hacking

Strategies of the Cyber Hunt

Definition of Cyber Hunting by our good friends at Wikipedia: "Cyber threat hunting is "the process of proactively and iteratively searching through networks to detect and isolate advanced threats that evade existing security solutions." This is in contrast to traditional threat management measures, such as firewalls, intrusion detection systems (IDS), and SIEM Systems, which typically involve an investigation after there has been a warning of a potential threat or an incident has occurred." In short, hunting begins when traditional security methods fail. Teams are called upon to enter contested terrain and defeat attackers. This article discusses the high level process of how a team would approach such a situation. In later articles we will step through each phase of an attack, discuss technical methods and use some open source tools as a demonstration. (more…)

By hellor00t, ago
hacking

Protectli 6-Vault Review – pfSense, ESXi, ELK

Homelabbers rejoice! In this review we are welcoming the Protectli 6 Port Vault to the home security hardware market. We have been in the market for something like this for a few months and while researching several products we stumbled across a CPU requirement for pfSense version 2.5. This requires chipsets that support AES-NI and even though pfSense 2.4 isn't out yet we at Hackmethod always like to future proof as much as possible. For full disclosure, we reached out to Brent at Protecli and asked when/if they would have hardware to support the AES-NI requirement. We were informed that they were working on a new line of products due for release in a few months and wanted to know if we would like to get our hands on one for review. That lands us here today with Protecli graciously providing the Hackmethod team with some hardware to test out. Thanks Brent! (more…)

By hellor00t, ago
hacking

Guide to wifi hacking using Wifite

Disclaimer: What you do with this information is up to you. You are fully responsible for what you do with this info, and how you use it. HackMethod is not responsible for your actions. Please do not hack Wifi points that you are not allowed to. NOTE: I do advise having a USB WiFi adapter, and an extra point would be to get a great one like the ALFA AWUS036NHR or AWUS051NH. Although any card would do as long as it supports monitor mode and packet injection.

Introduction

When it comes to the world of WiFi hacking, the possibilities are only limited by your imagination. Skilled hackers can combine attacks together for increased efficiency, and can also judge on which attack is best to use given a particular situation. By the end of this guide you should have an overall idea on the types of attacks that you can use against any WiFi-enabled AP or router. (more…)

By deadpackets, ago
hacking

HM Podcast001 – Introduction and History

HM Podcast 001 - Automating your Network Diagrams, Bug Bounties, and the Mirai Botnet Incidrthreat, hellor00t, and A1ph4byte are eager to give back to a community that hasn't stopped giving us various challenges and is always pushing us to improve ourselves as nerds. Together we make over 15 years experience and are excited to share and give back to a community that has always had our back and are still teaching us to this day. Join us on our journey to empower all levels of cyber security enthusiasts ranging from beginners and the advanced. If we touch on subjects that our listeners are already privy we simply look forward to entertaining anyone willing to deal with our corny jokes, misplaced wit, and like-minded enthusiasm for "cyber". (more…)

By InCIDRthreat, ago
hacking

Using LUKS

Linux Unified Key Setup, or LUKS [luhks] as it will be referred to as from here on out, is a widely used method of disk-encryption.  LUKS is proprietary to the Linux Kernel and a device encrypted with LUKS will not mount in a Windows or Apple environment.  LUKS can encrypt entire block devices such as Hard Disks Drives (HDD), Solid-State Devices (SSD) such as USB sticks or Flash drives, partitions, etc.  LUKS is largely recommended for protecting removable storage media, laptop hard-disks or Linux swap files and not recommended for file level encryption. (more…)

By InCIDRthreat, ago
hacking

Malware Types

Malware Types Malware can be classified by it's behavior, target platform, or attack commands.  Of the three classifications, we will look more specifically at malware based on behavior.  These can be divided into 8 different categories:

  • I. Infectors
  • II. Network Worms
  • III. The Trojan Horse
  • IV. Backdoors
  • V. Remote Access Trojans
  • VI. Information Stealers
  • VII. Ransomware
  • VIII. Rootkits
(more…)

By InCIDRthreat, ago