instruction
stringlengths
24
29.9k
Consider the consequences of compromise of a secret key in the Kerberos system vs. in SSL. For example, suppose your individual shared secret key (for your user account) becomes compromised (i.e. it is learned by someone else) in Kerberos. And suppose a widely used certification authority's (CA:s) RSA private key becom...
In various docs on SSL there is a mention of connection. But from the context I am not sure if this means the underlying TCP connection or the SSL connection. I am thinking that there is no SSL connection (formally defined) in the SSL protocol and only an SSL session. Therefore if I read for example: For each SSL se...
I am connecting to a server nc -v 192.168.0.1 1111 But I want to do IP spoofing because the server on 192.168.0.1 only accepting commands from 7.7.7.7. We are two friends, I am 192.168.1.1, and my friend is 192.168.0.1. My friend installed a daemon (on port 1111) and runs ncat -u -c /bin/bash --allow 7.7.7.7 -l 1111 ...
Possible Duplicate: Public DMZ network architecture screened subnet firewall architecture has a DMZ the outisde world doesnt know about the inside network beyond DMZ and inside doesnt know about internet then what are the real world use cases ?
No doubt there is much good information at this link on hardening a linux server and at the child links off of that. And at this link to relevant tools it seems there has not yet been a popular security tool that the wiki writers are not enthusiastic about. Reading and understanding it all would take a considerable a...
I am connecting to a secure site and firefox mentions about identity: Owner: This website does not supply ownership information Verified by: Not specified Technical Details: Connection Partially encrypted Parts of the page you are viewing were not encrypted before transmitted over the internet What do th...
https://www.forumatic.com/ uses an extended validation cert. wikipedia.org's entry on extended validation certs says that a cert is known to be an extended validation cert if the OID in the certificate policies extension is of the appropriate value. How does the browser know what the appropriate value is? Here's what...
On the client side, my application accepts the server's certificate in case of the client certificate being signed by this server cert. Is this correct or may it be dangerous? Is it better to ask a user to confirm security exception every time (e.g. like browsers)? To clarify the question: What I have: [server-cert][CA...
Isn't 128 bit security enough for most practical applications?
During ssl key exchange, I have read that sending the symmetric key to the server encrypted with the server's public key is an old technique. Now for key echange Diffie hellman and other techniques are used. My question is why is key echange using the seerver's public key outdated? What are it's shortcomings?
I am developing stand-alone software in BDS 2006. I want to provide a trial version for 6 months -- the user can use it for just 6 months, but no more on a particular system. I have handled most cases but I do not know how to handle some other cases including: 1. On formatting a pc This is because I am saving the e...
I was thinking of applying 2-step verification to my web apps that will work similarly to Gmail's SMS/voice 2-step verification, except my web app will just email the verification code each time a user logs in. I was wondering is this a good practice or is it still vulnerable? I ask because no one seems to implement th...
I've seen Firefox poping up the message "Untrusted Connection" where self signed certificates are involved. However, I could not understand what the following means (in bold) : XXXX.XXXX.XXXX:8443 uses an invalid security certificate. The certificate is not trusted because it is self-signed. The certificate is only val...
I recently followed a discussion, where one person was stating that passing the session id as url parameter is insecure and that cookies should be used instead. The other person said the opposite and argued that Paypal, for example, is passing the session id as url parameter because of security reasons. Is passing the ...
Possible Duplicate: Netcat IP Spoofing I want to ask one question to you. My friend and i playing game together.He is using below command this computer. ncat -u -c /bin/bash --allow 1.1.1.1 -l 443 And i must connect my friend computer.But i must my ip spoof(1.1.1.1) I am doing ncat 192.168.71.1 443 -s 1.1.1.1 or n...
I ordered a product from a website and found that their invoice display page is completely un-protected with the order id in the query string and merely incrementing the number exposes every order. The information displayed shows email address, full billing and shipping address, and products ordered with the amount. Th...
I've recently asked a question about blanking the password fields in UX for usability purposes, but It seems all the sites use this approach for security reasons. Why is it insecure to post back the same pass that user has entered?
I notice many websites implementing HTTPS for changes in account information even though the user has already logged in through HTTPS and tracked by SESSION. Is this really necessary?
I am giving a free consultation for a non profit organisation that wants a simple system to manage multiple groups with a schedule component, etc. and also manage the medical informations of the kids. Its all in an Excel file but the problem is, it is not very convenient for the nurse. So, I am building this ASP.NET ap...
I am trying to understand the TLS Renegotiation Indication Extension from the RFC. I can understand that it is related to the fact that the renegotiation is sent under the encrypted stream, but I cannot undertand the idea and the exploit. Could anyone please explain it to me in layman's terms so as to be able to unders...
We have about 20 developers working in a heterogeneous environment, mostly using company laptops or desktops. We run Windows 7 on desktops/laptops and a mixture of Linux distros (Ubuntu/CentOS). Management is very keen to set up a system that completely secures the source code, since we are working on project for a cus...
I'm not sure if this is standard practice in all banking institutions but almost all banks where I've received checks the account number of the issuer is exposed (some even the account name). Isn't this information considered confidential? If not then disregard this question. If yes, then it makes me wonder why banks b...
Is there any way to stop users from sending attachments over Gmail or any web based email including private mail servers, if internet access is through a Linux box running Ip Tables/Squid etc. We are looking for a free/open source tool. Can this be achieved through Squid or IPTables/Shorewall?
Possible Duplicate: Can I block based on Mac Address? I have a situation where I need to ban a MAC address from accessing my webserver. (Windows Web Server 2008 R2). Is this possible? P.S. I know how easy it is to change a MAC address... I just want to know if it is possible.
The CVSS standard has a "temporal" component that models the changing risk associated with a vulnerability over time, such as the publication of a working exploit. But NIST's NVD doesn't provide that kind of temporal information. Do you know of any location or service (free or paid) that provides temporal data for CVSS...
What methods are available for testing SQL injection vulnerabilities?
We are currently designing a Web Service that returns a JSON formatted messages. The following are the planned implementation for the service's security: An SSL Certification to the service for the communication security over the internet. Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL)...
I was using a socks proxy to access websites blocked by my ISP, now it don't work any more in an strange way. Using the proxy is same as not using it! (i.e. I can access open sites but filtered sites are filtered even through proxy.) I want to know what can case this? And is there any way to make a secure tunnel other ...
is there any free or open source tools that is able to collect audit logs from firewall in syslog format for monitoring purposes? There is 2 firewall in my organization and I would like to track changes done in the firewall by the administrator for compliance purposes. Unfortunately there is budget constraints and we c...
I am trying to understand how attack trees\graphs can be used in the security process. I read a lot of papers presenting the topic and how this reppresentation can be useful, but I really don't understand in which ways. For example in here there is an example that uses the CVE to collect vulnerabilities. But what if my...
How do you think could we secure hyperlinks pasted by users on website's forums, comments, blogs against bad links/leading to malware etc.? I thought about google safe browsing, projecthoneypot. Did you address this problem and if can avoid bad links problem?
I am creating an web application which processes user information. As a part of application we are storing this input user information and generated output on server. Since this input and output is sensitive, I am encrypting it using AES 128 bit symmetric key for encryption. I want to manage the key and its rotation ...
I want to take a CEH exam, I'd like to know what tutorials and books are recomended for this kind of study. I also would like to know if there are certifications that are better-recognized, so that I can focus on them.
I have over 20GB of photos and documents stored on my hard disk without a backup. I'm thinking about saving all of them in a cloud service such as Microsoft Skydrive or google cloud, but I'm wondering if it is really safe... I mean, can I trust these services in privacy and responsibility just as if I was saving these ...
Suddenly, starting from about yesterday-evening (gmt+2), I get lots of -what I suspect are- 'hits' from bots that are looking variations of this file: /somerealpath/includes/formvars.php I'm curious to know what this is, and why so suddenly these scans? They all seem to scan the same couple of paths. They could be get...
In Diffie Hellman key exchange technique both the parties agree on a common parameter g then they generate their private parameters a and b . Then they exchange g^a and g^b. now they can calculate the common secret key g^ab. But my question is how do they agree on the parameter g. Is it specified in the certificate? I...
I was reading that the designers of UNIX password algorithm used a 12 bit salt to modify the E-table of the unix hashing function (the DES). Supposing i have a system with 2^(24) users? Is that ever possible to user dictionary attack? and if so how long would it take? years?? I am really new on computer security Edit: ...
Why should administrator or superuser account never locked regardless how many incorrect login attempts are made? What should be done instead to alert the staff to the attempted instrusion?
Will all intrusion detection become host-based once all network packets have been encrypted?
EDIT: Please view the revised question instead The admin area has special access to the database (modifying orders, etc). To help explain, I drew a diagram, so here is my process: Notes: I left out having a timed session from the diagram for sake of simplicity of the diagram, but I will actually set a last_login d...
I have a situation in which I cannot use a server-side session, but must allow users to log in, and for their logged in state to be persistent between queries. As with anything that involves crypto of any kind, I know how easy it is to make a mistake and just wanted some extra pairs of eyes to look over what I am propo...
Need to sync arbitrary files within two TrueCrypt containers; one container is a backup, the other the one actively used by me, both are local during the transaction. Current concern security wise is that there would be "data leaks" that would result from the sync tool being used; for example, the sync tool producing i...
I'm currently using Sulley to fuzz my FTP server, but I'm having problems. I want to specify the STRU command, which has a syntax: STRU [<SP> F|R|P] <CRLF> I tried to specify the optional F,R,P arguments to the STRU command like the following: s_initialize('DataSTRU') s_static('STRU ') s_group('struv', values=['F', 'R...
I would like to be able to not just centrally monitor but also filter any organizational data moving out our edge routers, regardless of the sender application and regardless of the protocol/port used by the sender application. For example, the sender application could be an ssh/sftp client, a browser (http/s), email ...
I am making a CA that I hope to be able to sign RSA and Elliptic Curve-capable (EC) keys with. I was wondering if the best approach was: CA with RSA keys capable of signing RSA and EC CSRs CA with EC keys capable of signing RSA and EC CSRs 2 CA key sets (one RSA, one EC) each signing CSRs of their respective type 2 s...
I'm currently investigating Haskell as a platform for secure web development. I'm leaning toward happstack for the web framework part, but I'm also investigating yesod and snap. My gut feeling says that the way the language works (especially the combination of full purity and a powerful static type system) makes it an ...
We always hear about "hacking" (or cracking) banks, websites or the like. Nothing really "important" like centrals, or even satellites (like TV channels). Those we only see in movies - but are they possible? Could one crack a TV satellite, or something like that? Or is it really impossible/too secure? If it is possible...
This is a response to my previous question, Is this admin area secure enough?. There were some very helpful answers there, for which I am very grateful. So I went back to the drawing board and here is my new question, because I'm new to the security side of things and I'm not sure if I've understood or covered all of t...
I have a laptop that has been infected with a virus. I am thinking of taking the disk out of the laptop, putting it into an external disk enclosure, and connecting it to a second laptop so I can run avast on it. Is it a good idea? Can the virus be completely removed?
I have read that TrueCrypt uses ~2k SHA-1 hashes on the password. The iteration count is part of the TrueCrypt specification and is 2000 for SHA1, 2000 for RIPEMD-160 and 1000 for Whirlpool (because Whirlpool is more advanced and computationally heavy than the two others). I recall from prior testing that my computer...
Is there a best practice on how to review IP(s) that are blocked on firewall / router and determine if they are safe to be removed from banned list? Occasionally, the firewall guys see a high counts of security events on the security devices and will proceed to block them in the firewall or router. Over time, these lis...
What are the limitations of vulnerability scanners? If it is related to how these scanners work, how these work?
How would I set up a multiboot system which supports full hard drive encryption and pre-boot authentication. I have a system with Ubuntu, Windows 7, Windows XP, and I would like to install Red Hat. I use grub 2 boot loader. What software would support this set up, for full drive encryption with pre-boot authentication...
This question has always intrigued me whenever the subject of passwords is brought up. Does anyone have direct experience or a reputable source to answer what percentage of password breaches are executed via cracking (dictionary, brute force or various hybrid methods) vs some sort of keylogger or packet sniffer system...
I use chrome (dev channel) on mac osx lion and every now and then it tries to access chrome.googleechotest.com on port 80 (EDIT: and other ports!). Anybody knows what is the deal with chrome.googleechotest.com ?
In Windows 7, Vista and newer OS's, UAC will prevent logon scripts from mapping hard drives so that the following logon script code won't work: Dim WshNetwork Set WshNetwork = WScript.CreateObject("WScript.Network") WshNetwork.MapNetworkDrive "g:", "\\\Saturn\data\" WshNetwork.MapNetworkDrive "k:", "\\\Saturn\stuff\" ...
I have been working with live boot disks recently and I know that it gives you access to the computer's processing power, internet, and various other tasks without the hassle of a username/password. Is it possible to obtain files created in another OS (e.g. Windows XP) that are saved to the "My Documents" or similar fo...
Let's say you use a program like Truecrypt or Keepass which allows you to have a password + key file. I understand that passwords can be brute-forced/dictionary-attacked but is the same true for key files?
I am developing a web app, which makes HTTP calls as long as the user is not logged in. Once the user clicks the login button, he is sent to a "login page" that is HTTPS. The login makes an Ajax call to a servlet, where some specific attributes are added to the session. Then, to solve the problem of "session fixation"...
If my website is hosted on a network of hundreds, possibly thousands, of computers wouldn't an attacker have to gain control of just one of them in order to conduct a MITM attack on my website considering that I do not use any form of SSL encryption?
When you try to install program you'll always asked about administrator permission. Same thing when you try to user 'regedit' command. So I'm interested in how does this virus works. How can it edit Shell and userInit in registry without asking any permission?
I've got virus which tells that all data will be deleted after 12 hours. I cleaned autorun and now scaning my computer with anti-virus, but still is this message just to scary people or is this virus installed something, that will delete data or simply run "format c:" after time passed? This thing looks like message bo...
The string format exploit affecting versions of Exim <= 4.69 cannot be used when Exim is running on port 465, considering authentication is required to relay messages through the mail server, correct?
Let's say I have a website isellchicken.com, this site needs to be able to collect sensitive user information like credit card details. This site will not process the information, but will send it to another site, processpayment.com which uses SSL. Does isellchicken.com need to run SSL as well? Or is the connection enc...
I just heard about this term, is it really used? The concept does not seem new, is it used and/or implemented in current technologies?
Does anyone know of a database that lists the range of MAC addresses that are assigned to each particular brand of router? I would like to use this information for fingerprinting. I know I can find the manufacturer given the OUI of the MAC address, but I do not know how to find the exact router version. For example I ...
If the former, then if the private key can be used to digitally sign messages, why doesn't your client offer to encrypt this highly sensitive piece of data? If the latter, then if someone had access to your private key alone, would they be able to decrypt all your messages? Thanks in advance, I haven't been able to fin...
I am wondering how is it possible for Team Viewer to establish the remote desktop connection over the internet even if the user has not enabled the 3389 port ? I am searching over the internet but didn't find the satisfied answer to my question ? How does it even possible to establish RDP over the internet since it is ...
What does HTTPEverywhere gives compared to NoScript with Firefox (Options|Advanced|HTTPS|Behavior)? Why use HTTPEverywhere, when NoScript also can strict websites to use only HTTPS?
Let's say there is a program sending some data to server via GET: http://server.com/gateway?value1=abc&value3=def Then the server sends these values further, adding value2: (python code) SECURED_VALUE = "safe" "http://externalAPI.com/?value1={0}&value2={1}&value3={2}".format ( get['value1'], SECURED_VALUE, get['value2'...
My friend wants to keep his home network super-secure, due to some trouble that he's had with unwelcome Wi-Fi intruders. So, naturally, he devised an ultra-long WPA2 passphrase (on the order of 100+ characters) to thwart any would-be intruders. Now, to my knowledge, even a simple 10-character alphanumeric passphrase wo...
The RHEL5 manuals state that /dev/urandom will use the entropy pool until it's exhausted, and then it will resort to a fall-back pseudo-random algorithm, so that it will never block. But when investigating the system, I've found that the pseudo-random generator (/dev/urandom) is initialised by /var/lib/random-seed as s...
I want some help regarding use of autpwm feature in backtrack 5 R2. I'm using bt5 (64 bit) on my dell inspiron N5110 laptop. I downloaded the copy fresh from the website and running it as dedicated O/S. I'm running postgresql 8.4 the reason i know is because i can start it up by issuing the following command /etc/init....
I had this idea to permanently conceal user password by requiring minimum length then stripping certain characters. For example if the user password is secret123, the system will strip it down to ecrt12, add random characters to it like ecrt12!@#$%^&* before hashing, adding salt, etc, then storing to DB. Granting all c...
I currently store my passwords in a text file encrypted using GPG -e (specifying my own public key). When I want to lookup a password I'll do something like gpg -d passwords.gpg | grep <sitename> | less and when I want to add a new password I'll decrypt the file, edit the file and then encrypt it again. What are the...
I'm writing a web service which stores data which will be shared between two separate systems. /session/requestNewSession?args=<data> => returns session id /session/requestArgs?session=<session id> => returns <data> stored with key <session id> The code is implemented in python in the twisted matrix library, and I've w...
I'd appreciate if you could recommend me a presentation the describes the dangers and possible solutions and guidelines, when using the Internet. Specifically, in corporate settings. I would need to change and adapt it to our needs, so it has to have a suitable license, something like CC. A good example of such a prese...
I've always used backtrack for security assessments, it's a great toolbox. The thing is since it's a toolbox to exploit things, have their been any reports of "bundled" spyware in standard backtrack installs? Have their been reports of backtrack phoning home? I'm not looking for a debate, just facts.
Are there any explicit disadvantages in comparison to running it on a UNIX machine these days?
I would like to secure as much as possible a computer I am using to sync sensitive data files from work to my home pc. The syncronisation is being done by only 1 software is there a firewall to allow connections to the internet only by that 1 software (and windows updates also) and NOWHERE else so an attacker cant find...
I am using a software to backup my website .sql data every 3 days and it connects simply to the server logs in and downloads the .sql file to my computer. While its downloading the connection is not under SSL is it dangerous? Can someone sniff the data, cookie or username/password of the connection I have made? If I ch...
I was trying to test out my friend's computer (with agreement) by using nmap remotely. But the result I got seems kinda awkward to me. It only showed 1900 as tcpwrapper and all other ports were no responded. And OS detection was 3Com router not the machine I thought. Is it because it blocks nmap scanning at router? I t...
As you can see on this post TeamMentor.net vulnerable to BEAST and SSL 2.0, now what? the app I'm currently development got flagged for SSL 2.0 and BEAST by SSL Labs. I'm using IIS 7.0 with the latest patches, and can't seem to find the answers to these questions: What is the risk impact of this vulnerability on a sit...
If an attacker were to dig up the 'outgoing feed' from my local exchange or the street cabinet, could they sniff my entire neighborhood's network traffic? Or is this infrastructure secured against this sort of attack?
In a x509 digital certificate there is a "certificate fingerprint" section. It contains md5, sha1 and sha256. How are these obtained, and during the SSL connection, how are these values checked for?
Let's say I have a web server I setup, and then a database server. However, they are communicating locally and are behind firewall. In my opinion, no SSL is needed here right? The only time to use SSL to encrypt the database connection would be between a web server that exists in a server that remotely communicates wi...
I am (not so) currently learning about security and right now I am learning about using Wireshark. I bumped into this video: http://www.wonderhowto.com/how-to-detect-network-intrusions-with-wireshark-and-snort-263020/ and one part that interest me is in min 12.42. It is a site that describes the result in details. The ...
I just want some advice for the implementation of a web filter for a school network. Just want to block some contents and url. A free tool should be fine I guess. Any recommendations? Thanks!
Here's a background of what I've done so far: I've been able to add a CRL to a self signed certificate using OpenSSL (see attached). But I'm not sure how to create an X.509 certificate issued by this self-signed root (i.e. a leaf certificates from this CA) I've tried to create a leaf certificate from this CA using ope...
Is it OK if I sign a subset of domain emails, or is this an all-or-nothing game? We use Amazon's Simple-Email-Service for sending e-commerce emails. We would like to sign these with DKIM. This same domain is also used for all email addresses for the corporation behind this e-commerce operation. Due to some IT constrai...
So I'm setting up a small e-commerce app, and am thinking what happens if the server is compromised. We are selling software so potentially an intruder could generate themselves some free serial numbers (not a great worry), grab the customer database (more of a worry) or do something sneaky like redirect legitimate pa...
Back in 2008 a wireless defibrillator was shown to be hackable. At this year's Black Hat conference a presenter showed exactly how to hack into a wireless insulin pump. Both of these demonstrated the ability for the potentially lethal hacking of wireless medical devices. (Here's a shameless plug.) I and a couple oth...
At work we have a network that is not connected to the internet however it is exposed to the outside work through USB drives and employees cell phones. I'd like to connect our system to the internet to get automatic Symantec & windows updates. Currently I have to update these manually which I don't have time to do as...
See the following for dealing with credit information: https://www.pcisecuritystandards.org/security_standards/ Does a similar standard exist for PHI? Is one being developed?
This is an entirely hypothetical question. Lets say a clinic has a computer in their waiting room for checking email, surfing the web etc. while patients wait. Lets also assume whoever signed this up wasn't thinking, and this machine is just sitting on an unsecured network for the clinic, and can access patient files s...
I have been asked by a client to deidentify the PHI data in their database and I'm either over-simplifying the process or my client is overly paranoid. Perhaps you can tell me which is the case. This client's need for de-identification is two-fold. When they lose a client they have the right to keep a deidentified co...
I have read conflicting information on whether PHI can be stored and delivered on a cloud in a HIPAA compliant manner. I hear many people saying you cannot share infrastructure and be HIPAA compliant. What needs to be taken into consideration when storing PHI on a cloud?
I want to point out, from the start, that I know all about the Direct Project and I am huge fan of work to provide easy-to-use standards based secure email for doctor-patient communication. I am not asking a "should" question here. I know patient-doctor communications should be encrypted. I know that the meaningful use...
When setting up a server, what configuration changes do I need to make sure that all of the software uses /dev/urandom instead of /dev/random? Some servers don't have much entropy in the entropy pool (e.g., VPSs). If a software component uses /dev/random, then it may block and cause the server to become mysteriously s...
I was discussing software trial time limit enforcement with a colleague and the idea of CIA came up. Do stricter enforcement techniques increase confidentiality at the expense of availability? (for example when an application MUST phone home to authenticate and therefore cannot be used offline) Or is this integrity? Ma...