instruction stringlengths 24 29.9k |
|---|
I'm implementing the Secure Remote Password protocol, and similar to this question, I'm wondering if I can use the SHA-512 hash function instead of SHA-1 currently being used. Would this help improve the confidentiality of the Key?
M = SHA1(A | B | Key) -->
<-- SHA1(A | M | Key)
|
Let's say Alice wants to use a webservice on Bob.
Bob is on bob.in.wonderland.com
Alice opens a connections to bob.in.wonderland.com:443. Taken by DNS magic rabbit, Alice arrives on port 443 at 69.64.156.40.
Alice asks for a certificate and Bob presents its, issued by Diginotar to bob.in.wonderland.com. As Alice trust... |
On Freenet you can host websites deemed 'freesites' which are publicly accessible by everyone. As I understand, Freenet can serve a variety of content, some which is illegal, which is why content is encrypted on the users computer to ensure plausible deniability.
If this is so, how can many people access a freesite if ... |
I was wondering how OS detection really works on Nmap. I know it is about to send different tcp probes to see how the target machine responds to them.
But what kind of probes would distinguish a Linux system or a Windows system? A Linux 2.4 or 2.6 system? Windows XP or Windows 7 system etc?
|
I understand why the SSL client certificates are not widely used (need to install them, problems with shared machines etc.). On the other hand when I log into the server the password is send to it and it is in server's memory. Also if the server certificate leaked and there was DNS spoofing there is little protection a... |
I set up a server running debian I opened port 22 allowing access to ssh into the port. I keep getting weird messages in my router log saying: [LAN access from remote] from 211.161.46.101:57201 to 10.xx.xx.xx:22
I looked up the IP address and it said something about being from Beijing. Am I being hacked? I changed ... |
I was just implementing a new feature on the registration form of my site that checks if an email address is still available to register an account with. I am wondering if it is secure to show a user that a certain email address is no longer available.
Is this feature a security risk related to the privacy of my member... |
When I try to use nmap:
# nmap -sP -6 FE80::1-234
[...]
Failed to resolve given IPv6 hostname/IP: FE80::1-234. Note that you can't use '/mask' or '[1-4,7,100-]' style ranges for IPv6.[...]
What other tool can I use?
|
I've implemented a Forgot Password service in the following way:
User goes to login page, clicks on "Forgot password?"
User is presented with a form that asks for their email address.
Email is sent to given address if in the database, with a link that contains a (supposedly) unique, long, randomly generated string, wh... |
I just authorized remote access to my Windows 7 machine (not using NLA, since I run a mainly Linux network). I diabled Remote Assistance.
My user (JoeBlow) is protected with password 123456 and autologon is not enabled.
When I connect from a Linux (Ubuntu) box, with a local user named JoeBlow, using password 0987654 (o... |
I found something very suspicious. When connecting to www.pulseexpress.com following a Google link, the server redirects you to some very dubious site that sends you a .exe file right away:
# host www.pulseexpress.com
www.pulseexpress.com has address 173.236.189.124
# netcat 173.236.189.124 80
GET / HTTP/1.1
Host: www... |
I have a website that needs to be PCI compliant. I have coded it using the guidelines but to be safe i wanted to get a third party audit done where this individual who runs a IT security firm and does individual projects will look at the source code and will also do penetration tests, etc.
Now while it will make me ... |
After yet another exploit of and malware injection into his website, host Leo Laporte of the Twit network has recently asserted/been told by his security expert that falling victim to such attacks is simply the cost of doing business on the Internet, and that the best one could do about it is to react quickly, remove t... |
Are there people who will refuse to use a website just because that site sends browser information to Google Analytics?
Could the +1 button be a red flag?
Should I expect that there would be similar thoughts around Facebook Connect?
|
SRP is short for Secure Remote Password protocol, and provides a better way for passwords to be sent over the internet.
I've read the information at it's Stanford University home page, the Wiki Page, looked at a in-browser demo. I even found a company that uses SRP, read their blog but still can't figure out how to... |
There is a site with IP blocking. When a client makes too many invalid attempts when guessing e.g. password, then their IP address becomes blocked.
I've heard about IP spoofing and similar attacks. Can an attacker spoof their IP address and continue their attempts to guess passwords?
If it matters, site uses HTTPS and... |
Google offers a Chrome plugin that uses cookies to control privacy, while Firefox offers a HTTP Header to tell websites to not track the users and log the data anonymously.
This obviously extends a level of trust to the advertiser to respect the user's privacy wishes. The Google cookie approach seems to be based off a... |
Say an X.509 cert is signed by an intermediate cert that's not in your browser. Maybe the root certificate is but not the intermediate cert. At that point it seems like a valid certification path could exist even if your browser doesn't know about it and I guess you'd just be S.O.L?
Seems like maybe there ought to be... |
Say there is a line of business application which has username/password datatable in the DB. Personal email address is not stored, and usernames are assigned by an administrator. Someone gains access to the database, and finds out, among other things, mentioned user data.
Why would one be interested in passwords, when ... |
I am deploying a vulnerable web application for students (about 100) in a university, that they can test online and am collecting all the traffic for research purposes.
I am deploying this machine on an ESX hosting other machines, and am concerned about the security issues involved.
Any recommendations/links/tips avail... |
This is a question to learn more about security management and physical security.
I'm running a small serverroom in the basement at home, mainly as testbed for attacks I dont want to try on live hosts and for development. I'm more of a learning by doing person, so I want to maximise the security of my basement room an... |
Possible Duplicate:
If someone breaks encryption, how do they know they're successful?
First off, this is not about cracking hashed passwords. I know that a brute-force or dictionary attack knows it cracked the password when it gets in.
However, if an attacker is trying to brute force a message, let's say a messa... |
The guys who made the security for my country's state bank are completely nuts in all senses. Their internet banking password must be between 8 and 10 characters, and contain only letters and digits.
I don't think I need to stress how insanely backwards such restrictions are.
In another news, my card's password must be... |
In his book Michal Zalewski says:
To protect your users, include a top-level crossdomain.xml file with the permitted-cross-domain-policies parameter set to master-only or by-content-type, even if you do not use Flash anywhere on your site. Doing so will prevent unrelated attacker-controlled content from being misinter... |
In Tangled Web Michal Zalewski says:
Refrain from using Content-Type: application/octet-stream and use application/binary instead, especially for unknown document types. Refrain from returning Content-Type: text/plain.
For example, any code-hosting platform must exercise caution when returning executables or source ar... |
In Tangled Web Michal Zalewski says:
If you are not using path-based parameter passing (such as PATH_INFO), consider disabling this feature.
He gave only one example of this vulnerability. There HTTP response of downloaded file contained Content-Type: image/jpeg and Content-Disposition: attachment. Url to file (suppl... |
SSH offers a large variety of algorithms for Ciphers, MACs and KexAlgorithms configuration options. Sometimes I need quick and light (my own internal network), and sometimes I want all the protections I can get (VPN'ing home from DEFCON).
Is there a taxonomy of what's slowest/fastest, and most/least secure (given know... |
EDIT: Here is some more background. I am basically trying to reproduce this the method outlined here I have been able to hit everything up until the paragraph regarding the decrypting of the data file in the raw folder. That site pretty much outlines everything.
The file was encrypted using a random number via the jav... |
I would like to know, what are the best hardening methodologies, procedures, and books to use when hardening your network? Especially for the following:
Windows /Linux Server
SQL server
Microsoft Information Services (IIS)
|
Here in Germany, authentication of transactions in online banking (beyond the basic log-in password which is and has always been needed as well) has evolved from a list of one-time passwords which are distributed in advance on paper (so-called "TAN" codes, or transaction authentication numbers) to the use of one-time p... |
I am trying to make a judgement call on a cloud provider's security. This is what I know :
Provider A - PRGMR.COM (not very well known but competent and reliable)
Is very transparent - seeks feedback, honest about downtime, etc (a great plus in my experience)
provides out of band access via ssh (ssh-keys used for auth... |
I know of a company who has port 3389 open on their router and forwards this to a Windows SBS 2003 server. The server has the Windows firewall switched on, is patched and has an up to date antivirus program, the router is a Draytek 2820.
Is this a secure combination?
Thanks
|
I guess this is not considered a true MITM attack since the attacker does not have to be between the server and client. My question is how it is possible to poison a DNS cache, and redirect traffic to your computer that is hosting a proxy that then forwards traffic to the actual web server? I wanted to simulate an such... |
I am trying to exploit the Kaminsky bug for a school assignment. The specific version of the bug that I want to exploit is sending a forged packet with false information about www.domain.com so that all users attempting to access www.domain.com com will be directed elsewhere. My packet looks like so,
flag: 8580
Query: ... |
Just read this article on Google Analytics and the risk of forged certificates, where it said:
Sooner or later it's going to happen; obtaining forged SSL certificates is just too easy to hope otherwise. What can we do about it? Don't load the Google Analytics javascript when your site is accessed via HTTPS. This is ea... |
Apologies if I'm using the wrong lexicon, I'm just reading up about password systems out of interest.
After seeing the xkcd strip on passphrases and coming across the passtouch system (youtube demo) that uses an abstract signature to login to sites, I just wondered how the company, or anyone might estimate or predict t... |
I was just watching as my bandwidth monitor spiked downloading a file. I checked my current netstat and I didn't recognize one of the IPs so I started capturing the data with Wireshark.
The situation:
None of my services explain the connection
The suspicious IP shows up as malicious Google Search and malc0de database
... |
I'm looking at one of our compromised web server logs and we found that an attacker has uploaded a file with multiple extension. Below is the IIS log. The log format are as below. I have removed the cookies and user agent values as they are a bit long and irrelevant.
#Fields: date time cs-uri-stem cs-uri-query c-ip cs-... |
An nmap scan against an IP address shows that port 5060 is open. I know that 5060 indicates that this is SIP traffic. Also, 5060 indicates that this is unencrypted traffic, where if the port was 5061, then the traffic would be encrypted.
I also have a hunch that 5060 tunnels through to a PBX-based phone system (possibl... |
6.4.2 Is there separation of duties between personnel assigned to the development/test environments and those assigned to the production environment?
What does the separation of duties here mean? Is it in the sense of http://www.sans.edu/research/security-laboratory/article/it-separation-duties or something else? The... |
I've bought something from an online store, and when entering the card details, it sent the details to their server through a HTTPS connection, which I then assume they forwarded to their provider - who that is I don't have a clue.
I've since read on their site and they do say that they'll store card details, but:
I c... |
The reasoning is what if an enterprise monitors snort alerts more-so than say syslog. Is there a specific pre-defined alert for 'client side app says something fishy is going on'?
|
I would like to encrypt some data so that it can only be read if two or three people use a private secret to decrypt the data.
What is the best / most modern way to accomplish multi-person decryption?
Some thoughts I am thinking of
X people has N characters of a password that is X*N characters long
Re-encrypt the me... |
I'm creating a server where people can come and talk to each other. I'm mostly doing it for a fun project. I'm using RSA for encryption/decryption, so only the clients will know what's being said. I don't want the server to handle any decrypted text.
My question is, what's the most efficient way of doing this? From my ... |
I'm attempting to compile resources on industrial IT security from a non-technical standpoint as it pertains to the U.S petrochemical industry. This is for my final research paper as an undergraduate student enrolled in BAISc (Information Systems Security).
My paper will be primarily structured around developing polici... |
When using the Diffie Hellman exchange with the second Oakley group 1024 bit Prime per RFC 2409 (*), how large should the random numbers generated by both sides be?
In RFC 2631 this is called the private key, and I'm quoting:
X9.42 requires that the private key x be in the interval [2, (q -
2)]. x should be ran... |
Say we have a hash of a password. The password can be considered to be made of of totally random characters and has a fixed length of N. The hash is SHA1(password+salt), where the salt is of length M.
How large must M+N be in order to resist a rainbow-table based bruteforce attack?
Scenario #1: Consider the attacker ... |
I am researching IPS devices and their signatures both stateful and stateless. The test network I am looking to implement the IPS in has asymmetric traffic so stateful inspection would be nearly impossible. What percentage of threats can only be mitigated from stateful inspection?
If I were to turn off stateful inspec... |
Since a few weeks I have set up my google apps domain to use DKIM for all outgoing mail. Does this mean that everyone that is in possession of a copy of the message can verify that it really originated from my domain, and that the contents were not altered?
I am specifically considering the cases of forwarded messages ... |
In the past, I've always used a single session per user setup, but I'm working on a project now where a user can be signed in from multiple locations/browsers at the same time.
What are the security concerns for single vs multiple concurrent sessions per account? Is one method considered best practice over the other? W... |
I get that I don't want a page loaded from stackoverflow.com to be able to request gmail.com on my behalf and read my email--but this seems to be simply a cookie issue.
Since JSONP bypasses same-origin entirely, I want to know why, instead of making XMLHTTPRequest conform to same-origin, the browser doesn't just apply ... |
Diskcryptor is an open-source competitor to TrueCrypt for Windows. It has an edge over Truecrypt for system encryption, because it allows for more than one independently encrypted system partition, and this is exactly why I use it.
Can anyone here confirm that this program doesn't have backdoors and is as secure as Tru... |
How does the password that we enter (to connect to a wireless network) encrypt the data on the wireless network?
Through my reading I am not sure if the password that we enter is the same as the passphrase. If that is right then how can the passphrase generate the four WEP keys?
I understand how the four keys work in W... |
Correct me if I am wrong, but I think Windows 7 is the only operating system out there that requires a hint for the first user created on the system (have not had a chance to check out Windows 8 Beta). Why does Microsoft insist on requiring a hint for what could be seen as the root user? Of course you could always pu... |
I originally posted this as a reply here in this thread but didn't get much feedback on it, and now I'm curious as to what others think is the best approach, or if there is any difference between the two approaches.
The original point was whether it was more secure to send out a password reset link when a user forgets ... |
I am about to set up a new account on my Linux server for a user that lives in another state in the U.S.
I can't think of a good way to get them this user their password. There must be a standard mechanism for this, right?
|
Basically, if I have a Windows computer connected to a domain, how can I ensure that if the password is changed on Active Directory that the computer must be restarted before the new password takes effect? Is this possible?
I ask because I have a computer that is on 24/7 and that runs important services. It spends most... |
Possible Duplicate:
How to simulate DDoS attacks from the Internet?
I want to conduct a DDoS attack. Can anyone please tell how can i conduct it? What are the latest DDos attacks? What are the tools available for it?. I dont want to conduct any real time attack but as a part of my academics i have to show demo of it... |
iOS, like most other mobile OSs, has the potential to leak significant chunks of personal information to 3rd-party apps and to ad and tracking networks used by those apps, which in turn also has the potential to allow aggregating and tracking user identity and behavior across apps.
Location Services was finally locked ... |
Possible Duplicate:
When a sysadmin leaves what extra precautions need to be taken?
A company has been maintaining its ALL internal and external (like google emails, apps, etc.) IT systems (computers, servers, networks, web sites, security keys to bank accounts and auctions, passwords, etc.) with the help of externa... |
So i'm trying to set up a pen test lab in virtual box on my windows 7 host.
I have 3 guest OS's installed:
1.) BackTrack5
2.) Centos 5 Server/Snort (My Snortbox)
3.) Win XP (Unpatched)
I have 3 Ethernet adapters created IP'S
192.168.191.1
192.168.127.1
192.168.56.1
My goal is to use BackTrack5 to nmap the Win XP ... |
I'm creating a REST WCF service and want to use OAuth to authenticate each user's request. The user accounts are stored in Active Directory so I have access to their AD login name on the client application and can pass that information along with the request header.
I've used oauth with the FatSecret REST API before so... |
I am working on a PHP sandbox for a Web Application Honeypot. The PHP sandbox will analyze a PHP file that may have been injected as part of an RFI attack. It should run the file in a safe environment and return the result, embedding the output of the PHP script. We hope to fool the attacker into believing that this is... |
When I search the name of my site on Google, I see site links description which are spammy and not related to my site. Sometimes when I click I get redirect to phishing sites.
But I have used many site cleaner tools, and they reported that my site is clean. I have checked my site in Google's webmaster tools for malwar... |
What is the added value of a Windows 2008 Server over Windows 2003 in terms of security?
Does Windows Server 2008 has enhanced/new security features compared to 2003?
|
For intranet applications that already leverage Active Directory, is there any point or benefit to adding a second layer of security such as OAuth when accessing SOA REST services? We're new to SOA and REST and are fairly unguided as to how to secure our services.
|
If I have a normal TrueCrypt volume, and I want to create a Hidden volume inside of it, how do I stop the 2 from overriding each other? Or do I just have to manually make sure the inner volume does not go over the threshold?
|
How can I fuzz standalone applications because I can't seem to wrap my head around how a fuzzer can "feed" fuzz data to a standalone application.
Most online resources use web servers as examples. The other resources give examples like opening a file with an extremely long name. my question is are there any tutorials o... |
Our company is considering several options in moving to MFA with software OATH TOTP or yubikey OATH OTP. In regards to where the secret is stored, I'm aware that a yubikey or similar hardware device is hardened to physical attack on the stored memory to retrieve the key by force.
Do iPhones or Android device have a se... |
I've seen a security question/requirement that a website login return the same error message for invalid password as for non-existent user. The idea being that this it makes it impossible to discover valid usernames by scanning the error messages.
In cases where self-signup is available, does this make any difference? ... |
My bank has recently replaced passwords with occasionally asking me information that is "known only to me". Such information includes my date of birth, postcode, and my mother’s maiden name.
Obviously these details are far from qualifying for "known only to me", and what’s worse, I can’t change these when they are comp... |
I was employed as the only system administrator by a company where half of computers are portable ones being taken away for work at home, business trips, visits to clients, etc. having access to practically everything while connected to internal corporate networks.
And most users of computers, even desktops, are ad... |
What does the Mac OS X offer that it has been recently attracting users with IT security focus?
There are sites that specifically focus on "hacking" with OSX, such as machacking.net. Defcon has an entire link section dedicated for Mac (Titled: Mac Security Related Resources).
What does OS X have to offer to IT Security... |
I know this newspaper article sounds absurd. Even if a machine is compromised we (should) have hardware safe guards in all our devices to prevent the software from damaging the hardware. But is it possible to make a computer explode or catch fire? Has this ever been done?
|
Is there any best practice method (and preferably documented) way of revealing the True IP of a user using a HTTP(S) connection?
I.e.: To be able to uncover the true IP from transparent as well as anonymous proxies wherever possible.
|
Currently, I am a junior application consultant and we are maintaining huge amounts of redhat machines as servers. I am given the chance and liberty by my boss (unbelieveable!) to go do my own research regarding the security of our own systems. So I thought, maybe I should ask around here.... Hope you don't mind :)
So ... |
My email client will flag up PDFs as potentially insecure, but won't do the same for other document formats such as PPTs. Why is this?
|
There is a program for android- WifiKill which disables wifi internet access of some neighbor peers connected to the same wifi AP. How does this program work? ARP poisoning or some other techniques? Is there a similar one for laptop? Is there a way to prevent such attack? Link to WifiKill.
|
I have two related questions:
As HttpOnly attribute is understood by a set of modern browsers, I was wondering if there is a list of all browsers which support the secure flag of the cookie?
What would happend if a browser does not support the secure flag but an application sets it on the cookie?
|
I'm wondering how others verify the identity of users they're resetting passwords for. We currently try to speak to a manager at work, but it frustrates end users and seems like we don't trust them. I've heard some say that sending the password via SMS has worked for them, and it seems like there's a reasonable level o... |
My home broadband connection has been up and down all day, I took a look at the router logs and saw the following:
Mar 27 12:22:30 kernel: Intrusion -> IN=atm1 OUT= MAC=34:08:04:00:08:35:18:80:f5:97:9e:98:08:00 SRC=92.48.122.218 DST=x.x.x.x LEN=48 TOS=0x00 PREC=0x00 TTL=123 ID=64889 PROTO=TCP SPT=23431 DPT=3306 WINDOW... |
My understanding of the situation is that, when the Windows firewall is off, every port on the computer (all 65535 of them) is fully open. This means that any application running on the computer can send any traffic from the computer through any port to any device on the network or the internet. This also means that an... |
I have a PfSense box as a UTM, running snort among other things. I started noticing that when MacBooks and iPhones/iPods connect to my network, the snort log gets flooded with this message:
(ssp_ssl) Invalid Client HELLO after Server HELLO Detected
It seems like this must be in the network stack somewhere, as it happ... |
Is it possible to respond to an SSL Handshake request by sending back a http 302 redirect without making the browser mad?
I would like to immediately redirect to a different site upon receiving the https request. Will the browser allow that?
|
If I am using PGP to encrypt mails whther it is send as a MIME (Multipurpose Internet Mail Extensions) message, and S/MIME and PGP are used for providing email security.
When I send PGP message using a email client to my another web based account, what I got was a an attachment.
|
I have an account in an online banking system and they have the FAQ with something like this:
How secure is the <Online Banking System Name>?
Each page you view and any information submitted on <Online Banking System Name> is encrypted between the client's computer and the <Online Banking System Name> server using 128... |
Lets say my PC & server is in an environment where a theoretical attacker has physical access to the machine while I'm not there. Now the data is encrypted on the hard drive with TrueCrypt. However if I'm not there I usually don't bother dismounting the encrypted containers as it's time consuming to enter the long pass... |
if I have a developer who wants to install a new software and he ask me to check this software security before installing it what shall I do
|
I've been wondering for a long time about is. There are many certificate authorities having different types of certificates. But even certificates of the same security level cost a lot more with one certificate provider than with the other.
I'm aware that there are many types of certificates, but even certificates of t... |
What does a good security requirement for an application look like? I am talking about functional as well as non-functional security requirements here.
For traceability reasons I consider it important that the requirement is fully testable. I also want it to be technology-independent. What else is considered important ... |
Mod_security has a rules updater distributed with their release packages on sourceforge:
http://sourceforge.net/projects/mod-security/files/modsecurity-crs/0-CURRENT/
Usually, you can run the script and modsec will update the rules for you. However, recently, this feature has stopped working. I get the following 404 er... |
I'm doing a degree in network computing and am currently working on my dissertation right now. I am not an expert with networking yet, so I'm kind of struggling to get started with my topic that I've outlined below for which I hope to get your invaluable suggestions and advice!
My topic:
Today’s small to medium enterpr... |
In the company that I work there is a security rule:
If you enter your password 3 times wrong, your login will be blocked!
Then I have to go to mainframe program and re-register my new password. First I make a login in this program with my blocked password, so it still works for this.
If I type the password wrong 8 ... |
What level of access would an attacker need to obtain to compromise a SAML-based SSO system?
Would stealing the private key used to sign SAML requests be enough? What if an attacker had root on the server that was generating the SAML requests? Could they then later replicate sending the requests on their own machine, o... |
I have a web service (ASP.NET) running on my application server. It can be reached via
http://xxxxxx/Servercomponents/servercomp.asmx
Is possible to find this even if you don't know the file name and directory location? Could you scan for it with e.g. nmap or wget? Or could a spider tool like skipfish find it?
|
If the DIGEST-MD5 negotiation is done over an HTTPS connection instead of HTTP, does that prevent this list of disadvantages from Wikipedia?:
Digest access authentication is intended as a security trade-off. It is intended to replace unencrypted HTTP basic access authentication. It is not, however, intended to replace... |
Sometimes I imagine: My money in the bank is just a floating point number in a mainframe's memory... So, if I just change 1 bit, I will win a lot of money...
The most common way to steal money in banks today is to just ask people for their account information and credentials, through fake e-mails or websites. However,... |
I have to exploit a very simple buffer overflow in a vulnerable C++ program for an assignment and I am not being able to find the environment variable SHELL.
I have never worked with BoF before, and after reading lots of similar questions, posts, etc. I have this information (correct me if it's wrong):
The program sto... |
Is it possible for other application running in the OS to read the keystrokes that my application uses?
What about mouse events and window handles?
Is there any security wall that the OS uses to shield my application from other potential dangerous applications that have might infiltrated into the machine?
Is there any ... |
I am looking for a good Office Router that can handle good firewall rules, have logs, and ca support about 50 computers/devices connected with wire and wireless.
We had different models before, and even installed dd-wrt, but sometimes when there is some restriction rules, the router just hangs or starts acting weird on... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.