instruction stringlengths 24 29.9k |
|---|
What is the difference between SSL connection and SSL session?
This is what my lecture notes have to say which makes no sense to me (I am new to SSL):
SSL Connection:
A transient peer-to-peer communications link.
Each connection is associated with one SSL session.
SSL Session:
A session is an association betwee... |
In light of BadUSB,
storing private keys on a USB flash drive is not the best way.
What about writing private keys to a CD?
What I am worried about is whenever I plug my private key storage device into the machine, it opens up the possibility that any rogue process may take over and steal the keys.
I have a private key... |
According to Mozilla Sync-new-security-model, Firefox servers are not able to decrypt your sync data without your password. So I figured that, the browser generates a key from your password, encrypts the data and sends it over the wire without the key.
But if I forget my password, I can still recover it, by having fir... |
How can I find out what payload(s) can be use/executed along with an exploit?
For example, I can use an exploit called exploit/windows/smb/ms08_067_netapi. Right after that I set the payload to windows/adduser. What other payload can I use here. How can I find out this information or is there a specific command in Met... |
If so, what is it called when someone alters or interjects into un-encrypted communications? Is that email spoofing? How is it resolved?
End users probably are more concerned with the fast resolution of the current disruption to their work than with the technical prevention.
How would an account holder even know to s... |
I am developing a web page where people can write and comment things (no personal informations required) and I need to put a log in form so users can see all their actions on my web page. My idea is to program a log in form without SSL and also allow people to log in with Facebook if they prefer. The page will load com... |
Amazon CloudHSM (It is Safenet in the backend), Safenet Luna HSM SaaS version and other cloud HSM providers provide Key Management and encryption services on device in the cloud.
From my research, I understand that they can be used to encrypt some data and get the encrypted blob for storage in DB / disk either on
- t... |
I read that antivirus opensource software would be a good idea since the database could be informed and mainained by lots of capable people. However I have also read arguments to the contrary but none really explaining why.
Is an open source antivirus for windows a bad idea or a good idea?
|
Consider an end point such as below. Let's imagine that this endpoint updates an address of the signed in user, changing the zip code. The address to update is identified by the address ID (kUj3Nkg10).
http://example.com/address-update/kUj3Nkg10/?zipCode=1234
Importantly, the identifier is an alphanumeric string, not a... |
The story:
I'm currently writing a web service that allows for communications to be made remotely via TCP/IP.
I first thought about signing each packet using HMAC-SHA1 with a password, appending the signature to the start of the packet and then have the server (which also knows the password) verify the packet sent.
Ho... |
Anti-malware software has to keep track of all bad software there is. To ease this load, it seems like a good idea to stop looking for threats that's been dead for years.
Is there any example of some malware that was "big", cleaned enough to be removed from anti-malware software and then re-released by someone or left ... |
If you run the nmap command on a server eg. nmap espn.com or nmap -Pn espn.com what information does that reveal to the server about you (eg. ip address or MAC address)? Does using a private vpn reduce what is revealed?
|
Linux naturally restricts all but superuser from pulling traffic directly from network adapters. In the case of Wireshark/dumpcap, setuid root is used ONLY for dumpcap, restricting the privileges needed for Wireshark run by the user:
Wireshark has implemented Privilege Separation which means that the Wireshark GUI (or... |
I'm a little confused about how VPNs work ... I read that they provide an end-to-end encrypted tunnel between you and whoever you're trying to connect to but is that actually the case?
VPNs let you route through different countries right? - So is it an encrypted tunnel between you and the VPN service providers server .... |
.NET has this great way to sign and then verify the signature of an XML file. Is there a way in Java to verify an XML file that .NET has signed this way?
|
Suppose my friend has a connection of 4mbps. If I just send him 4mpbs of random data with my server, wouldn't it block his connection? Even if the router has firewalls and closed ports, isn't enough for me to send random data continuosly to his router, in order to block it?
I've found some scripts on the internet (like... |
I'm just trying to execute shellcode directly from the command line. I send a simple 0x90 NOP and get a segmentation fault?
root@server:~# gcc shellcode.c -o shellrun -fno-stack-protector -z execstack
root@server:~# ./shellrun `perl -e 'print "\x90"'`
Segmentation fault (core dumped)
root@server:~# more shellcode.c
... |
I'm planning to purchase a SSL certificate for one of my sites when I'm concerned about points made in these articles:
WiredTree: The Most Significant Issue With SSL – And How To Solve It
TechRepublic: POODLE vulnerability hastens the death of SSL 3.0
Infosec Island:
IPv6 - The Death of SSL
This POODLE Bites: Exploit... |
While I am doing a quick scan for virus on Norton 360, I noticed a long stop at some files. Their names are very very suspicious. Although I can't recall all of them, one of them, which I clearly remember, is Backdoor.Rustock.A. I searched this on the Internet, and the results are... Pretty shocking. It turned out to b... |
Here is the context. Suppose you have a corporate PKI with :
AC_Root (offline in safe store - SHA1 signature)
SubRootA and SubrootB (offline in safe store - SHA1 signature)
SubSubRootC, SubSubRootD, SubSubRootE... (online in HSM - SHA1 signature)
End entities certificates (servers, users smart card, auto enrollment, A... |
An organization has all the regular controls you can think of for network and systems protection from the 10 security domains. External login access to the organization's services is protected with 2 factor authentication. As an improvement on security posture, it is suggested that 2 factor authentication could be enab... |
I read here http://blog.insicdesigns.com/2009/01/secure-file-upload-in-php-web-applications/ and question is related with text near
However, if the attacker is able to upload files, even outside the web root, and he knows the name and location of the uploaded file, by including his uploaded file he can run arbitrary c... |
I am writing a mobile app which would be expected to store sensitive data. It needs to be stored for offline use. I am wondering now that Android and iOS provide encryption at rest do I need to encrypt the data stored in an database within the App.
The main concern would be that the phone could be stolen. What would so... |
The sharing section of Jedox's webpage has the Facebook, Twitter, Google+ and Linkedin share options in default inactive state. You need to first click it to activate and click again to get the share window.
Hovering the inactive button it says
Two clicks for a better data security: The first click will activate the b... |
Is it possible that Alice can authenticate Bob without using any secret information except her password, i.e they don't share any thing else. If so, how can I authenticate Alice and ensure the integrity and confidentiality of the password in the same time. is hashing useful in this case? if so can I use two way hash ... |
I am creating a simple application. There is an option to download a generated image.
For that, my PHP code is:
<?php
if (isset($_GET['img_name'])){
?>
<html>
<img src="<?php echo $_GET['img_name'];?> "></html>
<?php
}
?>
I know this is vulnerable to XSS. But this is not the problem. Question is, is it possible for a... |
My OpenPGP key is soon to expire so I wanted to create a new one.
GPG 2.1 came out a month ago including ECC support and I wanted to try the new key types.
So I have generated a brand new ed25519 key. Today I tried to upload it using gpg2 --send-key but then I couldn't find it.
I also uploaded it manually on pgp.mit.ed... |
I have been reading Symantec & Kaspersky Labs analysis of the Regin malware.
According to Symantec
[Stage 2] can also hide running instances of Stage 1. Once this
happens, there are no remaining plainly visible code artifacts.
As I understand Stage 1 is implemented as a Windows Driver, and there exists no safe wa... |
Recently an Evil32 project group announced that they have found collisions for all OpenPGP keys from public keyservers (https://evil32.com/).
What does the term collision refer to?
|
I've been tasked with creating a formal security testing schedule / calendar for our organisation's applications, as most of our current testing (scans, pentesting, etc) is done ad hoc.
I'm wondering if anyone has created something similar for their organisation, and what process was used in order to build this schedul... |
Is there a standard way of automatically testing the basic security of my web server? I've found a couple on-line services, (e.g. http://hackertarget.com/), and they seem ok, but I'd like to start off with the basics. Is there a go-to method for stress-testing a web server's security?
|
I've read some of the great responses to storing and passing session keys in a single page web application (i.e., a web "site" that runs mostly on the client-side, getting data from the server by using an API). But my question is about securing (after logout) the data which comes back in the response, of which I've see... |
Everyone knows about the sure thing retirement strategy that is the Superman 3 exploit, but is there a way to exploit bankers' rounding to grab some of the less than half pennies "floating around out there"?
Specifically, assuming that the internal accounting cannot be tampered with like in Office Space, can transactio... |
Who still uses the traditional method of storing passwords (written down) in an actual physical safebox vs modern methods like password managers? What are the pros and cons of each method?
|
Anonymity means that nobody knows your real identity (on the Internet).
Untraceability means that nobody is able to trace back your actions to you.
It appears to me that Anonymity and Untraceability is the same thing: if nobody knows my real identity on the Internet, how are other users going to trace my action to me? ... |
We have built a web application using ASP.Net MVC3 and SQL Server 2008 which has features like credit card payment, etc. We engaged a 3rd party to perform vulnerability assessment and penetration testing.
We got a good report with few security issues. We have fixed all the issues except one.
In that report it says that... |
So I have android lollipop installed, which should be encrypted automatically with some startup password.
My question is, what happens if the phone get stolen while its on, and the screen is locked?
(If I had time I would obviously wipe it through Google.)
Is the file on my phone (nexus) encrypted while the phone is on... |
I would like to allow the user to be "logged in" and maintain state / logged in status between pages within an iframe. The iframe content is ours, and will be hosted on various clients' websites.
Since the usual session cookie will most likely be blocked as a third party cookie I am trying to find a suitable way to do ... |
I am looking at the theory behind MITM attacks in order to see some unencrypted packets from the 3DS. From research here is what I understand so far:
3DS > Proxy > Nintendo server
I am going to try and force the 3DS to use a forged certificate. The 3DS will then communicate with the proxy and the proxy will decrypt the... |
We've found a number of attempts to access non-existent pages in our IIS logs, specifically a lot of variations on phpMyAdmin URLs.
My kneejerk reaction would be to block these IPs, but I have a feeling this is not really a "solution" since the likelihood of multiple attacks from the same IP address are pretty low.
So,... |
I'm modifying the search module of prestashop in order to be able to search strings containing dots : .
Prestashop uses its own sanitize functions against mysql injection vulnerability (yeah...) and uses a list of characters (almost entierly copied from Drupal search module) to filter:
define('PREG_CLASS_SEARCH_EXCLUD... |
I'm trying to export the public component of my subkey, but all GPG will give me is the public component of my master key. The keyring is set up like this.
$ gpg -K
/home/alex/.gnupg/secring.gpg
-------------------------------------------------------
sec# 4096R/4ACA8B96 2014-06-21 [expires: 2015-06-21]
uid ... |
I am studying
Web Application Security, A Beginner's Guide Paperback – November 3, 2011
by Bryan Sullivan (Author), Vincent Liu (Author)
On pp 69, "Validating Credentials", they say you can validate credentials based on
Comparison logic in application with plaintext passwords
Comparison logic in database with plain... |
Sometimes you stumble upon input fields that don't escape input properly, but who still appear to be to short to actually be used for anything malicious, at least to someone with my limited imagination.
This made me wonder what is the shortest possible input field that can be used to perform a malicious XSS?
|
Suppose I want to change the hash algorithm used for a certificate signature (ex: SHA1 to SHA2).
Is it better to revoke the previous certificate and issue a new one with expected hash algorithm ? Or is it possible to just push a new CSR with the same To-Be-Signed certificate, but expecting that another algo used ? Wha... |
I created a simple two way cryptographic function which allows you to encrypt a message and decrypt it with the same key. Here's how it works.
Split the message into an array of 32-bit (or something else, depending on your key's length) segments
Generate a random 32-bit number and xor all segments with it, and append ... |
This morning while checking /var/log/secure to troubleshoot an issue with my Centos VPS, I found that there has been too many SSH bruteforce attempts from 54.93.174.60 for the past couple of days. I blocked the IP immediately and a quick google search on the IP 54.93.174.60 said there are quite a few who has complaints... |
I have a practical situation here, my company is a FTP server provider for some clients. The clients are sharing their files on our FTP server and have had no problem with access management and privacy policies so far.
Recently, our clients want to encrypt their files for one reason: " They don't want FTP server admin ... |
I don't know how well known this system is or maybe there are equal systems better known international. So I'll introduce the related points of the system:
It is a paymentsystem where your wallet is saved on the cardchip itself. The terminals you are able to pay with such a card on do not have to have a permanent inter... |
The linked question relates to error pages, although the same information is often available in HTTP headers, if I follow best practise of hiding service banners:
Is displaying what server I am running on the error pages a security risk?
would I be hindering the effectiveness of vulnerability scanners such as Nessus or... |
> **Update (6 February 2015):**
> It seems like the class in question has actually updated as a response to the answers here (through an issue, now closed, raised on github).
I was looking for an easy to use library for encrypting files in PHP. PHP provides encryption functionality through the [mcrypt library](h... |
I have read a lot of users saying that you have to hash IP addresses - and a lot of others who say I don't have to because it is not private information.
I use IP addresses for identifying users, because they can download files but have limited traffic (per day).
Are there articles or blog posts where this is illustrat... |
I don't share any personal information with StackExchange, I'm not really worried about anyone trying to hack my account and I can't see any incentive for them to do so, and yet the password strength requirements are about the strongest I've ever seen.
Why does this site, and others, insist on strong passwords? What's ... |
Best practices would dictate that domain admins should not be logged into as such for daily tasks.
Ideally the user would have two accounts; Their "daily" account and their domain admin account.
How can one assure (through a technical control) that Bob doesn't use the same password for his domain admin account that he ... |
I'm sure I will be quickly corrected if this is a stupid idea, or if it has already been tried. My question is: has this idea been tried before? If not, are there good reasons it would not work, or would not improve security?
It is easier for me to remember my current password algorithm by entering it in four differen... |
To start with, I am dangerously bad at security. I am aware of this, which is why I'm asking for help to figure this out.
I have a POCO object, which is exposing an ICollection of a model object, so that I can act on it. Is there an inherent flaw in allowing this, or should I preferably be looking for another way to ge... |
I'm making a school project about the AP attacks and I'd like to know how does the Fake Authentication Attack from aircrack-ng actually work and how to prevent it?
I read a lot of articles but nothing goes too deep into it. Thank you for your answers!
|
I have patched my server with OpenSSL 1.0.1j for the Poodle vulnerability. Been reading the spec on TLS_FALLBACK_SCSV. From what I can tell in order for TLS fallback prevention to work properly it requires the client to announce it in the client hello, and if not, even if the server supports fallback, it will not be us... |
I read an article that th3j35t3r (hacker alias) had written awhile ago and could not find it again to reference so I will do my best to explain correctly. An anonymous individual tried to dox th3j35t3r. Th3j35t3r replied with a post to his website wherein he unmasked the Anon and explained that he did so by performing... |
I've been using LastPass to manage all my passwords, including the password for Google account. The thing is, on a new Android Phone, in order to sign in (for Gmail, Play store, etc), I need the LastPass app to copy password from. To get the app, however, I need to sign in Play store first. So my question is, how do I ... |
This malware is hidden in pirated themes and plug-ins for CMS .
the ‘social.png’ file confirmed we had found the backdoor; as it contained a big blob of obfuscated PHP code .
My question is how hacker use the code infused inside an image ?
Can i execute an image file as a php keeping php code in an image ?
Even if i ... |
So I came across with this authentication bypass security notice and the fix for it was just simply changing all serialization to json encoding.
I am just wondering how is this really exploitable? I know that unserialize() can be used to perform object injection. But how can it be used to exploit this vulnerability b... |
Since I'm working on a little historical document about the SSLv3.0 protocol and it's most important attacks, it would be lovely to add some statistics about how many webservers and browsers still support SSLv3.0 nowadays, even after the POODLE bite event.
Sadly I've not been able to find such updated statistics. So, ... |
Older cell / smart phones were susceptible to bluesnarfing / Bluetooth attacks, Nokia phones in particular. But now in days, modern smart phone and cell phones that use Bluetooth technology for pairing, which made phones vulnerable to various types of Bluetooth attacks, are no longer able to be attacked with the same t... |
Is it possible for a webpage to detect or otherwise be aware of what other tabs in the same browser, or even other open webpages in other browsers are doing or transmitting?
I am well aware of cookies, and their ability to store information placed by the web dev for local use. This link and this link were also helpful... |
I am pentesting a windows box to which I have gained system privileges. This box has two network interfaces. I have been able to reach machines on the second interface via the below netsh command. However this is quite inefficient as it is one port at a time. And each remote host requires its own local listening port. ... |
This is technically not even an attack. We have all the resources at hand, except for the original plain-text. We have the cipher-text (to be converted back to plain-text), as well as the key.
The cipher-text stored in the DB is as follows: HKnvB41kkow+KkR4c7G/8vusmEM=
The hashing function used is as follows:
Public S... |
I am working with a security organisation as a developer, recently in spare time, i found some vulnerabilities in our products, i reaction to this, there is a team being setup for pentesting, and they are asking if i am willing to join this new team.
I am confused on this, from career and growth perspective. By the way... |
I buy my train ticket from our railway local web site. When ticket open for sale on web site then web site original traffic remain 50 (Just an example). Our railway web site is attacked by DDoS for this reason ticket opening time traffic show (50x50=2500). That’s why I cannot buy my ticket from our railway website. The... |
If somebody observes a connention between client, and the server, then he can see the keys, by the following data encrypted is.
As far as I know, if I connect to a server, then it sends me some keys, and later the communication will be encoded by this key. But I dont understand, how is it possible, to make it secure fr... |
Apart from the conventional email phishing tests, what other security Key Performance Indicators can be used to measure end user security awareness in an Organization?
Looking at the SANS critical security control #9:
9.4 Validate and improve awareness levels through periodic tests to see whether employees will clic... |
Do firewall rules have to be symmetric? That is, does a firewall have to block a particular traffic type both inbound (to the protected site) and outbound (from the site)? Why or why not?
I have to answer the above question. What is the meaning of symmetric rules in firewall? can anyone please explain it to me
|
After finding a sql injection vulnerability I need to provide the more information I can about the DB. Minimum I need to provide a list of users and passwords.
I identified that it's a MySQL but checking information_schema.schemata I notice there are just two databases: information_schema and abc (the one created for t... |
I have done some basic things protect my router like disabling wps setting strong passwords and stuff. However, I am using a virgin media superhub 2 where it does not seem to be possible to ssh into it so I can only use the web interface which has very limited settings. e.g. the firewall setting options offered are onl... |
I have heard that an Android APK can be debugged if android:debuggable="true" is set. What are the possible threats in allowing an app to be debugged?
|
I am currently working on the redesign of a login page. I have initially suggested that login be throttled whereby pauses (incremental - in number of seconds) are introduced between each failed login attempt. The idea is that this will allow us to avoid locking the account and give users time to think about reseting th... |
How many different certificates can a subordinate certification authority manage?
Please, supply me also some reference.
Thanks
|
I'm going to lecture a group of students about Information Security. I'm going to explain the theoretical sides of SQLi, Buffer Overflow and XSS.
I wanted to give them a live demonstration without breaking the law. Do you happen to know of any framework (maybe even Metasploit is capable of this) that has various of vul... |
When we download an application - it asks us whether it's ok to submit statistics, error reports to the vendor. Since this data is sent from the application to server endpoint - I am wondering how authentication works in this scenario. Is this based on a certificate that resides in the application or some agreed encryp... |
I was wondering how sound is the concept presented by the Gibson Research Corporation (see below if you do not want to follow the link) about simple passwords (= very easy to remember) with the addition of padding.
I understand what Gibson is getting at with increased search space, etc., but I was wondering if this app... |
Let me start off by saying that I read other StackExchange questions related to this and they weren't really able to answer my question. I have a feeling this may be an unsolvable problem, but I'm wondering if maybe there's a happy medium that will satisfy my requirements.
I have an Android application. However, it's... |
Is an anonymous VPN (like frootvpn) all I need to remain anonymous online or do I also need to use TOR or take other measures?
|
I'm not very familiar with encryption and new to this, I'm just learning it right now by code review of one of the class we have in an application to encrypt a password using AES. Would anyone explain to me why do we need to have salt and RFC.
Example Snippets: passing parameters compose of input, salt and rfc string.... |
I found that Wifi's Password can be retrived using the network and sharing wizard in Windows, And Technicaly theres no way to store Passwords/collection of bytes in the memory after switching/shutting down your computer, and So the Network and Sharing Wizard is also an application, and it has to store the password any ... |
I heard that WebView vulnerability is active in Android versions before 4.2. I read that it is fixed by Google in their newer updates from 4.2. What I want to know is a brief description of the WebView vulnerability, like, how an attacker can use this vulnerability and any solution to fix this by myself in my app if it... |
I have an enterprise application running that uses both MySQL and Mongodb datastores. My development team all have ssh access to the machine in order to perform application releases, maintenance etc. I recently raised a risk in the business when users started storing highly sensitive data on the application that the de... |
I have been trying to mitigate POODLE on client side in my organization. I disabled SSL3 in most browsers but couldn't disable it in Safari. Apple released a Security Update 2014-005, which, according to apple, addresses POODLE.
However, Safari is still vulnerable to POODLE according to various SSL testing sites.
I ... |
Im curious about how secure a OpenVPN setup that uses a single cert/key to authenticate against the server, compared to a OpenVPN setup that uses a separate cert/key combination for each OpenVPN client.
The OpenVPN server configuration has a section that says I shouldn't be doing this, but is OpenVPN warning about pote... |
May I know which are all forward secrecy ciphers supported in TLSv1.0 protocols?
|
In short
Are there any tools that can be used to work with authorized_keys to scan the keys and maintain a database of which servers have which keys?
More context
I'm a big fan of public key authentication for ssh, but one aspect that worries me a bit is disabling keys that are compromised. I've been putting my laptop ... |
This question stems from my other question, sorry if it is too similar. Now I would like to know what mechanism is used to sandbox network processes and (if relevant) individual programs, if at all?
Obviously, if the local machine is comporomised and someone has a screensharing program or keylogger installed, all bets ... |
Is it good secure programming practice to overwrite sensitive data stored in a variable before it is deleted (or goes out of scope)? My thought is that it would prevent a hacker from being able to read any latent data in RAM due to data-remanence. Would there be any added security in overwriting it several times? He... |
I know data-remanence is a concern on hard drives, but is it a concern on RAM? For example, once a program completes, is its data still available on RAM, just as data on a hard drive remains after being deleted?
Edit: In this case, I am not as worried about data that could possibly remain after the computer is shut do... |
A penetration test was allegedly done through the following method. The tester sent a user a a hyperlink that:
Silently installed a piece of software/code/etc through the browser with 0 user interaction.
Shelled the app silently through 0 user interaction.
Return a screen shot of the users entire desktop out through po... |
IPsec is a framework protocol that consists of the sub-protocols ESP and AH. IPsec, inately, doesn't include a Key Exchange mechanism, and is therefore dependent on manually setting Keys (archaic), or using IKEv1 or IKEv2 to securely establish mutual keys between two parties.
From reading the IKE and IKEv2 RFC's, I kn... |
I was using an ATM at Walmart when it froze on me. My pin number was in the machine, the account opened. I could not get the machine to cancel, or release my account. I was stuck standing at the machine for almost an hour waiting for help. Walmart told me it wasn't their machine, even thought the phone number to c... |
My old cell phone number had made lots of calls I am not familiar with. I was confronted with a list of calls I know I did not call. I was also told that I was using Skype. I have never used skype, I do not know how to work that program. But, the cell phone company submitted a history of calls made. I called sever... |
I an thinking about this issue and it is hard to estimate technical impacts.
For any relevant reasons, one want to modify one the x509 field of an intermediate CA. This intermediate CA was signed by root CA, and it has already issued some end certificates.
I want Root CA to sign again this intermediate certificate bec... |
I am developing a system to prevent frauds in tickets.
What do I need?
An algorithm to generate a QR Code that will be shown to my clients
in a ticket.
An algorithm to validate (offline) the QR Code, using the user's
smartphone (Android or iOS).
I would like to start by saying that I know nothing about cryptograp... |
Mathematically, is there a difference which set of characters is private_key and which one is public_key?
@Edit
At the moment of asking I was thinking on RSA, not asymmetric crypto in general.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.