instruction stringlengths 24 29.9k |
|---|
Some random password generators support the generation of pronounceable words of any given length n. Assuming that words are derived using 26 lowercase letters, the number of possible words of length n is 26^n. Not all of these words are pronounceable. My question is how many pronounceable words are possible of any giv... |
LastPass is a top-rated password manager that comes as a browser extension and uses a master password to encrypt and decrypt the password database using the JavaScript. Is this a secure way of doing? Isn't this approach vulnerable to any web based attack? What can be the attack vectors to be considered while doing this... |
can emails(e.g gmail)can be configured to open-up only in my laptop ,my operating system is windows 8 and is it possible to restrict my gmail account to be opened up only in my computer?Usually we could check for unusual activity on the email but is it possible to
restrict within my computer?
Note : i dont know where ... |
I am creating a certification server which takes some required details like name, email etc from clients and issues public and private keys using RSA along with digital certificate.
Initially all clients have no keys to enable secure transmission so I need to pass the keys through a secure channel.
What techniques cou... |
Microsoft has just patched a vulnerability in Schannel that could allow remote code execution (MS14-066). What I can't find are any reliable details on how this can be exploited. I've seen some people claim that it can only be exploited if you're running a webserver on Windows. But the german news portal Heise claims t... |
This is connection to my previous question: Shared Database and PCI Compliance
However, this question relates to the requirement "Appendix A: Additional PCI DSS Requirements for Shared Hosting Providers".
If we are a service provider, is there any requirement (or recommendation) to:
Keep the Shared Database separate p... |
Any domain that cannot be resolved defaults to yandex right now, on any browser on my system.
Helper objects or extensions are not installed.
It turns out that the ISP (Turk Telekom) is employing DNS Poisening to achive this result. All pages that cannot be resolved now resolve to the yandex landing page.
|
I'm trying to understand the different EMV-related keys that are shared between a bank who issues EMV cards and a card scheme, such as Visa or MasterCard.
I understand the bank would typically generate an RSA key pair and request the scheme to certify the public key. The result of this is an issuer public key certifica... |
How secure is an offline android phone?
Some background. I want to use an app called Bither on android, which allows me to create a cold wallet on 1 phone and a hot wallet on another phone.
Cold wallet is a wallet which is created on a computer which never connects to the outside world.
Hot wallet is a wallet which is... |
I'm combing through a legacy app updating SQL to prevent Injections and XSS vulnerabilities. I know to apply PHP's htmlspecialchars() anything that is directly passed to a script and displayed on a page.
Should I be stripping every non-numeric database field even if it is from a generally not-editable lookup table?... |
What type of hash is this?
a9df6dcd35f4e7223ff3dd087abcc266
I can't find anything when I decrypt it.
Please someone decrypt it
|
I have an API call where a user adds to their balance when funds are low. The actual payment is done via Braintree, but I need to allow the user to make that call via their API.
What would be a good way to do this? Two-factor authentication wouldn't really work for my use case, as I want the user to be able to automati... |
Before launch of a project, I reset the server's mysql root password. The colo that is hosting project wants the server's root database password stored in the .my.cnf file, in plain text, with the permissions set to 400. I just can't see how that is good security practice, but he said that it was something that was bei... |
I received the following email from someone claiming to be the second-richest woman in the world, Liliane Bettencourt.
I, Liliane authenticate this email, you can read about me on: http://en.wikipedia.org/wiki/Liliane_Bettencourt I write to you because I intend to give you a portion of my Net-worth which I have been b... |
Assuming the following HMAC is used : HMACK(M) = Hash(K||M) = H which is "secret-prefix" hashed function. M is the plaintext message , K is the secret key used
The ciphertext is generated as follow : Ciphertext = EK(M||H) where EK is a encryption scheme which uses the secret Key K.
I have read on Wikipedia that a lengt... |
Let's say I had a Gmail account. Should I just not have a Gmail account, or should I not use their cookies? How bad are the cookies, in of themselves? I obviously wouldn't log into it, with my VPN or Tor. But what do you think of Google's log in cookies?
|
Whenever I connect to security.stack.exchange, I am automatically logged in. I haven't allowed the browser to store my password. When I delete all cookies stored by the security.stack.exchange, I have to login by myself by entering username and password. Therefore, I concluded stack.exchange must be storing either a un... |
I just learned to use hex editors and i have a question:
If i change 1 or some of hex values of a file(picture) and save it, Is there a way to find changed hex values an make original file back?
|
I have a little trouble understanding, how to use OAuth to secure an API. So I developed a RESTful service, which I would like to secure to authenticated access. I first opted for HTTP Basic + TLS, but then decided to also support OAuth. The Jersey library supports OAuth1. After I got that working, the first consumer o... |
I am looking for an service to get Security Warnings (CVE) for PHP, Apache and different Frameworks.
Does someone know an source where i am able to get those as RSS Feed?
|
How do you re-conciliate two PCI DSS requirements in applications:
3.3 Mask PAN when displayed (the first six and last four digits are the maximum
number of digits to be displayed), such that only personnel with a legitimate business need can see the full PAN.
10.2.1 Log all individual user accesses to cardholder data... |
If you browse to https://blog.stackoverflow.com/ you see a certificate error.
In Chrome:
This server could not prove that it is blog.stackoverflow.com; its security certificate is from ssl4245.cloudflare.com. This may be caused by a misconfiguration or an attacker intercepting your connection.
In Firefox:
The certif... |
More and more, lately - I've seen attackers posting complete HTML pages that seem to have nothing malicious - to php pages that aren't even listening to their POST (sometimes, it's a contact form, which blocks spam, anyway).
So, my question is - is there any other malicious purpose that such things could be crafted for... |
I have a system that sysadmins in a few of our global offices need to access. What is the best way to grant them access through our firewall to this system? I don't think that having them use static IPs and then using the firewall to allow those specific IPs access is a scalable or great solution.
Some more informati... |
I got a little problem regarding AES decryption. I have to decrypt some text that has been encrypted using 128bit AES / ECB with PHP mcrypt. The thing is, the key that is being used to encrypt/decrypt is 32 bytes long instead of 16. This is all good when I encrypt/decrypt through mcrypt, but now I have to write a decry... |
We've recently implemented WS Trust security over SSL for our client / server communications. Our application is used by thousands of our customers, spread out all over the world. One of the problems we've had in the past with secure communications is that customers with unsynchronized clocks have difficulty connecti... |
This question comes up a lot as I do evaluations for different customers. I currently recommend the following:
All outbound SSH & RDP blocked by default from user network (non-CDE)
All outbound SSH & RDP blocked by default from production network (non-CDE)
All outbound SSH & RDP blocked by default from Card Data Envi... |
My company just got a worm. The specific one is beside the point, but I linked a couple pages that I think describe the worm / virus below. We're getting lots of emails to Outlook asking us to open documents.
For fun, I want to do a static analysis / dynamic analysis in a virtual machine at home. I know the rule of se... |
I was wondering what mechanisms exists that could be used to prevent error propagation in wireless networks and especially with respect to the avalanche effect.
I know ARQ and FEC can be used, but these affect the QoS when used. Are there any mechanisms that work better than these two?
|
My IE browser has SSLv3.0, TLS 1.0,1.1 and 1.2 enabled in the advanced settings.
And (I was informed by my server admin) my web server can encrypt data in SSLv3.0 and TLS 1.0
Now which system (server or the browser) decides which protocol to use. I do know that TLS 1.0 is used. But I need to now which system takes the ... |
I came across a file, that was used by our tech support, to store all generic usernames and passwords in them for use with new systems. (Our company has been trained on the use of other Password storage tools, so this isn't a matter of training. The problem is that these files now exist on our network from before the t... |
I have a Web application running on port 89 ( non-standard port) of a Windows 2012 R2 machine. The login page for this application needs to be accessible through a link on my website - let's call it mydomain-llc.com. I have created a button on the home page which currently explicitly provides the IP address and port nu... |
I recently installed the Light (a more compact forking of Firefox).
I started getting the "This Connection is Untrusted" error, which got me wondering: when should I add an exception to the list of trusted certificates? Yes, this gets at the issue of trust, and that is an enormous problem in itself. But let us suppos... |
I have read up on Digital signature and it is stated that it provides non-repudation.
Assuming Alice signs the message using her private key and sends it to Bob, Bob can use Alice's public key to verify the signature hence Alice cannot deny sending the message. This only proves that Alice is the sender of the message... |
I love my phone, it's small, I can bring it everywhere, I can access the wealth of human knowledge online, and do so much more. But with the recent light of the NSA and other world government agencies, the question is how secure is my phone? Can I really treat my phone like my laptop or desktop? I also wonder how the... |
could an attacker who'd just found out that you're using mysql make an SQL Injection attack with only this information? If you don't know Any table/db name how come you can find it out? Is that even possible and how to avoid that?
Thanks
|
Case 1 involves TLS + client certificate authentication with both client and server using secp384 based EC certificates. In this case, when monitoring traffic via fiddler, the tunneling/handshaking as well as encrypted traffic is completely missing from fiddler (as if nothing is happening). We know there is real traffi... |
Is TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 a safe cipher suite to use for a TLS 1.2 connection to a Tomcat server? What are potential weaknesses or better alternatives? I am looking for a cipher supported by Java 8.
|
I am looking for a possibility to sanitize large amounts of data on regular hard-drives and SSDs. Instead of overwriting the data several times (on regular hard-drives, which could take days and doesn't "work" on SSDs) I am thinking about using hardware-based FDE and simply performing a cryptographic disc erasure (drop... |
Nowadays RFID / NFC is everywhere. From public transport use, door opening to Credit Cards.
I see often people just passing their wallet in RFID/NFC readers to do all kind of operations.
This seems to me that opens a new angle of attack to cards. It's not hard at all to install a card reader next to another and read al... |
I discovered a lot of requests to a fishy file in a plugin on my Wordpress site. There, I found a long string, a mapping function for each character used in the string, and an excecution of the decoded string. This is the code the decoder outputs, any help in understanding what it does would be great!
<?php
if(isset($_... |
CVE-2014-6321 (also known as MS14-066) is a heap overflow vulnerability discovered by Microsoft engineers in Schannel, the SSL/TLS implementation used by Windows.
My Java application uses SSL (JSSE Implementation) and so now I'm wondering if my application is at risk due to this vulnerability or it is irrelevant?
|
I am writing a paper on reducing the power consumption of security protocols. I am having trouble identifying sources that describe real-time usage of DES and AES, and how often they are used. I plan to use such sources for the 'motivation' part of my paper - explaining why power consumption is important. I know AES a... |
I am having so many problems with my laptop. I have 8 malicious items detected and 4445 non malware items detected. Is it better to quarantine or add exclusion? I am not sure what add exclusion means.
|
I use iOS7 with a 4-digit passcode that isn't on any top 10 lists. I have "Erase all data after 10 failed passcode attempts" turned on.
How hard would it be for someone who stole my phone to get access to my email?
|
I was curious how a DoS attack would affect a home router. In particular, I'm interested in how a SYN flood would affect a home router.
The reason I'm interested is due to a Cisco document I read. Within the document, it said SYN flood attacks can affect home routers. To me this seems odd because SYN floods must specif... |
How does one with simple access rights find out the remote host directory structure? I see that web archives are able to not only backup content on the specified domain, but every folder within it.
|
Multitun is a tunnel that encrypts connections and sends them bulk over a web socket, which is a web standard. So firewalls that ensure the expected protocol is running on the allowed port, will just pass it through as being compliant with HTML. Is there anything a firewall or filtering system can do to detect this k... |
I have an application (which I'm testing), in which I create some services. These services are accessible via libraries i.e java and python apis. In order to authenticate the api calls, the application does gives me pkcs file.
I want to change the expiration date of the pkcs file, only for testing purposes.
I followe... |
I am pentesting a server, and it appears my ports are open for telnet.
Upon accessing telnet, if I type "help" I only get these commands:
telnet> help
Commands may be abbreviated. Commands are:
close close current connection
logout forcibly logout remote user and close the connection
display ... |
I need to know the best scenario for a merchant inserting client's credit cards and expiry dates to process recurring payment for these cards. What I have in mind (and want your expert suggestions please) is the following:
form to be filled with credit card information
normal post with https to a php page having funct... |
I have a Comodo PositiveSSL certificate issued for mail.btcontract.com and I've set up Postfix and Dovecot to work with it in the following way:
Postfix main.cf:
smtpd_tls_cert_file = /etc/ssl/mail/mail_btcontract_com.crt
smtpd_tls_key_file = /etc/ssl/mail/mail_btcontract_com.key
smtpd_tls_CAfile = /etc/ssl/mail... |
From my understanding, ChopChop attack against WEP, which goal is to decrypt one packet without need to know the WEP key, goes like this:
First, the attacker takes one ciphertext message from the RF stream, addressed to the target AP. Next, he/she "chops-off" the last byte of the message, right before the ICV (which is... |
How can I prevent CSRF in Ruby on Rails programming ? Is it possible to avoid overload on the application loading on net ?
|
http://lifehacker.com/how-can-i-stay-anonymous-with-tor-1498876762
Alright, so here's a lifehacker guide on how to remain anonymous. Do you really have to go to this high level of extreme to remain anonymous? For example, is it really not safe to use a VM of Linux on Windows? Do you really have to go to thirty eight di... |
The guide I'm following says to use openssl genrsa to generate a TLS key, which I did. I've changed the CSR generation command to use SHA256 instead of SHA1, but I'm still not sure if this is the optimal solution.
The oldest clients I would like to support are Windows XP with SP3 (cries) and Android 2.3 (preferably, b... |
Lets say that I'm building an website and a app which saves the users' secrets. The user logs in and can save into the app his deepest secrets.
I'm worried about two things:
- Should I save the password (hashed/bcrypted/etc)?
- How can I prevent people who has access to the database to be able to correlate the secre... |
I would like to know if storing credit cardholder data using RC2 encryption requires to be compliant with PCI DSS. Currently the 16 digit PAN number and expiry date is stored in the database. The PAN number is encrypted before storing and the site uses SSL to transmit the data to the payment gateway. Do we still need t... |
So, let's say one just doesn't want the government/corporations to know what they are doing online. Let's say, for example, that they just don't trust the NSA, FBI, Google, etc.
So what are the steps it would take to anonymize someone of each one: normal person and then a black hat hacker who isn't severe. Maybe they a... |
I'm aware of the impact of MS14-066 to Windows servers/workstations, and have managed the patching our of desktop networks.
However, I am concerned that our Windows CE systems may also be affected, although I can find no specific mention of this, either way, despite searching MS & Google.
Certainly in Platform Builder,... |
Lets say I receive internet through my eth1 port and share it via hotspot to other devices (wlan0 port)
[internet]----(eth1)[my computer](wlan0 hotspot)
|
|
|
[de... |
The data on my hard disk was deleted from an encrypted bitlocker hard disk. After deleting the data, a new partition including a new installation of windows was created on the same hard disk. The key to the original bitlocker encrypted data is available.
Using commercial software for data retrieval has proven to be dif... |
I am currently working on a project where we are using Google Maps to display some data by using the client-side JS API to manually add the points on to the map once the user has clicked on a button.
It has been suggested that using Google Maps may leak our data to Google, and I would like to understand the possibility... |
I was wondering why Shellshock works when put in the useragent.
Based on what I could find it is because a web server (e.g Apache) uses the useragent string in its internal working.
Why would a webserver care about the useragent? AFAIK decisions based on useragent are made in the application with the programmer buildi... |
The default setting is that the apache2 root-directory Documents is owned by root and I have to enter a password each time I change it. This is why I want to give full permissions to my user account in the file information:
However, I'm not sure whether that might be a security risk since the default settings are so ... |
When trying to pair 2 bluetooth LE devices (e.g. 2 iPhones), a popup shows up that requires to input a code displayed on the other device.
I am aware of the concept of out-of-band authentication, and why it is necessary.
Device A generates a code.
Device A requests Device B to enter the code.
Device B shows a popup to... |
To ensure privacy in communication I encrypt and sign E-Mails using gpg4win. However, sometimes the communication does not work as expeceted (GPGTools and Outlook/gpg4win seem to be incompatible).
In such cases I ask the counterparty to send an encrypted attachment. I decrypt it, then write my answer into the file, enc... |
for the last two days I played around a bit with nginx's SSL configuration.
A question came up:
I created asymmetric key using
$ openssl req -x509 -sha256 -nodes -days 365 -newkey rsa:4096 -keyout nginx.key -out nginx.crt
nginx config:
ssl_protocols TLSv1 TLSv1.1 TLSv1.2;
ssl_ciphers 'AES256+EECDH:AES256+EDH:!aNULL';
... |
Clients (actually software pieces developed by some random dudes all over the Internet) are authenticating on a web server using "basic" authentication scheme and to do so they are passing the username and password with each request. Every time a non-empty username and password is passed the server it has to hash the p... |
I was watching a very recent TV show, the FBI agent told the police that there is no way for anybody to block a live stream of a pedophile torturing a kid nor to trace it. Even when it's being broadcasted from within the same country.
What am I missing here? I can think of lots of ways to block and the website and trac... |
I know that SSL should be used on web servers that need to gather credit card information etc..however, is it industry best practice to also turn on SSL even for non critical web servers? eg those only used for static browsing, or those that just require a simple login and password , that's all.
Would like to hear your... |
I'm learning Application Security, and tutorials such as www.asp.net discuss updating databases with placeholders, instead of directly using user input
@{
var title = "";
var genre = "";
var year = "";
var movieId = "";
if(IsPost){
Validation.RequireField("title", "You must enter a title");... |
I'm looking for a RSS feed or a mailing list that would allow me to be alerted of new CVEs impacting Windows or Red Hat that have a very high score, such as the recent ones for Shellshock and Winshock for example. Basically, a simple way to be proactive about updates that require immediate action and can't wait until t... |
The question is simple:
Adding a hash to a message and then encrypt it using a stream cipher / block cipher. Why can't this guarantee integrity of the message upon decryption?
|
When adding a User ID to your OpenPGP key, you are typically asked (for example by GnuPG) to provide a name, a comment, and an email address (where each part is optional).
This format (Name (Comment) <email address>) is described by RFC 4880, section 5.11 (User ID Packet):
By convention, it includes an RFC 2822 [RFC28... |
I'm currently learning the Linux system and I have a question about the default Linux ACL.
On my virtual machine, all files created are set with the default permissions as follows:
-rw- rw- r--
According to this permission level, any other user on the system could see the newly created file knowing the path and the fi... |
I'm creating a multiplayer game(based in websockets) which runs directly from the browser and which has multiplayer functionality. Each player needs to have his own account(Username and password). When I was planning the game, I realized that the easiest way to migrate it to other platforms is writing it in HTML5. So, ... |
I was taught that an important step to securing a website (primarily with PHP) was to store all sensitive information such as database connection info, salt generation, etc. in a separate file(s)/Folder(s) and use .htaccess with something like deny from all to prevent access to that information, and otherwise unauthori... |
Just want to ask some questions regarding on this strange experience while logging on my account on Facebook
There are cases that I'm accidentally typing my password into the username box of the Facebook log-in page without knowing it.
I'm gonna demonstrate a detailed sample scenario of logging in a Facebook account. I... |
I am not a .NET developer and I am trying to understand how exactly does __ViewState protect against CSRF/XSRF attacks.
I came across the following :
security Stack exchange discussion on similar topic and
OWASP Guide to CSRF Protection
I am a little confused with how exactly is the CSRF protection happening here.
I... |
Is there a way to track the sender and the location via the email address only.
The problem is somebody has created a similar sounding email id to send content to my official circle with a view to malign me.
It is obvious as result I am now under silent investigation and hence do not have access to the email
|
I want to cover the possible cases of attacking. My application already has captcha and two-factor authentication, but how can I avoid a tiny attack without annoying my users? The possible cases that I'm thinking to cover are:
Show captcha after 3 failed login attempts based on Session, but the problem is that some... |
I was wondering if such practice would be safe:
I have a table that stores encrypted notes
Every note has a data field and a password field
When a password is entered, i want to select all notes, encrypted with that password
For this purpose, i need to safely store the password next to the data
There can be many notes... |
Suppose I'm hosting a web server and a separate box offsite that crunches data. The web server interacts with the worker using the worker's API over port 2888. What would be the design of a secure infrastructure be like?
I was thinking to have just 2 firewalls: one in front of the web server with port 80 open to the p... |
When I search in google for:
"sensors"
The two first results are:
"Sensors"
"Publications"
If I click on these two lines (the second one for instance), I get to a defaced website (actually, there is an extra document.location() redirecting me to a Russian website).
However, If I go directly to the webpage :
http... |
At our office we have a router on the table, and the powers that be want to lock it down by MAC address to stop people from plugging in cables for other computers i.e. intruders.
Given that resetting the router to factory settings to bypass the password will wipe out all the configuration (it has to be manually entered... |
It appears that the textbook version of Diffie-Hellman is susceptible to man in the middle attack and the use of digital signatures could prevent this attack from occurring.
Digital signatures could be implemented during the Diffie-Hellman key exchange in the following way
Alice has a pair of public/private key (SKa,... |
A friend of mine told me about the following problem: She used to login on Facebook on a computer of her boyfriend. After they broke up she recognized that he was able to login to her account from his computer.
Of course she then changed her password, but still he is able to login via any device (smartphone, computer, ... |
I am a newbie to PHP and password hashing. I am following the instructions provided @ Safe Password Hashing to hash my user password before storing.
My questions are:
PHP recommends password_hash() method as a preferred secure way to hash. In case of a database breach won’t the hacker use password_verify() and identi... |
I'm using Apache 2.4, with two certificates, one RSA signed by CACert, and one ECC self-signed. Neither of these certificates provide a path to a broswer-trusted root certificate. My question is this: When presented with two different certificates for a website, how does the browser decide which one to use?
|
I know how to do this with RSA keys (see this article: Determine if private key belongs to certificate?) however I do not know how to do this for ECDSA certificate / key pairs.
With RSA keys, the modulus can be used for this. However I'm not sure what the "equivalent" is for ECDSA.
Thanks!
|
While being fascinated by how it is possible to create hidden services with Tor, there's a few details around the address collision issue I can't seem to wrap my head around.
Quote from Hidden Service Names on the Tor wiki (my emphasis):
The output of SHA1 has a length of 160 bit. To make handling the URLs more conven... |
I have a port forwarded and open in the firewall that I sometimes use to play games with friends over the internet. The game server doesn't run 24/7, only when I'm actually playing is something actually listening on this port. Are there issues with having this port open while nothing is listening?
I know I can tell the... |
I have a small web application. Because it is necessary to upload some files I check the file extensions with a whitelist (tgz, jpg, png, pdf, zip, rar, txt, gif, py, c, rb). In addition to that, I hash the filenames with md5 so e.g. when the user uploads the file exploit.php.jpg it is renamed to 526a8f9f3497b5a69bc45... |
I have certain information on my drive that I don't want anyone (not even me ;) ) to gain access to. I read recently that Fedora only offers EAS 256 LUKS encryption. This just isn't secure enough for me. I want 256 or stronger for my entire drive.
Now I'm confused because on this site: http://docs.fedoraproject.or... |
I'm using php/mysqli queries such as this:
$stmt = $con -> prepare("INSERT INTO `comments` (`uid`, `article_id`, `status`, `comment`) VALUES (?, ?, ?, ?)");
$stmt -> bind_param('iiis', $uid, $articleId, $status, $comment);
$stmt -> execute();
Talking strictly SQL Injection (no buffer overflows from entering 20,000 c... |
When I do PublicKey.getAlgorithm(), it only returns me RSA. Am looking for something to return Sha1RSA. Basically to identify if it is a sha1 or sha2 algorithm.
Any help is appreciated.
Thanks,
|
For research purpose, I want to launch a MitM attack on computers that are connected to my wireless network.
I wonder what is the best way to do so. Notice that I control the router, and do not want to launch constantly attacks like ARP poisoning or something like this. I want to use my router and a dedicated computer ... |
I have generated an SSH key on Ubuntu 10.04 with
ssh-keygen -t rsa -C "example@example.com"
and the key's random art image comes out mostly empty (modified slightly):
+--[ RSA 2048]----+
| |
| |
| |
| |
| D |
| s.J |
| Bv.... |
Am I correct calling file with .p7b file extension saved as 'Cryptographic Message Syntax Standard - PKCS#7 Certificates (.P7B)' in Windows - a 'PKCS#7 certificate'? Or is it better called 'X.509 certificate saved in PKCS#7 format'?
When would one choose one certificate format over another? Do these formats have any p... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.