instruction stringlengths 24 29.9k |
|---|
I read every where that drive by download attack consists in downloading malware to the victim's PC and execute it without the victim's permission.
My question: does this "download" term include downloading any given file (virus.exe, worm.js ...) ? Or does it consists only in a something like malicious JavaScript attac... |
As someone who usually works with people in other countries it has always been a problem to send login information to each-other.
For development login details like debug databases etc sure I can send them over in clear text email or something but when it comes to actual production information such as SSH keys how do... |
If a narrow, trusted channel is needed (for example, there is an usb key to take data between the machines), it is okay.
Although SSH will throw a big error if it tries to connect to a server pretending to be another one (RSA fingerprint wont match), it can't happen if the servers don't know eachother (also they don't ... |
Currently, I have two years of experience in the field of IT and IT security. The type of work isn't what I expected when I was a student. Since then, I've asked people who work in this field, who suggested me to get certified.
So, I started preparing for the CompTIA Security+ certification (I need to refresh my basic ... |
How does forensic software detect deleted files?
When a file is deleted, the pointer from MFT in NTFS system is deleted and the file is no longer accessible from the OS. If our disk is fragmented how can software like Autopsy or Recuva detect where each fragment from a single file is located and how can the software or... |
I've read some interesting Bluetooth vulnerability questions, but I didn't notice one recently. Bluetooth has long been disabled in our organization, and I'm looking to enabling it because of repeated help desk calls regarding peripheral support.
I'm curious on the following:
The sole intention is to pair Windows 7 la... |
According to Wikipedia, the NX bit is set for all x64 binaries:
OS X for Intel supports the NX bit on all CPUs supported by Apple
(from 10.4.4 – the first Intel release – onwards). Mac OS X 10.4 only
supported NX stack protection. In Mac OS X 10.5, all 64-bit
executables have NX stack and heap; W^X protection. T... |
I am a computer science student interested in the field of security and just had a few questions.
What are the pros and cons for using C# for security purposes, I had assumed applications programmed in C# would be more prone to hacking etc. than C++ due to it being a higher level language and therefore being less "powe... |
After reading this article ("Everything is broken" by Quinn Norton) I was about to ask a question similar to this one (Why are security-crucial software written in unsafe languages?)... but actually I am more interested in counter-examples — where the security-crucial software is written in safe languages and does not ... |
I have a php and nodejs server. User logs in on the php backend, and, when entering nodejs, the php SID cookie is being passed through a websocket. I further take the session ID, find the session file in php's directory and deserialize it, where I can access data.
Is that safe? The websocket does not use a TLS connecti... |
There is a service called ProtonMail.
It encrypts email on the client side, stores encrypted message on their servers, and then the recipient decrypts it, also on the client side and the system "doesn't store keys".
My question is this: How does the decryption work?
I'm a bit confused. Do I have to send my decryption k... |
In this article from Privacy International, it indicates that when GCHQ undertook the task of destroying sensitive data on system belonging to the Guardian newspaper, in addition to the Storage media, they destroyed certain chips within the devices, amongst others chips relating to control of the Touchpad and keyboard.... |
We have a server that provides RESTful services to our application server. It runs on Amazon Elastic Beanstalk and mapped with a domain name and SSL certificate registered at GoDaddy.
It ran perfectly fine in the last few years. In March, we renewed our SSL certificate and updated it for all the servers we have. A few ... |
I am looking at a choice for consuming a rest service from a word document. As far as I can tell there are 2 choices.
Using a .net apps as listed here:
http://msdn.microsoft.com/en-us/library/office/jj229830(v=office.15).aspx where the code would be compiled.
or using VBA/Macro as listed here:
https://stackoverflow.c... |
Suppose we have a master key, and we want to encrypt some file(s). We then generate one-time key for that file, use it to encrypt file contents, and finally encrypt one-time key using master key (with IV, padding and so on). Fairly common scheme, isn't it?
So, we now want to generate one-time key and store it somewhere... |
I had turned ssh on a while ago to do some remote work. I was just looking over some netstat info when I noticed someone had established an ssh session with me D: I turned ssh off immediately and looked up the address.
Netstat said the ssh session was "established". I'm assuming that means they know my password, and I'... |
I'm working on authentication for my JSON-RPC API and my current working strategy is using signed requests sent via POST over SSL.
I'm wondering if anyone can see any vulnerabilities that I haven't taken into consideration with the following signature method.
All communication between the client and the server is done ... |
Is it possible for a Mumble server operator to monitor or record users' conversations? Or are Mumble conversations encrypted end-to-end?
|
When I download a copy of a vulnerable program and try to exploit it by buffer overflow (any internal function calling as a payload), it works.
However, when I made a same type of vulnerable program in C I am not able to exploit it and I have no idea what's going wrong. Checking on gdb I figure out that I am able to ov... |
As I know, most hacker can crypt the virus to bypass all antivirus.
Even famous antivirus like kaspersky and avast doesn't know it.
So, is there a good way to find out the FUD virus and protect from it.
|
I need to find a XSS and propose a solution in the following code:
<form action="#" method="post">
<input type="hidden" name="id" value="<?=$id?>"><br>
<textarea name="body"><?=$text?></textarea><br>
<input type="submit" value="Send"><br>
</form><br>
This is part of a message board. The submit will store the message i... |
Had a chat recently with PCI compliance specialist and got to realize there is a way to steal raw data from Apache / Nginx memory e.g. credit cards. It's called "harvesting" and becomes pretty common.
Let's say somebody hacked in through a file upload functionality and gained access. What would be the way to detect it ... |
I'm doing a study on Memory Corruption. I need to compile a list of all the exploitable memory corruption issues that have been recognized till date and provide a sample vulnerable code for it.
I need help from the community. I tried searching but was unable to find any such list.
Things that I have compiled
Stack Ove... |
Is it possible to be recorded via our camera/micro via web browser without asking our permission ?
|
At the time the Cloudflare blog post “ECDSA: The digital signature algorithm of a better internet” was authored, Cloudflare was apparently one of "fewer than fifty" users of ECDSA certificates on the web. It seems they have since stopped (via ssllabs.com test).
I briefly surveyed several other major web properties usin... |
Are there any algorithms/modes that work particularly well for shorter messages? (hundreds of bytes at most, usually < 100 bytes). I am looking at it from both security and performance point of view.
I imagine padding a short message to block size isn't good for performance, and seem to recall there being crypto probl... |
I'm looking for a Windows utility that can list all drivers, driver-filters, services, sniffers and other information for a selected USB port.
I want to check if my "USB connection" is confidential.
|
From the security perspective (and not usability as it's discussed here https://stackoverflow.com/questions/3648430/is-it-a-bad-idea-to-escape-html-before-inserting-into-a-database-instead-of-upon), why is it a bad idea to escape HTML before escaping SQL?
|
In Germany everyone is worried about a prominent political party that exposes their wp-config to the public:
https://www.a***********r.de/wp-config.php
How much of a security risk is that? The db, for example, is only reachable from a local ip.
What information can an attacker actually use and how high is the risk?
Con... |
As mentioned in this particular answer, compressing data before encryption may lead to the CRIME attack, especially if the hacker has collected many similar versions of the transmitted data.
Let's use the following example for this particular security case:
Bob is using an encrypted personal diary program which is sto... |
Imagine I have a file encrypted using AES CBC mode with a key and a random IV. The attacker access to the encrypted text and the IV used but not the key.
In this scenario there is no vulnerability since the IV is random.
Now lets assume the attacker gets information about the plaintext used. The plaintext is a survey ... |
I'm wondering if there is an easy way to establish VPN tunnels through other VPN tunnels to get onion routing like properties (sender anonymity). Since VPN builds a tunnel, it should be easy to set up another tunnel in this tunnel to another VPN endpoint, but I have found no documentation on such a setup. It would be i... |
I see a lot of similar question but my is different. I had done a lot of challenges like Kioptrix and De-ice. But I'm not sure that this is real life pen testing. I mean this is so simple only nmap and metasploit (and some web app hacking). So is there something closer to real life penetration testing?
|
Car manufactures like BMW, Audi or Mercedes-Benz all provide mobile applications to control your car. All apps share really critical functions like remote lock/unlock or the ability to find your car based on current GPS location.
Can somebody provide any additional information how this kind of communication is secured?... |
i am new to buffer overflow and learning from securitytube.net website but in 7th video i got stucked Buffer Overflow Primer Part 7 (Exploiting A Program Demo)
In this when the value of egg is passed through the vulnerable program on one point 80 bytes are loaded on the stack but mine computer is loading 88 bytes due t... |
I'm a firm proponent of using a password manager like Keepass to generate and store secure passwords. I also encourage others to do the same.
But there's always one person who says they'll never use it because it keeps all their passwords in one place, so if an attacker breaks into their Keepass database, they will the... |
Would chip-and-PIN have prevented the Target breach?
As we all know, Target was breached and the hackers stole lots of credit card numbers. Target is now advocating for chip-and-PIN, as a way to provide better security for credit cards. This makes me wonder. If chip-and-PIN had been in place, would it have prevented... |
Most Linux distributions now use ASLR for many programs, to randomize the layout of memory.
How often is the randomness used for this changed? If I re-run the same program multiple times, will it receive the same layout each time, or will it differ every time? Is fresh randomness generated each time the program is ru... |
Many sites that support multi-factor authentication provide a "do not ask me again for this computer" option. I'm hoping to gain some insight into how this feature could best be implemented.
My initial assumption would be that it is implemented using an (ip-locked?) cookie on the users system.
This would however seem t... |
This is a situation that I have encountered on a number of occasions. I will conduct a web search in Google, a link to a file (.pdf for example) will take you to that file on the server. It opens up in your browser, you can save the file.
But when you backtrack through the URL to find out more about the website that h... |
The following image attempts to explain the diffie-hellman key exchange for people not strong in maths such as myself:
I do understand how the colour/paint example illustrates the idea. But I'm a bit confused about how it maps to the use of very large numbers as is the case with the real protocol.
In particular the la... |
In reading Glenn Greenwald's 2014 book No place to hide, one thing stood out to me as a bit odd. Greenwald details how Edward Snowden was insistent that Greenwald install PGP in order to communicate securely, but Snowden then later (before PGP encrypted communications is available) agrees to talk over OTR-encrypted IM ... |
According to https://security.stackexchange.com/a/2531/5002 TLS-SRP allows one to authenticate a client or server without third-party certificates because it uses a shared secret.
If you're going to require the parties have a shared secret, how is this any better than agreeing on a pair of signed certificates ahead of ... |
Everytime I visit Gmail, Facebook, YouTube, or Yahoo mail, I get a popup "Please update Internet Explorer" (while I'm using Chrome!). I don't have screenshots but this website describes the problem.
I followed all steps but it had no impact. I also ran a few virus scans using Kaspersky, then uninstalled Chrome and Fire... |
Two days ago I asked that question:
Are web browser able to use camera without permission?
and I got an answer saying : "there have been multiple vulnerabilities in Flash, Chrome and even Facebook"
Is there a process to validate that a software developed by a company is safe ?
I mean, is it really impossible to prove t... |
I am looking for a free open source solution that is able to capture and decrypt SSH traffic given the fact that I can provide the server's RSA private key (something like SSH CryptoAuditor).
Please advise.
|
i am trying to exploit a buffer overflow vulnerability in ubuntu (kernel version 3.0.0-12 generic i686) by using the method return to libc and the stack is not exploiting ?
By while exploiting i figured out that the address of system call and exit call is of size 3 byte due to which i think i am not able to exploit the... |
From what I understand in PHP '/etc/passwd/' or '/etc/passwd/./././' should be treated just the same as '/etc/passwd'
I am using PHP 5.4 and this does not seem to be true:
php -r "include('/etc/passwd'); "
works fine but
php -r "include('/etc/passwd/'); "
Warning: include(/etc/passwd/): failed to open stream: No su... |
I see a lot of websites (including Stackoverflow) using this authentication mechanism:
Client authenticates under HTTPS and gets back a session id.
Client drops back to HTTP and accesses secure pages using HTTP, passing the session id to prove that authentication took place.
What's the point of using HTTPS to protect... |
I'm building an image with openwrt sdk and i want to secure my image (by encrypting filesystem for example).. How can i do that to prevent anyone from seeing my sscripts or programs running ?
|
Assume a simple struct:
struct test {
char variable[4];
char variable2;
}
If I write something like variable[4] = '\0' there is a buffer overflow which modifies variable2.
Does ASLR prevent this buffer overflow?
|
When storing user's passwords that you need to verify against (but not use as plaintext) the current state of the art is:
Hash the password
Use a salt
Use a slow hash function - bcrypt, scrypt, etc.
This provides the best possible protection against an attacker who has stolen the password database. It does not solve ... |
I want to share a "honeypot" folder on a Windows 7 machine connected to a router. The only shared folder in the local workgroup connected to this router is the honeypot folder, which allows unrestricted access to anyone on the local network. I want to then allow anybody in range to connect to the router via unsecured... |
I am writing an OpenSSL SSL enabled client application which connects to a Google server. I have the SSL working and I can monitor the traffic and see that it is definitely encrypted. I am using OpenSSL API function SSL_CTX_load_verify_locations to load a .pem file containing public root certificates to verify that t... |
In the process of designing a web app that handles public/private key pairs - a Bitcoin web app, specifically - I've had a lot of thought on how to securely handle the storage of the private key, since, using a banking analogy, if someone has access to a user's Bitcoin private key, they have access to all of that user'... |
I'd like to change the CSR before it is transferred to the CA without going through the CSR creation process again. To do that I need to know how to calculate the signature of the CSR after I modified it. Unfortunately I couldn't find out exactly how many bytes of the CSR are hashed.
I created the CSR like this:
openss... |
I've got some practical questions about SRP when the shared secret must be established online.
Is there a way to establish the shared secret online without the use of HTTPS?
If you've already used HTTPS to establish the shared secret, why bother with TLS-SRP at all? Meaning, what's the advantage of switching to TLS-SR... |
What is blind SQL injection, and how does it differ from normal SQL injection? How can I simulate an issue of blind injection?
|
I'm looking at whats nessecary to create a small accounts server for a video game I'm programming in my spare time. User privacy is a very important topic for me, and I don't want to keep anything about my users that isn't really needed to provide the service I'm offering. I don't feel I have the right require that inf... |
So, I've come across a couple of devices that are using default writable community names for SNMP such as 'private' (on windows machines) and 'Secret c0de' (on Brocade switches).
I'm aware of the implications in terms of using SNMP for recon, and i'm aware of the attacks against Cisco devices to both reset the device p... |
I just asked myself that when you have bitcoin network, which is as we know "pseudo" anonym. Because of the transaction logs of the network (which are afaik endless), it seems that transactions are traceable. But my question is how traceable am i when i am using a bitcoin client with something like tor or other network... |
My current situation is:
Site 2 can connect to site 1 via VPN. I'm on site 3. IT at site 1 doesn't allow creating a new VPN to site 1.
I'm thinking of using a Remote Desktop via VPN from site 3 to site 2, and the remote PC (in site 2) will connect to site 1.
My questions are:
Is this possible?
What kind of configura... |
I'm migrating users from custom application-level authentication security (built into the app, using username as the unique identifier) to security as a service (using ThinkTecture's Identity Server and MembershipReboot).
A substantial number of existing users have non-unique or null email addresses. These will all be ... |
Based on my understanding, avoiding the use of cookies as an authentication mechanism prevents CSRF vulnerabilities entirely (namely token based authentication in an SPA), when authenticated.
Does this also render CSRF checks on the login page / API endpoint itself unnecessary? As far as I can see, even though we could... |
Today, I received a mail from fb saying that two of my friends have mentioned me in a comment. When I opened fb to see that comment, it was filled with random names (which obviously were their friends/friend-of-friends) and mine was one of them.
And the topic of the comment was an advertisement proclaiming a hack to re... |
I am putting together a presentation comparing CDN services that also provide DDoS protection. I have to do a really good job on this and I'm not a security expert. For lack of direction, I've copied most of these from a comparison article and could use a little feedback. I don't want a recommendation for a specific se... |
In our app (PHP, MySQL) we allow users to create templates which are stored in their own subdirectory (which is named by the template name).
Someone suggested to use standard file name sanitization but I am not too comfortable to allow user to name their template 'mytemplate.php'
IS allowing extensions on directory nam... |
I am a University student and I'm currently working on a paper of ethical hacking.
I have already investigated a lot about Web based attacks(SQLI, XSS, etc.) and about two months ago I started learning more about RE (Reverse Engineering) in Immunitydebugger.
My professor (who is a CCNP and is an instructor of CCNA) was... |
I was pondering my computer theory and this question has been bugging me for a while .
Is it possible in some way to have a running process with its memory "encrypted" on an insecure system ?
If some one started a thread and its bits where encrypted with a key would`t it have to have its key visible in ram any way ?
I ... |
What I know about CSRF is that a malicious website tricks a normal user into issuing a request to a trusted website using a form.
I understand that is possible because we can post forms to different domains. However, I see posts of Stackoverflow that say that one should also protect AJAX requests using a token.
Doesn't... |
I know theoretical that blowfish is much faster than aes. But I benchmarked several algorithms including aes and blowfish for 1MB, 5MB, 10MB etc. files in java 8 platform and bouncy castle library. In every test scenarios aes is faster than blowfish.
I wonder if I make mistake somwhere?
Here is the code :
private stati... |
When deploying a mobile phone best practices policy, one of the points which were raised was the requirement for the user to protect his SIM card with a PIN. The theory is that three failed attempts to input the right PIN switches the SIM card into PUK mode, and 10 failed attempts to input the PUK make the card unusabl... |
I'm able to upload any file to an ASP webapp/IIS server. My first though is to upload an ASP shell but I don't know where the file has been uploaded.
I have written a Python script that beggining with the URLs dumped by ZAP, makes requests to any known folder looking for my ASP file. For example, if I have the followin... |
is there external library/approach/whatever to add
canary protection (stack-protector equivalent)
extra buffer boundary check (fortity source equivalent)
on a C software without using glibc / gcc built-in functionality ?
|
I plan on using OpenVPN on client devices which are small embedded machines, so I must balance between speed and security.
The OpenVPN documentation says that it is "general wisdom that 1024-bit keys are no longer sufficient". This refers to the asymetric keys used for the key exchange.
I should now choose an encryptio... |
Suppose you have an Internet banking site based on a secure web server running the HTTPS protocol via port 443.
The server authenticates itself to clients through an X.509 certificate signed by a CA. The signature is constructed by using RSA encryption of the MD5 hash of the certificate content. The key used for the e... |
I need some pointers to any resources (videos from any conferences or general videos, pdf, anything) for secure source code reviewing of multi-tiered web-apps in JAX-WS, Spring or Hibernate. I am especially interested in know what are the security vulnerabilities that can occur when using these specific frameworks. I a... |
While performing a pentest for a Java based application I came across an SQL (actually HQL) error by simply putting a single quote in one of the request parameters and breaking the syntax of the query. But as the application made use of Hibernate Query Language as an intermediate layer between the application and the d... |
In TrueCrypt I noticed the option to encrypt a volume with multiple encryption algorithms i.e. AES-Twofish-Serpent. Would it be useful to encrypt something with the same algorithm multiple times? For example AES-AES-AES. I would guess if a flaw or backdoor in the algorithm was discovered this defense would be useless, ... |
Skip to the fifth paragraph for the actual question, before that is some background.
I am a highschool student with an interest in computers and penetration testing. Given the restrictions placed on student-level access on the computers at my school, I often attempt privilege escalation in order to gain more complete a... |
<?php
header("Content-Security-Policy: default-src 'sha256-".base64_encode(hash('sha256', 'console.log("Hello world");', true))."'");
?>
<script>console.log("Hello world");</script>
However I still receive in Chrome:
Refused to execute inline script because it violates the following
Content Security Policy directiv... |
Is it possible to use RSA public and private keys to authenticate two computers (or to make sure they're both the right computers)? If so, how?
Thanks!
|
I was at a coffee shop and had to (I mean had to) check something on my bank account and another account. I figured since the two websites I was viewing were encrypted, and because my computer (I'm on a Mac) has a firewall, and I don't share through a cloud or such, that my information is safe. Google is encrypted from... |
I've recently joined a security project, and received a task to demonstrate the risk related to an end-user uploading an image containing embedded (malicious) JavaScript code.
I used EXIFeditor to inject JavaScript code in an image's imgdescription tag, then uploaded the image to the ASP.NET web server using the follow... |
The private and the public key from the cert must have the same algorithm, correct?
Yes of course pub / priv are a key pair.
So this code would be legal, to be more flexible (e.g. ECDSA or DSA):
PrivateKey privkey = (PrivateKey) keystore.getKey(keyAlias, passphrase);
Certificate cert = keystore.getCertificate(keyAl... |
Is anybody use publicly available (or relatively cheap) templates of procedures for ISO 27001 for build own information security management system capable to be conform standard.
Any recommendation?
After such organic building system did you certified it? Or crucial was reach comparable metrics and staff behavior, no... |
I was wondering if it is possible to create a windows SAM file. I already tried using chntpw but it seems like it only works under a Redhat based linux, ie I was able to blank/change a Windows 7 64bit box on Fedora with chntpw 0.99.5 but I couldn't get it done using Backtrack 5, Ubuntu or Kali. I know I can recover th... |
There are many Firewall solutions for the world on different operating systems: iptables, pf, ipfw.
My question is: Does the firewalls run in kernel-space or all of them runs in user-space? (in general, not just the mentioned ones)
|
I installed the CAcert root certificates on my Android device (which is not rooted), so that I could visit websites with server CAcert certificates without getting the "certificate not trusted" warning.
But now I get constantly reminded by Android, at each reboot, that a third party is capable of monitoring my network ... |
Since an IP address does not necessarily represent a specific device, but probably a whole network/company/etc. does it at all make sense to block an IP address if there is a significant amount of false login tries from it?
I was planning to implement IP checking as well as tries for a specific user/account/email, but ... |
As I understand it, GnuPG allows the creation of multiple subkeys, but multiple encryption subkeys are problematic because it's not clear which encryption subkey someone should use when sending a message. As such, by default, when a person sends a message to you, their software will select the most recent encryption s... |
We are currently having accounts compromised at a substantially high rate. Some in the organization believe that our password complexity requirements is enough to thwart brute force attacks.
I wanted to test and demonstrate how certain password complexity requirements can actually reduce the password search space.
Has ... |
We seem to spend a lot of time guarding against Man-In-The-Middle (MITM) attacks without discussing who we are actually guarding against.
This is important because if these individuals are unlikely to attack our website or the cost of them doing so is minimal then we can afford to spend less resources guarding against ... |
I'm having trouble with a spammer and would like to begin submitting their messages to a few black hole lists.
Unfortunately, I'm having trouble finding a list. For example mail-abuse.org now redirects to Trend Micros and there's nothing of substance available (just a dashboard showing SPAM densities per country).
Are ... |
I've heard from several people that private repository servers like BitBucket are not really safe. I've heard rumours about code being stolen and used by people even out of private repositories.
Is it true? Is there any evidence, that cases like that could have happened?
|
I have a use case forced upon me by industry regulation. I wish it wasn't there, but it is.
A user logs in to my service, navigates around, etc. The user can perform many actions, but one of the actions requires (by industry regulation) that the user re-enter the username and password prior to continuing. It does not m... |
Is there an easy way to test an SMTP server to check for configuration issues associated with STARTTLS encryption, and report on whether it has been configured properly so that email will be encrypted using STARTTLS?
Think of the Qualys SSL server tester as an analogy: it is a great tool to quickly check a webserver to... |
I am trying to figure out how it was compromised. They installed IptabLes and IptabLex in /boot.
They also added /etc/init.d/IptabLes and /etc/init.d/IptabLex which simply call the respective /boot files. It seems this attack uses a lot of bandwidth (probably a DDoS); I noticed it immediately.
The server is running Ce... |
I'm going though my GPG keychain. I've got a key for a few strangers in my keychain. I don't recall exchanging keys and I'm not sure how the public keys came to be installed in the keychain. I think (perhaps incorrectly) it may have been installed by GPG for Mac OS X, but I'm not certain.
I did find some references to ... |
I am seeing quite a few browser "version 0.0" in visitor log. Can anyone explain the significance of this? Please see examples below. Thanks.
Safari version 0.0 running on ChromeOS
Chrome version 0.0 running on Win8.1
Chrome version 0.0 running on Win7
Chrome version 0.0 running on WinXP
Google Web Preview version 0.0... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.