instruction stringlengths 24 29.9k |
|---|
I'm wrapping my head around Mandatory Access Control (MAC) and the well-known Bell-LaPadula model. One limitation that is mentioned with this model is covert channel exploitation. The one example I have learned is regarding Database Object Size:
High clearance subject adds or removes data
Low clearance subject checks ... |
On Linux systems, /var/log/secure (or similar, depending on distro) shows all SSH login activity. Is there a similar log for SCP? If not, what's a good approach to enabling logging of scp activity on my servers? Is it SELinux through /var/log/audit/audit.log?
|
Background
A short sketch of my situation before I formulate my question: I am on a large home network, which is privately administered by a couple of admins. The network consists of a lan and a wireless lan, and controls access centrally by filtering mac addresses (and denying/allowing based on whether they allow that... |
I am looking for table top or card games related to risk management or information security. A kind of "serious" game that can be used as a teaching tool of infosec/risk management.
I know only about Microsoft's Elevation of Privilege.
|
I was wondering if it were possible to know the key if you already know the original value and the hashed result.
For example, let's say :
`$value` = helloworld
`$hmac_key` = 0123456789
`$result` = 6adfb183a4a2c94a2f92dab5ade762a47889a5a1
With only $value and $result, is it possible to retrieve $hmac_key ?
In simple b... |
Can my email account be accessed without the password, and how secure is email if I store my personal documents on it?
And how come Yahoo Mail asks me to tell them my friends and folders names to give it back to me after being stolen?
|
Now that the ICANN is allowing custom Top Level Domain names and often corporate IT workers like to use .local as the TLD for internal networks, if someone does buy the .local TLD what are some possible dangers a user could encounter?
The main example I can think of is spear-phishing attacks. If a company has computers... |
I'm stuck in between a very bad cocktail mix of two very desperate technologies. One is Nessus and other is a Juniper EX2200. When I'm running the two together, the NIC on my HP MiniTower 6200 Pro shuts down completely. This happens roughly 2-3 minutes into the Nessus scan.
My environment is that I have a Juniper switc... |
How does the length of the RSA key and the size of the document affect the time it takes to sign a document using SHA-1 and RSA?
I used CrypTool to check it, but the time does not appear to be larger for big documents. I don't know whether it is problem with CrypTool or the way I used it (maybe I used too small documen... |
What are some of the security concerns and reasons either for or against allowing X11 Forwarding. I have generally taken an approach of not allowing it under the blanket guise of security. Recently, I had a user indicated that they thought that the security implications of resulting from allowing X11 Forwarded sessio... |
For example, if hypothetically an application requirement was to tell users when their password might have failed because caps-lock was turned on, and hypothetically there was no way for the application to actually know that caps-lock was turned on, is there any inherent security risk in storing a hashed password as we... |
I'm reading through Mozilla's Secure Coding Guidelines, and found this statement:
Don't trust any user data (input, headers, cookies etc). Validate it before using it
I'm using the codeigniter framework, and am using the following (mostly built-in functions) for inputs and cookies:
Inputs
global xss filtering is set ... |
I am running a Debian Squeeze VPS and need a good IDS. I have used snort before and it was quite good but i am wandering if there are any other good ones out there.
Preferably compatible with modsecurity.
|
It seems amazing that there is no industry accepted best practice for this problem yet (or maybe just one I'm not aware of):
What is the most secure way for a batch script, a program needing to connect to a resource (E.g. database) via a non user driven interaction to authenticate? Technology agnostic answers are best,... |
With the exception of the SD card data, is Android's built-in password/pin/pattern screen lock enough to protect data stored in your phone's internal storage in case of theft? Or can a thief simply by-pass this by hooking-up your phone to a PC via USB, or open the device and take the internal disk and be able to view w... |
This may be more of a routing question than a security one but I am asking for the reason of security.
I monitor an IPS on a remote network and there have been high alerts triggered recently that match stings within web pages that various users access throughout the day. I have looked into a few packets and seen that c... |
Does anyone know how to perform penetration testing/vulnerability assessment for Microsoft WCF services I couldn't find a tools till now , any tools available and guides are welcome
|
Text books on database systems always refer to the two Mandatory Access Control models; Biba for the Integrity objective and Bell-LaPadula for the Secrecy or Confidentiality objective.
Text books tend to recommend that a combination of these methods be used to meet these security objectives of a DBS - but they often on... |
Are there any scientific papers or publications on GPU password cracking?
|
So I just learned about the jasager attack, via the wifi pineapple and it struck me immediately that it wouldn't work at all if network managers (privately) associated MAC addresses with hotspots and asked for explicit permission if you were going to connect to a new physical device.
Obviously this would be mildly irri... |
My webserver logs revealed a request to /user/soapCaller.bs from 220.226.188.32, which maps to Mumbai, India. The HTTP user agent is called 'Morpheus * Scanner'. My server returned a 404 error.
Obviously it is some kind of scanner, but I don't know any details. Is it searching for vulnerabilities? Does anyone have ... |
I understand the difference between MAC (eg. hmac_sha256, etc.) and Symmetrical Encryption (eg. rc4, etc.), but my question is what advantage does MAC solve that using encryption doesn't?
I know that MAC is used to verify that the message is both from the intended source, and did not get tampered though transmission by... |
I am using Netsparker community edition for checking my app for any general security holes. I'm getting a lot of following XSS probable issue areas:
my_php_file.php?nsextt=" stYle=x:expre/**/ssion(alert(9)) ns="
Code in my_php_file.php is not accepting any $_GET or $_POST parameters.
So how I am supposed to fix thi... |
How secure is the encryption of files when using GPG this way?
gpg -c personal.zip
It will not use any keys or other lines. And how good is it compared to TrueCrypt?
Note that I will upload encrypted files to my email for backup reasons, and bigger files go to 4shared and they will be public. Is it secure (assuming I'... |
I can understand that an app needs explicit permissions to access it if the smartphone has a permission system (e.g. Android, Windows Phone). But how does location get so much intention than others (say, contacts), as I see Windows Phone (and iOS which does not even have a permission system) gives an extra notification... |
First let me clarify that I was trying to crack WPA2 in my home for educational purposes. I followed some tutorials and the message I received was:
key found! [ilovegod]
I know that this is not my WiFi password. Below that I can see
the Master key and transient key and EAPOL HMAC but I don't know how to
translate t... |
I have to use password-based encryption for dealing with metadata files in my application.
While reading, I came across three options: bcrypt, scrypt, and PBKDF2. I read something about them, but I found nothing convincing and satisfactory to help decide which one is best to use.
I would like to have an comparative an... |
I want to confirm through scanning means if the switch is sending syslog packets or not. What i did was run a nmap scan
nmap -sV -p514 xxx.xx.xx.xx
The result came out as closed. Does this mean that syslog service is not activated on the switch is this a correct assumption?
|
What is the ethics and legality of developing and using a tool to grab data on employees in the client's company in social networks such as facebook, twitter and linkedin. The data should then be used in a pentest in social engineering attacks.
Data could be grabbed via the API, or maybe web scraping.
|
Some answers mention that it's possible to inject attacker-controlled HTML into images and therefore provoke XSS.
I guess that this HTML will be processed by browser only if hole exists in browser. So I think it's more a browser issue and there is no need to convert those images, strip EXIF metadata, randomize them at ... |
I am researching SNMP and I read about a scanning tool from SANS called SNMPing. Is this tool still available?
I cannot find anywhere to download it. Sending an empty email to snmptool@sans.org just gets rejected.
|
I'm currently staying at a Four Seasons resort using their Wifi. I noticed that while surfing all non-https sites, my webpage seems to be forced into a frame. For example, here is what google's homepage (over http) looks like on the hotspot:
<frameset id="frameset1" name="frameset1" rows="35,*" framespacing="0" frameb... |
As part of my daily routine, I was SSH'ing to one of the corporate servers.
However this time I was presented with following message
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
IT IS ... |
I have a file encrypted with gpg, using AES256 and MD5. Suppose that the MD5 hash function is broken, but not the AES cipher. Does that make it easy to crack decrypt the file?
|
I have seen many write-ups on "malware research", what information are they trying to gather?
Is it the origins of the malware? Or its behavior patterns? Or something else?
|
Possible Duplicate:
How secure are virtual machines really? False sense of security?
If I download a file in Guest Windows XP machine in Vmware Workstation, which is a virus. Can it affect the Host OS ?
I understand that the work on Guest OS doesnt affect the Host, but I was amazed when Kaspersky detected threat whe... |
I've been making some progress learning about web application security. Right now I'm trying to finalize my strategy for sanitizing input and output.
Background: Users can submit reviews to the site, and those reviews are displayed in certain views.
1) Posting Data. When posting data (using $this->input->post('review')... |
I'm used to logging into my personal Mac which is a password-only field (like waking from sleep mode). Sometimes I have to use a Windows network on which I have an account, but of course I have to type my username first. Still, going right into my password is a natural habit.
In a careless moment recently, I woke a mac... |
This question is for anyone who has tried or succeeded to crack WiFi WPA/WPA2 keys with BackTrack Linux and Reaver. So, I wanted to test it on my WiFi router. I started everything as described here.
But I got this error:
root@bt:~# reaver -i mon0 -b 74:31:70:05:4B:A7 -vv
Reaver v1.4 WiFi Protected Setup Attack Tool
Co... |
Possible Duplicate:
Why should one not use the same asymmetric key for encryption as they do for signing?
I'm new to IT Security. I still can't figure out why using the same RSA key pair for both (signing and encryption) & (signing and encryption) is a bad idea?
Most people talk about why we should not use same key... |
I'm new to commercial SSL certificates and would like to know if a CSR that I generate is safe to send via email?
|
I recently came (Dunno, since when it was happening) to know that malwares can detect if they are running inside a VM like Vmware, and thus can change their behaviour.
So my question is how the security guys going to properly investigate a malwares behaviour, since running them in VM might not be a good idea anymore fo... |
Pardon me for doing the following as I know it is cringed upon (the tv reference) but:
Is there any good reason for the usage of 'tape' recorders? Ex. taping a conversation between criminals, this is done digitally nowadays and the signal can be relayed between multiple points I believe. Is there any good reason to con... |
I'm sitting at a cafe, using their public Wi-Fi. I don't go on sensitive sites; I basically go to a music site and listen to a live stream, for which there's no login. I don't check my email or visit any password-protected sites. Some rare times, I visit Stack Overflow, for which I'm automatically logged in. I'm using ... |
I want to derive a key from a password in a client application that will be used as a master key that decrypts a data key. As far as I understand the salt should be private knowledge. Would it be enough to use the hash (e.g. SHA-1) from a password as the salt parameter for PBKDF2?
Again, as far as I understand, when th... |
One year (or more) ago flash cookies were really a problem, because they could not be deleted from within a browser. They were not managed by the browser but by the flash player. Flash cookies were able to "respawn and recreate" deleted HTTP-cookies.
Is the flash cookie problem nowadays solved? Clearing your cashe and ... |
I came across this question a while ago and read about hole 196.
Is there something I can install on my laptop to protect it against WPA2 Hole196?
Software (such as Snort or DecaffeintID) can be installed on some Windows and Linux laptops to detect ARP poisoning, though it's not practical to manually install software ... |
Our (financial/banking) mobile app requires user to enter username/password in order to get data via webservice calls. Once user is logged in, credentials are stored in global variable until user logs out. If application is sent to background (text msg, phone call etc.) we would start a timer and log user out if app di... |
I have a domain name that I have registered for a long time. Due to a combination of bad luck and oversight, the domain name expired and was rebought by somebody else. I am attempting to buy the domain name back, but I am not sure if I will be able to.
My domain is associated with a google apps account. Could the new o... |
For days now I try to get my head round how to write a secure web application in php, and it turns out to be particularly difficult. The more I read, the more I sink in deep swamps full of vulnerabilities which are not mentioned by kind people like Matt Robinson or Chris Shiflett.
For a few examples, take:
http://sird... |
I need to convince my internal IT department to give my new team of developers admin rights to our own PCs. They seem to think this will create some security risk to the network. Can anyone explain why this would be? What are the risks? What do IT departments usually set up for developers who need ability to install so... |
Here is what happened, I first collected my data into one folder,tar'd it, encrypted it with gpg, put it in truecrypt container, and after that started to copy the container to another place, but before copying got to the halfway mark:
Input/output error
so I opened the container and started to copy gpg files out aga... |
Example scenario:
ActiveSync
Authentication method:
certificate-based authentication AND Active Directory domain username-password
Encrypted on device:
public & private key
AD username & password
Question:
If a certificate is used for authentication for a reverse proxy and a username & password is used for Outloo... |
Possible Duplicate:
How often should an SSH key pair be changed?
I've been using a passphrase-protected 1024-bit RSA key for passwordless SSH via ssh-agent between my own systems for years. More recently I've also started using it for passwordless access to my hosting providers and to source code repositories.
Is us... |
Does anyone know if using Dirbuster [link] to scan for unlisted directories and their contents is (possibly) legal in say the US?
|
Restore session in Firefox
What does this mean, is it related to the session concept which is stored on the web server?
If I stop the computer with my web-app, and then start it again before the timeout set on the session on the server expires, then anybody that starts the computer and clicks "restore session" could... |
After the recent critical vulnerability: 'MS12-020: Vulnerabilities in Remote Desktop could allow remote code execution' I have been looking for a hardening checklist or in the scenario that I am an admin at an organization which allows access by Remote Desktop, what would be reasons to disable it or how to implement ... |
I've been using a 1024-bit RSA key for passwordless SSH between my own systems for years. More recently I've also started using it for passwordless access to my hosting providers and to source code repositories.
Is using the same key pair for an extended period of time, and to access multiple resources, an issue?
|
Another noob question, I know, but something I'm unsure about.
If I somehow magically knew the output of /dev/urandom at any given time, how much would that weaken a given encryption system? Or, perhaps, what kinds of encryption schemes would be most harmed by reducing this randomness?
|
I was reading recently that for AES, the encryption strength is actually the key size/length, so 128-, 192- or 256-bit. While, for SHA-2, the encryption strength is measured against the message digest hash. Is there some sort of an easy breakdown that lists for each algorithm and type, how the strength is measured or d... |
We have a Web Server that mount Centos. Onto that WS there is an Apache (version 2.2.3) and some sites.
You can log on only if you have a certificate (for root user) or via ftp (a restricted partition of data for upload contents, but this is not the point) or through apache that have some permission for write onto cert... |
Can commenting services like Disqus, IntenseDebate, etc. pose a security risk for corporations?
Edit:
What risks could arise when embedding such services into corporate websites?
|
asymetric key is normally used for signature for non repudiation.
But what if one uses EMV CAP in TDS mode as described here http://en.wikipedia.org/wiki/Chip_Authentication_Program ?
Is non repudation possible since the user uses a banking card he cannot pretend he didn't sign could he ?
|
I'm learning exploits from the book Hacking: The Art of Exploitation. The shellcode below was written to enable higher privilege access to files.
\x31\xc0\x31\xdb\x31\xc9\x99\xb0\xa4\xcd\x80
\x6a\x0b\x58\x51\x68\x2f\x2f\x73\x68\x68\x2f\x62
\x69\x6e\x89\xe3\x51\x89\xe2\x53\x89\xe1\xcd\x80
However it sounds the shellco... |
Having a report which shows me to which requests my website responded with a 404, I often find hacking attempts like this:
Some are recurrent and too explicit, like PHPMyAdmin-type requests exploiting the known vulnerabilities in old versions of PHPMyAdmin.
Other are new and related to something which happened recent... |
I was sent a file by a coworker via "sendshare" - my first time using the service. The page loaded a bit slowly and the ads came in before the actual download link. I was in a hurry to get the file - it was a time-sensitive job - and I ended up clicking on the deceptively-designed ad at the top of the page instead of t... |
This morning, I've not been able to login to my Google Account.
Google says, my account has been compromised and I had to walk through account credentials recovery and verify (SMS to verify phone number, changing password)
Now, after securing my accounts again, is there any possible investigation?
I'm interested in:
T... |
Where does the snippet or Javascript get processed when we enter that in input box of HTML page or any URL?
Does it go to the server and come back or does the browser process it?
|
What are the main classification of attacks in network and specially in Snort IDS?!
Is it possible to power up the Snort by classifying the attack into for 5 main groups, for example; R2L, U2R etc.
What snort does in detecting the attack?
|
If we take into account only security concerns, how bad of a practice is it to mount tomcat's manager to Apache2.
E.g.,:
JkMount /manager/html* ajp13_worker
I'm doing this because my company has a firewall which blocks anything but web and mail.
|
Today I found an article about a skype hotfix and noticed that the repo I use on my linux notebook:
deb http://download.skype.com/linux/repos/debian/ stable non-free
Doesn't have the new version, but a very old one.
I'm running my current installation since about one month and I'm afraid I could have been infected. I n... |
My resources are limited, and thus i am wondering what methodology can I apply to know where black box testing is best fit, where white box testing is best fit? Or even where pen testing is better than code scanning or than code review?
Please elaborate in details on the HOW such a methodology would help me determine m... |
My workplace has a standard that plaintext passwords are not allowed in application configuration files. This makes enough sense on its face, in case someone gets access to the config files they don't automatically have access to all the privileges of that application. In some cases it's possible and obviously prefer... |
I'm looking for holes in my current implementation of a chroot jail that I have implemented for a group of users. Is there anything I can do better here?
I utilized the following packages:
RHEL6
openSSH
jailkit
The user runs a standard shell, not the jailkit specific shell, but I configured openSSH to start the users ... |
I was just wondering how could i check my client's Android application for SQL Injection or other similar kind of bugs.
I mean if its an application, where should i write the queries. If through ADB, then how?
|
Its been years since I installed an anti-spyware program. Keyloggers and other nasties might have gotten installed and so I'm looking for a program to flush them out. I used to use Spybot-S&D, but I think in the past it would slow the PC down. Which free anti-spyware program do you recommend/have used extensively?
|
We hesitated between BCrypt and PBKDF2 for password hashing. In many forums and blogs people say something like "In their Special Publication SP 800-132 NIST basically recommends using PBKDF2 for password hashing."
This may be a very important argument for our client (they adore standards). But I still cannot read thi... |
Imagine button after clicking which browser sends XHR http request with GET method. Characteristics:
after executing request sensitive action is performed
sensitive information is sent in GET parameters
HTTP headers X-Requested-With: XMLHttpRequest and X-CSRF-Token with large enough PRG token are sent and are necessar... |
I have several servers that I want to lock down so they're only assessable from inside the network so I need a router that allows me to VPN in. On top of that I want certain ports(22,8022) from my servers location to go through another VPN. Is this possible, what should I be looking for?
|
My IDS picked up our squid proxy server doing a dynamic DNS request. I wasn't aware squid passed DNS requests from the client to the internal DNS server. Is this possible?
Snort Alert:
ET POLICY DYNAMIC_DNS .dyndns.org DNS Lookup - Possible Malware
|
I have a dedicated server and I'm hosting a game, and the web page (using Apache) for account registering.
The server is being ddosed since 8 months ago till today. I've tried to talk with the server provider but they couldn't help me.
When the server is under attack, the remote desktop is down, and so is the webserver... |
I have found out recently that the remote assistant software that we put in a smartphone we sell can be activated by us without user approval.
We are not using this option, and it is probably there by mistake. But the people who are responsible for this system don't see it as a big deal. Because “We are not going to us... |
Solaris 11 now uses SHA-256, so we can have longer than 8 character passwords now, by default. That is nice.
I'll just make it clear that this password is never used as a line of defence. Only a select few can reach the tools that actually make use of the passwords. Other users go through a web-based management system ... |
I'm working on a (non high security) project that currently isn't live but might go live at some point.
We have a REST API (implemented using Restlet and Neo4j) running on a server and an Android client app.
To keep things stateless, we need to send auth information together with each request. We decided to use a MAC-b... |
I've got a function in my app where users can click on a "thumbs up" image and a like is recorded in the database; all that's recorded is the user's ID and the ID of the post that the user liked.
I know user input can't be trusted--am sanitizing user inputs, validating user inputs (server-side), escaping outputs, and ... |
This is not a concern that I personally have,no! In my job environment I've heard from programmers and non programmers that PHP developers always put secret backdoors in PHP that no one has access to but themselves, so if a project goes live and become a big project they can do whatever they want with it, like stealing... |
I've noticed recently when I log on to sites like Hotmail that IE has been telling me there is something wrong with my SSL certs. When I examine the certs, the Issuer appears as "Blue Coat" from "Some-state, AU", and the certification path has only one item in it: "mail.live.com". What's even more strange is that th... |
We plan to add Snort with the firewall for our network to have improved security. The purpose, apart from protection from malicious traffic, is to customize Snort to detect and block specific traffic as per our needs. So basically i will be writing rules for Snort for our specific needs.
But before beginning all that, ... |
I got the following message from Fortify static code analyser.
Incorrect serialization and de-serialization can lead to unpredictable behavior and cause denial of service attacks.
Can anyone explain how this can be serialization and de-serialization can lead to DoS?
|
I know if a person has a GUID from a machine that person can figure out if other guid belongs to that machine.
In a .NET project (csproj and the visual studions solution file) GUIDs are generated. If i were to compile this project would the GUIDs be in my executable thus can a person tell if a programmer develop two di... |
Excuse the naive question (I'm more of a dev than a web-sec person)
In the past I've had webservers hacked and usually i've traced it to some random machines which seem to have been compromised (i assume part of a botnet etc trying to find a way to add my server to the network).
I've always kinda left it there after re... |
Possible Duplicate:
How does changing your password every 90 days increase security?
What are best practices for password expiration policies?
There are some questions that already address this issue:
https://serverfault.com/a/21898
How does changing your password every 90 days increase security?
But they seem to... |
I'm not sure if this is the right SE to ask this question, but it seems more I have a database of files that needs to be encrypted such that multiple people with different passwords/logins to this remote system can access the same files without entering a second set of credentials.
Specifically, I need to be able to su... |
I have a external user getting a weird error in the middle of using my website. The user authenticates, post a search for information, and then with the address of the search results page they get a Request denied by WatchGuard Firewall page with the Reason: IPS detected for "WEB long basic authorization string/Buffer... |
I'm trying to create an extensible platform, where my site will provide a model and some views (both client-side, in the browser) and third party sites may add their own views as well. The goal here is that only my model will make HTTP requests to my server, and the third party views shall only make API calls to my pla... |
I'm building an application where certain sensitive files need to be digitally signed before being stored in the file system using ASN.1 encoding, so they can be verified against a digital certificate (the one corresponding to the private key used for signing) at a later point in time when they're accessed. I'm using t... |
I want to connect some sensors such as Snort and OSSEC to AlienVault SIEM. How can i do that?! Is it possible to send logs via syslog?
|
I'm currently researching what malicious activities can one do with a computer containing a high-end GPU. So far the only uses I found were Bitcoin mining and password cracking. Are there any other possible malicious uses for such computers?
|
Are there a standard method(s) for me to give someone else read-only access to my data?
There are several situations where I may want to give a few people read-only access to some data, but I would rather not give those people my secret passwords that allow full authorization to act as me.
I want to see pretty stock m... |
The VPS is running CentOS and I have full access.
I only looked around using the cPanel installation and already disabled anonymous FTP access.
What other security risks are there with a default VPS install?
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.