0
votes
0answers
2 views

Do the BEAST and CRIME attacks apply to an IMAP service?

While setting up the Dovecot IMAP service, I noticed that the default parameters are not optimal, it allows SSLv3 for example. Using Thomas Pournin's TestSSLServer.java program, I saw the following: ...
0
votes
0answers
3 views

Log Attacks in Different Files using Snort

How can i log attacks separately using snort. I basically want to log attacks invoked from different files separately. Like if i have 2 files ddos.rules and log.rules then i want to log attacks show ...
-1
votes
0answers
2 views

Known vulnerabilities in (EC-)KCDSA

Does anybody know if there's known vulnerabilities in KCDSA/EC-KCDSA? I have been researching for the past few hours and I haven't found anything. Wikipedia has very limited amount of information and ...
0
votes
1answer
16 views

VPN and remote desktop access

Here's my case, I have a laptop from work, it has Cisco AnyConnect. 3 scenarios: Laptop using home network, from home PC I can remote desktop to Laptop just fine. Laptop using home network, enable ...
0
votes
0answers
5 views

automatic connection from LSASS to different IPs. Is this the usual behavior?

I'm using windows 7. firefox 22. connecting through a regular residential wifi router. In the last month I've noticed that when I connect to the internet and once in a while my firewall indicates me ...
0
votes
2answers
13 views

Why are DSA keys referred to as DSS keys when used with SSH?

When I generate a DSA key with ssh-keygen -t dsa, the resulting public key will begin with ssh-dss. How come? Why not ssh-dsa?
0
votes
0answers
19 views

wifi devices connected even if they give a wrong password, how can i use this vulnerability?

i have an access point that subscribes in the list of connected devices all the devices that try to connect to it, even if they give a wrong password. The device does not give them an IP address but ...
-1
votes
0answers
7 views

hydra wrong passwords

i'v been trying to use hydra (educational way) but with no success. i saw that a lot of people get wrong passwords and so am i. the site method is http-post but performed by ajax (should it be a ...
2
votes
2answers
28 views

Why password strength is often underestimated and uncertain in context of password hashing?

It bugs me a long time already, why there is positive certainty about hashing algorithm and salt importance, but password strength either never mentioned at all or considered rather "philosophical" ...
-1
votes
1answer
22 views

How are client side hacks created?

Many games today are prereleased in an alpha/beta state and instantly overwhelmed by "hackers" downloading programs manipulating the game itself to become overpowered. I guess they make injections ...
0
votes
1answer
15 views

What is a Certification Path in SSL certificate?

I've been trying to learn more about Digital certificates for the past few days and I'm struggling in order to understand how actually this concept is applied in the real world. Anyways, as I visited ...
1
vote
0answers
33 views

Is Temporary XSS a Problem?

I use a site on a regular basis so I wanted to make sure it was secure. One of the things I checked was that when I changed my first name to <img src="http://blah.blah/blah/blah.notanextension" ...
4
votes
2answers
120 views

How (in)secure is POP/IMAP/SMTP

I'm making a few assumptions about basic email security, and I want to confirm or clarify some of these points to make sure I understand the big picture. Please correct me where I'm mistaken: The ...
0
votes
0answers
9 views

How to use an OR condition with the content of a snort rule

I understand that if you specify multiple contents then the rule triggers only if ALL the content conditions are satisfied. But I want to create a rule that will trigger even if any one of the ...
0
votes
0answers
28 views

I made a mistake in renewing my cert, can you help me figure out what I did wrong? MS IIS 7 ISA [migrated]

Sorry if this is a duplicate question, but I didn't see anything like my problem. This is also my first time renewing a cert. So, a bit of backstory. We have a sharepoint site, with a ISA firewall ...

15 30 50 per page