instruction stringlengths 24 29.9k |
|---|
I am re-setting up some OpenVPN infrastructure to be more secure than the original and wanted some guidance.
It's noted that the best security policy is to keep the Certificate Authority (CA) offline and separate from the server, but there's not much guidance on how to achieve this.
If I have a CA, server, and client, ... |
I recently received an e-mail from Virgin Media indicating that I might have the Citadel virus. It obviously sounds like a fake e-mail, but I am almost certain it is genuine, as they had my name and account number, and a generic version of the e-mail available on virginmedia.com, here:
http://my.virginmedia.com/custome... |
WebsitePanel is a windows hosting control panel that uses a CryptoKey to hash passwords into the databases.
We have lost WebsitePanel config file and lost CryptoKey. We have to reinstall WebsitePanel but for passwords we need old CryptoKey.
We have orginal and hashed passwords.
Is it possible to find CryptoKey from or... |
GSMs vulnerabilities have been known a long time now. UMTS was supposed to fix those problems. Why is GSM still used?
|
For example: I am using HMAC SHA 256 to sign an XML file. Part of the file data is a version number. If I append the version to my secret to use it as a key, does that weaken the HMAC? As the version is also part of the signed message is it weakend or still safe?
|
I made a small application that displays hello world to the console output and attempted to open it in another computer that had Kaspersky fully updated. When I ran the application, Kaspersky gave a message about Application Privilege Control and the hello world application not having a digital signature so it wasn't t... |
I have a mobile app that communicates to server over HTTPS. To authenticate the client and to make sure its who I believe it is, I return upon successful signup (apart from the username) a secret API key (saved locally on the app). Every private method call following successful signup is SHA256 using the [method_name +... |
For example:
from Issued SSL Certificate:
CN = abc.com.my, OU = Room, O = House, C = MY
from generated CSR:
CN = abc.com.my, OU = Room , O = House, L = KL, ST = KL , C = MY
Is it legal for a public CA to change the distinguished name when issuing the SSL certificate, or must the distinguished name exactly match what I... |
Is it possible to get the IP address of the person who posted a comment on my Twitter profile?
|
I have been robbed in the past by thieves using my HSBC Debit Card (issued by UAE branch) to purchase mobile phones and accessories by signing for the purchases. While the card has chip & PIN protection, HSBC mention (in the fine print) that, because not all merchants have chip & PIN, they also allow the PIN to be bypa... |
I don't understand how using a random salt for hashing passwords can work. Perhaps random salt refers to something other than hashing passwords? Here is my thought process:
The salt is used to add extra junk to the end of a password prior to hashing it, to fight against the likelihood of being cracked by a rainbow t... |
From the Android website:
Android requires that all apps be digitally signed with a certificate
before they can be installed.
The signature ensures that only the original developer can publish an update for their app. It doesn't ensure that no faked app gets delivered to the user the first place. The developer can'... |
The security industry typically uses rolling code algorithms to authenticate sender & receivers in keyless entry systems, which is called RKE (ex: KeeLoq).
In key-less smart key car system,
The transmitter periodically (at interval of 1-2 seconds) sends a low power RF signal. If a receiver is around it will check the ... |
I found a USB drive while riding the subway and I want to read it to see if I can return it back to it's owner. If I can't find any info on the stick, I'll use it for my own means. Assuming I have a perfect sandbox and I reformat the USB drive, how large is the possibility that my system gets compromised from using thi... |
I am reading up on TEE in ARM. I am looking for pointers for the following questions:
How does the TEE load code from the OS securely and guarantee that its not malicious code?
I am guessing the code is signed and the TEE can verify the signature. So that brings up other questions --
Who is loading the code? The load... |
In the PCI DSS version 3 it says:
1.3.3 Do not allow any direct connections inbound or outbound for traffic between the Internet and the cardholder data environment.
But in the event of hard drive failure, fire, natural disaster, or terrorist takeover, I wouldn't want to lose the information stored there, so I resear... |
My child's school is using a Google Web Form to collect student and parent information, including occupations, addresses, maiden name, birthdays, contact information, and who the child resides with.
How do I know how secure my information is, if I choose to fill it out?
|
I have been using CrashPlan for a while internally (i.e. local backup server). I would also like to setup off-site backup but my experience is that I have to forward a port from the router sitting at the perimeter of the network where my offsite server is to be located. Otherwise, the client and server cannot see each ... |
Is there an existing exploit, virus or malware that doesn't need any user interaction?
In metasploit for example.
No link to clicked, no pdf to open , no vba or exe to execute by the victim.
|
I'm familiar with the basics of multi-factor authentication. Now I'm trying to understand how a physical signature, as written on, say, a check or a credit card receipt, would be classified:
Is it a knowledge factor (something you know), in that you know how to write your signature (and someone else can learn it)?
Is... |
I just tried to demonstrate a simple Web app program to simulate the Http Header Splitting attack but I failed. I realise that this sendRedirect() function has filtered my carriage return and replace to space (%20). I wanna to confirm whether I am right or I doing the wrong way. Any comment and and suggestion are welco... |
Background
I have am developing a service which consists in a small headless client device (e.g. OLinuXino) which will contain sensitive data.
The device will be plugged to a remote network (maybe behind a firewall) and its goal is to open a reverse ssh tunnel to a server automatically (i.e. unattended).
The device wi... |
Say I have 2 separated servers which are one web server (apache) and one proxy server (nginx), I want to use HTTPS for the website running on the Apache.
Do I enable SSL on apache or nginx or both?
If enable on both, is it duplicated setup? because my internal network (between apache and nginx) are very secure.
If bot... |
I have a smartcard that can be read by websites using a Java applet (see http://www.springcard.com/online/applet_pcsc/). I would like to monitor and is to replay packets going from this java applet to the network. The problem is that it uses SSL. I tried to make IcedTea plugin (the open source version of oracle's java ... |
I've the following headers in the e-mail which I've received as spam:
X-Source:
X-Source-Args: /usr/sbin/proxyexec -q -d -s /var/run/proxyexec/cagefs.sock/socket /bin/cagefs.server
X-Source-Dir: silvianimberg.com:/public_html/wp-content/themes/ultimatum
Can you explain how and why proxyexec/cagefs.server is used?
Do... |
I've received the following spam e-mail (with the link to viagra site):
Return-Path: <silviani@server04.funet.co.il>
Received: from server04.funet.co.il (server04.funet.co.il. [212.29.215.70])
Received: from silviani by server04.funet.co.il with local (Exim 4.82) (envelope-from <silviani@server04.funet.co.il>)
From: si... |
We currently have a custom, cloud based application that can analyse then route HTTP and HTTPS traffic through to a domain. So if a client wants to use our service, they re-point their DNS to our application's IP address and our application will analyse the traffic and then route as appropriate.
In order to satisfy our... |
If the suspect's computer is Linux, can you directly use tools such as dd or dcfldd on his computer to acquire the disk image? Or do you need to use forensic live cds like Helix, Penguin sleuth or FFCU on top of the existing OS?
|
Is it possible to configure an access point to use one-time passwords for authentication and encryption ?
|
In Kali Linux whenever I open a binary in Olly Debugger after compiling the c source file, it gives an error:
"The file is not a valid PE file."
No debugging takes place thereafter. Is there any workaround for this?
|
I once read that if I send a DDoS attack via a proxy (for example with LOIC), I won't target the server I am trying to send a DDoS attack to but I will actually DDoS the proxy server.
Most important question: is this true? And if so, why?
For the record: I don't want to do anything evil :)
|
i want to write (and currently writing) a php script to display external images, not hosted on my website. Something like facebook's safe_image.
What I'm currently doing is file_get_contents('pic') (or curl) the url and checking for httpcode and content-type, resulting in a 404 or whatever other code if content-type di... |
I have a gmail address only. It is a copy of the email. I do not have the original email. Is there anyway to trace it?
|
prey project tracks mobile devices and helps to find stolen devices.
Is it safe from privacy perspective? How can I know that it doesn't spy on me?
|
Most webpages from Stack Overflow use http even if you are logged in.
Isn't it a security issue?
Could an eavesdropper steal my session and authentication cookie then impersonate me since it's sent over http?
Edit
I found this great post by Troy Hunt that explains the security of Stack Overflow.
|
I noticed that the brute force times (the time it takes to find a message that hashes to a given hash) of various hashing algorithms seems to be 2^(num_bits / 2). For example, people say that brute forcing SHA1 (without using the vulnerability that reduces the brute force time to 2^69) is 2^80. In fact, if you look at ... |
I am not intimately familiar with Java, so this could be a stupid question.
In a C program I can find buffer overflows or may be a ROP based exploit to run custom code. How is it done in the context of Java? Is it even possible? In Java strings or other data types are all bounded and so overwriting memory is not possib... |
As I understand the paper An Improved Clock-skew Measurement Technique for Revealing Hidden Services (6/23 = pdf page 3), it implies that a NTP client leaks the system's local time because of TCP sequence numbers.
Is this the case or does that paper mean something else?
|
I'm using elliptic curve cryptography (curve25519 and ed25519) for key exchange and signing. The signing and key exchange keypairs are independent. I need two users to be able to verify each other's identity using their permanent ed25519 keys. One solution I came up with was to have each user generate a nonce, have ... |
I'm currently reading about an access control and saw something interesting about smartcard contact & contactless.
From what I understood from the book, smartcard contact is like an ATM Card. Then smartcard contactless is like RFID, which is used for door access at a lot of companies.
I was just wondering, is that pos... |
Our web application offers users with the option to bulk email a bunch of interesting information to multiple email addresses at once. It's fairly easy to register an account with the service and thus it's pretty easy to start spamming people with email they never wanted to receive. You can't actually change the conten... |
A computer hasn't been connected to the internet for 2 weeks but has still been used. It's running Windows 8 and various notices are complaining about virus definitions and updates not being current. What's the best thing to do once it is reconnected to the internet? Just let it sit and update itself? I remember in the... |
I know the hosts file is often deemed obsolete by an actual DNS, but what is/are the best way(s) to secure a hosts file (Current Best Practice)?
Example: Would I delete the hosts file, input known "good" addresses, assign specific permissions to the file/make read only, host on separate single machine/server (like DNS... |
Ok so basic overview of the environment I'm envisioning: Webapp w/ db backend storing sensitive data, possibly phi; standard user:pass auth due to unteachable users.
My idea was to encrypt row data in sensitive tables stored in a db using a key that was derived from the user's password (ie the hashed pw using a differe... |
Upon building a kernel for a small CLI system what option is the best one?
I don't know much about what microkernels can do so bear with me if I'm being ignorant:
In one instance, there are monolithic kernels which allow the user control over services before reaching hardware but this could compromise the kernel itself... |
The default usage of HttpClient and HttpWebRequest .NET classes is setting Credentials property and then asking the class instance to perform an HTTP request. If the target requres Basic authorization the following happens (those classes do this under the hood and Fiddler shows what's going on):
the first request is s... |
Since I was a teenager (that's 20 years ago) and till now-days you see movies with professionals stealing a super-computer and use it to crack a password or a home security system using brute-force (I assume). However they always demonstrate by showing them trying to crack a pin or a password that consists of many digi... |
I am using a VPN to ensure to encrypt my traffic.
I wonder though if I could check somehow if the datastream really is encrypted?
|
For the past days some script kiddie has been scanning our site with w3af and some basic manual checks. Although I know the site is "secure" because I analyze it almost everyday, I'm not perfect and some hole may be found.
I told my coordinator to block that IP, as he (the kid) is always attacking from the same IP, but... |
I'm looking for the typical ways to generate a One Time Password. I know about the HOTP and TOPT. But, in my case, the problem is that the "server" only has a display as interface and the otp-generator-app should work on one or more mobile devices.
Currently I am thinking about using a secure Pseudo Random Number Gener... |
What is the best way to go about getting rid of hackers that have gained access to all my personal computers, (both old and recently purchased) phones, and even random computers I use to simply get emails out to my clients?
(Ive attempted to Explain my story below)
My current solution involves using Deriks boot n nuke... |
I know that Gnome-keyring hashes the master password between 1000 and 2000 times. It picks a random number. I would like to ask where it saves this number, what is the location of that file? As far as I know it needs this count number when decrypting the files with saved passwords.
|
Per the OpenSSL announcement for CVE-2014-3508, sensitive information can be read from the stack.
The OBJ_obj2txt function in crypto/objects/obj_dat.c in OpenSSL 0.9.8 before 0.9.8zb, 1.0.0 before 1.0.0n, and 1.0.1 before 1.0.1i, when pretty printing is used, does not ensure the presence of '\0' characters, which allo... |
I'm trying to find a way to crack XKCD-like passphrases (correcthorsebatterystaple) from word dictionaries. Basically concatenate X number of words from a dictionary file. Right now it honestly doesn't look like there is an easy way.
After the XKCD comic there were plenty of tools like this made, and I could always spi... |
Problem
I'm streaming MP3 files to users. Users are not allowed to share these files. I know that it's in the end impossible to not let anyone download the files. That's not the problem, people can download if they really want (but still I will try to prevent it as much as possible).
No, my problem is that if someone f... |
Should a test/demo/non-prod system be prohibited from using the same HSM as production? Since the same master key would be used for both test and prod it seems like it could raise eyebrows but I can't find any specific guidance around this topic.
|
On credit cards, the security code is printed on the back of the card (usually), on the premise that having a credit-card slip or photo of the front of the card won't allow you to use it fraudulently. Recently, I got a voucher from an airline for losing my luggage. It had a voucher number and security code, but they we... |
I have a web application built with PHP with a login page where the visitor is supposed to enter his / her account's email address and matching password.
Since I'm using the PHP native (slow) hashing function, every time a visitor enters the email of an existing account it will use the password verify function to check... |
I've got a page with a login system where you type your username and password, the salted hash gets pulled down from the database depending on the username ...
SELECT hash FROM db WHERE username = ?
bind theSubmittedUsername
The potential password is then run through a method to verify if its the right one or not.
Is... |
Here's a specific scenario that I have.
I want to have subkeys on my laptop and store the master key safely.
So I went ahead and created new keys:
gpg --gen-key
gpg (GnuPG/MacGPG2) 2.0.20; Copyright (C) 2013 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO W... |
I was playing a little bit with signature algorithms, trying to determine which CAs among the ones I use are currently issuing SHA2 certificates.
I generated a CSR specifying the SHA256 hash (either using gnutls-certtool with the hash param and openssl req with the -sha256 param) and the CSR is clearly displaying sha25... |
453.7 million social security numbers have been issued to date. There are only 1 billion = 1000 million distinct 9 digit integers. This means that if I were to make up any 9 digits, I would have roughly a 45% chance of guessing someone else's valid social security number.
With that said, is it fair to say that if a cri... |
Occasionally on his show, John Oliver points his viewers to the comments section of websites for companies/organizations that have done something putatively nefarious. For instance, when he pointed his viewers to the FCC's website to comment about net neutrality, the FCC was subject to a DOS attack.
Now, in that case, ... |
Are Android apps, specifically Chrome, isolated?
Can other apps listen to other apps' activity?
If so, how can apps be sandboxed?
|
As far as I know,
IDS sniffs network traffic, and if intrusion is detected, reports it.
And IPS sniffs network traffic, and if intrusion is detected, rejects it, and reports why it was blocked. Am I right?
And I read that some IPS can even be configured not to drop packets, just to report them.
Apart from the ability ... |
I thought I would ask this question here as it as to do with security. There are a few people on my Facebook that are close to me in real life. I don't mind it in real life (considering my real life is boring), but they seem to want to know every detail about everything I post on Facebook. One person ALWAYS comments on... |
According to this article on Wikipedia, a trojan horse can allow a remote connection by opening a random port if it is able to bypass the firewall. I'm not much of an expert of routers and Network Address Translation but if a trojan horse opens a connection through the firewall, how does this allow the owner of the tro... |
This question is directed at the .Net framework, but would hopefully be answered to encompass many languages & frameworks.
Let's assume I have a two methods, one which actually decypts data and one which takes the decypted data and returns it to the user:
private string Decypt_Data(string encryptedText, string Encrypti... |
From https://en.wikipedia.org/wiki/Capability-based_security
Capability-based security is to be contrasted with an approach that uses hierarchical protection domains.
From https://en.wikipedia.org/wiki/Protection_ring
hierarchical protection domains, often called protection rings, are mechanisms to protect data and ... |
In Linux, do sudo and su belong to Capability-based security ?
For example, when editing a system file, we usually need sudo or su to temporarily switch to user root. Does this example belong to capability-based security, or to protection rings? Does this example need some system call to the kernel, or just the privill... |
I have a Service written in c# which uses asymmetric Encryption to Encrypt Data, and a client application which Decrypts the Encrypted data received from the service.
How can I do the following things ?
I need to save the private key in a secure way that no one can read it (preferably in DB).
Transfer the public key ... |
I am planning to implement diskless clients for booting Windows 7 clients. I am trying to determine whether to use PXE with TFTP or iPXE with HTTPS or iSCSI.
Are there any vulnerabilities with using PXE and TFTP that may justify using iPXE instead? Does TFTP provide any sort of security?
|
Reading up the XSS attacks on wiki I see that it says an injected script could send data/cookies to the attackers site. How is this achieved? Are there no checks/restrictions on cross origin requests like this from a browser? I thought the CORS spec was specifically done for this purpose and the original site must set ... |
I found this article that claims asymmetric crypto signature of DH-obtained key prevents MITM:
http://www.gremwell.com/ssh-mitm-public-key-authentication
Key idea:
The value of 'signature' is a signature by the corresponding private
key over the following data, in the following order:
string session identifier
by... |
Like when I browse a website using SSL from my laptop that is connected to my router using WPA2. My router talks to my ISP using IPsec.
Is that more secure or do these types of encryption have nothing to do with each other?
|
I am looking into setting up a secure Ubuntu server with daily backups to two different external hard drives that will be swapped with the external hard drive that is stored in a safe deposit box. The hard drives will be encrypted.
My question is, is there a way for Ubuntu to detect the serial number of the external h... |
I have two internal servers that are going to communicate with each other; they speak HTTPS. Is there a best practice for authenticating communications between internal servers?
Short of a best practice, my current idea is to have both the server and the "client" (really another server, but a client in the HTTP sense) ... |
Looking for a link to what I believe was recent research that was similar to "RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis" - but instead of being based on acoustic emanations, the research used electrical signal processing. Physical access to the system was required.
|
I have a bunch of applications, where users need to log in. Not everyone can be a user, each user has to be approved of by an admin. The authentication should be a SSO solution, where user accounts are created and managed in a central application.
My idea is to use OpenID. The central application acts as OpenID-Provide... |
What is the best practice for choosing GPG user id(s)?
I've read various bits of advice, which sometimes even contradict each other. For instance, I've read that one should not use comments, because they are not part of your identity. But strictly speaking, neither is your email address (as it likely will change, and ... |
I know that Tor is used for anonymity while browsing in the Internet. I heard that by using Tor, it is possible to hide my IP. But is it possible to hide my MAC address also?
|
For all of my hobby web projects, I have coded a login system that these projects share. There is no critical data in these projects, the only critical data could be reused passwords. So I try to hash passwords in a very secure way.
My current password hashing algorithm is nothing I would call really secure. And as I ... |
As part of a project that my company is doing, we need to setup a development server.
Let's say our company's main domain is example.com
We need to be able to access the dev server through dev.example.com but unfortunately, company policy does not allow dev servers to have subdomains for the example.com
We need this du... |
Do anybody know from what version of Android did TLS 1.1 started to be supported directly by the OpenSSL version preinstalled in the system?
|
I was surfing a random blog today (Enterprise video conferencing solutions vs Skype), and I came across a claim. I do know that the Skype protocol is a proprietary one, but the author of this blog claims that:
Skype makes use of peer to peer technology in which Skype users become supernodes. This allows Skype to tap o... |
I have just found a cache db wal file from android mobile device. I would like to know what private information of mine is stored in it. I did not make this file. Can I find out who made it?
|
Is it possible to detect port scans on OSX at the kernel level? I would like to write a kext that detects the ip addresses of systems scanning my computers ports.
How exactly does a stealth scan work? Doesn't the kernel get notified when a port is accessed from outside?
|
My question relates to the hardware encryption of samsungs 840 Evo SSD (maybe also other models):
The theory:
Samsung specifies that their SSD encrypts each data with AES by default. So if I choose a HDD password in my bios, I can protect my whole disk (instead of encrypting e.g. my personal data folder later).
If I un... |
I know that it is still not very easy to use PGP for an average user. However, the situation is improving (there are some easy plugins that can even nicely integrate into your GMail webmail). In addition, the press releases of the last time may have encouraged people to think about their safety a little more.
What is ... |
In OAuth, when the user authorizes the client the client gets a authorization code, the client then exchanges this for a token that is used to access the resource.
Why do we need to do this extra exchange of authzcode for the access token? Couldn't just the Authzcode be used directly to get a resource? What extra secur... |
I'm taking my masters in cyber-security and as a student I come across a lot of garbage when doing research. What are sites with the latest security breaches? Thanks for the help in advanced.
My current one so far is www.darkreading.com but I'm sure there is much better out there.
|
Is there a threat from screenshots with blacked out info? That is can someone take out that aftermarket addition so to speak?
For instance
I take a screenshot (using MS snipper)
Then I 'blur/blackout' some info
Is the picture above vulnerable to someone looking through its hex values for that extra green layer and j... |
I understand that having anything sensitive under webroot is not smart; someone may be able to access it via url. However, I do not have a choice with my web host (iPage) as they limit my server space to just the web root.
So my question is: how risky is it to just have sensitive files in a directory in a webroot with... |
I'd like to know if it is possible to set a Virtual Machine as a protection against traceability.
I would want my traffic to be impossible (or hard) to link to my current computer.
I guess that the specific element that ties a traffic to a machine (namely, a person) is the MAC adress.
Thus, I thought that with a Virtua... |
I have an idea for an algorithm. I don't know if I made any mistakes and need some extra thoughts/peer review on it.
This would work as an (almost)zero knowledge proof for sending passwords that can be easily implemented.
registration:
A user sends his password to the server (one time risk).
The server computes a "secu... |
I need to implement an architecture someone else designed.
They have a drupal as user interacting component, and an external authentication module.
To authenticate, from drupal, username and password should be passed to the external authentication module.
Now, the password "lives" inside that external module! And is e... |
This happened to me today, September 12, at about 6pm. Any ideas about what happened, what's going on, and what I should do?
I was at home alone with my 2 year old -- I was feeding her dinner. All of a sudden, I hear my mom's voice saying, "Bob, Bob, where are you?" This was highly unusual, since my mom lives in anothe... |
in a project I have, I'm salting passwords with 3 salts at the moment...
Static salt - hard-coded into the source-code.
Randomly generated salt (using a function designed for generating password salts). This is stored in the MySQL database.
A random number that isn't stored.
When checking the hash, I generate 100 dif... |
I'am curious whether the administrator's has the privilege to access the hangouts chat and the email of employees?
For example, here in our company we are using the gmail as our private email provider. Then we can also use google hangouts, send email to other employees.
If by any chance they can monitor or access, plea... |
I am trying to understand how to implement an OAuth 2 Authorization Code flow when having both a single page JS app and a REST API. The aim is to secure access to the REST API by offloading authentication to the OAuth provider.
Currently my flow looks like:
1)
+--------------------+ +----------------+
| J... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.