instruction
stringlengths
24
29.9k
I want to know whether my various providers changed their certificate because of Heartbleed, or they are using an old vulnerable certificate. How can I know that? Is the "valid from" date also the creation date?
Somewhere on this site I read that I should connect to websites by entering the URL myself or using a bookmark when security is critical. I started wondering why that didn't include browsing history. Of course it is true that my browsing history might have some mistyped URLs in it, whether entered by me or by people I ...
$query = " $sql = select * from users where id = '$id' " Won't $id=3' OR '1'='1 break the query ? The doubt arose because someone claimed it can't be broken.
microsoft.com for example can use a Verisign Certificate for their domain. What are the chances that an attacker could ask verisign for a m1crosoft.com domain and get approved? It is very simillar, but still can be used by attackers to run a "secured phishing website". Do trusted CA's do some research on a client that ...
Regarding the priority to upgrade servers, I want to confirm this, as I read in https://www.rfc-editor.org/rfc/rfc6520 chapter 3: However, a HeartbeatRequest message SHOULD NOT be sent during handshakes. If a handshake is initiated while a HeartbeatRequest is still in flight, the sending peer MUST stop the DTLS retra...
I have read about recent vulnerability in openssl. I tried to exploit one of my cloud servers where I run my web sites. I managed to get 64 KB of data. But what I managed to get was only HTML, CSS, PHP codes. But here states: We have tested some of our own services from attacker's perspective. We attacked ourselves...
I'm working on upgrading an old Windows RAS server that hosts PPTP VPN. I want to move to a L2TP/IPsec VPN. Due to the firewall appliance we use, the VPN server has to be behind a NAT. This means in order for L2TP/IPsec to work, I need to enable/configure NAT-T on the client and server. However, NAT-T functionality i...
On several pages, it is re-iterated that attackers can obtain up to 64K memory from the server or client that use an OpenSSL implementation vulnerable to Heartbleed (CVE-2014-0160). There are dozens of tools that reveal the bug in server applications. So far I have not seen a single tool that exploits the bug in client...
This may be a stupid question, but I'll ask anyway. I have been reading quite a bit about the Heart Bleed vulnerability, and I'm curious as to whether it only affects web applications or whether OVPN connections secured with certs produced with OpenSSL would potentially be affected. I have attempted to scan an OVPN Ser...
I'm not entirely sure if this is on-topic for Security.SE, but it doesn't seem entirely off-topic either, so I'll try. :) I keep a couple of (GPG-)encrypted files with more-or-less sensitive information; particularly passwords for various web services. While they are mostly used read-only, I sometimes need to edit them...
Edit: Please follow the above link to the original. I have a self-signed certificate which is use to sign other certificates that I issued. This is all done with an affected version of OpenSSL. These certificates are installed on Windows servers for encryption of https traffic. OpenSSL is NOT installed on the servers....
When I visited Google and Facebook, and then clicked on the Perspectives add-on button to check the certificate information, I saw this:     What does this mean? Shouldn't it have more "graph" lines? Why just two? Is this secure? Do I have to worry about this?
I'm working on an authentication system for a web based Bitcoin-related service. As part of the service, users do some less sensitive operations (mostly reading and sending various types of information) and some highly sensitive operations (controlling Bitcoin funds by signing transactions). I'm looking to create an au...
Today's xkcd has characters discussing heartbleed: Megan: I mean, this bug isn't just broken encryption. Megan: It lets website visitors make a server dispense random memory contents. Megan: It's not just keys. It's traffic data. Emails. Passwords. Erotic fanfiction. Cueball: Is everything compromised? Megan: Well,...
Users have been advised to consult a list of sites affected by heartbleed and to change their passwords on those sites once they are no longer vulnerable. Facebook appears to have been unaffected; but many affected sites use Facebook logins. What should users do about affected sites where they use Facebook to log in?
For a passphrase that is UTF8 encoded and then SHA256'd, what is the minimum length to achieve a practically collision free result? The implementation is for a 32 byte cryptocurrency ed25519 seed thus will not be stored anywhere by the implementation.
One of the services I use is saying they were unaffected by heartbleed. But when I check their site with the tool at http://possible.lv/tools/hb/, this is what it says: Looking for TLS extensions on https://xxxxxxxxxx ext 65281 (renegotiation info, length=1) TLS extension 15 (heartbeat) seems disabled, so your server...
I read a lot about IP spoofing but I am not sure how easy it is really to do. Let's say I am in Spain, can I somehow connect to a server in the US with an IP address that is allocated to Mexico? Won't the routers simply refuse to forward my traffic? I know you won't get any response as it would be routed to Mexico but...
Should I change all of my online passwords due to the heartbleed bug? Edit: I found a list of vulnerable sites on GitHub and checked all my critical sites. Everything I was really concerned with was not vulnerable according to the list.
I hope this is the right stackexchange - if not, please advise. As to the actual question: have a system we've developed that makes heavy use of asymmetric cryptography in various different ways (RSA, client certificate authentication, and digital signatures), and in our recommended configuration uses 8 certificates - ...
From what I gather you need local memory based access correct to even access the private key? Is all this talk and worry of "Was I hacked?!" "Heartbleed just made you full hackable" ect... really over exaggerating the issue? For example I run some pretty big websites using SSL Certs for HTTPS. Am I really remotely expl...
SSL supports a number of ciphers, but is it possible to stack/nest the ciphers, and process the plaintext in stages? My adversary may be able to easily crack one or more of the stages, but to decode my message, they need to crack them all if I can use multiple ciphers. For example: ciphertext = Encrypt(plaintext, key,...
So I'm getting conflicting information from members of my team. The premise is, if an attacker can keep requesting 64 kb chunks of memory from my server, they could get the entire memory footprint of my server, and thus get the private key I used out of memory. So, is the private SSH key I used to log in stored in mem...
It is public that Amazon's Elastic Load Balancers (ELBs) were vulnerable to the heartbleed exploit before they patched them all on April 8th. I understand that the memory of these ELBs (and therefore the certificates on them) could be compromised, but I'm curious if there was any risk of memory exposure of the EC2 ins...
As part of the Heartbleed event, I have upgraded OpenSSL, reissued and replaced certificates and revoked the old ones and changed passwords however, I am also seeing advice to invalidate all session cookies (https://security.stackexchange.com/a/55089/18057) but I cannot find out how to do this. Does this just apply to...
I have looked everywhere and I can't seem to find a netsh equivalent of the u32 module for iptables. I want to create a rule to Drop a packet that starts with a specific set of bytes. Similar to: # Block rules iptables -t filter -A INPUT -p tcp --dport 443 -m u32 --u32 \ "52=0x18030000:0x1803FFFF" -j DROP Is this po...
Would designing a crawling bot to detect and inform vulnerable website owners be legal?
I was talking with a friend about HeartBleed, and he mentioned that he had 2-factor authentication enabled on all the sites that supported it, so even with his username and passwords, nobody would be able to login without his phone too. I told him to change his passwords anyway. But I'm interested to know; was he right...
According to the OpenSSL project the version in use on a server we control is not vulnerable: 0.9.8o. According to OpenVPN v 2.1.3 is also not vulnerable (also in use). These are running on Debian Squeeze (6) and are repo packages. However, when using two web based tools and the Python PoC code, this site reports as vu...
If LastPass does not store your master password, then how can you login to use their web app? Surely you must type it in, it is sent over using SSL, and then salted/hashed on the server-side, and then compared with what in their DB, like any other login scheme on the web.
I have observed a number of web-based login forms that offer 2-factor authentication do token entry on a second form after validating your username and password. Is there a reason not to ask people for their 2-factor authentication token at the same time as their username and password? A login form could detect a usern...
From what I read at heartbleed.com "...Bug was introduced to OpenSSL in December 2011 and has been out in the wild since OpenSSL release 1.0.1 on 14th of March 2012. OpenSSL 1.0.1g released on 7th of April 2014 fixes the bug." So what took them so long for it to be fixed ? Most importantly, how come any of the s...
I was wondering if the linux TRESOR module (http://en.wikipedia.org/wiki/TRESOR) would protect a webserver against HeartBleed or other similar attacks.
I'm sure its obvious, but I was wondering, what is the primary reason 3DES encryption is not used for storing passwords in the database? My understanding is that 3DES is a strong encryption? So I can only think that the reason it is not used is because its encrypted not hashed, so that if the system was compromised th...
Today when I woke up , I got a email from Godaddy that contain “A critical vulnerability with OpenSSL, known as 'The Heartbleed Bug' was recently announced that could potentially impact your server“ I don’t know what Heartbleed is. Please help me protect my server.
Most of my friends who are not experienced in computers want to know what Heartbleed is and how it works. How would one explain Heartbleed to someone without a technical background?
I want to implement card-based authentication for the parking system in a university. Currently all students own a Java Card-based student ID card, if they have not broken or lost it. Can we create custom APDU structures in a blank, non-smart 13.56Mhz card? I'll elaborate. While the majority of the parking lot is occup...
One of my friends site got hacked recently. Now while pinging the site ping zyz.com the response is like From 10.x.0.1 icmp_seq=79 Packet filtered From what I have heard, 10.x.0.1 looks like a LAN gateway address. Could someone please help by telling me why is the response having subnet detail in it? Any help would ...
Can an external tool accurately determine the current vulnerability of a site to Heartbleed? If so, how? What has to be tested/tested for? What features are required? vvvvvvvvvv UPDATE 1 What features are required to determine if a vulnerable site was remediated? How does one determine that it is time to update the p...
I am at a small firm (12 PC on the internal network). We use this network architecture now: Internet(Modem) --> Router --> Firewall --> Switch -- > Internal Network (clients PCs) | | |- Wifi Router |- DHCP & AD Server |- HTTP file server T...
If I have got this right in my head it would be a simple enough task to combine arp spoofing on a public WiFi to redirect clients to an evil SSL server which sends malformed heartbeat requests or to set up a honeypot WiFi and use the box as a router.. not many people would notice this as most public WiFi hotspots redir...
So the heartbeat bug can lead to memory read overrun, exposing (parts of) the process memory, because it reads the payload when there actually is no (or less) payload. But what do you need a payload for, especially in a heartbeat? It looks like it's just memcpy'd into the response. How is it used, exactly? Edit: Simila...
I am in the midst of a pentest. I have managed to uploaded a war shell (backdoor) in c:\test\ which is automatically deployed in a folder, for example c:\test\tmpbrowser.war. The application which I am testing and its files which are accessible are installed in c:\approot\extracted\. Now what I want to arrange is that...
I host my personal website on digitalocean. Nowadays, I received many abuse complaints which finally make them shutdown my machine. I feel really sad and angry. Someone complaints that my machine is used to attack his machine via ssh. I check my machine, and find two suspects: root@eva:~# lsof -i COMMAND PID USER FD T...
I have a form which contains a password field. In swing the getPassword() method returns a character array. After the password has been processed by my web application the array can be wiped to remove the password from memory. This is not possible when using Strings because Strings are immutable. Using arrays reduces t...
I understand the part about a server with the vulnerability. But from what I gather, the vulnerability has also existed in browsers that use the vulnerable OpenSSL implementations. So, if I first visit a site that doesn't have a vulnerable OpenSSL implementation, log in then, and then afterwards (or perhaps through som...
Since I'm quite beginner to information and websites security, I'd like to ask more experienced people about and idea, that just crossed my mind (probably isn't my original discovery! :]). With introduction of so many new top-level domains, would it increase my website security, if I would move "control panel" to a sep...
My understanding of the Heartbleed vulnerability is that there is no bounds check on the payload length/buffer size so the server can read into memory outside of its process space. But can the start address be modified? If not, then the probability of snagging anything interesting from a server with gigs of RAM, where ...
As title says, is there an av that does that? And if not, is there any other program that protects processes like lsass in windows, apart from protected process utility in win8.1?
Is electronic voting software compromised by the heartbleed issue?
Before you dismiss this as silly, let me explain :) The only purpose of this encryption is to make the data inaccessible if the drive breaks down and I want to send it off for warranty replacement. This system needs to be able to boot without my supervision when I'm away - which precludes the use of any passwords. Righ...
I have a Windows based server that serves a signed JAVA applet. The website isn't secured (HTTP), but all JAVA applets have to be signed now, so the site serves a signed JAVA applet as part of a web page. As such, the applet would have access to the client computer. I can't explicitly find OpenSSL anywhere on the serve...
I'm working on a project, where we use the Common Name as a certificate's basic identifier. However, importing certificates without the Common Name fails. What's the default way to use digital certificates? Which identifier should we choose to be able to import them?
How can a Linux server be protected against an attacker that tries to open a large number of SSH sessions (probably trying to brute force a password) that no ports remain to be able to legitimately login to the machine? The server already uses only SSH key based access and does not allow root logins, so the password br...
One thing that's been bugging me in relation to the discovery of the Heartbleed OpenSSL flaw is the recommendation that everyone should run to their computers in a panic and change all of their passwords right now. Considering that there probably still are sites out there that haven't yet upgraded their OpenSSL version...
Just heard about the heartbleed news over the internet for OpenSSL and wondering if it affects ios apps as well. My app uses openssl crypto library and thus the concern ! Any views in this regard would be much appreciated ! Venkat
There is a task to design a system to store sensitive data securely (should be HIPAA compliant in the future). It's just a draft - this will not be used in production in a foreseeable future. I have a prototype inspired by TrueVault and want to know if there is some semantic security lacks or violations of security con...
In light of the recent heartbleed vulnerability, I'm thinking of switching to a service like 1Password. However, I don't know how to evaluate the risk of NSA (or other government) spying. So, two questions: how can I evaluate the risk of such spying, and is 1Password secure from it? EDIT: I thought it went without sa...
I am semi-embarrassed to ask this question having worked in the field for 20 years, but can someone describe to me why I should run SSL on any web site that uses authentication? I understand the bigger "why" issues (people use same password on blog and bank) and I am assuming that the passwords are stored encrypted on ...
Is it possible to brute force a flash login with hydra? If not, what is a good tool to pen test a flash login?
I'm learning about security at the moment and one thing I'd like to try out is having a key server distribute keys to clients that will allow them to securely save and read data locally. My basic idea is that the client will communicate with the server over TLS where they'll provide a username and password. This passwo...
With all the coverage of the technical aspects and doomsday talk, it's hard to get co-workers to listen when they don't see stories of real people being affected by Heartbleed. So is there any evidence of individuals out there actually suffering at the hands of this bug?
When you create a Scheduled Task in Windows, it gives you the option of running the task as a different user, including saving the password. How secure is the password that is stored?
Does anyone know of any research of papers on fingerprinting botnets? If a given target is being brute forced or DDoSed do methods exist to determine if a brute force or DDoS on another target are coming from the same botnet? Based on geography of the nodes and time of day given nodes are attacking? I'm talking prol...
As I understand it, HTTPS/SSL/TLS works by EC/DHE/RSA key exchange, providing a shared symmetric key (ie. for AES) that is used for future communications. How long is this symmetric key kept in use by the major browsers before a new key is negotiated?
Let's make the following assumptions: A trusted root certificate was being served with a vulnerable version of OpenSSL. Prior to public disclosure, a malicious entity was aware of and exploited the heartbleed vulnerability Said malicious entity attacked and gained the private key for the root certificate I don't have ...
In the context of the Heartbleed bug I would like to make sure that I can detect if someone tries to do a MITM attack with a stolen certificate, which since has been revoked. The problem is that browser either only soft-fail or don't check the CRL at all because soft-fail is useless. Firefox lets one make OCSP response...
As my computer is currently set up, I have 3 AV's: AVG (paid), Malwarebytes, and Spybot S&D. I think that each one of these serves a purpose: AVG gets your real malware - Trojans, Worms, etc. and provides real-time protection, Malwarebytes gets adware (which AVG misses with alarming frequency), and Spybot gets spyware ...
SSL implementations have been discussed a lot lately, due to Chrome's potential of switching off NSS (https://docs.google.com/document/d/1ML11ZyyMpnAr6clIAwWrXD53pQgNR-DppMYwt9XvE6s/preview?pli=1&sle=true#) and OpenSSL with Heartbleed. What are the major factors preventing someone with tons of resources (e.g. Google) ...
I have a web site where users can enter some text into a textbox and that text is immediately rendered in a div using javascript (strictly front end). If a user enders something like this: This is my text<script>alert('test');</script> It will render that content in the div and show the alert. When the user saves th...
I recently looked at my local credit union bank and they said that their site is not vulnerable to heart bleed. However, I have used my credit card in many websites such as grubhub, amazon, some charity organizations, so the credit card data can be exploited. I want to have some expert opinion before I act? PS: I looke...
Are intruders in a local network able to mask their local IP in any way? Could they 'hijack' another local IP and perform scans and exploits from there?
Related to, of course, the heartbleed vulnerability, I've been reading the news about the worst case scenario for this attack being the extraction of the SSL private key, because, of course, this would allow the attacker to decrypt all traffic to and from the compromised server, including [probably, depending on forwar...
I just got a software update openssl-1.0.1e-37. I believe it is a patch for HeartBleed. Given that it was widely reported that versions up to 1.0.1f are vulnerable, how can I verify this patch on my server without resorting to an external checker?
I was wondering if there currently exists a Content Management System that supports PKI and client certificates for website authentication instead of username/passwords. If not, what's a good place to start on developing a site that uses this authentication scheme? Is it possible with Python and Django?
From what I understand, all it takes to enable PFS on a webserver is adding ephemeral cipher suites (ones that use DHE and ECDHE for the key exchange) to the list of cipher suites used in SSL/TLS handshake. I'm aware that some older web services and crypto libraries do not support these cipher suites. But besides that,...
I am trying to write an application is rails. Which is more like a api application so that when a user gets redirected from his application into mine I would like to authorize him and start a session for his own. This session must be open till he leaves my application. How can I do this?
the lastpass.com/heartbleed tool states that my server is most likely vulnerable and that users should wait untill my cert has been replaced. It seems that they check for certificate creation date, but i re-keyed my certs which means that they are newly created with a new key but still have the old information like the...
Everywhere I go, people tell me the private keys need to be kept away, possibly even locked into a safe. Then how come Firefox and other keystores expect you to give them a private key? Firefox is a client, it shouldn't need this right?
More and more evidence seems to be surfacing that the Heartbleed vulnerability leaks the private key portion of the SSL certificate in use. As such this can actually mean that if an attacker was also able to passively monitor SSL traffic, when they get hold of this key, they could decrypt an unlimited log of SSL data, ...
We have two severs sitting under one load balancer. We run PCI scans on those two servers. Now, when we started, we only had 2 websites running from these two server. But the business is growing and we have around 10 more sites on these two servers. Do I have to get the PCI scans of all these websites separately, or ...
(1) As it is possible to extract the secret key from a SmartCard using laboratory equipment, I wonder if there is any (new) way to protect against this sort of security breach? Does it affect all kinds of SmartCard? (2) Do eToken/ crypto-token resist such key-extraction attacks? Would the PIN lengh make any difference?...
I have started Firefox in an Ubuntu terminal, and now I see these messages during browsing: "No permission to use the keyboard API for http://googleads.g.doubleclick.net" I mean... WTF? Why does Google Ads or DoubleClick need to have access to my keyboard?
Basically, I'm testing a local network, on which I'm able to use ARP spoofing. I now want to try and infect one of the Windows boxes on the network with a backdoor. I could inject an iframe into their HTTP traffic, or a JavaScript redirect, or something to that effect, to get the file to download. However, I'm wonderin...
In hearing about the Heartbleed vulnerability, I went to https://www.openssl.org/source/ to download the latest patch, but was quite surprised to find that the security certificate for that site has not been refreshed since the exploit was discovered ("not valid before" date is Tuesday, August 30, 2011 5:30:50 AM CT). ...
According to articles such as the following, it's apparently possible to check logs for heartbeat requests matching the payloads described in the Heartbleed exploit. Is this something that any server operator can check for in their own logs (at the server level, any standard Linux distribution)? If so, which logs shoul...
I admit that while I'm a programmer, my crypto/security knowledge is fairly basic. I understand that the potential of leaking private SSL keys is cited as one of the most serious effects of the Heartbleed bug. My question is, how can an attacker actually use the private key? Heartbleed.com states that: These are the c...
It's been a while since I studied key distribution, so I may have some fundamental misunderstanding.. From what I remember, man in the middle attacks can't occur during cert distribution because the cert being distributed is protected by a higher level cert's key. The root keys are distributed on cd with the OS making ...
The OpenPGP specification (RFC 4880) describes, page 34, the different capabilities that an OpenPGP key may have; including: 0x20 - This key may be used for authentication. In GnuPG, one of the most popular implementations of OpenPGP, it is possible to generate [sub]keys with the authenticate capability (using the --...
Pretty sure that browsers are compromised most often through their plugins, at least, that's what I keep reading. So, then, does that mean the browser itself has vulnerabilities, and the plugins are just the vector to get at the browser's vulnerabilities?
What Causes an Operating Systems ISO image to become Corrupted? I found an ISO image of windows 7 off the internet and now when I use windows 7, its extremely slow. What causes this? I cannot boot up the computer anymore from a CD disk. I want to remove the windows 7 from the computer and replace it with a clean copy o...
I want to develop an Android app that may contain sensitive personally identifying information (national ID number, phone number, etc.) among other data that will be stored in an Android phone. Let's say that this data will be kept on the phone, which is offline most of the time, and has a very small and not so frequen...
I'm running Ubuntu x86_64, and want to upgrade to OpenSSL 1.0.1.f. wget <openssl latest> tar -xzvf openssl.tar.gz cd <openssl dir> ./configure --prefix=/usr make In the console output, I get the following error: collect2: error: ld returned 1 exit status
Does HTTPS retrieval, among its other effects, sign a document? I'm asking in hopes of understanding in more specific details what TLS accomplishes. I will try to elaborate my question, as follows. Suppose Bob retrieves a document message.txt from Alice using HTTPS. In the course of this retrieval, Bob also stores into...
I have a number of apps on my smartphone that store the passwords - facebook, mail, etc. So say the phone is lost or stolen and the finder decides he wants my passwords - what can he do to get them, and how safe is my data on the phone? Is is doable to bruteforce the password given that the password is not super comple...
A friend of mine recently got her Gmail account "hacked" because of a weak password (the same as her login..). While sanitizing her account, I removed the forwarding of her emails to one email address (let's say booba123@outlook.fr). I typed the scammer's email in a search engine, and I found one domain name which seem...
I realize that this may be more of an opinion type question, but I see a lot of questions on ethics in this forum so I hope mine fits in. I was reading a BBC article about Heartbleed, and in the article it references couple of sites that can test other websites for presence of Heartbleed vulnerability. The sites' state...
After I learned last week that the login data of some of my accounts was leaked, I had to change my passwords for more than 30 sites. That was tedious! As luck would have it, some days later we learned about Heartbleed. Oh great, now I’ll have to do all this again (and for even more sites now). Then I read the question...
I want to protect my passwords for free and store them on a machine that might get stolen but have the passwords very securely backed-up in the cloud, again for free, and minimize the total lifetime inconvenience of password management system changes and minimize the risk of transcription errors that might result from ...
According to this heartbleed mass test, Stack Overflow is vulnerable whereas google is not. I use my Google ID to logon to Stack Overflow (and some other sites). Do I need to change my password? In other words, is it the account that determines safety, or the service used?