instruction stringlengths 24 29.9k |
|---|
We're using AES-CBC and HMAC to encrypt and authenticate our messages (using encrypt-then-authenticate method).
Sometimes I see solutions (like this one) which are deriving encryption and authorization keys from single AES master key:
Kenc = AES(Kmaster, P + "1")
Kauth = AES(Kmaster, P + "2")
Questions
Is it somehow im... |
Following from, What information is leaked from an OpenPGP encrypted file?, which was very helpful, I'd like to ask a similar question regarding symmetric encryption.
For example, in a file encrypted with
gpg -c --cipher-algo AES256 --armor -o file.asc file.txt
Is the passphrase hash (with salt and iterations as spec... |
I am looking for web services that allow clients to authenticate using digital signatures.
Especially with e-commerce and payments, clients generally authenticate using name and password (sometimes using an additional factor). I'm looking for something entirely different: services where the client is authenticated by d... |
Recently, I had my credit/debit card from my bank "stolen." The thieves somehow got my card number and information and took quite a bit of money from my account. Fortunately, I was able to recover it all.
The whole process was stressful and time consuming. My account was frozen so I could not access my money, I had to... |
I have these doubts regarding authentication in SSL/TLS :
Will there be an authentication involved for all SSL connections ? For eg. when I browse the internet, using the most up-to-date browser, can I assume that there is always authentication involved ? From other questions I learnt that they are mostly to avoid a M... |
Gmail was recently changed to require HTTPS for everyone, whether they want to use it or not. While I realize that HTTPS is more secure, what if one doesn't care about security for certain accounts?
Some have criticized Google for being Evil by forcing them into a secure connection even if they don't want to be secure... |
A relative of mine used a favorites link to login to yahoo. The favorite link is
https://de.mg40.mail.yahoo.com/neo/launch?
However, this link uses a fraudulent certificate. Visiting the Yahoo website was now (maybe 2 weeks ago) reported as insecure (you can try above link). However, when redirected from the main yaho... |
Is there a difference between "security management" and "security engineering"? I read about security engineering in some places and security management in others, but I really can't find what the difference is between those.
|
Background: I'm building a .NET application, a very small part of this application allows for users to communicate with a third party application. I am designing this aspect. The third party simply needs the user name and expiry time (will likely be very short), because they have access to check, against our user store... |
Is it possible via brute force to derive a private key from a public key (such as a website's SSL certificate)? If so, how much computing power would you need to make it feasible, compared to say, current supercomputers? I thought it involved factoring prime numbers, or a similar function that's easy to compute forward... |
I'm developing a webserver that performs digital signatures of (xml, pdf and office) documents and then validates those signatures.
My idea is: an user puts its SmartCard and through a PIN, he gets his private key. Then, the private key must be sent to the server, so that the server may sign the document with that key.... |
If a merchant sends an invalid card number to the bank, will the bank have to secure the information to be PCI compliant?
|
[S]ome passwords are gleaned by hacking into computers where intruders
can find stored passwords. Those are stored in encrypted form, but
there's software that can attack the encryption. Nearly all encrypted
passwords are stored with the last character in clear text, warns
NASA, so the last character is a thro... |
I'm about to go online with my first web site, it is a small project hosted on a regular home PC running Windows 7. I want to keep the software footprint at minimum, so it only contains the operating system and the web server with the website files, no antivirus, no SQL, no nothing. And except for the network cable it ... |
I'm trying to figure out if there is a way to be 100% sure that a GPG signature is valid. I'm not entirely sure how it all works, or the correct terminology, so forgive any lack of understanding.
I was trying to understand chain of trust, how can you guarantee that any signature you receive is not modified? Take downl... |
I have a friend who said he has a private exploit for all WordPress ran websites. I asked him to take down my private blog, to see if it is real. He couldn't do it. I tried to get some more information regarding it from him, and I did manage to do so.
He says it does deal with wp-config. I asked if he has to deal with ... |
I recently downloaded fuzzdb from http://code.google.com/p/fuzzdb/ and my antivirus kept on detecting some of the files as Trojans. I need to know if these files are safe?
|
While pointing out a SQL injection flaw on another question, I was able to show that an arbitrary sha1 hash could be inserted into a query such that it would be taken for a real hash, and was therefore able to login assuming the dummy hash was used. I could inject an ORDER BY but then wanted to make sure the hash I was... |
Someone told me that if my device communicates with a server on Internet via VPN connection or HTTPS, all the contents that I have sent can be sniffed and decrypted by the UTM device (or more functional devices) in the LAN which I located at. In other words, administrator of the UTM device can easily get all he wants t... |
It is clear that some big malls are tracking all the wifi-enabled mobile phones before they are connected to the network... How can this be done?
I have a similar issue... how to get the MAC address of a mobile phone when it comes near my network but is not connected to it.
|
Why does the linux XRDP module use a 512 bit RSA key? 512 bit RSA keys are broken by now. How can this be safe?
|
After the Snowden revelations, is there any mass change being carried out to HTTPS protocol?
As far as I understood, any HTTPS communication is still visible to NSA as they can compromise the RSA protocol. Is there any existing alternative of RSA that the government and multinational organizations (where confidentialit... |
Well, I've been thinking about this for a while now.
Within the last decade, we've used various ways to make our websites look dynamic and live. For example, in JavaScript, it's quite easy to send data to a remote server using AJAX, even easier with Websockets.
Example for some malicious AJAX:
xmlHttp = new XMLHttpR... |
Someone gave me a link and asked me to open it, but I don't trust that guy. I'm not sure the link whether safe to open or not. I want to know if there a way to check the safety of the link? I have not clicked it yet.
The link is http://37.46.80.128
I don't have any knowledge about security. However, someone told me peo... |
I am planning to make a web application deployed on a port more secure by detecting the pattern of the request an then comparing it with the patern next time that IP tries to connect.Any ways to move forward.
|
I have a self-hosted WCF application, with a server application running on the server (obviously) and a client application that will be installed on the users PC. Up until this point I have been developing the system on my personal machine and using "development" x.509 certificates and all works fine. I am comfortable ... |
I am concerned about the possibility to download a fake keepass upgrade.
If possible this would allow many ways to get private data on keepass files!
For example, keepass hacked or modified code could send the kbdx file by ftp to a server in China or in Crimea! Or hacked keepass could send the kbdx file attached in e... |
Virtualmin supports a flurry of algorithms for DNSSEC: RSASHA1, RSASHA256, RSAMD5, DSA, DH, HMAC-MD5(???), NSEC3RSASHA1, NSEC3DSA.
If I understand correctly, there's Proof of Concept available for SHA1 being easy to compromise when used with DKIM, because of data length. So that would lead me to believe that the same ... |
Now that Google, Twitter, and some other sites require a TLS connection to access their sites, when you go to http://www.twitter.com it redirects to https://www.twitter.com/. If an attacker had access to your Internet line, could he or she have the connection running over HTTP with a fake version of Twitter?
If a user ... |
I intend to use the least privileged user to do a given task. The issue is that it involve a kind of responsibility chain and translate as a sudo chain in my scripts, spreading the overall task in many places.
Sudoer file
"www-data" ALL = (webadmin) NOPASSWD: /home/webadmin/scripts/git-deploy.sh
"webadmin" AL... |
What is the best method for securing PHP scripts that contain database passwords?
From what I've read, PHP can be revealed when an error occurs and is not caught.
Is there any way to reveal PHP by viewing source code in a browser or saving site files to a computer?
Thanks. Any information on cementing PHP scripts (exc... |
I read quite a bit from Troy Hunt about spoofing WiFi SSIDs and luring devices to connect to them.
When the Pineapple device sees a probe request it will create a WiFi with the probed SSID. The naive device will connect to the network and succeed if it is an open network.
What happens if the network is secured. Say my ... |
Im authenticating with a mysql server with the authentication method listed here.
I observed the salt and hash using wireshark, and I know the password, but I am having trouble reproducing the hash I saw.
My question is about the salt. I observed in wireshark that this salt was only 12 bytes and null terminated. I noti... |
I have a managed switch on my network but I don't remember the subnet.
How can I scan all the private network without changing my ip address : 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16
Thanks for advices
|
I'm experimenting with security, cryptography and web applications. My aim is to create simple login system that is realy secure enough. I'd like to share my approach to keep authenticated session with you to get some comments.
My approach:
When te user signs in (I use BCrypt and password_verify):
session_regenerate_id... |
If you use a passive network tap and a server with an Ethernet port in promiscuous mode to monitor all traffic between WAN port of your router and RJ45 port of your ISP cable modem.
Is the IDS instance running snort and snorby vulnerable to attacks from the Internet? Because it's placed outside the router, which usuall... |
I am working at a company that is PCI compliant, but I believe they have interpreted some of the requirements incorrectly. Because of this, they are laboring to create work-arounds which I suspect are not necessary.
Specifically, I am wondering about the definition of "Transmission", in the context of PCI requirement 4... |
I don't really understand how salting works. I read the Wikipedia article, but I still don't understand how can a system authenticate a salted hash?
Let's say a user chooses a password. It's randomly salted and hashed. Now, when that user wants to login again, his password is hashed again and compared with the salted a... |
There are two clients and a server. Each client generates an RSA key pair and uploads public key to the server. The server associates the public key with the user identifier that is specified during upload.
Then client A needs to share the data with client B. It asks the server for the public key of the client B. The f... |
In an 802.1X protected LAN, the switch port is usually set to "Multiple Hosts" mode and the access point is configured as an 802.1X supplicant which authenticates to the switch and "opens" the port. The access point can now freely bridge wireless clients to the LAN and has the responsibility of authenticating each wire... |
Talking about SSL certificates, there are 3 types.
Basic validation
Business validation
Extended Validation
The first one checks only if a domain name is registered for the user which issues the certificate.
The second one also requires information about the company.
The last one checks the physical location of a ... |
We're currently running a web site using .NET, and I'm using the Elmah package to look at some errors and issues in real time.
I've noticed that there are a number of errors in the log from IP Addresses that seem to be scanning for PHPMyadmin exploits, etc.
While we're not affected by these particular scans, I'd like... |
We've just learnt about firewalls and DMZ and I'm struggling to understand how are these actually implemented ? The architecture we've learned was something like this:
Let's say that we have a shopping website that allows users to register an account in order to make online purchases and also participate in the websit... |
So it's a fairly simple question. When offering an avenue to security researchers for communication with us regarding disclosure of security vulnerabilities, what's the best way to do so?
Assume we have a responsible disclosure policy page that's secured under a properly configured SSL/TLS connection:
Offer a security... |
I'm trying to see the visual difference between Business SSL Validation and Standard Validation but I see no difference (or I cannot find a site which contains a Business SSL certificate)
Is there a way to see what kind of SSL certificate has been issued?
- I know about the green bar for example on HTTPS VeriSign for ... |
I'm still new to information security, but I have read a bit about the one-time pad. The point that sticks out to me the most is that it is supposedly unbreakable. Has this method of encryption ever been incorporated in any internet web applications on a larger scale? How would they pass they key?
|
StartSSL has an intermediate certificate that they use to sign their EV certificates: sub.class4.server.ca.pem. This certificate's issuer is shown by openssl x509 to be /C=IL/O=StartCom Ltd./OU=Secure Digital Certificate Signing/CN=StartCom Certification Authority. This matches the certificate they distribute as thei... |
I need a way to share large, uniquely encrypted files (AES256) that are actually the same file when decrypted, through P2P, to optimize download speeds.
For instance, a centralized server would store the keys for each uniquely encrypted file (keys are assigned to user accounts). When a user downloads the uniquely encr... |
As my knowledge about information security is not THAT good and Google did not give me a satisfactory answer I would like to ask the community here:
I am working for a company offering online services (as an ASP) where high-value target information of customers is stored (e.g. confidential documents of different compan... |
So people always talk about how if you use http over a shared wifi hotspot, people will be able to see your unencrypted data, but I have never been able to make the direct connection from a network security standpoint. I would like to know how to intercept such data and how to view it in a form that is usable. If I con... |
This might well be a silly question, but at the moment I've not thought of a reason it doesn't work.
As I think is generally known, you should never re-use a one-time pad. But compression allows you to transmit something larger than the number of bytes used in transmission...
I'm not intending to / have no reason to d... |
My understanding is that SSL certificates are expensive because you are paying a 3rd party to vouch for your identity, and apparently the most secure form of trust is the trust you have to pay for. I'm guessing the trust you're getting is a way to show you're not a phishing website or something (even though I've seen v... |
It appears that there is an exploit out there that allegedly allows you to bypass the UAC on Windows 7 computers and gain administrator access. I was wondering if this exploit is still a dangerous vulnerability on the average Windows 7 box or if it is already widely patched. I haven't looked too closely at the exploit,... |
I'm running Ubuntu 8.04 TLS linux 2.6.24-23, I find that CVE-2009-2692 which exploits by using sock_sendpage() null pointer dereference. It describes this exploit affects linux version prior to 2.6.31 and I find patched version of Ubuntu 8.04 is linux 2.6.24-24. I attempted to run this exploit on my machine, but I coul... |
I've recently had some success and traffic increase with an online business I own and due to that someone has hacked my domain email and twitter accounts. My bank password is the same and I just changed everything to some really random difficult 16 character pass (looks like a bitcoin address honestly). But the problem... |
There is ongoing and quite promising research with prototypes presented about using physically unclonable functions (PUFs) in authentication. If they are practically unclonable, how is a PUF-based device authenticated?
|
I want to pentest a specific web application with automatic tool like Burp Suite and IBM Security AppScan. However, the website uses a prevention mechanism for attack. When I started automatic tool, it blacklisted my IP address.
In my opinion, I can change my IP address periodically but this method takes long time.
Is ... |
I have been wondering how to stop intrusion/hack in a website build in cakephp.
The neccessities that I have done so far are
updated framework
strong password
frequent password change
removed default username from root to user from config.php file in cakephp
file permission to /app/config changed to 755 from 777
ro... |
Maybe this question sounds obvious, but I wonder how dangerous might be publishing a public key for an asymmetric encryption system?
I know public keys are meant for encrypting messages by anyone who's meant to do so, that's why we can even download a public cert of the most common CAs from web browsers.
But is it secu... |
Question is clear from title, is there a way to track user even if he is using a proxy. The point is, am i secure enough to surf internet with proxy to hide myself?
|
Generating Diffie Hellman parameters in OpenSSL can be done as follows:
$ openssl dhparam -out dh2048.pem 2048
Generating DH parameters, 2048 bit long safe prime, generator 2
This is going to take a long time
[...]
The "generator 2" caught my attention there. It appears I can choose between generator 2 and 5 as indic... |
I'm currently using GPG RSA keys to encrypt binary files. Many people recommend using symmetric keys to encrypt large files, and then encrypt the symmetric key with a public key.
At what file size should I switch from RSA to something like AES? Is it arbitrary? Are there any security concerns with using GPG/RSA on mass... |
Here is a scheme for deanonymizing a user that I've been thinking about, just out of curiosity. I tried searching for it but didn't find much. Does this technique have a name? Are there any papers or articles on this? And is it known to be in use?
So a user posts a lot of information, on Twitter or on a Blog, etc.. He/... |
I am using Facebook login in a mobile native app, and I'm trying to figure out if my approach is secure enough.
This is the flow (all communication is made over SSL):
User logins to Facebook through the mobile app.
The app passes the user's Facebook short term access key to the server.
The server uses the key and make... |
Some of the leaks which emerged during/after Snowden concerned the fact that the NSA was paying the organization behind RSA a lot of money in order for them to systematically weaken the encryption by default.
Since both SSL and SSH typically use public/private RSA keypairs for their encryption, is this encryption now c... |
We are looking to implement Attribute-Based Access Control. While we are sold on the philosophy, there are two topics that seem to crop up:
Will it lead to significant performance issues? Especially if we seek fine-grained access. I guess I am looking for some structured guidance to strike the right balance.
Are avail... |
How can you tell which hashing algorithm is being used on a system? We are using 2048 bit encryption and wondering how to tell if hashing algorithm SHA-1 with SHA-2 is being used.
|
What are some encryption algorithms that are currently in use by secure websites, by operating systems, or by Secure USB thumb drive manufacturers. I am trying to do research on differences in speed on algorithms that are currently used. I know security is a debatable factor, but I am not concerned with that. I just wa... |
I understand that a block cipher can be made to act like a stream cipher at the cost of "losing versatility" of the block cipher for the sake of performance. I don't understand what I'd be losing.
For example, AES GCM mode is a block cipher that acts as a stream cipher, however I get
Integrity (the message can't be m... |
In SSL, the client generates a pre-master key from random data from itself and also the server. It then encrypts this with the server's public key, sends it to the server and then both client and server generate a master key from this.
Why not have the client generate the master key and send that to the server?
My init... |
Let's assume the same message is encrypted many times, each time with a different IV but the same key. Do we reach a point where just knowing what that message is gives us a plausible attack by which we can discover the key?
The closest thing I see to this is a side channel attack mentioned on the Wikipedia page requi... |
This question is a bit broad, but I'm hoping someone can point me in the right direction. I administer a small LAN at work with 15-20 machines on it. They are running Windows XP - Windows 8 and I have a Linux based NAS for backups attached as well.
In the past, every user was highly trusted and my main concern was maki... |
I'm mainly server sided. I haven't worked with JS that much before.
My coworker was talking about BeeF and how it basically controls the victims browser just by a simple xss attack.
I was wondering how it's possible. Javascript only executed when the user is on that page correct? So when the user leaves that page, how ... |
In the past recent years of mine, I have been doing a lot of DLL injection with a few indie games and MMORPGs. I fully understand how to do it, and how it works for allowing these games to work not as the developer's intend them to.
If I am able to compromise these games so easily and fast, what keeps me from doing it ... |
Let's say Alice, Bob, and Mallory all live together in a house.
Mallory decides to go on vacation, but before leaving, she decides to play a game with Bob and Alice. She makes two claims:
She has installed hidden cameras inside the house.
She has remote access to the cameras.
Mallory challenges Bob and Alice to find ... |
I'm not entirely sure if this is the right place to ask this, and I'm also slightly fuzzy on how the p2p system works, so correct me if I'm wrong.
I've been looking into the practical implications of decentralized P2P networks, and there's a few issues I've noticed, generally relating to the security side of things. Fi... |
I have seen advice that I need to close all unused ports, and disable any unused services in order to secure my servers. How can I prove, beyond any doubt, to my client that I have done this?
I need to accomplish this in a realistic amount of time, using realistic resources, so please also let me know if there is no s... |
While I was away from my home I needed to do some work on a java program so I booted a friends netbook(windows 8) I had with me and finished most of the works I needed to do there. Tho when I returned home I realized that the netbook didn't have antivirus, firewall and nothing security wise turned on which made me worr... |
I looked at my logs from amazon ec2 instance and found the following lines:
94.177.121.102 - - [29/Mar/2014:08:50:52 +0000] "XGET /web-console/ServerInfo.jsp HTTP/1.0" 501 418 "-" "-"
94.177.121.102 - - [29/Mar/2014:08:50:52 +0000] "XGET /jmx-console/HtmlAdaptor HTTP/1.0" 501 415 "-" "-"
I looked at http status codes ... |
In order to be HDCP compliant, a source can only output HDCP-encrypted digital HD content.
However, is the opposite true for HDCP sinks? In order to be HDCP compliant, should a sink only accept to reproduce digital HD content when it's HDCP-encrypted?
|
No idea if this is right place to ask.
In my country, by law, all ISPs are required to block certain websites. People can not access such sites. But, through proxy websites every one can access blocked websites. I guess the flow is My PC ---> My ISP ---> Proxy ---> Website and then it returns back the same path.
If al... |
# aircrack-ng output-01.cap
Opening output-01.cap
Read 31484 packets.
# BSSID ESSID Encryption
1 00:11:22:33:44:55 SSIDHERE WPA (0 handshake)
Choosing first network as target.
Opening output-01.cap
Please specify a dictionary (option -w).
Quitting aircr... |
I've recently purchased an SSL certificate, and it says that it's limited to three servers. Surely if I have the key and certificate on multiple servers (more than 3), the SSL will still be valid? Can someone clarify why/how vendors can limit this? An example of one is 123-reg's 123-SSL (which is a resell of AlphaSSL).... |
So you can use msfpayload or msfvenom to add a payload to an existing exe, most people online seem to use reverse shell. But I was wondering if you could include a custom exe of your own design as a payload. For example, I have "evil_notepad.exe" that I want to add a payload "showanalert.exe". When opened, "showanalert... |
Suppose a site allows connection to be established with HTTP or HTTPS .If you establish a connection to http://www.example.com or https://www.example.com then all further link's on the page displayed will have HTTP or HTTPS correspondingly. I understand that an attacker can degrade your HTTPS connection to HTTP using M... |
I have a server in my computer for testing purposes, accessible from the outside.
I was reviewing the access.log file, and I saw
89.187.33.50 - - [29/Mar/2014:03:39:01 +0100] "HEAD / HTTP/1.0" 200 -
89.187.33.50 - - [29/Mar/2014:03:39:02 +0100] "POST /cgi-bin/php?%2D%64+%61%6C%6C%6F%77%5F%75%72%6C%5F%69%6E%63%6C%75%64%... |
Say I'm making a snapchat clone app for Android and iOS. Let's say that I get a snapchat from Baz. I want to pre-download the audio for this snapchat. However, as the developer, I want to secure this audio from being viewable outside of the app.
I've been thinking of encrypting it using AES with an IV and key that are ... |
I'm trying to wrap my head around the Application Data record that carries secured traffic. I understand TLS/SSL is a "authenticate-then-encrypt" protocol, which means an HMAC is calculated over the Plain text, and the resulting digest is appended to the message. Finally, the whole packet is encrypted using the negot... |
When it comes to blackbox pentesting of a Wordpress site, the first thing to come to mind is WPScan [http://wpscan.org/].
While pentesting some sites, I faced a common issue i.e it shows that Wordpress SEO 1.14.15 is vulnerable to Cross Site Scripting Attack. Output is given below:
| * Title: WordPress SEO 1.14.15 - i... |
On a typical desktop (with no listening services such as Apache, SSH, ...) it seems to me, the browser is the most exposed application and a potential security compromise (and even more so with Java and Flash plugins. And judging from the constant security updates, this seems to be correct.
I am therefore wondering whe... |
I received a message from google saying they had prevented a hacking attempt. However I then received messages from friends saying that they had received spam from my gmail account. If you go to the security tab of gmail it lists
"Application/device sign-in attempt (prevented) London (UK)"
The email from Google also... |
I have some Truecrypt volumes stored on my USB drive and I would like to know if they are safe from being cracked by the FBI or any government agencies? Some people say Full Disk Encryption will prevent the FBI from snooping through your files but I would like to know if Truecrypt volumes are just as safe and can provi... |
For how long ISPs keep record of Internet usage?
Do they keep record of every page we visit?
In what form do they keep such records (remote IP, URL, page title, headers, etc.)?
Is it possible for an employee working at ISP to monitor an individual customer's Internet usage?
|
I'm looking for an online training lab for pentesting/hacking and security.
I've found one at hacking-lab but it's seems troublesome to work with and it has some issues on VPN server authentication.
Someone knows about something similar?
Or something like Hackademic RTB1 and RTB2?
I wish for more resources to learn wi... |
I was just wondering about the implications of Sky's new revelation of a so-called 'shield'. Is this actually even a security feature or just an advertisement stunt for Captain America? I can find very little information on this (maybe I am looking in the wrong place) but it seems this is just a URL filter that all ISP... |
I am working on web application security auditing.
I was going through various checklists & methodology.
I found one interesting stuff in a document.
Type - Configuration Management
Security Testing - After logout, I created a dump file of my chrome browser and opened it in winhex editor. Used search feature of that to... |
I typed in my IP into my address bar and my router admin page came up. Is this safe? How can I disable it? It's Linksys Smart Wifi
|
I want to develop two Android apps that will communicate via intents (on the same device).
When the two apps transfer confidential data, should they encrypt it?
Or does the Android OS guarantee (or at least try to guarantee) that intent data is not seen by anyone but sender and recipient?
Of course, let's suppose the u... |
What is "period" in the context of pseudo-random number generators? For example when someone says "The Mersenne Twister has a 2^19337−1 period" what does it mean? I would appreciate a simple as possible explanation as possible.
What exactly is meant by "state" of a PRNG? On wikipedia I found "The sequence is not truly ... |
Also, the name of the actual virtualhost is going through unencrypted or not?
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.