instruction stringlengths 24 29.9k |
|---|
If its 14 then it splits it to 7&7, but how about 13 characters? 7&6?
How does it work?
|
I have a scenario in which I have two computers with static IP addresses running under common proxy. And let's say computer A is blocked from accessing certain site, let's say Facebook and another computer B is not blocked.
Is there any mechanism I which allows to access facebook from computer A? If we can do something... |
Let us say that we have a computer with a fully encrypted disk. If it gets infected with malware, does this make it more difficult to use a LiveCD or other rescue option to clean it or restore it? It seems to me that one would have to decrypt the volume before cleaning, which feels like a lot of work.
|
To see the users that are connected to the machine and they're pass hashes with Whosthere.exe, do I have to run it as an administrator?
|
I was thinking about how security on my Linux server can be increased and came up with this question: If most intrusions are performed by gaining remote access to machines, would it be possible and sensible to restrict admin user or maybe even root login by a hardware device? Meaning that it wouldn't be possible to log... |
According to this blog PAN number should be hashed using a "secret salt". What they are doing is basically H(Message+salt). The reason you need this "secret salt" is because PAN numbers are limited to certain amount of numbers, which makes bruteforcing dead easy.
I was wondering if a keyed-hash (HMAC) would not be mor... |
The paper Cryptanalysis of the Random Number Generator of the Windows Operating System describes some problematic aspects of the Windows CSPRNG. However the paper was written in 2007, and looked at the version of the generator present in Windows 2000. Are the problems described still issues in more recent Windows (7 or... |
Is IIS and ASP vulnerable to the same Host Header Attacks we have seen on Apache and Nginx? Specifically the attacks that use the HTTP Host Header to reset a password or implement web-cache poisoning. These specific attacks use the SERVER and HOST variables.
Any insight or help is greatly appreciated.
|
Let's say the attacker got the username and the hashed password. How can he use it when authenticating to some service in its domain with for example NTLM?
How can he send the request as the compromised user? What tools and techniques should he use?
|
My understanding is that with the WebRTC peer-to-peer data API, communications between peers are encrypted via a modified form of SSL. Where are the keys for the peer-to-peer SSL connection generated, though? On the original web server that unites the peers, or on the peers' computers?
Update:
Also, assuming that the J... |
I know this question is probably at risk of offending the guidelines but our IaaS provider was unable to offer us an anti-virus solution for our Linux servers. We are deployed in an enterprise cloud vSphere environment but it looks like a solution at the hypervisor level would not be available anyway since those anti-m... |
i have a 64 gb micro SDXC memory card that has sensitive files on it and i want to completely erase it but i heard it was impossible to be sure that your data was erased because of wear leveling ? The manufacturer (SanDisk) doesn't provide special tool for a secure erase.
What if i delete the files then use a software ... |
ASP.NET MVC provides default protection against cross site scripting. Just wondering, if PHP frameworks do the same?
|
we have a scenario for implementing SSO using x.509 certificates. A secure client will download a x.509 certificate (only certificate...no private key is available) upon user logs into the windows machine. Henceforth for all web applications, we would like read this certificate for authenticating the user. when we trie... |
The concept put forward by Docker and LXC seems to be, from a security perspective, a move in the right direction. Afraid of a MySQL zero-day? Run it in a Docker container and it won't be able to cause damage to the host operating system.
However, it's definitely not a silver bullet. What needs to be done to secure Do... |
I wonder if my setup can be risky. To give a good starting point for answers I would briefly sketch the situation
setup:
double boot system GNU/Linux and Microsoft Windows
GNU/Linux is on 2 partitions which are both LUKS encrypted using AES cipher with a considered "safe" block-chaining mode and keylength
Windows is n... |
I just told my friend my Wi-Fi password, will he know what I am doing even though he does not connect to my home internet?
|
I have a question about how to properly set up full disk encryption on a server running virtual machines.
My setup is Windows 2012 with 2 VM's(Hyper-V) on it.
I was looking into using Becrypt for full disk encryption.
Would it be sufficient to run full disk encryption just on a host?
or should I run it on host and on e... |
I'm trying to see the actual point in implementing Perfect Forward Secrecy during Internet Key Exchange Phase 2, if it had already been used during Phase 1.
Quoting the IKEv2 RFC:
RFC 5596
3.3.2. Transform Substructure
[...] Although ESP and AH do not directly include a Diffie-Hellman exchange, a Diffie-Hellman group... |
I have an AES string being produced with this class, the AesCryptoServiceProvider Class provided by Microsoft.
And I need to decode this encryption with Ruby's SSL::Cipher class .
The problem is that if one encrypts one with one, you can't decrypt it with the other.
An example of my VB.NET code :
Private Const AesIV A... |
My main Question is:
Is it possible to create your own security packages?
[ NOTE: I enjoy teaching myself new skills for many different things. So please give me an answer in a 4th grade reading level. What I mean is that I won't have a clue what you're trying to tell me if the words are way to hard for me to understa... |
For my studies, I am required to do an investigation on a fictional criminal VMWare image. The image is suspected of participating in DDoS attacks and other illegal activities. On this PC TrueCrypt is installed. Along with TrueCrypt, The image has Mozilla Thunderbird installed with a OpenPGP security module.
I made a r... |
I'm planning to set up a server environment with high security requirements on which i want to install an intrusion detection system (snort). Additionally, I think of running a vulnerability scanner (OpenVAS)
on a regular basis (nightly). My concerns are whether
a) wouldn't this render my ids reports during the scan us... |
I am currently looking at TPM (Trusted Platform Module) and wondering how does TPM offer platform authentication. Suppose a legal host is deployed on the cloud. How do I use TPM to assure that the host I am connecting to is that very host, rather than some other host that has the same configuration?
In principle, since... |
Are there any threats against a web site that isn't running SSL but uses PGP to encrypt all information to the server (except session identifier)
The information flow is as such:
1. Session ID set on User browser
2. User selects a book from a list of books and submits it to Server
3. User submits Credit Card informatio... |
Adding the AWS access key and secret key directly in app code is definitely not a good approach, primarily because the app resides on the users device (unlike server side code), and can be reverse engineered to get the credentials, which can then be misused.
Though I find this information everywhere, but am unable to f... |
I recently tried to do a MiTM attack on my network using ettercap.
I have a router, two windows 7 machines : Host A and Host B, and Backtrack on a VM.
In the ettercap window I added the router as TARGET 1, Host A as TARGET 2 then started Arp poisoning. When I checked the arp tables of Host B, I found that it was also t... |
What is the digital signature software? What it takes to digitally sign software?
I'm using the Kaspersky antivírus and the software I wrote, in Delphi, is flagged by the antivirus software due to lack of digital signature, as an untrusted software.
To use my software I need to go to the Kaspersky and set it as a trust... |
Is it best to create an application that allows a user to sign up with username and email at the beginning and password once you click the generated email sent to you or should the password entering be in place before you get an email to continue sign up process?
|
Is it possible to use SecurID 2FA for Highly Privileged shared accounts? I am currently using CyberArk to vault passwords for privileged accounts. when I checkout a password, I would like to make sure that this account has to 2FA to the endpoint. the problem that I see is that all of my admins share these accounts. To ... |
I'm currently using nginx with the following ciphers:
ssl_ciphers HIGH:!aNULL:!eNULL:!LOW:!ADH:!RC4:!3DES:!MD5:!EXP:!PSK:!SRP:!DSS;
I would like to maintain compatibility to older browsers, especially also older mobile browsers and therefore not completely disallow SHA1.
How can I achieve that SHA256 is preferred over... |
I am having the following problem on both my android phone and on my chromebook. I'm running a website on an internal server (10.3.3.3) using nginx with a self-signed ssl certificate. Since it is just an internal server, I put the CN=10.3.3.3. All of our desktop machines work just fine (they give a warning about the ce... |
I've been following the FIDO standard (a consumer-friendly public-key system similar to SSH key pairs) and it appears that it's close to being complete: both Google and PayPal have been testing it internally for some time, the just-announced Samsung S5 is compatible, and Yubikey has announced that the next version of t... |
Does http support encryption without https, akin to STARTTLS in smtp?
This may sound like a stupid question, but just think about it.
Banks require strong encryption, and cannot do business without it.
However, regular websites may not necessarily do so, but would benefit from casual encryption nonetheless, preventing ... |
I am dealing with a multi-step form, and I need to pass information from step 1 to step 2, then from step 2 to step 3, and so on.
Step 1 contains a membership number and ID number entry, as well as another identifier (3 fields to complete to identify the visitor). At this moment I use RIJNDAEL encryption to encrypt the... |
In a login system I'm doing, I'm using a per-user, per-device randomly generated cookie token. A part of the script looks like this:
// Generate current device's token
$token = substr(bin2hex(mcrypt_create_iv(200)), 0, 60);
// Include this device's token
$STH = $userDB->prepare("INSERT INTO devices (user_id, token, ac... |
It seems that every single banking & financial website that I have used logs me out after a certain period of time.
Are there a legal requirements or technical reasons for financial sites to do this? Or is this just their form of "security" to prevent others from accessing your account should you forget to logoff or s... |
What is the risk of accepting an untrusted site security certificate in your browser if you're not entering any data, but merely browsing the site?
|
Currently the default maximum key size is 4096. I know this can be changed by recompiling the software, and I don't mind doing that.
My problem is about compatibility issues. It makes sense that some implementation may not / may have trouble supporting 8k or 16k keys.
However, I've heard of sub-keys. I don't want my "d... |
I was looking to give out login information to a read-only mysql database (via phpmyadmin) to the public (the users of my program) to use for reference purposes on a production environment. Would I be risking anything on my side by doing so (assuming all privileges were locked down and the users could literally only re... |
I'm looking to purchase a wifi card to help me learn about wifi network penetration testing and other associated issues but I was wondering if there were any features of a wifi card I should look out to get the best in terms of ability. Or is there no real difference between the different models. The most important fea... |
My application is divised into two parts:
Javascript application as client
Server side API's (RESTFUL through Play!2.2 framework)
I expect users to be authenticated through Facebook's Oauth 2.0 client, especially with the Facebook Javascript SDK.
Once authenticated, users could call my various own a... |
I am looking into php's max_input_vars setting
How many input variables may be accepted (limit is applied to $_GET,
$_POST and $_COOKIE superglobal separately). Use of this directive
mitigates the possibility of denial of service attacks which use hash
collisions. If there are more input variables than specified... |
i'm about to secure a webservice with client authentication. (apache2, mod_ssl, openssl).
from what i googled, i found that it's more common to have a ca, which signs the client certs, which will then be checked.
also i found that it should be possible with the help of the sslrequire directive (in the apache configurat... |
I have a ASP.NET MVC 4 application.
In some webpages or views, I have information displayed in table. Column values are rendered as links.
Problems:
1. When I hover over the link, it's URL is visible at the bottom of browser.
2. When I click on link, I show information for the resource requested in URL. (www.someurl.co... |
We are planning to develop a EHR/Billing Software and we are aware about HIPAA rules and regulations. Our current application architecture using a shared database with all client's(Provider/Practice) data.
I would like to know if HIPAA recommends in isolating database per client(Provider/Practice) - ie is a single dat... |
We have an eCommerce website hosted on a dedicated server. We get our PCI compliance report from Qualays and there is no problem with that.
However, now we want to test something new on Amazon's AWS environment. But the idea is that we will still use the same checkout setup done on our main site.
So my question is will... |
I am looking to build a number of simple REST web services where:
they only need to be called by server-side clients (i.e. no mobile/javascript/desktop)
they are only accessible by HTTPS (no downgrade to HTTP)
clients will only be deployed to secure, trusted locations
clients will each have a unique API key
each servi... |
Could someone please tell me why cryptographic algorithms are placed in the data-link layer for wireless networks?
|
I found an XSS vulnerability which is exploited by appending attack in the URL parameters.
For eg. the original URL site.com/?s=login&m=forgotten
And the attack URL site.com/?s=login&m=forgotten" onload=alert(966) bad="
Now I would like to prevent this attack. Can anybody help me?
|
For an experiment, I'm trying to open a 2048-bit RSA encrypted mail on a image.
Using this fresh image, I made a memory dump and analysed the dump for RSA keys.
Now, several RSA keys have been found.
An example;
FOUND PRIVATE KEY AT 1048fb83
version =
11 8e 48 04 06 11
modulus =
02 01 00 02 02 00 02 03 00 02 04 00 ... |
Is there any program or method that allows encryption that can not be brute forced or is it just that any encrypted file can be decrypted by brute force?
|
What is a recommended way of handling CRLs in long-term electronic signatures (specifically the CAdES-A)?
The problem I see is in that CRLs are not protected against modification (they are plain text, not signed) and not even mandatory in CAdES-T or CAdES-A.
As such, they can be forged, and such forgery cannot be easil... |
I have been experimenting with the TPM on a Dell R710 (BIOS version 6.3.0). My goal was to detect changes to BIOS settings through TPM PCRs. The research I have done leads me to believe that BIOS configuration changes should be reflected in PCR value 01. However making alterations to the BIOS config such as changing t... |
Is sqlmap still traceable when we use --tor --user-agent and macchanger?
For example:
sqlmap -u "[vulnerable_website_link]" --tor --user-agent="Mozilla/5.0 (compatible; Googlebot/2.1; +http://www.google.com/bot.html)" with macchanger.
|
As we all know, Microsoft stops developing security patches for Windows XP very soon. If a bug in the kernel was to be found that would allow an attacker to take control by, say, sending a specially crafted UDP packet, this would not be patched.
But what if the system is a desktop behind a common NAT router and the onl... |
My team currently uses ASP.NET with MS SQL Server for our software.
Security has only become important since I started, in which there is injection vulnerabilities everywhere.
Due to current integration with Oracle and MS SQL the business decision was never to use parameterized queries.
This of course has been an iss... |
While studying HTTPS and related transport layer security protocols(SSL/TLS), I came to know that HTTPS suffers from two complications - Web-Proxy and Virtual-Hosting.
I can understand how virtual-hosting could be the complication for HTTPS. This is because the underlying transport protocol of HTTPS (SSL or TLS) issues... |
http://www.troyhunt.com/2013/05/your-login-form-posts-to-https-but-you.html
My question is, if the threat is that someone controls your internet connection and can serve up bad login pages, couldn't the attacker just serve you a page like facebook.com instead of https://www.facebook.com?
Many sites just have a 301 redi... |
I'm thinking of using SAML for sending authentication and authorization information to system. I plan to send roles and other information as authentication attributes in the assertion.
Does this sound like good idea or do I have to look into using XACML?
|
I am seeing lot of IPSEC Authentication messages in eventlogs of Windows domain hosts. I was wondering if this - setting up IPSEC connections between domain workstations is a part of normal Windows behaviour?
|
I'm trying to simulate a possible attack scenario for my studies.
I've got a image, which has a encrypted disk, encrypted by TrueCrypt (confirmed).
TrueCrypt is installed on the image itself too.
During a RAM analysis of the image, the attacker found a few keys using AESKeyFind.
A sample output is;
FOUND POSSIBLE 128-B... |
I have an assignment to do for school which involves attack signatures (I have to do a service-specific IDS). Basically what I have to do is to generate signatures for some attacks with Metasploit on some programs, and then I must be able to recognise these same attacks.
Currently I am in the research phase, more... |
I need to move user cryptographic identity between several user devices. In the operating system I have only one option: use password-protected PKCS #12 to import the identity to the OS secure store.
I’m wondering how secure PKCS #12 is. Can the p12 file be distributed over the insecure channel? How secure is it compar... |
This is a part of curl's verbose output when connecting to the HTTPS site of Google.
* Server certificate:
* subject: C=US; ST=California; L=Mountain View; O=Google Inc; CN=www.google.com
* start date: 2014-03-12 09:38:30 GMT
* expire date: 2014-06-10 00:00:00 GMT
* subjectAltName: www.googl... |
A PCI scanner of a client is current showing a potential path traversal exploit. The document root is set to /home/somefolder/somewebfoldername/
YET, visiting ourwebsite.com/manual shows the Apache manual. The same goes for ourwebsite.com:8443/manual
The exploit highlighted is: ourwebsite.com/manual/howto/ssi.html?..%2... |
I downloaded Adblock plus on my computer, then went back to youtube (which was playing Vivaldi concertos), and all the ads were yet there. What gives? Is Adblock plus authentic?
|
In symmetric encryption, the key responsibility is for the two parties involved (sender and receiver). Hence, it can be more vulnerable, and can cause accountability issue in cases ofthe key is compromise. If symmetric encryption is too risky, then why are other those algorithm so successful and even used today?
|
Following Turkey's recent social site blocks, I am wondering how can you efficiently accomplish that as a country. Similar for a big company.
Blocking IPs → easy to circumvent, (proxys, tunnels, etc)
Blocking/Redirecting DNS → type the address or similar as above
Deep Packet Inspection → very resource intensive, can i... |
I want to encrypt a few files on my computer (not FDE). To do this, I'd like to use something that requires having some external usb thing with the key on it plugged into the computer. Price is not really an issue for the usb device (ideally in the hundreds of dollars). Any recommendations for solving this problem?
|
Are there ways to monitor and check for network monitoring like WireShark?
Or would it just be more ideal to ensure every application uses SSL to ensure no employee or anyone could packet sniff chats/emails for information.
|
All websites that support authenticated user interactions have a password recovery feature. Usually they will email the password reset link through which you can easily recover your account by typing a new password. So, when pentesting some of these websites I've noticed that the password recovery token seems to be som... |
Suppose a document that was signed with a long-term signature (e.g. CAdES-A): D S T1 (D - document, S - signature, T1 - time-stamp created using a time-stamping certificate C1).
If C1 appears in the TSA's CRL, is there a way or a time period (an opposite of "grace period" from RFC 5126) to still recover the long-term v... |
I'm under the impression that a sufficiently powerful solar flare can temporarily disrupt and even damage electronics.
Are there any practical approaches that one could take to minimize this disruption? In particular, what can be done to protect mission critical hardware which needs to remain running during the event?
|
I'm not exactly sure how metasploit works when exploiting a target machine, and it has been a while since of played with it, so forgive me.
Instead of using meterpreter as a payload in metasploit, could I write my own .Net based executable that would be dropped on a system after exploitation? Assuming the victim had .N... |
I scanned my site using a tool that detects xss vulnerabilities. As a result, the tool generates a report that contains httprequest and response of vulnerable pages. Now my question is how this request and response can be helpful in detecting xss?
|
iOS and WP8 support Unique Identifier per Vendor or Publisher according to this and that.
Android unfortunately does not support that feature.
Is there anybody knows the mechanics of that mechanism?
Has Apple/Microsoft revealed the identifier generator algorithm to the public?
Assume there are two apps (a1 and a2) fr... |
Let's say I have an application that accesses an encrypted datastore, and I want the admins to be able to unlock the datastore upon application startup (and then the application will have access to the datastore until it terminates). I don't want any single admin to have the ability to unlock the datastore himself, b... |
I received this bounced email, yet I have a password with 105 bits entropy, my sign in history only shows local sign ins, I do not have any linked accounts nor apps, and I have not been to GermanyDenmark.
Received: (qmail 90091 invoked by uid 102); 3 Apr 2014 21:27:50 -0000
Received: from unknown (HELO mtaq2.grp.bf1.ya... |
It is recommended to verify the zeroing-out was done properly when you try to secure delete a HDD. From this post, some drives with firmware bugs prevent secure erase from working properly.
What are the recommended software tools to accomplish this? Either Windows / Mac / Linux is fine.
Ideally, tools that could verif... |
Whether or not a connection is encrypted, I'm afraid the time an information is sent from one host to another might reveal too much. And I'm literally talking about the time when pieces of information are sent, and not the information itself.
Are there any way to mask when information is sent across a link?
I'm specifi... |
I know this is possible either by modifying the firmware or doing something with the partition, but does anybody know how? This can be done? Specifically I am wanting the USB drive to read as a HD or CD when plugged into the computer.
Edit:
I want to be able to convert other USB drives, doing it for other people, etc.... |
http://blogs.cisco.com/security/mass-compromise-of-the-obsolete/
and:
All Redhat/CentOS versions plus nearly 100% of linux-based routers run
2.6
Since the article is extremely uninformative..
Q: How do I know that I'm vulnerable or not? ex.: If I have an OpenWRT router, or Redhat 5?
|
I need to prove the need we have to install SSL certificates in our webservers.
For that I've been requested to try obtaining sample credentials (in lab enviroment) during a http authentication process.
How can I do this?
|
Can someone please explain to me how its possible that someone hacks a server and uses its email to send emails from a address thats not listed on the server and how to prevent it.
When I look at the mail queue there are emails there from and to yahoo.com accounts, how does this happen and how can I prevent this. Runni... |
First, I have very limited knowledge about AD.
Problem: I authenticating users on AD using user certificates. I want to authenticate user on various devices (including mobile devices). Each will generate its own certificate via a CA. The CA is tied up with AD, so user authenticates on AD via certificates.
On the questi... |
I mainly use 2 passwords: 1 is a 4 word full lowercase passphrase of 18 letters long which I use wherever possible. The other is basically 3 words and a digit with the first word in full uppercase and only 14 digits long. I use this whenever the first passphrase is not valid due to length or character set constraints. ... |
What will be the default mode for AES encryption if we don't use any specific mode like ECB, CBC, OFB, CTR, etc. and just carry out the encryption without specifying any AES encryption mode.
|
As the title says, does anybody know how Subterfuge bypasses the SSL layer?
|
I'm interested in knowing what could be the consequence if the server side SSH keys of a host were compromised.
The situation would be:
An attacker manages to read the SSH private keys of the server.
The attacker can MITM any connection to the host (because he's controlling the router, or w/e).
Does that mean that a... |
While Pentesting through some sites i found that an Multiple account's can be created using same CSRF token which should not allowed.I want to place two scenario's to describe my question.
Scenario 1:- Multiple account's can be created on the site with same CSRF token and there is no need to verify the account for usin... |
I have had experience with an ISP that slows down all encrypted connections (down to an average 20-35 KBps) I was wondering if a) this is legal b)how can they do it and c) is there a way to bypass it. I have also noticed that the use of a VPN is still prone to such limitations.
Furthermore, what are the implications of... |
There are a number of IAST tools available on the market such as Acunetix Web Vulnerability Scanner and HP WebInspect Real-Time.
How effective are these at finding vulnerabilities? Is there any evidence that these can find more or less than a black box application pen test (DAST) or by source code review (SAST)?
I foun... |
I've read this Android developers page regarding code signing that states:
You can use self-signed certificates to sign your applications. No
certificate authority is needed.
I have also read the answers to "How could one detect if Apple/Google/etc. has modified a third party application distributed through their A... |
I have question about extensions of certificate and what specific extension should I use in my situation.
The problem is following: I have a CA and I want that CA will issue certificate only for specific type of service. For example imagine application that can do 4 different type of actions (let's say action A, action... |
I read that Windows (probably not new OSs but say, Windows Server 2008) stores passwords using Hashes using NTLMv2 protocol which uses MD5 hash function. My questions: MD5 is known to be insecure because it is not collision resistant. How is it used in Windows 2008 server?
|
I have read a post in thehackernews and searched the net to find how it worked.
How can anyone add javascript in an image such that when the image is displayed it can run a script.
Can this be done with other languages?
|
I want to compute the possible combinations of a password consists of 8 digits of: alphabetical letters (26), numbers (0-9), symbols and punctuations.
In order to compute this, I have to know the total no. of possible characters and raise this to the power of length of the password. However, I do not know how many poss... |
After I've read a lot about key exchange many sources state that the Station-to-Station is secure, since it also verifies the entity on the other side.
Well how is that true, if an active Man in the Middle can just send it's own public key and sign the concatenated shared x and y with it's own private key?
Wouldn't it ... |
I always assumed that the process for getting a (trusted, not self-signed) certificate was more or less like this:
You generate a public and private key pair
From this key pair you generate a certificate
You submit your public key, certificate and other (company) information to a CA
The CA checks that the information ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.