instruction
stringlengths
24
29.9k
Following the breach of avast:forum.avast.com they decided to host the database externally@id.avast.com. My question is, what is the point of hosting the database externally since when you get remote code execution on forum.avast.com (which has access to the database hosted on id.avast.com) you can then steal the datab...
I would like to know how the ATM pin hole camera works.Whether the pin hole camera works only once the card is inserted in ATM or during the cash withdrawal or it works always?
Let's say we create a flyer in some desktop publishing software (e.g., InDesign, Illustrator), physically print it and post it somewhere. We don't want inauthentic claims of authorship. Is there a way to, say, put a [?] on the flyer that only we could have generated. Or, that someone claiming to author the flyer cannot...
I've understood that the following steps are taken when I log in to a site: 1. My password is hashed 2. The hash is compared to what's stored in the database. 3. If the hashes are equal, I can log in. I'm also quite certain that if attackers gain access to the password database, they can use brute force to find the cl...
As we all know, when an SSL Certificate is assigned, there is a trust chain that is created for verify everyone from the Certificate Authority to the actual website's SSL Certificate. Thanks to a good discussion with a security expert, I am lead to believe that this trust chain is flawed by the way it is done. After so...
It's "time to add a word" says Arnold Reinhold, the creator of Diceware, in his blog (3/2014). He advices to use 6 word sentences (or 5 words with one extra character chosen and placed at random) from now on. Reasons given include that he predicted the likelihood of a change in 2014 back in 1995, and that "Today crimin...
I am using Firefox browser version 28.0. To access https://www.yahoo.com, I put a proxy with a self-signed certificate in between and my client PC can access the HTTPS site. I then sniffed traffic in my client PC and observed a strange thing; Each HTTPS request sent from Firefox is split into two TCP segments. One is o...
Is checking the state of the supporting files of the Windows registry hives enough to detect if a new software/malware has been installed on the computer or a given Windows regsitry key has been modified ? By checking the state I mean verifying for example the last modification date, the size of the file and so on. It ...
After reading the question about a manipulated google analytics script I wonder how you would protect against this kind of attack. What comes to mind is setting DNS IP fixed in network configuration or using a tunnel, but in both cases you would not detect the attack. Is there a way to protect yourself and also be able...
I have a client who is looking to hold personal information such as Driving Licences and Insurance documents in order to verify if a user of the site is who they say they are and lives where they say they live (the site is a sort of brokerage) We were looking at storing this information in an offsite solution such as a...
The internet is full of guides of how to remove malware on already infected computers. Normally, step 1 is to enter failsafe mode, so that the virus can't interfere with the anti-virus program that easy. But if you got infected, you shutdown your computer, then the virus could have time to encrypt itself. And when you ...
Could someone please enlighten me, either on a technical level or high level if that detail is not feasible, on how tracker cookies and beacons work. Particularly, how information on my browsing habits (shopping suggestions) can be persisted between different machines even when I only use one for work, never logging i...
What is the relationship between the Suite B algorithms and FIPS 140-2 certification? Does OpenSSL meet both criteria? From what I've read, it seems that OpenSSL's crypto library implements many algorithms, and the FIPS 140-2 Object Module covers a subset of those algorithms. Further, it seems that Suite B is an even ...
Block http HEAD requests helps us to solidify the safety rules for a Apache webserver or this restriction would be an exaggerated? What kind of vulnerability can be exploited by HEAD method? Tests: lynx --dump --head http://www.terra.com.br HTTP/1.1 200 OK Server: nginx Date: Wed, 16 Jul 2014 14:44:35 GMT Content-...
I have come across a few Android apps that provide various features for communicating with a desktop machine (sending text or typing in one direction or another, controlling the desktop pointer with the mobile device, sending mobile notifications to the desktop, etc). Most of them rely on both machines being on the sam...
I am running a Windows XP virtual machine on a Windows XP host machine. I use the VM for suspicious websites and software/applications. In the case a kaylogger will be installed on my VM: will this keylogger listen to the keyboard activities when I type on the host machine ?
I was wondering how PGP works with a CC. In my understanding, if I send an e-mail to foo@example.com and use baz@example.org in the CC, Enigmail would have to encrypt the e-mail once for every user and send two e-mails. But in reality, if baz@example.org checks his e-mail he is still listed as CC and not as the main re...
What's the best way to hash a credit card number so that it can be used for fingerprinting (i.e. so that comparing two hashes will let you know if the card numbers match or not)? Ideally, I'm looking for recommendations of which hash + salt might be well suited for this use-case. The hash would uniquely identify a par...
I have found a small encryption in a programm and would like to identify it, in terms of the public name. I have been programming with a DES and with TEA, but what i have here is not even similar with these. The Algorithm is en/encrypting (exactly, only) 4 byte blocks, is using 5 steps left and right shifting, and xor...
When a user is logged into a web-based application in multiple tabs, and changes their password, should it automatically log them out of the other tabs? The use case is an account is compromised, the attacker logs in, the user also logs in and changes their password, however, since the attacker was already logged in, t...
I am running a windows 7 virtual box without internet connected. Internet is, however, connected to the host, and I allow any internet access to and from the host. On the guest platform I am working with some sensitive documents that I do not want any viruses or attackers to get. Can someone look at the virtual box har...
I could use a password manager, but I don't like relying on another entity than myself to store my passwords, and it would screw me over if I find myself on the internet in a new location without the database. So I want to use the correct horse battery staple method for my passwords (don't tell anyone,) and memorise al...
Found this article on using Live Boot Devices to do sensitive tasks such as online banking. While the article discusses the benefits of avoiding a possibly compromised host OS, it doesn't mention lower-level threats. Given increasing prevalence of sub-OS malware (e.g. BIOS, NIC, etc.), is there still a substantial incr...
I'm looking to generate some new passwords for myself that are easy to remember, but hard to crack. By choosing a generation algorithm and generating one random password with it, I can be relatively confident of how hard to crack my password is. (I can calculate its entropy.) If, instead, I keep generating passwords un...
So I have a client-authencation cert installed on client PCs, which doesn't expire for 5 more years. Unfortunately, the cert on our gateway which is used to validate the client cert, expires this month. I know.... D'Oh! Plan A is to place a new cert on our gateway, and issue new client-auth certs to all of the clients...
For a cryptocurrency client implementation, I am serving a single page webapp to mobile clients. It is a client-side-only page. I would like to serve this page to clients, but I fear tampering by hosts to change the code so that user passwords are intercepted. The passwords, at least 128 bits of entropy enforced, are...
I have two different crypto libraries I created, one is in java and uses the standard built-in java crypto libraries. The other uses openssl and has been wrapped in java through the JNI. I'm currently replacing the default java library code with the openssl library code, and verifying the encryptions against each other...
If a user connects to an SSH server using an rsa private key, but does not confirm the server's fingerprint. What kind of information can a man in the middle attack get from the session?
My GF just told me she just sent some of her personal info over an email. She was trying to send her folks some documents. I guess the documents had some sensitive info on them, like her full name, SSN#, etc. The email was not encrypted. How at risk is she and what should she do from here? She is freaking out.
I'm currently following a small game to get more familar with linux and security and got the following task: The password for the next level is stored in /etc/bandit_pass/bandit14 and can only be read by user bandit14. For this level, you don’t get the next password, but you get a private SSH key that can be used to l...
I'm trying to understand SSL/TLS. What follows are a description of a scenario and a few assumptions which I hope you can confirm or refute. Question How can my employer be a man-in-the-middle when I connect to Gmail? Can he at all? That is: is it possible for the employer to unencrypt the connection between the browse...
How could I decrypt a file (encrypted with AES-128) using openssl ? I do not remember the passphrase I used to encrypt it, but I saved the key generated and used to encrypt my file. How could I use this key to decrypt my file ?
I am connected to my chat accounts via Empathy, a messaging program, and it has my password stored in it. I am really curious to know how it is storing the passwords, and if there is any they can retrieved back in plain text?
If you have a REST API, which when you log in from the client side, generates an access token for the client, which is then stored in local storage and used for all authentication from this point on. Is it secure to keep using the same access token, say you generate the access token, store it in the database, and keep ...
I'm unable to understand how arbitrary code execution vulnerabilities are supposed to work. Wikipedia mentions: Arbitrary code execution is commonly achieved through control over the instruction pointer of a running process. Say, the vulnerability is being triggered by some maliciously crafted file that said process ...
The traffic from Wireshark saved into a file with dumpcap. In this file a have for example : € X `þ $À6 @ íëÃNxXÀ¨£ P&E»kKí¨<`PEà; HTTP/1.1 200 OK Cache-Control: private And I want to see only : HTTP/1.1 200 OK Cache-Control: private On windows 7 and I use this commands : cd\pro* cd wir...
is it recommended to use both protocols together? In which situation?
We are currently using EasyRSA and OpenSSL to manage our user VPN certificates for OpenVPN. The process we have in place currently is: User generates a CSR on their laptop and sends it to us to sign We copy the CSR to the server, sign it, and return the signed CRT to the user We usually leave a copy of of the CSR and ...
What's the point of spotlighting wget on heartbleed dumps? I'm specifically talking about this which is the first page of wget occurencies in heartbleed dumps. They put this page as a link on the top of the main page like if that is relevant in some way. I can understand the reason behind exposing email= and password=...
I just visited a forum and a member knew what OS I was running without me saying anything (a not TOO common distro of linux). Now I'm not sure how he exactly he might have done it, or what information he might have been able to get out, but, for starters, I'm guessing that, besides information on my OS, they might have...
So, a bit of context before I start may be handy. I am developing a Java desktop application which will use an SQLite database to store/process data. The application will utilize authentication to access the program for editing data, adding/deleting data, etc. But I don't want an attacker to be able to pull the laptop'...
A framework for modeling password management risks and costs, and the beginnings of a good strategy for users to help them manage passwords for their often large portfolios of accounts is outlined in the paper Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts | USENIX Securi...
I want to have a simple application that is in .exe (executable) format hosted on a secure domain that, on my website, a user can click to download and run. However, I'm aware that many annoying viruses are in the form of a harmless-looking executable, so I naturally would want to also put, as a small notice for that d...
Soon I will be acquiring the event logs of the systems my company produces and expected to audit them. Multiple logs are generated from each computer and there are multiple operating systems to audit. The systems are isolated from the internet and have a significant amount of physical security, not to mention there isn...
I bought a domain few days before. but it came to my attention that my domain has been blacklisted by many antivirus programs and search engines as the domain for previously purchased by somebody and he misuse it. Though i have asked few antivirus companies and search engines to review the domain, but i want to know wh...
I was looking through the OpenSSL vulnerabilities list and came across CVE-2010-5298 as a 2014 vulnerability. At http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-5298, under Date Entry Created, it says 20140414. However, under http://cve.mitre.org/cve/identifiers/syntaxchange.html, it clearly shows that format a...
I'm new to SSL/TSL and was wondering if you could walk me through the following scenario. Scenario Let's say I am one of a thousand websites that has a certificate signed by some certificate authority (CA). Everything is fine. Breach Then, some evil hacker steals the CA's private key. Now, all of a sudden, all thousand...
Homework question The full question is the following: Suppose you are told that the one time pad encryption of the message "attack at dawn" is 09e1c5f70a65ac519458e7e53f36 (the plaintext letters are encoded as 8-bit ASCII and the given ciphertext is written in hex). What would be the one time pad encryption of the mess...
First of all, I apologize if these questions can be answered using a web search, but I'm sort of a crypto noob and don't know what to search for. Given N AES encrypted messages (where the message length is much longer than the key length), and the corresponding N decrypted messages (all encrypted with different keys),...
Ok I've worked with some penetration testing but it's all done in house where I work at on a secure network to secure servers and work stations before being deployed. But my question here is kind of vague on the laws of the U.S. I want to show my girlfriends son who is interested in my line of work some examples of ha...
Utill yesterday I never saw any warnings on secure sites like twitter and many others but currently I am getting an exclamation in my chrome saying identity not verified but https is indeed used, hence what to do in this situation? following are the screenshots: Well it was resolved today
Note: This is not an actual situation I'm currently in. Assume your boss is one of those old-fashioned computer-illiterate managers and wants to store the passwords in plaintext to simplify development. You get 5 minutes to explain the point of hashing passwords. You also know from experience that your boss can be sway...
I'm not clearly understand technologies behind OpenVPN, so I have a question about OpenVPN security: What if I have client.p12 (PKCS#12) file and this file was leaked (with export password) to some evil person. Additionally this person can dump my encrypted VPN traffic (which was secured with leaked client.p12 file). D...
From http://msdn.microsoft.com/en-us/library/jj709705.aspx In contrast to the DAC model, which is oriented around objects, the AzMan RBAC model attempts to orient the common administrative experience around user roles. Rather than assigning permissions to objects, an AzMan RBAC framework enables applications to present...
What is the difference between openssl and mkcert. Which one should I prefer. I want to create an IIS hosted WCF service. Which one should I use to create an SSL certificate. Also, there is another option to create an ssl certificate. On the iis we can create a self signed certificate. Can I use this instead of the one...
An anti tampering mechanism of a device relay on detect tampering mechanism when the device is powered down using the energy provided internally by a coin cell. Is there a way to uncharge rapidly a coin cell contained in a device without having access to the coin cell and the electronic that use it ? I'm trying to th...
I am looking to PEN test my application against XSS attacks. The application is a REST API... As such when you POST some JSON to /cart/add to see the result of that attack you would need to GET /cart. So far I have figured out how to successfully use Fuzzer to make XSS attacks to my application. However it expects th...
The requirements for a system like itunes store or google play are as follows; identify and authenticate the user determine if the user has paid for a given app if s/he has, securely transmit the app and install it on the device What is the strategy used in this situation? In particular, is the app transmitted in an ...
Years ago computer security analysts Dan Farmer and Wietse Venema wrote the security program S.A.T.A.N. Does anyone know what happened to it (or if it just went out of style) and what people replaced it with, if anything?
I was going to ask about how to educate users, but now that I think about it, I first want to know if it's actually possible to do effectively at all. Are there any amazing success (or horrible failure) stories floating around about user education, and different approaches thereto? Any statistics on whether companies t...
I need to set up an scenario where an attacker DoS attacks port 80 of an server while snort and others users try to connect to port 80 at the same time. Something like this: 1000 connections to port 80 800 analyzed by Snort 750 detected like DoS attack by Snort How can I get these values? What tools I need besides sn...
I am writing a paper on "The Role of Architecture and Design in Software Assurance" and a commenter asked "Provide a stronger case for using the CWE over the CVE. Explain how CVE vulnerabilities relate to the design phase and static code analysis." As the article is more for software engineers and developers, I am lo...
The author of https://stackoverflow.com/a/477578/14731 recommends: DO NOT STORE THE PERSISTENT LOGIN COOKIE (TOKEN) IN YOUR DATABASE, ONLY A HASH OF IT! [...] use strong salted hashing (bcrypt / phpass) when storing persistent login tokens. I was under the impression that login cookies served two purposes: UX benefi...
Start with a unique identifier String macAddress = "CC:3A:61:24:D6:96"; Hash the identifier via MD5 implementation String hash = md5(macAddress); //bd37f780e10244cf28810b969559ad5b Remove all letters from the hash String result = hash.replaceAll("[^\\d.]", ""); result == "3778010244288109695595" I am using MD5 to ano...
I am trying to balance good security practices against excessive logging of user metadata / Personally Identifiable Information. I am constructing a web app that allows for secure messaging. In part of my system design, I am trying to minimize leaking of user metadata. Part of my system design includes a module that tr...
So I'm running a private subnet where there is no internet connectivity, I understand the grave danger of running an ssh server on the internet without security. In short I would like to be able to login to another machine on my subnet without entering a password or fumbling with rsa keys. So passwordless, but not p...
I have a customer who wants me to "restore" his Wordpress page. I looked a little bit deeper in the codes and found the following code a few times in different files: http://pastebin.com/nL4i6t8x I'm not an expert in IT Security but for me this looks pretty much as "encrypted" code that does not belong to Wordpress. Ho...
I was wondering ... when I upload a file to, say, Dropbox, does anybody personally check it to see what it is? Say I upload a copy of my Blu-ray movie to cloud storage ... will anyone check, and could they possibly tell law enforcement that I uploaded a digital copy online? Or is it all 100% automated, and nobody actua...
Hear me out ... On TV shows like Criminal Minds they make it out to appear that any encrypted files can be easily decrypted, even without a key. The character, Garcia, just simply "pushes some buttons" and the file becomes decrypted almost instantly, even without any key, etc. I know that the show is not a good example...
I'm in a situation where I need to calculate a hash of the result of the password in plain text plus some random chars representing a session. The gained hash will be compared to another hash that is received by the opponent. The problem is, that I only get the full hash from the opponent which can only be regenerated ...
I'm kind of tired of the password managers that are available around... I need one that's open source, that works on OSX, that lets me store .pem files and that I can trust. As I haven't found one, I thought it could be an interesting project for me to work on. I'm going to use AngularJS just b/c it's a technology that...
I'm building a backend for the mobile app with a public-facing HTTP API endpoint. Despite being publicly visible, this endpoint is only meant to be used by my app, i.e. I don't want people to send random requests to it using wget or anything similar. My idea was to configure a SSL/TLS on my server, thus making the API ...
Imagine alice posts her public PGP key on her website and bob encrypts a widget with that public key then sends it to alice over Tor. If alice's key is widely and publically available and an attacker were to keep a map of key => identity, wouldn't the attacker, if operating your entrance node, be able to correlate the ...
I have seen that x.x.x.255 is reserved for broadcasting. Is it only work for broadcasting to the computer which connected to the same router? Can I broadcast to public IPs?
I have some questions about how the fingerprint function is performed. First of all, I have some knowledge about cryptography. However it seems to do not be good enough to understand hundreds of pages with vague or incomplete information. Questions: I am trying to know how to compare the fingerprint appeared when the...
Ten years ago, we opened our building's front door with a badge. Five years ago we paid public transports with an RFID card. Today we pay for our bread with the same system and tomorrow we would probably be able to authenticate ourselves with something similar. Basically, an NFC tag is only a physical support, just as ...
Specifically talking about walkie talkie radio networks. Suppose there is a group of up to 16 persons, each equipped with such a unit. Typically, one person will be talking with one another (one-to-one), or one person will be broadcasting to all the others members (one-to-all). The goal is to secure and authenticate al...
I am reading "Hacking The Art of Exploitation" book . i have read till chapter 2 programming but most of it has gone above my head . I want to learn basically cryptography , network security and web security . Which book should i read or should i just skip the first four chapters and go to the chapter 4 network securit...
How would I report an international security vulnerability which could cause a lot of damage? I am asking how & where I would report this vulnerability, not now to create a simple vulnerability. :)) so & I am trying to trade it to free someone.
I have software installed on my computer that has encryption capabilities. This is the case both for things like VPN/SSL, and also GPG. I don't really use GPG (there are not that many people I can use it with), but I have it in case I want to send sensitive information of one kind or another. I know that the US has exp...
I'm working on a security project. I have sensitive data that I would like to store in OS X's keychain. I'm able to add the data programmatically into the OS X keychain by using RHKeychain. But after doing a lot of research, it appears that OS X keychain data can also be accessible (1, 2, …) by malware. Is OS X keycha...
I want to invoke a custom assembly that uses protected services (like DirectoryServices, etc...) with reporting Services. On the web, I see a recurring example of configuration (inspired by this article) to do just that. Here it is <CodeGroup class="UnionCodeGroup" version="1" Name="SecurityExtensionCodeGro...
Is there any way to implement encryption/decryption using ECC, like RSA does? For example, say some user wants to send a message containing a symmetric key to user X. Then, in RSA, I could just encrypt the symmetric key using X's public key, and only X can decrypt using his private key. In my particular application,...
Rebooted my rMBP late 2013 recently, and saw a set of SSL errors (unable to verify certificate) across a wide range of sites (google, gmail, mubi, medium) and also in the Calendar app as it tried to connect to Google. Never seen this kind of thing before -- any reason for concern?
I understand that copyright holders can identify illegal filesharing over BitTorrent by simply taking part in the sharing process and noting IPs of peers. But how do they detect illegal downloads from file hosters?
Someone can suggest me a real situation in which is better to use MAC (Mandatory Access Control) instead of DAC (Discretionary Access Control) or RBAC (Role Based Access Control)? And in which DAC is better than the others? And in which RBAC is the best? I know the theoretical notions, and I know that RBAC is better in...
I recently hacked into my router which runs BusyBox v1.9.1. I want to edit some files in my web GUI interface which will allow me to get hidden options in it. I'm trying to edit a .js file and replace it via FileZilla (I also hacked FTP through setting the default router directory as ../..), and when I upload the file ...
Suppose I do an online shopping they are asking me to enter my card details like four digit number(whatever related to that) and they are asking me to enter the PIN number too. If I enter all this things, Can't they get all keystroke from me through Javascript and crack my passwords, card details etc ? I surfed for saf...
I'm trying to decrypt my router's root password, since I only have access to a simple admin account that doesn't have root privileges. Here is the passwd file: 0:F.bCrWv/Oxp6.:0:0:root:/home:/bin/sh nobody:x:99:99:Nobody:/:/sbin/nologin derp:heooPbcMgdldo:0:0:ftp user:/mnt:/bin/sh I only want the identification of the...
Similar to a default password list for network appliances, it's conceivable that application layer passwords are default from training materials given to a developer. In fact, I have discovered applications that have an authentication system largely unchanged from the corresponding SDK. Is there a repository of usernam...
In my page admins-only section is very responsive, so I have to use both server and client side templating. Obviously server side templates are stored outside of web-root and routing takes care of loading them. However now I need to GET a bunch of templates for javscript part. One approach is to put client side templa...
Setup PC running Wireshark, connected to the network wireless (if OS variation is an issue, use Wireshark on Linux). Another device connected, wireless, to the same LAN. Wireless network uses WPA2 encryption Question Using Wireshark on my PC, how do I capture ALL packets, sent and received, by the other device on th...
I need to design a self service portal for renewing, revoking, and unrevoking a certificate and have come up with the following rules*: Renewal Certificates have a short term validity and need to renewed quickly, so most renewals will be automatically approved. Zero knowledge proof is sufficient for the CA to issue a...
Boxcryptor https://www.boxcryptor.com is not Open Source. Can I trust this? Is it secure? No government backdoor? Because there is no alternative for OS X and iOS.
I have a website that has an smtp server open on port 25. There is no outbound functionality on the smtp server. We just parse attachments from our users, then 'queue' the email in a dummy queue. So essentially we drop the email after parsing it. I've been noticing some weird traffic in the logs lately. Basically, I'm ...
I have used Burp Suite Penetration testing tool in my computer to intercept requests.Assume that I am using Smart Phone. So Is it possible to intercept my smart phone requests into my computer?
Egor Homakov made a nice writeup (Cookie Bomb or let's break the Internet) on how to crash CDNs and other websites with cookies. Although this is a user/browser-side DOS, I'm wondering how one would stop this on the server-side.
Is there any way other than Meterpreter to pivot into the network? If yes, then please guide. I already know about Meterpreter, just want to know manual methods other than this.
I encountered a data storage service with rather weird access policies. There're "folders" with "files" and each "folder" can have either of the following permissions: anyone in the world can enumerate and read the files anyone in the world can read the files (knowing their names in advance or guessing the names) a va...
Truth or bald-faced lie: the cheap $50 router you can pick up at your local electronics store for your home broadband Internet connection is actually a pretty effective firewall. Why or why not? How does Network Address Translation (NAT) increase firewall effectiveness?