Using LUKS

Linux Unified Key Setup, or LUKS [luhks] as it will be referred to as from here on out, is a widely used method of disk-encryption.  LUKS is proprietary to the Linux Kernel and a device encrypted with LUKS will not mount in a Windows or Apple environment.  LUKS can encrypt entire block devices such as Hard Disks Drives (HDD), Solid-State Devices (SSD) such as USB sticks or Flash drives, partitions, etc.  LUKS is largely recommended for protecting removable storage media, laptop hard-disks or Linux swap files and not recommended for file level encryption.

(more…)

Malware Types

Malware Types Malware can be classified by it’s behavior, target platform, or attack commands.  Of the three classifications, we will look more specifically at malware based on behavior.  These can be divided into 8 different categories:

  • I. Infectors
  • II. Network Worms
  • III. The Trojan Horse
  • IV. Backdoors
  • V. Remote Access Trojans
  • VI. Information Stealers
  • VII. Ransomware
  • VIII. Rootkits

(more…)

Hardware – Random Access Memory (RAM)

Basics

RAM stands for Random-Access Memory and is commonly referred to as RAM or Memory for short. It serves as temporary storage and working space for the operating system and its applications. This allows data to be accessed (read or written) in almost real-time regardless of the physical location inside the memory as opposed to HDDs, Disc Drives, or any other mechanical media.  In the majority of computers, RAM is an easily upgradeable option that will increase the performance of your operating system and application usage. RAM is a volatile type of storage medium. Which means if you reboot, shutdown, or have a power loss of any sort, every bit of data residing in memory no longer exists.

(more…)

Why You Should Learn Python First

This is not a discussion on how to hack or program with python, it’s a discussion on why I personally chose python as my first programming language.

I’m not a developer, I’ve never written a program from source code to production. So when I started looking for a language to jump into I wanted something that could be used a stepping stone for lower level languages.

(more…)

Passive Recon – Hacking with Google Dorking

Google Dorking can technically be defined as a type of hacking by itself. The basic idea of Google Dorking is to used Google’s advanced search features/operators to obtain information about someone, or something.

In general we know that Google Search is a big database of all the webpages that are considered publicly searchable (I’m not going into deep web in this article). Public webpages are websites that googles spider has access to. It is possible to make your website not searchable by telling Google’s search spider that you do not wish for it to crawl and index your website. That being said I think you’ll find that most websites on the internet are intended to be found and as such can be searched using dorks.

(more…)

T-Shirt Design Contest starts 15 Jan! You have a chance to win a Raspberry Pi 3B and $50 NoStarch Press ebook voucher! Visit https://contest.hackmethod.com for all details. Dismiss