Preface

Ok, lets get started. If you are going to hack, you must be doing this for a

reason. All hackers have their reasons for doing what they do. Most are just

hungry to learn. Most of what I have learned about unix, i have learned on

some service providers or someone else's machine. I am one for the 'hands on'

experience. There is much to learn and you would have to read 20,000 books

just to get what you would learn out of a few config files, a few admin email

messages, some .bash_history files, and some poking around a few systems.

Here in this manual you should learn how to be the 'complete hacker' and come

up with a style of your own. It will not take to long, but it will take some

practice and experience before you will be able to call yourself a hacker.

Not just anyone that can crack a password file, and log into a unix machine

can call themselves a hacker. Ok, you can get root access to a box! You still

are not a hacker! You need to know why you are a hacker first, and then have

your 'code' and 'style'. You need a purpose and a reason for hacking into any

box. The true hacker knows why he is doing what he does, and is doing it for

reasons like knowledge, free information, and ACCESS. The true hacker will

turn one hack into access to many different systems and providers and keep this

access for future learning and more FREE information.

The wan-a-be hacker will not be invisible, and will do many stupid things like:

delete or corrupt data, down the machine, run bots or irc clients from root

accounts or machines Give the passwords he cracked to everyone in the world

to prove they can hack. Or they might just do stupid things that will get

themselves cought. I think sometimes this is done purposely just to draw

attention to themselves so they can get cought and make the announcement that

they are a hacker, and they were here! A real hacker needs no such glory,

he just needs the access and wants to keep it and be invisible! He will not

tell many friends about the system, he will not give out the passwords or

accounts, he will keep others off so he can continue his access there and

keep it clean.

Here in this manual i hope that i can add enough style so that you can have

real heart in this matter and and be a good clean hacker.

Happy hacking ...WB01345_.gif (616 bytes)Next Page or

GET THE FUCKING TEXT FILE WITH ALL APPENDIXes AND UUENCODED FILE (Say Thanks to Invisible Evil)