instruction
stringlengths
24
29.9k
I'm working with the registry for .wiki, a new generic top level domain set for public availability in June 2014. We're going to be giving away hosted wikis to registrants of .wiki domains and I'd like to use only https across the board on these wikis. Purchasing an ssl cert for each second level domain is cost prohib...
I was wondering if two factor authentication is really necessary if you are using high entropy, long, unique passwords for each site. From my experience 2fa just beefs up security a little more, by adding another key necessary to get into a lock. But if the first key is sufficient(20 plus characters), does it really ma...
I have a set of URL's which might be Zeus hosts / C&C servers since my security appliance says so. Is there a way to check if these really belong to Zeus?
This is my first question and I dont even know if it is the right place. If this is an off-topic just mark it as off-topic, don't go crazy and downvote. :P But how can I detect if my browser is not storing my passwords in some server, for later use against me. :D How can I trust my browsers privacy policy? And also I a...
I'm not a computer guy, but just out of curiosity I've recently started to learn PHP for programming my own website and I've read about some most common vulnerabilities that exist in web applications. I know the basics about Cross Site Scripting vulnerabilities. So, an XSS attack happens when the input from the user is...
I have a domain that is only used by me, with several inboxes in the format aep-x-company@domain, where I replace 'company' with wherever I sign up. This way I can detect when someone sells email addresses. However, since yesterday I have been receiving spam on about 10 of them simultaneously. The source are infected s...
I would like to understand if this service is as safe and good as it claims to be: https://unseen.is This is what they say: ... Many other services that offer encryption keep the key, but getting a copy of the key from the service is the easiet way to break in to your messages. With Unseen, you control the key, ...
I was searching around about CSRF attacks and I am thinking about the "random form token" prevention concept. Let's say every form has a "hidden token" inside and the server checks the token before anything else. Now let's say there is a form http://myWebsite.e.x/acccount/edit and it's supposed to be submitted. The att...
I currently try to understand the Kerberos protocol. And I think I understand the parts of it. How Alice gets a ticket from the Authentication Server to authenticate herself to the ticket granting service. And how that one does the same, so Alice can authenticate herself to Bob. But what I don't understand is, why aren...
Some time ago i try Wireshark at my home local network just for see how it works. I scan the connection of my mac to the router and also to other external ips. The flow of connections were high when i was surfing on web and low when the browser was shut down. My question is: why also when all browser were turned off i ...
Is it possible for an uploaded PDF file to harm an Apache server, if the filepath can't be found? That is, the PDF file can't be viewed from the browser or accessed by a known path once uploaded. I have a feature within a Drupal site that allows anyone to upload a PDF file in order to have some ImageMagick processing d...
"Keyset does not exist". I know that there are tons of question about this error, but mine is totally different. I'm not gona use the key from windows certificate store, but load the public key & private key from 2 bare strings, using method "fromXMLString". rsa.fromXMLString "<RSAKeyValue><Modulus>......" then rsa.Si...
The fundamental idea is to load a blog comments plugin (like Disqus) from a domain someone is already logged into to save users time and increase engagement. I like the facebook comments plugin because people are usually logged into facebook, but not everyone is keen on having their comments go through facebook and be ...
What prevents an attacker from copying and pasting a Chrome packaged app (which is just a zipped web app) then distributing it on the Chrome webstore under a slightly different name?
I understand from a cryptographic standpoint that you want a password to be as random as possible to resist brute force or dictionary attacks. That is fine- but in what circumstances can those approaches actually be taken? Just about every system I have ever had a password to locks you out if you enter more than a co...
I've been reading a lot about quantum computers and RSA. I know RSA security relies on the difficulty of factoring an extremely large number with just two prime factors. Apparently quantum computers claim to be able to factor them within minutes. I wanted to know about some viable alternatives to RSA, possibly somethin...
I know that the best options to use for storing passwords are bcrypt/PBKDF2/scrypt. However, suppose you have to audit a system and it uses SHA-512 with salt. Is that "fine"? Or it is a vulnerability that must be addressed, even thought your site is a discussion forum? Of course, if it is weak, it must be addressed, be...
I have my own domain, and a few email addresses on it, including a catch all address, with Google Apps. Recently, my catchall address has been receiving "delivery failure" emails from many different domains that are saying an email I tried to send to them was rejected or couldn't be delivered. But I didn't send any ema...
Imagine you are developing a "free" app for android & iPhone and want to refinance yourself through using some sketchy ad service. Does an app developer have to worry that the ad content he embeds can access information such as the user's phone number or maybe even his phonebook? Furthermore, is there some danger that ...
I have a public-facing web application where anyone can register an account. The passwords I store are salted and hashed. When someone tries to overtake the account of someone else through guessing passwords I would like to know this. For that reason I would like to log all unsuccessful login attempts. I think that it ...
I work in a lab environment, and save data to a shared PC. This PC is not networked, and so the only way to get the data from that PC to my own, is through USB. The lab director has mentioned that the PC has been infected with malware many times in the past few years, and to be careful not to infect it again. It's not ...
I was reading about Impagliazzo's five worlds and I have some questions about cryptomania and minicrypt: What is difference between them? I cannot find one? How does cryptomaniac MitM protection work in SSL/TSL? Does it still need some level of trust?
Suppose one of my duties for a small organization is to send out statements to clients by email. Suppose one of the directors / owners / trustees want to be able to audit the numbers. Specifically he wants the ability to check that I'm not keeping two sets of books (One set for the directors and auditors and one set fo...
I'm trying to get a better understanding of the potential security holes my default filesystem permissions might be creating. It appears I am capable of traversing my filesystem, serving simple php pages that display info from files outside my /var/www Web Root: echo file_exists('../../../bin/filename'); I don't know ...
Apologies if this is not the right place to ask this question, I will happily move it to another Stack Exchange site if need be. Before I explain the rationale behind the question, let me clear up a few things first. I enjoy cracking software, for my own educational purposes. I do not participate or work for any crack...
How to use Scapy to overwrite a part of the TCP header information of the first fragment, which contained data that was allowed to pass through the firewall, with malicious data in subsequent fragments? For example: overwrite the destination port number to change the type of service i.e. change from port 80 (HTTP) to p...
Data Execution Prevention in Windows supposedly is a line of defense against malicious code by "by monitoring your programs to make sure that they use computer memory safely". However, I also know for a fact that not all programs are made for DEP, and crashes and other problems can result if a "safe" app is blocked an...
A friend pointed out that putting virtual hosts as sub folders of the default /var/www was a bad idea. (linux example path; this applies to all OS) I see that it's possible to reach the virtual hosts from another domain (or just the ip), but how's that affecting security? No source code would be displayed since all scr...
With these reflection attacks, the source IP should be the IP of the vulnerable server. So shouldn't nodes which see abnormal amounts of NTP data be able to add the source to a blacklist and therefore mitigate the attack?
Facebook claims to allow restrict sharing to friends, certain network, or even custom when I upload photos. But it appears that this security is only in effect for the page where the photo is hosted. One can use the "Copy image URL" or the equivalent in one's browser, and you can forward this URL to anyone, who will ...
Can a file e.g. containing some random key that is generated by my web site/app be acceptable as the second factor (the first factor being a normal password) in 2FA? Someone said so to me in the past, but i doubt about it, because i think a key in a file is not very different from a password in that it is stored on the...
In light of the recent hack of the EC-Council site, where the hacker makes the point that he has access to passport data a general question arises. What, if any, are the security/privacy consequences for people of their passport data being compromised?
I'm trying to implement an encrypted file-system. The file-system consists of 512-byte sectors. I encrypt/decrypt the contents of a sector as follows: Compute the SHA256 sum of the user password. This results in a 32-byte User Key. Compute the ESSIV for a sector by computing the SHA256 sum of User Key and the Sector ...
I'm trying to figure out if there's a way to figure out when files on my external hard drive were last opened. I'm using a Seagate Backup Plus, and it's both mac and PC compatible. BUT, I've also read that updating of the 'accessed' date is usually turned off by default on these drives to save space. This seems to be t...
I might be totally misunderstanding the concept of web-of-trust, but imagine the following scenario: I generate my key, then go to a key signing party, and after, I import all the keys which fingerprint I have verified, and sign those. Now, this will make all those keys fully valid, but the default trust for each key w...
I've made the below function to make a completely random 64 character long hash function password_salt($password){ $salt = hash("sha512", mt_rand(1,100000) . strtotime("now") . $password . "ewuwmeqwjkeq 7689" . hash("sha256", strtotime("now - 10 days") . $password)); $salt = $salt . $password; for ($i=0;...
I was trying out a simple stack buffer overflow exploit by creating a malicious crash.m3u file. as you can see the EIP pointer is overwritten by "A" but EBP hasn't changed. isn't EBP supposed to get overwritten before EIP??
is there an XSS attack vector that allows the inclusion of a external .js file without having to use forward slashes? let's say the path of the file is somewebsite.com/js/xss.js Is there a way to pass it to a parameter that it works and without it containing forward slashes An example that wouldn't work is: <script src...
I am trying to implement AES on an image of size 256x256 (65536 bytes) but AES works on 4x4 size of image (16 bytes). What should I do? Can it be implemented or not? And if yes, then how?
My mum (on Gmail, using Chrome) received an email from a friend's Hotmail address. She opened the email (very obviously a phishing email) and clicked a link in it. This opened a webpage with loads of medical ads on. She closed the page and deleted the email. She did not notice anything else happen when she clicked the ...
We are trying to see who is using network VPN. I used Wireshark to sniff the network, I gained some users and passwords. The usernames were in plain text, but the passwords were in two different encrypted types One kind like this : NAME='PlainTextUserName', VALUE=0x9fe513a40a2e169f9930d21b6b0a669d At first it looks lik...
I am programmer by day and night, I work within security at the moment working on some security products. I have noticed a few non software engineering based roles which require security clearance. I was wondering is there any cases within software engineering / programming that developers require security clearance ? ...
TLS Sign was proposed as an IETF Draft in June 2007. I have not found further information, besides that the draft expired in November 2007. Can someone tell me what happened with this extension or can someone point me to an extension, or a mechanism that provides non-repudiation for TLS connections.
I'm building a web app that uses S3. In some of our operations, we're creating a file on S3 with a path that's directly dependent on user input, so an attacker might cause a file to be created on S3 with whichever path he wants. Is there a way for an attacker to leverage this into an attack? (A few ideas that came to m...
Source: http://www.infoworld.com/t/development-tools/bittorrent-sync-gaining-major-traction-peer-peer-alternative-dropbox-232144 and the average usage has hit 20GB per person. How can they know that without using some sort of spyware to monitor and keep track on a central server somewhere? If it's P2P, they would ne...
Does storing the actual length of the message in metadata make an encrypted message more vulnerable to attack?
Optimal flags to specify when using nmap to guess the OS on remote devices? I'm currently using the following: nmap --privileged -sS -sU -sY -sZ -O --osscan-guess -F -r 192.168.200.223 This seems to work ok but it takes quite a while to finish. Is there a more optimal set of flags i can use to balance performance and ...
Most malware one hears about on the news seems to fit into one of two categories: Windows viruses, trojans, rootkits etc. Linux server "worms", backdoors and similar How big is the threat of classical Windows Desktop-style malware (i.e. viruses, keyloggers, trojans) for a Linux Desktop user sitting behind a router ma...
We have a Java application running on a Linux server and we are transmitting some files using a third party Java library which uses HTTPS internally to connect to external servers. These are legacy libraries and we have only .jar files. How can I identify which SSL/TLS version is being used by this library? Is there a...
Looking through my Apache log files ("combined" log file record format), I see a large number of requests for URLs ending in "wp-admin". This is pretty weird, as my server doesn't run WordPress. I also have a 404 document that's a PHP program that records $_REQUEST, $_SERVER, $_COOKIE and $_FILES. I have apparently del...
Suppose: A and B are initially configured to possess the same key. -- the key is only known by the pair -- no key needs to be public A has an algorithm, a, that takes a message(plain text), m, mutates it with a key, k, producing an encrypted message(cipher text), c. B possesses the same key, k, that lets its al...
I'm looking at implementing a two-factor authentication system for my web site, utilizing a user's cell phone as the "something you have" part of a two-factor system. It seems like there are two typical approaches to do this: Send a code via SMS or voice message to the user and ask them to enter the code on a web pa...
I have heard many times that hacking .NET websites is different from others. What's the technique used by hackers to hack .NET websites, and how can we secure .NET websites?
I made a software and I would like to distribute it as a demo that can be registered. I would like to know if there is a site where I can offer some reward for some one try to crack my software and explain how it was done. Thanks
I'm an amateur web application security enthusiast with what I would say is an intermediate level of knowledge at this point. I'm interested in finding full time work as a web app pen tester. Up until now I've been working mainly on vulnerable web apps hosted on VMs locally. I'd like to start doing actual vulnerability...
In my app I'm using Facebook login and creating a local user in my DB after retrieving the data. When saving the Facebook ID in the DB I need to hash it, as I don't want the ID to be in clear text if someone gets my DB data (I want to prevent, as much as possible, a way to connect the data to an actual person on Facebo...
If I understand right, there is a "handshake" where both the server and the browser verify who they are and agree on an encryption key. Why cannot a hacker just watch the network for the keys going through? Why can't a hacker just watch for the handshake, collect the data, and run it through a easy-to-write piece of so...
When a user initiates a SSH connection for example, keys are exchanged and a session is established with a new "passphrase" each time. If an attacker were to attempt to brute force this connection, their chances of cracking the "passphrase" would be much higher if the connection persisted for a long period of time righ...
As I understood it (correct me if mistaken); Wifi Positioning System has a network of routers of some sort, and when I plug in my new device, by using existing devices whose locations are known, they can locate my new router. I have few questions about this; How do they collect my info? Do they ask for permission? Can...
I have a question regarding encryption and message sending. There are 2 hosts, A and B with their own secret key kA and kB (assuming this is not PKI). It is known that when A wants to send a message to B, they do this handshaking protocol: A sends to B, an encrypted message in this form E(kA, m), where m is the message...
I have been hired at a start-up where I seem to have become the de-facto admin despite being hired to do application support (to be fair I do have a background as an all-rounder). Amongst the interesting things I have found is a lack on anti-virus on the domain's Microsoft servers the argument being that they are not t...
as the topic says I am interested in learning more about anomaly detection in particular I am asking for good starting points and references both from a theoretical point of view and applied one. For the second one (applied) I am interested in tools to use and good "traffic packets sets" which I can use to start diggin...
In Belgium we have electronic identity cards (eID) issued by our government. They can be read by a smart card reader. On the card are two certificates, one for signing and one for authentication. I want to distribute my public key. Can I use my eID to sign my certificate so to let users know that it really is my public...
I recently got updated by InfoSec that we need to be careful about ETags using Apache WebServer (HTTPD) as they reveal inode and can be exploited especially in NFS etc. But I am moving to Tomcat 7. Do I need to care about all these ETag vulnerabilities in Tomcat also ? If Yes, how can I mitigate ? Thanks.
We've been discussing a possible attack vector where a rogue app with root rights could hijack the legit ssl session of anther local app and transmit its own data over it without the server being able to detect it (Edit: our app uses ssl cert pinning). What would the rogue app need to do to achieve that? Are there any...
After the Mt.Gox crash, and also keeping in mind recently published attacks on Target and Neiman Marcus, one is led to believe that sometimes so-called hacking is perpetrated by insiders. What are the tell-tale signs of an insider-led compromise as opposed to break-in by outsider threats? Please limit your arguments to...
I felt this fit more here than SO, if not, please vote to migrate. We've been approached by a company who would like to use our platform to host their videos. The issue is that right now, we use the HTML5 <video> tag meaning anyone who is capable of opening the source of a page can see the actual location of the video....
What is the current best practice to secure an executive's laptop? The exec will be processing highly sensitive documents (high-value bids, merger & acquisition info, technical specs). As such they are a potential victim for a targeted attack or APT. They will primarily use web, email, and office. And they need to be a...
I've been looking for some decent documentation on Meterpreter shells, but I can't seem to find anything useful. I would like to know when to use what kind of shell for a certain situation. All I can find are guides that just mention what shell they are using but never elaborate why they prefer the shell. Do any of yo...
Do you think it’s a good idea to disclose your password encryption policies in your privacy policy or terms of service agreement? In other words, would you tell your users - and the world - you don’t store their passwords in plain text, and disclose the exact method you use to store passwords? For example, a privacy po...
Does a pair of (hashing) functions for which where neither g(x) nor f(x) are constants exists?
I've seen several implentations of CSRF tokens: The first one uses randomly generated CSRF tokens which uses a cryptographic strong random generator to generate the token. The second implementation I found uses HMAC which encrypts the session id with secret key stored in the server side config. The third implentation ...
I'm using SecurityOnion with Snort/PulledPork/Snorby. I am getting multiple "ET POLICY Pandora Usage" alerts a minute for the same source and destination. I want to threshold these to get 1 alert per day per source. The original rule: alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"ET POLICY Pandora Usage"; ...
i was wondering if this is a secure method for a hashing password.if it is not secure please tell me what to do in order to make it secure $pass='test'//the password $salt=openssl_random_pseudo_bytes(225);//generate salt $pre_hash_pass=hash('sha512',$pass);//pre hash the password $final_pass=hash('sha512',$pre_hash_pas...
I'm working on a project where I need to store and recover a password. I can't use a salted hash for authentication because the password is used to secure an HTTP connection via HTTP Digest. I'm not in charge of the protocol on the other end, so that means I need the plaintext password to perform the authentication. I ...
According to PCI-DSS requirement 3.5.2: Secret and private keys used to encrypt /decrypt cardholder data should be stored in one of the following forms at all times: Encrypted with a key-encrypting key that is at least as strong as the data-encrypting key, and that is stored separately from the data-encrypting key. W...
According to PCI-DSS requirement 3.5.2: We should store secret keys in a cryptographic device. Cryptographic devices: 1.HSM 2.PTS-approved point of interaction device My questions: I have some knowledge about HSM and it encrypts the KEK using Master key. Also read about Thales HSM and I'm aware about it. But when I was...
Following their tutorial, Stripe allows to save customer and charge them later. But, does one have to be PCI compliant? In their API Reference, it seems they give lot of information to be stored which seems to be a security risk. If someone gets hold of my API key and customer information, can they misuse the informat...
I've been asked to figure out how to get our company to comply with an "Industry Recognized [Security] Framework" where '“Industry Recognized Framework” means a global industry recognized information security management system (“ISMS”), such as ISMS standard ISO/IEC 27001:2005 – Information technology – Security techni...
i am storing the password using hash_pbkdf2 but now ive hit on a problem my code : 1.for register $salt = openssl_random_pseudo_bytes(125);//salt $final_pass = hash_pbkdf2("sha512",$pass,$salt,1,125);//where $pass is the password entered by the user 2.for login $found_pass=$row['salt'];//retrieve the salt ...
I am preparing a test plan for the security penetration testing of a software solution that manages patient information (HIPAA compliance) and allow the user to access to it from the web. Does anyone happen to know if there is any security standard for HIPAA that I can refer to as a blueprint for building the test plan...
A few years ago I have used S/MIME certs to sign (and encrypt) my mails. The reason for which I stopped signing was the following: My (class 2) cert was issued on Jan. 1st 2008 (just a sample). It was valid for 1 year. Thus it expired on Jan 1st 2009. During Jan. 1st 2008 and Dec. 31st 2009 I sent hundreds of mails. Ev...
Im trying to implement a better system to monitor checkins to our repository. We have some generic users everyone can use, I have recently disallowed them from checking in as those users however there is one user that is used in our builds who must be able to checkin. I would still like people to be allowed to become t...
I have a few sites that are using HTTPS (no mixed mode HTTPS/HTTP). The cookies do not have a HTTPOnly flag set. They do pass along session IDs. Also some of the sites do not have a "Secure"flag set in the cookie along with the HTTPOnly flag. Is running these sites in SSL a sufficient mitigating factor ? If not, what...
I realize how basic this question is, but I have relied for years on mechanisms built into .NET to handle log in for me. These days, most of my work involves using client-side logic and calling API services and I am now considering authenticating users that way. Should I be using oAuth, or is there something more simp...
In order to access my desktop or the hpc cluster at my university, I need to go though an intermediary server managed by the university. Currently I use the "netcat method" (ssh -W) to access the desktop and hpc cluster. I have also previously used tunnelling (-L) to access these boxes. What is the difference security-...
I recently acquired a Synology NAS (DS1513+). I am looking to expose SSH access remotely and to that end would like to harden SSH as much as possible. Is 2 Factor auth possible and if so what are the options that exist. Please note, I am aware of the PAM-based Google Auth module but wanted to know if there are alternat...
I am trying to recover login information of another computer. I have managed to copy the local/roaming profile credential files located in C:\users\%username%\APPDATA\local\Microsoft\Credentials\ and C:\users\%username%\APPDATA\roaming\Microsoft\Credentials\ when I try to copy these credential files in my credential st...
I would like to know about Multi-Factor Authentication is applicable for TEMPEST or not. Why I'm asking is I have suspicious matter every day also captured as log. My concern: It's possible to steal my account, password from my display or my keyboard tapping and also pass code for MFA from Smartphone such Google Aut...
I have obtained some credential files from another pc and would like to decrypt them. These are the ones found under local/roaming profile in Appdata folder C:\Users\%USER%\Appdata\Microsoft\Credentials Can ophcrack crack these credential files? I dont have any hashes, pwdumps or sam files.
I'm analyzing some malicious files on a VM and I'm noticing that every time I open a file, the host's antivirus detects it. Why does this happen? Is the malicious content escaping to the host?
Ive done a bit of reading on the subject of Hashes and Salts and I came up with an idea for a salting scheme but I wanted to check it with some people more learned than myself. My basic idea is to use the initial password hash as a salt for a second hash ie. password = 'foobar' final_hash = sha1( sha1( password ) + pa...
Decrypting the DEK using KEK under PCI-Standards, which are separated by Servers: Let say for example we have server1 and server2 Server1: It is in East US, called it as Application Server. Hosted my website and database. In my code I'm using AES 256-bit cryptograpy. Store the encrypted cardholder data in DB. This s...
Assuming a person gets his own domain address, say, theperson.com. He then goes on to create a vanity email address with that domain. e.g. me@theperson.com. me@theperson.com may be hosted by the person's own mail server, or somewhere else that offers vanity email services, such as Gmail, Yahoo mail etc. To the uninitia...
I use Cain to ARP spoof my host and the router. Then I use arp -an to show the ARP entries on my host. For a second or two, I can see the router's MAC address is changed to the address of the attacker, but it recovers to the router's valid MAC address immediately. Both Linux and Windows 7 are installed on my host, bo...
I have multiple web application installed in separeted directories in a shared hosting account. My worry is if one application get hacked, attacker can use it to attack other applications too. So, My question is what are the potential ways in which an attacker can exploit a application on a shared account using a diffe...
Although I understand the concept of a SQL injection and have done simple exploits (simple hack challenge sites and stuff) I'm wondering if one of the site run by my employer is vulnerable. Unlike my previous experience (relating strictly to forms open for injection) it seems as though the site is sending SQL statemen...
I am building an application in VB.NET (WinForms) utilizing SQL Server 2008 R2 as a Backend. The application is to track employee's money they defer each paycheck, or month, to deposit into separate 'fund' accounts. (Think of it like putting $200 of your weekly check into a few different stocks). The business side say...
Background: Implementing online casino, I would like to use a number of PRNGs with high throughput, like MersenneTwisterFast. I know it is not cryptographically strong, but quite unpredictable when used with a proper seed value (is it?), let's say, AES-CTR. Question: How secure would be the PRNG, initialized by a gener...
I believe that when adding a salt to the password you need to store the values so you can compute the hash again. But, what does happen if the attacker get the salt? How is it possible to add value or strength to the password if the salt is known by the attacker? What am I missing?