This action might not be possible to undo. Are you sure you want to continue?
a few updates by myself. You stay up all night on the PC typing and typing. No, you re not hacking. You re be gging someone on IRC to teach you how to hack! Let s look at the facts: You re a luser and you re annoying. No one likes you if you ask others how to ha ck without taking the least amount of initiative. You re not worthy of any title even resembling hacker, cracker, phreaker, etc. , so don t go around calling yourself that! The more you do, the less likely you a re to find someone willing to teach you how to hack (which is an infinitesimal c hance, any way). You re wasting your time (if you couldn t infer that in the first place). Many r eal hackers (not those shitty script kiddies) spend all their insomniac hours re ading and, yes even, HACKING! (Hacking doesn t necessarily (but usually does) mean breaking into another system. It could mean just working on your own system, BU T NOT WINDOWS 9x (unless you re doing some really menacing registry shit, in which case, you re kind of cool).) You re probably thinking, Then what should I do. If no one s going to help me, how ca n I learn to hack? Have you ever tried READING (I assume this far that you are li terate). Read anything and everything you can get your hands on! I recommend hit ting a computer store and looking for discount books (books that are usually out of date, but so are a lot of the systems on the net, so they re still relevant!). You ll be surprised what you can learn from a book even when you re paying a dollar for every hundred pages. I recommend the following books to start off with: Maximum Security I or II: this is not a guide to hacking, despite what you m ight have heard, but you can get enough info to learn the basics of how hackers hack! (Isn t that more fun than being lamed, email bombed, and kicked off IRC). Practical Unix and Internet Security (Sec. Edition): This is mostly a book a bout how to secure Unix (if you don t know what Unix is, either shoot yourself now , or read O Reilly s Learning the Unix OS), but half of learning to hack is learning a system from the inside out. How can you expect to hack a site (w/o using a ki ddie script, which i must restate, is NOT hacking) if you don t know how to use th e system?! Linux Unleashed/Red Hat Linux Unleashed: these books are kind of cool. First of all, they come with Red Hat Linux (*sigh*, just go to www.linux.org and read everything there) 5.1 and 5.2 respectively (if you get the newest versions of t he book, which you should). Read everything you can from it. Sendmail in a nutshell: This is only after you read everything else. Sendmai l, for those of you who still don t know, is a program that sends mail. It sounds stupid, but this is a buggy program, and usually is the avenue of attack many ha ckers take because of it s vulnerabilities. TCP/IP Blueprints: this will clear up a lot of things concerning TCP/IP. TCP/IP Administration: haven t read it, but can t wait to! (I ve been bogged down by a lot of other REAL computer stuff). Editor s Note: OK, some of these books are out of date now, so I ve striked the ones that are no longer relevent. Hacking Exposed is a good substitute for Maximum Security . After you ve read them all, re-read them! Trust me, you gain a ton of information the second time you read them just as you gain perspicacity the second time thro ugh a movie with a twisted plot. Then, read a ton of RFCs. RFCs are Request for Comments by the people who practi cally shaped the Internet. Here is a good list of RFCs (the books above give abo ut the same list):
it s easy to use. I really wouldn t bother with the RFC s. Odds are. You want the best advice? Don t hack . EV ER expect to get it on the first try just right. try to look up an RFC for it. but don t become a scri pt kiddie. You have now earned my respect. They may be nice enough to offer you a job! That s right. EVER. you will have to do. Oh. mail. you may have noticed that this was not a real guide to hacking. Java is a really cool language to say the least. kay. there are some people who get paid to hack and do what they love. That s it for now. The thing is that Linux people are usually pretty nice. There i s no one way to hack. be a white hat hacker. Now. but not enough to be 3l1t3. which. you should be advanced enough to breeze through Carolyn Meinel s Guide to (mos tly) Harmless Hacking. and are willing to help you out. For example. (If so. Read these books : Teach Yourself C++ in 21 Days: the name says it all Learning Perl: an AMAZING book on learning Perl Programming Perl: the next step after Learning Perl Perl Cookbook: the next step after Programming Perl Core Java (Volume I & II): these books are by the makers of Java. you may be saying I may have been a bit hypocritical by saying not to ask h ow to hack but to ask about installing Linux. If anything else interests you about the Internet. it s a small linux environm ent that you can run inside windows to get the feel of a shell interface. like hacking the white house se curity cameras and get video of Slick Willie getting a BJ. install Linux. I recommend learning C++ first becaus e it will help you understand a lot about programming. now for the big step: the step from lamer to hacker! If you have not alread y. and the people who are Linux gurus want more than anything for Linux to prosper. and MC2. you will get caught. and I ll follow up on it now.. it s pretty fucking hard! NEVER. but you should at least learn C++ before so you can understand classes. leave a note maybe including how to contact you (not through the phones. if you ve installed Linux the way you want it (which does not include throwing you Linux b ox out the window and yelling. Kiddie Scr ipts are auto hacking programs that will do all the work for you. Okay.Editor s Note: Yeah. by the way. I mentioned kiddie scripts earlier. it would be a lot easier for system administrators O . and then it goes down on your criminal record. I do condone downloading them and learning from them. Now. and unless you did something fan-fucking-tastic. if you want to be a real hacker. Read anything you can about Internet security in general (but not stuff like How to Hack (but keep reading this!)). you should know a great deal about hacking. they can come later if you get really seriously into it. You have a compendium of inform ation at your fingertips with a mental index. It s got some interesting stuff. You don t want t hat. If yo u do hack. T hat s because there is no one resource for hacking. The next thing to do is learn programming. Some of my favorites are bugtraq. happy hacker (interesting stuff). Subscribe to mailing lists. you can pretty much k iss your computer future goodbye. do it through a hotmail account or something) or how to fix it . I LIKE THIS JUST FINE! ). Editor s Note: you can install cygwin to start with. cuz quite frankly. In conclusion. By now. real em ail address etc. congratulations. cuz no one will hire a convicted hacker. The only place they go in life is jail (not where you want to be). upon breaking into a site. and is a lot like the other programming languages you should also learn. This was a guide to LEARNING h ow to hack. Now it s okay for you to go online to usenet groups and ask for help installing Linux.
and a C IDE and just play around with all of them. (end of article originally by R4di4tion (email). Yes. W .) OK. And if you look at the comments to this page. You may also want to sign up to the security-basics. If you didn t catch them the first time around. A short atte ntion span is not something prized by hackers. You should also lea rn how to program. No. it s very high volume. messing around with technologies unt il you find something cool. Hackers use their initiative. If you ve read this far I congratulate you. Reading the conversations that take place on those l ists is a gold-mine of hacking information. This hacking tutorial teaches you the basics of how to hack. you can t just call up the admin and say Hey. Please use whatever information you have wisely and responsibly.to keep you out!) It s a variety of different tricks as well as the ability to ke ep up with current vulnerabilities in software and hardware. vuln-dev. If you have to ask. he couldn t even write his own exploits! Tha t s pretty sad. you have my respect. you didn t waste your time. But the hacking skills are the same. where s the password file kept? you have to figure it out on your own. you re probably not the right kin d of person to be a hacker. Check out my Hacking Facebook post and you ll see exac tly what I mean. so that s the article that first got me into hacking. Now you re probably thinking hang on. In many ways . Some of you will want to ask how do I download wireshark or how do I use hping you must understand that answering the question for yourself is half the p oint. it s a n old piece of text. it s not really hacking as such. all I did there was peek into face book s code using firebug. here can I find free ebooks? . and those aren t ever going to change. That s what the essence of hacking is. guys can u crack msn passwords? . a lot. learning how to hack is also learning how to learn. a nd distribute it only to people who are worthy of it. If you re h acking into a website and get stuck. Like. hping. web-application-s ecurity and pen-test lists. here they are again: learn to program learn how the internet works learn how unix/linux works Go download wireshark. you can see the same questions bei ng asked again and again hey pls teach me to hack . Even though Kevin Mitnick was infamous among the hacker cultu re for being the most wanted cracker. I guess around 15 years ago. nmap. I also very definitely agree with R4di4tion s suggestion to subscribe to bugtraq b ut I d suggest signing up a new email account solely for it. you read this fifteen years ago?!?! . and I found some cool stuff.
This action might not be possible to undo. Are you sure you want to continue?