instruction stringlengths 24 29.9k |
|---|
First of all, I should mention that I read this thread and it was useful in my case, but I need more comments and reviews about this authentication method.USB Token authentication which I want to talk is :
1- User logon to server with username and password
2- server requests for some USB credentials like serial number,... |
I have a webserver which is asking for client certificate for mutual authentication. I have what I think is the right certificate loaded into my client browser. However, the browser is not able to find the certificate & is giving the error "This page can’t be displayed" when I visit the page from IE (it also fails in c... |
I just watched an interesting talk from Glen Glenn Wilkinson titled: The Machines that Betrayed their Masters.
He said that your phone is constantly broadcasting all the SSIDs it has ever connected to. How would an attacker be able to capture these wifi requests?
|
My task is to convert .p7b to .pfx. It would be great, if you could provide me some pointers.
Below are the steps I used to generate the .p7b file:
I generated a .jks (java keystore) file using below command
C:\Program Files\Java\jdk1.6.0_33\bin>keytool -genkey -alias serverkey -keyalg RSA -keystore C:\server\producti... |
I've dumped a call between two lync clients and saw that there were some UDP packets that look like this:
Server -> Client
1132 14.495362000 <serverip> <clientip> STUN 146 Binding Request user: ????:????
Client -> Server:
1133 14.499136000 <clientip> <serverip> STUN 130 Binding Success Response X... |
I am watching a training video called "Creating Secure J2EE Code". The video makes this statement:
Perform all validation in a secure context on the server. Do not rely
on client-side validation as a security mechanism. Validate all
application input, including user input, API return values,
environment variable... |
Windows servers in the DMZ need to communicate with the Active Directory.
I do not like that the servers will have direct communication with my Active Directory, so I consider installing a Read-Only Domain Controller that replicate the real one.
It seems like there are security benefits with RODC only when it is not ph... |
I really don't know much about HTTPS. But I always hear people saying that it is 100% safe and bullet proof.
My question is: Is that true or even possible.
I mean there are lots of tools that allow you to read the internet traffic of all other devices that are in the same network as you.
So how do certificates and en... |
We are going through the PCI process at the moment and because v2 goes out of date on December 2014, I opted to use PCI v3. Because with Stripe you put the form inside your application and post to them, does that mean I need to go down PCI SAQ A-EP ?
I am a little confused and the only way to be PCI SAQ A is to use an... |
I'm a little unclear on the subject of opportunistic encryption of the HTTP:// address scheme in HTTP/2.
According to the bug report, it looks like it's kinda optional, and an afterthought:
https://github.com/http2/http2-spec/issues/315
There's also a FAQ entry:
http://http2.github.io/faq/#does-http2-require-encryption... |
I'm going to send my timestamp to server and server will check if it is in a given interval. What if My mobile clock is not adjusted (say it gives 2:00 pm while now it is 2:00 am). now I lost the server. How should I handle such a situation.
|
I'm 20 years old and have no knowledge in the world of information security! I'm currently studying engineering and I've recently found what work I want to do (pentesting or a career in fields like this).
So reading various sites and forums, I've decided to start to study the basics of the communication service TCP/IP.... |
My company recently had a security assessment done on our website and we had a XSS vulnerability reported. Below are the details of the reported vulnerability:
If a user hits a URL like the one below:
mysite.com/Secure/Account/Addresses.aspx/%32%35
You can find the following when the page is rendered:
<script src="/S... |
Here is a recording of Glenn Mulcaire using social engineering to reset the PINs to voice mailboxes to which he did not have authorised access. (At least, that's my understanding.)
He appears to say to the operator, "Do you want the DDNs on these, or - you should have them anyway, shouldn't you?" The operator replies, ... |
Often, users will install additional package repositories to their Linux distributions to be able to follow "bleeding-edge" versions of software that hasn't been/will never be backported to their distribution version.
Say that packageA provided by repoA depends on libssl. Originally, no problems found; the only possibl... |
I am wondering what happens when I set HDD password in my laptop (Samsung with ssd).
I mean a given case.
I have been having working system without any password. Then one day I decide to set up HDD password in BIOS.
Does whole disk in that very moment become encrypted ? I did not notice any moment waiting etc...
I un... |
I am using my mouse to interact with a Java applet in a browser. Clearly the party that owns the Java applet can record where I click inside the applet. What I'm wondering about now is whether it is possible for that party to also record the movements of my cursor (i.e. the paths I take when I move my cursor around) wi... |
I've been assigned a web project that deals with shipping goods between two parties. I am unsure what a secure database scheme (if any) would be for storing the recipient's postal address and whether or not there are data privacy laws in regards to how these addresses should be stored? Both the recipient and the sender... |
I have a Apache Cordova hybrid mobile app that needs to authenticate users, but we don't want to prompt for credentials every time the app is used.
Some options came to my mind:
Store the password encrypted using public key cryptography, so only the server can decrypt it and perform authentication. However, I understa... |
I have seen from:
http://www.scientificamerican.com/article/tracking-cyber-hackers/
"The source field can be changed [spoofed] by an attacker to make it
seem like it's coming from someplace it's not"
From what I know, IP spoofing only allows one-way communication, as server replies the spoofed address, and therefore ... |
When someone is sniffing data at a Tor exit node, how much information can be obtained? The IP can be revealed, but can they see everything you do?
Does it make a difference if it is encrypted using https, or if it is a hidden service link?
|
I read these questions which had great information: How can I keep my identity anonymous as a website owner/administrator? and How much can I trust Tor?, however I wonder if this is too extreme for my situation.
What I mean by this is I am not in a life or death scenario, however I want to keep my artist name anonymo... |
The Certificates that are used to sign Android applications are generated by the user and not checked or signed by any authority. They are RSA or DSA Certificates and as i read on crypt.stackexchange.com it should be nearly impossible to create two identical RSA certificates.
But the question still is open: could it be... |
Hackers inserted a specialized device which was connected to the notebook into the card reader slot on the ATM and installed malicious software. 100 thousand US dollars were stolen from at least seven ATM in China.
We actively discuss this topic in Russia. http://www.plusworld.ru/daily/ustroystvo-dlya-zarajeniya-banko... |
Background
A discussion about not sourcing JavaScript files from other websites (http://www.reddit.com/r/netsec/comments/29hfhz/please_dont_use_externally_hosted_javascript/) got me thinking.
Performance and cost reasons are mentioned that might make sense to have some scripts hosted by 3rd parties.
Question
Is there a... |
The other day I tried to withdraw some cash from an ATM in a hurry and punched in a wrong pin. I realized that only when I hit the "ok" button, but to my surprise the ATM did not complain. It showed the usual menu, asking me to select an operation. It's only when I selected withdrawal I was prompted that the pin is inc... |
To successfully defend the BIOS from malicious rootkit installation or other malware that writes itself inside BIOS I wonder if these ideas are possible or even done yet:
Can you program the BIOS itself in a way that it only accepts data to be written to the BIOS that has been signed with the BIOS-Manufacture's PGP-Ke... |
I use Cain and Abbel and I want to see the email content.
If you help me becouse I don`t know to see the content.
I see the email in the section password but I need to see the email content .
I can simply with Wireshark?
Thank for what you said,I understood and I made ARP Poisoning.So I see at Passwords->HTTP two URLs:... |
At the moment I have a strange problem: I captured a pcap-file, and pyrit and aircrack tell me that it contains a valid handshake. But cowpatty complains about not having a full handshake, thus making it unable to crack the pcap file. Why? Is there a solution?
|
I am currently developing an auction desktop application. At the moment I am storing the buyer and vendor information in 2 separate tables within a MySQL Database.
Currently the data for these tables is unencrypted (whilst in development) but I am planning on using PBKDF2 to encrypt these with a salt that will be store... |
We are planning to implement the time-stamping service (RFC 3161) using OpenTSA and we wanted to know:
Does OpenTSA support PKCS #11 (Cryptoki) to talk to HSMs?
BTW: I did not find documentation or much information on OpenTSA.
It would be really helpful if you could comment on the support of PCKS #11 by OpenTSA.
|
Why do ATMs accept any PIN? states that the ATM does not know my pin and the pin is not on the card as well.
My bank has this system:
It works in 5 stages:
I enter my debit card number on the website;
The website gives me an 8 digit code to enter on the machine;
I insert my card into the machine, press the M1 button ... |
As part of an automated test suite I need to run a lot of gpg --encrypt and gpg --decrypt processes.
In order to make each invocation of gpg --encrypt and gpg --decrypt faster, I would like to use a very fast public key algorithm.
I understand that the fastest ciphers are also those providing the weakest security, espe... |
I have a new piece of malware that isn't detected by current anti-virus vendors. How do I report it to them?
I want to do a good turn and help protect as many people as possible. What is the best and easiest way to get it to as many anti-virus vendors as possible, to help them detect it? Is there a list of sites wh... |
Let's say that our first firewall has some vulnerability and a malicious person is able to exploit it. If there's a second firewall after it, he/she should be able to stop the attack, right?
Also, what will be the side-effects? I mean, would this slow the traffic or not? What are other possible effects like this one?
H... |
I'm trying to find a way to password protect an Excel file (.xlsm) beyond the built-in password encryption options.
Ideally:
Enter the password
File works for a week(/other period of time)
After a week, file requires password again
The file is used consistently, so I don't think that encrypting a .zip or similar woul... |
How are top secret networks hidden? What are the techniques to make a network hidden from the public?
|
For same chunk of data, which one is faster? Public key encryption or digital signature?
Confidentiality is not important. I am trying to achieve non-repudiation for the communication.
Thanks!
|
I'm currently going through a course on software security. I've recently been introduced to the idea of password salting, where a random value is concatenated to a password prior to being hashed and stored. I believe I understand the operation correctly, but I don't understand how this makes the process itself any more... |
Always wondered about this. I had a friend tell me it's to make sure your information can't be stolen as easily on the credit card, but I will admit I am a bit skeptical of his claims.
At most gas pumps (as long as you dont pay with the attendant), the gas station usually requires you to insert your card, then just as ... |
I've developed my own custom authorization grant.
The steps I am undertaking are the following:
I get the facebook authorization code from the mobile device (this is an an API for mobile devices)
I exchange the auth code for a Facebook access token using curl. I save access token in the database and associate it with ... |
I'm trying to understand the validation logic that would occur in the following hypothetical scenario
An unpatched XP user who trusts a list of root CAs. Those CAs in particular have been renewed (using a different public key) but have only been updated in newer versions of Windows
A Windows 8.1 client who has the ne... |
I've been reading "Hacking: The Art of Exploitation 2nd Ed." and I hit a part that's not explained clearly enough for me.
In the section "Writing to an Arbitrary Address" Jon Erickson creates a vulnerable little c program (called fmt_vuln) that passes format-paramaters (such as %x) as the first argument to printf. Doin... |
I know of at least two pages that I would have just assumed were a phishing scheme if I didn't know any better.
Serverfault.com is a stack exchange site on a different domain, however if you click to sign in with stack exchange, it does not redirect you, it just prompts you for user/pass.
Steam community does the same ... |
I've been asked to generate a public key with PuTTY key generator. The default is 2048 bits, should I add additional bits to the generated key? Or is it unnecessary?
|
I'd like to wipe a stack of drives (spinning and SSD) securely. I'm familiar with the ATA Secure Erase (SE) command via hdparm, but I'm not sure if I should use the Security Erase (SE+) command instead.
There is some evidence that these commands don't work on all drives. How can I ensure the drive is really wiped, incl... |
Suppose I have both network based IDS and host based IDS installed in my environment, will I miss any security attacks if I don't correlate the information from these sources? If so, what are they?
It seems that one of these systems should be able to catch any attack whenever they happen, but not sure if I am right abo... |
I am working now on Windows 7 and I want to see if I can sniff an email content on it with Wireshark. So all right with http but with https I can't at this moment and I don't understand how. You think I need Kali Linux? Or I need something to do to realize it on Windows
|
From my understanding, the Java keystore contains certificate information, but this information is public (i.e. other machine certificates which you want the local machine to trust).
Is there something else besides this that I am missing? What would be the risk in protecting the keystore with a weak password?
Update
I ... |
When dynamic IP addresses are assigned to users, how do ISPs store the logs? Do they just store the time and address of the websites visited or do they store the whole URL like we see in our browsers?
I've tried searching for this information but all that I get is "yes they store logs of everything you do".
But I want ... |
How does it work?
For example, could OpenDNS be tracking everything (source ip + requested url) and then selling it to who have the necessary information to correlate the ip addresses with people profiles (i.e. BigData Companies, DataBrokers, Social Networks, etc).
I'm pretty sure that ISPs could be doing that. They di... |
Recently I conducted a penetration testing where I used the following text as authorization:
Penetration testing authorization
During a penetration testing is possible that:
The performance of servers and networks is decreased.
Lost of availability of some services.
Access to confidential data.
Modification of web si... |
So a couple years ago when I was learning basic back-end web development, I found a tutorial for creating a basic log in system. I haven't done much modification to the code since, but I have the opportunity now to use a more robust system if I need to.
So here's the code I'm currently using:
$pepper = "String of... |
I have just realized, that my web application is sending unencrypted passwords from login form. It's just like that -- I've analysed, that string sent by user from login form is hashed with MD5 (which is wrong itself -- but that's a different story) on server-side and compared after that (passwords in DB are hashed).
I... |
I see this notice in the TextSecure README:
The U.S. Government Department of Commerce, Bureau of
Industry and Security (BIS), has classified this software
as Export Commodity Control Number (ECCN) 5D002.C.1,
which includes information security software using or
performing cryptographic functions with asymmetric
alg... |
I want to make a secure network because of government surveillance.
Is there a way I can configure or build some type of custom hardware to be able to detect and to access the network, but only using that hardware the network becomes visible. Is it possible to make the network access be controlled using custom nic fo... |
I have written an Android game. Now, I want to connect the marks of the players.
The code below is the client side program, which send their names, countries and marks to the server. Basically, I use ':' to separate the information.
However, hackers can know my server ip and port by decompiling .apk file. Then, they ca... |
If I insist on digitally signing all outgoing packets from my computer, would it affect my browsing experience?
I mean if a website doesn't expect me to sign my packets, and still I sign them, can I access that website?
As the packet data is in plain text and only its hash is encrypted and attached with the data, I thi... |
I need to evaluate the security of a cryptographic library. In particular I am targeting a part of the library where I believe the private key is exposed for a limited time in the RAM. Any ideas or pointers on how to go about checking the RAM for this key. I was thinking about dumping memory after some specific user in... |
I've been given a requirement of providing a client certificate to authenticate between two application's web services. The other application (that I don't host) is requiring an SSL client certificate that is signed by a 3rd party CA (ie. Symantic, RapidSSL, etc.) and not be self-signed. After going through most of the... |
I recently applied for a second credit card for my partner to use on my account and was surprised when her preset PIN number turned out to be the same as mine.
Coming from a development background I assumed PINS were hashed somehow.
It seems very unlikely this is a coincidence, why are credit card PINs not stored hashe... |
I am working with alarm signalling systems at the moment, and they communicate with 2400bps v22bis modems.
I would like to be able to intercept the traffic on the phone line as a proof of concept.
The only device/software I can find to do this is the 3am Linescope.
This appears to be a phone line to audio adapter, conn... |
I'm building a password reset system at the moment and I've come across a dilema.
Currently we have a system which creates a long md5 has (16 characters) and emails a link to a customer which they then click on and can reset their password.
However now we want to step away from putting links into email and make custome... |
I'm currently conducting research regarding MySQL server remote authentication. I've captured unencrypted, uncompressed authentication packets between the client and the server where the username is in plain text but the password is hashed using two salts which are also visible in the "server greeting" packet sent to t... |
Is there a programmatic way to check if a given mobile application executable is malicious through some sort of lookup service?
I have used Virustotal for desktop malware, does it work for mobile malware as well? Are there other standards for this sort of thing?
|
If the iPhone is actually off and not in sleep mode, how can it be remotely turned on if no software is running and network communications aren't even activated until the device boots?
|
I need to store the payment info of a transaction.
We have a script that reads which transactions haven't yet been sent to our ERP (the business management software), to then send it. This script runs every several minutes.
According to PCI DSS, I can store info such as credit card number, cardholder name and expiratio... |
A few days ago I had to make a phone call and on the other end of the line was some machine using some voice recognition software to validate the customers spoken answers to the service menu. I asked myself if it would be possible to fuzz this kind of input with some kind of random generated noise files or such? In the... |
Lets assume the product is pure software or a blend of software and cheap commodity hardware.
Is there any work showing what the average industry spending is on just the security aspects as a percentage of the total product development costs?
I do see this post but that only talks about estimating absolute $ figures f... |
This is a bit of a vague question, but it seems relevant these days with the information on all those "mass spying" programs getting leaked. I will describe the scenario and I just want to know if it is possible under current laws (specifically, US laws but I would be interested in laws of other countries also), and if... |
Ok so consider the scenario in which you have two projects, one is a RESTful API, and the other is a public facing website.
The API uses cookie/token based authentication, and contains all of the logic of your application.
The website is built using a client-side MV* technology, what it can and cannot do is based on th... |
If I have a Bring Your Own Device policy, how can I track whose device belongs to each IP address? Do I need to collect information on all devices that use the WiFi system?
|
I am little confused about this matter. By simply writing a JavaScript code we can go through our browser history and identify visited links. It is fine. But how an attacker use this to identify a victim's history. Essentially, the code should have to be executed on the victim's browser.
I know that there are XSS attac... |
What are the pros and cons of using xinetd for a web server running on a VPS. Assume the following measures have already been taken to secure the system:
system hardening, latest updates, minimal packages
strick iptables firewall
controlled/limited use of admin privileges
properly configured services
hardened web appl... |
My Drupal 7.28 site has been hacked through the the tmp dir which was not protected by .htaccess file. The hacker managed to delete the main .htaccess file and upload some bogus google docs 2014 directory with php files to the site. After some work I managed to fix the site by getting rid of the offending php files and... |
My understanding of SElinux context public_content_t is as
public_content_t is required for files shared via a FTP server unless associated with a user home directory
Here is my question
Does user include FTP anonymous user ftp? If I have created a file owned by ftp:ftp and save it to /var/ftp/pub does it mean it is a... |
We are running a Portal application for our client with Payment Gateway integrated. Payment gateway uses SSL as it is suppose to be .
The concern for me is that our Portal application does not use HTTPS leaving it susceptible to MITM attacks but since the payment gateway uses SSL , are we still open to MITM attacks? W... |
I read this:
Reveal the True IP of a User
I am using Hola Unblocker to hide my IP address. This appears to work when I go to netflix as the site treats me as a US resident (which I am not).
This however does not work when I go to:
https://www.crashplanpro.com/business/signup.html
They seem to be able to figure I'm not ... |
One of our co-workers followed a phishing link and entered their Google for Business account credentials. We have reset their password, is there anything else we need to do? (We also used this as a reminder for everyone to enable two factor authentication.)
The mail was also sent in their name to our staff mailing list... |
Just curious how this one works in practice and if it's as much of a risk as has been made out? It says you actively require a MiTM scenario, which is understandable, but then what are the steps to actually downgrade the cipher spec?
As a MiTM, if you try and alter the messages between client/server (ie to downgrade t... |
I was wondering how could my computer that uses a spoofed MAC address be sending probe requests for APs that I was never connected to?
Note:- The other computer with the original MAC address was shut down.
|
I have a page on my website like this : domain.com?img=test.jpeg
And on the page, the javascript written is:
var imgPath = getQuerystring('img');
$("#img").attr('src','/Images/' + imgPath);
I was wondering if someone can manipulate the querystring to do something mailicious.
Since the javascript is always appending th... |
I just learn about tabnabbing.
Tabnabbing is a computer exploit and phishing attack, which persuades
users to submit their login details and passwords to popular websites
by impersonating those sites and convincing the user that the site is
genuine. [...] The exploit employs scripts to rewrite a page of
averag... |
I am considering putting a forward a proposal to use a password database/manager instead of a flat (PGP) encrypted file for managed passwords for our team to access. I would like to hear some suggestions for the pros and cons of doing this. I am personally for using a password database due to the extra user processes i... |
I want to digitally sign all outbound data from my computer. Can someone suggest a way to do this programatically or using some tool? Instead of actually signing the data, I would simply append a small random string at the end. (It's the same thing as long as website doesn't care about signatures. Unless I am wrong.)
... |
The PKI RFC talks about revoking or suspending certificates. It also talks about revoking CA certs. However, I could not find anything about whether a CA or a Sub CA's certificates can be revoked or not in the RFC.
What is common practice. If a CA feels that a subCA is compromised, they may want to suspend the certif... |
I am looking at implementing an authentication module using OAuth 2.0 Client and I am trying to avoid having any server state. I was going thorough a few other questions
when to use nonce?
Is it possible to have stateless server nonces in HTTP Digest
It seems like implementing a nonce requires storing something on ... |
I have retrieved some old pictures/videos (mp4, many types of avi) of some old events that I want to keep, the problem is that these files have been sitting in confirmed infected machine for a very long time, and noone ever bothered to check what type of malware it was they just backed up and nuked it. My question now ... |
As far as I know - and please correct me if I'm wrong - Cain does not support WiFi cards. So if an attacker wants to perform ARP poisoning without being connected through Ethernet to the (router\switch) s\he must use an Aircrack adapter.
My question is, if the attacker somehow managed to plug his laptop to the router\s... |
Can my computer be hacked through my WiFi connection?
If so, how can I detect this?
And what can they access or see? Emails, etc?
Please respond in layman's terms, as I am not a computer pro.
|
EFF's Survelliance Self-Defense (SSD) project has an illustration of how email over SMTP goes through intermediate mail exchange servers:
AFAIK each intermediate servers is expected to add its own Received: header to the email so at least the transit is traceable. I'm not sure how easy is to circumvent this. There see... |
Assuming your code-signing tool is secure (e.g., does not suffer from buffer overflow exploits and the like), is there any reason to be concerned if a time-stamping service is not running over SSL? Obviously, a MITM attack could do slightly annoying things (e.g., provide a bad certificate), but SSL doesn't protect you ... |
I did check out the previous postings and didnt find what I was looking for- apologies if this is a repetition.
I am working on an analytics engagement for a customer and he needs to share access to his customer sales transactions for me to do my work. The idea was to create a encryption routine whereby details such as... |
the title said it. Is it possible to detect IDS name and version. If server use Snort as IDS, would I be able to detect it from external PC? And if it's possible how?
|
After having been a regular code monkey in the US for 6 years now with readily offshoreable skills, I feel like I am fighting an uphill battle against third world wages. While I am not prepared for a drastic career change that will be completely incompatible with my Computer Science background, I was wondering if inves... |
When you're using tor can't the third parties copy all the data that's going back to your device and decrypt it later, let's say I downloaded some doc files, the data has to come back to your device through your isp servers right. If your government wants your isp to keep copies of all the data packets to be reviewed l... |
Taken from Wikipedia, here is the pretext to my question:
A certificate authority (CA) is an organization that stores public
keys and their owners and every party in a communication trusts this
organization (and knows its public key). When the user's web browser
receives the public key from www.bank.example it a... |
After reading about writing a secure shuffle algorithm, I realized that my module that generates a password is only as strong as my PRNG, which in this case is Math.random(). I'm confused as to how to replace Math.random() using SJCL's PRNG. What exactly should I be concerned about when generating a secure random value... |
http://XXX/?subscribe_message=%3Cscript%3Ealert(/zzz/);%3C/script%3E
Why doesn't that popup with a /zzz/ alert? When I do javascript:alert(/zzz/); in the address bar it does so why not when I do it via the URL? A look at the source code makes me think it /should/ work...
|
I'm writing a project to securely store and share passwords between users, I've been doing tons of research into encryption algorithms, CSPRNGs, hashing algorithms, key stretching etc...
I just want to layout my thinking as to how to use all of these, to create the secure application - and hopefully someone(s) can poin... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.