instruction
stringlengths
24
29.9k
So if a group has made open source software, and the source code is available on github, and is bundled with an executable in their main download, can it be proven that the executable is compiled from the source code that is on github, and not modified source code (like adding a backdoor to the system that isn't on the...
There are three different ways how TLS (1.2) can be used: server and client authenticate only the server authenticates neither authenticates If neither server nor client authenticates using a certificate the connection is not protected against man-in-the-middle (MITM) attacks. The TLS 1.2 specification says that ...
What is the difference between using Google Safe Browsing and using other traditional anti-webmalware tools ? Which one is more efficient to protect against malicious web content ?
I've been monitoring my network traffic with Little Snitch, and today, when launching Chrome, just the default Chrome tab (shows most frequent sites), it alerted me Chrome was trying to connect over SSL to the domain goldenticket.disconnect.me According to whois lookup, this domain is registered to a "dedicated server...
In a recent question (can't seem to find now), someone asked: Is it possible to track a phone which is off? and received a response of Who's to say that it's really off? Your phone has both a CPU and a baseband processor, which may keep running after you've "powered off" the phone. Details of baseband processors are...
I've got an ASP Classic system that passes around sequential ids corresponding to keys in the database. I had gotten an encryption module (chilkat, an activex control) that I was using to encrypt and decrypt entire querystrings. However, since I do validate a user's right to access a particular resource (noted by an ID...
Following is a excerpt from COMPUTERWORLD Yesterday, in talking about the zero-day vulnerability in Tails, Exodus Intelligence wrote: "We publicized the fact that we’ve discovered these issues for a very simple reason: no user should put full trust into any particular security solution. By bringing to light ...
Two questions about User-Mode Linux: Suppose that a privilege escalation attack is used to gain root in a UML guest. Assuming modern (3.0 or later) host and guest kernels, is it trivial to escape the sandbox, as with a chroot? Or is it more difficult? Is it possible to run a privilege escalation exploit against the ho...
I've read that the Server header would disclose information, and that its use would be bad. The arguments made in that question also apply for the User agent header. So why is it still used, and not a "dummy", like the one google uses for the server header field? As I understand it, the user agent was useful in the day...
We are implementing a REST service that requires authentication and authorization. Because of the stateless nature of REST API's, we want to use JWT to make authenticated calls to the API through a token, without the need to hit a database for each API call. After evaluating the JWT we had some questions: How do you ...
For a client-side only webapp run from file, how can a keylogger gather data and then transmit it? In this scenario, please limit the scope to the client code only, that an attacker somehow has injected code. Vulnerabilities outside of the browser is out of scope. There is no flash or java in the original code, and p...
Use connection of A and B as an example. Their communications were encrypted by Public Key Encryption. Before they exchange their public key, ISP MITM attacked. A got "B"'s public key (ISP generated) B got "A"'s public key (ISP generated) A send message X to B. A->"B"'s public( (A's private(X) )->ISP When ISP got that ...
If I publish my public key (I think I understand how this works, I'm still learning encryption) and I have a common name, could this leas to problems at all? OR does the email part guarantee that this will work fine? Does this not make it extremely easy for someone to compromise my identity? In retrospect, this seems l...
My goal is to build a perfect stationary workstation from which I can work anonymously. Most instructions on being anonymous usually involve, at some point, moving around and switching from coffee shop to coffee shop. Is there any way around this? Currently, my best-possible imagined setup involves tails OS plugged int...
The file is binary, named '96748', and it's 12.8kb in size. Ubuntu thinks it's an swf. Thank god I was in a Linux VM and not Windows. It doesn't seem to have done anything, and it's just sitting there in my downloads folder. This is the URL (don't visit in Windows) h**p://www.buzzfeed.com/elliewoodward/orlando-bloom-tr...
When I am doing a lot of sudo operations, I like to spawn a bash shell from sudo to make the operations go quicker. I am against assigning a root password because I do not like the root account enabled because it is an easy target for hackers. There are a couple of security concerns I have with using sudo bash as well,...
Without using Private and Public keypairs, i do not understand how Diffie-Hellman is able to generate a secret key between two parties on the internet without passing something between that could be sniffed. There is a term for this that comes from Generals sending messages through hostile territory. I do not understan...
I need to pull some data from network storage to a publicly available laptop that is running Linux. The network storage used to be provided via a server that could be connected to via ssh, but it has now been switched to a server that only provides access via samba. I used to connect from the laptop to the server with ...
I am working on a system that consists of several applicaitons communicating with each other. Some of these applications will run on the same server and some will run on a different one. So there is going to be communication from one server to another one and from one server to itself. The communication will be TLS pro...
I need to share some sensitive information with someone else who can only communicate via E-mail. I don't love the idea of sharing this information freely over email in plain text, so I was considering encrypting it using asymmetrical encryption (It's not a nuclear missile launch code, I just want to prevent someone f...
I'm doing some research on user account guessing, and wanted to ask a question about some "bad practices". My thought is generally this is a trade-off between great user functionality/UX and security. For example, I could create a user webservice that checks if an e-mail exists, and when a user is attempting to registe...
I just read about PGP encryption scheme here, and started wondering what is the need to encrypt the file with a one time random key? In other words, how is this scheme more secure than simply sending the file which is directly encrypted using the public key? (Because the one time key is anyways sent along with the data...
I would like to know what the minimum access is to be able to dump from the lsass process on a Windows machine (any version) to try and grab LSA Secrets. The reason I am asking is because I had thought it was restricted to admin and higher, but accross multiple penetration tests and different versions of windows, I hav...
Let's say a friend gives me a SD-card which I'm not sure is safe (i.e. it may contain malware), what is the safest way to access this card on a Mac OSX? E.g. is it possible to create a sandbox in Finder? I know some of you may say, "Just don't access it." But assume this is a scenario where I have to access it.
Does a typical computer begin with any shared secret with a certificate authority when I buy it? If not, a compromised home router could fake everything and get my credit card info when I attempt to buy something, even if I were careful to use https.
Is the Java programming language used for penetration testing in practice? I've wondered whether Java is used or can be used for penetration testing in the field (people write pen-testing suites and attacks in Java)? If so, does the same apply to C#? I know Python and Ruby are used a lot, but I would like to aim for...
I see other similar question here. I want to become Malware analyst. I have learn to program in Python and C++(not on expert level but fairly good). Before I continue with Assembly language I want to learn about OS. Could any of you recommend book(s) that will give me the concepts I need to know. I will be very gratefu...
We have a requirement for 2-factor authentication for our internal WiFi SSID's. Currently we use PEAP w/ MS-CHAPv2 to pass windows creds through the AP to a RADIUS server (A Domain Controller running NPS). This has been recently been accused of not being 2-Factor authentication because it's only supplying 'something y...
We had a web server that had the wrong SSL certs installed yet the browser was able to find another trusted path to a root and supply the page properly over HTTPS. We also have proprietary software clients that use SSL outside of browsers that connect to the same server yet these failed SSL validation. My question is w...
Assuming no XSS and a client-side only page, how can a keylogger be identified in javascript code? Should I simply look for the id of the targeted fields and possibly some sort of DOM traversal to get the value in an obscure way? Is there anything else?
If I am connected in a public WiFi, is there any way to know whether I am under attack or not while browsing sites using SSL? For example, if I visit facebook.com and the URL starts with "https://", does it mean that I am 100% secure? What methods can be used to verify this?
Wired, and others are reporting on a research paper by Karsten Nohl and Jakob Lell. The paper apparently shows how any USB device (not just memory sticks) can be infected with malware at the firmware level. This can then be used to attack any device the USB device is attached to. As the malware resides in the firmware,...
I have read that bios passwords are sometimes good--or bad, if there is a default. Places mention that these passwords are pretty much just available through google, but I can not find them. Where would I find them?
We're developing a web application in which certain not logged users (clients) need to send their credit card details to other users (merchants) - which, we'll assume, are PCI compliant. We are looking into getting PCI compliance, but the process will surely needs a lot of time. Therefore we are investigating other sol...
My application is vulnerable to XSS attack. Technology used in the application are Servlet 2.2, JSP 1.1, Jdk 1.3, WAS 4.0. I wanted to remediate XSS vulnerability with migration of technology or remediate with the current technology. As of now i thought to migrate servlet 2.2 to 2.3 to use filter interface. Please advi...
I am reading a book on network security and when talking about user confusion it writes: "It is not uncommon for a user to be asked security questions such as Is it safe to quarantine this attachment? With little or no direction, users are inclined to provide answers to questions without understanding the security...
I'm trying various sandboxing solutions on linux. I'm used to running untrusted programs (for example, a web browser, a pdf document reader, etc) inside a selinux sandbox, which I'm quite satisfied with, but there is a problem: it's only supported on rhel/fedora. AFAIK other distributions don't really support selinux ...
I have a database with individual contact data for students... this data includes name, address, phone number, birthdate, etc. (no social... that would have made this too easy apparently, ha ha) I would like to allow their parents to access their data from home, and be able to view and edit it. Obviously, security is ...
I don't know if this is some injection attempt or a weird bot or what ever. An IP opened several pages within my Drupal 7 website with the appendix http://domain.com/some/url/$tags.get(%22pixelLink%22) I didn't find anything on Google. What does $tags.get(%22pixelLink%22) mean? Should I prevent this and if so, how?
Not really new but it's all over the news right now. You can hack a USB firmware to run an attack by emulating a keyboard. I wonder how difficult it is create an USB thumb that emulates a keyboard. I am trying to evaluate how likely such an attack is. Can the kid in my neighborhood do this or does it require are secret...
We have a website, and somebody wrote us an email claiming we are insecure! What should I do
I am hosting a site on a hosting server. How to identify whether my site is vulnerable to DOS/DDOS attacks?
Suppose that there is a http proxy server outside the firewall of an organization hosting a web server. All client connections to the web server happen through this proxy. The client negotiates SSL with the proxy server and connections terminate at the proxy. Since the proxy is deployed outside the firewall, there are ...
We use a custom app which uses Matrix SSL (client side) to perform certificate validation on MAC and Linux systems. My question is, does Matrix SSL keep a cert store cache of intermediate and trusted roots so it can perform its checks against what the server sends? Or does it call up something like OCSP or use AIA exte...
What are the risk that I encounter when increasing the timeout of a vip between a web server (apache) and mysql cluster (two servers). Actually it is set to 5 minutes. If time_out was 1hour, knowing that all servers have a proxy to go out the vlan, could this be a security threat ?
I'm using Tor (Orbot for Android), and when I look at the log of the connection establishment phase, I see that I'm repeatedly being connected to familiar nodes, especially the Entry Nodes which 3 out of 4 times are the same 3 nodes that I'm connecting to every time! Even the whole 3 Nodes in my path are more often tha...
Given a secure wireless network (lets say WPA2) with clients A and B, what level of traffic can A see from B? if the router has "wireless isolation" enabled? does it make a difference?
Alice wants to encrypt her data. She is not comfortable with using only a password. While she prefers to use a properly random crypto key, she isn't confident she can protect the key file from theft or loss. So she wants to use both. Bob proposes that she derive her encryption key EK from her password P and input key I...
When I go to whatsmyip.org under my host name I get "Your.Ipv6.Is.Under.Attack.By.The.Smurf6.Info". What does this mean? I'm using private internet access as my VPN so I'm guessing PIA is under some sort of attack? What should I do?
From my experience a card can not be used for online payment without a valid CVV, then why is it still always emphasized that card number must be protected? What can a hacker do, assume that he has all the information on the front side of the card (card number, holder name, expiry date) but not the CVV?
I have a Truecrypted, airgapped (no internet connectivity at all) laptop that I use as a completely secure computer for sensitive files. I want to add images from my iPhone (I know), camera or other device. What is the safest way to do this? I know safety will have to be compromised in some way, but I need to best. Her...
Due to very paranoid customer requirements, we have to install several Windows services on two different systems that should run under a shared service account. Each system should each have a copy of the service account with matching name and password. I originally planned to generate the password at install time for ...
We would like to digitally sign DOC (MS-Word) and PDF documents using PKI. Is this possible using an internally deployed CA? I've found lots of articles getting email digitally signed but almost no reference for Word documents.
I've noticed that my Dropbox installation really loves sending unencrypted information over the net including a "user_id" and it's user-agent. What i want to know is if it's possible at all to determine who owns the account from the user_id or from something else in the url. This is an example of the url with the numbe...
What can I do to protect my Linux laptop from BadUSB attacks as described by ArsTechnica here? Perhaps writing an appropriate AppArmor profile would help?
I want to know what type of server facebook uses ? If they use sql server , then is it vulnerable to sql injection ? Are all sql servers vulnerable to sql injection ? I just want to know this information and i have no intention of hacking as i have just started reading sql injection attacks and defense book
While I was searching online for information about Linux security, the most typical explanation was: Linux is secure, because the root password is required to access the kernel and install new applications - therefore external malicious software can't do any harm as long as the administrator is the only person to know ...
I understand that most antiviruses by default quarantine infected files. I have changed it to remove all infected files immediately. Would this cause more harm than good?
I have implemented a stateless auth over HTTP in Laravel, using JWTs. I send my username/password from the frontend. Server authenticates user, sends back a signed JWT with an expiry time. I'm using the HS512 algorithm to sign with a private key (only available to the server). Frontend stores the token for future re...
Referring to this vuln: http://bluebox.com/technical/android-fake-id-vulnerability/ and this permission: http://developer.android.com/guide/topics/manifest/permission-element.html "signature" A permission that the system grants only if the requesting application is signed with the same certificate as the applicati...
I have been running alot of javascript code on nike.com through the console in order to create a shoe bot. The code i paste into the console has one intense loop with many iterations which makes me worry as I got a temporary site down when i tried to connect to the site earlier. My code is by no means harmful, all it d...
I've been looking at how PBKDF is used to generate encryption key for AES. One thing I couldn't get my head around is that how those OS keep the encryption key safe apart from using hardware modules. So far my understanding is that OS like Windows stores user hashed user password in a file (SAM file). The password hash...
Vulnerabilities are discovered everyday. The recent Heart bleed attack caught many people off guard. I was wondering if a serious flaw was to be discovered that allows unfettered access to SSH, how should I defend myself and minimize my exposure to such an attack in order to have sufficient time to patch the server?
Given that Site X uses HTTPS, how can it be blocked by a country? My browser reads: 128-bit encryption | ECDHE_RSA as key exchange. I say it's blocked since when I use Tor, it works fine. One important thing to point out is that it's not blocked in the typical sense we are used to see, which clearly shows a page that s...
I've been trying to understand something. When you generate a CSR from IIS, how is the private key kept as a secret, or is it? Do CA's email you a certificate that includes your private key? Because nothing seems to tell me otherwise, and nobody should know your private key but you. Instructions to generate a CSR from ...
I plan to use a DNS service, I'm just wondering what sort of information gets sent. Will my passwords, browsing activity flow through the DNS servers? I kind of know what a DNS is, but I'm not sure about the security risks from my point of view, I don't want my passwords compromised.
I'm trying to implement some security access control in a software I'm building. I came across Stormpath for user management and they have somewhat an approach for RBAC yet what I was considering is to rely on XACML for ABAC and more specifically BALANA from WSO2 in the sense that I may set the attributes for users and...
The VPN won't see anymore than your ISP already is. So even if the VPN was logging everything you did, shouldn't it just leave you in status quo? How can it ever compromise your identity, that you move your "entry-point" from your ISP to a VPN?
After buying a used computer from a stranger, what steps should be taken to ensure it is safe to use for connecting to a network that handles sensitive information? (I am defining "sensitive" broadly: notes to a loved one, corporate trade secrets, and the location of several of Russia's submarines.) I am imagining that...
Specifically, the problems with OCSP that Adam Langley talks about here?
Some financial websites that I use use passwords in a peculiar way. Instead of asking me the whole password string, they only ask me to enter e.g. "3rd, 5th and 8th character of your password", i.e. a random combination of characters of the password string. I think this would make sense if it's done using a shared ra...
I am using Bitdefender AV 2013 ed and I have noticed that when the Scan SSL is enabled in the configuration BD will use a local certificate, as mentioned here. This modifies the cert chain with BD as the trusted root on secured sites, or at least that's what you see. My questions are: 1) What is this kind of technology...
a friend challenged me to find out the ip from the new web server he uses. Is there a rainbow table or something similar with all possible adresses or are 4 billion numbers to much for a normal consumer pc ? Is there another way to find out the right ip ? Is there any possibility to find it out if i know the webhoster...
the story looks like this: we have a browser, we have attached windbg to this browser, we have a fuzzing 'page'. now, when browser will crash (and i.e. I know that bug occurs somewhere in the HTML code), how can I find that code which crashed the browser? is there a way to find it during the windbg session? appreciated...
I have a multi-factor web authentication server, that in addition to regular passwords uses fingerprints for user authentication. Can anyone think of a security flaw in the following scenario: I have Resource Server that hosts valuable resources, the resource owner must provide his fingerprint to an authentication se...
Would you please tell me what is the difference between Anti-skimmer and Anti-fraud in ATMs?
First of all sorry if I am asking a trivial question. As far as I know, XML is used for representing document structures. Can entirely static sites accepting no user inputs at all be vulnerable to XML, DTD and entity attacks? If it happens, In what context is it possible ?
We build software which needs a SQL SERVER database. This database will hold private user information (address,bank, ...) My question is: Should I install my database in a fresh SQL Server instance, or can I use an exiting instance? (I doesn't want to wast user resources but also want to deny unauthorized access)
I'm setting up a home HTTP server which can send and receive JSON data to/from different clients (Android and iPhone apps). I'd like to allow access only to certain users and I'm considering using a simple username/password mechanism, as setting up client certificates seems a bit of an overkill for this small project. ...
What are the main components that JavaScript malware targets on the browsers ? Which aspects of browsers on which JavaScript takes advantage to exploit them ? And which techniques are used by malicious web content to attack browsers ?
I am trying to understand how/if an email I received is being encrypted. A financial institution sent me a verifiable email (i.e. not phising) asking me to fill out a pdf form to complete a transaction. The outbound email contained my account information and a completed pdf form in my reply would contain even more pers...
Does the EICAR antivirus test work on antivirus scanners for Linux? The EICAR test is described in more detail here: http://en.wikipedia.org/wiki/EICAR_test_file The reason I ask is that it requests the EICAR file to be a .COM file, which is specific to Microsoft as far as I am aware. Should Linux antivirus software ...
My coworker and I are developing an authoritative server for an MMO. We can't agree on how to handle "misbehaving" clients. Misbehaving, in this case, means clients who send "odd" requests that might indicate a compromised/altered client, or even a nefarious user injecting data directly into the communication stream. O...
According to National Public Radio, Ruben Santamarta has reported that gear aboard airliners and accessible through on-board WiFi or in-flight entertainment equipment uses hard-coded login credentials. http://www.npr.org/blogs/alltechconsidered/2014/08/04/337794061/hacker-says-he-can-break-into-airplane-systems-using-i...
I have a DD-WRT based wireless network with strong password security. However, other machines on the network may not be as protected as mine. If these machines are compromised, need I fear the attacker can more easily hack my machine, having gained access to another machine on the wireless network? We do not share d...
When using (Thunderbird and) GnuPG to send a PGP/MIME message to two separate recipients, with the text body different in both messages, but the same file attached to both of them, does this give an outside attacker that observes the traffic any additional advantage without knowledge of the plain text? I realize that t...
As per my understanding , openssl will verify the certificate of the server during ssl handshake , using the trusted CAs present in the CA certificate dir in the context. After the server certificate is verified and handshake is done , does the openssl cache/store the verified server certificate?
I'm interested in using SaltStack in stand-alone minion mode as a way of automating the various configs that I want to do for my personal dev environment. But as a good security conscious dev, what kind of attack vectors would I be opening myself up to here? Or are there any?
Sorry I'm not sure this would be the best place but I've noticed this icon recently. I'm not sure what it is and it only pops up sometimes. When it does, I can't click it or do anything to it and it disappears a few seconds later. I don't recognize the icon as anything I installed. If anyone recognizes this icon and wh...
I need to send sensitive information from one piece of hardware to another. I was thinking wifi, but if someone obtains the password, it wouldn't be encrypted. I don't think you can use ssl unless it's a website, but I may be wrong. I don't know if it makes a difference, but it only needs to be one way.
I've been reading about 2-way SSL or mutual auth recently, and here's what I've figured so far: Mutual auth is a way for the client to authenticate itself to the server, just like the server does to client during (1-way) SSL connections. Web browsers are preloaded with the certs of well known CAs, so, when a website se...
Assuming SSL/TLS cannot be used in this context, is this method secure enough to authenticate someone without someone listening to be able to retrieve the password from the information transmitted. The client sends a login request. The server replies with a unique identifier for the login The user enters in the passwo...
Below is an informal protocol narration of a simple authentication protocol. A sends to B a signed hash of message M, B's name and a nonce N. B knows that the message M is intended for him, that it originates from A and that it was sent as part of the same run. A -> B: (M, A) B -> A: N A -> B: {| #(M,B,N) |}sA But wha...
In ADFS, serveral certificates are used. This is explained (very clearly) on this page: http://blogs.technet.com/b/adfs/archive/2007/07/23/adfs-certificates-ssl-token-signing-and-client-authentication-certs.aspx Now, I have configured the following: ADFS Communications certificate ADFS Token decrypting certificate (fo...
I am not saying I am actually going to buy one but I am wondering if an individual can get an Extended Validation SSL certificate? I know this is intended for companies / organisations but would this technically be possible?
I have implemented a login, and session, procedure for a web app and I am wondering whether what I have implemented is secure enough. The authentication is based on login password on https. If the login succeeded the server returns a randomly generated token the server stores and sends with any https post request it ma...
Suppose a given random number generator has poor entropy, and is compressible by any compression algorithm (zlib, bzip2, lzma, etc). Specifically the issues with this RNG are: Bad entropy Bad seed size Failure to use multiple sources of entropy Reseeding only occurs once, at initialization, instead of at an interval. ...
The MD5 hashing algorithm is known to be vulnerable to collisions for a number of years now, see its Wikipedia entry. Still, I see that in many places throughout the web, MD5 is used to verify download integrity, e.g., the Ubuntu images. CMake's ExternalData()C feature description even says: Note that the hashes are u...
We are hosting a site on a self-managed Digital Ocean VPS ("Droplet") that will be taking payments via Stripe using their stripe.js API. According to PCI, we have determined that we fall under the SAQ A-EP. However, the SAQ A-EP (Part 2g) states that: If merchant website is hosted by a third-party provider, the provid...
I'm trying to do a Bruteforce attack on a handshake taken from my wireless network that is not WPS enabled. The reason I'm doing it is because I'm testing how strong a 10 digit phone number is as a password. I tried the following command crunch 10 10 0123456789 | aircrack-ng -e NETWORK -b 60:C3:97:34:8B:E9 -w- hs/NETW...