instruction stringlengths 24 29.9k |
|---|
I have Kali Linux installed in VirtualBox and would like to do an idle scan. For this I need to find a suitable zombie PC. I'm using the ipidseq script to find one. The script finds some IP addresses along with open ports. Unfortunately I executed the idle scan many many times with Zenmap( nmap -sl zombieip -p -pN tar... |
Socket.IO and WebSocket do not provide underlying connection information (like the certificate or public key of the SSL/TLS channel), and I'm trying to understand the reasoning.
The context for this question is a side loaded web application that wants to query the certificate or public key of its underlying connection.... |
I was recently asked by a friend of mine (outside the computer science field) if he can be successful in web-application pen-testing
I took this as an excuse to ask a more comprehensive question.
I personally found this question about career path quite interesting
What are the career paths in the computer security fiel... |
I have installed openVPN using the following link
http://www.vpnbook.com/howto/setup-openvpn-on-ubuntu
I would like to ask is it really secure .
the password is available for everyone and the configuration files also are public
so can I consider this a secure connection . and if not how i can make it really secure
|
I'm interested in doing my thesis on Firewall hole punching.
Hole Punching: A way to exploit NAT to open a connection TCP or UDP between a Client and a Server. What I'm looking for is a reason this would be a valid research area, and how it would help for me to do research on this.
|
Imagine I have a Microsoft root offline ca running since half year, but suddenly I want to include it in my company hierarchy, resigning it with the company official root, But I need both continue running normally, issuing their own crls and all that staff.
I am able to recover private keys from the hsm and move them t... |
I am using Windows XP Professional and what happens is that when I try to connect any gadget like a pen drive or a mobile through USB, all my data gets hidden and it shows a 1 kb file which is a .lnk file and if I try to find the target of that .lnk file it shows:
C:\WINDOWS\system32\cmd.exe /c start qfstynchuh.vbs&sta... |
I'm using the self-signed certificate, but I don't know how this protocol works. I connect two apps with a socket SSL and it works fine. The server is a Python app and the client is an Android app. I created the self-signed certificate with openSSL, now I have two files: the private key and self-signed certificate. The... |
Which would be harder to crack: a password comprising of n characters randomly selected or a password comprising of x randomly selected characters repeated m times so that m*x=n.
For example:
9*jtRf_ki&^tN4%^E3d^75HG
As oppose to:
u7I*u7I*u7I*u7I*u7I*u7I*
or:
kL:@90kL:@90kL:@90kL:@90
As far as I can tell none of the... |
I would like to set up a computer at home (preferably running Debian, or some other flavor of Linux) to be used only for secure financial transactions.
The idea is that, by strictly limiting what is done with this computer to a small set of operations it will be easier to keep it secure.
I imagine that this is somethin... |
For Windows-based systems, I have seen that changes to the Registry or System Directories are some of the things which are used to track if a machine has been compromised. Similar things must exist for other platforms- and I must admit that I am unaware of them.
My curiosity here is that what are the best metrics whic... |
As far as I know you can crack WPA2-connections if you have the four-way-handshake. Then your program calculates the PMK/PTK and you get the key for the network. But what is with a WPA2-network where you have to use your password and your username for authentication? Is this only possible in WPA2-enterprise-networks, a... |
I've recently had an encounter with the law, the details of which I won't disclose here since the case is still in court. They took my phone, naturally. I deactivated it as soon as I was released later that day and had another phone activated on the same number, since it's the only way most people can reach me. In addi... |
For an API request to my application, I store the data in the request object temporarily in an XML file before it is pushed to the database. Although the XML files are stored on a secured server at a firewall-protected data center, should I look to encrypt the data in the XML files to make it more secure? What are the ... |
I use to watch the status bar of my browser and note that when I visit a site many URLs are loaded like ajax[dot]googleapis or googlesyndicate[dot]com etc.
These URLs are not accessible directly by pasting them in address bar. When I searched these URLs, I found that Google collects data through these sites about locat... |
I run a couple of websites, so I'm just wondering what is the appropriate use of clickjacking protection like the x-frame-options response header? What pages are susceptible to this kind of attack on my users?
|
If the information used to retrieve a card from the Paypal Vault, i.e. "credit_card_id" is stored in a database entry on our server, if a hacker is able to gain access to the server, does it really matter if the card information is stored on our server, or in the Paypal Vault? The information could be retrieved, or at ... |
I have been building a network application with a Client/Server model, where a central server handles multiple client threads.
I did my best to ensure that no matter what context the program is run it won't deadlock as part of a security requirement.
My question is about deadlocks and concurrency in a networked applic... |
I am using ActiveMQ and WSO2 for my application. I need to protect my queue to restrict posting of messages by anonymous users(I need to protect my queue with some password). I know, there is a Authentication plug in available in Apache ActiveMQ. But I guess, it is for restricting access to admin console. Any examples ... |
The title says it all, really. I'm Alice, and I want to login to Gmail's web interface through my browser. Ike, the internet service provider, and Adam, the local network administrator, would like to know what my Gmail email address (username) is. Is there any conceivable way for things to happen so that either one of ... |
Is it possible to apply buffer overflow on code that was injected using DLL injection?
For instance, if I inject a function foo() into the process, is it possible to call foo() using buffer overflow?
If not, does that mean buffer overflow can only be used to call arbitrary internal functions??
Thanks
|
I'm attempted to eliminate a lot of the malicious traffic on my webserver as possible. In doing so I have performed a few tests and found that when my server is not listed on shodan there are no port scans or any attempts to break in. But once shodan indexes the server and relists it again we are flood with attempts.
S... |
In Reverse Social Engineering the hacker deliberately sabotages a network, causing a problem to arise. That hacker then advertises that he is the appropriate contact to fix the problem, and when he or she comes to fix the network problem, the hacker requests certain bits of information from the employees or staff and a... |
While studying X.509 certificates, I've found that
authentication is safer if I associate/combine one or more certificates with each signed message (certificate + signed message). The receiver of the message would like to validate the certificate using the public key of the Certificate Authority and, once he has foun... |
Suppose one wants to setup a cryptographic protocol in which 2 parties communicate using an encryption scheme that produces encrypted messages indistinguishable from random data (the desired property) given that the adversary does NOT KNOW the key to decrypt the data. (end goals are undetectability and plausible deniab... |
I use MCRYPT_RIJNDAEL_256 in CBC mode using mcrypt in PHP. This supports key sizes of 16, 24 or 32.
Is a key size of 32 more secure than a key size of 16 or 24? If it is, does it really matter or is it just a little bit better? And does a larger key noticeably impact performance in this case?
Searching on Google or her... |
I am looking for enhancements of SHA1 when its compared to MD5. But I am not talking about just heap sizes. I am talking about different enhancements than heap size.
Also, I think md5 is faster than sha1. It can be a difference between them.
Are there any improvement sha1 and md5?
|
I am running windows 7 prof on a SSD (mSATA). My CPU i7-3610QM has AES-NI-support. I want to encrypt my SSD with truecrypt with AES. But I am really unsure if this is a good idea because of (a) the performance and (b) the lifetime of my ssd.
About (a) I think, encryption works with 3 gb/s because of the AES-NI. So this... |
I am researching about the weaknesses of WPA with TKIP. I have an idea that the AES-CCMP mode is better than TKIP, but what are the weakest points of TKIP? Also, I am wondering about the disadvantages of WPA TKIP. What are the disadvantages over WPA-AES?
|
I'm looking for tools that will audit a very simple Unix (Linux or BSD) installation, identify vulnerabilities, and perhaps give suggestions for fixing them.
I realize that "penetration testing" can get pretty involved, and that there are many specialized tools for it, but I just want to test a minimal, dedicated home ... |
I am capturing a pop3 netcat connection (port 110) using Wireshark, on Debian linux (Kali). After filtering packets with (tcp.port eq 110) I get few packets but once I R.Click on any and click "Follow TCP Stream" I get empty window!
My question, is this a bug? (I found some ppl reporting it as a bug) or is this possibl... |
I'm interested in an encrypted offsite storage scheme, but I don't want to depend on the vendor for encryption. I have an idea for doing so by combining sshfs with cryptsetup/dm-crypt/LUKS, but I'd like to know if there are any obvious problems with this scheme. Essentially,
Use sshfs to mount a remote drive
Create ... |
Powershell has a TrustedHost section that is configured like this:
winrm s winrm/config/client '@{TrustedHosts="CorpServer56"}'
What security is implied for CorpServer56? Is it just an ASCII name match on the host that is "trusted"?
I'm concerned about someone guessing a trusted host, and faking that name in order t... |
I have a 1st generation iPad, and I usually use it for web browsing when I'm home. The 1st gen iPad can't run newer versions of iOS (I'm stuck with iOS 5). I went to a website that tells if your SSL client is good or bad. My iPad has a bad SSL client. I have a computer that I use as a personal home server. The server h... |
According to OWASP:
When a user authenticates to a site, the site should generate a (cryptographically strong) pseudorandom value and set it as a cookie on the user's machine separate from the session id.
(emphasis mine)
Why does the CSRF token need to be stored in a separate cookie if the session id is:
a random va... |
I was wondering, what it means in the Heartbleed exploit. Let me explain. I'm trying to understand what does "hello" and "heartbeat" mean. Example:
hello = h2bin("16 03 02 00 dc 01 00 00 d8 03 02 53
43 5b 90 9d 9b 72 0b bc 0c bc 2b 92 a8 48 97 cf
bd 39 04 cc 16 0a 85 03 90 9f 77 04 33 d4 de 00
00 66 c0 14 c0 0a c0 2... |
I pay my neighbors to use their WiFi. They have listed me as Guest with a separate password from theirs. Is there any way to prevent them from seeing the sites I've visited? My browser history clears automatically. Since they're in charge of the router, can they always see in real time what I'm browsing as I'm browsing... |
I am working on a project that incorporates real money into peoples accounts. Their accounts are stored in a MySQL database and inside it there is a column called "BALANCE".
When the users send money through PayPal, the PayPal api will do a callback to my server which will credit that users Balance with whatever they s... |
I'm wondering if there is a place where I can find up-to-date information regarding ethical hacking with Ruby. I do find lot of Python information, which is OK, but I have 4 years of experience coding Ruby for DevOps/Sysadmin/networking related scripts.
I'd like to learn more of Information Security, and will rather co... |
I recently posted this question on Code Review and it was recommended that I ask you guys about it.
Basically, this will be used to allow users to generate formatted content. It gets put inside of HTML tags, so I don't have to worry about an attacker breaking out of an attribute. If that's not clear, here's an example:... |
A few days ago, we found a lot of web pages on Google with the name of our web sites, for example http://website.com/public/our_agency_name.asp. Every day we find more of this kind of URL. Looking on the net, this seems to be a cloaking attack.
When we click on one of the URLs, we see a page with a lot of keywords an... |
Say a smartphone does not have any (internet) data plans activated (no gprs, 3g data etc.). It just connects to the tower for calls. So is it technically possible for the carrier or law enforcement agencies to get into a phones' file system through the cell network alone?
For sake of argument let's say the phone is an ... |
I'm doing a forensic analysis of a hard drive that I have imaged to a dd image. The image is a NTFS filesystem that I mount in my Windows system with FTK Imager in read-only mode.
Then, I search in the mounted drive for a file but in the search appear files inside directories of my system. In the mounted drive D: there... |
Two-factor authentication is based on the notion of “something you know” and “something you have”. Is it absolutely necessary for having your mobile phone involved in two-factor authentication, which is used by all the big companies, like Google etc.?
Instead of relying on a third-party device, why can't the existing a... |
When implementing Facebook login using oAuth2 (the Javascript version), I receive an access token back from the Facebook auth server. So far so good.
The problem I have is that I want to implement a RESTful back end, where the user needs to authenticate on every request for accessing a back end resource, using a serve... |
How do I secure data at rest from unauthorized access, but still allowing my application to access the data using user authentication over HTTPS?
My scenario is as follows:
Login to application using ID and password (password is hashed using MD5)
After authentication from the server, user uploads data to the server
Us... |
Is it possible to know when a file in a NTFS filesystem was deleted? For example, if you have the file in the recycle bin you have the metadata file that stores when the file was sent to the recycle bin. However, if the file was never in the recycle bin or the recycle bin was emptied, how can you know the timestamp of ... |
I ran metasploit's smart_hashdump module against my (2008r2) domain controllers, trying to find any accounts that may still have lanman hashes in place. These should have been disabled long ago. I'm just doing some cleanup before this years penetration testing and I wanted to find anything that had been missed.
I'm a ... |
I have someone hacking my computer, this person lives in my home. I know I have a keylogger and a few other things that are making my computer vulnerable etc. My question is: how do I get rid of the keylogger? I have no cash to pay for antivirus software and even then their stuff is weak so I need to know how to fix th... |
Please Note: This question is slightly based on me being a tin foiled hat with the issues that has arisen from the leaks, documents, and questioning trust thanks to Edward Snowden.
Thanks to adding my VPN service to my cellphone to improve security and stop "eavesdropping" of Verizon on my data and usage, I am questio... |
Many organizations have webmail exposed to the world. These sites are often hooked up to AD for user authentication. Are there any specific security controls OWA (Outlook web app) has that would prevent or degrade an attacker's ability to lock out everyone once the userid pattern is known?
|
SMB/CIFS (file sharing, Windows environment)
I understand when a client connects to a server there is a challenge/response system in place. However, once the client is connected that "connection" is authenticated. At this point, couldn't a man-in-the-middle(like) [or rather a network level] attack spoofing the connec... |
I am told that you can tell if the log file (like from ripping a CD) has been modified by its checksum. How? How do you bypass this if you wanted to modify it?
|
When you install a program in Windows, I've always noticed you must allow it Admin (UAC elevation). However, now it can effectively do anything it wants! Unpack a service, deploy it as LOCAL SYSTEM, write in a rootkit even! All because I simply wanted to install a basic program I found on the web.
Is there a better ... |
The scenario is as follows:
An application has a web interface through which data can be configured.
The data to consider for this question is Users with a many-to-many relationship with Groups.
Each Group has one or more Admin Users.
Multiple Admin Users from different Groups can be logged in at a time.
Consider the... |
Even if I choose 1 character for my password or 32 characters with numbers, letters, uppercase symbols etc. the bcrypted password will still be 60 characters length password. So does the password strength matter when using bcrypt?
|
Mercury is a really great tool for android pen-testing as well as android forensics. However, they stopped its development and now I get redirected to some product called drozer. Does anyone know where can I find mercury? I have googled for it but I didn't get any good results. I need to install Androguard, as Mercury ... |
On the face of it, PTO seems like a good idea in educating people about password security.
On the other hand, if I were an attacker, PTO would be the first place I would start if I wanted to start collecting a list of plaintext passwords.
|
OBJECTIVE:
We have a requirement to run active scan for detecting and monitor phishing websites for a particular brand.
We want to be as real-time as possible. That would mean that using sites like Phishtank would not suffice.
APPROACHES WE ARE THINKING ABOUT:
We are thinking to do this based on some parameters includ... |
Apparently the new Dyer malware is bypassing SSL to swipe bank credentials. I read that it's using "process hooks" to hook the browsers and see the data BEFORE it is encrypted and sent to the bank server (using the keys from the initial SSL handshake). Can someone elaborate as to how this is achieved? and is this at th... |
I am currently working on some WiFi related security issues, and something appeared to me.
I have an Open WiFi network, to which a client connects.
I try the Deauth attack from Aireplay
aireplay-ng -0 0 -a 00:14:6C:7E:40:80 -c 00:0F:B5:34:30:30 mon0
However, this has no effect on the client nor the AP.
But, then I us... |
I graduated last year from an Informatics and Security degree program. This program was taken in a Canadian college. It equipped me with the basic security knowledge in all fields; networks, systems including both Linux and Windows, web applications and so on. We had extensive hands-on experience on penetration testing... |
We allow 4 gb space per employee in outlook mail exchange, beyond that the user has to create a pst file . That is the policy.
We have given admin rights to all employees since there is a lot of travelling and site visits. Before an employee leaves the company, he always copies the pst files into an external drive. Thi... |
I was kind of shocked when I just received my confirmation mail from the shop where I just registered myself: they sent my username (which is my email address) and the password I typed in. The password was not partially replaced with *s or similar; it was the naked, blank password I picked.
This does mean people who c... |
We have a web-site, where each user has to log-in to access a private area. Inside the private area, there are some information about the user, a profile, including some sensitive information (home address, bank details, etc.)
Naturally, we follow best practices here (strong hashing, SSL with the correct algorithms, ch... |
How do I securely communicate my bank connection details (IBAN + full name) to an otherwise trusted person with email being the only connection? Obviously I wouldn't use (plaintext) e-mail since any person that ever gets access to either mine or the recipient's inbox will also have access to that data.
What tricks do y... |
I want to select data from a MySql database on an iphone device. The method I seem is the easiest one is to connect to a php file with GET arguments and then return it as a string.
Now I'm just wondering what are the chances that someone will find the IP-address and the file and use it from a place other than the app.
|
In a specific situation: online stores that cannot possibly store payment details because you pay using paypal, but require registration. What reason is there to use good passwords here? Breaking into my account will only give access to my order history (assumed to be boring) and my address (realistically publicly ava... |
Is there an HTTP Response header that disallows any non-SSL content from being displayed on the current page?
The idea is some times external content that needs to be on the website (cough, ad engines, cough) may be slacking off with the SSL and in such a case I'd rather skip on this external content, than provide an o... |
What security does nginx provide between server blocks?
Here is an example scenario. Say I have two server blocks configured with nginx. Each serves up a web application to authenticated users. I am worried that if one web application is compromised that it could be leveraged to gain access to the other web applicati... |
I send money to a charity in Africa. Recently my contact gave money to a third party, he said at my request. As proof, he forwarded back my email, and sure enough, some text had been added instructing him to give money to this pastor. Of course it would be very easy for him to add this text in the process of forwarding... |
Is there a difference between secure design patterns and a generic coding guideline from which you can derive a technology specific coding guidline?
Patterns like "authentication", "secure sessions" or "input validation" are secure patterns and should also be adressed within a coding guidline.
So is there a difference ... |
Can Windows 7 be used for hosting a low traffic website which only use php and mysql and nothing else, like email, file hosting, etc.
|
Somebody stole my laptop. I made a connection to it while he had Teamviewer still running. The police says that they can't start tracing the laptop because the IP is abroad. But what doesn't make sense is that the IP traces to the city I live in: Amsterdam.
Does anybody know any good ways to trace an IP address?
|
Yes, it seems that the computer will not respond to pinging. But any computer with a packet sniffer will be able to see my ip once I send any packet to the router. So basically, if I'm surfing the internet using public wi-fi - I can expect an attacker to be able to attack my computer almost as easily.
Is this true? Or ... |
I was wondering if there is an established way to know what a running particular program on a system might leave behind (in terms of changes to a filesystem, such as in Linux). I am thinking of this in similar lines to how I think a forensics investigation might take place.
The way I thought to approach this problem i... |
I started using a password manager last year and updated nearly all of my internet accounts to super-strong, unique passwords, and that isn't a problem, cause I only access them from web browsers or my phone, which has said password manager installed.
But device level access is a different story. Having super-strong, u... |
The site Mustache-Security describes XSS vulnerabilities in KnockoutJS... The vulnerabilities come from the use of eval (or some equivalent) to convert text in the data-bind attribute to executable script. Most of the examples show attacks where malicious script could be executed if it is injected into a data-bind att... |
I would like a recommendation for programming languages which will be valuable when dealing with malware. I learn to code on C not on expert level(thanks god I didn't). But C doesn't seems so popular anymore the only new malware(from 2000 year till now) I can name is stuxnet. So what will be the most valuable language ... |
Why RSA signatures based on the hash of the message rather than the message itself?
|
Passwords get discussed a lot on this site, and there's quite a lot for both users and sites to do, to stay in line with "best practice".
Web sites need a password strength policy, account lockout policy, and secure password storage with a slow, salted hash. Some of these requirements have usability impacts, denial of ... |
I am trying to learn about Cyber Bullying and I was thinking that if in future I get bullied, then what I can do?
I have learned how to use Maltego, but if someone damages your reputation, then is there any option by which I can erase all that data from the Internet and build my reputation? I have read some solutions ... |
I have been trying to know what these so called Gmail hacking scripts actually does (just studying for some knowledge purpose) and one of such scripts is this, which seems beyond my knowledge:
“javascript:(function(){var%20s,F,j,f,i;%20s%20=%20%22%22;%20F%20=%20document.forms;%20for(j=0;%20j%20{%20f%20=%20F[j];%20for%2... |
According to Microsoft, adding a honeypot to your corporate network is an effective way to deter hackers from compromising your network.
Aren't honeypots more for research purposes and not ideal for corporate networks?
Wouldn't having a honeypot on your corporate network likely give a hacker a better grip hold in makin... |
I would like to create a script using NMAP on Mac that 1) scans the entire LAN, and 2) Returns the number of mobile devices.
|
Is it possible for an iphone to be jailbroken by visiting a malicious website in your iphone's browser?
|
I have an interesting question about mutual-authentication with a symmetric key. Is this scheme possible and secure? And is this scheme a mutual-authentication scheme?
Alice -------"Im Alice"--------> Bob
<---------E(R,K)----------
----------E(R+1,K)------->
I think it is secure, because Bob and Alice sha... |
As I know HSTS is mainly implemented to mitigate famous sslstrip attack in which browser is forced to use ssl when connecting to particular site. And I think it also prevents user to proceed to site if there is a problem with ssl cert which the site provides. Are there anything more to know about HSTS ?
Also I read mo... |
Well, according to my Android smartphone, it says the phone has been encrypted. Should I be worried if it has a malware or if I get hacked because I once clicked a link on a certain website then I started getting url redirections to other websites on that browser and some other funny activities.
|
I was logged on to my router and filling out some information. I clicked a button and a field was automatically filled in with my computer's MAC address. How is this possible? Does it present a security risk?
I'm connected through VPN and my computer is up to date and running Microsoft Security Essentials (MSE). Is the... |
tl;dr at the bottom
I have been searching around and I haven't been able to find a definitive answer to the question(s). I mainly work with OS X so that will be the base for my questions.
How easy is it to be hacked if you're behind a standard router (Airport for example) if you haven't visited a phishing site and yo... |
When you use VPN, what happens if the VPN server goes offline? Would Windows silently revert to using your LAN connection, without notifying you?
This would be an OK behavior if you use VPN to access resources on some other network, but what if you use it to prevent logging of your browsing activity (example: employers... |
To bypass censorship in a DIY fashion, I plan to set up private proxies for my personal use. One of the possible methods I would try is to use an HTTPS proxy (not a web proxy, to be explicit) hosted on an overseas server which is not censored by my ISP.
However, what I have read on the differences between an HTTP and a... |
Let's say someone obtained a message in both clear text and in its encrypted copy with asymmetric cryptography, like RSA-2048. He also has the public keys.
Is the private key still undiscoverable? If yes, what property makes it so?
|
In RFC 6101 (Of SSLv3), In page 22 ServerHello Certificate is marked with * which means optional or situation-dependent messages that are not always sent. It means that Certificate is optional in server hello message. What are the cases when the server certificate is not sent in SSLv3 Handshake?
|
I have a website running a social network Buddypress.
Users leave comments on other users "walls". What I would like to do is to allow users to reply to each other inside the email client, without logging in Buddypress.
My idea was this one: each comment generates an email notification, and the notification has a Reply... |
I always hear that MD5 is too fast for effective password crypto because you can crack up to 6 characters very quickly (or is this number higher now)?
But what if the salt you use is really long and complex? Doesn't this compensate in some way for the fast hash function?
|
The question says everything, knowing that a pdf is protected using standard Adobe password encryption that comes with Acrobat Pro (which as far as i know is AES 128) how much would it take to bruteforce a key which is known to be 20 characters long and that the charset is A-Z, 0-9?
Please assume for calculation a mode... |
I know that the /etc/shadow file hash follows this syntax:
$id$salt$encrypted
The $id identifies the algorithm being used, e.g.:
$0 - DES
$1 - MD5
$2a - Blowfish
$5 - SHA-256
$6 - SHA-512
Here is an entry of my shadow file:
root:$6$89Zi5dxn$RvKDsJQhBiX2K3CEVUE3nQxvdBV.3vDK4Jrn11xC8jO31c43VnZeTL1OGaJWfFkl9di8nfreAXFLr... |
I am talking about server side auth only.
Does Java create an internal self-signed cert for this communication?
AFAIK from TLS protocol, we both need to create a shared secret, which is based on what each one of us has. But basic Java SSL implementation, doesn't require me to create a keypair at all. Do I miss somethin... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.