instruction stringlengths 24 29.9k |
|---|
My college wireless network has a firewall blocking all outbound ports except 443 and 80. The wired network, however, has none of these restrictions.
I can connect to HTTPS sites (obviously). On my server host, I forwarded port 443 and wrote an IPTables rule to redirect it to 22.
From home I can connect as well as usin... |
I have a sql injection in my site and im using sqlmap but when i try --os-shell it says cannot write file due to permissions . now is it impossible to write a file to the server?
|
I read the What is the difference between SSL vs SSH? Which is more secure? , and it mentions there is the possibility they can be affected by similar attacks. Now that the heartbleed thing is out, is the ssh used in python through Paramiko affected by this?
|
Does anyone know how to fingerprint an IPS ? is there any tool available to do the job?
I want to detect snort in my network .
Would appreciate any kind of help.
|
I wonder how Shodan crawls internet-connected devices and adds them to its database. I know Google, for instance, finds new websites by following links in websites it already found, but that strategy won't work with internet-connected devices because they don't link to one another.
What method does Shodan follow?
|
With the release of heartbleed how does one protect themselves with closed source networking hardware like cisco? Especially hardware with VPN variety.
Would it be best to replaced such systems with opensource hardware setups such as pfSense or OpenWall?
|
Well, actually I know that the risk is that somebody from an external network could access IPs and hostnames of the machines on a local network, but I am struggling to understand if this is it or if there is something else.
If the devices on the local network are all behind NAT, what would an attacker do with just a si... |
What are the benefits of storing known_hosts in a hashed form? From what I read, it is supposed to protect the list of servers I am connecting to, presumably in a scenario where my account has been compromised (and known_hosts file stolen)
If my account were indeed to be compromised, having known_hosts hashed would be... |
example4.php?id=id=2-1
I came across the above injection and I can not figure out why(how) does this work and what's interesting is it returns all the records from the database.
Anything guys? educate me
Thanks
|
I am in a situation where I would like to encrypt audio and text files for an application I am working on. I did some looking around and from what I have seen the Rijndal encryption algorithm would work well for this. I found an implementation that uses .NET's RijndaelManaged class here.
In my site, I will be accepti... |
We are in the process of setting up a PCI compliant server (with Firehost's help). We are using MongoDB as our primary database. I am having some concerns about the encryption, though. Are there any advantages of Field-level data encryption over Disk encryption (maybe with something like truecrypt)? Which would be the ... |
I received an email to the email address listed on our website (it's a generic info@ourcompany.com to help "weed out" spam, whereas each employee has something like andreas@ourcompany.com to which I manually forward any "real" email that comes in through the website.)
I received the following email (with actual names r... |
We are a vendor that provides software to the healthcare industry, and our application is locally hosted on customer infrastructure. As such, we are provided with VPN access in order to be able to provide support for the software. Given the risk that a member of staff could see HIPAA protected information, almost all o... |
To clarify, my question isn't on how to protect myself from phishing. What I'm curious about is how exactly software can identify whether or not a website is designed for phishing, ignoring word identifiers/scanners to looking for spam/phishing sounding material.
|
If I am working writing a text document in a text editor (say notepad or MS word, or ...) then I can save the file and the encrypt this file. I can then try to erase the original file by overwriting it (using proper software). From what I understand there is a small (?) problem doing this because copies of the file mig... |
According to OWASP you can prevent CSRF in a ASP.NET application if you include the SessionID in the ViewState. From the article:
Viewstate can be used as a CSRF defense, as it is difficult for an
attacker to forge a valid Viewstate. It is not impossible to forge a
valid Viewstate since it is feasible that parame... |
I often use cat on the console to view the contents of files, and every now and then I accidentally cat a binary file which basically produces gibberish and system beeps. However today I've encountered a situation where the output from the cat utility got redirected to the console input so I got stuff like this:
-bash:... |
I'm generating a public PEM-format key from a private PEM-format key. I noticed that if I change a few characters near the end of the private PEM that the public PEM generated from the modified private PEM is exactly the same as the result from the unmodified private PEM.
For example, this private PEM
-----BEGIN RSA PR... |
I recently got homeland on a humble bundle and I've been getting really interested in Information Security so i want to keep learning and the best way i find is to listen to Audio books or podcast while drawing\walking\sleeping.
I've listened to Homeland and SnowCrash, i know the Cryptonomicon has an Audiobook but the... |
I am trying to see the heartbleed bug in action with my OpenSSL server application.
My server uses the OpenSSL library - openssl-1.0.1b
I successfully connect with s_client (openssl-1.0.1b) to my server. The SSL Handshake is through.
Now, I type 'B' to send in a encrypted Heartbeat to the server. But the server close... |
I am staying in Thailand right now on a "long holiday" to do some work on my laptop.
A few weeks I noticed that at the condo where I am staying, sometimes I am redirected to ad sites. I researched it and learned there may be some problem with the wireless router's security (the model, TD-W8961ND, has a known vulnerabil... |
It seems to be generally accepted the same password should not be used for different sites or devices. How different should passwords be? For example +_^gum<JW1 and +_^gum<JW2 are very similar. Does it matter what the passwords are used for, for example having two e-mail accounts with similar passwords may be poor secu... |
I have installed Tor on my Mint computer, but how do I determine if Tor is working? When I visit http://whatismyip.com, my old IP is shown. Should it not be a different IP when I'm using Tor?
Here is some information when I run netstat -ant | grep 9050
tcp 0 0 127.0.0.1:9050 0.0.0.0:* ... |
We are using heartbeat for high availability of httpd. In httpd we are using openssl of version 0.9.8 but about heartbeat i dont much about that but while search in google some sites are sayong that if u use heartbeat we are affected with heartbleed. what should i do?
|
How does DPI basically identify SSL data traffic? Just by the number “443” in port section or the SSL traffic has some other particular properties other than “443”?
Thanks in advance,
|
Is there a way to attack SHA-3, GOST, and WHIRLPOOL hash functions?
|
I have an application that runs in mobile devices and connects to my server via HTTPS.
At times the connection fail because the device has a date set in the past (before the 'valid from' date on my certificate).
I can change the application code running on the mobile devices and also can change things on server side, h... |
Yesterday, I woke my computer up from sleep mode (it had been on all day while I was at work). And my browser was open to an email account that was not mine.
Is it possible that someone hacked my WiFi and then used my computer to visit websites on my computer?
If it is, is there a way to detect when someone had access... |
I have a school project where i am supposed to implement a Kerberos based infrastructure (AS, TGS and resource server).
It is already done and working, but i started thinking about how to protect the Authentication Server against DDOS and although is not a project requirement, i am very curious about how it should be ... |
I'm working on an application which allows a moderator to edit information of user.
So, at the moment, I have URL's like
http://www.example.com/user/1/edit
http://www.example.com/user/2/edit
I'm a bit worried here, as I'm directly exposing the users table primary key (ID) from the database. I simply take the ID from t... |
I recently got a magnetic card reader that plugs into my computer because I was bored. I decided to scan my ID and bank card through it and I was surprised to see my ID number/bank card number show up plainly on the screen. Therefore, can you load a custom value onto a blank card (say, another number or SQL injection s... |
So with my knowledge of Tor, I know that exit nodes are where packets escape the Tor network and enter the "traceable" internet; ie. you can link an attack to an exit node but not the source of the attack within the Tor network. If I notice my server is getting attacked by exit nodes, can identifying as many exit node... |
Are there signatures for malicious JavaScript codes as they exist for other viruses/worms/trojans developed in other programming languages ?
If so, are these JavaScript malware signatures defined the same way as they are defined in other "standard" malwares ?
I ask this because I need to download some signatures of kn... |
The cert for our public facing site is about to expire soon. Our site is entirely http. The site runs on SharePoint, and with SharePoint working with NTLM, the credentials that are passed over the site are done so securely (not in plain text). This is for users going to the site and making basic changes (text/images). ... |
How can I create a password, which when directly hashed (without any salt) with md5 will return a string containing the 8 characters "SALT ME!". The hope is that a naive developer browsing through his user database will see the "hash", realize the insecurity of his application, and eventually make the world a better pl... |
I've read through How do I deal with a compromised server? and have followed the steps to cleaning-up/mitigating any future damage.
I'm just wondering if there are any post-clean up steps that are considered "best practice", such as:
Informing the customers of the infection and clean up
submitting the shells/infected ... |
I am a software engineer with an interest in expanding my knowledge in the security field.
In addition to security.stackexchange and OWASP, I am currently reading the book "The web application hacker's handbook".
My question is; based on your experience(s) what are worthy security certifications for a software engineer... |
I have a function that returns random unguessable keys with the following characters: a-z A-Z 0-9.
I have set the key length to 10 and I am using that for my form tokens to prevent CRSF and I will be using the same function also to generate email confirmation keys.
My question is if that will be secure enough to use?
T... |
On Android applications now some applications say that they want access to things such as speaker or camera "at any time without your confirmation".
I wasn't sure if this meant that it does not require your overt permission each time to access that resource, or if it meant that it can literally access that resource whe... |
I'm creating a web API in .Net for a web application. I'm wondering what the industry standard for login authentication is.
I know that most people believe that sending cleartext username/passwords over SSL is enough security, but I don't want to place all of my trust that SSL won't be broken in the future and I'm a f... |
(Sorry I know this is a complete noob question and at the risk of posting a somewhat duplicate topic. I have a basic understanding of public/private key, hashing, digital signature... I have been searching online & stack forum last couple days but cannot seem to find a satisfactory answer.)
Example:
I am surfing on op... |
I've heard that using encryption outside military use has been illegal for a long time in the USA.
However, I've also heard that when the regulation was updated, limits were put on encryption strength (such as key size by common algorithms such as AES).
Is this last statement true?
|
I am new here, and have poked around the site looking for an overview of which hash algorithm to use on the web and why.
It seems to be the consensus that SHA-256 or other SHA-2 family algorithms are the best because they do not have the collisions that MD5 and older hash techniques have. I'm wondering if SHA-2 family ... |
Looking at this previous question, the answer suggests that using a GET request to retrieve a CSRF token in order to make a POST is a legitimate method of preventing CSRF attacks.
I have two websites, and a form is used to communicate between them -- a login form. These two sites are on separate subdomains, and the for... |
I have huge problem with my router: Sagem F@st 3202.
Here are some Security log events:
Inbound Traffic | Blocked - Default policy | TCP
XX.XX.XX.XXX:80->XX.X.XX.XX:51707 on ppp0 [repeated 3 times, last time on Apr 23 02:32:08 2014]
Inbound Traffic | Blocked - Spoofing protection | IGMP
192.168.4.1->22... |
In order for a Heartbleed attack to happen and for someone to grab the SSL private key and even spy they have to be on the local network with a router, switch or server, correct?
Or can this be done to any server directly over the internet? I always thought packet sniffing had to be done locally
|
I want to implement a challenge-response login authentication for my web application.
My understanding is that the server has to send back the password salt for the user so that the user can calculate the password hash on the client side and then send it back to the server to compare and check if the user is authentic... |
After some half-good script kiddies found out about this exploit or DDoS method, they have been doing it like crazy to websites, game servers, and now my home servers which allows me to work on some of my client's websites and different projects for people. My ISP is calling me, complaining about it and how it is using... |
I'm trying to understand the DUKPT (Derived Unique Key Per Transaction) system used for PIN devices, but I'm getting hung up on the IPEK. This blog post has an image where the sequence is:
BDK (Secret)
IPDK (Generated, used, then thrown away)
Future Key (Generated, used in devices)
One-Time encryption key (Generated,... |
Is there a general name for this sort of cryptographic protocol?
If so what sort of assymetric/symmetric encryption functions tend to be used for this protocol?
|
What would you think about military strategist who is publishing full plans for all of important infrastructure? I think that person will be stupid.
Can be this analogy case with OpenSource?
Here is one possible scenario of attack on OpenSource systems in near future:
Say, there are enemy goverment with big budget of m... |
For example today there are ".codes", ".farm" and ".vaijes" newly available.
How do big companies like google, facebook, twitter, .. keep sure that they are the first who register their name on the new domain? Is there any contract they have with the domain registrar?
|
I want to make sure that the dynamic link libraries used by my application can't be replaced with other libraries of the same name, in order to inject malicious code. Therefore, I thought about creating a fingerprint of the DLLs before releasing new application versions.
The application would then validate the fingerpr... |
I was thinking about a situation to avoid session sharing or hijacking, validating the IP the user logged in against the ip that is accessing any page after log in.
It was working until I figured it's possible when the user are coming from other network and someone from inside the same network copied (or hijacked) the ... |
I would like to install Metasploit on an hardened OS.
For this purpose I chose Mavericks
just because I'm able to harden this OS pretty far.
I would like to install Metasploit with MacPorts because until now, all the best security tools I needed were correctly manageable with MacPorts through 4 different versions of Ma... |
I'm currently learning IKE and IPsec for an exam. I have a lot of information on how Security Parameter Indexes (SPI) are used in both protocols, but I'm having some problems figuring out the coherence.
First, in IKE, both parties share their SPI with the respective other party. I guess these will be the both SPIs use... |
Here at OU=PKI we've been requested to issue a certificate with CA capabilities to install it in our reverse proxy, so that it could issue trustable certificates for every single web. (SSL ending)
Currently it is signing them with an own non trustable Bluecoat certificate. So the browser warns you each time
Should I ju... |
I'm using SourceTree (a Git GUI) which uses PuTTY as SSH client. I need to push some code into a repository for which I need to tunnel through SSH to do so. The trouble is, the repository and SSH authentication server are on separate servers. Hence, I need to login to one server and then push to another one.
I was give... |
Several systems rely on using UID of smart card for identification/authorization.
For example database stores list of smart card UIDs and corresponding
privileges.
Given that today there exist cards where you can write any UID you want
and thus emulate say Mifare classic UID for example, what are practices
of using sma... |
I would like to know if the connection in my office is filtered, because i cannot access Faceboook neither Youtube but i can access google with no problems, but Tor i can access all the websites.
i would like to know some details about the filtering software used in my office network.
is there any type if filtering tha... |
The company I work for has a few OpenVPN servers used by over 200 employees. The servers were deployed a few years ago using the default easyrsa settings and now we want to upgrade to stronger encryption and authentication. Is it possible to change the 1024-bit CA seamlessly, like issuing a 2048-bit CA and sign it with... |
Which SSH server (compatible with Debian Wheezy) has the fewest (if any) exploitable security bugs?
|
I am using a form token to prevent CSRF attacks. Those tokens are stored and tied to a user's session. Now I want to refresh the token only every N minutes or hours so that the user's don't experience any usability issues like the browser Back button not working properly.
My question is, what would be a good time perio... |
As I was going through Crypt::SSLeay, preparing it for the next release, I noticed the following code, written way before my time,
...
int rand_bytes_read;
static int bNotFirstTime;
char buf[ 1024 ];
...
if(!bNotFirstTime) {
SSLeay_add_all_algorithms();
SSL_load_error_strings();
ERR_load_crypto_strings()... |
I have a list of 30 websites I have scanned. I need to pull out a report for each individual website. Is it possible to do? Right now I am just running a report and getting the results for all 30 and it just comes out in a huge chunk of data I dont have time to sift through.
|
I have a desktop WPF application which authenticates with Dynamics CRM 2011. I ask for the username and password of the user and use them to connect to Dynamics CRM 2011 using CrmConnection.parse("url={2};Username={1};Password{2}",CRMServerUrl, Username,Password). This class then connects to the CRM Server using the pr... |
In DTLS 1.2 RFC 6347, section 4.2.6:
CertificateVerify and Finished messages have the same format as in TLS. Hash calculations include entire handshake messages, including DTLS-specific fields: message_seq, fragment_offset, and fragment_length.
Is this the case for DTLS 1.0 as well? Cause I can't find info particul... |
I have a public and secret key pair in my .ssh folder. How is the secret key being stored on disk? What I mean is .. Is it possible for someone to hack into my computer, steal the secret key and use it to decrypt all my messages which were encrypted with my public key?
Secondly, gpg requires a password to make use of t... |
I just received a notification from Microsoft that my Microsoft account has been blocked because it's been accessed by an IP address that's never accessed it before. I received this notification as a text from a number that has texted me before about Microsoft Live-related stuff, then as an email from account-security-... |
I have a Grails app I'm working on that allows users to fill out a fairly lengthy application form. One of the requirements I've been given is to NOT require users to log in or create any sort of account. When they start filling out the app, I store their app ID in the session so it can be remembered from page to page.... |
In this article about increasing the security of LastPass the author suggests:
For additional security, you can have LastPass send security-related
emails to a special security email address instead of your normal
email address. For example, password hint emails, account recovery
emails, and multi-factor authenticatio... |
I have a friend who has a website developed in PHP on which we can browse all his files one after one (of course, we can not read the content of the PHP files).
Do you think this is a security hole?
If yes, in which sense?
|
There are a lot of spywares for android and ios smartphones. Are there spywares for feature phones ? I am using this samsung phone, which is basic. I am wondering if somebody who has access to this phone for few hours can bug it.
|
I am currently diging deep into the IKEv2 protocol. In the description of the Authentication (RFC5996, p. 48), the following statement is given:
"It is critical to the security of the exchange that each side sign the other side’s nonce"
Can anyone explain this issue to me?
It is clear to me, that I need some kind of si... |
Sometimes passwords/hash/keys & other private information is stored in variables and hence in memory/RAM during code execution.
while some situations (i.e. Linux Kernels see here Is there any Linux distro or kernel patch that wipes a process memory space after the process exits? ) care about wiping used memory I was wo... |
I am facing an issue regarding security projects, for example: last year we bought an antivirus licence for 500 (end point security), and made a policy in order to force everyone to install it, however, at the end of year, we found out that only 50 users were using the antivirus properly.
I have discussed this issue an... |
I recently did a university module on digital forensics and learned a lot about the process, and techniques, of digital forensics investigations.
We didn't actually cover the cloud although I couldn't stop thinking about how it would work. Although we can access the virtual machine image, and all of the files/logs etc... |
I've just found my notebook has a SmartCard reader.
Would it be wise/possible/practical to buy a single SmartCard, transfer my private key on that (somehow), and use it as my primary private key storage?
Or would I need a SmartCard "writer", which would increase the expenses for personal usage to an impractical height?... |
I'm using some popular commercial forum software and to help secure the admin area more I have changed the name of the admin folder; however I was wondering, with regards to robots.txt if I go ahead with putting:
User-agent: *
Disallow: /random_admin_name/
Then wouldn't I just be exposing the "secret" admin name now!?... |
I just read about this new struts2 security problem. I want to tell our developers to patch it, but I wish for some more sources first. The only source he cites is in another language. I guess I could spend the better part of the day testing it, but if I could get confirmation from other sources, it would be better. ... |
Let's start off with an example. Here in Canada, credit card companies cannot upgrade you credit card limit. You need to make a request, that will then get analyzed and then, depending on your status as a payer, you might or might not get your limit increased. Why? Simply because the best security system here to preven... |
A common theme in security engineering is that perfect security is impossible (or at least highly unlikely). Consider Johnston's Infinity Maxim:
There are an unlimited number of security vulnerabilities for a given security device, system, or program, most of which will never be discovered (by the good guys or bad guy... |
I'm no expert. Could someone please tell me if I'm overreacting?
After the Heartbleed news broke, I changed a lot of passwords. Here's what I discovered when changing the password on my all-in-one bank/brokerage online account.
Password requirements:
- Include 6-8 characters and numbers
- Include at least one nu... |
After signing in Google 2-Step verification scenario, user should enter verification code which sends to his mobile. Without it, he couldn't access to Gmail account.
Consider an attacker does session hijacking. Can attacker access to Gmail account if attacker uses hijacked session? Or he will stop at entering verificat... |
Is it common to implement crypto software in such a way that sensitive buffers are overwritten before free'ing memory?
For example when they contain a private key or the plaintext message.
|
Suppose, I have a static IP on my PC and is known to others. None of my softwares listen for remote connection. Is it still possible for someone to DOS attack me in such cases? If yes, how it is possible?
|
I am trying to enumerate a database, created specifically for the purpose of learning SQL injections. I am trying to discover the number of columns a particular select statement might be using. I do this by "Ordinal" ordering the result set. So, I start with ORDER BY 1, .. BY 2, and so on until I get an error returning... |
I want to know how to ensure the most complete anonymity when browsing the internet and connecting to remote servers: I want to be as anonymous and secret as possible. I don't know exactly how VPNs differ from proxies, but are they safer? Is it possible to do a combo: proxy, VPN, Tor, etc.? Will combinations as such ma... |
Are there any security benefits to having a different key(it is encrypted by a master key and that encrypted key is included in the metadata for the file) used to encrypt each file versus just one key that is the same for all?
Assuming the crypto is fairly well designed, there shouldn't be any real security benefits, b... |
There are many methods for finding very large primes fast. Most of them have complete lists.
Is it possible an attacker try to guess that p or q was generated using a such kind of method?
If yes, shall I try to check my prime match a case like this one, when I generate primes by pure random numbers (generate a random n... |
We have a load balancer facing the Internet.
It's balancing load towards two systems behind it in the back-end running apache.
How many SSL certificates do I need to buy?
- One for the load-balancer only
- One for the load-balancer and for each server instance one (3 certs)+
- Only for the server instances (2 certs)
- ... |
I recently found the following configuration settings:
use-strict-mode
hash-bits-per-character
hash-function
and I have some questions about them:
Use-strict-mode says the following:
session.use_strict_mode specifies whether the module will use strict
session id mode. If this mode is enabled, the module does not ... |
Many websites including OpenSSL's website provide downloads along with MD5/SHA1 checksums sometimes in addition to PGP signatures for the files.
Simply put, do PGP signatures provide file integrity verification in addition to file identity verification? I would assume so. If I've verified a file's PGP signature, are th... |
I'm interested in encrypting my Android devices for security in the (hopefully will-never-happen) event of the phone being recovered by an unknown/unauthorized person.
How does Android filesystem encryption work and how does it stack up to other filesystem encryption solutions?
Solutions I'm more familiar with are:
Tr... |
I have 2 questions that are somewhat related:
When you try and guess the key in a program (in a brute force way), how does the program know if it got it right and it had deciphered the message (I'm not talking about the obvious files with headers, but just a long string of text)?
What is the problem with cascade encry... |
I'm not sure whether self-signed Package Installer are supported by Mac OS X 10.8+
Using informations in How to create an Apple Installer Package Signing Certificate I could create a Package Installer self-signed certificate.
But all (flat) pkg files I've tried to sign with this certificate are rejected by spctl --asse... |
Is there a way to detect a malicious JavaScript code within a webpage before the script runs on my computer ?
I want to develop a Python script that prevents from 8 JS malwares that I can embed on my website (for test). But if the malicious script runs on my computer then I do not find it useful for my Python script to... |
The Windows RSA SecurID app allows the device seed to be determined and cloned from one machine to another (see this blog post).
Do either the iPhone or Android RSA SecurID apps suffer from the same issue?
|
Suppose you have some malicious code on your linux laptop, for example a rootkit or trojan or something like that. Now restrict your attention to the case that the malicious code does transfer some information to the hacker over the internet, for example because the hacker wants to steal some files from your computer o... |
I know there have been similar questions about that topic, but I think mine differs from the others. I have this application which I am able to crash, but the error seems to happen inside of a shared object library, which gets loaded by the application. So my question is, how do I proceed further? I attached the appli... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.