Sunday, May 29, 2016

Week 11 -System hardening


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: Give a brief overview of how to prevent hacktivist activities.

The first thing to mention is that if you ever encounter someone performing activities that you belief to be illegal, simply call the law enforcement authorities. It is their purview to identify illegal activities and enforce the law, so don't entice the attacker to start targeting you.

The best home remedies to help prevent your environment from being attacker, is to implement several of these key network infrastructure components. First install a firewall and maintain it by installing firmware and rule updates. Make sure the firewall has an IDS system with it and that it's rule definitions are also updated constantly. Second, make sure whatever operating system you are using is updated. Third, make sure you are using a well known anti-virus software. And lastly, if you are wanting to be diligent, encrypt your file system with a long passphrase.

It should also be noted, to have at least two users on your devices. One as an administrator with a long passphrase for a password. This administrator account should only be used for desired installations and administrative tasks, otherwise use the user accounts that do not have privileges that can cripple your network environment.


   



Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Tuesday, May 17, 2016

Week 10 -Hacktivist Tools: DDOS


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: Give a simple overview of a hacktivist tool

As odd as it may seem, hacktivist use the same tactics that hackers use. For example, if the hacktivists want to limit the ability of a targets external resources, then they may use DDOS as a method. DDOS is the ability to exhaust that resources ability to provide its service to anyone. The best way to break this down is to imagine Facebook. Everyone is able to create an account and upload pictures and videos to their feed. That uploaded data is stored on servers that Facebooks uses to not only store at rest, but also publish when viewers want to see it. If folks were to write programs and successfully deploy a way to create accounts and upload a ton of data while viewing that data, then they may crash Facebook's background servers. Crashing those servers then hinders the actual legitimate user base from getting on Facebook. Since we are just customers that enjoy the free services that Facebook gets, if their servers are down, then they will not get any revenue from advertisements. Coming full circle, the hacktivist group then just made a successfully attack at Facebook's wallet.      



Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Sunday, May 15, 2016

Week 9 -KALI


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: Discuss a simple overview of Kali Linux.

Kali Linux is a distribution of Linux that contains tons of software that is specifically purposed to aid a hacker or cracker. Kali Linux is a free to download software, and it has several version that can be installed on different devices.

Kali Linux contains a slew of software that can assist an individual in several ways.

Wireless Networks: AirCrack is a software programs that captures data and reverse engineers the password out to break WEP/WPA wireless network security

Websites: The free version of Burp Suite is included with Kali and provides its users an analysis on websites. This helps identify potentional vulnerabilites that require some attention.

Password Attackers: Hydra is a program that applies brute force principles to attack password locked programs and sites. It goes through a attempts ten's of thousands of passwords

Download Kali: tools.kali.org

Check out: http://www.networkworld.com/article/2291215/security/security-139872-top-10-security-tools-in-kali-linux-1-0-6.html#slide4

Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Sunday, May 1, 2016

Week 7 - Anonymous is starting a hacker web training course.


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic:  How do folks learn how to start hacking/hacktivism?

Recently, there was a movement within the hacker community to promote their talents to those who wish to become better hacktivists. In the spirit of learning this also breeds the movement and furthers the range of motivated people around the world.

As it is, the dark web is now hosting different training camps, both live as well as recorded, to instruct the latest in hacking methods. This includes the technical side, as well as the strategic side. The point is to show their audience that there is more than just beating the system with

Now accessing this content requires a relative understanding of the dark web, and located the content. For obvious reasons, this content is moderately difficult to find as this saves the content publishers as well as the receivers.

http://www.scmagazine.com/hacktivist-school-set-up-on-dark-web/article/490950/

Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Saturday, April 23, 2016

Week 6 - What are the repercussions of being a hacktivist?


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: What can happen is someone is caught being a hacktivist?

There are five main categories when it comes to getting caught doing hacker-like activity that can get you in prison. The five categories are mainly stacked up in regards to how much damage you cause to the victim.

Computer Crime 1st degree: If you make more than $10,000 in damages then you can go to prison for up to 20 years and pay up to $15,000 in just fines.

Computer Crime 2nd degree: If you make more than $5,000 in damages then you can go to prison for up to 10 years and pay up to $10,000 in just fines.

Computer Crime 3rd degree: If you make more than $1,000 in damages then you can go to prison for up to 5years and pay up to $5,000 in just fines.

Computer Crime 4th degree: If you make more than $500 in damages then you can go to prison for up to 1 years and pay up to $2,000 in just fines.

Computer Crime 1st degree: If make any damage then you can go to prison for up to 6 months and pay up to $1,000 in just fines.


https://www.cga.ct.gov/2012/rpt/2012-R-0254.htm



Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Saturday, April 16, 2016

Week 5 - Ways Hacktivism is performed globally.


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: Different Types of Hacktivism

Every since the start of oppressive movements, rebellions have formed. Just like the gossip smoke-pits of the 70s have turned into online forums, I feel that this generations rebellious activity is a tad more sophisticated than those from our past that resorted to torching barns! Instead they turn to another plain, and use the internet to conduct their activities. This post will address the several methods we see them use to accomplish their heinous 'crimes.'

1. Hacktivist activities require a method to communicate with the world. Needing a real-world cloak of invisibility to spread their thoughts and ideas or even talk to their fellow, they turn to using anonymous forums. Much like this, but masking who they are ...... obviously im not part of their world, since I have my name on the front page!

2. Hacktivities also tend to spawn from their governments oppressive rules. For instance, the USA does not permit the distribution of copyright files. Using VPNs and other encryption services allow them to hide their file transfers from prying eyes.

3. Standing up servers that preach the good word... Of things deemed illegal is difficult to do when the government has gone through certain lengths to ensure those sites are blocked. I'm not saying that the Dark Web is a good place, but some sites that publish news articles that could paint targets on reports / whistle blowers is something that may be needed form time to time. Using the TOR network allow access to those sites. Since those sites require  a specific top-level domain just to view them, this helps those folks get around certain cyber-fences.



Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Sunday, April 10, 2016

Week 4 - Is hacktivism a good thing?


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: Do I think that hacktivism is a good thing?

"Beauty is in the eye of the beholder" is a great way to assess today's question. Hacktivism is bad, due to the means in which the movement is carried out. By definition, the hacktivist is vying to overcome a system that they are not permitted to access. The way in which they gain access itself is typically considered illegal. Then the actions they perform afterwards is also usually highly illegal. For instance, corrupting file systems and destroying intellectual or private property is the next level of virtual vandalism. Or in another example, stealing information and then distributing it regardless of its classification is also bad. But the question is whether or not this is a good thing.

This boils down to the intention of the hooded figure behind the screen and the opinion of the target audience. From the perspective of the victim, their secrets or information was just improperly disclosed. Perhaps they were trying to fix a problem or cover up a mistake. To them, it was solely their right to handle their information, not the hacktivist's. However, the target audience may have wanted this information to prove someone else's innocence. Perhaps to see the true colors of a political candidate .For them, this information is something that should have been public because it assists their goals.



Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Saturday, April 2, 2016

Week 3 - Target Selection?


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: How do hacktivists choose their target? When they choose a target what is the typical information targeted?  

All hacktivists are out there wanting to accomplish something that hits them personally. They are not your mercenaries that are contracted to perform tasks and activities. They are out there doing something themselves in response to something they are against. How do they choose their targets? They look for what offends them, and focus on knocking them off of the playing field. Lately, it seems that most of the media centered attacks are honed in on political scandals, freedom from oppression, and freedom of information. In most cases, these guys and gals are trying to help investigate those that were put into a position of power over the masses that resorted to greed instead of helping others.

This then focuses on the type of information they are after. When all is said and done, they alter or publish the information that they can get their hands on. For instance, the last couple FBI/CIA directors have had their personal emails, addresses, calendars dumped on the internet because that is the information that the hacktivist could get their hands on. I am sure that they would have dumped other vital information if it would help with the success of their vision. Other instances focus on official documentation that proves someone is guilty or lying on a court stand. For instance, when Edward Snowden provided documentation that several high officials in the intelligence community lied. This information helped him prove his point that the government was not doing what he wanted. While he was a whistle-blower, he was a hacktivist in his own right. He had the credentials to perform several insider hacking tricks to steal information and disclose it to those who did not have a need to know.



Articles to check out:




Future Items of Interest:
-Is hacktivism a good thing?
-Is hacktivism legal?
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Saturday, March 26, 2016

Week 2 - What are the notable hacktivist groups?


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: Identify some of the more notable groups out there in the media, set them as the standard class of hacktivists.

 The very first and most popular hacktivist is undoubtedly MAFIABOY a.k.a. Michael Cacle. Michael has been deemed the inventor of denial of service attacks and was credited/arrested for the take down of massive websites like Amazon, Yahoo, Dell, etc all while he was just 15 years old! While he wasn't out to make money or publish a political scandal, he did break the law and teach our hacktivists today how to wreak havoc!

Anonymous is a very popular group and has a very unique view. They oppose governments, organizations, and public figures that neglect human rights for all sorts of reasons. They believe that they represent all people and wear their masks to not only hide their identity, but to tell everyone who is watching that Anonymous is everywhere and anyone. They mean that on the creepy level as well as extending the invite to everyone. This group is not a strict college Greek organization, but one that extends to all people. Check out the wiki below for more demonstrations and "protests."

Final Note
It is important to note, that there is a certain level of admiration for all of their work. In several parts of the world, we were raised with stories that the government was out to get us and we are very lucky to have those who stand up and fight them. However, that doesn't mean that these groups weren't breaking the law. Illegally accessing government websites gives them access to steal information and sell it. It gives them the unhindered power to alter government websites and databases.




Articles to check out:
https://en.wikipedia.org/wiki/Anonymous_%28group%29#Million_Mask_March

http://www.npr.org/sections/alltechconsidered/2015/02/07/384567322/meet-mafiaboy-the-bratty-kid-who-took-down-the-internet





Future Items of Interest:
-Is hacktivism a good thing?
-Is hacktivism legal?
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?
-How do hacktivists choose their target? When they choose a target what is the typical information targeted?  

Wednesday, March 16, 2016

Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice. 

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: How/why is there a difference between bad hackers and hacktivist?

To me this goes back to the old stories about Robin Hood. Look at Robin's motive. Steal from the rich and give to the needy. His motive wasn't to make tons of money for himself. He had a mission remained outside the scope of personal profit and greed. Hacktivists are cut from this cloth. Sometimes their actions are spread around the world in the news and social media. Sometimes their success is not popular and even goes unnoticed. Bad hackers, or blacks hats are the opposite. They focus on their "number one." They are in it for the money, and we have all felt their activities.

We have heard and felt the touch of black hat hackers. Those of us who bank with USAA get a new debit card every once in a while. Everyone that shopped at Target a couples years ago and got their PINs stolen, that too was by a black hat. Black hats are the greedy ones that are in it for personal gain. Their motives seem to be easy to identify. They gain profit directly by stealing assets, or indirectly by garnering money by hackers another. They can sell stolen information on the web with no care.

Hacktivists have been seen around the world fighting ISIS by various means. We have seen them provide details on corrupt government officials when two tourists were illegally accused and sentenced to death. One of the more recent ones covers the the Flint water crisis. While these acts don't give money to the poor they uncover those "dirty little secrets." However, just like Robin Hood these folks are still breaking the law. The difference between their actions and the actions of black hats is that they don't seek a personal gain, they break the law to carry out their personal view of justice.


Articles to check out:
http://www.ibtimes.com/anonymous-thailand-hacks-justice-websites-over-koh-tao-murder-verdict-declares-2261698

http://www.ibtimes.com/anonymous-thailand-hacks-justice-websites-over-koh-tao-murder-verdict-declares-2261698



Future Items of Interest:
-Notable hacktivist people/groups?
-Is hacktivism a good thing?
-Is hacktivism legal?
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?
-How do hacktivists choose their target? When they choose a target what is the typical information targeted?