All Questions
1
vote
3answers
38 views
How can I prove this site is a huge security weakness?
Disclaimer: I'm a computer programmer, not a security analyst or anything to do with security. I have zero experience in the world of cryptography, so bear with me please.
Situation: I was given the ...
0
votes
0answers
18 views
Powershell Empire - Token Impersonation
I have been struggling trying to get token impersonation to work in Empire 2.0.
I use the credentials/mimitokens module to list and elevate to use a specific users token - I see mimikatz' output ...
1
vote
1answer
14 views
I need assistance in properly understanding the IA-7 control in NIST SP 800-53
I've recently been working on a number of A&A tasks for the RMF for a US Government entity, and I'm having a hard time properly understanding the IA-7 control of NIST SP 800-53 and the supplement ...
3
votes
2answers
56 views
Using old ciphers in email security
My email provider still supports old SSL_RSA_WITH_RC4_128_SHA ciphers. What does that mean for me?
If I use an updated system (Ubuntu 16.04) and an updated client (Thunderbird 52), shouldn't it use ...
1
vote
1answer
13 views
Why is the BLP access control model a mandatory one?
In my lecture on formal methods in IT security as-well as on Wikipedia it is stated that the BLP model is a mandatory access control model. It is not clear to me why this is the case.
We have defined ...
3
votes
2answers
561 views
Is this invalid HTTP_HOST header part of an exploit?
We received a large number of error messages from our django application, like this:
Invalid HTTP_HOST header: ‘target(any -froot@localhost -be ${run{${substr{0}{1}{$spool_directory}}usr${substr{0}{1}...
0
votes
0answers
60 views
When DDOS attack and how to prevent attacker from flooding? [duplicate]
When a DDOS attack takes place I believe that packets/data are ignored at the receiver's end, but we don't stop the attacker from flooding the packets/data. How can you handle that?
If we say we are ...
0
votes
0answers
63 views
My Website got Hacked [on hold]
There is someone who managed to hack and steal my code source of the website and asking for money in order to tell how did he manage to hack it.
- I have checked and tested my website from file upload ...
0
votes
1answer
20 views
How key management happens in both OpenSSL and aescrypt and how the key is stored after encryption?
I am using OpenSSL and aescrypt for encryption and decryption so how key management happens in both OpenSSL,aescrypt and how to save key after encryption?
For example I giving a sample code
openssl ...
2
votes
2answers
112 views
Blocking DiagTrack outbound connection after malware infection
I was scammed and I thought those scammers were really from Microsoft so I let them remotely connected to my computer. I don’t know what they installed on it.
After I realized that it was a scam, I ...
-4
votes
0answers
41 views
How to build a penetration testing team [on hold]
What are the high level steps on building a penetration testing team?
What are the factors to consider?
Thank you!
3
votes
1answer
82 views
Protect Raspberry Pi's physical sd card to be swapped
Scenario:
In a company there are Raspberry Pis which are connected to its network environment. A person with bad intentions could swap the SD card and replace it by his own which makes the Pi to a "...
0
votes
2answers
41 views
limiting automated domain creation by malware
As we know most of the malwares create thousands of domains and subdomains using DBA for setting C&C communications. The domain names are controlled by Internet Corporation for Assigned Names and ...
0
votes
1answer
30 views
From a local file inclusion to a shell when file is downloaded?
I've just participated in a boot2root capture the flag event where I got close to solving an item but couldn't quite get it over the line and want to learn what I could have done differently.
In the ...
0
votes
0answers
8 views
What is the syntax to allow access to splashtop remote desktop servers when using Acrylic DNS proxy to block pretty much everything?
I have installed and configured Actylic DNS proxy to block all TLDs with a wildcard.
But before this in the AcrylicHosts.txt file, I listed certain specific work related IPs which users need access ...