Thank you readers, community contributors, and supporters! We’ve had a busy year both on and off the keyboard and would be remiss to not give a recap of what we (Not just the HM staff, but you too!) have accomplished! We have exciting projects in store for everyone in 2018 and are going to put our money where our mouth is by letting you all know what’s coming!
Hey guys & gals its been a bit since we’ve had a tutorial or a blog post. Well that’s because we’ve been busy!
As you can see the site got yet another facelift, hopefully a change that uncluttered the site and is easier to navigate. We also added a forum and we are also doing monthly challenges insipired by the hardwork of @incidrthreat!
So whats on the horizon at Hackmethod? Well… lots of things!
Read more “Company Update 01”
Course Overview I recently completed and was awarded my
SANS GCIA Certification. The GCIA or GIAC Intrusion Analyst certification is a course that focuses on learning how to configure intrusion detection systems (Snort, Bro, SiLK) and analyze logs, and network traffic. I took the six day boot camp that was taught by Mike Poor.
Happy Holidays everyone! I had some time to work on the site this week and decided to do some back end work. I’m hardly a website developer and to be completely frank I find website development and technologies frustrating at best. I did learn quite a few things while doing this and it was in the end a successful few days.
Most importantly I improved the security of the site, I implemented some server side firewall rules which should drastically reduce the amount of attacks on the site. For fun I’ll probably end up posting some of the logs so interested parties can get a view of what a site under constant attack looks like. It’s pretty much a spaceship flying through an asteroid field. I also implemented HTTP TLS/SSL encryption. You’ll notice now that all traffic is force re-directed to https. You may get a mix content warning and I hope to fix that soon. Its because images are being served as http rather than https and WordPress doesn’t have an easy way to correct the migration.
Our certificate comes from Let’s Encrypt which is a free automated open certificate of authority. So that is my Christmas gift to all of you this year, encrypted traffic!
I hope to continue this site well on into the future and I hope to bring not only tutorials but more frequent blog-esqe posts of thoughts, projects or general useful tidbits that I come across during all of my research.
Again, have a Happy Holidays, enjoy some time off with your families and see you next year!
Hey there HackMethod fans, its an exciting day for us because we are giving something away!
We’re giving away a “set” of field manuals that will consist of the Rtfm: Red Team Field Manual and the Blue Team Handbook. As many of you are aware, we almost always recommend these two manuals to users. Not for learning per say, but for reference or points of further research. I often find myself reaching for my books when I need some inspiration or a little guidance.
HackMethod.com Field Manual Giveaway!
Our primary goal for this giveaway is to a) Give something away that we have found helpful b) to help spread the greatness that we are doing here at Hackmethod.com. If you found this site helpful please follow, share and retweet on behalf of us. Our social media accounts can be found on the sidebar to the right and it would mean a lot to us.
The above contest is hosted by the gleam.io platform and we are not affiliated, associated, authorized, endorsed by, or in any way officially connected with gleam.io or any of its subsidiaries or its affiliates. Having said that, we are not in the business of collecting personal data, however the winner will need to provide an address for which we will send the manuals.
Many of the questions I see in r/howtohack or any computer security forum often are flooded with questions from beginners wondering how to get started in hacking. I hate to be the bearer of bad news but its going to be a lot of work.
Lets discuss some of the major reasons why learning hacking is so difficult and along the way we can dissect how to overcome these obstacles.