instruction stringlengths 24 29.9k |
|---|
Given a specific SSL/TLS connection, I would like to know what is the proper way to launch a parameter renegotiation, asked from client side.
Are they any requirements from the previous handshake in the parameters established?
What is the exact structure of the first message sent by the client asking for the renegoti... |
Let's take a chat system, where any user can create a channel with a password protection. Thus, other users may only join using the channel password.
This password is therefore known to every person inside the channel.
Should this password be hashed in the database? This would mean that the application is not able to s... |
When I try to visit some websites with HTTPS , I get the error that the
SSL is self-signed and that the SSL is only valid for another domain, and that SSL is actually invalid.
If the SSL is valid only for other domains(Error code: ssl_error_bad_cert_domain) what should I do? Stay to Http or go Https. Also can you expla... |
Just trying to get some general sense about the security on internet now-a-days.
There are so many websites I go and comment on different things. If some comments are political and they don't like, I am afraid, they will trace me back.
So just wanted to know few basic things
Is it possible for any website (example-www... |
If you use a client like mutt to access your mail, you probably know that it doesn't support 2-factor authentication. It still prompts only for a password - either your account password or, in the case of Gmail, possibly your application-specific Gmail password.
My concern is that attackers can work around Gmail's 2-fa... |
What are the operations made by malware to hook the auto start extensibility points in order to be able to run at the startup of the computer that runs Windows operation system ?
|
I've been a developer for quite some time, and as part of my on-going learning process I've learnt how to spot and remedy broken (and insecure) code written by others. Recently, I've found myself digging through random projects, and noteing down security issues that I've spotted, ranging from XSS, to SQLI, insecure up-... |
Preferably with a vanilla Linux kernel i.e. not using SELinux or grsecurity?
Lately there has been a case of in-the-wild UNIX server malware:
https://www.virusbtn.com/virusbulletin/archive/2014/07/vb201407-Mayhem
that takes advantage of LD_PRELOAD to implement a hidden userspace trojan. I'm thinking it would be good to... |
I am looking for some opinions on using free AV for meet PCI requirement 5. The way I read this for version 2.0 is that it's entirely possible for a client to meet their AV needs with the modern free versions.
With the expansions 3.0 it appears that sites will need a full blown AV product unless there is a product out ... |
I am writing a User Management system that has to include a change of password utility. We don't front end hash passwords (hopefully we will soon). As a result passwords are passed over https in the clear whenever a user is edited or his password is changed. Is there any difference in using "PUT" vs. "POST" requests in... |
You could imagine a web app that serves subtly different versions of a page to each user. For example, it might encode the identity of the user in the images it serves. This would be a per-user watermark. On a private site, the consequence would be that if any image were leaked, it would be possible to identify the lea... |
I know that AES-GCM mode does not need padding, and its output are exactly the length of input data plus the tagging. But I am a little bit lost, as AES itself is block cipher, it could only operate on input of multiple of its block size, than when the input is not exactly multiple of its block size, what kind of data ... |
Elliptical Curve Cryptography (ECC) is one of the newest encryption schemes to challenge RSA cryptography. What problem does ECC seek to fix compared to RSA? Would you have any qualms with using ECC to encrypt sensitive material?
|
I'm writing a small protocol that relies on a DH handshake, generation of a shared secret, and subsequent AES encryption/decryption using that generated secret. I want to add a built-in test message after the handshake to ensure both clients are able to communicate properly (in addition to a CRC). Is building a small "... |
I don't have the ability to determine/recover the master password for a production system that uses zip 2 archives. However, I need to be able to add new files to existing encrypted archives. There are various tools out there that can 'break' the zip 2.0 encryption with a known-plaintext attack, which allows recovery o... |
For the second time in 8 weeks, one of my American Express (AMEX) card numbers was stolen. I do use the card online, but only at reputable (and SSL/TLS enabled sites). I use it in the real world, too, although nowhere shady. While AMEX's fraud prevention is good and they detected the attempted fraudulent usage, it's... |
A company whose services I'm trying to integrate uses this protocol:
An AES key is embedded in an Android library.
To authenticate itself, the library sends a SHA1 hash of the key over plain HTTP.
The response contains an RSA public key encrypted using the same AES key.
A temporary AES key is generated on the client.
... |
We run scraping jobs on behalf of users. We use webkit-gtk as browser to do the scraping. Each job is executed as a separate process
So as not to mix user data we have isolated following data per user.
Cookies
Flash cookies
Cache files
HTML 5 storage
Do I need to worry about any other types of files that normal brows... |
As a part of work, I've come across content sniffing, and i understand web apps can be vulnerable to xss because of it. There is another post, regarding content sniffing and xss, but didnt quite answer my question, or maybe i just misread it. content sniffing will read the file to try and determine what type of file it... |
I find it hard to believe that the majority of Windows system files aren't signed. I don't know whether my disbelief comes from naivety, or because Windows is used within secure environments worldwide and thus one would expect a certain level of care. (Does signing files show care? Probably not.)
But I imagine this lac... |
I want to design and implement an epayments system (I will not be handling credit card payments). The system will have a RESTful API. I am already familiar with RESTful servies, and have built a few in my time.
However, this time round, security is of paramount importance and I want a system that is as robust against e... |
We have application which will be in iframe. Partner sites can use our application - put iframe in their sites.
Partner site has users with money, who will use our application in iframe to buy items. Iframe needs communicate with partner site.
For example user buys item. Our app creates a record about sold item in dat... |
Firstly, I welcome a better title for this question. I admit I'm a security novice.
I'm trying to determine whether I have malware and what that malware may be doing. Using Wireshark, I see several suspicious streams, including addresses ending in .ln and .ch that send all data encrypted. When I run whois it always tim... |
I've been tasked with writing a module for my company to interface with an external API. This API has a syntax similar to SSH where I have to incorporate the user details as well as the host address of the server I'm trying to connect to.
However, I run into the security issue that in order to pass the user details,... |
I've been trying to determine if there is malware on my OS X 10.9.3 Mac, that is could be doing keylogging or other forms of non-destructive intrusion.
Given the (not technically based) suspicion I have that my machine was compromised and that the compromise may have survived a complete HD wipe and OS reinstall, I'm w... |
Is it true that when I connect to a site over HTTPS , my mobile service provider or the ISP gets to snoop in the communication? Can they play MITM?
|
I got free certificate from Comodo and installed on my Windows. Now I'm trying to sign PDF document using this certificate, but get message: "signature validity is unknown":
Why is this? How I can validate my signature?
PS. Adove Reader XI Version 11.0.07
|
On the etterfilter(8) man page, there is a section about the inject() function, which takes the contents of a file and injects it in a packet, or as its own packet when coupled with drop():
inject(what)
this function injects the content of the file 'what' after the
packet being processed. It always injects in DATA.d... |
I have a fixed line broadband connection at home. This morning when I tried accessing Google or Facebook through my browser (Google Chrome) I got a webpage asking me to update my flash player. I found this to be a little suspicious since I had accessed Facebook just a little while earlier from the same machine on a dif... |
Following worked on Ubuntu 12.04 using chromium and firefox browsers.
I ran following command on terminal for both firefox and chromium browser
HOME=/tmp/tmpdir firefox
Both browsers promptly created new directories in the given location where tracking cookies and cache files were installed. Even flash cookies were cr... |
As I understand it, DANE (RFC 6698) is a promising candidate for addressing issues with current TLS Trust Anchors (i.e. Trust Anchors).
My attempt at explaining the issue:
Currently, CAs are universal trust anchors and, as a result, are permitted to issue certificates for any site, regardless of TLD or prior existence ... |
Is it possible to identify the algorithm used for the stream cipher based upon analysis of an encrypted stream?
|
I've heard of tools that could be used to graph entropy of a file. Is there a graphical Linux program that I could use for this job that would let me conveniently explore which blocks of a file have certain entropy patterns that could suggest compressed or encrypted data?
|
If I travel abroad and am concerned that when I land in the foreign country they may try to install a digital keylogger, does this work as a potential solution: If I sign my entire computer's hard disk using for example Keybase's code signing mechanism for directories (I know there are lots of issues here, just bear wi... |
I'm developing a RESTful API using MongoDB as the backend. The easiest thing to do programmatically would be to simply use MongoDB's _id field in the URI, such as:
https://api.example.com/collection/507c7f79bcf86cd7994f6c0e
I know that the ObjectID is based in part on the creation timestamp. Is there anything else an a... |
Regarding this: http://www.forbes.com/sites/thomasbrewster/2014/07/21/exploit-dealer-snowdens-favourite-os-tails-has-zero-day-vulnerabilities-lurking-inside/
Apparently, even the version of Tails released yesterday contains critical 0day vulnerabilities potentially compromising anyone's anonymity, which are sold by Exo... |
Let's say that I sign someone's key and then later decide that was a bad idea - either it was a bad idea at all, or I should have signed it with a different level of trust. Is it possible, both in a theoretical and also in a practical way, to "un-sign" someone else's key?
|
I have a website and it has an audio player to play music files. The music files are hosted in a public directory. Since they are there anyome can point there and use the files on their website.
Is there a way to only allow my webpages to use the audio tracks?
|
I have a small website on which users can upload several types of files: images, zip files ... (except .exe files). Suppose a user uploads via the front end interface of my website a picture which is infected: will this picture be hosted without a problem on mywebsite or are they antiviruses/scanners hosted on the ser... |
I would like to block websites like Facebook, YouTube and other social sites as part of my job and would need your advice on how to manage that. There are about 120 PCs in the building. Is something like that possible?
Can it be done with the host file, or is there other way?
|
i am trying to login to my yahoo mail, but no avail. i recently discovered after monitoring some traffic that the dumb yahoo server doesn't send a close_notify response but just acts ignorantly and closes the ssl session. i know if i do this i may be vulnerable to truncation attacks, but i will disable it as soon as i ... |
I have an android app that connects to a server through HTTP (notice the abscence of S, also android means Java, so nothing I'll hardcode in my app will be unreachable).
I want to store the password securely on my DB, so I wanted to use bcrypt (with password and salt)
My issue is the following : since I'm on HTTP, I do... |
Recently I got a CAcert Assurance and discovered that I can get my PGP key signed by CAcert key. After I got their signature, CAcert website suggested that I sign their key, too.
Question: CAcert status aside, what are the pros and cons of blindly signing an arbitrary key?
|
is Pentesting now just about running tools like Nessus and creating a report based on it ?
and not actually exploiting anything on your own based on the Agreement ?
|
I am trying to find out why this process appeared during 2 boot occasions. Autoruns does not show it anywhere. It appeared when I uninstalled google chrome and malwarebytes.
The prefetch file for makecab.exe (makecab is an official microsoft process) showed it was created yesterday, and modified today (it ran once toda... |
I would like to get the browsing history of a computer in my network (without running that web browser), is it possible?
|
In any major server-side web framework, there is usually a mechanism to read HTML form input, e.g. in ASP, for an HTML element, <input type="text" name="the_field" />, it is Request.Form("the_field"), where Request.Form is a dictionary-type object where the values are parsed from the POST data into key/value pairs.
Th... |
I use pass to manage my passwords and sync this manually to a private git repo in the cloud.
I believe this is safe because the repo is not public and, more importantly, the data is GPG encrypted.
Am I at risk doing this?
|
Lets assume I want to give my hypothetic 10mio users userbase a good feedback on their password strength. Besides the classical entropy tests and top500 list of bad passwords, I might want it to be based on "there are already more than N users with the same password" (for N maybe 100).
So aside of the state-of-the-art ... |
Starting around 3 weeks ago, my site started getting a lot of strange and recurring http requests from my users.
I'm familiar with malicious scans which happen on a daily basis, but these requests seems to be different, and I believe its some browser, extension or javascript malfunction somewhere, rather than anything... |
I am from Australia and I use a iPhone 4.
Today, a young guy asked to borrow my phone, since he was out of credit and since I was trying to be a good samaritan, let him borrow my phone (also we were at a well surveillance area). He told me that he was meeting his friend and he just arrived. Did not think much of it at ... |
Looking for any open and dynamic list(blacklist) of
adult,dangerous,+18,sucide,drugs etc web resources
to filter it in intranet for children security in internet
|
In Chrome, every tab is its own process. Yet, logging in to a site, say, Facebook, persists across tabs. For that matter, in many cases, it persists across OS reboots. This seems inherently very very insecure, but I'm just wondering, how is Chrome implementing this? The reboot thing in particular means it is storing so... |
I first tried to log in this morning and our password was changed on our ubuntu server.
I contacted our server support and they told me that I had just been fat fingering the password.
I thought it was fishy, I am not the type of person to mistype a password and blame the IT guy.
I looked at the history file and sure ... |
A paper on web tracking mechanisms identifies the web-tracking company AddThis as a major user of canvas fingerprinting.
Are IE:s Tracking Protection, provided Tracking Protection Lists including AddThis entries, able to prevent user identification by AddThis using canvas fingerprinting?
|
Is there any difference between the technique or algorithm used from Nmap to guess the OS between the option -A and -O? If not, why -O option requires root privileges but -A that it is doing at least the same (and even more) does not require special privileges?
|
I'm wondering how large companies with tens / hundred of applications are handling access-rights for their users. From what I've seen, it's a nightmare that never ends, and it requires full-time resources for a poor result.
I'm not looking for specific examples of IAM solutions, but more generally, what are the differe... |
I have a lot of experience with software as a developer, and am trying to move from newbie to more informed about present-day security. Everything I uncover makes me feel that personal computers have become horribly horribly insecure, while most consumers (like me) have grown complacent because the old days of constant... |
I have used LOIC (Low Orbit Ion Cannon) earlier .
Today i was reading on wikipedia that there are many types of dos attacks , namely SYN attacks , HTTP flooding ,UDP flooding ,etc and two questions striked my mind .
1)I want to know which type of attack can LOIC do ?
2)Can anyone list the examples of dos attacks in dif... |
I'm working on an app that is planned to be licensed to OEMs, who would in turn offer it as a service to their users. We would host the app server and the OEM would optionally host the app's web client. Because of this we want the option for OEMs to allow users to authenticate through the OEM, using their existing cr... |
SSL certificates, generally speaking, use a "chain of trust" model - a trusted certificate authority (CA) gets proof that a company such as Amazon owns amazon.com and issues an SSL certificate.
However, certs can be expensive - and it doesn't make sense to spend that kind of money for example on a personal website. But... |
In addition to the fact that encryption systems like PGP are notoriously difficult to use, and that encryption doesn't always jive with cloud-based services like webmail, the fact is that most people don't believe that they have secrets that they want to keep from others, or from the government, which would make encryp... |
In Europe most cards use a chip+pin system to secure the card information. You put the card in te machine and enter a PIN number to decrypt the card information which is stored on the chip. Theoretically this is more secure as the credit card number alone is not enough to make transactions: you still need the PIN.
How... |
I have recently gotten a prompt from my anti virus stating that there was an intrusion with an OS attack as describe in the link below:
http://www.symantec.com/security_response/attacksignatures/detail.jsp?asid=20443
It seems that it isn't the first time occurring and it happens sometimes when I use my mobile 3G stick ... |
I have a file that's nearly 200Mb. It was reportedly packed/encrypted with Kruptos 2. But it has a .~enc extension. The header of the file is pure gibberish. Running file says it's data running mimetype says it's an application/octet-stream. The only thing that looks like a way to identify the file is at the end o... |
I'm considering the possibility of running an Open Server, as I would call it, that is, a server where as much of its contents are publicly visible as possible. I would like to give read access to everyone for as much content as possible. I'm wondering what content on a linux server, such as an Ubuntu one, with the typ... |
Why don't the commands
gpg2 --armor --sign file.txt
and
gpg2 --clearsign file.txt
have the same output?
Also when I use just --sign I get a bunch of binary gibberish surrounding the message in plaintext, however using the options --armor --sign spits out ASCII text with no plaintext message.
What's going in the backg... |
Can a virus infect my Windows XP operating system by its mere presence? I mean, if I copy/paste a virus on my computer and I never click on it, will it infect my computer or will it remain dormant, not harming my computer, as long I do not click on it?
|
Lets say for example I have to use a public online proxy like https://www.zend2.com
to load a PHP webpage controlled by me containing sensitive data over HTTPS.
How would I make sure that the proxy in the middle doesn't have insight in the data without modifying the client (browser), JavaScript and/or additional doma... |
How can normal files supported in the Windows operating system hide a virus?
Sometimes opening a .txt , .jpg or .docx files leads to running a virus. How is this possible?
|
Are there any known cases where antivirus companies for some reason have choosen to make their product allow/ignore malicious software?
The reason could be government coercion or former trustworthy companies/developers turning to cyber-crime.
|
We all know we should keep our programs up to date, after all each of them could have an unlatched security hole that was fixed in the latest update. However the average computer easily contains 200+ programs and only few of them actually contain automatic updaters. This leaves most of them open to all kinds of attacks... |
I am doing a penetration test at the moment, where the client has deep packet inspection for SSL enabled (my guess), as every SSL connection seems to being MITMed.
Now, some HTTPS sites, like Gmail, throw up a warning about the site not being trusted. Which is expected. Other sites however, such as Yahoo Mail, are not ... |
On attempt to change my cPanel password I was warned that:
Your password could not be changed because the new password failed with the following reason : (is too similar to the old one), please try again!
Which is correct, my old and new passwords does differ by a single character. However that rises the question how... |
I'm fairly okay with PCs but when it comes to networking i'm quite lost with the details.
My brother started up Mount and blade war band napleonic wars - an official game and played multi player and joined a server. All of a sudden malwarebytes starts blocking outbound connections to 176.53.17.226, on ports 49287, 639... |
My company is going to start to provide penetration testing services pretty soon, in fact, we are just missing the legal aspects of it.
I'm wondering if is there any template which states the most common get-out-of-jail things? Or should we write a custom document for each client? If so, what should include?
|
This is a Nessus finding, which is considered medium by default.
Basically it may allow for some plaintext injection which may allow for some man in the middling.
My question is, has these been exploited in the wild? Are there to tools to take advantage of it? I'm thinking of permanently reducing the risk to low for t... |
I have a library that stores all its ECC Field Elements in uncompressed form, in a bloated Base64 XML format, and storage has become a concern. (We want to support QR code as a form factor,etc)
Rather than ask the crypto library authors to support compressed points in ECC (I don't know how difficult this would be) I t... |
The consensus on this Server Fault question seems to be that opening port 3306 for MySQL is more dangerous than using an SSH tunnel to access MySQL.
I would think that with strong credentials you could keep MySQL safe, especially since the login can be locked down to certain hosts in the USERS table.
Is there someth... |
When I was about 13 or 14 years old, I was a little interested in cryptography (which is, after all, an interesting field). I learnt quite a lot since that time (it has been about 8 years since then), but I'm still very far away from concidering myself an expert in cryptography.
Whatever, when I was at that age, I wrot... |
I understand that the answer to questions like this depend on country, but I'd like to get an idea what the usual approach to cases like this are.
Heres the case:
I found a security hole in one of the governments services.
The flaw makes it possible for anyone to download documents that would normally require authoriza... |
What passwords are stored in Microsoft Windows? How can I know what password are saved in computer?
|
I'm using Charles to sniff out the traffic on my iPhone at Starbucks and for some reason it won't work with at&t wifi. Google Starbucks wifi does, however. I use my iPhone to connect to the same wifi network that my MacBook is connected to. Then, for the proxy settings on my phone, I enter my computer's local IP addres... |
Some sites that I use check my password as I type it into the login (not registration) form. So, for example, to begin with I might have:
Username: sapi ✓
Password: passw ×
and by the time I've finished typing, the site already lets me know that there were no mistakes:
Username: sapi ✓
Password: password123 ✓
Submis... |
Let us visit a given webpage on which video files and/or java applets are embedded. Could clicking to start on these videos/applets lead to a drive-by download attack ?
|
The entry below is from the visitors log in c-panel
Host: .
/specific legimate-wordpress-post/
Http Code: 503
Date: Jul 24 09:28:06
Http Version: HTTP/1.1
Size in Bytes: 1118
Referer: http://mywebsite.com/
Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_3) AppleWebKit/536.28.10 (KHTML, like Gecko) Version/6.0.3 Sa... |
I'm working on an application where users have a key or password generated by me that is used to encrypt a string. Each user has their personal key, and no user should be able to decrypt another user's string.
How to generate a "superkey", which could decrypt the strings encrypted by all the users key? I am new in cryp... |
I am currently developing my own PKI where x.509-client-certificates are issued by a public server. At the moment, the CA-public key is distributed with the binary and there are no routines for renewing neither client nor CA-certificates. What should I think about when implementing these routines? My thoughts are:
For ... |
I am fiddling about with a sort of single sign on procedure.
Let's say there is site1 and site2 and both use an SSL certificate.
Users are signed in on site1.
I was wondering what the experts think of this way to let users automatically sign in on site2 that is hosted on a different server:
clicking on a link in site... |
This question is an ongoing discussion at work. Assume a Tomcat serving some web application and has all JMX and remote management stuff disabled. If you consider three scenarios:
Tomcat serves directly to the internet.
Apache Webserver serves to the internet, Tomcat is connected via AJP
Apache Webserver acts as a pro... |
I'm adding new features to an old Borland C++ VCL application using Borland 2006 IDE.
I'm finding that upon adding a single line of code, and building, the exe is being quarantined since Sophos is detecting it as a virus/spyware - Squatter-310 to be exact. If I remove the line then the application builds as expected or... |
Env
Rackspace cloud server
Wordpress 3.9.1
Ubuntu 12.04 Linux web.mydomain.com 3.2.0-67-virtual #101-Ubuntu SMP Tue Jul 15 17:58:37 UTC 2014 x86_64 x86_64 x86_64 GNU/Linux
History
These may actually be part of the same issue, I have already resolved those yesterday. Adding here for reference and background history.
... |
Pseudorandom generators (PRG) are functions that takes a random small input (called the Seed) and maps it into much larger output .
However, the mapping process must be unpredictable in order for the PRG to be used securely in cryptography.
My question is: Are there any tool the does the opposite? i.e. takes a long ra... |
I installed a fresh Windows 7. I wonder why when I visit website using HTTPS, I do not get asked to accept their certificate like shown on this picture:
|
I would think the answer is unequivocally, "No." But...
My MacBook Pro logged "Diagnostic and Usage Messages" in the Console, at 4:19am, while it was physically closed and (therefore) sleeping. I was physically asleep from a bit before 1am until 8am. I'm the only one who was here last night. When I woke up, I actually ... |
(I have GNU/Linux and Microsoft Windows installed.) I played a game on Microsoft Windows, quit the game, restarted the PC, and selected GNU/Linux.
On the login screen, the background image was different, contorted, glitchy (similar to this image, but not as bad). On a closer look, it showed parts of the game I played …... |
I'm investigating the state of my MacBook Pro which I know was compromised, and do not know if I removed the exploits completely (and I realize, technically will never know this). I'm trying to hone in on specific exploits, not expecting to prove they don't exist, but in any case I can prove that they do, that can help... |
Little Snitch has been useful to get a better handle on all the connections my computer tries to make. It's main dialog to allow or deny connections allows customizing (e.g. require specific port, or allow all connections, etc.) but it has no option to allow *.domain.com. This is possible by manually editing the create... |
I've heard others talk of disabling NetBIOS, but over the years I have never understood exactly when this protocol is required. The wikipedia page explains very abstractly what it is, but not which products rely on it. I'd love to disable any services I have no use for.
|
Hi I just wanted some feedback on a DDOS preventing php script that I'm designing. It quite simple and I wanted some feedback on whether you guys think it would be effective.
I'm currently using the ulogin framework as a base and have implemented API Key's. At the moment the user will send a request with a key. This ke... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.