0
votes
1answer
4 views

Identification info that my wireless card sends to the (wifi) network

I would like to ask if there are any other identification info that my wireless card sends to the wifi network apart from the mac-address. If so are they changeable? Lets say for example that i ...
0
votes
1answer
21 views

Is the following PayPal Vulnerability a design/implementation flaw?

I am trying to understand the logic behind following vulnerability, I believe this a design flaw not only an implementation. To me the problem with the two-factor authentication service at PayPal is ...
0
votes
0answers
18 views

Force connected devices to use http rather than https

I am very new to MITM attacks and have been faffing around on my home network today.. When sniffing my iPhone trying to connect to some mail accounts I have noticed that it shows a message stating ...
1
vote
0answers
11 views

Configure icefloor to prevent leaks when VPN connected

I am trying to configure icefloor firewall on OS X 10.9 so as to make sure all traffic will go through VPN. I recently notified that even with "Route all traffic through vpn" option in tunnelblick ...
3
votes
1answer
29 views

How Do I Troubleshoot a Browser Hijack on a Mac?

My Mac is getting weird redirects with Safari and Chrome, however not with Mozilla Firefox. Since I cannot find software to do malware removal on Apple products or any good information, I am at a loss ...
2
votes
3answers
25 views

How to add a file as entropy source for /dev/random

What I have: A large file containing lots of secret, true-random bytes (yes, I'm sure they're not merely pseudo-random). I'll call it F. What I want to do: Tell Linux that it can use this file as an ...
0
votes
1answer
42 views

Is it a good idea to use the user's username as a salt when hashing a password like hash(username_str + password_str)?

I'm helping my friend with hashing his passwords, and I've a question - Should he use one secret string as salt for hashing or is it better to have each user its own salt for hashing? Consider these ...
-2
votes
3answers
70 views

My friend hashes passwords with SHA512 algorithm without salt. How do I convince him that he needs to add salt?

Today I discovered something incredibly stupid - my friend hashes user passwords with sha512 algorithm without a salt. I immediately raised this issue to him but he said he wants to see anyone crack a ...
8
votes
3answers
618 views

Why is using SSH key more secure than using passwords?

If people use password to log in to a UNIX server, then it could be forced to expire the password, then they change it. If people use ssh key and have no passwords, no password expirity, then ...
2
votes
2answers
38 views

Difference between Second Pre-image Resistance and Collision Resistance in Cryptographic Hash Functions

I am studying the subject from these notes. However it is not clear what is the difference between "Second Pre-image Resistance" and "Collision Resistance" properties of Cryptographic Hash Functions. ...
0
votes
0answers
24 views

RSA Key Encryption Algorithm

I have been working with PGP for use with EDI transactions with utilities, and am still working on understanding the basics. The issue I am trying to solve is that using my trading partner's public ...
-1
votes
2answers
35 views

Which web browser supports a proxy in proxy configuration? [on hold]

Normally you are forced to use a corporate proxy. This is necessary for the company to protect against the internet. But a side effect is, that the internet usage of every proxy user can be monitored ...
0
votes
1answer
42 views

Are there approaches/mechanism to detect hardware backdoors?

Background: A nice Chinese based manufacturer (AllWinner Technology Co.Ltd) produces very useful SoC used boards that often claim to be open source hardware. Question: If need be is there by way of ...
0
votes
2answers
48 views

Detect Different Machine using Browser [on hold]

Some web apps like Facebook and Gmail detect the first time we try to login from a device. Assuming that a browser can't read machine name, and MAC ADDRESS. What kind of variables are they collecting ...
-2
votes
2answers
124 views

Is “HTTPS” ~100% secure? [duplicate]

Before I login to a trusted website, I always check that the address bar has a green padlock and the URL has no typos. E.g: After I've seen the green padlock and checked the domain ...
0
votes
0answers
21 views

Attack Vector for Wildcard Cert

So I am looking to the security risks of WildCard Certs, in a previous post most of the questions were answered however I have one follow up question for that. In my instance I use DigiCert, so ...
0
votes
0answers
50 views

Is it possible to demonstrate that md5(x) != x for any x? [migrated]

I am looking for an easy to follow explanation, if possible, that demonstrates/proves the validity (or not!) of this assertion: for any X, md5(X) != X (being X any string of 32 hex characters)
-7
votes
0answers
50 views

Hacking website which has no admin panel or database managment system(phpMyAdmin etc ) [on hold]

How do I hack a website which has no Admin panel or database managment system (phpMyAdmin) For example :lets take Joomla If we get access to sites phpMyAdmin , we can change the jos_users password ...
0
votes
0answers
12 views

how to pass password file to openssl srp [migrated]

I'm trying to pass password to the openssl srp through a file using -passin param as below but im getting errors. openssl srp -verbose -passin file:password.srpv.attr -srpvfile password.srpv -add -gn ...
1
vote
0answers
23 views

Best practices for OAuth 2.0

I understand that OAUth 2.0 really just relies on SSL to encrypt the contents of the bearer token. However, are there any other best practices one should follow when securing OAuth 2.0? I know you ...
11
votes
4answers
2k views

Is an 80 bit password good enough for all practical purposes?

I know that asking how many bits of entropy comprise a strong password is rather like asking the length of a piece of string. But assuming the NSA is not on to you, and that it is hardly worthwhile ...
1
vote
3answers
49 views

Preventing User Enumeration on Registration Page

You have a website that users log into, and you want to prevent user enumeration. On the login page and the forgotten password page, this can be achieved by careful choice of user messages, but what ...
1
vote
0answers
14 views

Access to My documents folder [migrated]

Can someone enlighten me as to what may have happened to cause the following: Last night, my son tried to scan a document using a HP inkjet printer. He didn't succeed, I think he was trying to do it ...
2
votes
1answer
50 views

Security of shared “super pin” code table at meineschufa.de

The german brank credit report service "Schufa" uses a so called "SuperPIN" to enable users to reset their password. This super pin is a permutation of 30 lower and upper case letters and digits and ...
0
votes
1answer
27 views

NSS / OpenSSL tradeoff on an embedded linux application which uses a TPM via pkcs11?

I am on a trade-off between the use of OpenSSL or NSS in an embedded Linux application that makes use of a TPM (HSM). EDIT: I need a SSH server and Apache using TLS, both using the keys protected by ...
2
votes
1answer
61 views

Is this somebody trying to exploit a vulnerability?

On our website, when an invalid PHP session ID is detected, it's logged and regenerated. This invalid session has been logged: n040jl1nujch72tkrmr0uilnl1, ...
0
votes
0answers
18 views

Does NSS implements fully pkcs11? [on hold]

I am on a trade-off between the use of OpenSSL or NSS in a Linux application that makes use of a TPM (HSM). I am looking for satisfying the best the support of PKCS#11 (at least management of Elliptic ...
0
votes
0answers
28 views

Private server security questions [duplicate]

I want to build my own server. It will have mail, ssh, and apache (slackware 14.1). Could you tell me what I should pay attention on when I secure my server? Should I install SELinux? It will be ...
-1
votes
0answers
14 views

mod_ssl with FIPS mode enabled and SSLRandomSeed [migrated]

I have traced through the mod_ssl and the OpenSSL FIPS code as best I can and I believe that the SSLRandomSeed configuration parameter given in the mod_ssl.conf file simply doesn't do anything useful ...
0
votes
1answer
40 views

How to get the information from the iframe displayed (ClickJack) to the user back to the attacker?

Just for knowledge I want to know how to get the information from the i-frame displayed to the user back to the attacker? Scenario : Suppose You are an attacker and you want to grab the private ...
5
votes
2answers
384 views

Website Certificate Revocation check - Big deal? [duplicate]

As I was about to make payment for my flight ticket, I noticed something strange with the British Airways website's SSL cert. My browser (Google Chrome) was unable to check whether the certificate has ...
3
votes
2answers
92 views

Would it be possible to create a zero knowledge social network?

I understand the concept behind a zero knowledge web application where only the user has access to their data. What about a social network where some circles of user have access to that data? Is it ...
0
votes
1answer
37 views

Why does IBM's Intrusion Detection System Show Local IPs instead of Public IPs for the Source of an Attack?

Security Intern here given the assignment to find the IP address of an attacker using IBM's IDS. The event or attack in question is entitled X509_Weak_Signature_Algorithm, and from what I ...
2
votes
2answers
51 views

Isn't the behaviour of the switch to flood packets when it's MAC table is still empty dangerous?

If we have a switch with empty MAC table, and three hosts are connected to it - let's say host A, host B, and host C. Host A sends something to host B, and switch remember on which port is host A, but ...
2
votes
2answers
29 views

Are Chrome extensions like Advanced REST Client safe to use?

I'm just getting into learning REST and came across this great application that instantly lets me test out requests (Advanced Rest Client). The question arose that since it is an extension to the ...
-6
votes
0answers
73 views

Does EMP bomb actually exist [on hold]

I have never heard of an EMP bomb attack on the news not in large scale attacks nor using a home-made ones Is it just a theory? My security+ guide does not even mention it as a threat, and there is ...
-2
votes
2answers
39 views

SSL protocol : Port 443 [duplicate]

I want to usethe SSL protocol. SSL protocol uses port no. 443. During the initial handshake does the communication occurs on port no. 80 or it handshake starts on port 443. If not during the initial ...
-2
votes
0answers
29 views

How to tell if /GS compiler is enabled for a PE [on hold]

I am able to parse ASLR, DEP, SEH, etc. but not sure how to tell if the file was compiled with /GS stack canaries. I am writing a program, so pointing me to a program like PEStudio won't help me ...
3
votes
0answers
16 views

Serpent 256bit key wrong round keys [migrated]

Assume that we have this 256bit key: 15FC0D48 D7F8199C BE399183 4D96F327 10000000 00000000 00000000 On first 0-7 keys we can't apply formula wi=(wi-8 xor wi-5 xor wi-3 xor wi-1 xor phi xor ...
-5
votes
0answers
58 views

Please help me with Man In The Middle attack [on hold]

I would like to set up a Man in the Middle attack. Which IP addresses should I use with ArpSpoof if I am running Windows 8 as a victim machine and the attacker is Backtrack 5 R3 that is running as a ...
0
votes
2answers
64 views

OTP vs. Keyfile

I have been wondering what are the benefits and cons of using an OTP (one time password) versus a keyfile to, for example, decrypt a keepass database, connect to a server via SSH, or other uses. ...
0
votes
0answers
35 views

Pentesting Google Cloud process? [on hold]

As you might know, Amazon requires anyone who wants to perform a pentest of an app hosted on their AWS to submit a pentest request form: http://aws.amazon.com/security/penetration-testing/ However, ...
-1
votes
0answers
26 views

Free alternatives to Windows nap? [migrated]

NAP was depreciated in 2012R2 and now Microsoft says it is not even present in Win 10 Server. I read this article which explains NAP is not as relevant today as there are better technologies to ...
0
votes
2answers
81 views

future of graphical password authentication [on hold]

I'm a student currently pursuing my Engineering in Computers. I'm planning to put all my knowledge in and try to actually implement something related to security. To be more specific I'm more ...
0
votes
1answer
24 views

How to test for zone transfer? [duplicate]

I heard that it is possible to test for zone transfer attacks on a web application using host and dig commands in Linux. How it is done?
1
vote
1answer
42 views

Is XSS prevention only on the frontend enough for JSON services? [duplicate]

We have an application with a form where user can enter a comment. The form is submitted using AJAX. Values are read also through AJAX and returned by the backend as JSON, and then parsed by ...
1
vote
3answers
66 views

Will checking the CSRF token on the header and the form's hidden be enough?

From what I read here, CSRF tokens from the cookie header cannot be read because of the same-origin policy. Is comparing the CSRF token on the cookie header with the form's hidden element be ...
1
vote
3answers
43 views

How safe is it for an app to trust a click on a link in an email?

In my question and answer application, Joe signs up, logs in and adds a question. He then shares the question via email to his trusted friends. How safe is it to provide a link within that app ...
20
votes
2answers
2k views

What actually happens in “low voltage fault attacks”

I understand they are an attack on crypto algorithms as implemented on various processors, but how do they work? The online papers are too complex for me to understand.
6
votes
6answers
1k views

Is it safe to reveal information about the OS and the software you use?

As in what OS you use, it's version .. etc. Every time I go to the bank and I get greeted with the ATM in the following photo, this question comes to my mind.. Oh and it's still Windows XP till last ...

15 30 50 per page