instruction stringlengths 24 29.9k |
|---|
Is there a possible way of injecting code to pull data from Active directory?
I have written a PHP page that executes Powershell and is able to change passwords to a controlled group of people. However I'm still at a loss on whether or not i can inject code into my script.
Currently everything from space and all specia... |
We have a shared webserver which is being monitored constantly by our ZABBIX agent.
On some hours of day we have unusual TCP traffic on port 80. Lets say we have over 400 connections from IP address of 109.230.67.50 to our webserver.
We can easily block any connection from and to 109.230.67.50 from IPTABLES but we want... |
In the server keys of the MIT, there is several signatures from "PGP Global Directory Verification Key".
Example (from http://pgp.mit.edu/pks/lookup?op=vindex&search=0xB63024F96C73DA99):
sig exp CA57AD7C 2013-07-14 2013-07-28 __________ PGP Global Directory Verification Key
sig exp CA57AD7C 2013-10-10 2013-10-24 ... |
Many websites give you a recovery key or a list of recovery codes that can be used in place of 2FA tokens if you lose your phone or can't access your token generator.
What are the recommended practices when it comes to storing these codes?
Should these recovery codes be stored along with the password in a password man... |
Below is a copy of my answer that I gave in some other thread (Would running VMs inside of VMs be a more secure way to study viruses, etc?) about a topic of security of nested virtualization. I would like to know whether my answer was right of wrong. I'd like to know whether paravirtualized drivers are actually a secur... |
I'm working on a web API. We are going to use Hmac256 for signature hashing. From what I can gather, the secret is a key used to initialize the hash algorithm (ie to generate a random number). The salt is appended to the content, to make it harder to decrypt.
The API will be used by a few clients and the data is not ve... |
There was a question on a quiz I took, about different authentication methods that SSH uses.
The answers were combintions of the following four:
username/password
public key authentication
shared secret
kerberos authentication
I choose the answer which included all four, but I wasn't sure if shared secret is actuall... |
Recently Laravel 4 was updated to address a security concern: there was a CSRF vulnerability in their code.
Here's the old code:
if (Session::token() != Input::get('_token'))
{
throw new Illuminate\Session\TokenMismatchException;
}
And here's their fix (note the !==):
if (Session::token() !== Input::get('_token'))... |
I am running pfSense on an edge firewall conncted to a cable line. I can see many DHCP requests hitting my firewall. I guess this requests are getting send by cable modems currently booting up and looking for the ISPs DHCP server, which later on hands out DNS server and TFTP options, so the modem knows on what paramete... |
I know there is secunia and cve.mitre and ms kb database but I could not find a way to filter results only for operating system "windows xp" (or 2003 server, they share about the same code) with impact "arbitrary code execution" for which there is no workaround and no patch.
|
Are there certain things I can look for when buying a new external hard drive or flash drives to ensure that the one I purchase does not contain BadUSB? Would popular commercial brands, such as Seagate, be a safe choice?
|
I want to know how to secure credit card order with blank mail.
My boss instructing to create new site like as below:
1) User send "Blank e-mail" to new site.
2) The site returns mail including URL, the URL is display credit card number to start payment.
3) After input credit card number and press OK, then display i... |
Is there a protocol or best practice for trading information between parties where one, after receiving his share of the information from the others, might refuse to answer or might alter his answer, based on the information he just received? Ideally there should be a system where each put in their information, and the... |
I'd like to implement some kind of simple (yet as strong as possible) encryption for my client-server application network traffic. Data to be encrypted can be both textual, and binary.
Now I'm thinking about using just a trivial XOR encryption, but with following features:
Key will be random (i.e. uniformly distribute... |
I went through the help pages of VT and VT Intelligence, saw documentation about most tags, but couldn't find anything about the "hosts-modifier" tag, can anyone explain to me what does it mean?
|
Most of the advice on choosing cipher suites I find tends to be one of these forms:
Here's a string to paste into your application, or
Here's a list of 30,000-foot generic criteria to use ("favor stronger ciphers") (gee thanks)
The former tend to be outdated quickly and don't really educate the reader on why those ci... |
Is there a way to use Tor network as your VPN, proxy or something alike?
I have been gone to their website but I've seen just browser (Tor Browser), bridge, relay and exit.
Is there way to tell Linux? "Hey, connect to Tor network like browser, use that IP and send data through that hole."
|
Today in networking class we were talking about VPNs. The prof got on topic of virtual routers and said that a way some VPNs work is by a client would purchase the service from the ISP and the ISP would have a separate virtual router for each client, so that each router has it's own routing table (and this would someho... |
I have a space for computers secured with a simple deadbolt. Someone keeps coming to pick the lock. While working there, I have scared them away three times.
There are cameras, but not in useful places or all exits and the building manager won't let me run wires for more. I contacted the police, but maybe it is a low p... |
According to OWASP, we have a list of top ten mobile application vulnerabilities.
But we are damn sure that the number of vulnerabilities on mobile apps, especially android apps are far more than listed here. And also I couldn't find a comprehensive checklist for either android or iOS penetration testing anywhere in th... |
Is encrypting the password hash in database more secure than storing only the hash?
Suppose we store encrypted SHA-256 result with AES instead of hash directly. Is this a good protection from a situation in the future when someone will break one of the algorithms?
|
Suppose we have passwords that are statistically 7-8 characters long. Is appending a 200 character long salt less secure than a 5 character salt, because of the similar hash function inputs?
I was wondering: what if someone tries to guess the salt by brute forcing the salt with for example the password "123456", or ano... |
There may be a basic flaw in my understanding of how the internet works so sorry if this is a simple question. What type of attack does VPN protect against? For example if a local area network (let's call it alpha) needs to connect to local area network (let's call it beta) that is in a different city, often VPN is use... |
We've just implemented a proxy that decrypts all SSL traffic in order to classify and scan it. Naturally a lot of our users feel concerned. We're a small company (100 users) owned by a big company (5000 users). What we hear internally is that "other companies doesn't do this". I think that this is the de facto standard... |
I'm trying to find out on which OSI layer the ISAKMP protocol resides on?
It isn't listed under the wiki's list of network protocols, and the internet says it's either on the transport, network or the application layer.
I did find out where it resides on the tcp model, but still, I need to know for the OSI model.
|
Consider a user accessing a site that is using HTTPS for all its traffic.
A hacker is trying to use a man-in-the-middle to snoop on the user. What information can he glean?
Obviously the content is encrypted, and we'll assume he can't decrypt it, but what can he learn without having to do that?
The kind of things I'm t... |
We've just recreated a contact form on a HTML webpage. We've implemented Google reCaptcha to prevents bots and spammers from abusing the form.
We've received some feedback from our client, saying they receive a lot of mails with following content:
Language: French
Name: cmRDCjlVlGjMOQxWcAB
Street + nr: nX... |
It should be trivial to get fingerprint patterns for many of the most important people in the world, as they frequently (enough) wave their hand, palms forward, to many HD cameras.
Is it possible to gather this information of fingertips to overcome fingerprint security systems?
I understand that fingerprint security sy... |
I'm developing a browser(firefox) plug-in which essentially checks for malicious input. My current approach is to store all input fields sent in GET/POST requests, try to heuristically determine potential attack vectors and drop requests in case true positives are detected.
For data retrieval I've been thinking of impl... |
I see plenty of answers for what and how to use IV. But is it important to keep the IV saved for decryption? I would think so, but I haven't seen anyone saying anything about this.
If you want a specific encryption for this to be about then AES-256-CBC
|
Imagine there is a login form in Java application. We need assign usename and password to variables. Moment after we can Hash or HMAC password and keep it just for authentication step (no caching). But still we need to assign variable for Raw password.
Q1) What sort of variable type we should use to store Raw password(... |
I am playing around with pyopenssl. I am trying to extract the public key from a CSR and to check if it is the same than the one I find in the associated certificate.
There is a small difference between the two than I can't explain.
From the certificate CSR:
30 61 02 01 00 30 0D 06 09 2A 86 48 86 F7 0D 01 01 01 05 00 0... |
Can JavaScript be used to capture the user’s screen? If so, is this functionality available in any JS framework?
(I do not need code examples: I am mainly asking to form an opinion about the security capabilities of JavaScript.)
|
I receieved an e-mail which at first glance appeared to be from a friend, I clicked on the link provided without thinking as we would often exchance links to sites. The link went nowhere i.e page not found. When I looked at the e-mail again, the actual e-mail address was completly different to my friends.
Does simply ... |
When I am exchanging PGP keys with someone, I receive the regular 0xXXXXXXXX.asc file and regularly receive a file called 0xXXXXXXXX.asc.sig.
What is this file?
How can I generate one and send it with my .asc file?
Thanks.
|
A previous question, What is the use of cross signing certificates in X.509? described cross-signed certificates well.
I have a situation where the clients trust CA1 xor CA2, and both need to reach a single service. Logically, this means I need two end-entity certificates for the same hostname. From a single SSL key, I... |
This is kind of a bar-bet question. An acquaintance of mine has made the claim that, given an arbitrary glob of HTML, it can be completely prevented from executing JavaScript if, before slapping it into a webpage, you replace all instances of < with < -- and make no other changes.
I am not convinced my acquaintance... |
We are going to release our new product which will have customers create their own subdomains. This requires having a wildcard DNS on our main domain (We have no other options, right?)
Are there any disadvantages (from a security point of view) in having a wildcard DNS?
|
These two are the functions can capture remote address, for example this is a social network site example.com/user?privacyemail.php, this site is containing email of user or some kind of private info, curl and get content function in php can grap that, the problem is a have created a script with this, but it only captu... |
Can any one explain the difference between YARA and ClamAV ? Are they just two different ways of writing AV or Malware signatures ?
|
There is a new Wordpress exploit in wp-includes/formatting.php
$textarr = preg_split('/(<.*>|\[.*\])/Us', $text, -1, PREG_SPLIT_DELIM_CAPTURE);
General problem here is that they try to parse HTML using regular expression. If they had ever looked at Stackoverflow they would know it's a bad idea.
Anyway, I tried to figu... |
Of the following three actions:
Certifying / signing other people's public keys.
Generating a revocation certificate.
Adding & revoking subkeys.
... which ones does the Certify capability on a key allow?
As I understand it, Certify permits 1) but I don't understand what permits 2) and 3).
If I remove the primary key ... |
It has been said that if we accidentally use ftp instead of sftp, people can actually see the login name and password in pure text form, and it is very bad.
But who can actually see it? Will it be operators at large firms only? Can any hobbyist at home with a broadband modem be able to see it?
I think I used ftp ac... |
I want to develop a mobile bank app (Windows Phone, Android, iOS) that interact with a bank channel.
First time when user opens application the key exchange process begins and at end of this process a long-term SymmetricKey generates and must store in mobile device. All of request that sends to server encrypt with this... |
I found on my server something like this at the beginning of my php files:
<?php eval(gzinflate(base64_decode('lVltc9pIEv7MVd1/UCjFSDEGSYBtYstONnF2t+qyyRFyVVdxlhrECLQWklYSBGLlv9/TPRLIb3d7qQSGme6efu+eTuBrxrOZ9INIzoyWny7fZi3TvP373xpqs9rT2rZ5hl2ZpnE6SWUSp3kQzQ2Ld3HgryIvD+JIA43JLNQMfZWGpkaUGgEuqc4nchNkeWa0PJxPgijIcZ8Ca+jeQ... |
My colleagues claim that XSS is a vulnerability on the server side. I always thought that this is a client side vulnerability. Which one of us is correct, and why?
|
I am looking for a way to make a set of files only able to be read when a USB key is plugged into the system. For example, if I have FILE A on my C drive and I try to open it, it will say something like "Please insert key" (The "key" being a USB drive) Once I plug the USB drive into the computer and try to open that f... |
I'm hoping to use the below issue we came across recently to better understand Java's security providers, ciphers and encryption in general.
We got the following error during an SSL Handshake (using the InstallCert tool) from a Solaris 10 host, running Java 1.6.0_81 to one of two AD hosts:
]$ java InstallCert host1.ex... |
As far as I can tell thread.com log their users in automatically based on a token in their emails, appended to the URL.
e.g https://www.thread.com/1234logmeintomyaccount-forexample
This is a really useful, great feature and makes it very easy to interact with the site without having to remember/sign in all the time.
Ho... |
I have had a couple emails sent to people who have sent me an email in the past (in my inbox, but who are not necessarily on my contact list). They have my full name in the from section, and in the email body, but the email address they are sent from is not mine, nor do I recognize it. The emails were not sent from m... |
I'm hoping someone can point me in the right direction.
If I wanted to implement email encryption within an organisation what would be the best way? I've been searching the web tonight but all my searches just come up with PGP. However a web of trust approach doesn't appeal to me for an organisation.
Any suggestions? ... |
We repeatedly hear news of hacking of passwords from PW database (server side) but nothing about hacking of server's RSA private key (not asking regarding finding p and q for a given public modulus N), why?
Please someone explain how and where server's RSA private key is stored & used w.r.t authentication and any other... |
So with a typical website, perhaps the fastest and most effective (arguably) way to secure the site is to add a simple .htaccess and restrict by ip addresses:
.htaccess
DENY from ALL
ALLOW from xxx.xxx.xxx.xxx
but I want to access my website via an approved iphone. Is there an equivalent way to do something like the .... |
I've just run into a scenario where a stylesheet was being blocked on a secure payment page.
The stylesheet was loaded like so:
<link href="/CSS/all.min.css?v=2" rel="stylesheet" type="text/css" />
I was getting an error in the chrome dev console:
Mixed Content: The page at https://www.example.com/secure/checkout.as... |
I was going to apply for a Student ID card through ISIC, but noticed that the form where they ask for payment (such as credit card number) details is not available through HTTPS.
The URL to their purchase form is http://www.myisic.com/get-a-new-card/
I asked ISIC about this and they replied with that the form submissio... |
when using proxychains+tor in kali,you should be logged in as root because proxychanis doesnt work when you are not logged in as root but using tor while logged in as root is not secure so what is the correct way of using proxychains+tor,is it even possible to use these while you are not root?
|
I'm seeing a very weird attack this morning from a pile of VPS instances spread out across the US. The URLs look like this:
/js/bundles/,!0):this.element.propAttr(
/js/bundles/&this.buttons.button(
/js/bundles/),this===i&n(this).addClass(
/js/bundles/)&!t.input.is(
/js/bundles/&(f=i.end-i.start==0?0:(i.now-i.start)/(i... |
I've seen lately some bugs that used zip symlink technique , can anyone explain how this vulnerability works , how attackers use it to exploit applications?
Thanks
|
There is an option on android devices to unlock when the correct pin/password is entered, but without the user explicitly pressing the "done" or "enter" button. How much security does this remove from the device? is there any sort of limit to prevent many login attempts via this method? (granted, one may not know if th... |
How can I test if an email address is a spammer's?
I received a reply to my Craigslist post, with a gmail address in the email body.
Craigslist uses some way to hide my email addresses, if I choose to reply directly.
But I replied to the gmail address provided, and immediately got an email which I recognized as spam.
A... |
Alice navigates to https://example.com.
https://example.com delivers an invalid certificate.
https://example.com 302 redirects to https://www.example.com
https://www.example.com delivers a valid certificate.
Question: will Alice see a warning on step 3
|
I'm in a system where my modem connects to a college network (KotNet) that monitors its internet traffic. Since I'd like some privacy I was wondering if a Tor browser would hide my identity or if it would not work since I first have to log in to the college net (with username and password) before I can have access to ... |
Using openssl to create a self signed certificate. The certificate needs to have the Basic Constraints value defined and showing in the cert but I can't seem to be finding the right location to modify in the openssl.cnf file. So far all of my certs are missing this field so I must be editing the cnf file wrong. Does an... |
I have a project in Cryptography where I have to discuss the provable security of any proposed scheme (encryption or authentication) which has not been discussed yet.
Any pointers on how and where to start?
I tried researching some schemes but I could not find any scheme for which any security analysis has not been alr... |
I have previously analysed an online contest and found that it was trivial to reverse engineer the handshake process since it was all done in javascript. As a result, it was possible to code an automated client that submits entries repeatedly and cheat the contest. The nature of the contest hinges on submitting as many... |
How effective are tools such as w3af in looking for web app vulnerabilities compared to looking for vulnerabilities manually? Are they able to find all vulnerabilities from OWASP top 10 such as reflected xss, persistent xss, sqli, lfi/rfi, and unrestricted file upload? Or will some vulnerabilities fall through the crac... |
Is the following PHP code XSS proof?
<?php
$site = $_GET["url"];
echo "<a href='".str_replace(array("\"", "'", "javascript:", "vbscript:"), array("%22", "%27", "", ""), $site)."'>Site</a>";
?>
|
Is there any difference in security between browsing the internet on a remote desktop and using a VPN to browse the internet on a local machine? In this case assume both use the same encryption techniques and VPN server and remote desktop sever are located at the same place.
The direction of attack of primary concern b... |
I want to know how secure it is to transmit Credit Card details as plain text to the payment gateway from my website using HTTPS. We are not storing any details in our database but I read that transmitting plain text to payment gateway is not PCI Compliant. Also once we transmit the details to the Gateway they return a... |
As mentioned in this wonderful link, the way to get a PBKDF2 Hash of a user given password given
a password (of course),
a salt (generated Cryptographically Secure Random Number Generator.
iteration count (chosen high enough to be secure while balancing your application's usability tolerance)
Hash size (length of the... |
Recently, the appearance of public NFC tags are growing in major populated areas. The company I am currently working along side with wants to increase their advertisements with a NFC tag placed on the side of their ad so users can navigate to their website and,want to later expand it to opening up the app store to down... |
Self Encryption: Encrypting a password using the password itself (as a symmetric key). Basically, by doing this, I'll get random data as an output. Now, in order to retrieve the password from this encrypted data, I must know the key. That is, I must know the password itself. Doesn't this property make it kind of one-wa... |
I just encountered API which I find pretty vulnerable. Could you clarify if my concerns are wrong?
1)For retrieving user data, API KEY, which is unique for every user i used. This api key is stored in rest url. For example, to request something, request is build /something?api_key=dsfdsf34r3wrwfdew3r3rfw3. Api key is c... |
We already have SSL session resumption enabled using a session cache. Based on an in-house performance report, enabling Session Resumption using Session Tickets is recommended.
Is the performance increase gained from this worth the additional security risk? (From what I understand there is only a problem if the client ... |
We have all heard them, rumors about people randomly calling you on your mobile phone number and asking you to confirm something by typing in a specific combination onto your dial pad (the rumor I'm referring to, specifically states 09# or 90#).
When you do, people claim these callers copy your SIM card (information) a... |
Our security experts, database administrators, network team and infrastructure team are all saying it's OK to have the database server located in the DMZ along with the HTTP server and middle-ware server.
Their reason:
If the database server is compromised (because of an insecure middle
tier), at least the database ... |
I have been seeing some Heart-bleed PAN alerts. I want to set the default action from 'alert' to 'drop'. But I am not sure if this would block some legitimate packets.
Since there are a vast number of teams, it is impossible to completely upgrade all servers.
My environment consists of hundreds of clients and servers.
... |
On a "brand new" (but fully updated) Windows XP installation (an Asus EeePC that I restored to factory setting and than updated with all Microsoft's upgrades) I installed a few days ago Google Chrome.
Today I opened Chrome and browsed https://www.mozilla.org to download Firefox.
I was suprised to see Chrome alerting th... |
Is it sufficient to convert ' to ' , > to > and < to < to avoid XSS when inserting untrusted data into a JavaScript string as below?
<script>
param='payload';
</script>
Are there any examples of situations where the above conversion is not sufficient to avoid XSS?
|
so our company's CTO quit, and i replaced him and we need to change the system's passwords, however some passwords are encrypted in our database and i need to know what encryption to use in order to place new ones.
the encryption i am looking for is not base16-32-64. few examples:
12345678: qxha5ZeyN4w0TaEWSDSCNBNNC4Xl... |
Attacker has only access to USB port and can either attach a device or pen-drive to a computer, that can be on or off. Imagine a scenario where non-reliable people have access to offices, either because they clean after-hours (off scenario) or because they sit near the running computer (on scenario) but only that, what... |
If I am using a VPN to connect to Twitter, can an organisation like Anonymous or Lulzec track me and find out my identity?
|
For doing business with a company I have to browse to https://www.prioenergie.de/nc/mein-prioenergie.html (German website).
Firefox says the certificate is invalid, because it is not signed by a trusted root CA.
This is the certificate data:
Created for
CN: www.prioenergie.de
Serial: 1A:AE:76:6C:D0:09:24:AC:41:07:2D:27... |
Lets assume we have two servers :
(1) https://adomain.com
(2) https://abc.x.adomain.com
The each have different certificates, (2) has a wildcard and (1) does not.
If we remove https from the picture, the two servers can "share" cookies provided that the cookies have domain=".adomain.com"
questions :
Can a page served ... |
Is there a complete definition list for all CKx abbreviations in PKCS#11? I believe I gathered most of them:
CK = ... Data type or general constant
CKA = ... Attribute
CKC = ... Certificate type
CKD = ... Key derivation function
CKF = ... Bit flag
CKG = ... Mask generation function
CKH = ... Hardware features type
CK... |
Some company was trying to sell me their security system. They said that the SSL certificate was expired on my laptop, which they showed me. They said that I wasn't protected. What are my options?
|
How does a DNS Rebinding attack work? How can it violate the Same-origin policy?
Will the victim's browser send cookies to the remote server (specified by IP), when the domain is not the same as is in the cookie, created by the same remote server before (keeping the user session)?
|
Is there any tool or method to separate normal traffic and malicious traffic from pcap? For example : if malicious traffic detected with snort i need to store those packets .only if malicious traffic . Thanks for respond.
|
I was prompted recently to take a deeper look into some of the PCI requirement information, and I have found some pretty serious discrepancies with regard to the reporting obligations of Level 4 Merchants (less than 20,000 transactions per year).
Some suggest that Level 4 Merchants are not required to report on their P... |
Is it possible to prove the identity by ip address of someone that has compromised a router on your network?
|
I'm going to move my /boot/ folder to a USB to as a security measure to protect against Full Disk Encryption exploits. My question is, is it possible to only allow boot from USB from a single USB device and not any USB that is plugged in?
Thanks all
James
|
Can someone confirm whether Facebook Login API (https://developers.facebook.com/docs/facebook-login/v2.2) is based on OpenID Connect (http://openid.net/connect/) specification?
Thanks,
Sameer
|
I am new in the field and trying to pentest a php web app locally stored on my host pc using metasploit from a kali vm. I have run some scanners like wmap,OpenVAS and Nessus and found some vulnerabilities but i have trouble finding the matching exploits to use in msf. I have tried 'search cve-xxxx-xxxx' and even on goo... |
An Ubuntu server of my company has been hacked to carry out a DoS attack. I found the shellshock bug had not been fixed by my colleagues, and I think it's the problem.
Then, I found an ELF file that sends thousands messages, and the script is auto-generated by something. Even if I try to remove it, it creates newly by ... |
scanned my IP number with nmap and I got all "unknown" status ports.
What does that mean?
|
In school I was given an assignment to perform a buffer overflow, which would execute some shellcode and open a new shell. After a bit of fiddling the buffer overflow succeeded, and when I ran the exploit in GDB it says that the program is executing /bin/dash, and then the program I was exploiting exited normally, leav... |
I am using openssl example server and client with specific cipher in ubuntu 14.10 pc. The openssl version is 1.0.1.
When I use the RC4-SHA cipher in both sides, the connection is established successfully. However, when I use ECDH-RSA-AES128-SHA or some other elliptic curve cipher, I get the following error:
3074328252:... |
When I look in the Google play store (android apps market), I see that there are a lot of apps to make secure phone calls. However, all the apps I have seen so far all seem to use data packets over 3G/WiFi to encrypt the calls. Therefore it is not possible to make direct calls over the 'regular' phone network to a land... |
War Games are fun but mainly deal with Linux reverse engineering.
Example: http://blackbox.smashthestack.org:85/
Does anyone know of similar online games for Windows security?
|
I'm running a basic scan using nmap from
1) a VM of Kali Linux running on personal machine
2) an instance of Amazon Linux, running on Amazon's EC2 cloud
These two runs (against any target) are producing vastly different results, with the personal Kali run always producing much more and more detailed results (more IPs f... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.