instruction stringlengths 24 29.9k |
|---|
The NSA has came up with the "Guide to the Secure Conguration of
Red Hat Enterprise Linux 5" (http://www.nsa.gov/ia/_files/os/redhat/NSA_RHEL_5_GUIDE_v4.2.pdf) I have read through this guide and it is amazing information. My question is, is there a program out there that you can run on your server and it can tell you w... |
I'm looking for a demonstration web site that shows an example of a web site that is vulnerable to command injection: where I can inject something and get the web site to run a shell command. (This is solely for demonstration purposes, to help teach others about the dangers of command injection.) Does anyone know of ... |
What i want to know is whether it is possible to connect to a proxy with an ssl (or otherwise encrypted) connection? (I'm suspecting this is possible because TOR encrypts user connections to it's network.) If such a thing exists, what is it called, and is it easy to implement (say with firefox and foxyproxy)?
All i cou... |
I recently read an article about researchers being able to penetrate the Facebook network and making lots of friends with about 100 "Social" bots. What would prevent somebody to do the same on Stack Exchange sites, so as to increase his reputation? He might do this in order to finance bounties and have questions answer... |
I have Active Directory Certificate Services on my server, which makes it possible for me to deliver an SSL certificate for the websites hosted on the same server.
I know that normally, I need to acquire a certificate from a known certification authority. But I have my reasons¹ for not doing it. That's not the point.
T... |
I have seen that in gmail, there are 3 certificates in hierarchy. I noticed that all the certificates have the same exponent(65537 with 24bits). Why is the exponent value same for all certificates and how?
|
I was just wondering whether performing encryption on the GPU was safer than on the CPU, with regard to the difficulty of reading the encryption key from memory and/or various other hardware attacks.
I know there exists extensive literature about how to extract information from software cryptographic implementations bu... |
I want to ask if my below understanding is correct or not regarding the HTTPS used for the webpage we are visiting.
I will use Gmail as an example:
My laptop tries to connect to the Gmail server and sends an http request
Gmail server replies with a request to establish https connection instead (sends https request)
... |
I was wondering if there exists (or if it could be created) a cryptographic system in which a message is encrypted and sent from A to B, and some nodes in the middle could intercept and decrypt the message (having been given a key for that) but in such a way that when B receives the message, he knows who has read it be... |
I post a question before about one password repeating to make it longer, now its a new way want to ask about, if take the word 'secure' and instead of repeating it put somenumbers between it, exp: s1e2c3u4r5e, or longer exp. PureSecurePassword would be
P1u2r3e4S5e6c7u8r9e0P1a2s3s4w5o6r7d8
is it better than repeatin... |
Starting with a QA team that deals mainly with functional requirements testing and has little real security testing experience, what simple practical things should the QA team start doing to start thinking like an attacker?
A couple of examples that I can immediately think of are:
use of special characters in text inp... |
Symantec keeps blocking traffic from the IP of my Comcast SMC Network gateway. It blocks traffic because it is detecting a UDP Flood Attack. According to the log the CPU usage is spiking to 100% when this attack occurs but Im not seeing this spike in the performance monitor. Symantec also detects a UDP Flood Attack whe... |
There have been a few people at my office that have requested the installation of DropBox on their computers to synchronize files so they can work on them at home. I have always been wary about cloud computing, mainly because we are a Canadian company and enjoy the privacy and being outside the reach of the Patriot Act... |
Why do we generally configure firewalls to filter out all traffic that we don't specifically allow? Is this just an extra layer of security for defense-in-depth that buys us nothing if we are not running malware on our system?
Are there any dangers in say opening up say ports 60000 to 61000 for incoming UDP connection... |
I bought a bunch of cisco equipment for a project and I got
1 PIX firewall
2 switches
and 2 routers
This is my plan for a topology but I am new at this so I need help.
I am basing this off the illustration on the ethicalhacker.com "rant about hack labs" article here
I would like it if my attacker machine wasn't connect... |
I ran netstat -a under windows.
what is the meaning of this line UDP [::]:57427 *:* ?
Proto Local Address Foreign Address State
UDP [::]:5355 *:*
UDP [::]:57427 *:*
UDP [::1]:5353 *:*
I wonder if one of those is a backdoor to my machine?
|
I have HTML and SWF files that I want to put on a CD. How can I protect the contents on the CD, or make it difficult for someone to burn or duplicate them?
|
Question was once on a mailing list but wasn't answered. I want to use a custom exe as a payload in metasploit. For example when I use exploit/multi/browser/java_atomicreferencearray and want to execute my payload.exe, how can I do that?
It is possible in SET, where you can just import a custom executable.
Is it possib... |
Some of our users have installed Mouse Without Borders and I wanted to know if it is possible to intercept the traffic being sent between the two computers and read it in some meaningful manner. I was looking at the PCAP file of the traffic between the two and I couldn't discern anything, but I also am not an expert at... |
I am relatively new to the GPG key system and I have been been learning about the system through experimentation. I now know that while generating a random seed for the key generation, the random number is taken from either the kernel entropy (/dev/random) or pseudo-random number generator
(/dev/urandom). The pseudo ra... |
I would like to fuzz FTP protocol, and currently I have the following:
s_read_packet();
s_string("USER test\r\n");
s_read_packet();
s_string("PASS test\r\n");
s_read_packet();
I've also tried with s_readline(); The problem is that I'm getting what's shown in the following picture:
I should be getting what's on ... |
I have a website built upon windows IIS and to use password to protect the website and disable anonymous logon to that website, the ONLY way is to disable the anonymous logon in IIS and use a windows login account as website logon account.
However this will cause security leak because the there is no https connection s... |
I suspect to be the target of very skilled hackers.
5 or 6 years ago I found spyware on my Linux webserver, it was lkm masked as ppp_deflate module with md5 hash hijacked. I mean with the same md5 hash of the original ppp_deflate.
Everything started because 2 sites were looking offline but they weren't.
I suspected t... |
Possible Duplicate:
How to disclose a security vulnerability in an ethical fashion?
Reporting vulnerable sites
I've found a security vulnerability which gives me the ability transfer money to my account.
What should I do now? Do I get payed by the company where I found the bug? Should I report that bug to them befor... |
Since the recent theft of a mac mini and macbook pro Im looking into products to lock down the mac mini server 2011 model. There are many cable solutions out there like kensington but the mac mini has no hole for that.
So my question is are there good products out there to lockdown a mac mini 2011 model?
I have found:
... |
So - I don't actually have a problem, but I'm really curious, because apparently VPN's don't work the way I thought they did.
It was my impression that when I VPN into my office, my computer is essentially isolated so that I can no longer connect to computers on my local physical network, and that instead, everything i... |
I would like to know the best way to increase security on a website so that the a single user can't create multiple accounts.
What all of a user can be traced? I'm thinking:
IP address
Mac address
Browser details
Computer name and its details
I know an IP address can be spoofed but is there a work around to still ide... |
It has been suggested in securing PHP article that using directive as below in htaccess is more secure than hardcoding it into your app:
<VirtualHost ilia.ws>
Include /home/ilia/sql.cnf
</VirtualHost>
then declare your parameters in the sql.cnf as below:
SetEnv DB_LOGIN “login”
SetEnv DB_PASSWD “password”
SetEnv ... |
real_escape() is a function which needs memory for its functionality, so I was wondering if there was any necessity to do that if we've already cast it?
$num = (int) $num;
Can we use real_escape() just for string parameters?
|
Is there any program that can set password on the app like mail or browser? I know about parent control, but I doesn't work with administrator account.
What I want is some program that blocks some apps from launching with popup password window.
|
What are the main security risks of popular cloud storage services such as Dropbox? I am torn between the convenience of cloud storage and the potential security risk of it. How can I evaluate whether a particular service meets my security requirements?
|
I am checking about the security of redirect link, For the below link , how to determine whether it is secure?
For the first link, the users are not allowed to change the url in the browser, but they can copy the url down, open a new tab and paste it and change the value (but it is useless for attacking?)
For the secon... |
Is WebGL a potential security problem due to the low level access it provides?
For example, a web page can attempt to compile and run any shader source it wants.
It seems that security would especially be a problem with open source web browsers, as an attacker could more easily find vulnerabilities in the implementatio... |
So I read through http://en.wikipedia.org/wiki/Authenticated_encryption and http://www.cryptopp.com/wiki/Authenticated_Encryption and I don't seem to be following the concept.
From the simple examples provided, it seems that Authenticated Encryption aims to prove that the message has not been altered - i.e. that an att... |
I am making a virtual network setup for my high school cybersecurity team to practice. I am connecting all the VMs together through a VPN and then people who are practicing will VPN in and ssh/remote desktop into the different VMs. The problem is that for practicing, they will need root access into the VMs and because ... |
What is the difference between Federated Login and Single Sign On authentication methods?
|
I've been browsing through several studies on user acceptance of biometrics, and I've been noticing that they all focus on attitudes and beliefs about biometrics. While it's important to know a sizeable portion of the population has objections to using biometrics in certain circumstances for various reasons, I am much ... |
I have two files which were encrypted using OpenSSL. I know that that first one was encrypted using bf-cbc, and I also know the password to decrypt it. The second file is likely to use the same password, but when I try to decrypt it I get the following error message:
bad decrypt
29034:error:06065064:digital envelope ro... |
How to do a virus scan before post attachments in asp.net application,when they find a virus on to give up post attachments,otherwise proceed to upload.
I wonder if there are any APIs out there where you can send a file for scanning? I mean could we possibly upload, send off to a third party for scanning then receive a... |
I want to do password length audit of domain password using offline brute force analysis.
I cannot find any domain hashes from local machines , I want an approach where i can retrieve these hashes either though AD database file or by running some hashing retrieval tool.
Can someone please guide me how could this be don... |
Background information
- Application responds to request to a particular URL with content-type: application/json
JSON response contains a parameter from the request
Escapes the quote with a slash
Doesn't do an eval on response
Responds to requests which do not have X-Requested-With: XMLHttpRequest (i.e. if you direc... |
If my IIS 6.0 web server is disabled and the only other service running is FTP, what are the security risks of allowing anonymous FTP read/write, considering that a random person couldn't use any sort of php/asp shell to compromise my system?
|
My question is about CDNs (Content Delivery Networks) and their simultaneous use for legal and questionnable stuff. One specific example is the following.
I'm noticing taffic from our network to the following IP address: 8.26.202.125 . I see from http://robtex.com that this IP address belongs to a CDN provider (Level 3... |
Whenever I attempt to use an exploit (that I know will work) from Metasploit in Windows on a machine on my LAN, I always get the error
Exploit exception: An established connection was aborted by the software in your host machine.
I do not know why this is happening as my firewall is off and anitvirus is disabled. ... |
To those unfamiliar, the Mac OSX has the root account disabled by default. In order to enable the root user you have to go deep into System Preferences and authenticate yourself with an administrator name/password. This makes sense that you would want to leave something as powerful as root disabled by default. Then, wh... |
I hope this question falls within the scope of the faq...I'm curious to see what kind of answers I get.
Suppose the following
A user is posting libel and slander on social media (lets say Twitter for example). The posts may be misleading, propaganda or just downright lying
A user has suspicions and they believe they k... |
I was asked this question at an interview and i wasn't sure about the answer. The question was "suppose you were checking the open ports on a particular webserver which was behind a firewall, how could you figure out which ports were closed on the webserver and which ports were blocked by the firewall. You can use what... |
Possible Duplicate:
When a sysadmin leaves what extra precautions need to be taken?
We have some servers on two sites. We use Puppet to allow only SSH key (root denied) and authorize users to connect to each server by policy.
If someone leaves the company, I will just have to change something in Puppet to close the ... |
I am doing a project that needs device authentication with a gateway. What are some of the best ways of doing that ? Whether a certificate based mechanism is feasible in this case ?
|
Looks like Null Byte Injection is possible in Java apps. see: Is null-byte injection possible in Java filenames?
So how does one protect against it? Inspect all the bytes of the filename for a 0 (zero) byte?
|
Let's say we have a desktop application and a web application. The desktop application uploads files to the server using POST requests to the web application.
What are the possibilities (except using certificates and username/password) to find out that the POST request came from our desktop application and not from an ... |
At work we use Outlook 2010 (I think) and an exchange server.
The situation is simple: Our IT Manager (Steve) was fixing a problem one of the guys out in the field (Dave) was having with email on his phone.
The Steve did not put his own email on the phone but worked with Dave's email.
A few hours later we find out th... |
The military's Common Access Card (CAC) seems legit. Do other companies/organizations employ their use? If not, why?
UPDATE
What are the pros/cons of smart cards, compared to other methods?
|
So I heard this guy talkin about how one time he deleted someone's windows directory remotely. He claimed to have gotten into the system and deleted it such that the files are all still there, but the OS can't find them. I might be coming up with the wrong name.... But about my specific question: how did he do this and... |
I know that the first response to a question titled like so is "seriously?". I know the answers exists, but I am just trying to put everything together.
Using and/or having an open Wi-Fi network is dangerous, as per the millions of reasons on the internet. My question is, in reality, how dangerous? Let me explain:
The ... |
I want to learn how can I protect my PC from getting hacked in order to protect myself from cyberbullying. There is an intruder who has hacked my system over the last 4 years.
He has hacked my all emails, websites I log on to and whatever when it is related to me being online. He has a team of friends and has professi... |
Nmap can scan and sometimes successfully detect the running OS in the remote host. However, can nmap scan routers and switches? Most of them use an embedded system.
|
I wish to create a system wherein I store encrypted data.
Users can access this data if they have the key. If they give a wrong key, they don't get access at all. If they give the right key, they get the data, and they may modify that data.
One idea I came up with is to store the bcrypt of the key, a salt, and AES-encr... |
I've found that using the command nmap -A gives me the most reliable results and according to the reference guide the option -A includes service detection, traceroute, and OS detection. I want to do an nmap scan that only includes the service/port scanning used in the option -A but I'm not quite sure what type of servi... |
I've encountered a strange thing. I connected to an open Wi-Fi, then I was just fooling around. First, I visited 192.168.0.1 and it was a router configuration page but default password didn't work.
Then I navigated to 192.186.1.1 and I saw the configurator of a completely different router that isn't even on this networ... |
Will they be resolved by my VPN provider, or by my original ISP (if left on "automatic" settings)? Would I have to manually configure a dns server, to make sure my requests will not be resolved by my ISP (constituting a privacy risk)?
|
If I want to generate strong high quality RSA keys, is there any reason not to use Microsoft's built-in cryptography system? Or should I use something open source like OpenSSL or Bouncy Castle?
I'm not necessarily afraid of backdoors, but I'm wondering whether I can trust the process of finding quality primes. I don'... |
I am working on signing and encoding of CMS/PKCS#7 messages (something similar to C# SignedCms).
I have x509certificate from the keystore, rsa private key,
ContentInfo. ContentType is "oidPkcs7Data".
I don't quite understand what should I do next.
I thought:
generate a signature and sign ContentInfo data
Signatu... |
I want to remotely start VMWare virtual machines (I own VMWare Workstation) and to this end I need to execute on host something like "vmrun -T ws H:\VMWare\VM1\VM1.vmx nogui" with user desktop context, so launching it from ssh (which runs from the service and doesn't have access to desktop) is not an option.
I know tha... |
In Google Chrome, sometimes you will see the https: protocol in the URL bar with a red strike through it. Clicking on the info button says that not all elements on the page are encrypted, and may be viewed by others while in transit.
My question is: how can one view any/all requests while in transit? I have read a lit... |
I'm trying to make sslstrip work with Internet Connection Sharing.ve shared internet connection to router and another pc connected to that router, all are Linux, so
Internet <-> pc1 <-> broadband router <-> pc2
How can I use pc1 to decrypt all ssl packet coming from pc2 with ssl strip
|
I was reading a rather dated book on SSL/TLS, which mentions International Step Up certificates and Microsoft's Server Gated Certificates which were the way around the US export rules for economic transactions.
Now export rules still exist.
But I always saw that the browsers I have used have requested stronger ciph... |
After reading what Metasploit is able to do my grey hairs got even more.
From my understanding current attack methods are being done without tampering with any file in a filesystem - thus rendering file based HIDS useless.
So my idea was: What about the blacklist-approach? Is there an (OpenSource) IDS tool out there th... |
I'm not sure if this is against the rules of the site. If it is, please let me know and I'll delete the question.
I've seen variations of this script floating around recently. What the heck is it, and what does it do?
http://pastebin.com/1XcMTsiL
You can see a list of sites that have been hit with it here:
(For the lov... |
We need to support the following Authentication flows
User 1 logs into Salesforce using Salesforce Credentials
User 2 logs into Salesforce using Arcot +Ping + Siteminder credentials
User 2 logs into Custom App using Arcot + Ping + Siteminder credentials
Since all the authentication methods above are SAML, I need to f... |
What assets am I trying to protect?
An unofficial pre-alpha software prototype provided as a reproducible example for evaluation during the scientific peer-review process. The software will be officially released under an MIT/BSD style license after it has been peer reviewed. The VM has been distributed through a ftp s... |
I was looking out how NMAP identifies DNS services. After determining that port 53 is open it issues a standard query TXT version.bind to find out if BIND is running on the domain port. Then, I saw that after NMAP received the response:
9.3.6-P1-RedHat-9.3.6-16.P1.el5_7.1
it issued a "Server Status Request" and re... |
Example from http://en.wikipedia.org/wiki/X.509#Extensions_informing_a_specific_usage_of_a_certificate
1st certficate - freesoft
2nd - CA thawte
Don't we use the RSA public key from the 2nd certificate to verify the MD5 of the first certificate?
If so, then what is the use of a RSA public in the 1st?
|
I have installed Cain and Able in machine A, which is connected to another machine B via a LAN. Now I want to analyze all the traffic of machine B. Is this possible by installing Cain and Abel on machine A?
EDIT
After trying a bit more - Cain and Abel is able to sniff packets of the machine B. But the problem is how do... |
When I examined a NMAP -sV scan on a host running Exim on port 465, it uses the standard SYN scan to determine if the port is open, and then issues a Client Hello to which the server responds with a Server Hello. There is a Encryted Handshake from NMAP and Application Data from the server but nothing seems to suggest h... |
I am using Fortify 360 to analyze my code's security. Fortify has identified a Hibernate based delete method to perform a delete based on an object that has been passed in. My understanding of hibernate is that hibernate will delete a row in the table the object is associated with based on the objects id (the id is a n... |
Does someone here knows a cheap DIY door logging system?
What I have:
- 2 doors that needs to be logged
- 1 netbook (running OpenBSD with internet connection & root permissions), the two doors are 1 and 4 meters away from it.
What I need:
- Every time when one of the door open/closes I need a warning about that... |
All serious full disk encryption schemes I have looked into use a static password for authentication. For example, TrueCrypt supports two-factor authentication with keyfiles, but not for system partitions. It's possible to use a Yubikey in static mode as a second factor with TrueCrypt full disk mode. But in both cas... |
Some telecommunication companies in Europe and maybe in other parts of the world now want to charge their customers for the VOIP traffic (maybe some already are doing it), e.g. the use of Viber, Skype etc since it´s "free" to use in Android and IOS.
I guess they will use deep packet inspection to read the headers of t... |
It may seem crazy to you, but I wasn't able to find any detailed description of these security protocols on the web (except wikipedia).
Can you point me out some documentation of the protocols implementations?
|
We are relatively small software company who has a requirement to store PAN's for our customers. Hosted payment solutions just don't fit our product requirements. We literally have 3 lines of encryption Code in C# which currently uses Ent Lib.
We have taken some consultancy from a very knowledgeable QSA and we have wor... |
I have a client using Terminal Server and it would make some sense to use Exchange for email as well, rather than the current situation with postfix/dovecot running on a linux VM alongside - particularly because the client is a charity and gets Microsoft software almost for free.
There are a few things I'm worried abou... |
For SSL certificates we have a web-of-trust principle. If we are allowed to make alterations to the certificate format, are there viable ways to automatically or semi-automatically authenticate the certificate information is really about the owner without a CA? It's not an option to distribute keys in advance.
So far I... |
I was wondering what the pros and cons are about sending an email with the password to a user registering on a website (like wordpress.org does).
They use pretty good passwords (12 characters long with uppercase and lowercase letters, numbers and symbols). Now, assuming that the passwords are secure enough, why would s... |
I have been developing a Webobjects application, and I found that my application is vulnerable to XSS through URL, but not when malicious input like <script>alert("hi")</script> is input to form fields.
So, i have currently employed technique of URL rewriting in apache web server to solve this issue.
I have handled fol... |
I'd like to encrypt IP addresses in my MySQL database, with the following constraints:
Does not need to be resistant to attackers that can execute queries.
Must be resistant to attackers that have access to files on disk.
Must be able to validate an IP against the encrypted form, to check if it matches.
Checking again... |
I need to send a public key to my bank. I'm using CoreFTP which allows the generation of keys using RSA. It says that it generates "OpenSSH compatible certificates [sic]" when you press the generate keys button.
The keys it generates have
-----BEGIN RSA PUBLIC KEY-----
at the start (and then the key and then an end m... |
Perhaps this is a trivial question, but how accessible are environment variables in Linux between different users?
e.g. if Alice executes
export FAVORITE_FOOD=`cat /home/alice/fav_food.txt`
Can Eve tell what's Alice's favourite food? (Assuming both Alice and Eve are normal users, and Eve doesn't have read access to /h... |
I have to write a term project about WPA/WPA2: I should find and read five articles and write a sort of summary of the technology citing those articles. And no, the professor will not help find articles.
It is a long shot, but if there is a reader who did academical reading on this, could he/she then please recommend ... |
I want to send my command to destination server.
I am using hping3. And;
hping3 -p 9999(running daemon and commands executing on this server) -S 127.0.0.1
I want to send my command. How to?
|
When I look at most RNG's (random number generators), I see a disclaimer that looks similar to this:
Caution: Mersenne Twister is basically for Monte-Carlo simulations - it is not cryptographically secure "as is".
What are the requirements for a (pseudo-) RNG to be 'cryptographically secure'? What tests/logic is us... |
The subjAltTag extension for X.509 certificates can take in domain names, email addresses, URIs, etc. I was playing around with an X.509 whose subjAltTag had just a URI in it doesn't seem to work. Here's a screenshot:
The URI in the address bar - at the top - is the same URI in the certificate. I updated my hosts f... |
Storing the hash of users' passwords, e.g. in a database, is insecure since human passwords are vulnerable to dictionary attacks. Everyone suggests that this is mitigated via the use of salts, but the salt is considered non-sensitive and does not need to be protected.
In the event that the attacker has the salt how h... |
When pentesting a network, call it ExampleNet, the network range sometimes exceeds 256 hosts, such as the range x.y.56.0-x.y.63.255. Does this mean that a compromised host on x.y.56.z could be used to leverage a MITM attack against a range such as x.y.62.z, considering they both share the same ethernet?
|
The Metasploit team provides some documentation on how to develop exploits, but other than looking through the sourcecode (which is annoying considering how much time I spend going from this file to that file) is there any other semi-comprehensive reference that would make it much easier to learn about the framework? S... |
The plan is to have a situation in which no third parties have to be trusted unless you explicitly indicate so. For example CA's are only used when the contact explicitly added the CA as a trusted party (there will be no such thing as root CA's or trusted CA's signing other CA's).
Methods I collected so far:
The above... |
For the last three months I have thousands of real visitors to a single page on my website. Those visits are recorded in Google Analytics and count as page views in adsense reports, but they are fake:
They are not generated by spam software / prox5yy or a BOT.
All are real IPs from US, Canada, Europe (no spammy IP, I ... |
Imagine you are running a web server on a Virtual Private Server (VPS) hosted in a datacenter. Could the people running the datacenter covertly read files from my VPS's hard disk? Could an attacker or malicious admin who has compromised the VPS provider, take my private SSL key (or other data) loaded into memory (for... |
I found an example of a DNS rebinding attack scenario in the paper "Dynamic Pharming Attacks and Locked Same-origin Policies for Web Browsers".
Figure 1: An example of a dynamic pharming attack against www.vanguard.com. (1) Initially, the pharmer arranges for the victim’s DNS queries for www.vanguard.com to resolve t... |
In X.509 architecture what are the uses of cross signing certificates from other hierarchy?
Does it just expand trust?
So from the answer I am assuming that if CA3 is cross signed by CA2 (from another hierarchy) and CA1 (a parent in its own hierarchy) whose private key is used to encrypt the authentication hash in th... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.