instruction
stringlengths
24
29.9k
Can anyone with access to root CA private key decrypt HTTPS traffic of sites using certificate signed by that CA ? and if yes do he need to be man-in-the-middle or just monitoring traffic is sufficient?
I found this test here for the Shellshock vulnerability follow-up CVE-2014-7169 , which is basicaly doing: echo `env X='() { (a)=>\' sh -c "echo '[Vulnerability CVE-2014-7169 Detected]'" 2> /dev/null; cat echo 2> /dev/null` Is this the correct way to test the vulnerability? And why does it involve sh and not bash? My ...
Considering that RedHat and other major teams in business are conducting an audit in bash and have uncovered a few other vulnerabilities besides -7169 (-7186 and -7187), is it sensible to link /bin/sh to another shell? Both -7186 and -7187 were found by one researcher - Florian Weimer - in just a few days (RedHat has ...
I'm using a VPN service (purevpn) and I notice that google knows my location even when I use noscript and a firefox private window. Is there something I can do to stop this? Remark: I'm living in Brazil which official language is Portuguese. I started a VPN connection using a French server: I went to http://www.whatis...
I'm taking a cryptology course, and one thing that popped up as an idea was the following: Can't one take a "master" key, and generate a key that is as big as the plaintext, to encrypt the plaintext and thereby having perfect secrecy? The strength of course would depend on the size of the masterkey, but that's the case...
I just read the following paragraph in an article from the New York Times about Apple encrypting iPhones by default): Breaking the code, according to an Apple technical guide, could take “more than 5 1/2 years to try all combinations of a six-character alphanumeric passcode with lowercase letters and numbers.” (Comput...
I have been doing Network Scan for our box and Ncircle reported SSL Server support RC4 ciphers for SSLv3. Based on that I did a search and I plan to add to /etc/apache/conf.d/security the following: SSLProtocol -ALL +SSLv3 +TLSv1 SSLCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:!LOW:!SSLv2:!EXPORT So if I understand well...
I have one noob question.I tried to exploit shellshock on my Slackware linux server, but after I connect with reverse shell and User Agent I get that I am apache user and apache user don't have too much privileges, so I think there is no way to anyone can get access to root account or to do anything wrong on system. Am...
I have been hearing about the Bash Shellshock problem since yesterday and am curious to see where in the source code this problem occurs. I have downloaded the source for Bash 4.2 from here. Where exactly should I look for Shellshock in the source code of Bash 4.2? I was able to find this patch information for 4.2 (fro...
I was reading this paper on SSL/TLS from the SANS Reading Room on how to capture and decrypt your own SSL traffic with Wireshark. I wanted to capture the credentials used to login to gmail. When the TLS handshake takes place, the browser and the server agree to communicate over SPDY. SPDY is very new to me. On the wir...
So here is my setup Desktop booting a live version of Kali from a USB drive The standard distro of wireshark that comes with Kali A Ralink RT-3070L High gain antenna My home network as a sandbox. When I run wireshark (with my antenna in promiscuous mode) I only see a very small amount of packets from other machines...
Recently, the new full-disk encryption system of Apple's iOS 8 operating system has been in the news. And soon after Apple's release, Google announced that they will also enable encryption by default in the upcoming version of their Android operating system. My question is: From the security perspective, are the two sy...
Setting the discard option in /etc/crypttab has security implications. From the man page: Allow discard requests to be passed through the encrypted block device. This improves performance on SSD storage but has security implications. Q: What are the security implications if this option is set?
Can anyone let me know the steps to setup a simple Hello World Apache (or other GNU/Linux) website that i can hit over 80 or 443 and exploit any bash CVE vuln; assuming I have a vulnerable bash. I dont have ssh creds to 100% of the boxes, and the bash (rpm) tests only work with credentialed scans. I want to hit the URL...
I would like to install the Dictionary Pop-Up addon for Firefox. I usually don't install any addons, but this one looks especially tempting. I could not find any information on the Mozilla page, whether or not this addon is authorized/approved/reviewed. What are the chances that an addons mozilla.org on is malicious? A...
I'm developing an API system which provides functionalities for a game. Currently, we are using HMAC to prevent simulating requests (let's say, prevent hackers from simulating the game) but because we encountered some issues with HMAC, I thought that it could be better to use a temporary password. Same as what Google A...
So, about Heartbleed again, why does SSL/TLS allow the client to specify the message and its length in the heartbeat requests, rather than sending a simple ping?
So I'm trying to decrypt/decode some text strings. I don't believe they're hashes because they vary in length too much and the software they are used for is able to easily decode them and display them to the user. (I also have no access to the source code) My end goal is to be able to replace the encoded text with my o...
I'm working on a chat system and I want to add it some kind of security (not just HTTPS with SSL since I've read it can be sniffed and decrypted with a few tools). Now, my knowledge in cryptography is scarse, but I'm willing to learn, providing what I'm asking is possible to do: Taking in account there's an eavesdroppe...
A server with vulnerable bash, but cgi enabled only and there are no cgi scripts in cgi-bin. Is it still exploitable ?? If there are scripts in cgi-bin and only server-admin knows about filenames of scripts in cgi-bin. Is it exploitable by attacker? How can attacker get to know about names of scripts in cgi-bin? What a...
I want to use pbkdf2 to generate a key for a symetric encryption (DES, 3DES, may be AES) algorith, that will be used to secure private data between an AS/400 and another computer (probably running Windows). I've been "porting" the pbkdf2 c source code from a FreeBSD repository to an AS/400 (AKA as iSeries or Power syst...
BSD sockets API was released in 1983. As it was implemented 3 decades ago and still being widely used, is it secure in today's scenario where every software has to be actively protected against being hacked. Is it secure enough to be used in a production-level code? I am writing a client-server application which does...
I have a SIP proxy server, that would like to test Shellshock on. I have used this https://github.com/zaf/sipshock to try and test. but this is what I get. So I just want to know generally what is the flow like for this exploit over sip ( anyone with a wireshark capture) Can any one help to interpret what the above ou...
Is there a way to see a source code of metasploit shellcodes. For example: root@kali:~# msfpayload windows/shell_bind_tcp EXITFUNC=seh LPORT=1234 C /* * windows/shell_bind_tcp - 341 bytes * http://www.metasploit.com * VERBOSE=false, LPORT=1234, RHOST=, EXITFUNC=seh, * InitialAutoRunScript=, AutoRunScript= */ unsi...
My program has the following flow: a client sends a CSR to server, the server sends back a client certificate and after that the client communicates with the server to a path that requires a certificate signed by the server (the client certificate) My questions are: I've set clientAuth extended key usage in the genera...
I can understand that an SMS can be traced to the mobile phone which it has originated from and the phone owner has no chance in court but to claim that someone else has used his phone but what about an email from a PC? Most emails are being sent using a browser and a web interface let alone the fact that you hardly fi...
I am wondering whether it would increase security in any significant way, if I would use two separate Firefox profiles, one for normal browsing and the other for private/secure websites, such as my e-banking. In case the normal profile got "compromised/infected/malwarized" in any way, would my other profile still be un...
The plain text and the cipher text have a one to one mapping. Given a pair of those, can there be multiple keys used to generate the same pair? Or can a particular plain text - cipher text mapping be achieved through only a particular key?
Why not get rid of all certificate authorities and all the special kind of SSL certificates there are (extended validation etc. etc.) and instead just require anyone who wanted SSL to write their own self signed SSL certificate and then have them stored in DNS records. Wouldn't that be easier then having to put trust i...
I have a general idea about the Shellshock bash bug (CVE-2014-6271 reported Sep 24, 2014) of what the vulnerability is and how it could be exploited. Here you find examples on how to exploit the original bug CVE-2014-6271: What is a specific example of how the Shellshock Bash bug could be exploited? Meanwhile, a patch ...
All modern password hashing schemes are deliberately designed to include a huge amount of "busy-work", to limit the speed with which an attacker would be able to conduct password hashing attempts. Further, a goal in newer schemes is to reduce the amount by which special-purpose hardware can be made more efficient than...
My company has a few dozen servers hosted on a cloud provider. All but one (OpenVPN host) is closed to the internet. We're using OpenVPN AS which uses certs + Google Authenticator for login. We are very interested in security and we want to minimize the potential damage in case of infiltration of one our employees' com...
I'm trying to setup a website attack vector and I get in error when it tries to load up metasploit. Here's a look at my whole process: Select from the menu: 1) Spear-Phishing Attack Vectors 2) Website Attack Vectors 3) Infectious Media Generator 4) Create a Payload and Listener 5) Mass Mailer Attack ...
Is it noticeable when you use a tool to take a copy of a website? - how likely are you to trigger logs and whatnot when you use tools like HTTrack? Is it actually illegal or 'bad' to do this? - alls you're doing is browsing the website quite quickly, no?
I've read about rainbow tables (which I've confused with hash tables at first). I understand that it uses a reduce function R(x) and by saving start value P(plaintext) and ending hashed value H I can 'save' space by just saving (R,P,H). But I don't understand why I can't do that with hash tables: create "GetNext(x)" fu...
I am running a java webapplication ( Spring 3.2 based) on linux hosts. The linux hosts are vulnerable to the ShellShock vulnerability. Can someone exploit this vulnerabiity on my website ?
I'm trying to detect what web server a particular website uses. For instance whether it's nginX, Apache, Tomcat and so on. I usually use Live HTTP Headers Firefox add-on. The problem is that sites sometimes hide their back-end. Isn't there a way to detect web servers when they're not present in HEADER? EDIT 1: A sa...
My bank uses this rather uncommon policy of authentication. They of course have a password, which has quite strong password patterns like "use alphanumeric characters and symbols, 8+ characters" are enforced. And they have a secondary password, which must be exactly 8 alphanumeric characters. We are supposed to enter t...
I found two ways of checking for the vulnerability CVE-2014-7169 (aftershock or taviso bug) bashcheck uses: cd /tmp;rm echo 2>/dev/null X='() { function a a>\' bash -c echo 2>/dev/null > /dev/null if [ -e echo ]; then echo -e "\033[91mVulnerable to CVE-2014-7169 (taviso bug)\033[39m" else echo -e "\033[92mNot v...
We administer a Java web application from an external supplier where we have access to the source code. The user is able to provide an external URL which is stored in a database and later on embedded in a website generated by the web application. Only stuff members can supply URLs. The URL is properly escaped and embed...
If setuid scripts take arbitrary environment variables, apart from a few black-listed ones like LD_LIBRARY_PATH, from the caller, does this not mean that any setuid script running #!/bin/bash directly or indirectly is a vector for local escalation of privilege? A good answer would be an explanation of why this is or i...
For the last few months, I have been using self signed certificates to provide ssl for a system that I have been building. We are now getting ready to start getting external users on the system, but this will require purchasing a certificate. This system will be one of several others that will be running on a sub-domai...
Even without the immediate code-execution problem of Shellshock trailing commands, to what extent does the feature of bash importing functions from the environment give rise to a comprehensive privilege escalation vulnerability? To be clear, there are many setuid programs, and some of them will directly or indirectly ...
This password database resides on the authentication server which is connected to the Internet. My question is that if the password database is stored on different server than the machine connected to the Internet, will it prevent database breach? The machine connected to the network can load the data from the passwor...
Using Metasploit I am trying to attack an unpatched Windows XP SP3 Virtual machine with the ms08-067 exploit but it just gets stuck at Attempting to trigger the vulnerability. I assume this means the exploit failed for some reason but I would like to make it work. Do I need to enable any GPO or some other change on the...
Basically which python's functions trigger bash (and might be impacted by shellshock), and which don't ? I have come up with this question by seeing in some scripts the popen() function. My question relates to both Python 2 and 3.
I'm using CentOS 6.5 on an existing server and am researching encryption options for compliance. SEDs are out since the controller in this older machine will not support them. That leaves full disk encryption. Does full disk encryption offered by RHEL/CentOS meet the FIPS 140-2 standard?
I'm using an internal API for some commercial software we purchased and it recommends using SSL when utilizing the API; it uses cURL to achieve this and hence the user, pass and key will all be passed to the cURL request. We don't currently use SSL on the site for anything so didn't really want to purchase one just for...
I love the idea of decentralized trust, the web of trust, and the fact that anyone can run their own keyserver and isn't beholden to a centralized point of failure. But does the decentralized "feature" of the web of trust and the keyserver network make it effectively broken as a method of trusting others? Take for exam...
I'm not sure where to post this, so I figured I'd just post it here. CloudFlare is now offering free SSL to all sites. There are two different types of SSL connections, however. There's "Flexible SSL" which runs HTTPS on the Client <=> CloudFlare connection, but regular HTTP on the CloudFlare <=> Server connection. Whi...
We are developing an Android/iOS app. This app tracks the user's GPS coordinates and send them to the server along with other data. The integrity of the sent data is too critical for our service. We would like to confirm that the data is actually coming from our app and not from the user as he/she can send fake data. E...
how an attacker can exploit the below provided feedback form in a company website containing the company’s domain? the feedback form does not store data into a database. The server side code only mails the administrator. plz Do not include DOS attacks. Code for the above form: <form action="serverUrl" method="POST"> Y...
I am writing automated tests for a web application that will be run periodically over night, and I am running into a moderate security issue. In order to make the tests thorough, I am hoping to include live data as test input rather than relying exclusively on mock data generated specifically for these tests (this woul...
I am trying to understand the Networking And Cryptography Library (NaCL). Consider i have a file that i want to send to multiple recipients. PGP or S/MIME supports multiple recipients by encrypting the file with a single symmetric key and encrypting this symmetric key with the public keys of the recipients. is this tas...
I was just trying to check if OpenSSL does use PCSK5 as documentation states when I got the following problem. I first encrypted a plaintext and encrypted it using DES-ECB. I was expecting to see extra stuffed bytes in decrypted message but it seems OpenSSL is pretty smart and remove them before printing the result. So...
I've used mail encryption products like Mailvelope in the past, where you have to create a key pair to encrypt/decrypt data. I understand you have to hand out the public key to others that want to encrypt data back to you, but how should you protect your private key? And do these methods change depending on the softwar...
I'd like to use a chip and pin credit card for authentication, that is to register a card into a system and then use it to log in (for demo/entertainment purposes only so bulletproof security isn't required). I've had the idea of performing a fake transaction (that wouldn't be submitted to the bank obviously) to prove ...
If a website is running on HSTS and it is setting about 20 cookies. Out of those 20 cookies 15 are both secure and HTTP-only and remaining 5 are neither. In this scenario, in what ways can we compromise the security of the website?
I want to encrypt the content on a USB or SD card that can only be decrypted by an app installed on any device or TV. When the USB is not connected to that particular app, it should not be accessible. Is it possible? Which tool or software should I use?
I recently read about 'Mental cryptography' or 'Metal hash' process from this post: Mental cryptography and good passwords (via this message board http://www.codeproject.com/Lounge.aspx?msg=4911235#xx4911235xx). I think, main point of this scheme is this: Do not use the same password more than one login. For this purpo...
I'm trying to capture Request/Responses using Burp on Mozilla. I've configured Burp Proxy on 8080 and have set same proxy settings on Firefox however when trying the Gmail link, Firefox gives "This Connection is Untrusted" error message. While other pages are allowed like Google which also work on HTTPS. Help me with t...
I'm doing some research on the App of my telephone operator. I started Burp Suite on my Mac in proxy mode, then I opened up the App on my iPhone and started to sniff some traffic. I pressed the "login" button and this happened: My username and my password are there, in plaintext. The connection is actually HTTPS, b...
The shellshock bug, and the underlying feature allowing Function Import from the Environment (I'm calling it FIE), have been in bash since at least 1993, before the rise of CGI. At that time, the rest of the Unix/Linux/GNU environment was very different. So at that time in history: Were setuid scripts allowed at that...
I want to know how they work together . for example , we implement IPSec tunnel between 2 routers and we establish Snort IPS on Router 1. when Router 1 get the packets , they're encrypted . Now which one examine them first ? if IPS investigate the packets , it can not detect malicious content . so do we lost IPS becaus...
I want to capture queries to MySQL from my web-application on my Linux-based Server. MySQL port is 3306 and my web-application in on port 8181. So I started using tcpdump as follow: # tcpdump -x "port 3306" Now I browse my application and make some queries to Data-Base but I get nothing in tcpdump console. I also trie...
I got an alert in the newest OSX (newest Macbook Air) and in Eduroam network that my IP address is used by another machine. This is my first time in life. I think I may have been attacked because I was doing some important research at the time of interruption. What can be the reasons for such situation? I think it sh...
My server freezed a few days ago. After restarting I immediately checked the logs and the only trace I saw were some dots in the kern.log. To my surprise, a day or two later these dots disappeared from the kern.log. Should I suspect that someone rooted the box and covered his tracks or rsyslogd somehow magically cleant...
In Https connection asymmetric encryption (with Server certificate) is used during handshake and to create symmetric keys. Am I right that in this case client certificate does no encryption? The server just checks that it trusts that client certificate and that's all?
The question is: How big a problem is this? Looks pretty big to me. With the shellshock bug it is possible to bypass the whitelist of known-harmless environment variables in sudo, as well as other routes to execution of code as high-privileged users. For example variables MAIL and DISPLAY are by default propagated by s...
I have a MySQL database that stores sensitive (personal) data about individuals; and have been tasked with ensuring that this data is encrypted in some way to protect the individuals and their data if e.g. the server should be compromised, or a malicious user from our hosting service provider accesses the server withou...
Given a public ip, is there a way to retrieve what's lying behind? I mean if I use nmap -PO 159.149.xx.xxx I am able to know if the device is alive (responding to ping) and which ports are open. But basically I don't know if it's a switch or a machine (computer running Windows) having a public ip. Any help will be high...
Hi basically I'm doing a vulnerability assessment for at the moment. The setup includes a DMZ with a single firewall and an internal network (3 legged network model employing a single DMZ) but on the network all internal IP addresses have access to all DMZ hosts on any port. What kind of vulnerabilities could be presen...
I am hashing and storing the salt:hash of each user's password in our database. The web server is ASP.NET and the connection string to the database in web.config is encrypted using the IIS config encryption. I could also encrypt the salt:hash before storing it. But the encryption key would also be in web.config, also e...
As seen on https://stackoverflow.com/questions/233507/how-to-log-out-user-from-web-site-using-basic-authentication, there are some interesting ways of logging out a user from Basic HTTP Authentication. Currently I'm sending an HTTP 401 to do so like this: GET logout.php <?php header('HTTP/1.1 401 Unauthorized', true, 4...
Let's say an attacker knows the encrypted content, the decrypted content and the algorithm used: can he get the key that was used to encrypt the content or does it make it easier to find the key out? I think that this may vary between symmetric and asymmetric encryption and between different algorithms. So how secure i...
Assume that I have created a CSR and I am going to buy an SSL certificate with it. Would I be able to use the SSL certificate on another machine than where the CSR was created? Someone I know recently told me it wasn't, but I'm not entirely sure.
Attempting to understand the key factors in evaluating the fitness of security questions. By security questions, I mean for example: What was the name of your first pet? In what city was [insert someone] born? What was [insert someone] maiden name? What is your preferred internet password?
I recall seeing, upon release of Windows 8 a while ago that a number of new mitigations and memory protections had been put in place but i'm unsure if these are the same protections offered by EMET. Based on the bypasses discussed it appears that KASLR and SMEP are something specific to Windows 8 (but not present in EM...
AES 128-bit advanced encryption is fairly simple to break and was wondering if there was any way to use a more secure one? And if so - any suggestions?
I need some inputs for the scenario when the certificate expires which is stored on the embedded device on the network which is a client. Following is the explaination of the setup. The setup explaination A device (client) is connected on the internet. We need to connect this device to the server Currently the server...
i've see a lot of different webserver-attacks against cgi-pages, but have seen the malicious payload only in the headers, might it be User-Agent Cookies Referer Custom-Headers does anyone know if (or if not) one might use POST-Vars or other methods to inject the payload?
May be I am not much clear about the stored procedure. Can someone explain me how stored procedure prevents SQL injection with a simple example using MySql.
I want to draw an architecture diagram for a general ERP application. In that I have come across a confusing point: where should I place the SSL and Firewall? I tried to figure out exactly where the SSL and Firewall fit in the OSI Model. I know we can use Firewall in Application Layer, Network Layer, Transportation La...
A long time ago when Microsoft changed my e-Mail from Hotmail to Outlook the password-interface said that I should only put in the first 16 chars of my password. But my password was longer before. So how could they find out the first 16 chars of my password? Was the password always truncated to 16 chars and then hashed...
Tatu Ylönen (the creator of SSH protocol) and two others authored a report recently, offering their views on SSH key management. I have read the report, and am struggling to identify whether it is corporate astroturfing for the authors' outfits or genuine advice to IT orgs using SSH widely and on a regular basis. In pa...
I was doing some study on Windows services, when I came to know that when an account other than Local System is used to run service, the SCM automatically grants the account certain security privileges like SeServiceLogon right and SeTcbPrivlige, well I understand it needs service logon right but what is this TcbPrivil...
My exact use case is that I'm starting a new job, and I need to transmit sensitive personal documents to support my application. However, the same applies for applying for a loan, buying a house etc etc. In each case, certain sensitive documents need to be transmitted to a certain party, and then possibly sent onwards ...
Given a database like CryptDB, is it possible to determine whether the data is actually encrypted with the correct (specified) onion? I'll elaborate a bit: CryptDB uses onions (chaining) of encryption algorithms to provide an ecrypted RDBMS. It encrypts a column with at least one algorithm and stores the algorithm(s) u...
Provided a user has chosen the remember me option while logged in last time into a web application,how does the web application server identifies the user next time when he logs in? The credentials are stored in cookies in the client side itself? That would make huge security issues right? Somebody please explain
A third-party wants to provide a web app which they say only works if we enable unsigned ActiveX (unfortunately users are required to use IE). I understand what 'signing' is, as well as the basic impacts could be if we run unsigned software, such as having client-side code being execute on the browser. My questions ar...
The PCI-DSS only requires you to protect the PAN if you are storing more than the first six and last four digits. Can an all zero masks be used? E.g. 4111 1100 0000 1234 to make it PCI compliant / not sensitve.
I recently setup an Hardware UTM Firewall. The firewall log shows the this entry every 20 seconds: /var/log/packetfilter/2014/09/packetfilter-2014-09-30.log.gz:2014:09:30-12:06:15 utm ulogd[11342]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60002" initf="eth...
I have three VPC's within AWS and I want to run an automated Nmap scan on all three VPC's every few weeks to make sure nothing has been opened, added, etc. What would be the best way to achieve this?
I know that javascript files can contain malware. However, I am not so sure about CSS files. They only affect how the page is displayed, right? I know that css files can be used for clickjacking but I cannot imagine how they can be used to infect someone. How can a css file be used to compromise a machine? Are there an...
Are there good/established techniques for password/key recovery in situations without a centralised service? (Anything goes, but I'd prefer solutions that distribute the recovery information across multiple places) For example: I can imagine a system where a recovery key is generated, split using secret sharing and dis...
On my laptop I have a well secured Linux installation that I would like to stay this way. It has in the past and could in the future contain confidential medical data I use for my study. I also have a Windows installation I use for more casual usage (games, downloading stuff ext.). Is it possible to hack my linux insta...
If we would want to give internet for free via WIFI, then what would be the better option and why from a security standpoint if we could only choose between: A non-encrypted wireless network setup An encrypted wireless network setup with known password (WPA2/AES/PSK, and the SSID is "The password is: free internet") ...
What security risks would be caused by using a wireless router with no encryption for the wifi and by configuring it with: vi /etc/config/wireless option isolate 1 "HW" isolation. Running OpenWRT. In this way, the wireless clients would be separated and wouldn't be able to capture each others traffic. Or are there st...
I am working on a node.js application that allows users to sign up for accounts using social media. When they do this an entry is created in our database with their email address, and a blank password. When I saw this I became concerned that someone could simply supply an email address and a blank password to log in...
PCI DSS states: "[You must...] verify that only trusted SSL/TLS keys/certificates are accepted." Long story short, our payment service provider just asked us to please stop verifying their certificate after we had some SSL handshake issues. Is this wrong?