General Discussion Undecided where to post - do it here. |
Reply to Thread New Thread |
![]() |
#21 |
|
So you freely advertise what equipment you have, what OS revisions etc... to anyone? The least amount of information you give out the better. |
![]() |
![]() |
#22 |
|
Obscurity is exactly what security is about. Obscurity is exactly what security is about. Obscurity is exactly what security is about. Obscurity is exactly what security is about. Obscurity is exactly what security is about. Obscurity is exactly what security is about. Obscurity is exactly what security is about. Obscurity is exactly what security is about. Obscurity is exactly what security is about. |
![]() |
![]() |
#23 |
|
|
![]() |
![]() |
#24 |
|
So have a company you want to hack, but don't know their IP(s)?
1. Look for their domain names... If they have anything public that's not on a 3rd party host, duh? 2. If they have ANYTHING they host themselves, they're open. 3. Do a couple searches and see if their name is registered to their IP blocks... 4. Even if they relay mail through a third party, you can trace that, too. 5. Social engineering anyone? 6. Dumpster diving... Knowing who their ISP is can tell a world of information and drastically narrow down a scan. 7. And if you really don't mind physical intrusion, inline network tap. Nuff said. Security through obscurity is for hapless idiots who simply don't know any better. Just because you don't ADVERTISE what you have doesn't make it any more secure!!! It's like people thinking that not broadcasting their SSID makes their wireless any more secure. Software and hardware both can be fingerprinted remotely. Hell, with the right knowledge you can map the ACLs of a firewall with little to no difficulty in a completely undetectable manner... REMOTELY! Does obscurity make ANYTHING more secure? Maybe if it's some script-kiddie who downloaded some canned apps and has no idea what he is doing. But for everyone else, it's ABSOLUTELY USELESS!!! |
![]() |
![]() |
#25 |
|
So have a company you want to hack, but don't know their IP(s)? |
![]() |
![]() |
#26 |
|
So you freely advertise what equipment you have, what OS revisions etc... to anyone? The least amount of information you give out the better. |
![]() |
![]() |
#27 |
|
So you freely advertise what equipment you have, what OS revisions etc... to anyone? The least amount of information you give out the better. "Let's use an obfuscated naming scheme on our servers so people can't figure out what they're for!" "Don't broadcast out our SSID! Without it, someone will never know our wireless network is there!" "No no, don't set it up so that the organization has to come through our main firewall. We don't want to mess with it and open yet another way into our network. Instead, we'll just hook up that organization straight to our LAN with a firewall between us." "Static IPs, by nature, are more secure than DHCP. With DHCP you can just hook up and get an IP; with static IPs, someone has to assign you an IP." /me head plants into desk repeatedly |
![]() |
![]() |
#28 |
|
So have a company you want to hack, but don't know their IP(s)? If you want to protect against someone who knows what they are doing, then yes it is absolutely useless. At my work, we hired someone to try and break into our system. We gave them all the information they asked for, details about how the permissions are set up on our servers (mostly web servers, where you can get a site and run ASP or ASP.NET code), user names, network diagrams, etc. If they can break into it with that information, they can probably break into it without that information. It would just take a few more steps. |
![]() |
![]() |
#29 |
|
At my work, we hired someone to try and break into our system. We gave them all the information they asked for, details about how the permissions are set up on our servers (mostly web servers, where you can get a site and run ASP or ASP.NET code), user names, network diagrams, etc. If they can break into it with that information, they can probably break into it without that information. It would just take a few more steps. ![]() ![]() |
![]() |
![]() |
#30 |
|
|
![]() |
![]() |
#31 |
|
|
![]() |
![]() |
#32 |
|
Maybe I am just really tired but that made a startlingly small amount of sense. Hard to explain, but if you give them the keys to your kingdom and they can break in from the outside without knowing where the doors are, they'd be able to break in regardless. |
![]() |
![]() |
#33 |
|
|
![]() |
Reply to Thread New Thread |
Currently Active Users Viewing This Thread: 1 (0 members and 1 guests) | |
|