instruction
stringlengths
24
29.9k
I'd like to find a way to block or restrict my access to the web-pages where my password is sent as a plaintext on the internet. Let's assume if I have the same password for all web-pages, is it possible to set this up with iptables? if so, how? I am a very new Linux user. Thank you for your help.:)
I'm confused by some terminology - reverse engineering seems to me to be pretty similar to exploit researching. I mean if you can reverse one program probably you will be able to find a vulnerability, but for this you need to be good with C and Assembly. A lot of people tell me that a pen tester should master python an...
I'm just curious if new version of backtrack Kali be hacked like back-doored or crack user password like the windows or mac
The URL filtering can block the HTTP traffic but not the HTTPS traffic in Internet Explorer. For example, the website http://www.facebook.com is blocked by the URL filtering while the https://www.facebook.com cannot be blocked. You cannot also block the HTTPS traffic during InPrivate browsing in Internet Explorer. Is t...
If someone discover an unknown vulnerability for a given online service or website, is there a decent way to sell it directly to the concerned entity.
I was wondering what the effect on strength/security is If I would use an aggregate of multiple hash-functions. For instance, I don't want to sent passwords in plain text (although it's over an SSL-connection) down the wire. So I hash the password client-side with javascript: js > hash = sha256(Password+Username); T...
I'm looking at Resource Monitor in Windows 7 and wondered whether a process could be hiding in plain sight by mimicking another process. For example I've renamed an executable file as chrome.exe and when I run it it shows up as chrome.exe under the Image column, the same as Chrome itself - but the Description is differ...
I am often getting DDOS attack from multiple IPs with simple HEAD requests. There are around 30 unique IPs creating such attacks. 201.230.167.68 - [05/Jan/2014:00:19:19 +0530] "HEAD / HTTP/1.1" 301 5.000 0 "-" "-" - - 77.121.228.31 - [05/Jan/2014:00:19:19 +0530] "HEAD / HTTP/1.1" 301 4.792 0 "-" "-" - - 186.64.78.24...
I am using Private Tunnel to do some tasks involving sensitive data like logging in to PayPal and online banking. Is my data safe or can it be retrieved by other users of the Private Tunnel service?
I've received a spam email that claims to be invoicing me for some service in New Jersey, USA with whom I've not had any dealings. The email includes a link to a zip file that is hosted on a greek restaurant website in the Netherlands. This, to my mind is a compromised website who are most likely unaware of their situ...
If I have a: router with stateful packet inspection turned on, plus WPA2 security on the wifi network an IP camera or webcam connected to this Wifi network Is there any way to ensure that: camera itself can't try calling some external service and bypass the SPI firewall only way to view the video feed is to ssh into...
I use Nginx compiled with the Naxsi module to protect against some vulnerabilities (SQL injection and cross-site scripting). Now I need to apply a layer of poor man's DDoS protection at this level. I read a lot to come to the conclusion that there are three recommended approaches: two modules for Nginx and the option t...
I am trying to understand the concept behind XXE (XML External Entity injection). I went through OWASP Guidelines on XXE And since I am new to XML and DTD, I went through the W3Cschools tutorials as well on these topics. Now as per my readings I tried creating a demo of XXE. So below is my attempt to do the same : - <?...
During client authentication, neither the secret key nor the password is sent to the KDC. If a user changes their password on the client, how is the password updated in the password database in the KDC?
I want to avoid people installing the app on virtual devices. Is there any way to tell this? What is best you could do? Ideally what i want to prevent as a whole is one person or entity creating many accounts to analyze my service easily. The app is only a portal and the processes are server only. I use captchas when a...
I just started teaching myself cryptography, I am reading this http://www.garykessler.net/library/crypto.html to understand the basics. I am confused by Sections 3.4 and 5.3. Section 3.4 details how to combine hashing, secret key, and public key crypto to get a secure connection over an unsecured network. To make the d...
Can anyone provide a good list of resources to learn network penetration testing? I am specifically looking for those having hands on exercises (kind of virtual labs/ISOs) which are free. I know web-apps like Mutillidae or even Google Gruyere are good resources for learning pentesting but these are good for web-app pen...
i'm getting re-acquainted with OpenPGP and noticed that GnuPG allows me to store a "preferred keyserver" URL in my keys: reuben@localhost:~$ gpg2 --edit-key 'Reuben NP Garrett <my-special-email@example.com>' gpg> help .. keyserver set the preferred keyserver URL for the selected user IDs this seems to influence GPG...
Recently I've been receiving in my SPAM folder, SPAM mails sent "by me". With "By me" I mean, that I am not sure if those are really sent from me. It has been happening since December, at around one email per week. I've changed password 3 times. The last time, two weeks ago, I enabled two-step verification, so I guess...
I would like to store data, and send it by mail. What is the best way to encrypt it, and being able to decrypt it? My guess would be RSA, but is there a better way? (Considering that the other person knows the algorithm and has the key)
Do current mobile cellular networks like 3G offer enough security? The article from Info-Security states that 3G encryption cracked in less than two hours. Could a eavesdropper or man-in-the-middle attack be launched on a mobile device? Should we be using a VPN such as Hotspot Shield?
Location services - such as https://www.lociloci.com - allow you to track any phone as long as the person replies to a text to allow the tracking to be performed. How do these services receive the location information from the phone networks and are networks legally allowed to share this information with other companie...
How effective signature-based Antivirus is, in detecting encrypted malware?
I've stumbled over some code in an application where (certain) users are allowed to input where conditions. In addition to this there is a part of the where condition that is set as a parameterized query. E.g.: select foo from bar where <user generated> and foo = ? (Besides this the user generated portion is run throu...
I'm working on a simple secure mirror for potentially untrusted services like Dropbox, Owncloud and so on. (Current code may be seen here: http://www.codeduce.com/extra/secure_mercurial) Currently I'm relying on 7zip for encrypting the individual files. So, I am encrypting every file with a password and mirror it to th...
Given two companies managing two separate websites, the client wants the user to be able to log in to one website, and then click a link to navigate to a certain part of the second website. The client wants to eliminate the need to log in a second time upon arriving on the second website. I'm thinking the solution is ...
My laptop has windows 7 installed. One Saturday night I couldn't fall asleep and was just lying in bed. Then suddenly at around 2 in the morning I heard the fan of the laptop start up and lights on the laptop started blinking. The lid was closed, and I didn't want to open it because I had a headache. The fan was on and...
I heard once from someone I trust, that the French governement is about to buy and certify a software to put on tap an internet line even for HTTPS connection. I don't really care about the legal issues it brings because this product will be use anyway by law enforcment, but I'm quite interested in how it is possible....
In the old days I would emphasize that people should not select the remember passwords option because (besides the fact you tend to forget what the browser remembers) a bad guy could display the password (if he knew how) and read it there, and then use it later. These days the passwords can be encrypted using a master ...
Is it feasible to authenticate users such that they should be prevented from creating multiple accounts, and that their privacy is not impaired (i.e., no personal information should be revealed to the application). I'm thinking client-side biometric authentication with hashing? I think biometric authentication might sc...
I seem to have a serious problem of being attacked and after looking up the attack source, 99% come from China, then Korea, Hong Kong etc. Here is a fraction of the report from my Router, which is a Cisco WRVS4400N router. 1 2014-01-06 14:53:32 CHAT GoogleTalk login attempt -2 173.194.73.125 2 2014-01-06 14:52:...
What technique is used to hide a process from Task Manager? I'm currently researching ways I can do this in C++. Is this process called hooking? http://www.codeproject.com/Articles/3978/Trap-CtrlAltDel-Hide-Application-in-Task-List-on-W The book I am self-studying from: RootKits: Subverting the Windows Kernel
I see nobody here has asked this question. What if one, instead of just using a single proxy, connected a proxy-to-proxy in a very long chain and downloaded something (illegal) using secure packets (so no one can see what OS, etc.) through the long chain of proxies back to them? Wouldn't it be too wasteful to go throu...
Is it possible to perform null byte injection on PHP code? And, how would vulnerable code look like? Could you give me some examples, as I noticed that: <?php echo $_GET['get']; Will not make code vulnerable. I want to know, what are possible security flaws in code that can cause this kind of vulnerability, if poss...
I work for this telemarketing company, and when I went to work this morning all my fax machines' outputs were jammed with black paper with the faded words "f*** you" transcribed on each of them. I looked it up and it says its an electronic attack called a 'Black Fax', what should I do?
Basically I'm wondering if a Skype video session along with audio could be logged (or recorded) over a virtual private network? I know whoever hosts the VPN server can log which websites you visit (or how often you visit them) along with other sensitive material such as user names, passwords, emails, and bank account n...
I have asked this question: False positive Apache version in scanner results on Centos I need additional clarification: Do you know if it is possible to configure Nessus to adopt Red Hat backport security updates? I want to prevent false positive reports from Nessus. Example of false positive report: Apache 2.2 < 2.2....
i designed code for uart module now i want to include Encryption code before sending the data which algorithm is better for me RSA or AES
I've spent many hours on whitebox testing to make sure my code was safe. From a theoretical standpoint, the code SHOULD be safe. I then used several widely known testing tools (including one that cost $3500) to test for SQL injections, cross site scripting, CRLF injections, file handling security, and more. All softw...
Correct me if I'm wrong, but for a node to participate in peer-to-peer, if it's behind NAT, it must port forward to be able to connect. Why is the port forwarding necessary? I know there are exceptions to this i.e. NAT traversals, but I'd like to understand the basic problem first. Can anyone explain in very simple ter...
Please excuse my ignorance as I am new to information security. Could someone please explain in simple terms what the difference is between key generation and key agreement. In which situation would I use which. Keep it simple please.
I want to test our DOS prevention system against http requests that are not have header and agent information. Is there any tool I can do that. I tried siege with this command siege -c 3 -b -H "Host: " -A "" http://10.0.1.2/ This command sends requests with empty host and agent values. What I want is to send request...
What are the windows privileges that deserve to pay attention to prevent a user (non-admin) to escalate his privileges to the local admin group ? I know SeDebugPrivilege, but what else ? Thanks. Edit for clarification : I am looking for a list of privileges that can be abused during escalation attempts. The goal is to ...
I am wondering wether a CSRF attack, will disclose the information being sent back in a GET request. I need to send a social security number out, to the client a few times, and it is NOT anyone else should ever be able to receive. The data is guarded already by HTTPS, but I know that won't stop a CSRF attack. The reque...
Background: I'm working with Node's crypto library. I'm using PBKDF2 to convert a variable-length binary "passphrase" into constant-length keys for an AES cipher later on. The underlying source of this passphrase data, for reasons out of my control, is encoded with base64. Out of habit, I decode the passphrase back to ...
I'm using Windows 7 and decided to learn Linux Administration (Centos 6.4) using Oracle VirtualBox to host the Linux system. In my network configuration I choose "Bridged Adapter". I set the VM's IP to 192.168.1.104 and my Windows host is 192.168.1.100. As I do not have much RAM I did everything using SSH. SSH was set ...
I was wondering, If I got infected with a Keylogger and I start my On-Screen Keyboard(from OS) and type things, will the symbols will be recorded (considering no Screenshots Keyloggers)? Since Keyloggers act on keystrokes I think this may work against Keylogger, correct me If I'm wrong.
So reading this blog post, I know how the password reset works and how it's exploitable, but in a real case scenario, how would XSS be possible? Is there a way to send a victim to a page with the host header edited? Thank you!
How well do the various biometric authentication methods currently perform in regards to precision and recall? Can anyone cite a relevant research article?
Found this rather detailed list of the NSA's latest spyware gadgets, with several different remote bios exploits that once installed are virtually undetectable and can survive reinstall of the OS: http://leaksource.wordpress.com/2013/12/30/nsas-ant-division-catalog-of-exploits-for-nearly-every-major-software-hardware-f...
I'm working on a project that would use bash and FastCGI to create a pseudo-CMS. Are there any kind of security concerns to watch out for within FastCGI itself over a well written bash script (for example buffer overflows, and the like)?
I'm wondering how to successfully detect malicious activity in my web server traffic? Could you point me out some popular solutions which can help me to detect attacks on my web application? I didn't find similar questions with sufficient answer. I will appreciate any answer. B
Disclosure - I'm not a security professional - but I have a security issue (I think) I need to articulate to a client. We have a partner organisation that has built an API for a mobile app we're building. Rather than use oAuth for the facebook login - we're required to POST a user's facebook ID to the API endpoint, vi...
I have a web application that sends "change password link" to user that wants to changhe his password. The link is something like this: http:// www.my-domain.com/changepass?uid=username&secretkey=some-hardly-encoded-secure-key Is it possible to change my email content before arrival? I have a scenario in my mind but ...
Lets say I have a self-signed root certificate called root-ca.pem created by openssl. It allows me to sign certificates. Is it possible sign new.csr certificate with root-ca.pem such that the issuer from signed new.csr would be different from the issuer who signed root-ca.pem?
I have been using a key pair at home with gpg command line tool on Ubuntu, to encrypt password text files for a few years now. I no longer have any record of the type of encryption and bit length used when I created the keys so I would like to identify it and decide whether the encryption is strong enough for the next ...
I've been SSHing into my VPS for months with no problems and this morning it returned this familiar message: The authenticity of host '[hostname]' can't be established. ECDSA key fingerprint is 05:39:ac:73:c3:ba:f4:16:57:74:66:c0:a1:81:6a:fa. Are you sure you want to continue connecting (yes/no)? ^C I have not reinsta...
If I had a website http://site.com redirecting to https://site.com via javascript (with a HTTP/1.1 403 Forbidden), what are the attack vectors I could be vulnerable too? Why is this not a good practise? (and the preferred way is to do a 301 from the server side) ok SEO while a 301 is preferred for the search bots. dis...
Is there any Guideline Doc. or Tutorials for writing Security Functionality Requirement (Common Criteria)for a product?
I was just wondering why there is a file on your computer implementing the trusted root CA's instead of something similar to DNS where there is a file on root servers that computers check against to retrieve the list of trusted CA's? Thanks again, Francis
I want to publish some information in my country that is in the public domain that is in a hard to read format. What are some reasonable steps I could take to help ensure I am not identified or make it reasonably difficult. Update: To elaborate a bit the Government won't be coming after me, its their publicly posted da...
I'm working on a project that splits large files into several encrypted fixed-size blocks (e.g. 4KiB). Those blocks shall be used to be stored persistently on a storage device. Blocks are encrypted symmetrically and each block has its own Initialization Vector. Unfortunately I am unsure how to "generate" those Initiali...
A few sources state that the DH keylength (bits of the prime) should match the keylength of rsa for TLS. For example SSL_set_tmp_dh(3) from openssl has example code on how to match the dh parameters to the key being used. Obviously, one doesn't want DH to be the weakest link in the chain. Using AES-256 and only securin...
I was wondering if someone can become a victim of a DDoS attack as home user when only his IP is known by the attackers but he is behind a router with no open ports or other known vulnerabilities? I'm mainly interested because this becomes more and more a topic in professional gaming (which I like to watch). But my fee...
During a penetration test for a client, having an infrastructure with multiple (5) Active Directory Servers (Win Serv 2008 R2)... I found a nice exploit to drop a system shell in one of the servers, and stole the domain admin account with mimikatz. But the problem is, I used quarks-pwdump to dump the hashes... And I am...
I don't get the correct results and I'm not sure what I'm doing wrong: $ ./hydra -l admin -x 3:9:a http://localhost http-post-form "/admin/login:j_username=^USER^&j_password=^PASS^:failed" -s 8088 Hydra v7.5 (c)2013 by van Hauser/THC & David Maciejak - for legal purposes only Hydra (http://www.thc.org/thc-...
Recent leaks about widespread NSA surveillance have brought privacy and security to the forefront of the public consciousness as we strive to determine best practices in governance for the Internet era. People are also concerned about network neutrality and how the Internet currently relies on protocols (such as DNS) t...
A web application I'm developing needs to store some sensitive data in a database. I need to be able to retrieve and use this data later on so hashing isn't enough. The web application might, at some point in the future, be load-balanced, so I'm trying to get things done correctly now instead of battling this later. I'...
I'm receiving e-mail from my PHP/MySQL application with certain links. I was thinking on including an UUID as part of the link, which would point to a Web Service that ONLY reads those UUIDs. Those UUIDs will be stored in the database and the Web Service server will understand what to do for each UUID (execute a SQL st...
Is there any danger of any of my computer's files being read or changed (mainly - infected by malware) in the following scenario (I'm using Windows 7): I have file sharing turned off (in "advanced sharing settings"). I connect to a public wireless network (such as at a restaurant), and surf the web. Assuming: No vuln...
A security scan result prior to the deployment of a web application on Windows Server 2008 R2 has raised the below message : Weak SSL Cipher Suites are Supported Reconfigure the server to avoid the use of weak cipher suites. The configuration changes are server-specific. SSLCipherSuite HIGH:MEDIUM:!MD5!EXP:!NULL:!LOW:...
Can we control the SSL version for ClientHello (like passing the lesser version then maximum supported)? I am using Java client to connect to App server. Currently my client is supporting TLSv1.0 and App server is supporting SSLV3, TLSV1.1 and TLSv1.2 but TLSv1.0 has been disabled due to its vulnerability to BEAST atta...
Assume I have root/administrator access to a given computer which is currently being controlled via LogMeIn from an outside location. I see a password being typed into a browser (as little black dots). Is there any way to extract the content of the password? The question is OS-neutral though I expect that some answe...
In order to protect a Windows administrator account from attacks such a Pass-the-Hash and other Token Passing tehcniques (e.g. via Incognito tool), can you tell me if it is a good idea to remove the privilege "SeImpersonatePrivilege" on which Incognito rely on ? If this privilege is removed, it should be impossible to ...
We evaluate using Windows EFS on Amazon EBS. There is a report about Windows flaw that allows you to copy data from an encrypted volume as described in this article: http://slashdot.org/topic/bi/the-windows-flaw-that-cracks-amazon-web-services/ Aside from the Amazon staff, can other Amazon multi-tenant customers mount ...
I'm looking for some best practices documentation for implementation of a reverse proxy. We need to allow an internal database / web server incoming access to the outside world and are trying to determine the most efficient and secure method to accomplish this. We already have a Red Hat 2 server running a mod proxy Apa...
With elevated SQL permissions, I am able to export a blob and retrieve a pdf with employee data (SSN) from a SQL Server database. This database is a backend to a third party web app we use internally (and are considering the option to allow external users access to the website), so I don't have a lot of options in ter...
I am testing my own wordpress blog against security issues with wpscan. Honestly I have never done that before and was shocked after I saw the result. One vulnerability of my wordpress site is: [+] WordPress version 3.8 identified from rss generator [!] 1 vulnerabilities identified from the version number | | * Title...
In a scenario where a client is reading data from a server over SSL/TLS and then encrypts that data using a client-side symmetric key before saving it to the disk, how susceptible is the data to an in-memory attack (e.g., by tools like SSLsnoop)? Would the client need to do anything extra (e.g., get the data encrypted ...
I made a login system. The user can login by: using a normal email / password (bcrypted). using a service like facebook, gmail, etc. So far so good. Now I want to store sensitive information (ftp credentials) in the database in a secure manner. This is very easy for the first users: when the user logs in with their e...
I know most, if not all, ISPs log the IPs you had tied to your network, but do ISPs keep logs of the IPs you have tried to connect to? For example, let's say I went to google.com, would the ISP be able to go through their logs and find whether I have ever connected to that site?
My fiancee was browsing a website (www.medievalbridalfashions.com) and about to make a purchase when I noticed something. During checkout, everything appeared to be getting sent over plain HTTP. I made a dummy account, went through the checkout process, fired up Wireshark and looked at the packet that was sent and the...
What are the best practices for thwarting DoS attacks for a WebSocket server? Is there a comprehensive site or document that can be referenced?
I need to know what all information a random website can get from my computer, and whether a website can tell which of my two computers on the same router I'm using. I know websites can determine what operating system and browser I'm using and the IP address of my modem, but I'm wondering if there is any machine-speci...
I'm currently investigating WPA2 enterprise security options, and I'm curious about PMK Caching. I've found lots of vendor information about it, and understand that the client does not need to reathenticate to the access point during the caching period. Does anyone know what the likely attack scenarios for this are, ...
Before I even ask the question - this is a hard question to frame, so I welcome edits to improve clarity. How do major browsers decide how to cache responses, especially if said responses are retrieved via AJAX, and have no explicit Cache-Control, or other cache related headers? The applications I am testing are both f...
There is a number of services online like RightSignature or SignHub that will let you sign online legally binding documents. I understand how documents can be signed digitally and this can guarantee that they were not altered, but I do not understand how they can guarantee non-repudiation. For example, I just created a...
I'm trying to identify what exploits to guard against when anonymous users generate reports with PHPword and PHPexcel (or similar libraries). Specifically, I'm worried about textarea inputs where the user can enter about half a page. The amount of text makes it hard to validate/ sanitise the data. The two contexts are...
I'm using .htaccess to control source IP of connections to my web application. My configuration looks more or less like this: order deny,allow deny from all allow from X.Y.Z.Q These days we can trust less and less things, every days some commonly used technique is found to be vulnerable. So I started to ask myself qu...
You use multiple computers in work, home and mobile devices (android, ipad). You want to share your files between devices and you use physical sources: an SD card, dvds, a usb stick etc. with every flaw that it implies: losing the physical storage device, you lose all your data. This can happen by theft, fire, loss or ...
I need to implement a classification system for my company, similar to the government's. I'm working for a company working with the government. The classification system in my country isn't public so we can't just ask them how to do. We're required to create classification levels like: Top-Secret, Secret, Confidential,...
Many companies have policy again writing passwords and paper and I wonder if there reasoning is sound. Is it always better to use a software password safe than writing passwords on paper? Here are some pros and cons I can think of: Software password safe pros - easy organization - convenient - can backup (however y...
I've noticed some very suspicious activity from my ISP. Sometimes I would notice that when I ping google.com it would resolve to an IP which is owned by my ISP. I currently don't have an example since it is resolving normally at the moment. However, here's a weird thing. My ISP's DNS servers (41.128.225.225), 8.8.8.8, ...
Are there any negative security implications of setting the private key password (DSA in this case) as a PKCS12 (and then JKS) export password (instead of generating/inventing a new one)? My use case is that I need to export my PEM private key as PKCS12 so that I can convert it into JKS to import it into a Java based s...
My application has an Upload Management Module and accepts Excel and text files to our server. I detected invalid data inside some uploaded files (the uploader put <script>alert("XSS")</script> instead of the original data). I verified inside the database and that data was stored inside it. I would like to know if my a...
Reading Preventing SQL Injection Attacks in Stored Procedures started this debate between my partner and I---and looking for the right approach is not as straight forward. I'm no security expert--but what do a person do when you take a look at the first few lines of this stored procedure....and you see this. We haven'...
I'm trying to put some anomoly detection in place and I'm looking at referrer data (I know that this is optional, and can be fudged in some circumstances). But I'm seeing too many cases of what I believe to be false positives. From rfc2616: The Referer[sic] request-header field allows the client to specify, for the ser...
I am curious about something; let's say someone randomly added me to Skype and tried to initiate a chat with me and I want to know more about them but I am worried if they can do some damage. My question is, how dangerous would it be to have a voice call with someone you don't know on Skype ? What can a potential attac...
Hello I'm a beginner into IT security. I want to become ethical hacker. So I know how to use metasploit to write exploits, and how to use different fuzzers, but I think this isn't enough. I can read and understand code from a lot of languages including basic assembly - I can convert simple assembly code to C code or Ja...
We have a data warehouse that stores prices for our products. Once every business day, new data points are added representing the day's price for each product. On the website, a user sees this information on a page load. There are currently 7 products; analytics shows that the amount of page loads is about 100 per day....