instruction stringlengths 24 29.9k |
|---|
As far as I know this only DOESN'T work with iPhone 4S and iPad2 / iPad 3, because of the fixed Boot Rom. So, is it no longer possible to brute-force the passcode lock? Can anybody confirm this with some sources? Or does this tool do a jailbreak and make a disk image to extract the data?
Product:
http://www.msab.com/xr... |
I was reading through different posts here about email security. After reading these I still have some questions.
I understand that S/MIME can be used to transfer email securely between servers.
Is S/MIME used by Gmail, Yahoo, or Hotmail when I send e-mail from one of their accounts?
Or is SSL/TLS the sole mechanism ... |
In have a web form on my website, and someone keeps sending annoying spam through it. I know Captcha can block this, but why do people spam my site - what's their benefit?
How do they access my web form? Is there any script?
And how can I identify who I'm up against?
|
PrivateSky is a website that promises encrypted "cloud-like" secure information exchange. They promise that except the sender and receiver, nobody can see your data. After testing it yesterday, I do not understand how this is possible.
Let me explain you step by step what I did. Assume I have two email addresses A and ... |
I need to demonstrate that security through obscurity fails twice in the following scenario.
I've a secret KEY.
User A gets MessageX = SecretTransformation(KEY, SecretValue1);
User B gets MessageY = SecretTransformation(KEY, SecretValue2);
SecretTransformation() is not a standard cryptographic function.
Now, Security ... |
With the recent news that microsoft are releasing the source code for their ASP.NET Web API and web pages 1 I'm wondering,
Does having access to the source code of the underlying libraries a web applicaiton is built upon give a hacker an advantage, i.e. is it less secure than if the hacker didn't have the source?
I'm g... |
I am the Compliance Officer for a laboratory. Is it permissible to send an unencrypted email with a patient accession number? It does not include patient name, DOB, SS# or address. It is just an associated, unique number related to a test.
|
Can someone add context to the subject issue? At first glance it appears to me this issue represents a fundamental shortfall in the forces encouraging secure coding in open source development. Is that the case and/or is this example common or a rare outlier?
I note that CVE-2007-6752 released on 28 March 2012 listed ... |
Which is more secure:
use one container encrypted with AES > Twofish > Serpent = 768bits key size
make an AES container, and inside it make another Twofish container then inside it make a third Serpent container
Which is more secure and which is faster, or are the two ways the same fast 30Megabits/sec?
The goal is ... |
What does it mean that "the permission system does not include checks for transitive privilege usage" (quote from a paper on Privilege Escalation Attacks on Android).
Android grants app privileges during installation, but (as above) there's no some kind of checks. What is it about?
|
I've been wondering about recursed encryption. The idea I'm trying to convey here is an encryption scheme where a message is encypted, then somehow encrypted again, and again, etc.
The encryption method may allow other means of security, like take a message, encypt it, shuffle it, zip it, and repeat this process.
I'm ... |
From several security books and sites I understand that IP-based security (with which I mean: user is verified only by IP address) is a bad idea. One of the reasons is obvious, multiple actual users can use the same IP address.
Our idea is not new: we want a one-time validation and from that moment on allow any comput... |
The graphs for one server that I am using are showing consistent 7.5 kb/s outgoing network traffic that started a few days ago.
How can I monitor/log/capture/analize this traffic to see what is it,
where is it coming from and where does it go to?
The server is a linode (hosted at linode.com) running linux debian lenny... |
I was thinking about generating passwords with combination of English, Arabic, Chinese charac. Is this pass secure enough against brute force attacks?
|
I used Netsparker community edition and tried to find a vulnerability in my personal site. Then I thought let's try with Facebook. It didn't show a single webpage also because normally it shows links inside the website, whole site structure but here it didn't.
Why? What is the reason?
|
My router, an up-to-date ADSL Fritz!Box 7340 router with a fixed leased IP address, has been configured to block all incoming traffic.
Assuming, for the sake of argument, no extra security is applied to the home network and the machines are unattended and wireless is disabled, how secure is this "block all" configurat... |
In software engineering, a design pattern is a general reusable solution to a commonly occurring problem within a given context in software design. Wikipedia lists many different design patterns for example, but security is never mentioned.
Open SAMM includes the following question in the audit checklist for Secure Arc... |
Where can I get info with a view to classify malware based on actions performed by the them. Eg. modifying registry files, copying themselves into other executable's etc.
|
When you install a RDBMS (say, PostgreSQL) and create a database, without taking any additional steps, what can you assume about the security/confidentiality of the data? I mean, is it encrypted by default, so even a person with physical access to the machine (or root password to the OS) would have trouble accessing it... |
I'm tasked with decrypting ciphertext acquired from an encrypted card reader. The card reader utilizes DUKPT(derived unique key per transaction) scheme and 3DES encryption. I don't have a problem with the 3DES encryption as it is a common algorithm implemented by well known libraries like BouncyCastle and Java JCE.
Pri... |
Some time ago I bought something online from a reputable website. I paid through my credit card and everything worked fine. The thing which is important to note is that the name used on the credit card is different from the name I use everywhere else on the internet. Now I am getting spam emails with the name on my cre... |
I need to save session data for a dynamic web page script by writing to file. I have two questions:
Are there any security preferences as to whether to save the data UNDER the web folder, or OUTSIDE the web folder?
I attempted to write to the folder an (unsuprisingly), I had a 'file permission refused' type error. Sho... |
I have an EXE file on Windows that I have to distribute around. It's based on tclkit so an adversary could unpack it, change some tcl script inside and repack the exe.
I would like to know if this ever happen, so that if anyone complains about what they received I can check if the file is really the one I sent or if an... |
If one has been using the same set of public-private key pair for quite sometime now, given his public key(which is public), can't an attacker find the corresponding private key for that public key by bruteforce?
If not bruteforce then what else methods are there to break the rsa encryption?
|
Is it possible for other application running in the OS to read the keystrokes that my application uses?
What about mouse events and window handles?
Is there any security wall that the OS uses to shield my application from other potential
dangerous applications that have might infiltrated into the machine?
Is there an... |
What I would consider to be hacking one of these services is something along the lines of cracking databases (or I think what would be databases). In reality, I have no idea how sites like these store passwords. From what I read a little bit ago, sites such as these with massive databases don't story every thing in one... |
We are looking to move to iframes due to technical challenges. By moving to iframes it will be easier to manage the technical issues. But we are not totally sure of security implications of iframes.
Our website is rendered through SSL and the user may need to click on the links also on SSL from our site.
Is it possi... |
I have seen them plenty of times, with many different types of software, but the one thing I have always wondered, is how software keygens know what key to generate. I know the basic principle of it: the keygen looks somewhere in the software installation files and creates a key that matches some encrypted file which a... |
My connection.php file stores the credentials to connect to the database:
<?php
$objConnect = mysql_connect("localhost","username","password");
mysql_select_db("selectDB", $objConnect);
?>
When a page need to connect the database I just use <?php include("connection.php"); ?>.
Is this safe? Can hackers ste... |
I've seen packets originating from RFC1918 addresses from two fairly large european ISP's (ASN1257 & smaller ASN35706) coming in on eBGP transit links lately, and I'm a bit puzzled why it wouldn't be dropped by an ACL first entrance in my ISP's network (or really, entrance in ANY ISP's network).
While I recognize that ... |
I was browsing a website, and stumbled across a sample scheme for password-protecting web pages. The owner of the website specifically had a page that invited people to attempt to hack it.
I wanted to give it a try, so I wrote up a quick python script a few hours ago to try brute-forcing the password. (Which, in retr... |
The problem:
I have an open-source client (a Firefox add-on written in JavaScript) and a server containing somewhat sensible user information: username and user history (all from YouTube). The client is able to add new entries to history and to query full history (by telling his username). The communication is on HTTP ... |
this is for our thesis project. we proposed to study the Wi-Fi security in most related to the users.
|
I confused with the three terms:
Packet drop.
Packet loss.
Packet drop attack.
|
I know of Nessus (which is $1300 for a pro feed) and OpenVAS (which I don't like).
I use Linux so do I have any other options for vulnerability detection?
|
I was reading another question which mentions a site that had a page inviting people to try to hack it, and it made me wonder.
Lets assume, for the sake of this rather hypothetical question, that a site has a page asking people to hack it, and that the page did not specify which kind of hacking was or wasn't acceptable... |
Military and intelligence organizations have spent a lot of resources guarding against the possibility of hardware trojans, unauthorized modifications to hardware circuits that leak information or impair device functionality. However, I'm not aware of a single confirmed case appearing in the wild.
I've found one refere... |
Our network is currently isolated from the outside by a Linux box, running iptables and Squid to control web access.
By default we deny all outgoing traffic from all IP's, to force Web traffic through the proxy, and deny the rest. However, we need to allow FTP for some users but not all.
The previous admin used to manu... |
It is a question I have had for some time which I have never received a solid answer on. It seems most infosec teams prefer to disable clipboard functionality on Citrix and other RDP setups. What is the real threat here and does the threat actually out weigh the huge inconvenience of not being able to copy/paste text... |
The process of installing Microsofts pseudo VPN called Direct Access requires me to remove the ISATAP name from the default global block list by running this command:
dnscmd /config /globalqueryblocklist wpad
What are the implications of running this command and what are the benefits of leaving ISATAP blocked?
|
I can access each page of a site through the browser (firefox). I can also see the ip and port address in firebug, but when I open cmd->ping site ->it says "request timeout".
I also tried traceroute. The trace was something like this
1. my router
2. some local-server
3. server out of state
4. * * * request timeout
... |
There's a couple other questions already addressing legalities, ethics, and liabilities of hacking websites with open invitations.
What are legal/ethical concerns to bear in mind, when hacking websites with open invitations?
I think I accidentally DoS'd a website. What should I do?
These got me to thinking: How good o... |
I'm testing a feature to support S/MIME mail signing and encryption. As far as I know US DOD has quite strict standard on these certificates. So that DoD uses separate authentication, signing, and encryption keys. Also email address is placed not to "e-mail" field but somewhere else. Can anyone provide an example of ho... |
As some kind of a follow-up from my previous question - which was asked from the security researcher/penetration tester point of view:
(Thanks to Rory McCune for pointing this out) There seem to be a number of high profile sites like facebook and google who appear to openly allow security researchers to try to hack the... |
Today I've tried to start the Visual Studio Developer IIS as usual on Port 80, but this time it has quit with an error that port 80 is already in use. With netstat I've found out, that an application C:/Windows/System32/ntoskrnl.exe is using port 80. My OS is Windows 7 Prof. SP 1.
Has anyone an idea why this applicatio... |
Recently I have thought more and more about how to make my Internet traffic anonymous. Not for illegal reasons, but just to stop leaving information about me. The methods I know of to anonymize my browsing are services like proxies and VPNs.
I have thought about going the VPN way with services like CyberGhost VPN or vp... |
I am to implement a system where android devices connect to a central server and have to register with different user accounts, so I have decided to create a pairing dance similar to what can be observed in bluetooth pairing, or software like the apple remote pairing with the itunes library. I'm searching information o... |
I'm currently working on a project that needs be as secure as possible key-management. My experience with encryption, decryption and key-management are none whatsoever so i did some research on the subject at hand, but im still not sure what i have thought have is safe therefore my questions:
Project
The project in sho... |
I have a linux box on my network which, according to Nmap, contains two services called telepathstart and telepathattack listening on ports 5010 and 5011.
From the same box, I am receiving inbound requests to my computer on port 113, which my firewall is blocking.
This page lists both of these services listening on the... |
Having read through the core specification for SAML 2.0 section 2.5.1.4 (page 23) I still cannot fully understand the purpose of the AudienceRestriction tag and what problem it is attempting to rectify.
My, probably incorrect, interpretation of the AudienceRestriction tag is that it facilitates a sort of intention stat... |
I'm highly uncomfortable with the recent news surrounding government snooping in the UK.
If we define a typical user to mean somebody who:
Browses web sites such as BBC News and Stack Overflow
Uses "web applications" like Twitter and Facebook
Sends and receives email using something like Gmail or Hotmail
(more advance... |
I'm a developer, not a security guru. My primary focus is ensuring that I'm not introducing security holes through bad programming. I understand how to code to protect against the OWASP Top 10, as well as other vulnerabilities, but I know enough to know that I don't know enough. I'd like to add some additional test... |
In the Programs tab of Windows' RDP application, there is a Start the following program on connection option.
Does On Connection literally mean on connection? As in will the program I specify be started after I connect and before I login, or does On Connection really mean On Login?
Thanks
|
In the desciption of the vulnerability:
Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c
in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute
arbitrary code via a long pathname for a UNIX socket.
I can see how this might be a local issue, but how could an a... |
I know a membership website which is getting quite popular among people day by day. Now I see people are making more than one accounts by using proxies. They should allow multiple accounts from the same person(As they have no Terms of Service against it.) and it should be ethical to create as much accounts a person wan... |
After running a few tests from Qualsys' SSL Labs tool, I saw that there were quite significant rating differences between a GoDaddy and VeriSign certificate that I have tested against.
Are all SSL certificates from different providers equal? If not, what should one base their decision on? Currently I believe that most ... |
Many countries have data protection legislation:
Data Protection Directive in EU
Data Protection Act 1998 in UK
privacy laws in USA
Web application may have registration form where fields for name, surname, email address, address, phone number exist. What actions should be done by site if it stores such personal info... |
I have read so many stories that a major DDoS attack is causing companies thousands of dollars to mitigate. I have two questions:
Is this because they try to keep the servers accessible to real site visitors while an attack is going on?
Does shutting the server down instead of trying to keep it up still cause loss of ... |
Is it illegal to post tutorials and articles on hacking related things? In particular in the UK.
For example would it be illegal under this law?
http://www.legislation.gov.uk/ukpga/1990/18/section/3A
|
At this link there is a claim that if an RSA key has a strong passphrase security might be broken in a few hours if an attacker has the private key.
Is there something weak about the security of RSA keys that makes this possible? It would seem that strong passwords cannot be broken within a few hours so why is it that... |
I have two different Facebook accounts with two different passwords and two distinct online personalities, one as myself and one as someone else. Since the last one week, to my horror, both accounts were fused as one. Has this happened to anyone else? How does Facebook decide to merge accounts?
Edit: I wanted to clarif... |
I am currently working on some POST GATHER modules for the Metasploit Framework the idea is that after a shell is spawned on the target, it will gather certain files from the target such as chat logs.
I am confused to whether this is illegal or not as there are hundreds of modules like this, however there is no ethica... |
A script is currently being run against my exchange server attempting to access resources on port 25 SMTP. This is generating event 4776 within Windows event logs. How can I stop this? Would I need to block this at the firewall or at the exchange server? Do I block incoming or outgoing on port 25 (I don't want users to... |
AppHarbor has a blog post containing sample C# code which reads data from an unsigned cookie and passes it through .Net binary serialization.
Is that safe?
Obviously, the data is completely tamperable.
However, are there any risks in passing attacker-controlled input to the deserializer?
Could that result in code execu... |
While in Germany, I want to keep using my Netflix account, watch PBS, CNBC. I have found following services:
A VPN: https://hidemyass.com/vpn/promo/1/5/
A DNS: http://www.unotelly.com/unodns/
I an concenred about someone stealing my data trough a man-in-the-middle attack. Should I use any of these services?
I know that... |
Security Researchers: How do you choose what services or software you are going to audit next?
I am referring to finding vulnerabilities and developing exploits in various applications. I am wandering how decide what software you will target next?
|
I have a specific environment in which TCP is not optimal due to its general assumptions, and thus needs to be improved. This small improvement has been done successfully. It operates at various layers, from 2 to 4, and needs read/write access to some information displayed in the TCP packets, such as the congestion win... |
Does larger hash size improve the security? Is it overkill to use a 512-bit hash?
If I stored only 256 bits of the PBKDF2-SHA512 derived key, is it less, equal or safer than 256 bits of PBKDF2-SHA256?
Is the hash size only used to avoid hash collision, or does it improve security?
Is it secure if I only stored part of ... |
I love my VPN, it gives me to a certain extent privacy from isp & to what I connect.
I also use P2P to get & provide data, but I would like to create a level of privacy. What methods exist for P2P anonymity and privacy?
|
There are three ways to access your GMail account on iPhone or iPad devices:
1. Use safari browser
2. Use Apple's default mail app
3. Use Google's Gmail app
What is the safest way to access gmail account? How about stored (downloaded) emails in case of app usage? Is there anything user can do in order to increase emai... |
My network recently the last week as become abnormally slow around 11 pm. Very slow buffering youtube videos during all hours. Ive recently purchased the new router about two months ago but not until the other day has it become very slow. I have 1 port open to allow myself connection to a server but I believe i have... |
I want to assure the compliance of password policy in my office.
Environment Intro
My environment is all windows based (server 2003/2008) user base is not more than 400 employees. Nearly 90% of all users have windows XP O/S installed on their machines. The other 10% is divided between Vista and Windows 7. The maximum ... |
I am considering encrypting my database and/or encrypting only certain columns in a few tables. Is it worth the time? I mean, how much of a burden would it be on someone if they were to get a hold of my encrypted database? Has anyone even found a way to break this?
|
I am running firefox 11 on ubuntu 10.04 and every time I close the program it continues to run in the background. What worries me even more is that the flash plugin is also running in the background:
ps aux | grep firefox
userxx 99999 11.4 10.3 689152 105696 ? Ssl 22:33 0:30 /usr/lib/firefox-11.0/firefox
u... |
So I plan on updating some data via an ASMX web service on a web server via .NET programs running elsewhere. The primary security concern is that this web service needs to spawn a process to handle the data. I'm utilizing the built in windows authentication system and restricting access to a local web server's window... |
Possible Duplicate:
What “hacking” competitions/challenges exist?
I want to test my penetration test skills.And i solved a few CTF.But it is not enough.I want to solve more ctf test.
Please advice me.
|
As a hobby, I find security holes ranging from XSS to SQLi to LFI etc in random websites I find. (I don't exploit them). I've decided to to do a little more; I want to create a volunteer group composed of hackers who will find holes and report them to the website.
I'm finding two "issues":
Although I don't exploit th... |
If the encryption algorithm broken or analysed, can the attacker know what my password was?
|
I'm implementing the AES block cipher, which reads/writes data in 16 byte blocks. The implementation I'm working with usually read data in the little endian format. But in my platform the endianness I'm using is "network order" big endian. Can I use BE for the encryption algorithm? Does the endianness usually change th... |
I am currently building security into a website. So far, I have the following rules, and am wondering if this seems sufficient.
5 failed login attempts for a particular username will cause that account to be locked for 1 hour
The number of failed login attempts by IP address will be stored in the server cache. If an I... |
Years ago, when I was a student, a network security professor taught me in a class what a DMZ is. The architecture he used in his slides was similar to this one:
Now that I got employed, my boss, a security engineer with 10+ years of experience has a different point of view. For him, a DMZ should not be placed in a "s... |
The Hail Mary Cloud was a botnet that slowly and intelligently attempted to bruteforce SSH logins. Why was it dubbed the Hail Mary Cloud though?
|
If I'm feeling paranoid about the CCDP (UK) - requiring ISPs to intercept communications across the internet - then what would be the most secure approach to a webmail system?
Obviously, there's some legal/political stuff (can I rely on the people running it, can I rely on the legal jurisdiction that it's located in, e... |
I have a web server hosting Joomla 1.5. I discovered that the Joomla configuration file configuration.php was modified by a hacker. How could he do so?
Note that the file has 777 permission. Also, when I try to directly browse the file www.mysite.com/configuration.php I get an empty page as a response.
|
Can anyone suggest good resources to learn about vulnerabilities in and attacks on web sites, in a hands-on way, for someone with limited programming experience?
|
To preface this, I'd just like to let you know that I'd consider myself an intermediate security guy(Definitely not a novice, not yet an expert) I do have a story to tell, and would like to know if you guys have any ideas as of what happened.
1. The call
My friend received a call today(From his supposed credit card com... |
Reading an answer to another question ("Is there a method of generating site-specific passwords which can be executed in my own head?") I came across this link, describing a way to use a physical token (a tabula recta with randomly generated characters) to derive different passwords for different sites (choose a cell u... |
I have an SSL Server and it can be connected by two types of Clients, one for which Client Authentication is needed and the other for which Client Authentication is not needed.
Is there any mechanism in the SSL Handshake using which I can distinguish between both the clients and decide for which I need to send the cert... |
If I use short password like ' myvolume ' and use a key file with it says
WARNING: Short passwords are easy to crack using brute force
techniques! We recommend choosing a password consisting of more than
20 characters. Are you sure you want to use a short password?
What I know is if I use keyfile truecrypt use fu... |
We are in the process of creating a web service and have been investigating ways of securing it. In reality, the service is likely to get very little traffic and the data is likely to be of little use to anyone. However, we will need to authenticate users and do what we can to ensure the integrity of the data passed to... |
What professional standards and practices are recommended for guiding such an effort?
|
If i use a single word to form a password by repeating it like the examples below:
securesecuresecuresecuresecuresecure
SeCuReSeCuReSeCuReSeCuReSeCuReSeCuReSeCuRe
$eCuRe$eCuRe$eCuRe$eCuRe$eCuRe$eCuRe$eCuRe
Would a similar pattern (repeated symbols) appear in the encrypted format of the password (NTLM, MD5, etc)?
|
I intend to build a front end site entirely in javascript (NodeJS) and i would like to do ajax calls to a REST WS which is on another domain on client side.
I intend to use oauth2 and SSL to secure my REST back end, perform the access token asking on front end server side, but as i want to be able to do ajax calls, i h... |
Most of the banks use a 128-bit or 256-bit encryption. What does this mean? Does it mean that the keys used in SSL are 128-bit long or what?
If they are the SSL key lengths then 128 bit RSA keys are easy to decrypt. The rsa site itself recommends keys having length of 1024 bits or more.
|
I am thinking about launching wide nessus scans (in the "IP range" sense) against exploits present in metasploit. The idea is to limit the number of plugins so that that the scan finishes in a reasonable time. (As a side note nessus 5.0 comes with a set of filters which allow to chose for instance "critical" vulnerabil... |
For group membership I am using LDAP for performing the consumer matching. I can pretty clearly see how to do simple matches with ORs or ANDs, but I would like to match in a more complicated fashion. For example, while this is obvious
memberOf cn=PGPUsers,ou=Groups,dc=site,dc=com
AND
memberOf cn=Dept1,ou=Groups,dc=... |
if I am looking for a virus/spyware under linux, where should I have to look for to find it ?
I suspect to be the target of very skilled hackers.
5 or 6 years ago I found a spyware on my linux box, it was lkm masked as ppp_deflate module with md5 hash hijacked. I mean with the same md5 hash of the original ppp_deflate.... |
I know the title is just baiting the "your setup is insecure", but allow me to explain.
I'm working on an application which aims to allow clients to rsync over SSH to our server. We need a web application from which we can create/rotate SSH keys for our users. This application will return a private SSH key to the user ... |
In a world where most people used passphrases instead of passwords, wouldn't an attack that generates a random string of words (alternating between word delimiters) be similarly effective to a brute force attack? Of course, there are many more possible words than possible characters, but I suspect in practice the range... |
What are the security risks of scanning a QR code from an untrusted source?
If the QR code was constructed by an attacker, what can the attacker do to me? Do widely used QR scanners have any known vulnerabilities? What information can be stored in a QR code, how is it handled by QR scanners, and how could this be use... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.