DFIR vs HUNT

Digital Forensics & Incident Response vs Hunt

Gone are the days of defense solely relying on systems being patched. The model of hiding behind firewalls like the Greeks in Troy.  This has been proven, time and time again, to be as faulty in Cyber as it was in the days of old. There aren’t many hard definitions in Cyber, so here’s Hackmethod’s take on a popular topic that’s been brought up around the water cooler for the past few days.

(more…)

Strategies of the Cyber Hunt

Definition of Cyber Hunting by our good friends at Wikipedia: “Cyber threat hunting is “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.” This is in contrast to traditional threat management measures, such as firewalls, intrusion detection systems (IDS), and SIEM Systems, which typically involve an investigation after there has been a warning of a potential threat or an incident has occurred.” In short, hunting begins when traditional security methods fail. Teams are called upon to enter contested terrain and defeat attackers. This article discusses the high level process of how a team would approach such a situation. In later articles we will step through each phase of an attack, discuss technical methods and use some open source tools as a demonstration.

(more…)

Goodbye 2017, Welcome 2018!

Thank you readers, community contributors, and supporters!  We’ve had a busy year both on and off the keyboard and would be remiss to not give a recap of what we (Not just the HM staff, but you too!) have accomplished!  We have exciting projects in store for everyone in 2018 and are going to put our money where our mouth is by letting you all know what’s coming!

(more…)

Protectli 6-Vault Review – pfSense, ESXi, ELK

Homelabbers rejoice! In this review we are welcoming the Protectli 6 Port Vault to the home security hardware market. We have been in the market for something like this for a few months and while researching several products we stumbled across a CPU requirement for pfSense version 2.5. This requires chipsets that support AES-NI and even though pfSense 2.4 isn’t out yet we at Hackmethod always like to future proof as much as possible. For full disclosure, we reached out to Brent at Protecli and asked when/if they would have hardware to support the AES-NI requirement. We were informed that they were working on a new line of products due for release in a few months and wanted to know if we would like to get our hands on one for review. That lands us here today with Protecli graciously providing the Hackmethod team with some hardware to test out. Thanks Brent!

(more…)

Linux File Structure

Overview

This lesson will not re-invent the wheel by teaching another linux file structure lesson. There are many other articles that already discuss that topic in detail. What this lesson hopes to accomplish is give the reader an understanding of why it is important to learn the linux file structure from both offensive and defensive perspectives.

(more…)