instruction
stringlengths
24
29.9k
I have a 15 yr old daughter who's become not only a certified Microsoft Expert, but by pure accident, it came to my attention she'd long ago created a SPLIT network connection on our internet, HIDDEN from my view. I've had numerous problems such as errors when trying to open certain web pages...email/internet provider/...
Do signature-based antiviruses search for the exact matches of the signatures they have in their database with those of viruses to analyse ? I ask this question because I wonder if it is the reason why I often read that signature-based only antiviruses are outdated.
I read this article, about an exploit which highjacks a DVR to become a "bitcoin mining bot". The heart of the attack is to send a binary using just echo comands to the device, which acts as a trivial wget (the device does not have any wget on its own): echo -ne '\x00\x00\x00\x2f\x00\x00\x00\x1a\x00\x00 \x00\x00\x00\x0...
I'm updating an iOS app and I want to prove that it is vulnerable to MiTM attack. I have set up Charles Proxy on my mac and configured the Simulator so that it trusts Charles CA Certificate, per these instructions: http://www.charlesproxy.com/documentation/faqs/ssl-connections-from-within-iphone-applications/ I am able...
Maltego Footprint L3 says: This perform a level 3 (intense) footprint on a domain. It takes a while and it eats resources. Use with care. Whose resources do they refer to? My resources or the domain's resources? I'm allowed to gather all the information I can from a domain, but I don't want to cause a DoS on them.
Today I read about a researcher who bought a digital TV recorder and connected it to the internet - probably using port forwarding to enable attackers to connect to the recorder. After a while someone was able to connect with Telnet, and upload software to mine bitcoins. If this is possible, other malware could be ins...
What websites give the latest information on zero day malware or other exploits newly introduced.
I find PGP to be quite a complex subject. I have gotten to a point where I need to give a client a public key for encryption. I have successfully done my homework, generating a public key from my Ubuntu desktop pushed it to keyserver.ubuntu.com, gotten a validation link, hustled to get Thunderbird open, read it, and v...
I am doing research on computer worms. I have been through several sites and a few caught my attention. I have learned that worms propagate through email, there are types such as XSS worm and most of them are written in scripting languages and some through c and c++ which aren't scripting languages. How is a worm made ...
I have an API and a web application that exist in different domains. I can activate CORS on the API to allow for the web application to interface with the API cross-domain. However it has been brought to my attention that some business, for corporate IT reasons, will opt to block cross-domain requests from their instal...
A Public key is certified by a Trusted Certifying authority, to ensure the integrity of the key and authenticity of the entity who claims to have the corresponding private key. In this Public Key Certificates, What are Implicit and Explicit Certificates?
In my class, we are discussing virtual machine based root kits. I've research root kits, but could not find any information specifically talking about how root kits work inside of virtual machines Can someone explain me in a few words how an attacker would carry a rootkit attack against the virtual machine and how he ...
I have an ASUS RT-AC68U router and would like to set up port forwarding, but I would like to restrict which MAC addresses can connect through that port. My use case is that I'll have a live camera, and I want to connect to it remotely, but I only want myself and one other person to have access to it. Strong Username/Pa...
I found lot of articles describing about the heard bleed bug but can someone please explain the remedy for the heart bleed bug ?
In many countries, EMV is used to prevent credit and debit cards being cloned. But given that it's possible to perform online transactions using the details printed on the card, how does it add security?
As of today, I believe every major browser will by default reveal to a third-party site which site I came from, and more specifically, the exact URL I came from. What are the privacy implications of the "Referer" being shared, and is this a violation of cross-domain policy? I'm asking this in the context of a recent ne...
I am using ncat for creating reverse connections and through that i open a cmd. my problem is that for commands that there is a lot of out put such as dir in a folder with a large number of files, ncat hangs before finishing the command. the same situation exists when i am executing a command against a domain such as ...
When running the command: openssl ciphers -v I get a long list of cipher combinations. I'm having issues interpreting some of them. An example is: DHE-RSA-AES256-GCM-SHA384 TLSv1.2 Kx=DH Au=RSA Enc=AESGCM(256) Mac=AEAD I thought the last part of the combination, in this case SHA384 would be the HMAC function. It...
I was reading an article which included an anecdote of someone who had nearly fallen for a phishing attack which: established a mock Halifax.co.uk website which replaced forward slashes in the legitimate URL with full stops. By chance I wondered if there was anything at the url http://h.alifax.co.uk was taken and if ...
I have been researching on computer worms that brought me to this topic of backdoors. According to my research, backdoors are malicious pieces of code that are inserted into either computers to get remote access to the target. I also learnt that usernames and passwords can be hard-coded into the program but I do not ge...
I want to try practicing MITMing raw TCP binary protocols as well as MITMing HTTP protocol. What is the best way to do this? Are there any specific tools which help me do this? Like wireshark or ZAP or Burp suite?
Earlier today I received a number of comments saying that my shared links were disabled. I looked around and saw a number of articles explaining what happened, and Dropbox posted an official statement For background, whenever you click on a link in any browser, the site you’re going to learns where you came from by so...
So when i do a tls handshake with the server, it responds with a cert chain which the browser verifies and which ends at a trusted root CA. In this the browser checks if the cert presented by the server is valid or it has expired/revoked. So my question is , is this done for each cert in the chain ? or just the leaf ?...
Currently, I'm developing a bank related android app. I would share my knowledge and also maybe you guys are more expert than me so you can add your ideas to the list. Bank is a very special client. They really concern about security stuff. However, in the same time, they want to have very flexibility and great feature...
In SSL literature, I've noticed the use of the term "ad-hoc MAC". I understand the meaning of MAC (Message Authentication Code) and how it works, but what does the term Ad-hoc MAC mean? Note: With MAC, I mean Message Authentication Code (as used in SSLv3), not Media Access Control !
I am looking at this cluster of student work stations. They are diskless clients which boot from NFS. They also have sshd enabled. All of these machines share the same ssh host key (rsa,dsa,etc), because they boot from NFS. As NFS is not encrypted, the private keys are transferred in clear text anyways. This is not a h...
How does one implement a trial period in a product properly, e.g. a trial period that lasts 30 days, or limits the number of product uses to 10? Storing the entries, even in an encrypted form, isn't secure: Users can backup the registry values, and restore it it when the trial ends. What's the proper way to implement T...
Imagine you are building a public service where you need to store the customer's cloud credentials(like their aws secret and access keys) in your database to regularly use by your backend services in the background to do things. What are some of the key risks involved and potential controls which can be implemented to...
Is it common for small companies to get security certificates/compliance from audit agencies for their SaaS to present to customers for their assurance? If so what are the suggested certifications?
Imagine you have a master key to encrypt/decrypt the data saved in your database of your app service. What is the risk of having this key embedded in your app service code to store this key in the app server binary files? Can hackers get this key from the binary of your app server? If not, what is the best way to prot...
I get the basic OAuth and PKI flow and the different actors involved but I'm still unsure how public/private keys play a role. When a client identifies itself upon registration with a certified public key, is that key then bound to the access token?
When prompted to update their passwords after they've become stale (whether that's after 30, 60, 90 days — whatever is implemented by policy), many users simply increment the number that they may have been forced to add by the password policy. I'm interested to know just how prevalent this practice is — not necessarily...
Consider the case where a computer has 2 drives: one for a Windows OS and one for a Linux OS. The user then uses full drive encryption, BitLocker, on the Windows drive. It can be assumed that Linux cannot read data from the encrypted drive in normal operation (barring bootkits or other exploits). But my question is abo...
How can the host environment (not just the OS) be identified from a running guest VM. To determine what the underlying host and virtualization stacks being used actually are. I.e. whether there's a VMWare, Cisco, OpenStack or other IaaS solution powering it. I already know of imvirt and virt-what but they don't provide...
Is there at present a way to open a SSH connection using pre-existing symmetric session keys? In other words, if I create a list of symmetric keys can I send that list to the recipient on a CD or USB key (or otherwise) and we can then connect without the use of a key exchange algorithm that generates and transmits the ...
I am creating a demo of the infamous windows tokens manipulation. the scenario I am using is as follows: A single PC connected to the domain controller. 2 users are signed in the DC through that computer. A regular user and a domain admin. I am using nishang to enumerate tokens but no tokens are found. How can I create...
Say I have a website running a popular CMS like Wordpress only over SSL through HTTP Strict Transport Security. Prior, the backend administrator login page could be accessed by anybody simply by adding /wp-admin to the URL, but using a mix of mod_rewrite and a plugin, it is now obfuscated and stops brute force attacks....
My background is in compilers/code optimization, and I'm wondering whether there might be any interesting applications of extremely aggressive runtime code specialization towards improving security applications. So: suppose we have a JIT compiler that can perform aggressive code optimizations based on runtime constant...
I am writing a web app that connects to external web services. The external web services serve an intermediate certificate signed by Thawte SGC CA - G2. When I setup IIS to run the web app using service account on a separate corporate domain (let's say, DEV\service_account), the application fails to validate the certif...
I have found these benchmarks in Crypto++'s site. http://www.cryptopp.com/benchmarks.html But I am, quite honestly, not entirely sure how to interpret them. I am really looking for a set of benchmarks, or a study, that shows how asymmetric encryption is slower (and more computationally expensive) than symmetric encr...
Edit: removed a part of the original question; I'll break it down in a different post. I am following @Polynomial's answer to store information in a database. Here are my requirements: Only the user can see their information. The server only sees scrambled data. Allows for easy password changes OK with "lost you...
Recently, I stumbled with this topic in my mind for few days. I understand that obfuscation is not the best protection against reverse engineering. I wonder if there is another method that make it harder for reverse engineering, especially in mobile apps. In android environment, it is easier to reverse engineer an APK ...
If any characters are allowed in the alt attribute of an img tag (except for double quotes), is XSS possible? Valid image or not.
With the frantic certificate upheaval resulting from the Heartbleed fiasco [drink!], there has been lots of talk regarding certificate revocation, and in particular the policy of certificate verification through CRLs and OCSP. One thing that's come up is the general consensus among the browser vendors that forcing ver...
I was just referring to this article: http://en.wikipedia.org/wiki/Port_knocking The term Port Knocking, as explained here, was slightly confusing and I was feeling difficulty in getting the hang of it. I would be really thankful if anyone could offer a simpler explanation.
I was reading weaknesses in AES encryption. Unfortunately, I have a website that uses AES: Its database is almost entirely AES encrypted. Is there a real threat? Would it be worth to refactor the web site's implementation?
Let's say that I've a relatively strong password, but I don't want to use many different passwords for each different service, and let's say that those services provide two-factor authentication using a password and a TOTP, for example like Gmail, Facebook, ...etc Is it still secure to use the same password on those se...
I issued my server a Startcom class 1 cert. With no changes on the client, I can access this server via FF without issue. However, when try to validate the certificate via openssl s_client it chokes complaining about missing certificates. I can resolve the above openssl issue by copying Startcom's "intermediate" certif...
This question is about Claims-Based Authorization and Windows Identity Foundation (unfortunately I lack the priviledge to create a tag for this). Consider the following simple use case: I have a class User and a class Project, (for the sake of simplicity) each project has exactly one assigned User, The access control ...
If I have a salt of 16bytes and 16bytes of data, how fast can one find another 16bytes of data so that MD5(salt + data) == MD5(salt + other data)? I don't expect an answer accurate to the nanosecond, just an estimation like "a few seconds", "a few hours", "a few civilizations".
Assuming that the users have dynamic IPs (so I can't whitelist) and that setting up a VPN is not an option, is it a valid approach to restrict access to an administration area by only allowing IPs that are currently connected via SSH on the server? Are there any security issues with this? What if the server in which th...
When we refer to symmetry in cryptographic algorithms such as symmetric or assymetric does the symmetry refers only to the equality or not of the keys, or does it also refer to the symmetry of encryption and decryption operations? Also does symmetry when refering to keys means they are equal? Is there any symmetry bet...
I have successfully being able to perform WEP key cracking attack using aircrack tool. I want to allow my students to test this in a lab environment. They will be working fro their own laptops against the lab Access Point. I have tried to perform the attack simultaneously to make sure this is not an issue that will ma...
I am currently building a web service at http://write-math.com similar to http://detexify.kirelabs.org/ that should help users to get LaTeX code from drawn formulae. It is part of my bachelors thesis and a main goal of this project is to make it easier to do research in the field of on-line handwriting recognition. Tha...
I am using Process.Start in a Windows Service I created to execute an exe that I have on my server that is used for audio conversion. I am passing some user input as a parameter to this exe. The code looks something like this: string filePath = "\ffmpeg.exe"; string parameters = String.Format(@"-i ""{0}"" -f mp3 ""{...
I was wondering about md5 encryption. It is good, and I agree that it is unbreakable. But this is why we have rainbow tables. What if bunch of people gather together and start brute forcing and creating a hash for every single possible combination of characters. Especially if you are someone like NSA then you probably ...
I've been reading about Ubuntu LVM Encryption, and I understand that it supports the use of Linux Unified Key Setup (LUKS) during installation, which is a block level encryption that encrypts the entire logical volume. Is it possible to read files on the encrypted volume when I boot the system with rescue media or a li...
When I send out emails using Gmail, is my IP address being recorded? Can the recipient of my Gmail message know my IP address and thus infer where I am located?
Comparing ways of distributing and securely storing and querying structured and schemaless data. Currently I am using MongoDB, but am looking into (Postgres|MySQL)&CryptDB, Cassandra and others. What do I need to keep in mind, for securely storing and expressively querying [potentially] massive data?
Are SMS and MMS sent via a mobile phone stored on telecommunication service providers' servers before passing them to the recipient? Does it depend on the country or does every network service provider have the resources to do something like this?
Following this topic, I have a question about how the OS and apps access data while the phone is locked. Particularly in the case of iPhone 5S running iOS 7. When the device is locked, what allows apps to access data from the flash memory? For example when receiving an incoming call, the phone app accesses your contac...
How is the accuracy of a biometric security system (its ability to minimize false acceptance rate and false rejection rate) determined?
I want to propose an architecture of intrusion detection on the schema shown below. Should I place one IDS in front of each server, or would one be sufficient for all the servers?
Or: "Do I need to be concerned about emailing people scans of my passport if they want to verify my identity?" Is there anything anyone can do with the information on the main page of the passport that could be used to hurt the owner in the short or long term?
I have a Microsoft Access database which contains encrypted data: When I copy-paste it, it looks like $ 8F). How can I determine the used encryption algorithm? How can I convert this to readable text???
I got a spam attachment from two of my facebook friends I know it is spam because of the nature of the content I also know that these aren't the type of people to send such a message to me deliberately, so I am sure they ran some kind of script while being logged in to facebook The message has a zip file attachment, an...
I received a strange issue reported by one of my web application users. Apparently they are getting "ads" within the browser window when using my application. I didn't add advertisements at all. It's a straightforward ASP.NET web application. What I believe is happening is that the end user's PC is infected with malwar...
In websites related to facebook malware analysis and information, we often see messages to the effect of if you have run this facebook app then your account has been compromised, or if you went to your browser console and run this script then your account has been compromised. Change your password immediately. I can ...
In order to prevent Cross-site scripting (XSS) in a private web application that supports image upload, I intend to reject browsers that are vulnerable to content sniffing. Which browsers are currently vulnerable to this exploit? PS. I'm aware of the X-Content-Type-Options header, which isn't fully supported as far as ...
I have just now got 20 of my e-commerce websites scanned and certified by Comodo. I will be submitting them to my banks as well to prove that I am PCI compliant. But is there any regulation on who can show any pci logo and is there any choice of pci logo.
There is a site that allows you to see all SMS received by a certain set of phone numbers (owned by the site). This seems to be meant for services that require two-factor authentication using SMS, when you're unable (or unwilling) to provide your phone number for that SMS. Instead, you enter a phone number provided by ...
I want to know when scanning using NESSUS, though it is said its non-intrusive by default But what I want to know is how the use / definition or the testing conditions mentioned in the plugin-id effect the outcome of the scan. Does these conditions or tests or checks make the scan more intrusive in some way. I.e sendin...
Theoretically I was thinking a firewall inspects the TCP header and looks at the destination port and discards/forwards based on its firewall rules. So could I port scan an external server to the firewall and see what ports are returned? I'm on a network where FTP, PPTP, and other stuff is blocked. I just want to know...
I'm building a database that symmetrically encrypts user data. Nothing super sensitive, I'd use a third-party if it was. The data is encrypted with a surrogate key; the user must enter a password to decrypt the data. An evil DBA cannot view the data as it's encrypted. Pretty standard so far. Given that only the use...
The question is simple, and really interesting at the same time. How would you keep your data secure in case of a total compromise of your infrastructure? This should NEVER happen, but as we all know, bad things happen, and I'm preparing for the worst. I have two types of data: Log data (access logs from the applicati...
2G would leave you vulnerable to spoofed base stations. 3G tried to somewhat fix that using mutual authentication. Now, I tried to check how LTE handles this but I couldn’t find any usefull information. Are both client and network being authenticated in the current LTE standard, or can someone with a fake (LTE) base-st...
I'm setting up a reverse proxy to limit access to a protected resource. The protected resource provides a status page (http://protected.local/info). That page contains a number of links with query strings in order to drill down (http://protected.local/info/detail.asp?zip=01234). The interface does not provide a way ...
I am looking for a way to do the Token Kidnapping’s Revenge exploit by Argeniss. (The vulnerability is explained in here) I am studying security (beginner) and I would like to imitate the attack to see exactly what it does and how it happens. I am using two VMs (victim VM is Win 2003 server, no security patches). But I...
I'm training with labs and metasploit and there's some payloads I can send to my target and exploit it(in my subnet). If I have to exploit a payload I sent to a target outside my network which options does I need to use in my payload configuration ? I've tried the usual option of LHOST = 192.168.x.x and did not work we...
I really like the Java programming language, but I continuously hear about how insecure it is. Googling 'java insecure' or 'java vulnerabilities' brings up multiple articles talking about why you should uninstall or disable Java to protect your computer. Java often releases a huge number of security patches at a time, ...
I just discovered the YubiKey NEO which seems like a pretty awesome device for maintaining security for a variety of different things including computer login, SSH private keys, GPG private keys, and even password safes applications. I generally understand how systems like Google Authenticator work, wherein the server ...
There are many sites that have self-signed ("untrusted" in Firefox) certificates. I then have the option to trust them or not. If I not trust them I can either leave the site or only visit the site fully unencrypted. I know, there are cases where I should not use the site at all if there's the smallest risk of "being w...
The term PRF is mentioned in the documentation of the IKE (Internet Key Exchange) protocol. What is a PRF? What is the difference between a PRF and a hash function? What PRFs are used in the IKE protocol?
A comment to this blog post at sans.org about secure file uploads suggests making a pre-formatted template available for users when they need to do file uploads. The user would use the template to add their own data and upload the resulting file. It suggests "encode the template in some way that an attacker would hav...
Google Apps has a feature to monitor users' password strength and notify administrator about it. Google help says: View the length of each user's password along with a graph showing its relative strength based on other criteria. The graph's indicators can assess password strength upon user login. The indicators ch...
In IKE protocol; what is the PRF ? What is "the generation of a key based on modeled random oracle hash functions"?
It has been a while now since the Snowden revelations of various NSA malware and backdoors. For instance: March 12, 2014: NSA has developed implants to take over targeted computers’ microphones and webcams, record keystrokes and internet browsing histories, and save data from removable flash drives connected to target...
Like the title says, what happens if my ISP gives my connection (by accident/on purpose) a public IP address that someone else is currently using to browse the web or send an email or pay his bills? More importantly, what are possible exploits (for me, the other guy with the same IP, a third party maybe) and how are th...
I'd like to be able to ban an IP from my website, but for privacy reasons I would like to not have a record of the IP itself. Hashing the IP would allow for the hash to be brute forced in mere minutes, and salting it would be useless because anyone with access to the bans database would have access to the salt. Is ther...
I'm developing a file hosting and sharing web application. Are the following PHP session settings secure enough? ini_set('session.cookie_httponly', 1); ini_set('session.cookie_lifetime', 0); ini_set('session.entropy_file', '/dev/urandom'); ini_set('session.hash_function', 'whirlpool'); //is whirlpool that necessary? i...
Would PGP work as a method of sharing the AES key, as shown below, and what would be the flaws with this method of encryption? Server sends PGP public key Client generates (uses as AES key for networking) and encrypts random 128 byte key with PGP public key Server decrypts data with PGP private key and uses as AES key...
What's the security issue of this scenario related to tampering with the continue parameter: Go to: https://accounts.google.com/ServiceLogin?service=[service name]&passive=true&continue=https://[service].google.com/?continue=https://efbrcko.com/&ltmpl=ae When I sign in, I get redirected to efbrcko.ba/?state=[long rand...
I want to identify the hash algorithm used by an online service. What I have now is thousands of pairs of original string and result hash. Some examples: 62.152.39.195 25d10817d8d2836925 62.152.39.200 c20147df170843824c The result is 18 hexadecimal characters, as you can see. Is there any algorithm for such identifica...
For those who don't know: Telegram is a partially open source Whatsapp alternative (Server is closed source) which offers secret chats and normal chats. Secret chats are encrypted with Diffie-Hellman key exchange and are end-to-end encrypted. One can verify his peer's signature using a barcode. Normal chats are not end...
I'm conducting some basic pen testing against a page protected with Basic Authentication. I've sucessfully tested with Medusa and Hydra but am struggling to get the syntax correct for ncrack. The syntax I have been using usually gives the following error (which I am not entirely sure what it means) Starting Ncrack 0.4...
Company A needs to set up an IPsec VPN with company B, where each side will configure its own devices. Is there a recommended practical and quick way to communicate a pre-shared key from A to B? I understand that using e-mail is discouraged for security reasons. And telling it over the phone is inconvenient and error-p...
[I'm not really sure if I should be posting this on SO or here. I think my questions might be answered if I have had a good experience with MySQL. But, I don't. So probably, most of you will definitely want to tell me to read a good SQL book (if so, do tell me which books to read as the answer to my questions won't be ...
Is it possible that someone who is in charge of a network serving many users, can see what site we visited? I mean, we have only one internet connection, and we used WiFi to be connected. Is it possible that the one who is managing the network can monitor the sites I visited?
A well known company in Oil and Gas field, sends the email message as PDF attachment, with brief explanation, here is an example: Dear Mr Name, Please review the attached document acknowledging your recent activity on ..... Regards, Company Recruiting Team Is there any security benefit behind this?
I want to send the new releases of my application in encrypted, signed archives to the server. Are PHAR archives a good solution to do that? Is PHAR secure enough?