Sunday, May 29, 2016

Week 11 -System hardening


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: Give a brief overview of how to prevent hacktivist activities.

The first thing to mention is that if you ever encounter someone performing activities that you belief to be illegal, simply call the law enforcement authorities. It is their purview to identify illegal activities and enforce the law, so don't entice the attacker to start targeting you.

The best home remedies to help prevent your environment from being attacker, is to implement several of these key network infrastructure components. First install a firewall and maintain it by installing firmware and rule updates. Make sure the firewall has an IDS system with it and that it's rule definitions are also updated constantly. Second, make sure whatever operating system you are using is updated. Third, make sure you are using a well known anti-virus software. And lastly, if you are wanting to be diligent, encrypt your file system with a long passphrase.

It should also be noted, to have at least two users on your devices. One as an administrator with a long passphrase for a password. This administrator account should only be used for desired installations and administrative tasks, otherwise use the user accounts that do not have privileges that can cripple your network environment.


   



Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Tuesday, May 17, 2016

Week 10 -Hacktivist Tools: DDOS


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: Give a simple overview of a hacktivist tool

As odd as it may seem, hacktivist use the same tactics that hackers use. For example, if the hacktivists want to limit the ability of a targets external resources, then they may use DDOS as a method. DDOS is the ability to exhaust that resources ability to provide its service to anyone. The best way to break this down is to imagine Facebook. Everyone is able to create an account and upload pictures and videos to their feed. That uploaded data is stored on servers that Facebooks uses to not only store at rest, but also publish when viewers want to see it. If folks were to write programs and successfully deploy a way to create accounts and upload a ton of data while viewing that data, then they may crash Facebook's background servers. Crashing those servers then hinders the actual legitimate user base from getting on Facebook. Since we are just customers that enjoy the free services that Facebook gets, if their servers are down, then they will not get any revenue from advertisements. Coming full circle, the hacktivist group then just made a successfully attack at Facebook's wallet.      



Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Sunday, May 15, 2016

Week 9 -KALI


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: Discuss a simple overview of Kali Linux.

Kali Linux is a distribution of Linux that contains tons of software that is specifically purposed to aid a hacker or cracker. Kali Linux is a free to download software, and it has several version that can be installed on different devices.

Kali Linux contains a slew of software that can assist an individual in several ways.

Wireless Networks: AirCrack is a software programs that captures data and reverse engineers the password out to break WEP/WPA wireless network security

Websites: The free version of Burp Suite is included with Kali and provides its users an analysis on websites. This helps identify potentional vulnerabilites that require some attention.

Password Attackers: Hydra is a program that applies brute force principles to attack password locked programs and sites. It goes through a attempts ten's of thousands of passwords

Download Kali: tools.kali.org

Check out: http://www.networkworld.com/article/2291215/security/security-139872-top-10-security-tools-in-kali-linux-1-0-6.html#slide4

Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Sunday, May 1, 2016

Week 7 - Anonymous is starting a hacker web training course.


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic:  How do folks learn how to start hacking/hacktivism?

Recently, there was a movement within the hacker community to promote their talents to those who wish to become better hacktivists. In the spirit of learning this also breeds the movement and furthers the range of motivated people around the world.

As it is, the dark web is now hosting different training camps, both live as well as recorded, to instruct the latest in hacking methods. This includes the technical side, as well as the strategic side. The point is to show their audience that there is more than just beating the system with

Now accessing this content requires a relative understanding of the dark web, and located the content. For obvious reasons, this content is moderately difficult to find as this saves the content publishers as well as the receivers.

http://www.scmagazine.com/hacktivist-school-set-up-on-dark-web/article/490950/

Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Saturday, April 23, 2016

Week 6 - What are the repercussions of being a hacktivist?


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: What can happen is someone is caught being a hacktivist?

There are five main categories when it comes to getting caught doing hacker-like activity that can get you in prison. The five categories are mainly stacked up in regards to how much damage you cause to the victim.

Computer Crime 1st degree: If you make more than $10,000 in damages then you can go to prison for up to 20 years and pay up to $15,000 in just fines.

Computer Crime 2nd degree: If you make more than $5,000 in damages then you can go to prison for up to 10 years and pay up to $10,000 in just fines.

Computer Crime 3rd degree: If you make more than $1,000 in damages then you can go to prison for up to 5years and pay up to $5,000 in just fines.

Computer Crime 4th degree: If you make more than $500 in damages then you can go to prison for up to 1 years and pay up to $2,000 in just fines.

Computer Crime 1st degree: If make any damage then you can go to prison for up to 6 months and pay up to $1,000 in just fines.


https://www.cga.ct.gov/2012/rpt/2012-R-0254.htm



Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Saturday, April 16, 2016

Week 5 - Ways Hacktivism is performed globally.


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: Different Types of Hacktivism

Every since the start of oppressive movements, rebellions have formed. Just like the gossip smoke-pits of the 70s have turned into online forums, I feel that this generations rebellious activity is a tad more sophisticated than those from our past that resorted to torching barns! Instead they turn to another plain, and use the internet to conduct their activities. This post will address the several methods we see them use to accomplish their heinous 'crimes.'

1. Hacktivist activities require a method to communicate with the world. Needing a real-world cloak of invisibility to spread their thoughts and ideas or even talk to their fellow, they turn to using anonymous forums. Much like this, but masking who they are ...... obviously im not part of their world, since I have my name on the front page!

2. Hacktivities also tend to spawn from their governments oppressive rules. For instance, the USA does not permit the distribution of copyright files. Using VPNs and other encryption services allow them to hide their file transfers from prying eyes.

3. Standing up servers that preach the good word... Of things deemed illegal is difficult to do when the government has gone through certain lengths to ensure those sites are blocked. I'm not saying that the Dark Web is a good place, but some sites that publish news articles that could paint targets on reports / whistle blowers is something that may be needed form time to time. Using the TOR network allow access to those sites. Since those sites require  a specific top-level domain just to view them, this helps those folks get around certain cyber-fences.



Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Sunday, April 10, 2016

Week 4 - Is hacktivism a good thing?


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: Do I think that hacktivism is a good thing?

"Beauty is in the eye of the beholder" is a great way to assess today's question. Hacktivism is bad, due to the means in which the movement is carried out. By definition, the hacktivist is vying to overcome a system that they are not permitted to access. The way in which they gain access itself is typically considered illegal. Then the actions they perform afterwards is also usually highly illegal. For instance, corrupting file systems and destroying intellectual or private property is the next level of virtual vandalism. Or in another example, stealing information and then distributing it regardless of its classification is also bad. But the question is whether or not this is a good thing.

This boils down to the intention of the hooded figure behind the screen and the opinion of the target audience. From the perspective of the victim, their secrets or information was just improperly disclosed. Perhaps they were trying to fix a problem or cover up a mistake. To them, it was solely their right to handle their information, not the hacktivist's. However, the target audience may have wanted this information to prove someone else's innocence. Perhaps to see the true colors of a political candidate .For them, this information is something that should have been public because it assists their goals.



Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?