At Hackmethod we believe in learning through experience. In highly technical fields such as cyber security you can only learn so much from powerpoint slides, videos or books. Students need a way to gain experience through regular practice with variance in environment and tools. This is the reason we are Read more…
Definition of Cyber Hunting by our good friends at Wikipedia: “Cyber threat hunting is “the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions.” This is in contrast to traditional threat management measures, such as firewalls, intrusion detection systems (IDS), and SIEM Systems, which typically involve an investigation after there has been a warning of a potential threat or an incident has occurred.” In short, hunting begins when traditional security methods fail. Teams are called upon to enter contested terrain and defeat attackers. This article discusses the high level process of how a team would approach such a situation. In later articles we will step through each phase of an attack, discuss technical methods and use some open source tools as a demonstration.
Homelabbers rejoice! In this review we are welcoming the Protectli 6 Port Vault to the home security hardware market. We have been in the market for something like this for a few months and while researching several products we stumbled across a CPU requirement for pfSense version 2.5. This requires chipsets that support AES-NI and even though pfSense 2.4 isn’t out yet we at Hackmethod always like to future proof as much as possible. For full disclosure, we reached out to Brent at Protecli and asked when/if they would have hardware to support the AES-NI requirement. We were informed that they were working on a new line of products due for release in a few months and wanted to know if we would like to get our hands on one for review. That lands us here today with Protecli graciously providing the Hackmethod team with some hardware to test out. Thanks Brent!
Disclaimer: What you do with this information is up to you. You are fully responsible for what you do with this info, and how you use it. HackMethod is not responsible for your actions. Please do not hack Wifi points that you are not allowed to.
NOTE: I do advise having a USB WiFi adapter, and an extra point would be to get a great one like the ALFA AWUS036NHR or AWUS051NH. Although any card would do as long as it supports monitor mode and packet injection.
When it comes to the world of WiFi hacking, the possibilities are only limited by your imagination. Skilled hackers can combine attacks together for increased efficiency, and can also judge on which attack is best to use given a particular situation. By the end of this guide you should have an overall idea on the types of attacks that you can use against any WiFi-enabled AP or router.
Basics A cryptographic hash function is a mathematical algorithm that takes in data of arbitrary size and converts it to a string of a fixed size, which is designed to also be a one-way function, that is, a function which is infeasible to invert. See Fig 1. The idea is Read more…
Basics The GPU is the graphics processing unit, sometimes referred to as graphics card or visual processing unit (VPU). Commonly used for processing imagery, it is used to handle resource intensive computations that may overload your standard Central Processing Unit (CPU). It is typically embedded within the motherboard or CPU Read more…
Password Safeguards Password Strength Password strength or complexity is the goal of having a good password and making it strong against brute-force attacks. ab where a is the possible symbols and b is the length. If you have a 4 letter password containing only [0-9] then it might take 104 = Read more…
HM Podcast 001 – Automating your Network Diagrams, Bug Bounties, and the Mirai Botnet
Incidrthreat, hellor00t, and A1ph4byte are eager to give back to a community that hasn’t stopped giving us various challenges and is always pushing us to improve ourselves as nerds. Together we make over 15 years experience and are excited to share and give back to a community that has always had our back and are still teaching us to this day. Join us on our journey to empower all levels of cyber security enthusiasts ranging from beginners and the advanced. If we touch on subjects that our listeners are already privy we simply look forward to entertaining anyone willing to deal with our corny jokes, misplaced wit, and like-minded enthusiasm for “cyber”.
Linux Unified Key Setup, or LUKS [luhks] as it will be referred to as from here on out, is a widely used method of disk-encryption. LUKS is proprietary to the Linux Kernel and a device encrypted with LUKS will not mount in a Windows or Apple environment. LUKS can encrypt entire block devices such as Hard Disks Drives (HDD), Solid-State Devices (SSD) such as USB sticks or Flash drives, partitions, etc. LUKS is largely recommended for protecting removable storage media, laptop hard-disks or Linux swap files and not recommended for file level encryption.
|Introduction Source Code vs Executable Code Narnia Level 0 – Source Code Narnia Level 0 – Exploitation Narnia Level 0 – Solution|