instruction
stringlengths
24
29.9k
How does the 6 digit randomly generated security code from (disconnected) Verisign Identity Protection card help in verification/validation of any user? Why one cannot enter any random 6 digit value instead of generating that value from VIP card/device? Is there any fixed pattern of getting those values from that V...
I have a domain with a wildcard SSL certificate (i.e. "*.example.com"). I also develop using WAMP setups, which I would like to be able to test HTTPS on. There are several tutorials on how to setup a self-signed certificate on a WAMP, but since I already have a wildcard certificate for my domain, I thought I might as w...
Currently I have an "Antivirus" and Anti Malware software installed. In addition I closed all remote assistance and unused port rules on my firewall. I'd really like to get a complete as possible solution/guide. I wanted to know if there is a guide on further securing my machine. Do you have any suggestions? (IDS? Fi...
I have an openssh encrypted private key. I don't remember the pass-phrase. I may be able to suggest words or patterns that may be in the phrase. I am looking for software that will help me recover the key. I am thinking of a tool that can generate a stream of pass-phrases, based on my hints, a dictionary and some rando...
I am involved in project where I have to install a new server for a new application to a preexisting production network. The new server shall sit in the DMZ and two controllers will sit on the production network. The network has one firewall with an extra module for the DMZ. The server application requires many ports ...
I'm going to rephrase a question I asked earlier, as I don't think anyone understood what I meant. Basically, I'm writing a web based password locker, which can handle multiple accounts; users can share passwords (useful if you're in a website company and need to share login details to, for example, 1&1 or Fasthosts). ...
Some attacks on web browsers consist simply of advertising, so the default homepage of the browser is changed (which is just a small aspect of browser-hijacking). My question: is installing (malicious) add-ons (via drive-by download attack) the only way to modifiy the browser's homepage?
How can I use a TPM chip along with the OpenSSL FIPS Object Module without modifying OpenSSL FIPS Object Module (to avoid Private Label certification)? Should we add an engine interface in OpenSSL module as well in OpenSSL FIPS Object Module?
The title is really bad, but I was able to find better. I have installed Debian on VMware, and set iptables to block any traffic except port 80 (inbound and outbound). When I run a nmap scan it shows that this port is filtered. Should it be this why or not?
I have run a port scan against a Thomson 789vn router and have noticed to my surprise that its HTTP as well as telnet and FTP ports are open. How can one turn off telnet (also FTP) using the router's management interface? Is there a good reason that speaks against doing that? The product is by now several years old and...
I am currently investigating the architecture of the secure, but user friendly service, which combines storing of sensitive private data together with simple authorization procedure. The approach is perfectly described in the answer on this question. However it assumes that user enters a password during authorization...
Some attacks on web browsers consist in installing new toolbars on the browser of the user (which is just a small aspect of browser-hijacking. My question: is installing (malicious) add-ons (via drive-by download attack) the only way to add new toolbars to browsers such as firefox, internet explorer and google chrome ?...
I heard that some credit cards are vulnerable to RFID scanning and thus identity theft. I am concerned about my cards and I would like to learn which cards are vulnerable to such abuse? Are any of these vulnerable too: personal id cards, driving licenses, etc? I see that these might vary in different countries so how d...
I'm having a huge problem with my website due to a weird spike on hits. Today, i'm getting several hundred hits. Normally, i get a lot less, and they are from me country. Today's hits are from every country on the map. They are all direct hits (no referral) and they hit my main page. Most of them stay for 0 seconds and...
I am needing to run scans from one computer/laptop/device to another computer in a protected system. I am worried that plugging in my scanning computer to the protected computer might cause some risk in that a virus may be transferred. To reduce the risk I wish to use incompatible architectures, specifically I wish t...
I am running a webpage for my family with a feature to track users and guests. Since its all just family stuff no one ever visits this server, and I hardly see more than 2-3 of us logged on at the same time. I did however notice today that I suddenly had 16 guests browsing the site, and when checking the logs they were...
I've been playing around with virtual operating systems for some time and began wondering: would it be possible to set up a virus laboratory in a virtual machine? If not, are there other ways that do not require me to go out and get an additional computer?
About 6 days ago my parents who aren't great with PCs got phished on gmail, and the account started spreading spam. It had been hacked on an Argentinian IP, and then logged in from IMAP and SMTP from the UK. At the moment it was logged in from the UK, it sent spam out on the gmail contacts briefly. We changed the passw...
Please note that I am new to BitLocker but I was able to set it up on my C drive. After doing this, I breifly searched on the web for ways around BitLocker and came up with two articles, Passware Hard Disk Decryption and This $299 tool is reportedly capable of decrypting BitLocker ... disks in real-time. How can I prev...
Are there any protocols equivalent to TLS that are widely used, or the TLS is the most, worldwide used protocol to secure almost all the traffic available in the network?
Does any one have references or sources on how to approach developing a web application in which the content is encrypted and unreadable for the developers or company owners; I'm referring to content such as legal docs, in which there is a need to keep information confidential for third parties. The protected data shou...
I'm wondering how secure is to blur face in my photos? Is there any way to re-focus, or re-blur blurred object?
So I have read up and have a decent understanding of how the crypto works with Elliptic Curve Cryptography. I also think I have an understanding of how signing works with things like Elliptic Curve Digital Signature Algorithm (ECDSA). The certificate and private key on my web server are both 2048 bit RSA keys. Can I...
How could someone change the root password without changing chage -l root Last password change date? I know it was changed because it does not match the value in Keepass. I noticed when I tried to use su from a non-root account. My private key still worked. I updated many packages too if that matters (I had to restart ...
I'm well aware in the concept of binary malware but I don't fully understand the idea of a script-based (or shell script) malware. I am more interested in the difference especially in how script-based malwares are multi-platform and can work across architectures, as opposed to normal binary malwares.
Not sure how long this link will be up, but this is the page where users get redirected after trying to read a fake news post in someone timeline. [WARNING: ACCESS IN A CONTROLLED ENVIRONMENT] http://yt-news.info/s/?id=qlktvqt46220jr8q6 Here's the link bait as a news on facebook https://facebook.com/290091591171980 W...
I am new to the field of crash analysis. I recently, by accident, happened to crash Google Chrome. I do not know the reason as to why the crash really happened. I'd like to know it in depth though. When the crash happened, there was a Crash report that was generated. I have saved that report in a text file on my syste...
The Wiretap Report 2013, http://www.uscourts.gov/Statistics/WiretapReports/wiretap-report-2013.aspx#sa5 states that the number of state wiretaps in which encryption was encountered went up from 15 taps (2012) to 51 taps (2013). It also mentions that in just 9 of the 2013-cases officials were unable to decipher the plai...
My lecturer said that since hard disk space is so cheap these days, most organisations do not delete the data on the disk. Rather, they only logically delete it (remove the link to the data). If this is the case, would it also mean that organisations like Facebook still have the data of users who delete their pictures,...
I would like to know if there is a way to securely erase USB flash drives without a chance to recover data from it once it has been erased. I know, that programms like DBAN can be used to securely erase HDDs, but as they work different from flash based drives, I am not sure if I can use DBAN to securely erase my USB dr...
Note: this is not the same as What is a self-contained cross-platform encryption for USB drive?. I believe my question is on topic because I'm not asking for a recommendation. I'm asking if such a product exists. I'm not asking for a subjective comparison of products. A correct answer could be as short as "yes" or "no...
Could clicking on an e-mail attachment (a Microsoft Excel file) from a trusted source (work colleague) have installed a tracking virus that would have allowed the sender to obtain browsing history from my computer? I realise this will raise issues of what I was looking at online and why I feel this may have happened to...
I have setup a test website in order to play around setting up SSL. The website is setup on a Windows host with Apache 2.2.20 with OpenSSL 0.9.8r, MySQL 5.5.37, PHP 5.3.28. The URL to the home page of the website is http://example.com/index.php. Once you get to the index.php page, you are instantly redirected to htt...
I've been inspired by the answer to the question here: Location to store an encryption key It gave me a lot to think about. My friend and I are building a website and we've encountered a problem in which every user will have the ability to upload digital content (files) and sell it to other people. The people who purch...
Is it possible to sniff a network (WLAN) and find out what operating system are installed on network clients (PCs/Phones etc)? I am using Ubuntu.
I need to simplify (at the cost of security features) an SMIME deployment. How can I generate a CSR that reuses the same public and private key for more than one email address? In other words, I have N email addresses, and want to generate N CSRs (and resulting certificates); however the crypto will be the same. (publi...
I just read a very interesting article in Popular Science about repo trucks and their new auto-scanning license plate cameras. The cameras are mounted on all four corners of their trucks, as as they drive around they automatically scan any license plate number that comes into vision and compares it with an online data...
Basically, I'm trying to let the user use a private key without having read access to it. Use case: Employee needs to SSH to a server in the data center. There is 1 private key for all servers, stored on the bastion. How can the employee use the bastion as a jump box while still protecting the private key? Employee co...
I can't seem to find the answer to this question. I read that botnet bots are used as email relays (they have smtp servers installed). Wikipedia on Open mail relay: "(...)Internet initiatives to close open relays have ultimately missed their intended purpose because spammers have created distributed botnets of zo...
So when you connect to tor it gives you a specific IP right, who's IP is this exactly? And when you visit an open website who's IP is visible to the site, mine or the exit node. And while you're connected to end to end untrusted hidden service if the website tracks you with cookies is my original IP visible or the one ...
Great write up on network printer hacking at IronGeek's site here for anyone interested http://www.irongeek.com/i.php?page=security/networkprinterhacking. Here's what I want to do: Scan the subnet for HP printers with port 9100 open. I know I can use OS fingerprinting and the port argument to filter it down. I want to...
Rule-4: alert udp $EXTERNAL_NET any -> $HOME_NET 3333 (msg:"ET EXPLOIT Wireshark ENTTEC DMX Data Processing Code Execution Attempt 1"; content:"|45 53 44 44|"; depth:4; content:"|04|"; distance:2; within:1; content:"|FE FF|"; distance:0; within:50; content:"|FE FF|"; distance:0; within:50; content:"|FE|"; byte_tes...
Assume a web site with some kind of mailer option, that doesn't implement any rate limiting: This enables users to send an unlimited amount of email per second. Will SMTP face possible DoS attacks for that? Or any kind of problems? Can anyone explain this?
If I have... <table onclick="texttexttexttextUSERINPUTHERE"></table> Would XSS be possible? I mean with > and " filtered out. I know if there wasn't text behind the user input, you could put alert(0), and that would set off when clicked, but I don't know if it's possible with this case.
When I am browsing in an environment where Untangle server is installed, can the network admin track everything I do? for example: Skype chat messages Personal emails (Gmail, Yahoo)
I am considering uploading some (all) of my digital personal data to Google Drive. I guess this would instantly grant access for NSA to my data. (Is that right?) Who would have access to my data on my gDrive? After deleting some files on the Drive, will they actually be deleted?
I have Kingston DataTraveler vault privacy USB flash drive (DTVP/2GB). Here is tech specs. Flash drive has a 256-bit AES hardware based encryption. My flash has password protected and I do not know password. Is it possible, to crack password in some way? The question is - is it possible to get encrypted password hash ...
I am creating SPA application using Angular. This will serve my two purpose for middle layer on mobile as well website. Now trying to security my application from XSS, CSRF and also wanted secure authentication mechanism. My services will be Resful stateless services. This is the flow which I think will help me. Clien...
I have a set of INPUT chain rules restricting traffic based on source ip and destination ports.The services are ftp and a job service.The server has a public ip address. The default policy of the INPUT chain is deny. The default policy of the FORWARD chain is deny. The only service accessible from any ip address is th...
I am using pfsense as a firewall, and I would like to know how I can stop network scans from enumerating open services and ports.
I am making a site's authentication system in which the sign up form isn't located at index and it isn't going to be at index. If a user is already signed in and wants to fill sign up form, the script tells him that you're already signed in with the following account. It is ok to do that or not? I've seen Google tellin...
I have implemented the login/verification aspect of a two factor auth system as per RFC 6238. It works fine with Google Authenticator, which is great. Now I am turning my attention to the backup codes, that are provided by services implementing 2FA such as Google and GitHub. I notice they are of a different length and/...
My community centre has a public computer center. I am pretty sure that it's connected in a star topology with some switch in the center. It also have a proxy server which we need to enter a username and password to access the internet. The username and password can be requested from the service counter near the public...
I'm am looking into conducting a phishing campaign to gauge how susceptible my workplace is to phishing attacks. Part of this will involve guiding "duped" users to materials or resources that will help users learn how to spot and handle phishing attempts. Would anyone happen to know of some good, preferably free, reso...
I am in the habit of wiping new drives and for SSDs I use hdparm to perform an ATA secure erase. I just purchased two 44-pin PATA SSDs through an eBay seller in China and hdparm does not report a Security section when querying the drives: # hdparm -I /dev/sda /dev/sda: ATA device, with non-removable media Mod...
I'm asking my question here since I was not able to find an answer anywhere. I have written a piece of software which stores pretty delicate passwords. I have used BCrypt as hashing algorithm with an appropriate setting of strength. Point is, I have now implemented a method which, everytime the user changes something, ...
It is really common (and I would say it is some kind of security basic) to not show on the login page if the username or the password was wrong when a user tries to log in. One should show a generic message instead, like "Password or username are wrong". The reason is not to show potential attackers which usernames are...
I recently got a call from our network admin asking that I stop the app updates on my iPhone to open up bandwidth. It is my personal phone. My question is 2 part: Out of all of the personal devices in the office, how was the admin able to identify the device as mine. What can I change on my phone so it does not person...
I am running MIT Kerberos V and I would like to automate the creation of principals. The page here explains how to do this by providing principal names and passwords on the command line like so: awk '{ print "ank +needchange -pw", $2, $1 }' < /tmp/princnames | time /usr/sbin/kadmin.local> /dev/null Where ank is a...
I'm trying to obtain a copy of program that uses 128 bit encryption, I've been denied since it could decrypt ANYTHING that anyone else has saved in it. I suggested giving me the program, but on mine just change the key so it only works on my copy and no others. I know little of encryption, but it sounds like a logical...
Lately, there have been a couple of projects which aim to replace all the credit cards in your wallet with a single smart device which will hold all of them, sync with your smartphone, etc. (Namely Coin and Protean) What I specifically don't like, however, is that there are so many points of failure involved: Both req...
I'm trying to learn how Microsoft Certificate Templates interact with a certificate request, and can only guess that they take on one of the two/three forms: They simply help the client create a request, EKUs, and other settings for the PKCS10 submission to the server. OR they are used to validate, control, and restri...
I'm currently doing a penetration test for a client, who are using Trustwave NAC to prevent unauthorized physical access to their network. I would like to know if there are any possible ways to bypass this. Client is putting a lot of faith in their implementation (with good cause so far), but I would like to be able to...
I've run into a predicament... I'm developing a mobile application that utilizes a server for various things. One portion is that it stores an id/key pair related to accessing and processing transaction information for specific accounts. This id/key for specific accounts is dynamically decided based on what's going on ...
I have a master server installed on AWS and the slave server installed on GoDaddy. How many SSL certificates do I need to buy? Can I use a single certificate for both?
I came up with this idea but I cant figure out if it's good or bad, maybe you can help. My goal is: I want to create extremely strong passwords for my main accounts (gmail, skype and so on). I want to have different passwords for all my accounts that are longer than 20 characters and that contains lower+upper case char...
I've been reading "Hacking: The Art of Exploitation 2nd Ed." and I hit a part that's not explained clearly enough for me. In the section "Writing to an Arbitrary Address" Jon Erickson creates a vulnerable little c program (called fmt_vuln) that passes format-paramaters (such as %x) as the first argument to printf. Doin...
I want to know how browsers detect phishing pages.And also what methodology browsers use to detect phishing pages?
I have below snapshot of log generated by auditd when I tried to delete a user. It doesn't have hostname and addr in the logs: type=DEL_USER msg=audit(1404811391.243:4407153): user pid=5772 uid=0 auid=513 ses=185589 msg='op=deleting user entries id=532 exe="/usr/sbin/userdel" hostname=? addr=? terminal=pts/1 res=succe...
Consider this scenario Step 1: App asks user to "Sign In" using Google or Facebook. Step 2: Once authenticated, app sends user's Id (from Google/Facebook) to My App Server requested to app specific data Question Since the authentication is purely happening at the client level(iOS/ Android), there is no way for my...
I set up my certificate for my mail server at https://mail.xxxx.com/ I exported my certificate as described in my mail servers documentation and pointed to it in the server settings. The certificate seems to validate 100% on all tests, even the issuer verified that all is well. However my mail clients like outlook and...
I need to do some testing on boxed devices, incidentally having Bluetooth interface. I am quite sure that there are problems in the implementation, at least there must be given how the architecture has been developed. My question is: where can I find some theory on Bluetooth attacks? I am not happy only with BlueSnarf...
Since years ago, miscreants use JavaScript to craft web malware attacks such as drive-by download attack that is used for example to install the famous CoolWebSearch virus. There are static methods that analyze the text of web pages and teach a learning machine to inform a classifier how to detect web malware based on ...
I have recently started work in application security at a mid-sized firm, having transitioned away from 5+ years in security consulting (pentesting, etc). One of the biggest challenges I see here from the start are that security scanners and other tools use root/Administrator access, since that is what vendors had told...
Say you have an ASP.NET page that lists the prices for certain items in labels. I know it's cringe-worthy, but say you took the price of the item from the label on the page to determine what the user is charged for their order. Does ASP.NET guarantee in any way that the text in those labels has not been tampered with?
I want to know if a firewall is considered an access control list (ACL). I know there are other types of ACLs, but am specifically interested in knowing if a firewall is an ACL. Edit: It appears from the answer below that the firewall itself is not an ACL, but are the rules for the firewall considered an ACL?
I was reading through RFC 5280, PKIX Certificate and CRL Profile, Section 4.2.1.6, Subject Alternative Name: The subject alternative name extension allows identities to be bound to the subject of the certificate. These identities may be included in addition to or in place of the identity in the subject field of the c...
Is it possible to unencrypted export a folder in KeepassX? I would like to share a part of my KeepassX database with a collegue but I have all of the needed passwords in separate entries in KeepassX
Is there a way to store a file on a disk as a user so that even the root user has no access to it? I tried EncFS but that is no solution because the root user can switch to every user, so he/she can read the encrypted files too. How can I store a file on the server so no-one can read it but me? Maybe somehow store it s...
I currently offer email subscriptions on my blog, something I coded myself in PHP. People sign up on the blog using their email address. I send them an email with a link to verify their email address and once verified, they get an email whenever a new post is published. I only publish about 4 or 5 posts in a month and ...
Since I am new to encryption and have recently been losing stuff, I decided to start a file that contains some passwords for online accounts and whatnot, encrypt it, back it up (and keep a single copy on Google Drive....cloud storage seems insecure to me.) I was wondering about using GPG though. Is the default algorith...
am using apache 2.4.9 latest with windows 7 i am using some modules like limitipconn_module security2_module but using wireshark i get unlimited request to busy my webserver (DOS) from some ip address i have deny them and their ip ranges basicly on isp hostname but using proxies would be a new problem and i can not d...
From my iptables log, I can observe a particular remote IP address trying to connect to my server from port 80 to a private port number: Jul 09 01:24:41 example.com kernel: IPTABLES: IN=eth1 MAC=xx:xx:xx SRC=abc.a.b.c DST=xyz.x.y.z LEN=44 TOS=0x00 PREC=0x00 TTL=51 ID=16405 PROTO=TCP SPT=80 DPT=61412 WINDOW=16384 RES=0x...
Click farms can be hired to boost ad revenue. http://www.security-faqs.com/what-is-a-click-farm.html The click farm is made up of armies of low paid workers who’s job is to click on links, surf around the target website for a period of time, perhaps signing up for newsletters and then to moving on to another link. It ...
We modified our Session handling from cookie based to URL Rewriting. By doing this the session id gets transmitted as part of the URL. Now there is a vulnerability issue, where whoever uses this URL will be able to log in into the system. To resolve this issue we have done the following A HTTP Session Listener has be...
I am making a web application in Django which generates and includes CSRF tokens for sessions (a Django session can be anonymous or a registered user). Should I keep CSRF protection to the controllers handling login and logout action?
I want to buy a Windows Phone 8 and a Blackberry (BB) device for practicing penetration testing of mobile applications (of course, Windows and BB apps). I am asking for appropriate devices. I don't want alternative of emulators please I have tried emulators concept but it does not suit well as is the case with Androi...
A Paloalto firewall(PA-2050,POS 4.1x) was capable of recognizing the websites which users are visiting(thru http/https) then flag them with a App-ID and apply application control on the traffic, for instance blocking all webmail/file sharing/social media... etc. But PA-2050 can only recognize those traffic visiting web...
First time doing a secure login from a mobile app to a server (built in java). I want to understand if I got this right. Login in for the first time: 1. On the mobile device hardcode a security phrase (ex: "superSecurePhrase@@!!". 2. Take in a username and password. 3. Use base64 to encode username+phrase and password+...
I am using few secret keys to encrypt sensible date. What is the best way/place to protect the keys ? In a file located on my server ? Within the SGBG databse itself ? Or ... ?
Say I have a QR-code on my laptop screen that I need to scan with my mobile device. Is there anything that can be done to make the on-screen code harder to scan from a distance? I am thinking for colors, contrast, movement, etc. At what point would the legit device have trouble scanning a, for example, moving QR code? ...
My boss recently implemented a new security system related to PGP/GPG. The whole idea behind this is to sign files so that people know from who they came. They don't require us to encrypt them, just verify their authenticity. The problem is that wrapping my head around such new and complicated concepts is getting ha...
I have a web application I am doing a security assessment on and it uses captcha for both the login and for certain operations inside the app. The interesting thing is that this particular app displays the text of the captcha right under it (users complained, so...), so it would be feasible to rig something up to read...
My understanding is that miners solve complex algorithms (sha256 i believe) and receive bitcoins. With the amount of hash power all these pools get from miners couldn't they use the resources to decrypt a bunch of encrypted information?
I want to learn sql injection, xss and other web attacks. I am new to all this, just a beginner. I want to know which software to use. Can I use Windows for these attacks and which software do I use? I came to know about some software like Nessus and Burp suite.
guys I am using Tor browser from some time, few weeks maybe and I am still trying to determine the level of anonymity that the browser gives. I am using the browser to advertise a service that I am offering in social networks. I create the accounts using outlook.com e-mail and since I am using Windows OS, I was wonderi...
So that: Only process owners, and root, can access information about their processes, Or, at the very least, cmdline permissions are only readable by root, and My system (CentOS 6.x) still runs Why do I care? I was just talking to a few developers who I think of as knowledgeable people, and only one out of the three ...
I have seen increased 'HEAD' requests in my webserver access.log. What are these requests for? Should I disable this method in my webserver configs?
I'm not at this point yet, thankfully, but being prepared means knowing the answer before the issue arises, so here goes... You're looking through your firewall / website logs... And you notice a large number of requests. Someone appears to have portscanned you, or run sqlmap or DirBuster, Nessus, metasploit or whateve...
Yes. Of course using https everywhere is best. But sometimes that's not an option. In those cases, I'd like to make an informed decision. Is there any information about their prevalence? Or would that all be hidden anyway so no one knows? Does it depend on the site visited? To be clear: I'm not referring to an attack o...