Ok, lets get started. If you are going to hack, you must be doing this for a
reason. All hackers have their reasons for doing what they do. Most are just
hungry to learn. Most of what I have learned about unix, i have learned on
some service providers or someone else's machine. I am one for the 'hands on'
experience. There is much to learn and you would have to read 20,000 books
just to get what you would learn out of a few config files, a few admin email
messages, some .bash_history files, and some poking around a few systems.
Here in this manual you should learn how to be the 'complete hacker' and come
up with a style of your own. It will not take to long, but it will take some
practice and experience before you will be able to call yourself a hacker.
Not just anyone that can crack a password file, and log into a unix machine
can call themselves a hacker. Ok, you can get root access to a box! You still
are not a hacker! You need to know why you are a hacker first, and then have
your 'code' and 'style'. You need a purpose and a reason for hacking into any
box. The true hacker knows why he is doing what he does, and is doing it for
reasons like knowledge, free information, and ACCESS. The true hacker will
turn one hack into access to many different systems and providers and keep this
access for future learning and more FREE information.
The wan-a-be hacker will not be invisible, and will do many stupid things like:
delete or corrupt data, down the machine, run bots or irc clients from root
accounts or machines Give the passwords he cracked to everyone in the world
to prove they can hack. Or they might just do stupid things that will get
themselves cought. I think sometimes this is done purposely just to draw
attention to themselves so they can get cought and make the announcement that
they are a hacker, and they were here! A real hacker needs no such glory,
he just needs the access and wants to keep it and be invisible! He will not
tell many friends about the system, he will not give out the passwords or
accounts, he will keep others off so he can continue his access there and
keep it clean.
Here in this manual i hope that i can add enough style so that you can have
real heart in this matter and and be a good clean hacker.
Happy hacking ...
Next Page orGET THE FUCKING TEXT FILE WITH ALL APPENDIXes AND UUENCODED FILE (Say Thanks to Invisible Evil)