Header Banner
Null Byte Logo
Null Byte
wonderhowto.mark.png
Cyber Weapons Lab Forum Metasploit Basics Facebook Hacks Password Cracking Top Wi-Fi Adapters Wi-Fi Hacking Linux Basics Mr. Robot Hacks Hack Like a Pro Forensics Recon Social Engineering Networking Basics Antivirus Evasion Spy Tactics MitM Advice from a Hacker

How to Protect Yourself Against Black Hats! [DEFENSE SERIES PART 1]

Jul 17, 2014 09:52 PM
Jul 17, 2014 09:56 PM
Globe surrounded by computer code, symbolizing technology and global connectivity.

Hi! Let me get started on this subject as it is a very "touchy" subject. We all want to "hack" these days, and that's logical. Te be real honest here, i was inspired once by the words someone from the Null byte community said. In the (near) future, wars will be ended by computers and not a nuclear missile. That's something i really do believe in. But let us take a defensive measure instead of the offensive one. Sure, Full frontal bryte forcing is an option, but when it'll come that far we'll need a good and strong "fort." In this case, a good security. Good offense is good defense, right? So let us look at the protective measures we can take, instead of cracking a wireless network let's protect one from it. Instead of using a MITM(Man In The Middle) attack, let's stop one. And if all that fails, well, we'll always have that nuclear missile anyway! :-)

Types of Protection

There are a few forms of protection worth looking at. These all contribute to the whole "defense" of a computer. I'll be focusing on Linux protection, Because who uses windows these days, right?*1

-Anti Malware,

A whimsical illustration of a computer infested with cartoonish monsters and creatures.

Malware is essentially harmful software. You should see malware as all the harmful software out there. Including, Trojans, viruses and yes, Your own metasploit created exploit is one too.

-Firewalls,

Firewall icon with flame and brick wall elements.

Everybody probably knows what a firewall is, but did you know that there are different types of firewalls? No?, Read the rest of this guide. Yes?, Well... read the rest anyway!

-Encryption

Digital lock symbol on a matrix background.

We once had the NSA spying on us and we don't want that to happen again, right? So that's why we need encryption. We're going to "dive" into the web encryption that we need to ensure that our "surfing" is unknown for everybody but yourself! Also i will be talking about file encryption and decryption of course.

Intrucion detection systems,

Network architecture diagram illustrating secure remote access and VPN connections.

What if someone wants to break into my house and i dont want that? I install an alarm. Thats exactly what we'll be doing here. We're going to look at protection against attacks.

-rootkit Detectors

Magnifying glass highlighting the word "rootkit" among binary code.

Rootkits are nasty bits of software, installed on your computer and are hard to remove without damaging your system. So, were going to look at some detectors to avoid these!

-Proxy's

Diagram illustrating a VPN connection with blocked websites and accessible platforms.

This simply function as a shield, no one will know what you're doing on the world wide web. In the upcoming series i will briefly discuss proxy's.

The Series

I'll make a different "how-to" for every one of these subjects and try to explain them to you. Its not hard to protect yourself, but you got to take some time out of your schedule to do it. As everything in the hacking scene! Of course there will always be questions but i'm eager to answer those! Just remember to take your time!

Final Conclusion

some of you may think that defense is useless and just "A waste of time." Well i'm here to tell you, it's not. You need a good base of operations to coordinate those attacks. And what if you get attacked? you want to have some decent army man standing at your gate shooting at everything that moves! So stick around for the next tutorial, and you'll see how its done. Please comment if you feel like you want to share something!

Keep learning and stay focussed!

*1: If anyone IS actually interested in some Windows Tutorials, send me a private message and i might consider doing some!

Th3skYf0x

Arctic fox with white fur and dark eyes.

You already know how to use your phone. With Gadget Hacks' newsletter, we'll show you how to master it. Each week, we explore features, hidden tools, and advanced settings that give you more control over iOS and Android than most users even know exists.

Sign up for Gadget Hacks Weekly and start unlocking your phone's full potential.

Related Articles

Comments

No Comments Exist

Be the first, drop a comment!