Finding a community

When you are starting out it might be a good idea to learn with a bunch of people and get to learn a lot more, after all a network of people are better at teaching than individual sources. Similar to how United doesn’t just service broward county but has locksmiths in Pembroke Pines, West Palm Beach and Miami for maximum efficiency.

So we are going to look at ways for you to learn in a group and spread your social wings.

Hackathons

“A hackathon (also known as a hack day, hackfest or codefest) is a design sprint-like event in which computer programmers and others involved in software development, including graphic designers, interface designers, project managers, and others, often including subject-matter-experts, collaborate intensively on software projects. Occasionally, there is a hardware component as well. Hackathons typically last between a day and a week. Some hackathons are intended simply for educational or social purposes, although in many cases the goal is to create usable software. Hackathons tend to have a specific focus, which can include the programming language used, the operating system, an application, an API, or the subject and the demographic group of the programmers. In other cases, there is no restriction on the type of software being created.”

Hacker Communities

“The trick is not easily expressed. Back decades ago, when expert systems were popular, I suggested an expert system to select talent. It never worked.  What came clearer is that you have to create what Martin Gardner called the “Aha!” experience (also called “A Eureka moment” in the psychology community). You have to beware, some topics are just completely over the heads of some people. The Cypherpunks were somewhat examples of the latter. You will have to learn and pick up math.”

“TrojanForge.co, HackBB, TCF, HackYard, HackHound, Darkode, MazaF-ka, DirectConnection, Exploit.IN. But disregard HackForums.net as another charlatan fan base.”

Hacker Groups

Hacker communites are a little different than Hacker Groups. These are the big boys and they don’t recruit, you become the big boys through hard work. You can’t become a part of this unless you are regularly part of blackhat communities though in their eyes its whitehat so pick your side and check this list out.

https://en.wikipedia.org/wiki/List_of_hacker_groups

Conclusion

Learning with people is always fun because you get swept up in the lifestyle and it’s hard to get excited about much of anything these days and if you ever want to actually make a difference in the world the only way to do it is to find a group who can make actual changes happen. Otherwise you’ll just end up locked out in plantation.

You can have all the skills in the world but you need to develop the personality of a master hacker and you need to be discreet above everything else. People don’t get anywhere if they announce that they are locked out in Miami. That’s how you get caught so here are key attirbutes you need to be a successful hacker.

Once again, read more from this great article.

Creativity

“Having first appeared in September 2013, it targets just Windows computers. It usually makes its way to the victim via an email attachment. When the user clicks on the attachment, it uses RSA 2048 bit public key cryptography to encrypt all the target files while the attacker holds the private key.
RSA encryption uses two keys that are different, one public and one private that uses very large prime number factorization.
As of December 2013, the attacker’s Bitcoin account had a balance of $27,000,00!
The key takeaway here is that these hackers really didn’t invent anything new, they simply used some tried and true social engineering techniques coupled with some knowledge of public key cryptography to garner millions of dollars!”

Persistence

“A hacker must be persistent. If you fail at first, try again. If that fails, come up with a new approach and try again. It is only with a persistence that you will be able to hack the most secured systems.”

Humility

“Finally, I have personally observed that the self-deprecating behavior of some leading hackers reflects a real (and not unjustified) fear of becoming the object of a personality cult. Linus Torvalds and Larry Wall both provide clear and numerous examples of such avoidance behavior. Once, on a dinner expedition with Larry Wall, I joked “You’re the alpha hacker here—you get to pick the restaurant”. He flinched noticeably. And rightly so; failing to distinguish their shared values from the personalities of their leaders has ruined a good many voluntary communities, a pattern of which Larry and Linus cannot fail to be fully aware. On the other hand, most hackers would love to have Larry’s problem, if they could but bring themselves to admit it.”

Conclusion

I usually try to let other people speak and teach people through other examples in order to keep my identity a secret and to prevent myself from being personally scrutinized for advocating this culture. Otherwise you’ll never access your inner locksmith in Miami.

But I highly suggest every young hacker read The art of War. It’s extremely pertinent in this world. While there are a lot of people who follow the scorcher earth principle. It’s much better for the culture to be respectful and to play your cards very close to your chest.

Practicing

There are many skills that you need to acquire in order to be a great hacker. Similar to how if you ever want to be a locksmith in Homestead, you need to practice and know your tools. But you are never going to be a master hacker unless you are able to have all of your tools. So here is a list of tools and next we will talk about the characteristics required.

Also, we are highly recommending this article for a great follow up

VPN

“The service is built for users who just want secure, private access when connected from public or untrusted networks. The app gives you an offshore IP address and connects you to an anonymizing server to mask your real IP address and location, and then encrypts all of the internet traffic between you and the VPN service. It may sound like overkill, but if you use public Wi-Fi networks on a regular basis, using a VPN is the best way to protect yourself from applications or web sites that transmit sensitive information like usernames and passwords in clear text.”

VirtualBox

“A VirtualBox or VB is a software virtualization package that installs on an operating system as an application. VirtualBox allows additional operating systems to be installed on it, as a Guest OS, and run in a virtual environment. In 2010, VirtualBox was the most popular virtualization software application. Supported operating systems include Windows XP, Windows Vista, Windows 7, Mac OS X, Linux, Solaris, and OpenSolaris.”

WireShark

“Wireshark is cross-platform, using the Qt widget toolkit in current releases to implement its user interface, and using pcap to capture packets; it runs on Linux, macOS, BSD, Solaris, some other Unix-like operating systems, and Microsoft Windows. There is also a terminal-based (non-GUI) version called TShark. Wireshark, and the other programs distributed with it such as TShark, are free software, released under the terms of the GNU General Public License.”

Several Browsers

“Similar to Metasploit, BeEF is a framework for launching attacks. Unlike Metasploit, it is specific to launching attacks against web browsers. In some cases, we will be able to use BeEF in conjunction with Metasploit to launch particular attacks, so I think its time for us to become familiar with it.
BeEF was developed by a group of developers led by Wade Alcorn. Built on the familiar Ruby on Rails platform, BeEF was developed to explore the vulnerabilities in browsers and test them. In particular, BeEF is an excellent platform for testing a browser’s vulnerability to cross-site scripting (XSS) and other injection attacks.”

Conclusion

You want to get the VPN first. Having private online searches is great for ensuring your movements aren’t being tracked and put on a list somewhere which can cripple your fledgling career. You don’t want to end up being locked out in Homestead and the hacking world.

New Depths

This is a continuation of the previous post about where you can work on the internet. The main thing that we have is the infographic on the right. You know how there is an iceberg, and you only see the tip, but there is a great mass underneath? That is all the internet that accessible by you specifically. That is The Website, Surface Website sites and crazy locked results that can only be seen by exclusive sites. Because after that, you will start finding other parts of the internet that are gray hat specifically. Pretend that The internet is like being locked out in Cincinnati, you do not want to call for help, but you will have to.

Deep Web

“Neither the deep web nor the dark web can be indexed, but not all that cannot be indexed is the dark web. For purposes of this question, I assume you want the dark web – that much-hyped, mysterious place that the media would have you believe is a wretched hive of scum and villainy where you would be well-served to shoot first if you hope to survive. Activists will tell you it is our last, best hope for privacy and free speech, all alone in the night.” – Quora

“In effect, the proxy server acts as a third party, filtering out requests according to the rules of the server. At its most basic level, the proxy server follows several key steps.” – Optimum7

Charter Web

Charter web is called that because you cannot access if by standard browsers instead, you have to download what is called a Tor browser. You will need a charter and if your charter breaks down you will have to do the internet equivalent of calling an auto locksmith in Cincinnati to get out.

“Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.” – Tor.org

The Elite Zone

Up until this point, we have seen what is known as the 4 out of 8 levels of the internet and beyond this point is farther than I am comfortable talking about on a casual blog. Beyond this point are where viruses are created, where bad people roam and where there are no restrictions. AS long as there is a free and open internet, there will be the dark web. To get there, you need tor, proxies and several aspects that you exclusively created through custom code and have found direct links for certain parts. Here is where unchecked aggression ferments. There is no reason to go there other than chaos. There is rumor of an 8th level. What they say at the 8th level is where the internet is a core. But who knows if we will ever get there.

There’s a lot of opportunities to be had in the field of hacking and whats great is that if you are great, there will be more than I can possibly hope to offer you. But when we are talking about hacking, it’s a lot like talking about locksmiths in Dallas. It might seem like an obscure reference but bare with me.

When you are a locksmith, you have the ability to open any door, but you choose to help people with your abilities. But some people use that ability to open doors that shouldn’t be open, that is what we are going to talk about today.

 A man of different hats

Hackers wear different hats. There are white hats, black hats, and grey hats. The name comes from Western films, where heroic and antagonistic Cowboys might traditionally wear a white and a black hat respectively.

White Hat – The term “white hat” in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization’s information systems. Ethical hacking is a term coined by IBM meant to imply a broader category than just penetration testing.

Black Hat – The term was coined by Richard Stallman, to contrast the maliciousness of a criminal hacker versus the spirit of playfulness and exploration of hacker culture, or the ethos of the white-hat hacker, who performs hacker duties to identify places to repair

Grey Hat – The term began to be used in the late 1990s, derived from the concepts of “white hat” and “black hat” hackers. When a white hat hacker discovers a vulnerability, they will exploit it only with permission and not divulge its existence until it has been fixed, whereas the black hat will illegally exploit it and tell others how to do so. The gray hat will neither illegally exploit it, nor tell others how to do so.

Red Hat

Red Hat is a Linux distro team that are responsible for creating Linux distros, and they have cleverly named themselves red hat. Red Hat by it’s nature implies that instead of using hacking and exploiting different aspects of that, they are instead profiting off of hackers instead. Which is it’s own thing? It is similar to charging for keys in Dallas. Everyone already has the keys, but if they need additional keys, there’s only one person they can call.

The Hacker Landscape

Now while there are also several different aspects of hacking, there are also several different levels of the internet. But that is a story for another time.