instruction
stringlengths
24
29.9k
I mean if I encrypt my ""full system"" so that everything (besides the /boot) is in an encrypted VolumeGroup (Linux). So I store my /boot on a flash drive, thats always next to me. Q: can the encrypted VolumeGroup (or in any similar solution an encrypted Image) compromised in a way that If I want to "mount" it it ste...
I have an e.g.: WAV file that contains the sounds of a man typing on his keyboard (English or any language) How can I convert this WAV file to a TXT file? I mean are there any scripts/programs that can convert it? (Using e.g.: statistical methods, like "e" is often used in e.g.: English, etc.) Thank you!
Are there any? What are their names? Are they publicly available/downloadable/installable?
Is there a way to find what type of encryption/encoding is being used? For example, I am testing a web application which stores the password in the database in an encrypted format (WeJcFMQ/8+8QJ/w0hHh+0g==). How do I determine what hashing or encryption is being used?
Hardware support for various client-side controls based on Trusted Computing (Wikipedia) has been evolving over the years, e.g. TCPM, TPM, TXT (LaGrande, DRTM). I've heard of one practical application, for convenient disk encryption via a "Transparent operation mode" of BitLocker. What other examples are out there of a...
In an answer to this question about pw reset, D.W. says: Lastly, consider non-password authentication. Passwords have many problems as an authentication mechanism, and you might consider other methods of authenticating users, such as storing a secure persistent cookie on their machine with an unguessable secret to a...
Is it possible to find Meterpreter or similar malware which doesn't modify the hard disk but is only stored in RAM? Most common anti-rootkit software like rkhunter and chkrootkit don't find it.
I use KeePass for storing my passwords. What should I use if I want to store my several hundred contacts (name, phone number, email, etc) encrypted?
Do security questions subvert hard to crack passwords? For example, if a site requires passwords with a certain scheme (length + required character sets) and has a security question, why would someone try cracking the password instead of the security question? I assume most answers to these are shorter and have a small...
I work with APIs all the time and I work with web developers who insist that OAuth, OpenID, etc are far superior than a home-brew method. Every site seems to be using these as well now for ease of use to the user, but also for security. I hear it every day almost that it's more secure, but I find that extremely hard to...
Narrow pipe hash function designs have recently come under fire, particularly in reference to some SHA-3 candidates. Is this criticism valid? Can it be explained more simply than this paper does? I'm curious because I want to know if this is a criteria by which old hash functions can be evaluated as well.
In SSL if the handshake is not successful, does it always end with a handshake alert? Or are there other ways to finish the SSL connection (acceptable by standard). I am asking this, because in an HTTPS server configured to require client authentication, if the client does not send a certificate, I see (via network pac...
If I add a rule in Privoxy: echo '{ +redirect{s@http://@https://@} } .mozilla.org' >> /etc/privoxy/user.action then I can't install Firefox Add-ons. Why? I though the Firefox Add-ons installed through only HTTPS! If it's ain't using only HTTPS then it could be compromised in a way, that someone makes a tool that autom...
According to the following screenshot, taken from firefox-3.6.17-1.fc14.i686, Firefox has an option to fail closed when unable to connect to OCSP servers. Can someone please explain why this isn't enabled by default?
Google recently announced false start in Chrome browsers which increased TLS performance by 30% http://news.softpedia.com/news/Google-Chrome-s-SSL-False-Start-201253.shtml I know TLS has been poked and studied by many people for years but you can still get the implementation wrong. Is anyone aware of research into any ...
After I ticked that my browser (Firefox) must require OCSP: I got a window pop up (several times! And it still pops up.. ~randomly ~about a few 10 minutes): https://i.stack.imgur.com/NYdoe.png I didn't visit this site, nor any wordpress domain! $ host -t any hackedirl.files.wordpress.com hackedirl.files.wordpress.com...
I am currently implementing Android in-app payments, and am wondering what attack vectors I should look out for. I have a simple application to view server-generated content. I want to allow the user to buy additional access in-app, and would like to know how to communicate a successful transaction to the server. A qui...
Joe Tech gets a job managing Acme Startup's IT services. Acme Startup handles information of X, Y, and Z data types, and offers services A, B, and C. Joe Tech is aware that some of these data types and/or services may fall under government regulations, but is not sure which. He also knows that Acme Startup's CEO and...
The discussion at Why isn't OCSP required by default in browsers? notes that many browsers by default simply ignore failure to check web site TLS certificate revocation status via the Online Certificate Status Protocol (OCSP). Is there a simple way (e.g. a tool) for users who care about it, or are just curious, to moni...
I've been told that I might have more luck posting here than on Stack Exchange, so here goes: I'm looking for a way to lock down a 3rd party application in IIS. It's a web service, so there's no login page or anything, it's meant for use in a VPN environment. I'm trying to put it online without a VPN and am thinking of...
We are currently in the process of allowing USB memory sticks, but with a stricter policy. Some key points in the policy is: Any confidential data stored on the USB drive has to be encrypted Always keep your USB drive with you or in a safe place if it contains sensitive data USB drives which are used in work situation...
If requesting payment from an affected party directly for the disclosure of vulnerabilities is considered extortion, how can independent security researchers earn a living or side income from researching security vulnerabilities?
Under Windows/Linux, client side. How can I ensure that I'm not connecting to a rogue AP?
I have an application which is structured in the following way for its signup page. After this signup, the user is directly granted access into the system - there is no email verification (as intended). I'm interested in learning if there are attack vectors or other insecurities in how this workflow is constructed. S...
Possible Duplicate: How secure are virtual machines really? False sense of security? E.g. on Ubuntu/Fedora - if I have VirtualBox installed and I'm running guests in it, then how can I make it harder for an attacker to get access to the VirtualBox host from the VirtualBox guests? e.g.: - If we set NATed network ca...
Since Firewire lacks security, allowing a plugged-in device to access host memory, it's a good thing to fully disable it. If we're not using the BIOS to disable the Firewire port then how could we do it using "software methods"? The OS running on the PC is OpenBSD or Fedora or Ubuntu. Edit: Is it sufficient to disable ...
In A Comparison of Market Approaches to Software Vulnerability Disclosure (2006), Rainer Böhme describes the profound role of economic "market failure" in the industry dynamics that hinder software security. He also describes 4 kinds of markets that can help: Bug challenges, like payments by Mozilla and Google for s...
The new credit card standards including PA-DSS can be quite confusing for software companies. My question is this: If your software company designs a POS software system (like we do) which utilizes a locally installed 3rd party credit card processor (which is PA-DSS compliant) to encrypt, transmit and process the cred...
I'm far from being an expert in the IT security and I have this maybe naive question. Many downloadable files are deployed on websites together with the corresponding hash numbers to ensure their integrity. If a bad guy hacks the website and replaces the original file with its modified version, this can be detected bec...
Possible Duplicate: How can a system enforce a minimum number of changed characters in passwords, without storing or processing old passwords in cleartext? On a system I used several years ago users were forced to change passwords regularly and the new password was checked for similarity to previous passwords. I can...
What case-studies or references are available from companies who have implemented a secure development process (eg, SDL or similar) around the cost/effort involved. Whilst each development department is likely to be a unique case, it is still important to understand roughly what the costs of a programme would be before...
I am by far, no security expert but I experience on the subject working in Java (JCA,JCE and JSSE). Anyway, recently there was a discussion about FIPS compliance. I looked into this and SUN's libraries are not FIPS compliant per se. Additionally, Bouncy Castle, which I use extensivelly, and as far as I know is consider...
This is the best place in SE I can find to post this. We have an ex employee who created a gmail account for work purposes that looks like staff_name.company_name@gmail.com He left the company and refuses to surrender the password to the account. Do we, the company, have the legal rights to stop him from using the acco...
I'm looking to perform policy audits against firewall configurations and/or rulesets. This should be performed independently of any configuration management systems, ideally by operating off the running config. I am most interested in inspecting Cisco PIX/ASA/FWSM and Juniper NetScreen/JunOS devices, however iptables ...
What are good resources for the physical security questions that IT organizations face? Like best practices for locks and seals on servers and kiosks, personnel access mechanisms and policies, disaster recovery plans. I'm looking for conferences, journals, books, blogs, etc.
I'm looking for hints about secure linux desktops. Securing servers is no problem. Most recent Software Updates, run only the services required etc. But what about desktops? I'm thinking about details like Noscript for Firefox. ASLR, PIE and similar are enabled in Ubuntu https://wiki.ubuntu.com/Security/Features by def...
I'm wondering if anyone has some recommendations for Android source code review which is Java based. For example, reviewing an Android app for security issues. Bonus for being F/OSS. Fortify seems to be a good option but out of my price range. :)
A couple of us wanted to setup a honeypot/honeynet with the goal of learning; not planned to be in a production environment. What's a good recommendation for a high interaction or low interaction honeypot. Also we'd like to eventually report the findings into some kind of businessy style report so something that compil...
I purchased a new laptop recently, and I'm working on hardening it. Specifically, I'm interested in increasing my chances of recovering the machine in the event that it's ever stolen. The system runs Ubuntu 11.04 (Natty). I've installed Prey on the machine, of course. I've also created a guest account that requires ...
Is it okay to use the primary key as the salt in a Users table? The only disadvantage that I can see is if the PK changes (unlikely), then the passwords break. What are your thoughts?
On a router such as dd-wrt or tomato, what would be some default iptables rules? I am asking for rules on a router/gateway - For example; blocking SYN flood attacks, or XMAS attacks. The basic iptables rules that are a must for a router/gateway. Sort of like how anti-virus is 'defacto' when securing a computer.
OpenBSD claims to be highly secure. So why doesn't it allow downloading the release iso's over HTTPS? Or I'm missing something? Can someone please explain this to me?
If I run this for example: gpg --keyserver hkp://keyserver.ubuntu.com --recv-keys 0xFBB75451 then does the importing occur in a secure way? I mean does it go over only secured connections? (HKP?) Could it be compromised because the key fetching doesn't use end-to-end encryption+proper authentication (MITM attack)? UP...
I found a security hole in an organisation in the UK with many employees. Login form sends user name and password in clear text to the public facing IP via HTTP. Initially I pointed this to IT but they didn't understand and asked for screenshot. I used a sniffer to show my user name and password, on our guest WiFi netw...
Unless I missed something I don't think RSA/EMC came out and said publicly what was stolen earlier this year when they were compromised. So I know the answers to this question will be conjecture. That being said, how would any information that was taken from RSA allow somebody to login as an end user in an organization...
I'd like to centralize all authentication on my network using something like an LDAP server. Clients consist of Windows and Linux servers. I'm looking to manage authentication for virtualized servers in a multi-tenant situation. Thousands of VMs with hundreds of organizations. Skillset leans towards Linux, but I do ...
What is the best solution for mount options/partitioning when having e.g.: an Ubuntu minimal install (11.04) for Desktop use? e.g.: put /tmp on different partition to give it mount options like: nodev,nosuid,noexec - it could increase security. I just want to gather tips, how to do this noatime could give more performa...
Is there any way to browse certain exploits in MSFconsole? The show exploits command shows too many and I cannot find a way to show just Windows file format exploits, for example.
Assuming a hacker has sent somebody malware. It's a trojan (digitally signed by TeamViewer) which runs automatically when windows starts up and sends the login info to a web site using GET (sniffer proved) and runs in background so the victim could never see what's happening. So, the attacker connects to victim's PC us...
Possible Duplicate: Password Hashing add salt + pepper or is salt enough? In the official documentation of the PKCS5 V2.0 standard, we can read "The salt can be viewed as an index into a large set of keys derived from the password, and need not be kept secret." The part "need not be kept secret" is interesting. Sinc...
I am using the PKCS#5 standard to generate a key using a random and unique salt and the user's password in input. Consider this key as the "encryption" key. The "encryption" key is used to encrypt a random AES key. Each user has an AES key associated to their profile. So, a user's profile will contains this information...
I'm not sure if this is the right website to ask this but I'm giving it a shot. I got the following message in an email today: (it's translated so sorry for the typo's/mistakes) This e-mail and it's attachments are confidential and only meant for the addressee. If this e-mail would end up in your inbox by accide...
I'm interested in learning more about web sockets security. Read that web sockets were originally in Firefox, removed for security reasons and now added back in with the problem resolved: http://news.ycombinator.com/item?id=2600022 Intial read of them seems like plenty of oppotunity for vulnerabilities just like tradit...
What evaluation criteria would you use to select the right Oracle scanning tool? Context: To deploy an automated scanning tool (nessus / SQuirreL etc) for use by both development teams and security teams. One tool to be used by both teams during the build stage, ongoing management (patching, changes to DB structure) an...
there was some arbitrary code execution that occurred on my os x 10.5 system. this came as a result of opening an xls file with excel for mac. the vnc type program that came with office for mac was being used to loot around, but i think the damage was minimized because of needing the admin password for most things. i n...
Wireless security (Wikipedia) describes security issues due to the fact that wi-fi deauthentication packets are unencrypted: Weak PSK passphrases can be broken using off-line dictionary attacks by capturing the messages in the four-way exchange when the client reconnects after being deauthenticated. Why is it not pos...
I just stumbled on a website vulnerable to an SQL injection attack by mistake ( https://stackoverflow.com/questions/6181248/is-this-site-vulnerable-to-an-sql-injection-attack ). That made me curious about what is tried and how often an attack attempt comes by on some website. So I'm thinking it would be cool to setup a...
I see that most IPS available in the market comes with a basic pre-defined policy which administrators can base on when creating their initial IPS policy. However, these policy may be insufficient and the administrator may need to dig deeper. As such what is the best practice when creating an initial policy and making ...
Reverse proxies and NAT would seem to obscure a network behind such technologies to the point where it would be hard if not impossible to identify ports open and services running. Given that many networks use these technologies I assume it is possible to bypass them in some capacity. I am just wondering how that may be...
My client has a small "Contact Us" form on every page of their website. They are adamant about not including CAPTCHA verification on these forms, to keep them easy to use, but I feel it is my responsibility to implement some type of security against brute force attacks, etc. What are my options here, especially those t...
Question In the case of security questions being used to reset an account password, what is considered best practice for handling case-sensitivity on the security question answers? Scenario An account password reset process I'm working on works in three steps. The first step asks the user to provide three pieces of ide...
I understand that FIPS addresses cryptographic operations. My question is, is it addressing exactly this? For example, can an application loading a keystore use a non-FIPS provider? Any input or relevant references is appreciated
I'm currently using a USB flash drive with a live distribution. At times I would plug it into terminals I cannot trust. My threat model here is solely the risk of unauthorized modifications to the live distribution image on the flash drive. Unfortunately, a live CD is not convenient enough (the file system has to allow...
I have a server set up with medical files in a Access database. I am taking over this job from an existing guy who has vanished, so I don't know all the details of the system. I can find out specific details as needed. It is currently set up so that the local area network has access to the database file. However some...
I understand at least theoretically WPA2 is more secure than WPA, but in practice does it make any difference which one you use? From what I know there are no known attacks for either except for dictionary attacks, in which case if you are using WPA or WPA2 it is the same. What about specific implementations? Have ther...
I am interested in the attacks that could be used to compromise or disable HIDS software such as Tripwire or Samhain. I understand that ideally checks should be run periodically and the database stored on an external machine or media, but lets say that is not the case, and everything is just on one machine. Firstly the...
I am interested in how attackers manage to identify vulnerable versions of software on client machines, behind a large network or stand alone at home. I am not interested in portscanning at all, as the majority of software on a client machine will not be actively listening. I am specifically interested in techniques to...
I have limited experience with Windows networks and certainly no experience with AD forests or anything related. I have experience and understanding how to secure and maintain a unix style network. I am wondering if the extra stuff like AD and whatever other windows specific technologies there are allow for Windows spe...
Thomas Pornin brought up a good point about PGP key servers in an answer to a recent question, here: Shouldn't GPG key fetching use a secure connection? ...you should not trust the key server... Key servers are, after all, just another type of service that hosts what is essentially user-generated content. This got m...
I was recently listening to the security now podcast, and they mentioned in passing that the linear congrunential generator (LCG) is trivial to crack. I use the LCG in a first year stats computing class and thought that cracking it would make a nice "extra" problem. Are there any nice ways of cracking the LCG that does...
To what extent can an attacker generate a map of a network from outside of it? Are network scanning tools such as nmap the only means to do this? Otherwise what other types of tools or techniques could be used? Say you have a network with internet facing servers in a DMZ, the internal network, then internal servers in...
I was browsing over this question and had some follow up questions from a practical perspective. What tools will show the SSID of an AP with the SSID set to hidden or broadcasting disabled? I have looked at Kismet and similar tools but they don't seem to show the name of the hidden SSID. Do you have to use a packet ins...
I was recommended by my brother to direct the question here about the level of traffic I get against several of my blocked ports. I run pfsense 1.2.3, router in bridge. Behind pfsense I have: 1x desktop windows 7 1x Linux ubuntu running web(about 50MB transfered/day) and ftp service(filtered) and mumble (used by abou...
Phil Zimmerman released PGP (Pretty Good Privacy) on June 5, 1991. As we examine the legacy of that far-sighted and brave act 20 years later, what are the most widespread and helpful uses of PGP signatures, and of PGP encryption? See also: Why I Wrote PGP - Phil Zimmerman
If I want to use Ubuntu 11.04 as a Firewall in SOHO environment, then I just can't figure out what is the bad thing about installing GUI on it (e.g.: XFCE)? The only opened port to the world (wan port) would be SSH on a non-default port+pubkey auth only+restricted ip subnets where could people log on, etc.. I'm just n...
How can a "webserver" know (or a sniffer between the srv<->and the client) that what browser i'm using besides the user-agent? Are there any "magic tricks"? javascript? java? How can I securely, completely hide that what webbrowser am I using?
http://www.dwavesys.com/en/pressreleases.html#lm_2011 Lockheed Martin Corporation (NYSE: LMT) has entered into an agreement to purchase a quantum computing system from D-Wave Systems Inc. I'm just asking that if computing power would be "infinite" (not really, but the quantum computers could bring dimensional differe...
It's one of the logged by nginx webserver requests: ‹\x11Г»=џ&gьµЈБЈx¬ёђАЙхPЙuN0жЫ¶@Oc[ќЮmћC”Ь™\x04»c/‹\x1F or \213\\x11\303\273=\237&g\374\265\177\243\301\243x\254\270\220\300\311\365P\311uN0\346\333\266@Oc[\235\336m\236C\224\334\231\\x04\273c/\213\\x1F Can someone understand what this is? Thanks ;)
This is from the FIPS 140-2 standard: Cryptographic keys stored within a cryptographic module shall be stored either in plaintext form or encrypted form. Plaintext secret and private keys shall not be accessible from outside the cryptographic module to unauthorized operators A cryptographic module sh...
I would like to implement a "Remember Me" time-limited auto-login type feature on a mobile application (on Android). To start the app, the user must type in a username and password. For convenience, EDIT I would like to save the last inputted username and/or password into a file on the phone to avoid having the user r...
First of all there was the PSN hack, which was compromised due to a vulnerable version of Apache and no Firewall and using a developer console. Then Sony Greece fell due to an SQL Injection attack. Then there was a phishing site on Sony's Thailand servers. Then Sony Canada and Sony Japan were compromised. Then today So...
Found some malicious javascript on a Joomla site which we noticed has returned after being deleted a week ago. Also noticed that www.cssstickyfooter.com is infected by the same code. If you're curious, here it is in whole below. function net_match ( $network , $ip ) { $ip_arr = explode ( '/' , $network ); $...
I am interested in potential/actual attacks against kiosk software. I am not talking about physical access, or specifically designed kiosk operating systems or shells, bur rather software that runs over windows and attempts to prevent access. All too often this software runs on top of explorer and I wonder just how sec...
In considering whether or not I want to join the big web o' trust and put my keys on a key server, I got to thinking about how it would affect my e-mail address' exposure. I generally try to keep my e-mail addresses from being too public, so as to avoid unwanted spam. Along this train of thought, I began to wonder: I...
Bit of newbie at the whole forensics stuff - but I'm trying to find out what I should have in place before an attack. While there is no end of material on the internet about forensics from seizure onwards, I'm trying to find out more about how I can make a secure record of events (specifically webserver logs) of adequa...
Possible Duplicate: Do security questions subvert passwords? Is it true that on some websites (e.g.: free webmail) there are "security questions" - if the user forgets about his password he could answer the security question, that he provided before, and then he could change his password. BUT: isn't this a security ...
On my Vista PC the Firefox shortcut icon is being randomly renamed. The name changes to some variation of a recently visited URL. This unwanted action has survived several version updates. Of course I suspect a possible malware issue but as an IT professional I have tested many AV/AntiMalware programs on this PC over t...
I know I am required to enter a password every time I use my OpenPGP key. Is this done via software implementation or is it a property inherent to the protocol, and therefore the key? Essentially, the question breaks down to: If someone stole my private key, could they use it without knowledge (or breakage) of my pas...
In a PCI environment with an MPLS VPN network setup should you allow store to store communication? Do you think that an MPLS network would be consider secure enough for this? why or why not?
I'm sure many of you have probably seen (online or in-person) the DEFCON 18 presentation, demonstrating what can happen if you steal a hacker's computer. For those who haven't, the link is below. It's quite an entertaining presentation. (Warning: Video may be NSFW/NSFLE due to offensive language and some censored, f...
All, First question on here so please be as gentle as you can :-) I've been looking around for any writings or papers on a standard for classifying vulnerabilities. Not from a severity/risk/impact point of view but categorising such as grouping all the 'missing patches', 'weak authentication management', egress/ingr...
I am doing a research on how to prevent my gmail account from being hacked and what are the options of claiming it back. The associated phone number and recovery email can be changed, in fact I expect the attacker to change them immediately so there is no real value in them. Is there a way how to link my gmail account...
I have a decent understand and experience with securing and setting up smaller networks, although absolutely no enterprise experience. I understand at such a large scale there are different technologies for managing the sheer number of machines and the complicated topology. What security technologies are unique to ente...
Could I use some sort of permanent device ID broadcasted by the bluetooth radio in my phone to do something like unlock my door? I don't want to have to ever pair the device, or take it out of my pocket (rfid, nfc). I just want to be able to pick up some unique identifier being broadcast from my phone. (could be somet...
This is a thought experiment on the interaction between Tor, OpenID and one (or more) compromised nodes in the secure path. I'm focused on how to use technology in a way that adds value to a secure cloud solution. I have no interest in using this technology for nefarious purposes. Use case Suppose I have a multi-tena...
Why is HTTP still commonly used, instead what I would believe much more secure HTTPS?
I have enabled iptables logging for packets coming from the outside -A INPUT ! -s 192.168.218.0/24 -j LOG Now i am seeing lots of incoming packets from unknown addresses Jun 5 14:54:56 localhost kernel: [572504.888953] IN=eth1 OUT= MAC=... SRC=91.189.88.140 DST=192.168.218.101 LEN=1500 TOS=0x00 PREC=0x00 TTL=55 ID=49...
Beyond commonsense and physical access controls, is the system password the oldest still in active use security feature? By physical access, I mean for example leaving the system within a secure space.
Just finished reading "Honeypot on home network to help me learn", and the top-voted/selected answer that suggest deploying a honeypot to the cloud, but the answer does not say how to do it; also, read all the other answers too, and none appear to state how to do this. I'm interested in knowing how to do this, and mor...
For example, say the following are HTTPS URLs to two websites by one IP over 5 mins: "A.com/1", "A.com/2", "A.com/3", "B.com/1", "B.com/2". Would monitoring of packets reveal: nothing, reveal only the IP had visited "A.com" and "B.com" (meaning the DNS only), reveal only the IP had visited "A.com/1" and "B.com/1" (th...