instruction
stringlengths
24
29.9k
Our company is working on getting FIPS validation for the iOS app and is in the initial phase. We have decided to use a private FIPS-certified libraries for using in the crypto modules. I have some questions regarding that. If I include the fipscanister and the openssl TLS libraries in the build and use only the TLS l...
I was amused to see no one have ever asked such a question here before. After a little research in google I found only a few links to root a device in avd. Somewhere I also read that the sdk is already rooted and you just want to install an application which allows other applications to launch as root (am not sure abou...
I am interested in finding out whether my (or any) current ISP (Internet Service Provider) uses a technology known as "perma-cookie" oder "sticky cookie" when I am browsing the internet. This consists of inserting a special HTTP header into every HTTP Request sent via their network. It would allow the visited site to u...
When someone is using a penetration test tool on my site sometimes I can find out what tool is that by looking at the user agent strings in the logs. But sometimes I can't because the tool uses a browser's user agent. Is there a database with common URL patterns that each penetration tool uses? For example here are som...
Is it possible to provide a subjectAltName-Extension to the openssl req module directly on the command line? I know it's possible via a openssl.cnf file, but that's not really elegant for batch-creation of CSRs.
For homework, I coded a TCP packet with raw sockets. So I was also able to change the source IP address to whatever I wanted. So why can't someone just make a program, which sends millions of these packets (DDoS) with a different source IP address? Wouldn't he/she be "secure" and no one could trace him/her? Further que...
I have bought a server and used it to host some game servers or my website. Now I am visiting a computer security course and I would like to test some of the presented attacks. Am I allowed to, for example, DDoS my own server, or could I damage something? I don't want that other servers are damaged by my attack.
Today I set up my first server with Dovecot and Postfix. These are excerpts from the configuration files: Dovecot: disable_plaintext_auth = yes ssl = required ssl_prefer_server_ciphers = yes ssl_cipher_list = EDH+CAMELLIA:EDH+aRSA:EECDH+aRSA+AESGCM:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH:+CAMELLIA256:+AES256:+CAMEL...
I am making a web site which can be considered similar to Reddit in some ways. I need to implement a sign up form so I will store informations about the users. My idea is to store the username, password, email address, and if they want also the gender, birthday and country. There are many SSL certificates, from free to...
I know that if you are using software for your website like wordpress, ip-board etc. there can be like in every software vulnerabilities. But what if you just have an apache server and a simple index.html with really simple html code. Can there be vulnerabilities? I ask because I've seen a site that looked really, rea...
I'm using Dovecot for IMAP connections. I've read a lot of tutorials on how to set up Dovecot, and a lot of them said to only allow: auth_mechanisms = plain login Why should I not allow *-md5 authentication, too? Like so: auth_mechanisms = plain login digest-md5 cram-md5 I know that the server has to store the password...
I have been researching LUKS vs TrueCrypt topics -- my only concern is security, but most of the discussions I see focus around usability / interoperability . I know TrueCrypt has a bunch of nice passphrase features -- slow hashing algorithm, thousands of iterations, options for multiple keyfiles etc. These features m...
It's clearly a good idea to store the revocation certificate in a way which is both secure and reliable. Cloud-based storage services are great for reliability, but of course they lack of security. Would it be a good idea to store a revoke certificate on a cloud-based storage, and securing it with a strong symmetric en...
We recently had a security scan done on our production web applications and received a notification of a potential XSS vulnerability on a particular URL that is used to retrieve a combined response containing multiple js files. Example: http://example.com/CombinedScripts?file=foo.js&file=bar.js And the server would ret...
I found an old box in my garage and it contains a 'sonicwall' device. It looks like a huge router but I am unsure what it does. Do I hook it up between my modem and router and it somehow provides secure protection? What is it and what is its purpose? Also, what protection does it provide?
I'm looking at a Windows PKI and see that the Thumbprint is SHA1, while the Signature is SHA2 (SHA256). Is this an acceptable configuration? Should I recommend that the client update to SHA2 for a Thumbprint? Would this cause some backward compatibility issues?
Where can I get more similar to nmap.online-domain-tools.com scan services. Edit: Probably, nobody know what does nmap.online-domain-tools.com is. I'm trying to explain: Network service. For example, web-interface without "Registration Form" or "With". Kind of security test, implemented on the side of service against...
Please correct me if I'm wrong anywhere, but from what I understand , popular mobile phone based two factor authenticators like Google Authenticator implements TOTP which uses a shared secret key that is shared between the phone and the authenticating server. Why did they decide to use a single shared secret key when ...
I have a router (actually it is an android phone as an access point) with wpa2 AES encription, and I'm trying to crack the password with a very small word list. Strangest thing is, when I use wireshark with EAPOL filter, and deauth, I actually can see the 4 way handshake, but aircrack still says "no valid handshake" An...
I am concerned that my personal, home based Macbook Pro guest network access may be being used by an outside source. Is there a way for me to identify user access, time logged in / out, etc?
I am looking for some advice on setting the ciphers for nginx with SSL. What would you recommend for a good compromise between security and compatiblity at the moment? I have made some research but the solutions are sometimes very different and it gets confusing. For example, this site https://cipherli.st/ recommends ...
D-Wave has teased the ability to perform integer factorization previously, but if you jump to ~10:00 in this presentation they actually appear to outline how they can perform integer factorization using quantum annealing and at ~12:10 they can produce a D-Wave machine (maybe as an NSA special order) that can factor 2n ...
I have noticed that when I am using GnuPG to encrypt a file for multiple recipients, the size of the encrypted message does not seem to be directly proportional to the number of recipients. For example, a file that I tested is 836 bytes in plaintext. encrypted for 1 recipient, it is 1090 bytes encrypted for 2 recipie...
I have an OTP generator that receive two numbers less than 99 as input and return an 8 digit number as its output. I know it has a simple algorithm. because its processor is just an ATMEGA8 micro controller! I tried different numbers as its input and find out that the output is dependent to the multiply of inputs! I me...
Disclaimer: I am not very familiar with safety techniques in general. The problem: Quickly create lots of small files in server from a bash script. I used to use scp (secure copy) in order to create those files but I found it extremely slow with the login operation needed, even when using a shared key through SSH. So I...
CDNs speed up the loading of websites by allowing caching for frequently used javascript libraries like jquery. How do we know if they have modified the javascript before serving it to my clients? E.g. I have compared the hash of jquery.js and verified that it matches the hash on the official website. I then insert the...
What steps can I take to detect if a brand new computer has been compromised? Would it take an actor with significant resources to compromise a system and still have it appear to start the standard Windows set up wizard? Partly I ask this because I wonder if reinstalling the operating system would help or if anyone who...
As a part of a course I study polymorphic/metamorphic malware. Every single paper and article I've stumbled upon mentions the techniques used by a malware to achieve polymorphism/metamorphism but non is mentioning the language(s) in which most polymorphic/metamorphic is written on or code examples of that particular te...
I don't want any connections coming from a tor network to be accepted by my servers.
If i download photo from Facebook, will i be able to read its geotagging metadata, or Facebook just parse the uploaded photo, record all EXIF headers into the database (to show the camera model somewhere or to provide them to law enforcement agencies, for example), and then removes them for security reasons?
Over the past year, several vendors I've contracted with have claimed hipaa compliance. I have asked them for documentation of their compliance and I've never seen any. I would expect an audit signed off on by a third party, or a checklist showing the status of security controls. I know there isn't a merit badge to ...
I detected that my rooted Android tablet had a slow connection. Trying to find what is taking the bandwith, I installed a firewall (DroidWall) and I blocked all the applications thinking that one of them was doing it. The weird thing was that my tablet still making connections to somewhere. So, I used an sniffer appli...
I have a shell script which syncs some files from a remote source and I have a pretty typical HTTP server set-up. There is a user who owns the files served by the HTTP server and a user which runs the HTTP server - both of which belong to the same group. I want the synced files to be owned by the "owner" user and I don...
A linux server has Node.js installed with the http-server package. The server will respond to requests on port 80 with a file in the same directory named index.html. An interesting characteristic of this server is that it exposes full read access to guest users via ssh. Any file on the system can be read by guests (exc...
Is it feasible to create a portable battery powered drive out of RAM that could sustain its data via the charge of a battery? From my understanding it doesn't require much power. Combining this with drive encryption. I see this as being a highly effective method of securely transporting data, that in the event of eme...
I have been using a Windows PC for many years now. Since Android has come to market, I have been very wary of installing apps that require unrelated permissions. Obvoiusly, these extra permissions could be used for malignant purposes, or they could just be used for troubleshooting... always hard to tell. However, I hav...
I'm interested in encrypting e-mails. My very, very basic understanding is that I am to generate a private key, and share my public key with the message recipient (who will share his public key with me). Then, I can encrypt my messages utilizing his public key so that only he will be able to decrypt it. If my underst...
Using classic ASP, is this the right way to do to protect against XSS? var1=untrusteduserinput Showing a text in the body <%=server.htmlencode(var1)%> Showing a link in the body <a href="http://www.example.com/page.asp?var1=<%=server.urlencode(var1)%>"><%=server.htmlencode(var1)%></a> Showing an image <img src="http...
My friend connected to WIFI and after 5 minutes he told me which sites I had actually been browsing, and who I chat with. My question is: how do I defend myself against this, and also how did he do this?
I have a .NET MVC Application which is hosted in IIS. Users of the Application will be company only and it will be access so it will be on the intranet - app wont be exposed via internet. Within IIS I created a new Certificate Request (though I wasnt asked to enter a private key at all doing this from the wizard within...
Why do “Unsecure connection” warnings in modern browsers don’t work against SSL Strip?
I wonder what happens what happens when I am changing my password on a Linux system. Basically all passwords are stored in a file called /etc/shadow or /etc/master.passwd in BSD-like systems as I do remember. Both of them are owned by root/wheel with 600 permissions. So when I change my password using passwd command i...
I know some antidotes for DNS cache poisoning attacks, both simple as port randomisation, and more complex as DNSSEC. But, which is the more effective? Which solutions are really deployed in the nameservers today? Thanks for answers.
Is there any different on case 1 arpspoof -i <interface> -t <target> <default gateway> case 2 arpspoof -i <interface> -t <target> <default gateway> arpspoof -i <interface> -t <default gateway> <target> I found a lot of tutorial on website, some only spoof the target, while some spoof both target and gateway. I had te...
What is the reason that after running: $ nmap -sP 192.168.1.0/24 I got 3 results, but running: $ sudo nmap -sP 192.168.1.0/24 shows 7 results. What is the role of using sudo here?
My application consists of a nodejs back end API but I am also developing a "reference" implementation of a JavaScript client, which is a backbone SPA. First of all; the API accepts only HTTPS requests, in case an HTTP request reaches the server it completely ignores it and also (depending on tenant configuration) inva...
I understand that some KDFs bundle the salt with the output, such as bcrypt (modular crypt format). In PKCS5_PBKDF2_HMAC (specifically, looking at OpenSSL implementation) with a single iteration, is the salt knowable/attackable? I am staring at a KDF implementation that runs a single iteration of PBKDF2-HMAC over some ...
Assuming I currently use a safe way to salt-challenge-response-authentication-method, passwords are stored secured and all. I now question myself - how do users set the password? Meaning, they enter password as plain text in the textbox, and what happens next? should their client hash the password and send it to the se...
CSRF tokens are used a lot. The server sets a token in cookie for that domain that either (1) include in the HTML form or (2) Javascript can read and include in the request. The server verifies the token in the request matches the token in the cookie. But why not simply check the Origin header? According to OWASP, tha...
I have configured 3 VMs: ossec server and two agents in CentOS 6 and Windows 2k8 R2. I have completed the setup and FIM and Log Management works smoothly. It also reports the new files. However, it doesn't detect (or I would rather say reports) the deleted files. I have searched the Google group and didn't find any ans...
For the last 2 days, +/- every 15 minutes, someone is attempting to sign-in to my online email account. When I verify recent activity, the IP address (and the corresponding country) is different for each attempt. I assume it is the same person (bot) attempting to log in from the same geographical location. How does the...
When I began my career in network security, almost a decade back, the industry standard was stateful firewalls that even had the ability to inspect some application layer protocols. I had only heard that a packet filtering firewall was the previous generation of firewalls. I never got to work with and understand how a ...
I have a query regarding the SSL inspection functionality on the USG110 series and above. I have a requirement to provide a public Wi-Fi access point, and I’m looking at using a USG110 to provide application control, and content filtering which I can get working ok with HTTP traffic, the challenge I’m having is with HT...
I've got an application vulnerable to directory traversal (I know this because it's part of the wording of the question). The application has two directories, public and private, and two php files: A.php?folder=[public|private] list the content of both directories. B.php?folder=public&file=test.txt&action=[view|downlo...
We had issues with one internet provider, and switched to another one. However, we received word that the new internet provider is somewhat affiliated with the previous. When running a "what's my ip" query online, we see different results if we run it over an http link opposed to over an https link. Over an http link, ...
What is the most suitable way to encrypt and decrypt sensitive data on a public cloud server disk without storing the decryption key on the server in plaintext? REQUIREMENTS In our SaaS web/mobile app, following user login a user may upload PDF files containing sensitive customer data to a public cloud server physicall...
In an answer to another question of mine, it was noted that a class using standard string comparison functions when checking the HMAC in authenticated encryption would make the class vulnerable to timing attacks against the HMAC. I can't wrap my head around how this a timing attack against the HMAC of authenticated enc...
I have a project that require client application to register and then use the services. I would like to do the following: A client app sends a request with IP, domain name, etc. to my REST service The rest service creates a new certificate based on the parameters and then sends back to the app. The application will th...
I have option in my application which send an invitation email to another user. Someday ago, one of my friend told me that, attacker can flood any email using this function. And i have checked that this is true. But, is this really something bad for my application ? I mean memory corruption or any other matter ? Wha...
Model People living in countries with totalitarian, oppressive and other threatening regimes should be able to use this system and have some degree of privacy when communicating. Objectives Encryption is hard to understand for non-technical people, it should be easy to use. Client side encryption with OpenPGP.JS Code ...
Not being a security expert, I have a rather theoratical question that I have been thinking about for quite a while now: Let's imagine an encryption software that takes a user-provided password, passes it through a key derivation function and then uses its output as a key for AES-256 in order to encrypt a file. Assumin...
I have heard that the developer versions of browsers (chrome and firefox) are less secure than stable versions of them. Is it true? Is there any sense in using developer editions of browsers for development and stable versions for general use?
I have this school project of mine that involves an app and a website that use the same database. The app serves as an administration tool for the website. Since it's made in C# and it's not as secure as PHP, I decided to have the app interact with the database through the website: On the website, there's a php file u...
My organization currently sends out emails directing our customers to login and view information on a customer portal site we have developed. The content of these emails is usually pretty generic since we prefer to send all confidential information to our customers through this secure website. I have recently been ask...
I added a new 4TB hard disk drive to my desktop computer, and noticed a couple of days later two .dll files at the root of the drive. The environment in question is a 64-bit Windows 7 Professional (American English, if that matters). This new hard disk does not contain the OS (the OS is on a separate SSD disk). I have ...
I have Bitdefender Total Security 2014. Recently I have been getting the message/alert "Port scan detected and blocked". I did not care about it much until I getting more especially in a specific timee. I was shocked when I saw the External IP of the attacker is from the same country where I am; so it's not a robot or ...
I would like to know if DLL Hijacking and DLL Injection are the same or if they are different. I know that some malware use it to do malicious things.
According to the Google [1], if my SSL cert expire after 2016 and at some points they will show a warning. But, if all my cert expired before 2016, so I assume no action need to be taken to prevent the warning, right? (Of course except the renewal) [1] http://googleonlinesecurity.blogspot.co.uk/2014/09/gradually-sunset...
What attacker will benefit of TRACE Exploitation and What is the Recommendation to fix this issue?
When a user logs in with their username (Their public ID number) and a password (Their birthday, by default) their name, full social security number, partial credit card number/Expiration date, and billing address is sent over. The user is asked to confirm that the information is correct; This happens every time they ...
I want to solve following problem. Please share your ideas or directly product name that capable to solve this. Our system administrators need to connect customer's servers but I don't want to share SSH, VPN etc information with sys admins. Also I need to see log of commands that executed by sys admins. to make the lo...
spammimic.com offers a service that 'encrypts' your mail as 'spam', the rationale being that all mail services automatically filter out spam, and so if you're wanting to communicate with someone without an eavesdropper noticing, disguising your message as spam will do this. Is there any evidence that this would actuall...
We have created an amateur software product related with monitoring and management of specific services. It has been made in Python and runs a web service as frontend to show the data in a nice way besides other things. We have one problem that we did not solve yet, and is how to distribute it in a way that the virtual...
Do I have to use an IV when using GPG with AES 256? Or does GPG handle that for me? I've noticed that I get different results each time I run the encryption, i.e. gpg --symmetric --cipher-algo AES256 --armor test But is this secure enough without an IV?
Is there any problem if I sent the identity token, which has been issued from a trusted IdP, to javaScript code in order to use it in an Ajax call to a web method with authentication? Is there any security concern from doing that whether the token is encrypted or not! In my case, there is a web application which is ask...
Assume the following scenario: You have to set up a machine in a way that a user is unable to bring out a certain set of files (or a single file only) from that machine while he has to be able to access the file on the machine itself. The user has physical access to the machine when he is unobserved. He has no Admin pr...
I'm an apprentice in web security and I was assigned with the task of researching about OSSIM. Bear with my infinite ignorance as I take my questions to the stack exchange gurus. What I know so far: It's free and and open source Once installed security administrators can easily observe all risk related processes It ...
Is renaming folders & files and changing file types an effective solution for file security of a PC? I am an application programmer and have an extensive background in it. I have written a robust program that renames folders and files and also changes file types. It does not compromise the integrity of the file, altho...
I am confused and would like to know the difference between DLL injection and DLL hooking? I am familiar with its use in malware and I know that key-loggers use it. I also know that SetWindowsHooKEX is used in DLL hooking.
I've been spending a lot of time looking into building an API that needs to be accessible by a single page JavaScript application and how to make it as secure as possible. A lot of what I'm reading about standards like OAuth suggest that you never want the access token you issue to be made available directly to the cli...
man sshd_config page states: RekeyLimit Specifies the maximum amount of data that may be transmitted before the session key is renegotiated, optionally followed a maximum amount of time that may pass before the session key is renegotiated. [...] The default value for RekeyLimit is "default none", which means that r...
Suppose I have a set of computers with variegate level of trust (for example): I fully trust my own desktop pc at home I trust a bit also my smartphone, but I know it could be stolen I trust a bit also our "family laptop" where a login exists for me, one for my wife and one for each of my daughters I don't trust so mu...
According to a Qualys Blog, POODLE can now be used against TLS (all versions). I've read separately that in order to execute POODLE against TLS, the server must skip a step in validating the padding. Most sources name two manufacturers which skip this step. How would an administrator verify or fix their implementation...
I want to host an application locally, but I was worried about security of my local files. I decided to 'encapsulate' the application using VirtualBox. Is that safe for my host OS (Windows)?
I would like to know whether the US Prism can know even the data outside of the US Data centers. For example, If I have my own servers and all the data in Indian servers but I have been using some services like web application acceleration, security, domain name registration etc from US companies, then is there a chanc...
I've been asked by a user whether I would recommend using the Dashlane password manager. I'm aware that other password managers have had some significant security problems, including XSS and CSRF (see below). Is the Dashlane password manager vulnerable to those problems? Has anyone done an independent security analy...
Does java implementation affected? https://www.imperialviolet.org/2014/12/08/poodleagain.html
I recall having read several articles online, and even passing along the advice, stating that disabling SSID broadcast is not only useless as a security measure but also harmful to the security of the client devices. The logic goes like this: SSID Broadcasting On Client devices passively listen for known networks. C...
I want to obtain internal IP of a remote computer behind a NAT that I can reach by using some port, say myhost.farfar.away port 11122TCP: C:\>telnet myhost.farfar.away 11122 SSH-2.0-OpenSSH_6.6.1p1 Ubuntu-2ubuntu2 As you see, there is a SSH server on it, but I don't have connections user data. If I try to trace the ...
Intrusion Detection Systems (IDS) rely on binary signatures or known-bad-behavior of malware in order to detect threats. It has become very clear that this approach has limited success due to the fact that in most cases it will miss new threats and variants. My question is, rather than taking the more-or-less "black li...
I just see this line of code in VB in one file .aspx FileUpload.SaveAs(sPath & "/" & FileUpload.FileName) This line save a file that an user uploaded. It use the SaveAs method. I was worried about the sPath because the user can edit it. The user can only save image, so it check the filename extension. I thought someo...
I am still getting confused with security topics. At the moment the advantages and disadvantages of some of authentication methods are still not very clear. According to OWASP Authentication Cheat Sheet, the password should be only transmitted over tls because of the following Statement: "Failure to utilize TLS for th...
I wanted to create a winform application that have a centralized security database. This application is portable, can be save to any PC and simply run the .exe to use, hence there will be many copies of this software. However, it will require a User login, this login account credentials will refer to centralized securi...
Came across a Digital Certificate which has issued to field *.example.com Is this a valid certificate?
Let's assume we've a architecture like this: [HTTPS JSON API] <-- INTERNET --> [Single-Page-Webapplication using XHR] <---> [Locally installed HTTP Server] The users browser would refuse the connection to the local HTTP because of Mixed Content policy. So how would we implement the communication in this case?
I have a problem with a machine to machine communication where for me it looks like our server hangs up the TCP during the handshake, but I cannot understand why. We have been running for several month on same setup of certificates etc. Our client has supposedly only changed the requirement to not support SSLv2. But t...
We are rethinking our security and came on an interesting issue. How can me make a generic security implementation for customer owned assets. Does every asset need a direct-indirect relation to a customer. And does this mean that for a secure system there always must be a a check on this relationship before a query ope...
Greetings this is my first time to post a question here so please be forgiving if I do something wrong or did not follow proper etiquette. Here is my situation: I created a private, totally locked down, unsearchable, and password protected account and photo gallery on a popular website for hosting photos. The only way ...
There are several articles describing the newly discovered Linux-based Turla trojan. But basically, all these articles repeat the same, very limited, information. Can anybody provide more details, such as: How do linux machines get infected Is there any privilege escalation involved, or is the whole thing only happeni...
I have a simple test website on Tomcat running on RaspberryPi. Pi is behind a router. Port forwarding is on and I can access the website from the Internet. What are the security risks of standard out of the box configuration? Only user and password to Tomcat changed or actually added. Can someone access my RaspberryPi ...