instruction
stringlengths
24
29.9k
I wonder where can I find good collections of dictionaries which can be used for MySQL 5 dictionary attack? I just need MySQL 5 word lists / dictionaries. I found a lot of MD5, SHA1, etc. but not MySQL 5 word list / dictionary.
We are a small startup. One of our products is a B2B web service, accessible through its https://service.example.com canonical URL. For testing purposes, that service also runs on different testing/staging/integration environments, such as https://test.service.example.com , https://integration.service.example.com, etc....
Assume the following sample directory: - / - /images - /28374728127636438 - /css Directory listing is disabled on the server and the directory named 28374728127636438 never linked anywhere on the actual web page. This directory contains the backend of the web site. It is secured by a http auth and php login, but can a...
Another question about client or server side password hashing, I know. After reading many other post about this topic I'm still a little confused and not completely sure what is the best, because I read many contrasting opinions. Using a SSL certificate, that is what I'm gonna do, I came to conclusion that it's not wo...
Traditionally most Payment providers only provide Hosted Payment Sites via redirect or iframe. But now an increasing number is also supporting payment integration via a Javascript library. I imagine the case in which an attacker is able to inject code into the Web App: the attacker would still not be able to read the i...
This is really bugging me. Up until recently debit cards with an electronic chip were the most popular electronic form of payment available in Poland (I'd wager that in other European countries as well). It does seem pretty safe too - in order to make any kind of purchase (either from an ATM or in a store), the user ne...
If you have already encrypted files, are they still vulnerable to being encrypted a second time by a program like Cryptolocker, or would this protect them?
So I'm trying to solve how to block users from downloading an attachment of a timed WordPress -post before article goes live? Attachments work as uploads on a custom field in an article. My current solution is to use htaccess to block the uploads archive, so visitors cannot browse them and thus see a new file before it...
Once you have generated your master PGP key, will the "data" in the private key ever change? For instance, if you add another subkey, uid, or any other data to the master key, do these changes need to be "written" to the "secret half of the key", modifying it in any way? Or are all changes made to the "public half of t...
I am using and getting my friends to use NoScript, and the argument I usually have to use to convince them is "It prevent website to infect you without you downloading something (by yourself)". But now that I read a bit about malware, I m not so sure anymore about this, and I d like confirmation; With Firefox updated t...
What happens to the packets that the exit node sends/receives from the desired web server? Does each response packet get routed back through the Tor circuit (encrypting on the way) individually? If so, does the client need to send acknowledgement of receipt of these packets back to the original web server (routed back ...
I'm not very experienced with information security but know some basics about injection attacks and other web based attacks. Is there a tool / crawler to find all forms and input fields of a whole website? I know addons for firefox and chrome showing form details of the current viewed website. What I need is a tool li...
Why is it not possible to use a bearer token from an IdP STS to get ADFS (2.1) to issue a token? All issuedtoken endpoints require a symmetric or asymmetric key in the IdP token. Is there a specific reason for this?
A couple months earlier, I made the mistake of downloading some software over an insecure wireless network and running it without checking its integrity. I am now considering reinstalling my system, as I am worried it might be compromised. Should I consider myself compromised? EDIT: Just to clarify: no credentials were...
When Evil McJones develops Virus X and initiates its propagation, what events must transpire for AV companies (and AV testing/validation companies) to recognize Virus X? This answer to this question gives a brief list of high-level ways the virus can be found: Samples are sent in by customers Malware detected by heur...
Let's say I were to post my e-mail address and public PGP key to my website. When a client contacts me, they would have to include their PGP public key in the e-mail so that I can respond to them in encrypted PGP format, am I correct? Or is there some other way to reply to them without them having to include their PGP ...
I'm trying to talk with somebody on Facebook, but after many Facebook privacy scandals, it's a big question. Secondly on OSX, it's giving me the error that “FacebookVideoCalling_v1.6.jar” can’t be opened because it is from an unidentified developer. If I install that software, is there any possibility that somebody can...
If an attacker on the network attempts to use ARP poisoning (spoofing) in order to redirect traffic to his own machine, what mechanisms and techniques are available for tracking the spoofed ARP messages to their source? Are these techniques effective even when the attacking machine is using a spoofed MAC address (a lik...
If I had to store a text file with some confidential information on the cloud, would encrypting the file multiple times (say, 3) with different passwords using WinRAR (AES with a 256 bit key) provide more security than encrypting it just once? Assumptions: I'm assuming that someone will eventually break into this servi...
I'm writing a web app that already uses TLS encrypted connections (HTTPS), Secure; HttpOnly session cookie, HMAC-SHA1 CSRF token, requires correct Referer header to avoid Login CSRF and changes session id during login to avoid basic session fixation attacks. However, I cannot use HSTS because the same domain needs to s...
I´m building a enterprise application and I need to create a secure communication between android and a server. What is the most secure way to do End-to-End communication? Should I use HTTPS or VPN? There are better options?
I have a dead tree document. In order to reduce the risk of being compromised, I would like to digitize and encrypt the document, and then destroy the physical copy. Let's assume my computer itself is secure (since if not, this discussion becomes moot). Let's further allow that I am very paranoid and suspect the scanne...
1) To what extent is OAuth2 more secure than JSON authentication (both over SSL)? The context is a client (one server) querying another server (via API) within a local network using RESTFul. Prior to the server sending a JWT, the client sends a password for authentication (over SSL). 2) So is there a justification, se...
Our product is comprised of two servers. We would like to authenticate one server to the main server by means of client certificate. I assume that we should ask the customers (who purchase the product) to use their own CA to generate a certificate for the main server. 1) Would that be an intermediate CA certificate? T...
Hi need some help here. I am trying to exploit an unsanitized file upload with a PHP backdoor. Basically the file uploads successfully and I can see my backdoor inside the web applications /images/ directory but when I click on the file to execute it I am give an error stating 'permission denied'. (This is because only...
I am using Retina via BeyondInsight 5.2.0.410 to scan my network. Occasionally, I get the error message "You do not have the required permissions to scan the entered range" which doesn't make sense because within BeyondInsight my account has every permission. Any pointers on where to look?
Just to make sure, is there is a reason for shredding any type of data cables? Is it OK to throw them away just as they are? Thanks.
I'm curious since I discovered the nature of how browsing works in Opera Mini. A URL request is sent to Opera's servers, they download the page then compress it to lower bandwidth. They use a file format that is only used by Opera Mini. I like to visit websites like reddit's WTF and I don't think my university network ...
I have to write some login module for Java EE application. Previously i was using JBoss security - provided login and password, called HttpServletRequest with login method and JBoss security did the magic. That authentication uses Hash - SHA. Right now i'm thinking about salting passwords. I have got jbcrypt library. I...
I am lead dev on a team of five people. Only three are coders. And only the coders are really technical enough to do a roll-out of our application to a production server. Our app is pretty successful and we have attained some high profile clients. These clients typically put us through pretty brutal security audit...
I have a multipart form data where I am suspecting one of the multipart form fields (parameter named htmlbevt_id), to be vulnerable to SQLi. To test for the same I captured the request using Burp and saved it in a file, say myFile. Now on SQLMap I ran the following command: sqlmap -r /root/Desktop/myFile -p htmlbevt_i...
What is the best course of action when you discover that a non-administrator Linux account has gotten owned, and a single foreign process is running, making all sorts of networking connections? For example, how would one take a complete snapshot of the process for future analysis? Take into consideration that the execu...
I have an application that runs on some host machine and generates logs. Later in the day those logs are securely transmitted to my machine. The problem is that while the logs are being generated I dont have any access to the host machine whereas some users have full access to it and may want to forge the logs to thei...
Today at work I was asked to test our anti-virus software on our Linux servers. I attempted to create a text file containing the EICAR Virus Test signature. The file was deleted instantly, indicating the real-time virus scan was working. However, this got me thinking... since this is a relatively short string of ASC...
Everyone want security for their pc/laptops... NO DOUBT... So we protect them by some password. 'Longer password, more security' this is the tag line. But what if our computer can change our account's password? For better security, can we design an OS which is able to change our passwords with specific duration of tim...
I am uncertain about how public malware detection rulesets are? By a "ruleset" I mean the rules, usually written in Yara, that malware detection engines use to determine whether a file or memory sequence is potentially malware. I know that different detectors definitely use different rulesets, because if you use Virus ...
I was involved in this project where development got outsourced to a consulting company, but to seal the deal the consulting company had to set up a room in their office with restricted access so that only consultants working on our projects could enter, and bunch of functions were disabled from workstations to prevent...
I plan to build an Android/iPhone app. The app will contain a few forms and status screens. One of the screens will ask the user for their card details. Once they'll click submit they'll be sent over to a third-party via a secure channel (https); but not stored at all in the application. Update: We will not be taking p...
an xt-commerce-based online shop from a friend of mine got hacked recently. The attacker mailed that the shop is vulnerable, he showed the extracted data (basically he dumped the databases and cracked the md5 hashes, which were not salted) and asked for some bitcoins. My friend engaged a security company, which perform...
While searching on Google I found a website that shows one set of content to the Google Bot and an other to users (by redirecting to a new domain), and also a very suspicious Javascript file. Maybe it's a tracking cookie or a virus/malware, I don't know, so I am asking here if someone can help explain the code? If the ...
The way I have set up my email system allows me to put the name of a company (that say I am buying a book from) in front of the @ and my domain name.net after it. So, when I get an email from amazon@****.net, and it's from a different company, I would know that Amazon have sold my email address or their email address ...
I am a student of information technology and I am doing a project on avoiding MAC spoofing by using MAC encryption. My goal is to encrypt the MAC address inside the packet and send that packet to the router over the WiFi network. On the router side, I want to decrypt the MAC address from the packet and store it in such...
Today most of the home WIFI/Routers are vulnerable from a security perspective, with various backdoors, UPnP issuses and more. What should I look for when I as a home user want to get a secure solution at decent price? Do I need to look for enterprise products or should I go for any hardware supporting OpenWrt?
There have been wars fought over RSA, DSA, and I'm sure other public key encryption algorithms, and usually the arguments are "Algorithm A is faster to encode, but algorithm B is faster to decode". However, from what I understand, the slow asymmetric encryption is only used to encrypt a single hash, after which point s...
I started to show interest in information security few months ago, the more I read the more I think it's all about mathematics not information techonolgy. I mean the whole thing is based on encryption and the latter is just a set of complicated mathematical equations. To be more specific why do we see IT gurus in conve...
I was thinking about SYSTEM account on windows 7 and while researching about it, I came to know that it is predefined account used by service control manager (SCM),The account is not recognised by security subsystem what does it mean? I want to know if this account has a profile name on windows 7, 8, 8.1 etc., why can'...
Is it at all possible to detect all air type signals for a given location? For example, if I wanted to get a list of all air signals (i.e. wifi, bluetooth, radio, 3g, 4g, and all other air type signals, gps etc) going into and out of a building, is that possible?
I was just wondering if I can generate couple of PGP key pairs and save them for later use or backup. In addition can I be sure that other wont generate and use some of my key pairs in the meantime. I mean is there any guarantee that anyone anywhere in the world haven`t generated the same keys?
I work from home and use a VPN to connect to work. Can my company tell which time I'm using my laptop and which time I am using my PC? Is this something easy for them to check? The VPN is through Citrix.
Over the past few weeks I have noticed that there is a mystery contact showing up in my text message history: When I click into this message there is nothing in the history. I went to the domain associated with the text message and found the Chinese news site: hxxp://21cn.com/. I've noticed that the day associated w...
Cloud scanners are becoming more common these days. Pricing is a lot cheaper than on premise scanners. My concern with cloud scanners is that they store sensitive information on 3rd party network. (I am not sure if the sensitive information only include scan result). Is there any other information cloud scanner may sto...
Is it a good practice to recreate the CSRF Token once its been used (basically create a new taken after a post request is sent)? Or it an unnecessary measure to take? My current system is recreating the token after each post/delete/put request and currently its causing me some serious trouble with a part of my code whe...
For PCI compliance I was required to protect our server against BEAST attacks. While I have correctly configured the apache / openssl settings to pass a scan, these settings have effectively limited the client browsers that can securely transact on the sites https side. We are using Cenots 6.5 Final, OpenSSL 1.0.1e-f...
I feel like this isn't the best place to ask this (since there's no single right answer), but I can't think of a better place. If you have a better recommendation, could you please recommend it and I can move the question rather than just having it closed outright? I'm teaching a class of high-school students about gen...
I'm trying to fully understand the report of the SSL Labs server test. Can someone explain the term 'TLS version intolerance'? I cannot find any documentation of this term, even not on the forums of SSL labs or their SSL Server Rating Guide. For example, for the SSL report of mijn.ing.nl (dutch banking site) it states:...
I've been researching BREACH, and while I can understand how it might work if you have access to the the browser (to send crafted requests) and the wire (to capture compressed response length), I haven't seen a way to do this without access to the wire, aside from a fragile timing attack on response time. You can get C...
My team at work was recently working on encrypting some hard drives using Microsoft's BitLocker on Windows 7 hosts. The initial encryption for the 2TB drives took several hours to complete. This is all fine and dandy. What is concerning me however, is that upon changing the password, the process was instantaneous. This...
I'm looking for some informed perspectives on the growing 'casual' use of finger/thumb print scanners in for instance schools, for library use, cashless cafeteria payments, registration. The security around such use is much, much lower than for e.g. holding credit card data where PCI-DSS gives a defined standard, proce...
Definition of virus is (from Wikipedia): A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly modified) into other computer programs, data files, or the boot sector of the hard drive; when this replication succeeds, the affected areas are then said to be "infect...
I'm learning about web security. I understand that passwords are hashed with salt. Why aren't the salts encrypted with same user's password? Cloudn't this make password cracking much harder? Generating generate salt encrypt it with AES using user's password as key save the encrypted salt and hash Retriving decrypt ...
I have installed 2 VM's on my Windows 7 machine: Backtrack (kali) and Metasploitable. When I run a nmap scan on metasploitable from metasploitable VM itself, it shows that 3306 port is open. But when I run the scan from Kali all ports show closed. Also when both are in NAT network configuration, their IP is the same. ...
nowadays some vendors offering web filtering based on cloud security , where your web traffic will be forwarded to vendor cloud to be filtered and controlled at the vendor proxy , the vendor will provide you with management interface to define your own we browsing policy, comparing to having your own web proxy with web...
I'm working with a Luna SA HSM through PKCS11 and i have the following scenario: I have created a master key pair for key wrapping and i want to bring a key wrapped with the master public key into the HSM. So, i search for the master private key and then use it to unwrap the wrapped key. I then use the unwrapped key fo...
just want to ask whether company IT can monitor the websites that I open using the company-issued laptop but on my personal wifi network? Offhand, I can see Symantec endpoint protection and Websense as installed 3rd party security softwares. A couple of details, I usually use private browsing windows and go to https si...
I'm worried about camfecting (webcam hacking). The camera light on my mac (running OSX) is not on, but it isn't hard wired so that doesn't say a lot. I've ran a virus scan but no signs. Now my idea was to watch outbound traffic in activity monitor. If there is live streaming (most likely when camfecting is occurring?) ...
Is it risky to open the SSH service on a web server (even with a strong password or with RSA keys) ? What are good practises to connect to a web server for maintenance ? Thank you !
I have read that BREACH was a side channel compression attack against TLS however focuses on HTTP response compression. If a site has disabled support for TLS compression does that still mean it can be compromised by an attack such as CRIME, BREACH, etc...using HTTP compression/HTTP responses? Also, does this type of ...
Are shell scripts / bash suitable for any kind of task as long as the developer(s) write correct, security bug free scripts? Or are shell scripts / bash less advisable for some tasks such as parsing untrusted data over networks? Are shell scripts / bash inherently less secure than other (script) languages such as pytho...
Currently, some services use a second layer of veficiation if logging in from a new device: Gmail and Facebook send a text or call with a code Facebook generates a code in the mobile application The problem is: Countless times, I've been abroad with a cell phone whose battery had died, and needed to access my Gmail ...
It is customary to protect certain critical files with a password. For example: PGP keys, VPN keys, password managers, etc. The practice dates back to before full disk encryption being common. These days, people tend to have full disk encryption. I realise that there is still a small security benefit from password prot...
I just got a new laptop and the first thing I wanted was to install Chrome. I opened IE and searched for "google chrome" in Bing. The first result was an ad with the link pointing to www.Google.com/Chrome like below I clicked the first link and to my surprise it opened a suspicious site http://www.thesoftwarelive.com/...
Reading the doc for setting the password, the command is : python -c "import crypt; print crypt.crypt('password', '\$6\$SALTsalt')" SALTsalt is the 8-character crpytographic salt. Valid characters in the salt are ., /, and any alphanumeric character. So, do I type in different password, and replace SALTsalt? Can someon...
Suppose I want to figure out which of a group of people is distributing my content without authorization. So I create several different versions of the same content, each with a unique watermark embedded. Then, when I come across a pirate copy of the content in the wild, I can check the watermark, so I can see which ...
http://www.incontrol.co.nz/82/Cards-and-Tags Say, for example, a group of people were given the card tag, "Proximity Blue Key Tag", in the link above. This card tag gave access to buildings 'A' and 'B' to those with the cards (card AB). Another group of people were given the same card key tags, but half of them could o...
I was asked during a job interview the following question, to which I couldn't find an answer then, and this thing is still bothering me. I was hoping someone might know the answer here: Consider two banks that communicate through an encrypted channel, where you are able to listen to the communication between them: ...
We have been asked to evaluate Conversant Tracking. http://www.conversantmedia.com/solutions/enterprise-solutions From what I can tell its pretty straight forward tracking, like google re-marketing, you pass them the information you want to via some javascript, and they target your visitors with targeted ads you have s...
If this header is set Access-Control-Allow-Origin: * javascript can make a request to the domain and read the response if and only if no cookies are sent over, otherwise the javascript cannot read the response. Generally speaking why is this header considered an insecure practice for a stateful web app that requires au...
What are all the values need to be entered in the source and destination IP address and Subnet mask in order to block the bit torrent file exchange.. i.e. blocking torrenting My router's filtering webpage asks for: Source IP adress: Subnet mask: Port number: Destination IP adress: Subnet mask: Port number: I have no ...
I downloaded a File Checksum Utility executable file from Microsoft. This tool is for checking the hash of a file. I'm wondering what is the version of the "Info Hash" section on the torrent site "thepiratebay.se". Is there anyone here knew what is it?
I have client / server and there is a firewall between them.The server is listening on a port and I want to check if this port is allowed by the firewall. I can only know the ports that the machine is listening on using netcat, but I want to know if the server port is allowed to pass.
I have a TP-Link wifi router. There is no screen on the front to indicate how many devices are connected to it. Is there any way to either access logs or in real-time monitor how many devices are connected, so I can verify that it is secure?
I watched an old episode of The Real Hustler in which they demonstrated how strangers can use some devices to force your Bluetooth-enabled mobile phone to call a premium rate telephone number. The victim's phone gets charged and the owner of the premium rate number gets the money. This TV show may have aired before wif...
I have an expect script on my server which opens a WebDAV connection to another server, expects a username and password, and then sends $arg1 and $arg2 as the username and password respectively. Example: Running the script: # ./script.exp username password This executes the script with username and password as argumen...
I am trying to exploit the mutillidae web-application and I found a page vulnerable to sql injection but with a blacklist check embedded into the HTML code. I've tried to bypass this by forging a POST request with CURL but I don't know why it return always all the html source code of the page. The command I use is this...
I currently store my users passwords as PBKDF2 hashes, for the authentication part of my web application. Each user also has their own private key and public key (also stored in their user profile in the database). The private key is encrypted with their plain text password upon registration. Now, I've come to the par...
I've long been under the impression that with unix, you should never login as root. Now I've started using Virtual Private Servers over at DigitalOcean, and some advice is to use SSH keys to login as root. This makes sense to me but I feel uneasy, like I've been caught using tabs and spaces in the same text file. Is it...
I was one of the people who thought that enabling 2-factor in Apple would have prevented the download of images from iCloud; it was recently pointed out to me that, in fact, I was gravely mistaken. Apple's 2-factor only works in a subset of their services and therefore their 2-factor lends a false sense of security (at...
I was testing an SQL injector I made in Java and the site I tested it on said 'Detected security breach attempt' blah blah blah. Is what I did illegal or not? I have found different opinions and answers on different web pages and dont actually know. (I live in the UK). If it is illegal, how serious is the crime?
According to this ArsTechnica article, using a self-signed certificate on a mail server is a bad idea: When we set up a Web server in our previous series, getting SSL/TLS working was a recommended but optional step. However, it is most definitely not optional for this guide: you must have a valid SSL/TLS certifi...
If a server was rooted, to the point that we know a Perl script which creates a remote shell was placed on the filesystem remotely, and the server was rebuilt entirely, patching the original Apache vulnerability that allowed that exploit, but the same SSL cert was used for the new Apache config (I know this is foolish)...
I am looking to create a ePHI database for a small physical therapy office and I would like some advice on some of the security that I will need to implement. Most computers will most likely have no internet access, except for doing scheduled updates (checking Windows Updates, etc). The data will be stored most likely ...
I have to log into an account to use the university internet, so I imagine they can see all the sites I view, but can they see what account I am logged into, and can I do anything to hide this?
I've been using NoScript for a couple of years now but I can't seem to figure out which scripts are safe to allow and most of the time I just temporarily allow all the scripts. Is there a way to check if a script is safe other then running it to find out?
I am doing some egress monitoring on my computer. Once in every few days, I would find some strange connections being logged, which I believe is initiated by the web browser through a related but not established HTTP(S) connection. IN= OUT=eth0 SRC=192.168.1.2 DST=54.242.237.165 PROTO=TCP SPT=33001 DPT=843 SYN URGP=0 I...
Say I have the SSL certificate for google.com. I intercept it, edit the certificate with my own domain name and public key and use it to intercept all traffic to google.com. What mechanisms exist in the SSL certificate to prevent me from doing so?
Ally Bank uses a 'trusted image' system to supposedly make login more secure. I can't find evidence that this is standard practice, so I'll explain it. When creating an account, you choose an image from a list of images. When you log in, you enter your username on the first screen, then on a second screen you're shown ...
Out of curiosity, and also to check whether this is doable at all: Is there any way using standard tools to assign an expiry date [only] to the passphrase of an ssh private key, or to enforce the expiry and change of the passphrase without changing the private key itself? (I'm not talking about scripts that check [a,c,...
Many security articles discuss about adding an extra layer of security at the link layer by either authenticating the data at the link layer authenticating and encrypting it. If we have encryption enabled at the application layer, what is the point of using authenticated encryption at the link layer vs only having a...
Recently, me and at least one other person I know received an obvious scam E-mail that starts off something like this: We considered your resume to be very attractive and we thought the vacant position in our company could be interesting for you. Our firm specializes in consultation services in the matter of bookkeep...
Let's say there is a C program that simply takes a string argv[1] and uses sprintf to copy it in a finite buffer. Classic stack buffer overflow. Let's even say the program is more complicated, allowing for techniques like ROP. But then it's compiled with a stack canary/security cookie, and run on an OS using ASLR and...