instruction stringlengths 24 29.9k |
|---|
The use case is analogous to accessing a safe box in a bank. There is a per-user key, unique for each user, either generated by the system or hashed from the user's password. And there is a system-wide, master key for all the users. Both keys are required to be able to decrypt data. What's the best way to implement ... |
I found a strange file on one of my servers containing the code below. The file was last modified one week ago at 1.40AM in the night, which is a bit odd.
I have done lots of changes on this site lately, but I can't remember uploading this file:
<?php if(md5($_SERVER["HTTP_USER_AGENT"]) !== "49de371511c1de3bde34b0108ec... |
We're deploying ipsec on embedded devices and getting catastrophic performance from the diffie hellman 2048 group in ike.. afterwards the shared securet is used for 3des, sha1. ipsec negiation is well over 20s for a single tunnel.. the network stack is using openssl to the negotiation
Am I correct to say that 1024 ... |
I have two separate AWS accounts and I would like to a Vuln scanner/IDS on one to scan another.
One environment is a regular AWS account and the other is in AWS Gov Cloud.
Due to limitations within Gov Cloud I was only able to install my IDS on the regular AWS account. I would like to scan my machines within the Gov C... |
we're in the process of replacing certificates with SHA1 hash due to Google's move to let them appear less secure in Chrome. The replacement certificates use a different intermediate CA than the ones we're currently using, but the same root CA. During testing we noticed that our SSL clients would fail to validate the c... |
I am having a discussion with a few coworkers about the best way we can handle SSL certificates within our organization. We have some internal applications that are not using any SSL certificates at all.
My thought is this:
Create an offline, trusted, root CA in a VM
Use this CA to issue certificates for our applicati... |
We are planning to submit a project to our managers about scanning all our office papers and deal with PDF instead of physical-format documents.
For doing that, we are loooking for some support, if there is any, for claiming that scanning documents is a good practice that is aligned to ISO/IEC-27001 policies.
We know t... |
Does anyone know of any recent (past year or two) research into email obfuscation/munging?
All I can find are tests done five to ten years ago.
I'm trying to decide whether it's something still worth doing.
|
Is it fundamentally possible to validate that an unmodified version of your client connects to your server?
I was just thinking about the idea of having my client-side app hash its own source code and sends that as a key to the server with any requests as proof that it's unmodified, but that's silly because anyone coul... |
I'm donating an old Windows XP laptop to a school. The machine will spend its golden years doing only one thing - a process that consists of just three steps:
Recording lectures and discussions with MP3 recorder software (the app is MP3myMP3).
Uploading these recordings over an unsecured wireless connection to a pass... |
I've just stumbled upon something pretty weird, at least for me at this moment.
When i've finished setting up my openBSD 5.5 server, along with the isc-dhcp43-server port. I tried to see if i could find this service by doing a nmap-scan from a client.
But somehow the command listed below fails to find the open port (67... |
Are non-browser applications which do not contain an embedded browser, and merely make REST API calls over HTTPS, vulnerable to POODLE?
And if not, is it unnecessary to disable SSL in such applications?
|
I'm building special extension ( on domain B ) to the present e-commerce hosted on a domain A.
The goal is to redirect user from A to B and back. Similar to technique where user leaves e-commerce site to the credit card payment web interface and then redirected back.
Both domains are secured with SSL/TLS. User registe... |
Imagine having a couple of hundred of embedded devices in the field that need to be remotely managed over SSH or HTTPS.
These embedded devices are exposed on the internet but are installed at secure locations. They are put in an enclosure that cannot be accessed by unauthorised personnel.
The people that require remote... |
Let's assume that a vulnerabled process is set up with an ASLR and DEP against all the imported modules used in this process and there is no way to find a module that is aslr free..
More over, the process is not used by JIT so JIT Spraying is out of scope as well as the heap is not used to cause a buffer overflow(it's ... |
I'm trying to setup a keychain on Apache Tomcat that contains a server certificate that was signed by a custom root ca certificate. (not sure if custom is the right word here, but it's a root certificate that I created myself and that I want to trust). The idea behind this is that all certificates signed by this CA sho... |
I admit that I know very little about torrents. There seems to be very little point in encryption them as an ISP can detect the torrent protocol and a user might then have some explaining to do (which a search of their PC might make difficult).
My question (which shows how little I know of torrents) is this - for HTTP ... |
First of all, my aim is not to do any illegal things.
What does a person need (environment, tools) to catch incoming or outgoing frames from any other person's device which is in the same network? For example, sending login information to a server and I want to catch these frames.
What capabilities are needed for this?... |
I am helping a friend install OneNote 2013 64-bit on their Windows 7 (64-bit, SP1) system.
We went to the official Microsoft OneNote website, www.onenote.com, clicked on 'Windows' (just to the right of 'Get OneNote for free on all your devices'), then clicked on 'Other download options' towards the bottom of the page. ... |
I am trying to intercept SSL traffic from my Android app to test the security. I am using certificate pinning in the hopes I can prevent people from snooping. I have tested by configuring ProxyDroid to route traffic through my proxy, for which I have used both Fiddler and Charles. However, I get different results with ... |
I got a Microsoft Sculpt keyboard, as it seems to be a small improvement over the much loved Ergo 4000. (What I'd give to have an Ergo 4000 with CheryMX Blues...)
On various sites, they have this one snippet:
Proprietary 2.4 GHz with 128 bit AES encryption
Anyone knows what this actually means? Does each keyboard/rec... |
I've been trying to grasp how Protonmail could work.
From what it gather, it works like this:
When you signup, you create an account password and a mailbox password. A PGP private/public key pair is made using the mailbox password.
When you log in, you enter the account password to verify your identify, then your encry... |
I have apache behind nginx on my webserver.
Today my apache stops answering to requests. Investigations shows this situation:
Number of apache processes grows more that 500 but MaxChildren=256 in config (I have mpm_itk, also tried mod_prefork).
server-status shows that 256 of processes were busy and near all of them ... |
I'm doing a project for my high-school and I'm trying to get the best security for my network.
I've made almost everything in my access-point configuration and I have only 3 tcp/ports open on my AP: (Let me show you the nmap scan:)
22/tcp open ssh
53/tcp open domain
8081/tcp open blackice-icecap
So, let's focu... |
We have a campus Wi-Fi at my university and we authenticate through a log in page which to me seems like we are using a RADIUS server.
Every time the page loads my browser warns me that the certificate(s) being used are expired/not valid.
Is there any way to capturer the authentication data (login and password) off the... |
Is md5(sha1(pass)) more secure than md5(pass)?
For example in case of sqli when an attacker can't get our hashing schema, brute force or dictionary attack would be much less efficient.
Am I right or is it pointless?
|
I posted this question over on Crypto.SE, but didn't get any takers and thought it might be more suited for this site as it were, so I'm cross posting it here.
I was recently looking through the Mac OS X 10.10 source code and noticed that it has a Kerberos client, and in addition the bastion of all human knowledge tha... |
I came across a question
You are the network administrator for your company. You have deployed
Windows Server 2008 on all server computers in your company.
You have deployed the Network Policy and Access Service role on a
Windows Server 2008 R2 server named SRV_NPS. You need to configure
SRV_NPS as a virtual pri... |
Let's say that we have our computer inside the local network. Our local network is connected to the Internet by AP+Router that connects to the router in other network which is connected to the ISP.
Now, I'd like to know if there is any chance that we can listen to the traffic between AP+Router and Router(in other netwo... |
yesterday I tried going to several websites but an "untrusted certificate" warning popped up several times. Eventually it went away. I am the latest version of Mozilla Firefox. I also connect to the wifi through my phone which has a Chrome browser. It too popped up with a very similar message. Any reason why this ... |
I have currently been working in an environment where I am connected to a WPA2-Enterprise network requiring me to enter my username and password for the network whenever I connect. I have been asked to do some security analysis and have come across a couple of issues.
When I connect to the network and execute a quick... |
While setting up the IPtables rules for a new server, I set up Postfix and send an email to try it out. To my surprise the email arrived without me declaring a rule for the port in IPtables.
Additionally, I am using SquirrelMail and I had to make a rule specifically for it to being able to connect to using IMAP:
-A IN... |
Between the PHP-as-cgi-bin problem, and shellshock, I've seen 4 or 5 different Perl scripts that, when run, purport to make your machine part of some scary, heinous botnet.
What, specifically, would be the problem if you went through the Perl script, defanged it so that any eval or shell out or TCP or UDP or HTTP flood... |
This might sound broad -- but it has to be considering the details are truly unknown.
Context: Our university (and many more) have begun rolling out mandatory webcam recording for certain portions of the course. This has been sprung on us mid course (and we have no exit option; we must either comply with some of these ... |
which scheme is the better one in your opinion?
I know that both are secure but which is better one?
I know that digested passwords are very difficult or even impossible to decrypt.
Thanks for your comments
|
A friend asked about putting some of his data on Microsoft's OneDrive.
I did some research, and what I learned seems very surprising.
It appears that all the user data on MS OneDrive is store completely unencrypted (it is only temporarily encrypted during transfer). The only "security" is trusting that whomever they h... |
How many 'random' characters should my iCloud password be if it were going up against the BEST hackers and the best hacking software?
|
I am designing a system which requires access control via a strong password and for that purpose will use a password generation algorithm A that produces a strong password of length L >= 32. The system would check for the password and, if the password is incorrect in several consecutive attempts, block the user from fu... |
Recently, CVE-2014-3704 was in the news. This vulnerability allows attackers to execute SQLi without the need of being logged in.
However, I've looked to the available exploits, and I found only exploits that make use of the login form.
Does this mean that when the access to the log in field is restricted (IP white lis... |
I've just realized there was a girl that asked someone to hack my computer and also my telephone (that's why WhatsApp was working strange). Right now I'm trying to protect myself at least on my computer. I'm trying to keep track of my network to understand any pattern despite the common packages like launchd, spotify a... |
For example, I sent a message to Ardi and encrypted it with Ardi's public key. Ardi must decrypt the message with his private key. How can Ardi's private key be obtained in PKI without anyone else knowing?
Thank you in advance for you answer.
|
I've got the Honeyd honeypot in one virtual machine (kali) and nmap in another (ubuntu), the config file looks like this:
create default
set default default tcp action closed
set default default udp action closed
set default default icmp action open
create windows
set windows personality "Microsoft Windows XP Professi... |
I am located in Venezuela right now, and for the whole weekend have been unable to access grubhub.com and seamless.com.
Finally, I tried using the Tor Browser and got access. The same thing happened in January when I tried to access the police department's website in a New York State county when I was abroad.
Is this a... |
In that paper: http://www.delaat.net/rp/2011-2012/p14/report.pdf[1] is reported that USB OTG can be used to have direct DMA memory access and as a consequence have access to all the content of the memory of a device/computer.
I would like to know more about that attack vector.
Any idea about where can I find more infor... |
My friend Paul set me this arithmetic puzzle:
To make 21 from the numbers 1, 5, 6, 7. You can use the operations add, subtract, multiply, divide as well as brackets. You must use each number once.
After I solved it myself, I set the puzzle to another friend Ollie. He thinks it's impossible. How can I prove otherwise ... |
I have an AP at home and I'm trying to secure it as much as I can. I found an bug by accident. My AP has 3 ports opened:
22/ssh
53/dns
8081/blackice - icecap
What I found is that my port 8081 is running the lighttpd software for accessing the AP remotely. It wouldn't be anything special, but actually I did an nmap... |
I've looked at a lot of VPNs, and "what's my ip address" sites confirm that outsiders can't tell where I really am when I'm using them, but I haven't been able to get my own WiFi yet, so I don't know what privileges they have. Can they tell that a proxy server is being used by their network, even if the person using it... |
I am looking to encrypt a few drives of mine, and my ONLY interest is security. It is OK if my VeraCrypt volumes are not compatible with TrueCrypt, and vice versa.
There is a lot of talk about "TrueCrypt is dead" and it seems there are two forks out there now gaining momentum. The one more interesting to me is VeraCr... |
When running an NMAP scan of my internal network (192.168.1.0/24) from my Mac, NMAP sees all hosts as live.
It also believes there is a port 80 http service running on every IP when I do not have 254 hosts configured on my network.
Although oddly enough, telnetting to any IP on port 80 does respond with a connection,... |
I've got the following situation: A web server located in a DMZ receives file uploads from web browsers. The uploaded files are stored on the web server's file system. In the next step, these files must be forwarded to another server (let's call this the internal server) in the internal network. For the last step, the ... |
Is it possible to detect whether or not a visiting computer is using OpenVPN to tunnel from a remote location? I know that through packet inspection I can determine an OpenVPN connection between the end-user computer and the OpenVPN server regardless of port, but what about detection of the end-user computer using Ope... |
Open Whisper Systems claims that its TextSecure messaging is end-to-end encrypted, but at the same time there are now some rather serious allegations of how it might be betraying its users.
If I understand it correctly, it seems they use a central server (or something similar) and therefore might store (and pass on if... |
Has anyone come across a 2.5 SSD or HDD that has a physical read-only switch similar to this? Or an enclosure that can render a hard drive read only?
|
I am learning Burp Suite(Free Edition v1.6). I have set it up with the default settings. The proxy listener is listening to 127.0.0.1 on port 8080 and Certificate option is set to 'Generate CA-signed per-host certificates'. I am using Firefox 33.0.2 and have configured the proxy settings appropriately. When I try to br... |
I want to implement an HTTPS client using pure C. I have implemented an HTTP client, and it works just fine.
My question is: I know the HTTPS protocol does some kind of negotiation to announce what ciphers etc. it supports to the peer. Is it possible to announce that it supports no ciphers, i.e.: like a null HTTPS sess... |
I'm trying to understand the CIA triad. I read that all three parts of the triangle exclude each other, but I don't understand why you can't have full integrity and full confidentiality?
I figure you get integrity with encryption and maybe some other restrictions, but how does that hurt confidentiality?
Thanks.
|
Tor network is considered to be a main tool for achieving network anonymity. But it is of common knowledge, that Tor was created by programmers in US Navy. Yet the main "spy" on the net is considered to be NSA, another "department" in US Government.
What are the reasons to believe that Tor doesn't just log all the conn... |
Note: this is a cross post from my question on SO. Feel free to keep the one in the more relevant location and close the other.
We have a rails app which will be deployed on torquebox/jboss. (This in a way does not matter too much for the question as it would apply to any Web app, not just a Rails one.) It retrieves ce... |
As the question already states, I'd like to know if the dh1024.pem file, generated by ./build-dh in openvpn, is dependent on the ca.(crt|key) file.
The reason was that I needed to ./clear-all the keys, but kept the dh1024.pem file open in an editor, and re-saved it after clearing the keys. Then I went on with creating ... |
Are authentication mechanisms based on UNIX domain sockets (Linux) secure? And more specifically, are the respective MySQL and PostgreSQL implementations on Linux secure?
The background for my question is: I want to get rid of having to manage all the database user passwords used by various web applications when access... |
https://en.wikipedia.org/wiki/HTTP/2
Earlier, encryption method TLS 1.2 or greater was planned to be
mandatory as part of the protocol. However, in lieu of consensus for
mandatory TLS, an optional unencrypted mode exists in addition to
required support of an encrypted mode. Some implementations, such as
Firef... |
https://en.wikipedia.org/wiki/HTTP/2
I know that a HTTPS connection provides:
Authenticity: a website that I'm visiting is the real website that I intended to visit.
Integrity: the data that is sent between the two endpoint is not altered
Encryption: the data that is sent between the two endpoint is encrypted
The q... |
Four years ago, I discovered that an applet on my college's website sends SQL queries directly to a server application. The databases contain nominal and personal information about students and grades, and possibly more (SSNs?), but I'm not sure as I haven't tried anything, because I'm a good person.
In December 2010, ... |
The question is not professional, but what I'm trying to say is...
Is there any way to inject or force the DNS server to attach/change an IP address for some site. For example, I'm running an apache on my machine and I have my sniffing website on it. I'd like to know how to attack the DNS which is going through port 53... |
I recently discovered nmap and pointed it at my router out of curiosity. It found that ports 3333 and 5555 are open but doesn't recognise either service. I investigated and found:
I can successfully make TCP connections on both ports.
On port 3333, after I connect the router sends '0NTP00-00-00MAC00-00-00-00-00-00'. N... |
There are similar question about how to prove YOU sent an email, but I want to know if it is possible to prove a 3rd party sent an email to me.
An individual sent some very threatening emails to my company, enough to warrant providing the email copies to authorities. Now, this individual is claiming he did not send the... |
This morning i received this funky looking email from Cerys Evans about a private message he sent my way. First and foremost I want to mention the lack of design talents this attack employed and imagination. The member id of 16666 was immediately suspicious.
here is what I did to backtrack the attack.
|
It seems that one of the weak points in LUKs encryption is that the LUKs header can be a single point of failure if you do not create a backup header for it.
My question is: What methods of securing your backup LUKs header do you take to ensure it is not recovered by someone else?
Possible options that come to mind for... |
I building an online banking service in ASP.NET and my objective is to implement all possible security measures. Currently at database level I am using RES 2048 bit encryption to encrypt database columns that contains confidential data. Also I am planning to use SSL on my network. I am protecting front end from CSRF a... |
Testing for Poodle attack vulnerability.
Also, I could sniff the packet from wireshark and see the TLS version. I want to find if there is any other way available by which I can test this?
|
I have been making use of Burp Suite's active scanning functionality for some of my recent web application assessments and I had some questions about the active scanners ability to remove urls from the scan queue that have particular characteristics such as being a media response or having a certain file extension.
Oft... |
My bank provides online banking facility like most of the banks these days. On the web they have Partial Password Authentication. Although I don't really believe in PPA providing extra security but that could be wrong.
My Alarm bells started ringing when today I downloaded their mobile banking application for my smartp... |
In my case, the static code analysis tool shows the issue when it founds the code like this:
boolean status = file.delete();
It issues the security vulnerability saying the validation is required.
On further investigation, I found that Java's file manipulation methods on failure returns a value instead of throwing a... |
In an iPhone app that utilizes plain text (unencrypted) XML as the contents of its http POST requests over https to the app server; how would someone be able to discover the "format" of the plain text XML requests inside the packets sent over https protected channel?
Please note, the attacker has access to the applicat... |
Example:
Bob generates a key pair for this example.
Bob registers at example dot com where he provides his public key.
When Bob will try to log in, example dot com will ask him to sign a random string of a few characters with his private key.
If the signature is successfully verified, it is indeed Bob (or Alice who s... |
I would like the ability to look at Snort rules that were written in specific date ranges only given a collection of .rules files from either Sourcefire or Emerging Threats. Is this possible?
|
I have a problem.
I am creating a mysql user, and mysql will store the hashed password in user table.
The problem is I dont know how to get the password back.
As it is hashed, we can't get it back.
If the user forgets their password, then we can't get it back.
Then we have to reset the password again.
I thought to save... |
Other than client puzzles, what are some things a website can do to defend itself against a
LOIC Hive Mind attack?
The Low Orbit Ion Cannon (LOIC) is an attack tool which features a user-friendly GUI as well
as an option to voluntarily add yourself to a botnet controlled via an IRC channel.
|
If an attack (DoS & DDoS) involves thousands of bots, how can the server distinguish them from legitimate clients?
|
I would like to store valuable client data (ex. passwords, OAuth tokens) in a way that they will be accessible only from one application (separation on application base). The mechanism must be transparent for the user - additional password protection will be irritating.
Is there any way to achieve that in Windows?
(I... |
Suppose that the victim's web server infrastructure can process 200,000 TCP connection requests per second. Assume that a single connection request (TCP initial SYN) requires 40
bytes to transmit. The victim's web server maximum bandwidth is 100 Mbps. Can the attacker launch a sufficiently large SYN flood to overwhelm ... |
Most of websites that handle important information (Gmail, for instance) have some kind of brute force protection. Sometimes if you try more than X times it will lock the account or at least give you a captcha to solve.
Currently all the security experts keep saying the same thing: make long, mixed chars, high entropy ... |
I want to use X forwarding in my work because some tasks are just easier with GUI. I trust the administrators not to be malicious, but I don't trust their competence in security (almost nil). Hence the machines I ssh into are not that reliable.
So what measures can I take to minimize the risk of X forwarding, except fo... |
At a company I worked at, I had to change my password every 90 days and I could only reuse a password after 8 iterations. This no-reusal included passwords being too similar to the old one, e.g. when I only changed one letter, that new password was not accepted.
Does that mean they were storing this password in plainte... |
I've been messing about in CTF's for a while and I also do pen-testing professionally, what i've noticed is a distinct lack of CTF competitions using windows environments.
This is in stark contrast to the majority of environments I test professionally (that's not to say there isn't *nix used heavily in the environment... |
If I use a credit card only for chip&pin/EMV transactions and possibly for contactless transactions, I don't need the following parts of the card.
magnetic stripe
embossed numbers etc
signature strip
CSC/CCV number
The vendor never really look at your card in these circumstances.
Obviously this will cause some diffic... |
So I have read some articles (this being one https://nakedsecurity.sophos.com/2010/01/05/flash-drive-manufacturers-warn-hackers-decrypt-secure-usb-sticks/) that point out some flaws with certain encrypted USB sticks. Are all encrypted USB sticks subject to these kinds of problems or are there ones out there that are st... |
The control + j feature within PeopleSoft outputs a list of potentially interesting data for a potential attacker. The feature is generally used to aid in debugging. Here is a the [censored] output from a control + j:
Is it a security risk to have control + j functionality enabled in a production (live/public) instanc... |
To use tails, I have always used a DVD, because of the fact I know it will not be tampered with, at least within reason. However there are endless reasons why a USB boot option would be faster, and in the current project I am building, it is the only real choice.
Here is what I do not get, and why because it seems so g... |
I know there are HSMs that let you enter keys but you cannot read them out. Also the secure element in Android lets you do that too. You can enter keys in them and you can perform operations using those keys but you cannot read them out. How does that functionality work? I mean how do these chips prevent the read-out? ... |
I'm trying to get around the DVWA high security SQL injection challenge, I've tried a bunch of automated scanning tools with no luck, read a bunch of articles saying it's impossible now i've turned to the source code:
You can submit a number (id) to select some details from within the database. I'm trying to pull all r... |
Lets imagine the Fed start registering digital USD for use in offline e-wallets, and they figure out a way to make it so that only registered wallets can make transactions.
Without an online centralized server validating and tracking ownership of currency to a wallet, I would worry that hackers could theoretically dupe... |
Is this still viable? I remember using this when it just worked in shells.
http://www.openwall.com/john/
|
I was trying to overflow buffers and I was wondering ,
Is there anyway to do a buffer overflows without using environment variables ?
|
I am inspecting a Wordpress web site for a client and I have found that some backdoor were present in the webroot folder.
Now I have to understand how the attacker did that reviewing the source code that the client provides to me.
What are the ways with which an attacker could upload a backdoor? On what part of code sh... |
I just discovered this fact tonight and I was rather floored by it. Isn't that a gaping security flaw? I realize that an external drive is less secure by virtue of the fact that someone could simply take the drive and move it to a different machine. In looking at this a bit different, it is possible to change OS X d... |
From what I hear, android uses the standard linux dm-crypt for encryption. Obviously you should have:
A pin/password for your phone
That pin/password should at least be 8 characters
The question is how much that already does to protecting the data on the phone. Let's just assume that the password you picked is "safe"... |
I know most services run under non interactive windows station or desktop also called session 0 while as some services (interactive) running under local system account create a window on interactive desktop and access the User desktop by calling OpenWindowstation and GetThreadDesktop functions. It often displays UIOde... |
Question first: Is there any remediation for passive MITM?
I've come across examples of NFC relay attacks which use phones to get around the proximity requirement for NFC payments.
It looks something as this:
[card | phone1] ----------------------> [phone2 | terminal] (normal operation would be [card | terminal]).
Many... |
Against my better judgement I foolishly opened an MPEG video emailed to me from a friend's email address because the topic in the email was something we had recently discussed.
I am fairly certain that the MPEG was malware as it only opened Media Player long enough to do some kind of exploit and then closed. Shortly af... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.