Bibliotheque
DiscordHackTheBoxTryHackMeGitHub
  • Welcome wanderer
    • Bibliotheque
    • Hacking Philosophy
    • Useful Links
  • PENTESTING
    • Methodology
    • Protocols
      • FTP
      • SMB
      • NFS
      • SSH
      • RDP
      • SMTP
      • IMAP / POP3
      • RSYNC
      • SNMP
      • IPMI
      • R-Services
      • WinRM
      • WMI
      • LDAP
    • Databases
      • MySQL
      • MSSQL
      • Oracle TNS
      • PostgreSQL
    • File Transfers
      • Windows
      • Linux
      • Code
      • Misc
    • Password Attacks
      • John The Ripper
      • Hashcat
    • Docker
  • TOOLS
    • Nmap
    • Metasploit
    • BloodHound
    • Other
  • Linux
    • Theory
    • Commands and Utilities
      • Useful Commands
    • Bash Scripting
    • Post-Exploitation
      • Cred Hunting
      • Pivoting
  • WINDOWS
    • Theory
      • Security
    • Commands and Utilities
    • PowerShell
    • Post-Exploitation
      • Tools
      • Enumeration
        • System
        • Network
        • Users
        • Groups
        • Processes / Services
        • Permissions
        • Defence
        • Programs
        • Files
      • Access
      • Pivoting
      • Cred Hunting
    • Privilege Escalation
      • Privileges
      • Built-In Groups
        • Backup Operators
        • Server Operators
        • Print Operators
        • DnsAdmins
        • Event Log Readers
      • Privilege Abuse
        • Potatoes
        • SeDebugPrivilege
        • SeTakeOwnershipPrivilege
      • MISC
        • UAC Bypass
        • User-Interaction Attacks
        • Weak Permissions
  • ACTIVE DIRECTORY
    • Theory
      • Terminology
    • Reconnaissance
      • Responder
      • Password Policies
      • DNS
      • Enumeration
        • Users
        • Groups
          • GPO's
        • Shares
        • Domain
        • Trusts
        • ACL
    • Movement
      • Credentials
        • Dumping
          • DCSync
          • DPAPI Secrets
        • Making a Target List
        • Spraying
        • Powershell Remoting
      • Kerberos
        • Kerbrute
        • Kerberoasting
          • Semi-Manual Way
          • Targeted Kerberoasting
        • ASREProasting
        • Forging
          • Golden Ticket
        • Overpass The Hash
        • Pass The Ticket
        • RBCD
        • noPAC
      • MITM / Coerced Auths
        • LLMNR, NBT-NS Poisoning
        • PetitPotam
      • DACL Abuse
        • AddMember
        • ForceChangePassword
      • Trust Abuse
        • ExtraSIDs
      • ADCS
        • ESC1
      • Printers
        • PrintNightmare
    • Tools
  • Networking
    • Theory
      • Types / Topologies
      • OSI & TCP/IP Models
      • TCP / UDP
      • MAC Addresses
      • IP / Subnetting
      • Proxies
      • ARP
    • Pivoting
      • Port-Forwarding
    • Commands and Utilities
    • Techniques
  • WEB
    • Web Recon
      • Fuzzing
    • DNS
  • CLOUD
    • Google GKE/GCP
      • Theory
Powered by GitBook
On this page
  • The Hacker Manifesto
  • Motto
  • How to Become Hacker
  • Media
  1. Welcome wanderer

Hacking Philosophy

Some my thoughts on hackers as general, and how to become one

The Hacker Manifesto

Loyd Blankenship had been involved with several prominent hacker groups in the early 1980s, including the Legion of Doom (LoD). In 1986, after his arrest for unauthorized computer access, he wrote the manifesto in a burst of emotion — more as a personal reflection than a call to action.

For me it's perfect representation of hacking culture, especially then, when it was more punk-like.

                               ==Phrack Inc.==

                    Volume One, Issue 7, Phile 3 of 10

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
The following was written shortly after my arrest...

                       \/\The Conscience of a Hacker/\/

                                      by

                               +++The Mentor+++

                          Written on January 8, 1986
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

        Another one got caught today, it's all over the papers.  "Teenager
Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"...
        Damn kids.  They're all alike.

        But did you, in your three-piece psychology and 1950's technobrain,
ever take a look behind the eyes of the hacker?  Did you ever wonder what
made him tick, what forces shaped him, what may have molded him?
        I am a hacker, enter my world...
        Mine is a world that begins with school... I'm smarter than most of
the other kids, this crap they teach us bores me...
        Damn underachiever.  They're all alike.

        I'm in junior high or high school.  I've listened to teachers explain
for the fifteenth time how to reduce a fraction.  I understand it.  "No, Ms.
Smith, I didn't show my work.  I did it in my head..."
        Damn kid.  Probably copied it.  They're all alike.

        I made a discovery today.  I found a computer.  Wait a second, this is
cool.  It does what I want it to.  If it makes a mistake, it's because I
screwed it up.  Not because it doesn't like me...
                Or feels threatened by me...
                Or thinks I'm a smart ass...
                Or doesn't like teaching and shouldn't be here...
        Damn kid.  All he does is play games.  They're all alike.

        And then it happened... a door opened to a world... rushing through
the phone line like heroin through an addict's veins, an electronic pulse is
sent out, a refuge from the day-to-day incompetencies is sought... a board is
found.
        "This is it... this is where I belong..."
        I know everyone here... even if I've never met them, never talked to
them, may never hear from them again... I know you all...
        Damn kid.  Tying up the phone line again.  They're all alike...

        You bet your ass we're all alike... we've been spoon-fed baby food at
school when we hungered for steak... the bits of meat that you did let slip
through were pre-chewed and tasteless.  We've been dominated by sadists, or
ignored by the apathetic.  The few that had something to teach found us will-
ing pupils, but those few are like drops of water in the desert.

        This is our world now... the world of the electron and the switch, the
beauty of the baud.  We make use of a service already existing without paying
for what could be dirt-cheap if it wasn't run by profiteering gluttons, and
you call us criminals.  We explore... and you call us criminals.  We seek
after knowledge... and you call us criminals.  We exist without skin color,
without nationality, without religious bias... and you call us criminals.
You build atomic bombs, you wage wars, you murder, cheat, and lie to us
and try to make us believe it's for our own good, yet we're the criminals.

        Yes, I am a criminal.  My crime is that of curiosity.  My crime is
that of judging people by what they say and think, not what they look like.
My crime is that of outsmarting you, something that you will never forgive me
for.

        I am a hacker, and this is my manifesto.  You may stop this individual,
but you can't stop us all... after all, we're all alike.

                               +++The Mentor+++
_______________________________________________________________________________

Motto

My personal motto is "Quo Non Ascendam", which is

To what heights can I not rise?

Which in easier words is just "What limits can truly contain me?". Which symbolizes

  • Unbounded curiosity

  • Defiance of imposed limits

  • Relentless drive to explore, understand, and control systems

How to Become Hacker

To clarify from beginning, I am also working on to becoming a hacker (no job = no title I think), but I am learning for more than 3 years slowly and not, so I was boiling in this culture for quite some time. So basically if you think about hacking as a career, you need to view your past life and think about whether you have these 4 traits

  • Passion for Problem-Solving

  • Unquenchable Curiosity

  • Dogged Persistence

  • Out-Of-The-Box Thinking

If you don't have more than one, then think more about if you really want to spend a LOT time, and insane amount of effort to get into field, and actually get a job in cyber, ESPECIALLY in offensive side of it.

But if you are, and think you could be the one who will go to the end, then I recommend to start in TryHackMe, that's an insanely good platform from absolute zero knowledge, where you can spend basically good year or more of learning. Also it's pretty cheap and has a lot of free rooms.

Then I would recommend to begin to learn in HackTheBox Academy, because comparing to other platforms, it has modules (principle of learning which is basically books + practice) with insane quality of materials. Also CBBH and CPTS are relatively cheap, same thing with certificates, which would help you test your skills and will increase chance of getting a job.

Important part is combining theory with practice, because hacking is all about learning + doing, so by doing some easy challenges in TryHackMe once or twice in a week you will retain interest in the topic, because no matter what the theory is, it is easy to overlap it. When you're knowledge will become broader, you can try crack some active machines on HTB

Also what kickstarted my learning 3 years ago is team. I was looking for fellas in CTFTime, some russian CTF team allowed me to join them, where members recommended me TryHackMe and HackTheBox.

Before that I was doing lame courses and cringe YouTube videos on "How to become Hacker in 1 hour", so you can guess that I didn't learnt a lot then ;)

So the point is - find a team, some Discord servers (as example of purplestorm server, or THM's with HTB's) or guys to hang out with, because hacking is super niche topic, not a lot of programmers or regular IT guys would truly understand what you do, and that's why hacking is a lonely road — be ready that nobody would be interested in your craft as much as you do, and not so much people would understand what do you actually DO. And that's why it's important to find team, community, and someone who you can learn from. That's more funny and more effective:

If you want to learn piano, go to pianist. If you want to learn art, go to artist. If you want to learn hacking, ask hackers. Want to learn some craft, go to Craftmaster.

And the last one important thing, which almost denies all my yap here, but:

Forge your own path, this is how I learnt what I know and what you can see here, in this project, but you are different, so just Learn, Adapt, Advance. Don't listen to anybody fully, and do what you want. Only with persistence of Sisyphus you can become master.

Media

That's not important at all, but if you want to get more into hacking as culture, you can try watch these movies, and play these games.

Awesome old-school movie about hacking culture.


Stylish German movie about hacking, which reminds me of Fight Club


My favorite series of all time, actors, music, story, themes, directing — everything is pure perfection.


Very good series of games, the most popular games about hackers. Fan of two first games, third was mid

First game is techno-thriller with Open-World Third-Person Shooter gameplay, which would make you feel like John Wick Hacker.

Second game is more fun, have more creative deep gameplay, and the vibe reminds me the Hackers (1995) movie, when it wasn't about gritty black hoodie criminals, but about geeks who's smart, rebellious and ambitious (which as I think represent hacking culture perfectly)


Love Westerns and Mysticism - Weird West

Love Dark-Steampunk - Dishonored

Love Sci-Fi and Alien - Prey

Love Cyberpunk - Deus Ex


Both are very good stealth games, which are practicing creative thinking and stealth planning, which is required for our job. Splinter Cell is good for grounded stealth missions as secret agent (I know that MGS is good, but I've never played it by now, so can't recommend), and Hitman is good for social engineering skills with creativity, which is also required for job.


Here everything is simple, these are the best puzzles in industry, which is good for brain which is good for hacks.


This is the best hacking sim, it will teach you basic terms, even a little linux commands

PreviousBibliothequeNextUseful Links

Last updated 2 days ago

But after Full-Scaled Invasion on Ukraine, I burned the bridges with them, and then after some time after sending requests to all HTB Teams with cool logos and names, ended up taking me in, and I am infinitely grateful to it, and especially our captain - (you may have seen his awesome handbooks repository), because he helped me quite a lot on making me forge my own path, so basically thanks to my Mentor.

For all these games I can say almost same things in terms of how they are good for you as potential hacker, and these reasons is genre — . Genre that could train challenge your out-of-the-box thinking (Prey is especially good at that point). If you don't know where to start, it's simple

and Series

,

purplestorm
syr0
Hackers (1995)
Whoami (2014)
Mr. Robot (2015-2017)
Watch_Dogs
Deus Ex Human Revolution
Deus Ex Mankind Divided
Dishonored
Dishonored 2
Prey (2017)
Weird West
Immersive Sim
Hitman
Splinter Cell
Portal 1 & 2
Talos Principle 1 & 2
Hacknet
Image from HTB Blog