instruction
stringlengths
24
29.9k
Is/was CNN Money Portfolio ever vulnerable to heartbleed? It states 256 bit SSL bank level encryption on the website..
We currently have the need to authenticate and verify generated keypairs. Our system allows users to register for our service which generates them a key-pair for use on our network. We are in need of a way to authenticate key-pairs so that we can verify they were generated by us, and not by someone else. Is it possibl...
While reviewing code for a vb.net application I have come across the following implementation of stored procedures using ExecuteDataSet Result = DBInstance.ExecuteDataSet(Name, paramArrayList.ToArray) Here, 'Name' is the name of the stored procedure and the input parameters from the client are passed in an array. 'DB...
After installing a CAcert personal certificate, every time I land on the BBC weather site it asks me to identify myself with a certificate. Why would any non-malicious web site do that unless I've requested to sign in first? The weather report is visible, so it's not like authentication is needed for any content. The ...
Chrome just warned me about malicious content when visiting a site - so I visited it. The source code is like the following: <html> <head> <link href="images/DPT2.ico" title="Dynamic PowerTrainer Manager" rel="shortcut icon"> <title>Dynamic PowerTrainer Manager</title> </head> <frameset rows="94,*" border="0" framebord...
I am learning about SSH and how to use it to secure file transfers and commands between a windows machine and a Linux server. Everything that I have read so far indicates that I need to use an SFTP client (like WinSCP) to connect to my server and transfer files. Gettin gin a little deeper, the docs for WinSCP never ...
As I understand it, when two systems create a secure SSH tunnel, the first step involves communicating the 'guidelines' for the encryption of that tunnel. If an third system is able to listen in on this initial conversation, wouldn't it be able to decode all of the data that is sent through the tunnel? How is the tun...
The Kohnfelder certificate standard is very similar to that of X.509 certificate standard. Comparing the two standards, does one have an advantage edge over the other? or what are the pros and cons of both standards?
As we move toward a future where fingerprints might possibly replace passwords, I see one issue. While passwords can be stolen, they can be changed by the owner after being notified of the security breach. However, fingerprints can be stolen, but they can't be changed. In this future, what happens if someone's biometri...
It is a well known fact that OS-related viruses are commonly written in low level languages like C or C++ which require direct access to the kernel of the CPU , I am just wondering if its possible that viruses can be written in high level languages like Python or Java which does not have as much access to the CPU kerne...
I got a DB (152.4 million users) (My own fake one).I did not hash the passwords, but encrypted them. So anyone that uses the same password, lets say, "123456", will have the same encryption/cipherkey. So what I need to do is extract the 100 most common cipherkeys. Keys: http://shrib.com/uPB5ALVn I did gap string db.txt...
So I want to write my own authentication scheme for a web-app server, as follows. I assume this is a Bad Idea from either security or cost-effectiveness reasons and I know the conventional wisdom is using an existing library, but I'd be happy for pointers as to where exactly I would be going wrong, since this scheme se...
I want to generate my own CAPTCHA. I am using PIL library of Python to generate an image. I would like to know how should the image be (i.e. numbers with weird font style or some mathematical calculation shown in an image (for example: 5x8)) How can I validate it with the user input? - Can I store it in a variable to c...
Put simply, CSRF tokens can be sniffed out of responses from the server unless the request/response are transmitted using encryption. Is this enough of a concern to worry about, or is it reasonable to allow the CSRF token to be transmitted via plaintext? In our case, the framework we're using provides for exactly one ...
I work for a small company who has troubles with third parties selling our products on Amazon. Sometimes those third parties have websites and when I use an IP address finder online it gives me coordinates to what I think is a proxy server because there has been a few times where I enter different IP addresses but I ge...
I wanted to check if the following means of generating a hash for storage of a password was secure. I have an username and password combo. In order to generate a secure hash, I am doing the following: gen_password = SHA256(password + "my_site_name") gen_salt = SHA256(username + password + "my_site_name") hash = PBKDF2...
I am trying to figure out if some Android applications with login functions are vulnerable to man in the middle attacks or not. I have set up a MITM proxy (as an attacker) on my lubuntu machine and set my cell phone to connect to the proxy before connecting to each app's server. Besides, I use Wireshark to see the traf...
Background The company I work for have a system with some data. This system's hosted in our private data centre. This system provides some ReST web services. We're looking to create a website, hosted in Windows Azure, which will call the above system's ReST services. Users of this website will be authenticated via ADFS...
What is the best way to accomplish this and prevent attacks like SSL Strip?
I have moved this question from stackoverflow to this place. I know it may be a question about 'opinion' but I am not looking for a private opinion but a source of the final decision to keep it this way. I have been taught that nobody tries to open a door when one does not know that the door even exist. The best defens...
I am running nmap to probe services that use SSL.¹ In order to detect vulnerability in non-standard ports, I am using the -sV option to perform service discovery. But it is very slow since it runs several probes per open port. How to make it more efficient and quicker by running only SSL probes? ¹ Specifically, I am e...
How do you know which attack method to use when using software like thc hydra, brutus, etc? e.g. http-get, https-get, http-form-get, http-form-post, etc? For example, for sites like Yahoo, Gmail, and Hotmail it's POP3. In this question, for example, the poster says he: pinged the website and obtained the IP address ...
When I first got to my university I had to provide my MAC address to get access to the internet. What I want to know is what information can they get from having my MAC address linked to my name. I use Private Internet Access as my VPN and have Zenmate for Chrome. When I'm plugged in to their network can they see what ...
If you're chatting with them via Skype, how can you get their IP address? Do you need some kind of program or is there a simple, obvious way? Is it illegal?
In my security class with David Wagner, we talked about some of the reasons why DNSSEC is not widely adopted right now. One of the reasons was that for backward compatibility reasons, clients need to accept both signed DNS records and unsigned ones. This means that websites have little incentive to start supporting DNS...
Function RemoveSuspeitos(ByVal strTXT) Dim txtAux As String txtAux = strTXT txtAux = Replace(txtAux, chr(34), "") txtAux = Replace(txtAux, "'", "") RemoveSuspeitos = txtAux End Function DB: MSSQL 1) Forget syntax errors in the above code, I am ...
I've recovered a .SQB SQL database backup file from a backup server and do not have the password. As I do not have the password available to me, I'm looking to determine what type of encryption is being used and also if it is possible to use any existing programs to crack the password. Based on this link I believe the ...
I'm going to build a demo affiliate network, which needs to be secured. Let say I have a web application called Affiliate Network Manager that manages all affiliates associated with my online book store. Affiliate Network Manager provides an API that enables a publisher's web site (an affiliate site) to get the logo o...
I have an X509Certificate (say Certificate-A) for signing purpose. While validating this certificate, I have to check its path with Intermediate & Root certificate which I have implemented fully. There is a custom extension in this Certificate-A which has a another signature as its value. While validating this Certifi...
I wouldn't bother asking this question if it was easy to find. In the past I've used a risk-analysis-checklist which was split up in serveral factors. For example, there are Human factors, Hardware is one, Organization is one of them and Environment too. I've lost this list and I wonder if anyone here could share this ...
According to news reports, arrests have already been made in relation to the Heartbleed bug. It sounds like this person managed to gain access to the website's database by capturing the credentials the app used to access the database. This person then apparently used those credentials to access the database. My questio...
Some dependencies were missing when I installed THC Hydra. I found this site which directs me to install the missing package: sudo apt-get install libsvn-dev libapr1-dev libaprutil1-dev But when I try this, I receive the following error message: -bash: -sudo: command not found I tried searching the web for how to ins...
I see PCI compliance related only to password security, as far as storage and transmission goes, for user names and email accounts. How does this relate to passwords for programs that run on a PCI compliant machine? For instance: Someone transmitting plain text passwords from a configuration file in an email. Is this c...
I was going through some CLIENT side defenses against reflected XSS e.g. XSS auditor(chrome), IE8 XSS Filters, Noscript. They use regular expression and other sophisticated techniques. My question is- why don't we store what ever is going to server as parameters and if these parameters are reflected in HTML response th...
On Stack Exchange's Add Login Credential page, one can add logins with Google, Facebook, Yahoo, etc. How many logins should I have to provide best combination of: The least chance of a hacker gaining access to my Stack Exchange account. The best recovery in case they do. One? As many as possible? My possibly incorrec...
I am building a license generator for nodejs and I am currently testing on Heroku. On my local machine running OpenSSL 1.0.1g, I'm able to test my key pairs (sign and verify) like this: # data.txt's content (the content of the string literal): "Tsenkov" openssl dgst -sha1 -sign private.pem data.txt > license.txt openss...
Is there any kind of protocol, scheme, or theoretical paper out there that implements or examines the problem of establishing trust between two parties (communicating, listening) where the communicating party initiates contact and does not have a key/secret/password known by the listening listening party; but the liste...
I own a Javascript application (Single Page Application) hitting some apis from my own RESTful backend. What I expect for my authentication/(authorization) mechanism is three things: Preventing all known malicious ways of stealing or acting on user's data: CSRF, XSS etc.. Allowing only my Javascript official client t...
So I'm just poking around the TCP/IP protocol using a Ruby library called PacketFu, and it seems to me that in each packet, it is possible to set all of the following Source IP Destination IP Source MAC Address Destination MAC Address and a whole bunch of other things. Here is my question: What prevents me from sniff...
I came across a project called jCryption 3.0, which encrypts data between the client and server, without using SSL. If a website's JavaScript had used jCryption 3.0 to encrypt login form fields before sending them (over SSL) back to the server, would this technique have mitigated a potential Heartbleed attack? This que...
So I was just thinking about how ARP poisoning can be used to intercept a clients request, forge an SSL cert, and send it back, with the caveat of not meeting certificate validation, but what if I were to intercept a client communication, send back a 301 to the http version of the site if the request is SSL, and then a...
When preparing to encrypt an entire partition, is it better to rely on "native" whole-disk encryption (eg following this tutorial), or an external tool like TrueCrypt? The wikipedia article comparing disk encryption tools doesn't seem overly helpful to me in working towards a decision.
I just read about Indosat trying to take over the Internet by mistake. I read on a Polish infosec-related website that most of their announced routes failed to propagate, but some of them reached the whole internet. This made me wonder - what security mechanisms protect the BGP protocol and why did they fail for these ...
It looks like msfpayload now generates a powershell-based payload when you pass it windows/reverse_tcp_shell. Is there a way to generate a regular cmd.exe reverse shell instead? Thanks!
In Bruce Schneier's book Applied Cryptography (1994?) he writes The NSA uses its power to restrict the public availability of cryptography, so as to prevent national enemies from employing encryption methods too strong for the NSA to break. My first question: Is this still true today? My second question: If this ...
Is there to be a review in the code of OpenSSL any time in the near future? It seems OpenBSD is doing a controversial one, in that the review is also "Ripping out some windows-specific cruft". But is any actual security firm doing a code review, or are there plans by the OpenSSL project to hire one?
I know that some of PHP's random functions are insecure due to them not being completely random and are considered a bad practice. My question is how an attacker go about finding that the developer used an insecure function to create a token, such as a forgotten password token or CSRF token?
Take for example a game. Typically, when you buy or download a game that can be played offline, all of the data required to run the game is shipped with the executable. In order to protect these resources, developers use various protection methods such as passwords, encryption, compression, file archives, anti-debugger...
Nodes don't know each other's IP address right? So how do they manage to address one another when it comes to sending data?
In many places a common practice is to connect in a backup drive at the end of the day and let the computer do an automatic backup in case of an emergency. I have been doing that for the past 2 years until the day I needed to use one came, my computer was infected with malware but as I booted up in linux and inserted m...
If someone uses a password manager and tries to organize the credentials well, doesn't that make attacks easier? Let's assume an attacker has the encrypted credentials available for offline attacks, and the attacker knows which software was used to save the data, and that he also knows what the credentials are used for...
I'm testing a client's web site vulnerability to SQL injection, which appears to be the case. The web site is hosted in IIS on a Windows server and is using Microsoft's .NET framework with SQL. I'm able to enter SQL statements in the sign in form. But when I enter ' or 1=1;-- in username, it replies "Your Account Has B...
This question seems to be related to https://stackoverflow.com/questions/15913200/facebook-js-sdk-not-executed-in-my-chrome-extension , but I am not developing a chrome extension. I am developing a normal web application. I am trying to integrate Facebook login on my website, which has a tight CSP policy. I am followin...
For various reasons I use both Keepass 2 and Lastpass. They have 90% the same password database. Is it secure to be using and maintaining both of them? Is it secure if they both use the same password (or a very similar password)?
PGP has been around for almost 20 years, but email encryption is not used by most 'regular people'. At the moment, with Snowden's NSA revelations (which should not be a huge surprise to anyone), the Heartbleed bug, etc. many people are becoming more interested in encryption and privacy, but email remains one of the way...
After reading this question about if it's safer to download and compile the source for an open source project or download and run the installer, I thought of another possible vulnerability: is it conceivable a compiler could be designed to leave a back door (or other malware) inside a file it outputs? In other words co...
Most webmail services like gmail, facebook, yahoo,.. allow anonymous to create a mail address. If there is a security breach, user may lost important information on that address. They may add phone number as a security layer, but even phone number can be lost and not guarantee security (in many countries, anonymous ph...
This is extremely strange but I have already tried this twice and am completely sure it is openSSL and not me doing the bug. I am encrypting the data 'Hygiene' with the password '*' (sorry can't tell you this) and get the ciphertext '3/mEwtZdIuIV5wwsQAcnAw==' then I changed the last charecter to '-' and when I decrypte...
I have a website and I want it to be accessible only by authorized clients/browsers (ex. with a certficate). The idea is that the users can only access the webpage in their office's computers (situated in different geographical areas, and they're different companies, so I cannot check IP or install something manually...
I'm curious is it possible to hide the ip address in a peer to peer connection. Mainly considering you have 2 computer connected remotly in a browser session. I would like to know if it's possible to hide the ip. Lets say A chats with B in a browser session chat build with Java script. But i want that A not to be abl...
I have set up a page and database so I can practice SQL injection. Ive tried some examples and it doesn't seem to work. It seems to add the username and password to that database, even though I input an Injection in the username field. Here is my code: include "Connection.php"; <form method="post" action="sqltest.php"...
I'm trying to figure out some possible attack scenarios for a project I'm conducting. I've read plenty of material about malware and, in particular, spyware and trojans. While it's hard to find unique specific definitions for both of them, which however I'm not really interested in, I came to the conclusions that, roug...
I'm trying to make a web application in Java with a login/session system using com.sun.net.httpserver and as far I know, it does not have an inbuilt method to this. So, I had the following idea: User try to login using a form in POST method. Login success Server generate an unique session ID string and send it to the ...
I know I can add a self-signed certificate from a website to Firefox, but only in the CA list of it. Question: does this mean I have to ultimately trust that self-signed certificate? Can someone sign with that self-signed certificate ex.: google.com, and since the cert is in my CA list, I wouldn't notice when visiting...
I'm designing an authentication methods for my client/server system consisting of: a windows desktop client application (.NET) windows/linux servers (C++) one "security server" which authorizes the users and passes some tokens for single sign on to the other servers A user would login providing username and a passwo...
What is the difference between CMP and SCEP protocol? Which one is better?
I'm thinking about implementing certificate pinning in a mobile app. The app will need to connect to several secure sites. Rather than having to update the app every time one of their certificates expire, would it make sense to: create a self-signed cert with an expiration date far in the future publish a list of vali...
If I have a Live USB Linux stick and I plug it into a computer which is not connected to the internet and boot the computer using the Live USB stick. How secure is this interms of not leaving any traces of work I do via the Live USB stick? i.e. will any traces be left on the host computer once the computer has been s...
I am reading the documentation for Kentico where it describes using hashes to validate query strings EX:http://localhost/KenticoCMS8/cms/getfile/2d003444-9a27-43c9-be97-4f5832474015/Partners_logos_silver.aspx?latestfordocid=75&hash=eee41e027bd45142fd1f44d173d61950f34d6e98f4e35018fda70542322adc77&chset=013bca78-6bf2-42a...
I was going through some CLIENT side defenses against reflected XSS e.g. XSS auditor(chrome), IE8 XSS Filters, NoScript. They use regular expression and other sophisticated techniques. Why didn't they use any simpler idea? My question is- why don't we store what ever is going to server as parameters and if these parame...
My question is pretty similar to : https://stackoverflow.com/questions/5487757/using-hmac-sha1-for-api-authentication-how-to-store-the-client-password-secure. Basically, I want to write an API for my service that allow a user to log into it and grants them access to the rest of the API calls. I want the API to be hook...
I am writing a web backend/api for an iOS application using Node.js and MySQL. In my database I have a table for posts. I would like the posts content to be encrypted. Let's say I'm using this AES for encryption. I would like to be able to safely encrypt and decrypt data on the server. Data sent back and forth to the c...
I've been trying to figure out a way to efficiently bruteforce on Windows, but the method I currently have isn't very efficient. I did some profiling and found out that on average it can go through 274,080 attempts per minute, which would amount to a worst case scenario of 18 hours to crack one 6 character password wit...
Correct me if I'm wrong: When encrypting a file, GPG creates a one-off AES encryption key and encrypts that key using RSA. This is supposedly to take advantage of AES's superior performance when handling larger amounts of data. If that's true, then why is gpg --encrypt so much slower than, for example, p7zip's AES-256 ...
I have a standard forum, currently plagued with bots. In the registration agreement, I included the following text: SPAMBOT OWNERS, YOU HEREBY WAIVE ALL YOUR RIGHTS TO PRIVACY. ANY AND ALL INFORMATION YOU OR YOUR BOTS LEAVE, INTENTIONALLY OR ACCIDENTALLY, ON THESE FORUMS CAN AND WILL BE EXPLOITED. YOU HEREBY ALLOW US ...
I am creating a portal where users can send private messages (PMs) for a very large audience. So I want to encrypt the messages and store them in the database. But I do not want to ask the users for new keys. So here's what I have planned: A randomly generated symmetric key will be allocated to every pair of users, whi...
Read some of the stuff here regarding wiping disks and securely deleting files. From what I've understood, after deleting (not securely) files they become part of the unallocated(free) space of the HDD. So if I want to securely delete the deleted files should I wipe the free space only or by keeping this link in mind ...
I've been learning about Cyber Security and how to protect myself online after reading some books on the subject and I want to know how much Information i've handed out to companies.
I have a general question how asymmetric schemes are usually implemented. Typically, there is a parameter in an asymmetric scheme which limits the message length. For example the modulus in RSA. I know that asymmetric encryption is usually used to encrypt a symmetric key and the actual message is encrypted with the lat...
There are some software that states that can crack WPA networks, however that is not an easy task as the initialization code for WPA2 uses a four-way handshake to properly initialize all of the vectors that are used in the actual encrypting. So in order to properly break it you need to sniff the traffic that gets sent ...
Is my computer vulnerable to someone who knows my modem's MAC address and my public IP address? What kind of vulnerabilities would this imply? Could they actually get access to my computer just with this information?
I've been reading for a while but yet do not properly understand how is BGP filtering used to prevent "attacks" such the recent Indosat's problem. Do not copy&paste Cisco's site, I have read all that information already.
I analyzed PDF, and extract javascript code. But javascript code is encrypted. I can't decrypt it. Please advise me. javascript code \040\040\040\040\146\165\156\143\164\151\157\156\043\164\151\157\156\040\163\167\050\051...
I'm trying to write Iptables rules for a small web server. Almost every source I've encountered recommends to allow loopback access to the web server, but doesn't explain why this is necessary. What's the purpose of this configuration, and is it really secure?
It is interesting to observe, that Tor exit nodes with out-of-date OpenSSL implementations can themselves be affected by the Heartbleed bug. Can Heartbleed expose a Tor user's IP address merely by exploiting the vulnerable Tor exit node, or would all relay servers in the chain have to be vulnerable as well (and simulta...
I am looking for mod_ssl configuration which protects against common attacks like Breach, Beast and Crime. I already disabled gzip to avoid Crime but I'm unsure about the others. RC4 should only be available to mitigate Beast. Furthermore I am looking for a proper forward secrecy if possible. This is a part of my curre...
I'm a masters student in computer science who works part time with my own company as a consultant. My lastest project is based on my bachelor thesis which handles everything except the security. The application will be audited by a much larger company than those who hired me and one requirement in the audit is dual lay...
I'm pen-testing a Windows 7 machine, and have access to a limited remote shell. I can see there's a vulnerable SMB service running on the machine's loopback, but it's not available externally. Is there any way I can run a metasploit exploit over the session I already have, to access this service? Thanks!
One of the extremely valuable functions of a Trusted Platform Module (TPM) chip is its ability to seal a private key under the hash of the code that will use it. This means that one can create a private key which can only be read by a a piece of code that hashes to a certain value. By using this technology, we can esse...
Is there any available tool which can check kernel 3+ system call table for modifications? Also I want to know, is there any automated general tool to check Linux for unknown rootkits? Not like rkhunter etc. which is mainly signature based, I want something like GMER for Linux, check for code modifications, kernel hook...
JavaScript based OAuth exposes the client ID of the application and it trusts only on the domain requesting the access token. The domain name can be forged with a DNS hijack (or a virus affecting /etc/hosts). Then why is JavaScript based OAuth supported by Google, Facebook for clients not using HTTPS? Or am I missing s...
I recently generated some custom Diffie-Hellman parameters which are basically just long (in the below case 4096 bit) primes. Those are then used in the key exchange process. I used the following command: openssl dhparam -rand – 4096 Now I really wonder what OpenSSL actually does if I do not generate these parameters ...
Though pretty interested, I'm everything but an expert in Information Security, please redirect me to any helpful resources if my question is stupid or correct me if my assumptions are wrong. When reading through the Keepass Security page it seemed to me that the workflow of generating the password that's actually used...
I want to implement the following requirement. In an online Bank Transaction, a User wants to send an amount of $1000 to an Account A. I want to see that the request is going unmodified to Banking Server. So, I am using a Proxy Server as Fiddler n Client Side where the user enters Account and Amount information. Upon c...
Introduction: I am in the process of building a web-based game that requires user authentication. The vast majority of other gaming sites utilize the typical username/password method for authentication of users, however, knowing that gamers are typically lazy folks, I have thought about using a new kind of authentica...
I've noticed that when extracting password hashes from a domain controller (using Elcomsoft proactive password auditor) sometimes I'll get LM and NTLM hashes and other times I'll only get NTLM hashes. I note that the NTLM + LM hashes (the accounts that contain both sets) are recovered orders of magnitude faster than th...
Let's say I know a guy is selling an SSL cert at a very low price, assume they will generate a real and valid cert for me, since I need to submit my CSR to them and they pass to the CA, are there any risks involved in buying cert from them technically? Second question is: given a cert, are there any methods I can know ...
E.g.: XORing the candidate against stored then comparing against 0. Do I need to worry? (my question is much in the same style as this question: Does bcrypt compare the hashes in "length-constant" time?)
I've been getting a lot of failed connections lately, namely from Facebook and now Google (German site works, French does not). This happened to other sites as well but these two are the kind you expect to work smoothly. Does anyone have a reasonable explanation for this? I have OCSP validation active on Firefox, i.e. ...
I plan to create an application for secure instant messaging, now I don't know whether or not I want to implement the encryption by myself. This project is also mainly for educational purpose so I wouldn't mind a bit of extra work. My 'vision' is that every device that registers for my service generates a RSA-2048 keyp...