instruction stringlengths 24 29.9k |
|---|
I have a laptop that has Sophos Safeguard full disk encryption on it. I booted the machine into another operating system on a USB stick and attempted to read the disk from the other OS, and I verified that the disk was encrypted and I could not read it. This machine does not have a TPM chip. I do not have to enter a PI... |
I need to create cryptographically secure PIN number in Java using secret id for each user.
This simple approach comes to mind:
int getPin(String secretUserIdStr)
{
String pepper = "randomPepper...";
String seed = secretUserIdStr + pepper;
SecureRandom sr = SecureRandom.getInstance("SHA1PRNG", "SUN");
... |
In an internal PKI using SHA1 for hashing, will S/MIME signature and CRL/ARL signature be considered invalid in the next few years (SHA1 Deprecation) ? End certificates can be revoked, CA certificates too (or may be updated and signed again), but what about S/MIME signature and CRL ?
The question is not really about ... |
I'm searching for a encrypt method that receives an int variable and outputs exactly 11 hexadecimal digits.
I'm starting on a existing application, that already has a database of more than 130.000 registers, each one with his own 11 hex-digits code. The old algorhythm only generated random 11 hex-digits, with no inform... |
"The problem that led to the vulnerability was reportedly wallets
generated with previously used 'R-values' in formulas that generate
random numbers, meaning a hacker could use the public address to
calculate its private keys. If R-values are unique, this should be
impossible." - CoinDesk.
https://github.com/... |
This may not be a great site for this question. I basically have approximately 10 VPS instances running a secured website each, each with their own SSH connection to a hosted Database. What I'm looking to do is transfer these sites to a single server setup (minus loadbalancing, etc.), and have the sites be selected bas... |
I am talking about the Java implementation. Is it more secure to use reflection in order to access the internal Field value of type char[] inside a java.lang.String instance and overwrite the containing values like the following example?
As an example why someone could use it: Someone enters a Password and after the P... |
Recently, I was at the bookstore checking out books on computers. I found an interesting book on various types of hacks and how to stop them on your servers.
One that caught my eye was the "buffer overflow". It was basically the hacker removing the limit on an input box, typing random gibberish into the input, and then... |
I've been learning about PGP, and I asked myself, "Why?"
For example, if I'm using https://mail.google.com, then what benefit would adding PGP offer that would justify it being used?
I can understand that its possible for an encryption method to become compromised, and it could be seen as a means to avoid disaster if a... |
I'm editing my question to clarify what I'm trying to ask.
In order to launch an SQL injection there should be someway to get input from the user (i.e. username and password) for instance. So I've been exposed to the attack and to the solution itself, the emphasis of the solution was on validating the input and somewha... |
Is it possible to prevent a file from being encrypted, or at least being easily decrypted in case of encryption?
For instance; with the Crypto Locker malware attacking users, could you set up a honeypot with a file to somehow reveal the key needed to decrypt the rest of the files?
Or could you construct a file (or pad ... |
Rivest et al. proposed the concept of privacy homomorphisms, but did not distinguish between partial versus fully homomorphic encryption. Gentry seems to take for granted the idea that fully homomorphic encryption must preserve both addition and multiplication.
Clearly, someone in the intervening three decades made the... |
Microsoft has tremendously increased the security of Windows 8.1 but i found a technique to bypass UAC remotely
I know that if User belongs to local group Administrators he is not given full Admin Token on the box nether locally or remotely
He is given filtered token and when he needs to perform admin related tasks he... |
Could someone tell me the difference between hardware encryption and software encryption?
(With regards to flash drives, if it makes any difference).
From what I understand, software encryption is basically a program that runs when a flash drive is inserted and asks for a password. So what does hardware encryption do?... |
I want to start using keepass to set and get my passwords. To always get access to them I thought about using keepass-portable on an USB-stick.
So I would have an USB-stick with a the program keepass-portable, my password-database and my keyfile on it.
When I am on any computer, I have to put the stick in to get to on... |
When designing a password reset process:
Is an email address or an assigned username a valid piece of information (identifier) to ask for in two factor authentication?
How does two factor authentication work for password resets in general? wouldn't asking more information from the user be an overkill when they have ... |
For what is it usefull?
I (client) send an echo-request (with http data) to the proxy server. Then the proxy has to send me the echo-reply. But my question now is:
2.1 The proxy first needs to send my data to the webserver, the webserver needs to reply -> this costs time. So can the proxy server delay the echo-reply?... |
Is there anyway (e.g some command line argument) with which we can tell snort to run and perform detection but without caring for the rule modifiers if there are any ?
e.g
alert tcp any any -> any any (msg:"PROTOCOL-TELNET bsd exploit client finishing"; flow:to_server,established; dsize:>200; content:"|FF F6 FF F6 FF... |
How does someone attack a WPA/WPA2 wireless network? I have read on the two main approaches: dictionary and rainbow tables. How do you use rainbow tables in conjunction with your tool of choice? I went over to Free Rainbow tables (http://freerainbowtables.com) and the tables seemed to be listed in the order of the type... |
Here at my school teamviewer was installed in all faculty computers. My question is, when I access another teacher's computer via teamviewer, are they able to see that I am doing so? Can they see and be aware that I am seeing whatever they are doing on their computer?
|
I am currently doing a penetratiion test, and have captured a bunch of NTLM hashes via NBSN spoofing.
An example (this is not taken from what I captured, and is random but the format is the same) would be:
[*] SMB Captured - 2014-12-11 11:20:00 -0500
NTLMv1 Response Captured from 1.1.1.1:62222 - 1.1.1.1
USER:justauser... |
I would like to configure local honeypot on windows xp which is installed on vmware, to do so I follow instruction on this link, but as I am new I don't know how can I configure routing infrastructure so that the appropriate network traffic gets passed to the honeypot machine.
could any one help me with this?
|
Let's say I lock down my site through .htaccess and say
DENY FROM ALL
ALLOW FROM myip
how involved is it for a hacker to to simply spoof their IP address to match whatever mine is and gain access?
For that matter, is the .htaccess secure enough to lock down specific files/directories?
|
Some organizations will configure their Windows systems to require Smart Cards for all account logins, as part of a two-factor authentication implementation. However, this can easily be bypassed without two-factor authentication under certain conditions.
The bypass requires Administrator credentials (username & passwor... |
I decided to take an online virus scan using ESET online scanner, after getting some weird crash that made my drivers and other parts of the operating system unusable...
The preliminary results say "PHP/Small.NAL trojan", but I cannot find any real information about what it actually is.
What is NAL? What kind of trojan... |
It's often recommended that you should use a VPN when using unsecured or untrusted networks, such as open public wifi or secured wifi that you don't control. What are the advantages to using a VPN on any network (wifi or wired), even a network you own/control?
|
I am thinking about forwarding port 22, to 22 on the machine behind router, but is it safe? Anyone can try to connect to my public IP on port 22 and then indefinitely try to guess user and password.
Doesn't seem like a good idea. Any suggestions? How is it properly done?
|
Obviously the first answer is "a malicious application can do much worse than that." However, it seems like a really easy thing for an application to read your cookies, saved passwords, etc. from your browser settings that are saved in your browser's folder inside AppData (on Windows). It seems like a really hard thing... |
False acceptance refers to an unauthorized user given access to a system which he is not allowed to access. Therefore a false acceptance rate of 1% means the system will incorrectly allow access to someone who is not allowed 1% of the time. I have tried to google around but cannot come up with how the false acceptance ... |
Multiple instances (between 3 and 15) of this of this process Wslxrqjet.exe are running on my Windows 8 system at all times. Windows Task Manager 'Description' field for all instances is "Google Chrome". Yet I have uninstalled Google Chrome from my system.
Location of the executable on my system is C:\Users\RickReeve... |
I want to start learning about VA on Apple iOS devices. Besides documentation, is there any good tool - in terms of automated vulnerability scanners, or scripts - to start?
|
A strong cryptographic hash makes collisions unlikely. Many cryptographic protocols build on that fact. But Git is using SHA-1 hashes as object identifiers. So there are a lot of already computed hashes out there in the public Git repositories of the web, along with details on how to reproduce them.
Is there some known... |
I was wondering, how safe the default configuration of a Fritz!Box really is.
By default, there is a 16 digit WPA2 key, which contains only numbers.
My first though was, that bruteforcing is right easy, because it only containes numbers.
I could find out, it'll take up to 65 years with my Geforce 780 to bruteforce.
Now... |
We have an embedded device running a web server. That web server uses HTTPS and so has a private certificate which is embedded on the device. Right now we are unsure if this private key should be password protected since that password will need to be embedded on that same device at some pont. If we don't, even the web ... |
Some softwares such as Computertrace claim that it can survive on a laptop even if the thief successfully reinstalls the operating system, reformats the hard drive, or (in some laptop models) swaps out the hard drive. How could this happen? Won't all the data associated by the software with the computer be erased?
|
My client is who is running a recent version of vBulletin is getting lots strange activity and I'm at a loss to explain what the attacker is trying to accomplish.
The attacker registers a fake user account in the forum with clearly made up personal details. Then we start getting hundreds of hits on the member page of... |
Sorry I'm pretty clueless with this stuff..
I know that vpn hides your IP address when just browsing websites, but how about submitting an online form, such as when you send an inquiry?
Would my IP address (fake if using VPN?) and device-specific address like Mac address etc. go through? What else? Meaning my anonymity... |
I'm really sorry if this is posted in the wrong section. I did spend some time trying to get it right but I am not sure if this is...
I have been exposed to thieves who have stolen my phone and then made over 500 calls an hour where some of the calls cost up to $500. Of course I have blocked my SIM card, but the damage... |
I was doing an pen test in a website and the programmer did a big mistake and I was able to read any file. So I read the web.config and see the password for database was in ConnectionStrings_Prod.config.
Before report and just for curiosity, I tried to connect to database. This is MS SQL Server 2014. Because my lack of... |
This is somewhat a followup to "About password_hash() in PHP and storing (part of) its salt outside DB".
Is there a way or any advantage to have a system-wide salt and a user-specific salt vs just a user specific salt? If so, how can I archieve that with that function? Is there a way to replace its internal salt genera... |
For clarification, I am looking for the best way to release this program anonymously, not how to remain anonymous and such in general life (that is a different -already answered- question).
I've created a program myself not pirated/cracked and would like to release it to the world but do not want anyone to know I crea... |
The Situation: I'm developing a script that runs in a popular sandbox game as a paid service for other developers. The problem is that the game does not implement a way to do so. The language is Lua and the game has disabled bytecode loading. This means that any script I hand over to the other developers would have to ... |
I am looking for best practices regarding the collection of Pre-Authorized Debit (PAD) agreements electronically. The Canadian Payment Association only seems to provide the following statement regarding electronic PAD agreements:
"If the customer provides their authorization electronically, it is your responsibility to... |
Our websites have been the target of an increasing DDoS, the reason is unknown. Right now, we have taken enough precautions to reliably identify and filter the problematic requests (approx 1 mio/day at its peak, before we stopped counting). But as there were other efforts to disrupt our service in recurring intervals... |
I've been trying to access the website of youtube but it keeps denying permission. It says
Incorrect certificate for host.
The server presented a certificate that doesn't match built-in expectations.
These expectations are included for certain, high-security websites in order to protect you.
Error 150 (net::ERR_SSL_PI... |
I came across this question during an interview. I was asked: What are the two main components of PGP encryption necessary for it to work?
I was thinking in line of Private and Public Keys but I am not sure. Googling the question did not help neither.
Any ideas?
|
When ones goes into a public space, like a train or plane, how does one prevent their previously joined SSIDs from being broadcast? I noticed that my phone and tablet tend to try to join these networks and it can efficiently build a list of places I've been to in the past without too much effort. The accuracy might be ... |
While reading a website called 4chan/b/ someone posted this code snippet, i was wondering what it does when executed? it appears to be C code, how harmful is it?
This is the full post:
Run a live system and try this:
char esp[] __attribute__ ((section(“.text”))) /* e.s.p
... |
So I'm reading over the Yaksha Security System and see it is based on the RSA cryptosystem and a centralized server, easy enough. What I'm slightly confused on is the math behind the related keys.
It states
nAlice - Alice(some user) modulus
dAliceA - First private key only known to Alice
dAliceY - Second Private key on... |
I'm intrigued that many sites use seemingly random numbers with a random operator as a security check to validate that you're not a bot. Forgive my ignorance in captcha technology, but what is stopping the bot from pulling the simple math problem and calculating it on the fly?
Here's a sample I've pulled from a website... |
It seems to be commonly accepted nowadays that all internet communication should be encrypted.
(For example, this is evident in how the HTTP 2.0 standard outright requires HTTPS.)
However, I have a hard time believing that this is the right way to go, but I feel I'm alone in this position.
Consider, for example, the do... |
There are several questions which discuss the resistance of passphrase-protected private gpg keys against brute force attacks. It seems, this kind of discussion could go on forever.
Rather than starting yet another of these endless discussions, I would just like to ask which concrete options/parameters I can change in ... |
If I am using tor for anonimity, does this prevent staff at a place of employment or an educational institution from remotely viewing my desktop and seeing what I am doing on Tor? If so how can I get around this?
|
Is the protocol described at https://datatracker.ietf.org/doc/html/draft-ietf-secsh-agent-02 actually implemented by any ssh agent? pageant implements a different protocol as does OpenSSH's ssh-agent.
|
Initially asked in bitcoin, I wanted to know how is it supposed to be used for anonymity. I mean that I need to register wallets and buy bitcoins. For anonimity, guitedlines recommend to use disposable mail. How is that? Isn't disposable mail features public exposure of your communication and possible loss of informati... |
I saw a DEFCON talk about owning back a stolen PC/Mac, with a SSHd daemon and a dynamic-ip service installed,running in background.
I was wondering if is it possible to achieve tha same results on an Android phone with root access? If yes, how?
Since Android it's not like any Linux distro,how would be possibile?
EDIT: ... |
Recently, I notice that while using Google search, I am connecting to Google's server using UDP instead of TCP on both port 80 and port 443. It seems that Google is experimenting with some new technology related to SPDY QUIC or HTTP/2.0.
Since UDP is a connectionless protocol, it can be spoofed easily. Does this not ma... |
I understand that Kerberos is for Authentication not Authorization, but Is it possible to get Kerberos to refuse to Authenticate certain users on specific hosts? I am currently using LDAP for /etc/passwd /etc/group, providing the userPassword entry as a '!!' to disallow login by default. And Kerberos is serving up au... |
From what I read, in TLS, the master secret is used to generate the following:
a symmetric key to encrypt the SSL records.
an IV (initialization vector)
a key for Message Authentication Code (MAC)
I'm not sure what the term "session keys" stands for: is it the symmetric key only, or is it the ensemble of all keys der... |
I was asked to do a research about attacks on various digital signature schemes. There is one thing that bothers me for which I could not find a direct answer.
For digital signatures that are based on prime numbers (like RSA) attacks are theoretic for example "chosen ciphertext attack" or "known plaintext attack", a v... |
Our government encourages the citizens to move to "smart passports", which contain biometric data such as fingerprints. They say it is safer for us because it prevents identity thefts.
On the other hand, some people claim that the entire idea of having my biometric data in a government-controlled database is problemati... |
I am currently interested in knowing how to write some proof-of-concept code for recent vulnerabilities that are released every month by the CVE and Microsoft Security Bulletin.
These websites list that vulnerabilities have occurred but they don't explain how the vulnerability works. For example Microsoft Security Bul... |
When I need to access our school web portal I need to access it with my certificate (pfx). Since certificate needs to be installed in browser, I'm thinking (out of security reasons) to create a portable version of firefox. So I would buy a new usb stick, encrypt it's file system with TrueCrypt, so that every time I try... |
I wrote the log In/log Out scripts of my web page and when the user logs in I store in the $_SESSION variable the user agent. Now each time a page is loaded I check if the user is logged in or not and if it is logged in I check if the user agent has changed or is still the same to prevent hijacking. In case it has chan... |
Hello I am working on an Android application in which I'm required to execute a few https web service calls. All my web-service URLs and Web API KEYs are in the code plus the IP address of the server. When anyone does reverse engineering on my app then that guy can get my web service URLs as well as API KEYs then can s... |
if theres a port scan on the same segment and it does not reach the firewall at all, it is not detectable by anything. is there any solution to that ? maybe using the windows fw on ach workstation to monitor ? Is there a way to create maybe a user defined rule using a default windows firewall, that detects when theres ... |
I was wondering if DLL hijacking would work with all types of linking or just run-time linking. I hear that malware uses it and wanted to know how it works
|
I have a bit of a security concern. I'm concerned that my neighbor sees everything on my computer, web sites I have visited, my passwords, etc.
Background:
He installed a Linksys router in my house after I complained to him about poor signal strength. He is experienced with IT, and I am concerned that he is able to con... |
If I open up a dedicated server on my home network to accept incoming connections (HTTP, SSH, etc) and that machine is compromised by an outside attacker, what are the risks to other devices on the network?
Is it enough to keep important personal files off the server itself, or is the entire LAN potentially open to the... |
Does google give the info to website owners / administrators... is I guess how it would work?
|
I'm writing a simple web framework for a project of mine and need to ensure that the websites it produces are secure. In order to check this I thought I might as well just try and hack my own website while it still has dummy data and doesn't matter if I lose any information. I can always just destroy the server and sta... |
Someone reported a bug on my site that I don't really consider an issue. My site has an URL akin to this:
www.site.com/ajax/ads.asp?callback=[text injection]
So filetype is application/json, and I don't see how that can affect security of site.
His point of contention was that it can bypass crossdomain.xml if someone ... |
I am writing a program that uses a webserver as a backend for communication between different users. Is it okay to use my own encryption (such as http://www.logikdev.com/2010/11/01/encrypt-with-php-decrypt-with-java/) instead of purchasing an ssl certificate for communication between the program and the server?
In par... |
Ive been recently trying to lock down my network at home and suspect
that someone has hacked my linksys router because port 3128 seems to be
open through the router and I have no knowledge setting or allowing anything
like squid-http up. I try to run things as lean as possible for security.
I checked my Mac OS while I... |
I am trying to optimize the Orchid Tor client library for my needs and noticed that every connection with every node uses TLS with turned off certificate verification.
Actually there are no TLS certificates on any Tor nodes, so it seems to be useless; is it?
Can I turn it off to improve network speed?
|
It is known that people reuse their passwords across different sites.
The reuse can be done in two ways:
using exactly same password for two different sites,
slight modifying the password of one site and using it on other. We call them similar passwords.
For case 1. comparing passwords directly reveals the password r... |
I was using my laptop at a Starbucks on a table, and a person was using a laptop on the same table across from me, a couple seats to my side. He flicked some plastic thing across the table towards my laptop. What really freaked me out was he then actually flicked it again further to get it right in front of my laptop, ... |
I have a database which has stored procedures which take plaintext passwords. It hashes them and inserts them into the DB.
If an attacker has access to the DB connection, it is possible to intercept calls to the DB using SQL Server Profiler and see the passed in plaintext passwords. I understand that SSL will encrypt n... |
With the massive Sony leaks (including their private keys/certificate), i was wondering:
How do major AVs deal with signed binaries? ie:
Does it influence their detecting ability of the signed malware? If so, how? For example:
Do they check CRLs and get the binaries with revoked certificates under stronger scrutiny?
D... |
There's this "change password" ASP.NET form that has both event validation and viewstate enabled. There are no specific anti-csrf tokens. From I understanding, in order to execute a successful CSRF attack, an attacker will have to be able to get both viewstate value and event validation value. If that is the case, is t... |
Can rfc6238 be used for transaction signing by concatenating the random seed string with transaction details (such as amount and target account number) ? Could a transaction authorization 8-cipher OTP be generated offline using these transaction details?
|
We have a web application for which I've been asked to add the ability to let users upload documents that will then be visible and downloadable by other users. Those documents will typically be images and audit documents that will initially be in PDF format but may extend to other office formats in the future. Each use... |
Was looking at cryptocurrency and how, as a non techy, to get involved when I began thinking about the security of it being developed to undermine the stranglehold bankers have on economy and the unfettered misuse of currency by governments. Very good. I applaud the theory and effort to overcome inequality.
If somethi... |
I was checking the weekend logs of my IIS server and noticed a strange request which was blocked:
http://www.mysite.com/Scripts,j.html()).html(a.spinner)}this.xhr=d.ajax(d.extend({},a.ajaxOptions,{url:h,success:function(k,n){e.element.find(e._sanitizeSelector(c.hash)).html(k);e._cleanup();a.cache&&d.data(c
I have chec... |
Little background: I forgot one of my CCTV accounts password, so used the admin account to create a new one. However I can't access the old one as it's not possible to change a user account password, even with the admin account (Via the interface at least) (And I'd like to either delete the account, or get access to it... |
I have recently received an attack to my website and Google is warning visitors to not load the page.
The malware is located in wp-includes/js/swfobject.js of my Wordpress and I had deleted it but appeared again.
Malware code:
/* SWFObject v2.2 <http://code.google.com/p/swfobject/>
is released under the MIT Lice... |
I was thinking of using a Debian guest as my main 'host' instead of my actual host (Ubuntu).
Do you think this will have any advantages in terms of making it difficult for digital forensics to recover the files that are in the guest OS?
The only encryption used in the Guest OS is encfs. Also the network is bridged. I ... |
I've been asked by bankers, school administrators, insurance agents, car salesmen, realtors, you name it to send them all kinds of information over e-mail over the years. Everything from my address and phone number to credit card information and Social Security Number, either as text or in the form of scanned documents... |
Our cloud based service is currently undergoing changes with a view towards PCI compliance.
It is a high throughput service, and there are concerns that enabling the right amount of logging on our web server application will hinder performance of our system (What logs to retain for PCI-DSS? - Retain All The Logs). Duri... |
When I search the geographic location of my IP address why does it show multiple cities and states that are not my own? Does this indicate someone else is sharing my IP address?
|
In order to stop people abusing free trials, we can make sure new users are not reusing data from existing users and therefore not just signing up with a new account every month.
It is reasonably simple to create an email alias, use a fake name etc, but getting a new credit card each month is tricky.
However, this coul... |
An application is required to store sensitive data* on each user. Additional columns are added to the database which store cyphertext encrypted on the application server. The algorithm of choice is symmetric (AES) and a single key (assume that this key is correctly stored and distributed to the application servers).
My... |
Lets say I want to develop a website with a community, and so I want it to be open source. However, this website isn't going to be static.
However, it seems that revealing the database connections and the queries made is insecure, as the database name, username, and password are all part of the code.
How is sensitive ... |
My residence provides wifi and I'm using my personal computer to connect to it. I use a login and password to have access to the internet. Some websites are blocked by it.
Sometimes I log into VPN (using ANyConnect) to access data on my university's server. When I'm on the VPN, the websites usually blocked aren't.
My ... |
I sometimes come across systems that are segregated in a way I know to be flawed. The arrangement usually looks like this:
There is a general IT environment, which follows best practice: patching, anti-virus, password policy, USB disabled, etc. However, there needs to be a balance of security and usability in this envi... |
Most password reset systems involve emailing the user a one-time link that lets them reset their password. The token needs to be in the URL, as most email clients do not allow HTML emails to perform POST requests, and asking the user to retype the token is not an acceptable experience. However, this puts the token at r... |
So, I had an idea on how to block Tor (or similar tools) from being used on your network (or ISP, which is perhaps more relevant, considering Tor's mission). I'm assuming it wouldn't work (based on the assumption that the US Navy is smarter than me), but I'm not sure why not. So, here's how I'm thinking it would work:
... |
Sony recently saw a large amount of data stolen. In order to prevent the stolen data from being spread using torrents, they are doing what was called a bad seed attack. What is this attack? Is this a known attack or some term they coined for what is happening in this specific case?
Here's an excerpt from an article rel... |
I use Lastpass and I'm testing out other password managers in order to set policy for organizational use. Depending on settings, I've found that these programs can automatically send your password out to unexpected places. For example:
Password Safe: The "browse to URL and autotype" feature of Password safe opens th... |
Microsoft suggests "certified drives" for http://www.microsoft.com/en-us/windows/enterprise/products-and-technologies/devices/windowstogo.aspx, but it appears that other than confirming that these drives work with Windows To Go they are no more secure as it relates to Windows To Go support than any other drives that wo... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.