instruction stringlengths 24 29.9k |
|---|
I have a bunch Raspberry Pis collecting data from behind client firewalls. I want to start sending this data to MYSQL server. Because the Raspberry Pis do not have static IP addresses, I obviously feel vulnerable opening up my database to the public. For SSH we have Fail2Ban, but for MYSQL I have found no documentation... |
I want to play around with NTRUEncrypt and I found this tweet that NTRUE is now part of bouncy castle.
But I cannot find any proof of the existence in the source code of the Bouncy Castle C# API,
http://www.bouncycastle.org/csharp/
In the specifications http://www.bouncycastle.org/specifications.html, you can see the ... |
While reading DOS detection and prevention http://staffweb.cms.gre.ac.uk/~lg47/publications/LoukasOke-DoSSurveyComputerJournal.pdf I've asked myself:
Even if a firewall detects a DOS attack and begins to filter it out, doesn't the detection and filtering (by IP etc.) still require a resource to respond to the attack (i... |
I am configuring a HTTPS proxy, which I want to use for my laptop wherever I go. The idea is that since its encrypted, I should be safe from eavesdroppers, even on open wireless networks. Think of it as a easy to configure VPN for web browsing.
My problem however, is that HTTP requests does not use my HTTPS proxy, but ... |
I'm just struggling to get my head around this.
In certificate signing with static Diffie Hellman the public key and certificate information is sent to the CA who verifies the certificate information, and encrypts the certificate information including the public key with his private key. The public key of the CA is di... |
I'm finding myself on the inexperienced end of a discussion about where password hashing takes place. My coworker drew a schema from less to more secure, where the Public Internet was the least secure, and an internal API for user data was the most secure. The internal API can only be reached from within the network. T... |
Given
Dictionary containing 1000 three-letter words:
dictionary=abc,def,ghi,jkl,mno,pqr...
Randomly chosen words from the dictionary:
10-bits-passwords=abc,def,ghi
Randomly chosen three words from the dictionary:
30-bits-password=jklmnopqr
The 10-bits-passwords are encrypted using the 30-bits-password and the tabula
re... |
While I was looking at my browser's history I noticed there has been a Facebook login from my computer, there are some Facebook related messaging and profile links in my browser history (chrome).
The login was not made using my account, so how can I learn the account information of the logged person (Facebook ID or ema... |
I want to make a prediction about a future event, but only reveal that prediction after the event occurs lest knowledge of my prediction affect the outcome.
For example, suppose Alice predicts that Bob will drink the spill his glass of milk on April 24th at 9:17 AM. She writes to a text file:
Bob spills his glass of mi... |
Say you purchase a domain on Namecheap, but want to host DNS on DigitalOcean.
DigitalOcean, says to simply tell your registrar to use DO's nameservers, then set up your DNS for that domain on DO. However, there doesn't seem to be any verification that the DO account that configures the DNS for that domain is actually t... |
One of the new features to Windows 8 is the ability to log in to your PC using your credentials from a Microsoft Account. How is this implemented, and what steps are taken to prevent hijacking of credentials in transit, falsified authentication or other such MITM attacks?
I'm presuming SSL or another encryption & authe... |
I want to encrypt data, but make sure that no single user can decrypt the data.
Further, it is important not to require ALL users to be present to decrypt. This will allow for some flexibility and reduce the consequences if/when secrets are lost. It should be enough that 2 out of 3 secrets are provided, or a configurab... |
Is it possible to find out if ips are from the same location and used by one person. We have a situation were three ips have been logged etc. We know for sure that two are from the same person this xxxxxxxxxxxxxxxxxxxxxx was the first in our data base.
These two xxxxxxxxxxxxxxxxxxxxxxxand xxxxxxxxxxxxxxxxxxxxxxxxxx ca... |
Is there a known variant of Zeus which attacks iOS based mobile devices?
I have read about versions for Android and Symbian , wondering if iOS is vulnerable to it as well.
|
I've been doing some reading here about session ID handling, and have learned that it's generally a bad idea to include a session ID in the HTML source code, and/or on the query string. For example Is it correct to use form field(hidden) for storing Session Token and Why is passing the session id as url parameter insec... |
I have logs from a security appliance from Damballa which has cryptic names for threats observed in a network which I am trying to make sense of. Some examples of these threats are "RedTreeBruisers" , "WeirdSideTroop" , "WhiteBikeScorpions" ,etc. which I do not know how to interpret . I have over a 100 of these unique ... |
Situation
I swapped out a dead router at home today. I setup the new router with the same SSID and encryption settings. The devices on my network acted like nothing had happened and are happily connected to the new router.
Question
If I swap out a physical host or VM using the same IP and using SSH for example, conn... |
I was listening to Pandora as I logged in here, and the next commercial was about InfoSec. That set me wondering as to whether that was a coincidence (probably) or if they knew somehow. To make a long story short, I was wondering whether a webpage could access cookies that it didn't put there (thus getting a rather acc... |
One of the security appliances we own reports a so-called "Industry Name" for the threats it detects on the network. I wanted to know if there is really such a standard and where I can find information about specific threats with a given industry name?
|
This is the first time I've had to handle personnel information and I want to make sure I have a good amount of security. I will be storing users' emails and passwords for their accounts on a MySQL table, so I was wondering if the password_hash() function is sufficient for hashing.
For example would this be an accepta... |
I have been reading some articles on WPA/PSK encryption and one said that the hash is calculated like this:
Key = PBKDF2(passphrase, ssid, 4096, 256)
Where PBKDF2 is a standardized method to derive a key from a passphrase.
As you see here the key depends on the SSID, so if you have the same password with different SS... |
So I have the document format as follows:
{
id : plaintext,
date-created : plaintext,
data : binary
}
The data entry needs encrypting and decrypting. My idea was to have a private key, and use subsequest hashes of the id and date created (which will never change) to form a unique password for each document... |
I have a two-part question about question #570288 over on ServerFault.
Question:
Is it bad to redirect http to https?
Accepted answer (185 up-votes):
[...] Hell no. It's very good.
Part 1
Is that answer, well... wrong? :)
Am I correct that, from a security point of view, redirecting HTTP to HTTPS is a terrible idea... |
Hello, I am a beginner looking for some information.
My question is the following: In order to understand certain security concepts is it essential that I understand the underlying languages?
For example, to understand XSS should I know Javascript? To understand SQL Injection should I know SQL? Or is it enough to ha... |
The question is about a very specific SSL handshake scenario. I understand that some servers may request client certificates in order to authenticate connecting clients. However, as far as I can know, server only checks the authenticity of the client. Why would you not use client certificate to generate premaster key... |
Emails from site such as Gmail and Yahoo are rejected from secureserver.net server and treated as a spam.
Can you help me?
|
For example I have a WD Passport external hard drive. After installing WD security I can enable and disable password protection, however the settings basically get applied instantaneously. Does this mean encryption is not actually happening? If not, is there any point in using a password?
|
When we buy a new hard disk drive, what steps can we take to ensure that it is virus-free?
For example, there are many vendors selling hard disk drives on Amazon. When we purchase one, how do we know that it is free of virus?
Disclaimer: I'm pretty paranoid about security.
|
I have a problem setting where I want to contact a user by phone, and where I need to protect the integrity of the phone call as much as possible. I'm wondering about how to design the interaction in a way that best achieves this.
I am worried about a very specific security risk: the person I'm contacting might be usi... |
I am doing a project on Vehicular Ad-Hoc Network Security (VANET). The proposed scheme uses electronic signature as a means to authenticating the nodes. Most of the research papers I read suggested ECDSA because it says a "160 bit key in ECC is as secure as 1024 bit key in RSA, and is faster and occupies less memory" B... |
I am going to be hashing user passwords on the client machine, and I would like the hash to be generated in 0.3 seconds.
Do I need to find the number of rounds myself and make every user use this number, or should the number of rounds depend on the machine?
For example, if I found that 10 rounds took 0.3 seconds on my ... |
I am currently struggling with how to correctly implement storage of encrypted fields in a MySQL db, without knowing the encryption key.
The result I am trying to achieve is to encrypt certain pieces of user provided information, which if I was legally obliged to provide to third parties would be encrypted without me b... |
Hi I am using JSON on User Interface side. I want to protect that data. What are the possible ways I can protect my JSON. I have a scenario where I am having JSON Object with data on User Interface side. While performing update operation using jquery postback I am updating the JSON data and sending it back to the serve... |
My Pebble smartwatch, like many (most?) other smart watches, uses Bluetooth Low Energy (Bluetooth Smart, BLE, BTLE, etc) to communicate with my smart phone.
There's some security in the link, including authentication, data encryption, and signing, however last summer researchers suggested an attack that appears to comp... |
If a password expires, the user can't access the account. If the account expires, the user can't access the account...
So, what's the difference? Just that in the case of an expired account, I'd need to enable it back?
|
From what I understand, one of the benefits or Secure Remote Password (SRP) is that is does not require reliance on certificate authorities. In a scenario where clients need the ability to register as a new user how does this work? I can only imagine 3 scenarios none of which seem to be great:
1) Client sends password ... |
We are an eCommerce website. I'm working on our PCI compliance at the moment, and I'm trying, if at all possible, to argue that our organisation falls under SAQ A rather than D. We do not sensitive card details in a database, physical media etc etc. We've passed numerous PCI scans.
Our payment flow is as follows:
Add ... |
Is it possible if i use in address bar this
host.com?<?php unlink("/img/bg.jpg");?>
or
host.com?<?php rename("/bg.jpg","bg.png");?>
if not then is there any way to do that?
|
With the rise in cybercrime, I am slightly worried about my computer security.
I have been using open sourced anti-virus AVG for years and it has been doing well. Are anti-virus software like Norton and McAfee worth the money to get?
It would be good if there are reports that showed how much difference a paid versus fr... |
As there is currently a move away from SHA-1 being used as part of TLS, we're examining moving our SSL certificates, used to protected traffic in transit to/from our webservers, to use SHA-2.
However, I'm having trouble finding information on client support. According to this, Windows supports SHA-2 back to XP SP3, bu... |
I recently discovered a website that I am in no way affiliated with linking to the files of my local website stored on an external hard drive. This unknown website is actually executing the scripts, even my local favicon shows as their favicon. When I disconnect my external hard drive, this website reports Object not f... |
Currently I have heard a lot about differential privacy but I am unable to find out what exactly it is in a non-mathematicians language. Up-till now my understanding is that it add noise to the answer one gets for his query to database.
|
If a person uses VPN and authenticates herself to some social network through the VPN, doesn't she lose her anonymity for as long as the VPN session is used ? By losing her anonymity, I mean that her real name may be linked to the IP of the VPN and subsequently the IP of the VPN to torrent downloading (for instance).
I... |
If your computer has been hacked or infected, is there a way of cleaning your computer and have 100% sure that it's clean?
I heard that you can safely clean your hard-drive with completely wiping tools, such as:Dban,but,today we have other types of virus like bios virus
|
This site says it is best to keep API keys in environment variable out of the code. And here
Storing Credentials Securely
You should take great care to ensure your credentials are stored securely. If someone obtains your api_key or an access_token with the send or all permission, they will be able to send all the bitc... |
A month ago, someone posted an ad with my personal details, including my home address, my phone number and my photo on an ad with very a very defamatory write up.
What followed was a week of calls from strangers and friends calling me up asking me if such a thing was true. It took forever for the admins of those ads to... |
I’ve been applying to for some jobs and use one certain careers page somewhat regularly. I’ve started to notice that I don’t always get logged out even if I do click “log out” and see a message that says I have successfully logged out. After I log out, clicking the button that is supposed to take me to the login page... |
I'm new to linux and nmap, and I am attempting to do a scan of my local network. Using nmap I find that there are 4 hosts on my network (10.0.2.2, 10.0.2.3, 10.0.2.4, 10.0.2.15). I am using VirtualBox and running a Kali Linux VM with a native Windows 7 computer. The network options in the Kali Linux VM are set as NAT b... |
We have an internet connection that we need to audit:
INTERNET ->> ROUTER ->> CLIENTS
our idea would be to put a (enough big) HUB before the router (router, that logs in via pppoe to the ISP) and on that HUB put an OpenBSD* machine too:
INTERNET ->> HUB ->> ROUTER ->> CLIENTS
*I want to run a:
tcpdump -i em0 -w ou... |
I am creating a java application which is dependent on a server. On startup the application will transmit sensitive information (passwords and emails) which will be sent to the server and from there encrypted and never be touched again.
My question is how can I secure the client>server transmission from MITM attacks o... |
This is an extension of my question on UNIX.
Let's suppose I create a file, map it to /dev/loop0, and create a LUKS partition inside
dd if=/dev/zero of=myfile bs=1M count=1000
losetup /dev/loop0 myfile
cryptsetup -c aes-cbc-essiv:sha256 -s 256 -v -y luksFormat /dev/loop0
I then open the encrypted partition
cryptsetu... |
We run an API service. We gave our customer a package for max limit of 12000 API calls / day. He reported to us that a user has been on purposely visiting his web page 12,000 times a day in order to max it out. We checked the logs and blocked that IP. A few days later, the attacks came again, this time, from 50 differe... |
I am to release a system-on-chip device that, during its lifetime, will come to store sensitive data. I want to make that data hard to extract or duplicate.
Encrypting is good for dealing with MiTM, but it doesn't solve the problem of duplicating the flash memory (and MAC address) of the chip and posing as the origina... |
There is a new WhatsApp-killer application called Telegram. They said that it's open source and that it has a more secure encryption.
But they store all the messages in their servers and WhatsApp doesn't store any messages in any server, only a local copy in the phones.
Is Telegram more secure than WhatsApp?
|
I'm thinking out my password recovery logic for an ecommerce system. Some backround: Passwords are stored using bcrypt, password recovery involves the standard reset link, which then can be used to reset the password within a limited amount of time.
I would like to add an additional step before allowing customers to re... |
I'm going to implement a small crypto lib/tool.
The "do not implement crypto by yourself" rule does not apply here, since this crypto system is new and not implemented yet. ;)
So the first step is the choice of the implementation language. And my question here is, if there are reasons to prefer one over another.
Since ... |
If I download a file through Tor, will it be any different than if I download a file through a normal internet browser? I've downloaded stuff through Tor but it's always really slow. I was wondering if I browse through Tor, but then download a file through a normal browser, will it practically be the same thing or comp... |
What are the parameters in play, and what is a rough estimate of the hardness of the task of reading the contents of flash memory off a microcontroller? Of course, it is assumed that there is no conventional way to do it.
|
I have a wifi shared connection with other flatmates and I'd like to know how can I protect my Debian pc from being sniffed. Should I use a wifi anti sniffer to detect if any wifi card is in promiscuous mode? in that case it's only to detect, but if no wifi cards are in promiscuous mode means that nobody is sniffing ri... |
I understand the question of client certs and MITM attacks has been asked several times, but I don't believe this specific scenario has been answered.
It was my (seemingly incorrect) assumption, that the presence of a client cert would allow the server to ensure the client was correctly consuming its server certificate... |
Is there such a thing as a non-expiring SSL certificate? Our scenario is that we develop and sell embedded devices (think "internet of things"). These devices have little web servers running on them that allow for certain administrative functions (like a Cisco home router allows admin actions). We would like to have... |
The context is network based load balancers. It would be nice if someone could explain how TCP ACK storms are generated in real life and practical mitigation strategies for them.
Edit: Clarification on "mitigation strategies". The platform consists of nginx web servers/load balancers running on Linux. So would apprecia... |
I am trying to clearly understand the HIPAA regulations a court reporting company must adhere to.
Let's say the court reporting company does not directly contract with any covered entities but does contract with law firms who would be considered a business associate of the covered entity. Would the court reporting comp... |
Is it at all possible to capture Dot11 headers under Scapy in Windows? I'm thinking Winpcap, but I'm not sure how I'm supposed to do that. Any clues?
|
Considering I use SSL the whole process.
I have an IOS client that I want to use to enter the user's credit card details. I want to do the whole charging and processing on the server side, so I send the credit card details to the server where it is being used to process. I don't save the details there on any permanent ... |
This isn't really language specific, but I'm wondering if anyone has any suggestions for a security model securely storing some user details in a way that could be accessed in an automated fashion.
i.e. I want to be able to send users automated emails when certain events happen but I don't want to store that email addr... |
Since Apple force iPhone users to use iCloud to sync contacts & calendar, I moved to a local ownCloud instance that works well. However, it would be more convenient if I could sync everywhere and not only when my local webserver is started (and thus I'm near my laptop), so I'm thinking of a simple VPS with ownCloud ins... |
I am a QA Engineer, but have been tasked with creating a security testing platform. I have many years with Backtrack/Kali and my primary OS are Arch and Ubuntu. The Systems guys here gave me a CentOS machine in the cloud to build out a machine that will be the hub for all of our security tests. Both systems level tests... |
Let's say that we're building a generic timing-safe comparison function for general purpose use. Making it so that it is safe when both strings are equal length is pretty well known. However, what I'm not sure about is how we can make it safe if the strings are different lengths (arbitrary).
One string will be deemed a... |
Some time ago, penetration testing was done on our website, and one of the tools used was SQLMap
It was executed by a security consultancy, but unfortunately they did not notify us beforehand. So, seeing that they were in the middle of enumerating the tables in our database, we treated it as a genuine penetration and ... |
In OWASP recommendations regarding escaping untrusted input for HTML element content, they list the following:
& --> &
< --> <
> --> >
" --> "
' --> ' ' not recommended because its not in the HTML spec (See: section 24.4.1) ' is in the XML and XHTML specs.
/ --> / forward slash is i... |
I'm following a tutorial to write a simple buffer overflow. I have (basic) knowledge of assembly, and the stack. I've written a stack based buffer overflow before and understood it. The program I'm exploiting this time has NX enabled which means it's not possible to execute code from the stack or an environment variabl... |
I have a pool of cloud servers (~50) that need to talk to many other remote cloud servers (~4000) using SSH. Each remote server has its own SSH key, so we need a place to store all of these remote servers' SSH keys securely. How should we go about storing these keys without saving them all over?
What is the best way to... |
I am currently developing a component for an application that does TCP communication with a device inside a local area network. I use TLS to provide data encryption, integration and authorisation. However, I have to use self signed certificates which will not expire in like 5 years or more.
Since using self-signed cert... |
So, i learned that new in PHP 5.5 is password-hash() which works much like crypt(). Which is more secure (slower) than md5() or sha1(). The result string is algo+hash+salt, which can be passed as-is to password-verify() to verify password. So far i get how it works.
Some doomsday questions that remain:
Q1) What is the ... |
Apologies for the funny title, I'll try to give a better explanation here :) I have just noticed something weird with regards to a website certificate: if I go to https://www.anobii.com/login using Firefox on my PC everything works and the certificate is validated.
If I visit the website on my phone, using Dolphin Brow... |
On a large project, my company is responsible of administering the internal servers where applications used within the intranet are installed. One of our sites are accessible from outside but we do not manage such redirection, another company is tasked to manage the network. Every seat has a laptop running W7 with no r... |
Among the Elliptic Curve Cryptography (ECC) algorithms available in OpenSSH (ECDH, ECDSA, Ed25519, Curve25519), which offers the best level of security, and (ideally) why?
|
In ~/.ssh/id_rsa.pub my public key is stored as:
ssh-rsa magicmagicmagicmagic...magicmagic username@hostname
When publishing my public key, should I include the username@hostname bit? Can I replace it with something else? My concerns are that:
I may want to change the label for vanity purposes (super@wishihadbetterh... |
I know being an employee I am paid to do what my boss tells me to do, however:
I am currently writing a website for my company that I work for. We work with sensitive data, so much so that my line manager told me that the overall boss wants me to lock IP addresses to accounts so that you cannot access it unless you are... |
I tried to find any documentation about the security of LINE messenger, but I couldn't.
Is there any documentation or reviews about the communication protocol it uses, and whether or not it uses end-to-end or point-to-point or no encryption?
|
I am looking for a password application for storing passwords, and RatticDB have a web interface and SSH access is planned, which are exactly the features I am looking for. However, they write that they don't encrypt the database.
When designing RatticDB we made some very specific design decisions.
We didn't include... |
Is it possible to detect IP spoofing/reflection attack via NetFlow?
|
Is it possible that somebody who has access to my laptop can flash a new version of bios which does spying too i.e. recording keylogs, url browsed, downloaded files etc and send it to remote location and i will not even come to know about it ? I am running ubuntu 13.10 on dell inspiron.
|
I've tried to reproduce a string comparison timing oracle in two languages (Java and Python), but I'm not seeing any correlation in the timing based on the input into the comparison. Are there any examples out there, or do you see an issue with my code? Note that I would like something simple, like the example I have... |
A friend of mine lives in Hong Kong and she travelled to China over the weekend. Whilst there, she was able to use Gmail on her Android phone without logging in again, but she had to re-login on her laptop to use her account (she didn't end up using it on her laptop). Something very strange happened while she was the... |
Are there location tracker hardware (GPS receiver) which can be fitted inside of a laptop and it sends live location data to a remote location ? If yes, how to detect such trackers ?
|
The oft-mentioned approach for website password-handling is to use a server-side language to employ a suitable hashing algorithm (stretched or otherwise designed to overly-consume computing resources), combine with a randomised salt, and voila: a safely stored password. I'm over-simplifying, of course.
Whilst this stop... |
After constantly being under attack in phpBB, I created a new forum by hand, which successfully prevents spam bots from registering, and I get a report for every failed login attempt, telling me the info they tried, their IP address, whether they're blacklisted, etc. Of those that are from spam bots, the login info I s... |
I have an ASP.Net MVC 4 web application that is hosted on a Windows 2008 server. The application is secured by a custom ASP.Net membership provider. Only users who are granted permission by the admin have access. The application contains sensitive medical data of individuals.
Recently, I discovered that 60 out of 320 r... |
I have file uploaded system in my php project.
What I make at uploading:
1) Check file extension and file mime type.
2) If extension and mime type are allowed types, I save file outside of public_html directory and then, I give the opportunity to users, download file so:
if (file_exists($file_path)) {
header('... |
So I have a Ubuntu server hosting a PHP-based web site for me. Some of the services rely on sendmail being configured. I have set it up to send through my GMail account.
As of yesterday ~19:00 CET, my GMail "sent mail" folder suddenly got overwhelmed with Returned mail delivery reports from Mail Delivery Subsystem. I ... |
I have a string of 7 characters. I'm supposed to generate all the combinations. But some combinations are more likely than others, I would like the more likely ones to be generated first.
If I iterate from AAAAAAA to ZZZZZZZ, it's very unlikely that AAAAAAA is a valid combination. But BZYEKSO would be more likely being... |
I need to encrypt byte arrays blobs fields of approx 50k to 100k each in .net with a public key then store in SQL/Server thendestroy original data. When the data is retrieved by the ultimate owner, it would be with a key that only they have (I don't).
The problem is that I need all records to be encrypted with the sam... |
After reading the recent social engineering of a user's twitter handle, I started thinking about ways to improve my own online security.
We can only do so much too protect ourselves because at the end of the day we have to trust the companies whose services we use to do their part in protecting us.
Nevertheless, I'm c... |
As described in Perfecting the Art of Sensible Nonsense, a major breakthrough in cryptography research was published in the summer of 2013:
Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits
In principle it seems to allow for what most computer scientists had assumed was impossible:... |
The PCI DSS says that a server can have only one primary function and i'm a little confused over what it means by 'one primary function'
we have a webserver with database - web pages and email
is this a breach of the rules? because just about all web servers come with a database, web server and email. We are only a ver... |
There are more and more sites claiming that long passwords which are chained words are not only easier to remember, but also more secure then short but obscure ones.
Don't get me wrong: I totally get the idea of entropy, but are actual bruteforce-attacks really that stupid? With Markov-Chains and dictionaries isn't tha... |
My boss is asking me to prepare the fire incident Plan(IR) and Disaster recovery plan(DR), and how can we determine it is IR / DR. I am no clue on those issue. What should I do?
|
I've been reading the posts here about bypassing ASLR. On 32bit systems this appears to be trivial but I was surprised to see how trivial. It takes mere seconds to bruteforce ASLR address'. The reason seems to be that according to my tests only 12 bits actually change in the address:
export BLAH=$"/bin/sh"
BLAH will b... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.