instruction
stringlengths
24
29.9k
Suppose a hacker obtains a shell on my Linux host and wants to hide a file. What's the best way for him to do this? You may assume unprivileged or root access. My thoughts are Use a .file filename (pretty easy to find these of course) Write a file to some obscure directory (might be found by tripwire and the like?) ...
Cryptology is such a broad subject that even experienced coders will almost always make mistakes the first few times around. However encryption is such an important topic, often we can't afford to have these mistakes. The intent of this question is to identify and list what not to do with a given algorithm or API. T...
We have a WiFi network that we want to be public and free. Does having a password that is known to everyone provide any additional security advantage to the people using this network as opposed to just leaving it without a password? i.e. Can a hacker do more damage on a WiFi network that has no password than he can on ...
I copied this question verbatim from a tweet by Dave Hull. CIRT = Computer Incident Response Team
In computer security, my areas of interest include x86 processors, binary exploitation and reverse engineering. I'm also interested in the certain aspects of the minix and the linux kernel(memory management, filesystems). A book I read recently is The Shellcoders handbook. I would like suggestions on books which you ha...
So you are looking to hire a fresh graduate to work in an entry-level/trainee IT security role that covers a wide range of tasks: vulnerability research, penetration testing, secure software engineering. Assuming that you will invite to interview candidates with general degrees in CS/IT and no specific experience of se...
I'm not security literate, and if I was, I probably wouldn't be asking this question. As a regular tech news follower, I'm really surprised by the outrage of Anonymous (hacker group), but as a critical thinker, I'm unable to control my curiosity to dig out how exactly they are doing this? Frankly, this group really sca...
I'm reading the Azure Patterns and Practices multi-tenant guidance and in there it says Cascading style sheets Behaviors are one feature that the Surveys site will not support. What CSS features should I support in a multi tenant website?
The Windows Data Protection API (DPAPI) is the suggested method for storing secrets on Windows systems (such as database passwords required by ASP.Net applications). DPAPick was presented at BlackHat DC 2010 and WOOT'10, with a focus on recovering past passwords and encrypted file system certificates. The presentation ...
So I know what SHOULD be in an AUP. This question circulates more around how do I explain to my bosses the importance of having an AUP and ensuring everyone not only knows of it but understands the value and consequences of it. We are an eCommerce company based on the East Coast that ship nationally and to several othe...
I am just wondering if there are benefits from a security perspective to develop a mobile App either as native app or as a cross-platform UI app, in particular Rhodes? I need to develop an application and from security perspective i am wondering if i gain any additional security in going one way over the other.
I'm trying to change text links to real anchors. So for example I want to change http://example.com to <a href="http://example.com">http://example.com</a>. Since this is a user given string, should I take special precautions to things like XSS (for example removing all < and >) or is this something I shouldn't care abo...
I'm looking for a good resource for learning/configuring BURP. I understand the concepts behind using the framework, and have read the docs on the site, but if anyone has a solid tutorial link I would love to see it. I would've made this a wiki but I'm not looking to compile a large resource, I just want a couple sol...
This question has been revised & clarified significantly since the original version. If we look at each trusted certificate in my Trusted Root store, how much should I trust them? What factors should be taken into consideration when I evaluate the trust of each Root CA for potential removal from my local store? More In...
As a more corpose vulnerability assessment and penetration test, one step of our activity is to review from a security perspective the policy of some firewall. In our society we have a deep understanding of firewall rule and best practice but we don't have any standard reference for commercial purpose and we don't kno...
What is the European counterpart organization to USA's NIST? I want to check the European best practices and guidelines on computer security. Does anyone know if this organization exists, and if there are available publications? I need to check the policy role of some firewall but in general I want to know what is th...
I don't know if "here" is the right place to make this kind of question... so here it is.. Is rfid a good solution for controlling access to a data-center? Because rfid is "wireless", is it hackable? Is a biometric solution more secure? For accessing a data-center, should I use a hybrid solution, like for example a bi...
I read an article (can't find link) recently that advocated dumping software firewalls if you had a hardware firewall. I was just curious as to the take on Firewalls in general for a small-medium office. Assume we had a router with a dedicated hardware firewall behind it that filtered and routed traffic before it hit t...
When I run MD5 algorithm I am getting an output in numeric and a few lower case letters. Obviously it uses all numeric digits and rarely i saw some lower case alphabet letter. I need to understand what all the lower case values are in the MD5 output....
I graduated this year and am working in the security domain. I want to explore security topics and don't have a strong background since it was not part of our curriculum. Can you list some good security blogs which explore various security strategies. It could be any kind of security like network security, information ...
MD5 tools output hexadecimal values. In the same manner, do SHA and RSA together produce a hexadecimal (or any other) output? What are the differences between the MD5, SHA and RSA algorithms?
Long story short: I'm an engineer doing development, not administration. I have no direct access to the production server, so I can only tell the administration team the best configurations for security. However, as you all know, it's not as simple as a checklist, because you need to dig deeper and incorporate the conf...
A customer has asked me to conduct a pen-test on the phones of their employees. The customer's target are the text messages within their employees phones. The text messages are stored on the SIM for security reasons. Physical access to the phones is allowed only when the phone is turned off. The customer has asked for ...
My local bank uses a 2 factor authentication where customers key in password AND a One Time PIN delivered via SMS to mobile phone OR from a security token device. I am doing a web startup in the ecommerce space. I already have implemented https for important pages like login. I have chosen a, shall we say, cost effect...
Came across this question What browser plugins can help us to see the actual destination of such shortened URLs?
I came across this question I like to offer my startup also for security advice. Objective: building a SaaS web application that allows businesses to quickly open up online stores akin to Yahoo! Stores. Programming: Done mostly by me. Sometimes I hire freelancers to help me with stuff I do not know. I use CakePHP frame...
I received an email from a client with IDS logs. I was wondering if the following log has any real indications of the server being compromised. If there are certain things I can do to diagnose the situation I am open for any suggestions. ###Log Start## 02/28/2011 08:58:42.352 - Alert - Intrusion Prevention - Possible p...
I am looking for Video Tutorials for IT Security or related. Something like khanacademy.org but for IT Security. Suggestions?
The students are skeptical that turning off non-executable stacks, turning off canaries and turning off ASLR represents a realistic environment. If PaX, DEP, W^X, etc., are effective at stopping buffer overflow exploits, is there still value in learning about them?
In my project I'm using the value of public exponent of 4451h. I thought it's safe and ok until I started to use one commercial RSA encryption library. If I use this exponent with this library, it throws exception. I contacted developers of this library and got the following reply: "This feature is to prevent some atta...
I've got lines in my PHP/MySQL code which look like this: ... $sqlquery = "SELECT price FROM products WHERE 1=1 AND id=".$_POST['id']; ... ... query is executed ... echo $price; As a test/demonstration, how can I subvert this to show something like a user's password if I had a table users like: id | username | passwor...
While conducting a software security assessment, if you have access to the source code of a compiled application (say C++), would you ever do any analysis upon the compiled version, either with any automated techniques or manually? Is fuzzing the only technique applicable in this situation or are there any other potent...
I am now concentrating on my startup which is basically a one-man show. At the same time, i just received an email from SANS Technology Institute’s (STI) about their exciting new accelerated option called “STI Cohort 2013.” which promises me that I would get a Masters of Science. The following information about my sit...
Not sure if this question is too broad, if it is please let me know, we could probably turn it into a wiki. I'm posting this as a reference for other users. What would you say are the best security conferences to attend, and for what reasons? I know defcon is considered the most popular US con, but that doesn't mak...
how does CheckPoint R65/R70 handle IPS violations of outbound traffic from hosts that are NAT'ed? Is it necessary to include the NAT'ed IP in the exceptions list or is it sufficient to include the private IP address? Regards
First of all, I hope this is the right stackexchange to ask this. Seems to be most relevant here. Now, if one is planning to go overseas and he/she has a lot of data on the email account (say, gmail) that needs to be protected, what security considerations need to be taken care of? I mean, I'm thinking of making a seco...
Is WPA2 WiFi protected against ARP poisoning? If not, can the ARP poisoner decrypt the packets?
I'm playing with some generally well written and parsed java code, but there are some oddities thrown up by my code scanning tool. I know a null pointer dereference can crash a program, but assuming the code is written to catch and manage all exceptions, does anyone know of a real attack that could use this issue? Code...
I don't know why do we authenticate by prompting the user to enter both username and password. In my mental model, prompting password only suffices. The reason is as follows: Assume there are x valid characters to use. Case 1 (prompting username and password) Let the length of username and password be n/2 characters ea...
Just curious why most packet sniffers are limited to their segment? is it the nature of a gateway to block the attempt outside a subnet? cheers
As you all know, the SSL/TLS protocol requires both client and server to exchange (in clear text) a random number or nonce. This is presumably used to prevent replay attacks. It is not clear to me what the server-side nonce requirement is. Must it simply be unique? Or must it also be unpredictable? What would be the i...
Would having a large number (10^4) of RSA encrypted files make it easier for an attacker to find my private RSA key? Update: These files would be available to the attacker, and perhaps the content of a few of them could be guessed. The GnuPG implementation with a 2048-bit RSA key would be used, and the public key would...
I saw this question about anonymous web browser, but I wanted to go a little bit more in depth. I prefer answers that take into account how a connection would be traced back, time it would take to trace back (ie: complexity factor), speed loss due to methods of anonymity, and cost-effectiveness of the various solution...
I am searching good info on sophisticated viruses/worms. One example would be STUXNET and the very good analysis made by folks from Symantec. Any ideas?
I am investigating Tripwire and have stumbled upon something about which I am unsure. In a tripwire report generated after I modified hosts.deny to include an extra #, I noticed the inode number changed from 6969 to 6915. I would like to know why this happened. I know inodes are records which store data about where dat...
If I am still logged in using browser X, can a CSRF attack work when I use another (default) browser Y on the same machine? Assume that the web server has a CSRF vulnerability and no hidden token checking will be done on the server.
I use a few websites that prevent me from copying & pasting into the username or password fields. It's quite frustrating when using a password manager, and if anything I'd think it discourages users from good password-management because they're going to have to choose something they can type manually over and over agai...
[cross posted from superuser - I believe the question is also relevant here] I'm trying to harden a windows 7 machine, including replacing the default login shell from explorer.exe to a custom application. This part works well. However, I also want that the administrator will still be able to manage the machine, so I m...
Obviously this is very open-ended. But, I'm just paranoid about people going through everything on my laptop after I leave my job. Here are the things I'm planning to do: Completely wipe all browser caches/histories/passwords, etc. Delete my Skype database files and configurations so that nobody can log into my accoun...
That security through obscurity is A Bad Thing is received wisdom and dogma in information security. Telling people why something is to be avoided can be considerably more difficult when there is no line delineating what you are trying to ban from apparently effective strategies. For example - running ssh on a non-defa...
I need a serial number generator and accompanying checker. I would like to be able to set a salt (and maybe a length). The generator should only produce serial numbers that pass the test of the checker. Those numbers should only account for a small fraction of all the possible numbers of the given length. The algorithm...
Again, I am new to the programming and security world. I should mention that it is just a theoretical question so I can anticipate this kind of attack. Using javascript, is it possible to iterate through all cookies saved in the user browser and send them to me?
IRC seems still the most prominent way for communication within botnets. Why do attackers choose IRC? In my (very naive) opinion, to set up a web service is far more easier.
How do large companies implement their security requirements which are centralized and used to drive things people can do (allowed to call a certain web-service, submit an order, etc.) as well as to drive UI (disable buttons, menu options, individual form fields)? I am considering RBAC architecture: Users -> Roles, Rol...
A lot of people will have at some point received a spam text offering some sort of help via a debt settlement order, or help claiming for an accident that they have never had. I’ve noticed these are prevalent in both the US and UK, and expect other nationals will have similar stories. For those that haven’t, you recei...
I want to use Apple Push Notification Service, so I need a server. This server will have to check a site every x minutes. How the site that has to be checked requires the user to login. So is it ok security wise to get the user to login on a web browser, then upload the cookies which contain the session information ...
In my company, after a DDOS against a server, my employer asked me to make an analysis of the attack and to write down some stuff. What do you think I need to write down in my report? Is there any available template from a CIRT or another organization that can be used after an incident? What is the best practice about ...
I have seen some people recommend Belarc Advisor for Windows hardening, especially for servers. It's supposed to check for stuff such as installed hotfixes and CIS benchmarks (<-- which are great, btw). So question is: Anybody tried it? Anybody know something better? Hypothetical situation I'm in is that I'm an enginee...
I'm trying to brainstorm a security scheme for the problem of verifying server software integrity. The domain of this problem is Game Servers built on Valve's Source Dedicated Servers. These servers are used in competitive gaming, and the integrity of these servers can be incredibly important in running tournaments and...
Apparently a computer system protected by a a login password, e.g. Windows XP, can be easily hacked by someone with physical access to it using methods like this one: http://www.raymond.cc/blog/archives/2006/09/02/how-to-hack-into-a-windows-xp-computer-without-changing-password/ Can anyone inform me how to mitigate aga...
I've just acquired a wireless keyboard/mouse combo (Microsoft Wireless Desktop 3000). Only after having plugged it in did it get me thinking. How susceptible are those kind of setups to sniffing? Are they secure enough for everyday use? From a brief perusal it seems that the problem is not purely theoretical as I initi...
Possible Duplicate: How to do Ajax securely? At my workplace many people believe that AJAX is fundamentally insecure. I am under the impression that AJAX is exactly as secure as any other page load, it depends on how you code the call/page. Is there a fundamental security flaw in AJAX? How does the attack surfac...
Is it possible to use Blackberry Protect in conjunction with a BES IT policy? If so, what settings are incompatible? So far I discovered that Memory encryption appears to be incompatible, but I'd like to see if anyone has more complete information than my trial by error approach. More info
I don't know if I'm looking for a file integrity monitoring software here. Basically let's say we have firefox or chromium, let's say the user is watching a youtube video, then we'll find that video in our cache right? Now i would like to know if a specific application is creating or modifying some file, even if it ca...
Reading a couple questions and answers here recently got me to thinking. Wireless keyboards run the inherent risk of exposing their data due to the relatively broad transmission range, and the ease with which highly sensitive receivers (remember, making an RF signal audible is more the job of the receiver than the send...
We just had a breach of one of our servers, where an intruder got access using the JBoss account and started running exploit scripts. The server has been taken offline and is being investigated, but I'm curious about how he got in. Are there any know vulnerabilities in JBoss 4.x.x that would allow an intruder to run a...
From NIST SP 800-53, Rev. 3: SC-10 NETWORK DISCONNECT Control: The information system terminates the network connection associated with a communications session at the end of the session or after [Assignment: organization-defined time period] of inactivity. I'm aware that a session lock (also required, in AC-11) can ...
I have a Blackberry with no access to the BIS or BES server that managed it. How does one erase and reset the device to defaults?
We are developing REST Web service. We will give Identifier and Secret string to each of our REST clients. When doing requests, clients will authenticate themselves using HMAC algorithm (they will sign body and headers of HTTP requests using Secret string). REST service will receive HTTP headers, body, finds client's s...
In terms of infrastructure, how do Cloud providers (organizations providing SaaS, PaaS, or IaaS via the cloud) manage keys and cryptography? From my understanding, "private" datacenters tend to manage and offload cryptography with dedicated hardware appliances (such as HSMs, ADCs, or SSL accelerators). In that case, as...
Could anyone provide a good resource or check-list for a security review of PostgreSQL?
Some people think the certificate authorities for a PKI should be the government, but others think certificate authorities should be private entities, such as banks, corporations, or schools. What are the advantages and disadvantages of each approach?
inSSIDer shows my wireless network as RSNA-CCMP. The settings on the wireless router (Linksys E2000) do not at all seem to suggest an "RSNA" security option. The security filtering options in inSSIDer have both a WPA2-CCMP and RSNA-CCMP available. What is the difference between these?
By default, I have CSRF protection for all my forms using a token. However I noticed another web application that has a similar function to one of my forms. ANd they did not use CSRF token. So I assumed they did not protect against CSRF attack for that form. So question 1) other than CSRF token, there should not be an...
I intend to generate an OpenPGP RSA key pair where a part (~half) of the private key is as I specify, i.e. a specific string. Are there tools for generating a key pair with such restrictions, or will I have to investigate the protocol? Despite some cryptographical limitations, such a strategy could be used to hide keys...
I've been looking for some time now and have come up short. The most promising I found was Spike PHP, which seems to no longer work. I'm looking to scan my code for potential risks of SQL Injection, XSS, etc. I've gone through most of my code manually, but with a few hundred thousand lines of code, I'm sure I missed th...
As the software engineer on a project, I have been asked to make a Microsoft Access application, with custom interfaces running custom VBA. That part is going just fine. Recently though I was asked to ensure that my Access application complies with FIPS 140-2. The deployment and maintenance of this application will be ...
I’m using Linux based VPS hosting, and a firewall and mod_sec help to keep most hackers out. However, over the last couple of weeks I noticed several entries in mod_sec showing that an unknown domain was attacked. Does this mean that the VPS is compromised (I do not see any unknown DNS entries) and other domains are ge...
Apologies if this is question is not quite right for this site, I have been working on a small startup simple security risk assessment application, mainly to scratch my own itch and am looking to get some feedback from experienced security professionals What I think the problem is with current security risk assessment ...
I have a load balancer that terminates https requests to http and therefore my backend servers see them as http. As a result, all of my cookies are set without a secure flag when you view cookies on the https version of this site. Does this matter anyway since we mix http and https? Amazon.com and several other larg...
I've a pen drive that I carry to the college lab . It seems all the systems in lab is infected. I need to be able to write to the drive, so I can't simply write protect it. Everytime I insert a pendrive , all the folders became an .exe file . Also several other issues . After I scan with avast , everything is cleaned...
I'm creating an SSL cert for my IIS server and need to know when I should choose the Microsoft RSA SChannel Cryptographic Provider or the Microsoft DH SChannel Cryptographic Provider. Question 1 Why would someone still need (what I assume is) a legacy certificate of 'DH'? Given that the default is RSA/1024, I'm assumin...
All things being equal; suppose I have a CA chain that has 1024 bits of RSA encryption. Does this mean that my selection of a child CA or WebServer certificate gains no benefit from a higher level of encryption? My theory in that question is that it if it takes an attacker N compute cycles to attack a certificate with...
Yes or No? :O And why?
Is there any chance that Session ID's can be shared between different websites (one in other IFRAME of others) through P3P Headers?
I'm not talking in particular about encryption, but security as a whole. Are there any security measures that can be put in place to protect data and/or a system that can withstand even a hypothetical amount of resources being pitted against it over a hypothetical amount of time? I think the answer is no, but I thought...
I'm trying to find a way to exploit my stored procedure to test for security problems, I have specifically been testing for SQL truncation-based injection, but I did not succeed so far; I don't think that's necessarily because the code is immune to SQL injection, but maybe because my test cases were not thorough, so is...
PC-A: the local machine, from where i want to see the remote machine [Fedora] PC-B: the remote machine, where the vnc server will be [Ubuntu] install a vnc client [from where you want to connect] on PC-A yum -y install vinagre ssh to the target machine [from PC-A to PC-B], then: [if PC-B is behind NAT, then port forwa...
If I block auto-run on a windows machine, is this enough to protect it from malicious code (assuming I don't run any files manually)? Or are there known vulnerabilities that may cause infection?
I'm wondering if you can actually have 2 (or more) promiscuous (sniffing) ports on a single machine, to monitor multiple network segments? And can you monitor them all with snort?
Had an excellent discussion this evening with ISACA Scotland around data loss prevention. There are technical tools out there from such luminaries as Checkpoint, MacAfee, Cisco, Symantec etc, but all have cost implications, scale limitations and implementation issues. If you use a DLP solution or are planning to use on...
The Security Advisory Press Release here doesn't have much information, the email that alerted me to this didn't help much more, and unfortunately I heard about the two Thursday evening conference calls (how quaint!) after they had already happened, so I'm left to wait until tomorrow morning for the next call. I'm wond...
I'm reviewing the random number generator (expected to be of cryptographic quality) on an embedded device. My point of view here is the operating system and crypto library implementer. I'm particularly concerned about entropy gathering. I've identified a few points to look over: How is the initial state of the PRNG is...
Our project is moving towards OpenSSO, but we have some CGIs that are accessed via web services. For example, one CGI locates files on the server and supplies them to the client. I understand that OpenSSO allows for an Exclusion List, but I'm wondering if Basic Auth will still be enforced by the Apache webserver? For e...
I have a roommate who is a network security engineer and I think he hacked our home network and now knows what sites I am visiting and what I am doing online. Although he is not stealing anything I think he must be playing with me. I read on the internet that if my router is a switch then it is not possible to snoop th...
I'm sniffing a connection that uses ICEP (ZeroC ICE Protocol), and its packet bodies compressed using BZ2 (GNU BZip 2) algorithm. I want to find out whether packets encrypted, or not. ICEP can use OpenSSL to encrypt the traffic. Additional Info It's a local network, and I use WireShark to analyze the traffic. The clien...
Does somebody has an idea, that what kind of iptables/pf rule must i use to achieve this?: i only want to allow these connections [on the output chain]: on port 53 output only allow udp - dns on port 80 output only allow tcp - http on port 443 output only allow tcp - https on port 993 output only allow tcp - imaps on...
I've been in the IT security industry for well almost a year now since I graduated last year and I'm currently thinking about taking up C|EH examination. I've glanced through several prep and review books and found that C|EH seems to be quite straightforward. I do not have hands on experience on most of the hacking too...
I watched this video: http://www.securitytube.net/video/193 Now I'm thinking about an example. Suppose I have a privoxy proxy on my PC: user.action file (just part of it): { +redirect{s@http://@https://@} } .foo.org then I visit http://foo.org and get redirected to https://foo.org. The big question: Am I protected ...
I'm interested on kind of attacks which can be used on 'Industry Control Systems'. I only have found that following malwares: switching-off/disablement the systems stole the information What else consequences can be occurred?