instruction
stringlengths
24
29.9k
The company I work for has recently moved to an external vendor for payroll services. We did an initial upload of data from our old system to the new vendor. I noticed that our employees that have apostrophes in their names (O’Riley for example) were no longer matching up with other systems. The new payroll vendor h...
There are various old questions on stack exchange which say that malicious code in file metadata can potentially be executed when the file is opened (here, here, and here for example). They are all from a few years ago however, is this still a valid threat with today's video players? If so, what steps can I take to mak...
I want to become a pen tester/ethical hacker,what should I do in the beginning? (I'm new to information security ,i have basic knowledge in python,will it be okay if I take CEH course,Any help is appreciated,Thank you all.)
We have a project with 3 remote developers and myself, at the moment passwords (server logins, db passwords etc) are being shared via emails which are cc'ed to everyone, Is there a normal workflow for this, we use git for version control, but it dosnt feel right to have our passwords in there (not that email is any mo...
Website here: alienvault.com I've been trying out Spiceworks for about a week, seeing what use I get out of it. Today I log in and see an alert: "(my computer) has established a connection to suspicious IP 198.143.173.146" which apparently is some site called busedge.com and/or Singlehop, Inc. in Chicago (or spoofed t...
Since GnuPG is available for Android, why does no one makes an app that encrypts every message using an RSA key and just swaps the keys with each "friend", so for example: John has a limit of 100 friends. John has 1 RSA public key. Only John has the secret key. People who would message John would only get his public ...
The following is a scenario for an attack where one website can impersonate another. I am told (including by this answer) that it's impossible, but I would like to understand exactly what prevents it. Alice uses websites that fetch a trusted JS resource from Bob's server, using HTTPS to prevent MITM attacks. Bob's reso...
I carried out an arp poisoning attack from my virtual machine to real machine with cain and able and collected data with wireshark from real machine. While I was investigating data with wireshark I came across a data flow as picture. What does it mean? I was expecting only an ARP storm. Can I use information in this pi...
I've been on a shared webhosting plan for 10 years and I recently moved all of my sites (various WordPress sites and associated plugins, all in PHP, a MediaWiki site, and a lot of static stuff) to my own VPS. Yay! Now I have no one to blame but myself for any problems relating to availability, performance, and security...
The report from Hold Security says that 1.2 billion sets of credentials are in the possession of this party. I have a feeling that this report may be a hoax or a partial hoax due to grammatical errors ("while we getting our full service ready") and self-advertising of their electronic identity monitoring service. If it...
Can we use the tools such as P0f, OSSIM and other passive fingerprinting tools to build a comprehensive network topology of how the devices are interconnected ? or is there a passive finger printing way of building network topology ? without any active probing, traceroute, nmap etc
Personally I want to call the element _DO_NOT_give_this_security_thingy_to_anybody_ever. An example scenario is some clever social engineers want the user to run a malicious "add a friend" and find the CSRF token stands in the way. But is it worth it?
I have data coming in the form of XML with certain XML attributes being encrypted. I am very new to encryption/decryption. So I would like a detailed explanation on how to find the encryption algorithm, if at all there is any applied on this data. Or is it some other form of encoded format? Please ask any question rela...
I have a Gmail account. Unfortunately I have sent an email from my Gmail account. How I can stop or back this email ?
Android docs lists a number of places to store data here. To what extent can Google access data in these places assuming the developer does not want them to have it? In other words, if I save a private piece of data in an app that I make in my "private internal storage", and make no use of Google Services (Play, Maps, ...
My web-app takes some configs from the user and saves into an XML file (it was not done to stop XSS). The input is XML encoded so that the ",& ... and such characters don't break the XML structure. So is there a need to have another layer of XSS filter or will this way of saving the data automatically stops XSS attack...
Doing an integration with an online payment provider. Payment provider will be making a web request to my server to provide some information about the basket content. On my end there's no payment processing involved, I only need to be able to capture the basket information along with the merchant ID. The payment provid...
I was just reading about CRIME which is an attack to steal sensitive information by creating requests. Could this attack be mitigated, if the Server wouldn't send the client the actual session key to save in a cookie, but a random generated string, which maps to the session key? On each request (or every 100 requests) ...
I'm working on a always online mobile game (native android/iOS app with Unity) and i would like to be able to authenticate the player without requiring any login/password at the beginning. For those who know, i try to achieve a similar authentication scheme as famous Supercell games (Clash of Clans, Boom Beach, etc..) ...
When we create a Google account, Google tells us whether an account with specified username exists or not. Doesn't that lead to user enumeration? Why not let users fill other information first, pass the CAPTCHA test, and then choose the email address after passing the CAPTCHA test? Would this really frustrate users?
Firstly, if a site is PCI compliant, and new references to a 3rd-party file (e.g. image, Javascript, CSS, etc…) via http:// instead of https:// are added, does it violate PCI compliance? Secondly, would adding a reference to a third party js library over https validate PCI compliance? Thanks
I have a question and answers site. I have an admin section. From that section I can delete users, threads, responses, and edit various other things. I have some simple code at the start of the admin page: if(($session->protected_page_security()) == FALSE || ($session->is_administrator() == FALSE)){ $sessi...
The ISO27001:2013 standard (and ISO27002:2013 guidance) requires that use of "utility programs" that might be capable of overriding system and application controls should be restricted and controlled (A.9.4.4). I've looked, for example, at http://en.wikipedia.org/wiki/Utility_program for inspiration and am finding it d...
First time 'asker' on here, but wanted to say thanks to how much I've used this site and reading answers to questions I've had! Anyway, lately I've been having issues with a customer of ours who's server is failing the PCI Compliance scan from Trustwave. The problem in particular is with OpenSSH being vulnerable and ne...
I sent emails out that contains an email registration confirmation link: http://example.com?create=email%3Djay%40gmail.com%26confirm_key%3D53e321f97c145 I do not hash the link above. Before I sent an email containing this link, the user registered as a new member. Email address is inserted as a new record in the datab...
I am using Ubuntu 13.10. If my laptop is infected with malware, can I get rid of it by creating a live usb on it and using that live usb format and re-install the ubuntu ? I mean is it possible that malware will find its way in live usb and hence infect the re-install ? If yes, how to get rid of it ?
I have found an XSS vulnerability on the subdomain of a site I am testing, and using it I can set cookies for both the main site and all it's subdomains. My url currently looks like this: http://s1.example.com/u/%22%3E%3Cmeta%20http-equiv=Set-Cookie%20content=%22sid=1234;%20path=/;%20expires=Thursday,%2020-May-15%2000...
I am working with a website that sends API requests. I would like to write a client to make the requests myself, but in order to do so I would need to first see the request payloads. However, the connection is secured and therefore I can't see the data in wireshark just like that. I found out that Wireshark supports SS...
Say I have a private service that exposes sensitive information (PHI) via a REST API, and that I want to permit access to it from only one other service. Is it enough to partition these services into different security groups and restrict inbound traffic only to the calling service? Would this type of authentication ...
While writing an answer to this question on Server Fault, a thought that has been bouncing around my head for quite some time resurfaced again as a question: Is there ever a good reason to not use TLS/SSL? To further elucidate the question, I'm asking about the specific case in which things have been configured properl...
I have noticed that every web site has the exact same behavior for their password reset pages. They send a link to your email using which you can reach the password reset page. On that page you enter the new password. So far so good. But at this point, they always prompt me to login again. Why? I just entered my passwo...
By definition, incognito mode shouldn't leave a trail of visited websites. However, HSTS (HTTP Strict Transport Security) requires the browser to keep a database of hosts that have requested HSTS, and honor HSTS for subsequent requests. This introduces a conflict and there are two possible ways of resolving it: Browse...
Are there any products that let you see and set IDS [Intrusion detection system] on router or any another hardware that is connected to the router? All the ones I have found of them are Operating Systems like security onion, alien-vault, aanval. All of them are Linux distributions. Is there not any another hardware ID...
I want to harden the security of my host system and side by side running virtual machines while testing some files for malware in one of the virtual machines. Here comes a list of questions that I hope you can answer. - Network Adapters One thing that I am worried about is the possible spreading of malware from one vir...
I am currently using a technique where I send the username/password in cleartext (using https) to the server, which then does bcrypt and compares to the db. Standard practice. It is considered safe. Would sending bcrypt hash to the server for checking be equally safe? The point of bcrypt is that it is computationally e...
I subscribed to a VPN service recently, and installed wireshark to take a look at the traffic sent from my computer. Practically all of it goes through UDP protocol, encrypted. But there are two HTTP requests that are sent through TCP, not encrypted. One of them comes from an Firefox extention that updates imageboard t...
If you worked in a big company that was very security conscious, would you build a product based on PlayFramework2 underneath? Since it does automatic dependency resolution at load time, aren't you placing a lot of trust in some possibly untrustworthy source of updated libraries? Why would you trust it? How do you kn...
I found today that Google allows you to reach its search engine and submit searches over non-https connection. Visiting http://google.com, results in a redirect to the URL https://www.google.com/?gws_rd=ssl Attempting to visit http://www.google.com/?gws_rd=ssl (note, the protocol) results in access to Google over non-...
I would like to know if I can use of PGP to ensure SOAP webservices confidentiality? I don't want use SSL, it's kind of slow mechanism to make a tunnel for high throughput data transaction. I though cypher data using a symmetric key, the key will be encrypted to by a asymmetric public key. And push the message in the ...
While reading this page about Public-Private key encryption, I asked myself a question about digital signature: Alice wants to sign a message for Bob; she uses her private key to sign the message. Bob receives it and uses Alice's public key to generate the signature and checks that it's the same as the one that Alice a...
I've recently spotted that DVL (Damn Vulnerable Linux) has gone inactive. My first question is what happened to cause them to stop releasing it? Secondly, I have found some references to other testing environments, but was curious if there was an official/unofficial replacement for DVL that provides a large test bed f...
Some corporate applications are most useful when they are accessible from the internet. Outlook Web Access comes to mind. Those application usually have a user directory (usually LDAP) in the corporate environment that serves other purposes, like desktop authentication or authentication to some other internal only serv...
Currently we are using Teamviewer 9. We have a couple of desktop machines that are locked down in the following manner: 1). The shell is no longer explorer.exe, it is a custom program we have created. 2). The OS is Windows 7 embedded, latest version, latest security patches. 3). The user logs on one of two ways: Admin...
About two weeks ago, I had to reply to an urgent email (gmail) on my Android phone with the Gmail app. Unfortunately, my VPN client refused to work that day (Private Internet Access Android Client), so I had to risk it and connect to a public wifi hotspot at a restaurant to reply this email of mine. Now, I have been bo...
I stumbled upon an interview with "the grugq" in which he is talking about how hackers anonymize their traffic, i.e. hide their original ip address (- this is also what I will mean by "anonymizing" in what follows). He states that The old idea was to have a lot of boxes in different countries so that it was legally ...
It's a conceptual question: Suppose i want to separate NAT and firewall, can it help to my security? INTERNET >>>> NAT >>>> Firewall >>> MyNetwork
I understand that CAs issue certificates based on common names (CNs) like www.amazon.com and that certs are not based on URLs like www.amazon.com/stuff. How is it that when I go to www.amazon.com, it is not secured and when I press Log In, the connection is now SSL-secured? I could understand if the login link redirec...
In older versions of Android, when connected via USB the default behaviour was "Charge Only". This allowed the device to charge via USB without exposing its file system to the device providing power, often a computer. In newer versions, this security feature seems to be missing, introducing a vulnerability whereby the ...
What are the top security concerns when setting up a PXE (Preboot Execution Environment) booting environment, ordered by severity of a possible exploitation? Things that I thought of are (in no particular order): Rogue DHCP takeover Man-in-the-Middle attacks on the NBP load over TFTP The question is meant to look at...
I am trying to pentest a dummy website that has a form with a TEXTAREA input on one page. When the form is submitted, the contents of the form are displayed on a second page. However, the second page that receives the POST input, filters it to replace ", <, > and & with &quot, &lt;, &gt; and &amp;. The second page also...
The django docs tell us that our AJAX scripts should acquire the token from the designated cookie as in get_cookie('_csrf_token'). Can I rather print it to the HTML source, so that it's available to the JS context more easily? <script> var TOKEN = "{{csrf_token}}"; </script> <script src="myscript.js">
I am a novice to network security domain. For one of our clients, we are trying propose a network model where an Apache proxy/web-server which will be the only one that is exposed into the DMZ(Demilitarized Zone) and application servers/DB will be inside the WAN. But the client is insisting on keeping an application s...
I was looking through the OWASP XSS Filter Evasion Cheat Sheet, and there was one technique that was completely new to me: & JavaScript includes <BR SIZE="&{alert('XSS')}"> I tried out the following HTML: <html> <head> <title>test</title> </head> <body> <br size="&{alert('1')}"> </body...
I'm not into security and encryption at all, I'm just a Truecrypt user. So maybe it's a very noob-question, but I can't figure it out. When I make a Truecrypt container, it will encrypt everything inside it. When I want to open the container, I open up Truecrypt, mount the file and type in my password. Suppose my compu...
If I re-install Windows, will it ensure that all types of malware/spywares/rootkits and any other malicious software are removed from my laptop?
Please if you cant answer this question, don't down vote it and the let others to discuss their opinions instead of closing it. Yesterday I watched a collection of videos at YouTube for people who can hack a car which is parked 200 meter away from them, they can turn the car on/off and even use the benzene pedal or tu...
Can I get "hacked" by a Tor node? My computer is sending packets through the Tor nodes and receiving packets from them as well. Can I be sure that there are no Tor nodes that manipulate the packets sent through them and could infect my computer with malware?
I know XSS is possible if the window.name is echoed onto the page, but from my understanding, this requires you to use an iFrame, but what if the page has clickjacking protection, stopping the page from being embedded in an iFrame? Is such an attack still possible? Here's example JQuery... <script> $("div").html(windo...
I have a case at hand as follows: There is a number of clients in Internet (i.e. untrusted channel), initially in hundreds but growing in numbers. There is a server doing processing related to these clients. This relation is established prior to this elsewhere, say a web portal. The clients should be able to connect t...
I have a list of plaintext passwords that I would like to hash with various different hash algorithms (for educational purposes). As a minimum I would like to obtain hashes under MD5, SHA1, SHA256, (with and without salts), bcrypt, PBKDF2 and NTLM. Since hashcat supports all of these, I thought the simplest approach wo...
Q: Suppose an attacker knows the max allowable character length, n, for a website's passwords. Would it be smart for them to attack passwords of length n BEFORE length n - k (where k is small portion of n)? Q: Suppose a website has max allowable password character length 32. Would it then be smart for me to choose a pa...
I understand why a hashing algorithm should be slow but is the method that makes it slow important to the strength of the hash? Everything I've read says that the algorithm should be computationally slow - hash the thing over thousands of iterations or concatenating it with huge strings to slow it down. This seems li...
Suppose I have this scenario: User --> Inputs License Key --> I validate it --> If success, good, move onto main window. If not, prompt the user to reenter the license key. The license key will not have activation or hardware ID verification. Just basically enter key and pass or not. I am wondering about few things whe...
SHA-1 was standardized by the NSA. It appears to be possible to choose the constants in such a way that collisions can be derived easily. Yet, it is not easily possible to discover that the constants have been chosen in such a way. Would it have been possible for the NSA to insert a backdoor into SHA-1 using this techn...
I was playing with OWASP Mutillidae II and in one page I've found a vulnerability. In the address bar I've wrote something like this: 127.0.0.1/.../?page=text-file-viewer.php/"><script>alert("test");</script> The alert box pops up, but I don't understand why? I know what happen if I put this code in an input form, bu...
So I just learned about SSLStrip now--I feel like I'm so late to the game. What I want to know is: If your site only serves content over HTTPS and hard fails on HTTP requests, with no redirect, are you still vulnerable? Can an attacker intercept your HTTPS request and perform the request "on your behalf", so-to-speak, ...
I hope this question fits this stackexchange: From what I understand, IPSec takes care of encrypting everything above the IP layer (transport, application). Does that mean that if I open a socket between two applications for, say, a chat, that my chat is "secure"? (in the sense that no one can alter the data sent by M...
I am currently working on a pet project website and I want to implement the "remember me" feature for logins and wanted to know if my procedure is secure. The authentication process basically goes something like this: If a user want to be remembered and logs in successfully alongside his session cookie he gets a long-...
I am living in a student housing in UK. Today, I was suddenly asked to put in my log in credentials for the internet service and because I forgot the credentials, I went to find my password section. Guess what... an ISP... storing password as PLAINTEXT! The blacked out section after "You password is:" is not a temp...
So few days ago a friend fixed an lfi on his site , and he sent me the url used , it was base 64 encoded url but not usual ../../../etc/passwd , It is : Li4vLi4vZXRjL3Bhc3N3ZAAucG5n Now decoded on base64decode.org I get this : ../../etc/passwd�.png What is that question mark , I thought it was null byte , but it seems...
My forum was running MyBB 1.6.10 and maldet found a JPG file with the webshell by Orb malware code at the end (php.cmdshell.unclassed.352). I'm using nginx and had secured against arbitrary files being processed as PHP files per this guide. Still - how could I check whether the exploit has indeed been executed from the...
Whilst researching another question, I've noticed that on OS X 10.9.4 there are many instances of Library/Keychains/login.keychain from ~ within the Data folder of what looks like apps from Apple App Store within ~/Library/Containers. Is this merely a coincidence, or does this mean that any random app from the App Stor...
my devices and my network have been compromised. I foolishly left my router unprotected and they were able to gain access to all my apple devices and then install some sort of software that will take pictures and record audio and store them in their metadata so it remains hidden on my computer. This person has then set...
In stream cipher (namely the OTP ) . The pad which the plain text is Xored with has to be random to achieve perfect secrecy , or psudorandom to ensure semantic security Dose this apply to DES or block ciphers in general ? Dose the randomness of the DES key effects the security ?
I have a site running only with http. I have decided I want to go full https, but I have no idea how to do this. Do I have to buy that certificate somewhere? Where, how much does it cost? Does it involve changes in my actual code? Forms, ajax, etc.. Do I have to change something in my server config? What, how, where?...
Suppose I have 3 sites that I want to have SSO in, site1.com, site2.com, and auth.com. SSL is always required. According to how SiteMinder cookies are described here, one of those domains would be the associated "master cookie" domain, and others would redirect to that domain in case of an authentication failure. H...
I am looking for a list of typical mistakes someone can make when implementing digital signatures for a software. And of course why they are mistakes and how an attacker could take advantage of them. I do not mean implementing the crypto itself but applying/using a library (like GPG or something alike) in your own proj...
I'm concerned how android apps that integrate payment processing deal with secure financial information.When purchasing through these apps the apps show the Webpage of the bank asking for credentials. The page is same as the one which opens when we pay through the Web browser,but there the data is secured by HTTPS. We ...
i am creating a game of sorts where you use and earn credits to accomplish tasks. I am curious if you can effectively use gmail's security features to secure these submissions if the emails are all in one of the major "safe" ESPs - that use SPF and DMARC. For simplicity let's just say every account except the game_ho...
I am a bit confused from various sources about the abstraction level and layers that a file resides in forensic imaging. I have found two slightly different explanations: The first one includes a) Physical Layer (sectors,cylinders etc.) b) Data Layer (Unallocated space etc.) c) Metadata Layer (i-nodes, alternative dat...
Redhat finally gave in after insisting for years that elliptic curves had patents and disabling them, recently enabling a whopping three algorithms: CentOS 6.5 openssl ecparam -list_curves secp384r1 : NIST/SECG curve over a 384 bit prime field prime256v1: X9.62/SECG curve over a 256 bit ...
I'm currently working a project that requires me to store sensitive information (mainly passwords and other information) on a web server via a standard python/flask website. This information is to be shared with x number of other people on the system where they can decrypt and see the information. Ideally I'd like to p...
I'm a beginner, and these may be very obvious for you, but I'm trying to understand if there are security issues with this example. Today on Stack Overflow, I saw the following post: PHP Sessions Login with remember me. The question is about creating a "Remember Me" function to extend the authenicated session for logge...
I haven't used Windows partition since mid-June and I booted the system once again just a few days ago. My first action was as usual update all programs marked to be updated (including Windows updates). Today MSE detected TrojanDownloader:Win32/Tugspay.A in chrome directory, which I believe to be for persistent storage...
I'm trying to implement two-factor authentication on the cheap for a website of mine. My bank uses this sort of grid-based OTP system, so I wanted to emulate it in my application: Cards are generated using the same functions as passwordmaker.org. A 64 character pseudorandom string is generated for each card as well as...
What do I need to learn/know to throttle a clients network based on his/her operating system. For example: Someone in my network using Kali Linux... I would like to throttle their traffic to trickle state. Is it possible to do this? If its possible, what ways can the client spoof their OS.. ie: Kali Linux shows up as ...
Many of my customers refuse to sell or recycle their old hard drives or mobile phones because everybody now-days talks about how popular data recovery program's are. Isn't it enough to use a software to write a zero to every byte of the storage area in order to protect your deleted data? What am I missing here? Are th...
I'm thinking of developing a third-party client for Quora in Windows Phone. There are a few but they just run Quora in a mobile browser. The problem is there is no public or open APIs of Quora. And I want to develop an app which logs in a user and displays questions related to his faved topics and all. The way i've fi...
"arpspoof" arp replies every second and I think about what is a reasonable time to send arp replies without affecting the network performance, or just making arpspoof not so noticiable. Is there any arpspoof config to change that? I guess in "ettercap" is possible in /etc/etter.conf
I asked a related question earlier, but I want to ask a broader version this time: To simplify things let's say I've developed an application that allows users to send messages in a chat room, and to each other (similar to IRC). The nature of the message doesn't require too much secrecy, nothing sensitive is ever share...
Is it safe to use virtual mobile numbers for account verification & authentication for services such as PayPal, Twitter, Gmail, Linkekdin, etc.? And what is the security drawback for this?
I am by no means an expert in online security so I wanted to outline the steps I am taking to remain as safe as possible yet still make it as easy as possible to gain access to my system from anywhere (within reason). I have set up an openssh-server on my linux (debian wheezy) PC and enabled port forwarding for port 22...
We have a web app for which some users want to have a password reset function. I don't want to enforce a particular level of security for the users. So if a user picks a strong password which she is able to remember and then proceeds to store sensitive data in our system, then we want to keep that data secure. At the s...
A WWW-site guided me to change the password regularly. Should I believe what the say, if my current password is long enough random string?
I didn't think of this before but today I just realised that in soke sites, pw recovery is possible if you know the answers to security questions like What is your mother's maiden name? In this case, should the answers to the security questions be hashed or not?
The administrator account can be renamed which means the hacker needs to figure out two pieces of information : the user name and the password while there is always one root account in Linux named root
I can understand that typing my user name on the computer is "identification" and providing the password is "authentication" but when I use a smart card or a key fob I see no identification taking place?
I've been looking into what hashing functions are, what they do, &c. I was just wondering: how does a hashing function always return the same length hash? How does hashing work? does not explain why hashes for a certain algorithm return the same length every time.
I'm using a tplink router for my home LAN and just noticed that in the UPnP section in its control panel there are two entries with App description: Teredo of tipe: UDP and ports: 55566 and 49868 How can I analyze what application is using those forwarding? Does it seem suspicious? (There is no remove button in the web...
I have set up an SSH key with Digital Ocean that is automatically added to any servers I create. Is it okay to use this root account for SFTP and daily use or should I create another user account and avoid using the root account?