“ The Only True Guide to Learning How to Hack ”
originally by R4di4tion (his email, but it’s no longer in use), with a few updates by myself.You stay up all night on the PC typing and typing. No, you’re not hacking. You’re begging someone on IRC to teach you how to hack! Let’s look at the facts:
- You’re a luser and you’re annoying. No one likes you if you ask others how to hack without taking the least amount of initiative.
- You’re not worthy of any title even resembling hacker, cracker, phreaker, etc., so don’t go around calling yourself that! The more you do, the less likely you are to find someone willing to teach you how to hack (which is an infinitesimal chance, any way).
- You’re wasting your time (if you couldn’t infer that in the first place). Many real hackers (not those shitty script kiddies) spend all their insomniac hours reading and, yes even, HACKING! (Hacking doesn’t necessarily (but usually does) mean breaking into another system. It could mean just working on your own system, BUT NOT WINDOWS ’9x (unless you’re doing some really menacing registry shit, in which case, you’re kind of cool).)
- Maximum Security I or II: this is not a guide to hacking, despite what you might have heard, but you can get enough info to learn the basics of how hackers hack! (Isn’t that more fun than being lamed, email bombed, and kicked off IRC).
- Practical Unix and Internet Security (Sec. Edition): This is mostly a book about how to secure Unix (if you don’t know what Unix is, either shoot yourself now, or read O’Reilly’s Learning the Unix OS), but half of learning to hack is learning a system from the inside out. How can you expect to hack a site (w/o using a kiddie script, which i must restate, is NOT hacking) if you don’t know how to use the system?!
- Linux Unleashed/Red Hat Linux Unleashed: these books are kind of cool. First of all, they come with Red Hat Linux (*sigh*, just go to www.linux.org and read everything there) 5.1 and 5.2 respectively (if you get the newest versions of the book, which you should). Read everything you can from it.
- Sendmail in a nutshell: This is only after you read everything else. Sendmail, for those of you who still don’t know, is a program that sends mail. It sounds stupid, but this is a buggy program, and usually is the avenue of attack many hackers take because of it’s vulnerabilities.
- TCP/IP Blueprints: this will clear up a lot of things concerning TCP/IP.
- TCP/IP Administration: haven’t read it, but can’t wait to! (I’ve been bogged down by a lot of other REAL computer stuff).
No comments:
Post a Comment