Knowing how to hack isn’t as easy as reading a text and downloading tools. You have to learn how it works and make some of your own tools. I am willing to help someone do this.
www.infosecinstitute.com/ Learn both offensive and defensive "Boot camp style" hacking training
www.seccuris.com/assessments Have Seccuris Test Your Security Before Hackers Do.
www.cortona-virginia.com/HighSchool Take The Lead In Your Childs Future Surround Them With Knowledge!
please tell me
i want to know how to hack it is my dream to learn..please help me.. am just new here..
I want you to teach me how to hack. I have a dream …
I will show you around, but I am not going to spoon feed you. Be sure you are willing to learn and try some stuff yourself
Just send me an email at: seraphgreyfox [at] gmail.com and we can talk on irc, aim, or msn (cause I am too lazy to get anything else, but maybe yahoo or icq)
ermm, i woz wonderin. can u teach how 2 hack e-mail adds, even 2 a total beginner?
Apparently your defintion of Hacker is about the same as everyone’s these days. Going on what the media tells you is a hacker isn’t the best thing to do. Here you go.
Hacker is a term used to describe people who create and modify computer software and computer hardware. Hacker has multiple meanings. In some programming communities, the term refers to people skilled in computer programming, administration and security with legitimate goals. The word is also used in a derogatory way in most communities to refer to someone who is relatively unskilled in programming. Most people in the popular media and some in the general population use the word hacker to mean what is called in most programming communities a cracker, that is, someone who partakes in illegal activity or lacks in ethics.
You are thinking of a cracker
A black hat or black-hat hacker (also called a cracker or Dark Side hacker) is a malicious or criminal hacker (see computer crime). The term hacker is also commonly used as a synonym for “black hat hacker”. However, in computer jargon, the meaning of “hacker” is much more broad.
Usually a Black Hat refers to a person who maintains knowledge of the vulnerabilities and exploits they find as secret for private advantage, not revealing them either to the general public or manufacturer for correction. Many Black Hats promote individual freedom and accessibility over privacy and security. Black Hats may seek to expand holes in systems; any attempts made to patch software are generally to prevent others from also compromising a system they have already obtained secure control over. A Black Hat hacker may have access to 0-day exploits (private software that exploits security vulnerabilities; 0-day exploits have not been distributed to the public). In the most extreme cases, Black Hats may work to cause damage maliciously, and/or make threats to do so for blackmail purposes.
Black-hat hacking is the act of compromising the security of a system without permission from an authorized party, usually with the intent of accessing computers connected to the network (the somewhat similar activity of defeating copy prevention devices in software – which may or may not be illegal depending on the laws of the given country – is actually software cracking).
TheMasterplan is not sure what to write here
Oh, pleaze help me.. Great one!!
i’d give you my email, but what if you hacked it? o.0
Could you point some good resources around the web? I think it’ll be good for me to learn how to find exploits and some things like that. You never know when you’ll need to use a darker hat.
And I’m tired of people asking me to hack someones box. I have only the basic skills of net security, so I don’t have a clue about the technics.
Notice, I’m not, and I don’t wanna be a script-kid. I’m a gentoo user, C/C++ programer, with basic knowledge of the Ps (PHP, perl, python), etc. I just don’t know how to move to the next step.
Well I have been referring people to http://www.textfiles.com/hacking/ and http://binrev.com/forums if you want to be part of a discussion about hacking/phreaking. I will say that I have little experience in actually finding vulnerabilities, but I suggest you go over to http://www.securityfocus.com/ and read about some vulnerabilities. Maybe after reading some of that you might get some ideas on what else could be exploited.
i really need ur healp, i entered some1’s computer using telnet but thn i hav no idea how to communicate with the victims user, can uplz help me?
Ok, if any of you you know how to use a RAT, try this… I infected this one dude/chick a little while ago…
Download prorat (www.prorat.net) and connect to 22.214.171.124 on port 5110 the password is nemesis (DONT EVEN THINK ABOUT CHANGIN IT BITCH)
Or just goto the ftp server I opened…
Please note that this dude/chick has to be on…. and no im NOT a script kiddie little bastards…