Security through ...
Follow
Find
7.3K views | +1 today
Security through Obscurity
A system relying on security through obscurity may have theoretical or actual security vulnerabilities, but its owners or designers believe that the flaws are not known, and that attackers are unlikely to find them. The basis of STO has always been to run your system on a “need to know” basis. If a person doesn’t know how to do something which could impact system security, then s/he isn’t dangerous. The technique stands in contrast with security by design.
Curated by Yury Chemerkin
Your new post is loading...
Your new post is loading...
Scooped by Yury Chemerkin
Scoop.it!

IPMI: Redefine the meaning of "OFF"

IPMI, the "Intelligent Platform Management Interface" can provide a web based admin interface to your server even if the server appiears to be turned off.

...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Reverse Engineering: Bypassing Acunetix Web Security Scanner 8 activation.

Here in this tutorial we use Olly Debugger which is a 32-bit assembler level analyzing debugger for windows applications.
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 2. Hall 5

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 2. Hall 5 | Security through Obscurity | Scoop.it
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 2. Hall 3

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 2. Hall 3 | Security through Obscurity | Scoop.it
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 2. Conference

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 2. Conference | Security through Obscurity | Scoop.it
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 1. Hall 5

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 1. Hall 5 | Security through Obscurity | Scoop.it
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 1. Hall 3

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 1. Hall 3 | Security through Obscurity | Scoop.it
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 1. Conference

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 1. Conference | Security through Obscurity | Scoop.it
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Massive Top 100 security tips. Part IX. Public computers

The Social Media Story storified by Yury Chemerkin...

...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Massive Top 100 security tips. Part VI. Smartphones

The Social Media Story storified by Yury Chemerkin...

...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Grendel Scan Web Vulnerability Scanner Backtrack 5r2

cd /pentest/web/grendel-scan /pentest/web/grendel-scan# ls /pentest/web/grendel-scan# sh grendel.sh Enjoy!
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Metasploit with Microsoft SQL Server and SMB exploits (Part 1/2)

This video shows how to use Metasploit to gain access to a computer using a vulnerability in Microsoft SQL Server (1st step) and then using an SMB vulnerabil...

...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Protect Your Java Code - Through Obfuscators and Beyond

A beginner's guide to Java code protection, showing where obfuscation falls short and what can be done about that.
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 2. Mix

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 2. Mix | Security through Obscurity | Scoop.it
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 2. Hall 4

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 2. Hall 4 | Security through Obscurity | Scoop.it
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 2. Hall 1

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 2. Hall 1 | Security through Obscurity | Scoop.it
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 1. Mix

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 1. Mix | Security through Obscurity | Scoop.it
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 1. Hall 4

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day 1. Hall 4 | Security through Obscurity | Scoop.it
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day1. Hall 1

Security Through Obscurity: POSITIVE HACK DAYS-2012. Day1. Hall 1 | Security through Obscurity | Scoop.it
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Hakin9 06/2012: Biometrics | Magazine | IT Security Magazine - Hakin9 www.hakin9.org

Hakin9 06/2012: Biometrics | Magazine | IT Security Magazine - Hakin9 www.hakin9.org | Security through Obscurity | Scoop.it
Biometrics: Secure? Hackable? You Decide...
more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Massive Top 100 security tips. Part X. WiFi security

The Social Media Story storified by Yury Chemerkin...

...

more...
No comment yet.
Scooped by Yury Chemerkin
Scoop.it!

Massive Top 100 security tips. Part VIII. Anti Virus

The Social Media Story storified by Yury Chemerkin...

...

more...
No comment yet.