instruction stringlengths 24 29.9k |
|---|
I have a server running rstudio. This is basically a web application, and it is currently only accessible over the local network.
The web app takes your Linux username/password in order to log you in, and according to the docs "User credentials are encrypted using RSA as they travel over the network." (https://www.rstu... |
We have a confidential portal for clients. Historically they have been identified face to face in person and handed a unique token number that is associated with their email address and allows them initial access into their account. Once accessed they can set up their own user name and password. I want to be able to... |
I plan to write a PHP script which will allow web users to upload MS Word formatted docs. Here are the precautions I am taking:
Filenames will be created by me (something like YYYY-MM-DD.doc)
Files will have 600 or lower permissions.
Files will not be touched until they're downloaded via FTP.
File size is limited.
I'... |
This is a very newbie IT security question...
I have to quickly implement a solution for our application that works like this... We have a binary executable that is given a configuration file. I need to encrypt the configuration file such that a non-trusted user can be given the binary and the encrypted config file (an... |
In our application, a user selects answers to questions. Their score is based on the time spent answering each question down to a tenth of a second. The server is responsible for calculating and storing the score, but it obviously cannot record the exact time spent itsself due to latency.
Somehow, the mobile app will ... |
CVE-2013-4310 indicates the action prefix (action:) feature of struts2 framework is vulnerable. Hence the vendor released the patch(?) by disabling this feature. However, there is an option to enable this feature back.
Question:
What are the security implications on the same (enabling this feature back). Is there any o... |
My brother gets malware infections practically every week. Apparently he had a infection over the past 24 hours, I only noticed it because I checked the router logs and saw a massive amount of network traffic on his MAC address.
How can I limit the damage on the network when this happens? I try to educate him but nothi... |
So the story goes like this..
I recently rediscovered an old website i used to go on quite often but i couldn't remember my login. The site is poorly made and hasn't been updated in about 5 years, so i tried a simple SQL-Injection to gain access to my old account and lo and behold, i was in. The problem is that i (and ... |
I would like to understand below SIP DoS attacks
Message Payload Tampering [implementation errors, SIP bugs]
Flow Tampering [CPU, Bandwidth, Memory]
Message Flooding [lack of authentication or encryption implementation / errors]
On the other hand, I came across with five different attacks on Register, Invite, Update,... |
We are trying to decide on which RSA key format our application should use. The ideal format would be widely used and supported in most of the popular platforms/frameworks. This would make it easy for 3rd parties to integrate with our system. So which one of the RSA key formats is closest to that?
|
I have ASA5505 , connected to the WAN on port 0 (called Vlan2), and connected to my development LAN on port 7 (Called Vlan1).
I want to add DMZ, and I connected switch and servers to port 3, and called it Vlan3.
this is my settings:
interface Vlan1
nameif inside
security-level 100
ip address x.x.1.1 255.255.255.... |
I have a website that has certain menu items that need to be hidden from end users.
The web site has PHP in the front-end and Java and Spring in the back-end, deployed on a Linux OS in a VM infrastructure, although the full technology stack isn't fully understood as it's a legacy system and not fully documented.
I ne... |
The best practice is we should hash a user password using algorithms such as bcrpyt to protect the user, however, given the following conditions, is hashing in the backend still matters?
the password is randomly generated by backend with enough security factors
user will not be able to change it
Since the password is... |
I know that misuse cases are use cases which help identify security requirements as they highlight the user's goal in misusing the system, but what exactly is abuse cases and what is the difference or these very similar to each other?
|
I've installed ubuntu server 12.04 on VM two weeks ago.
I've created regular snapshots.
XXX time ago I've noticed unusual activity and I've found that a backdoor was installed into my server.
One of backdoored files was sshd. Ive then analysed the logs and found the host which connected to my server in the first place ... |
Whenever an unhandled exception makes it into production somehow - whatever the reason - there's generally an option (especially with .NET programs) to print out a stack trace to the end user before the program ends completely. Even though this helps with debugging the program, if the user sends a copy of the stack tr... |
I'm not getting the exact main point of 2-DES and 3-DES. I would like to know the difference between the two; why 3-DES is chosen over 2-DES?
|
I am currently working on a file encryption program using Java Cryptography Architecture.
My plan is to have a number of encrypted files where each file has a different AES key.
To keep track of the encrypted files I also include a metadata file which stores an entry for each encrypted file with the following values: p... |
How malware nowadays spreads? For example, I have a Windows computer infected with some kind of malware (someone ran malicious executable on the computer when nobody was looking at it) and it can spread to other computers in, for example, local network. I think spreading by USB isn't the right or actual way nowadays.
|
My (not so small) bank has a website for doing transactions over the internet, and it has an HTTPS website for it. But my Firefox 29 wrote that the website is just partially encrypted. I did a little search with Wireshark and found out that there is only one element using HTTP (and not HTTPS):
<script type="text/javas... |
I am making a presentation to the class about "SSL 2.0 deprecated protocol" and I really have no idea how this exploit is used or how the attacker can use this vul. I understand the impact of this vul, but I need a complete explanation on how it works out and the steps that an attacker would approach to conduct man-in-... |
I work for a company from home online, using my own laptop. To work, I have to login to their network through a web browser, Google Chrome. The URL begins with: https:// . I use a User ID and password. I log off whenever I go on break or when I finish a shift. Since it's my own personal laptop, not company-issued, do... |
Two days ago a file called "images.php" appeared on a friend's server, which he noticed because it caused errors. The file contained the following. This code is of unknown origin and presumed to be malware so DON'T RUN IT.
<?php for($o=0,$e='&\'()*+,-.:]^_`{|,,,|-((.(*,|)`)&(_(*,+)`(-(,+_(-(.(:(](^(_(`({)]+`+{+|,&-^-_(... |
Is it possible to create a timestamp that is so hard to fake, that it could be used as proof or simply strong evidence in a court of law, that something was not created after a certain point in time?
The file could be anything; a word document, an image, an audio file, a software specific file, ie. PSD.
Some ways I thi... |
Consider the following...
Alice and Bob are communicating over TCP. Currently, the next expected TCP sequence number is 1000. Charlie, pretending to be Alice, sends a spoofed TCP packet to Bob with a sequence number of 1003. Bob's computer holds onto this packet thinking that it arrived out of order. Meanwhile, Alic... |
I'm scanning a Windows XP in a virtualized environment. I use all of needed arguments to bypass its firewall but it doesn't answer:
nmap -e eth0 -Pn --data-length 5 --badsum -g 80 -S 192.168.1.103 -f -T1 -D 192.168.1.200,192.168.1.30,192.168.1.45,192.168.1.90 192.168.1.102
This is the response:
all 1000 scanned ports ... |
If I understand correctly, the main difference is that the user must be logged in to carry out an insecure direct object reference attack but he doesn't have to be logged in to exploit a broken access control attack.
Do I have this right? What are the differences?
|
I'm posed with a situation where i am uncertain which way to go.
We have 2 Virtual Machines set up at a host that'll act as a webserver and a database server.
Obviously, both will have to communicate with eachother. Now currently the way that it's set up is that they both communicate over their ext. ip's. (so we query ... |
I've watched this video, and what this guy says is that
with javascript its easy to create a worm that steals your information
also that javascript will continue to execute even tho you closed the tab
of the infected site , on the other tabs. Even after closing the browser
it will save itself in cache only to load itse... |
Occasionally, I've produced (and reproduced) the HTTP 500 Internal Server Error on an online banking platform - quite a famous one. I suppose the errors are due to bugs in back end code, possibly security vulnerabilities.
How can I make this information public, without compromising a platform that's used by thousand of... |
We can assume that if an attacker gained access to a web server running mysql that they would be capable of reading the scripts to determine the mysql password.
If mysql only responds on localhost, does it really need a strong password?
Sure, if there was an exploit on the server which allowed an attacker to upload and... |
I realize SIMILAR questions have been asked before but I'm looking for certain specifics I can't seem to find elsewhere. The following question closely resembles mine but falls short for me on details: Encryption strategies for multi users access in production systems.
I'm creating an application that allows users to a... |
CNet is reporting that all OpenID and OAuth sites are vulnerable to an attack called "Covert Redirect". What is this attack, how does it work, and as an end user, how can I mitigate the risk?
|
I was thinking about the feasibility of one way remote control using radio signals. The sending hardware would be bound to a computer and therefore have enough computing power, while the reciever would be a limited hardware device that have some rudimentary computing power.
Putting aside the obvious drawbacks of one w... |
I am looking to improve my skills, to do so I need a site with an old OpenSSL version, so that I can do a pentest on my own.
|
I saw a hot network question on SE, about Workplace Ethics - Do I give my password at work to my old boss after quitting?. My initial response (as are the answers in that question) is always NO. The reasons are highlighted there, and I'm sure all of you agree with me.
My question though is about one of the answers, tal... |
So I was reading some comments on a popular forum about SSL encryption and how some websites pass their login form data as plaintext and don't use SSL or TLS. I understand that using an encryption method allows data to pass to the server securely and stops a 3rd party from eavesdropping, and then allows decryption on t... |
Recently, I scanned a physical document for a friend, put it on my web server so that he could download it, and sent him the URL over the MSN chat network. I removed the file again shortly afterwards, but about an hour later, I got the following HTTP request for the same URL:
65.52.100.214 - - [15/Apr/2014:03:58:48 +02... |
I ran a couple of wireshark runs for my computer and noticed inbound GET requests.
Is it legitimate traffic for there to be GET request traffic inbound to my home computer if my home computer isn't a server?
|
I was managing my firewall using AVG and I noticed this was allowed:
I have north american locale, and sometimes Japanese locality(?), and that is not Japanese. It is getting through my firewall, but I have blocked it for the moment. I thought it was fitting to put it here; should I be wary of that?
|
We have a new IT guy that insists we do not need an SSL on our email. Quite a few people access their email from outside our office(network) via mobiles and home computers, often from WIFI connections. Shouldn't we be encrypting our emails? We are a software company that is responsible for millions of dollars worth of ... |
I am using social networking services such as
My Banking
GMail
PayPal
Facebook
Twitter
Google+
LinkedIn
All of these services text messages me a six digit code to login from anywhere, even a device which is recognized from previous logins. I have had several major attempts of people resetting and trying to recover my... |
I have search a lot in the internet and I didn't find anything that is directly answer my question. What type of vulnerabilities are out there. I mean vulnerabilities like buffer overrun, not like XSS or SQLi etc.
Here is a short list of vulnerabilities I know that exist:
Buffer overruns(stack and heap)
Integer overf... |
I was sent an innocuous and genuine looking e-mail with "Welcome back to Facebook" from the address "notification+mnqx54sr@facebookmail.com". I deactivated my account long ago, so was a tad surprised. I was fooled since both the links in the e-mail were directed to the real facebook site, and the actual e-mail addy did... |
Imagine: We have been given the source code of several software programs, some open source, others proprietary. What's the best strategy to analyze the source code in each case?
For example: We know that open source software is usually more reliable than commercial software. So I'm wondering if it's a good idea to, ins... |
Intrusion detection has been there for many years. It monitors network traffic and/or system events like sys calls or other data and determines whether an event is intrusion or not.
But I am curious what has a next generation IDS in addition to a classic one?
|
On IPSec protocol, how can denial of service (DoS) be prevented or its effect be minimized? For example, assume an attacker intercepts a packet and changes its sequence number to a bogus one (say 10 is changed to 100000). This will make the receiver slide the anti-replay window so far that real packets will be drooped ... |
[Being a LastPass user] recently I moved to Google Authenticator instead of using Grid Authentication as a 2-factor security. For me, finding and filling letters from such a dense matrix is a rather clumsy task.
I have basic understanding how Grid, Google Auth some some other LastPass 2 factor-authentication work (Yubi... |
I asked a question on stackoverflow, but guess this site is better suited for it.
Idea is to prevent problems when the next buffer overflow bug comes out.
In my understanding the problem with Heartbleed was the access to memory of previous requests? Isn't it possible to wipe the memory after using it? To use different ... |
I got a message from D.O. about my Droplet saying they shut it down because there was a lot of outgoing traffic that looked like an attack. The site I had on that server was not very known at all. I'd be surprised if 20 people had seen it. It's not related to money or sensitive information at all.
Assuming D.O. is ri... |
I'm trying to quantify the exact risk I'm subjecting my PC to if leaving it with Windows XP as opposed to upgrading it to e.g. Windows 7, an upgrade that would be very time-costly in my case. I don't really go on "dodgy" websites and have a firewall & AV. Is there a risk that a new exploit/vulnerability that is uncover... |
I've been researching the disadvantages of using RSA for encryption, and one I've found repeatedly is that RSA decryption is slow, but I haven't seen an explanation as to why this is. Can anyone explain why this would be?
|
A malware file appeared on a friend's server as described in this question. It's a file called "images.php" that is designed to look like nothing important, whose sole function is to wait for an unknown party to send it some code to execute.
The server is on shared hosting. The hosting company adamantly insists that if... |
I understood that Windows users' password hashes can be exported very easily. Right? So my question is:
If I can have the hashes of other user accounts (e.g. local users on my Windows machine), isn't it good enough for me for impersonating other users?
For example, when a user tries to log into some web site using NTLM... |
I have many client devices that I need to reverse SSH tunnel into. I am finding that managing all these certificate files are becoming cumbersome. I am looking into a centralized authentication system.
I am also running a NodeJS server that first checks REDIS for proper authentication then saves sensor data to Mongo.
I... |
The problem lays in my brother two computers. I have few computers on my own on which on one of them I'm doing business with transactions and stuff like that. However I have one network on which all computers are connected and my little brother on his two computers has tons of stuff like viruses, malware and who knows ... |
Does anyone have experience in setting up a responsible disclosure procedure for a company?
I'm interested in taking up a university assignment involving this.
I have read up on my governments guidelines to responsibilities of both the discloser and the organisation in charge of the information system, but I still ha... |
Can any of you security experts help me make a decision on how to deal with staffing for an initial hardening for an Apache server running MySQL and PHP?
We are working on a new site have to do initial hardening and I don't know if we should have the sysadmin do it or if we should get a security expert to do it. I know... |
I have some app-components on the same machine but in different languages which need to communicate. I am using socket communication over localhost to do so. The data transferred is confidential.
Should this communication be encrypted?
I mean an attacker would have to be able to run code on the machine in order to inte... |
First of all, please don't shout at me for wanting to use Skype. I know that it's evil and I fully expect all the calls and text chats going through it to be stored permanently in govt data centers, but let's pretend we don't care about that.
Assuming one installs it on Linux (if there's still a binary available), is i... |
I'm beginner in exploits. So I had type simple program in C
#include <stdio.h>
void func(){
printf("asd");
}
main(){
char buf[100];
scanf("%s", &buf);
}
My goal is to run the func() and print asd. With 116 'A's I'm over writing the EIP but when I change the last 4 A's with the memory address of the functi... |
Just a theoretical question:
If I had ideal users, who all provide fully random 128-bit passwords,
And also, I invalidate every password shorter than 128 bits.
Then would I still need a slow hash function to store these passwords?
|
Cybersquatters register so many domains and sit on them for so long that the renewal fees alone would bankrupt anyone.
Do they have some kind of special status that lets them pay very low renewal fees? How do they obtain this?
I asked because about a year ago I did a "whois" on an obscure name I was pretty sure no one ... |
Is it safe to post passwords to my web server in this manner?
NSURL *url=[NSURL URLWithString:@"http://mywebsite/test/register.php"];
NSData *postData = [post dataUsingEncoding:NSASCIIStringEncoding allowLossyConversion:YES];
NSString *postLength = [NSString stringWithFormat:@"%lu", (unsigned long)[postData length]];... |
I am trying to go through all of the the steps in the Rijndael Encryption Algorithm using pencil and paper. I have been using http://www.formaestudio.com/rijndaelinspector/archivos/Rijndael_Animation_v4_eng.swf as an example. The mix columns step has a lot involved in it. To further explain it, I have been following ht... |
In this question I will use the example of Linux OS, but I am also interested in general situation.
Linux OS distributions are famous for being open source and thus rather secure. But how can you be sure that the Linux that you set on your PC, with the installer you have downloaded, is coded with exactly the same code ... |
I'm struggling to get a handshake from my router when using airodump. I'm running this from Kali Linux live CD.
airmon-ng shows my wireless card is an Atheros AR9462 using the ath9k - [phy0] driver. I believe this supports packet injection. aireplay-ng --test wlan0 and aireplay-ng --test mon0 show injection is working.... |
I am practicing cracking MYSQL5 hash using hash cat, however, for a reason or another, it finishes the cracking process too fast -within 30 seconds- without giving any results/errors back.
I doubted that I am using an incorrect hash type, however, I double checked using hash-identifier and other tools as well.
Here is ... |
What's the procedure a certificate authority (CA) must follow to get internationally recognized, like Verisign or GlobalSign?
|
I was going through the OWASP XSS Filter Evasion Cheat Sheet and and I came across this section where there is an anchor tag used to do an XSS in the following forms:
<A HREF="//google">XSS</A>
<A HREF="http://ha.ckers.org@google">XSS</A>
<A HREF="http://google:ha.ckers.org">XSS</A>
I can imagine its use in a stored X... |
I am curious to know if we require separate update server in our cloud based PCI environment. In our current setup webserver, appserver, dbserver, logserver, and jump server are independent instance. I am not sure if we can directly update (packages) of these Centos Linux servers from yum or we need local update server... |
I am using escapeXML StringEscapeUtils.escapeXml to prevent XSS in my Java application. But I am wondering if it resolves XSS to the fullest.
I have tried some XSS attack vectors, and escapeXml seems to work fine.
Basically most of the examples I tried included < , > etc.
Are there any attack vectors which would make e... |
Doing a report. Having trouble understanding the concept. I need to talk about the following topic in relation to:
How can the errors be detected?
Can they be detected and corrected? If so, by what means?
If someone could help explain this, that would be great.
|
I'm learning SAML, which is said to be centralized. To understand the difference with decentralized, I'm reading about OpenID.
I find it difficult to understand the difference between the two, regarding centralization. OpenID is said to be decentralized because it supports multiple entities which authenticate users. B... |
I'm a student and I'm working on an OTP authentication systeme based on
OATH using smart phones as tokens for the clients.
My problem is the protection the OTP seed at both client and
validation server; encrypting the seed using a passphrase or a PIN
is a solution. My question is if there is another methods to ensure t... |
I would like to create a new GPG key. Going through a couple of thread it seems like the most popular scheme for maximum security is to have an offsite master (sign-only) key which provides a shell for a couple of daily-use subkeys.
As the master key could probably serve one a lifetime I was thinking about putting only... |
I would like to install a second hard drive on my laptop and use it as something like a sandbox, just for games and home, and the other for work and sensitive data only. Both hard drives have windows installed on them.
What I need is a way to completely isolate them from each other so there is no way for a malware to ... |
Recently I have faced a site that seems to implement something that we can call "one-time cookie". This cookie is used for single-sign on among different sites.
In each request the server sends a Set-Cookie that sets a new session cookie that is used by the browser in the next request... This mechanism is supposed to r... |
When a session is closed, for example, when a timeout triggers or when the user clicks the logout button, the session should be terminated at server side so the session cookie is invalid.
I think that it could be useful to also set to a blank or invalid value the session cookie in the browser, even if it is a temporary... |
I got this email from service@intl.paypal.com, with the title:
Your account has been limited until we hear from you.
I think this is a scam / spoof email because I don't see any notification in my Paypal account and this is Hotmail account is not used as my Paypal login. (It used to be not any more for more than a yea... |
I want to store passport copies safely in a database, the database itself is a normal MySQL database and on a somewhat trusted web server. The user who owns the passport copy should only be able to upload his or her passport not view it. The approach I want to take consists of the following steps.
Configuration:
Syste... |
is it legal to do a security review/pentest of a web application that we bought and operate on our servers? Meaning, the whole infrastructure is ours + we bought a licence for the software. Can we do an in depth review of it? Or would this be breaking some laws against reverse engineering etc.?
I'm interested in USA an... |
If you watch traffic in real time, you can see that an attacker doing a MiTM attack does ARP spoofing because MAC addresses will be duplicated, etc. And, well, you can see all MAC addresses and see who is a router and check if MAC addresses of the router match.
But what if we know that an attack was done yesterday, for... |
On this ISC article on DVR compromise the author talks about the compromise of an embedded system. In particular, the attacker executes a series of echo commands on the remote host, and:
This DVR has no "upload" feature. There is no wget nor is there an ftp or telnet client.
...
The first echo writes 51 bytes to "/var... |
I have a question about password hashing. This is not a question about the the BEST POSSIBLE method of hashing passwords, but rather a more utilitarian question about what is sufficient to hash a password without standard rainbow tables being an issue.
Let me outline a hypothetical scenario. You have an application tha... |
Sorry for novice question. I am completely new here.....
I am already familiar with Asp.net, JavaScript, Java, C++, etc.
I know the theories behind attacks and protocols, but I want to see them in simulation systems.
Do you know any simulators where I can try these (network attacks such as DOS, man in middle) on them?
|
In a classic PKI scenario, the certificate authority receives signing requests generated by an end-user which owns the keychain, and thus has his private key secret.
Consider a scenario in which the CA not only signs certificates, but also generates the requests for the end-user, thus essentially having a copy of all t... |
Suppose I have this JavaScript malicious function f1() :
<SCRIPT type="text/javascript">
function f1(){
a=1;
b=2;
c=a+b;
}
</SCRIPT>
This function is embedded within a larger JavaScript program called myScript.
I use a Python script called myScanner that reads myScript and warns me if f1() is present or not.
myScan... |
Does the Linux kernel use DEP internally for its kernel memory? In other words, does the Linux kernel take care to ensure that, when the kernel is executing (in kernel mode), every executable location in memory is non-writeable, and every writeable location in memory is non-executable?
I've tried searching, but it's h... |
If remember right, then before I send a CSR (Certificate signing request) to the CA, I have to create private and public keys.
Then I use the public key to encrypt my personal details before I send them to the CA as a CSR file.
Why do I need the private key for?
And how does the CA read my CSR if only I have my private... |
Say there is a website example.com. It hosts static content from a CDN, example.net.
This site allows uploading an image, which will then be served from the CDN.
This images can be SVGs and they are not filtered in any way, so they may contain arbitrary HTML content (including script tags).
Would you consider this a se... |
I'm trying to find the best (most secure) configuration for the firewall in OpenWRT.
I'm using LuCi to configure all the stuff. I have successfully created a VPN (OpenVPN). It is supposed the best way is create 3 zones (wan, lan and vpn) in the firewall and then configure it.
My problem is if I create 3 zones, I cannot... |
So I was doing some tests with the php session ID cookie. I know that data is stored on the server however, a cookie with a unique ID is stored so that the server can recognize the client while browsing. So, what happened is I got the ID of the cookie and opened firefox on a different computer, I edited that phpsession... |
I have be reading more and more about email spoofing and was curious how some things are done.
I know in PHP you can simply do mail() and then include "From: spoofsender@provider.com" for example, but how would you spoof the whole header?
Info such as sending IP address for example etc.
Thanks
|
How can we trust our encryption methods if our random number generators are to be [assumed] compromised? Does encryption also depend on the random number generators of our hardware?
I forgot to also say, if any of this is true, then how are we able to trust the companies that hold our data "securely". If the NSA has al... |
We moved to RC4-MD5 as a mitigation to BEAST attack. But our other teams are saying to use DES-CBC3-SHA
I want to know if DES-CBC3-SHA is also equivalent secure and mitigates BEAST as well ?
Also are the browser compliance different for these ciphers ?
|
I am planning to secure my REST Web service (REST WS) using API KEY and NONCE VALUE. The REST WS is over SSL.
The Userid / Password is encrypted and sent to Web Application hosting the REST WS where the Application decodes it and Authenticates it.
Would there be any mechanism by which it can get hold of the UID / PSWD ... |
I have two password protected zip(COmpression method: normal) file with the same content(aaa.txt(blank notepad)) and I opened the zips and this came up. First one's password is: abcd
PK
Rd¦D aaa.txtóH¼”„.‚ûÄFPK PK
Rd¦D $ aaa.txt
XÐ|ähÏXÐ|ähÏXÐ|ähÏP... |
i am actually doing some tutorials about ROP on Linux. So i tried to follow the
tutorial and compiled some of the example codes to try ROP in a small scope. But
actually when i am trying to exploit the executables either get some message like:
./a.out "$(python -c 'print "A"*0x70 + "BBBB" + "\x00\x40\x06\x2d"')" ... |
I have read the question on HOTP implementation in KeePass HERE. This question is however on the other newer plugin KeeChallenge.
According to the documentation, the a secret is encrypted and can only be decrypted using the TOTP. However if it is done so, isn't the weak link now the encrypted xml file (plus there is a ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.