instruction
stringlengths
24
29.9k
NIST recommends FIPS 181 as a random password generator for "easy to remember" passwords. As far as I understand the standard: it will generate a password that is lowercase, and with some pronouncebale syllabuls My question is whether there is an alternative standard which: includes besides lowercase alphabet, upp...
At our office we have bad reception for 3G. We bought a Femtocell device that provides a 3G connection for one specific mobile provider. This device is connected to our network via ethernet. I cannot use this device at our office, because I use another provider. Thinking about this - it could be that I use connections ...
So I just used metasploit to generate the payload/linux/x86/shell_bind_tcp payload without null bytes (generate -t raw -b '\x00' -f shellcode). Here's the shellcode: $ xxd -p shellcode dbddd97424f45e33c9bf0e0f5844b114317e1983c604037e15ecfa699f07 e7d95cb482dfebdbe386269b5f19ebf35da51a5f08b54d0f455407c90d5a 589cef60ea9a5...
I have my own suspicions that there are blocked users of my website that use Teamviewer to login to my site from their friends' pc. Is there any way to identify if the one who visit a website is using the Teamviewer at the same time?
If I go to https://google.com/q=test_query with from my browser, what traffic can be seen on the router? Can the domain name (google.com) be seen? If so, can I block all of the traffic to a web page by disallowing access to that domain? Does anything change if the website has multiple IPs (different servers)? Thanks!
In other words, how easy is it to break into Windows without having the passwords for any of the users configured in the computer?
I am trying to encrypt few database columns (string values) using Java AES algorithm. This is to protect certain sensitive data. For some users these data should decrypted. In Java AES encryption, if my input character length is 60, I am getting encrypted string length as 88. But I don't want a change the length of the...
As stated in the title. In my lab I am trying to arpspoof a so called "victim pc" that is using Windows 7. I do arp spoofing with arpspoof, but once run arp -a on the victim I see that the gateway entry is not changed. Maybe because the entry associated with the gateway is set to static. In a situation like this, there...
A recent laptop theft, as well as concern that the data upon it might be deliberately accessed (on a drive with encryption or not), head lead me to think about how one might retroactively seek to regain possession of such a laptop, or at least how one might go about gaining leads as to who might have taken it - or wher...
Using a buffer overflow, I have been able to override return addresses. But the problem is that Windows addresses contain zeros at the beginning (e.g. 0x00401020). As a result, the objdump of any C binary will contain zero's. This makes it very difficult to execute shellcode inside a buffer as a shellcode cannot contai...
I got a question that says "What is the major difference in the USB propagation system used by Flame with regard to Stuxnet to prevent being identified?". After Googling for a while, I haven't found anything about this.
We have a situation where a user's identity can be verified as follows: the network provider knows the identity of the user and injects secure headers into the HTTP request, which our servers can use to authenticate the user. We're writing client-server applications and want to use this mechanism to automatically authe...
Is it possible to trace the source or destination (location, even coordinates) of an SMS message ? If it is, is it possible to do it even if the phone is roaming in a different country ?
1.4 install personal firewall software on any mobile and/or employee-owned computers with direct connectivity to the Internet (for example, laptops used by employees), which are used to access the organization’s network. If company employees have their own mobile devices that don't connect to the internal network howev...
I have several clients that are having trouble logging into vendor's web service. When talking to the vendor about the issue, they told me to set them up with Chrome running in Windows XP compatibility mode. This is how they want the client to change the compatibility settings: I have some reservations about this fi...
We have several applications that leverage AD SAML (via Ping Federate) LDAP authentication from 3rd party applications Windows workstation / Exchange auth (Kerberos) IIS and web components (su4user, impersonation, etc) I have never deployed 2 factor auth in an AD environment and remember reading that RADIUS was leve...
How can find the efficiency of any biometric system is there an equation to find it? How is the efficiency of a biometric security system?
From what I understand, when you send information to a website over SSL, you encrypt the information you send with their public key. However, if you want to be able to decrypt the information they reply with, you are going to need a private/public key combination yourself. I don't ever recall having been prompted for a...
The wonderful answer to the question "What can an attacker do with Bluetooth and how should it be mitigated?" suggests that frequently re-pairing Bluetooth devices is a "good idea™." Are there any Bluetooth pairing sequence attacks such that it would be advisable to avoid pairing Bluetooth devices in public places? Or ...
I'm trying to understand how this user impersonation might have taken place. Here's the scenario: Our controller got a call from our bank this morning about a suspicious wire transfer request. After some back-and-forth with the controller and with the bank, we've established that this is what happened: Somebody sent a...
The official TrueCrypt webpage now states: WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues This page exists only to help migrate existing data encrypted by TrueCrypt. The development of TrueCrypt was ended in 5/2014 after Microsoft terminated support of Windows XP. Windows 8/7/Vi...
I have a web application where (among other things) customers can upload files and administrators can then download those files. The uploaded files are stored on ServerA and the web application used to upload/download those files runs on ServerB. I would like to make it so that while the files are stored on ServerA th...
I read an article from CSA that they rank service traffic hijacking as the #3 threat to cloud-services. Why is it worse for the user if an attacker hijacks its service traffic on cloud? What new exploits can the attacker take advantage of in a cloud-service compared to before? I had a hard time phrasing this question ...
A typical strategy for defeating ASLR is to find both a buffer overflow bug and an information disclosure bug. But when attacking servers that are automatically restarted whenever they crash/die, is a buffer overflow bug enough? Can we use that buffer overflow bug to also give us the information disclosure capability...
I want to create my computer passwords with a RNG, but I am thinking about one thing: I would use python to write that script and the RNG is controlled by one seed, most likely the time. If I would generate my passwords with a RNG that is seeded with the time and someone knows about it, he could try to brute-force the ...
I don't trust BitLocker. Probably backdoored and relies on TPM which can be hacked according to DEFON. It also does not allow for hidden partitions or other advantages like TrueCrypt. With TrueCrypt and the state that it is in, are there any other open source options that can be trusted and not backdoored?
I am planning to use JSON as the data transport mechanism between my iOS app and my server (the server is a WCF service). While learning about JSON, I realized that all the data is passed around directly in the URL. I am sure this question gets asked a lot but I was not able to find anything concrete on the site. Is th...
I'm made a small web service that gets urls, download them, and convert them for another format. Most of those urls are documents (doc, docs,...). Basically, I'm open them with MS-Word and convert their type. Another critical assume is that my server will meet, in some day, an infected file within the given urls. Now, ...
From what I understand, the certificate authorities (CAs) have to get their root certificate included in the browser. What if the root certificate of a particular CA is not included in the web browser yet. Is there another way to get it in? Maybe my question is not clear enough. The question shoud be : in a PKI hierar...
Many people who live outside the US use "DNS unblockers" such as Unblock-Us to access region restricted services such as Netflix and Hulu. My understanding of these services is that for DNS requests to blocked services it instead returns an IP for one of their proxy services. Netflix is approximately 5 times cheaper th...
I am having trouble finding out if a potential server configuration is secure. I have a server running a nginx reverse proxy that is accessible from a public ip address on the ports 80 and 443. I then have a private network that is internal to the machine nginx is running on with a 172.17.%.% address that only the mach...
This has become a bit of a thought experiment for me. Suppose someone would like to establish a pseudonym along with a corresponding PGP Key, how could other people verify the correspondence between the name and the key? Generally, PGP keys are for real people, whose identity can be verified IRL, but that does not appl...
I have an c/c++ program used for encrypting data for communicating between two ends. Encryption is done using OpenSSL (0.9.8d-fips, Sep 2006). Think it'll be worthy to mention that I'm not much familiar with using OpenSSL. The program works fine for larger packets. But the size overhead is very high when encrypting sma...
i play an android game which seems to send the player's high score in an encrypted format . some thing like (f11cca35236eebbdc26a0ce45876d117) a 32 character code tried MD5 but no result found. i wanna know is there any way i could decrypt it or at least find the encryption method? thanks
In light of the current fiasco surrounding TrueCrypt, I have received considerable criticism from current clients and peers in the IT industry for my continued support of the open-source model. Such criticism is usually lumped in with ongoing dialogue on the virtues and failures of the open-source model following episo...
I'm playing with adfs, and I'd like to store credentials in a session context during my questioning of the user. So, my question is, is it safe to store sensitive data in a session context? Thanks
In a weird announcement on the TrueCrypt page it says that the software is unsafe so we should migrate to BitLocker. If it is a prank it's sure not funny especially when it comes to data. Since I want to switch to Linux as my primary OS, I was thinking about Encrypted LVM. Is this secure just as TrueCrypt full-disk e...
Unfortunately, TrueCrypt may have been discontinued yesterday. I use LUKS on Linux, but I liked the fact that with TrueCrypt I had a portable solution across Windows, Mac, & Linux. TrueCrypt has its own license, but it was Open Source. Are you aware of any reasonable fork of TrueCrypt or any other portable alternativ...
We are a medium sized company. Recently, one of the representatives of the finance department raised a question about the use of credit cards to shop on-line among different departments in our company. His concern relates to cases when a person from Department X requests to make a purchase from a site directly from his...
I was using TrueCrypt until recently, until one of two options has happened: either it was discontinued or its web-site truecrypt.org was hacked. Any option implies that I don't trust it anymore. So I'm now looking for encryption that is both convenient (just drag and dropping a file into a container) and secure (in th...
So I am interested in computer security, cryptography and security protocols. Thing is, everything I read is about theoretical usage of protocols, but how do those things work in real world? Is there a book or paper that I can read and understand how everything works practically. Like how everything is implemented prog...
I'm working on a mechanism to better handle group policy passwords in response to MS14-025. We formerly used this mechanism for setting the local admin account passwords on our workstations (primarily Windows 7) To this end (see the method I've outlined below for specifics) my thought is to have these changed client si...
Specifically, why are the most popular attack proxies written in java? Is there any particular security posture to the design of the java language that makes writing tools like these simpler? Easier to maintain and update?
Many websites, including banks, use text messages as their primary or secondary means of authentication. In theory, it sounds like a perfect method unless the user loses their phone or has it infected with a virus. However, are there any known attacks on text messages that don't rely on access to the actual phone? Is i...
Given KeePassDroid, I'm considering some of the security implications of accessing KeePass databases on an Android device. In the native applications for Windows, OSX, and Linux, whenever the database is locked or exited, the password is erased from memory by filling its location with zeroes. Since Java itself does gar...
Does DANE offer the ability to provide certificates for services? Or is it just hosts? How does one specify a mail server with DANE? If my email is jd@foo.com but mail.bar.com is the email server, then do I publish mail.bar.com for the foo.com domain? Here, mail.bar.com may be operated by someone else (in my case, its ...
I wonder why countermeasures against code-injection and control-flow hijacking attacks (e.g. stack-based buffer overflows and heap-based buffer overflows) are mostly implemented in software. Examples of popular and widely deployed countermeasures are: - ASLR - Stack canaries - Non-executable memory regions But why exac...
I am taking a web security class and was told by the instructor that most of the websites today use https for authentication and then use a cookie (authentication token) in plain text to keep track of the user. I wanted to confirm this. For example, when I use Amazon.com, if I logged in before, Amazon shows something r...
Transaction Data Signing I need an idea to develop a very secure algorithm to authenticate online operations using PHP in the server and an Android app in the user's device. What is the idea? The user try to login in the system. The server sends a confirmation request to user's device (Android). The user sees the date,...
A friend shared a "security service" he just read about. Apparently the product is in beta and can thus be tried by anyone right now. I found it very interesting and surprising. I'm curious to know who provides the license plate photos for this product and what legal implications exist with this sort of thing. The serv...
I have a web application that runs on localhost. I have a self-signed certificate for tomcat configured but when loading the website on firefox, I get a security exception. Can I get a CA to sign my SSL certificate so that this error is not thrown?
I'm developing Medical Billing & EHR Software. On completion we are planning to use AWS for hosting and thus provide SAAS. Do we need to encrypt the MySQL database in order to keep HIPAA compliance? I'm aware of HIPAA requirements for data at rest but I don't know how it applies to Amazon Web Services.
My understanding is that, typically websites are recommended to store only hashes of passwords using one-way cryptographic hash function. This way, there is no way to retrieve the passwords even when somebody can hack the database.[1] On the other hand, financial management website Mint requires you to enter bank logi...
I want to create a dual-boot such that the content of each OS is separated from the other using encryption. The main point point would be to to test out potentially harmful software on one OS, and still be able to rely on the integrity of the other OS. User A uses OS A and User B uses OS B. Lets assume: both OSes are...
I have a website and hosted some data and MySQL files on it. Is it possible for me to install an intrusion detection system on it, or can IDSs only be installed on my internal network where I have a router?
I've read numerous articles about using HMAC and the secret key for client authentication in a RESTful client (Javascript) application today. Still, I don't find a single source that is able to transparently explain to me a process that fills the security gaps in the theory. The secret key is supposed to be secret, whi...
With their iOS devices, Apple allows people to block certain applications through "Restrictions". I recently had an issue with my iPhone where I'm positive that I entered the correct passcode on my new phone, but the device refused to give me access. Searching around online shows LOTS of other people claiming the same ...
There is no doubt in my mind that spaces should be allowed in passwords. I see some websites disallow spaces, symbols in passwords and even enforce minimum length which seems t otally nonsensical to me. Normally I'd check that user passwords contain: minimum of 6 characters Upper case letters Lower case letters Number...
I am trying to find out whether this is vulnerable against XSS: I can control the content of the title tag through the URL. This would make the site vulnerable if it wasn't for the fact that the site only takes the text until the first forward slash appears, making it seemingly impossible to close the title tag. I alre...
Since a few days, the Sourceforge project page of TrueCrypt is displaying a message saying: WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues And, the authors are even encouraging users to switch for Microsoft BitLocker program. The press did a lot of comments about this change: TrueCr...
Question Standard security advice is: Only download files from websites that you trust. http://windows.microsoft.com/en-ca/windows/downloading-files-internet-faq This implies that 1. we are active agents when downloading files from websites and 2. websites cannot download files to our computer without our interaction...
I attended B-Sides in Orlando FL where one of the speakers had mentioned a site which contains hardened configs for popular services such as apache and postfix. The author of these configs is anonymous and although he doesn't claim to be an expert most would agree his configs are pretty locked down. I want to say it's ...
Watching the Snowden interview last night, Brian Williams asks him what degree of control the NSA has over smartphones -- in particular, whether or not they can remotely turn them on in order to collect data. Snowden replies "Yes" and goes on to say some scary things about the kinds of data that government agencies can...
I've been getting the weirdest email messages for the last 2 days on my personal gmail inbox. On May 28th, exactly at 4:33 pm BRST I got about 2,000 emails that look exactly the same, here's the original. Delivered-To: XXXXXX@gmail.com Received: by 10.58.195.142 with SMTP id ie14csp9116vec; Wed, 28 May 2014 17:...
For a long time I've pondered this question. I am aware of the benefits and downsides of dynamic libraries (shared objects), including the infamous article by Drepper. All other things being equal, isn't a statically linked binary of, say Nginx or OpenSSH, less prone to stuff like library placement or other (non-kernel...
IP is hidden in apache log for privacy, except last octet. /billing is our application start page. But it doesn't make sense that it sends POST requests, and get 500 response. Or maybe this is legitimate old IE 7 browser who can't handle our site, ant sets into loop? There is about 20000 such requests xx.xx.xx.223 - -...
While it seems like a bad idea for attackers to be able to use DNSSEC to enumerate subdomains, I cannot think of a specific attack that this information enables, which would not be doable without this information.
According to process of authenticating a server certificate: What's keeping a malicious server to fill up a valid server certificate since it knows all the things: Forged Server public key (man in the middle public key instead of actual server public key) Certificate serial number. (actual server) certificate vali...
I have 3 CentOS server configured for my applications. Recently I recognized that there is so many attacks to my servers. I have so many logs about attempt to login to my servers using sshd from unknown IPs. This is some part of my secure log: May 25 03:45:03 mail sshd[22291]: Invalid user user from 42.121.117.150 May ...
I already know that some concerns of lack of security in TCP/IP are that TCP/IP does not support strong authentication of packets and no encryption of packets. What other weaknesses are there in the TCP/IP regarding security concerns?
The enterprise where I work has a proxy server that traces and filters our web activities. Employees claim that they can know the links that we visited and see the content of HTTP web sites, but they can't see the content of HTTPS secured web sites because the content would be encrypted by the server. I don't share the...
If I do not define any range (or if the range is large like a hundreds of ports), Nmap is returning ports as opened. However, if I put a smaller range or just scan a specific port, it says it's closed. For example: nmap -sV 1110/tcp open nfsd-status? 1111/tcp open lmsocialserver? 1112/tcp open msql? 1113...
I recently discovered a way to bypass a commonly used security seal system, requiring no special equipment and taking only a matter of seconds. I feel obliged to disclose this, so as to avoid the possibility of users of that seal system harbouring a false sense of security. I would use CERT's Vulnerability Reporting Fo...
I am an admin of an immigration forum. Security is my job One and protecting our members's info is my highest priority. Recently, I discover that there are 3 members who have posted from the same IP addresse and the same iPhone browser info. My questions, Is it possible that different people would have the same IP ad...
Say I have previously created a private/public key combination, and decided at the time to not protect the private key with a password. If I later decide to "beef up" security and use a password-protected private key instead, would I need to generate a new private/public key pair, or can I simply add a password to my e...
I wish to set up SSL/TLS for my site. How can I do this on my own without using a certificate authority. The site will be accessed only via certain machines so I can easily install the public certificates on their browsers.
There is a web application which contains a search function. When I search for aaaaaaaaxss I get this: <meta property="the:property" content="100 Results for aaaaaaaaxss (Page 1)" /> It strips the < and > characters but not double quotes. However, since I cannot get rid of the other input, I cannot use 1;javascript:ale...
I've been reading about SSL/TLS and I was surprised when I saw the amount SSL/TLS implementations that exist. wikipedia. So, is there really a need for all these different implementations? Wouldn't it be cheaper, more productive and faster just to mantain one implementation like OpenSSL?
I have two questions regarding Tor (onion routing). How do I receive responds from a server when I use onion routing, I've read that, the last node(exit node) will use the same path I used but in the reverse order, but that means that the last node will know who I am. It was never clear anywhere but I guess that the ex...
Assumption used: all password that I've used have been salted with some random elements before hashed and stored somewhere in their database. If my previous password exists only as salted-hashes in their database,then when I: trying to use a previous password during the password reset phase (as I type it into the new p...
I have an ASP.NET web application which uses HTTPS and XML based request-response. It seems a user's session cookie can be retrieved via XSS, if the request/response is intercepted and malicious JavaScript code is added as a payload. Since it is an XML based request-response, the payload has to be HTML encoded. Here is...
I have been looking for an operational security guide for generating one's asymmetric key pair for (Open)PGP. I have found plenty of technical guides for how to use GnuPG to generate RSA key-pairs, for example, but not much organized content of how to do so securely. The use case is an average user wishing to use asym...
I am doing an HMAC of some cipher-text, IV and encryption algorithm. Right now I am using a hard-coded key that is known to both sender and receiver. I was wondering if the key should be changed once in a while? If it does, how would I synchronize the keys with the receiver? Is sending the HMAC key in plain-text a very...
If I was able to view any page on a website as localhost using SSRF, what files should I check for? I checked to see if I could view robots.txt normally, and I couldn't, but using SSRF, I was able to. What other files are typical on websites that are normally hidden to the public, but would be visible on the localhost?...
How can I block websites in Firefox from viewing my browsing history within my browser cache? For example; I've done some Google searches that Amazon is now starting to use to target advertise; the issue here is that Amazon is able to view my history for Google; how can I prevent this at the browser level?
It is asked in stackoverflow, but I suppose maybe it is more suitable to ask here. It is said that openssl are widely used, however, as far as I know, the most popular browsers seem not use openssl, instead, they use other SSL libraries like: NSS (for all firefox and chrome in Linux) SChannel (for browsers in Windows)...
Wordfence reports the following visitor: An unknown location at IP 0.0.0.0 visited 4 hours 45 mins ago IP: 0.0.0.0 Browser: Baiduspider version 2.0 Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html) An unknown location at IP 0.0.0.0 visited 4 hours 45 mins ago IP: 0.0.0.0 Browser...
This is something which I have been wondering and trying to find an answer for, but yet to come even remotely to one. Why do you need a 4096-bit DSA/El-Gamal key when AES uses only 256-bit keys?
I've lost my master password. Not all is lost as I know the original word that generated the password: It was generated by a random case switching for consonants and random vocal to numbers. For instance: a and A become 4. I'm searching online for list generators that takes the seed word and generates permutations as I...
One of my friends told me that running tor in a virtual machine Linux and then passing it through a proxy on the underlying Windows would provide in his words great security. Is this true?
I have set up an SSH server to accept only login using codes generated by Google Authenticator (I have disabled all other forms of authentication on that port). After having rebooted my remote machine, it keeps giving me the Access Denied error after having entered the code on the authenticator app. It has been working...
Given that an attacker only knows the public key and cipher text, why is it difficult to decrpyt the message ? If the knows the N value will he be able to decrypt it ?
By several REST clients the credentials are sent with every request through custom HTTP authorization headers to the REST service. Is there a way to force file download in the browser when accessing files stored in the REST service, is protected with this kind of authentication? Force file download: Content-Disposition...
There are well known attacks to WPA by capturing handshake and running offline hashcracking against it. Also there are tools to exploit vulnerability in WPS to get the PIN. My question is why WPS handshake (if it is called handshake) cannot be captured and the PIN revealed. It seems impossible otherwise obviously someo...
Did anyone successfully exploit CVE-2010-4478 in the past? This is insufficient validation of the J-PAKE public key parameters in OpenSSH up to 5.6. I'm dealing with a vulnerable machine running OpenSSH 5.1 p1. I need to get a flag but in order to do so, first I need access to the server. I found the vulnerability of j...
I need some help in understanding the security risks if I want to use OAuth 2.0 (Facebook, Twitter and G+) as standard login provider for an E-Commerce site. Keeping in mind that I will not be saving Credit Card information on the site or in any of the data stores. I would be utilising services such as PayPal (And Simi...
My boss proposed me to code from home on the their machines via internet, in two possible ways: I would connect to their computer and work on their machine, as if I was in front of the computer(from what he said the method used in this case would not be a VNC but something different) Via SVN My concern is all about t...
I've bought a new phone, where one of its products can be activated by receiving a phone call. If someone uses a spoofed SIM card - with a number I recognize - I'll likely answer the call. Are there ways to circumvent this? I'm currently using a phone for data only, and another for calls and SMS: This leaves my calls a...
Google recommends using a 130-bit cryptographically-secure random number as an anti-forgery token. Why do we need so many bits? If an attacker decides to mount a brute-force attack, wouldn't you be able to detect and lock them out after a few attempts? With as little as 30-bits, you've got 1 million possible tokens for...
Note: Original question asked at https://stackoverflow.com/questions/24012390/is-this-token-based-web-service-secure but here seems to be the right place for it. The company that I current work for has an internal application, it provides some RESTful (sort of, just a collection of URLs) APIs. To access the APIs outsi...