instruction
stringlengths
24
29.9k
What do people mean by saying that X.509 certificates work in "top-down manner"? Do they say that because CAs can do cross certifications?
And know which are not default ones installed by Microsoft?
I have a set of bad URL's. I want to know the nature of infections affecting these URL's . Running an online scanner such as VirusTotal gives me some basic information from various engines about the URL in question like which engines tag a URL as bad, but the question of 'why' seems a bit unclear from these results. Is...
I'm interested in unique information that is beyond typical user knowledge or control. As of iOS 7, users can easily protect local physical tracking by controlling radios (cell, WiFi, Bluetooth) in Control Center. There are also now explicit privacy controls for Location Services, Contacts, Calendars, Reminders, Photo...
I accidentally typed my root account password on my google account login, I know google keeps their website quite safe but this question came in mind: Is there a risk if you accidentally type in another password in another websites login page?
Connecting via remote desktop to a Windows 7 machine today showed the last couple of seconds of a windows device installing and the "Your device is ready" popup for a Sony Xperia T. Going to printers/devices showed an image of the phone. There's no bluetooth on the PC, and there's no reason for such a device to have be...
I am not sure if I am in right forum. But i am having problem with this virus. On affected computer, If we use a USB drive, all the file become hidden. I am using HFV.exe for retrieve all data in pendrive, but still same thing happening for another pen drive. any solution for removing this virus from computer? tried ma...
Say you have a windows server that works as a PDC AD box. Is this a potential Attack Vector for a small 20 people buisness? Wouldn't it be better to simply have an encrypted database file with all the user info always with me? For example someone could enter the building and physically harm the server or gain access to...
I have been trying to make some extensions for chrome lately to block some unwanted stuff. I have also been searching for quite some time to find what a JDB does.So , the applet downloads a file , doesn't it?(silently) The java code I believe looks like that: (not crypted, sample file) public void init(){ try { in ...
I got a python script decrypted out of a pcap file it's communication from a botnet (proberbly the c&c) but when i start the script i ain't getting login or passwords. What does this script do? And how can i find the client controller? from twisted.internet import reactor from twisted.internet.protocol import Reconnect...
I'm researching certificate authorities, and I just have no idea what to think of the CA named x00Ax00-x00Tx00rx00ux00sx00tx00 x00Gx00ex00sx00.x00 x00fx00xFCx00rx00 x00Sx00ix00cx00hx00ex00rx00hx00ex00ix00tx00sx00sx00yx00sx00tx00ex00mx00ex00 x00ix00mx00 x00ex00lx00ex00kx00tx00rx00.x00 x00Dx00ax00tx00ex00nx00vx00ex00rx00...
I always hear conflicting things. Should I use a long sentence? Or is this privy to dictionary attacks? Or should I use a long string of random alphanumeric garbage with upper/lowercase and numbers/symbols/etc?
I would like to know briefly what are the best practice to protect corporate network from BYOD challenges nowadays? Thanks a lot!
Given a site that publishes unique content online and given that there are lots of site scrapers and persons stealing content and reposting it as their own, inevitably you will have the same content hosted on different sites. Is there any measure that can be taken to later prove, beyond any doubt, what the original sou...
My server gets base64 encoded passwords from the client, and I am going to hash them for storage in a credentials table. Should I decode the password and hash the clear text password, or just hash the encoded string?
My only operational computer has shown some wierd signs like disapearing logs, rotated logs gone random files getting updated and so on. Tho this is my only operational computer and I have decided to nuke it. My question is can I trust this system to download and burn my OS? If not what can I do to nuke this computer s...
I'm having trouble understanding how an encryption key works. for example: if the word was 'hello' its encrypted value could be 'GHSSDgsd2', what would happen to the encrypted value if the key was 'dog'? how would it change the encrypted value of 'hello'?
I've got an SSL certificate from GoDaddy, and it's time to renew. I ended up with a single "keystore" file, which I give to my webserver (Jetty). This is the process I went through to generate the original keystore file, which gets to my final point of confusion: First I generated my keystore file: keytool -keystore ke...
I'm having trouble understanding how an encryption key works. for example: if the word was 'hello' its encrypted value could be 'GHSSDgsd2', what would happen to the encrypted value if the key was 'dog'? how would it change the encrypted value of 'hello'?
I recently came across a paper called "Users Get Routed: Traffic Correlation on Tor by Realistic Adversaries" (Aaron Johnson et al) ... which seems to be saying that adversaries (like the NSA) that can see large segments of the Internet can relatively easily de-anonymize most Tor traffic: "... previous work has thus f...
I see examples of AES (with a shared secret key) being used to encrypt shared secrets (e.g. nonce + counter) to produce a keystream against which the plaintext is XOR'ed to produce the ciphertext. What is the advantage of using this method over simply using AES to encrypt the plaintext? What is the advantage of using a...
I've seen people demonstrating the use of BackTrack to attack VMs. In one of the components of BackTrack, it shows the operating system of the targets. Since support for Windows XP is ending soon, I would like to know if it is possible for attackers to know that I am using an outdated OS and exploit its vulnerabilities...
I was reading about Google's usage of RC4 and an answer on stackexchange website stated the following: I know Google uses RC4 for most of its services, and this is the reason one shouldn't keep gmail opened all the time ;-) Is this true? What sort of attacks can be done if we're exchanging information for too long...
Let's assume both, my VPN client and VPN gateway has public and private keys. I encrypt my request with VPN gateway's public key. VPN gateway gets the request, decrypts it with private key. Then, VPN gateway encrypts the shared secret key it generated with my public key, then I get this request, decrypt it and now I ha...
I am convinced that it is possible to find out the real IP address of computer which has spoofed its address. I find it rather unlikely that no techniques exist against IP spoofing. How is it possible to find out the address of spoofed IPs? What methods are used? How do you detect spoofed IPs?
Currently I am saving LastLoginAt, LastActionAt, LastLogoutAt, and LastLoginFromIPAddress. I am not so sure about the value of logging/saving details of logouts and IP addresses, as I am not sure of what use they would actually be. What is the "best" practice here when it comes to saving info about user logins?
I have a cloud server that I am preparing for a small E-Commerce website deployment. I've used a RSA-2048 keys right before booting the newly purchased server, with the help of the Provider's Control Panel. I've quickly secured SSH Server before doing my first reboot. I've installed Ubuntu 12.04 64-bit Server Edition...
When Googling for the most trusted VPN provider (for keeping your anonymity), some users say that the best way to go is to just setup your own (e.g., OpenVPN) using a dedicated server. How is this more secure if the provider of the dedicated server and their ISP still has access to your internet traffic data?
If someone sniffs requests coming from my computer and my VPN's computer, there's no point using VPN, right? Because they can see the time when I made a request to my VPN and they can analyze all of the requests coming from VPN at the specific timeframe and they can guess which request was made by me, correct? That's j...
My home network consists of a router (with wired and wireless connections), and a separate access point used to repeat the router wireless signal. A device is further wired to the access point; it does not have a wireless interface. Is it possible for the device to determine the MAC address/SSID of the access point, of...
Let's assume that a hacker has already infected an X number of PCs , each one of them is online. How will he actually perform this attack? Just send ping requests or use his very precious tool to do it(Having the risk of it being revealed) ? I do not understand the actual way
I'm doing some exercises in the lab. My vuln. scanner detects MS12-020 on a few machines. The report indicates that this could be exploited to allow the execution of code remotely. To me this would mean that there must be some way to upload a persistence module to it (if I'm wrong forgive my naivete, I'm only second ye...
I am working on a fitness app, and it is going to have the following user data: email, first name, last name, birth date, height, weight over time, Body Mass Index over time and heart rate over time. This data is very personal and private to some people. I was thinking of using AES to encrypt their email address, first...
As the nonce bits would be used twice in that case, does that break EAX security? The examples I've seen using EAX have separated the nonce from the Associated Data, but to me it makes more sense to have the nonce be a part of it. http://www.cs.ucdavis.edu/~rogaway/papers/eax.pdf
I want to download and upload to the internet anonymously. I have successfully configured Forefox to access internet through a secure SSH tunnel service (and remote server). I use 'SSH Tunnel Manager' app to do this (like PuTty for Windows).I also access the Tor network using the Tor Browser Bundle. But I can't figure ...
I am using OpenBSD with a browser named Xombrero that doesn't have SSL certs by default. Should I get the certs from the /etc/ssl/certs.pem file? (ex.: I am not trusting OCSP and don't trust that my webbrowser auto-updates itself - if there were any - so the certs aren't updated) Question: are there any best-practises...
While it is theoretically possible to thoroughly examine the source code of Open Source Software to check for backdoors (neglecting a Ken Thompson hack), and given sufficiently adequate knowledge in Electrical Engineering one can probably figure out what a given observable circuit can do, how can one ever be sure an In...
I have been tasked been tasked by my boss to change the encryption system of our web application from MD5 to PBKDF2 as MD5/SHA1 has been shown to be breakable in recent years . I argued against it and thought we should allow users to attempt to login a maximum of 200 times a day , anything more would result in a lockin...
I'm planning to automate copying a large file to a remote server over ssh using rsync, using following command : sshpass -p '<PASS>' rsync --partial -av --progress --inplace --rsh='ssh -p 22' ${TAR_PATH} <SERVER_IP>: This command will be run through Jenkins. The operator will enter the password in Jenkins. I'm using ...
If a malicious application has found its way onto a computer running a localhost only WebSocket server, would it help if the communications used SSL? If so, how could SSL fail if a malicious app Had total control over the computer Was a non-root linux user Could only listen to communications
Numerous clients have told me that my suggestion on changing the algorithm on a web app does not increase security. I've tried reasoning that if the files have not been exposed, the attacker has to guess at the algorithm. A few days ago I was assessing a friend's site and pointed out a few SQLi vulnerabilities. I didn'...
This question is generally similar to past questions asked here, but I haven't seen one the relates to Linux. Case at hand: a PHP web app has a MySQL backend. As part of its functionality it accesses other, remote MySQL hosts and issues some queries on those hosts. To allow that, the PHP app needs credentials for those...
I am coding up the security for a website in express.js and postgresql database. Now I have been reading about salting and hashing and I have the code set up with pbkdf2 using the crypto module, but my issue is how I will structure the account table in the database. Should I create a login role which will have an MD5 ...
I am new to SAML2 and have a question. We have a customer that is saying that they want to encrypt the user data they are sending to us. Here is an overview of how I have this implemented today: User logs on to their Intranet site and clicks on a link to our company. They use PingFederate Single Sign-On (SSO) to genera...
I am pursuing a college project, in which I am running three fake services on three ports to protect the main service (say running at port 80). The concept is that if the user is malicious, he'll try to bring the services down and access the fake services. These ports adopt a blocking process of a connection request an...
The title pretty much says it all. It seems counter-intuitive to escape inside a <noscript> block because any js that an attacker is able to inject there shouldn't be executed. But, I'm still pretty new to this, so I thought it would be prudent to ask. For clarity, this is the context that I'm talking about: <noscript>...
What is is strength of the key derivation? Specifically, how many milliseconds or microseconds would it take a desktop computer to check a guessed password to see if it is a match? I am aware this varies by computer, so I want a ballpark, and I'd give a 3GHz single core computer as an example, but take your pick. Assum...
Let's say I'm trying to reverse engineering communctions between an Android app and a web server uing HTTPS. At beginning, I tried to do MITM using webmitm and a fake cert. But the app failed to start because the fake cert used by webmitm is not trusted by the app.(Let's say the app has its own way to decide what cert...
I know how a buffer overflow works on a local network against an application running on a TCP port, assuming it doesn't drop the connection, but I would like some advice on an "exploit" I would like to try to develop. I would like to do a buffer overflow on word by injecting the appropriate script into the macro of a w...
Assume that the server and the client both has some secret key K. Is it possible to have a key exchange protocol with authentication between them such that MITM attack cannot hold and if the key is exposed at some point in time the past sessions are still in secret? I tried it using the regular Diffie-Hellman key-excha...
The description of WinObj says: WinObj is a must-have tool if you are a system administrator concerned about security What kind of security issues can it detect and what is the rough usage?
Linux has multiple x86 ABIs: ia32, x32 and x86_64. ia32 and x32 both use 32 bit addresses for addressing and x86_64 uses 64 bit. Now, the question: Since the size of the memory space should affect how much addresses could be randomized, how much does this impact the effectiveness of ASLR, and how much does it matter in...
I think my employer uses Citrix product to supply VPN. I have files in My Documents folder on my home PC that I would not want my employer to be able to access when I am connected over their VPN. I am aware an obvious solution is for me to keep the personal files off my PC and store on a memory stick that I can disconn...
Are there any industry accepted standards for the false positive rates for a Network IDS based on Snort? Is there a way to check the false positive rates in a deployed IDS? (ideally without looking at every network record) . I read about the ICSA labs certification for Snort here http://lwn.net/Articles/6896/ but, it d...
I can connect to my server in practically every browser except for Internet Explorer and I cannot figure out why. I am resolving SSL on AWS Elastic Load Balancer (ELB), which is configured to use the following ciphers: DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES256-SHA256 DHE-RSA-AES128-SHA256 DHE-D...
I'm reviewing an Android app (consists of Java and C source). There are complicated obfuscation steps in the build process (for content protection). But it uses statically linked openssl library for AES encryption/decryption. I'm not a binary hacker but it seems ironical to me. Why use (almost) public open-source b...
I have a requirement to limit SSL certificates by source IP. Would setting a critical SubjectAltName limit this (server side validation is by OpenSSL via nginx)? If not, how could this be implemented?
In the Scouts, it is popular to use secret codes to write messages (which are simple ciphers). I want to introduce Forward secrecy to the kids so they can use it with these ciphers. So, if the competing team found a ciphered message and decoded it successfully they can't decode old messages too. My question, how can I...
I'm setting up a secondary guest wifi on my router and I want to make sure that it's impossible for clients connected to the guest wifi to access my primary network. Initially, I used IP filtering with iptables but I figure that a guest who spoofs his IP could possibly still gain access to my primary network. At the mo...
How do I restrict network access to LAN for visitors? In my organization's premises any outside visitor can come and connect to the LAN ports in our meeting rooms. We have seen that they are able to ping internal systems. How can I prevent this issue?
In this scheme , is confidentiality guaranteed? A sends to B an encrypted file which is encrypted by B's public key. Can you illustrate any variant, still RSA- based but also using symmetric cryptography (no pre-shared keys) and lowering CPU time?
I heard that during Christmas a lot of customer data was stolen using malware attack called Ram Scrapers. What exactly is a Ram Scraper?How would one infect a machine with it?What information can you take with a Ram Scraper?How to detect if you have Ram Scraper installed?And how to protect yourself against Ram Scrapers...
What are the main factors that influence information security effectiveness (besides top management support, employee training and use of security policies)?
I want to design a new crypto-currency, with an algorithm which is different from SHA-256 or Scrypt. But in order to do this, I need to know the hash algorithm which is the hardest to make specialized ASIC's or FPGA's for. First, is it difficult to make an ASIC for SHA-512? I head that it uses 64-bit operations, so it...
To simplify the user experience , if we want to design a system such that the user login password for the desktop account itself can be shared with various applications like chat/email/skype etc. How do we pass credentials across applications without asking the user to give them again / seperately? I understand it's n...
We're looking for help/advice from website security experts. Our company develops web-based process management software and hosts it for our customers. The software sends emails to users when they have new tasks in the system, or reminder emails when those tasks become overdue. We've recently started seeing probes in...
Do developers necessarily make good penetration testers & vice versa? The reason I ask is that I find I have much more of a knack for figuring out how an existing piece of software works and can be manipulated than actually designing and developing things myself. I can program and I'd say I have an intermediate level o...
How to store a passphrase with a Java application that periodically needs access to its plaintext form? It is a strange situation, but I am wedged in it. If providing a decent security mechanism is impossible, any tips on deterring script-kiddies? Elaboration on my situation (it rhymes): It's an inconvenient (read "hor...
I am a student,residing in a hostel,accessing internet,using College LAN,which is protected by Cyberoam Corporate Client authentication,and the bandwidth is equally distributed to all students but a student is illegally using netcutter to deny others of internet access.The network admin is unable to catch him because h...
Recently I noticed a lot of traffic generated by automated bots that were checking for vulnerabilities in my web server. They were mainly looking for ways to hack into plesk/wordpress which I don't even have running on the server. Now my question is, what are hackers trying to accomplish by hacking the server. I mean, ...
We have many text files with ~all the words from a given language. Does someone know a "full" list of methods a word/dictionary can be remaked? ex.: testword can be converted using leetspeak (https://en.wikipedia.org/wiki/Leet) to: 7357\/\/0RD What other converting methods exists in the world?
If I wanted to make a bot that plays/issues automatic actions/moves in a online browser game, whose communication is realized over HTTP1/1 and WebSocket (https and wws respectively), all TLS encrypted, what approach would you take? Additionally the following constraints need to be considered: The bot should work while...
Do the attackers use small but a lot packets or big and some? e.g. 2 bytes or 512bytes? Also , can packet size affect the size/speed of the attack? Something more , how do the firewalls block dos attacks? Just checking the content of the packet e.g. A string 'aaaaaaaa' in bytes gets deleted or do they just have "cooldo...
What options are available for implementing DLP within an organisation and what are the pros and cons of each?
Ok so what im actually trying to do is to bruteforce my own account on some website just to check myself . This is NOT for illegal steps or use , im trying to crack my OWN password , and im trying to get help to see what im doing wrong with the software. the thing is , when im starting the bruteforce , it doesnt recogn...
I was wondering if anyone knew of a way of capturing and modifying the requests sent out by a Java application over HTTP. I can see them in Wireshark, but I also want to be able to modify them in transit (modify destination/POST data). Many thanks.
What information is present in an Email Header that can be used to track a sent mail? For example, are some of these present? Web Browser used? Operating system Type of Network (broadband/dial up)? Type of system Laptop/Desktop etc.
Is legal to use contents retrieved from a not protected url (no authentication involved, just a public accessible URL) from the content owner's server? Is legal to distribute urls pointing to that resources? Is legal to develop applications using that contents?
Is there any way (directly from a computer or device) to see the packets that pass the router from the different devices. Thanks.
This is a snippet of a PHP script: $useragent = isset($_SERVER['HTTP_USER_AGENT']) ? $_SERVER['HTTP_USER_AGENT'] : NULL; $query = "SELECT `id` FROM `browser` WHERE name = '".$useragent."' LIMIT 0,1;"; $result = @mysql_query($query); // The browser is visiting the page for the first time if (!$row = @mysql_fetch_asso...
I have come across a number of websites which include links such as www32.example.com and also www2.example.com. Why is there a number in the www part of the link? Are these sites not legitimate? Thanks
I've developed a web application (developed in .NET MVC 4) which have multiple users with personal login credentials. The web application holds a lot of content uploaded by the users. My client would also like to have an offline version of the application, for Windows. This application should use the same information a...
Some of you may have seen/hard of Western Digital's MyCloud NAS solution for home networks. This comes with a proprietary app suite for mobile devices and workstations alike. This allows the consumer a "dropbox"-like experience with a storage medium they themselves privately own and operate. I've been toying with this...
I want to create an Android app where users from an office (typical use) can upload scanned documents to the app backend service for later use. e.g. A lawyer want to upload a sentence sensitiveDocument.png. The guaranteed privacy for the user is a important sale point for the product. From the previous example, the law...
In this document is detailed technique of exploiting Windows kernel. But writer is talking about accessing kernel memory & doing exploit from user-mode application at the same time. Can I do this from user-mode application, or do I need to do it from driver? Thanks.
It has happened to me several times that I've become so used to typing in a password I can't consciously remember it and it's purely muscle memory. This is particularly true with complex passwords that don't follow a pattern. It's a problem because if I'm using a different keyboard or am in a different environment I fo...
I am working on a project that uses a combination of a web based framework (Django) and an installed app (Python) for the purpose of data entry/upload. I will have to send medical records over the web and I've been trying to come up with a way to make a system that is cryptographically sound. I figure I can use django'...
This question may be related to this one, but I think we need to be sure. My website implement login via OpenID (or Google, or Facebook, etc.). On my website, authorization is based on user email adress. If user has email something@example.com, she gets access to the content linked to that email address. (Basically in ...
I remember reading a news article of an incident where a hacker was able to use an image to infect thousands (maybe millions?) of computers. Can anyone provide links to such news articles? I couldn't find any on Google. I would like to show them to a friend.
I am a PGP beginner, having just downloaded GPG for OS X. I created my first pub/sec key for my email address and uploaded it to the public key server. GPG has several features available, namely: 1) encrypt, 2) decrypt, 3) sign, and 4) verify. Given these options: What is the most secure way to use PGP to send & receiv...
do CAs offer service wherein an application can request someone's public key? i am trying to do this but i am unsure if it is correct (suggestions of better ways to do it will be most appreciated): someone with a certificate from a CA and is an authorized user in my application enters data to a web page (in a form) hi...
Scenario A: A user points his web browser to https://users.server.com. The website completes the SSL handshake and continues with the HTTP protocol inside SSL. Scenario B: (server-side) Now, let's say users.server.com is modified to run this socat: socat OPENSSL-LISTEN:443,cert=path_to_cert TCP4:127.0.0.1:22 (client-s...
I have one windows service and web service trying to make a web service call over TLS. I have setup the certificates in MMC and I am able to successfully connect using the web service. However, when I try to make the same call using same certificate from Windows Service it is unable to establish the connection. Both w...
My understanding is that when using a client certificate for security one issues a private and public key cert (for example X509) of some sort and sends that of to the consumer of the service that one wants to authorize themselves before consuming. But what's then the standard way of checking that it's actually a vali...
What is the best way to handle spam on pages like user registration or password recovery? I am not asking about whether to lockout a user for a few minutes or how to put up a captcha. I'm interested to learn on how do I target the spammers. Iv'e read that it is bad to target a user via: IP since a lot of users share a...
HTTPS is an end-to-end encrypted connection. Given this, does the website I am visiting know my original IP? The website is only available over HTTPS (not unencrypted HTTP).
I'm using gnupg and I've just seen that people can sign keys with an expiration attached. The expiration of individual signatures can be seen in gpg --list-sigs <KEY> when setting this in your .gnupg/gpg.conf: list-options show-sig-expire However, I can't find any information on how to add such an expiration to a sign...
Short version How can I determine the Java version a remote server is running if I only have access to the server through port 443? Long version I am validating a pentest run by another group. They found an error message that provided the Java version being run by the remote server. The Java version was an old one....
I'm really interested in IT security and I would like to know how vulnerability reports work. Is there a central database for those things? I often see CVE-XXX-XXX on disclosures, but I don't understand very well how the numbering works and which database keeps the information about that report. What should one do to p...
We bought some Magnetic stripe cards and I'm writing a program that will get talked to by a mag card reader. What I need help with is that I can't, for the life of me, find out what characters are valid on track 1,2, and 3. I have my program working, but I would like to have the program raise red flags if someone tries...