instruction stringlengths 24 29.9k |
|---|
What are the risks of using an Android phone as a modem to connect my netbook to my company network from outside the office?
Is it better to use a cable to connect them both or bluetooth?
I've read that using VPN is good enough to protect my data, is that right?
|
Can a browser get the data on my clipboard? Data could be for example my temporary password?
Any browser or operating system that allows this?
|
This question is on the assumption that any data once encrypted, may (eventually) be decrypted through
Brute force (compute power/time)
Exploits in the cryptography used
Theft of private keys
Most threat models, procedures, and business interaction I've been involved with has focused on the protection and security o... |
See the reference image below. When issuing commands to a bash shell via a netcat connecting using UDP only the first character of the command seems to make it to the server. Moreover, after entering the command a second newline is required.
Why does this behavior occur? What is the proper way to create a shell using n... |
Please can someone tell me the main Enterprise/Open Cryptographic Systems in use, I am having a hard time googling for them. I know OpenPGP is one, but is that the best and most ubiquitous one for ogranisations/enterprises etc?
I am thinking for authentication, encryption etc. Emails, files, network access etc.
Thanks
|
Unfortunately, a client of mine still has an application based on ASP.NET 1.1.
Yes yes, I know - horribly insecure, support ending, and on and on... I've already been through that with them.
Unfortunately, their upgrade timeline is not soon enough.
In the meantime, they're trying to plug some of the larger holes... ... |
As part of a compliance audit, I need to run a routine scan that verifies that our firewalls are performing stateful packet inspection on incoming packets. I have a dedicated server outside our network, on which I can run nmap or whatever software I need to, and scan the external port of our firewall.
The compliance au... |
Is it considered "secure" to send a password in a skype message and delete the message after the recipient remembered the password?
|
I use a good MUA: Thunderbird [to read/reply to my emails on Gmail].
So: what happens, if i go to a place, where is public wifi, and someone tryes to sniff my password/username/emails?
Questions:
- Is gmail available only via IMAP/SMTP with SSL? [sslstrip-like attack could get my passwords?]
- if someone spoofs "s... |
I am planning to do a clean Windows 7 OS installation.
Is it possible (and/or recommendable) to download all the Windows 7 Security Updates from Microsoft in advance and patch my fresh Windows 7 installation before I connect it to a network? If so, how?
Are the temporary risks of being online through my private broadba... |
I've tested the tool from Microsoft available here which tests password strength and rates them. For a password such as "i am going to have lunch tonight", the tool rates it's strength as "BEST" and for a password such as "th1$.v4l" it rates it as "Medium".
I'm wondering how important password length really is. In thi... |
Hi
I suspect a former employee of the company I work for still have access to the servers, in fact I’m sure he does. When he left the company in December he neglected to remove his personal files from one of our servers. I contacted him and made him aware of it. When I checked the folders I saw that the files where ... |
How do I record the outbound 'attack' traffic from a botnet on a Windows XP machine? The captured traffic will be in the Windows XP firewall log.
I need to setup some kind of an experiment where I can use a Win XP firewall log for later analysis, for research purpose.
|
Just wanted to get everyone's opinion on this. In Information Security, you get various alerts about particular machines on your network going to sites and/or IPs that have been flagged as "malicious". While a lot of time, this is truly bad, there are other times that websites share the same IP with a lot of others, th... |
Is there a database of vulnerabilities somewhere, that can be queried in such a way as to return results for all non-patched vulnerabilities for a specific piece of software?
For example, I would like to see a list of the current non-patched (workarounds don't count as patches) vulnerabilities, including CVE numbers, i... |
I've been wanting to create a dummy "Honeypot" user account on my Windows 7 laptop in case of theft.
My question is: Has anyone come across useful resources and tips for doing this? Is there a way to have what "looks" like an administrator account with lots of goodies but hides the real stuff; like a sandbox?
The main... |
If I search for the two words: OpenBSD and NetBSD on http://www.exploit-db.com/ then I get 17 hits regarding security bugs on OpenBSD, and 8 hits regarding security bugs on NetBSD.
So what are the differences exactly, and how do NetBSD and OpenBSD audit their code?
|
If someone has to decide between 2 very similar server programs, or operating systems, then it searches on sites like:
http://www.exploit-db.com/search/
so that there he could get enough information about the given program/os's historical security bugs.
Do you know exploit-db like sites, where can people search for... |
When, for a vulnerability assessment, you need to report the security consideration about a firewall's configuration rule-set, after the audit on the rule-set you make a report about security concerns on the rule analyzed.
In this report, you need to write what is wrong in the rule-set and the security consideration a... |
is the 64 bit or the 32 bit installer better? (not counting that if i have x>4 GByte RAM) - so i mean like is there any ASLR in OpenBSD?
https://secure.wikimedia.org/wikipedia/en/wiki/Address_space_layout_randomization
So that 64bit would be advised to use?
|
Can xp_cmdshell ever be used safely within a stored proc and are there any situations for which there really is no other option? In other words, should its usage within a stored proc always be flagged as a security issue (as is advised by a well-known source code analyzer)?
Put differently, would you agree with the fol... |
I have a stream that I want to encrypt for broadcast to 10,000 subscribers. I know I should encrypt this data using a symmetric key; and also intend that this symmetric key will be rotated every 30 days.
Assuming that I already have a Public key for each subscriber (private key only known to them), how should I encry... |
I would like to create a shared "password wallet" where I encrypt several instances of a username/password and store it in a common location.
I don't expect all key/value pairs to have the same encryption key; in fact I'd prefer that most usernames and passwords were encrypted using a different key.
What is the idea... |
I am looking for some security related project in which I can contribute and also learn something. Since I am new with this stuff It will be better if that project is less complex and digestible for a beginner. I was searching for such project in GSoC and found a opensource sandbox project called "Cuckoobox".
I tried ... |
My girlfriend was browsing images on google when suddenly her browser redirected to this url:
defender-iies.co.cc/scan3/167
The site seemed to be posing as an anti virus, saying your computer is at risk and what not. She immediately closed and reset firefox. I then copied the url from her history into google to check i... |
I am looking for an email provider (or for a way to do it myself) that will not divulge my personal information under no circumstances. I found out that getting this information with a order for example, is not that difficult and companies such as Google (Gmail) are required by law to comply. Is there a company that wi... |
Which is better -- OpenPGP or S/MIME for higher security?
|
Maybe I have the wrong idea but this is a question that has been floating in my head for some time.
Whenever you use an iPhone (or a Mac, Apple products seem to be more prone to this because it simplifies stuff for users) you get asked what network to join if you are not on WLAN.
Now imagine this scenario: You have to ... |
Mozilla Firefox 4.0 supports something called Content Security Policy that disables the interpretation of embedded Java Script. Only external Java Script files that are referenced using a script tag and that are on a whitelisted domain are executed.
Currently only Mozilla Firefox 4.0 support it, but it is an W3C draft... |
I'm using a technique borrowed out of a book by Bruce Schneier and Niels Ferguson called Practical Cryptography. Basically, it boils down to this:
Bob does this:
pubk_A = Alice's public key
entropy = bytes from PRNG
encrypted_entropy = RSA_Encryptpubk_A(entropy)
hashed_entropy = SHA2-512(entropy)
encrypt_keyBA = hashe... |
Normally in the past, I've managed that the production server only serves http(s) to the internet, and is isolated from it's database by a firewall which only allows database queries to travel. However, I have a situation where a bunch of workers using MS office manipulate files living on a domain. These files also n... |
What is it called when a user tries several attempts to figure out the files and folder structure on a web server?
For example, the attacker will run http://example.com/test.jpg to determine if test.jpg exists or not before commencing on other kind of attacks?
|
I'm developing an application that allows user to input hostnames, database names, usernames, and passwords for database access. The application will construct a ODBC connect string by filling in the placeholders. In C, that would translate to something like:
snprintf(connStr, sizeof(connStr),
"DRIVER={%s};SER... |
Let's say I have a linux guest running in xen and I want xen to check the integrity of the guest kernel so that I know there aren't any rootkits, or similar, active.
Is there a way to accomplish this in with xen or other hypervisors?
|
I'm not trying to solve a current technical problem but I came across this and have been wondering how it's done. Intrusion Prevention Systems are supposed to let all network traffic pass through and implement Intrusion Detection methods to detect and stop packets with malicious payloads. I would think that an IPS does... |
In order to login to most websites you need a username and password which is often stored in a SQL database. You are storing per-user information that can change, this is state. Can you prove that someone has the rights to access your system, such as an administrator or a user, without the need to store per-user ... |
As OpenVZ runs on a lot of virtual servers, I would like to know how kernel exploits would affect the whole system. Would it be possible to break out of an OpenVZ container (virtuozzo, etc) with a kernel exploit?
|
What is the difference between a penetration test and a vulnerability assessment?
Why would you choose one over the other?
What deliverables would you expect to receive and how would you rate the quality of them?
|
I'm investigating Certicom's API because they are "free" with the Blackberry implementations, and have come to realize that I have several alternatives for implementing crypto such as BouncyCastle, and others.
I like the idea of using the same API across my product set, rather than to use Certicom for Blackberry, .NET ... |
What is the benefit of combining different web log files with different formats in terms of web application security? In other words, how does combining iis log file with apache log file help in identifying attacks?
|
I have to determine if a given subnet has virtual hosts.
Are there any ideas about what switches to use?
|
I have already read the post of best security conferences, but am not able to find any academic security conferences, even through Microsoft Academic Search.
I admit this question is quite localized, but still hope to find an answer. Any list, source (of both security specific and general computing) will be greatly app... |
I m trying to find a good way to deal with incidents.
For now these are my thoughts:
x Join Logs and analyse with splunk (and alert with rsyslog, splunk is too expensive),
x Configuration-Management and automatic Re-Deployment (puppet, capistrano),
x Forensic via File-System-Mounting (compare with clean hash-db), Anal... |
We currently have Microsoft Enterprise Certificate Server installed on a domain member machine which issues 1 year certificates to users for authenticating to VPN.
We'd like to start issuing web server certificates from our CA to secure Dell Open Manage (a systems management application) and also Microsoft RDP. Because... |
Right now we have a single Microsoft Enterprise Root CA which issues certificates to our VPN users for two-factor authentication. We're planning to extend the use of the CA to issue certificates for RDP and also Dell Open Manage (systems management application).
Most of the reading I've done so far has suggested our cu... |
I am trying to learn more about attack graphs and how they can be used. I have read a little bit about them from some simple Google searches and believe that they could be a useful tool for work. I would like to know how one could go about creating an attach graph, what use cases they are best suited for, and how to pr... |
I've been reading about the LANMAN (LM) hash and I'm curious about a particular part of the algorithm.
The LM hash is computed as follows:
The user’s ASCII password is converted to uppercase.
This password is null-padded to 14 bytes.
The 14-byte password is split into two 7-byte halves.
These values are used to crea... |
With Regard to Sarbanes Oxley and particularly The Japanese version thereof: Is it true that in order to comply with (J-)SOX you must have a support contract - and therefore a responsible party - for any software used within the enterprise? If that is true, does that disqualify nearly all open source software?
The reas... |
Can anyone suggest an automated tool to scan a PDF file to determine whether it might contain malware or other "bad stuff"? Or, alternatively, assigns a risk level to the PDF?
I would prefer a free tool. It must be suitable for programmatic use, e.g., from the Unix command line, so that it is possible to scan PDFs au... |
Should a network have a high concentration of UDP traffic compared to TCP traffic bad for a network especially in the context of network security?
I'm looking at my organization's network protocol usage breakdown and I noticed that the UDP is higher than TCP. I understand that UDP is connectionless and can be caused by... |
I've occasionally read the suggestion to enhance security by either doubling up on encryption algorithms (encrypt a message once with one algorithm, then encrypt the ciphertext again with a different encryption algorithm) or by periodically cycling through a list of encryption algorithms.
I suspect that this is not app... |
In the notes for my Computer Security course, the lecturer refers to the "Australian Failure" on slide 19. I'm assuming he's referring to a well known security system failure, but I can't find what it is, does anyone know what he's talking about?
|
My IPS recently detected a type 8 ICMP packet (echo request) with an unusual payload.
The echo request command a fragment of a command that looked like part of a route add. Here's a PCAP of the ICMP data payload.
.&.1Y..! .b....E.
..x..z. ...)....
....(4.. ......e
-p ADD 1 72.16.1.
21 MASK 255.255.
255.255 10.18.12... |
For example, the Biba model is now hanging out in current versions of Windows. Things downloaded from the Internet are tagged as such. Internet (low) stuff can't alter user (medium) stuff which isn't allowed to write to system (high) objects. Inevitably, this kind of fades away as the end user just starts clicking yes ... |
At work my company uses internet monitoring software (Websense). I know if I visit a https ssl-encrypted site (such as https://secure.example.com) they can't see what I'm doing on the site since all the traffic is encrypted. But do they see, that I visited https://secure.example.com?
|
It has 3 terminals and is presumably a smart battery.
I bought it on ebay recently for $2.74 USD and that included postage from China to Australia. It would normally retail for maybe $40 - $50.
The phone's an LG TU550 and the battery is supposed to be model LGLP-GAJM. The sticker on the back is identical-looking to the... |
A hypothetical online store that accepts credit card payment will have to be PCI compliant because it receives (transmit), process and possibly store credit card numbers.
But the client's web browser is also transmitting a credit card number, albeit on a secure connection, but after receiving in plain text from the key... |
(aka) Is it possible to hack CPUID instruction or BIOS to make it show wrong CPU information?
Yesterday, I was having a chat with computer sales guy. He is little close to me. During the conversation he said that, A processor is not what it shows in bios. On inquiring further he said that they know a guy who can make ... |
If I obscure my IP by going through a free http proxy and visit a page, will that site's admin ever be able to find out my true IP or anything related to my true connection/info?
|
I maintain a server to host my files and a number of websites for hobbies and friends. I just noticed that the site summary being returned in google for one of my domains were all porn related (search "fringe.org", 1st result).
Checking the source, I found obfuscated php code (see here) I didn't recognize included in ... |
I could generate ssh keys on the client like (without password):
ssh-keygen -b 8192 -t rsa -f /home/THEUSER/.ssh/id_rsa -P '' -v
and copy the generated id_rsa.pub to the server:
ssh-copy-id -i /home/THEUSER/.ssh/id_rsa.pub '-p PORTNUMBER SSHUSER@SERVER-IP-ADDRESS'
How much is the chance that someone would generate th... |
We have a test environment which mimics our enterprise network security design. In this test environment my team and I would like to bypass our DMZ entirely. This seems easily enough done by simply changing the default route on our internal ASA (5510). The problem is that when using ASDM-IDM when I remove the old de... |
I have a web-site for which I'm building a Drupal module that allows the users of that Drupal site to navigate to my web-site directly from the Drupal site.
I intend to distribute secret API-keys to each of the Drupal site administrators and they need to enter that value in their copy of the Drupal module.
When this ... |
The book Web Hacking Exposed has a number of instances where the attacker would essentially use patterns in naming conventions to design attacks.
Can any one point me to any study on security/privacy exploits based on "naming conventions" ... such as file name, identifier names (may be in javascript), url parameters e... |
The specific example I have in mind here is the breach of RSA in March 2011 where attackers got away with critical information which could be the seed information which is used to generate the pseudo-random numbers for RSA tokens.
RSA have kept very quiet about the actual details, so if I was in charge of security at a... |
I'm working on a small security assignment and I was instructed to implement simple encryption/decryption of files using RSA in C#.
When attempting to encrypt/decrypt large files, I was informed by the compiler that the file size cannot exceed the key length. I can solve this problem by breaking the files into key-siz... |
Does anyone know of any lightweight OSs that are great for Pen-testing? I would love to have a very lightweight live OS that I can boot off a USB and try some pen-testing against some of my Windows/Linux boxes. It would be nice if this OS had a toolset of different common attacks. I am sure this will be some Linux b... |
Can anyone suggest a cheatsheet or ToDo list of web site and application security?
A local small business owner prompted a question about web security, basically her company website just got XSS attacked last week. I spent some free time to highlight where she should spend time on fixing in the future. Given that she... |
Does anyone know of a well-known application that still uses unsalted hashes for password storage? I'm looking for an example for an upcoming lecture on Rainbow Tables, and I think it would add weight to the discussion if I had a real-world example that the students had perhaps heard of.
|
I'm currently developing a web application which will serve data to iPhone clients.
In order to be the owner of the data, I don't want other clients to be able to get it.
I thought I could use a shared secret key between the server and the clients : a hard-coded string that would salt the timestamp to ensure that the r... |
By "encrypting" passwords you are violating CWE-257: Storing Passwords in a Recoverable Format. But this is exactly what the French government wants. They want to be able to obtain the passwords of any user. By all accounts this is bad thing, and Bruce Schneier agrees.
So how can you satisfy this French mandate as we... |
After reading Part I of Ross Anderson's book, Security Engineering, and clarifying some topics on Wikipedia, I came across the idea of Client Nonce (cnonce). Ross never mentions it in his book and I'm struggling to understand the purpose it serves in user authentication.
A normal nonce is used to avoid replay attacks w... |
It's been a few years since I mucked around with modsecurity...
Will simply installing the package with the default rules provide enough validation to prevent any (okay, let's be honest - best we can hope for is "most") type of XSS? My assumption is no... and even if we consider only Type I - Reflected XSS.
What ... |
I’m basically trying to get some stats from my war drive kismet database using giskismet but I’m finding it difficult to get specific data.
Things I'm trying to do:
Count how many wireless BSSID’s there are in total
How many are WEP/WAP, using to calculate what present are WEP/WPA
Get the make of the wireless eg netg... |
I heard a while ago about someone exploiting md5 weaknesses to create a web certificate with the same md5 that a different certificate has.
They were able to create a certificate through bad issuing policies and i think they had 200 ps3 calculating.
So I wondered, is it possible to scrape the whole web for certificates... |
Im working on a script that's going to talk to a DNS on a LAN that have information about local domains. And I believe its blocking my requests.
So my question is: How can you limit a DNS server to only handle request from some clients and not all clients true different authentication methods?
|
I'm configuring my relying party (a website) to use either ADFS or Azure ACS 2.0.
ADFS 2.0 has some interesting features such as Token Replay prevention (in the SQL version) and may have other SAML security features as well (which I may not understand)
Can someone distill the differences between ADFS and ACS security r... |
How can I achieve the following goals?
All compute and storage to be located in the cloud.
Encryption in transit of all data between web nodes and db nodes running MongoDB.
How to set up tunnels? Which protocols/tools?
Encryption at rest of all data stored in MongoDB.
All data is backed up (also to the cloud) freque... |
Which methods do you use to quickly scan a network for certain vulnerabilities?
I read in the O'Reilly book Network Security Tools that Nessus had the ability to test for one vulnerability only, but that it had to be done via the command line. But that was long ago, and Nessus is different now. Is this possible today, ... |
It appears that the ACS has IDP-style features within the "Service Identities" section. How does the ACS treat these in comparison to a real IDP? What is missing?
Some examples I'm thinking of include: Account Lockout, Auditing, Token Replay, etc. These come more into light when comparing the credentials to a "real"... |
I have written an application for Apple's iOS which embeds messages in JPEG files using steganography (see http://en.wikipedia.org/wiki/Steganography). For the purposes of this question lets assume that my steganography algorithm is well known, but I also use random embedding locations (meaning that a key is required ... |
Which route to take, what are the pros and cons, which is more secure..
Generate AES key, encrypt the data with it and then encrypt the AES key with RSA, save the encrypted data and encrypted AES key to a file and RSA keypair to a KeyContainer.
Or use DPAPI ProtectedData class to encrypt the data and save it to a file... |
When using SSH keys to authenticate to a server for remote access, why is it possible to devise the true key and therefore the passphrase from an encrypted private key, without checking each guess of the passphrase against the server to see if it authenticates?
I understand that the passphrase is only used to decrypt t... |
Our application group is looking to deploy a product which requires that we disable forceguest in HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa. We are running on a Novell network (I know, I know) and the machines (mostly XP/some 7) are not on a domain. Each machine has two administrative accounts which are p... |
There is a trend among companies I've worked at where administrators (or helpdesk folks) give a user a courtesy extension of the old expired password... rather than forcing the user to change it.
This is usually done by re-entering the expired password directly via AD Users and Computers... rather than changing it thou... |
I am working with a networked embedded device with AES-128 and no public key cryptography (1KB RAM, 8KB flash). At install, the device is pre-loaded with a longterm AES-128 key known also to the server.
What patent free protocols exist for securely distributing an authenticated session key using the existing symmetric ... |
I was reading this CompTIA Security+ SYO-201 book, and the author David Prowse claims that:
Whichever VM you select, the VM cannot cross the software boundaries set in
place. For example, a virus might infect a computer when executed and spread to
other files in the OS. However, a virus executed in a VM will sprea... |
I have created two virtualbox ubuntu clones for the purpose of setting up a test strongswan ipsec network; I'm trying to follow this guide. The virtualbox machines are on a bridged adapter and i verify that they can connect by pinging to the ip of each other, which suceeds
Basically i've created a net-net configuration... |
Here's a story about how one guy reverse engineered AirPort Express and obtained the private key that was used to prevent cloning the device ability to stream audio to approved devices only.
So basically the whole "security" was tied to the fact that noone except a limited set of manufacturers new the private key and t... |
So I had a scare this past week (couldn't find my thumb drive) and figured I'd better put in some protection on my thumb drive.
What is the best way to encrypt the data on the thumb drive? I am a Windows user, not concerned about having access to these files on any other system. I would want access from Windows XP an... |
I'd like to increase my VPN security, and Google hasn't turned up anything with regard to VPN services and SecurId.
Does anyone know of services like this?
|
I have 3 websites that could be configured as a "VirtualApplication" in servicedefinition.csdef:
www.mydomain.net/enroll
www.mydomain.net/admin
www.mydomain.net/
... or I can configure them as a site:
enroll.mydomain.net
admin.mydomain.net
www*.mydomain.net
Since I intend to install SSL on my site, I plan on buyi... |
I am looking for recommendations on a good wireless hacking book. I would like something more focused towards the defensive, but a healthy knowledge of both would be great. I would also need it to go in depth on using wireless tools such as iwlist, iwconfig and maybe some simple scripting of these tools.
Any suggestion... |
What needs to be installed to get the full aircrack-ng suite (or the closest possible equivalent) working under Win7?
Should you use VirtualPC, VirtualBox, or VMware Workstation for this?
Should you buy something? Pretend you already have two USB WiFi cards (or one USB and one internal) that are monitor and frame injec... |
So I was asked to put together a syllabus for a series of courses on the basics of secure coding, for a programming team. Though the time constraints are a bit... constraining, I'm working around that...
However, I'm coming up a bit short on relevant topics, though I feel that there should be something else. It's be... |
I am looking for resources and details on establishing a security operation center (SoC) or network operation center (NoC) based on ITIL or any other applicable regulations. Where can I find good details or experiences of others except for hiring consultants.
|
My company has a website/service that stores/processes credit cards and is PCI compliant (Site A). We also have websites with storefronts that need to submit credit card data to that site for processing (Site B). When someone orders something on Site B, and enters their billing information, how do I submit that informa... |
I'm interested in learning some basic hacking; and I've read online that Linux is a good place to start.
Although, I've been a Windows user for as long as I can remember. So I was hoping I could get a few tips and maybe even a good tutorial. Thanks! :)
|
I'm a hard core dyslectic who wants to read up on all things security without the reading part. So I want to know what good high quality security podcasts are there? I'm interested in almost everything ranging from crypto to the latest scam.
I was listening to Security Now for a while but it was becoming repetitive and... |
http://code.google.com/apis/predict/
From google:
What is the Google Prediction API?
The Prediction API enables you to make your smart apps even smarter. The API accesses Google's machine learning algorithms to analyze your historic data and predict likely future outcomes. Using the Google Prediction API, you can bu... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.