Easy tutorial about hacking our first MIFAR/RFID Tag. RFID is a technology widely used in our lives, from our building access badges, to payment facilities, or even our gates’ remotes. As we’ve seen in the previous post here, some of them are utilizing Read more…
Whether you’re in a small business or in a multi-million dollar company, you’d surely want to fortify and maintain your networks physical and IP security by having penetration testing. There may be a lot of pentest companies and professionals out Read more…
Gone are the days of defense solely relying on systems being patched. The model of hiding behind firewalls like the Greeks in Troy. This has been proven, time and time again, to be as faulty in Cyber as it was in the days of old. There aren’t many hard definitions in Cyber, so here’s Hackmethod’s take on a popular topic that’s been brought up around the water cooler for the past few days.
Definition of Cyber Hunting by our good friends at Wikipedia: “Cyber threat hunting is “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.” This is in contrast to traditional threat management measures, such as firewalls, intrusion detection systems (IDS), and SIEM Systems, which typically involve an investigation after there has been a warning of a potential threat or an incident has occurred.” In short, hunting begins when traditional security methods fail. Teams are called upon to enter contested terrain and defeat attackers. This article discusses the high level process of how a team would approach such a situation. In later articles we will step through each phase of an attack, discuss technical methods and use some open source tools as a demonstration.
Thank you readers, community contributors, and supporters! We’ve had a busy year both on and off the keyboard and would be remiss to not give a recap of what we (Not just the HM staff, but you too!) have accomplished! We have exciting projects in store for everyone in 2018 and are going to put our money where our mouth is by letting you all know what’s coming!
Homelabbers rejoice! In this review we are welcoming the Protectli 6 Port Vault to the home security hardware market. We have been in the market for something like this for a few months and while researching several products we stumbled across a CPU requirement for pfSense version 2.5. This requires chipsets that support AES-NI and even though pfSense 2.4 isn’t out yet we at Hackmethod always like to future proof as much as possible. For full disclosure, we reached out to Brent at Protecli and asked when/if they would have hardware to support the AES-NI requirement. We were informed that they were working on a new line of products due for release in a few months and wanted to know if we would like to get our hands on one for review. That lands us here today with Protecli graciously providing the Hackmethod team with some hardware to test out. Thanks Brent!
This lesson will not re-invent the wheel by teaching another linux file structure lesson. There are many other articles that already discuss that topic in detail. What this lesson hopes to accomplish is give the reader an understanding of why it is important to learn the linux file structure from both offensive and defensive perspectives.
It’s been about a week since I’ve fully recovered mentally and physically from my Offensive Security Certified Professional exam. A lot of people wonder (myself included) if they are ready to tackle OSCP. You’ll often see people ask OSCP credentialed individuals on what their background is and how much effort did they have to put into OSCP. So rather than give you the “this is how OSCP works” spiel, I’ll aim to answer those questions!