instruction
stringlengths
24
29.9k
I am using the Scala Play web framework. In it, there is a PLAY_FLASH cookie used to flash messages to the user (it's a cookie so it will still work after several redirects). I put HTML in the cookie so I can include links, etc. Other details: The cookie is not HTTPS-only. I do not have a Content Security Policy. I do...
Let's suppose that I have a router and three computers connected to Internet through that router. When I tried to get the external IP address for each computer, I got the same address. I think this is due to NAT translation. I want to know how a hacker can scan a specific computer of the three computers using nmap a...
For years, we've been receiving messages through our contact form in the following format: name: vlsyekcz email: jjthiy@toaagq.com subject: BdsQiWYlYo body: 2BLgIr <a href="http://aixfhxcynapd.com/">aixfhxcynapd</a>, [url=http://kfsriuqfsuer.com/]kfsriuqfsuer[/url], [link=http://lyiusjazrqvl.com/]lyiusjazrqvl[/link], h...
I have setup a new set of servers to test a software in Amazon EC2, and had set up my application. I've given it public access and a DNS entry, so its easily reachable by those that need to test it out. Today I've found the following in the application logs (beside from the regular application requests): GET /manager/...
Forgive me if this question seems a little "under the hood", but I think it's important to know from a security point of view. I see SPOOLSV.EXE runs with print driver DLLs (Type 3 - User Mode, I know) loaded into the process under the security principal NT AUTH\SYSTEM. Doesn't this mean print drivers can pretty much d...
Im using a website and somehow they can find out that i am using a proxy. My first question is how can they do. How can they find out this? And Second what can i do i mean how can i hide my self, is there any way that i use proxy and they can not catch me? what i think is they have some famous proxies's ip or whatever...
We are implementing https with a third-vendor SSL library in our embedded system. Because of the chosen small public exponent in RSA 2048, encryption is much faster (approx 120ms) than decryption (approx 3100ms). Could we exchange the public and the private exponent after key generation? That would shift the heavy lif...
The same-origin policy is one of the most important security feature in our browser. It basically provides sandboxing for our applications which is protecting our users. Desktop application can read anything on your computer. If you install a malicious application by error, it might start reading files that you don't r...
A few days ago I installed OSX 10.8 on a clean disk, and moved some of the old apps and data form the old to the new one. I've noticed that Chrome exibited an odd behaviour: when clicking some links, it opened and immediately closed a new tab, then it correctly displayed the new page. I've tried in incognito and it did...
In an internal network, all machines are firewalled from each other. The firewall has port scan detection and blocking mechanism (say, psd module of iptables). Question: What are the ways I can block internal port scans while avoiding DoS threat? Say, an internal attacker might impersonate/spoof the domain server's IP ...
I have installed the "md5sum" utility on my Mac and there was also a "md5" binary pre-installed in /sbin. My problem and question is this: "Isn't MD5 a standard algorithm?" Because I get different hashes for a string using these utilities Are there any differences in these utilities' implementations? Example: Mehdi-Mac...
Why do some sites recommend "letters, numbers, and special characters" in a username or User ID? When creating a User ID at the www.discovercard.com website, the "User ID Strength" indicator meter bar indicates that a User ID is "weak" unless it includes letters, numbers, and special characters. (It looks similar to th...
If one uses a passphrase which is grammatical, such as "I put my keys under the doormat because they're safe there."... how many words (on average) must it contain to be as secure as a password with ~ 14 characters, such as 28fjha9;582g-jg ? (say we allow 26 lowercase, 26 capital, 10 digits and 10 punctuation, so total...
Does anyone know what the status of the "Valicert Class 2 Validation Authority" root certificate is or what's going on with Valicert in general? I've heard that that cert has been deprecated, no longer honored, revoked, whatever. I got it from GoDaddy a while back and it cross-certifies to the Valicert root. It just se...
I have a few questions, all relating to the title. 1) Is it possible to configure a server to receive the cookies using https but then serve all the content with http? 2) Does SE do this / do many sites do this? 3) Is it less costly on the CPU to only do the cookies over HTTPS? 4) Are there any security risks to doing...
I started learning hobbyist penetration testing a while ago, and as far as penetrating a computer I have physical access to, all is good. Mainly using Hiren bootCD, it is easy to gain access to an local administrator account, if nothing else then through offline cracking of the poorly encrypted local passwords. However...
I am operating in a guest account of Windows 7. Could an attacker that got onto my PC through malware I installed, install a video program that records everything I do and send the result back to his server without knowing my admin password in the first place? The reason why I am asking this is that for some actions, i...
So I understand roles vs permissions. I also understand roles vs claims. In both cases claims and permissions are granular, usually per feature or business operation such as AddPerson permission. I've been learning about claims based authorization and the examples that show how it's "better" and it's usually compari...
The code that I have is: <input type="text" name="some_name" value="<?php echo CHtml::encode($str); ?>" /> $str is the input data. 'CHtml::encode()' is Yii's way of encoding special characters into HTML entities. Can this be bypassed? I know it can be broken if I do not put those double quotes around the input. But I...
I have lost my modem to use the internet and I am starting university next week. There is Wi-Fi available to the students in the university, but I'm worried about the risk of using it. Can other good computer students using the same Wi-Fi hack and see what I am using? If there is a risk, what should I avoid using? Is ...
It's pretty common among security-minded folks to fill in addresses using e.g. foo+company@gmail.com when disclosing their email address to company so that they can tell if company has sold their address if they start getting spam. But is it just me, or is this pointless? It literally takes only one regex substitution ...
I read a recent article on a Chinese phone manufacturer on Wall Street Journal that says: The rumors had begun when a user posted online in mid-July that his RedMi Note smartphone was “secretly” connecting to a server in Beijing, although he had turned off the data backup functions. The server was connecting to...
From: https://marc.info/?l=openbsd-announce&m=140752800525709 The announcement: We have released LibreSSL 2.0.5, which should be arriving in the LibreSSL directory of an OpenBSD mirror near you. This version forward-ports security fixes from OpenSSL 1.0.1i, including fixes for the following CVEs: CVE-2014-3506 CVE-2...
From the article LibreSSL's PRNG is Unsafe on Linux. The first version of LibreSSL portable, 2.0.0, was released a few days ago (followed soon after by 2.0.1). Despite the 2.0.x version numbers, these are only preview releases and shouldn't be used in production yet, but have been released to solicit testing and feedb...
I have come across the following question in a Security+ exam guide You are tasked with creating a high-security authentication system for physical access control to a military installation. Which of the following authentication systems would be most appropriate? Biometric eye scan Security badge Smart card and PI...
Where can I find websites that perform drive-by dowload attacks ? I need such websites in order to test a software that prevents such attacks. I am in the testing phase but I do not see where I could find such websites. Thank you for any help.
How can I protect the following code from CSRF? $.post("lib/newEmployee.php",{employee_id: employee_id, employee_name: employee_name}, function (output){ //code }); And here is my form (it is submitted after being validated with jquery validate): <form id="new-employee" class="inline-in...
Can a word document contain virus or harm you in any way? Someone sent me a word docx that has only 2 pages, no image but it's 1.7 MB big. If I use save as to save it with a different name but still docx than the duplicated document has only 35 KB. Is there something I'm missing? Can this happen normally? If yes, how c...
As far as I understand if Dropbox wants to automatically run in the background without asking the user for a password it has to store the password somewhere on the harddrive and has currently no way to encrypt that password in a way that other applications can't read it. As a result some security aware application ask ...
The way I understand password security is that the user enters a password, which is then converted using a hash function. The website then compares it to the stored hash to see if it is correct. That way only the hash is stored, so if an attacker learns that they don't have the original password. Where exactly is it ...
Recently I read a few things about the BadUSB exploit, for example: http://arstechnica.com/security/2014/07/this-thumbdrive-hacks-computers-badusb-exploit-makes-devices-turn-evil/ My understanding is that a device connected to USB can change its appearance (drive, keyboard, network card, ...), which opens the opportuni...
There are some usernames that shouldn't be allowed to register on online services, for example: administrator, admin, root, system, owner, hostmaster, webmaster, sitename or sitenameadmin As far as I know, those shouldn't be allowed because they might cause a security risk, due to users registering those usernames migh...
Ok lets say some one have clone my debit card here in Greece all debit cards have and stripe and chip and lets say in a way he knows my pin and all my information and he put the info on a blank card can he take my money? i repeate here in greece all banks have chip
I have a question. One of my colleague gave me a Smart Token which consists of public/private key inside and asked me if I can test its security. I said it should be tested in a equipped lab for passing FIPS standard tests. However I was wondering if I can test this token with some tools and check if it's secure. I sea...
I am a little bit afraid about remote hacking, since I'm using a Windows 7. I see what a hacker can do if he exploits the DCOM vulnerability in Windows XP, but does this sort of exploit exist on Windows 7 or Windows 8? It other words, can hackers compromise a system with only knowing the IP address of my machine and ge...
I have heard throughout the internet that English is incredibly redundant. So why do we turn English messages in to a cipher which is then, from my understanding more vulnerable to letter frequency analysis (LFA). I think it would be more vulnerable to LFA because someone trying to decrypt the message would only need t...
If not, how is an ARP attack possible on a WPA2 secured network?
I understand you would not want to do this as it would limit compatibility for older devices and platforms. However if someone were in an all TLS1.2 environment, say a very well managed internal corporate network with all up to date browsers, is there any reason to keep TLS1.0 enabled?
About an hour ago, strange requests began showing up in my access logs. They are coming in at a rate of ca. 400 req/s and appear to come from IPs all over the place. It started out at a lover rate and has been increasing, which worries me. The requests look like this: 63.141.242.51 - - [17/Aug/2014:19:10:50 +0000] "GE...
What information is kept in a linux file about the user and/or system that created it? I want to make some files publicly available, posted on another server such as GitHub or FTP, but I'd rather the original user & system information not be included. How can my intent be implemented?
In our company we have a procedure to verify internal worker but we cannot use it for temporary worker. We cannot use badges and because of privacy reasons we cannot use any photos. Is there any other way to authenticate them? For example I meet someone very late in the company building and nobody else is there. How ca...
Is it bad practice if one uses the same email address on different sites and forums?
I am trying to learn securing wcf service using ssl. I found this website and I am following the steps. http://robbincremers.me/2011/12/27/wcf-transport-security-and-client-certificate-authentication-with-self-signed-certificates/. But when came to creating certificate step I had an issue. Using below to create a certi...
OpenVAS reports that an Apache virtual host is vulnerable to CVE-2003-0042, which is a vulnerability in versions of Tomcat prior to 3.3.1a. The host is not running Tomcat. The detection OID is 1.3.6.1.4.1.25623.1.0.11438. Why is this vulnerability detected and how can I fix it? Is it a false positive?
I opened a web page using HTTPS. When I looked at the page info provided by my Web browser (Firefox) I saw the following: Connection encrypted: High-grade Encryption (TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, 128 bit keys). I got a question - what does this encryption technique mean? In an attempt to understand it I dec...
In this image can someone tell me if a standard RSA certificate can support the EC*_RSA ciphers listed? If so do you create the typical RSA keys when you are creating the CSR? Also I am fairly certain that the EC*_ECDSA ciphers require the use of an ECDSA certificate. Is that correct?
It has been one year since BREACH made our way into our hearts, and there does not seem to be any articles or posts or patches since then, is my Google-fu weakening? Has BREACH been mitigated or patched in Apache/nginx? Can we enable GZIP on SSL if we provide further protections?
Is there a kind of analysis which would enable me to get AES key which was used for encrypting arbitrary data while I have both original and encrypted version of data ? The problem is that the AES key is burned into coprocessor but I have an interface to tell it to encrypt supplied data (therefore I can generate as muc...
Recently while looking at several banking URLs I can see the domain name with security certificate at address bar and normal locker security certificate at address bar. Have a look at the screenshots: Is it just an additional feature? What's the main difference between those two?
<div id="cat"></div> <script> $("#cat").html(location.pathname); </script> I think that example would work, but anyway, if location.pathname has to be a valid page, can this be exploited? Edit: I'm mainly talking about if the user can't make up their own pathname, (i.e. /test/<script>alert(0)</script>).
This website blacklists URLs: http://hosts-file.net/?s=54.244&view=history&direct=1 Its last database update has been today. When I check the last 5 URLs it published Firefox tells me they are unsafe. But When I check those URLs on http://wepawet.cs.ucsb.edu/ it says they are benign. And when I run those URLs on my com...
I have always wondered if penetration testing is a preventive or detective control. My view is that it is both preventive (preventive as it scans for vulnerabilities, which can be fixed to prevent cyberattacks) and detective (detects any vulnerabilities found on a system). Correct me if I am wrong.
In my nginx access.log I have plenty of request logs like this: 1.2.3.4 - - [18/Aug/2014:12:09:33 +0200] "-" 400 0 "-" "-" As you see there is neither browser specification nor any target url. I am wondering whether they could be part of an attack scheme (what sort of?) and if so how best to counter them?
I downloaded the Windows installer (.exe) for ImageMagick via http (both http and ftp downloads are provided here). Upon executing the file, Windows SmartScreen displays a banner across the screen saying "Running this app might put your PC at risk", so I decide to verify the published SHA256 checksum using the md5deep ...
I use a Macbook Air 2013 and I recently noticed a very strange and long line of digits and letters under my "shared" category in finder. When I click on the name, it just says "failed to connect." It has a picture of a PC next to the name. In addition, when my computer goes into sleep mode the screen saver says "test'...
I have 2 SSL certificates that are generated and being used for our staging and development server. However, we wish to change the roles of these two servers. currently the staging server is using example.com domain and dev server is using dev.example.com domain. So after the switch, example.com will go to the curr...
This weekend I took part in an security challenge. I had great fun doing it but i found a huge gap in my knowledge that I'm really keen to fill and hope someone here can help get me pointing in the right direction. Midway into the challenge I discovered 2 files that appeared to contain encrypted data, but i could find ...
If I understand correctly, according to this: http://blog.ircmaxell.com/2014/03/why-i-dont-recommend-scrypt.html, looks like the attacker can just create an optimimized version of scrypt that produce the same ouput with extremely high effiency (e.g. with N= 2^14, p = 8, r = 1, requires only 1KB instead of 16MB to run, ...
Let's say I have two Linux servers. One containing a desktop app database (running on a local network) and a webserver. I want to automatically transfer each hour a database file (with a size of a few MB) from the local server to the web server to make updates. The information needs to be encrypted and the server has...
I understand that it is important to use well known and well tested hashing algorithms instead of designing my own. For such there often are reference implementations available, which initialize the needed constants with manually picked random numbers. When I use such implementations, does it improve security to pick c...
In a recent discussion somebody mentioned the following hashing scheme: passHash = sha256(password) saltedHash = sha256(passHash+passHash.substr(-10) finalHash = sha256(secret+saltedHash) The password is hashed, then hashed again with the last 10 characters of the previous hash as 'salt'. Finally a secret is appended ...
Forgive me, as I am very new to cryptography, but it seems interesting, and I have a question. I'll state my beliefs and please feel free to correct me on the aspects that I'm mistaken so i can learn: Here's what I think I know: When trying to protect a password, it goes through a hash function (i.e. SHA-1), and the r...
I am building an API that returns data about companies Multiple applications will access the API, some of these applications will have access to one company, some to multiple companies. When a request is recieved for data, an ApplicationApiKey is also sent. I check if the ApiKey has access to the company data. THis wor...
I have suspicions that someone other than people on my team have obtained the credentials to remotely access a Windows 2008 Server. I need to get some evidence before I start pointing fingers or get everyone alerted that someone might be hacking our servers. Can I get a log of all the computers that have remotely acces...
I'm fairly certain I shouldn't commit certificates into source control. Even if the repository is private and only authenticated coworkers (for example) have access to it. That would allow for accidental exposure (thumb drives, leaked credentials, whatever). But, how should I store and secure certificates? I don't supp...
I am aware of the implications that hashing something more than once correctly will increase the security of a system, but doing it incorrectly will decrease it, as noted here and on various other sources. But I stumbled upon a feature of Keepass, where the password database is encrypted N times to increase the work fa...
I currently have a desktop application which requires the user to have a username and a password. These credentials are stored on a webserver (myserver.com), so when he types the username and the password and clicks on the Login button, they're sent to the webserver. If the credentials are right, the server will return...
I've been reading about the definition of the sandbox pattern and reading one answer given here. In the idea of a real world sandbox, it wasn't made only to prevent the children from leaving it, but also to prevent unwanted visitors from entering it. What is the name of the pattern for this second situation? Where the ...
I am writing a program in Processing (which is basically java), that (amongst other things) downloads files from a FTP Server. To connect to the Server the program needs the correct FTP-password, which is currently saved as plain text in a String in the source code. The program should be given out to other people later...
I am working on a persistence model for SSH Private keys. The technology used is Java. Since the persistence structure of the public and private keys is pretty similar and using some of the Java APIs like java.security.interfaces.RSAPrivateCrtKey, I am able to derive the public keys. So this makes me wonder if only per...
what s the longterm security margin of of a winzip or Winrar file encrypted with aes-256 and a password consisting of 64 completely random characters set a-z 0-9 and other printable special characters)? How long will such a file be safe against an enemy with a large GPU cluster? My own calculation is that the possibl...
We have a secure server that seems to only be sending over the identity certificate. Running the hostname through Qualys says that only 1 cert was provided. The intermediate had to be downloaded on the fly. This is not a problem for browsers but we have a custom app which uses an SSL library to connect to these servers...
So i have a https login page with standard username and password inputs. I put in simple xss test such as, alert(‘XSS attack’) the page displays a "credentials you have supplied are incorrect" warning. I dont get a pop up window but the whole line is reflected in html code. Is this still xss or?
Hello I am considering installing owasp mod_security crs on an ubuntu 12.04.4 which comes with apache 2.2.22. On the github page I have seen many version's but all tutorials were using 2.2.7 First I figured it's because the posts are using the available version at the time of writing . Is there any caveat using versio...
I find it very strange that bank use service like SiteKey without user-agent identification. This still makes them very vulnerable to MitM attack which is exactly what they are trying to protect against with this technique. How a man in the middle attack works against an online bank. The user communicates with the t...
I need to pass an IP to a PHP page, and it would be convenient to be able to use GET, but I know that's sort of asking for trouble, so I want to triple-check that I'm handling it securely. if(!filter_var($_GET["ip"], FILTER_VALIDATE_IP)) { echo "Invalid IP."; die(); } $ip = (string)$_GET["ip"]; Is this secur...
I have a very simple app that does allow unauthenticated users to leave comments (maybe later I will incorporate a capatcha). The app then stores the comments in a mysql db. I do my best to filter out special characters but I do not think that is the best approach. What is the best approach to guard against SQL-Injecti...
With CAcert.org losing trust in browsers and OSs and StartSSL providing only top-level domain certificates, are there any free SSL certificates providers for second-level domains?
Identity Providers (IdP) often provide a metadata file that is used when setting up SAML. This file needs to be entered into a Service Provider (SP). Do we need to keep this metadata file private and secure? Or is the information within it all safe to make public? I'm curious when setting up a service provider what lev...
I’m not a security expert. I wasn't sure if I should post this question here or in "exploit". I have searched for answers before posting.... Could anyone tell me how I can determine if emails are being sent from a particular computer? The situation is this. A friend of mine is getting prank or “bogus” email messages....
When Symmetrically encrypting a file, (not signing, not an asymmetric encryption question), is it possible to conceal the encryption algorithm used, or is it already concealed, but just showing on systems as a result of being cached somehow? Analogy: When signing an encrypted file, it is possible to conceal the recipi...
I'm creating a website that only allows nonprofits and government organizations (parks, etc) to sign up and post service project listings. The accounts posting the listings must be verified to protect the safety of the volunteers who want to go do the service projects. All nonprofits have an EIN that can be confirmed u...
I was always concerned about the model of trust behind CA stuff we use . Well, for most of us, it is OK to trust them, since they are reliable organizations with a bunch of solid experience. Browsers trust hundreds of CA and their subCAs, and I don't know any CA center that is under international jurisdiction(if you ...
X has some serious security problems, not the least of which is that any program using a given display can log keystrokes from any other program on that display. (This can be demonstrated easily using xinput.) Is there any way to mitigate this within a single X display, without losing essential things like shared clipb...
Are input fields that don’t have name attributes susceptible to MITM attacks (w/o SSL) or any other attack? For example: <form action="" method="post"> <label for="credit_card_number"><input id="credit_card_number" type="text" value="4111111111111111"></label> <button type="submit">Submit</button> </form> What...
Is Google hangouts encrypted? Would my work's IT guys be able see pictures and text I send while on a work computer? Yes I know I shouldn't be sending stuff I don't want them to see while at work, but it wasn't at work. I use hangouts on my phone as well and just realized I use the hangouts Chrome plug-in at work and i...
I don't know where to start in searching the forum for existing threads that might cover my issues. I recently received a spoof email pretending to be from a client for whom I've just started to do some basic SEO and content work. The email directed me to a problem URL on the site: http://clientdomainname.com/%E2%80%8E...
Lantern is an app to avoid censorship. It is hosted at getlantern.org. I just noticed that the cloud server my client is using is actually roundrobin.getiantern.org Notice the i in getiantern instead of getlantern. They look extremely similar with the app's font, I had to look very closely to see the difference. Shoul...
Hi I am trying to get Kismac working. I downloaded the r407 version from here (http://trac.kismac-ng.org/wiki/Downloads) but when I scan for networks I get a never ending sceen saying "Loading Apple Extreme card, passive mode". When I try to use the other versions, I can scan the network but I get not packets with the ...
Are there any studies regarding the security of PDF viewer software from different vendors? I try to find the most secure reader.
I have a server which has multiple NICs (ignoring redundant pairs): 'inward' facing production (connects to other servers); 'outward' external facing production (connects out to the internet via a DMZ), 'outward' internal facing production (connects to internal users including application admins); and management NIC t...
I have some data in column of table of mysql database in the encrypted form applied with SHA-256. How to decrypt that data using Java? I stuck at this since 4 days. Please spend 5 minutes of your valuable time to provide code snippet to decrypt that code.
I am looking for sample test cases for all 10 vulnerabilities to exploit those scenarios. I would highly appreciate if any one share or share the link for test cases for a web application with all 10 vulnerabilities or any OWASP vulnerability?
I have the following question regarding the decryption of SSL traffic. The topology that I have in mind is like this: User-------MitM Proxy--------WebServer In the environment described earlier there is already a commercial proxy which is doing a man in the middle attack by replacing the original SSL certificate of th...
I have a memory dump. I know it is infected by a rootkit which uses its own file system installed at the end of the disk. Can there be any artifacts in dmp file to show this?
Some days ago I noticed that YouTube knows the videos I watched even though I deleted my cookies. I also was not using a YouTube-account. When I noticed I used IE 11. After some research I found out that YouTube uses zombie cookies. For those who don't know: zombie cookies are cookies that don't get deleted if you use ...
I have heard that with forward secrecy that the ECDSA ciphers generate different keys for "each session" because they are not dependent on the private key of the server. My question is how is "each session" defined? Does this different key approach mean it happens with each consecutive/different SSL connection to say t...
Symantec recently made a loud statement that antivirus is dead (http://online.wsj.com/news/article_email/SB10001424052702303417104579542140235850578-lMyQjAxMTA0MDAwNTEwNDUyWj ) and that they don’t really consider it to be a source of profit. Some companies said the same afterwards; some other suggested that Symantec ju...
I have some questions about squid proxies, we set a squid proxy server to block certain web sites for users. and some users only can access one website that related to our work.but after install some VPN software it can bypass squid proxy server. and access all web sites that blocked by squid how this happen ? i don'...
I will be traveling abroad for several weeks on a business trip as a consultant. I will carry a laptop with an IDE and all the necessary source code so I can make changes on site (which is the purpose of this trip). The boss is very worried about the source code being stolen. I have put forward the idea of filling the ...