instruction
stringlengths
24
29.9k
With products such as LastPass that store encrypted passwords on remote servers, what are the associated risks that aren't applicable to locally stored and encrypted passwords? If something is encrypted well enough, it's unlikely anyone would be able to break the encryption no matter how much processing power they have...
I did a search and didn't quite find an answer to my question. I have website that is integrating with a 3rd party for eCommerce and CRM. On my side I am collecting no data. I don't collect any login data, customer data or anything. To retrieve any data I need to log in to their site. My site pulls various forms from ...
Say I have strings: stringA, StringB, stringC. And I make two hashes: HashA = sha256(stringA + stringB) HashB = sha256(stringB + stringC) For the sake of the argument I'm suggesting sha256 but answering the question generically is just as good. I'm not a strong mathematician, but suppose I were, and am trying to revers...
After an IT audit of my company, the report said that our Active Directory contained too many non-personal user accounts. This caused a risk of misuse and unauthorized user access. I checked my company's Active Directory today and noticed a lot of non-personal user accounts, but most of them seem to be related to syste...
Let's consider two Encryption keys: 1.Data-Encryption-Key(DEK) 2.Key-Encryption-Key(KEK) KEK will be securely stored in HSM, which will be encrypted using master key. Data Encryption Key will be decrypted using KEK. Based on the above concept, my doubts are: Do we need to send the Encrypted DEK to the HSM for decryptin...
I was talking earlier to a script kiddie and claimed that IP spoofing can increase the upload speed in a DDOS attack?! that does not make any sense to me According to him if your server has an upload speed of 1Gbps IP Spoofing will help you strike a target with a 10Gbps DDOS attack, any explanation? Thank you for your...
This discussion does not include self-signed end entity certificates for hosts like web servers and mail servers. OpenSSL's default configuration for a CA certificate has the following keyUsage: cRLSign keyCertSign The Federal Public Key Infrastructure (PKI) X.509 Certificate and CRL Extensions Profile has the follow...
We would like to start using digital signatures and possibly encryption for e-mails in our company. My knowledge of public-key cryptography is entirely theoretical with no practical experience. In public-key cryptography, e-mails or documents are signed with the signer's private key. It is crucial that the private key ...
After the recent Target hack there has been talk about moving from credit cards with magnetic stripes to cards with a chip. In what ways are chips safer than stripes?
I'm learning PHP and at the same time I write the examples that I get from the book to .php pages to test them and eventually publish them. My concern is about a bunch of forms that are there to test the codes; these are very basic forms that have no validation code and I would like to know if someone could do bad thin...
When installing a new AIX server, there is a possibility to use several patterns for secure deletion. My question: Is it necessary to use several patterns? What is the benefit from having several ones?
We are a company that has many web applications developed in ASP.NET. Our Internet service provider (Telefonica) wants to test our web sites looking for vulnerabilities. For that, they are asking us to provide them credentials (read-only access) for each web site. It's the first time that I have heard that for testing ...
Has there been any cases where hackers have taken over the phone number to a business, by creating a phone number in the same area code, setting up a virtual PBX / Asterisk system, routing all calls to the business, recording the conversations, and updating/hijacking Google/Bing/Yelp listings for the business with thei...
I've been trying to find a way to secure a webpage that is easy to do (ie gaining access) yet still fairly secure. So, while a 4 char numeric password would be fairly quick to enter, it wouldnt be very secure, and a 4 char alphanumeric + symbols would take more time to enter in, but potentially be much more secure... ...
With sales of smartphone on the ascend and PC sales on the decline, the demand for smartphones will soon outstrip the PC. What will be some of the new major foreseeable security concerns present on the smartphone? How do we protect ourselves against such security threats?
I have an Application Pool in IIS running under the standard AppPoolIdentity as part of the IIS_IUSRS group. What are the security implications of granting AppPoolIdentity modify and create permissions in the intepub/wwwroot/website/ directory? Are there any ways to mitigate these risks? In my particular instance, it i...
Why are chips safer than magnetic stripes? The answers to the above question explain that the chip based cards can not be cloned as the "secret number" is embedded in the chip and protected by the use of public key cryptography. The chip also performs some cryptographic operations to authenticate itself without reveali...
I am trying to compile the following exploit http://pastebin.com/pxy4GiFQ to use it against one of my lab machines. I am trying to compile it inside KALI machine and get the following error: root@kali:~/Desktop# gcc -o OpenFuck abc.c -lcrypto abc.c:22:26: fatal error: openssl rc4.h: No such file or directory compilatio...
I want to get the wrong password that a user enters at a wifi hotspot on android. I just want to know if this is possible on android and if so how.
I'm on a work network, and I had some files I wanted to give to a colleague. I set up a shared folder and directed him to my computer name to open the shared folder. Then I remembered from a long time ago seeing C$, and tried I entering this: \\COMPUTER-NAME\C$ Now, he got access to my computer. He could do everything...
I am learning at school about attack signatures on web applications (basically OWASP), but I do not understand what they really are in this context. Can anybody give me some good references where I can better understand what they are and where they are used? Thanks!
In this thread: Why are chips safer than magnetic stripes? the answers all seem to be that the chip cards are far more secure and difficult to copy. Here is my problem, and my question. A couple of years back, there was a lot of talk about moving cards to a chip system - and a lot of counter talk about how INSECURE the...
I have a few servers and machines that I regularly login to, so I was wondering if it was possible to secure them using a version of Shamir's Secret Sharing. I thought if I could split my private key into a number of pieces, then distribute those pieces among each of the computers I use each day as well as a USB stick....
If I send messages using OTR & GPG, will my ISP or some surveillance agencies know that I'm using them? "Look, he's sending an encrypted message. He must have some important secret. Let's go rubber-hose him!" Note: Obviously, if they see the content of my messages (e.g. emails), they will know that they are encrypted. ...
When having a rich text editor on a web application, what is the best way to escape HTML entities and prevent XSS attacks but keep the formatting (<b>, <i>, <u>, ...etc.) ?
I might be asking a similar question to this: Whitelisting DOM elements to defeat XSS But I think my proposed solution is different and I was wondering if I could get the community to comment on whether it can be an effective way to prevent XSS attacks. I am customizing a content management system that has a large cod...
I've been working on a site that requires users to login. It's written in PHP with MySQL, and passwords are stored as Whirlpool hashes with a salt (source code later). However, security sites or fellow developers have advised against this (actually, SHA-256, but the point remains) and have recommended bcrypt or PBKDF2....
I am a beginner in Reverse Engineering and am trying to improve my skill by participating in any CTF's I can and solving CrackMe's. I am trying to find out why Binary Exploitation and Reverse Engineering are always separated as two different topics. My Question is simple: Is Reversing different from Binary Exploitatio...
Currently, there is an HTML form/input attribute called autocomplete, which, when set to off, disables autocomplete/autofill for that form or element. Some banks seem to use this to prevent password managers from working. These days sites like Yahoo Mail seem to do it as well because they feel that password managers ar...
Can somebody have stolen files and data from my desktop PC just by inserting a USB Flash drive in my computer, without dragging files over to the Flash drive?
LFI: Local file inclusion. After going through many tutorials I have two things I can/t figure out: checking the vulnerability: I don't understand what makes a website vulnerable or not. For example, in the stackexchange network itself we can make changes in the url: https://security.stackexchange.com/questions/ask <...
the RSA system uses a private key to read the content encrypted with the public key. If I make a game for mobile, and want to save the data : I guess I cannot save the private key on the device. If I use a server, and call a php function to send me the private key, the hacker could just intercept and read the private...
Should I worry if a developer programmed an app to send IMEI / IMSI number of the phone where the app is installed back to him? What can an attacker do with such information?
If I understand correctly GSM uses A5/1 stream cipher. My question is why doesn't it use a stream cipher mode like OFB or CFB?
Suppose that I have a block cipher whose key size is 128 bits. but the block length is eight bits. Let E(m’) be an encryption oracle that encrypts by running our “short” block cipher in CBC mode. How would I write pseudocode for an adversary, A(m), that, given E(m’), can probably decrypt any input in a reasonable amou...
I would like to try to build a Virtualbox image to use with Vagrant. This is the features: Login with SSH + 2FA (Google Auth) No X No internet connection Copy unsigned transaction, sign it and broadcast from the external host (Possible with the use of "Synced Folders") What worries me is: If the image was to be stole...
I want to hide my home network behind a router and not worry about firewalls on internet-facing devices. Furthermore, one PC is going to be hosting some services, so I guess I need port forwarding as well. It would be also nice if this PC is somewhat detached from the LAN, so that if a breach is successful upon it, onl...
I have been advised to use dd-wrt, for richness of features and heightened security. The argument about security is that major manufacturers don't care much about the firmware, release with a lot of bugs and those become widely known. Consequently, just knowing the router model confers knowledge of many vulnerabilities...
This classical paper of Paul van Oorschot: Revisiting Software Protection, mentions in section 3.4 that by employing software diversity "an exploit crafted to succeed on one instance will not necessarily work against a second" software instance. I know that software diversity does not eliminate the possibility of re-ex...
I'm a Linux user and I installed Windows recently, I need it for some software. I don't want to use any anti-malware programs, I don't plan on giving administrative rights to applications I don't trust - just like in Linux. So, in theory, getting a malware shouldn't be possible, right? So, my question is, can I get inf...
I'm trying to add a meterpreter plugin, a = client.railgun.kernel32.GetLogicalDrives()["return"] # Math magic to convert the binary to letters drives = [] letters = "ABCDEFGHIJKLMNOPQRSTUVWXYZ" (0..25).each do |i| test = letters[i,1] rem = a % (2**(i+1)) if rem > 0 drives << test a ...
Mobile devices like smartphones and tablets have the feature to autoconnect to wireless networks of known name. The same is with laptops and other hardware using WPA2. Is it possible to: a. Obtain the target hotspot name, like "john home network" b. Setup a new wifi network with the same name by using e.g. Android adho...
If I'm about to sell my iPhone 5, is there a way to make sure that the buyer won't be able to recover anything from my data? Both data that has been recently deleted and data that has been deleted long time ago.
Another theoretical question about Tor: Imagine I am running a dissident web site as a hidden service. How can I reduce the chances that I get caught? Assume I am running the server from home, over a large ISP. Going to a small ISP seems too suspicious, and giving the server out of hand is way to dangerous. I'm especia...
I have a firewall VM which creates I have used to setup subnet for different purposes. For example: (fake ips, of course) 1.1.2.1/24 DMZ 1.1.3.1/24 Internal 1.1.5.1/24 security/logging I use dovecot,spamassassin,postfix, and apache on the mail server. The DMZ has a mail/web server. The firewall and server use OpenSu...
I have a PHP script that executes a bunch of commands to verify that a user is logged. if (( isset ($password) && $password!="" && auth($password,$hidden_password)==1) || (is_array($_SESSION) && $_SESSION["logged"]==1 ) ){ $aff=display("you're logged in); } else { $aff=display("you're not logged in"); } If reg...
I am working on a web app with a sign up form like below. The validations are all done client side using http://formvalidator.net/. I am well aware that client-side validations can be bypassed, but I have currently not bothered to implement server-side validations as they are much more painful to implement and require ...
I understand that it's not possible to have Authentication Header with a regular NAT, because it messes with the IP header protected by AH. How about proxies? Do they change anything in the packet? Would it be possible to use AH in transport mode on an IPSec channel between proxies?
I just read this post and it proposes a method of storing SSL fingerprints online so that you can double check that your certificates have not been tampered with. But is it really relevant or useful? To me it does not seem to add any security: it lets you know that you are being snooped on, but doesn't protect you fro...
I work as an application architect at larger company that builds web applications using both .Net and Java technologies. These are sold to and accessed by other businesses (not consumers). We have multiple application development teams working on these, including various skill levels of employees, contractors/consult...
A few months ago I configured a test mail server on Amazon AWS, all legit. I used a new address to my catchall-domain (something similar to, but not exactly, test-config-aws-neptune-2014-08@my-domain.com). I've now started getting spam mail to that very address. It is highly unlikely that a spammer would have 'guessed'...
If I have a HTTP reverse proxy that communicates with it's backends in an untrusted datacenter, or across datacenters, I would want to use HTTPS in the backend, as talked about here: Reverse Proxy Secure Configuration How would these SSL certificates be set up though? I can hardly buy and install a new certificate ever...
I can't really understand the concept of VPNs, since we already have various secure transmission protocols. Isn't the point of VPNs that people using its 'channels' can send encrypted data to each other? At the end, isn't it just one client and one server trying to exchange data securely? We have SSL/TLS for that and m...
I am developing an application and part of signing up requires a user to sign a contract agreement of using the service. I have been reading around the subject for a few days, and I am fairly happy with all the techniques around digitally signing a document. Some references below Digitally Sign DATA, Not Documents [clo...
According to this article => http://www.howtogeek.com/166507/why-most-web-services-dont-use-end-to-end-encryption/ Gmail doesn't store the encryption key. But Gmail reads whole of users' email for advertisement or other purpose like government! (Based on Mr.Snowden disclosure) The idea of “end-to-end encryption” — you...
Does anyone have thoughts on the potential damage of your online banking account being hacked? I'm not sure what a person could actually do since I think they could really only pay my bills (adding a new payee would require additional security information to set up). They might be able to see my account number I suppos...
I'm trying to set up a honeyd system. How can I suppress the broadcast traffic seen by the outside interface, preferably without needing to resort to syslog filters? User subnet 192.168.20.0/24, default route 192.168.20.1 HoneyD subnet 192.168.25.0/24. The IP used to reach here is 192.168.20.254. The router has a st...
This tool requires physical access of course, and there are many things you can do once you have physical access, but this peaked my curiosity. The tool in question: https://www.kickstarter.com/projects/jontylovell/password-reset-key?ref=discovery Obviously the magic to this piece of hardware is what's contained on it...
I want to learn all about that. How can we inject code into an image? Is the code must be php? Or is javascript or HTML works too? How I find documentation about this article? I'm a newbie about these type of topics. I want to be a pentester. So all your answers is very improtent for me. Thanks for help. P.S: When i'm ...
Since it is possible to fake the source IP of a packet, is it also possible to anonymize DDOS attacks?
I was looking at our authentication system which hashes passwords differently than I was taught. The salt is a constant byte array and it uses the password + the salt as a key for the password hashing algorithm. public byte[] GetHash (string password) { var hmac = KeyedHashAlgorithm.Create("HMACSHA512"); hmac.K...
I have an app that sends an encrypted message to the server, with the sender and recipient username attached. The usernames are each linked to a unique device ID that allows messages to be sent to them through the Google Cloud Messaging service. My problem is that I'm not sure what the best way is to prevent anyone fro...
If I create a TrueCrypt volume and secure it with a password and a keyfile, is there any way that someone who has access to my computer would be able to tell that the volume requires a keyfile to decrypt? If not, then if I store the keyfile on my computer, along with thousands of other files, won't it be practically im...
We are using Verizon's Home Phone Connect as a replacement for our AT&T landline. The problem is that somebody is using our phone to make dozens of calls each day to a series of toll free numbers. When I've dialed these numbers I get a fax signal once a connection is made. Has anyone else experienced this? The phone...
I'm considering the relative benefits/disadvantages of making a login page cacheable. Note that here I'm referring to the page containing the form into which the user enters their username and password. Certainly it doesn't add any protection against SSL stripping (the HTTP page is treated as a seperate entity from the...
I wanted to know if I can still be PCI compliant if I store card holder and PII information for multiple tenants in the same database? I.e., have an identifier on the table level to identify the tenant?
I had a request to find a solution for making a log file secure from editing from the user (not root user) running the JBoss instance of an application (Linux environment) First idea I had is to use the 'chattr +a' from root user to allow only the appending of new raw in the log file. But the Log4j file is configured t...
I've been thinking about building a web-based keysigning robot. Mostly I want to do this to dip my toes back into working with PGP after quite a few years of ignoring it. The robot I have in mind would simply do email verification. Is this kind of thing useful for building a stronger PGP Web of Trust?
I have searched up whether a host is safe from its guest, and generally, it is said that, aside from vendor security flaws, a guest that is infected can infect the host over a shared network. So, what if a firewall is set up to block all traffic from the guest to the host? You don't need to be on the network to cont...
I've built a web app which uses the openssl_private_decrypt() functions. The rendering of a page with 15 messages encrypted with these functions takes remarkely longer as the ones without. (3-4 times) The application runs on a simple VPS with 1024mb RAM and 2.5ghz (1core). If I want to speed up the encryption/decryptio...
I work with sensitive sites that handle financial information, my code protects more than four billion pounds of assets. All of our sites have a logout button and in addition use HttpOnly, Secure, Session cookies to maintain a user's session. Although we expect users to click the "Logout" button, we also anticipate th...
I was wondering that if there is a Local Area Network and one public IP,through which various clients connect(which have been allocated private IP's).Suppose one of the clients spoofs his IP to try to launch an attack against a server(say Google).Does there exist a way that Google uses to secure itself against such att...
I use Hydra with the Web-Form (Http-Post-Form); and I'm trying to use a list of Usernames when some of the nicks contain a letter ñ. For example I have the following account in my list: Username: ñandu123 Password: asd123 The script that I run is something like this: hydra -L usernames.txt -P passwords.txt www.xxxxx.c...
I'm in the process of buying an SSL cert, and I'm confused by this part: Many CAs say they'll add www. to your domain, so that e.g. if you buy a single-domain cert app.example.com, they'll also add www.app.example.com as a matching domain name in your cert. A related example is that if you buy a wildcard cert, say *.ex...
This is kind of a social engineering question -- my local law enforcement agency sent out this email today: Help us by keeping identifying information about your valuables safe and accessible – Use ReportIt - it’s web-based and FREE. In just minutes, you can help the Police Department and other Law Enforcement Age...
I know, that my login credentials are sent in clear text for every body to read, when I log into facebook without using https from my mobile phone's browser in an public / non encrypted wifi. And I assume, that official app encrypts my login credentials and the content transfered between their servers and my device. Bu...
Consider an application where client certificates are to be used for authentication. The application web server requires SSL and client certificates for all users. In this case, it's IIS 7. I've used the built-in CSR functions within IIS. The server certificate has been requested, created, and installed. The Root CA is...
I read a couple articles on privacy/security but still cannot get a clear picture of the best practice to ensure that an attacker will not be able to access users' private information. For storing passwords or other data that will be checked only to verify authenticity, I understand that hashing algorithms like SHA-256...
I can understand why content from different domains is considered to be unstrusted for the same origin policy. But, how can be content from diferent protocols from the same site/domain be dangerous? Can somebody give an example of a situation in which this can be a security concern?
I am familiar with the cakePHP cookie and session settings but I am unsure as to why (when analyzing through the Burp Proxy Suite I am finding 2 separate Set-Cookie responses: Set-Cookie: DropZone=deleted; expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/ Set-Cookie: DropZone=spackr9fhhgod0lqk9glh3ch44; expires=Tue, 28-Jan...
It is good to know that ISP have legal boundaries for retaining a client's internet activity. Is it possible that individuals can hack the ISP and then have access to someone's web history activity?
I know that TLS (commonly but mistakenly called SSL) interception works by establishing two encrypted tunnels between a client and server, with the interception device (proxy) terminating both tunnels in the middle. To obfuscate that interception is occurring, however, the client's machine must be configured to accept ...
I recently setup a new Win8.1 PC while still working on my main development PC so it did not have all of the security tools that I usually install, e.g. malwarebytes, adaware, etc. Since it takes me a few days to fully setup my machines with coding tools and a myriad of other tools, I made the MISTAKE of accessing my b...
It's been happening more and more frequently I get viruses with no idea where they come from. I have recent backups, but I don't know if there's a point in restoring since I would just install the same applications and copy over the documents I've been working on. MSE didn't detect anything and I ran combofix and it se...
While discussing alternatives for asking the browser to remember your password, one guy suggested using a bookmarklet to store users' credentials. The original answer is in portuguese, but I'll translate here the protocol he used: The user, while logged in, has access to a bookmarklet [link] with a unique token He can...
For a REST API against which clients would be writing non-browser based, non-interactive applications, if OAuth2 is the authentication mechanism to be followed, then we would use the client credentials grant type for the authentication. Would that be the correct choice, and if so, how is it better than some other auth...
I've recently enabled 2-factor auth on a number of web apps, mostly using Google Authenticator. Does this mean that the importance of a strong password on each site is reduced? I would prefer to use passwords that are easy to type on a mobile device, if that doesn't compromise security too much. EDIT My particular need...
I am not very familiar with Blocklists so had a few queries around it. I have a sub-domain example.com which is used to send mass marketing emails i.e. emails are sent from no-reply@example.com. A SPF record has been added under example.com domain to authenticate a mail server to send emails with no-reply@example.com ...
I have the following problem: Alice wants to send Bob a message such that Bob knows it is from Alice but at the same time he cannot prove that Alice send him this message. The solution I came up with, using RSA, is: Alice picks a random key K, and encrypts the message M using this key K. M'= aes(K, M) Alice hashes K a...
I'm looking at using Theodore T'so's pwgen (on linux/ubuntu) with its sha1 (-H) feature to generate passwords that I should be able to recreate later using the same file and seed. I briefly looked to see what alternatives there might be if this particular app (pwgen in unix) is not available to me at any point. Is thi...
I couldn't find a better place on StackExchange for this question, but please point me in the right direction if there is a better place for it. My company is bidding for some work, and in the invitation to quote (under the Data Protection section) they state that there can be no "public or private cloud elements" to o...
I received a strange email which has some strange URL in it. I would like to know what is "behind" the url, but without the risk of running anything malicious. How can see the contents of the URL, the web page, without running malicious code? I am on a Linux machine.
I'm working on a Java Applet that used to be self-signed. Now that java 7u51 is being used, I am working to get the jar for the Applet signed. I used the certificate/key used for the apache2 ssl to sign the jar. In order to do this I had to create a new keystore using the key/certificate, and the Not Yet Commons SS...
I want to know if it's dangerous in any way to store the current logged user session id on the page generated source code. Why I wanted to do that? I'm trying to share the user session between two applications, one (the main) in PHP and another in Node.js. The Node.js one is used just for real-time data, but I just wan...
There are various ways to verify the validity of a file, usually checking the MD5 checksum or OpenPGP signature. Is it possible to do the same for a full USB Drive? I'd like to be able send a USB Drive through the post and give the recipient a way to ensure that it hasn't been tampered with along the way (à la NSA's Ta...
What does it suggest about a "hack" when people I know get emails from me, but my email password hasn't been changed to lock me out? (Not a spoofed sender - I see some in my sent folder). If my password is known to the attacker, why would they make themselves known (by sending emails like that) and NOT take over my w...
I have a client with a hacked IMAP-Account, and the attacker(s) made thousands of password-attempts, probably with a fixed set of passwords, from different IPs before they got in. After successful password guessing I see 10-15 different IPs connecting and pushing out spams, simply killing that little ol' post-fix serv...
I have been contracted to perform a security risk assessment that relates specifically to ICS and SCADA systems. I have performed many IT security risk assessments, however, I am new to assessing these types of environments specifically. I am familiar with ICS like devices and I believe I have a cursory understanding o...
I noticed most DSA private keys often start with the same few characters, MIIBvAIBAAKBgQD . For example, generate a private key on Ubuntu, by running: ssh-keygen -t dsa -N '' -f /tmp/id_dsa This results in a private key file that begins with something like: -----BEGIN DSA PRIVATE KEY----- MIIBvAIBAAKBgQD... The fir...
I've been looking around for an answer to this for some time now and I felt that this place would be a good venue to ask this. How can one improve the security in a MySQL database? The database that I am currently playing around with only has its data encrypted. This being the values in the tables are encrypted before ...