Sunday, May 29, 2016

Week 11 -System hardening


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: Give a brief overview of how to prevent hacktivist activities.

The first thing to mention is that if you ever encounter someone performing activities that you belief to be illegal, simply call the law enforcement authorities. It is their purview to identify illegal activities and enforce the law, so don't entice the attacker to start targeting you.

The best home remedies to help prevent your environment from being attacker, is to implement several of these key network infrastructure components. First install a firewall and maintain it by installing firmware and rule updates. Make sure the firewall has an IDS system with it and that it's rule definitions are also updated constantly. Second, make sure whatever operating system you are using is updated. Third, make sure you are using a well known anti-virus software. And lastly, if you are wanting to be diligent, encrypt your file system with a long passphrase.

It should also be noted, to have at least two users on your devices. One as an administrator with a long passphrase for a password. This administrator account should only be used for desired installations and administrative tasks, otherwise use the user accounts that do not have privileges that can cripple your network environment.


   



Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Tuesday, May 17, 2016

Week 10 -Hacktivist Tools: DDOS


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: Give a simple overview of a hacktivist tool

As odd as it may seem, hacktivist use the same tactics that hackers use. For example, if the hacktivists want to limit the ability of a targets external resources, then they may use DDOS as a method. DDOS is the ability to exhaust that resources ability to provide its service to anyone. The best way to break this down is to imagine Facebook. Everyone is able to create an account and upload pictures and videos to their feed. That uploaded data is stored on servers that Facebooks uses to not only store at rest, but also publish when viewers want to see it. If folks were to write programs and successfully deploy a way to create accounts and upload a ton of data while viewing that data, then they may crash Facebook's background servers. Crashing those servers then hinders the actual legitimate user base from getting on Facebook. Since we are just customers that enjoy the free services that Facebook gets, if their servers are down, then they will not get any revenue from advertisements. Coming full circle, the hacktivist group then just made a successfully attack at Facebook's wallet.      



Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Sunday, May 15, 2016

Week 9 -KALI


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic: Discuss a simple overview of Kali Linux.

Kali Linux is a distribution of Linux that contains tons of software that is specifically purposed to aid a hacker or cracker. Kali Linux is a free to download software, and it has several version that can be installed on different devices.

Kali Linux contains a slew of software that can assist an individual in several ways.

Wireless Networks: AirCrack is a software programs that captures data and reverse engineers the password out to break WEP/WPA wireless network security

Websites: The free version of Burp Suite is included with Kali and provides its users an analysis on websites. This helps identify potentional vulnerabilites that require some attention.

Password Attackers: Hydra is a program that applies brute force principles to attack password locked programs and sites. It goes through a attempts ten's of thousands of passwords

Download Kali: tools.kali.org

Check out: http://www.networkworld.com/article/2291215/security/security-139872-top-10-security-tools-in-kali-linux-1-0-6.html#slide4

Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?

Sunday, May 1, 2016

Week 7 - Anonymous is starting a hacker web training course.


 Hacktivism:  a label associated with movement of people that use their hacking/cracking know-how to carry out their personal view of justice.

Purpose: The purpose of this blog is to identify who fits within the hacktivist label, and how do they affect professional/personal internet interactions?

Today's Topic:  How do folks learn how to start hacking/hacktivism?

Recently, there was a movement within the hacker community to promote their talents to those who wish to become better hacktivists. In the spirit of learning this also breeds the movement and furthers the range of motivated people around the world.

As it is, the dark web is now hosting different training camps, both live as well as recorded, to instruct the latest in hacking methods. This includes the technical side, as well as the strategic side. The point is to show their audience that there is more than just beating the system with

Now accessing this content requires a relative understanding of the dark web, and located the content. For obvious reasons, this content is moderately difficult to find as this saves the content publishers as well as the receivers.

http://www.scmagazine.com/hacktivist-school-set-up-on-dark-web/article/490950/

Future Items of Interest:
-What are the repercussions of being a hacktivist?
-What seem to be the most common exploits or attacks hackers and hacktivists use?