instruction
stringlengths
24
29.9k
I would like to know if there was an other place to see if a debian package is fixing a CVE than the changelog of the packet. For instance the packet bind9 1:9.7.2.dfsg.P3-1 is fixing the CVE-2010-3613 here, can we see it somewhere else? To be more specific, can we see it in a place where we can compute the reading ?
With some colleagues we're having a debate regarding the randomkeygen.com website. I do think that there is a security risk using the generated keys of this (or any of this kind) website. Why ? Here's my thoughts: What prevents the owner of the website from storing generated password inside a database and releasing i...
"jmHMRWncShQ%3D" this is my encoded text , i want to know that in which format , this text was encoded , and also want to know that how i decode these types of code ??? this password may be encryptetion . .
I came across SAML and kerberos, both are used to establish identity using assertions (tickets) so is there an overlap in their use ? Can somebody highlight their differences and point which technology is a better fit where. thanks update to add some context, there are some web services in an intranet environment wh...
I'd like to make a webapp that would allow users to OAuth with Stack Exchange, so that they can perform actions like voting through the app. I'm stuck at one point, though: I know how to perform OAuth, but many users don't want to OAuth with my app if I can look in the DB and take their credentials, and possibly do bad...
I'm having trouble understanding how a particular XSS vulnerability might arise in the real world. Guides for two of the exercises on hackthissite.org: http://www.hackthissite.org/missions/realistic/9/ http://www.hackthissite.org/missions/realistic/11/ recommend XSS attacks to steal cookie information. In the first...
ASP.NET has a cross site scripting API by default, however does PHP have a cross site scripting prevention API?
Assuming that cryptography falls into one of three areas: Awfully weak protocols and algorithms, that are trivial to break with a low amount of effort and resources Cryptographically strong protocols and algorithms that require more time than the lifetime of the Universe to actually crack The grey area of unproven, ac...
As you all know, plenty of X.509 Certificates use (PKCS#1 SHA1 with RSA encryption) as the Certificate Signature Algorithm for generating the signature of 2048 Bits long. We know that SHA1 hash function generates a hash value of 160 bits, so this makes the 2048 Bits Certificate Signature Value a combination of (160 bit...
I am trying to understand if pinning a certificate essentially means pinning the CA or if they are different how so ?
I'm looking for a way to encrypt some data in such a way that I can later revoke a single person's ability to decrypt it. We have a store of database backups that are currently encrypted using GPG. However to decrypt them the team need the single private key. Instead, I'm wondering if there's a way to give everyone the...
I am looking to have a standalone compiled exploits for all local windows exploits that Metasploit has right now. I was wondering if somebody has done this before or know a place that has these exploits as an executables that are ready to execute on the vulnerable system. Here is a list of the exploits that I am lookin...
Is there any limit to the number bytes that an RSA key can be used before it can be exposed. In Symmetric encryption a Key is not recommended to be used to encrypt more than specific amount of data then it has to be transformed into an inactive state. Is this the same with RSA or asymmetric encryption schemes I didn't...
Some of my coworkers use Microsoft Outlook (I believe) and have it configured in such a way that mail attachments are encapsulated in winmail.dat files. Apart from the general annoyance and lack of interoperability, I would like to know whether there are arguments against this. Has the concept of winmail.dat encapsulat...
Mp3blaster is a terminal mp3 player running a UNIX-like operating system, e.g. Linux, Free/Net/OpenBSD, etc. I usually use this player for playing my music, but yesterday I found a blog which claim that there is an exploitable 0day. 1) The vulnerability is found in file main.cc. This is the code: void warning(const ch...
During writing some basic challenges, I discover that the exploits are not working if not launched in GDB. To test this behavior, the following program print register values and code address: #include <stdint.h> intptr_t esp; intptr_t ebp; void call_me() { asm("movl %%esp, %0" : "=r" (esp) ); asm("movl %%ebp, %0"...
I am currently in the process of designing a registration form for the users to register accounts. The accounts will contain a lot of personal information, so I want to ensure highest possible security. The biggest flaw/problem in the requirement is that username must be first letter of the user followed by his last na...
The Facebook iOS SDK only needs your bundle & app IDs of your iOS app to match those of your Facebook app. If I find out an app's app ID, can't I just create another iOS app with that app's bundle ID? Sure, I may not be able to distribute my app on Apple's App Store (since it requires every bundle ID to be unique), but...
I am curious in general if there are any reporting that collects statistics about the security breaches? like per country per industry and revenue losses? I am not interested in anonymized breaches like the ones of Verizon et al. I am interested in breaches admitted by their own companies, like (for example the Linked...
I'm developing an API which is planned to use simple user and password authentication mode. I have experience with HTTP requests and tended to think everything as HTTP request. As user name and password should never be exposed, would a cURL request hide authentication info or it would appear as any other post value at ...
A while ago (12 years old), I recognized my passwords weren't safe at all. Because I used the very same password everywhere, some grumpy admin could easily take over all my accounts (he got mail and password). The obvious thing to do is to change all passwords to unique new passwords. However, remembering these is cumb...
Encryption novice here so maybe this question makes no sense... Obviously if you know what the clear text is and it decrypts right, you have it. But if someone is running through keys to break the encryption how do they know they have it right? Would you have to check for readable text or can you tell from the math t...
When we go to websites that have generated certificates themselves you see this red screen that says do not go there!: However when it is trusted by some companies it's all good. So I have a couple of questions: Are certificates that are generated by these companies somehow better/different? If we take to account tha...
I work at a large company that requires employees to sign a digital certification saying that we recognize the right of the said company to monitor all data and communication on our work laptops, and that anything we do on the computer should have no expectation of privacy. What I wonder is, as far as standard enterpr...
How can i make a true/false statements in MSSQL without the following symbols: <,>,= ? Everything i can think of, e.g: or 1=1-- (true) or 1>1 (false) and 2<>3 (true) Makes use of those characters, is it even possible to do this? Via operators like & possibly? Thanks.
Many questions have already been asked about DNS cache poisoning (aka Kaminsky attack), however I couldn't find a clear answer to my question: Is DNS cache poisoning possible in a LAN, without executing a MITM attack? Clarification: It is normal that DNS cache poisoning is possible during a MITM attack. However, I don'...
The scenario: Data is sent to an application server and you want to selectively encrypt some data before sending it to a DB server for storage. All servers run some linux distro. This is a relatively high security situation where significant financial losses could be incurred if the data leaked, but at the same time th...
if i sniff all traffic leaving my router, if botnet traffic is present will it be IP traffic or does any malware use other protcols such as SSH, FTP, TFTP, etc?? do antivirus software programs routinely perform exit traffic pattern analysis? would it be useful to create a utility that does routinely analyse such traffi...
I am setting up a software security initiative at a small software company. Part of this is selecting a static analysis tool for early and automated detection of security vulnerabilities. Many languages have several incumbent static analysis tools. C#, our backend language, has a plethora of them, like HP Fortify or Ch...
I am going to install Linux on an external hard drive and my internal hard drive is currently running Windows. When I boot to my Linux and I still have my windows hard drive mounted is it possible for any malware on my windows hard drive to run or spread to the external hard drive even though I'm not booting to windows...
I am using the Pyro package to create a daemon which will, upon startup, prompt for a password, and then the daemon will store that password as long as it is running. Other scripts will then make a Pyro connection to this daemon and execute methods from the daemon, none of which reveal or have access to the password: ...
I'm creating a simple Android application which requires reading and writing values to the cloud. I intent to use PHP for the webservice. But I'm a little confused over the authentication scheme. I intent to host a script at www.mycoolsite.com/magic.php and POST data to it from Android. What is the best way to authenti...
I sort of understand what is meant by no security level beyond "cannot break it" but I have a much more involved question about having more than one form of encryption on a computer at once. Suppose your using Windows 7 and as we all know Anyone can encrypt and decrypt right within the explorer menu when clicking on an...
How should I handle authentication for a simple iPhone chat app? Backend I'm building the backend using two application servers: Sinatra REST Server It lists users & old messages. Node.js WebSocket Server It sends & receives new messages. Proposal When a user signs up or logs in, the REST server returns an access to...
I saw here that using the same key to encrypt and mac (in that order) a message could eventually be unsafe. What is the best way to generate two different keys from the same password (using a PBKDF with a password and a salt)? Generate a longer output and split it? Generate two keys using the same password/salt but wi...
A friend of mine installed a new firewall software at his company. Sometimes he works from home, and also has to maintain the firewall. The firewall management software is a web site. My friend made the management software reachable by https://firewall.company.org. Is this a good idea, or a bad idea? If it was up to me...
I'm working in a web agency, i have a request to made an home banking system for a little bank. I'm searching in internet for some information about security and a good pattern to start, but naturally i haven't found information. I'm a little bit confused, i know that a php web-portal is not suggested in most case (see...
It's possible for Tor exit nodes to sniff traffic on normal websites, unless you connect via SSL/HTTPS. But what about hidden services, they don't seem to support the HTTPS protocol. Can the exit node sniff/modify the traffic?
Is it possible to split the TCP/IP suite layers? I mean to get the original data packet with its all headers & trailers out of the Link Layer before delivering them to the physical medium, and then manipulating them in some way and then re-sending them to the application layer of the same IP suite? Sorry for my bad gra...
As we know, uploading of executable file is not safe. But if we change extension of file exe to txt, then file get uploaded. How to prevent this??
I could not validate malicious characters like ' .< > etc because these characters are required in my application. Also I could not encode characters because user supposed to enter HTML tags in my application so in case we encode characters, html tags not rendered on browser. So i have made a filter which blocked and ...
While in college I decided to have a randomly generated 16 character password. I used parts of that password in various sites. However, one of the sites was compromised so I had to change my password. I now have a randomly generated passwords per site. As you can imagine, it was difficult to learn the passwords and I r...
I've created a keypair with gpg2 --gen-key Then I created a subkey only for signing. If I clearly understand the process I have now 3 pub/priv pairs. The master, one for encrypting and one for signing. I exported public keys with: gpg --armor --export FINGERPRINT > pub.asc Now I have a file which seems to contain onl...
I have drawn an attack graph for a file-sharing application (eg. Dropbox) where a database stores details of virtual machines Eg. memory space left, etc. I've listed some possible attacks: The attacker can reduce the memory size assigned by some amount (eg. if I'm assigned with 2Gb of memory, the attacker can reduce i...
When I send a text message and/or an email, with or without location services turned on, what information is available to the recipient of that message if they know how to read the data behind the original message? IE: Location, my device, the service I use, etc. I ask because I would like to know what information I am...
How to check for different vulnerabilities mainly XSS, SQL Injection, CSRF manually??? We are not supposed to use any interceptor tool to read request and all. Is there any other way by which we can intercept any request without any tool or plugin??
There are several compliance and certification criteria that mention "multi-failure" disaster recovery. What exactly is the definition of this? A google search did not turn up a clear answer for me.
I'm playing around with certificates and encryption on a Windows system, but either it isn't working or I don't know how it should works. When I encrypt a file its name changes to green. But then, I can open it without any prompt or something. I thought "well... I'm logged with the same user that encrypted the file, le...
To repeat, "Why can't someone break email or https encryption by somehow getting access to the encryption key?" In other words, why can't someone intercept the key, or the algorithm to create the encryption key, using packet sniffing? After this, why can't they use packet sniffing to also get other data that is sent vi...
I need a client-side crypto library. I've seen https://github.com/digitalbazaar/forge linked many times on stackexchange. Forge seems to be the most complete and well-documented crypto library for JS. However, I have no way to confirm if their implementations of the crypto algorithms are proper and secure. I have not b...
I remember hearing something like this when I first learned the protocols that removed the need of a trusted third party, but I can't find this theorem or "law" anywhere. Any pointers?
I am in the process of creating a file/files containing all of my logins/password info for various accounts. In the event of my untimely demise this file would be sent to the appropriate party(s). What is the most appropriate and/or most secure way to encrypt this sort of file? I was looking into TrueCrypt or AxCrypt b...
1- what does "use NAME as default secret key" do in Kleopatra tool options? The reason why I ask this, is I have a looooong password for my certificate. And apparently this becomes a hassle when encrypting several files. So does the option in question replaces my long passphrase with my name? is that what this is? 2- O...
This question about RBAC implementation. Can a subject have a role in a certain realm? Suppose a university is made up of departments. Departments have courses. Courses have students. Students have grades in courses. Note that these grades are WITHIN the realm of a particular department, but they are not directly OWNE...
what will happen if us government shutdown Tier-1 internet backbone? Although Internet is designed to be quite resilient: Internet BackBone The Internet, and consequently its backbone networks, do not rely on central control or coordinating facilities, nor do they implement any global network policies. The resilience ...
I'm reading Jarmoc's Black Hat presentation on SSL/TLS Interception Proxies and Transitive Trust. I have a few questions on some of the key management practices. In the paper, Jarmoc states: To act as the server for the client-side SSL session, an interception proxy must have access to the private key that corresp...
i was wondering what actually causes wifi network connections to timeout. for instance, say my laptop is connected to my wifi and i yank the battery out such that my laptop can't send any proper 802.11 deauthentication frames. at which point will my router release whatever resources it had reserved for my laptop? is it...
After a nmap scan on my local host on my Windows 7 machine results showed a vast list of open ports. I'm using Windows Firewall. This machine was given to me by a friend. I've had my network crash occasionally. How can I stop or close these ports?
I am reading a book on security which suggest that if you have both development and production server and if you make some change, you should pull them from production server rather pushing them from development server via some means of automated scripts. Here is the whole excerpt: Content should move to the productio...
My question seems to be a mash up of two questions. The first is that over at TeX.SE there is a question about creating PDFs with crawler resistant email addresses. There are some good answers about creative ways that go way beyond just the boring name<at>domain<dot>com, but my question is, do these method cut down on ...
Looking for a bit of advice really, here's the situation: I currently have a security minded client who will be sending PGP encrypted files. I have to decrypt the files on my server before processing them. To achieve this I was thinking of using BouncyCastle with C#. Ok, so far so good... but... I was wondering what...
So I am working on a tool to detect any wifi device using Kismet. When I use Kismet, it works fine, but my problem is, it detects a device once, and until the MAC changes, it wont detect it again. However, I want to see, if the device is still around me and using wifi for something... I don't care if it is a access poi...
I own a web application (single page application with Angular), that asks for some data through a set of REST APIs based on my server-side application (using Play Framework 2.2.1). So basically, I'm not an expert in security and so I initially wanted to use a "tool" for implementing authentication easily. Thus I chose ...
I need to scan a range of IPv6 addresses with Nmap, but I'm not sure how to do this. When scanning for an IPv4 range, I would usually do this: nmap -sP 192.168.*.* or nmap -sP 192.168.1.* but if I need to do this with an IPv6, how would I do it?
Lets say a web application has four user roles. Standard, Supervisor, Manager and Administrator. Should a manager be able to promote someone else to a Manager, or only to a supervisor? I realize in the latter situation, an admin technically wouldn't be able to make any other admins, but administrators could always be a...
I own a REST API at server side and a distinct web application that would call those APIs. I want to secure my APIs calls. After some reading, I want to implement the OAuth 1.0a mechanism at server side. Indeed, dealing with temporary tokens, nonces etc.. is by far more secure than a traditional HTTP basic solution th...
I have a legacy system that collects and stores credit card numbers ( BAD! ). We are in the process of replacing that system in phases. We are going to integrate with a credit card processing system that requires us to be Level 4 Compliant. The new system will not do the bad stuff ( storing credit card info ), but b...
According to findings by the EFF's SSL observatory, there are "tens of thousands of keys that offer effectively no security due to weak random number generation algorithm." My understanding of that problem is this: During the generation the large prime factors used by the RSA algorithm, a significant number of devices...
was trying to consume an Web Services that I have published on the Web but I couldn't thing is that when I got into the server and check the "Event Viewer" I have a LOT of "Failure Audit" and they keep coming as we speak. So I guess someone is trying to hack in my server. How can I solve this?
To pay off our users, they are asked to enter their IBAN and bank name and bank address. The users are mostly based in Europe. As far as I know (see also this question) these details can not be used to withdraw money without verification (Direct Debit in Germany?). Would you encrypt these details? Or in other words, is...
My mail server has recently come under a very bizarre attack. Every five to ten minutes, a new IP connects to SMTP, attempts to try weird usernames (like pil, bennett, netscape, msfuser, desktop, fenix, clamav, emily, wwwrun, etc). Every attempt follows the same exact pattern, trying the username as the password, the...
I understand that if you specify multiple contents then the rule triggers only if ALL the content conditions are satisfied. But I want to create a rule that will trigger even if any one of the content keywords are detected. Note that it has to be in a single rule. Perhaps something like this: alert tcp any any -> any 2...
I'm making a few assumptions about basic email security, and I want to confirm or clarify some of these points to make sure I understand the big picture. Please correct me where I'm mistaken: The answer to this question gives some insight, but doesn't cover all I'm looking for. This is all assuming a traditional email ...
I use a site on a regular basis so I wanted to make sure it was secure. One of the things I checked was that when I changed my first name to <img src="http://blah.blah/blah/blah.notanextension" onerror=alert(document.cookie);>Henry that it didn't give me the alert with all of my cookies (I had already determined that ...
I've been trying to learn more about Digital certificates for the past few days and I'm struggling in order to understand how actually this concept is applied in the real world. Anyways, as I visited the website https://google.com, I decided to view the site information and I came across this information called Certifi...
Many games today are prereleased in an alpha/beta state and instantly overwhelmed by "hackers" downloading programs manipulating the game itself to become overpowered. I guess they make injections into certain memory addresses in runtime but I have no clue of how to go about to create a program like that. Also, how do ...
An aspect of security has bugged me for a long time: Why is there positive certainty about the importance of hashing algorithms and salts, but password strength is either never mentioned at all or considered a rather "philosophical" matter? To me, there are three components of a correct hash implementation: Slow and c...
When I generate a DSA key with ssh-keygen -t dsa, the resulting public key will begin with ssh-dss. How come? Why not ssh-dsa?
I'm using Windows 7 and Firefox 22, connecting through a regular residential wifi router. In the last month, I've noticed that when I connect to the internet once in a while my firewall indicates that lsass wants to connect to different IPs. example: C:\WINDOWS\SYSTEM32\LSASS.EXE Local Security Authority Process Remo...
How can I log attacks separately using snort. I basically want to log attacks invoked from different files separately. Like if I have 2 files, ddos.rules and log.rules, then I want logs generated from ddos.rules in one file and logs generated from log.rules in another. Is it possible, and if so how can I do it?
While setting up the Dovecot IMAP service, I noticed that the default parameters are not optimal, it allows SSLv3 for example. Using Thomas Pournin's TestSSLServer.java program, I saw the following: ... Minimal encryption strength: strong encryption (96-bit or more) Achievable encryption strength: strong encryptio...
If information_schema is not allowed in MSSQL , what is another method i can use to list the tables inside a database and ultimately the columns so i can dump them without using information_schema? Thanks.
My wireless network protected under WPA-PSK/WPA2-PSK protocol. Is there a good reason to change the default user/password for the router management interface? What would it take for an hacker to get into my network? Does the fact that I use default user/password would make it easier to hack?
I have a dedicated server running WordPress and have recently noticed that its been hacked and PHPShell a remote web server controller has been uploaded. This has let the hacker view and edit files including my database! I have since deleted the PHPShell folder. Changed all possible passwords (database, user accounts, ...
I am currently using a server 1 managing incoming traffic from users and a server 2 managing database requests from server 2. Both servers are accesible via Internet. Would IP whitelisting be a sufficient measure of protection to prevent any traffic on server 2 other than incoming from an application running on a serve...
I chose SSL for registration in the game client. The client communicates with the game server which stores a salted/hashed password. If I use SSL to authenticate users on login but the game does all of it's communication with UDP packets, how does the server know that the UDP packets it's receiving is from the authenti...
I have an access point that subscribes in the list of connected devices all the devices that try to connect to it, even if they give a wrong password. The device does not give them an IP address but they are saved as valid devices using their MAC address. I reported it in my work as a critical security issue but I don'...
Say I'm making a snapchat clone app for Android and iOS. Let's say that I get a snapchat from Baz. I want to pre-download the audio for this snapchat. However, as the developer, I want to secure this audio from being viewable outside of the app. I've been thinking of encrypting it using AES with an IV and key that are ...
A friend of mine purposed a method of making passwords where each has the same base and added to it is something indirectly related to the site or product being signed into. For example all passwords would start with "AXxY2" and then the one for hotmail.com adds on "any letters?" so the entire password to login to hotm...
I recently got a new laptop. As I usually do, I removed the wifi module from it, since I intend to use it in public places such as my college and I don't need any sort of connectivity outside my home. The reason I do this is because there is no physical switch for the wireless connection on the laptop and I feel insec...
I understand that a hashing algorithm like bcrypt uses several rounds of hashing to make it computationally expensive for a brute-force attack. How does encryption work against a brute-force attack? I was wondering if a stolen encrypted file such as one encrypted with GnuPG can be cracked much much faster than a bcrypt...
There is an application which shows a login page. However, I do not want people to login through any machine. I want to restrict login to a few Mac Ids. Is there a way to do this? There is probably a way to get the MacId from a java applet or ActiveX control, but how would a call which spoofs the MacId in a modified Ap...
I'm wondering if it's possible to increase the work factor of an already encrypted bcrypt password. e.g. I have a password that was encrypted with a work factor of 5, is it possible to increase the work factor to 6 without knowing the original password? If not, it seems to me to defeat the entire point of bcrypt, since...
I want to delete a suspected malicious file from a server. For the purposes of this question assume that the infected machine is Windows Server 2003 or later. Is there any risk in deleting such a file? Specifically, are there any logic-bombs that are known to execute when a file is deleted, i.e. the triggering conditio...
I would like to know how secure is this code I made for a login form... because I'm new in this and have serious doubts. $sql = "SELECT user_name, user_password " ."FROM users " ."WHERE user_name = '".mysqli_real_escape_string($db,$_POST['user_name'])."'"; $q = mysqli_query($db, $sql); if (mysqli_num_rows...
Is it considered bad practice to use the same password on separate sites, if so why? Even if the passwords to a site are compromised the attacker still doesn't know the user names or sites the same password is used on, or even if the same password is used anywhere again at all! For example if the database to hotmail.co...
Given, we want to crack a password. With Time Memory Trade-Off Attacks one tries to find the right balance between time to compute hashes for all possible passwords. And the used memory to store all password hash tuples, where a lookup would be instantaneous. (I know about some additional security mechanisms like salti...
We are using WebRoles to host our api, Table storage to persist PHI and Blob Storage to persist MRIs and CT images. What is required to become HIPAA Compliant? -- Edit 2014-02-17 -- I just want to know where to start
A comment posted on one of my questions the other day raised a question in my head. I know that many site admins appreciate users reporting bugs and security holes, and as a user I appreciate people who do this. I often try to find and report them in sites and apps to which I use frequently or hand sensitive data. I am...
I would like to understand how the packaged Linux distributions (i.e. Debian) ensure that their packages don't contain any malicious code. I know that packages are signed, and that I can download the package source and compile the package myself. But even when I do compile the package myself, the md5sum of that package...