Malware Types Malware can be classified by it’s behavior, target platform, or attack commands. Of the three classifications, we will look more specifically at malware based on behavior. These can be divided into 8 different categories:
Course Overview I recently completed and was awarded my
SANS GCIA Certification. The GCIA or GIAC Intrusion Analyst certification is a course that focuses on learning how to configure intrusion detection systems (Snort, Bro, SiLK) and analyze logs, and network traffic. I took the six day boot camp that was taught by Mike Poor.
In an attempt to stay motivated and focus on my own individual projects while I’m not at work. I’m going to challenge myself to post more frequently in a blog-esqe style. Tutorials and technical write-ups will still come. I’m primarily using this as my own motivational tool. SANS Holiday Read more…
RAM stands for Random-Access Memory and is commonly referred to as RAM or Memory for short. It serves as temporary storage and working space for the operating system and its applications. This allows data to be accessed (read or written) in almost real-time regardless of the physical location inside the memory as opposed to HDDs, Disc Drives, or any other mechanical media. In the majority of computers, RAM is an easily upgradeable option that will increase the performance of your operating system and application usage. RAM is a volatile type of storage medium. Which means if you reboot, shutdown, or have a power loss of any sort, every bit of data residing in memory no longer exists.
Basics Network interface cards or NIC’s are what connect computers to networks. If you haven’t heard about it yet, the OSI Model is the concept that all computers use to communicate with each other. There are seven layers the begin with the physical layer which go all the way up Read more…
This is not a discussion on how to hack or program with python, it’s a discussion on why I personally chose python as my first programming language.
I’m not a developer, I’ve never written a program from source code to production. So when I started looking for a language to jump into I wanted something that could be used a stepping stone for lower level languages.
Google Dorking can technically be defined as a type of hacking by itself. The basic idea of Google Dorking is to used Google’s advanced search features/operators to obtain information about someone, or something.
In general we know that Google Search is a big database of all the webpages that are considered publicly searchable (I’m not going into deep web in this article). Public webpages are websites that googles spider has access to. It is possible to make your website not searchable by telling Google’s search spider that you do not wish for it to crawl and index your website. That being said I think you’ll find that most websites on the internet are intended to be found and as such can be searched using dorks.
Many of the questions I see in r/howtohack or any computer security forum often are flooded with questions from beginners wondering how to get started in hacking. I hate to be the bearer of bad news but its going to be a lot of work.
Lets discuss some of the major reasons why learning hacking is so difficult and along the way we can dissect how to overcome these obstacles.
Today we’re going to go over the principals of wireless hacking, an example of a WPA2 hacking and then we will wrap it up with a few troubleshooting tips.
Disclaimer: Before we begin let me preface this. Intrusion into anyone’s network without express permission by the network owner is illegal. I highly recommend you practice these techniques on your own wireless network. I take NO responsibility in what you do with this knowledge.