background preloader

Hacking Help

Facebook Twitter

Tutorial Start Hacking - Hackers Dot NL. Throughout the site, you may see the term HDNL. This is an acronym for our community coming from: Hackers Dot NL. You are probably very excited to start hacking, and you should know that being a hacker is an adrenaline rush as well as fullfilling. To begin hacking, you need to learn a programming language such as(c/c++/perl/php/java) and study certain operating systems such as(windows NT,2000/Linux/Unix). Ask other hackers what they use and why, then choose one and stick to it. All 3 types of hackers may have detailed knowledge of system security and programming, but how they use their knowledge is what makes them very different. 1. 2. 3.

See the difference? After learning an advanced operating system, and/or programming, you will be able to understand how exploits work and how systems are compromised. HDNL can help you to advance your computer skills by providing a place to ask questions, read articles, and see how exploits work. Here is an example of a question you shouldn’t ask: 1. KernelHacking. How To Understand Programs for Password Hacking | How To Do Things. Password hacking may sound like an ominous thing to most people, who also believe that someone who may know how to do it can't possibly be up to any good.

On the contrary, it can actually be most useful for you or potential clients. You wouldn't know when you would need to hack your own email account in case you forgot your password, or an important client needs your help to crack a program password. Dictionary attacks. Most programs used for password hacking have this basic function, to scan the password and eventually find if the password used can be found in any dictionary. It tries all the possible combinations that could be a password and that can be found in the dictionary, and such a program can be given additional information on word modifications like using zeros instead of ‘o' or one instead of ‘I' and so on and so forth.

It will bombard the system with all these possibilities until the match is found. Password hacking is still a skill that not everyone can do. 2600: The Hacker Quarterly. Hacker (computer security) Bruce Sterling traces part of the roots of the computer underground to the Yippies, a 1960s counterculture movement which published the Technological Assistance Program (TAP) newsletter. [citation needed] TAP was a phone phreaking newsletter that taught techniques for unauthorized exploration of the phone network. Many people from the phreaking community are also active in the hacking community even today, and vice versa. [citation needed] Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree.

According to Ralph D. Clifford, a cracker or cracking is to "gain unauthorized access to a computer in order to commit another crime such as destroying information contained in that system".[6] These subgroups may also be defined by the legal status of their activities.[7] A grey hat hacker is a combination of a black hat and a white hat hacker. Rootkit.

Tools

Jargon File Resources. Welcome to freshmeat.net | freshmeat.net. Master Foo and the Ten Thousand Lines. Master Foo once said to a visiting programmer: “There is more Unix-nature in one line of shell script than there is in ten thousand lines of C.” The programmer, who was very proud of his mastery of C, said: “How can this be? C is the language in which the very kernel of Unix is implemented!” Master Foo replied: “That is so. Nevertheless, there is more Unix-nature in one line of shell script than there is in ten thousand lines of C.”

The programmer grew distressed. Master Foo replied: “All that you say is true. The programmer scoffed at Master Foo and rose to depart. The programmer muttered through his beard, contemplating what Nubi had written. “And how many hours would you require to implement and debug that C program?” “Many,” admitted the visiting programmer. “And who better understands the Unix-nature?” Upon hearing this, the programmer was enlightened. How To Ask Questions The Smart Way. In the world of hackers, the kind of answers you get to your technical questions depends as much on the way you ask the questions as on the difficulty of developing the answer.

This guide will teach you how to ask questions in a way more likely to get you a satisfactory answer. Now that use of open source has become widespread, you can often get as good answers from other, more experienced users as from hackers. This is a Good Thing; users tend to be just a little bit more tolerant of the kind of failures newbies often have. Still, treating experienced users like hackers in the ways we recommend here will generally be the most effective way to get useful answers out of them, too. The first thing to understand is that hackers actually like hard problems and good, thought-provoking questions about them. If we didn't, we wouldn't be here. Despite this, hackers have a reputation for meeting simple questions with what looks like hostility or arrogance. We're (largely) volunteers. Stupid: The Cathedral and the Bazaar. This directory gives you access to almost all of the contents of my evolving book, The Cathedral and the Bazaar.

Enjoy — but be aware that I have sold O'Reilly the exclusive commercial printing rights. The papers composing this book (like their topic) are still evolving as I get more feedback. I made extensive revisions and additions for the first edition of the book The Cathedral and the Bazaar, and expect to continue adding and revising in future editions. Even if you've heard me do the stand-up version, you may want to reread it. These papers are not `finished', and may never be. If you like these papers, you will probably also enjoy my How To Become A Hacker FAQ (also in the book). Here's the XHTML. My thumbnail sketch of the history of the hacker culture, maintained since about 1992. Here's the XHTML. Translations Here's the XHTML. You can download RealAudio recordings of the stand-up version of this talk from the Kongress (about the first 30 seconds is missing).

Forrest J. A Brief History of Hackerdom. Undergraduation. March 2005 (Parts of this essay began as replies to students who wrote to me with questions.) Recently I've had several emails from computer science undergrads asking what to do in college. I might not be the best source of advice, because I was a philosophy major in college. But I took so many CS classes that most CS majors thought I was one. I was certainly a hacker, at least. Hacking What should you do in college to become a good hacker? The way to be good at programming is to work (a) a lot (b) on hard problems. Odds are this project won't be a class assignment. Another way to be good at programming is to find other people who are good at it, and learn what they know. Some of the smartest people around you are professors. Don't be put off if they say no. Beware, because although most professors are smart, not all of them work on interesting stuff.

I never worked as a research assistant, so I feel a bit dishonest recommending that route. Math Everything But what's everything? Jobs Notes. Great Hackers. July 2004 (This essay is derived from a talk at Oscon 2004.) A few months ago I finished a new book, and in reviews I keep noticing words like "provocative'' and "controversial.'' To say nothing of "idiotic.'' I didn't mean to make the book controversial. Edisons There's no controversy about which idea is most controversial: the suggestion that variation in wealth might not be as big a problem as we think.

I didn't say in the book that variation in wealth was in itself a good thing. Variation in wealth can be a sign of variation in productivity. In a low-tech society you don't see much variation in productivity. That's not a new idea. Productivity varies in any field, but there are few in which it varies so much. If variation in productivity increases with technology, then the contribution of the most productive individuals will not only be disproportionately large, but will actually grow with time. More than Money Great programmers are sometimes said to be indifferent to money. Interesting. The Retrocomputing Museum. The Retrocomputing Museum is dedicated to programs that induce sensations that hover somewhere between nostalgia and nausea — the freaks, jokes, and fossils of computing history.

Our exhibits include many languages, some machine emulators, and a few games. Most are living history — environments that were once important, but are now merely antiques. A few never previously existed except as thought experiments or pranks. Most, we hope, convey the hacker spirit — and if not that, then at least a hint of what life was like back when programmers were real men and sheep were nervous. The curators of the Museum are Eric S. Raymond and John Cowan. If you've visited before, check out the what's new section. We link to Pete Friedrich's Spiked Punch project. We have acquired hardcopy manuals for IPL-V and SLIP and are looking into what it will take to get them scanned and OCRed. All these packages include documentation and example programs. Adventure Definition Language. Algol-60 Algol 68 apl-11 bloop mdk. The glider: an Appropriate Hacker Emblem. The Linux folks have their penguin and the BSDers their daemon. Perl's got a camel, FSF fans have their gnu and OSI's got an open-source logo.

What we haven't had, historically, is an emblem that represents the entire hacker community of which all these groups are parts. This is a proposal that we adopt one — the glider pattern from the Game of Life. About half the hackers this idea was alpha-tested on instantaneously said "Wow! Cool! " without needing any further explanation. If you don't know what a glider is, or why it would make a good emblem, or if you're dubious about having an emblem at all, read the FAQs page. I first proposed this emblem in October 2003. When you put the glider emblem on your web page, or wear it on clothing, or display it in some other way, you are visibly associating yourself with the hacker culture.

Yes, as of a mere four days after this proposal was floated, there are mugs and T-shirts. I used to have a prohibition against commercial use here. Hacking servers with network hacking tools. A virus used for network hacking is a bit different. Although it spreads in similar ways to Trojan horses (through email attachments or downloaded files from peer to peer networks), they cause havoc and destruction inside the network. A hacker will make use of this panic situation and try to enter the system while it's defenses are down. It may be considered a parallel to the siege strategies of ancient history, when cities were intentionally infected with diseases by their enemies. Worms are similar to viruses, but have a slight difference. They are self contained and do not require of other file, as a virus does, to infect a computer.

Hackers can even install a key logger for remote password hacking and the user will never know how they did it! What Tools Does He Use? If you are a hacker who just began his activities, it's most probable that you will download one of the dozens of free tools that are available in the internet. What Is The Damage When Automated Tools Are Used?