Questions tagged [threats]

An actor, usually a person, who may attempt to exploit a vulnerability of an exposed system.

99 questions
5
votes
2 answers

Port forwarding with 0.0.0.0, any threat?

I set up on our company's firewall (fortigate100d) a port forwarding to one of our Internal services. As we don't have a static public IP I used 0.0.0.0 as an external IP so the remote users can access the internal service through a DDNS service…
elsadek
  • 1,782
  • 2
  • 17
  • 53
4
votes
2 answers

What is a threat tree in threat modeling?

The OWASP Application Threat Modeling, quoting step 2 says specifically: These threats can be identified further as the roots for threat trees; there is one tree for each threat goal. what is threat tree and what it has to do with a potential…
Shritam Bhowmick
  • 1,602
  • 14
  • 28
4
votes
3 answers

Is there a process to identify threats related to a deployments?

I read about application threat modeling which makes a software products secure from its initial stages (SDLC). But if we do something wrong in the deployment phase still that will be an issue. For example, a sysadmin opens a port in the firewall…
4
votes
2 answers

Risks to company while performing the penetration test

I would like to know what the risks a penetration testing company faces while performing tests for clients. For example: A penetration testing company named "A" providing services for a client called "B". So now what threats would company "A" be…
coder
  • 41
  • 1
4
votes
1 answer

Is it possible to spoof a paired Bluetooth device?

I'm thinking about creating a physical lock, where the keys would simply be paired Bluetooth devices, but I'm concerned about the potential (in)security. I would like to have a Bluetooth 2.1 module constantly scan for paired devices and when one is…
IAmHello
  • 43
  • 1
  • 1
  • 4
4
votes
1 answer

How does FireEye HX work?

Can someone please expand on how FireEye HX works, what does it do exactly? Here is the site info: https://www.fireeye.com/products/hx-endpoint-security-products.html, but it's written in such an empty language that should get a reward for saying…
costa
  • 211
  • 2
  • 4
3
votes
2 answers

How to estimate threat and risk associated with that threat and not only vulnerability severity?

Having this simple formula Risk = Threat x Vulnerability x Information Value it is quite difficult to estimate risks quantitatively because of threat estimation seems to me the most difficult part. I aware about CVSS and other vulnerability scoring…
progmastery
  • 131
  • 2
3
votes
0 answers

How is it possible that the Metasploit meterpreter can take pictures without "notifying" the user?

Im curious how the Meterpreter can take pictures from my webcam without turning on the webcam LED? Ive read that you have to write/change a driver, or a firmware, or you just change some DLLs, but then others say that the LED cant be hacked because…
3
votes
3 answers

How should we implement responsible discovery program internally only for our organization employees?

We experienced a very interesting phenomenon in the last 6 months and that is that some employees found and reported to our security teams few very crucial security issues. We were thinking about encouraging this type of behavior (we think employees…
Filipon
  • 1,204
  • 10
  • 22
3
votes
2 answers

Vulnerabilities and Threats to Non Web Based Windows Applications

I believe that most people here are familiar with OWASP and their Top 10 project. When it comes to information systems these days it appears that there is a big focus on web application security and rightfully so. Recently I was tasked to perform a…
3
votes
3 answers

What would be the valid approach while handling short links

In modern world people often use to send urls with url shortners from various webservices,Mostly we use url shortners to shorten the url But in terms of exploits,phishing attempts how could we avoid it,if it's regular url we could/might guess some…
BlueBerry - Vignesh4303
  • 5,107
  • 13
  • 34
  • 63
2
votes
1 answer

how much of a security threat would this be?

If I set up a Domain Controller server to be accessible from the internet via Remote Desktop Connection (through port forwarding in the router), how much of a threat would that be? and if I have a strong administrator password? and if there are…
user29239
2
votes
1 answer

SSL certificates published in Mandiant's APT1 report

You probably heard about excellent report "APT1: Exposing One of China's Cyber Espionage Units" published by the Mandiant company (you can download it here). Report is great and I recommend it to anyone interested in computer security. Together with…
mzet
  • 233
  • 1
  • 6
2
votes
5 answers

What is Non-Repudiation of content? How can we combat it?

Can anyone explain precisely the term of non-repudiation of content (eg. of email)? What sort of security requirement is used to combat this? Perhaps a digital signature? This is how I understand the concept: If the nurse emailed a critical…
Best
  • 133
  • 1
  • 7
2
votes
1 answer

What is the difference between ATT&CK and CAPEC?

My question is on Cyber Threat Intelligence (CTI). I want to know the difference between Attack Patterns (as in MITRE CAPEC) and Tactics, Techniques and Procedures (as in MITRE ATT&CK). They both seem to describe the behaviour and modus operandi of…