Unanswered Questions
39
votes
0answers
946 views
WPA2 ephemeral key derivation
I'm trying to learn how ephemeral keys in WPA2 4-way handshake are derived.
Starting from 4 EAPOL packets sniffing, I successfully derived PMK and PTK reading ANonce, SNonce, and knowing ASCII-PSK ...
14
votes
1answer
162 views
Preventing a site from appearing in the 'Most Visited' or 'speed dial' section of a web browser
Are there any established ways of preventing a website from appearing as an icon on the 'Most Visited' / 'Speed dial' / start page of a web browser?
One example of this is the tab that opens by ...
13
votes
0answers
408 views
What unique device fingerprinting information can an iOS8 app collect?
As a follow-on to this question:
What unique fingerprinting information can an iOS7 app collect?
What remaining device fingerprinting privacy / security vulnerabilities still exist as of iOS 8? Can ...
12
votes
1answer
1k views
MPPE-Send and Receive key derivation from MS-CHAPv2
I am trying to get the MS-MPPE-Send-key and MS-MPPE-Recv-key from the MS-CHAPv2 challenge material. I am able to follow the RFCs 2548 3078 and 3079 to the step of getting the GetNewKeyFromSHA() it is ...
8
votes
0answers
61 views
Principles of cache attacks
There are many scientific publications that deal with cache attacks. Most recently, the CacheBleed attack was published which exploits cache bank conflicts on the Intel Sandy Bridge architecture. Most ...
8
votes
1answer
135 views
What is the current EU standard for data destruction?
I have been hunting around for a couple of weeks trying to find what the current standards for sensitive data destruction in the EU/UK are.
If you look at the destruction companies they have several ...
8
votes
1answer
158 views
Prevent and/or detect installation of root certificates on Windows?
I noticed that some applications installed root certificates on my computer.
Is it possible to prevent this?
Or is there a firewall or such that notifies me?
8
votes
1answer
188 views
Using cat to overcome 'Stack smash detected'
I'm trying now buffer overflow exercise from the site pwnable.kr
I found the string that should be entered to the gets frunction but got "Stack Smash Detected" then I found a solution in
rickgray.me
...
8
votes
1answer
108 views
How to understand QEBEK (Honeypot Monitoring Tool)?
I've been trying for some time to find recent or meaningful documentation regarding QEBEK, but all I've found is the Intro and KYT Paper for Installation 2010. The links are just a formal introduction,...
7
votes
1answer
39 views
Are virtualized environments vulnerable to the Row Hammer attack?
Row Hammer is an exploit which relies on RAM defects to get unrestricted access to the RAM content, allowing to read/write otherwise protected memory and to get higher privileges on the system.
To ...
7
votes
2answers
81 views
What could cause “Bad packet length” with sshd?
I am getting a lot of failed ssh login attempts by one specific IP-Address with a strange error. I cannot make sense of the information found through google, so I was thinking it is maybe a new form ...
7
votes
3answers
320 views
How to compile java_atomicreferencearray (CVE-2012-0507) exploit to run calc.exe on system?
I got interested in java exploits and stumbled upon this:
https://github.com/redcreen/exploits/tree/master/CVE-2012-0507/redcreen
It is source code for Java exploit, so even though my knowledge of ...
7
votes
0answers
504 views
Heap Buffer Overflow - AddressSanitizer output - what is needed to exploit this condition?
This is the AddressSanitizer output, for different input I get READ and WRITE errors. From Heap Buffer Overflow perspective which are more interesting? I want to execute my shellcode. Can somebody ...
7
votes
2answers
288 views
Microservice to Microservice Auth
We're planning a new architecture which will utlize a backend of many different microservices that will need to talk with each other as well as field requests from systems not part of the service. In ...
7
votes
0answers
88 views
How the AWS signature works in depth
I'm trying to understand how the AWS signature 4 works. I read the docs and I found the Python example where a signature is computed (http://docs.aws.amazon.com/general/latest/gr/sigv4-signed-request-...