Finding a community

When you are starting out it might be a good idea to learn with a bunch of people and get to learn a lot more, after all a network of people are better at teaching than individual sources. Similar to how United doesn’t just service broward county but has locksmiths in Pembroke Pines, West Palm Beach and Miami for maximum efficiency.

So we are going to look at ways for you to learn in a group and spread your social wings.


“A hackathon (also known as a hack day, hackfest or codefest) is a design sprint-like event in which computer programmers and others involved in software development, including graphic designers, interface designers, project managers, and others, often including subject-matter-experts, collaborate intensively on software projects. Occasionally, there is a hardware component as well. Hackathons typically last between a day and a week. Some hackathons are intended simply for educational or social purposes, although in many cases the goal is to create usable software. Hackathons tend to have a specific focus, which can include the programming language used, the operating system, an application, an API, or the subject and the demographic group of the programmers. In other cases, there is no restriction on the type of software being created.”

Hacker Communities

“The trick is not easily expressed. Back decades ago, when expert systems were popular, I suggested an expert system to select talent. It never worked.  What came clearer is that you have to create what Martin Gardner called the “Aha!” experience (also called “A Eureka moment” in the psychology community). You have to beware, some topics are just completely over the heads of some people. The Cypherpunks were somewhat examples of the latter. You will have to learn and pick up math.”

“, HackBB, TCF, HackYard, HackHound, Darkode, MazaF-ka, DirectConnection, Exploit.IN. But disregard as another charlatan fan base.”

Hacker Groups

Hacker communites are a little different than Hacker Groups. These are the big boys and they don’t recruit, you become the big boys through hard work. You can’t become a part of this unless you are regularly part of blackhat communities though in their eyes its whitehat so pick your side and check this list out.


Learning with people is always fun because you get swept up in the lifestyle and it’s hard to get excited about much of anything these days and if you ever want to actually make a difference in the world the only way to do it is to find a group who can make actual changes happen. Otherwise you’ll just end up locked out in plantation.

You can have all the skills in the world but you need to develop the personality of a master hacker and you need to be discreet above everything else. People don’t get anywhere if they announce that they are locked out in Miami. That’s how you get caught so here are key attirbutes you need to be a successful hacker.

Once again, read more from this great article.


“Having first appeared in September 2013, it targets just Windows computers. It usually makes its way to the victim via an email attachment. When the user clicks on the attachment, it uses RSA 2048 bit public key cryptography to encrypt all the target files while the attacker holds the private key.
RSA encryption uses two keys that are different, one public and one private that uses very large prime number factorization.
As of December 2013, the attacker’s Bitcoin account had a balance of $27,000,00!
The key takeaway here is that these hackers really didn’t invent anything new, they simply used some tried and true social engineering techniques coupled with some knowledge of public key cryptography to garner millions of dollars!”


“A hacker must be persistent. If you fail at first, try again. If that fails, come up with a new approach and try again. It is only with a persistence that you will be able to hack the most secured systems.”


“Finally, I have personally observed that the self-deprecating behavior of some leading hackers reflects a real (and not unjustified) fear of becoming the object of a personality cult. Linus Torvalds and Larry Wall both provide clear and numerous examples of such avoidance behavior. Once, on a dinner expedition with Larry Wall, I joked “You’re the alpha hacker here—you get to pick the restaurant”. He flinched noticeably. And rightly so; failing to distinguish their shared values from the personalities of their leaders has ruined a good many voluntary communities, a pattern of which Larry and Linus cannot fail to be fully aware. On the other hand, most hackers would love to have Larry’s problem, if they could but bring themselves to admit it.”


I usually try to let other people speak and teach people through other examples in order to keep my identity a secret and to prevent myself from being personally scrutinized for advocating this culture. Otherwise you’ll never access your inner locksmith in Miami.

But I highly suggest every young hacker read The art of War. It’s extremely pertinent in this world. While there are a lot of people who follow the scorcher earth principle. It’s much better for the culture to be respectful and to play your cards very close to your chest.


There are many skills that you need to acquire in order to be a great hacker. Similar to how if you ever want to be a locksmith in Homestead, you need to practice and know your tools. But you are never going to be a master hacker unless you are able to have all of your tools. So here is a list of tools and next we will talk about the characteristics required.

Also, we are highly recommending this article for a great follow up


“The service is built for users who just want secure, private access when connected from public or untrusted networks. The app gives you an offshore IP address and connects you to an anonymizing server to mask your real IP address and location, and then encrypts all of the internet traffic between you and the VPN service. It may sound like overkill, but if you use public Wi-Fi networks on a regular basis, using a VPN is the best way to protect yourself from applications or web sites that transmit sensitive information like usernames and passwords in clear text.”


“A VirtualBox or VB is a software virtualization package that installs on an operating system as an application. VirtualBox allows additional operating systems to be installed on it, as a Guest OS, and run in a virtual environment. In 2010, VirtualBox was the most popular virtualization software application. Supported operating systems include Windows XP, Windows Vista, Windows 7, Mac OS X, Linux, Solaris, and OpenSolaris.”


“Wireshark is cross-platform, using the Qt widget toolkit in current releases to implement its user interface, and using pcap to capture packets; it runs on Linux, macOS, BSD, Solaris, some other Unix-like operating systems, and Microsoft Windows. There is also a terminal-based (non-GUI) version called TShark. Wireshark, and the other programs distributed with it such as TShark, are free software, released under the terms of the GNU General Public License.”

Several Browsers

“Similar to Metasploit, BeEF is a framework for launching attacks. Unlike Metasploit, it is specific to launching attacks against web browsers. In some cases, we will be able to use BeEF in conjunction with Metasploit to launch particular attacks, so I think its time for us to become familiar with it.
BeEF was developed by a group of developers led by Wade Alcorn. Built on the familiar Ruby on Rails platform, BeEF was developed to explore the vulnerabilities in browsers and test them. In particular, BeEF is an excellent platform for testing a browser’s vulnerability to cross-site scripting (XSS) and other injection attacks.”


You want to get the VPN first. Having private online searches is great for ensuring your movements aren’t being tracked and put on a list somewhere which can cripple your fledgling career. You don’t want to end up being locked out in Homestead and the hacking world.

Cracks, Script, and Exploits

Today we are going to talk about the bread and butter of the hacker world. Getting into the nitty gritty of what we are looking for. When you are working as a locksmith in Dayton, you need to know what tools are at your disposal. Because of that, we are going to review cracks, scripts, and exploits.

What are Cracks

“A crack refers to the mean of achieving software cracking, for example, a stolen serial number or a tool that performs that act of cracking. Some of these tools are called keygen, patch, or loader. A keygen is a handmade product license generator that often offers the ability to generate legitimate licenses in your own name. A patch is a small computer program that modifies the machine code of another program. This has the advantage for a cracker to not include a large executable in a release when only a few bytes are changed. A loader modifies the startup flow of a program and does not remove the protection but circumvents it. A well-known example of a loader is a trainer used to cheat in games. Fairlight pointed out in one of their .nfo files that these type of cracks are not allowed for warez scene game releases. A nukewar has shown that the protection may not kick in at any point for it to be a valid crack.”

What are Scripts

“In computer programming, a script is a program or sequence of instructions that is interpreted or carried out by another program rather than by the computer processor (as a compiled program is).”

What are Exploits

“An exploit is the use of software, data, or commands to “exploit” a weakness in a computer system or program to carry out some form of malicious intent, such as a denial-of-service attack, Trojan horses, worms or viruses. The weakness in the system can be a bug, a glitch or simply a design vulnerability. A remote exploit exploits the security vulnerability without ever having prior access to the system. A local exploit needs prior access to the vulnerable system and usually, involves increasing the privileges of the user account running the exploit. Those who utilize exploits often use social engineering to gain critical information needed to access the system. Many crackers (or hackers) take pride in their knowledge of software exploits and post them to a website to share or boast with other crackers. “


While I can only brush up on each one of these, the best way to learn them is to open the code file in code blocks or notepad++ and fiddle with the code and see what happens, see what happens if you can cause an override or something like that, Then you will begin your journey properly and move from some hack in Dayton to who tey call for emergency locksmiths in Cincinnati.

New Depths

This is a continuation of the previous post about where you can work on the internet. The main thing that we have is the infographic on the right. You know how there is an iceberg, and you only see the tip, but there is a great mass underneath? That is all the internet that accessible by you specifically. That is The Website, Surface Website sites and crazy locked results that can only be seen by exclusive sites. Because after that, you will start finding other parts of the internet that are gray hat specifically. Pretend that The internet is like being locked out in Cincinnati, you do not want to call for help, but you will have to.

Deep Web

“Neither the deep web nor the dark web can be indexed, but not all that cannot be indexed is the dark web. For purposes of this question, I assume you want the dark web – that much-hyped, mysterious place that the media would have you believe is a wretched hive of scum and villainy where you would be well-served to shoot first if you hope to survive. Activists will tell you it is our last, best hope for privacy and free speech, all alone in the night.” – Quora

“In effect, the proxy server acts as a third party, filtering out requests according to the rules of the server. At its most basic level, the proxy server follows several key steps.” – Optimum7

Charter Web

Charter web is called that because you cannot access if by standard browsers instead, you have to download what is called a Tor browser. You will need a charter and if your charter breaks down you will have to do the internet equivalent of calling an auto locksmith in Cincinnati to get out.

“Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.” –

The Elite Zone

Up until this point, we have seen what is known as the 4 out of 8 levels of the internet and beyond this point is farther than I am comfortable talking about on a casual blog. Beyond this point are where viruses are created, where bad people roam and where there are no restrictions. AS long as there is a free and open internet, there will be the dark web. To get there, you need tor, proxies and several aspects that you exclusively created through custom code and have found direct links for certain parts. Here is where unchecked aggression ferments. There is no reason to go there other than chaos. There is rumor of an 8th level. What they say at the 8th level is where the internet is a core. But who knows if we will ever get there.

There’s a lot of opportunities to be had in the field of hacking and whats great is that if you are great, there will be more than I can possibly hope to offer you. But when we are talking about hacking, it’s a lot like talking about locksmiths in Dallas. It might seem like an obscure reference but bare with me.

When you are a locksmith, you have the ability to open any door, but you choose to help people with your abilities. But some people use that ability to open doors that shouldn’t be open, that is what we are going to talk about today.

 A man of different hats

Hackers wear different hats. There are white hats, black hats, and grey hats. The name comes from Western films, where heroic and antagonistic Cowboys might traditionally wear a white and a black hat respectively.

White Hat – The term “white hat” in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization’s information systems. Ethical hacking is a term coined by IBM meant to imply a broader category than just penetration testing.

Black Hat – The term was coined by Richard Stallman, to contrast the maliciousness of a criminal hacker versus the spirit of playfulness and exploration of hacker culture, or the ethos of the white-hat hacker, who performs hacker duties to identify places to repair

Grey Hat – The term began to be used in the late 1990s, derived from the concepts of “white hat” and “black hat” hackers. When a white hat hacker discovers a vulnerability, they will exploit it only with permission and not divulge its existence until it has been fixed, whereas the black hat will illegally exploit it and tell others how to do so. The gray hat will neither illegally exploit it, nor tell others how to do so.

Red Hat

Red Hat is a Linux distro team that are responsible for creating Linux distros, and they have cleverly named themselves red hat. Red Hat by it’s nature implies that instead of using hacking and exploiting different aspects of that, they are instead profiting off of hackers instead. Which is it’s own thing? It is similar to charging for keys in Dallas. Everyone already has the keys, but if they need additional keys, there’s only one person they can call.

The Hacker Landscape

Now while there are also several different aspects of hacking, there are also several different levels of the internet. But that is a story for another time.

Hello again, it is I, Dutch. Here to give you some fundamentals and ideas of where you can continue learning if you truly desired it. Today we are going to talk about sudo-hacking as in we are going to talk about Linux.

Linux is a distro similar to Windows and Mac except we can use it with much less resources than the other which is ideal for lean computing. One of my friends who taught me about linux now works as a locksmith in Aventura and he says that the two are one in the same.

What is Linux

Linux is an open os which means anyone can take it and run with it. But it is comprised of different terms that are specific towards the OS itself.

“The OS is comprised of some pieces:
• The Bootloader: The software that manages the boot process of your computer. For most users, this will simply be a splash screen that pops up and eventually goes away to boot into the operating system.
• The kernel: This is the one piece of the whole that is called “Linux”. The kernel is the core of the system and manages the CPU, memory, and peripheral devices. The kernel is the “lowest” level of the OS.
• Daemons: These are background services (printing, sound, scheduling, etc) that either starts up during boot or after you log into the desktop.
• The Shell: You’ve probably heard mention of the Linux command line. This is the shell – a command process that allows you to control the computer via commands typed into a text interface. This is what, at one time, scared people away from Linux the most (assuming they had to learn a seemingly archaic command line structure to make Linux work). This is no longer the case. With modern desktop Linux, there is no need to ever touch the command line.
• Graphical Server: This is the sub-system that displays the graphics on your monitor. It is commonly referred to as the X server or just “X”.
• Desktop Environment: This is the piece of the puzzle that the users interact with. There are many desktop environments to choose from (Unity, GNOME, Cinnamon, Enlightenment, KDE, XFCE, etc.). Each desktop environment includes built-in applications (such as file managers, configuration tools, web browsers, games, etc.).” –

How to Hack it?

Because there is an open terminal, it is highly possible to change, alter, and hack aspects of a Linux build with relative ease. In fact there is a theory that suggests that all viruses are from Linux and converted from there. Similar to how you get to have a mobile locksmith in Miami.

“Passwords are the sole criteria of system Security for most of the System. Moreover, when it comes to Linux, if you know the root password you owns the machine. Passwords are as a Security measure for BIOS, Login, Disk, Application, etc.
Linux is considered to be the most Secure Operating System to be hacked or cracked, and in reality it is, still we will be discussing some of the loop-holes and exploits of a Linux System. We will be using CentOS Linux throughout the article as an article to crack our own machine’s security.” – TecMint

More Research Material

There’s a great little game called ScopeCreep that can help you learn more about Linux and hacking. Check it out now!

no love

At first a brief introduction. I am Dutch, part of PhpNuke, not to be confused with the internet marketing company. We are part of the old php-nuke before it was taken down from neglect. You can come here it you’d like to learn things. A lot of people would like to learn more about cracking and hacking and that’s exactly what we seek to do here.
I post remotely, I don’t check my e-mail, if you want to come into contact with me ask yourself if it’s really worth getting into the trouble over it. Just for being on this site you are probably put on some sort of list so if you’re concerned about getting caught go ahead and backspace out of here.

What we will be covering is basic fundamentals of hacking, the best that we can do. We will be covering anything from cracks to scripts as well as giving you tons of resources with which you can learn the fundamentals on your own.

For your safety, all of the examples we provide here will be strictly gray hat. If you wish to use the skils here for other purposes, it has nothing to do with us and we do not endorse it **

deep webI’m a professional. I’ve been working in the industry for a long time and have been arrested twice. I think that what I’m doing is right and I fight for a free and open internet. I believe that the systems that teach you information are lacking the important tools needed for the future. You should learn the principal languages and I will not teach you any coded languages, just tips and tricks for when you are ready to learn more and are not satisfied with the current scope of your curriculum.

There is a fight coming. tThere will come a time when you will have to choose between country, globialism and what you believe to be right. I’m typing this remotely. Not even from my work station. This is a PSA to all that will listen, use this site as your guide. We will teach you all you need to know. But what you do with it is up to you.

PhpNuke started with an idea over a decadee ago, catalogue and learn from everything such as viruses to be databased and new tricks to be shared. Now it’s a shell of it’s former self. The bomb went off and this site is the fallout of that era. I will try my best to encourage that conversation again.

Dutch AFK.