Finding a community

When you are starting out it might be a good idea to learn with a bunch of people and get to learn a lot more, after all a network of people are better at teaching than individual sources. Similar to how United doesn’t just service broward county but has locksmiths in Pembroke Pines, West Palm Beach and Miami for maximum efficiency.

So we are going to look at ways for you to learn in a group and spread your social wings.

Hackathons

“A hackathon (also known as a hack day, hackfest or codefest) is a design sprint-like event in which computer programmers and others involved in software development, including graphic designers, interface designers, project managers, and others, often including subject-matter-experts, collaborate intensively on software projects. Occasionally, there is a hardware component as well. Hackathons typically last between a day and a week. Some hackathons are intended simply for educational or social purposes, although in many cases the goal is to create usable software. Hackathons tend to have a specific focus, which can include the programming language used, the operating system, an application, an API, or the subject and the demographic group of the programmers. In other cases, there is no restriction on the type of software being created.”

Hacker Communities

“The trick is not easily expressed. Back decades ago, when expert systems were popular, I suggested an expert system to select talent. It never worked.  What came clearer is that you have to create what Martin Gardner called the “Aha!” experience (also called “A Eureka moment” in the psychology community). You have to beware, some topics are just completely over the heads of some people. The Cypherpunks were somewhat examples of the latter. You will have to learn and pick up math.”

“TrojanForge.co, HackBB, TCF, HackYard, HackHound, Darkode, MazaF-ka, DirectConnection, Exploit.IN. But disregard HackForums.net as another charlatan fan base.”

Hacker Groups

Hacker communites are a little different than Hacker Groups. These are the big boys and they don’t recruit, you become the big boys through hard work. You can’t become a part of this unless you are regularly part of blackhat communities though in their eyes its whitehat so pick your side and check this list out.

https://en.wikipedia.org/wiki/List_of_hacker_groups

Conclusion

Learning with people is always fun because you get swept up in the lifestyle and it’s hard to get excited about much of anything these days and if you ever want to actually make a difference in the world the only way to do it is to find a group who can make actual changes happen. Otherwise you’ll just end up locked out in plantation.

Practicing

There are many skills that you need to acquire in order to be a great hacker. Similar to how if you ever want to be a locksmith in Homestead, you need to practice and know your tools. But you are never going to be a master hacker unless you are able to have all of your tools. So here is a list of tools and next we will talk about the characteristics required.

Also, we are highly recommending this article for a great follow up

VPN

“The service is built for users who just want secure, private access when connected from public or untrusted networks. The app gives you an offshore IP address and connects you to an anonymizing server to mask your real IP address and location, and then encrypts all of the internet traffic between you and the VPN service. It may sound like overkill, but if you use public Wi-Fi networks on a regular basis, using a VPN is the best way to protect yourself from applications or web sites that transmit sensitive information like usernames and passwords in clear text.”

VirtualBox

“A VirtualBox or VB is a software virtualization package that installs on an operating system as an application. VirtualBox allows additional operating systems to be installed on it, as a Guest OS, and run in a virtual environment. In 2010, VirtualBox was the most popular virtualization software application. Supported operating systems include Windows XP, Windows Vista, Windows 7, Mac OS X, Linux, Solaris, and OpenSolaris.”

WireShark

“Wireshark is cross-platform, using the Qt widget toolkit in current releases to implement its user interface, and using pcap to capture packets; it runs on Linux, macOS, BSD, Solaris, some other Unix-like operating systems, and Microsoft Windows. There is also a terminal-based (non-GUI) version called TShark. Wireshark, and the other programs distributed with it such as TShark, are free software, released under the terms of the GNU General Public License.”

Several Browsers

“Similar to Metasploit, BeEF is a framework for launching attacks. Unlike Metasploit, it is specific to launching attacks against web browsers. In some cases, we will be able to use BeEF in conjunction with Metasploit to launch particular attacks, so I think its time for us to become familiar with it.
BeEF was developed by a group of developers led by Wade Alcorn. Built on the familiar Ruby on Rails platform, BeEF was developed to explore the vulnerabilities in browsers and test them. In particular, BeEF is an excellent platform for testing a browser’s vulnerability to cross-site scripting (XSS) and other injection attacks.”

Conclusion

You want to get the VPN first. Having private online searches is great for ensuring your movements aren’t being tracked and put on a list somewhere which can cripple your fledgling career. You don’t want to end up being locked out in Homestead and the hacking world.

Cracks, Script, and Exploits

Today we are going to talk about the bread and butter of the hacker world. Getting into the nitty gritty of what we are looking for. When you are working as a locksmith in Dayton, you need to know what tools are at your disposal. Because of that, we are going to review cracks, scripts, and exploits.

What are Cracks

“A crack refers to the mean of achieving software cracking, for example, a stolen serial number or a tool that performs that act of cracking. Some of these tools are called keygen, patch, or loader. A keygen is a handmade product license generator that often offers the ability to generate legitimate licenses in your own name. A patch is a small computer program that modifies the machine code of another program. This has the advantage for a cracker to not include a large executable in a release when only a few bytes are changed. A loader modifies the startup flow of a program and does not remove the protection but circumvents it. A well-known example of a loader is a trainer used to cheat in games. Fairlight pointed out in one of their .nfo files that these type of cracks are not allowed for warez scene game releases. A nukewar has shown that the protection may not kick in at any point for it to be a valid crack.”

What are Scripts

“In computer programming, a script is a program or sequence of instructions that is interpreted or carried out by another program rather than by the computer processor (as a compiled program is).”

What are Exploits

“An exploit is the use of software, data, or commands to “exploit” a weakness in a computer system or program to carry out some form of malicious intent, such as a denial-of-service attack, Trojan horses, worms or viruses. The weakness in the system can be a bug, a glitch or simply a design vulnerability. A remote exploit exploits the security vulnerability without ever having prior access to the system. A local exploit needs prior access to the vulnerable system and usually, involves increasing the privileges of the user account running the exploit. Those who utilize exploits often use social engineering to gain critical information needed to access the system. Many crackers (or hackers) take pride in their knowledge of software exploits and post them to a website to share or boast with other crackers. “

Conclusion

While I can only brush up on each one of these, the best way to learn them is to open the code file in code blocks or notepad++ and fiddle with the code and see what happens, see what happens if you can cause an override or something like that, Then you will begin your journey properly and move from some hack in Dayton to who tey call for emergency locksmiths in Cincinnati.

New Depths

This is a continuation of the previous post about where you can work on the internet. The main thing that we have is the infographic on the right. You know how there is an iceberg, and you only see the tip, but there is a great mass underneath? That is all the internet that accessible by you specifically. That is The Website, Surface Website sites and crazy locked results that can only be seen by exclusive sites. Because after that, you will start finding other parts of the internet that are gray hat specifically. Pretend that The internet is like being locked out in Cincinnati, you do not want to call for help, but you will have to.

Deep Web

“Neither the deep web nor the dark web can be indexed, but not all that cannot be indexed is the dark web. For purposes of this question, I assume you want the dark web – that much-hyped, mysterious place that the media would have you believe is a wretched hive of scum and villainy where you would be well-served to shoot first if you hope to survive. Activists will tell you it is our last, best hope for privacy and free speech, all alone in the night.” – Quora

“In effect, the proxy server acts as a third party, filtering out requests according to the rules of the server. At its most basic level, the proxy server follows several key steps.” – Optimum7

Charter Web

Charter web is called that because you cannot access if by standard browsers instead, you have to download what is called a Tor browser. You will need a charter and if your charter breaks down you will have to do the internet equivalent of calling an auto locksmith in Cincinnati to get out.

“Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security.” – Tor.org

The Elite Zone

Up until this point, we have seen what is known as the 4 out of 8 levels of the internet and beyond this point is farther than I am comfortable talking about on a casual blog. Beyond this point are where viruses are created, where bad people roam and where there are no restrictions. AS long as there is a free and open internet, there will be the dark web. To get there, you need tor, proxies and several aspects that you exclusively created through custom code and have found direct links for certain parts. Here is where unchecked aggression ferments. There is no reason to go there other than chaos. There is rumor of an 8th level. What they say at the 8th level is where the internet is a core. But who knows if we will ever get there.