Obfuscation refers to hiding the intended meaning of communication.
Questions tagged [obfuscation]
179 questions
80
votes
5 answers
Does code obfuscation give any measurable security benefit?
I've always firmly held the belief that obfuscation is essentially useless. Obfuscated code is not impossible to read, only harder to read. I had the belief that a sufficiently skilled attacker would be able to bring the obfuscated code back into a…
user163495
74
votes
7 answers
Is image blurring an unsafe method to obfuscate information in images?
Is image blurring an unsafe method to obfuscate information in images?
I.e., is it possible to "de-blur" the image, if you know the algorithm and the setting, or by trial & error?
For instance, the image below is the Google logotype blurred with the…
P A N
- 889
- 1
- 6
- 8
9
votes
1 answer
How to Change a Culture of "Security Through Obscurity"
I have worked for a number of organizations in the past that utilize practices that are justified by what I would describe as "Security through Obscurity" including the following:
Weak/Vulnerable two way hashing of passwords
Utilizing various…
David Rogers
- 191
- 3
3
votes
2 answers
Any way to obfuscate *when* two end hosts are communicating?
Whether or not a connection is encrypted, I'm afraid the time an information is sent from one host to another might reveal too much. And I'm literally talking about the time when pieces of information are sent, and not the information itself.
Are…
Sal Rahman
- 641
- 1
- 5
- 14
3
votes
2 answers
Is it possible to send a message and 100% obfuscate the origin of the sender in a p2p networked message board?
I am thinking of an app that could allow people to share text so they can post grievances about a totalitarian government in a p2p network. It has to be p2p because a website can be blocked. This would be for locals to post about their mayor or the…
Mark
- 31
- 1
2
votes
1 answer
How can I obfuscate a 64-bit executable Windows file?
Hyperion works OK when scrambling/obfuscating win32 files, but I am trying a program that seems to be a Win64 executable, and it fails:
C:\Hyperion>hyperion.exe -v mimikatz.exe output.exe
-------------------------------
| Stage 1: Analyzing input…
Sopalajo de Arrierez
- 671
- 2
- 8
- 16
1
vote
2 answers
How can I hide my AWS S3 access key and secret in C++?
I'm using AWS S3 in my C++ app to upload and download files. I've included the access key and secret in my code but I'm worried someone could read them from the binary. Is there any standard technique for obfuscating them?
I'm not running this app…
parsley72
- 195
- 7
0
votes
1 answer
Can someone decode this for me?
I decoded some of the original traffic from hex and got the below output. I'm not sure how to decode it further. Any help?…
Neo Son
- 15
- 2
-1
votes
2 answers
Why are there no GPU Obfuscators?
Rationale: I need to figure out ways to protect Intellectual Property contained in NVIDIA CUDA/GPU code.
That said, I'm surprised that there are literally zero GPU code obfuscators.
On stack overflow, I found a single…
John
- 107
- 1
-2
votes
1 answer
Banking App With Sensitive Info In Plain Text
I have a car loan and wanted to make a payment through their website. To enroll for online payments, it asks for the last 4 numbers of my social security number, birth date and account number, but when I type those fields, it's in plain text. Does…
Grafica
- 287
- 1
- 2
- 4
-2
votes
1 answer
An alternative to obfuscation
Recently I devised a way to avoid obfuscation of a jar file, here is how it works:
Renamed the abc.jar file to xyz.so
Placed it in system folder something like /lib/bdevid/ where other .so files were also present
Modified the Operations And…
shabby
- 97
- 1