instruction stringlengths 24 29.9k |
|---|
I just setup a test bed and i disabled information_schema from being accessed (a weak waf) and i've been trying to extract the table list from the database by using convert to spit out a conversion error with the contained information.
To extract the version we use the syntax:
+and+1=convert(int,@@version)
The result w... |
I'm looking for best-practices or suggestions to secure inter-server communications between VPSs.
Should I just run all traffic through SSH?
What about HTTP Traffic via something like mongo? Reverse proxy it on the same machine to https with nginx?
What about setting up a VPN? My concern here is both 100% reliabilit... |
I have a web-based application where users can log on with username and password.
I just implemented a new account lockout feature and was wondering whether it makes sense or I totally screwed it up.
The first 3 invalid login attempts just show my standard:
Incorrect user name or password
but I store each failed atte... |
I recently talked with my ISP about many things, basically related to my (little) company security, this guy is a networking guru to me, but he did a strange thing that worries me. Basically I have a web development machine located in my LAN, that has no port forwarding (is not reachable from internet), but he could ac... |
I'm looking to improve defense-in-depth on a system, primarily by closing some holes in injected DLLs. Certain applications installed on the system cause helper DLLs (e.g. shell extensions, BHOs, etc.) to be loaded into processes. Unfortunately, many of these were not compiled with ASLR / DEP opt-in flags. Since the af... |
I have recently heard that most of the PHP code is confidential, because if attackers know your database structure or the hash function used to encrypt the passwords, there is higher chances of a breach.
I was wondering, if it's so, then what about open source projects where everything is wide out in the open?
|
Can you break an encrypted volume if you know the source code of the crypto-tool used and the hash value of the secret passphrase? Why is it not possible to just reverse engineer the passphrase verification process of the crypto-tool by tricking it with the extracted hash value?
Specifically I was thinking about the po... |
As part of hardening a MySQL 5.6 server running on Ubuntu 12.04 LTS, unnecessary services and packages will have to be removed.
For a server that is serving only as a MySQL server, what services and packages should we remove? Is there a list of services/packages that we can use?
|
My computer has a rootkit of some sort and the attacker can see everything that I do on it. I need it to do something related to banking, so I have to secure my computer first. I have a CD of windows 7 (64 bit), but when I would format my computer and install Windows anew, can't the attacker gain access to my computer ... |
If a website is running on HTTPS only, is it reasonable to close port 80 of the web server and only leave port 443 open? Does this action provide more security for the website?
|
Looking at a lot of different security software on Windows, a lot of them rely on some settings on the computer which can probably be overridden by a local administrator.
For eg. some DLP software does some settings which prevents a user from using a USB drive. However, I think a local admin can always override this?
A... |
In the different NVD files which enumerates the CVE, which can be found here
There is from time to time the field <vuln:security-protection>
, containing often the value ALLOWS_OTHER_ACCESS or ALLOWS_ADMIN_ACCESS.
Do you know what this field stand for ? What does it means ?
|
Off-the-Record protocol employes Diffie-Hellman key exchange protocol (DH). DH protocol does not provide authentication of the communicating parties and, according to many sources, is vulnerable to Man-in-The-Middle (MiTM) attack.
How does it affect the security level of OTR protocol? Is OTR actually does not provide a... |
Curious about the major differences between Kali Linux and SecurityOnion. Do you think it would be easy or useful to replicate what has been done with SecurityOnion on Kali? Why is there such a dichotomy between security breakers and security defenders... and is this divergence visible through these two primary (and he... |
For a federated server-to-server protocol with domain-based identities, I am thinking of using TLS client certificates as authentication mechanism. I figured that re-using each peer's TLS server certificate as client certificate for connecting with other peers would be the simplest approach to implement this.
However, ... |
Over the last couple of years there have been a number of changes in what would be considered an optimal SSL cipher suite configuration (e.g. the BEAST and CRIME attacks, the weaknesses in RC4)
My question is, what would currently be considered an optimal set of SSL cipher suites to have enabled with the following goal... |
If I choose the paranoia option for EncFS and for TrueCrypt I create containers using the encryption algorithm AES-Twofish-Serpent and the Hash Algorithm Whirlpool. Are both methods equally secure, or is 1 method more secure than the other?
As based on https://defuse.ca/audits/encfs.htm, EncFS seems to have some issue... |
My question probably will be blocked. Anyway, my question is how much programming is there in the security field.
Useless:
I really hate programming, actually I can translate code from C to python and Java and a bit of assembly to C(and vice versa). But I can't write my program the only port scanner that I have write ... |
Does anybody know a CA company which allows me to put the bought CA certificate inside SoftHSM (the same as an HSM but without any hardware, it is pure software)?
Is it hard to work with the PKCS11 interface? I have a Java application which will sign documents. But I need to communicate through the PKCS11 interface.
A... |
I am trying to secure my network from some infected computers(the owners dont seem to understand what security means) So I have a second router to make a bridge. What would be the best approach at isolating the network?:
router(infected comps)>router(good comps)>internet
or
router(good comps)>router(inected comps)>in... |
I am selling some hard drives but my question is. How can I be sure that the information is gone?
Is there a good way to wipe the drives?
What are ways I use to attempt to recover the data to ensure that they are clean.
|
I have been looking for some kind of hardening guide towards PostgreSQL which I can use for a security audit of a PostgreSQL DB.
I came across this url, have checked the same. Anything more to this?:
PostgreSQL Security Audit
I am more specifically interested in the security flaws that could be identified from the sett... |
I don't want the server to ever see the raw input and would rather have the client do the encryption and then pass the data (over https) to the server for storage.
If I use a JS library to AES encrypt it what other things do I have to look out for?
|
I'm looking to use my smartphone purely as a portable computer, with no network functionality, in order to protect my privacy.
Is removing the SIM cards from it enough to airgap it? Or do I need to go further?
If removing the SIM cards doesn't guarantee it, would it be possible to remove the antennae? I imagine witho... |
Support for Windows XP is ending soon. Therefore, I am seeking a secure solution to continue with Windows XP.
When I access the web from Xubuntu in VirtualBox running in Windows XP, is the Windows XP environment secure? And if not, how can I make it more secure?
EDIT: I am asking for a level of security for everyday u... |
I'd like to ask which authorization flow is considered better or standard.
First approach (has role AND assertion is valid):
if (!isGranted(roles, permission) {
return false;
}
if (hasAssertion(permission)) {
return assert(getAssertion(permission), context);
}
return true;
Second approach (has role OR assert... |
I want to log and modify outbound traffic on a Linux machine. I currently have one program that sends requests out to the internet, I would like to process these requests and their responses via another script (mitm).
Current Setup...
What I Want...
MITM Script will log requests/responses into a database, and potenti... |
Will the "Tor Browser" maintain a safe & anonymous internet connection over a computer's sleep/standby-and-resume cycle?
Is it safe to assume that when the computer sleeps the (internet) connection sleeps as well? What about BIOS settings such as Wake-on-LAN?
What happens to the connection during the steps of said cyc... |
I own an application that grabs some Long-Lived Facebook Access token, in order to be use later according to the corresponding logged user.
Should I need to encrypt them before storing them, to avoid any leaks if database is hacked, or a Facebook mechanism already exists to prevent some malicious usage?
|
Consider you lost your laptop with sensitive data and your smart card that contains the private key for your GnuPG and Truecrypt accounts. The smartcard is secured with a 8-digit PIN.
1) Is it possible for an attacker who finds the smartcard to somehow extract the privat-key; resulting in decrypting all sensitive data... |
Are the private key Serial numbers and thumbprints the same as the corresponding public key Serial numbers and thumbprints for certificates (X509Certificates, Base64-encoded X.509), and are these good fields to compare on?
I am wanting to use this information as part of a validation process for a WCF web service, but w... |
I'm planning on doing some malware research for a research project, and I was wondering what would be a better option for keeping my system safe from viruses accidentally infecting it. I'm only planning on analyzing the binaries, not running them, but an errant click could happen. Should I be trying to do this analys... |
I have a RSA SSH public key which I have converted from a x509 certificate and I want to be able to convert the SSH key back into a x509 certificate to compare the values with the original certificate.
How would I got about doing this? And is this even possible to do with only the public key?
Thanks.
|
When I run my application on Centos the specific process opens port that listens for connections from localhost, but uses 0.0.0.0 in Foreign Address. Is it secured?
netstat -plunt
Active Internet connections (only servers)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/P... |
So, I want to start using pass, but I need a GPG key for this. This application will store all of my passwords, which means it's very important that I don't lose my private key, once generated.
Hard disks break, cloud providers are generally not trusted. Not that I don't trust them to not mess with my key, but their se... |
on my website i deliver an xml, whereas GET parameters will be added as (entityencoded) attributes somewhere in the xml.
stripped down example:
http://host/file.xml?x=y
leads to
<root>
<element x="y" />
</root>
note that the string is being html entity encoded so you cant really escape out of the quotes. a string l... |
I need to purchase and install the correct Verisgin SSL certificate(s) (X.509) on Azure. I have never done this before and would really appreciate some advice on how to go about it and what is considered best practice for production and testing environments. I'l explain the scenario.
Our Site
Is hosted on Azure. We w... |
I'm in a bit of a pickle.
I've got an IIS application which accesses an SQL database (on a different machine). This already means that:
a) the IIS application needs to have a connection string to the database containing the password
b) the IIS application needs to run using an AD identity which has access to the SQL da... |
I have a corporate web portal which is used for staff collaboration including a web-based mail interface connected to MySQL Database, corporate calendar, file storage, customer contacts data with phone numbers and emails and all kinds of other data. Of course some of that data is sensitive as it relates to internal cor... |
I was trying to pay for mobile phone credit online from a service provider. I selected the amount to pay and clicked next to continues. The following page asked me to turn on third party cookies if I wanted to proceed. I thought that this wasn't acceptable so I didn't go through with the purchase. Is it normal for a pa... |
My subject says it all - I am clueless as to how a file with permissions 0644 can keep getting iframe injections. None of the posts on this site that I saw quite described what I am experiencing. Every two days or so, an iframe gets injected into some files with 0644 permissions. Just as I think we've got it covered, i... |
I have a DMS system(alfresco) that needs to sign approx 50.000 valid signatures a year.
The signing certificate needs to be acquired from one of the affiliated sub-CA's.
So according to the Adobe CDS certificate policy, are they obligating me to use a hardware HSM or usb Token? I want to use SoftHSM instead. It is free... |
I have a parameter in a POST request which is in the following format:
ParamName= < r username="123" password="456" x="" y=""/>
and I want to test username and password which are two HTML input controls on the webpage using SQLmap. how should I use sqlmap for this kind of requests or for example JSON parameters which a... |
I have started looking into Crytography, and the obvious starting point is frequency analysis. As a task for myself I thought it would be good to compile a script which could be used for perform the process of frequency analysis. One thing I started to look at, was to get the stats based on a dictionary - I have subseq... |
I'm having a task in a computer security class in school where I'm supposed to scan a host for open ports in order to find out what services are being run there. I have found out (among other things) that the scanned host has an open port 8787 and "Msgsrvr" is being run there, along with Scientia-ssdb on port 2121. Wha... |
(Note that Facebook now does use HSTS. The question was asked at a time when they didn't.)
To force a browser to always go directly to HTTPS for a website (and not rely on 302 redirects from the HTTP version), HSTS (HTTP Strict Transport Security) can be used.
To tell the browser that a website should always be visited... |
I recently wrote a website for my company and have been asked to Pen test it as well as the server. Have run SQL map and no vulnerabilities there, however I want to check if my hash and things are good enough as well as any vulnerabilities to the server its self. When I trained we had a working copy of L0phtcrack. Down... |
I have tried to issue a certificate beginning with 8 to F but I have found it is impossible, mostly due to the RFC:
The serial number MUST be a positive integer assigned by the CA to
each certificate. It MUST be unique for each certificate issued by a
given CA (i.e., the issuer name and serial number identify a un... |
I have written an application (in C#) to communicate with one of our customers via a web service. Our customer requires us to use bi-directional SSL. The customer has sent us their certificate (in the form of a .p7b file). The client certificate was provided to me in the form of a .cer file.
I've installed the certi... |
To preface, I'm not an IT security person, just a layman intrigued by the logic. I had this question while reading about Ladar Levison turning a key to his email service on paper to the government. That means that he has this key on a storage device somewhere. Then that storage device must be encrypted somehow. Then th... |
I have a feature request to connect my PHP web-app to the users mail server. I have usually strayed away from this type of work as it will mean storing the users email passwords.
My question: is it secure to store a users third party email password, if the email password is encrypted using PHP's openssl functionality, ... |
I've been trying to use hydra (educational way) but with no success. The site method is http-post but performed by ajax (should it be a problem? I think not). After execute the command I got an output of passwords and username that allegedly valid. I saw that some people have asked about the reason for hydra giving wro... |
We are designing a web site for selling financial products online.
The following is a high level description of the components:
Our frontend will be a SPA built with AngularJs.
The frontend will communicate with an API hosted in Heroku.
The API will expose web resources which allows the execution of the
business proc... |
Multiple email addresses for my domain have been compromised.
My client forwarded me an old email which he sent me few days ago but I haven't received that email. That email was sent to an email address just like mine but with an O replaced by a zero. So I found out that another domain has been registered just like my ... |
I've been performing lots of speed tests lately due to, among some other random things, an Internet programming class and getting Google Fiber hooked up.
Then I realized that SpeedTest.net uses a Flash app; it kind of bothered me that I can't monitor the transmission contents in my browser's inspector tools like regula... |
I have a vendor who needs to connect remotely to one of our servers. What I thought I would do is setup a NAT rule in our firewall. I have a public IP address that I will have translated to the local server address so that then the vendor just needs to RDP to the public IP address. Is this a secure way to have the vend... |
I'm concerned that Home Network Administration Protocol (HNAP) is a serious vulnerability that exposes consumer network routers to remote management by malicious entities such as government organisations and hostile corporate actors.
My question is twofold:
Is it possible to disable HNAP on a D-Link ADSL router?
Would... |
The overwhelming majority of my banking is done online. As such, I try to be as cautious as possible. I am moving into a new apartment in a few months which offers internet. (I am not sure whether it is WiFi or direct wire.) Unfortunately, you cannot have your own service exclusive to your apartment: your choices are e... |
I am new to ossec. I installed the server and wui on a dedicated machine. I have agents running on my zookeeper and kafka servers to start.
Below are events I am seeing. I assume the are automated bots.
10 - User missed the password more than one time
10 - Multiple SSHD authentication failures.
5 - SSHD authentica... |
The Linux kernel has a few sysctrl's related to random devices packaged in a bin_random_table (http://lxr.free-electrons.com/source/kernel/sysctl_binary.c?v=3.2):
static const struct bin_table bin_random_table[] = {
{ CTL_INT, RANDOM_POOLSIZE, "poolsize" },
{ CTL_INT, RANDOM_ENTROPY_COU... |
I'm looking at a system that uses an unprotected Diffie-Hellman exchange to negotiate a key for the session encryption.
That Diffie-Hellman is not secure against man-in-the-middle attacks is textbook knowledge, but how much harm could an attacker do if he is only able to modify one or both primes in the Diffie-Hellman ... |
Whatever I and my family members do at 'Home PC' is visible in the history in Google chrome in my 'Office PC'. The two networks are entirely different!
I saw all websites visited on our home PC by my brother on my office PC. I notice it is mostly Facebook and GMail and Google search results.
I do acknowledge that I op... |
So I was wondering about something, but for the simplicity, consider this example:
You have a file with n encrypted files in it, of which one is called 'Note.txt'
You also happen to have another file (not in the RAR) called 'Note.txt' which is an exact copy of the file within the RAR, but this is not encrypted!
Is it... |
Is it possible to insert arbitrary data into UUID?
Let's suppose we have an MD5\SHA hash of something... can we encode that data into a valid UUID?
|
While reading this article: Does Skype use encryption?
I came to know that PSTN do not have encryption.
Why it is like that? More so since we have our PSTN phones now more powerful (in terms of hardware) and cheaper. Why not write a encryption application at the transmitter and receiver end?
|
I have a registration portal where user inputs his details and then a valid email account.
Currently I check the email is not used already and if it is I reply with the classic: "email already in use" and something like "recover your old password or create a new account with a new email".
I'm wondering how safe it is t... |
My server is currently being attacked from another server. This is my log:
root@my-server:/var/log# tail -f auth.log
Feb 19 11:53:08 my-server sshd[3745]: Disconnecting: Too many authentication failures for root [preauth]
Feb 19 11:53:08 my-server sshd[3745]: PAM 5 more authentication failures; logname= uid=0 euid=0 tt... |
Note: I realize there is no legally binding talk hereinafter.
There are lots of leaked password hashes on the internet. Twitter searches for "hash dump" pull back tons of links, generally from "deep web" servers. As security yokels, we find it interesting to see how secure (or insecure) these dumps are; many are from ... |
I am not sure whether this is the best place to get my concerns addressed, but I hope it is. I went through some earlier questions posted on this site about Gmail and privacy but they don't seem to address my concern.
I use Google Chrome heavily as it's really fast and usable compared to other browsers. I also use Gmai... |
Q: For servers running Windows 2008 and up, what would be the most reliable whole disk encryption? We want to protect our data from unauthorized access.
Right now, we used BitLocker. However, the key is still resident in the system and/or MS can decrypt it because they have what it's called: Key Escrow. I've used TruC... |
I would like to change my pgp key because I have the same one 2 years ago. But, I want to warn my freinds that the owner of the old key and the owner of the new one is the same person (me). hwat is the way I can use to prove I am the owner of the new pgp key ? Include it on the revocation certificate of the new one ?
|
After telling my workmates and boss that we had a very critical lack of security controls, finally we got compromised!
They had a Joomla 1.5 which was exploited using a file upload vulnerability. WSO 2.5 web shell was uploaded.
I'm trying to find out where is the vulnerable parameter but I haven't had success. Running ... |
Consider the following theoretical webserver:
On any request, produce an html response that consists of 2 links,
which are each randomly chosen strings followed by ".html".
When the google bot attempts to crawl this site it will be presented with 2 more links. In the interest of mapping the site, it will attempt to... |
If only the server has an electronic certificate (User ID, Version, Public key), how can be possible the encrypted communication between the client and the server?
|
my question is that why I can not see some credentials in mitmproxy while the application connecting to, uses ssl connection? I actually installed the mitmproxy server on my PC and have set up my android smartphone to connect to that proxy before connecting to the main server. I have not installed the proxy certificate... |
I have posted this to NetworkEngineering.SE, as that seems the more suitable audience for this question.
I will leave this question open here but am happy to see it closed. I just did not want to delete it in case someone was working on a reply.
I am running pfSense 2.1 and having an issue with a Proxy.sh setup. In pa... |
Is it safe to accept the security certificate from AOL chat? Did they recently change their certificates? These images are from Pidgin.
|
From my understanding vlans create separate networks. If that is the case can you simply add routes manually and access those other networks?
Basically, I've always been under the impression that vlans were designed for seperating networks to keep them isolated and secure from more public access.
|
I have a client who wants to be able to have new customers who sign up with them online for a delivery service to be able to submit their credit card information as well. Once the information is obtained the client will manually enter this information into their POS system at their retail store. The client does NOT w... |
I think I already know the answer to this question, but I thought I'd ask the experts anyway.
A few months back, I created a password-protected 7-Zip archive which housed the source code of a simple program I was writing at the time. I was using the archive everyday, and so never wrote the password down. I've been rack... |
Every time I start my test-server and let it run for some days I get this in my log-files (in different variations):
111.241.26.165 - - [18/Feb/2014:22:16:45 +0100] "\x04\x01\x00\x19\xCBER!\x00" 400 172 "-" "-"
111.241.26.165 - - [18/Feb/2014:22:16:46 +0100] "\x05\x01\x00" 400 172 "-" "-"
111.241.26.165 - - [18/Feb/201... |
What I essentially mean to ask is, how is the scenario where a user who visits a website for the first time (the certificate for the website is not pinned in the browser) handled ? Additionally how is revocation handled ?
|
I want to show that if I modify one bit or byte from a given X509 certificate the signature verification results false (because this modification results different hash value from the certificate). I'm stuck in the case that how to do the modification on the certificate using getTBSCertificate() method. My following co... |
I'm concerned about microwave technologies nowadays and suspicious matter happend.
So, I have several questions. Could you tell me about my question in below if you know.
Question:
Is it possible to hack my encrypted session such SSL/TLS and
hijack (duplicate) the session by electromagnetic waves?
What will be possi... |
Surely we could just make it so a rainbow table says for each beginning of chain do 10k iterations, and then we wouldn't have to store both values?
Or does by doing it this way stop collisions?
|
I have a rails 4.0.1 app that allows locale as a request parameter. Here is what i saw when i tested my app on firefox;
http://localhost:3000/pages?locale=en_EN%22%3E%3Cbody%20onload=%22alert%28%27XSS%27%29
So Firefox executes body=onload when the page renders, if i run this request from Firefox browser sadly alerts x... |
For the sake of demonstration, I'm trying to perform a Ping Of Death sent from a Kali Linux virtual machine to a Windows 95 virtual machine (vmware) on a private network.
I've set both vms correctly, they are able to ping each other.
I've installed Windump on th victim Win95 and I'm able to monitor incoming packets.
I... |
Do you If there is a simple listing of which KB replaces which KB in Microsoft development because every report from Microsoft explain one by one which KB replaces which KB, but I can't find a place where this will be all gathered.
Microsoft Report Example here
|
In most of the companies, IT guys block some sites and by using TOR or other VPNs people walk around these blocks and gain access to blocked content.
My question is, assuming TOR is running on default set up (downloaded Tor Browser and hit run) is there a way to catch this? Could there be a default port that can be cou... |
I am a programmer by day and I am working on a project that is focused around risk management based on PCI-DSS controls within an organisation.
I have been thinking lately that a lot of PCI-DSS controls are focused on software patches, network diagrams and end of life dates etc but if the organisation create their own... |
I'm working with an Issuing CA that doesn't support name constraints that are defined at a higher level.
Assuming that it issues certificates that are compliant with the Name Constraints that are defined, would this be an issue with clients that validate the chain?
|
Let's say there is a web application needing a JavaScript support file .js to be loaded in the head of the html document.
<!DOCTYPE html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html;charset=utf-8" />
<script type="text/javascript" src="file.js"></script>
<title>example</title>
</he... |
I have discovered that a web application allows the setting of certain cookie values through request parameters. Each request param results in a separate Set-Cookie header. i.e. a request like this:
/url?cookie1=first_value&cookie2=second_value
results in the following headers:
Set-Cookie: cookie1=first_value
Set-Cook... |
Mosh has been around for a while now. Although it's claimed to be "a replacement for SSH" by its authors, mosh does actually depend on ssh to do the initial authentication, after which an instance of the mosh binary is started on the server, the established SSH connection over TCP is abandoned (after serving its purpo... |
I am not sure if my wording is right, but if I attach a unique token inside email links which will authorize the user if clicked, would you consider this a vulnerability?
Password-reset partly includes this. That link authorizes you to reset your password, but here I am talking about a more long-lasting link.
I have no... |
I am currently designing a login for a web service. I will use a PBKDF2 implementation for hashing the passwords.
However, I intend to allow unicode for passwords, as I will have international users, which might want to use, for example, cyrillic characters. To avoid any issues with unicode ambiguity, I thought of usin... |
I had a Asus N82J laptop with a dual boot setup. I boot into Kali and Windows 7. Long story short because of my dual boot with Grub I corrupted my HDD the operating system kept moving blocks of memory around. I've obtained a new SSD and 2nd drive HDD and starting from scratch. I still want the functionality of Kali... |
I know there are many discussions on salted hashes, and I understand that the purpose is to make it impossible to build a rainbow table of all possible hashes (generally up to 7 characters).
My understanding is that the random salted values are simply concatenated to the password hash. Why can a rainbow table not be us... |
I am beginning a new project and I already know that I'll have various roles for various users, regardless of their access level. They just have different jobs to do.
With that in mind, I'm thinking that I'll have certain actions that can only be performed by those who have a certain role (like being in a group)
The ot... |
I was reading the wiki on magnetic stripe cards when I stumbled across this sentence: "Magnetic stripe cloning can be detected by the implementation of magnetic card reader heads and firmware that can read a signature of magnetic noise permanently embedded in all magnetic stripes during the card production process." (w... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.