Project | Inception
Project | Inception
Use a proxy or VPN on this site
So, you wanna be a hacker? Are you sure. It’s tough to be a hacker. And football players get all the attention. Really? Read on.
Hackers come and go, but a great hack is forever.
Public goods belong to the public.*
Software hoarding is evil. Software does the greatest good given to the greatest number.Don’t be evil.
Sourceless software sucks.
People have rights. Organizations live on sufferance. Governments are organizations.
If it is wrong when citizens do it, it is wrong when governments do it.
Information wants to be free. Information deserves to be free.
Being legal doesn’t make it right.
Being illegal doesn’t make it wrong.
Subverting tyranny is the highest duty.
Trust your technolust!
* Definition: A good is public if the marginal production cost is lower than the marginal billing cost.
The Five Principles of the Hacker Mindset
Researcher Dan Guido reverse-engineered all the major malware toolkits used for mass exploitation (such as Zeus, SpyEye, Clampi, and others). His findings about the sources of exploits, as reported through the Exploit Intelligence Project, are compelling:
The so-called whitehats of the world have been playing a role in distributing digital arms.
- None of the exploits used for mass exploitation were developed by malware authors.
- Instead, all of the exploits came from “Advanced Persistent Threats” (an industry term for nation states) or from whitehat disclosures.
- Whitehat disclosures accounted for 100 percent of the logic flaws used for exploitation.
Criminals actually “prefer whitehat code,” according to Guido, because it works far more reliably than code provided from underground sources. Many malware authors actually lack the sophistication to alter even existing exploits to increase their effectiveness.
Navigating the Gray
A few farsighted hackers of the EFnet-based computer underground saw this morally conflicted security quagmire coming 14 years ago. Uninterested in acquiring personal wealth, they gave birth to the computational ethics movement known as Anti Security or “antisec.”
Antisec hackers focused on exploit development as an intellectual, almost spiritual discipline. Antisec wasn’t — isn’t — a “group” so much as a philosophy with a single core position:
An exploit is a powerful weapon that should only be disclosed to an individual whom you know (through personal experience) will act in the interest of social justice.
After all, dropping an exploit to unethical entities makes you a party to their crimes: It’s no different than giving a rifle to a man you know is going to shoot someone. (continued here)
- Download VM Player.
- Down iso image of operating system. Downloading is the longest thing in this exercise.
- Now just do this, or if you want to try and experiment with other ways to use Windows and Linux just read this.
- Moving data back and forth between your new virtual disk and your old real disk.
Get Tor to hide your IP address when on internet. Block Ads using Ad-block plugin when surfing the internet (like 14.95 million other users) and use Mafiafire to get to elusive websites. Get a Bit Torrent Client. This will help you download stuff.
hacker culture alert - This instruction is purely for sharing the culture but not the techie work of being a hacker. The website Pirate Bay acts like a search engine for Bit torrents. Visiting it is considered bad since you can get lots of music, videos, movies etc for free, without paying copyright fees.
Many thanks to the following for their generous contributions: [redacted for security reasons - you know who you are <3] and many many others.
Before messing with this stuff, read and implement Security measures
- Hack into your Friend’s Computer
- Google 101 Tips Tricks and Hacks
- The Hacker’s Underground Handbook - read online - download
- Hacking For Beginners – A Beginners Guide for Learning Ethical Hacking
- The Basics of Hacking and Penetration Testing
- Hack The Stack – Using Snort And Ethereal [WireShark] To Master The 8 Layers Of An Insecure Network
- Hacking for Dummies 3rd Edition
- The Art of Intrusion
- 100s of hacking links and tutorials
- 200 hack tutorials
history & philosophy
- Abstract Hactivism
- Underground - read online - download - film trailer
- Cyber Battles as Civil Disobedience
- Essays on conspiracies – Julian Assange
Private Search Engine https://ixquick.com/
Governments/business web sites
Background checks and other personal information
Profile information websites
- People finder
- Little Sis - tracking corporate human networks
- NNDB Mapper - mapping the entire world
Note: any of these sites could be logging your ip address so just keep that in mind
- vxchaos and vxchaos
- BlackHat Academy
- Anon Central - alot is mirrored here
General - tools, tutorials, epic: insecure.in
Security distros / sites
DOS via SMS Texting —> Carriers number to Email list:
- http://m.websmsonline.com/index.php http://pumpsms.com/index.php
Fake Mailer http://emkei.cz/
- Slowloris: http://pastebin.com/0Xgu9aE2
- Pyloris2: http://pastebin.com/NYYQYrrV
- R.U.D.Y: http://hybridsec.com/resource.html
- OWASP HTTP Tool: https://www.owasp.org/index.php/OWASP_HTTP_Post_Tool
- LOIC – Make sure you are using a VPN properly (NOT TOR!!) and spoofing your MAC address http://sourceforge.net/projects/loic/
- HOIC - http://www.mediafire.com/?t1kejryfrtc8sqs
- HOIC Booster Pack http://pastebin.com/K13k40hC
- More Booster info http://pastebin.com/5ZCcJ71u
- SQLI defacement - defacement for lazy people mirror
- SQLI tutorial less entertaining but more detailed, includes list of dorks
- Admin page finder
- Dorks 5,000 of them supposedly
- SQL Injection Cheat Sheet
- Havij download
For other good tutorials visit #Tutorials on irc.anonops.li, or #school4lulz on irc.lulzco.org - you will need an IRC client like HexChat – download links & info on the /OpSEC page
Online Admin Page Finder
Online MD5 Hash Cracker
Virus Online scanner
IRC Chat Networks: (For online help) FreeNode (irc.freenode.com SSL: 6697) – You’ll find anything here
IP/Domain Information Gathering
Online Port scanning:
If you want to be most effective, you need to learn some coding :) Every hacker you ask will have a slightly different take, but this is a good summary of what to learn and why.
This, of course, is the fundamental hacking skill. If you don’t know any computer languages, I recommend starting with Python. It is cleanly designed, well documented, and relatively kind to beginners. Despite being a good first language, it is not just a toy; it is very powerful and flexible and well suited for large projects. I have written a more detailed evaluation of Python. Good tutorials are available at the Python web site. I used to recommend Java as a good language to learn early, but this critique has changed my mind (search for “The Pitfalls of Java as a First Programming Language” within it). A hacker cannot, as they devastatingly put it “approach problem-solving like a plumber in a hardware store”; you have to know what the components actually do. Now I think it is probably best to learn C and Lisp first, then Java. There is perhaps a more general point here. If a language does too much for you, it may be simultaneously a good tool for production and a bad one for learning. It’s not only languages that have this problem; web application frameworks like RubyOnRails, CakePHP, Django may make it too easy to reach a superficial sort of understanding that will leave you without resources when you have to tackle a hard problem, or even just debug the solution to an easy one. If you get into serious programming, you will have to learn C, the core language of Unix. C++ is very closely related to C; if you know one, learning the other will not be difficult. Neither language is a good one to try learning as your first, however. And, actually, the more you can avoid programming in C the more productive you will be. C is very efficient, and very sparing of your machine’s resources. Unfortunately, C gets that efficiency by requiring you to do a lot of low-level management of resources (like memory) by hand. All that low-level code is complex and bug-prone, and will soak up huge amounts of your time on debugging. With today’s machines as powerful as they are, this is usually a bad tradeoff — it’s smarter to use a language that uses the machine’s time less efficiently, but your time much more efficiently. Thus, Python. Other languages of particular importance to hackers include Perl and LISP. Perl is worth learning for practical reasons; it’s very widely used for active web pages and system administration, so that even if you never write Perl you should learn to read it. Many people use Perl in the way I suggest you should use Python, to avoid C programming on jobs that don’t require C’s machine efficiency. You will need to be able to understand their code. LISP is worth learning for a different reason — the profound enlightenment experience you will have when you finally get it. That experience will make you a better programmer for the rest of your days, even if you never actually use LISP itself a lot. (You can get some beginning experience with LISP fairly easily by writing and modifying editing modes for the Emacs text editor, or Script-Fu plugins for the GIMP.) It’s best, actually, to learn all five of Python, C/C++, Java, Perl, and LISP. Besides being the most important hacking languages, they represent very different approaches to programming, and each will educate you in valuable ways. But be aware that you won’t reach the skill level of a hacker or even merely a programmer simply by accumulating languages — you need to learn how to think about programming problems in a general way, independent of any one language. To be a real hacker, you need to get to the point where you can learn a new language in days by relating what’s in the manual to what you already know. This means you should learn several very different languages.
Programming – General
Great source for programming ebooks, thank you!
English: http://www.java2s.com/ http://www.codeproject.com http://www.pickatutorial.com/ http://www.daniweb.com/ http://www.bigresource.com https://developer.mozilla.org/en-US/docs http://codepad.org http://www.supportforums.net/ http://mpgh.net/ http://www.enigmagroup.org/ http://www.thenewboston.com http://www.codeguru.com/ http://www.a1vbcode.com/ http://www.vbtutor.net/ http://forum.codecall.net/ http://www.freelancecode.net/community/ http://www.net-force.nl/challenges/ http://www.web-source.net/ http://www.w3schools.com/ http://www.dreamincode.net http://en.wikipedia.org/wiki/Regular_expression http://www.programmingforums.org http://stackoverflow.com/ http://www.opensc.ws/ http://www.programmersheaven.com/ http://www.planet-source-code.com/ http://www.devguru.com/ http://www.net-force.nl/challenges/ http://zetcode.com/ http://msdn.microsoft.com/ http://www.developerfusion.com/ http://www.sitepoint.com/ http://www.developers.net/ http://www.arachnoid.com/ http://codepad.org/ http://www.quackit.com/
Python: http://www.learnpython.org/ http://www.pythonware.com/library/tkinter/introduction/ http://www.jchr.be/python/tkinter.htm http://www.sthurlow.com/python/ http://pythonfacile.free.fr/python/ressources.html http://www.learningpython.com http://www.stackless.com/ http://zetcode.com/ http://showmedo.com/videos/python http://www.youtube.com/results?search_query=googletechtalks+python http://www.awaretek.com/tutorials.html http://www.effbot.org/zone/ http://planet.python.org http://www.tutorialspoint.com/python/ http://www.java2s.com/Code/Python/CatalogPython.htm http://www.rosettacode.org/wiki/Category:Python http://code.activestate.com/recipes/langs/python/ http://www.siafoo.net/article/52 http://docs.python.org/dev/howto/doanddont.html http://gnosis.cx/publish/tech_index_cp.html http://www.python-forum.org http://www.learnpython.org/ http://diveintopython.org http://www.tutorialized.com/tutorials/Python/1 http://www.siafoo.net/article/52 http://www.straw-dogs.co.uk/11/29/top-15-python-e-books-legal-free/ http://www.dabeaz.com/generators/ http://www.velocityreviews.com/forums/f43-python.html http://www.openbookproject.net/thinkcs/python/english2e/ http://pythonpapers.org http://python.developpez.com/cours/TutoSwinnen/ http://www.python.org/doc/faq/general/ http://norvig.com/python-iaq.html http://dev.fyicenter.com/interview-Questions/Python/index.html http://zetcode.com/ http://pythonfacile.free.fr/ http://www.arachnoid.com/python/index.html http://webchat.freenode.net/python http://learnpythonthehardway.org/book/ http://paste.pound-python.org/
Lisp: http://www.cs.sfu.ca/CourseCentral/310/pwfong/Lisp/1/tutorial1.html http://www.cs.umd.edu/~nau/cmsc421/norvig-lisp-style.pdf http://shivamkrpandey.blogspot.co.uk/2012/05/lisp-programming-ebooks-download.html http://www.softwarepreservation.org/projects/LISP/book/LISP%201.5%20Programmers%20Manual.pdf http://www.lambdassociates.org/blog/bipolar.htm http://www.gnu.org/software/emacs/emacs-lisp-intro/ http://www.cs.utexas.edu/~novak/gclwin.html
Perl: http://www.perl.org http://www.perl.com http://www.activestate.com/perl http://www.cpan.org/ http://perldoc.perl.org/ http://www.cpan.org/scripts/index.html http://learn.perl.org/ http://www.tizag.com/perlT/ http://strawberryperl.com/
C++: http://www.cplusplus.com/doc/tutorial/ http://cprogramming.com/ http://devcentral.iftech.com/articles/C++/default.php http://www.learncpp.com/ http://www.intap.net/~drw/cpp http://www.cs.wustl.edu/~schmidt/C++/ http://www.functionx.com/cpp/ http://www.glenmccl.com/tutor.htm http://www.edm2.com/0507/introcpp1.html http://www.arachnoid.com/cpptutor/index.html
VBScript: http://www.w3schools.com/vbscript/default.asp http://www.quackit.com/vbscript/tutorial/ http://www.hitmill.com/programming/vbs/vbscript.html http://steffiaume.pagesperso-orange.fr/vbscript.html http://vbscript-training.com/ http://www.visualbasicscript.com/
VB/VB.NET:VB/VB.NET: http://www.vbtutor.net/ http://www.vbforums.com/ http://www.pickatutorial.com/ http://vb.net-informations.com/ http://www.vbdotnetforums.com/ http://www.homeandlearn.co.uk/NET/vbNET.html http://extreme-vb.net http://www.startvbdotnet.com http://www.vbdotnetheaven.com http://www.java2s.com/Code/VB/CatalogVB.htm http://www.vbaccelerator.com/ http://programmervb.wordpress.com/
☣ I’m a Pirate ☠
I am a 21st century Revolutionary, liberating files from the English, capitalist overlords.
☢☢☢ ☠ ☢☢☢ ☠ ☢☢☢
Long live the ones who dare.
Wake Up NOW
We are Anonymous.
We are Legion.
We do not Forgive censorship.
We do not Forget the denial of our free rights as human beings.
Expected us to Give An EPiC Fight
UNITED AS ONE DIVIDED BY ZERO #WeAreLegion #SailStrong
☠SHARE ☠SHARE ☠SHARE ☠SHARE ☠SHARE ☠ SHARE NO©
☠SHARE ☠SHARE ☠SHARE ☠SHARE ☠SHARE ☠ SHARE NO©