instruction
stringlengths
24
29.9k
A friends drupal site was hacked. What is strange is that the root directory of the installation at the hosting company (let us call it rootdir) was copied (or renamed) rootdir_hacked and the directory rootdir was left one file index.html saying the site is under update. What I do not understand is how can the hacker c...
When using a Virtual Network, is it possible to infect the underlying Network infrastructure with malware from the Virtual Network. How safe is the use of Virtual Networks?
Yesterday I noticed that one of my e-mail addresses (the only one within that domain) started to receive a lot of weird messages that the mail haven't reach the target (something like "Sorry, Qmail wasn't able to deliver..." etc.). I (or rather the hosting provider I have a shared hosting account from) do(es)n't use QM...
So, recently, after going through some infosec training (FutureLearn's Introduction to Cyber Security, which I heavily recommend as well-explained newbie material), I decided to take the plunge and finally up the security of my authentication in password-protected computer systems. My goals were to... Use unique passw...
I have an web app 1 which would do the authentication of the user. After that I want to forward the request to another web app 2. Now web app 1 will generate some hashcode which I can authenticate in app 2 and be sure the user is authenticated. I thought of 2 approaches for this use case. App 1 will generate the hash ...
If you were downloading music and games from a Work Wifi, and knew the password is there any way they could trace you and what you have downloaded?
In Apache httpd webserver there are two ways to load modules into the server, static and dynamic. There are some modules which must be loaded static, e.q. mod_so and core. The mod_so must be loaded to enable dynamic loading of module, but it is also needed when all modules are loaded statically. My question is: Is ...
In my firm we have a couple of thousand hardware devices, installed externally, that all send back data to a central server. They send back data about every hour. Each of these hardware devices encrypt the data they send with an individual encryption key, typically an AES 128 bit encryption, but there are several othe...
I have implemented encryption for certain columns in a database. In some cases it may be necessary to search by these columns, either for exact matches or for substrings. At the moment, there is less than 10000 rows to search through (at most). However this will probably change in the future so I am anticipating effice...
Suppose I use remember one long high entropy master password, and use variations of it for each of my passwords. Eg if I remember tSaF4nWeACVkUU4 as a master password and use tSaF4nWeACVkUU4t (with a t and the end) as my Twitter password and tSaF4nWeACVkUU4g (with a g at the end) as my Google password. Is this bad prac...
Problem: Currently have no way to verify integrity of my offline encrypted system. I would like to ensure the system hasn't been physically tampered with while I've been away from it. (To clarify:while I am aware that the system cannot be modified without gaining access to the my encryption key. This question is to add...
Do U.S. based companies or corporations generally have policies restricting their security staff to certain nationalities or are they generally open to all qualified persons regardless of citizenship?
On the surface it looks like both libraries are designed to preform the same functionality with similar "drop-in" capabilities. Are there differences that I need to take into account when making a decision about which to use? If so, what are they? https://www.owasp.org/index.php/OWASP_PHP_Security_Project https://www.o...
I'm trying to consider how to properly vet devices that have exhibited unexplained activity for future deployment. Let's just consider my current scenario as an example, but I am interested in this from a broader standpoint. We have two IP phones that were purchased at the same time that are behaving strangely and dif...
Currently we are receiving a surge in machines that are being attacked with Cridex. We received several spam/infected emails that have used macros to we think deploy a backdoor trojan that is allowing Cridex to be pulled down. This is the popup we get from SEP: https://i.stack.imgur.com/TaDR7.jpg Also after installi...
I have learned about IMSI catchers but also read that one can not get the phone number through that IMSI. Lets suppose I want to collect the phone numbers of all people in a college/ shopping mall/ part of residential area for targeted advertising. Is it possible? If yes, how does one go about doing it?
What's the worst that can happen, the hackers will pay my bills for me? Assume that this isn't a malicious hacker out to disconnect my electricity. What kind of concerns are there for my finances, property, and personal data?
I have a requirement to implement Facebook and Google login in my web application. I also need to access a user's Facebook/Google+ friend list. I have gone through the complete OAuth2 documentation of Facebook and Google. I understood the basic concept. For example, lets say for Facebook login the steps are: The user ...
Does Google use network encryption on it's Android apps like Gmail, Drive, Google Play, Docs, and others when doing authentication/data transfer? What type of encryption is it? Is it secure? I have tried searching Google's help site about this and did not find a good answer. Can you provide me with some resources about...
I've been wondering how iTunes movie rentals work from a security standpoint. Given that the "rented" files are actually downloaded to the user's computer and then played from there, it seems like there is no way to prevent the user from saving the files indefinitely. It's possible that the files are stored in some ...
What is the best Open Source Malware Scanner/Cleaner? Malware-bites is good but it requires licensing for companies.
I'm a beginner network security student and as practice my dad let me look over his personal business online store website. I found a script called image.asp which when fed a file parameter returns a thumbnail of an image. Edit: It's used for creating thumbnails of products in his store. Example: www.example.com/image...
Recently I am growing passion for security/encryption/cryptography. I follow some famous people in this domain on twitter and read articles over the web. However, this topic seems deep and every time I read something new I kind of get information overload. I believe the reason for this is that I do not have my basis co...
I'm subscribed to goverment's owned ISP because only this ISP provides access to rural area. It has a bad reputation because it is not only redirects sites, but also injects JavaScript for advertising at the end of HTML pages. I've been using dnscrypt to avoid redirection. But a few hours ago, I accidentally discove...
Usually, in programming, reusing code is always a better idea than writing your own implementation of an algorithm. If an implementation has been around for a long time and is still used by lots of projects, it is likely to be pretty well designed to begin with, have received plenty of testing and debugging, and perhap...
I have been working on an application running over XMPP. I would like to know which all popular security layers are available over the XMPP protocol, similar to SSL over http.
A colleague suggested to me just to prevent letter characters from occurring immediately after an opening angle bracket as a way to protect against XSS and HTML injection. Obviously, this doesn't prevent issues such as: <img src="%injectable%" /> But I can't think of a way around his suggestion. Is it really that simp...
Why do some known vulnerabilities have no CVE ID? And why does some vulnerability have a CVE ID assigned but no information on cve.mitre.org or cvedetail.com?
I can't seem to find any documentation on what these options do: Does this somehow offer more protection to your secret key? That is all I can think it would do.
So my idea was.. There is a program that require login to be able to use(the program should work offline aswell not requiring any online data), so i want to make that program to be able to run offline aswell, so what i did is i captured the packets (with wireshark) that moved to the program while logging in, next i tri...
Maybe not 100% on topic for this site but it seemed like a good place to ask. All laptops are now sold with webcams and microphones and I have use for neither. Taking care of the webcam is easy; three layers of black duct tape The microphone is a bit trickier. Placing duct tape on it will probably dim the reception but...
I am trying to pentest the security of the password of my wireless network. It is a WPA2 with pre-shared-keys. My current computer is connected to the wifi router and I try to de-auth my own machine. Steps I created a monitoring interface: sudo airmon-ng start wlan0 Now I use airodump-ng to find the channel and MAC o...
I'm updating an application to write slightly more verbose errors to the system log file (in this case, /var/log/apache2/mysite_error_log). I hope that I'm not asking the proverbial stupid question - but are there any potential issues with including user-passed data such as invalid arguments passed to a page in the A...
My understanding is that when an e-mail is encrypted and sent to a recipient, the recipient's public key is used to encrypt the e-mail, and then only the recipient can decrypt it with their private key. However, how would this process work when sending an encrypted e-mail to multiple recipients? My best guess would ...
How does Avast's https scanning feature work? Is it basically a MITM attack? This feature was enabled in the 2015 version released a few days back
When a new machine certificate is imported with a private key a MachineKey file is generated in "%ProgramData%\Microsoft\Crypto\RSA\MachineKeys". When using the certificate mmc snapin or removing a certificate with powershell's Remove-Item the MachineKey file is left behind. What are the implications to the artifacts...
I'm designing a web application that is going to handle very sensitive data, storing it on behalf of its users. A kind of online safe, if you will. A user's secure data should only be visible to her, not even to the server software or owner. This opens the way to robust security practices, such as using an end-user pas...
If I visited a malicious site while being logged in to Google, Hotmail, Facebook, or Twitter in the same browser window, how hard is it for the site to discover my account IDs without my explicit permission? Assume: fully patched operating system, fully patched web browser with plug-ins disabled, fully patched router ...
Someone sent the following email from my gmail account. I believe it was hacked and if I can find the IP address I may be able to identify the person who did it. Here is the information. Please let me know> MIME-Version: 1.0 Received: by 10.25.30.3 with HTTP; Thu, 6 Nov 2014 19:58:50 -0800 (PST) Date: Thu, 6 Nov 2014 2...
Is it possible for incoming video/audio streams to contain malware through exploits in the transfer of the video/audio?
I noticed that at least one major CA (Comodo) publishes their CRL over HTTP rather than HTTPS. This seems to me to be somewhat of a vulnerability, as an attacker could hijack the HTTP connection that seeks to download the CRL and when HSTS is in use at the very least execute what effectively amounts to a DoS attack on ...
I am curious how safe I am if I use telnet through a VPN-tunnel to my webhotel? I thought that the information was encrypted between my computer to the vpn-providers default-gateway. But when it leaves the gateway on its way (through internet) to my webhotel its no longer encrypted? This is just a guess - Am I complete...
I wanted to create a new PGP key using GPG Keychain Access on my Mac. One of the options was to choose keytype: RSA and RSA DSA and Elgamal RSA (Sign only) DSA (Sign only) I found this Superuser question, but it may be outdated. RSA keys seem to be less secure since it's known that the NSA infiltrated RSA and made th...
I'm looking for different kinds of applications which is intentionnaly (or not) made vulnerable and so are suitable for practicing different penetration techniques, like SQL injections, buffer overflows and such. There are plenty of similar frameworks designed for praciticing web apps' penetration, DVWA (http://www.dvw...
I recently found a site, Cell-Spy-Stealth.com, that claims to sell spyware which can be targeted on a phone by simply making a call to it: "It will work even if you get the voice mail, or if the target phone is password protected." It claims that after this one-time call, your phone will have access to all live SMS, ca...
I am fairly new to encryption and I need some help. I have a problem that I'm trying to solve. My problem is the following: I have a Web Server and an (iOS) App that that communicate with each other. I want the communication to be secure, so I'm using HTTPS. The Web Server and the App are communicating via an intranet...
I created a user that I use to login with using an SSL Key. I have not set a password. To be clear it is not an empty password, but an unset one. The /etc/shawdow has a single exclamation point where the password would normally be and I have checked that entering a password instead of using the private key does not l...
I am testing one web application build using PHP. I found one vulnerability in which multiple user can log-in using same browser, without destroying others session. What this sort of vulnerabilities are called and what is the effect of this vulnerability? Many times it happens I find some vulnerabilities, but unable to...
What happens if someone steals one of my additional domain controllers? What information could an attacker get from my domain controller?
Is it possible to create a Web service that encrypts all messages, such that only the writer, and the person to whom the mail is sent, can read it? In other words, is the theory behind ProtonMail valid?
I want to ask about access control that are used on Ubuntu. I already read Ubuntu Access Control List but I'm still confused. Is there someone can explain about access control on Ubuntu? Because honestly, I don't really know about Ubuntu, I'm using Windows hehe. Thanks in advance for your help to answer my question.
i have been recently hired by an ISO 27001 certified company as an " internal ISO technical auditor". My employer told me that my job is described as follow: this job is created because of the need of a technical resource who will take care of technical issues not organisational issues i am attached to the ISO team an...
Just examined a spam email sent to me. The header's "originator" has both my email address and my web site's IP address, (my SMTP). My first thought is that someone has obtained my email password since I'm sure that my site's sendmail is secure. Is there some way that this could be a spoof, or what?
I use ssh connection encrypted and compressed. If I use small RSA keys or very big RSA keys, what is impact on CPU load for compression, for decompression and on bandwidth (encrypted file size) ?
I'm trying to verify a 2-way SSL connection using the openssl s_client command openssl s_client -connect localhost:8883 -CAfile ca.pem -cert client.crt -key client.key The openssl s_client fails with the following error: openssl s_client -connect localhost:8883 -CAfile ca.pem -cert client.crt -key c.key Enter pass ph...
I encountered a question "true or false, replication is NOT a way to protect data". I answered true since I felt that protecting data meant securing the network and preventing unauthorized access to the data, and simply replicating it would not "protect" it. I was told that I was wrong and that replication would fall u...
I patched for shellshock and was barraged a few days later. However, I would not have known any attempts were made at all if not for a regular expression I found on the internet. This has inspired me to look further into my logs. Is there any centralized list of regexes I can use in a script to parse my logs for common...
When I'm checking my log, I found like 15k events of " PAM service(sshd) ignoring max retries; 6 > 3 " I know this might be normal, and considered as Brute-Force attack, but can it be classified as DoS attempt? Sample of the log: | 8864611 | eros | 2014-08-11 18:18:38 | PAM service(sshd) ignoring max retries; 6 > ...
I want to know the table name and column names of that table in website login page. How should I do that. There are only two input fields, Username and Password. And it is vulnerable to Sql injection, because when I inject 1'or'1'='1 it logs me in with dummy values. I am learning sql injection, and testing on this site...
How to protect a web application from DDoS by the implementation of Web Application firewalls? How effective is this method?
Google Chrome browser helps in password management by prompting users to remember their passwords for the websites. These saved passwords can be accessed from the browsers "settings" menu, and to do so Chrome asks user for the Windows password. I understand this is for providing more security. I read somewhere that the...
Someone started attacking my site a few minutes ago and its caused PHP-FPM to max out all cores (4) on my vps and NGINX is now serving 502 to all users. I'm seeing a bunch of these requests with tons of different agents xx.xxx.xx.xx - - [10/Nov/2014:5:14:35 -0500] "POST / HTTP/1.1" 502 574 "-" "Mozilla/5.0 (Windows NT...
Suppose I am connected to a wifi-hotspot hosted by a malicious attacker. Further, suppose that I am accessing a login page of an fictitious email site tmail.com over insecure HTTP connection. My question is how can the attacker who owns the WiFi-hotspot steal my password by injecting the malicious JavaScript code with...
I am trying to exploit simple stack overflow vulnerability. I have a basic code in c: #include <cstring> int main( int argc, char** argv ) { char buffer[500]; strcpy(buffer, argv[1]); return 0; } compiled using -fno-stack-protector. I've already figured out the buffer length and I've successful...
In EAP-TLS method of authentication if a server sends Change Cipher Spec message to the client, I couldn't find references to SSL3_ST_CR_CHANGE_A. The enum is defined for SSL3_ST_CR_CHANGE_A in ssl3.h, but I looked at OpenSSL's source code: s3_clnt.c:ssl3_connect(), and I don't see any case that handles it. The ope...
I have heard about both Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Which is better in preventing a Distributed Denial of Service (DDoS) attack and why?
is there any simple way to log/list all resources my website (wordpress & theme) needs from the outside? Like jquery, fonts and all this stuff. I want to host it on my own server. (doesn't matter if it's a good idea or not)
Last week I read a lot about security. I have a basic understanding how public keys or private keys works. But I still have a lot of questions I can't find an answer. Right now I'm interested in checking an executable file I downloaded. Let's assume I sign a file, send it to user, but some bad guy in the middle change ...
I'm wondering how bad it is to truncate a SHA1 and only compare, say, the first 10/12 bytes, etc. I'm working with a fixed length of 8 bytes that I need to hash for uniqueness but store with the smallest footprint possible (8 other bytes would be nice, but I guess not feasible). A bit more information without sacrifici...
I have been analyzing a PDF I suspect to contain malicious content. For the most part, I've always trusted automated tools to determine if a PDF was safe to open. However, my eyes have been opened to all the encryption and obfuscation techniques in the wild today. So I've started reviewing my PDFs manually using tools ...
I can't quite figure out the differences between using the Tor browser and using a VPN (like concretely proXPN). From what I understand the idea is the same, that they both hide the IP address. The only difference that I can see is that Tor seems slower because it has to pass through several computers. So is using the ...
SSH with public-private key authentication comes enabled by default with most Linux distributions. This is great because when I create accounts for remote users I don't have to email them sensitive info(passwords). However, this process becomes useless when these users need to run sudo -- the server is still asking for...
For those malwares which are used to organize botnets to DDOS a website, they just need to send and receive HTTP packets. Do they need to be privileged? If they dont need to be privileged, is it true that any unprivileged program I run on my machine could contain malicious code to DDOS a website with my bandwidth?
From a computer forensics standpoint. If someone were to mount a partition in RAM using something like: mount -t tmpfs tmpfs /mnt -o size=1024m How much more difficult would it be to recover data saved there than it would be to recover data saved and erased on a regular harddrive?
I have set up a certificate-based connection with socat using this tutorial: http://www.dest-unreach.org/socat/doc/socat-openssltunnel.html My socat connection works as following (only the relevant parts of the command): ssl:<server-ip>:<port>,cert=/path/to/client.pem,cafile=/path/to/server.crt ssl-l:<port>,cert=/path/...
My question refers to securely erasing viruses from the usb flash drives, including the MBR, in case there is one. I was thinking of booting with Linux from a closed CD-R (a cd rather than USB flash drive because of the possibility of a virus jumping from one drive onto another AND bootable in order to prevent the viru...
Why aren't client-side certificates used for Authentication? Then user has to remember only 1 password to unlock his windows account which stores the certificates. I understand that if user access websites from different machines, the certificates has to be synced. But with one strong password for windows account, isn'...
I have a salt and a password for an application that is using MD5($password + $salt) and I'm looking to crack it. I believe this to be the same format that joomla uses. I'm having trouble figuring out the file format to pass to Jack the Ripper. I've tried username:password:salt username:password$salt username:passwor...
I am working for a company with perhaps the least security possible. We have servers, databases, web applications, and websites that are all unsecured. There only exists one account: root, which everyone uses for every purpose. The websites have hard coded passwords where the account information can be discovered by vi...
How does one go about to determine how well audited/checked a software is? To make this a much more specific question I am interested in ways to ascertain (mailing lists, rankings etc.) that a software (obviously a OSS) is to some [measurement?] degree audited?
I have an API written in nodejs and I have a frontendapp written in angularjs. I want my API to be called only through my frontendapp and not from any other source. e.g. I have an endpoint called myhost.com/posts/id and when the method is delete it deletes the posts. I dont want an attacker to access this end point and...
I have a server with Drupal 6 which was hacked and now by accessing the main page i can see the php shell. The problem is that i could not find the shell. The site files are not infected because i copied all website data on another server and it works and no files has been changed in the last week.. It might be the htt...
In the process of developing a vulnerable jsp/servlet based application I made an attempt to introduce the session fixation vulnerability. Referring to the documentation I came up with the following code which when used in the servlet to create a new session, should return the existing HTTP session if it exists and ot...
How usable and secure are 3rd-party password managers like Roboform, Lastpass, and 1password from the built-in Chrome and Mozilla password managers? What are the advantages of using 3rd-party password managers over browser password managers? The basic features of auto-fill and saving of passwords are available in bot...
In UNIX's security model, you log in as a user, and then every process you start can access everything that belongs to your user account - that is, the trust is based on the user account, not on the particular executable. But on my Android phone, it seems things are slightly different - every app seems to run under its...
The Linux ether-wake utility, which creates a magic packet to wake on lan another machine, requires root access: $ether-wake 12:34:56:78:9A:BC ether-wake: This program must be run as root. To give access to an arbitrary user would require either making it SUID root, or adding /sbin/ether-wake to /etc/sudoers. My conce...
I have been analyzing malware and I am seeing many 1x1 png and gif files. What could these be used for?
When you try and recover your password on Google, you will eventually stumble across this screen, and it made me wonder: Isn't this type of password recovery from Google essentially the same as allowing the user to log in with an old passwords? Thus making it impossible for the user to fix a compromised password. How ...
Good afternoon, Is there anyway to trace a text message? As far as the real phone number that the text is being sent from? Or the location of where the text is being sent from? I've been getting harassing text messages from someone and when I try to call the phone number back I am getting an automated voice mail (does ...
Is it possible to update a field in a MySQL database or insert a new row using SQL injection in this case: The only protection in the PHP code is mysql_real_escape_string(). The query is constructed in double quotes: "select id from db where id = $id" not single string literal quotes. The database is mysql (using my...
It is not clear to me how Windows Server 2008 R8 stores local account passwords. Is there any salt added or just NT hash is computed and stored? The following article describes all the methods used by Windows 2008 (even Windows 2008 R2). http://technet.microsoft.com/en-us/library/hh994565.aspx I am not sure if I unde...
I'm currently building a B2B E-Commerce site for a client using WordPress. We sell industrial machinery ranging in the upper $100k-$400k price range. My client would like to have their financing form online where customers/businesses enter bank account information, as well as social security numbers. He wants this form...
I'm interested in how SELinux effects the processing of packets through the networking stack. I've found the following questions and answers: Network policies under AppArmor/SELinux Filtering network access on a user/group/process basis The first seems to imply that SELinux can tag packets (kind of like tagging VLANs...
I'm making a Java-based web application that is intentionally vulnerable to Reflected File Download (RDF). White paper is here I read the requirements of reflected file download vulnerability as being: User has control over the file name (filename in content-disposition header is missing). app uses values found in UR...
First, please forgive my ignorance. Until this week, the only "credit card security" I understood was how to hack systems and why to write PHP pages with the types of features I do (msqli, pdo, parameterized query, etc..). As per my involved ignorance, I will make this question as robust as I can, attempting to not ove...
I am doing a security research project on TCP amplification, and was looking to download vulnerable OS's for testing. From what I have researched mostly ancient linux kernels (2.0.x and below) and embedded servers are vulnerable (SYN attacks, RST attacks, etc). I was looking to download some to run in a virtual machi...
I ran a full system scan this morning with all of my virus/malware programs and Avast detected 1 virus in an .avi file (which thankfully I have not yet watched): Severity: Medium Threat: WMA: Wimad [Susp] I don't know what this threat specifically is but Microsoft has a page describing Wimad virus' which it says are a...
What would the security implications be of enabling and using wifi and / or bluetooth before a user logs into the system in a Linux box? Thanks for your help!
I have a client who is a reseller for vacation packages. For years they've had a payment form on their site where the end user would fill out their credit card data and the information is emailed to the reseller. BAD... I know. The only security they had implemented was the page was SSL. The client then signs into thei...
I have heard that running code in a managed language, e.g. Java in the JVM, is impossible to protect against timing attacks due to the JITing nature of most managed runtimes. In concept I can agree with this, but I would like to understand what the current industry knowledge around this is.