instruction
stringlengths
24
29.9k
Registration card in hand, I went to register a newly purchased power tool yesterday. But when I arrived at the manufacturer's site, I was greeted by an ancient homegrown interface that was marked "Copyright (C) 2004" and looked like HTML 1.0. Attempting to connect via https yielded an invalid TLS certificate and no a...
In corporate environments where users bring their own devices for access to corporate resources, how can we determine which Android devices are currently supported and receiving security updates? For iPhones and iPads this is fairly easy because Apple has only declared support for the most two recent versions of iOS.
After reading a bit about WiFi roaming where multiple access points are set up with the same SSID and WPA/WPA2 shared key, I'm wondering how secure the concept of WiFi roaming is. If clients connect to access points with the same SSID (and usually without the user's knowledge), what's to stop someone setting up a rogue...
I just finally got into Keybase and was surprised to see this in the sign-up page: Shouldn't password stretching and hashing be done on the serverside, as we normally don't trust a client?
So you all know about the XSS vulnerability but what I cannot understand is how come injecting a <?php ?> tag doesn't work? eg.: suppose there is a Stored XSS vulnerability in the index.php of a site why it doesn't work if you did this: 1. close the php tag ?> 2.open a new one <?php 3.inject your php code and close i...
Well, today I was browsing the internet and I suddenly got redirected to a chinese hosted malware site and firefox started going crazy. I checked the url on virustotal with my phone and it found other reports where it was a malware hosting and browser redirect site. I turned off my router and modem and then turned my c...
I have this VPS Ubuntu v12.04 Server running with DigitalOcean. Zpanel/Apache/PHP stack was installed on the Server. For the past few days it was occasionally down. Initially, I didn't know what happen until I saw the network graph. There are outbound peaks of ard more than 1Gbps at the time of server down. Here was ...
I have been experiencing DoS attacks: ack scan and rst scan. Now I know these are supposed to be normal and the internet works that way but I experience severe internet disconnection when that happens. I tried to check all the ports I have open using curports and there were some named "EXPLORER.exe". I was not able ...
SSL uses Asymmetric Encryption like this : Server sends a copy of its asymmetric public key. Browser creates a symmetric session key and encrypts it with the server’s asymmetric public key. Server decrypts the asymmetric public key with its asymmetric private key to get the symmetric session key. Server and Browser no...
I'm building a website for an association. Its aim is to, out of other thing, provide an easy mail manager to communicate with the member, stored in a database. This database is always up to date as it used to manage the members status, contributions, etc. That's why I want to use a integrated "custom" webmail instead ...
Nmap's -D option stands for decoy, which means that the attacker can simulate that the attack is coming from multiple IPs, including attacker's IP. From the point of view of the victim, is it possible to identify the real IP and then trace back the attacker?
My Samsung Galaxy Note II was infected by a virus called the "FBI virus." Fortunately, I've managed to remove the malware but my problem now is that all my files have been encrypted. How can I decrypt these files and recover my data?
I have a friend who works on a ship currently in Accra, Ghana. We do video chats but his system is extremely slow and sluggish. There have been times where our only form of communication is IM. A few times I have felt like I was not communicating with my friend. I started to make a note of emails that appeared to com...
I'm trying to install GWT plugin for Eclipse. The Google manual says among other things Eclipse indeed shows that message during installation. The questions are: What exactly does that message mean? Is there a possibility for an attacker to substitute downloaded files to do evil things with my computer? Why would Go...
I was wanting to understand why the code below serves as a proof-of-concept for telling me whether my server is vulnerable or not. Moreover, how does the vulnerability work at lower-level? $ env 'x=() { :;}; echo vulnerable' 'BASH_FUNC_x()=() { :;}; echo vulnerable' So when I run the command below bash -c "echo test...
If a website stores passwords as a salted hash, is it reasonable to accept similar passwords as correct? For example, given the password stackexchange, does it dramatically decrease security if the website were to accept stackexchange, Stackexchange, or STACKEXCHANGE? The thinking here is that this will be easier for u...
I am quite new to encryption and recently played around with blowfish (openssl's implemenation). I am using a 23 character password (case-sensitive alphanumeric random). I estimate the entropy to be roughly 128 Bit (-> wikipedia password strength). My question would be: If someone would acquire my encrypted text, how ...
I get the gist of RSA but I'm mostly self taught so sometimes the phrases I picked to describe something don't match up with the widely accepted terminology. I'm trying to remedy this. I'm working with a NodeJS library called node-rsa. After you load the key, it basically has 4 functions: encrypt, decrypt, sign, and ve...
A webserver I know has this file which is "decrypted" to this file Now my question: What damage can this script do? And how could I inspect it correctly? (The compressed version needs a password and the decompressed version doesn't work) Edit: I found This tool
If I blocked Javascript to be executed. Then what are the ways by which XSS can occur and what are possible threats in case of intranet application.
Why aren't wireless handshakes sent using TLS? It seems like it would be relatively simple to implement, perhaps having the vendor insert the private key into the routers. That way WPA/WPA2/WEP encryption couldn't be cracked by capturing parts of the handshake sent in plain text.
There are already plenty of questions about what to do when websites store plain-text passwords. But this one is a little different. I use a piece of open-source (see below) software for playing games. It requires a user account that isn't directly linked to any services. Log-in consists of entering a username and a pa...
How exactly does Extensible Authentication Protocol (EAP)/Protected EAP integrate into modern security protocols? What I know (or not know) so far... It's used by wireless networks utilizing authentication methods based upon Point to Point Protocol (PPP). I have searched, but can't find an answer that makes sense to ...
I was reading about the Mask malware on Kaspersky. And they mentioned this: “Several reasons make us believe this could be a nation-state sponsored campaign. First of all, we observed a very high degree of professionalism in the operational procedures of the group behind this attack. From infrastructure manageme...
for the node.js crypto command: crypto.createHmac('this is a test', key); What is node expecting for key's encoding? utf8? a binary buffer?
The more I read about impersonating web sites the more I get confused. Does an attacker need the private key of the server in order to impersonate a website or does having the private key simply give him the ability to decrypt the communications? When I think of impersonating a website I think of a collision attack, w...
I want to securely convey a PDF document containing sensitive information from my system to another system. The latter is operated by a different person, whom I trust. However, this person does not have a lot of knowledge about information security and cryptography and thus not very advanced security mechanisms in plac...
I often happen to receive the message: "Unusual traffic from your computer network" while googling in Russian speaking countries. Google explains this with: You may see "Our systems have detected unusual traffic from your computer network" if Google detects that a computer or phone on your network may be sending aut...
State Recv-Q Send-Q Local Address:Port Peer Address:Port FIN-WAIT-1 0 3640 my.public.ip.xx:https xxx.xx.xxx.xx:56206 SYN-SENT 0 1 my.public.ip.xx:55380 suspicious.ip1:9001 users:(("zpanel-cgi",4274,3)) FIN-WAIT-1 0 178 my.publi...
Should i worry about securing PHP sessions for my users? How do hackers steal the sessions? The information users of my site can view is not at all sensitive and if viewed or modified by a hacker wouldn't really harm users, but would inconvenience them. Is storing and checking the IP really necessary? How useful is us...
Is there a mathematical formalism to rank the hardness of the hard problems? In particular I am referring to the sort of hard problems that are typically used in cypher system; such as factorization for RSA or the number theoretic method used in AES. Please note that by a rank system I am not referring the belief that ...
My question is closely related to Why do you need message authentication in addition to encryption? Specifically I am interested in symmetric-key cryptography. I understand that attackers may modify cryptographic messages and the resulting decryption will be an altered message, MACs are designed to solve this. I read t...
An attacker can exploit the bash bug in the DHCP protocol. On searching , how this can be performed , I found "http://www.sectechno.com/2014/09/28/shellshock-dhcp-server-exploitation/" , but could not found any tutorial showing it on linux machine. Please explain, how it can used to attack on clients using dhcp server...
The Google Chrome browser offers a quick way to check a domain's HSTS (HTTP Strict Transport Security) status via the page chrome://net-internals/#hsts (section Query domain). The query result looks e.g. like this: Found: domain: owasp.org static_upgrade_mode: UNKNOWN static_sts_include_subdomains: static_pkp_include_...
I'm trying to test if it's possible to use the PUT method to upload content to a IIS 5.0 server. The WebDav is actualy enabled and the PUT method is allowed for public/internet users: OPTIONS /website HTTP/1.1 Host: www.targetiis.com HTTP/1.1 200 OK Date: Fri, 03 Oct 2014 10:18:02 GMT Server: Microsoft-IIS/5.0 X-Power...
Is it the same as DHCP exhaustion? Can LANs be vulnerable to such attacks or it's against WiFi only?
In my website I'm using an ajax call to get some information from the backend. Even if I'm using SSL someone can intercept the call and replace the real response with a fake one. Is there a way to be sure that nobody changed the content of the response?
Given that it is a frequent requirement to allow unprivileged users restricted access to privileged functions: Jobbing sysadmins sometimes provide this in the form of shellscripts, which are then invoked via a setuid wrapper, like so: int main() { setuid( 0 ); system( "/path/to/script.sh" ); return 0; } (The...
I am interested in the question if there are any possible advantages to securing a given REST API for web clients and mobile apps with http basic authentication (over https of course) over a token-based system as with oauth2 for example (also over https). As I understand it the client has to save some form of a "key" w...
I had Fiddler running and noticed that there are few calls made to following url: http://www.yimgr.com/health_check.js?ts=1412350007104 the content is just this JSON payload { "chance": 0.5, "blacklist": [ "stackoverflow.com", "html5rocks.com", "xda-developers.com", "netflix.com", "shutterfly.c...
First of all, I have a college diploma in computer networking. I tried to get a job as network admin, but because of my lack of experience in that field I did not succeed. So I returned as a help desk technician (I already had 2 years of experience in this). So here I am, 4 years of tech support and I do not like it a...
In reCAPTCHA's API (without plugin), the key part is <iframe src="http://www.google.com/recaptcha/api/noscript?k=your_public_key" height="300" width="500" frameborder="0"></iframe><br> <textarea name="recaptcha_challenge_field" rows="3" cols="40"> </textarea> <input type="hidden" name="recaptcha_response_field...
I am reading an article on buffer overflow protection here. For terminator canaries, I follow the part that if a terminator like a zero is used for a canary, the attacker would have a terminator in the overflow, which will cause the overflow to stop, preventing overflow of return address. But the next sentence is not c...
I'm renting a bedroom in a house with shared wifi, and I'd like to secure myself against any network snooping. I know that using the wifi network basically opens me up to snooping of any unencrypted traffic by anybody who knows the PSK. I'd like to use ethernet only, but I have devices that are wifi-only (like my phone...
I'm using incremental mode (brute force) mode in John the Ripper to crack Linux MD5 passwords. I'm trying to calculate the time it will take to run through all combinations of 12 passwords (with 12 different salts for each password). Using a 95 character count and a max length of 6 characters, there are 735,091,890,62...
I have a standard Dell or Asus-motherboard based computer. it is a hard-disk or RAM. it was hacked remotely. I suspect that they were sophisticated. I am happy to reformat the disk and/or throw it away altogether. alas, because the computer was hacked, I wonder where else attackers could have hidden rootkits that wi...
I heard some people talking about how they had a 3 gigabyte per second drddosser. That sounds all fine and dandy, but what can that actually do? Could it take down a website? To what extent?
Our web application sends a one-time use generated token, in the form of an URL, to clients who forget their passwords. This works except for the case where the client is sitting behind another server that scans their email for URLS and does a GET on the URL. I'm assuming the server is checking for a malicious payload....
With so many devices that have internet connectivity, I really want to put something in place that can alert me if any application or device is communicating insecurely. How would I use something like OSSIM or Snort or something to be able to determine if credentials are being passed. From my thinking, it appears that ...
I just set up a new home network for my mom using a Linksys WRT1900AC router, and it has 24 devices on it right now, yet will have more soon. I can see the network map through linksyssmartwifi.com, yet I would like a log of everything that gets on the network and I want some kind of sniffer to monitor and analyze the ...
I use RSA encryption for sending messages between a server and client. The server program is implemented in C# and the client is an Android application. I want to know if it is possible for a message that is encrypted with a public key to be decrypted by the corresponding private key in the Android application? Is the...
I want to have list of zero day vulnerability, Could any one intuduce some site which annonce them?
I currently have the problem in one of my self-written apps that the app receives user input (JSON) from another app, but I am not able to check if this input is good or malicious. I can't check this because I do not know what is in this data, i.e. I know how the header should look like, but the data changes. But, befo...
There is an embedded device which acts a client. It communicates to a server via POST method whenever it has any data to be transmitted to the server. Embedded device: 1. Acts a Client 2. Does not have any browser capability 3. Cannot be accessed by the user directly. The data is availabe on the server if the user ...
As far as I read, Emerging threats and VRT Snort rules are available freely, and also Pro (fee based). Is there any comparision, or anything to suggest choose one over another? What are the benefits of one over other? Pro's and con's? Thank you,
For a coursework i've got to run the various port scans, i'm having trouble with the FIN scan though, I can't seem to find a system where I can try it, everywhere I try it all ports either come back as Open | Filtered or all closed (which I know is not correct). As i understand it's used to get around stateless firewa...
I'm trying to find information on encryption without key storage, I plan to generate the key using location data, and hardware addresses, so the key is never stored, instead it is generated if the user is on the correct device in the correct location. Does anybody know where I can find any information on something like...
Hydra sometimes fails against my own router known password. Sometimes confirms it was found, and sometimes returns unusual error code (empty). What does this means? dione@saturno:~/misc$ hydra -l admin -p myknownpass 192.168.1.1 http-get -vV Hydra v8.0 (c) 2014 by van Hauser/THC & David Maciejak - Please do not use in...
On doing some digging on the shell shock vulnerability, I found that being able to run the exploit via a remote location depends on whether the attacker actually knows the exact cgi script which uses bash as an interpreter on the vulnerable system. Am I right in this understanding and does this actually limit the scope...
I'm looking to implement stateless REST authentication into an API. I've been reading up on articles here, and have implemented an idea that works, but I was hoping to get some feedback on its security, and any potential improvements. Initial authentication happens over HTTPS Basic Auth. Username and password are prov...
It is often said that security tools such as firewalls, antivirus programs, etc. are only effective against random, untargeted attacks. If you are specifically targeted by an intentional, professional attacker (e.g. state sponsored, NSA, Chinese state attacker, or competitor looking to steal trade secrets) then most of...
i own a small private server (@home) with all necessary features for my backup purposes (Owncloud, SVN, GIT). My target now is to ensure the safety of my data in emergency cases like fire/flood. For this i want to rent or use a free online cloud storage (dropbox,strato,...). My server should backup there all important ...
Many big websites use their own intermediate signing certificates to generate SSL certificates for their domains. The intermediate certificates are issued by the usual root CAs but have a "Certificate Signing" key usage attribute. However I've noticed in some cases that the intermediate certificate is simply granted to...
I found out that an encryption tool encrypts and stores the passphrase entered by the user and used to generate the AES key in addition of the encrypted payload. Pseudocode: key = md5(passphrase) iv = 0 cipher = Cipher(key, "AES/CBC/PKCS7", iv) encryptedpayload = cipher.encrypt(payload) cipher = Cipher(key, "AES/CBC/PK...
As far as I know, Tor selects three new nodes every few minutes. What is the advantage of this? The only thing I came up with was to prevent "Bad exit nodes" from viewing too much of your (hopefully encrypted) traffic. But on the other hand, when using less nodes the chance is smaller to find a evil node at all.
For a course in game theory, we are dealing with BitTorrent and alternative strategies (roughly alternative clients) we can employ to maximize our download speed. One strategy is to over-report the pieces we have and upload junk data. Clients very quickly learned to deal with that, but looking at the spec I noticed tha...
A few days ago I received a Notification from my Android saying that it could not send mail because an attachment was too large. I opened my Gmail App and found 5 messages in the Sent Mail folder that I had not sent. The messages were all to people in my address book. Some had two year old timestamps. Most were empty ...
I am working for a project make a XSS scan tool using python. I have a sample url: http://www.foo.bar/index.php?ids=111 I've found that it has a vulnerability by http://www.foo.bar/index.php?ids="><SCrIpT>alert('XSS')</ScRiPt> A basic different from normal url and xss url is a alert box has been showed in the browser. ...
Alice has decided to stop using electronic communication with her friends and relatives. She believes analog media are generally more secure and private. Her friends and relatives, however, neither care about security nor want to be inconvenienced by it. Alice believes the postal service provides the most cost effectiv...
Is it possible for viruses to use Windows' autorun.inf mechanism to start their execution? If so, is placing an autorun.inf folder a good safety precaution? My reasoning is that it can help in one fo two ways: Best case scenario, the virus cannot write its own autorun.inf file because it is blocked by the folder. Wors...
I have a VMware ESXi server and I want to create two virtual machines with specific public IP addresses. Is it possible for the 2 virtual machines to sniff each other's traffic ? If so how can it be prevented ?
How can I know / see if my windows is using NTML, LM, NTML2 for its user account passwords? What is the standard today, in windows systems?
I've seen a lot of confusion between encryption key size and block size. I feel like I completely understand the difference between the two, no need to explain what they are. But it's when put in practice that I feel like the two numbers get confused. So let's look at the following php code... $encrypted=mcrypt_encry...
I'm building an application with NFC which is a wireless communication protocol. An attacker can modify bits in a wireless communication protocol. I want to prevent this. I know we can't prevent an attacker from changing the wireless signal, but it's possible to detect the modified information. My question is: is this ...
A common pc running bash inside a home LAN network (with a router/gateway providing internet access to the LAN) does not have any contact with the external internet, except browser navigation and the mailreader (with no port forward in the router and with a secure DHCP server). If no one from inside the LAN does attack...
There is a server program running behind a home ADSL modem/router, at a premise that I'll call C; the program listens on TCP port 29401, and accepts connections using a custom binary, non-HTTP, protocol to exchange data. The home router has a port forwarding feature that has been configured to allow (in addition to HTT...
I'm currently attempting to wrap my head around PCI compliance - and what I need to do for my business to be compliant. I would like some confirmation on what I've found so far. I accept payments in a mobile application. We take payment details and pass them to our own REST service (over HTTPS), and then that service i...
We're currently having our website pentested, and looking through our logs, a cookie we set (our allowCookies cookie) has had the value set to http%3a%2f%2fawebsite.net%2ff517a2bc19bdff66d7c64e8a7ad2f043.txt. That text file contains the string 3ac3bbfe0cb16c0ff90fc0c0fcb21764. What kind of vulnerability would this expl...
I use the standard Ubuntu eCryptfs setup to encrypt my home folder. As far as I can tell it encrypts the files and their names, but the directory hierarchy is essentially the same. Every git repository contains the same hooks folder with the exact same number of files. The .git usually has the same number of files and ...
I know all about how ASLR works, and how it has been implemented on both Linux and Windows systems. It provides an extra layer of protection that malware has to take into account. But nowadays with computers being left on for long periods of time ASLR doesn't seem to randomize the address space as much as we would li...
would greatly appreciate some advice from the experts here on this stackexchange. I'm building an application that requires access to a user's resources from a 3rd party application. This 3rd party does not provide any sort of OAuth-like authorization to allow a user to grant my app this type of permission. However, th...
I am using the Internet from my laptop at home, and am not connected to my company's network. I am using my own Vodafone dongle for my Internet connection. I was logged in to Gmail using my work e-mail address and forgot to sign out, and so I want to know if browsing the Internet while logged into this account could h...
I have yet to find a CA that doesn't require personal information for DV certificates. Is this because all of the major browsers and operating systems have a policy to reject CAs that don't require personal information? Or is there some other reason for the lack of privacy-friendly CAs? I'd like to replace my persona...
Is it possible to have an encryption algorithm/implementation that has a "backdoor", that also wouldn't introduce flaws into the encryption? For instance, if you have a master password, once that gets leaked that person now has access to anyone's account. Would it be possible to have TWO passwords work to decrypt: One ...
When you trust a GnuPG key, you can choose one of these five options (and I'm assuming the same options exist in other OpenPGP tools): 1 = I don't know or won't say (undefined) 2 = I do NOT trust (never) 3 = I trust marginally 4 = I trust fully 5 = I trust ultimately If you look at the options as "variabl...
When you trust a GnuPG key, you can choose one of these five options (and I'm assuming the same options exist in other OpenPGP tools): 1 = I don't know or won't say (undefined) 2 = I do NOT trust (never) 3 = I trust marginally 4 = I trust fully 5 = I trust ultimately However, there is a "sixth" option tha...
If we give a security auditing company a working system, and ask them to audit it, and only do that once during a project because it's expensive, this is basically waterfall. How can security auditing be integrated into an agile project without turning it into a waterfall project, and thereby introducing audit fail ris...
I have typically implemented password reset functionality by sending a link that included something like this: http://example.com/pwreset?id=userId&resetToken=superSecretResetToken On my pwreset page I will typically request a few resources from third parties. From what I understand, since I have sensitive information...
I have a simple login form. In it, I put an AntiForegeryToken. @using (Html.BeginForm("Login", "Account")) { @Html.AntiForgeryToken() <p> <label>Email</label> <input type="text" name="Email" value="" /> </p> <p> <label>Password</label> <input type="password" name="Passw...
I have been trying to know the "Certificate Signing Algorithm" ( SHA1 with RSA etc.) using openssl. To start with I tried to see the cerificate using following command, but it also does not show up any signning algorithm details. echo | openssl s_client -showcerts -connect <myhost>:443 Is there a way I can know it usi...
I have just seen that the last release has been pushed out in 2009 and that raised my doubts.
How can I compute the value of the ASP.NET forms authentication cookie?
I'll start off by saying this is a purely academic question; I'm trying to fill some gaps in my knowledge. If a website is vulnerable to XSS, and the target host is another machine that can browse to that webpage, does that then mean that the target is exploitable even if it can't communicate with the pentester's machi...
I understand that running apache/mod_php is safe, but I havn't heard about the case of running php in fastcgi mode (via nginx/php5-fpm), so, anyone can confirm this is also safe?
Let's say I've found a fundamental error with mathematics of a security package. For example, let's say I've found something similar to the Pollard’s \rho-1 algorithm that renders some of the RSA keys vulnerable. If I am a benevolent person, what is the best way to publish this result without wreaking havoc? I am not ...
I read about cross site flashing in the OWASP testing guide. I know the difference between XSS and XSF. But what I am looking for is how attackers perform a XSF attack. How is it possible since there are no entry points for a flash file?
For a project I'm working on, I need to securely send commands between servers. These commands should not be able to be altered, and there should be some security about not being able to just keep resending the request. This is what I've come up with: public static function encryptCommand($command) { $time = microt...
I run a standard laptop at home (dual-boot Fedora 20 and Windows 7; the Windows side is almost never used). Soon my other computer will be working again; it will have Windows 8.1 and some flavor of Linux. What is the best way to lock down the system and make it harder to attack? I am interested in solutions that are pr...
I have a lot of XMAS/NULL/SYN packets (+-1000 packets/day/server) from same IPs (+-120 differents IPs from anywhere) on multiple servers. Logs and firewalls are checked daily and servers are updated. Do I have something to do with those ips (e.g. nslookup, whois, complain to ip owners) ? Something else to do ? Thanks ...
With the RSA encryption algorithm, is there any guarantee that two different entities will not be given the same private keys?