instruction
stringlengths
24
29.9k
I'm reading the documentation about Google+ Sign In, more specifically, its server side flow. It says (https://developers.google.com/+/web/signin/redirect-uri-flow) that one-time code flow has security advantages over pure server side flow. It says: "This one-time code flow has security advantages over both a pure ...
Return Oriented Programming is a technique for bypassing DEP which based on ret2libc.. ROP is used for formatting the API function parameters in order to make a reliable shellcode.. I dont get something.. How ROP makes shellcoing reliable?Why should I use ROP instead of the old way ret2libc?
Edit: I mostly used my university's guidelines on how to meet DPA standards and their own. I extrapolated a bit because encryption on a VM hosted by my uni that is already probably encrypted makes little sense wrt. adversaries. The data we manipulate is very sensitive and the website will stay around for a while and be...
I saw some suspicious errors being generated on my site based on pages that were requested. My error is logging the path that the user is trying to access. Because of these errors (and the paths that they were trying to access) I created my own blacklist process where I can blacklist someone from my site based on ip ad...
From my understanding, for incoming packets over IPSec, the Security Association (SA) is identified by the SPI field of the ESP header. Then let's say I have a bunch of nodes where each node wants to be able to talk to each other node using IPSec tunnels (so n nodes, each of which talk to n-1 other nodes). If that is t...
The System I am using Windows 7 host with Cygwin and a virtual machine running Linux. The actual running guest is an Arch Linux ISO. The Objective I want to share files between the Cygwin host and the Arch guest. Possible Solution A good solution seems the SFTP protocol, using the Cygwin host as the server, because SS...
It is quite common that uploaded files (images, videos, etc.) are stored on a file server because of performance and database-recovery-time reasons. But is there a benefit of storing such files in database in terms of security?
I have just received this email from AbeBooks.com: Hello AbeBooks Customer, This is an important message from AbeBooks.com. As part of our routine security monitoring, we have learned that a list of email addresses and passwords were posted online this week. While the list was not AbeBooks-related, we know that many...
To store my Bitcoin safely, I have an offline transaction setup. Computer A is online with a copy of the blockchain, and computer B is offline with the private keys. To make a transaction, I craft it on A, transfer it to B via USB, sign it on B, transfer it back to A via USB, and broadcast it on A. It is possible the U...
When not having priveleges on the session user you're using with sqlmap this warning appears when trying to retrieve table/column names, offering you to brute force names using a dictionary file, do you want to use common column existence check? [y/N/q] y [03:37:06] [WARNING] it's not recommended to use 'AND/OR time-ba...
I'm pretty sure that you all are aware of this vulnerability, but i wonder how to patch this? I have seen this code in a tutorial that it is the way to patch this but still user can access all the files of the current directory: <?php $page = $_GET['page']; if(@strstr($page,'../')){ die('LFI Attempt Detected'); } i...
Microsoft explained USB-key and TPM based BitLocker decryption process on this article. USB-Key process: The steps in the illustrated sequence are as follows: 1- The operating system starts and prompts the user to insert a USB device that contains the USB key. 2- The VMK is decrypted with the key on the USB device. ...
Everybody knows about the dangers of Rootkits / BIOS malware. What do you say about this countermeasure? In order to actually get infected the malware needs to use the OS to 'patch' the BIOS chip. Now consider running Linux OS. What package / tool in OS is responsible for patching / updating / upgrading / writing to ...
Curious if this could be a good alternative to passwords. On a website, user can choose to use a pin instead of password. If she does elect to do this (given option) from then on, her account asks for pin only, and via Javascript pop-up. For users that don't like enabling Javascript, could be good to have a password a...
I might use some inappropriate terminology because I am no expert, but please feel free to correct me where it is needed. I believe that a process has modified some network file on my computer, like the hosts file, in order to reroute my Google searches. The reason I say this is because I have a very fast internet conn...
For limiting the usage of BitTorrent, I must identify BitTorrent traffic. For handshaking, I am simply looking for "19" and "BitTorrent protocol" string. If it is DHT I am looking for ping or id (d1:ad2:id20) commands. All I am doing can be seen in the link I generally catch BitTorrent at ~fifth packet. But sometime...
I want to know what is this cookie reverse engineering and how to do this is simple words. Thanks in advance.
I was researching on internet security. When I reached at section Cookies, I happened to read that the values inside a cookie are generally stored only after encrypting them. But an encryption can be easily decrypted by someone who can tamper the cookies. Considering the fact that if we have tampered the cookie, then w...
My parents just received an email from Gmail: From: Gmail Team [mailto:mail-noreply@google.com] Sent: 14 September 2014 04:25 PM To: MyParents@gmail.com MyParents@gmail.com Subject: Your Gmail address, MyParents51@gmail.com, has been created Welcome to Gmail! You can login to your account at http://mail.google.com/. ...
I am writing a post exploitation module that supports meterpreter sessions. For my module to work, I need to read/download some files from the victim machine that may be small or bigger. I am having troubles when the file is bigger than 2MB. I start to get all kinds of exceptions when I try the read_file method or whe...
I have a question with regards to having full control on the cryptography which you will be using for your own application vs relying on external entities such as certification authorities? What are the pros and cons for each options?
I'm trying to do key exchange using the following scheme. Server generates an RSA-2048 key pair and sends the public part to the client Client generates an RSA-592 key pair (I have to use RSA-592 due to client performance reasons; 592 bits is the minimum key size for encrypting 256 bits using OAEP) Client encrypts...
I know that there are different types of authentication mechanisms available. One among them is the HTTP authentication. What is the danger in using this method compared to other methods?
I've been diving into OSSEC for the last couple of months, but I feel unclear on one of it's alerts. I've provided the alert below. The main difference I see in previous output and current output is that 10108 is no longer being listened on, and previous output doesn't show most of my services that should be listening ...
I've noticed, based on the logging of my NAS, that my IP address is targeted by a hacker. I already took action by automaticly ban the IP address permanently after five unsuccesful login attemps. Unfortunately, the hack is being processed by using multiple different IP adresses, so to me this security attempt is not va...
For security purposes I need to use AES encryption and SHA256/512 in my Django/Python project. I know there are various libraries out there that provide different encryption methods but I can't seem to find a library/package that is FIPS-140 validated. I was wondering if there is solution available for my need? if not...
Can downloaded executables get my MAC address and send it to somewhere else? Also, why is it a security risk to have someone else use my MAC address, considering that it can be spoofed?
I have an endpoint protection from Symantec. Recently, I have been receiving many Symantec Cloud Alert emails. wp-admin/admin-ajax.php?action=revslider_show_image&img=../wp-config.php They have been attacking random domain that is hosted on my server. Most of my website is using a .NET based framework, only a few web...
We have which uses TLS client certificates as it's authentication mechanism between client and server. There is an IT department which wants to run this app through a firewall/proxy device of some sort, (client app is on the internet, server is behind their firewall/proxy device) and apparently they want to modify the ...
Salts are stored in the plain text and readily available with the hashed passwords if the password database is compromised. What if we encrypt the salt using password itself? Doesn't it make offline dictionary attack more difficult as the attacker now has to identify the salt to break the password and break the passwor...
I want to know the basic working of session cookies. When i tried googling, most of the results came were based on any programming language. I am not good at coding. So it will be helpful if someone can explain the working with the format of contents inside the cookie in simple English.
I heard that it is possible to use a proxy server to mask my true IP address and surf anonymously online. Also I have a list of valid Proxy IPs and corresponding ports. How can I use them to get anonymous. I am on an Ubuntu machine now.
Password composition rule is being considered as a burden for the users and some experts are recommending the increase in the password length instead of enforcing users to comply with the composition rules. But my point is that in the absence of any composition rule, user set easy passwords as evident from the analysis...
What are valid issuers of wiretapping requests aimed at VPN providers except the court of the provider's country? Is it possible that country in which jurisdiction VPN provider does not act will issue a wiretapping request which will cause user being wiretapped? Added: For example: I am interested in using VPN of Nethe...
I'm traveling to UK for college and I'm bringing 2x2TB drives with me. I'm concerned about my privacy when going through the border as they might search the drives. So I came up with the following things that I can do: Encryption, but UK (and some other countries) has the RIPA; I'll have to surrender my keys if they r...
Just found this article which basically suggests that electromagnetic emanations can be used to eavesdrop on what you're typing. http://www.engadget.com/2008/10/20/keyboard-eavesdropping-just-got-way-easier-thanks-to-electrom/ My question is, is it possible to secure yourself from such attacks?
I am looking for a mobile device, preferably a smartphone or a tablet, that contains a TPM (v1.2 or 2.0) and provides application access to it through an API. Does anyone know if any such devices exist?
We need to provide a license key to customers for our application. The actual license is XML but we need to encrypt it and then in our program decrypt it. I think it is the following, but am asking to make sure I'm not missing something (the below is updated from encrypting to signing based on the below comments): On ...
I have a networked product that we install on customer networks. The device is does not pass any of the CC data, but only sits on the same network (think Nest or Dropcam). The customer networks sometimes include a POS device. We never receive, process, or even see any credit card information. However, since our custome...
I noticed that today after I scanned a site on the Qualys SSL Labs site that SSL ciphersuites which use SHA1 are now highlighted as being "Weak". It seems this has just happened; I scan sites pretty regularly and haven't seen this before. We have all known for some time that SHA1 has some weaknesses. Does this change r...
A shift cipher shifts every letter of a word by "n" amount and creates new word. The number of possible keys in the shift cipher is equal the size of the alphabet set from which the word is derived. For example if the words are derived from the lowercase letters there are 26 different keys. The word "withcurious" with ...
I have addslashes(htmlentities($userInput)). It gets inserted into my database. (NOT a mysql db) Is it sufficiently safe from xss? Thank you!
I recently received two phone calls where the caller indicated that according to their log activity, MS Office has not been updated lately. They offered to help me get those updates. What kinds of things might they really be looking for? Setting up my machine to participate in DDOS came to mind. Harvesting my machine f...
I'm looking for a captive portal solution that prevents other users from stealing the session key from other active users. (or prevents the cloning the authenticated user's MAC) Is there a reliable way to prevent this kind of local service theft? The easiest solution I could imagine is a https session that sends a he...
After coming across this question in the Hot Network Questions section and reading the related blog post by Google, I'm starting to become curious as to what role these hash functions play in TLS/SSL certificate validation. I was under the impression that an SSL certificate was just a link between a set of domain names...
I have a client that wants me to begin doing research on finding the origin of a persistent attacker to their network and employees. I haven't gotten the specifics yet, but I'm trying to think of ways and what tools I would use to find the origin of an attack. I know of data-mining tools to use but these would be usele...
Our network admin has requested that a single remote employee purchase a separate modem in their house for "work" traffic. I question if this is a legitimate security practice of any kind especially because other employees access company resources from home all the time using their shared home ISP. The one difference b...
I'm just learning about DMARC (DKIM/SPF), so I apologize if my question doesn't make sense. A few days after I installed a DMARC policy on my server I noticed that the reports from yahoo.com contained thousands of 'validated' sends from my mail server's IP. I also received an email from my VPS host saying that one of t...
I am encrypting text files using AES256 (no particular reason, that can easily be changed). Before granting access to a file, I need to verify if a party knows the correct key, but without necessarily having direct access to the system's keyring (for instance, a file could be moved between different machines). I though...
I am starting to take on more and more enterprise clients while working remotely from my home office. I have a pretty secure network at the moment, but I have a lot hardware that I am not using and should be. I am a programmer, not a network specialist, so I would like to reach out and ask for some advice on how to m...
I have recently created a code for hashing password. Can you please give your advice over the security of my code? The function takes a password, then converts it to a number. #include <string> #include <cmath> int mod(int x, int y) { return x - floor((double) x/y) * y; } int crypt(string str) { int z = 0; f...
It is safe to assume that the majority of users accessing the internet also possess the mobile phones. So can we take advantage of this and relieve users of remembering any passwords. Instead of registering users on the website, the site can register their mobile phones. The mobile phone number is being used by gmail a...
Recently media have reported that a file of about 5 million gmail address and password pairs was published on a Russian Bitcoin forum. A media article on the leak Other media have reported that the password is typically not a gmail password and might be used on systems other than gmail where the gmail address is the i...
I've encountered a strange behavior while I was performing a security audit of a web application. Some user controlled inputs were displaying their values, unencoded, into the page that processed the request. After testing a few characters to see if they were encoded/removed, I went for the classic <script>alert(1);</s...
I have read that both of them are conventionally the same. But there must be a few differences which differentiates the two terms. Anyone please explain.
I am trying to implement an application that includes registration, In order to register to the system the user shall enter his organization ID number let's say. To verify the user identity, a verification code will be sent to the phone number stored in the database that meets the entered ID number, I was wondering wh...
Taken from here: Don't worry if the root certificate uses SHA1; signatures on roots are not used (and Chrome won't warn about them. Why are the signatures not used? Are not root certificates vulnerable too? Is there nothing that can be gained from breaking SHA1 to fake a root cert?
I have a (Drupal) website that needs a companion mobile app for some stuff (quite customized, not just creating/viewing nodes). I know I can use OAuth for this, but I was wondering about alternatives (because OAuth is a bit complex, but then again security in general probably is). When you use certain mobile apps (take...
If i set the same password in both linux and Windows, is it easier for a hacker to break the windows password? If so why and how can i create a windows password in the same security level as Linux?
So far I've always been logging the INPUT and OUTPUT chains because I only used iptables as host firewall. Now I'm configuring network firewall which uses iptables, but I don't know whether I should be logging another chains like FORWARD, PREROUTING or POSTROUTING. What security benefits would I get enabling those lo...
Few days ago I heard a professional scammer explaining how he exploits the banks, I cant find the right word to describe his actions, even the word scam does not fit as he is not breaking the law but exploiting it. He was explaining how he gets on a cheap flight and during the journey he buys as much as he can of goods...
i. If I choose random password of length say 15 from the alphabet set of size 94 i.e. from the search space of 94^15, is my password protected against all kind of threats? ii. Will there be any need of resetting such password in the near future? iii. If the password database is hashed and compromised by the attackers,...
I run a windows server 2008 which I connect to both via VNC and via remote desktop. Yesterday I noted when I connected to it via VNC that another user was logged in. See images. Notes: I have no idea what ASP is. It seems to be a guest account when I looked it up in accounts as Administrator. I have no idea what "SCO...
We maintain several wordpress websites which receive regular attempts at brute forcing the admin credentials. Part of our standard rollout package is installing the All in One WP Security and Firewall plugin. Part of the functionality of this plugin is the ability to rename the login page from wp-admin to just about an...
When you sign a PGP/GPG key, what exactly are you saying to everyone who sees your signature? Are you validating the person, or the email address? To explain what I mean, take the following two examples: Validating the person: "I trust that the key 0x559E3EE8 belongs to Bob in accounting; he personally handed me a piec...
A single word can be transformed in so many ways to create the password. With any word of length l there are l! different permutations. Appending digits and symbols to the word create alphanumeric password. Even the leet transformations(replacing a with @ etc) can be applied to create passwords. The number of such tran...
I generally sign all of my outgoing email with PGP. I don't usually encrypt it because most people I send mail to don't have a public key. Anyway, if I send an unencrypted message with a PGP signature to someone in China, will it get blocked or get them into trouble with the government?
I want to download files using Bit-torrent, but I have heard that they can detect when someone is downloading torrents. How can they detect this? And are there any precautions I can do to prevent their further investigations?
Is it in general a security problem not to update your browser. Firefox constantly prompts me to update my browser, but how dangerous is it to not update? As part of this question, I would like to know what that problem exactly is. What are the risks of not updating your browser? What exactly could happen?
I have a raspberry-pi (running GNU/Linux) and I recently allowed my router to forward port 22 (ssh) to the raspberry-pi so that I could log in while away from home. I then noticed a bunch of apparent break-in attempts (failed root logins coming from a chinese ip address) in auth.log, and I have a couple questions abou...
Can someone explain to me what cookie tossing is? and how it can be used to hijack someone's session? and also how can we prevent it? I am a bit confused about this subject.
I've been asked to enable DHE in our SMTP product. I'm stuck on this question: How often should the product regenerate its DHE p and g parameters? I've seen some implementations that use a cron job to regenerate p and g once per day; others (e.g., Postfix) set p and g as source code constants. The most common approach ...
I have a client who claims that some text messages "appeared" on her phone that she did not send. I think she may be telling the truth because it seems entirely too coincidental that these messages were sent just as my client filed for divorce. I am also suspicious because I am told that her husband gave the text mes...
I'm planning on doing a demonstration on how remote administrative tools work for my schools computer security club. I plan on writing a RAT in C++ and demonstrating/explaining how it works. I ran into the issue of dealing with computers behind a NAT, but came up with my own solution. I decided to make the victim act...
Suppose we have website that use MD5 hash in URL like this: http://somewebsite.com/XXX/ where XXX is MD5 hash. Content of this website may have sensitive information like transaction details with personal data. There is no other authorization to this website, so if you have URL you can access it. How safe is it? I mea...
I want to have users log in by entering an email, and then proving that they control that email. I only care that they do control the email, and so want to avoid add another password to the process if I can safely defer to the security guarding access of an email sent to that email account (to cut out a class of attack...
I am doing some unit testing and noticed that if I click (or have multiple people clicking) the same filter very very fast (very precise I know;) eventually I get a "The connection is already open." error. I know that one way to solve this is to open new individual connections for each query each time it's called but I...
Suppose that the passwords created under some specific composition rule "C" is to be tested for the security. One of the way could be to conduct survey on x number of people and measure the average entropy of the passwords created by them. What should be the least value of x so that approximate entropy of the password...
I heard that there are no specific tools available to test and find out the CSRF vulnerability of a website. So from a security testers point of view, how to test for the CSRF vulnerability?
This is my first post and I hope this is in the right section. I've been toying with attempting to crack my wpa password with aircrack-ng and airodump. I've successfully grabbed the 4-way handshake and run the .cap file through aircrack-ng. I know that my password is in the list, but for some reason when it "successfu...
Do GPG/PGP keyservers "garbage collect" old keys which have expired, been revoked, or simply haven't been updated in a decade? Or does the server (theoretically) keep every key it has ever seen from the beginning until the end of time? Is there any other reason keys are removed (such as if spam or abuse was detected)?
I want to send short messages to cell phones.Commonly a short message is no longer than 70 bytes. I need 20 bytes or more holding information and the rest bytes are for signature provided by asymmetric schemes from server. It is because short messages can be easily faked with faked radio towers. My app will get public ...
In many places I heard that people recommend to use the bcrypt algorithm to save passwords into database while creating web applications.I want to know what is the algorithm used to bcrypt a password in step by step.
Consider the SSH protocol: the SSH packet is like [data, SHA1(data)]. The packet is entirely encrypted by a block cipher. The question is, why do we need a strong hash to protect the packet consistency? IMO, simple XOR of all of the blocks would be as secure as SHA1 checksum. The data and checksum itself are encrypted,...
I was recently wondering about how to circumvent malware such as the infamous Cryptolocker a while back and was wondering about the efficacy of having a set of files with known content in a known location and then, in the event of a ransomware malware infection, using these files to uncover the cryptographic key used t...
Why does the finance industry uses 2TDEA instead of 3TDEA? Is there any historical reason or technical limitations like the support by HSMs used in the industry? The paper referred to here says simply that the financial industry has not considered 3TDEA as it does not offer extra security. Triple-DES, noted as 3DES fr...
Where I am in the US, health care providers refuse to send anything through email (e.g. even something as trivial as an appointment reminder). Often they claim that email is not secure. Instead they will send me information (e.g. appointment reminders, messages from my doctor) through voicemail, snail mail, or through...
I had another question in mind, but thought that I should ask this one first. Background: Everywhere I have been in the past has used a tiered policy architecture. What I mean is there is one global Information Security Policy, with general statements on the company's stance on each of the applicable topics of InfoSec...
Imagine this scenario: 1st December 2014 - a certificate is stolen and used to sign malware with 2014-12-01 timestamp. 15th December 2014 - the certificate is revoked. Malware will be prevented from running by systems that check CRLs. 31st December 2014 - certificate expires and is removed from CRLs as suggested by th...
I am dealing with a system (in development) that uses randomly generated (not user provided), unique, strings to authenticate services that will consuming an API. Right now, these strings are stored in the database in plain text. I would like to understand if there is a strong reason to re-engineer this system, so that...
Is it safer or more dangerous to run Windows Update when abroad and using a WPA2 connection to a random cafe's wi-fi? Obviously good news: you get the latest security tweaks. Possible bad news: just how likely is it that you've opened up path for malware to get into the heart of the machine?
My apologies if this question has been asked before. How does a medical practice assure patients that the practice follows excellent computer security practices? Conversely, how does a patient find this out? Some initial questions: Do any of the computers in the office run Windows XP? If so, are they air-gapped? Ditto...
I was reading reasons for clearing page files on workstations with one reason listed is that passwords can be stored in the pagefile and therefore should be cleared upon reboot in the case of somebody compromising the computer physically. So I am posing the question as it doesn't seem quite right. I could argue that...
Are there any methods in java to hide a constant hashed key which is embedded in a class? FYI, the key is used to AES encrypt a password used to authenticate a Web Service which would only take a plain text.
wondering if you could help me. i setup the Dionaea honeypot and have collected 6 or 7 malware files. Unfortunately upon checking the Dionaea logs it keeps giving the error "Couldn't resolve host" for Norman sandbox, Anubis and CW Sandbox. I tried finding the named sites myself but got nowhere, the results googled retu...
I have a site that has the following javascript that is being executed: var t=location.hash.slice(1); $("div[id="+t+"]").text("The DOM is now loaded and can be manipulated."); I was thinking that if I appended the following to the url: #message]");alert('test');// That it would execute the following javascript: $("di...
I am just looking for the meaning of "star" in this property
I want to know what could be the potential risk with the displaying part of this behavior. For the upload part: A form with a file upload for image. Image content is save into Mysql "longBlob" type (It is a requirement) For the display (loadImage.php): A script loadImage.php will receive as parameter the record id. ...
Today I read about port-knocking for the first time. It has been a pretty known concept for more than ten years, but I don't know anybody who uses it for their servers. How common is the usage of port-knocking?
I am reading The Basics of Information Security, 2nd. Ed., Andress, Jason. He says on p.25, "Identity verification is a step beyond identification, but it is still a step short of authentication, which we will discuss in the next section." He then goes on to mention that even if documents proving who one are presented ...