-3
votes
0answers
7 views

How to test HIDS(OSSEC, Sagan, KasHIDS, EsetHIDS) system? [on hold]

how to test HIDS(OSSEC, Sagan, KasHIDS, EsetHIDS) system? Any body can help me?
0
votes
0answers
20 views

How to craft Invalid packet to test for TLS Poodle vulnerability?

I need to test if a server is vulnerable to TLS Poodle. To do this I need to send an invalid packet to the server and check if it closes the connection. But I am not sure how I create that packet ...
-2
votes
0answers
25 views

Is this XOR OTP cipher crackable?

Consider a substitution cipher where the key length (which is randomly generated) is n bits and that accepts plaintext of n bit size exactly. Substitution takes place in a order where every plaintext ...
0
votes
1answer
10 views

OpenSSL certificate revocation check in client program using OCSP stapling 2

Pretty much this is request for additional information for the question: http://stackoverflow.com/questions/9607516/openssl-certificate-revocation-check-in-client-program-using-ocsp-stapling I want ...
-3
votes
0answers
13 views

SQLMAP: can't dump password hash

I am trying to exploit an sql vulnerability using sqlmap. I can retrieve other columns but the password column fails. Any way around this?
0
votes
0answers
13 views

Disadvantages of self signed and cross signed certificates?

Can anyone explain what are the disadvantages or loopholes in self signed and cross signed certificates?
0
votes
1answer
20 views

How is last line of defense for physical security “people”

According to CISSP The last line of defense in a layered security architecture is the remaining workforce of the company, excluding the security guards. I've also read "people" are the last ...
1
vote
1answer
11 views

Security implications of revealing internal IP addresses

What are the security implications of a web app firewall/load balancer revealing internal IPs of the web sites behind it to the outside world? I get that learning the internal IPs would be part of ...
0
votes
0answers
8 views

Azure Networking VPN

Company is exploring the option of connecting Azure VNET to the on premise network using either Site-to-Site or ExpressRoute. There are concerns regarding potential vulnerability of internal resources ...
1
vote
1answer
7 views

SHA 1 no impact to root certificate

I ran a scan on a server and the results of the authentication for digital certificate was as follows : Certificate 1 (root) signature algorithm: Sha256withRSA Certificate 2 (chain of trust) ...
0
votes
0answers
5 views

Connection refused when trying to SSH. But port 22 is not blocked. Pings work [migrated]

Connection refused when trying to SSH. But port 22 is not blocked. Pings work. I'm running CentOS 7 VMs and open source Docker. I want to SSH to Docker containers from other VMs or other Docker ...
0
votes
0answers
21 views

How to analyze netstat for suspicious connections? [on hold]

Somebody accessed my Microsoft account this morning and the IP that did it came from Thailand. A couple of days prior the incident, I noticed that my Command Prompt opened and closed immediately many ...
0
votes
0answers
7 views

AES 128 CBC in Python, cannot generate same cipher text by decrypting and encrypting again [migrated]

I am reading binary data from a .db file. It consists of a master-key, IV and some values. The first encrypted value is (say enc_val) with hex of 0abd4e92a8986ee1ae234e51f0783c79 After decrypting ...
2
votes
1answer
22 views

Exploiting an XSS vulnerability

This question is related to a class project involving a team of 2 students against another team of two students. We both have servers with a default plugin that we have a week to patch vulnerabilities ...
3
votes
3answers
33 views

Can a TCP connection be terminated by an attacker if SSL/TLS has been used to protect data in the TCP segment?

I understand that SSL/TLS is built on top of TCP. That is after a TCP connection is established, an SSL handshake can be started. When it is completed, all communication will be encrypted and ...

15 30 50 per page