Password Safeguards Password Strength Password strength or complexity is the goal of having a good password and making it strong against brute-force attacks. ab where a is the possible symbols and b is the length. If you have a 4 letter Read more…
Hey guys & gals its been a bit since we’ve had a tutorial or a blog post. Well that’s because we’ve been busy!
As you can see the site got yet another facelift, hopefully a change that uncluttered the site and is easier to navigate. We also added a forum and we are also doing monthly challenges insipired by the hardwork of @incidrthreat!
So whats on the horizon at Hackmethod? Well… lots of things! (more…)
HM Podcast 001 – Automating your Network Diagrams, Bug Bounties, and the Mirai Botnet
Incidrthreat, hellor00t, and A1ph4byte are eager to give back to a community that hasn’t stopped giving us various challenges and is always pushing us to improve ourselves as nerds. Together we make over 15 years experience and are excited to share and give back to a community that has always had our back and are still teaching us to this day. Join us on our journey to empower all levels of cyber security enthusiasts ranging from beginners and the advanced. If we touch on subjects that our listeners are already privy we simply look forward to entertaining anyone willing to deal with our corny jokes, misplaced wit, and like-minded enthusiasm for “cyber”.
Linux Unified Key Setup, or LUKS [luhks] as it will be referred to as from here on out, is a widely used method of disk-encryption. LUKS is proprietary to the Linux Kernel and a device encrypted with LUKS will not mount in a Windows or Apple environment. LUKS can encrypt entire block devices such as Hard Disks Drives (HDD), Solid-State Devices (SSD) such as USB sticks or Flash drives, partitions, etc. LUKS is largely recommended for protecting removable storage media, laptop hard-disks or Linux swap files and not recommended for file level encryption.
Malware Types Malware can be classified by it’s behavior, target platform, or attack commands. Of the three classifications, we will look more specifically at malware based on behavior. These can be divided into 8 different categories:
Course Overview I recently completed and was awarded my
SANS GCIA Certification. The GCIA or GIAC Intrusion Analyst certification is a course that focuses on learning how to configure intrusion detection systems (Snort, Bro, SiLK) and analyze logs, and network traffic. I took the six day boot camp that was taught by Mike Poor.
In an attempt to stay motivated and focus on my own individual projects while I’m not at work. I’m going to challenge myself to post more frequently in a blog-esqe style. Tutorials and technical write-ups will still come. I’m Read more…