Twenty Year Anniversary

NCR2K001.TXT

NCR2K001.TXT
Posted Oct 6, 2000
Site gmx.net

How to become elite.

tags | paper
MD5 | 2d7fab83c16f4e3c3b94667bdee5045d

NCR2K001.TXT

Change Mirror Download
===============================================================================
Title : How to become elite?
Author(s): Necrose (Necrose.Labs)
Adv. ID : NRC2K001.TXT
Rl. Date : 28/09/00
===============================================================================

I wrote this document to tell everyone who likes to know how to become a elite
dude because I am sick and tired of all those people who keep asking questions
on IRC or via E-mail like: "Hey, elite person can you teach me how to hack?" or
"Hey, I wanna become a hacker. I read two documents but I don't get it, can you
be my friend and teach me how to hack?". I usually answer them that they should
read a lot, but actually that isn't a good beginning. I wrote this document to
give people a little intro into the world of hacking. I won't actually teach
you how to hack, I will only tell you where to start.

Everyone who wants to hack always starts with downloading lots of text files
about hacking from every hacking/security site they can find. As a matter of
fact I always recommended: reading. To all the people who ever asked me how
to become a hacker. But when I saw some hacking/security sites last week, I got
shocked of the outdated crap that was available in the documents archives
there. The archives contained files which were released a very long time ago
whuch means a lot of the techniques and exploits are so outdated that probably
99% of the vulnerible machines to that techniques and exploites were already
patched a long time ago. But when you are new you wont notice this an you
probably will never get any further until you actually found one good recently
released text file. I won't say that all the information in the text files is
incorrect or outdated, but most of it is. So reading those text files can only
be interesting if you are really looking for a specific technique and it
certainly isn't good to read them if you are new to hacking and still a
beginner who wants to learn the basics about it.

You should start at finding out what you really know about computers and
networks. Do you know what IPv4 is? and what IPv6 is? do you know what PORT's
are? and what packets are? If you don't know this you'll have a long way to
cross before you can become a hacker. You can increase your general computer
knowledge and especially your knowledge about networks by reading books about
it. People often think you won't learn anything from reading simple books but
that isn't true, there are lots of very good books out there which will tell
you the basics about computers and networks.

You'll probably heard of UNIX and you might even have a variant of it installed
like: Linux. Because if you do, that is fine since hacking without a local
installed UNIX variant or a remote shell is almost as good as impossible
because most of the exploits is written for the UNIX platform. I would actually
recommend you to read some books about UNIX/Linux and consider to install it on
your computer. If you don't feel like installing UNIX/Linux at your computer.
You can also try to get a shell account, which will probably be very hard these
days. As long as you know that you can't live without UNIX/Linux if you want to
call yourselves a hacker.

As you could read above a UNIX variant is required to run most of the available
exploits. You'll probably heard about exploits and maybe you downloaded one. If
you run windows. And if you already have UNIX/Linux installed you might have
tried to run it but it probably failed because you dont know enough about the
working of exploits to use them properly. You should find out how to use them
by knowing what they should do. But before you can know exactly what they
should do, you should also have some knowledge about programming languages.
So you can analyse the code and learn from it.

There are a lot of programming languages, but how do you know which you should
learn. I personally recommend to try C and Perl because most of the exploits
are written in one of those two languages and they both have much power. C is
probably the most powerful available programming language in the world. Perl is
easier to learn than C, and is also available on almost every platform.

If you know some more about networks, exploits and programming C and Perl now
you should really try to subscribe into some mailing lists. I personally
recommend you to subscribe at bugtraq, but only if you are sure you know enough
now because if you don't you wont probably understand anything of the
discussions. And if you have some skills now, it is a very good training to
read this discussions and try to understand them which will increse your
knowledge. Bugtraq is also a good resource to keep up to date so you can try
the newest exploits which still have a higher number of vulnerible machines
because patching all the machines costs time. Which means you should use that
time to try out the new exploits which you should analyse and learn from.

If you read the above you probably noticed that becoming a hacker or security
specialist isn't very easy. And the way you'll have to cross to become one is
very long and difficult. But I hope this document gave you the information you
needed to make a beginning into the hacking/security scene.

===============================================================================
Necrose.Labs - Hacking/Security Research
===============================================================================

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

Want To Donate?


Bitcoin: 18PFeCVLwpmaBuQqd5xAYZ8bZdvbyEWMmU

File Archive:

August 2018

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Aug 1st
    19 Files
  • 2
    Aug 2nd
    17 Files
  • 3
    Aug 3rd
    16 Files
  • 4
    Aug 4th
    1 Files
  • 5
    Aug 5th
    1 Files
  • 6
    Aug 6th
    19 Files
  • 7
    Aug 7th
    15 Files
  • 8
    Aug 8th
    9 Files
  • 9
    Aug 9th
    7 Files
  • 10
    Aug 10th
    10 Files
  • 11
    Aug 11th
    1 Files
  • 12
    Aug 12th
    0 Files
  • 13
    Aug 13th
    14 Files
  • 14
    Aug 14th
    18 Files
  • 15
    Aug 15th
    38 Files
  • 16
    Aug 16th
    0 Files
  • 17
    Aug 17th
    0 Files
  • 18
    Aug 18th
    0 Files
  • 19
    Aug 19th
    0 Files
  • 20
    Aug 20th
    0 Files
  • 21
    Aug 21st
    0 Files
  • 22
    Aug 22nd
    0 Files
  • 23
    Aug 23rd
    0 Files
  • 24
    Aug 24th
    0 Files
  • 25
    Aug 25th
    0 Files
  • 26
    Aug 26th
    0 Files
  • 27
    Aug 27th
    0 Files
  • 28
    Aug 28th
    0 Files
  • 29
    Aug 29th
    0 Files
  • 30
    Aug 30th
    0 Files
  • 31
    Aug 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2018 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close