instruction stringlengths 24 29.9k |
|---|
It's a given that users will choose bad passwords. Why not help them out? Using a securely-random choice from a large dictionary, choose one or two words and tell the user to write them down. When they log in, require username, password, and the words that were generated. The password hash is based on the concatenation... |
We are thinking about switching from e-mail to instant messaging. Do you think, Apps like WhatsApp or Telegram provide enough security for that?
|
As a bit of a learning exercise, I'm trying to understand and implement a client for the Firefox Accounts Browser sync API.
I'm up to the point where I'm trying to ask the server to give me a certificate validating my public key:
https://github.com/mozilla/fxa-auth-server/blob/5c1354ecbc0c606d31e7db1b8ffd047808bdf6fa/d... |
Does an issued X509 certificate have a thumbprint (hash) included as one of the items in
the X509 certificate?
|
We had been testing an AWS instance accessing an internal Ubuntu 10.04.3 server, so had modified our firewall to allow all ports from that specific IP address to the server. We then released the AWS instance but forgot to remove the firewall rule.
Yesterday, someone noticed failed login attempts in auth.log which were... |
I am working on standardizing our server builds where we currently have three different functional pools.
For web pools I use the same IIS RSA key across all machines. It keeps life easy and allows the application.config file to be copied between servers without issue.
My question is, is there any issue of have al... |
What threats can a firewall between an application server and a database server mitigate that would not otherwise be mitigated when both the database server and application server are behind the same firewall?
|
I've been tasked with doing a security review on a Firefox update, but we don't have any utilities that we can find.
How would we go about running a security review on Firefox before pushing it to the other computers on the network?
|
this company claim Scrypt mining by ASIC (on crypto currencies who use scrypt hashing as proof of work)
scrypt is made to keep ASIC/FPGA attackers away, is that claim expired?
|
According to the implementation of the TCP/IP stack an attacker is able to identify which operating system is running on a network device. Is there any paper or the like according on this topic?
|
Also: Is it something that can be achieved with limited funds? I ask because I am intrigued by the obstacles that are in place.
|
I'm doing a school project where we are building a simple web server in C. To implement this I read the first line of the request (all I need for my purposes) and parse the middle string as the file name using strtok. So a typical request would be something like:
GET / HTTP/1.0
and my response code would be something ... |
A recent scan of a .net web application detected an ldap injection vulnerability for a field that was used for a username assigned to an instance of a custom class named User.
After stepping through the code, I found that the User instance was given the System.Security.Principal.WindowsPrincipal instance, and did in fa... |
This question has also been asked on Server Fault, but was not taken seriously. I hope this is a better place for it
I'm going to install Debian Wheezy on a KVM VPS. VNC access to console is enabled, and by sniffing network traffic when connecting, I see VNC password is encrypted but everything else is sent in plain te... |
I use the PwdHash service (http://crypto.stanford.edu/PwdHash/) and plugins for pretty much all of my passwords. I believe this is safer because:
No service gets the same password as another, so if one account is comprised my other ones shouldn't be.
The hashed passwords should be more secure than unique passwords I c... |
The update in question is the Mavericks combined update which, among other things, claims to fix the recent SSL vulnerability/gaping hole.
This issue really annoyed me, so I decided to procure Apple's PGP key and verify it as best I could. And I snooped my traffic with Wireshark during the downloads. Here are my find... |
My email-provider's website (http://www.gmx.de) recently started linking to the (German) site http://www.browsersicherheit.info/ which basically claims that due to its capabilities to modify a site's appearance, Adblock Plus (and others) might actually be abused for phising. Here's a quote from that site plus its trans... |
Will sabotaging a shared web hosting account threaten the security of sibling accounts being that they are shared on the same server?
Whether it it be through htaccess setups, posting login credentials and configuration specifics publicly, or the like, what are the main vulnerabilities a client on shared hosting can fa... |
I dont see any record of CVE-2011-1571 being fixed in tomcat based on ASF' security reports for tomcat itself. Usually they specify the CVE number and information about the fix. This was 3 years ago so i guess it has been fixed but when it has such a high vulnerability score i would still like to know as im planning to... |
I'm doing some studies/development for a security system that would use ECDH with ephemeral keys.
In my code I'm currently using a 256-bit EC, so when the two parts compute the shared secret, I get a 32B (256bit) array containing the shared secret.
Now, I would like to use this shared secret to compute a key for a symm... |
As per the PCI-DSS 3.5.2 requirement
Encrypted with a key-encrypting key that is at least as strong as the data-encrypting key, and that is stored separately from the data encrypting key.
Does this mean:
Storing the keys(DEK and KEK) in different servers(server1 and server2)
or
Storing the keys(DEK and KEK) in differe... |
I work for an insurance broker that sometimes has to share our customer calls with the insurance company we are underwriting for.
Generally this means retrieving the call from our call recording system and send this encrypted on a CD, recorded delivery to the insurance company for them to listen to.
Is there an easier ... |
To safely store a passwords, it is better to store them hashed using a hashing function designed to be slow like bcrypt. The goal is to trump brute force attacks.
Are there any ciphers slow enough to prevent brute force attacks? I am especially interested about SSH private key storage. Would a brute force attack work i... |
I am developing a web application. I am planning to skip CAPTCHAs for the initial signup by an IP so as to improve user experience. I was wondering if I am inviting any security risks by doing this. Is it possible for a malicious user to make many signups by using a new IP for each request? Also, How difficult is it fo... |
I just changed a password on a Google account while using the Chrome browser.
After doing so, I noticed that the https connection to Google was not highlighted in green signifying that it was an "Extended Validation Certificate".
Does Google not use "Extended Validation Certificates"?
If they do, then why wasn't their ... |
I wonder if it's possible to develop a secure point to point encryption application (a pgp message application for example) on a proprietary software.
If such an application was developed, let say on iOS or OS X or any proprietary OS, what are the chance that the OS could break it, intercept data, etc...
That lead me t... |
I have and android app that sends a encrypted sha1 salted message to a server, I know the message, is it possible to find the salt or it would be easier to try to reverse te android app?
|
If a post request is sent from a client on a website without SSL, is the request secure?
For example, I visit a site badsecurity.com, and I login using a password:
Will this password be encrypted if there is no SSL? (I am pretty sure it is not, unless it's https/ssl or there's some other encryption added to the form?)... |
I have a php script that sends an email using mail(). The php script lives on domain.com, and it sends the email to info@domain.com. Is this a secure transaction? The website runs over https.
|
Spam emails went out for an hour earlier this week bearing my Yahoo account in the FROM field and going out to all my contacts.
I changed the password, then saw (via rejected emails sent to my Yahoo account) that mail had gone out again with my email in the "FROM" field, to all my contacts.
However, in neither case di... |
I have the following rule:
alert tcp $HOME_NET any > $EXTERNAL_NET any (msg:"This should not happen"; flow:established,to_server; content:"GET "; depth:4; content:"Set-Cookie:"; http_header; within:100; classtype:trojan-activity; sid:1000001; rev:1;)
The header and general options are not the issue - it's the payload a... |
The title pretty much says it. Do the security patches to address the gotofail security issue in multiple Apple products employing SSL change the User Agent string for the respective systems? And, of course, what is the demarcation point between patched systems and unpatched systems with the build number in the UA str... |
Ive been called by someone, but when I answer the phone, it makes digital noises and then my phone calls some Nissan dealership. It will literally, after making before stated noises start ringing on my end like I am calling someone. The Nissan dealership will then answer like I called them. What is happening.
|
I created an x509 certificate using gnu certtool, in the certificate template i specified cn=myip
Problem is that each time I change my network I need to remake the certificate because my ip changes...and from client side it is even worst:if I want to contact a server on my private network I need a 192.168 address, whi... |
Can someone please explain how and why this struct.pack code is used in the below exploit? I'm trying to understand how it triggers the vulnerability. I understand the buffer overflow aspect, I'm referring to the below struct.pack method. I'm a ruby guy myself, and did some prelim digging into the sruct.pack code below... |
Is there any way how to use Kismet data to locate rogue wireless access points?
|
Short Question:
Question: Could any security vulnerabilities arise if a server runs htmlentities as UTF-8 but the client views the results as ISO-8859-1?
Assumption: No vulnerabilities exist when one consistent charset is used
Detailed Question:
Question: Could any security vulnerabilities arise if the server htmlenti... |
Is it possible to use internet without revealing my public IP Address?
I feel I should have the choice to reveal my IP address or not. At the moment, it feels like I don't have a choice.
Your IP address seems to reveal a lot about you, i.e. where you are, which ISP you're using and I feel that no one has a right to kn... |
Is obtaining the value of a textarea/input with the jQuery function .val() XSS-proof?
<html>
<textarea id="t1"></textarea>
<script>
var toBeDisplayed = $('#t1').val();
$('#elem').html(toBeDisplayed);
</script>
</html>
|
When using the Windows Azure IAAS servers how does one setup IPS for all incoming traffic to these servers? How would a regular user who runs his whole environment within Azure make sure that he can monitor traffic for security?
What are people doing now?
Thanks in advance.
|
Background: We're in the process of integrating two web applications. The other one, application A, is a publicly accessible Internet service, which is provided by a third party and which offers Web Service APIs we'll integrate with. The other one, application B, is an old(ish) legacy application hosted in a company in... |
I have a server that I want to restrict access to by allowing only one IP address to be able to connect to it through desktop and make http request through port 80.
Now in my firewall I only have World Wide Web Services (HTTPS Traffic-In), Remote Desktop - User Mode (TCP-In) and Remote Desktop - User Mode (UDP-In) rule... |
Are there any tools capable of automatically fuzzing Linux shared libraries, by automatically I mean detect exported function, determine function signature and finally inject random data ?
Can frameworks like Sulley or Peach perform this type fuzzing if we provide it information like function signature ?
|
A professor told us today, that MD5 is weak. I understand his chain of thought but pointed out, that IMHO MD5 is a good way to go if you would use a long (even really long) dynamic salts and static pepper.
He stared at me and said NO!
IMHO the possibility to "brute-force" a md5 hash with a any dictionary is even simple... |
For a user to defend against something like
Don't understand how my mum's Gmail account was hacked , they should pay attention to URL bar before typing their credentials.
But how can you make sure it's really the browsers URL bar that you are looking at?
Phishing site could look non-suspicious by:
Opening a popup with... |
So, as far as I know, Chrome and possibly other browsers have a very low privilege process spawned for every tab.
How do browser extensions interact in regard to this sandboxing? I'm not talking about directly compromising an extension, but compromising Chrome, and then escaping from the tab sandbox by compromising the... |
cRLDistributionPoints is OID 2.5.29.31. Here's what one looks like under Gutmann's dumpasn1:
SEQUENCE {
OBJECT IDENTIFIER cRLDistributionPoints (2 5 29 31)
OCTET STRING, encapsulates {
SEQUENCE {
SEQUENCE {
[0] {
[0] {
[6] 'http://crl.example.com/crt1-crl.crl'
}
... |
Problem
This morning I found that, what I thought was one of our proprietary artifacts, had been published to a public repository:
http://repo.grails.org/grails/simple/codehaus-cache/com/
If you click on the link you see that there are tons of Artifacts from companies like Adobe, Amazon, AOL, BP, ... at least some of w... |
Shouldn't this be a trusted certificate considering it's a wildcard SSL certificate?
That is, shouldn't *.delaware.gov cover www.corp.delaware.gov?
|
There was an interesting paper in 2013 from the University of Pennsylvania called Familiarity Breeds Contempt: The Honeymoon Effect and the Role of Legacy Code in Zero-Day Vulnerabilities. One compelling example the authors discuss is the lack of known security breaches in voting machines, contrasted with the high numb... |
I've been playing with John The Ripper (JtR) to try to crack/audit a salted password that was hashed with SHA-512, with 20 interactions according to the source (for the curious, this is a Rails app, with the authlogic gem).
If I understood things correctly, JtR expects its hashes in a file, where each hash follows cert... |
Just very curious, count my knowledge in cryptography, algorithms, and security in general as non-existent. Now I am aware that this might be a VERY broad question, but here it goes. What is the most secure and virtually unbreakable cryptography to secure data in today's standards (and of course tomorrow's). Tips and t... |
Does the recent certificate gotofail bug affect me if I'm running version 6 of iOS, but only use Chrome as my browser?
|
On a theoretical level, is there anything inherently different about public vs private keys?
During RSA key generation there are two keys generated, key A and key B. Key A is private and Key B is public. Could key B be private and key A be public?
Is the choice of which key to be private arbitrary?
Would either key wo... |
I'm thinking about building a very anonymous forum, where people can comment and upvote each other's comments anonymously. People are supposed to remain anonymous even if the forum's database contents becomes publicly available. As one step to prevent vote fraud, I'm thinking about storing parts of the IP address. Only... |
I'm writing a little webapp that demonstrates 2 factor authentication. I'm using the TOTP protocol as described in RFC 6238. In our scheme, we are storing, in addition to a b-crypted password hash for each user, a secret key, which is used to validate one-time codes.
I'm using postgreSQL for a database backend. Let'... |
You can see the link "Forgot Password?" nearby almost all login form.
Since passwords are completely protected from outside access, I come up with this question. I accept that the forgot password process is highly secure. However, I want to make my application a little bit more users-friendly.
I want to skip this whole... |
I want to move from a shared hosting to VPS. I never used VPS or dedicated server, so I wanted to know if there are some security precautions that I should have in mind. Say, I create a ftp account or, database user, should I do smth to secure my account info, or it is something that the provider should take care of ?
... |
What's the difference between normal sql injection and string based sql injection?
An example would be appreciated.
As far as I understand from the few readings around the net, string based sql injection is somewhat similar to blind sql injection in that, the sql injection occurs but a valid page is returned and we ca... |
My skype password was recently changed. I've changed it back and found it in the internet on hacker's site. My password is pc-generated, like as2fZ12v. How did they manage to hack it, if I've never written it anywhere?
|
If all html in a site is generated in client side (attributes, urls, styles everything will be concatenated in javascript and set as innerHTML), is it doing only html escape enough for mitigating all xss attacks mentioned here?https://www.owasp.org/index.php/XSS_(Cross_Site_Scripting)_Prevention_Cheat_Sheet
|
I have a program written in Python that checks the validity of its license key with a remote server. Am I right that an SSL certificate would make it possible to prevent spoofing (host redirects for example) of the remote server? And if so, is there a difference between using an official SSL certificate from an SSL pro... |
I have a website, large amounts of this site can only be accessed if the user logs in. I would like to use the users IP addresses as a means to determine where they are when they access certain pages.
I would like to use the users IP to determine if they are at a certain institute (company, university, school etc.). I ... |
I work for an ASP that provides banking solutions
Card
Services
Payments
ACH
Online Banking
And others
Back Story: Our company provides an "all in one" solution or parts thereof, we are constrained by regulatory agencies. One of the issues that we have run into, is retention. We are pulled in to investigate fraud, ... |
KDC-REQ ::= SEQUENCE {
-- NOTE: first tag is [1], not [0]
pvno [1] INTEGER (5) ,
msg-type [2] INTEGER (10 -- AS -- | 12 -- TGS --),
padata [3] SEQUENCE OF PA-DATA OPTIONAL
-- NOTE: not empty --,
req-body [4] KDC-REQ-BODY
}
I thought everything in square brackets was ... |
Bitlocker doesn't support USB key + PIN (password). The reasoning was "the password is too weak to provide additional security". Isn't that flawed? With a USB key and password, I've got some level of two-factor, right? The USB drive contains 128/256 bits of key material, and the user could provide as large a passphrase... |
Consider a drive with Opal 2.0 support that works with Microsoft Bitlocker's "eDrive" feature. In this case, supposedly, the encryption key never leaves the disk (which might increase security, although the RAM of the machine obviously needs to have the "unlock" code stored somewhere).
Is there a certification that sho... |
What are some reasons (if any) one would choose WEP over WPA? Clearly, WPA offers more security, but when can WEP be a good or even better choice?
|
As a way of backing up big amounts of data (about 1-2 TB) I thought it's good idea to bury a hard disk drive (in a damage-preventing shell) to be able to dig it later and read all the data from it if all other backups are gone (for example, if my laptop is stolen and my house is exploded). But I'm wondering if it's rea... |
we have found an issue with some production systems that the Anti-Virus causes the program to become slow a lot of the times and generally interferes with the activity of our software. Now as far as I know, this is exactly what the anti-virus is suppose to do in order to protect the machine from files coming in from th... |
Thinking about these below two cases, which one is best and most secure one
1st case
//key1 generated from static salt and user password, because in case attacker don't know about source code (bad assumption, but still my assumption), attacker have only hashed or encrypted data + random generated salt
staticSalt = "Sta... |
I am learning system security in an online course. In a practical experiment I tried to monitor the traffic through my router using wireshark1.10.3. But I have a feeling that it only sensing traffic from my windows laptop to the router, but not all systems connected to the router.
Do I need to have a Airpcap adapter to... |
I'm trying to inject javascript into a js scriptfile but it's not working.
I have the following setup:
html file with javascript-file include (all inline js is blocked!)
Welcome, <script src="js/domxss.js" type="text/javascript"></script>
javascript source of js/domxss.js:
var pos=document.URL.indexOf("user=")+5;
var ... |
I'm reading Post-Quantum Cryptography, and in the page 106 in the beginning of the Section 3 it says:
In this section we consider the message security (opposed to key security) of
code-based cryptosystems ....
What's do Message Security and Key Security mean? What's a difference between those?
|
I am looking for a way to isolate two different networks from each other. Suppose we have 2 different networks (public and private). I am looking for a way to connect to these two networks via a single network wire in a trusted way.
I did some search and I found that there are two solutions for this purpose:
Multilev... |
How am I supposed to match vulnerabilities with services fingerprint, with string like these? Is there a public database to match these versions with original versions?
> 5.5.29-0ubuntu0.12.04.1
> 5.5.29-0ubuntu0.12.04.2
> 5.5.31-0+wheezy1
> 5.5.31-0ubuntu0.12.04.1
> 5.5.31-0ubuntu0.12.04.2
> 5.5.31-0ubuntu0.13.04.1
>... |
How can I get nmap quicker in scanning UDP ports?
This kind of scan is incredibly more slow than TCP ports (at least 2-3 times)
|
So I have this web app where I'm supposed to generate my own session key to use in the session manager. I just have few questions about safe approaches to this.
I believe to make this safe it should be a randomly generated key and is unique in every instance of my web app processes. Is my assumption correct?
I'm using... |
Here's the idea:
I have a website where I offer to users to log-in/sign-up via social networks(in this case Facebook and LinkedIn)
When a user authenticates with either provider I look-up the users in my DB and see if there's already a user that has the same social network ID added to their profile.
If there is - the... |
I am a developer and I therefor I have very little knowledge on security. So I need some help understanding the attack on website which we launched recently for one of our client. Website is built on Ruby on Rails and hosted on EC2 Ubuntu.
In website log I see lot of requests which are unusual, below are few examples. ... |
From CVSS v2 complete guide :
"Security (Risk) Management: Security Risk Management firms use CVSS scores as input to calculating an organization's risk or threat level. These firms use sophisticated applications that often integrate with an organization's network topology, vulnerability data, and asset database to pr... |
When using Google's two-step verification with services that can't use it, such as mail clients on smartphones and desktops, the solution is to create application-specific passwords for those services.
Does that make things less secure than just using one password as this opens up the account to more that one password... |
I am using ZAP 2.2.2 and I have generated a dynamic SSL certificate and added it to my Firefox browser. I then started a proxy on localhost with port 8090 and configured Firefox to use it. When I browse https://google.co.in it works, i can see the result in "Sites" tab. When I try to browse http://google.co.in it gives... |
Just came across this bit of ruby that can be used to decrypt Snapchat photos taken out of the cache on a phone, apparently adapted from here. To my surprise, it worked without a problem, considering the problems around Snapchat's security which have been well publicized lately (Mostly the stuff around the whole phone ... |
As per PCI-DSS requirements, we have to use either HSM (Hardware Security Module), or Key Server to store the KEK (Key Encryption Key).
If I'm storing encrypted DEK (Data Encryption Key) in an App Server, how can I securely store the KEK which encrypts the DEK?
The two options:
If I decide to use a Key Server, then if... |
I'm using AES Encryption for encrypting credit card details and so I will store my DEK in Ecnrypted form and do we need to encrypt the Initialization vector for storage?
|
I have recently installed Tweetdeck, because my previous client stopped working.
In my custom client, and in the third party client I have used previously I had to setup authorize the application in my Twitter account and the use generated PIN to validate the client origin.
Now I have noticed that in Tweetdeck, I was o... |
A common issue noted by security testers is that the Apache web server is reporting a version in headers which is older than the latest available one.
This usually leads to CVE listings detailing the vulnerabilities present in that version of the product, and a typical challenge for black-box testers is establishing wh... |
I was tasked with implementing a network security solution for a small real estate agency. They are a typical old-school mom and pops shop, about 15 employees with basic file sharing, printing, and web access needs. They also have their own web server which hosts a simple informational website.
The current architectu... |
Is there a security checklist for auditing JBoss configuration files ?
CIS and DISA provides security checklist only for Tomcat and Apache server. Is there any other ressources ?
|
I was wondering, assuming a "The Invention of Lying" world, but where no one was able to steal or misrepresent themselves how much faster would computers be? Just to give two examples of what I mean, there would be no need for user permissions (because people would only access the files they were supposed to) and no ne... |
When I opened ftp command prompt and typed open mydomain.com, it gave me the following and I think that this is a security vulnerable.
connected to mydomain.com.
220----- Welcome to Pure-FTPd [privsep] [TLS] -----
220- you are user number 1 of 50 allowed.
220- local time is now 13:18. Server port: 21
220- IPv6 connecti... |
I recently found out that the company I use for shared hosting stores passwords for email accounts in plaintext (they mentioned this to me incidentally, while troubleshooting another issue). They're a major company that does business and e-commerce hosting, so I'm shocked. But I'm just a hobbyist, so I'm not completely... |
I am designing a secure protocol (for academic/learning purposes) and I am at the point where I need to (re)design the key exchange step.
In my previous implementation, I used to rely on RSA to encrypt then sign a couple of randomly generated AES keys that I would then use for traffic encryption.
It has been brought to... |
Recently, I ran across a website that requires me to change my password after X number of days had passed since I had last created one. Intelligently, the service made sure that the password did not (approximately) match any others that I had used before (something that clearly did not use permutations). However, I was... |
Scenario:
Cannot use previous 15 passwords
Using PBKDF2 with iterations targeting 1 second execution time
In this scenario, when a user wishes to create a new password, the server must combine that password with up to 15 salts from the previously used passwords. This means, worst case scenario, a user's password cha... |
I'm trying to design the best strategy to achieve the following goals:
Securing data-on-the-wire between my server and MongoHQ.
Encrypting all data-at-rest with MongoHQ (possibly key values as well).
And this is my current working strategy:
Use a VPN tunnel to connect to MongoHQ using the mongodb protocol. I don't b... |
Every three months, 7 people fly to a secure ICANN server building and go through an elaborate ceremony to generate a new signing key for DNSSEC. The entire affair appears to be based on politics and not any real security model. If the private keys have not been compromised then no-one else can sign any records, rega... |
A century old adage: The more the merrier.
In general, does this adage hold true in regards to the number of anti-virus software you should have on your PC?
Are there any limits before it actually has the opposite effect?
|
I am reading the Debian Security How-To and came across a section that I found odd: it recommends to use md5 hashes for /etc/shadow passwords (http://www.debian.org/doc/manuals/securing-debian-howto/ch3.en.html#s3.5).
This document was most recently updated April 2012, so I am curious why they would recommend md5 as th... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.