instruction
stringlengths
24
29.9k
I work at a large university and have a computer supplied by my employer. I would like to find out whether my employer is snooping or can snoop on my files or activity on my computer. Can I find that out? How would I go about? There is apparently some sort of remote management that the help desk can use if I call them ...
I just realize that this website knows the real ip address even if you use proxy ,i found this question, so start to test every possible way,first, this website don't have a X-Forwarded-For or X-Client-IP in its source code,second, this site don't just tell you are using proxy,it show your real ip address which it is n...
If a WorPress application that uses the Akismet wordpress plugin has certain directory listing exposed publicly, like, akismet-en_AU.po and the other .po files, and directories like plugins, themes, uploads (primarily containing just image files) etc.only accessible, should this be considered a security flaw ?
I'd like to use a key-value store (cassandra, redis, ...), but I don't trust the server. The clients have a shared secret, and I'm using that to encrypt the stored values. But what is the proper way of encrypting the keys (not the crypto-keys, the key-value store keys)? The store compares keys in queries, so each pla...
Does anyone have any examples of real-life applications that doesn't require "strong authentication". I am looking specifically for blog posts or even scientific papers that argue that "strong authentication" is not required for all applications ... sometimes you need to authenticate users using IP addresses only, for ...
The famous Mat Honan hack got me thinking about e-mail password recovery, and how any link in the chain can break all the links preceding it. In Mat's example, that link happened to be the last link, and the entire chain broke down. Specifically, Mat used his GMail address as the recovery email for all his services, a...
What options are available for transferring data between unix machines separated by an air gap? USB flash drives Optical media eg CDs and DVDs Printed paper and Scanning+OCR QR Code software, displays or printers, and cameras Pen, paper and typing! Smartcards / ISO 7816 Contactless / NFC / ISO 14443 Each of these hav...
I am not sure how hashing works exactly, all I know it is impossible to reverse it. All hash types have X amount of characters in them while the phrases and made up words can have an infinite quantity hence infinitely more times than the character counts in a hash. So do hashes repeat themselves?
I'm making a website that has an extended forum feature, where users can login, post comments, etc. I'm making the feature where the website stores cookies in your computer so the next time you visit the website, it logs you in automatically. I've heard not to store explicit username and password in a cookie. So I deci...
It seems many sites use 3rd party flash ads, those ads could be design to attack user. Do those site know which ads are safe or not? Or they just transfer any ads to user browser? In general, how to know 3rd party ads are safe or not?
I would like to encrypt some authentication tokens using AES 256 (not tied to this algorithm but it seems to be a reasonable choice). These messages are usually very short at 128-256 bits. I'm concerned foremost about the security, not very concerned about ciphertext length or performance in either encryption or decryp...
A very simple example... <div id="cat"></div> <script> document.getElementById("cat").innerHTML = document.referrer; </script> or <script src="' + document.referrer + '"></script> I've tried simply sending the request and adding a referrer header, but that doesn't seem to echo onto the page.
When you encrypt your home folder in Ubuntu and Debian, it protects not only the file contents but also the file and folder names. Yet I see that updatedb and locate works in Debian. When I run locate, it finds files that are in my encrypted home folder. Does updatedb store the unencrypted file and folder names of your...
What I understand about reflected XSS is ... When a web application is vulnerable to this type of attack, it will pass unvalidated input sent through requests back to the client... [1] Assuming that my webapp has a CSRF validation on server that checks for a valid CSRF token for all requests. It will give proper e...
Suppose as an attacker i want to carry out a Ping or SYN Flood attack.. I can change the source IP of the packets generated at my machine to a false/spoofed public IP address so that replies go to that spoofed IP to avoid detection. A WiFi router or any device for that matter .. would it drop the packet if source IP wa...
What is a good method to receive security alerts? Email is the first thing that springs to mind, although it is susceptible to MITM attacks (e.g. an attacker preventing the email from being delivered). Although this is not really a practical attack as the MITM will not usually be suitably placed for this to work (often...
I recently nuked my HDD(s) via a Windows program (Disk Wipe to be precise: http://www.diskwipe.org/), now everything is fine when I try to retrieve the information on that disk by any program I can find except for a couple of programs which have noted that the $RmMetadata folder still exists with files such as $TxfLog....
How can I prevent the installation of Chrome extensions on desktop?
Is there a way to disable the use of anonymous navigation window (an Incognito window) in Google Chrome for a computer?
Because Mylar does the decryption in the browser, the key is never stored on the server. Nice. This moves the threat to the browser, where, if the attacker is able to get a malicious script to be served to the browser along with the Mylar related app/data, then the script could just harvest the decrypted data. So, how ...
Hello my team is tasked to perform security focused training for developers (.NET and JAVA). I have used WebGoat to demonstrate OWASP Top 10 type security vulnerabilities and am looking for a similar tools / software to for demo and labs to cover security focused topics in .NET and Java. The goal is to show insecure co...
My gut feeling is that the following should be attackable: $("<td><a href=somefile.php?url="+encodeURIComponent(somevar)+">Download Here</a></td>"); In contrast to $("<td><a href=\"somefile.php?url="+encodeURIComponent(somevar)+"\">Download Here</a></td>"); For a cross site scripting attack if the user has control ov...
I am a bit confused about securing the secret encyption key. Here is the scenario: I need to encrypt some data (file) This data will be read by a program (say written in C/C++). Both the program binary and encrypted data will be accesible to some arbitrary user. However, in order to read the data the program needs ...
Does multi-factor authentication provide any additional security benefits on top of doing a better job at correctly identifying and authenticating users compared to single factor authentication? In other words, if a system could perfectly identify users based on say biometric cues, is there still a need for additional ...
As in md5(md5(md5(x)))... I can remember coming across that in some piece of code. If the attacker can somehow reverse md5(md5(md5(x))) into md5(md5(x)) then he certainly can reverse md5(md5(x)) into md5(x) and the x. However if it takes some good amount of time to reverse the first hash then hashing the hash can slow ...
I've noticed a brute force attempt on several different WordPress installs that know the right admin user name for those respective sites... It seems very strange that the hacker would be able to find the username but not the password... Furthermore, I've checked these WordPress builds, and I do not see where they are ...
I'm working on a web app at the moment where we’re trying to remove any user friction and excess steps from our user creation page. To avoid computer bots completely spamming our app we need to have a some sort of CAPTCHA but this would take away from the main idea behind the app which is simplicity. When looking throu...
My apologies if this is too subjective, but I am looking for advice on best practices. We maintain a small program written in Python that runs on our customers' servers and communicates back with our servers. We are using Python's ssl module which relies on openssl to protect this communication back to our servers. ...
What is the vulnerability level if the anti-csrf token is not sent with every post request? (If the vulnerability levels were high, medium and low). I understand for critical functions like login etc you would need to include csrf token. What factors should I consider when deciding whether or not to implement CSRF for ...
I use my MasterCard credit card for online transactions which uses SecureCode for preventing online frauds even though hackers knows our credit card details. I have come across many sites which is asking me to enter SecureCode. But recently i made one transaction in one online website, which is just taken my card detai...
I observed that sometimes my facebook https connection changes to http after using the site for a while. Is it possible for ISP or somebody in between to do such a thing by throttling the net speed ? Or, how such a thing is possible ? I thought facebook, like google, is always https. Also, this happened when I have ins...
VPNs are accessed by the user with credentials so that the information is encrypted. There are credentials that you download to allow this. Since you don't physically, in person get the credentials from the VPN provider they have to be downloaded which means using the internet. Now I know HTTPS is used but HTTPS is wea...
I am running a scan against one of our servers from the Qualys SSL tester site and it says that my server "does not support forward secrecy with the referenced browsers". What exactly does that mean? My server is setup to use ECDHE_RSA_* ciphers which I know do support forward secrecy if negotiated and is recognized on...
What's the difference between MITM attack and sniffing? Also could anyone name a few other attacks similar to those?
During manual SQL injection testing I came upon this. Is there any way to bypass these filters that supposedly prevent a UNION based attack? <?php error_reporting(0); include('db.inc.php'); $id=strtolower($_GET['id']); $counter = 0; if(strpos($id,"union")!=false){ $counter++; } if(strpos($id,"select")!=false){ ...
I'm actually interested about zero-knowledge storage system. Those system where the storage provider claims he can't have any access to the data stored. As far I know, the data are encrypted using a symmetric encryption system, such as AES or another, But those systems need a key to function. So what happens to the key...
I work for a firm that has a marketplace on the web. We want to make a link with a token that stops an ad on the marketplace without the user being logged in. Someone suggested that we make a token from this: base64urlencode(md5("salt-adid")) adid is information known by the user. salt is just a secret word. Given th...
Kind of a silly question, but I'm genuinely curious: (in part because I recently saw several questions that refer to "nuking" a hard drive...) what would a microwave DO to an HDD? Would it erase data on there, or at least corrupt it enough that it's difficult to recover?
I just read the question: Does microwaving a hard drive erase it? and now I am curious too... does microwaving a CD (or for that matter, DVD, or blu-ray) erase it? My initial thought is that some data would remain, but that it would largely corrupt the data. Would microwaving the CD completely clear off any data thou...
I have 2 or more web applications that need to be able to communicate together using a web service interface. Information All applications are using TLS/SSL (https) All applications have access to the same database and that database can only be access by these applications My problem is that I don't want anyone else ...
If ISP blocks TLS channel while a user is using Tor, can he read the Tor traffic, since Tor uses TLS encryption ?
Can ISP block HTTPS selectively i.e. certain websites cannot be accessed using HTTPS while others can be ?
I want to run a TOR node using a small ARM device mini server. I already have a good firewall set but feel a bit uncomfortable when giving away my IP address to the open web by opening a port. If I use a VPN service would it help obfuscate my personal IP address? What are the implications if it does not?
I was reading hashcat's About page, and the stats are listed in terms of c/s....is that "Cracks per seconds"....the 'c' part seems wrong, I'm just guessing. What is 'c'?
I am in the current process of renewing my SSL cert for my website. I also have a mobile app for my site. I want to use the same cert from my website in my mobile app. How can I do this? Thanks - I appreciate all feedback
I have a service with "try it now" experience that currently offers a "one click" effort. This service has a pool of N resources (lets say 50). Each new resource takes about 1 hour to generate. How can this service be protected from a malicious user to empty my pool of resources? We have circled around some suggesti...
I know it's possible for a computer to be infected just by visiting a website. I also know that HTTPS websites are secure. To my understanding, "secure" here refers to "immune to MITM attacks", but since such websites have certificates and such, is it right to assume they are "clean" and non-malicious?
I've been checking out various TLS certificates lately and noticed that most of the banks seem to have the following two issues: 1) They do not offer perfect forward secrecy 2) They are still using RC4 So far, all the ones I've checked (TD, JPMorgan, CIBC, Wells Fargo, Bank of America, ING/Tangerine, RBC) use TLS_RSA_...
For the early ChangeCipherSpec attack, the attack would affect client with all version of OpenSSL and server with OpenSSL version 1.0.1 and above. My question: If two mail servers are communicating with each other, would they be susceptible to such attack (assuming they are using OpenSSL version 1.0.1 and above) Thank...
I've looked around on Security.SE, but couldn't find much related to the following problem: I recently signed up for Chase Quick Pay as my method of being paid by a part-time job. I've heard of stupid password requirements, but never stupid username requirements. When I enrolled, I didn't really take into account how w...
Does such attack exist? Forgive my wild imagination but is it possible for a hacker to pretend/try to communicate with a service on the server and when the firewall examines the traffic it get's poisoned or taken control of? If such scenario exists what is the name of such attack? To my understanding firewalls are unli...
It's clear that someone listening on a network could still find out what website I visit over HTTPS (as discussed here) but what about when surfing in a VPN? What exactly can the underlying network (not the VPN host) see? Can it see what IP addresses (websites) I connect to whilst using a VPN?
I would like to make this story as short as possible since my question is not that long, I have worked with journalists previously in war zone where we investigated the involvement of EU IT companies in selling monitoring software to Dictator regimes owned ISP companies, One was a french company that I can't mention th...
My question is about the difference between signing and encrypting. Why would you still sign something if you are already going to PKI encrypt it? Doesn't the PKI encryption inherently provide authentication, integrity and non-repudiation? ==added later=== What if I use my private key to encrypt my message. Then anyone...
Does Shared key and Pre-shared key mean different thing ? Currently reading Text , Security+ Guide to Network Security Fundamentals.
We have received the below finding from an IT audit. Missing Secure Attribute in Encrypted Session(SSL) Cookie: It is best business practice that any cookies that sent over (Set-cookie) an SSL connection to explicitly state secure on them Can someone can explain what they are and how to secure them?
I'm trying to understand how null byte injection attacks in PHP code used to work before it was patched in PHP 5.3.4. I have this sample HTML page that is a somewhat modified version of what's shown here: <?php var_dump($_GET); echo '<br>'; $file = $_GET['file']; $path = '/var/www/' . $file . '.php'; echo $path; if (fi...
Let's say I have a system which use something you know, like a password, and something you have, like a code sent to a cell phone, to authenticate. Is there a preferred order to ask for the password and the code? Should it be the password first then the code sent to the phone or the opposite? Edit The answer should be ...
At home, I have a simple ISP supplied router where I have set up a WPA2-PSK wireless network for our laptops and other devices. While I played around with Wireshark, I noticed that I could use my laptop to see what my tablet is doing in the internet, without the tablet noticing anything. I think this works because all...
I work as a tester at a VoIP software company. We've been running into a problem with using TLS to communicate with certain phones. The phones are from different manufacturers but both exhibit the same problem. To summarize as succinctly as I can, the phone is rejecting the certificate provided during SSL Handshake wit...
So I found an interesting method of remembering those pesky security questions. Basically, the guy takes a hash of the question (IE what is your mother's maiden name?) and then appends his own password (I assume it is unique for each hash). He claims this is a great way to always know the answer to your security questi...
I understand that non repudiation intends to provide a mechanism that reliably proves that the sender of a message cannot deny sending the message. But does it also provide similar mechanisms to ensure the recipient of the message cannot deny receiving it.
I always thought it's possible to track attackers unless they try to hide their identities using some form of "physical" disguise. No matter how many proxies you use even TOR seems to be traceable by NSA but what about public WiFi networks? Anybody can simply go buy a used laptop from Sunday market (MAC cant be traced)...
I recently put a Linux server online and it didn't take long until I had the first attempts to brute-force the SSH login. It's not that I am worried about that - I trust the security of my server. But just out of boredom I looked up some of the originating IP addresses and noticed that almost all of them were Chinese. ...
Our system used to get bombarded by bots trying to login to the ssh client on the standard port. After switching to another port number the failed login attempts basically stopped completely. Recently, in the past week there has been a few unknown i.p. addresses attempting to login ( on average about 60 attempts a day)...
Aug 30 20:28:09 dropbear[6799]: Child connection from ::ffff:5.10.69.82:38463 Aug 30 20:28:11 dropbear[6799]: login attempt for nonexistent user from ::ffff:5.10.69.82:38463 Aug 30 20:28:12 dropbear[6799]: exit before auth: Disconnect received Aug 30 20:28:12 dropbear[6800]: Child connection from ::ffff:5.10.69.82:388...
Can anybody name all the risks of the following scenario: User visits a page, but his session is expired, so he is auto-redirected to login page with his previous page and params added as a single parameter, encoded using PHP's urlencode(): https;//www.example.com/login.php?previous_page=%2Fdashboard.php When logged i...
As far as I understand it's possible to issue SSL certificates, which could be used by clients for authentication. So in theory only users with valid certificates would be able to access a certain web service. So is safe to assume, that if SSL client certificate authentication is used, possibly vulnerable, high impac...
I want to setup my application for cloud computing for Software as a Service. There is going to be a lot of data transfer between my server and client, to and fro. The technique I have envisaged is: Even the smallest communication must happen through file transfer. The file must be created in binary at the source whos...
I just moved in a student flat where several students are using the same WiFi connection. A few days ago the internet was very slow and a guy (son of the owner) came in to ask if I was downloading. He could see I was using 'something that looked like a steaming or downloading site'. It really annoyed me, because I beli...
What security risks do you face when connecting to an (possibly foreign) RDP server? Opening an unsigned RDP file triggers the following warning: RDP is a one way street, right?
I have a 3072 bit RSA key that I generated for use with SSH. Can this key-pair be used with PGP/GPG, or do I need to generate a new pair of keys separately for use in email encryption? Are the two interchangeable, or is there a difference between the two?
i writing all my passwords and users names on my notebook emails,amazons,facebook. and i have really Nosy little's brothers that will probably look at my notebook when i am not around, which encryption methods i can use that will be easy to use. [example] lets say user - iceman. password - 245598504.
I never understood why I have to worry about MITM when I am at home connected to my simple WiFiless modem using an Ethernet cable. I can tell how serious the threat is when you are in an Internet cafe or you have a WiFi network but WiFi is relatively new compared to the existence of SSL. Where/How would the attacker...
Our application has recently gone through penetration testing. The test found one critical security breach, which is essentially: The problem: Attacker sets up a WiFi spot. User enters our site (which is HTTPS). Using a tool like Cain, the attacker either redirects the user to HTTP, or keeps them in HTTPS with a spoof...
When you are using services like chat, file sending, exchanging etc., you always have to trust server providing these services. The only way to use services without having to trust third party is to not have third party (server) at all and to perform all actions directly (peer-to-peer). The company providing services c...
I've built a system and have put a ton of work into making sure is super secure. But I have a (potentially irrational) fear that if someone were able to break into my server, they could just change the PHP code I've written and it'd be game over. No feature I could build could withstand someone with access to the ser...
My question is about online brute force attacks, that try to authenticate in the website. 1) For the first case if the requests are coming from the same ip, I think this are relatively easy as after some failed attempts we can block the ip for some time or show a captcha, or increase the delay between login attempts et...
I just bought a certificate from RapidSSL. Looking up the chain, I found GeoTrust who is signed by Equifax. Then I realized that the ”Equifax Secure Certificate Authority” is due to expire on 2018-08-22 at 16:42 GMT. While my certificate is due to expire on 2018-09-01 at 01:32 GMT. GeoTrust is due to expire on 2022-05...
I have an ISP supplied cable modem/router over which I have almost no control. They can upgrade the firmware remotely, so I assume they can do virtually anything with it. When I transfer data using the switch that is contained within the modem, I think they could look at the data. When I use my own switch which is conn...
I looked around everywhere and I can't find the answer to my question. I'm using the latest PHP for server-side scripting and MySQL for my database. The character set is utf8mb4 if that makes a difference. Until now, I have used prepared statements to protect myself from SQL injection. However, since most of my queries...
Sorry I am just getting into Web Development and trying to learn more about servers and PHP, so I downloaded the LAMP stack on an Ubuntu14 OS and started an apache2 server. tcp6 0 0 :::80 :::* LISTEN - This is the line in my netstat -anltp | grep LISTEN I am cur...
Can we generate a public key from a private key?
how I can obtain the latest list of the latest revealed botnets domain list I am looking for the DGA-based botnet in particular I want to collect 1000,000 generated domain list to seed them to my research algorithm
Scenario: a web app with two-factor authentication using username/password and hardware OTP. Once logged into the app, one of the app modules should be used in a tablet or any mobile device without a USB port available. Should the application be able to generate a OTP and pair it with a user then allow the user to log ...
I found that the characters; < and > are filtered (shown as: &lt; and &gt;), when I pen test for a website. Is there any methods to bypass < and >?
I am having some question regarding captcha and AntiForgeryToken Do I need to use captcha if I am using AntiForgeryToken in an MVC application. Does AntiForgeryToken prevents automated form submission? Can I use AntiForgeryToken as an alternative to captcha?
At work (a huge organisation) I found a server on the LAN that opens SFTP connections to 2 servers across the Internet. I assume the remote hosts are in the other parties DMZ. I know you are not supposed to do this but I am not sure of the associated risks. How much more risky is it to SSH (SFTP) to a remote host from...
I do understand that it is a good security measure to implement HSTS, because it will reduce the number of incidents. Statement 1: If clients IO traffic goes through MITM from the start, can the attacker can just strip Strict-Transport-Security header, even from initial HTTPS connection? I'm aware of the pre-defined HS...
Differentially private techniques guarantee privacy while often permitting accurate answers ...this is something I have been reading up on lately as a means of preserving user privacy/anonymity. As of yet, however, I haven't found any examples of it being applied in a real-world setting. Instead, I am seeing it in ...
Which shell is more secure, mksh or bash? There has been some discussion pointing into the direction, that mksh is more secure. How to come to that conclusion? By looking which code was more audited and which not? Have there been any professional comparisons of either shell or comparisons of the two? (Asking from persp...
Hypothetically speaking, could an attacker run a targeted attack on a network that would inject information into a victim's cache of recent TLS connections? Specifically, the master-key and sessionID of your existing session you'd maintain with a specific website the victim would likely visit later. When the victim go...
I wrote a huffman encoding program that can compress and decompress files. The file contains a header which contains information that allows me to retrieve the huffman tree. I wanted to add a simple encryption/decryption feature to my program. I was wondering which way is better: 1. Encrypt the whole file. The problem ...
So an Evil Twin Wifi hotspot is a hotspot with the same SSID and/or same MAC that when the victim auto-connect to this hotspot, all traffic go through this evil twin and thus the information transferred will not be secured. An evil twin requires the knowing of the password of the original hotspot. However, what if a pe...
We heard lots of complaints about hard to use crypto tools, and recent ideas of Google how to fix this. I had another idea about this which seems quite obvious, but couldn't find anything about it on the web. The idea would be to automate the PGP Web-of-Trust by loosening crypto requirements, following the Opportunisti...
The unix read permission is actually the same as the execute permission, so if e.g. one process has write access it's also able to execute the same file. This can be done pretty easily:First this process has to load the content of the file,which shall be executed, into a buffer. Afterwards it calls a function from a sh...
I feel like there must be a simple explanation, but I've been looking around haven't found any wholesome answers. Take for example my name is Alice and my best friend Bob and we want to communicate securely. If I write a program that takes my text and obscures it through several dozen filters and can successfully reve...
After some careful looking at one .pcap of my network i would like to undestand why a request appears on the communication like IP [TLS Application Data] Application Data Protocol: http Version TLS: 1.0 Encrypted Application Data: a44a55a5aa6aablabla and then the reply from the destination IP is just a simple TC...
Suppose a website is hit by a 500 Mbps DDos, and then the DDos stops for a second or so; does the website recuperate?
I have a question. If you were using a password brute force/dictionary attack utility on a site like yahoo or another site, how long would it take to crack a password like Jah13Wootiang if Wootiang is first name and Jah is last name? This is assuming that attacker knows your name. This is assuming that there is no lock...