Why 3 at once? Because I have indeed read all 3 of them, and they share a common author, Kevin Mitnick. The hacker with a life story right out of a Hollywood movie. Don't believe me? Believe him, by reading the first book Ghost in the Wires, the Adventures of Kevin Mitnick as the World's Most Wanted Hacker! This book is amazing! First of all, it is an amazing story, which by being real it becomes even more chilling, staggering, and breathtaking! I remember how I had a more rebellious spirit awakened in me just by reading the, more than one, catch me if you can real stories that this book contains. Whenever I see the sentence "A Great Hacking Book" this one comes to mind. Not penetration testing, not information security, pure old classic Hacking!Damn Kevin. Tying up the phone line again. They're all alike. ?
[PDF] How to Hack Like a GOD: Master the secrets of Hacking through real life scenarios (Hack The Pl
I really like making lists and posting them online, I actually believe that someone somewhere may find some value in it, and that warms my heart.I am open to conversation, to chat about hacking stuff, coding, projects, movies, whatever nerdy actually.
I'll also write a little about what not to focus on so you don't get sidetracked because someone told you you're not a "real" hacker if you don't know assembly language. Obviously, learn about whatever interests you, but I'm writing this from the perspective of what to focus on that'll give you the most practical results when hacking companies to leak and expropriate. Basic knowledge of web application security [66] is useful, but specialising more in web security is not really the best use of time unless you want to make a career in pentesting or bug bounty hunting. CTFs, and most of the resources you'll find when searching for information about hacking, generally focus on skills like web security, reverse engineering, exploit development etc. This makes sense if it's understood as a way to prepare people for careers in industry, but not for our goals. Intel agencies can afford to have a team dedicated to state of the art fuzzing, a team working on exploit development with one guy just researching new heap manipulation techniques, etc. We don't have the time or resources for that. The two most important skills by far for practical hacking, are phishing [67] and social engineering for initial access, and then being able to escalate and move around in windows domains.
Hacking made me feel alive - it started as a way to self-medicate depression. Later I realized I could actually do something positive with it. I don't at all regret how I grew up, it's led to many beautiful experiences in my life. But I knew I couldn't continue living that way. So I started spending more time off my computer, with others, learning to open myself up, to feel my emotions, to connect with others, to take risks and to be vulnerable. It's far harder than hacking, but in the end it's more rewarding. It's still a struggle, but even if I'm slow and stumbling, I feel like I'm on a good path.
I think that hacking to acquire and leak documents in the public interest is one of the most socially beneficial ways that hackers can use their skills. Unfortunately for hackers, as for most fields, the perverse incentives of our economic system don't align with what benefits society. So this program is my attempt to make it possible for good hackers to earn an honest living uncovering material in the public interest, rather than having to sell their labour to the cybersecurity, cybercrime, or cyberwar industries. Examples of companies I'd love to pay for leaks from include the mining, lumber, and cattle companies ravaging our beautiful latin america (and assassinating the environmentalists trying to stop them), companies involved in attacking Rojava such as Havelsan, Baykar Makina, or Aselsan, surveillance companies like NSO group, war criminals and profiteers like Blackwater and Halliburton, private prison companies like GeoGroup and CoreCivic/CCA, and corporate lobbyists like ALEC. Be mindful when selecting where to investigate. For example, we all know that oil companies are evil -- they're destroying the planet to get rich. They've known that themselves since the 80s[69]. However, if you hack them directly, you'll have to dig through enormous amounts of incredibly boring information about their day to day operations. It'll probably be a lot easier to find something interesting by targeting their lobbyists [70]. Another way to select viable targets is to read stories by investigative journalists like [71], that are interesting but lack hard evidence. That's what your hacking can uncover.
What all this means is that we are in a different space now, one that is largely unfamiliar to us even when we think we are using familiar tools (like a "newspaper" that has never been printed or an "encyclopedia" vastly larger than any shelf of buckram volumes), and one that has begun life by going through rapid changes that only hint at what is to come. I'm not going to prophesy where that goes, but I'll sit here a while longer, watching the ways I really have come to "let my fingers do the walking", wondering where they will lead. 2ff7e9595c
Comments