instruction stringlengths 24 29.9k |
|---|
Snort, daq and WinPcap are installed. The rule files are located at a convenient place. How can I solve this problem? A clue is the ERROR line: Missing/incorrect dynamic engine lib specifier.
|
For debugging purposes, one might be asked to put the output of strace for some process online, i.e. attached to a bug report.
Is this safe in general? Under what circumstances is this safe or unsafe, and how would I process a strace-logfile to make sure it is safe to put online?
(I suppose it might depend on the appl... |
Some of the old PHP string functions for example explode() are working with UTF-8 strings, but they don't work properly on malformed UTF-8 strings. Is this a security issue? Is it possible to avoid string validation with malformed UTF-8 strings somehow?
It is hard to make a list of this functions. I think every core PH... |
After watching videos and downloading just about every possible pen-testing tool out there to play around with and learn. How do you setup test beds and practice scenarios to crack?
With RE people make crackme.exe files. I was curious do people have virtual machine templates and other setups created for download that y... |
I have an ATT U-Verse Wireless router supplying 5 computers throughout my home. It is hardwired to my main computer.
I have three children of all ages, one of which has had a tendency to make poor decisions on websites, email, and internet chatting.
We have discussed the issue, but I am of the 'trust but verify' mind... |
I've played around with metasploit simply as a hobby but am wondering if actual pentesters and/or hackers actually use metasploit to get into systems or do they write their own post exploitation modules or their own programs entirely?
Reason I ask is because metasploit does not seem to be able to selectively clear win... |
Github pages is now using github.io domain instead of github.com I've read github explanation but it's still difficult for me to understand the root cause. Why would a domain become a security issue?
|
A lot of articles underline that XSS vulnerabilities can be very dangerous for the website on which they exist. I wonder how much is this true when we find these XSS vulnerabilities on the frontend of a website, in fields such as the search forms?
|
I'm looking for hints to solve my problem.
I would like to trace all devices that are in my surroundings.
I know how do it when someone already access to my WiFi network, but I'm also interested to see all other devices.
My idea is to trace mac address of all devices (associated and not associated to my AP).
I assume t... |
I was looking for a form on the US Department of Transportations website, and I came to a page that gave me an error, with a full debug report and stack trace.
Hopefully, you can get the same result by going to the page as well:
http://www.dot.gov/airconsumer/air-travel-complaint-comment-form
If not, I've included two ... |
While trying to understand some SNORT rule lines, I came across the following syntax that I could not figure. Could not find any description in the manual (though admittedly I've not read it all throughly yet).
Two examples with the parts in question highlighted.
From sid:17166
pcre:"/(?P<var>\w+)\x2Ereplace\x28\s*(... |
I have recently been trying to get my company ip addresses scanned with Comodo HackerGuardian. My website needed some adjustments to ssl but after they were made it passed the scan. As we also have a machine accessing a Virtual Terminal at our office premises I then scanned our LAN ip, but as we have no open ports on o... |
I knew about the Metasploit Framework for a few years, but I never really got into it. I have some knowledge when it comes to networks, but I am not a Pro. I've tested some things with Metasploit and I was curious about one thing.
(please correct me if I'm wrong)
Let's say that Microsoft is releasing a new version of... |
Let's say I get a new computer that's never been connected to the internet before. The first time I connect it to the internet, is it susceptible to a mitm attack while downloading its public key certificates from a certificate authority?
I assume that once the computer gets the certificate authority's public key certi... |
SPOILER ALERT: This question contains an answer to one of the problems from the Google's XSS Challenge! Please stop reading further if you're not interested in knowing the answer right now.
I'm able to get pass the level 4 of the challenge, however, I still don't know how exactly the exploit is working. The following ... |
I am developing an iOS application and web page, both use same Parse backend.
Web page contains some functionality that is not available in the iOS application. Therefore I would like to present the user an option to open home page from app. As user has already logged in before in the app I would like to skip the login... |
As stated on their website:
DVNC is not encryption but is a new branch of cryptography and
information science. DVNC employs a new paradigm in secret keeping to
keep your data secured.
I understand it is used like traditional cryptography to protect a message from being understood by an attacker, even if it is in... |
In attempts to setup our first instance of NDES/SCEP in the wild on Cisco routers we have run into a concern.
Currently our organization has a three tier PKI. We have an AD CS server on the third tier running NDES. All aspects of the system are functioning, but through discussion and testing we have a concern.
How do R... |
I just received an email from a friend's email account that conforms with the standard hoax where the person says they are traveling, have been robbed, and need money to pay for the hotel bill to get their things released. I'm not sure that my friend would know yet as she is indeed traveling. Should I report this? To w... |
I want to know if it is possible in Elliptic curve cryptography to have 2 parties holding a part of the private key. The idea is to encrypt (for DSA) data with the 2 sub keys without any of the party getting hold of the original private key.
For example:
Issue a private key
Split somehow the private key into 2 sub pri... |
I was browsing the web and suddenly I started seeing "Waiting for available sockets" error in Chrome with the page showing "Network Unavailable".
I thought that was weird so I opened up Fiddler and saw these strange URLs. Is this something someone has already seen?
Thanks.
|
With large computing power (like what you can get in the Amazon cloud for example) you can generate huge rainbow tables for passwords. There also seems to be some large rainbow tables reachable that you have to pay for.
What are the largest tables that secret services could possibly use and what's the maximum character... |
For a any processor of these or any other processor
armeabi (v7-A, Cortex A8); 2012 TI Sitara XAM3359AZCZ100; 1 x
1000MHz
armeabi (v7-A, Cortex A9); 2012 VIA WonderMedia 8850; 1 x
1200MHz
amd64; IB+AES (306a9); 2012 Intel Core i5-3210M; 2 x 2500MHz
How can I calculate the time needed for RSA verification ?
in anothe... |
I want to validate my SSL certificate each time I run API calls. I've been following this guide:
http://artur.ejsmont.org/blog/content/how-to-properly-secure-remote-api-calls-from-php-application
This is my code:
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, "https://api-3t.sandbox.paypal.com/nvp");
curl_setopt($ch... |
Convergence is a well-thought out system to replace certificate authorities built by Marlin Moxiespike back in 2011.
Since it's debut, it seems to have largely stalled out, with no additional major notaries since the original pair and a total lack of adoption by the major browser vendors.
The most critical piece of the... |
AFAIK, our current disk encryption methods (dm-crypt) preserve the key (as well as decrypted data) in RAM while the computer is running with an implicit assumption that the memory is volatile and key will be lost along with decrypted data when computer is shut down.
However, future advancements in technology may make v... |
I am trying to understand certificate pinning.
Google started adding a whitelist of CA certs that they use for their certificates and if a cert for a google service is issued outside of this list they deny it. That is straightforward.
But say I have a web site https://www.example.com how do I use certificate pinning t... |
I have two WebServices that are hosted by two different applications. Both Applications access each other's webservices:
Now both WebServices have to authenticate with each other. Different solutions came to mind.
Create a Authentification Server
Each application has a config file: Put a generated key in there.
W... |
Let's say users can define content of the style attribute, but in a constrained way. They can't break out of its value, as white-listing parser will remove any unsafe attributes/tags produced this way.
Can they do XSS using just the style attribute value in modern browsers?
With 'modern' being IE10+ and newest versions... |
When a system must go from a powered down state to a fully operational state without any human intervention it therefore needs access to usable authentication credentials unattended. The system must recover and boot automatically without human intervention so the credentials must be stored in a readable format on the f... |
There are exerpts, that say that using https can be broken by the NSA by now.
So is https still a solution for secure web-browsing?
source: http://www.digitaltrends.com/web/nsa-has-cracked-the-encryption-protecting-your-bank-account-gmail-and-more/
Encryption techniques used by online banks, email providers, and many... |
I want to capture all the traffic from an Android app for its pen-testing. How do I do that?
Here's what I've already tried:
I installed the app on an emulator and started the emulator with a http-proxy pointing to a local port. The local port had ZAP running on it. I'm able to intercept the traffic from the browser bu... |
I've been studying about common injection related problems. Is it possible to embed some filtering mechanism to prevent injection client side?
For example checking address bar URL for malicious added parameters, or checking user input forms on submission.
I am not questioning whether this measure is 100% effective or n... |
This question could be renamed "Would forbidding SQL comments inside transactions prevent some SQL injections?", but I'd like to know if some DBMS allow this first.
The goal is to reduce the attack surface of legacy applications. I understand that all user input should be sanitized before being used in an SQL statement... |
Is it possible to have a different passphrase for a GPG subkey?
The reason is that I'm using duplicity to back up my files, and it needs the key passphrase to sign the files.
Since I want run duplicity automatically, I would have to store the passphrase in an environment variable. I don't feel comfortable storing my m... |
It is common advice to not open suspicious email in order to avoid being infected by malware contained in the email.
What constitutes opening an email in Outlook? Specifically, is viewing an email in Outlook's Preview pane equivalent to opening an email? Can malware be activated by previewing email in Outlook's Preview... |
I would like to keep a password matrix in an Evernote note. I would like to ask for feedback on the security of that storage.
|
I'm looking for a reliable solution to compare two strings without leaking their content through time differences. The length of the strings is not secret.
The background is this: I'm implementing password-based authentication for a web application. The passwords are hashed with bcrypt and stored in a database. Rather ... |
How do I have to use hydra on a web form?
What I have done so far:
I already successfully used hydra on a folder with an HTTP authentication:
http://localhost/test/authtest/
with user admin and password 1234, I successfully found out the password with:
hydra -l admin -x 1:5:1 -t 1 -f -vV 127.0.0.1 http-get /test/auth... |
I was wondering how secure Touch ID/Keychain is really. My understanding is that iPhone 5S devices that use Touch ID allow you to enter a passcode if your fingerprint doesn't work, as a "fallback". Now, with iOS8, Touch ID is being offered to apps as a way for users to authenticate.
But... it seems to me that this is ... |
I have developed a REST/JSON API. The API exposes a lot of features. The API will be consumed by applications we design internally (mobile apps and web apps), by applications designed by our resellers and by applications designed by businesses. I am looking at securing the application by implementing authentication and... |
(I'm not sure if this better belongs on unix.se or android.se, but since it's primarily security-related, I'm asking it here)
I use my Android device to access servers for quick on-the-go administration. Before you ask, the device is encrypted with a fairly strong passphrase.
I'm using the standard Terminal Emulator pr... |
Recently the CCS Injection was discovered in OpenSSL (CVE-2014-0224)
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224.
It allows man-in-the-middle attackers to consequently hijack sessions or obtain sensitive information.
Is it critical?
Is it required to immediate upgrade OpenSSL?
How it is risky related to... |
When I download PGP keys from keyservers like so:
gpg --search-keys steve@openssl.org
How are the public keys transferred down to my machine? Is there a possibility of a MITM attack to serve me the wrong key?
|
Is it a problem to have more than one account in an information system from security point of view?
Let me clarify a bit. It is a bank system. I wonder if having a CSO (customer service officer) with more than one account associated with him/her (more than one login name and password for the same task) would result i... |
Recently my debit card information went to another hand, and he/she started to using it until my bank reports that there is an overdraft. I use Ubuntu 14.04 machine.
I am sure I am not a victim of phishing, or email-scam. But I sometime use debit card for online purchases.
Moreover, after going through my account hist... |
Preamble: Am in awe about the quality of both questions and answers on https / SSL on this site. My humble question below pales in comparison.
Both on professional and amateur websites I've encountered the following phenomenon, when trying to contact - that is, write to - the website's owner:
Rather than providing a s... |
I have an instance in Amazon EC2 and need to be HIPAA compliant. I have two questions,
Should I need to do a block level encryption of the database storage.
Should I need to encrypt sensitive data before storing in the database.
|
I understand that the shared users on a wifi can see each other's HTTP traffic using proper tools. Is it possible for shared users to read HTTPS traffic or encrypted traffic like TOR ?
|
I need to encrypt a partition, truecrypt could use keyfiles, (images and other)
Is there any other encryption tool with GUI which can encrypt entire partitions and not only files/folders?
|
I have read some questions and answers about uploading images specifically:
Have I done enough not be compromised through image uploading
Risks of a PHP image upload form
Uploading images safe of XSS, php code and virus
Antivirus for scanning anonymous file uploads
Use PHP to check uploaded image file for malware?
So I... |
Lowercase-only passwords are convenient for phones since we dont hit shift or go to characters page(each which is as much effort as hitting a character in my Android devices). But how long would a lowercase-only password have to be to match a 10-character all-chars password?
|
Creating an X.509 certificate with a valid signature with OpenSSL is pretty well documented all over the Internet. There are instructions on creating certificates that are signed by themselves and certificates that are signed by a certificate authority (CA). But how does one create a certificate with an invalid signatu... |
I've been investigating to deploy a honeypot for research purpose, Honeyd seems like the most popular and adequate option to my needs, but it seems too old, the last version of this software was launched almost seven years ago (2007) and makes me think if it's still a good honeypot solution.
I would like to know if the... |
Thinking about software security metrics currently I've thought about the following software security metrics:
number/type of CWE detected by developers (bug reporting)
number/type of CWE detected by static analysis
number/type of warning at compile time (i.e: from stack protector / fortify source )
number/type of (p... |
I know that in local PGP keyrings, there's an idea of trust: I trust this key ultimately, this key less than that, etc.
Is this web-of-trust exportable? For example, if I trust someone@openssl.org and they trust someoneelse@openssl.org, can I import their web of trust?
|
Let's say someone rooted a site, is it possible for the attacker to do XSS via document.cookie? Instead of giving the user a name=value, the attacker does something like this name=<script>document.alert(1)</script> and it will store this in users browser as a cookie when he visits site it will execute. Is this possible... |
What does the pgp public key length depend on? Does a long private key result in a long public key? The longer public key the better; or is it even the private key the crucial factor?
|
I use VPN quite often in public places where I don't want anyone to read my web traffic. However, some public places have firewalls that block ports required to establish a VPN connection (I usually use PPTP). I don't think some public places (especially my school) really distinguish between a VPN connection and HTTP(S... |
I'm looking at encrypting a small (500bytes) file using the TPM. This is either doing assymetric encryption with the TPM directly, or using the TPM to store a symmetric key for decryption. This needs to work on Windows (7).
I'm assuming I can do this with tbsip_Submit_Command through The TBS/WIn32_TBS, but haven't real... |
There is a corporate web mail site (PHP + MySQL) for limited numbers of users who are employees of a company working remotely with the corporate web portal. Each user has a login and password.
I'm thinking about replacing usual text passwords with a key file, i.e. user choose any file to be the key at his first logon,... |
There are many situations where the validity of the timestamp attached to a certain post (submission of information) might be invaluable for the post owner's legal usage. I'm not looking for a service to achieve this, as requested in this great question, but rather a method for the achievement of such a service.
For th... |
Is it illegal to publish an exploit against a known vulnerability in US? The exploit could be published in one's blog or places like exploit-DB. It seems that in countries like Germany and France such activities are not allowed.
|
SPOILER ALERT : Do not continue if you do not want to be spoiled
I am currently doing the Google XSS Challenge Level 2 .
I am injecting XSS code that is inserted into the document using element.innerHTML. I don't understand why <script>alert("Foobar")</script> does not work but <img src="/" onerror = "alert(1);" works... |
I think I'm too close to the problem here and I just looking for a sanity check.
My product blocks files from being stolen by restricting what programs can access what 'type' of the data. (e.g. Excel can read xls(x), Word can read doc(x), etc.). Basically a 'Content Based White List'.
It seems that my ‘would be’ com... |
[1]
The command prompt also sometimes opens itself and then stays open until I close it. I have run MalwareBytes and SuperAntiSpyware and they find nothing.
This is my hijack this log file. I don't get any X's when I run the hijackthis analyzer on it.
http://textuploader.com/kavk
|
When we use Tor or https traffic , the encryption- decryption key has to be exchanged between the browser and the website server. Why somebody who can capture entire traffic , say ISP or somebody who controls the wifi router, cannot capture the key and hence read the actual content of the encrypted traffic ?
|
This question is kind of asked already but it was asked with different context:
VPN tunnel in VPN tunnel
Connect through two VPN clients
https://superuser.com/questions/763433/tunnel-in-a-tunnel-multi-vpn
Say I am using DD-WRT flashed router which connects as a client to VPN server #1.
If I setup my machine that's b... |
Using Nessus I'm scanning our internal network for vulnerabilities and exploits. I've found a large number of instances where SSLv2 is enabled and is as a result, being flagged as a vulnerability.
I understand the limitations of SSLv2 and even the limitations of SSLv3 so I'm quite happy to proceed with disabling SSLv2... |
I noticed recently that ReCAPTCHA is using house numbers and street numbers as images for humans to decode.
How ethical is it for Google to do this to this? Does it hamper privacy of an individual?
TechCrunch has reported it way back in 2012, and Google had issued a statement,
We’re currently running an experiment ... |
I'm reading through past exams for an information security subject and I came across this.
#!/bin/sh
#applications launcher
X=$1
eval "$X"
"Do you think the program is vulnerable to attacks? Explain the reason for your answer with an example."
Simple program, obvious vulnerability.
The only example I could answer with... |
I am new to web programming. I read an article where they advised to use tokens as a hidden field in forms and match that token at the server end to detect non-legitimate requests. I am wondering what difference does it make, if an attacker uses an iframe to fetch a form,that form is going to have the token id generate... |
I am seeing this Snort alert show up multiple times a day, but my Google-foo is failing me, as I can not find any information about this alert on the internet. Can anyone point me in the direction for more information about this particular alert? Also, if anything in particular should be done?
CRITICAL - (2 errors in ... |
I have an app where users can enter credit card data and it is stored using a 3rd party toservice like BluePay or Authorize.net, I do not and will not save it in my system. Trying to get this point across to potential new customers is sometimes hard to do.
I want to tell them that it is actually illegal to collect an... |
According to wikipedia.org's article on X.509 certificates, "There are implementation errors with X.509 that allow e.g. falsified subject names using null-terminated strings Marlinspike Blackhat 2009 or code injections attacks in certificates." My question is... how do I create a CSR with null bytes within them?
Here'... |
We have a green (EV) SSL certificate for our site and images are fetched from the same domain (https). Currently we are planning to change the images domain (for performance issues) and put them in a different domain with a different ssl certificate. In order to reduce costs we are thinking if acquiring a standard cert... |
I have a mobile app which uses public key pinning to make sure that I only connect to servers from my CA. This works great with https, and it makes it so that nobody can really proxy my server and read the requests without going through some degree of trouble.
A colleague came up with an idea that certificate pinning m... |
There seems to be a number of ways to secure web services. OAuth, API Keys, Tokens, WIF, etc. Since security is not my area of expertise, I am asking what is the best ways to secure public web services.
Al least tell me what I should be thinking about to come to a standard way of securing the public web services.
|
I am currently using an LDAP setup. I am wondering if it is secure from Man-in-the-middle attacks or other vulnerabilities?
|
I have Kaspersky Internet Security 2010 installed on my Win7 computer. I assume it gives me enough protection for a software firewall(port security,tracking tcp,udp traffic etc.) Do I still need a hardware firewall for protection as well?
|
What are possible XSS vectors to this JavaScript code
new Image().src = encodeURI('[user url here]');
Let's assume two cases:
[user url here] is some string provided by user (with no validation)
[user url here] is a valid url (validated by Django URLValidator)
I'd imagine there are a lot of vectors for first case, e... |
A 256 Bit ECC key-pair (256 Bit is supposed to be the length of the public key) generated with OpenSSL using this command from the manual:
openssl ecparam -name secp256k1 -genkey -noout -out key.pem
and the corresponding public key with:
openssl ec -in key.pem -out public.pem -pubout
The public.pem file contains a ba... |
I'm trying to implement a web app(lication), which allows to share data automatically with connected users. Data will be encrypted end-to-end asymmetrically on the clients.
My first plan was to share the public key through the app itself, but then I realized that users need some verification that the public key is real... |
In an extremely interesting presentation at Puppet Camp London, Tomas Doran suggested a pretty radical approach for keeping everything automated by managing tons of Docker containers with Puppet.
As a security-conscious person, I like the idea of Docker, as everything runs in its own LXC and I configure all services to... |
Larger key sizes are said to be more difficult to bruteforce; is there any reason someone would then decide to instead use a smaller key?
Is there any negative effect in using a larger key size, such as performance, or poor compatibility with older versions of encryption/decryption software?
|
Can a video that was deleted from an iPhone 5c running iOS 7.1 be recovered?
1) the video was not in the camera roll
2) the video was deleted 3 weeks before seizure of device
3) app used to download/play video was deleted, re-downloaded and deleted again before seizure of device
4) no passcode locking device
Is recov... |
Web is filled up with the recent decision by Facebook to track user browsing history like adage.com andNYTimes.
How can a web application use browsing history which is local to that browser? Is it even possible to get browsing history from modern browsers like FF and Chrome?
Historically, interest-based targeting on t... |
I am working on a web project and I want to (as far as possible) handle user data in a way that reduces damage to the users privacy in case of someone compromising our servers/databases.
Of course we only have user data that is needed for the website to do it's job but because of the nature of the project we have quite... |
Are webmalwares capbale of performing browser hijacking attacks ? Has there been any famous webmalware that functioned this way ?
|
I'm black-box testing an application which uses java spring framework and MySQL in the back-end.
When I insert a single quote (') in a text box field, the server returns a HTTP status code 500 Internal server error with the below error stack trace,
org.springframework.jdbc.BadSqlGrammarException: StatementCallback; b... |
When I'm logged into my Google account, and I visit a web page that contains the Google Plus "+1" button, does a script have access to my name, even if I don't interact with the Google Plus widget?
|
Is there any way to make an "expiring" AES key?
Here's scenario to give a better picture:
Say Bob has some data which he would like to share with Alice. Alice has a public and private key, let's say RSA 2048. Say Bob dos not know Alice very well, she might not take care of her public and private keys (or may simply be ... |
We have an internal CA server for our domain located at http://cert_srvr.local.domain/certsrv/certrqxt.asp. This server runs
Microsoft Active Directory Certificate Services.
When I went to the site, I was able to use a CSR that I made on a linux computer to request an advanced certificate issued to the DNS name of ou... |
I have resources in an application. Further I have a table holding all resources and for every resource what role is allowed to access it.
I also have defined a Table holding all uses that are registered to my system and the roles they are allowed to play.
My question now: Is this an ACL managed with roles (that could ... |
There is a server side script written in php(say backend_file.php) or coldfusion(say backend_file.cfm).
Lets say, i am using Apache and I have a sample web folder (on my Localhost) like:
backend_file.php
index.php
Is it possible to restrict access of backend_file.php, when directly hit from browser?
However, index.php ... |
I understand the details of RSA encryption/decryption in that a public key can be distributed in the clear since all it can really do anyway is encrypt data. I also understand that this public key can be signed with a different public/private key pair. This is great to validate that the key came from a reliable source ... |
Are VPNs/proxies (and VPN/proxy software such as Tunnelblick and Hola) legal in the U.S., assuming that you are doing legitimate activities on the Internet (i.e. nothing illegal)?
|
Recently, one of my client-server application started to disturb me with some very annoying "notifications". Basically, what happens is that the remote server sends a few packets to my client, which translates them into a message it displays in its interface. Thing is : these notifications really annoy me.
Since these ... |
Someone has been sending me these weird emails and I am starting to get curious about it.
The latest one has an image of a broken image linking to this address...
I wonder if you guys could help me figure it out.
storage.googleapis.com/baleiao/Intimacao.zip
|
I have an idea to implement a account system using email and passwords for games.
Im intending to have the account creation and forget password systems on a webpage. So if users will have to access the webpage in order to access those features.
The users will login with those details in the game.
For the account creati... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.