instruction
stringlengths
24
29.9k
I found a site which is taking password letters from their users not the whole password. Is this secure? Or do they have saved password as salted hash (MD5)?
Let's assume following workflow for logging in a) On a device with keyboard: I type my username and password Press enter [realization] I made a typo Password field is cleared: not a big deal, I can type reasonably quick b) On a device with touchscreen I type my username and password Press "logon" [realization] My pa...
My computer is currently running windows XP on a LAN Network. I'd like to use linux but I want to hide myself. I don't want to be the only linux system on a network full of windows XP computers. Is there something I can do? While browsing the internet I understand that I override the user agent (The server runs a squid...
For now I read PCI compliance document and I don't understand any things. I have a program, which takes sensitive and cardholder data as input (some of them are in encrypted form) and then returned back (some of them are in encrypted form). I have 2 simple questions: What elements need to be encrypted as input and out...
By multi-level authentication, I am referring to the fact that the user makes use of a primary username password keypair to log into his account. Then, to perform some other actions, such as authorize a transaction, he is required to reauthenticate himself by providing a secondary password or passphrase. So, what are ...
Scenario: We are in the position to offer a local appliance to run a version of our proprietary software, which is normally provided as SaaS. Question: What steps can be taken to mitigate trivial reverse-engineering in an untrusted environment, where they will have physical access to the box? Clearly, it's 100% impos...
For an iOS app that communicates with a RESTful service over HTTPS, should the session key be stored in Keychain or NSUserDefaults? Username and password are stored in Keychain, and it would seem trivial to also store the sessionKey. But from a security standpoint, does that get you any added security? Presumably if ...
The OWASP web site recommends this: Use per user or session indirect object references. This prevents attackers from directly targeting unauthorized resources. For example, instead of using the resource’s database key, a drop down list of six resources authorized for the current user could use the numbers 1 to 6 to in...
For a corporate network, is there a way to possibly encrypt all network traffic on the local network? I would like to ensure that there is nothing left for chance to be packet sniffed. Not even e-mails or machine to machine communications with chat devices.
I have a small personal website which I wish to serve securely over HTTPS. At the moment I do not wish to use a third party CA to sign my certs. I was reading this document on generating a self-signed cert. I have three questions. The document shows two ways: (1A) Generating your own self-signed cert. and (1B) Genera...
I recently acquired a netbook to play with, and I want to install Kali Linux so I can start learning about network security and exploit development. I want to use this to learn as much about security as I can. What is the best way to partition a linux box so that it is most resistent to a security risk? Is a single pa...
I need to restrict some webpages to certain users and I do this using a .htpasswd file through nginx. The problem is I need to add other people's bcrypt password hashes to my .htpasswd file. Would it be possible for them to generate it using htpasswd on their own machine (could be windows, mac, linux), and then give me...
Given that there are clear advantages to using some block modes of encryption over another, and I would like to ensure that all software used in the enterprise uses a certain "level" of security I'd like to issue a statement of assurance to my stakeholders that the most appropriate technology is being used. e.g. Ban t...
I've often read that MD5 (among other hashing algorithms) is vulnerable to collisions attacks. I understand the collision part: there exist two (or more) inputs such that MD5 will generate the same output from these distinct and different inputs. There are 20 examples of such inputs given here. Fair enough, but how doe...
Let's say I have two websites that live on separate domains, and their service providers both talk to the same identity provider on a third domain. I log into the first website and authenticate, and now I decide to visit the second website. The second website comunicates with the identity provider so I don't need to lo...
What's the command line to generate a blowfish password hash? I can't seem to figure this out at all. Apache's htpasswd only supports bcrypt, and openssl passwd doesn't even do blowfish hahes (but it does do blowfish encryptions with openssl enc). Most sites point me to using $2a$ which is bcrypt, not blowfish ($2y$). ...
I am designing a .NET Web API-based REST API that would be accessed via a mobile banking-like app. We plan to use OAuth 2.0 Resource Owner flow for authorization. All requests will go through HTTPS with server certificate and will include the signed refreshable access-token received by the Authorization Server. What ...
I was using Wireshark in order to check the activity of an unknown client in my home network, and to my surprise, I found some strange connections established by my own computer. I disconnected all clients from the network but myself, rebooted my computer, logged in as root, didn't start any programs and ran wireshark ...
I'm a software developer working with hardware devices that are deployed on the field. Every now and then, I would need to update the hardware's firmware (upgrades, patches, etc) I'm thinking of now, implementing a secure channel to upgrade this firmware, and for some checking to be performed by the hardware before acc...
I checked my linux server with rkhunter, I got following warning messages, ... [00:35:35] Found file '/usr/include/gpm2.h'. Possible rootkit: Trojaned SSH daemon [00:35:35] Found file '/etc/rpm/sshdOLD'. Possible rootkit: Trojaned SSH daemon (original sshd binary) [00:35:35] Found file '...
If the application is not in production mode, there is no commercial contract signed with customer yet, and you just want to give a link to the customer (or give the demo yourself) so that they can experience the app themselves, then how important is it to use HTTPS enabled server? SSL certificate comes with a cost, so...
I'm writing some software where I have to encrypt all files that are written to a specific folder using AES. There is one password/key that is configured somewhere, which is always used. I don't want to store a base64 string because that is too complicated for the person who might have to change the configuration. I wa...
What is the purpose of the "Authenticated Users" group in Windows? Under Linux it doesn't exist and I'm starting to think this is another idiosyncrasy or over-engineering of the Windows operating system. Here is why: Assume I want to know what rights has the user Mike on disk C:\, I will type: net user mike and will b...
We have a site at work that is used for the following: Our homepage, which is just some info and contact info. Job applications are also handled on our site. There is no place where you can login though. I told management, seeing that we are a company that does software engineering, it would make a better impression ...
The computer and the router are located inches apart in my study. An Ethernet cable connects the router to the roof antenna. The antenna talks to the ISP, 5 km distant. I know from experience a hacker can access the router with ease. The question is, can the hacker access traffic anywhere along the route between the a...
My understanding is as follows: To securely store a password (e.g. in a database), you use a hashing algorithm designed for this purpose (designed to be slow, e.g. bcrypt), and you use a unique salt for each password. This makes it hard/slow for an attacker with access to the database to recover passwords, because th...
Okay - so I have been extensively looking into US export/import laws relating to encryption software (5D992), however I have a few questions about the laws and their applicability. So, the laws obviously apply to encryption software distributed online, say through iTunes or Windows Store, however "designed for install...
I have an application which writes a logfile in /var/app/applog.log. This application has to be launched as root, but runs as app:app and can also be demoted to nobody:nobody What exactly is nobody:nobody and what priviledges does it have? Is it best to run my app as app:app or nobody:nobody? The logfile has the same u...
The context from which my question has arisen is this user script which locally removes ads from Ixquick.com, which is an anonymizing 'proxy' search engine that gives the results from Google's index while not giving any info of yours to Google at the same time. But the script makes use of Google Hosted Libraries, with ...
Suppose I have a public/private keypair, which I would like to use to serve HTTPS from a webserver. The part I'm worried about is this: the private key is encrypted with a passphrase, so that if an attacker gains access to my webserver he doesn't get the private key. But I want some automated system to launch the webse...
Is it possible to create self-signed root CA certificate that Windows will import to Trusted Root by default instead of Intemediate certificate store ? Obviously, it won't do it without the big giant nag window asking if you're really sure - but it would be nice to not have to go the extra step of specifying which cert...
I have a Mysql database where one table is meant to store user complaints/comments/suggestions. I am using Mysqli to connect to the database with a $con=mysqli_connect("myhost","myuser","mypassword","mydb"); At this time, the "myuser" and "mypassword" are the same as the id and password I use as the admin to log ...
I have a question about having users logon to my service using their Google Credentials. I've gone through the Using OAuth 2.0 for Login documentation provided by Google. The documentation mentions an id_token (JWT token) as the primary authentication token that can be passed around and verified by the application. On ...
Say you boot into Linux from a brand new Live USB. The USB is write protected. The memory stick has never been exposed to the Web in its life. You surf all day on Firefox building your library of bookmarks. You backup your bookmarks to a .json file and send it to your Gmail account. You close down the computer and eras...
Consider a Internet Based Website which does authentication. The Web Application can do the authentication by calling an Authentication Server which is not connected to the internet. The Authentication Server is not in the DMZ. However if 2 Factor Authentication needs to be done via One Time Password over SMS then the ...
I use WPA2 encryption. But I know even that can be cracked with the aircrack suite. And a lot of users may not use strong passwords. I've read that while cracking WIFI keys the only noticeable difference is the rate of traffic. So is there a way to detect whether my network is under attack from such tools ? P.S: A sol...
I have a home network and I would like to implement a VPN to the cloud. Is this possible without the ISP's cooperation in port forwarding? In other words, is my only option to use a 3rd party VPN service or can I set it up without the ISP's cooperation? I doubt that they will do any custom configurations for me.
I recall hearing there is a range of attacks one can mount against a page which mixes HTTP and HTTPS loaded content (say, https://Secure-Site.com loading an image from http://Not-A-Secure-Site.com) but I don't remember the specifics. Could anyone list some common attacks that can be launched through this vector?
I have the headers from some emails I've received. There are several IP addresses in these headers. Which one belongs to the sender? Is the address in the headers reliable? Example 1: Delivered-To: highballer906@gmail.com Received: by 10.60.17.1 with SMTP id k1csp74699oed; Mon, 17 Jun 2013 23:56:20 -0700 (PDT) ...
I am using Windows Server 2008, Plesk 9.5, IIS 7, SQL Server 2008, and recently I have received and email claiming this server is vulnerable, and sent me the following URL: /scriptresource.axd?d=QivxuR3S70uO2-sZID2TL45AtoGwC4WTODQ6W4h3ca0AAAAAAAAAAAAAAAAAAAAA0 Using this URL on any website that I hosted on the server, ...
I dont really get it what exactly block size in openssl speed output means. Here: How can I interpret openssl speed output? I found the answer that it is the length of the input message. So, should I understand like this: I want to measure performence of md5 for 512 input-size message, should I do it like this: // ass...
I just read this about the security about Basic Authentication over SSL: Is BASIC-Auth secure if done over HTTPS? And I don't get it. I just installed ProxyDroid (http proxy) on my rooted android device, and started up BlurpSuite on my Ubuntu Machine. The first request I saw was some Exchange ActiveSync call to a corpo...
I am thinking there must be some alternative better than passwords, but not so complex and difficult to administer as a full PKI infrastructure with client certificates on every device. My primary concern is to prevent malicious users from spoofing a device that belongs to someone else and then guessing the password. ...
Where I'm currently working we use full disk encryption and after a laptop transfer owners we use a secure erasure program. This is quite time consuming and I'm wondering is it necessary? For the disk encryption program we use what we refer to as PGP, but I think it's actually Symantec Drive Encryption (am I right, the...
Would turning an iPhone off when charging from an untrusted charger make it safe from juice jacking?
I've noticed that there are a lot of different payloads to choose from in MetaSploit, and the choice (assuming there's enough room in the target) usually depends on what you're trying to do. However, from what I understand the payloads vary in size greatly. How can I determine the size of each payload so that I'll kno...
I have a basic understanding of private/public key cryptography and have been using it for SSH logins and GPG encryption/signing for a while now. However, I have always kept the private key/keyrings in the default location, in my home directory (.gnupg and .ssh). Obviously, I can transfer the keys to a usb drive, wh...
As per title... The malware can easily be de-obfuscated if it was obfuscated using common and known XOR techniques. Why don't malware authors use any other method that make it much harder to automatically de-obfuscate and identify malicious embedded code? My thoughts: Malware authors actually do use other encryption m...
I want to implement secure communication for my application. The A sends a message/data and B receives it. The message should be encrypted so the internet provider would not be able to read it even if it gets intercepted. Conditions: I cannot use https (but should be included for completness) It's possible to use ot...
According to the documentation at http://docs.mongodb.org/meta-driver/latest/legacy/implement-authentication-in-driver/: The driver then runs the authenticate command for the database on which to authenticate. The authenticate command has the following syntax: db.runCommand( { authenticate : 1, user : <username>, nonc...
Im just wondering ... Lets say, I want to compute an MD5 hash from a given buffer which is an empty (memset(buffer, ' ', sizeof(buffer));) buffer with size of 512. I also want to compute MD5 hash on same-sized buffer but non-empty one: memset(buffer, 'a', sizeof(buffer));. Am I right that the speed of computation shou...
I want to design a system that hinges on ECDSA. All messages are signed using the algorithm, and this is used to prevent spoofing. However, if a user were to somehow lose control of their key, they would be forced to create a new key to sign their messages. Is there any mechanism that can be implemented to transition p...
I need to encrypt something on my server and save the result. Since I am not a security expert, I want to implement as much existing code as possible. I found a fully build function on php.net but it says that "is not protected against padding oracle attacks." What are "padding oracle attacks" and what should I do abo...
Windows 8 has a feature to "Reset your PC" so that if someone needs to give their computer away, the recipient won't be able to recover data. How secure is it?
Is it a requirement to also disable SSL v2 and weak ciphers on client PC's? I have seen quite a few posts for disabling them on servers, but nothing about a regular client PC, say, running Windows XP or Windows 7.
I am trying to understand how SSL certificate and signing and the chain of trust works. I know about root CAs and that they are used to sign intermediate CAs that sign the end certificates that are issued to a website. I also understand how the chain of trust works and that because a ceritifcate signed for X.com is sig...
Whether I'm using a normal internet connection setup, or tunnelling it through an anonymizing VPN or through TOR, what information of mine is revealed to whatever DNS server that I choose (e.g. Google Public DNS)? Would I gain any privacy benefits if I created and used my own DNS server (either on my own dedicated linu...
I am connecting from my home Windows 7 machine to a hosted server Windows Server 2008 R2. I am connecting to it using Remote Desktop on a non-default port. I am wondering if I should go to the effort of setting up a VPN connection for Remote Desktop Access with something like OpenVPN. I'm not a security professional, I...
I am trying to use my PC to capture, decrypt and analyse traffic from SSL sessions on my android tablet. So far, I have a ZAP proxy server set up, with a CA generated. On my android device, I have ProxyDroid set up, that transparently routes all web-seeking traffic through the ZAP proxy I've set up. Browsing https site...
I have just recently started to delve into the topics of malware. In my hunt for malware binaries, I came across certain responses that it is not easy to grab binaries based on malware names like Nugache, Storm, Waledac, Conficker, Rbot etc. from the various databases. These names are, after all, just used to refer a p...
I have been working on providing the security related to the XSS attacks. My website only allows following mime-types: XML, CSV, HTML, PLAIN, VND_WAP_WML, APPLICATION_ZIP, APPLICATION_PDF, APPLICATION_VND_FDF, APPLICATION_MS_WORD, APPLICATION_OCTET_STREAM, APPLICATION_VND_MS_POWERPOINT, APPLICATION_X_VISIO, IMAGE_GIF, ...
I'm currently investigating the Mifare DESFire EV1 card and would like to know if there are the same issues with the UID as there were with the classic? Are the DESFire UID truely unique or have so many been made that UIDs are being duplicated? Thanks.
I'm using NMAP for Network scan ; The output does not contain the full traceroute details. Can I view all intermediate routers/hosts using the NMAP GUI? A simple VPN connection IP traceroute... Thanks your answers...
Suppose my .Net application which is installed in the client encrypts a data. I want to use a different key generated randomly for each client so each client doesn't know the key of the other. Someone told me that storing it plain in a file is not good enough, and it's better to use a certificate to encrypt this key be...
I received a mail about illegally sharing copyright-protected material on the Internet; I never did it. I checked my router's configuration and noticed that the MAC address of one of the connected devices doesn't match any of my devices. I'm afraid that somebody somehow hacked my wireless network and used my Internet c...
My question is, can you make a digital signature using the receiver's public key and then have the receiver verify the signature using his private key? I always thought that in order to create a digital signature, you must use your private key and then the receiver uses the sender's public key to verify it. However, o...
In the Thales HSM documentation, 40 LMK keypairs are listed but the following keypairs are not shown in the keytype table: 00-01 02-03 08-09 10-11 12-13 Am I correct in thinking that the keypairs above are only used internally by the HSM?
What is the purpose of "Variant" LMKs? The JPOS project (http://jpos.org/wiki/HSM_basics) gives this description: To make things more secure HSM's use variants. A variant is a hex value for each type of key. Q1) How do variants make things more secure? Q2) Is increased security the only reason why variant's are use...
How can I listen to a remote IP's traffic using Wireshark? (Man in the Middle)
This question was derived from my off-topic questioning here: Does Centralisation Decrease the Probability but Increase the Damage of Exploits? Like before, I suspect this may be overly abstract as a question. But the excellent responses to my previous question proved me wrong before. One of the tenets of security seem...
My iPhone has sent/received 900MB in 15 days from "com.busuu.japanese.a" I got this information from Onavo, which 'compresses' my data. I have never heard of Busuu until today. It is a language learning service. My iPhone is not jailbroken. I have used Chinese wall chargers, if that was actually a real thing. How is...
I am testing a webserver[proprietary] which offers SSL support and they say it supports TLS 1.1 and 1.2 which i have verified by firing requests from IE with only the target protocol enabled . However , how can i check if the TLS protocols implemented in the server are free from known security issues ? what are the key...
I am trying to debug a TLS handshake between two SIP trunk endpoints: .75 and .82. Mutual authentication is being used. .75 sends: Client Hello Certificate, Client Key Exchange Certificate Verify, Change Cipher Spec, Encrypted Handshake Message Encrypted Alert .82 sends: Server Hello, Certificate, Certificate Req...
We know that testing input parameters for lack of validation is one part of a black box web vulnerability assessment but, is it necessary to test ALL input parameters (parameters, cookies, HTTP headers, URLs...)? If we don't test one it is possible that that parameter is the one vulnerable to a SQL injection or the XSS...
I have a device which should lock and unlock something after receiving a signed server response. So in the best case a loop would lock like this: User locks device User wants to unlock device User authenticates to a webservice User receives a key User sends key to the device Device checks if key is valid Device unlock...
I have a table where all columns need to be encrypted (aside from the PK). This will be achieved using AES at the application level. However there is one particular field that needs to remain searchable. For example a Message table has: MessageTitle (Encrypted) MessageBody (Encrypted) SenderID (Encrypted but matchabl...
Ok first of all this is legal and I have it in writing my friend and I are attacking eachother to get better and not break the law. Setup I have a VMWare image running BT5R3. It uses VMWare's NAT then my network is behind a router using NAT. From there I am VPN tunneled into work which also uses NAT (I believe). I've ...
I have some experience in building PHP based websites with MySQL access, storing encrypted user details, but all other fields being plain text. My most recent project will require sensitive data to be stored in the database. I want to set up a system where a user can access his own entries and see the plain text result...
I have token made as sha256("public text" + "secret value"), or any number of such tokens with the same "secret value" but different "public text". sha256 that is used is not salted - so that sha256-ing the same text will always produce the same hash. Can I construct a valid token with my own "public text" (or even re...
There are a lot of books on encryption. Is there a must read intro, something like Smashing the Stack for Fun and for profit, that more or less everyone reads?
I'm interested in the number of vulnerabilities over time, not in specific information about the vulnerabilities. I also don't expect any list to be completely authoritative. But what list could I consult to get an idea of the number of vulnerabilities for a specific software over time?
Suggestions to make a good password all focus on creating a string that a computer (or more likely, a network of computers with multiple GPUs) can not guess. Putting a password meter for when users create passwords can help against this a little, e.g. by enforcing a password at least 8 characters long with a mix of cas...
The question is in the title. I have been reading about DNS spoofing. What if I were to save the IP addresses of websites I consider sensitive and then just enter the IP address when I am using a suspicious connection to prevent myself from DNS spoofing attack? Will it work? Why or why not?
I want to secure site which is locally used for Prepaid Services, the site has been hacked many times, for the first step, I implemented SSL and its now working fine, however, I want to be sure that attacker can't get user data in transit because many users connecting to the site from restaurants or public places. One ...
I've had an idea kicking around in my head for a while, and am wondering if there are problems with it or it just has no value. What if a Database server (such as Postgres) had a column that could only be used for INSERT or as part of a WHERE clause? I'm thinking of its use for storing password hashes, such that even...
Just musing to myself, what is the preferable access control mechanism in high security environments? Locks and Keys or RFID tags? Going under the assumption that the locks/keys are not knoow to be pickable and that the RFID tags are not currently known to be vulnerable, how should one choose the appropriate system? ...
For example, if I want to apply to a job based in UK which requires security clearance, can I only do so if I'm a British national? What if I'm from another country belonging to the EU?
How secure are PGP/GPG encrypted mails? I realize that it's probably fine for regular e-mail scenarios, but what about the security over longer time periods (>30 years)? Is the 4096 bit limit for RSA keys of GPG going to be an issue (given that there is no way to use symmetric-only encryption)? Also, if I'm not misund...
In MS SDL Threat Modeling, there is an External Interactor and Process. While the meaning clearly shows a difference between them, when threat modeling, one can't really threat model an external interactor as it impossible to enforce anything on it. So why do we need an external interactor? In case we can analyze its t...
I have come across a field that is vulnerable to XSS. It accepts and tags however keywords script,alert, msgbox, prompt are blocked. I have tried every encoded version of these keywords but its not working. Is there any way that i can show a POC (XSS popup) without using the above keywords. I successfully injected a ...
I recently installed Kubuntu and I noticed the option for having an encrypted LVM. The behavior suggests it's full disk encryption since I need to put in a password before I can boot. This article and others I have read suggest it's full disk encryption. Is this actually full disk encryption? If so what type of encrypt...
I found an issue related to Forced Browsing in my web-application.And I was able to verify that my static content(like text document...mainly help documents) can be accessed by simply hitting the URL like, Example: http://www.example.com/example/example.txt User was able to do that without authentication. I have a sim...
I am interested to hear what the community's thoughts are on detail provided by a software vendor along with a fix and a security advisory. For example, let's say that some kind of severe vulnerability was privately brought to a vendor's attention. It was fixed it, a new release made, patches and published a security a...
After creating a simple login system and trying to protect it against things like SQL injection, Session Hijacking, XSS, etc, I've found that I really enjoy doing this type of thing. I'd like to pick up a book and dive into all the details regarding PHP / database security and intrusion prevention/detection tactics. Ba...
I'm a software engineer, and I've written several discreet utilities that run at specific times on Windows Server 2008. Generally speaking, they are console applications, need to access SQL Server, are configured for trusted access and are running under a service account. Our security folks tell me I need to re-archite...
In my chrome browser if I google for Windows Update the first hit is windowsupdate.microsoft.com/‎ When I click on it I am redirected to http://www.update.microsoft.com/windowsupdate/v6/thanks.aspx?ln=en&&thankspage=5 Now this to me looks like my machine has been hijacked and somebody with bad graphics ability has re...
Today I experienced a situation where a person responsible for the security of a company required a pentesting company to withdraw a clause in the contract that says that: "during the pentest there exist the possibility to delete or modify sensitive data in the production environment unintentionally due to the executi...
I'm researching NTRU cryptosystem and started research based on source code from sourceforge and bouncy castle(java language). Currently I'm reseacrhing attacks on NTRU, based on CVP and SVP. But I'd be very grateful if anyone could give me a link to source code of attacks on NTRU, at least on short length, if any exis...
If there was a communication protocol that encrypts at the very low-level, this would solve the problem of wiretapping entirely and for all.
I have an XP laptop with Wi-Fi issues - it connects / disconnects intermittently. Anyway, I bought a USB Wi-Fi that works well. My security question are: Is there a way to completely disable the built-in laptop's Wi-Fi adapter? I have disable Wireless Network Connection from Network Connections. I do not see the Wi-...