instruction
stringlengths
24
29.9k
I would like to know how can I analyse an obfuscated malware php code ? I heard about cuckoo sandbox, but it seems too overwhelming for this particular task. So I decided to run a Vagrant box, install php-cli, tcpdump, ... run the php code and look for connections with tcpdump for example ... What would you do in such ...
In normal asymmetric crpyto like RSA, if Alice encrypts something using her private key, Bob can decrypt it using Alice's public key. Is the same possible in Identity-Based Cryptography, where the public key is usually the user's email address? So if Alice encrypts something using her private key, can Bob decrypt it us...
I am interested in drive-by download attacks. For the moment, the oldest article I found on internet treating about it is this one. Does someone know when first the expression drive-by download attack was used ? And what was the first successful attack ever performed ?
Imaging the following pseudo-code: h = hash(sha512) h.input(password) h.input(message) send h, message to client If the user has the hash and the message, and the only missing variable is the password, then why can't you reverse engineer the password without brute forcing it? Math has taught me that if you have two o...
I'm looking for an open source security dashboard that gives a basic overview of security warnings. Google has pointed me in a few directions but nothing promising. I need something to deal w/ selinux alerts, mod_security violations and hopefully have an api that can send/create new alerts to display (i think i might b...
Hopefully this question is deemed acceptable for this area of stackexchange. if not let me know what other site to use. Anyways i'm seeking advice on how you try to eliminate spam in your daily lives. What i've done up to this point is just a total pain and i'm about to give up. I own my own domain. I essential have...
Is a printer SSL cert really necessary if you just print? I don't use https for any administration; just http. I got a vulnerability saying that my cert was out of date.
I am using volatility recently and I noticed that it uses kdbgscan command, that is about kernel debugger block. Can someone explain in plain words what is it and why are we using it?
I understand that digital signatures are usually implemented by encrypting a message digest with a private key, decrypting the resulting signature with a public key, and verifying that the message digest matches the message. This seems to be a normal application of an asymmetric encryption algorithm rather than a diffe...
Im courious to know about how these large enterprises secure their linux desktop as Google does with ubuntu LTS. I am the only user at home with linux on the desktop and had already created some iptables incoming rules and that all. I want to copy some of those methods for my own desktop. How do they configure the foll...
I recently installed Guest Additions in my Windows 7 Virtual Machine because I could not stand working without widescreen and high resolution. I have read somewhere that this could be a possible vulnerability that an attacker could use to enter the host system but I guess this risk I will take. I am wondering if I impo...
How can i wipe RAM completeley before or during the shutdown process of Windows 7? I tried several programs and a script but later i noticed that all those options only claim to free unused RAM space.
Suppose that we have a process that generates passwords with entropy E. I'd like to compute the average time it would take for a brute-force attack to crack an MD5-hashed instance of such a password. From the entropy E (in bits), I can compute the total number N = 2E of candidate passwords in the universe from which a ...
I am reading about OPENVPN and I am a little bit confused. In the OPENVPN howto website, there is a step by step setup guide for generating certificates and diffie-hellman (DH) params. However, I cant see why the certificates are used in conjunction with DH. I think about this in the following way: The certificates and...
I hope this is in the right place, don't know where else to ask. I would like to automatically send a download link to people that directly downloads an executable. The executable is a verified and safe file. People will request this email with the download link themselves. Will I risk compromising the integrity of th...
So I am running pentest on a device running Win7 and admin user set group policy to disable all mass storage devices and all usb's. I have access to local user without privs. Although my usb stick wont work and group policy rules wont let me my USB flash, USB modem or anything but my iPhone works as a USB storage devi...
Recently I saw something new (at least for me) in log file [% tools.ua.random() %] as below: 199.246.2.10 - - [21/Aug/2014:13:25:15 +0545] "POST /wp-login.php HTTP/1.1" 200 2809 "http://mywebsite.com/wp-login.php" "[% tools.ua.random() %]" 64.34.173.227 - - [21/Aug/2014:13:25:32 +0545] "POST /wp-login.php HTTP/1.1" 200...
In my home pentest lab I though it would be interesting to try this scenario and see if it works: I have 2 computers and 1 AP, computer A is authenticated to the access point with WPA2 and computer B wants to run a MiTM attack on computer A by making it connect to a fake network. But, computer Bs antenna is not as powe...
Due recent breaches that have occurred using weak remote access application passwords. I would like to setup my own honey pot on a windows machine to study their malicious intents. This is pretty easy I will install RDP, VNC and other such like applications and put a weak password. The second objective of the study I w...
I am trying to set up a CA for my company, and issuing every employee a digital certificate and a private key. I am worrying about revocation and expiration. In my case, the root certificate of CA is used to verify client identities, id est user must present a valid certificate and private key to access specific web pa...
Lately I've been doing the trend of using passwords that are sentences, at least on sites that have a reasonable maximum character length and allow spaces. So for example the most basic variation is 'This is my password.', or 'This is my <insert website here> password.' It seemed rather silly to memorize a group of ran...
Often it occurs that when bulk uploading files somewhere, the author forgets that some of the files are being open by Vim and uploads their swap files as well. Can this leak some sensitive information, perhaps about the author's machine or network?
my wordpress site suddenly be hacked via wp-config.php. I have never known this type of attack. When i scan my site, wpscan warn against this errors: How can i protect my site from this attack? Help, please! Thank in advance!
In the context of the following statement what is meant by context-dependent attacker? The MySQL Client contains an overflow condition in client/mysql.cc. The issue is triggered as user-supplied input is not properly validated when handling server versions. This may allow a context-dependent attacker to cause a buffer...
If you were in charge of web application security and needed vulnerability scanner and had option between static code or dynamic code analysis which one would you prefer? (Of course, I realize, having both is the best answer) Also the scanners are just as good as their rule engines go. But as far as I have seen there a...
I am talking about the PHP 5.3.3 package that is available in the Red Hat Enterprise Linux repository, running on Apache. From what I can see, as of RHEL 6, it is the latest version (no updates available). I assume security patches are backported, so my question is, with all other things being equal: Is this package ...
Are there known techniques to obfuscate IDS rules, so they can't be easily used by attackers to reverse-engineer the vulnerability that they detect? Let me provide some context. Sometimes IDS vendors become aware of a zero-day vulnerability (one that has not yet been publicly disclosed). In that situation, one can cr...
I have been asking myself for a while what's the purpose of that popup showing up in pretty much all the modern browsers upon entering the full-screen mode of a video or website. It appears to be a security measure against some sort of potential threats, but what is it about exactly? Which attack scenarios could be car...
Is there any way in which you can stop a DDoS attack(or any measure that you can take), if the packets sent by the attacker look like normal traffic? I got the question on an interview (how would you block a DDoS attack if the malicious traffic looks like the normal traffic?) and I didn't knew how to answer. Thank you ...
So, I have this strange list of rundll32.exe There are quite a lot of rows of it (see attached image) when I open the process tab in my task manager I've already read the link here: Multiple running instances of rundll32.exe The patterns appeared to be in the cmd line column rundll32.exe mhunkw.dme, For example, in m...
I want to get a VPN with one of the known providers. I don't know much about VPNs but I know they issue certificates which you download and it authenticates the connection and basically gives access. I have some questions though. When you download the VPN certificates, even though they're being downloaded through HTTP...
For example, if a user is receiving a denial of service attack, with huge amounts of packets being sent to him to disrupt his service, will the ISP notice and stop the offending traffic? Another example, if someone has an internet-facing VNC server and a bad guy is trying to bruteforce the password with tons of login ...
To get rid of LM hashes in local SAM databases, one can rely on the famous NoLMHash domain GPO, which instructs clients not to store password hashes with the LM algorithm locally ("Do not store LAN Manager hash value on next password change"). However, as the policy's label clearly mentions, it has no immediate effect ...
Recently Google has indicated that a HTTPS certificate will be used as a positive signal in it's search rankings. This has caused some discussion within our company as to if we should apply a HTTPS certificate to our new site. However, our site contains no login details, does not carry user data, and is effectively sta...
I'm a little confused about something I am reading in Bulletproof SSL. "TLS 1.2 is the only protocol that allows suites to define their PRFs. This means that for the suites defined before TLS 1.2 the negotiated protocol version dictates the PRF. For example, the TLS_RSA_WITH_AES_128_CBC_SHA suite uses a PRF based on H...
I found this piece of code hosted on my website I'm sure it's a malware. Any have an idea what this script does or how to deobfuscate? <?php $nkIL3_='Hn'&~hTzup;$TTCpX='HEr@D@(DEi&'|'HD"AN`(T$I.';$fGZGQD2=l5fg.'{3Ht&d~'&'|,'./*'. 'gri*/Nenwkf.'|3n';$u4avG3='K|P'^".<t";$n9s='om|wo~'&'om}e~~';$cX8W='O]P'^#gg_'. '...
During a security audit, our client found that we are sending to the client a cookie called 'x-oracle-dms-ecid'. They asked to disable it or change its name. We have been reading all the Oracle documentation available, but we couldn't find any useful reference. So my questions are: How can this cookie be changed or di...
In an example scenario consider that; I am a customer of organisation and I have two separate accounts with two different departments X and Y. I can login in to each department's website by using user id and password that is unique for each department. To update my personal details in any deprtment, I have to call t...
I recently tried to use Fiddler2 from a third-party vendor Telerik. While decrypting the HTTPS traffic of my network, it asked me to install its own root certificate in my Windows operating system: Take a look at the below screenshot: Is it safe to trust these kind of root certificates? What are the preventive measure...
Do I have to keep the revocation certificate of my OpenPGP key in a safe place or may I place it in e.g. Dropbox to have it ready on all my machines? I know that, if compromised, the certificate can be used by anyone to revoke my key. I am just assuming my Dropbox/whatever place is reasonably secure from unallowed acce...
I have a key pair stored in GPG Keyring. If I export it to an ASCII Armored format, am I removing any layers of security as long as the exported key stays on the same server as the key ring itself? My private key is still secured by a passphrase even after export. For someone who breaks into my server is it equally eas...
Below is the hash function implementation of the roguewave library. It returns a 32 bit hash. The core operation is A = B ^ ((C << 5) | (C >> 27)). Is this hash safe to use as a password check or is it possible to retrieve all used B's by reversing it? const unsigned RW_HASH_SHIFT = 5; inline static void mash(unsigne...
Before I start, all information will go over HTTPS. So, my website is basically like a forum with the authentication part finished and working. This forum has a real time chat application that sends and receives information from a Node.js server. I want people to only be able to send information if logged in, and only ...
Is Information Security field and Data Security field same? If not then, What is the basic difference between "Information" and "Data" in security field? Is Data Security a sub-category of Information Security? Is Data Security field limited at some sectors only? ---if yes then what are they?
Would it be possible for a user of a 3rd party VNC software package and email client to obfusicate/spoof their location, so that an employer would be unable to determine the location from which the user is working remotely? Could one potentially set up a home server to pass connections through - so as to appear to be ...
I am really confused of what CSRF is. I know it stands for Cross-site request forgery. http://en.wikipedia.org/wiki/Csrf When you read it here it talks about cross site request forgery attack. But sometimes people use it to refer to the randomized string or token generated by server to make sure each request is from co...
Today there is news about smartphone OS (Android, Windows and iOS) security hole using which some researchers have found a way to literally read all user activity from mobile screen. This is one of the articles giving the news. The article also notes that this is security hole is because of how shared memory works. But...
There is a OpenBSD (64bit; 5.5) server having nginx (HTTP/HTTPS) and SMTP (OpenSMTP). Question: What are the best practices to detect suspicious activity? Are there any scripts that shows interesting activity from the logs or somewhere? Attacks, DDOS, any abnormal activity? Example for detecting IP addresses that co...
I recently learned that every packet includes checksum bytes and that the computer will request the packet again if the checksums don't match. How do the following attacks defeat such a safeguard? ARP Spoofing - I assume that this is able to take place because the attacker is not actually modifying the packet contents,...
I am new to security and encryption. I want to store important information like passwords and pin codes so I don't forget them. So far I have been using LastPass but I would prefer a solution I control my self. From reading a lot on the net it seems to me that 7-zip with AES 256 encryption is the way to go. But what ab...
I have a laptop with processor intel core i7 with turbo boost up to 2:7 ghz 8gb rams and gpu NVIDIA GeForce GT 740M (2 GB DDR3 dedicated) i want to know in approximation how fast ( in word/sec) can this computer crack a wpa password in bruteforce attack using airecrack-ng tools before i get linux kali and try cracking ...
I'm setting up a Mac laptop for my wife. Mine has a ridiculously strong password, but she finds this annoying. If I give her a (relatively) weak password for convenience, what risks am I taking? A couple I can think of: An attacker in person guessing or brute forcing it (unlikely) An attacker brute forcing and getting...
I am struggling trying to understand use after free vulnerabilities, can someone explain it for me with C language source code, and how it can be used to write to arbitary memory location or to cause code execution
I have just finished building a CMS targeted at a certain industry and built a test site to see how everything works. I wrote a program to check for SQL injection vulnerabilities and the program followed a blog link to an external website. The program discovered that the external site had a massive vulnerability that l...
Yesterday my friends Samsung Galaxy S3 was stolen. We have found the perpetrator but cannot yet prove anything. He is uploading photos to social media via the phone. Is there any chance to download and analyze the photo by some means to see from what device it was shot? What can we do in a circumstance such as this? Th...
From my understanding this is how WPA2 works for home networks: PSK (Pre-Shared Key) is used to generate PMK (Pairwise Master Key), which is used together with ANonce (AP Nonce) to create PTK (Pairwise Transient Key). PTK is devided into KCK (Key Confirmation Key, 128 bit), KEK (Key Encryption Key, 128 bit) and TEK ...
I am wondering if there is any list I could access to find TeamViewer ID's, as the police are not being helpful about this.
Is there any reliable data available based on which the Global Market Size of Virtual Pen Testing Labs ( or Cyber Ranges ) can be ascertained ? If NOT , is it possible to calculate it ?
I've seen an application recently that used the Diffie Hellman algorithm. It is not a Ephemeral Diffie-Hellman implementation, but rather a Diffie Hellman one. After the secret keys have been calculated, the client then sends a SHA-512 hash of the key to the server when the server asks for it. The only reason I can thi...
Today, early in the morning. My dedicated server was slowing because there was numerous requests coming. One error I remember is some message from MYSQL, it said something similar to, max_number_of_connections exceeded. It felt weird because the site I'm working on isn't launched yet, this huge traffic was just unreas...
What is the risk, man-in-the-middle or otherwise, of unencrypted connections between 2 people who use the same ISP, in the same city? If we assume the ISP (and the copper wire that leads to them) is secure, is there a fairly limited risk level? (excluding government surveillance, NSA, etc.)
According to https://support.google.com/accounts/answer/6010255: Google may block sign in attempts from some apps or devices that do not use modern security standards. Since these apps and devices are easier to break into, blocking them helps keep your account safer. What are those "modern security standards" and wh...
I am enrolling myself into a college. College provides a Public WiFi Access Point, to access internet through its network, which is unencrypted (No password). As being a programmer for last one and a half years, I know of some common attacks that any noob will want to try on public network (Packet sniffing using wiresh...
I was doing some cross-origin requests to Soundcloud's oEmbed and I noticed some strange behaviour. When doing a request from my localhost, which is on a regular HTTP connection, everything worked fine. However, when the code got pushed on our HTTPS test server, I got the following error from my browser: [blocked] Th...
I get a lot of logs saying someone is trying to reach /sign_in?t=login'+union+select+char(38,126,33),char(38,126,33),char(38,126,33),char(38,126,33),char(38,126,33),char(38,126,33),char(38,126,33),char(38,126,33),char(38,126,33),char(38,126,33),char(38,126,33)+--+ now, /sign_in?t=login is a valid url. the rest is the ...
Changes made to system proposed in Two-factor authentication Without Mobile Phone: In previous system, shoulder surfing would reveal the user’s pre-decided image. In the current system, end image does not reveal any useful information. The user’s start image and path cannot be backtracked from the end image, since the...
Im building an app which should receive data from my server. The Api should be a PHP based script which provides the data as JSON. However I want to keep the data private and it should only be accessible by the app itself. How can I prevent others from reengineering my app and find a way to access the API? I thought ab...
What are the requirements for studying CEH? Is there any requirements for the programming background? And can anyone apply for it or does he has to have a recommendation for both studying and taking the test.
I am concerned about the use of bcrypt for client-side password generation. I am developing a password generation function to be used client-side, similar to PwdHash and PasswordMaker. Much has been said about the advantage of using bcrypt over faster hash functions because it slows down brute force attacks. I know bc...
I don't know why it seems IMPOSSIBLE to find a blog or any security expert explaining the procedure of how this 'hack' works. My wife is receiving emails from people she's emailed through Gmail telling her that she they are getting spam from her email address (3 people, one forwarded the email with single link spam)....
Is there any way to have a flash drive encrypted and it will only open with one computer that has the key in it?
I'm using the latest version of Firefox with Ghostery and Adblock plus installed. This website somehow prevents navigation away from it. How does it do this and how can it be protected against? I can't even close the browser now. http://www.imagesnake.com/ad.html I didn't realize it at first as I was using Adblock Plus...
I want to make sure my information is safe. This website is openly china-oriented but says to secure card information with Secure Sockets Layer technology (SSL) on those pages that involve sensitive information such as credit card numbers. Is this true, and is it safe enough? Thanks!
The issue started due to setting up a proxy server on a PC connected to my network. I then realized that all of my devices that connected to the network, including PCs and phones, are all infected by an ad bot that redirects me to ads websites whenever I click on any link. I then installed Malwarebytes, Adware Cleaner ...
I am getting started in testing web applications, and I am having trouble verifying vulnerabilities. It seems all modern browsers have protections against things like XSS. When something like Burp finds an XSS vulnerability, I can't ever verify it when using something like TamperData. The code gets sent to the page, bu...
I have Burp and Appscan telling me that Reflected XSS is possible due to a particular variable on a particular page. The following example is given of what Appscan injected '%252fmypage.aspx%253fHomeURL%253d%252fmyotherpage.aspx"/><script>alert(152695)</script>' and what Burp injected x.com/mypage.aspx?HomeURL=%2fmyot...
I'm reading about Google OAuth and implicit flow. In Google docs it says that the access token received using the implicit flow must be validated otherwise the application might be vulnerable to "confused deputy problem." (https://developers.google.com/accounts/docs/OAuth2UserAgent#validatetoken) I was wondering if som...
Is it possible to use an open-source tool such as Cisco IPS or Cisco ASA to block incoming Teamviewer connections to specific internal IP blocks, while allowing the outgoing ones? I cannot find a specific answer on other online sources.
This article suggests that polygraphs are rather rudimentary and thus very susceptible to being 'beaten'. In pop culture we see all the time movies where polygraphs are beaten -but with great difficulty. Can this truly be done and if so, how difficult is it -does it take great skills and discipline to learn 'tricks' or...
First of all I want to excuse for the bad spelling and grammar. English is not my mother tongue. I have built a JSON communication between a front-end (website) and my Node.js web server. I want to keep in mind, that I might extend my front-end to mobile apps so I allow Access-Control-Allow-Origin: *. Now securing API ...
We currently have what I believe to be a pretty standard scheme for dealing with password resets. Our reset links are single-use links: They expire immediately after they've been visited, even if the user doesn't actually reset their password. However, our customers are predominately (99%) businesses with aggressive sp...
I want to know whether is it possible to know the conversation/email sent via BCC can be identified by admin in some corporate companies? I have heard that email sent from BCC cannot be identified, and I want to know how this BCC feature actually works.
Yesterday, Ars Technica posted an article explaining that Android was found to be vulnerable to a UI interference attack. This claim originates from a paper published by Alfred Chen et al. of the University of Michigan a few days ago, which states that other operating systems are likely vulnerable to this same attack. ...
Suppose you have a GUI application, that potentionally may be too curious about your environment, such as the list of window titles. How do I limit application's ability to enumerate windows, capture unrelated input, access clipboard when not asked to, preserving most of normal activity? How do I give partial, not ful...
One of the things that has always bothered me about simple database data encryption: If the server is compromised, the database is effectively compromised. The attacker can use the same code as the app to query out the data as desired. A simple review of the app code will show where/how the key is stored and what the d...
Looking at the Google geolocation API it claims: Geolocation API returns a location and accuracy radius based on information about cell towers and WiFi nodes that the mobile client can detect. Assuming a phone is in airplane mode or has no sim card and thus cannot connect to cell towers, and assuming that GPS is ...
I recently recovered a zip archive with some files I need access to, but I can't remember the password. All I can remember is that the password was short (around 3-4 characters), and contained only lowercase characters and possibly numbers). However there is no Incremental mode for this particular situation in John the...
Few different scenarios: 1a) On public McDonalds wifi, logging in gmail account (or any account such as skype). Can a random user who is using the same wifi somewhat intercept the signal and figure out the password? 1b) Same situation as above, except that gmail is already logged in and accessing gmail. 2a) On random p...
A security conscious friend of mine was attempting to generate entropy using random dice rolls to generate a random password, and I became curious about the security of random number generators and whether or not she could do the same by simply thinking of random dice rolls. Would it compromise the security of password...
I suppose this is related to What is an intermediate certificate authority? but I think my question is a bit different so I'll ask it anyway. Why do most modern certificate authorities (e.g. VeriSign) require two intermediates? And if more than one is necessary for security purposes, why "just" two? Why not three? Or...
We have a number of internal development environments that use weak passwords in the Auth and SQL components; particularly using passwords such as "password" or "Password1". These are obviously changed for UAT and Production environments but how guilty should we feel about relaxing our habits for the sake of ease whil...
I started looking at OAuth - Google's and Facebook's implementation. Both of the implementations, in the authorisation flow, seem to send the "Authorization code" back to the web browser. I was wondering what is the benefit of sending the code to the browser vs just hitting the redirect_uri from the authorisation serve...
I try docker with a simple webapp : docker run -d -v $(pwd):/app -p 8080:80 image_name I have docker listen on 8080: tcp6 0 0 :::8080 :::* LISTEN 13304/docker So I can test my web app through localhost:8080 I use iptables with UFW and I deny incoming except: 80, 443 and 22 But surp...
Is it possible for the developer of an open-source software to hide a backdoor without getting caught? Obviously open-source is superior to close-source when it comes to transparency, also I am aware of the fact that open-source does not necessarily means 0-day-free (if there is such software) but has it ever happened ...
I have a scenario where I evaluate two different types of attacks on a distributed network of nodes (you may also call it a multi agent system). On the one hand the attacker is able to read incoming and outgoing messages of nodes. That is called a sniffing attack. On the other hand he may pose as is a valid node (going...
I dialled a cell phone number and it rang but with no reply. I asked the person later why they did not answer and they said the Sim card was not in the phone. In fact, it was in a purse.... Is this possible? Can a Sim card that is not in a mobile ring?
I traced a header on an email I received, the person claims to have sent it from Maryland, but I traced the IP and it shows shows San Jose, CA and also contains loop backs, ??? Is this possible?
Per current security recommendations & browser support, is it okay to have an https iframe in an otherwise http-only set of pages? Is this not a dupe? It is, but I want current trends because when I tested a few months back browsers warned me about mixed content, but now when I do an iframe of a secure login page overl...
At work we use a central portal that provides basic SSO functionality to other applications. In addition to verifying the SSO data sent, all of our existing in-house applications (used by the public) also check the referrer header to make sure that the user is actually coming from our central portal. However, we just e...
I am thinking about a creating short security demo to get people interested in the security topic. I've had a couple of ideas just want to see if anyone has anything else interesting. Edit: I was brought to my attention that this question is too broad and I will have to agree with this. In order to narrow it down I wi...