How To: Protect Yourself Against Black Hats! [DEFENSE SERIES PART 1]

Protect Yourself Against Black Hats! [DEFENSE SERIES PART 1]

How to Protect Yourself Against Black Hats! [DEFENSE SERIES PART 1]

Hi! Let me get started on this subject as it is a very "touchy" subject. We all want to "hack" these days, and that's logical. Te be real honest here, i was inspired once by the words someone from the Null byte community said. In the (near) future, wars will be ended by computers and not a nuclear missile. That's something i really do believe in. But let us take a defensive measure instead of the offensive one. Sure, Full frontal bryte forcing is an option, but when it'll come that far we'll need a good and strong "fort." In this case, a good security. Good offense is good defense, right? So let us look at the protective measures we can take, instead of cracking a wireless network let's protect one from it. Instead of using a MITM(Man In The Middle) attack, let's stop one. And if all that fails, well, we'll always have that nuclear missile anyway! :-)

Types of Protection

There are a few forms of protection worth looking at. These all contribute to the whole "defense" of a computer. I'll be focusing on Linux protection, Because who uses windows these days, right?*1

-Anti Malware,

Malware is essentially harmful software. You should see malware as all the harmful software out there. Including, Trojans, viruses and yes, Your own metasploit created exploit is one too.


Everybody probably knows what a firewall is, but did you know that there are different types of firewalls? No?, Read the rest of this guide. Yes?, Well... read the rest anyway!


We once had the NSA spying on us and we don't want that to happen again, right? So that's why we need encryption. We're going to "dive" into the web encryption that we need to ensure that our "surfing" is unknown for everybody but yourself! Also i will be talking about file encryption and decryption of course.

Intrucion detection systems,

What if someone wants to break into my house and i dont want that? I install an alarm. Thats exactly what we'll be doing here. We're going to look at protection against attacks.

-rootkit Detectors

Rootkits are nasty bits of software, installed on your computer and are hard to remove without damaging your system. So, were going to look at some detectors to avoid these!


This simply function as a shield, no one will know what you're doing on the world wide web. In the upcoming series i will briefly discuss proxy's.

The Series

I'll make a different "how-to" for every one of these subjects and try to explain them to you. Its not hard to protect yourself, but you got to take some time out of your schedule to do it. As everything in the hacking scene! Of course there will always be questions but i'm eager to answer those! Just remember to take your time!

Final Conclusion

some of you may think that defense is useless and just "A waste of time." Well i'm here to tell you, it's not. You need a good base of operations to coordinate those attacks. And what if you get attacked? you want to have some decent army man standing at your gate shooting at everything that moves! So stick around for the next tutorial, and you'll see how its done. Please comment if you feel like you want to share something!

Keep learning and stay focussed!

*1: If anyone IS actually interested in some Windows Tutorials, send me a private message and i might consider doing some!



In my own opinion, I think it is easier to attack than to defend because no matter how we think we are secured- an attacker can still find a way to infiltrate our computer system, so I think Cyber Security Specialist should be able to track down attackers especially the black hat attackers and attack them back instead of just defending, since it is easier to attack than to defend. Just saying tho…

Share Your Thoughts

  • Hot
  • Latest