security

ASP.NET - FormsAuthentication - unable to redirect after login

Hi, I am using Forms Authentication in my VS-2005 website. In case of wrong credentials or while explicitly requesting protected pages the website is able to redirect user to login page. However, when correct login credentials are provided the application is not able to redirect the user to the desired page. While debugging I found tha...

Legal implication in exploiting a security hole

Please refer to the answer provided here. Just wanted to understand what are the legal implication if someone really exploited such a security hole to disrupt the system. Will he be legally charged for such act, and what kind of punishment / penalty will be levied. As Cyber laws differ from country to country, please refer to the loca...

Cannot get encryption class to work

Hi all, I cannot get an encryption class to work (it's in a seperate file in the classes folder). The code for the class is: class SymmetricCrypt { // Encryption/decryption key. private static $msSecretKey = "Hello"; // The initialisation vector. private static $msHexaIv = "c7098adc8d6128b5d4b4f7b2fe7f7f05"; // Us...

In SQL Server 2005, how can I write a query to list all login, their server role, correspond user in all db, db role?

Hi guys, I'm not clear about the security-related catalog views in SQL Server 2005 or 2008. I want to list all logins, their server roles, their correspond users in all database, all database roles in one query. How can I write the query? I know there are some catalog views to use, but I'm not familiar with their relation. These catalo...

Principal Permission

I worte a method with PrincipalPermissionAttrubute then i run this method but i get an exception - security exception. It happen cause i dont know who is the principal that running. I try to get the current principal by Thread.GetCurrntPrincipal() but i have a casting problem. My question is how i know the principal who running and...

Documentation on Virt-ICE other than white paper

I am trying to find information on Virt-ICE, a malware debugger/analysis tool presented at the most recent Black Hat conference. I have read through the white paper Virt-ICE: Next-generation Debugger for Malware Analysis and am now looking for something more. It sounds fascinating and I would love to dig deeper. Here is what I have foun...

how secure is a digital signature?

Digital signature, if I understood right, means sending the message in clear along with a hash of the message which is encrypted using a private key. The recipient of the message calculates the hash, decrypts the received hash using the public key, then compares the two hashes for a match. How safe is this? I mean, you can obtain the ...

Is it possible to "pirate" a session variable (I do not want to know how)

I am currently doing a website in php, we are using a Session variable to store the permission level of each user. For example, if any one of you would go on the website, you would automatically get a session variable with a value of "member". What I am asking is: Is it possible for an attacker to go on the website and modify the value...

Access To Message Queue System Denied Windows 7 Reading Windows 2003 - Windows 2008

I have an application that reads/writes from/to message queues on remote application servers. The clients usually run on machines outside of the servers' domains/forests with no trust setup. In Windows XP this was no problem, but with the introduction of Windows 7 it stopped working. After some research I found the suggested Registry ...

Securely deleting/wiping MySQL data from hard disk

We're running MySQL 5.1 on CentOS 5 and I need to securely wipe data. Simply issuing a DELETE query isn't an option, we need to comply with DoD file deletion standards. This will be done on a live production server without taking MySQL down. Short of taking the server down and using a secure deletion utility on the DB files is there a wa...

Is AHAH a security risk?

I am considering using AHAH extensively on a project and am concerned about security. Couldn't an attacker inject malicious code into my response that would then be executed in the client? If my AJAX response is JSON, I don't have to worry about this because if things are tampered with the JSON will no longer be valid. On the other hand...

Using PasswordBox with WPF - MVVM

I've read several articles about how to use Attached Properties to bind to the value of a PasswordBox in WPF. However, every article also references the .NET documentation which explains why the PasswordBox was not made bindable in the first place. I do not consider myself a security expert by any means, but I figure that someone at Mi...

Add Custom Green BAR MSG with EV SSL

Hello, I am interested in purchasing a SSL/TSL certificate for my website and I would like to know which retailer allows me to add my custom message in the green address bar like in this image : http://tinyurl.com/33yug4y You can see there : "COMPANIA NATIONALA DE TRANSPORTURI AERIENE ..." I want something like that too. ...

How safe is SSH?

I wonder how safe ssh is, espespecially in state of authentification/initializing. Is there any way for a hacker to sniff some "hashkeys" or stuff to decrypt my stream? or is SSH completly safe, with no yet known bugs or weaknesses? I read some text on that topic, but almost all of them dont cover such special cases. at best they only t...

How to protect a file so it can only be accessed by java?

Okay I have a folder say... http://oldserver.net/file/index.jar How would I be able to protect the file "index.jar" from being downloaded from regular web browsers? I've seen this done before, I just want to protect it from being accessed from web browsers, and keep it strictly java download access only. What I mean by java download a...

Grant SELECT, UPDATE, INSERT, DELETE to all tables except 1 (or more) in SQL Server 2005

The user I have should have access to all tables in a database - SELECT, INSERT, UPDATE, DELETE and EXECUTE (ASP code to blame :-P) except for 1 table e.g. users. When granting db_datareader and db_datawriter this gives them full access to everything and removing the DELETE permission on the users table will not work. There are over 60...

Website script injection scan

Does anyone know of any script injection scanners that are able to detect if your website has been compromised (i.e. javascript that has been injected that should just not be there)? Update: found what I was looking for - http://sucuri.net/ ...

Found a weak escape function for MySql, how to exploit?

In an application I'm working on I've found a weak escape function to prevent injection. I'm trying to prove this, but I'm having trouble coming up with a simple example. The escape function works as follows (PHP example). function escape($value) { $value = str_replace("'","''",$value); $value = str_replace("\\","\\\\",$value); ...

What's the difference between CAC cards and a 'generic' smart card?

We're trying to enable our rich client C++ Windows application to utilise DoD CAC cards. We're using a third party library to secure our client/server communication using SSL, and it recognises/handles generic smart cards, but only if the certificate was created by its own, bundled application. Why? Isn't a certificate a certificate? H...

Web security -- HTTP-Location = HTTP-Referrer if outside domain? Why?

What is the point of doing this? I want a reason why it's a good idea to send a person back to where they came from if the referrer is outside of the domain. I want to know why a handful of websites out there insist that this is good practice. It's easily exploitable, easily bypassed by anyone who's logging in with malicious intent, an...