instruction stringlengths 24 29.9k |
|---|
I have read extremely mixed opinions on the process of chrooting for a web server (non-shared environment). Some people swear by it, yet others say that it isn't as secure as everyone says.
Given that chrooting can be difficult and time consuming to implement and maintain, on a non-shared server do you Chroot? Why/Why ... |
I am coding an anonymous WCF service that allows others to post XML into it.
Does using different kinds of XML parsers XDocument, XMLDocument, or even 3rd party parsers increase the attack surface area? (Buffer overflows, etc).
|
When I used the Ophcrack LiveCD recently, the program automatically ran without me manually loading any hashes. Question is: If Ophcrack does not automatically find hashes, how can I go about obtaining them for a Windows 7 computer for which I do not have administrator access (which is required for pwdump7).
|
Who generates the session keys for a SSL symmetric encryption? Is it the client for both client and server where client generates part of it while the server generates the other part?
|
What is meant by an "intermediate certificate authority?"
|
can someone please tell me a few tools that can be used to create a CSR ?
|
According to this post, Dominick Baier was comparing two HMACSHA256 signatures and was leaking timing information upon an unsuccessful comparison.
When working with .NET crypto classes, when should one adopt a similar approach, and sleep for a random amount of time? What amount of time is sufficient?
[MethodImpl(Metho... |
What is the conceptual difference between certification rules and enforcement rules in the Clark Wilson model?
Am I on a wrong path when I assume that certification rules ensure external integrity and enforcement rules ensure internal integrity?
|
Does the encryption / decryption time of rsa algorithm vary significantly with a change in key length? For example, is there a noticeable difference in encryption/decryption time between 512 bit and 2048 bit?
|
How would you protect a password file in a web site? Is hashing the individual passwords not enough? What other steps do I need to follow?
|
Can someone please tell me what does 3 way authentication mean? I cannot understand this concept?
Now if there are two people A and B
A challenges B with a question
B gives the answer and B challenges A with a question
A gives the answer to B
Now if A and B receives the correct reply then both A and B are authenticat... |
I'm particularly looking ones which detect vulnerabilities in C/C++ code. I've seen a bunch of proprietary tools but no open source ones.
|
We have a system that stores credit cards securely on file. We'd love to allow users to sign up using Facebook Connect or Twitter.
Obviously this wouldn't be secure if we were trusting just any old OAuth or OpenID provider, but in the case of Facebook and Twitter specifically, is it possible to implement a PCI complia... |
In the SSL protocol I don't see where the certificate is checked for revocation status.
https://developer.mozilla.org/en/Introduction_to_SSL
Is the Certificate Revocation and Status Checking not implemented in the SSL protocol ?
|
Based on this discussion, closures in C# promote private variables to public variables at compile time.
Suppose a closure was implemented on a Username or Password string. Would there be any security issue with this at run time? Is this an issue in any other language?
If so, is there any way I can prevent this (via a... |
Situation: I have created a WS client (.net wcf) for the customer that access a third party web service (Websphere). This WS uses HTTPS and I get a certificate from WS vendor. All works fine, I have delivered WS client to customer, customer have ordered their certificate... but suddenly I got mail from customer's secur... |
For my computer to verify the identity of a certain certificate should it have all the certificates up to the root certificate?
|
A server certificate would have its domain name at its subject field. A personal certificate would have your name as the subject field. How can you be sure that there are no two certificates with the same name?
Eg:- Assume you need to send some encrypted data to userA. How can you be sure that its userA and not some o... |
If I have deployed a digital certificate on a webserver and if it needs to be renewed then what steps do I need to follow? Will I need to generate a new longer public key private key pair? Why do certificates need to be renewed in the first place?
|
Possible Duplicate:
What is the difference in security between a VPN- and a SSL-connection?
Which is more secure? And offer better access control?
|
What is the difference between the two algorithms?
One difference that I know of, is that MAC is keyed and hash is not.
|
Is it a substitution cipher or a stream cipher or both?
|
I had found bcprov-ext-jdk16-145.jar and bcprov-jdk16-145.zip. I wish to use the IDEA encryption to encrypt XML, but I haven't found any sample of coding in JAVA.
Can anyone tell me how to call the methods in org.bouncycastle.jce.provider.symmetric.* to do the IDEA encryption and decryption or where can find sample co... |
Is RSA a stream cipher or a block cipher?
|
Is the initialization vector used to encrypt a block of data always static or dynamic? If it is dynamic then I should send the IV along with the key to the recipient right? This normally doesn't happen.
|
I'm looking to sit for my exam in a few weeks, and I want to have a good set of practice tests to bounce against and make sure that I'm up to par with the types of questions that will be asked.
|
Why is triple DES is calculated in encrypt decrypt encrypt mode? Why a decrypt in the middle? And isn't decrypt = encrypt since DES in a symmetric cipher?
|
I'm having some difficulty determining how, or if, MiFi devices on property should be regulated. Personally, I see them as having little difference from any other rogue AP in the environment - the only real distinction being that they're generally not directly connected to the corporate network. However, it is that s... |
Do I have to check/test my code beforehand, or do these tools inform me when an attempt is being made in real time? Secondly, which one should I go for -- Suhosin or Spike or PHPIDS or a combo? What are the differences between them?
|
I know about following security attacks on php applications (html,php,js).
XSS
SQL Injection
CSFR
Session Hijacking /Fixation
Code Injection
Remote file injection
Should i know about any other or have i missed any?
|
I'm wondering if there are any tools out there that can assist in solving classical cipher text. I'm looking into developing some tools such as frequency analysis, transposition tools and so on but want to know what is already out there. I suppose it wouldn't be just a technique specific tool such as for caeser ciphe... |
What would you look for in a (X.509-) PKI solution, and why would you look for that, given the following constraints:
Available programming/sw-engineering know how is limited (ie, "OpenSSL with a handful of Perl scripts" is not a feasible approach)
Processes are reasonably well understood (eg certificate lifecycle)
So... |
We are implementing self password reset on a web application, and I know how I want to do it (email time limited password reset URL to users pre-registered email address).
My problem is that I can't find any references to point the developers at around using that technique. Can anyone point me in the direction of so... |
I have recently taken on the responsibility of developing a set of secure programming guidelines. My intention is to provide, using the OWASP Development Guide as a basis, several levels of requirements that correspond to our Sensitive Information Classification levels.
What kinds of issues should I expect to see as th... |
I don't want this to be subjective, so I'll try to make the requirements as clear as possible.
On a Mac with Snow Leopard, how can I set up the firewall rulesets that allow ONLY:
Using the internet through standard browsers (Safari, Chrome, Firefox), software updates, Skype, iTunes, and ftp access to upload data to a w... |
How do DHCP and Static IP addressing compare, from a security standpoint? What are the risks/benefits associated with each?
I know the preferred solution between the two will vary with network size and layout, but I'm just looking for a more general explanation of how they compare.
Please answer from a security standp... |
I see some sites are blocked for IT security at schools, colleges and offices. But, why are some obvious good sites blocked too?
|
I know there are a lot of security policy samples and templates out in the web. I'm curious to know if there are security policies that are actually in use and still published publicly. I know they are out there so I'm inquiring here to see if anyone else has knowledge of companies or organizations that publish these... |
If I can run a site to site VPN, NAT & Reflexive ACLs on a edge router (plus normal routing functions), what would be the use of running a stock firewall behind it?
For instance, Core Switch --> Firewall --> Edge Router --> ISP connections
Asked another way, why would you want to run VPNs & Reflexive ACLs on the firew... |
My local region in Australia is being targeted by a scam whereby victims are cold-called and told that their computer is sending 'errors' to caller at 'Windows' which should be fixed ASAP, and they are standing by to help out with a remote-access session to fix it.
It's not clear that there is any particular attack bei... |
It's all very well to use multi-factor authentication, but supposing you want to 'destroy a factor' so that in an situation where you are likely to be coerced to provide your passphrase, you can happily turn it over while smugly informing the attacker that it will do them no good because the physical token is 'dead'?
D... |
Internet service was widely disrupted in Egypt starting Jan 27th at about 22:15 UTC, in the space of about 20 minutes:
How Egypt Killed the Internet. Service was largely restored 5 1/2 days later on Feb 2 at about 9:30 UTC: Overview of routing activity in Egypt - RIPE
As described at On the ground amid Egyptians' prot... |
NIST provides good guidelines on the length of keys and hashes for various algorithms. But I don't see anything specifically on the length of a random or pseudo-random nonce (number used once).
If there is a single good answer for a variety of uses, I'd love to see that. But to make this concrete, I'll use the common... |
If there a generally agreed upon naming convention for types of malware/virus? For example, are there agreed upon terms for virus, trojan, worm and the like?
If one exists could someone explain it or link to an explaination?
|
What are some ways to mitigate the time-of-check-to-time-of-use issues that apply to Windows permissions?
Example:
End-user is added to the local Administrators group in order to install software, printers, etc.
The user's account is removed from the Administrators group while the user is logged in.
The change in per... |
There are two situations in which 'default' passwords get used on a network:
A new user is registered. In her registration pack, along with her new username, e-mail address and so on is her initial password.
A new piece of hardware is deployed. In its factory state it has a default admin password so you can go in and ... |
There's recently been some discussion (to be generous) about the pros and cons of having a firewall deployed in front of servers. The con mainly being that it's a point of failure in case of a DDoS. Microsoft has been talking about doing away with the standalone firewall and instead basing security on PKI and IPsec, me... |
Are there any automated tools for auditing config files exported from Cisco IOS devices? Free/Open Source is always nice, but anything that does the job would be of interest.
|
Re: Should I report hacking attempts? - Server Fault
Lots of people look at their own logs for attacks from the outside. But who regularly reports such attacks back to the source? I'm mainly imagining that happens for attempts that originate from inside the networks of reputable organizations (e.g. from a compromised... |
Can anyone point me at some good resources on Windows hardening? From 2003 upwards.
|
Can anyone recommend a F/OSS enterprise password management solution on/around the same level as something like Cyber-Ark?
Specifically, something along the lines of a standard password manager, (like KeePass), but with the ability to login with ldap credentials and get access to passwords for your environment, specif... |
i use metasploit for pentesting windows 2003 sp2 server but when windows firewall is on i am not able to perform pentest successfully is there any way to disable firewall remotly?
|
How effective is ASLR in preventing arbitrary code execution in a buffer overflow type exploit? How hard is it for an attacker to bypass this without simply guessing where the addresses are?
|
http://fr.wikipedia.org/wiki/Kryptos_%28sculpture%29
http://en.wikipedia.org/wiki/Kryptos
I read the Kryptos wikipedia page, is says it's crypted with a "modular transposition of lines and columns".
What is that ? How hard it is for a non-cryptanalist ?
|
What are the books you advise describing methods or steps required to make a successful penetration test?
I have a base knowledge of common security checks, but it would be great if someone more experienced describes the full test.
|
I'm looking for an authentication system that relies on 3rd parties (ADFS, OpenID, SAML) but doesn't rely on cookies or Javascript... or at least can make them optional.
My intent is to gracefully degrade and maintain state not in a cookie , but rather keep the session information in a HTTPS protected URI, that is repe... |
Aside from using browser headers, I want to blacklist/whitelist browser and plugins from my site so that I can prevent these older unpatched systems from (1) being a general user of my site (2) removing those 'targets' from would-be-attackers reach.
My goal is to define some kind of
endpoint security standard for us... |
I'm hesitant to implement the proposed anti-JSON hijacking solutions since
The recommended solutions to mitigating JSON hijacking involve non-REST-full JSON POSTs to GET data
The alternate solution (object wrapping) causes problems with 3rd party controls I don't have source-code access to.
I can't find a community-... |
The AntiForgeryToken is used to prevent CSRF attacks, however the links on MSDN don't give me much insight to what exactly the AntiForgeryToken does, or how it works, or why things are done the way they are.
From what I gather, it creates a hash inside a web page and a cookie. One or both of them use the hashed IPrinc... |
I'm looking for a list of risky browser plugins that we should prevent their use on the desktop.
It's probably safe to assume that old versions of Flash are on the list, but what versions? What other objects should we check for?
|
I'm looking for a bit of feedback on WebDAV, in this case running on IIS7.5. I've had an IBM Rational AppScan report come to me with a medium severity finding as a result of DAV entries in the response headers.
I'm conscious WebDAV has had its issues in the past but Microsoft seems to feel improvements have been in IIS... |
BASE is an improvement over ACID, but it's easy to tell that it's maintained by someone who doesn't use it. There's no at-a-glance overview of network activity like you get with McAfee's NUBA IDS and many others, and searching for patterns is awkward and slow compared to log aggregators like Splunk.
I'm aware of a few... |
My company develops and hosts a custom eCommerce and CMS system. We provide this only under a hosted, software-as-a-service model. We are in full control of the hosting environment, and our customers have no control over the source code. They cannot deploy on their own hardware; they have to lease the software from us.... |
For an upcoming contract I'm required to have the CEH certification (even though there won't be much PenTesting) so I'm working through that now. I've gone through all of the reccomended EC Council books but they seem light on the details of specific vulnerabilities and enumeration methods and are more a description of... |
When is it appropriate to use RFC2898DeriveBytes versus a typical hash?
Update
I now understand that a KDF is typically used to create a symmetric key for possible use in encrypting a stream. I also now understand that PBKDF2 obsoletes PasswordDeriveBytes. The intent of this question is to explore the possibility ... |
If I were to run more than one VPN clients on my machine, simultaneously, what risks would be involved?
E.g. are there technical conflicts, such that it wouldn't work right?
Could there be address resolution conflicts?
More scary, can traffic from one network cross over, via my machine, into the other network?
Or... |
I'm a student and fairly new to the IT security field. Most articles and books say you should only patch a vulnerability if the costs of a breach are higher than the costs of patching the vulnerability. However, I can't find any explanation that can give me at least some basic knowledge and skills about this issue.
Ho... |
I've got html / javascript code on my site like this:
<a onclick="validateForm('formEdit',...,'submitpage("mypaymentsettings","320")','show_confirmation_message()','conf1');" href="#"><span>Save</span></a>
I'm trying to understand if there's a way I can call this function "submitpage()" directly fr... |
Not sure if what I'm saying makes sense... but is it possible for me to alter a $_SESSION variable from outside the target PHP script?
One of our scripts uses a $_SESSION variable and I'm not sure if that is vulnerable to manipulation from outside as a $_POST variable is...
|
I'm reading about the OWASP double submit cookies method of protection and there it states that the cookie value between the header and form should match.
That seems to be somewhat of a risk, as the article states, as the value embedded in the form can be accessed by the DOM & Javascript.
Would it not be more secure to... |
I'm an IT Admin at a law firm. We handle sensitive customer data and some health records. I'd really like to have an outside consultant assess our data security practices, but I'm not sure what to ask for.
I realize that the real answer is "It depends based on which regulatory framework you fall under, HIPAA, SOX, PCI-... |
For all devices I know of, if a device is lost or stolen, it needs to be connected to the Cellular network to receive the wipe command. Considering that the end user often needs to regain mobile service as soon as possible, there is a delay between when they activate a new phone (thus disabling the old phone's servic... |
Despite the blatant title of the question, this is actually for a genuine purpose.
My site uses PHP code like this:
$select="select id from tableA where user_id='".$_SESSION['sess_user_id']."'";
I'm really trying to think like a hacker and figure out how I can alter this value. I've read articles talking "about" s... |
I've got legacy PHP code which attempts to prevent script/SQL injection with the following:
if (!empty($_POST)) {
reset($_POST);
while (list($k,$v)=each($_POST)) {
if(!is_array($_POST{$k}))
{
$val=str_replace("&","&",htmlentities($v,ENT_QUOTES));
$$k=$val;
... |
This is how user validation happens on my site:
if(!empty($_POST['username']) && !empty($_POST['password']))
{
$query = "SELECT * FROM users WHERE username='".$_POST['username']."' AND binary password='".$_POST['password']."'";
I do however have this injection cleanup code running on every page that my sit... |
I am planning to develop a website that require that the users register a username and a password. When I let the user choose a password, what chars should I allow the users to have in the password? is there any that I shouldn't because of security issues with the http protocol or implementation language?
I haven't dec... |
I am a recent graduate and would like to move into the IT Security field. My degree was just straight CS with no particular security focus.
I have recently acquired a copy of a CISSP study guide and have started to work through it. Having discovered that candidates with less than 5 years experience can only sit the exa... |
This question is inspired by this security question https://security.stackexchange.com/questions/1707
What are the threats in using Ajax? (Please note I am talking about security threats, not features drawbacks)
How do I do Ajax securely? (Please give examples, preferably examples in PHP since I am using the CakePHP ... |
i ran aireplay-ng -9 wlan0 and it seems that my intel PRO/Wireless 5100 AGN adapter does not support injection. i use Ubuntu 10.10 64bit (2.6.35-25-generic kernel).
is it possible to make the adapter have injection capability? if yes, how?
|
I've setup a Windows 2008 R2 server with an Active Directory Domain Services role. I would like to apply the Specialized Security – Limited Functionality (SSLF) security baseline to it, but am unsure how to go about this.
I have downloaded and installed Security Compliance Manager tool. I think I need to use some file ... |
I'm in search of an expert to answer my curiosity. Suppose that methods like AES/DES, SSH, PGP, RSA, etc. can be cracked or fail somehow. In other words, suppose that it's possible to determine one key for a given security method. I mean to say, that somehow a hacker has enough power to compute a key.
Are there any ... |
I'm wondering, does anyone have any suggestions to defend against SSLstrip particularly?
|
In a Windows environment where security is more important than flexibility is Windows 2008 R2 Core Server installation the best option? How much more difficult is it to setup an environment with Server Core?
|
I already asked this question at StackOverflow here: https://stackoverflow.com/questions/4970681/blackberry-app-security and was directed to this site, can anyone pitch in as to how I can solve this issue?
Users log in to my BlackBerry app with a username and password provided at registration. My app connects to a Jav... |
I'm running a rather large site with thousands of visits every day, and a rather large userbase. Since I started migrating to MVC 3, I've been putting the AntiForgeryToken in a number of forms, that modify protected data etc.
Some other forms, like the login and registration also use the AntiForgeryToken now, but I'm b... |
What should I ask a security consultant to see if they are legitimate or not?
I'm looking to hire someone to perform an assessment, but I'd like to make sure that someone is reputable first.
|
Does anyone have a reference implementation (ideally 3rd party certified, or government approved) way one-way hash a password for C# and or Java?
Ideally,I'd like to see something that includes a "salt and pepper" technique as mentioned here as well as any other modern security technique for validation that might be ap... |
Anyone running a webserver would agree, security can be a hustle and tedious job. Recently I came across a service claiming to help with that -- CloudFlare.com. There's plenty of benefits listed on CloudFlare's own website, however I'm interested if there are any potential drawbacks switching your DNS to theirs. A few ... |
I recently came across an odd JPEG file: Resolution 400x600 and a filesize of 2.9 MB. I got suspicious and suspected that there is some additional information hidden. I tried some straight forward things: open the file with some archive tools; tried to read its content with an editor, but I couldn't locate anything int... |
We have a network share that contains thousands of files. I am concerned that anyone with access to the internet could copy that information to a CD.
In addition to disabling all removable media, what else could I do to prevent someone from stealing our data?
|
Windows 7 and Server 2008 R2 come with a security tool called Applocker. This allows admins to restrict applications to a specific white list which can be as granular as the individual application versions.
Apart from considerations of how practical this is to run, how much real world security would running a fairly ti... |
Which mobile OS's provide a primitive to generate crypto-quality randomness that applications can use?
On desktop systems, these features are pervasive. Unix provides /dev/urandom. Windows provides CryptGenRandom. Do mobile OS's provide something like this? Do they provide any support so that developers don't have ... |
For an enterprise firewall you may have over 50 thousand rules. With typical errors in firewall rules including things like mistyped network masks you couldn't hope to manually review the release.
So what tools are available? Free or otherwise.
|
I have been evaluating MS Forefront Endpoint Protection 2010 vs. Kasperskey 2010.
One of the major differences in features seems to be that Kasperskey gives the option to force the full scan of a USB drive when it is inserted (Source), whereas FEP seems to rely solely on "actively protecting IO to/from that removable d... |
We have a large network that is private, with both eithernet and Wifi access. We'd like to make another smaller network that is wireless, open, and possibly throttled, and not able to access our larger network with file and print servers. Obviously, a good way to do this would to be to add a wireless router into the ... |
I'm writing a very small PHP app that takes input via a form. As could be expected for a first revision, the code does no escaping or sanitisation of input:
if( $_POST["var"] != "" ) {
print "Current value: ".$_POST["var"]."\n";
}
But if I try to inject PHP code ("; print phpinfo();, " etc.) I just get it echoed b... |
Our company had a break-in this evening and a laptop was stolen. The data on the laptop was not super-sensitive (luckily); however, we would like to be able to track the laptop if at all possible.
The laptop is a Win7 x64 laptop, a newer Dell business model. There is no lojack software or anything of that nature pre-lo... |
I would like to create application for encrypting SMS messages. After long enough discussions I decided to use symmetric encryption, since handling public/private keys issue is too difficult for most of users.
So I suppose that secret key has to be transferred over voice interaction between parties or other method.
My ... |
Has anyone used this Bluetooth based smartcard reader? (scroll to bottom) If so, what are your experiences with it?
Can you tell me if it's possible to require only the presence of the card + card reader, but no password? All of our devices have a local password already. Is the challenge password something you know or... |
The Internet is generally plagued by websites that break basic rules of security, then there's a middle tier where website try to secure passwords... but they do it incorrectly. And finally, there's websites that do security correctly and are generally secure, but may be vulnerable to attacks not directly on the passwo... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.