instruction stringlengths 24 29.9k |
|---|
I try to design a system which reads events comming from devices, stores them and exposes API to various applications. Originally I wanted to introduce a module Id translator, so I would store only anonymous device id in a database. It would be then protected from unauthorized data harvesting.
Then I wanted to have ano... |
Absolute persistence technology amounts to a persistent rootkit pre-installed by many device manufacturers (Acer, Asus, Dell, HP, Lenovo, Samsung, Toshiba, etc) to facilitate LoJack for laptops, and other backdoor services:
The Absolute persistence module is built to detect when the Computrace
and/or Absolute Manage... |
As I'm sure many of you have heard, the end of support for Windows XP is the supposed apocalypse for ATM's worldwide. I am cognizant of the fact that this ensures that no more patches are issued, and that banks need to take that threat seriously. I'm having a hard time identifying potential attack vectors and to me it ... |
note: Title edited to make the answer more useful to a wider audience
I'm reading source code for encrypting files with AES GCM and see the following binary output.
AdditionalAuthData IV Encrypted Data Tag (16 bytes)
--------------------_____________------------------..... -----------... |
I am trying to build correlation/ potential red flag rules to detect if passwords are being shared or stolen... the primary driver for this is guidance from our compliance team, that much of our frauds in payments have arisen because of deliberate sharing or theft of a co-workers credentials (e.g. in maker checker etc)... |
I understand that non-repudiation is based upon public key cryptography and the principle of only the sender knowing their own private key. However, what is a condition, if any, of non-repudiation that can never be proven through digital analysis? This digital analysis would include inspecting the message and logs. I a... |
I've been considering proxying all web traffic on my network transparently through Tor and dividing up my bandwidth to share with the rest of the Tor network.
Practically speaking, what are some of the reasons why one shouldn't do this? Obviously bandwidth is a concern, but apart from this, are there security concerns?... |
I'm seeking to understand how Perfect Forward Secrecy (PFS) works for non SSL applications.
More specifically, I'm interested in how Moxie Marlinspike accomplishes this in TextSecure and other applications. I've heard that they use a "racheting" protocol which gives each session its own specific key which prevents a co... |
I'm interested in learning about secure system design - the whole stack. Currently, I'm an expert .net/C# developer and I know about the differences between different hash functions, public/private key encryption and similar techniques, but my application is only a small part of the system as a whole.
For example, publ... |
Is there a way in metasploit to add a custom exe/script as payload to a file (exe/pdf/doxc)?
I'm asking this in the context of a SE media dropping scenario, where a file when executed, sends data to an internal server, to register that the file has been executed.
|
I am designing a REST Api for a mobile application and have some worries over properly securing access to accounts.
I am writing the API server in nodeJS and it will primarily be consumed by a mobile client (although a web client may be added in the future)
There are 2 main side aspects I wish to incorporate in the aut... |
I am creating a log in system. The easiest system would simply check a database for a log in and password, then same a session var which states login=true I am interested in other things that I can do to make it more secure. Here is a general list of things that I have already found. Feel free to use some of these it... |
I have a site running on a VPS. I set up the LAMP stack and a few other programs personally. This is only the second time I have set up a VPS and I am a bit worried about security. Are there things that I should be aware of (regarding my Linux install and LAMP stack) which people could use to gain access to my VPS a... |
I have used PCs for most of my life, and I am very aware of the fact that they can catch a variety of viruses. I have owned a MAC now for two years, and have enjoyed a pleasant (perhaps too pleasant) experience with it online. Lately, I have been hearing that MACs can become infected with viruses, which makes me wond... |
I store my OpenVPN profile (keys) in an encrypted drive but I run OpenVPN inside an OS that is not encrypted. When I finish my OpenVPN session and disconnect, the connection profiles are still there (until I delete them). Is it safe to assume that my keys are not cached anywhere or do I need to go about securely delet... |
Suppose I have a script that contains my PGP private key in plain text and requires me to manually type in the key passphrase to decrypt some data. Later, I decide that my passphrase is compromised and use gpg to change the passphrase. Would someone that has my old PGP private key and captured somehow my old passphrase... |
Over the past few days, I'm noticing that the log of my wireless router is showing an ACK flood attack from various IP addresses. I use a D-Link DIR-600L. I've searched through the internet, also through this question. But I cannot come to any solution. My ISP advised me to change DNS IP addresses and enter them manual... |
Noticed it here
https://twitter.com/wikileaks/status/446263047812702208
wwwwwwwwwwwwwwwwwwwwww.bitnik.org
Is this some security feature?
|
I was tasked with finding the security features of JRE 1.8 and compare it to JRE 1.7 update 51. When I try to look for new security though, it only shows ">JDK< Security Enhancements" (ie. Not ">JRE< Security Enhancements") for 1.8. Is that what I'm looking for? If not, is it ever documented?
So, I'm just looking ... |
Recently I've been reading about Web application firewalls and the fact that they protect against most frequent attacks like injections, XSS or CSRF.
However, a good application should already be immune against these exploits, so why do companies prefer buying those expensive devices to try to protect (WAFs aren't perf... |
I'm thinking about playing with/learning about firewalls. It is easier for me to learn by building, so why not build a firewall? If I run it alongside my normal firewall, I'd get the normal firewall's protection right?
|
Can you please provide a clear definition for procedural security controls?
Are operational and procedural security controls synonyms?
Thanks
|
I've seen many instances where a company or organization generates and uses a PGP keypair for a team or group of people. Most likely they all have a copy of the private and public keys on their individual machines or sign on to central server and use the gpg utility there (all knowing the shared secret key password).
W... |
I live in a country that the government blocks most ways of accessing to the uncensored Internet (like blocking VPN pptp, l2tp), Luckily there are some very fast services still available like Kerio VPN.
But as I found out, It does not seem to be very safe as the person running the service could easily track your activi... |
To prevent cross-site request forgery attacks, I'm considering the following scheme:
For each user, store a random key. If the user submits any "dangerous" information, include a security token and a creation date in the upload. If the creation date older than T (I'm currently leaning 5 minutes), the request is conside... |
We are going to deploy our service, it's drupal based with some additional REST APIs.
The drupal servers will be (loadbalanced) put in the DMZ.
We think to deploy the REST APIs on an app server in the DMZ as well, including authentication/authorization.
We'll have an additional firewall, behind which the database serve... |
On some websites, the login page (where you enter your login details) is served by a regular HTTP connection with no encryption. However, once I login, the page immediately switches to a secure HTTPS connection when displaying my account details, etc. It seems that using SSL after the password is entered is pointless, ... |
I'm recently interested in having an paranoid level of privacy but there is little question in my mind for which I cannot find an answer.
I know there is fingerprint of my browser which it gives away to every website it visit. Being a fedora user with bunch of browser extensions, I'm completely unique according to Pano... |
I'm working on a project whereby a certain level of anonymity is required for users. One of stipulations is that no email is used at all, as it makes the barrier to entry too high for people who want anonymity in this service but don't have an anonymous email account to hand.
One of the issues with this is that account... |
When registering for an SSL cert, I was able to validate that I "owned" the domain I was creating the cert for by having a valid @domain.com email address. If I worked for a large company, say Microsoft or something, and have a valid me@microsoft.com email address, how am I prevented from being able to create a valid S... |
Is it possible to keep several files and programs on windows OS after re-installing it? because of someone can steal the device that uses windows OS, then just removes the windows and install another one (cracked or even bought). So you just lose your device and all of the security applications! I think it is really se... |
Ok I understand from my research that the Chip Card creates an AC Key(MasterKey+AccNumber) to communicate with the authorizing server securely (3DES key to have encrypted communication) but I don't understand the following..
What's the difference between having the card talk to the server directly and having the card ... |
What is the optimal way (cost-wise, too) to secure page forms (https) on a large number of domains&subdomains? Are certificates required for all domains? Is putting all the page forms on a single secured domain -and than redirecting frm all sites to this one- a solution?
|
What do you think it's the best method to secure a string in PHP? I speak of hiding its content and avoid malicious changes by the user, but be able to recover the information.
We can use the open_ssl functions, but I prefer using a simpler solution, more platform-compatible, quicker, and without the need of public/pri... |
In most protocols I have encountered in which a passphrase is used for authentication it is stored not in plaintext, but a PBKDF digest of it instead. This is obviously good.
However what does not seem to be standard practice is to compute this PBKDF digest on the client-side while registering/updating a passphrase. In... |
Let's say that you create a system where a secret is hidden and revealed by a particular key. As well, the key can be broken, but it would take thousands of years. If you keep switching the keys frequently enough that no computer is able to break the key in time, is your system secure? ...well, apart from getting th... |
Using proxy software, I was able to bypass a file upload control file-checking for an asp.net system I am pen testing. I noticed they are saving the file into the database as bytes, and it is available for download in my own portal at any time after upload. The thing about this is that no one else can see files I've up... |
I have an instance where we have an application that requires the ability to set up sftp commands that are specified by administrative users. They are configured through the front-end of the application. Veracode has correctly identified a directory traversal attack here.
I work for a B2B company, and this sftp pro... |
Let the diagram below be a representation of a LAN.
- let R be the interface between the LAN and the internet.
- H be host connected to the LAN.
- F be a firewall implemented using a virtual machine controlled by H.
- V be a virtual machine controlled by H.
- F is also the interface between the LAN and V.
- F also bloc... |
SSL typically makes use of MAC-then-Encrypt technique instead of Encrypt-then-MAC (which is usually considered ideal for most of the scenarios). I myself don't have a full insight knowledge about the merits and demerits of both the techniques, but based on what I'v read and understood so far, I think using Encrypt-then... |
I'm building a desktop app. I'd like websites to be able to communicate with the app over HTTPS. The general idea is that a website could run a JSONP call to https://127.0.0.1:8844 and send data to the desktop app.
The problem is that most newer browsers won't let you run a call in the background to a non-authority-rec... |
People often recommend PBKDF2 over using hash functions directly, but typically they compare PBKDF2 to a single unsalted hash. What advatages are there to using PBKDF2 over multiple iterations of a cryptographic function with the password and salt appended to the previous hash at each iteration?
Pseudo-code:
password="... |
I got scanned yesterday, and I'm seeing a bunch of entries in my logs like /'\"\\'\\\");|]*{%0d%0a<%00>/photos or /'\"\\'\\\");|]*{%0d%0a<%00>/resources. What specific vulnerability was this bot looking for?
The next thing was a bunch of requests for urls like /1%c0%00xa7%c0%a2/about. Not sure what vulnerability was b... |
I have a WCF service configured to use two-way certificate authentication on the messages.
The server is also locked down through a firewall to only allow traffic from a single IP:Port that the client is also using.
Is SSL for the transport layer still a good idea, or overkill?
|
Use-after-free bugs are a particular class of memory safety bugs. How often are they exploitable, in practice? When you find a use-after-free bug in a program, is it often exploitable, rarely exploitable, or does it vary based upon some other factor I'm overlooking?
I'm particularly interested in how often use-after-... |
Is the following algorithm, using RNGCryptoServiceProvider & Rfc2898DeriveBytes, sufficient to implement a FIPS 140-2 password hash on Windows Server 2008R2?
var provider = new System.Security.Cryptography.RNGCryptoServiceProvider();
byte[] salt = new byte[8];
provider.GetBytes(salt);
var iterations = 100000;
var pbkd... |
I am part of an in-house development team that provides the software that is used in our company's factories across the world for production as well as for order management, and which also enables the sites to share data with each other across our WAN.
I have been recently tasked with the following objective to be com... |
Every once in a while (when I think out loud and people overhear me) I am forced to explain what a buffer overflow is. Because I can't really think of a good metaphor, I end up spending about 10 minutes explaining how (vulnerable) programs work and memory allocation, and then have about 2 sentences on the actual exploi... |
I have a public Single Page Application (SPA) that is calling my backend REST service via JavaScript. How can I secure the REST service so that it will only accept calls from my SPA and no other clients or users? Basically, my SPA should be the only allowed user of the service.
Any way that I can think to secure it wou... |
I am creating an application that allows a user to create an account, with a password, and have a set of public and private keys symmetrically encrypted with the password, so that they can be retrieved later when necessary, but only if the password is correctly entered.
For both the password and the key pair, I am cre... |
Okay, suppose that I have 2 computers: Computer A and Computer B, connected with this setup:
A->switch->router->internet
/
B->router/
and the closest router to computer B is configured to block connections from Computer As switch.
If computer A is desperately trying to attack computer B, sniffing packets, Mi... |
I have a very straightforward question. Is there any downside to logging in as an administrator all the time in windows 7?
I mean, it asks you whenever a program asks for permission to do something as an admin so how is this any less secure than logging in as a regular user.
One shortfall I see is that as an admin it... |
I have tcpdump installed on my iPad which is connected to WiFi (WPA2). How do I capture packets sent/received by other devices on same network?
UPD: iPad 1st gen, latest (5.1.x) iOS available.
|
Parting from the reasonable supposition that "everything can be hacked", I am sure the answer is 'yes.' But is it something possible, or even feasible?
I know that aeroplane computer systems are proprietary, but that would be a pretty weak security by obscurity policy, so I assume they have other security measures to p... |
We run a mail server (postfix/dovecot/centos 6.4). The hardware is based on a supermicro chasis with IPMI features.
It also runs a web interface for accesisng mails(Apache web server )
Recently our DC said that we are sending outbound DDOS attacks which touched upto 1.3Gbps as per their saying. They nulled the IP. Afte... |
As a bit of a thought experiment, I've been thinking through how one might design a web application where a user's data (say, from a form on a webpage) is stored, encrypted, on the server, using a per-user key. The decrypted data is shown in a form on the webpage when the user logs back in.
I've come up with two potent... |
I am aware of the problem of drive-by downloads, which happens when one visits a malicious site and a malware is downloaded to the PC. I want to ask that when such a program is downloaded, how does it manage to execute?
|
I have written a script to check a given password against a ~65 million long list of passwords collated from various lists released after hacking attempts.
I am thinking about incorporating it into the password checking process when a user chooses a password - notifying them that a password is on a list used by hacker... |
I am using LastPass for managing passwords on multiple computers.
However, LastPass extension (at least the chrome version) is running some opaque binary code through Native Client, and I just feel that I don't trust the company running LastPass anymore, since it's based in USA ( https://lastpass.com/about-lastpass/ ... |
I am using following link for arp poisoning our Wireless LAN.
http://www.irongeek.com/i.php?page=security/ettercapfilter
But the thing is, it is working only for some sites. Even some some http sites are not modified with this.
What is the reason behind this?
Does the sites any mechanisms to prevent ARP Poisoning?
|
I get this warning while I decrypt a Twofish-encrypted file in GPG.
WARNING: message was not integrity protected.
From what I found online, this warning should only come up for CAST5, not for AES256 or Twofish. Why does this occur? And is there a way to prevent this warning?
I use GPG on Ubuntu 12.04 GNU/Linux.
|
I currently have
Implementing SSL / TLS Using Cryptography and PKI Joshua Davies.
It is very recent and covers even newer TLS version 1.1 and 1.2 and ECC.
It is based on many C sample that are dedicated for this book and apply more for people wanting to develop or extend a tls stack understanding deep internal crypto,... |
As far as I know, SOAP services have security standards recognized by OASIS and W3C, such as:
XML-Encryption
XML-Signature
SAML
Are there any security standards for RESTful services?
|
I've already assembled a lab consisting of Kali, Metasploitable, and a Windows XP machine, but are they're any premade lab solutions available that offer up a bit more complexity or even predesignated goals? I am aware of different services that will allow you to VPN into a network, but is there a free/cheap alternativ... |
one of my friends wants to deposit money into my other friends bank account. obviously she needs the bank account number to do this. Can she access any other information in with just the bank account number, like the balance or anything? Also does online or in-person deposit make a difference?
|
In my website, a user can upload his profile picture. After analysis of some pictures, I have found some pictures with malicious PHP code, just like the upload script. As an example, I have found a single line code of PHP:
<?php echo $_GET['a']; ?>
So by using this code, if he can upload this picture as a .php file, su... |
I'm looking to design a system that allows a user of a crypto-coin such as Bitcoin to both have an online wallet and to be able to send and receive encrypted emails in the same system.
The relevant portion concerning Bitcoin is that for a user's address, such 31uEbMgunupShBVTewXjtqbBv5MndwfXhb, is a hash of the user's... |
Can I get MAC addresses of devices (mobile phones) which are near to my network but not connected to it? (Linux)
I have been trying to get the MAC addresses of devices connected to my network through nmap command... but how can I get devices which are not connected to my network?
|
I am interested in demonstrating an attack to my university's security team on IP phones installed at the university. The IP phone models are Siemens optipath410.
Basically, using nmap, I identified a few IP phones on the network. The IP phone have the following ports open: https (443), telnet (21) and ssh (22). When I... |
Does it actually help keep a site more secure to deny all access to WP admin and make changes directly on the FTP only?
Our WP has been hacked twice now. It seems that everyone has a different idea on how to keep WP secure and as a part of the security services we received one of the consultants recommended blocking al... |
Lots of sites these days, that don't deal with sensitive data, enable encryption. I think it's mostly to make (paranoid?) users feel safer. In cases where there is a user's account being logged in, their personal data accessed, I see how it can be useful.
But what if I'm just reading a news site? Everyone has access to... |
Sync, a new product from BitTorrent, Inc., has been cited as a viable alternative to other cloud-storage platforms. The Sync FAQ indicates that an encryption scheme is being used, but does not comment on specifics.
Does there exist any information about the type of encryption that BitTorrent Sync is using, and whether ... |
i just get an answer from IM+ (instant messenger client android app) support and they told me that my auto saved ICQ, Googletalk, YM passwords are encrypted using TLS, so i want to ask if i need to worry?
I mean i cant use full disk encrayption on my old android so when i loose mobile what is the chance of someone be a... |
SSL uses CAs which sign certificates for the domains after they validate that the person requesting is truly the owner and by a public/private key pair a encrypted connection is achieved which cant be decrypted by a MITM.
Now thinking on the long run, if someone has control over your network all the time, after some ti... |
When you look at currently used concept of Root CA (primarily in SSL/TLS context), you can see a single-point-of-failure vulnerability, which means, if your private key is disclosed, you automatically lose whole chain.
Current State of Trust Chain topology
Means, you start with one self signed certificate, declared as... |
I work for an insurance company who will randomly (3-5 times per year) have a consumer who emails their credit card to our customer service department. We don't ask for the number, they just send it over to "expedite" their transaction.
From a PCI-DSS perspective, how should this be handled by the customer service age... |
This has been asked a bunch of times. I am just curious to see if the below code provides a fairly significant level of security.
Are there any other cases I should consider?
Below is just an example; please ignore any syntax problems; I'm looking for insight into the security aspect of the code.
Few assumptions:
If... |
I have several programs (Emacs el-get, oh-my-zsh and Homebrew) that occasionally load source code from github and compile it on my machine. Is this a big security concern? What can I do to prevent malware getting on my machine this way?
|
I routinely get spam messages which state "Your account for [Insert game here] has been flagged. If you don't click this link/send us this info/go to this website in the next 72 hours, your account will be banned." I know that mails like this are pure spam, since the usual action the makers of these games do is ban fir... |
I am working in the development of an application that have to download and parse this CPE file definition: http://static.nvd.nist.gov/feeds/xml/cpe/dictionary/official-cpe-dictionary_v2.3.xml
My problem is the following one.
Into some entry (of the XML file) I found something like this:
<vuln:vulnerable-configuration ... |
We have a Jenkins system that builds and PGP-signs software releases, and we are considering moving the signing component to an isolated VM instead of running it as part of the overall builder infrastructure -- in order to better isolate the private keys from all the other relatively public moving parts.
A few develope... |
I am completely new to SSL/TLS and would appreciate any help you guys could give me.
To give you some background info, our company website is hosted externally by our ISP, however our email is redirected by our ISP to a mail server which is located at our offices.
We use communigate pro.
We have a customer who until re... |
I have found a Username Enumeration Vulnerability through which I am able to determine whether a particular user is registered with that site. While trying to brute force, after 5 attempts it asks for a CAPTCHA code. I have tried several methods to bypass the CAPTCHA but I'm not able to bypass it. So, now the situation... |
Say I have a piece software that allows people to download a trial version that can then be unlocked. Would the following steps below be an effective way to implement a key system for unlocking the software?
User can download trial of the software. In order to purchase they need to go to the website and enter paymen... |
I have email which is stored in Cookie :
%2FGl%F8%7E%06%F1S%FEF%10%E0T%B3%95%82BK%D9%D3%94%BC%AE%E1
which is sth like this after convert it with this tool : http://www.tareeinternet.com/scripts/unescape.html
/Glø~ñSþFàT³BKÙÓ¼®á
Does anybody have an idea what kind of hash it might be? I know email address which is sto... |
I see a lot of posts all over the web asking whether or not they should be using SSL to secure their website, or if it's really necessary to do so when the content of their site does not contain or request sensitive data.
Let's make the assumption here that the cost of the certificate is not the issue, considering it's... |
There is an app on xposed installer called XPrivacy for android that let's you decide what information you want your device to give a specific app and for information you don't want to give it produces and sends fake information and allows the user to continue useing the app without giving up the any information the ap... |
I've tried to verify some vectors from OWASP XSS CheatSheet which exploits style attributes
STYLE tag using background-image
<STYLE>.XSS{background-image:url("javascript:alert('XSS')");}</STYLE><A CLASS=XSS></A>
STYLE tag using background
<STYLE type="text/css">BODY{background:url("javascript:alert('XSS')")}</STYLE>
... |
Actually I have a case where I should able to detect the mobile phones and get some data about the device available in my network range without connecting to the network.
I have seen somewhere that a smart-phone continuously transmits hello packets so that we can detect that device when it comes in our network.
Can a ... |
https://en.wikipedia.org/wiki/Evil_twin_%28wireless_networks%29
My question: it's OK that someone can make an AP with the same MAC and SSID as the original AP. And with stronger signal. But what I don't understand is how can a rogue AP be configured in a way that will accept the password? (the password is for the orig... |
I'm making a new mail protocol (probably already exists, but I've learnt a lot of things about security and privacy on the way).
Here's the summary(much simpler if you know bitcoin's inner workings):
Every user has a list of public and private keys.
Every mail is in a file that every node has a copy of.
users can send... |
I am trying to find an updated book (preferably from 2012-2013) that can cover linux security aspects comprehensively. I searched on Amazon and found that most Linux security books are from back in 2001. The one I thought had practical contents (atleast from its table of contents) was Linux Security By Craig Hunt
Can a... |
We are currently developing a web app that allows users to upload files to act as attachments to information they provide.
Obviously allowing users to upload any file types is very dangerous, therefore we're adding steps to stop certain files.
Primarily exe and zip. But the thought has occurred that a user could simply... |
In GSM networks, it is found that there are so many mobile phone messages (uplink) with the first octet 01000000. For example, the 28-octet message is:
[64,32,238,176,168,33,236,7,11,43,43,43,43,43,43,43,43,43,43,43,43,43,43,236,40,175,214,203]
(each octet is in decimal)
I have no idea what these messages are? It seem... |
Based on:
https://security.stackexchange.com/a/33520/42220
and
https://security.stackexchange.com/a/41630/42220
I can see the benefits of a completely random salt per user.
If I am implementing an application that will only ever be used by one user per database, is there any point in having a randomly generated salt? ... |
I registered for a webpage years ago and have been using it without issues, today I made some changes to my account and they sent me an email containing my username and password in clear text.
I sent the company an email questioning their password handling procedures, but they claimed it was watertight.
My question i... |
If one steals someone's phone, he can easily use the password recovery mechanism to gain access to the person's Gmail account. Even if the victim had a alternative mail for a password recovery, the attacker can remove this mail address once he gains access to the account. Using Google's 2-step authentication will not h... |
I got the question "Explain how one would typically detect systems vulnerable to “NULL Session” " ,but I do not know how to answer this question. Could you help me?
|
Say I have a client and a server. I want the user with the client to login to the server with a username and password combination.
To login, they have to enter the right password which (when hashed) matches the details stored on my server.
Where do I perform the hashing function on the password entered by the user? Sh... |
I have an application where a code scanner has identified CRLF injection possibilities in some classes related to email generation.
I understand how CRLF injection could be used against me on URL-based attacks, but google has been kinda silent on threats coming from email. Are we concerned with injecting different a... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.