instruction stringlengths 24 29.9k |
|---|
I've just started reading IT Security, and found some interesting reads on man-in-the-middle and different types of "attacks" that could be used by an enterprise to intercept communications on their network.
This got me thinking. What things are ISPs capable of seeing/intercepting and what could one do to lessen this?
|
I'm developing a B2B platform, where other developers (our customers) will build shop-front style apps that leverage our platform.
We expose a REST based API which our customers either call directly from their app servers, or their own client apps can all, on behalf of their users.
Their apps are standalone, and they "... |
There are several pages on the Web that generate fake e-mail addresses so spammers can harvest them; the purpose is to fight spam. (Some examples of this concept under discussion and, in some cases, in practice.)
For this to work, the spammers have to (a) harvest addresses off of the Web, (b) not 'blacklist' such pages... |
BitLocker can be used as a cryptographic module to fulfill FIPS 140-2 security level 1 compliance.
What if the encrypted drive is on a virtual machine, is that still FIPS 140-2 compliant?
In one BitLocker virtual machine setup, one of the drives or volumes on the virtual machines' host can acts as a cryptographic key p... |
I'm struggling to find good documentation regarding requirements around security and encryption of patient clinical information when delivered to a patient in electronic format. Patient portals, etc., implicitly have authentication. However, what are the requirements, if any, with respect to encrypting and password-p... |
As HIPAA's language is somewhat vague when it comes to actual technical requirements, what are best practices for PHI encryption for HIPAA compliance?
I've seen varying levels at different organizations. Some just encrypt it in transfer, some when at rest as well. One organization I dealt with required PGP encryption o... |
If I was a marketing firm who provides an analysis on visitor statistics from anonymous members who then ties that in to a CRM to track conversions, what do I have to do to the data to ensure that those customers information is handled properly according to HIPAA if the CRM database is on my portal separate from their ... |
Many physicians, nurses, and technical staff like to carry PDAs to be kept abreast of patient conditions. Various companies want caretakers to view ECGs on their iPads.
Due to the incredibly private nature of medical records and data, if such a device were part of your network, are there any measures on software to ac... |
Amongst the open source EMRs, which ones may be good to learn from? Any references I can go to as a starting point?
|
I've seen referenced in literature the need to have a "break glass" mode in Healthcare IT applications. In this mode, the access controls in an application can be bypassed for an emergency when it is critical for a user to gain access to imaging data. Typically, the facility will have some sort of policy in place to ... |
Are there any front-running approaches to using server-generated hashes to encapsulate patient condition in a concise manner while maximizing security?
For example, a system to represent current med profile in a hash that can be used to check for contraindications without revealing the specific component prescriptions?... |
The role of HIPAA Security Officer is very important in maintaining compliance. In smaller organizations, there's overlap in employees' roles, so the person that ends up as the HIPAA Security Officer may not have a whole lot of background in compliance. Does the individual serving in this role face more personal liabil... |
Here's a scenario:
An intranet CPOE application
User runs a report, which downloads as a PDF and opens in Acrobat on the local PC
User leaves the PC without logging out or closing Acrobat
CPOE times out and auto-logs the user out
The PDF with sensitive data stays open. It is also stored in the browser cache/download ... |
My application logs accesses to PHI. I need to add a log item for things like downloading and printing.
Is there a general term that I can use to describe these events? I'm thinking something like "export" or "externalize".
I want to represent that the user took an action which yielded a file or hard-copy of PHI which ... |
Imagine you are designing a system that's comprised of overdue worklists for doctors (e.g., Doctor X you have 3 overdue studies to look at). In the notification, you identify the studies they have to review by their accession number / CPT code / date of service, so that the doctor can see what studies they are missing... |
I'm interested in having physicians digitally sign pdf documents we create, in a HIPAA-compliant manner. Ideally, there would be an open-source solution, but I'm also willing to consider a digital signing service such as EchoSign.
Update: We've decided to use EchoSign as a digital signing service. It has a good front... |
I participate in a mailing list where the following question was asked, without satisfactory feedback, and am interested in the correct answer.
Several referring physicians have requested that an imaging center send them a list of patients that are scheduled and completed at the end of each. They wanted the Patient ... |
I'd really like to implement Google Analytics at my work on web software that is required to be HIPAA compliant. But I'm wondering if it's against the rules. Does anyone know how I can find out? I've searched Google, but there isn't much there on the subject. In the mean time I'm going to be reading up on HIPAA Privacy... |
I'm a webmaster at a company without much knowledge of IT Security. We are running 6 computers connected to a central server that also hosts our website.
3 out of 6 people in the office have gotten viruses in the last week. Our IT consultant assures us that the virus would not be on the central server and that we all m... |
A really noob question, I know, but something I was wondering about this morning. If this were the case, would they encrypt things identically?
Or maybe someone could direct me to a helpful research about how linux generates entropy and encrypts things? Google is giving me tangential results but nothing especially hel... |
What are the emerging standards for file transfers (including online transactions)? How about for file integrity checks?
|
In a recent question I asked about investigating websites for viruses.
The answers were very helpful, I ended up using the AVG website scanner. First I used it on our website and found it was clean, then used it on a website we suspected and it came up with 'Potential Active Threats'(link to the report).
My organizati... |
If I send a XHR request to example.com and response has Set-Cookie: dummyCookie=dummy in response.
How different browsers handle this?
Does any version of any browser set the cookie for example.com, so that it will travel in subsequent requests(requests in compliance to SOP) to example.com
|
What exactly does the "key signing" mean?
So for example I have a private/public GPG key so that people could send me encrypted e-mail, because they know my public key. But: what does key signing mean in this example? E.g.: "a third person signs my public key (how?)."
And the most important: Where can other people see ... |
When pentesting it is useful to know when apache mod_rewrite is enabled. But when one comes across a web server that does not utilize PHP it is difficult to tell if mod_rewrite is enabled considering that URL redirection isn't very necessary. Is there any way to tell if it is enabled (remotely) without simply guessing ... |
As far as I've understood, if you try to issue a HTTP request with a spoofed IP address, then the TCP handshake fails, so it's not possible to complete the HTTP request, because the SYN/ACK from the server doesn't reach the evil client ...
...in most cases. But let's now mostly disregard these four cases:
- Man in the... |
Suppose you'd cut a fiberoptic cable with two razor sharp mirrors, reflecting the traffic out into your sniffing device and then back into the wire again. How fast would you need to get the traffic up and running again to not get detected? Also, I have no idea what tags to use. If someone would like to change them - pl... |
Do I need to be a "mathematical whiz" to be a hacker?
|
In many organizations these days, employee IDs are very mutli-functional. They can serve as:
Visual identitiy verification. (Including employee photo, name, ID number, and other details on the face)
Building access control. (Via RFID, prox card, bar code, magnetic strip, or smart chip)
Computer access control. (Sm... |
A BuzzDock toolbar suddenly appeared in my Chrome browser. I definitely did not install it nor do I remember installing any crapware.
It is not unknown to the internet community (Example 1, Example 2). Though it is considered annoying no one seems to think it is a security threat but I don't know where it come from so... |
We have an internal intranet system which is only accessible from a few internal VLANs. Our main external firewall blocks all access to the internal webserver – or rather, has no rules to allow access!
We have 100's of branches out in the UK that sit on a private network, most have VPNs to head office & access our intr... |
I am reading Tanenbaum's Modern Operating Systems 3e. He says "Suppose that the program being attacked [with malicious code] is SETUID root in UNIX (or has Administrator power in Windows). The [malicious code inserted with a buffer overflow attack] can now make a couple of system calls to convert the attacker's shell f... |
In my country, Austria, a telecommunications data retention law will be executed starting at April 1. Internet carriers are required to store connection data (from which computer to which server), but no actual data payloads, for up to 6 months.
I would like to avoid the government knowing which of the many million Fac... |
Is it possible to collect metrics or generate alerts when one of EMET's suite of mitigations prevents code execution? Ideally I'd want to be able to collect and analyze data to support statements like, "deploying EMET blocked ### exploit attempts against our Windows PCs last year."
|
The question below goes from a wrong assumption that attacker is able to spoof IP when making HTTP connection. But attacker isn't able to spoof IP if he doesn't have direct access to connection between server and this client
Many security engineers advise setting up attack detection layer. The main suggested component... |
Is it illegal in the UK to post styling that breaks out of a post?
For instance, if styling were allowed here and I were to use it to change some stackexchange pictures on this page, would that be illegal?
|
I was looking at using the encrypt option in an application but I've read some comments saying it is not so secure because it uses static keys.
How easy is it to break static key encryption? Does it require lots of data points or just lots of time?
|
Gmail provides an SSL connection and also encrypts the entire session by default. But if you send a mail, once it leaves gmails servers, it can be read at any point on the internet. But what about Gmail to Gmail paths (i.e. I send an email from my gmail account to somebody elses gmail account). Is that encrypted too, w... |
How do I create my own open Wi-Fi hotspot/access point with a custom login page similar to those found in commercial hot-spots?
The page would be accessible using Windows or iOS, and users would have to accept terms of use, or submit payment details, or enter a username and password before being able to proceed.
|
In my projects I always fetch roles from DB and store them in a session variable, then to check If a user has access to admin pages I just check the session.
Let's consider I use a private hosting what is the drawbacks of this approach?
|
I am looking at encrypting user data however performed on the server as opposed as on the client. What risks do I have to consider and if so how do I limit such risks? The reason we are looking at server side encryption is to limit exposure on the client side to trojans, key loggers, etc
EDIT
The data would be sent ove... |
I'm not exactly an expert, so I'm hoping you'll give me the benefit of the doubt and try very hard to make sense of this...
I've been thinking about a simple measure, which I'll call Multiple Networking, that may enable a computationally secure network. The idea is that we use multiple connection points that don't giv... |
I'm trying to implement the SRP crypto; 6a. However I'm not familiar with the cryptography and it's computing. I'm using the public implementation of the BouncyCastle lib, but I have no idea how it works actually. It's for a "private" server for a game and I'm kinda stuck now.
|
Is it possible, in Windows XP, to maintain user privileges of a command shell after a reboot?
For example, I'm running as a non-privileged account LocalMachine\Pete, but have a shell running as LocalMachine\System. I want to maintain the privileges of that system shell after a reboot. In Linux this could be accomplishe... |
How do we make a iPhone app HIPAA compliant. Our website is HIPAA compliant since we use encryption at rest, we use SSL, and other security provisions.
Will using a SSL connection give us the advantage? Also, i believe that the iPhone provides encryption regardless if a phone is protected or not?
|
I'm no security expert, so please just ask in a comment if I haven't made my question clear enough for an answer.
The Scenario
We have a server running WCF services, and a number of clients connecting. These clients are actually Linux PCs which we build. We need to establish secure communications between our server,... |
I know that certain DNS blacklists are considered more reliable than others, in that they don't have as many false positives.
I run a forum that is known to be spammed, and I've installed a mod to incorporate multiple DNSBL lookups with varying weights in order to have less false-positives by confirming there are multi... |
From a security point of view, is it okay to read foreign (untrusted) cookies (from 3rd parties on the Internet) on your internal (trusted) network, or should you only read them within the DMZ areas of your network environment?
The reason I'm asking is because we want to allow people to access our web services from the... |
I'm looking for a spreadsheet/template that allows the business-rules (i.e. 'who has access to what') to be mapped, visualized and analyzed.
In the past I have created a couple of these (some even with automation using the O2 Platform), but NDAs prevented me from sharing. So while helping with a set of Python scripts t... |
Currently finishing my degree in computer security and have a few years experience in IT support and want to get into a junior pen testing job or similar.
Would the OSCP certification do me any favours, does it carry any weight? Is it recognised by companies in the UK? From what I've read the OSCP seems to be the most... |
I had this idea a few years ago and improved it today as I notice a hole or two. I believe I have the system down right but If there was a hole the first time there may be a hole this time. I believe the below will have a voter voting anonymously and impossible to tamper with unless the party handing out tickets give o... |
The process would be easier if there was only one payment, but there must be some security or financial reason for Paypal to send you two random payments
|
I read an article about some hotel injection ads to every webpage using some router:
http://justinsomnia.org/2012/04/hotel-wifi-javascript-injection/
Would it be possible to do this with any existing software? (like in a Man-In-The-Middle scenario?) Injecting the scripts in every browser connecting to the Man-In-The-Mi... |
I've set up snort and am configuring it for my network. I have one vpn server making a connection to my dns/AD server. This connection sets off:
GPL SHELLCODE x86 inc ebx NOOP
The payload is as follows:
....WANG2..JFIF``..C
(1#%(:3=<9387@H\N@DWE78PmQW_bghg>Mqypdx\egc..C//cB8Bcccccccccccccccccccccccccccccccccccccccc... |
I'm trying to do penetration testing of our ASP.NET web-site to check for security loopholes (specifically for SQL injections). We bought a commercial web scanner tool (IBM Rational AppScan), however it only does black box scanning for IIS and fails to detect SQL injections in certain scenarios.
What we're looking for ... |
Imagine having a web application. You then decide that you want to create your own logging system, for whatever reason. What data should be logged to put a very good logging system in place?
I was thinking about the following:
Date and time of access for every user
User IP
Number of consequent login attempts
Session l... |
Is it possible to detect failed logins on the hotspots you create with your windows/linux laptops? So you can detect some dumb brute force/guessing attempts?
For example, a log like this:
TIME DATA - WIFI HOTSPOT LOGIN FAILED - MAC ADDRESS INTRUDER - PASSWORD THAT WAS TRIED
As for the password part, lets take wep for ... |
A lot of times I see that resource XXXXX.gif or XXXXX.js can't be saved when I try to save a webpage in Firefox.
So this made me think, can I implement a similar thing for my website as well?
Basically, I am interested in knowing what prevents a resource from being saved locally, but while still allowing the browser to... |
According to this paper it is cracked: http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf
Using Reaver.
|
I understand that using encryption for email isn't particularly mainstream (a fraction of a percentage of users, at a guess). Is that the only reason that banks and other sensitive companies do not offer some kind of encryption for email notifications?
For example, my bank sends me an email every month:
Subject: Your ... |
First off, this is a purely academic question. My first answer would be that he cannot since he does not have the session key.
Could he at least kill the connection, such as by sending spoofed FIN requests or something?
|
I have always heard that
A change in just one bit of the original text shall change half of
the bits of its hash.
I think this property is called the diffusion property.
However, I wonder why the diffusion property is so important in hashing functions.
I understand that for encryption algorithms this is a needed p... |
I will soon be moving to Mexico and living there for an extended period. During that time I will need to occasionally access my US-based bank's website. I'll always be connecting using my own laptop, which is guarded and clean from infection. I have no specific reason to worry about my net traffic in Mexico being inter... |
I use OSSEC HIDS to monitor XP and Windows 7 Operating Systems.
When OSSEC flags changes in the Windows registry, I have no idea where to go for to look for information and identify if the changes are rather legitimate or if there is an actual intrusion. So, I have two questions:
1) Can someone see anything concernin... |
How do I use the Markdown library safely? What do I need to do to make sure that its output is safe to include into my web page?
I want to allow untrusted users to enter content (in Markdown format). I'll use the Markdown processor to generate HTML, and I'd like to include that HTML in my web page. What do I need to... |
I've been looking into the various pros/cons of tokenless (particularly SMS based) and traditional token based two-factor authentication (think RSA SecurID). After doing some research, I think I have a better understanding of the two options when it comes to usability, cost, etc, but I'm having trouble finding good in-... |
When generating randomness using SecureRandom in Android, I want to select /dev/random or /dev/urandom as the seed source. It can be done in java.security file on Linux and Windows systems but there's not a java.security file on Android for now as much as I know. How can I do this selection?
|
Given a securities trading algorithm that is very effective and thereby very valuable, how do you keep it secret and protect it from theft or copying? What techniques or architecture is the best?
The algorithm will of course need some input data and output some data. It will also need maintenance and development.
Prefe... |
With the recent conspiracy theories around the registrar MarkMonitor Inc., the question arises, if DNSSEC protects against a registrar going malicious (or being attacked).
This is especially interesting in the context of SSL certificates. At the moment any trusted certification authority can sign any server certificate... |
I always thought that if I had an SSL connection there would be no MITM attacks. Now it appears that isn't true (see comments in this question Is it okay from a security perspective to read foreign (untrusted) cookies in a trusted network?)
I'm still unsure how it works and whether each browser needs to install a certi... |
Even though most people consider downloading your Linux software from you own distribution's repositories as safe, thinking about the scenario where a repository gets hacked sounds thrilling.
What would happen if a repository which hosts widely used applications gets hacked and those applications are replaced (or added... |
I have a problem fuzzing FTP protocol. An example of a command fuzzed is the following data model, which should fuzz the "CWD [string]" command of the FTP protocol.
s_initialize('CWD')
s_static('CWD')
s_delim(' ')
s_string('fuzz')
s_static('\r\n')
When I analyze the packets sent to the FTP server, I can see that Sull... |
I just learned that my dad fell for a online green card lottery scam. It happened over 3 years ago, the attacker took 60$ and disappeared. I am not even considering getting this money back.
On the other hand, he had his victim fill out all sorts of forms giving out private personal data. That worries me a lot more. I d... |
The script on opening web broswersays Warning: Unresponsive Script
A script on this page may be busy,or it may have stopped responding.You can stop the script now,or you can continue to see if the script will complete.
Script:chrome//global/content/bindings/text.xml34
and then two options to continue & stop the script.... |
I am trying to SSH into my fresh Ubuntu 12.04 server. At the client I have deleted known_hosts. SSH to the host for the first time has it offering me an ECDSA key to verify. The problem is I know how to get the RSA key and verify it but I don't know how to get the ECDSA key.
How can I force SSH to prompt with the R... |
I recently came across this term "Virtual Private Database" and I'm wondering what criteria need to be satisfied to allow use of the term.
I first saw the term in an HP/Fortify doc:
A virtual private database is used to ensure separation between
customers. The database is setup as a virtual per-client relational
d... |
Let me preface my question by saying that I understand that experience is generally more valuable than certifications when it comes to the IT profession.
Having said that, are vendor specific security certifications, such as Cisco's CCNA & CCNP Security routes, looked at similarly when compared to more general ones s... |
Suppose that Alice signs the message M = "I love security" and then encrypts it with
Bob's public key before sending it to Bob. As well known, Bob can decrypt this to
obtain the signed message and then encrypt the signed message with, say, Charlie's
public key and forward the resulting ciphertext to Charlie. Could Alic... |
I am running a Debian VPS and i did a port scan and found these services
135/tcp filtered msrpc
139/tcp filtered netbios-ssn
445/tcp filtered microsoft-ds
593/tcp filtered http-rpc-epmap
1720/tcp filtered H.323/Q.931
6881/tcp filtered bittorrent-tracker
6901/tcp filtered jetstream
6969/tcp filtered acmsoda
The one... |
Many automatic security scanners have built in rules that alert on the presence of software version, and in many security lists version exposure to arbitrary person accessing the system is mentioned as one of the security problems.
So my question is - is it a real problem and is hiding the version adds anything real to... |
Given the following conditions,
Session ID does not change upon login
Session ID travels in form of HTTP cookie
There is no cross site scripting/redirection vulnerability on the login page
is it still possible to perform a session fixation attack?
|
I got the most recent ESET Cyber Security Beta for Mac. It offers a mode called “Web Protection” and “Email Protection”.
The documentation don’t really explain what these two modes does, and I’m curious about the potential privacy implications. In a Web browser, the domain name of the sites you are visiting are sent se... |
I've read the 'Shellcoder's Handbook' as well as 'The Art of Exploitation', and appreciated both a lot. Now I'm looking for additional resources delving into vulnerability spotting, code auditing, and maybe fuzzing. Any recommendation for a book or must-read online resources of great interest?
|
I've created a new OpenPGP key to sign a software package in a source repository with an expiration date three years from now. It seemed like a good security measure, because if the key is compromised or stolen the damage will be limited.
But then I thought about the day when I will need to sign my new key. Signing the... |
Hello! As I have done before and also have read in many web sites, that just simply writing:
javascript:alert(document.cookie);
should work on any web page.
But now, I was not able to execute it. I have checked it with firefox and chrome. Why it is not possible to do it?
|
What are considerations for storing a United States Employer Identification Number (EIN / FEIN) in a database?
Is this considered sensitive information along the lines of an SSN?
Are there legal concerns as well?
|
This is the code that I found on my client's website:
?><noindex><nofollow>
<iframe src="htxp://atluscomdnsup23.ikwb.cxm/main.php?page=1f1214ff37a3022d" height="0" width="0" FRAMEBORDER="0" style="visibility: hidden; position: absolute;"></iframe>
</iframe></nofollow></noindex>
|
Please see second followup at the bottom! (Now with added real malicious code! ...ish)
Prompted by this question, I've noticed that my university's student charity organisation has an interesting problem on their website that I've been so far unable to find the cause of. (Apologies if this would be better off on Serve... |
What is the difference between ECDHE-RSA and DHE-RSA?
I know that DHE-RSA is (in one sentence) Diffie Hellman signed using RSA keys. Where DH is used for forward secrecy and RSA guards against MITM, but where do the elliptic curves in ECDHE-RSA are exactly used? What upsides has ECDHE-RSA over DHE-RSA?
|
This question quite amazes me. I dont understand how antivirus companies get info about the latest viruses. have they installed some kind of filters to monitor the internet traffic ?
Or they are purely dependent on sites like www.virustotal.com and similar ? If thats the case, then why some companies create a patch fi... |
I have setup a test application in Linux. I havent checked for paths in it, so if user enter /etc/passwd , then that file gets displayed to him.
However, I want to understand what more can be done if my website is prone to path traversal attack.
How can someone get root access ? If at all, its possible if vulnerability... |
We're trying to protect some sites that are primarily located in Asia using distributed caching. These sites commonly come under DDOS attacks. We are using fail2ban, but still have two problems:
Many users are coming from behind common firewall/NAT configurations so they appear to have the same address. Many legitimat... |
Last week, a couple of guys were fired from the company I work for; all of them had access to sensitive information.
One of them erased all the e-mails from the mail server, sent a massive e-mail to most of our customers, insulting them, and telling them not to do business with us because "We suck". Literally.
The sy... |
I have set up a honeypot, but I am not happy with the low traffic load and I would like to trigger much higher traffic levels.
What methods would attract high bot activity? These are the ideas I have right now:
incorporate Google Dorks into the honeypot
add multiple entries of the honeypot IP on Pastebin (I know ther... |
Let's say that I am connected to a WEP Access Point and I want to sniff all wireless traffic inside that network. How can I decrypt the traffic even though I don't have the cryptographic key?
I found a link that shows how to decrypt live wireless traffic on WEP AP's.
http://www.netexpertise.eu/en/linux/crack-wep-key-a... |
In order to allow users to connect to my website, I encrypt their password using BCrypt since it is one of the slowest algorithms to decrypt (making a compromised database longer to be decrypted).
But I was wondering if that was enough -- or if combining it with a hashing algorithm like sha256/512 was better ?
In fact,... |
I am trying to learn penetration testing and I have downloaded a vulnerable application called "Bodgeit Store". I have finished almost all the challenges except one which is to execute a Cross-Site Scripting attack. I looked through the source code of the app and found the following Java code:
if (request.getMethod().e... |
The following HTTP headers can be seen in responses on some sites:
Age: 12
Content-MD5: Q2hlY2sgSW50ZWdyaXR5IQ==
Via: 1.1 tacoma:3128 (squid/2.7.STABLE9)
X-Cache: MISS from tacoma
X-Cache-Lookup: MISS from tacoma:3128
X-Content-Digest: a513fd4a793de617e370699fe9a71c08be3b9476
X-Forwarded-Proto: https
X-Rack-Cache: mis... |
Objective: HIPAA compliance.
Here is the process:
Receive PDF File through secure website
Open the PDF (Which involves downloading to some folder)
No longer need PDF
The Question:
Is there any way to simply view the PDF in the browser without ever having downloaded it? Or can I use a secure app for Chrome/Firefox to ... |
I've recently been looking for a good (enough) method to encrypt files, and I came across this thing. It says that it's a
Simple p3 encryption "algorithm": it's just SHA used as a stream
cipher in output feedback mode.
Honestly I don't know what much of that means, other than I know SHA is a hash function. The firs... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.