The Anti-Hacking Handbook

Jared Blumer (he/him)
Software Engineer and Data Analyst
linkedin.com/in/jaredblumer/

Crimes of Opportunity

"You might think hackers selectively pick each business they hack. While this may be true in high profile or hacktivism cases, I estimate 90% of hacking is done based on a system’s general lack of security."

 

"Hackers don’t think, 'Today I’m going to hack Acme Hardware across the street.' They scan for the most vulnerable system and start digging."

—Steve Snelgrove, Security Analyst, CISSP

Social Engineering

Social engineering is a technique used by criminals to trick individuals and organizations into revealing confidential information.

 

A social engineer is a modern term for a con artist or confidence man, "a person who tricks other people in order to get their money."

Source: “Con artist.” Merriam-Webster.com Dictionary

Phishing

The most vulnerable point of any system is the individual

Understanding how hackers and social engineers operate is the greatest defense against attacks.

Brute forcing

Password length and character type

never use one key for the kingdom

use unique passwords

password managers

Bitwarden

Free and Open Source

"Free as in Freedom"
https://bitwarden.com/

The Anti-Hacking Handbook

By Shy (they/them)

The Anti-Hacking Handbook

  • 12