>alert("xss")</script>'
</script>
</body>
</html>
when openin... |
I have a little problem with encryption. I have this cipher text "AA969CF9657F77C597C8EAFF1594D59374E4977F" and i know that correspond to "http://jogos.meo.pt/". I have another samples, but i can´t find any analogy or logic, with the intuit to discover the algorithm of encryption. Can anybody help me??I really need thi... |
I was required to create key exchange module for custom Rest framework which supports document level security in REST requests.
Framework has its own security module which allows to encrypt parameter entities in rest request when keys available.
I have done some research and found that ECMQV key exchange algorithm can ... |
I tested a web application with a commercial tool (IBM AppScan) for penetration test. I found a bug which is related to Missing Secure Attribute in Encrypted Session (SSL) Cookie.
The web application is written in .Net so I have added this content to web config:
<httpCookies requireSSL="true" />
After that I checked ... |
There was a lot of news in the past year about exploitable weaknesses in cryptography which originated from weak random number generators. In some cases it was negligence on side of the developers, in others it was intelligence organisations intentionally sabotaging standards for secure RNG generation.
What about the i... |
I'm getting my masters in cyber security. I have a bachelors in criminal justice. I would like to do missing and exploited children investigation. I'm relocating to Georgia. What kind of job should I apply for?
|
ISP can detect DNS requests for a web site, ie www.google.com .
If I have a website ie www.mysite.com, and a webpage ie www.mysite.com/mypage.html
and inside www.mysite.com/mypage.html , the web site www.google.com is embedded ( by using an IFRAME tag ). In this case, what ISP can detect ?
DNS request for www.mysit... |
I have an application with a user database. The database stores the password using a bcrypt hash with a randomized salt.
How can I implement a password history set (to prevent password reuse) in a case like this?
If I have the traditional 3 field password reset (enter current, enter new, confirm new) I could store ... |
I checked my internet setting today and it seem that everything has being going through some proxy server for the last few weeks. How screwed am I?
Could they get my internet login password? All my files on Dropbox? I buy things online too, is my credit card compromised?
EDIT:
The IP of the proxy is 85.214.85.193, b... |
When you search the PCI website for validated payment applications it shows a re-validation date and an expiry date. There is also two categories of payment applications, "Acceptable for new Deployments" and "Acceptable only for Pre-Existing Deployments".
There are applications listed that are past the Expiry date. Th... |
I have some secure data created in my client app which I wish to store on the server as backup for the user.
The user already has a password to authenticate with the server. The password is never sent to the server (I use SRP6 to authenticate the user).
So here is my thinking...
Use Fortuna PRNG with multiple event in... |
For example, websites that are built in ASP,PHP,Ruby?
|
This is a follow-up to the following question: Can a website determine what OS or web browser a visitor is using if the useragent is blanked/changed?
If I have understood the answers correctly, a website can't determine what OS the user is using if he's running NoScript, so that no Java applets or Javascripts gets exe... |
I was at work using my phone. We have an open WIFI, but I did not use it to go online. I was wondering, can my information be viewed or was I transmitting data even though my phone said I was not connected to their WIFI?
|
For this I am assuming we have a server that is of a client or a friend, so we the helper are not innately familiar with exactly how things should be be.
What are good commands and ways to check to see if anything bad has been going on?
I know we have: the 'history' command, to see commands that have been entered and t... |
With their permission, I am selling a company laptop that I used, but I had been using iTunes and syncing my iPhone on that PC. Is it possible for a forensic tech to retrieve any of the browsing history of safari through the stored back ups of my iPhone? And retrieving any emails or messages I have sent out? I had the ... |
Can the data be easily intercepted when (or after) the card is swiped? My main concern is at a trusted vendor. There are two possibly different situations:
1) a typical point of sale scanner with a land line or internet connection
2) a standard reader on a smart phone, using the supplied software
Does the typical syste... |
I thought I knew how two-factor authentication works:
I enter the password.
Server generates a random number (token) and sends it to me via SMS.
I enter this token.
Server checks that the token I entered matches the one generated for my earlier 2FA request.
But today, I discovered Authy, and it looks like I don't kno... |
I may be asking for something impossible here.
I want to know if it is possible to set up a 3rd party storage system where the service provider cannot decrypt the clients files, but can de-dupe the files if two clients upload the same file.
I think I'm right in assuming that this would require that the two clients uplo... |
I'm trying to find self-contained encryption solution for USB drives while at the same time being platform independent. For example, Windows' BitLocker only works on Windows and not on OS X or Linux.
If I'm going to use TrueCrypt to encrypt the drive, it will need to be installed on the host computer somehow. (On OSX a... |
Question
As a regular Internet user, how do I check if my current HTTPS connection to some website is using perfect forward secrecy?
Example
I've taken two screenshots from my HTTPS connection to Google. Can anyone help me to interpret the information?
|
Or is authentication essentially incompatible with anonymity?
If we have the idea that authentication is proving that someone is who they say they are and anonymity is essentially having an unknown identity, could you have a system that could authenticate you but that you could still use anonymously?
Would adding a 3rd... |
Right so I'm developing very private systems recently, and I'm looking into admin login protection. I'm a PHP dev with essential knowledge of js/jq. While I handled most of the stuff so far, I'm looking to protect the login process itself. Now, from what I understand, only internet explorer is allowed to hook into a de... |
Importing a GPG key with a KeyID or fingerprint seems to rely on keyservers. Doesn't this invite man-in-the-middle attacks, in which someone would alter the keys to allow them to decrypt the data? What measures are in place to prevent this, and what alternatives are there to using a keyserver to and a key to a keyring ... |
I'm a part of a software start-up. I've the role of IT admin as well as requirement gathering (business analysis). Right now we're a team of seven people and we all are in the 'core team'. Now we're planning to lay down a email policy for the company. With my knowledge and experience I proposed the following things:
E... |
I want to experiment with web development (using django) for both desktop and mobile. Server, phones and desktops could all be part of the same virtual private network. The VPN will be from some professional, commercial vendor. I'll be the only user of the apps. I'm trying to find the easiest way possible to secure the... |
When setting up clients with WPA2 EAP-TLS, most clients (ie: my phone, my computer) require both a client public/private keypair (for obvious reasons) and a certificate authority certificate.
It's this second parameter which I'm not sure of the use for. My current setup looks like this:
.
└── root-ca
├── wifi-clien... |
What are the characteristics of the ideal digital signature for cryptocurrency transaction verification?
The reason I ask is because this answer about bitcoin signatures describes a potential vulnerability which makes this particular use of ECDSA sub-optimal with a possible solution in the comments.
I understand that t... |
I've been given an APK file, and before re-distributing to the "market" I want to make sure the given android app does not contain the malware. How can I do that ?
Business use case is similar like : I am a "market provider" or :"reseller" to which developers will submit the developed apps. To guard my reputation : I w... |
It's my understanding that the more bits an encryption key has, the longer it takes to break the encryption. What is the down side of having a larger encryption key or why don't we see keys of size 2^100 bits? Someone I worked with said it's the law made by the government encase they ever need to crack it, but this doe... |
I have a pretty standard registration form. One thing I've decided to do away with is the requirement to enter the password twice, for usability reasons.
In order to mitigate the increased risk of inputting a wrong password by mistake, is it ok to send the password in the welcome email to the user? This would happen in... |
Most of the credit cards require PIN to authorize transaction. Recently upon a transaction the merchant required my signature and not my PIN. I understand this is another sort of authorizing the transaction. But this is more to held me accountable , if i denied the payment.
It doesnt offer the security of a PIN since ... |
In an effort to increase security of our website, I'm reading up on Gazzang zNcrypt, which claims to protect data in databases from breaches.
Technically, it seems to do filesystem encryption. As far as I know, this is effective against hackers gaining physical access to the harddisk. If hackers manage to login to the ... |
We have to setup a central auth for PCI compliance and I'm wondering if it's ok to allow anonymous bind or should I create a user to do the bind for the services needing ldap?
|
How would it be possible that if my password was 123abc that my bank also accepts something like 123abc12?
Isn't that an extreme security flaw? If the password was hashed and salted, wouldn't the latter create a completely different digest?
|
Right off the bat, I'd like to know if there is a widely used library or standard that I could adopt to replace my "custom" scheme. I am certain that I, as one person, cannot produce something better than a community produced library.
That said, I am a security novice, and while reviewing other implementations did n... |
I'm working on a site that has a higher-than-normal concern for user security. I've recently been working on some CSS issues with older versions of IE (we support 7 and higher) and found that an easy solution to some of them would be the use of HTML Component files (.htc) to add certain CSS3 behaviors.
http://msdn.micr... |
I am currently writing a TOTP implementation in PHP (but this applies to other languages as well) and of course want it to be as secure as possible, what should be considered?
After reading the relevant RFC 6238 and RFC 4226 my implementation currently looks like this:
Every single used code is blacklisted for 2 minut... |
I'm quite a bit of a traveller. So i tend to just stay with my smartphone and sometimes notebook. I'm not a security expert but i would like to check how to know if wifi is safe to use. For example, at airport or cafe. Sometimes, cafes or hotels offer wifi without password or some kind of login page before use. The on... |
The general consensus I hear among security professionals is that USB drives are dangerous. In most organizations (that I have worked at), USB drives are either forbidden or employees are required to get official corporate drives that only work on corporate devices. I don't hear these same concerns over, say, SD cards ... |
I'd like to learn the top-shelf methods for designing and managing a generic X509 certificate infrastructure. There's some books here and there, but I figured I'd ask if anyone here has any favorites.
Books, web resources, etc?
(or is this not the best exchange to ask?)
|
I'm trying to set up a hidden web service over the Tor network, and I was thinking of making a configuration where my Apache server and my database server are located on different networks.
I know this will introduce a lot of latency, especially since no server will know where the other is (Tor will be running on both)... |
I'm looking for some interesting ways to redirect URLs. For example, http://example.com:@example.org will redirect to example.org. Are there any other ways to redirect/spoof URLs in a browser like that?
Any help is appreciated.
|
I was looking at this code and came across these comments which says encrypting without a salt is insecure. Why would it be insecure when you are already using a random IV for each value? I think the comment might be incorrect, but it is a popular gem so I wasn't sure. I think it is treating key really as a password, a... |
Why is port 53 open on the WAN side of the router? And more importantly how do I close it?
Port 53 is not one of my forwarded ports.
Discovered by doing
nmap -pT:1-64 <my-external-IP> -Pn
Output:
[...]
PORT STATE SERVICE
53/tcp open domain
[...]
How can I close that security hole? (see Listing of DNS vulnerabiliti... |
Assuming that an AS/TGS secret key has been compromised by a 'man in the middle' attack who in turn can monitor the network traffic, is an attacker able to find out the Client/Server session keys between clients and services and can they find out which clients are trying to access which services through service ID's?
|
There's the recent article NSA seeks to build quantum computer that could crack most types of encryption. Now I'm not surprised by the NSA trying anything1, but what slightly baffles me is the word "most" - so, what encryption algorithms are known and sufficiently field-tested that are not severely vulnerable to Quantu... |
We have an app running where among other things people can send messages to each other. Obviously admins and content managers that have access to CMS can see what people are sending to each other. Is this usually encrypted and if yes, how, with what encryption?
UPDATE
The entire site is SSL encrypted, I'm specifically ... |
The Wikipedia article about the Merkle signature scheme claims that it is
very adjustable and resistant against quantum computing.
What proof is there of this?
|
And having found a server IP that is controlling it. How can I find out the log-in credentials this client uses to log in to a IRC channel / server webpage / control panel. I have found out a python script the host gets. Just cant get myself to find the C&C server to mess around with it.
|
http://www.networkworld.com/news/2013/112513-bitcoin-robbery-276352.html
In this story we can see BIPS got hacked, but I don't get how it was hacked when it was offline because of the DDoS.
|
I've done a lot of searching on SE and particularly here in regards to preventing issues or attacks for an image based website to accept image uploads, but I haven't seen anyone mention the idea of adding a limit on the number of file uploads per a period of time on the server, and wondered if this would be a good addi... |
I see relatively many referrers such as the following (as reported by Webalizer) in a web server log. The server is located outside Russia and it's a small one.
8 3 http://tiandeural.ru/
19 3 http://timetorest.biz/
20 3 http://vigrx-original.ru/
21 3 http://www.rukinolenta.ru/
22 2 htt... |
I'm building a secure system which stores messages on a server in a Postgresql database. The messages are stored encrypted with PHP's openssl_encrypt() function with the AES-256-CBC method.
At the moment the key used for this function (lets call it the ApplicationKey) is stored as a file on the server with only read a... |
On Windows Server 2008-R2, certain javascript files are exhibiting the same behavior. Text can be copied from other files and pasted into new ones.
In both NotePad++ and Windows' default notepad, characters in specific areas will either suddenly be hidden depending upon what's next to it or even switch order.
Is this ... |
I get files with random extensions sometimes in order to bypass corporate firewalls. Usually I would just ask the other party what it is that I just received. Other times I get curious and open the file with notepad. Sometimes the file would have a plain text header which describes how to open it. Could this potentiall... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.