Before we get into it… Let’s start this off the right way. Thank you readers, community contributors, and supporters! We say this every year and each year it means more to us than you will know. As the Information Security community continues to grow, we would be remiss to not Read more…
Whether you’re in a small business or in a multi-million dollar company, you’d surely want to fortify and maintain your networks physical and IP security by having penetration testing. There may be a lot of pentest companies and professionals out there, but hiring what suits your needs might not be Read more…
HM Podcast 001 – Automating your Network Diagrams, Bug Bounties, and the Mirai Botnet
Incidrthreat, hellor00t, and A1ph4byte are eager to give back to a community that hasn’t stopped giving us various challenges and is always pushing us to improve ourselves as nerds. Together we make over 15 years experience and are excited to share and give back to a community that has always had our back and are still teaching us to this day. Join us on our journey to empower all levels of cyber security enthusiasts ranging from beginners and the advanced. If we touch on subjects that our listeners are already privy we simply look forward to entertaining anyone willing to deal with our corny jokes, misplaced wit, and like-minded enthusiasm for “cyber”.
Linux Unified Key Setup, or LUKS [luhks] as it will be referred to as from here on out, is a widely used method of disk-encryption. LUKS is proprietary to the Linux Kernel and a device encrypted with LUKS will not mount in a Windows or Apple environment. LUKS can encrypt entire block devices such as Hard Disks Drives (HDD), Solid-State Devices (SSD) such as USB sticks or Flash drives, partitions, etc. LUKS is largely recommended for protecting removable storage media, laptop hard-disks or Linux swap files and not recommended for file level encryption.
Malware Types Malware can be classified by it’s behavior, target platform, or attack commands. Of the three classifications, we will look more specifically at malware based on behavior. These can be divided into 8 different categories:
- I. Infectors
- II. Network Worms
- III. The Trojan Horse
- IV. Backdoors
- V. Remote Access Trojans
- VI. Information Stealers
- VII. Ransomware
- VIII. Rootkits
RAM stands for Random-Access Memory and is commonly referred to as RAM or Memory for short. It serves as temporary storage and working space for the operating system and its applications. This allows data to be accessed (read or written) in almost real-time regardless of the physical location inside the memory as opposed to HDDs, Disc Drives, or any other mechanical media. In the majority of computers, RAM is an easily upgradeable option that will increase the performance of your operating system and application usage. RAM is a volatile type of storage medium. Which means if you reboot, shutdown, or have a power loss of any sort, every bit of data residing in memory no longer exists.
A few months back A1ph4byte, hellor00t, and I had a discussion about a project that would be both educational and useful. Despite being employed in the Network Security world, none of us had tinkered with pfSense in-depth prior to this venture. We mostly relied on the “strict” firewall rules of our SOHO routers. As enthusiasts not only would this serve as a fun and interesting project for us, but it would also serve as a guide/walk-through to others with our same interests. In addition, we thought it would be entertaining to VPN our networks together to build a somewhat larger “homelab” to test theories and attempt to mess with each others VMs, but that’s another write-up for a different time. The overall goal of this is to setup a more secure home network.