Questions tagged [identification]

88 questions
1
vote
1 answer

does the --nack command do what I think it does in reaver and why won't it work?

I have a problem with reaver. I try the --nack command reaver -i mon0 -b 00:01:02:03:04:05 -vv --nack --mac=00:BA:AD:BE:EF:6 for example. And I assume it will try a different PIN, even if it doesn't receive a negative acknowledgment but it tries…
0
votes
1 answer

How do API's authenticate a user?

I've read many documents about API's but they don't seem to mention API's for private accounts instead of publicly accessible information. How does an API work to request private account data? How does it get the login details or session cookie? For…
John
  • 1
0
votes
2 answers

What methods can be used to verify identity against a database?

I have a database with individual contact data for students... this data includes name, address, phone number, birthdate, etc. (no social... that would have made this too easy apparently, ha ha) I would like to allow their parents to access their…
xtraorange
  • 103
  • 2
0
votes
2 answers

What kind of information can be found from email?

When an average person sees an email, he can see only part of an information enclosed in the mail. To see full information one can look at the source of an email, which shows more. Example of an email source looks like this: Received: via…
Salvador Dali
  • 1,745
  • 1
  • 19
  • 32
0
votes
0 answers

Determining the efficiency of a biometric system

How can find the efficiency of any biometric system is there an equation to find it? How is the efficiency of a biometric security system?
nuha
  • 21
  • 1
  • 3
0
votes
2 answers

How to identify a specific operating system with port scans?

According to the implementation of the TCP/IP stack an attacker is able to identify which operating system is running on a network device. Is there any paper or the like according on this topic?
Tom Maier
  • 125
  • 1
  • 6
0
votes
1 answer

Hack profile identification

What does it suggest about a "hack" when people I know get emails from me, but my email password hasn't been changed to lock me out? (Not a spoofed sender - I see some in my sent folder). If my password is known to the attacker, why would they…
Jason Kleban
  • 207
  • 1
  • 7
0
votes
1 answer

Fraud Detection - 2FA Bypass Methods and SIM Cloning

I am assisting another Data Scientist with helping a bank detect and prevent fraud via data analysis and predictive modeling (Machine Learning). It's a challenge because the proportion of known fraudulent cases is small and some fraud goes…
Hack-R
  • 213
  • 2
  • 8
0
votes
1 answer

How malware file signature is generated?

How is the malware file signature generated? Does it use a sequence of bytes in the beginning, size, PE (export, import, section), etc? And can the MD5 or SHA256 be considered a file signature for a malware file? Note: I know that there's YARA that…
heaprc
  • 103
  • 4
0
votes
0 answers

Could "System Volume Information" be used to find out on which system the storage was used?

If one uses a storage device (USB stick or SD card) on Windows, then it leaves "System Volume Information" folder in the file system. Would there be a way so a forensic guy could definitely tell on which computer the storage device was used by…
William
  • 21
  • 3
0
votes
0 answers

Are there differences on how storages are formatted between different OS?

If one formats the same USB stick (or SD card) to FAT32 file system on Windows, or on Linux, or on Android - would there be differences so a forensic guy could definitely tell on which OS or even on which specific machine the USB stick was…
0
votes
0 answers

Which traces leave on a flash card after using it?

If one uses a micro SD card with a card reader on Windows, or on Linux, or on Android - would there be a way so a forensic guy could definitely tell on which computer the flash card was used by examining it? I know OS can log which devices was…
William
  • 21
  • 3
0
votes
0 answers

How reliable is a mathematical model of a human fingerprint for identification?

How reliable is a mathematical model of a human fingerprint for identification? I am looking for a way to uniquely identify individuals that is very reliable and easy to use that does not require storing actual biometric data. Storing the actual…
polcott
  • 93
  • 6
0
votes
1 answer

Can we prevent users from generating a QR code with edited information

Currently there is this design of two apps that work together: Proof app: On customers phone, takes in a textcode and creates a QR code Scanner app: On hosts phone, Scans the QR code and displays some information like birthday, initial and valid…
0
votes
0 answers

Risks of Providing a Passport Number

Company A pays company B for enterprise software. Company A hosts it internally. An employee from company B needs access to servers at company A in order to manage said software Company A is requesting very personal information of the employees…
GWR
  • 1,203
  • 2
  • 9
  • 11