instruction
stringlengths
24
29.9k
How can I implement a cryptographic hash function using the block cipher? I was wondering whether I can use AES in cipher block chaining mode to achieve this.
This may be a unwise question, but I'll ask anyhow. I have been analysis relatively a bit about the Heart Bleed vulnerability, and I'm curious as to whether it only affects web applications or could affect any routers?
Our old computer is getting replaced, and I want to secure the new computer right from the get go. So I figured if I install something like VirtualBox first thing, I could then create one very powerful VM for my family to use. My old computer was plagued with viruses and trojans and rootkits that i couldn't pull out o...
In a discussion about the recent OpenSSL information disclosure vulnerability, the subject of OpenSSH being vulnerable came up. While OpenSSH is not vulnerable due to the problem lying in the TLS handshake, it opened discussion for the security of OpenSSH on FreeBSD. Theo de Raadt had this to say: ... as long as you ...
In the comments to this question it is mentioned that even after a backup recovery malware still can persist. Do I understand that correctly? How is this possible? If Acronis True Image is used to make a backup of a disk would restoring a clean backup guarantee the removal of any malware? For example when recovering is...
I would like to use Gladman's algorithm to create AES encrypted data in JavaScript. I use the Crypto-JS library, but its performance is horrible. PBKDF2 is terribly slow, so I switched to another library (SJCL) which seems to be over a lot faster. Crypto-JS has a special Gladman mode to give the same result as Gladman'...
I had generated the CSR with OpenSSL. Do I need to regenerate a new CSR with no vulnerability due to OpenSSL in order to obtain a new certificate from a CA?
in the hybris of leaked ssl-private-key everybody cries for new certs and new keys. my question: how would one generate a new and valid ssl-cert with the private key from my website? our certs are usually domain-validated, meaning that ssladmin@domain.com usually gets a ntoficiation on issued cert-requests p.s. i'm not...
I'm considering moving to a password-management strategy based on supergenpass or something similar. This is an alternative to other password managers where instead of having a database of passwords encrypted on your master key, your password for any individual site is a hash of your master key + the site's domain name...
If I understand correctly the hearbleed vulnerability, only the heap of the OpenSSL process can be retrieved by an attacker (or part of depending on the memory allocation type that is used). Then, how comes the OpenSSL process keeps in memory what it has encrypted/decrypted previously ? It seems obvious that given the ...
I am working on a vein pattern recognition project based on SURF algorithm and euclidean distance. I have completed my program to find the maximum and minimum distance between vein features and find a match exactly when there is an identical image. i.e max and min distance between two images is zero. In this case, how ...
I analyzed the TLS (1.2) handshake and I didn't manage to understand the message after the Change Chipher Spec Here it is: It is called "Encrypted Handshake Message" by Wireshark and it is sent by the server to the client and vice-versa. What is the content of this message? It should be the Finished message but what ...
"The fix for this bug is simple: check that the length of the message actually matches the length of the incoming request." Why do we even have the client report the length at all? If we can know the length of the incoming request, can't we just infer the length of the message from that? (This is a programming and prot...
I wanted to use sharable plugins for an application. However, the plugins were extremely time critical, so I wanted to distribute them as C libraries. Now, these are not guaranteed to be safe (the programmer could user system calls or cause segfaults). Then I had this idea: The application puts its source code through ...
In my opinion, it should be possible to forge DNS reply so it doesn't include DS/RRSIG/... parts for any request, thus bypassing DNSSEC validation of resolved domain. Is DNSSEC system immune to this kind of attack? Does Unbound with locally stored DLV and ROOT anchor files make any difference?
I use Linux, and even though I'm not pretending my system is virus-free, it's generally accepted that even an aggressive firewall is not a requirement. I want to install Windows 7 on a machine which I will use strictly for playing games. Browsing on it may even be discarded, if necessary. So, for the two to three hours...
Read about the vulnerability and decided to check out the site. Receiving a response from the php code was surprised. Look at the screenshot. Perl-script: http://pastebin.com/rL0XkewP Hackers have already got down to business?
I was reading some blog posts about the Heartbleed vulnerability (who's not nowadays) and was thinking about the following. Situation A If I would use a regular SSL/TLS connection the handshake will determine a key to be used for the session which is exchanged over the Internet, and is encrypted with the private key o...
What are major DNS services offered that aren't state-controlled. Better yet, why can't we take Bitcoin's model and create a truly decentralized system with P2P DNS? I see potential reasons behind P2P DNS: Logistical nightmare Endless domain registration Much like shift from ipv4 to ipv6
I found the file /WEB-INF/web.xml on a domain I'm associated with. The XML file contains: <database> <jndi-name>jdbc/mysql</jndi-name> <driver> <type>com.mysql.jdbc.jdbc2.optional.MysqlConnectionPoolDataSource</type> <url>jdbc:mysql://127.0.0.1:3306/[domainWasHere]</url> <user>[userWas...
So we now know who wrote the bad code (Robin Seggelmann). And we have an idea of why it is needed: Why does TLS need an explicit heartbeat protocol? We can also understand why the client supplies the length: Heartbleed: Why does the client supply the length of the message at all? But who proposed the form of the ssl h...
In the past month I've seen a better grade growth in sites that have clickjacking scripts that make you like the webpage or the Facebook site's Page when you click anywhere on the page. I have even seen sites that have this for "on Page close". I am curious if there is a way to protect myself from such scams. Turning J...
Today when I visited drive.google.com, I was auto-directed to http://drive.googe.com/router.php After clicking on "Exit Now" on that page I was redirected to http://globalreward-zone.sweepclam.eu/home.html Is this some kind of scam? How to avoid this? I'm running Firefox on Win7.
I'm employed as a consultant at a big tech consultancy. I recently noticed a major flaw in their website, they send my login credentials in plain text over HTTP. I verified this by doing a outbound packet capture and lo and behold there were my credentials plain in view for anyone to see. What's worse the credentials w...
I am planning on creating a text file to store my passwords, so I only need to remember 1 password (at the moment, I have about 20 long/complex passwords in my mind, and am worried that I might forget 1 or more of them). If I create a text file, store the passwords in that text file, move that text file to a usb stick,...
It is fairly easy to detect the heartbleed exploit if it all happens over cleartext, which it seems most things are doing for the time being. However, I believe that there are some heartbleed exploits occurring after encryption because the RFC allows (and suggests) that heartbeat requests be sent encrypted. From RFC...
I've heard that ISPs provide some kind of protection; using NAT and firewalls, to prevent hackers from using tools such as nmap to attack customers from over the Internet. What other technologies are being used by ISPs to secure their customers and what are the limitations of this security?
How can I encrypt my bash shell script on Linux server The shell script contain credentials of other servers for remote access. The problem is I do not want others with same level of access to view the shell script, modify it or get credentials. Is there any way to encrypt my shell script? My Initial research let me in...
A VPN is a Virtual Network that is used to hide IP address of the attacker. A Hotspot Shield is also used to change IP address which hides the origin IP. What is the difference between VPN and Hotspot Shield? What is more secure to use?
Received: by 10.182.241.38 with HTTP; Sat, 15 Mar 2014 14:09:36 -0700 (PDT) In-Reply-To: <294B46790F860A4B9790B42606DFA3E4E4E5AE@MAHEXMB02.thrivehosted.local> References: <294B46790F860A4B9790B42606DFA3E4E4E5AE@MAHEXMB02.thrivehosted.local> Date: Sat, 15 Mar 2014 14:09:36 -0700 Delivered-To: stevedunn2@gmail.com M...
Is a DOCSIS modem only authenticated by the CMTS by a MAC address or are there any other AAA techniques? In that case, how do I prevent other customers from spoofing my modem's MAC address? Cable Modem Initialization Wallchart published by Cisco in 2005:
Watching at TLS 1.2 traffic using Wireshark, I figured out that in the Application Data record, the 64-bit sequence number in some connessions is sent and in others not. Does it depend on the Cipher Suite?
My team currently uses ASP.NET with MS SQL Server for our software. Security has only become important since I started, in which there is injection vulnerabilities everywhere. Due to current integration with Oracle and MS SQL the business decision was never to use parameterized queries. This of course has been an issue...
RSA (the company) devises and publishes the public key cryptography standards. In those standards, PKCS #7 is a standard which defines how to encrypt and sign messages using PKI. PKCS#7 defines a format to store the public key certificates alone whereas PKCS#12 defines a format to store both public and private key pai...
I hope this is a good place for this, but I am looking to be safe while sharing my ASP MVC project. If a page was designed with a membership provider is is possible to share this project with out leaking information about your membership provider? From my understanding it would be very difficult for another developer t...
A file is encrypted and placed on a secure FTP server. An MD5 hash is taken of the file and also placed on the FTP server. A userlogs in to the server and downloads both files, however, the hash fails to match the archive. In this case, what basic goal of a cryptosystem has failed? I have been trying to answer this que...
Currently working on verifying and signing a file via GNUPG, given that I've already signed a file, given the clients the .sig and public key, is there a way for a client to verify the file without downloading any additional software? Currently using Cryptophane from GNUPG http://www.gnupg.org/related_software/frontend...
I'm developing a REST application using the Spring Framework, as as part of the requirements, we have to secure the different functions of the system to different user roles (pretty standard stuff). My current method of determining the roles for the currently logged in user is that every time they call a REST url from ...
On a Linux system, is it at all possible to detect unknown keyloggers? Keyloggers which are new and haven't made it to any detection software's database?
I always hear that one time pad'ing something is so great because you won't know if you've successfully decrypted the data. I understand the idea that you can XOR any bits just the same as any other bits and you won't inherently be "alerted" to the fact that you used the right bits, but is this not true of any other en...
Say my home router uses an OpenSSL version that is vulnerable to Heartbleed and I have the admin page enabled and accessible from the outside (even though I never use it). What can a hacker do? Could he for example read any traffic on my router or could he maybe get access to the admin page? As I understand now, it ca...
Below is a screenshot from the paper "Prudent Engineering Practice for Cryptographic Protocols" by Martin Abadi and Roger Needham. I can't see what's wrong with the protocol and what the fix achieves. Help please? It's driving me crazy.
We are using 'crypto.js' in our application. Since 'crypto.js' uses open SSL ,are we vulnerable to heartbleeding attack? If yes, what can we do to prevent it?
Is there a way to DDOS my web app through jMeter? Can anyone DDOS with a simple PC? I couldn't find any answer here. I would appreciate if anyone could help me out.
I know forwarding ports can add some security risk, but if I forward a port to a computer, say running linux, would it add a security risk to all computers on my network or just the one?
The facts: A friend put his phone number (and possibly the IMEI) for his android device into some kind of hacking PC software that promised to (and actually did) extend his Whatsapp account that was about to expire. We all know Whatsapp uses your number as user-name and the device IMEI (reversed and md5-hashed) as pass...
Are there any programming languages that are designed to be robust against hacking? In other words, an application can be hacked due to a broken implementation, even though the design is perfect. I'm looking to reduce the risk of a developer incorrectly implementing a specification. For example Heartbleed would not ...
So, I know rolling your own security is ill-advised, but for simplistic things like communicating with a home server, say, updating a grocery list, is a custom protocol fine? It won't be doing anything that needs to be secured, so it seems fine in that sense, but I guess someone could reverse engineer packets and sen...
Whilst testing a server I discovered a botnet. I have the executable downloaded to the server and decompiled the file to get the strings from it. My question is what would the next logical step be and how best to further decompile the evil httpd file? Also what would be the right thing to do (I.e. take over the botnet ...
As you already know, due to the heartbleed bug, we need to perform re-keying on our web servers (>10), before I do that, I want to check if my proposed strategy is a proper way or not a. Generate a new CSR, submit to Godaddy to re-issue the cert b. Install the cert and key on web server, and restart as fast as possible...
Some firewalls (like the first figure in 13.1.4 in http://doc.m0n0.ch/handbook/examples.html) allow user to specify source port in a firewall rules. But in a TCP connection, the source port is randomly selected from 1024 - MAX. So my question is, why we need to have a source port field in a firewall rule? And we can se...
Would an encrypted connection be able to bypass a firewall? A firewall is working on layer 1-4 of OSI model, the encryption and decryption is done in presentation layer (layer 7 of the OSI model). Can encryption may bypass a few rules?
Is it possible to use running SSH agent to decrypt some data (supplied as a string or read from file)?
I have been in a discussion lately with our security team, and I want to get an answer from this group. Currently our security policy states that domain accounts will lock out after 5 failed attempts. This goes for all domain accounts, including service accounts. To be clear, I refer to a service account as an acco...
I'm trying to understand the file format of the secring.gpg file. I couldn't really find any official documentation of the file format so I decided to create a new key-pair and use the S2K (string-to-key) function simple S2K, which basically means that the entered passphrase is only hashed once with the specified messa...
I've been developing a small CRUDish Ruby on Rails application on my free time for a non-profit organization. The app is already running in a small scale in Heroku. Lately I've been thinking about open sourcing the application. There are many pros for this, eg. I already know a couple of possible contributors, and even...
I've seen a number of articles on the heartbleed vulnerability that suggest testing your site to see if it was affecting using Filippo Valsorda's testing page which can be found here: https://filippo.io/Heartbleed/ When I put the URL to my site into here it says everything is good. Is this sufficient for determining i...
I'm only taking about security against bruteforce attacks. I assume that most crackers start at a and go up to zzzzzzz for as long as instructed (so it could be zzzzzzzzzzz if told so in the programming), as randomly guessing, storing the list of guesses, generating a new random guess, checking it against the list of o...
I want to develop an extension which will stop an user from proceeding to any banking site (configurable by user) if a proxy like paros is seating in between sending fake certificate to user. My extension will compare the certificate presented from an external different source (XHR) with the one presented by browser an...
There are many fields on a certificate revocation list (CRL) like Algorithm, Parameters, Issuer Name, This update date, Next update date, user certificate serial #, etc. While I understand the purpose of most of the fields, of what purpose is the field "next update date on a certificate revocation List?
Let's assume a service-oriented architecture (SOA) with hundreds of services. The services are completely isolated – what is behind their APIs is an implementation detail. Different services can have different security policies – i.e. who can access the service. For example, a service can be fully public, accessible to...
I have snort configured to log unified2 in my snort.conf file and am using barnyard2 to parse the unified2 results. It works, except I can seem to figure out to pull the event reference (xref) out of the data. I have my reference.config file with the different URLs and the sid-msg.map file has all the signature ids a...
I'm working on a website that allows a current user to invite another individual to be friends by typing in the non-user's email address. The non-user would then receive a custom registration url by email which would, when used, automatically connect the two users, giving each access to the other's private information....
How do I avoid nginx processing a request with an undefined server name using the https protocol. The following configuration makes this work for normal http requests. It resets the connection for requests with empty host headers which equals to server_namein the nginx configuration: server { listen 80; se...
Is it possible for a site to host malware such that if a certain page is accessed, Firefox is made to send additional GET requests? I'm seeing traffic for attacks coming from me that I haven't done. --- clarification "I" am sending SQL injection strings, when really I am not; ajax can do this?
Not really computer related, but I hope someone has the answer. How do people decode messages from an Enigma machine? I understand that if you knew the rotors, rotor positions, and plugboard the message was encrypted with, you could decrypt it, but how did other Nazis know those settings? They must have had to have a s...
I have a SMTP server where all the users (for an unrelated reason) will have public keys tied to their username and registered with the server. I want to add a non-standard extension that uses these existing keys for authentication. My understanding of the SSH key based auth is that the server encrypts a random number ...
What's some good advice on eliminating collisions when hashing things? I need a unique identifier for all my users, but I want them to be private. I'm thinking of using ODIN-1 (https://code.google.com/p/odinmobile/wiki/ODIN1), a sha1 of different device-specific identifiers; MAC for iOS, AndroidID for Android and Devic...
We have developed a search engine (simple search, no login required) where users can search details in the database (Apache Lucene) by entering their name (et. al.), then clicking the search button. The search invokes a asynchronous HTTP GET request (an AJAX call on the same domain) to the server which in turn calls th...
Google Chrome doesn't do typical CRL/OSCP checks, instead it depends on CRLsets. In simple terms, Google scoops up the CRLs from most CAs, trims them down and delivers the CRLset to the browser via the update mechanism. They claim this is more secure, but it only seems to artificially speed up the browser. Soft Fail M...
Background: I am currently trying to crack a salted md5 hash which I have recovered from an embedded device running busybox and manufactured in china. I have tried john the ripper using all of the wordlists I could find in Kali. I have tried cloudcracker and that returned no results. I am currently brute-forcing on a m...
I have been following this very useful post by Thomas. My use case is slightly different. I am developing a mobile application which requires some sensitive data to be stored on the device in a SQLite File. I am using SQLCipher for encrypting the file. The encryption key is based on a 10 character long(at least one upp...
We use a well-known service provider/API management gateway that sits in front of our RESTful APIs providing key management functionality etc. etc. The service provider was running the dodgy OpenSSL version. None of our web services have SSL enabled, though we use API keys to throttle API access, measure usage. Traffic...
me for learning SQLI. But I got stuck at this one regex which seems to be unbreakable : document.loginForm.username.value = document.loginForm.username.value.replace(/[^a-zA-Z0-9]/g, ""); If someone could give me any hint to this one? :) Thanks
BlueStacks is an android simulator for desktop. After installation it will ask you to login with your Google account to download and install android app from play-store. My question is "Is it safe to sign in to Google account with password from a desktop app"?
I am designing an authorization framework and now I am thinking about the error codes which I should return when someone is trying to access a resource and he doesn't have the required permissions. These are my thoughts so far: case: The user is not authenticated, he is seen as "anonymous" -> Here I think 401 would be...
I'm developing an application (C#) for Microsoft SharePoint platform that uses SQL Server's (2008 R2) Remote BLOB Storage (RBS) technology. To accomplish certain client-side tasks, I must obtain username/password pair from the database and pass it to a constructor that looks like this (MSDN): public BlobStoreCredential...
I need to login desktop application while autostart on server (like skype does). What is the best practice to save authentication token (password)? Should I use something like RSA encryption (which typically used for .config connectionstrings encryption in ASP.NET applications)?
I am using a Proxy for example UltraSurf, if I try to open a URL in my web browser, obviously web browser is going to send this information to my Proxy, then Proxy is going to communicate my Gateway. So my gateway or firewall will know which URL I am trying to open? if no then how proxy hides this thing? Updatedd - Mor...
We are in the process of implementing a Bring Your Own Device policy to allow our many employees to use their personal laptops and desktops (Windows platform) to VPN into our company's network. These employees will then remote desktop into their PC's located in our internal network. Since we are PCI compliant this brin...
first post here so be gentle please! I understand the Heartbleed vulnerability concept, and I have a general grasp of Python. I'm struggling to understand the PoC Python code though, so was after a bit of code dissection :) Particularly the two sections where it defines the 'hello' and'hb' message? I watched the messag...
It seems somewhat unsafe to move the private portion of one's key around to multiple machines...but it also seems odd to have multiple identities floating around.
I ran TestSSLServer.exe (from http://www.bolet.org/TestSSLServer/) against a web server in my organization. The results seemed self explanatory save for one section I'm not sure how to interpret. Here are the full results of the scan: C:\temp>TestSSLServer.exe 1.2.3.4 443 Supported versions: SSLv2 SSLv3 TLSv1.0 Defla...
I am using HOTP to generate OTP to validate a request, in order to prevent replay attacks. I'm thinking about using a window of 10 (or so) iterations to accommodate a possible mismatch in the counter of client and server, but i am a bit concerned about the way i should treat those iterations. Should i reject every toke...
I use my personal computer for both programming work and gaming at my free time(and sometimes penetration testing) all these in different operating systems each. The problem is that I dont really trust Windows security wise(which will be used for gaming). So I figured a solution to having 3 different drives, 1 for Win...
What is the difference between these openssl commands: "openssl genrsa" "openssl genpkey" "openssl req -newkey rsa:bits [everything else]" Which one should I be using when preparing a new CSR?
I am working on a web site and am considering using OpenID for authentication. The site will have some low cost ($3-$5) premium services, but will not be protecting particularly sensitive user data, just saved game state. From my point of view, my main concern for authentication is that the person who paid for those ...
My IP address is 181.224.153.95 Domain: www.ashaybythebay.com FTP Hostname: m23.siteground.biz I added private domain servers to my domain name ashaybythebay.com and I see the two IP server addresses listed in my DNS settings. Here they are on the robtex.com report. ns1.ashaybythebay.com. 600 IN A 181.224.153.233 ...
I am creating a database to store our client's information at work (a heritage center specializing in DNA based genealogy). Once the results of a test come back, we have people that use the information generated on sites such as 23andMe to find relatives and send out invitations for relatives to connect with our clien...
What I've Read I'm read the following resources on session fixation, but I'm still having difficulty understanding some aspects of this kind of vulnerability: Ruby on Rails Security Guide § 2.7 Session Fixation. Preventive Measure for detecting Session Fixation attacks. Session fixation attack. Wikipedia: Session fixa...
In the Blue Midnight Wish (BMW) cryptographic hash function, is there a variable I can use to increase memory/CPU resource consumption to slow down the password hashing process? Call me crazy, but I really like BMW and I'd like to use it to hash passwords. It's obscure, so a bit better, but I am also paranoid, so I nee...
I plan on installing a VPN server on one of my computers that is running Ubuntu for purposes of connecting to my local network while I am not at home. At home I also have a desktop computer (separate from the one I'm going to install OpenVPN on). My question is: is there any point to connecting my desktop computer thro...
I want introduce Flurry API in my iOS app. But I heard since 2014 Australia start an act to against web page and mobile app to collect user information. My question is simple: Does using of API Flurry break Australian law? or any kind of regulations? P.S. IN CISSP, Law and regulation is part of Information Security. ...
So, I am wondering - is it possible for an attacker to sniff traffic on an Ethernet connection if they are not physically plugged into the modem/router hardware but they are connected through wifi? In this scenario the attacker is connecting via wi-fi and the victim is connecting through Ethernet. So both the victim an...
I noted that on a lot of money-related websites (banks, paypal, etc), you are brought to a page that "logs you in securely". This is an example of one: Meanwhile, websites that also store very sensitive information, such as google wallet, facebook, etc (all of which use SSL), don't use this page. What is the advantage...
Through reading from multiple sources and watching Security Now's How the Heartbleeds, I have come to the understanding that the following procedure is recommended to be safe from the Heartbleed vulnerability (assuming that the user's browser reacts correctly to revoked TLS certificates, which I know may not be the cas...
I have a VM in VirtualBox with two network adapters: a Host-only adapter and a NAT adapter; I was wondering if the VM gets compromised, is my Host-only adapter putting my host in danger? --- reasoning: Host-only to putty in NAT for internet access
I'm having problems with SSL certs and my SSL accelerator. I have a Sonicwall SSL-R and it only supports SSLv2, SSLv3, and TLS1.0. I have it configured to decode SSL with SSLv3 as the TLS1.0 implementation on it doesn't seem to work with most browsers. So with it configured as SSLv3, it works with Chrome, Safari, an...
So, I'd say I'm one level above n00b. I've gotten to the point where I have accomplished a WPA Handshake (and saved the output as xxx-01.cap). I have also downloaded these hash tables (if that is the right term for a .hash file). I've learned how to use crunch - but it is obviously insanely slow. I read somewhere that ...
I have seen some suspicious outbound communications blocked on my VPS, which hosts a small experimental Web site, and want to find out which application is making the attempt. The server is running CentOS and I'm using iptables for the firewall. Here is an excerpt from my iptables rule set: # create a new chain for r...