instruction stringlengths 24 29.9k |
|---|
We are often advised, or required, to compose passwords containing all of the following: numerals, lower case letters, upper case letters and some special characters. In my view this is not the best advice.
Assuming we need need 80 bits of entropy in our password, that can be achieved in the following ways: 16 random s... |
I've been searching for the answer to this but haven't had much luck.
What is the difference between SSH version 1 and 1.5? Is 1.5 a release of 1? As in 1.2, 1.3, 1.4, 1.5?
Are there any additional security features added to 1.5?
TIA any help much appreciated
|
I'm currently analysing a compromised network(root access has been gained to a workstation and logs show that it has been used for port scanning and service brute forcing attacks on the remaining stations within the subnet) and am wondering what is the most effective attack that can be launched at this point?
Packet sn... |
I just starting to learn about PGP encryption. One thing that confuses me is the difference between a key algorithm, and an encryption algorithm.
For example, lets say I have a trading partner (EDI Trading Partner) who has a 1024 bit RSA public key. Is this key itself encrypted? Is that why it is called an RSA key?
... |
My goal is to be able to encrypt the data so that no one would be able to make use of it if it was stolen.
User data
- the one that will be encrypted
- can be any type of data
Data encryption key
- the key for encrypting and decrypting the user data
- stored encrypted
- does not change
- unique per user
- generated up... |
How can I identify the different HTTP methods supported by a web server, like OPTIONS, TRACE, etc.?
I have tried the nc command on Linux. But it doesn't work. It doesn't show me the HTTP methods supported, some other HTTP headers are returned along with the requested HTML page. Is there another solution?
|
When I try to install latest debian to my pc, the wizard ask me to input
a password to do FDE(full disk encryption).
My questions are:
What algorithm does Debian use? (Truecrypt = AES)
Can I change a password after install?
Is this really safe? I mean, FBI failed to crack Truecrypt. Can the FBI crack Debian or not?
D... |
I have been wondering how and what kind of tools are needed to do single sign on in the following scenario:
1) Alice is logged in to site X hosted by server W
2) Alice navigates site Y hosted by server Z
3) Alice uses her login credentials for site X to access site Y
How does the browser share the login information fro... |
I wanted to make some basic tests on Linux ASLR, so i wrote the following code :
#include <stdio.h>
void funct(){
int a= 0;
}
void main(){
int b=0;
printf("funct : %p\n", &funct);
printf("var stack : %p\n", &b);
}
When I run this code, the second pointer (which points to a value on the stack) seems r... |
Does a One-Time-Password like Google Authenticator or YubiKey protect against brute force attacks with unlimited computer power?
If not, what algorithems are immune to bruteforce attacks against static data on a HHD or USB-Stick? Consider the data is stored on an USB-Storage and you loose the USB-Storage to the attack... |
I found the code below on my customers site. It looks like a typical backdoor hidden with hexadecimal, but I'm not 100% sure.
<?php if (!isset($GLOBALS["\x61\156\x75\156\x61"]))
{
$ua = strtolower($_SERVER["\x48\124\x54\120\x5f\125\x53\105\x52\137\x41\107\x45\116\x54"]);
if ((!strstr($ua, "\x6d\163\x69\145")) a... |
The web of trust is a graph where the vertices are GPG users (actually, their keys) and the edges are cross-signatures. If we put issues of owner trust aside and assume that all participants only sign after checking the key fingerprints, I can trust a key that has a path between me and the key in the web of trust graph... |
Anyone who has generated large GPG public/private keypairs has come across this annoying message: "Not enough random bytes available. Please do some other work to give the OS a chance to collect more entropy!"
Searching for answers, you will often find answers such as these:
Use rngd -r /dev/urandom [1] [2]
Install ... |
I wanted to remove a probably malicious executable, but instead inadvertently double-clicked on it while using an account with administrative privileges. Nothing visible happened during a few seconds, then the executable removed itself (something a legitimate executable wouldn't probably do).
My next steps were:
Ensur... |
Can my ISP read my gmail or other email even when using HTTPS?
I guess they can do that since they are the "man-in-the-middle".
Is there a way to prevent that?
This is related to the news that in my country (Uruguay) the government ordered the ISPs to add a software that can read all emails. (http://www.elobservador.c... |
Once I forget my ID's password. I recovered it and changed it about a month ago but I forget again.
Is there any way to see the details stored in laptop what i typed in past to till now from my keyboard of laptop without using a keylogger?
|
I found the following in every index file of my sites on a server I have. It looks like its redirecting all android users to some spooky Russian site.
$ua = $_SERVER['HTTP_USER_AGENT'];
if(stripos("***$ua",'android') !== false){
header("Location: http://andsecurity.ru");
die();
}
My question is: In the stripos functi... |
I'm trying to implement a cookie-less authentication mechanism for a web API that is stateless on the server (does not store session tokens) and can be load balanced across several servers.
I have implemented a JWT that gets returned to a client (mobile phonegap client) which gets stored in sessionStorage, and added t... |
What are the advantages and disadvantages of having an internal pentest department in a large company compared to external service providers?
|
Why do we need IDS/IPS if a firewall is present?
|
Is it possible for a hacker who has entered a honeypot (running in a virtual machine e.g. virtualbox), to attack real computers on a LAN?
|
I dumbly downloaded a .jar file that contained jRAT.
When run, it stalls, gives a FileNotFoundException, then crashes. When I ls'd, the jar was there. When I cd'd out and back in, the jar was gone.
I'm running Debian Wheezy, and GNOME. Now there is a white block thing in the panel, and when hovering over it it says jRA... |
I've been doing some reading about YubiKey (for example What is a Yubi key and how does it work?) and found the information to be incomplete. It's my understanding, that when the user is prompted to answer a password, all they have to do is plug the YubiKey into a USB port and press its button and then it automatically... |
I have a website where users can generate links. I'd like to limit 10 links to a user, but would also like to avoid requiring a login/email. I was thinking about using the IP Address as an identity system.
Is this a bad idea? I can see two possible issues:
Is it possible for a user to automatically generate IP address... |
I am using hash for authenticating the signature of the message. since the hash will be part of a url that is used for QR code, I would like to keep the hash as short as possible in order to generate a less complicated qr code which is easy to scan.
Now I am using md5 hmac to compute the hash which already generates a ... |
AFAIK, both Xbox one and PS4 use x86 IC very similar to PC. The questions are:
1/ How can they keep those console systems protected from cracker and software privacy? What is the main method to protect copyright on those systems?
2/ Why not apply the same method to protect game/software on PC?
3/ Are those system Xbox ... |
Original question title: What information do EAP-TLS certificates contain
I recently read a couple of topics on stackoverflow, concerning the verification of Wi-Fi access points:
How Are Wi-Fi access points verified?
Why is a CA certificate required for EAP-TLS clients?
The answers to these questions made it clear to... |
I searched extensively for good materials for prevention of XSS attacks using OWASP ESAPI, but could not find any beginner material. Can some one please give me an example how this works?
|
I am connected to the internet in the university where I don't want the administrator or any organization to find out some of the websites and contents I check in them.
I'm afraid that they might trace me back through the IP or Mac addresses.
First I use a Firefox private browsing window to not leave a trace on the com... |
I have a remote service which allows users to SSH login to the machine and they're automatically sent to the (command line) application (without access to a bash prompt, for instance).
In the course of using the application, I would like to request re-authentication.
For instance, when attempting to perform a secure o... |
I have encountered the following article on Washington post:
Russian hackers use ‘zero-day’ to hack NATO, Ukraine in cyber-spy campaign.
As always in such kind of articles the publication sounds too scary. There is almost no information to understand what are they talking about.
Can anyone understand what kind of vul... |
I heard that with UEFI secure boot enabled a custom kernel module that is not signed will not run, hence a rootkit might be difficult to install.
Can a secure boot really block rootkit modules from being installed or is it just capable of blocking rootkits from loading during the system bootup?
secure boot : http://www... |
13:06:05.345111 IP 192.168.1.101.36218 > 157.55.130.174.40033: Flags [.], ack 162, win 237, options [nop,nop,TS val 688796 ecr 596714815], length 0
This IP address is Allocated Unspecified on ripe.net and there are many connections today.
I'm running Ubuntu 14.04 (always updated to the latest).
|
Is SSL the most efficient way for creating a encrypted communication between the user's mobile to the backend server?
I understand that there is a flaw in SSL, so I was wondering is there other alternative that I can go for or should I keep the option of using SSL.
mobile payment in this case is like credit card payme... |
I am interested in how a browser manages secure sessions. As I understand it this is the scenario when logging into a google account:
1) Browser (B) and google Server (S) perform a handshake to create a secure session by encrypting http traffic using TLS or SSL.
2) User (U) enters log in details
3) U is authenticated... |
I used to work in a small office which provided basic desktop support for users.
One day I had to answer a call from a very angry customer and he asked for my boss. He wanted to know how could one email slip through their spam filter/network-based antivirus software (if there is such a thing, that's what he claimed), ... |
Yesterday in my class we learnt how to send a message from Alice to Bob with
the achieved goals of confidentiality, integrity and authenticity.
In order to have a better performance we use a hybrid method with a symmetric and an asymmetric key.
Alice's and Bob's private Keys are signed by a Certification Authority (CA)... |
How does public key pinning work and what problem does it solve?
|
I've started using Sidekick to know when an email is opened or one of the links in it is clicked. What I ask now is how to know if an email I received is provided with a similar tracking system.
With Sidekick, every link is changed (to something like www.sidekick.com/abcdefg123), so that's the easy point. The difficult... |
I really need your help in this one. Today I got scammed by a "trader" for 100$, but I managed to get his IP, reverse DNS and Hostname but I am unskilled in hacking. I need help here, I just want to hack into his PC and prevent future frauds to other people, and of course get some satisfaction because I got lied to. I'... |
All in all, hardware keyloggers are harder to detect.
But if computers can measure the exact voltage consumption of their peripherals, could a hardware keylogger be detected by comparing the normal power consumption of the keyboard with the slightly higher consumption of the keyboard with a keylogger attached?
|
I need to capture/analyse the packets of another system connected to same network, is it possible with Wireshark? I have Wireshark installed on my system; what options do I need to capture packets of the other machine ?
|
I have read in different places that passphrases offer better security and are more user friendly however, I have also read contradictory information thats says longer passwords are not really more secure than shorter ones...so enforcing complex passwords (special charcaters, upper/lowercase ect) would be better?
Any c... |
TrueCrypt retired with a mysterious "Using TrueCrypt is not secure as it may contain unfixed security issues" (source)
Yesterday Slashdot reported VeraCrypt as a better replacement (source) since it bumps up several KDF iteration values (probably just #defines in the code :/ )
Why is this so? I doubt the original issue... |
I'm a building a RESTful stateless API and I'm using a token for authentication.
The problem I'm having is I'm not sure how secure HMAC is.
I'm using a JSON Web Token library that let's me encrypt and decrypt the data I pass in.
Basically, the way it works is this:
If I pass it this JSON:
{
token: "asdasdasdass",
... |
In the attack detailed here, I see that a hacker has actually added a malicious post link. What I do not understand is how the attacker added it to the actual myspace.comdomain.
Obviously this is an old issue but I'm still curious if there is an attack that can spoof the domain name itself.
|
In order to use SSL with a custom domain in Azure Websites you must upload a pfx file with your certificate and private key to Azure. What are the ramifications of trusting Azure with the private key, especially if I want to use a wildcard certificate on multiple sites?
http://azure.microsoft.com/en-us/documentation/a... |
Given the various lengths of RSA key pairs (1024, 2048, 4096) what are the odds of two users having generated the exact same private key?
|
A large amount of people use add-ons such as NoScript or AdBlock to avoid exploitation by malicious JavaScript from advertisments. This decreases the risk of becoming the victim of web-exploits.
But wouldn’t it be possible - if a bug was to be found in one of these popular extensions – that this actually increases the ... |
I just came across this:
https://blog.webmaker.org/one-less-password
Basically a technique for eliminating passwords as the primary authentication mechanism for connecting to a website by replacing it with your mobile device.
In the technical sense is this a more secure system or does it increase vulnerability because ... |
Let's say users log into a system using a voice-print. Software can read the input from the microphone, compare it to the stored sample, and tell the user "There is a 97.5% similarity to the voice-print stored on file", granting access depending on how sensitive it is. Due to the imperfections in microphones, air press... |
Canonical question regarding the recently disclosed padding oracle vulnerability in SSL v3. Other identical or significantly similar questions should be closed as a duplicate of this one.
What is the POODLE vulnerability?
I use [product/browser]. Am I affected?
Is [product] vulnerable to the POODLE attack?
What do ... |
I have an Internet website running on IIS/Windows configured as follows:
The website is publicly accessible for visitors to browse.
A user can login and upload files.
The user will be able to see their files, but not another user's files.
After the files are uploaded they are stored in a directory in the website.
If ... |
POODLE can be exploited on SSL 3.0 and TLS 1.0, as the latter falls back to SSL 3 after multiple connection errors. I wonder how many use these protocols for encrypted data transfer, will it be a major internet security issue?
|
I've got a web based system where a specific site only shall be available on a certain computer. On that computer I have a desktop application. The desktop application and the website communicate through a database.
For example: A user tries to use this "locked" website and therefore needs to authenticate. The website ... |
In order to mitigate the "Poodle" vulnerability, I'd like to disable SSLv3 support in my (in this case, TLS, rather than HTTPS) server. How can I use openssl s_client to verify that I've done this?
|
I am wanting to secure some highly sensitive data in a database. This would mean that the data needs to be encrypted and remain secure for 100 years if it were to fall into adversary hands. I also want to limit the amount of data that is vulnerable in plaintext at a time in RAM. This is so there is less chance of plain... |
I have a ssh key which I use to upload code to github. the private key is located on several locations from where I upload/download data.
I wonder how can I update (or expire) old keys after I update the passphrase on some of the locations.
I wish to avoid a split situation where some location use password X and the ot... |
I'm looking at ways an outsider (i.e. someone without a possible password) of the network could sniff the communication within the network, specifically focusing on WLAN.
This is what I understand about wireless network security:
When we connect to an open wireless access point (so, with WEP) it is possible to sniff t... |
Please note: I'm not necessarily talking about what happens when one shoulder surfs someone inputting a OTP. I'm fairly confident that it's nearly impossible (or extremely impractical) to guess the next or any available password based upon one.
What I'm asking is related to how a seed might be stored in a password list... |
I'm planning to buy an external HDD with hardware encryption, namingly the WD My Passport Ultra 2TB. On the WD website the information about the encryption is sadly scarce so I'm asking here.
How secure are these encryption implementations in general (I think the above mentioned model uitilizes AES-256)
How inter-OS f... |
I'm seeing a virus in our network with some strange headers. Sometimes they are coming (sourced) from a netscaler VIP, other times they seem to come from an Exchange hub server.
How do I determine the origin of this virus? (workstation, etc)
I'm thinking that this has to do with special authentication of the receive ... |
Preface: I have no experience with securing applications whatsoever.
I'm building a web app that uses Google Plus authentication to sign users in. My initial thought is to save the access token that gets returned after sign in and store that on my server and use it as an access token for my web app.
I have a concern t... |
I have a lot (>1000) of credentials for website logins in my Chrome's password safe. Some of them are quite old (> 10 years) and have weak (dictionary) passwords. Some of the accounts have low value to me so that I could just consider them hacked/hackable and abandon them altogether. Other accounts have higher (histori... |
My PKI certificate (Digital ID for email from Symantec, issuer is "VeriSign Client External Certification Authority - G3") expired after 1 year and so I have renewed it.
Do the people I correspond with using S/MIME for encryption and signing of emails have to do anything?
For example, if I encrypt an email using S/MIME... |
I would like to know how to add Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA support to the new versions of Chrome?
Since Chrome v25/26 Google stopped the support of Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA. Unfortunately, I am working on application that require such a cipher and for that I have built ... |
Web Application Vulnerability and Potential False Positives
As a Penetration Tester the application vulnerability scan is a major part of any penetration testing methodology. In the Application Scanning stage there are are several different types of vulnerabilities that may surface. The main ones being...
SQL injection... |
After reading about Poodle secutrity bug, I have disabled SSLv3 on my
servers and browsers.
But there are several clients that do not expose settings detailed enough
via their own means of configuration, e.g. owncloud, uzbl-browser. Also,
come to think about it, it is kind of cumbersome to go through every single
clie... |
My company currently gets malware alerts from several source's i.e. Symantec Endpoint Protection and FireEye. When these alerts are triggered, a manual process of logging onto the user's machine is started with the aim of finding any malware etc. that the security protection may have missed. The process of the analysis... |
This app claims to know when recipients opened the emails that were sent to them. Tracking clicked URLs is fairly straightforward. What I don't understand is how a 3rd party can possibly know when I open their email?
Does web-based email clients automatically provide reading-proof to all emails? Because I remember Outl... |
Some (insert noun here) who seems to be a black hat hacker thinks that I am his #1 enemy and has posted some of my information on his blog. He is mad because I am advertising for others. The information he posted on his blog can be found using Google. He has also sent me some tweets calling me every name in the book. B... |
I am building a new MVC app.
Considering this "forgot password" flow:
1)You enter an email.
2)You press "send recovery password".
3)An email awaits in the inbox, pressing the link in it brings you to "new password" screen.
In phase 1, there is no limitations on the email you provide. (It may not even exist).
Are there ... |
retrieve database data with application server?
|
I don't know how to write this without it sounding like a plug (lol), but it's not. So please don't close-vote it, even if you really want your editor badge. Here goes:
There's this site called av-comparatives that I use and trust to provide me independent antivirus reviews. You probably do, too, actually. While I keep... |
Social networking is a corner stone for a majority of our daily lives, be it communicating with friends, sharing photos or even using social networking for advertising and business promotion. Whilst reading up about this newly discovered complication. It's apparent that websites use a range of SSL/TLS type certificate... |
Here is a link to a screen grab of SSL Configuration Checker by GlobalSign for my domain: SSL Configuration Checker: https://i.stack.imgur.com/Br9t0.png.
Following recent discussions with the host, they concluded:
To achieve "A" rating,we will need to enable "Forward Secrecy" and for
that we need Apache 2.4.X. The cur... |
If my server has only the cipher suites enabled which are defined by TLSv1.2 does that force a client to also use TLSv1.2 or else not be able to connect or can the connection fallback to TLSv1.1 or 1.0 and still negotiate the TLSv1.2 cipher? I do understand that the GCM block modes are TLSv1.2 only but unsure about the... |
And if it is possible, how do you prevent other people from claiming they are you and lost their phone?
Amazon only directs you to a page which does not exist.
http://aws.amazon.com/iam/faqs/
If the authentication device associated with the AWS account is
damaged, lost, stolen, or stops working, you will need to con... |
Pastebin allow you to (along with plenty of other sites) input code into there forms.
I know that this can be a huge security threat if not done properly so I would like to know how they go about this? 'this' Being to allow the input of all data into a form without any security issues.
Edit-
Is anyone able to show a si... |
In the abstract of the AES-GCM RFC, the following passage is prominently included:
[AES-GCM] can be efficiently implemented in hardware for speeds of 10 gigabits per second and above...
Is the ease/efficiency of hardware implementation a significant consideration in cipher suite or encryption mode? If so, how big a f... |
I have 2 text files used by an application.
One is a very large "schema" array (approaching 100,000 lines, JSON format).
The other is a .txt.sig file generated somehow from the contents of the schema file, which is used as a check by the application to verify the schema file's composition.
If you modify even one chara... |
What are the properties of Lock-a-folder?
does it create plain-text temporary files anywhere? (e.g. ntfs artifacts, etc)
does it allow running a program from the folder as if it was a normal folder?
is it easy to backup and restore?
does it use a well known format that could be decrypted easily via a custom made progr... |
I want to pass a secret value needed by an app that runs in a Docker container. This particular container is short-lived -- it starts up, runs a command, and then terminates.
Method 1: Pass the value as an environment variable via the command line when starting the container (Docker supports this as a command line arg... |
RFID/NFC technology is used in credit cards and many other personal identification applications.
Is it possible/how easy is it to clone a card using a simple RFID reader?
In other words, can the retrieved information be reused in the future by the attacker?
|
There is scant information available online on the DH parameters used in DHE ciphers (and the kind that's available is aimed at cryptographers, not systems administrators). Basically, as a sysadmin, I would like to know whether the dhparam.pem file needs to be unique per each private key, or can be shared between vario... |
While disabling SSLv3 from our ssl.conf files to overcome the Poodle vulnerability, I also disabled the SSLv3 ciphers using !SSLv3. With the ciphers disabled, we were not able to access the website through Firefox and IE. The following was the error message from Firefox:
An error occurred during a connection to xxxx.ex... |
I have a web application for testing.
It has a login page.
For unsuccessful login attempts, the developers have made a custom error page so that the response from the web application shows 200 OK, but not signed in.
This is ok.
Now the problem is when a successful login happens, they are redirecting the user with a... |
What is the easiest way for two people – neither of whom are computer specialists and cannot meet in person – to send a password for an encrypted file that is attached to an email?
The two simplest methods are these: telephone the other person and read the password over the phone; or write in the email questions that t... |
Why so many people use different defenitions(attack or vulneraibility) for XSS?
I think that XSS is attack, that exploits insufficient filtering vulnerability. Am I right?
The answer for this question should unambiguously explain what is correct definition for XSS, with additional commenting, why people uses different... |
nmap has the capability to guess the operating system with the option -O.
I was highly surprised that it can find the correct kernel or service pack.
* How nmap guesses the operating system?
* What are common signatures for Windows 7,8, various Linux systems etc?
|
Suppose I have a server provide a POST URL to send CSR. The response certificate then will be used for later SSL client-cert auth connection.
The problem is anyone can POST a CSR to the server and then the server just sign it. Isn't this procedure meaningless?
My colleague suggest the sending CSR itself should also be... |
I trying to perform POODLE attack on a hosted server that I've configured to support only SSLv3. The scenario is I logged on my server and it sends the cookie in response that will be stored by the client. I need not be in middle since I'm the attacker and the victim. So to get the decrypted cookie I have to craft a PO... |
I have removed SSLv3 from my Apache 2.2.15 ssl.conf file with the line
SSLProtocol All -SSLv2 -SSLv3
I have restarted httpd but POODLE tests still show vulnerability exists with POODLE.
What else could be the issue? Thanks
|
Using Ctrl + ← / →, it's a common behavior across different operating systems to jump from word to word (or from blank to blank) in text input fields.
Now I've discovered that this also applies on password fields in Internet Explorer 8 and 11 (I haven't tried it on other versions yet): the actual text is masked with bu... |
We are running a network analyzer . And we log info which are in the HTTP request headers and HTTP response code.
Because in keep alive connection request may come without responses. I push requests to a queue and wait until response. Because my customers requires also response code I have to wait for response header.... |
I have a hunch someone is logging on my wifi. I already know how to see who is currently using my wifi, but can I find out who was using my wifi in the past?
|
How many hostnames can be supported by a wildcard ssl certificate? Is there any limit ?
|
Is having a GUID in a https url secure enough? Are there any security risks of using this way of authenticating users?
https://mywebsite.com/......?Guid=XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
Also what measures can be taken to make this kind of URLs more secure.
|
It's not so much a technical vulnerability, but rather a sloppy security practice by a web design consultancy. They use a CMS which they've augmented with an admin login. As it happens, the admin users are stored in a table and the password field is plaintext.
Having seen which username/password they used for my client... |
Just heard about a new vulnerability and am using the same format as the POODLE guy for this one.
What is the Sandworm vulnerability?
I use [product/browser]. Am I affected?
Is [product] vulnerable to the Sandworm attack?
What do I need to do to secure my [product] with respect to this
vulnerability?
How do ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.