instruction
stringlengths
24
29.9k
I have a late model Mac computer. I allowed someone to plug in a USB drive, and my network activity changed afterwards. Normally, Little Snitch will report every app that uses the internet. Every time my router light flashes, Little Snitch shows the app (or system) that is doing it. After I allowed this person to ins...
We got a security review done of our PHP code and they team advised this in their report (amongst other things): /appdir/ Details The HTTP header user-agent has been set to \" . Request GET /appdir/ HTTP/1.0 Accept: */* User-Agent: \" Host: localhost Cookie: PHPSESSID=08rtvlq03bd9d57qor4abjg7q4 Connection: Clo...
Assume that you want to give some web users privileged access to your website, but that you are unable (or unwilling) to offer SSL to all of them - at least past the initial login page. In this instance, is there some way to manage the user session that will negate FireSheep, but not create a painful user experience?
how can untrusted values be included in a html-page as javascript string constants? Although the case i am asking uses JSF and Rails, I think this is a general problem independent of the server side framework. on-attributes It is obviously not enough to escape \ ' " in on-attributes: onclick='alert("[variable]")' varia...
Does PCI dictate how much should be logged at an application level or simply what shouldn't be logged? I'm struggling with too much logging right now and some people who think we should have it. From a debugging perspective I've found excessive logging almost useless in the past and am kind of agreeing with Jeff Atwood...
Suppose there's a multi-user web application that requires access to user's mailbox (on third-party service, like gmail, etc.). This access needs to be persistent. Which means we'd have to store user password. Which creates a vulnerability point - if somebody gained access to such system, he could steal tons of user's ...
My case is I just registered at dyndns.com to get a domain for a website I am staging on my home computer (I know it's not considered good to do so). But the website is not big, and I don't expect to have much traffic; about a maximum of 50-80 per day. My website is served by IIS 7.5, on a system with Windows 7 install...
We got a security review done of our PHP code and the security company sent this in their report: Request GET /appdir/ajax/addAvail.php?counter=1216%3cscript%3ealert(0)%3c%2fscript%3e&from=1216%3cscript%3ealert(0)%3c%2fscript%3e&to=1216%3cscript%3ealert(0)%3c%2fscript%3e&day=1216%3cscript%3ealert(0)%3c%2fscript%3e&pare...
In trying to identify the country a user logs in from, or to block country ranges for whatever reason (for example regulatory requirements) what tools, whether online or offline, are available?
What type of attacks are there that do not use open TCP or open UDP ports? Is it safe to assume that no open ports means no remote access? (Excluding the possibility that there is a badware already on the machine that makes outgoing connections to send/receive data/instructions) Edit: Looks like we also would have to d...
I have very little experience in web development, but I'm interested in security. However, I haven't fully understood how XSS works. Can you explain it to med? The Wikipedia article give me a good idea but I don't think I understand it very well.
I’m wondering where I can find good collections of dictionaries which can be used for dictionary attacks? I've found some through Google, but I’m interested in hearing about where you get your dictionaries from.
Typically my job description limits me to code-review of web applications. More recently I've been asked to assist with some server-side PHP optimization where, although I am familiar with it, I lack experience. I have come across a configuration setting called: disable_functions Are there any implications I should be...
I'm looking for SSL proxy capable of dumping requests. I want to test custom browser against SSL-MITM attacks. I'm able to re-route all traffic ongoing from browser to machine with proxy. Basically proxy should: initiate SSL connection with legitimate website issue self-signed certificate pass data received from legi...
I'll be honest - I want to download a free PDF from a website which requires me to enter my "non freeware" email address. I do have them, but I dont want to use one as I'm afraid of landing up on a spammer's list and having a hard time getting out. How can I circumvent this filter and yet have a valid / email-able emai...
I would like to get more knowledge around RFID-systems auditing. Does anyone have a basic guide step-by-step which I can use to set up a lab with proper RFID "sniffing" equipment? I would like to know: What equipment I need and where to get it (ebay and so on) What software I need and where to get it (websites, book...
If I have a user on a unix system where Im allowed to create new files, what prevents me from downloading an executable file onto that system which is already SUID'ed to root on a different system? Scenario: I'm logged into a shell with my user Karrax (box1) On a different system (box2) where I'm already root I set S...
(Full disclosure: I'm already an active participant here and at StackOverflow, but for reasons that should hopefully be obvious, I'm choosing to ask this particular question anonymously). I currently work for a small software shop that produces software that's sold commercially to manage small- to mid-size business in ...
I want know what common use products are there that use public key/private key cryptography?
In an effort to be PCI DSS compliant, I took a trustkeeper.net questionnaire. I failed the question that asks: Is the presence of wireless access points tested for by using a wireless analyzer at least quarterly or by deploying a wireless IDS/IPS to identify all wireless devices in use? (SAQ #11.1) My only wireless a...
We all know to use SSL/TLS to stop people eavesdropping on our connection, but how likely is it that an attacker will actually sniff your unencrypted password or cookie if you don't? If we exclude sniffing on the local network (a pretty major exclusion I know, but indulge me), surely the attacker would need to have acc...
Client browser certificates seem to be a nice way to protect sites from intruders - it is impossible to guess and should be harder to steal. Of course, they do not solve all the problems, but they add security. However, I didn't encounter any public sites using them. Are there sites that use them? Is there some flaw in...
I am setting up a web service through which my company will talk to a number of business customers' services. We will be exchanging information using SOAP. I would like to handle authentication with SSL certificates provided by both parties, but I'm a bit lost on whether there's a fundamental difference between the t...
This question about Advanced Persistent Threats (APT) was posted by Rich Mogull on twitter. I copied it here because I'm curious too. Rich posted these follow-up tweets: And by APT I mean real APT.... China specific stuff. Netwitness/Mandiant/HBGary type stuff. Really specialize in this. Most of what I've seen ...
I'm trying to get all of our laptops doing FDE (as I'm sure lots of you are), and I've run into a problematic spot. Our Windows and Linux laptops are Dells, and they have some good BIOS integration with the Seagate drives (such as the ST9160314AS). That's working well. However, on the Mac, the BIOS support (well, EF...
I'm writing a client app in Java that sends encrypted data back to the server. All clients have my RSA public key. Is there a standard way to encrypt a given file with it to send it back to the server? From websites such as this one, I gather that usually, a symmetric key is generated to encrypt the actual file, and th...
Obviously, securely backing up sensitive data is a challenge. A remote backup is important for surviving a variety of disasters. What are some of the "gotcha's" lurking out there, and what best practices can avoid them? To make it a bit more concrete, consider e.g. a small business on a tight budget backing up both s...
A security report we conducted through an outside company reported XSS vulnerabilities in FCKeditor which we're using in our PHP application. They pointed out that accessing URLs such as: http://www.ourdomain.com/fckeditor/editor/filemanager/browser/mcpuk/connectors /php/connector.php?Command=837<script>alert(0)</s...
Is it possible to prevent regular users from accessing the C drive via Windows Explorer? they should be allowed to execute certain programs. This is to ensure that employees cannot steal or copy out proprietary software even though they should be able to execute it. One way would be to change the option in windows Grou...
I would like to design a client-server application where the server is placed on Internet. I assume that I could set up the client-server connection using VPN (is it using IPSec?) or using a SSL connection (possibly https). What are the differences between VPN/IPsec and SSL/https for securing a client server connection...
If you need to dispose of printers or fax machines that have handled sensitive documents, how should they be handled? Should you permit them to be donated or sold for reuse outside the organization? What kinds of media sanitization methods are recommended for this scenario? Any references or links to industry standar...
I work with a company that sells medical supplies and equipment. As part of this, we retain patient information or Protected Health Information (PHI). What measures have you taken when providing access to this data in a database? Should developers be allowed unfettered access to the entire database, since it is part of...
Suppose I have an Infopath form that is digitally signed today by a valid, and active user. When that user leaves the company, we disable the account and revoke the certificate. This causes a problem since the old documents that were correctly signed are reported as being invalid. How do we maintain the integrity of a ...
Is it as secure to use L2TP for VPN access, rather than IPSEC? Am I introducing any risks by using L2TP?
I am planning to setup a public wiki using mediawiki, but I never used mediawiki for a public site before and I am not experienced with it, even as a user. I am planning to create a very restricted wiki setup with restricted account creation and editing only by registered users, but content open to the public. So I a...
Firesheep has brought the issue of insecure cookie exchanges to the forefront. How can you ensure that all cookie exchanges are forced to occur only via an SSL-secured connection to the server when you're communicating to a web user? Our scenario is that the web app is written in ASP.NET 4.0 and hosted on Windows Ser...
It's often said that HTTPS SSL/TLS connections are encrypted and said to be secure because the communication between the server and me is encrypted (also provides server authentication) so if someone sniffs my packets, they will need zillions of years to decrypt if using brute force in theory. Let's assume I'm on a pub...
What issues will we face with the use of network surveillance tool in the company network with respect to the Telecommunication Interception Act and Privacy Act ? And what policies could be implemented to mitigate these issues ?
There are some websites and even programs that I use that have ridiculous password restrictions. Lots of forums for instance restrict passwords to ~32 characters. Others enforce a restricted charset. What would cause a developer to put in such restrictions? As long as you do the initial hashing of a password on the cl...
What is your default umask set to? Did you run into any problem setting a stricter default umask?
We are looking at deploying a Cisco ASA 5520-I am looking at the security contexts feature, and was wondering if anyone has deployed their ASA in this way, and how it is working out for them. Have you encountered anything that you wished you would have known before you deployed it? Have you noticed any performance issu...
During a recent visit to a coffee shop, I noticed that they hadn't bothered changing their default user name and password for their router. I realise that someone could log on and be annoying to other users (kicking people off the network, locking the network), but what other malicious activities could be done with thi...
anyone have anecdotes on how subscribing to an IP reputation service led them to discover internal compromises? services like: https://www.iptrust.com/ http://ipremoval.sms.symantec.com/lookup/
I have a network, where a have a couple of VLANS. There is a firewall between the 2 VLANs. I am using HP Procurve switches and have made sure that switch-to-switch links accept tagged frames only and that host ports don't accept tagged frames (They are not "VLAN Aware"). I've also made sure that the trunk ports don't h...
As the title says, my firewall (Sonicwall) can do either IPSEC or L2TP/IPSEC for VPN connections. One advantage of L2TP/IPSEC I can see is that the client computer get allocated its own IP address on the LAN. Are there any other advantages?
I'm trying to get Android 2.1 phones to connect to our corporate VPN, but it would appear they only support DES rather than 3DES for encryption. Is it safe to use DES, am I going to get hacked if I change the encryption to DES?
I've got this ASA in front of a network that I didn't set up. It's been configured with the clicky GUI (the ASDM), not the CLI, but I'm willing to use the CLI if it makes more sense. One of the jobs of this ASA is to allow remote users to VPN in and use internal stuff. It does this well enough. However, now I'm wa...
How to remove "mandatory level" label from the file? I have two files, for the first one icacls returns Mandatory Label\Medium Mandatory Level:(NW) for the second icacls doesn't return anything (that means use "default") My problem is that icacls /setintegritylevel [(CI)(OI)]Level can only set level label, when I n...
I'm curious if people have different views on this and why. Update based on comments: Defend enterprises. Quotes: "Long-time blog readers should know that I don't rely on tools to defend my enterprise. I rely on people first, followed by tools, then processes", Richard Bejtlich “The Enterprise Information Protect...
I have a customer with an IBM Domino server. They offer a way to export SSL keys but in a weird proprietary format. Any idea on how to convert those to OpenSSL? Basically I need to upload this key to an intermediate device that will do inspection and security. If I can bring it to OpenSSL, I'm golden.
In another question's answer, D.W. wrote: Make sure there is authenticity protection for the encrypted data (e.g., encrypt and then sign/MAC): you will need both confidentiality and authenticity protection. A very common error is to encrypt but fail to sign; this error can introduce subtle security problems What exac...
I tried to explain that security by obscurity should not be used but let's say I was challenged! I received the answer to list the known security by obscurity that I know, as a kind of bad practice and that should not to be followed. Indeed it is quite difficult to define Security by Obscurity, but I am not convinced t...
I am dealing with a small business that I have no choice right now but to deal with. I do not work for this business but my personal life dictates that I use them right now. I noticed a few months ago that they have a wireless network setup with WEP encryption (and a really weak key...don't ask), no MAC filter and the ...
Context: Small business, mostly a software house for web applications but also some desktop software. Many external collaborators, so a variety of outside users with access to the servers. Single physical server, with Linux and Xen as a virtualization solution - each VM has specific uses and controlled access. Externa...
What is the difference between SSH and SSL? Which one is more secure, if you can compare them together? Which has more potential vulnerabilities?
At my work we have a very tricky issue with spam. We use postfix, and recently began to receive several spam mails from our own domain. This is obviously very prejudicial for us, because many customers could think that those mails were sent by our company. Does anyone know some guide or solution for this particular p...
I need a primer for both the legacy (Level 1) .NET 2.0 security attributes and the new .NET 4 (Level 2) ones. I'm not familiar with the implications of controlling LinkDemand, stack walks, unverifiable code and other items in this Patern and Practices guide. Where can I learn more about this?
On a recent certification exam, I was presented with a question about ways to secure an 802.11 wireless network. It was a multiple-answer question, but the only two available answers that related at all to security were addressing SSID Hiding and MAC Address Filtering. Fortunately, this particular certification was ne...
Let's say I have a server listening on port 1234. I have some client software that needs to be able to connect to this port. But I want to prevent malicious users from bypassing the client software and connecting to the port by some other means (such as in a console or another piece of software). The trusted client...
I am working on putting together an Incident Response Jump Bag (detailed here). Any suggestions on what type of container/bag to use for this? It seems like a lot of little items that could be packaged together, and some big items. I have a messenger bag and backpack, but they don't really seem to cut it. Anything e...
As part of our PCI-DSS compliance process we get scans done by a third party. Based on the form and wording of the output, it's pretty clear they're using Nessus for most of their heavy lifting. Same as we use internally, actually. What is the value-add for having an external entity do the scans for us? Do they tune t...
I have some ActiveX controls that are not supposed to run in the browser but only in my particular Front-End. I know that by setting the Kill-Bit I disable their execution in Internet Explorer and MS Office applications. That is following the FAQ given by MS Part 1, Part 2 and Part 3. Now, I was assuming that ActiveX...
I am getting sick of reporting the same old chinese emails to Spamcop now and would like to make my own small RBL list that I can easily add blocks of IP's to. I have a spare PC and static IP address ready, just looking for some pointers on the best thing to install on it in order to make an RBL server. TIA
How do Intrusion Detection Systems (IDS) work? As I understand it, they monitor network traffic but what exactly do they look for? How can they tell apart regular activity from intrusions?
Any ideas on how to protect against the following scenario? Company x uses active directory for authentication of it's employees. The company has multiple authentication points that are semi-public and some that are fully public. (e.g., Extranet accessible from the Internet) Usernames are pretty easy to guess, as they...
Anyone have experience in a solution to manage in an integrated view this functionality ? - network forensic - SIEM - intelligence analysis and investigation Like Niksun or Solera solution do ? I'm talking about a SIEM and record solution of a entire network with intelligence investigation features, this tool of cours...
Is there a way (software, hardware/token or web-ware) to use One Time Passwords in the following scenarios: Logon to my pc/laptop (windows or ubuntu) Logon to sites with OTP (without having out-of-the-box support for OTP, which AFAIK none of them have). Do you use any OTP solution? Experiences so far? I'm interested ...
I'm considering starting a neighborhood-wide wardrive, with the objective of raising awareness to the risks of running unsecured wireless networks. Right now, I'm still in the planning stages of this project. The plan so far entails: Loading up a laptop and vehicle with appropriate tools. Drive through the entire are...
Many fingerprint readers and other biometric authentication devices come with software for single-factor authentication to the OS. Is there any third-party software (F/OSS or otherwise) available for making OS authentication a two-factor process, such as by requiring both a fingerprint and a passcode?
Most of us with fingerprint readers and such devices probably use the software provided by the vendor, to enable biometric OS login or single sign-on functionality. However, I've recently wondered if there is any third-party software that will do the same thing. This would be similar to how you don't need the manufact...
Over the years biometrics is the go-to movie authentication mechanism, but in the real world I'm getting conflicting opinions about it. Everything I've learned shows that biometrics are flawed because of two main reasons: they are non-revokable credentials, and they can easily be forged. So what is the state of the na...
Consider this. Many websites with software downloads also make available MD5 or SHA1 hashes, for users to verify the integrity of the downloaded files. However, few of these sites actually use HTTPS encryption or digital signatures on the website itself. So, if you're downloading a file from what is effectively an un...
Working on the assumption that SSL serves both to encrypt data and to provide assurance as to the identity and legitimacy of the website, should the practice of providing a logon form on a page requested over HTTP be avoided, even when it posts to HTTPS? The question relates to a post I made yesterday about the Who's w...
Let's say I have a file containing a random bunch of bits and then I encrypt it using some modern algorithm (Blowfish, AES, or whatever). If someone captures the file and mounts a brute force attack on it, how will they know they've successfully decrypted it? It would be obvious if the original input was meaningful, b...
Is anyone aware of any mobile (iPhone, Android, Windows mobiles and Blackberry) Operating System that support multi users? I am not aware but I thought it is worth double checking. Off course, in case yes, please tell me in case how many user groups do they allow and whether they are daemons or human users. If I need ...
What is CSRF? I need a basic definition that is not just lifted from Wikipedia. I understand SQL injection, XSS, cookie poisoning, but I just cannot wrap my mind around this. I am using a framework, CakePHP, that has a component that automatically prevent this CSRF. However, whenever I do something to the form like us...
I would like to give a daemon-style process (i.e. no user interaction) access to a shared secret key so that it can access a shared, encrypted data file. User applications accessing the same encrypted data store the shared secret key in the user's OS keychain (e.g. OS X Keychain or Gnome Keyring, etc.). The OS keychain...
I'd like to extract the current SSL certificate from the current browsing session, and read the properties. I'd like to do this at the Browser, for content that is delivered from the server. I'm not looking for a 3rd party tool. A likely implementation would be to use Javascript and any invokable object that may be...
A website of mine was recently hacked. Although the actual website remain unchanged, they were somehow able to use the domain to create a link that re-directed to an ebay phishing scam. I've taken the website down, for obvious reasons, so I can't link to the code. I'm wondering how I can go about finding out what vulne...
I recently discovered that my web site was hacked: there was a hidden HTML div that's about selling shoes...! I googled the text in question and voila: thousands of sites have been hacked. Check this out: Google the text 'There is also hang tag made of leather, a slip pocket to put cards' and go to the sites in the res...
I am learning to use Metasploit as part of one of my college lessons. As you may know there are software builds like NOWASP (Mutillidae) or Damn Vulnerable Linux that allow you to exercise on pentest or similar things. I have heard that in order the payloads to work the target-victim should run its PC as server. I have...
I'm building a multi-tenant (cloud) environment that needs to push out (or make available for download) configuration files for agents (background services) that receive this information. One of the pieces of information in the config is a username and password. Assuming that the agent can be identified securely to th...
Is anyone aware of a C# code sample to interact with smartcard, hardware security module, TPM chips (etc), that will allow me to encrypt and decrypt data? My goal is to allow my application to support a variety of key stores, and should the administrator decide they want the Private key to reside on those devices, I wa...
On this answer, cjk says RSA and PGP are different. What you are essentially asking is how do I run my petrol car on diesel? The answer is you can't. I would be interested in a more detailed comparison between the two, why they are different, and why one would choose one over the other.
I'm interested in updating this two pronged question for 2011: What cryptology is most appropriate for low-powered devices (such as a cellphone), and yet still effective? What cryptology is most secure for a .NET developer? In November of '08 Rasmus Faber answered this similar Stack Overflow question with this respon...
I'm looking at downloading the C# binary for Bouncy Castle and see two downloads with source code. One has the IDEA algorithm, the others presumably not. http://www.bouncycastle.org/csharp/ Why make separate distributions?
One of the usage of Input validation, is to be protect against XSS. In case one would need to define best practice for the functions validating the input, then some (which I am calling quality criteria) are to check for expected type, check for the expected length, check for the expected range and etc... XML Bombs typ...
I have an application that is creating several keys and storing them in various stores (in this case the Machine store). How can I enumerate all the keys on a given Windows system? CspParameters cspParams = new CspParameters(); cspParams.KeyContainerName = containerName + " " + g.ToString() ; cspP...
Low down: This client does zero with credit card data (no processing, no passing of it, nothing), but they do have a device often placed on the same network segment of a POS (Point of sale) system. The key is their clients are expecting them to follow PCI security requirements and to produce an attestation. Given thi...
Data loss protection is a major concern to every industry. The software engineering process involves multiple points for potential data loss, as a number of parties are involved other than the client and software development team. The list may include external testing agencies, other software vendors, consulting agenci...
Okay, so we push corporates to improve security, and provide training to IT staff and awareness presentations to CEO's etc, but each year a new batch of graduates are brought in to companies as others leave, and they typically have one of two perspectives: security? security fascist! One of the things a few of us are...
What the advantage of sequentialy signing a document? That means signing a document by two people in a sequential manner?
This document says that a challenge response authentication proves the servers identity. But is a man in the middle attack still possible if the client does not verify domain name ? Please help me understand this.
I didn't make it to DEF CON this last year... I'd like to know what you thought was the most interesting/informative presentation and possibly a link to more information on the topic. [mod - switched to community wiki]
If I have a message that I need to send to another person, how do I achieve non repudiation ? Is digitally signing the message sufficient ?
Assuming a machine has malware, regardless of how it got there, one thing I would like to learn to do is to take the binary file and reverse engineer it to see what the malware is doing/has already done. It would be good to know what has been compromised, as well as look for routes to successfully remove it. I have fou...
A collegue and I have been asked to do a demo where we show off stealing Facebook sessions with Firesheep. I've never used Firesheep before myself, but I reckon it should be a simple task. I know the demo will raise a lot of eyebrows and many will be actually scared knowing they are using an open wireless network every...
I'm still pretty new to PowerShell, and recently read this in a blog posting about creating and using PowerShell scripts. To prevent the execution of malicious scripts, PowerShell enforces an execution policy. By default, the execution policy is set to Restricted, which means that PowerShell scripts will not run. You ...
In an answer to a question about RSA and PGP, PulpSpy noted this: It is possible to generate an RSA key pair using GPG (for both encryption and signing -- you should not use the same key for both). What is the reasoning behind this? Perhaps my understanding of public key encryption is flawed, but I thought the opera...
I've been playing with mod_security for some time and I'd like somehow to use it in my master thesis. I don't know exactly how this work could be more interesting than describing what mod_security does, what kind of web attacks can be prevented using it, what are other functions of it (like analysing if the requests ar...