Hacker

The Diary of a Hacker (Prologue)

Why a beginning? There has never been a beginning! It has always been with me. I don’t know why, I don’t know where or when it all began. I just know that it’s been with me for a while. So forget about a beginning. I’d like to start from the middle:

A Command prompt opens. color 0a. Other colors just dont suit my style. net view. Holy crap all these computers are on LAN? Let’s try something new…

wait… I look around. The teacher is teaching other students. I’m in level 3 so he doesn’t bother teasing me much. I should know what I’m supposed to do after all (even though I didn’t actually TAKE levels 1&2, I skipped them!!) So I guess I should be fine…

This is High School and Computer Science doesn’t have many fans. People think of Firefox as an operating system. “Internet Explorer” is the same as “Internet”. A command prompt MEANS a hacker. a “Tree” command MEANS hacking to an international database!

However, there is still a class in which people learn computer science level 2! but there are only 8 of us in this classroom: an Asian guy with glasses and pimples all over his face, he browses for jokes on his computer all the time. The other guy: Asian again, but this one has neither glasses nor pimples. He just sits quietly by himself in the corner all the time, does his homework. Good kid. Very depressing that someone with his talents doesn’t like computer science. Another guy: Weird face, glasses, straight hair but no asian eyes. Looks Bulgarian or something: Dubstep, Break Dance, a novel with a circuit on its cover, a tuned voice, as if a robot is speaking. This is all I can remember from him, but I expect much more. We have some of the stuff in common, just some, but this guy, with all these technology themes floating around him, doesn’t like programming either. Why?? Aren’t the computers cool enough for someone like you??

“Laziness triggers this boredom.” My brain answers me.

Other one is a Nerd-looking one: Reminds me of the genius kid in “Meet The Robinsons” Another talented-looking kid. However, he likes to spend his time playing Mario rather than some real-deal programming!! Why??

“You just don’t get it do you?” My brain replies. His words make me hate him because he’s always right.

The others don’t even count: A Paki who does his World History homework during CS classes, and the other one is just… not there.

These are all level 2 students.

Level 3 has even fewer students. Guess how many? only… 2. One of them is me, and the other one…

No luck on that one either, even tho hes level 3.

The other level 3 student is from Bangladesh, a stupid, weird, nerdy guy who spends his time watching classic movies and looking for fashion designers. He doesn’t understand a crap out of computers. All he does is what his parents tell him to do. He can’t write a single algorithm, and so far he’s survived because he’s been cheating from my hand.

All these thoughts pass through my mind. So who am I? Why am I sitting here? Do I deserve to be with these people?
I had the answers: I’m not a weirdo, not a dubstep dancer, not a nerdy asian. I’m just the one that actually LOVES computer science and ENJOYS being here, in this class. And I’m sitting here because I thought that this class is supposed to teach us about computers (and it did, however, in a VERYY BOOOORIIING WAY!) if I was a regular student like them, I’d give myself the right to hate that class. I mean, 8 students overall (from which one of them is mentally retarded!) + 27 stupid computers to be programmed with a language like JAVA! and some lessons such as Trees and Sorting and Searching and GRID WORLD! (WHY???) for a student who has just started exploring the world of computers. Such great beginning! I don’t blame them…

That’s why I hate beginnings, so I started from the middle: Command prompt, color 0a, net view, and all those computer names appeared. I was facinated again, I was totally thrown out of my own world.

Being thrown out of the world… such familiar feeling. I’m never where I’m supposed to be. My mind flies: it flies all over the place. The only thing that keeps it in one place is a screen full of code.

All my world was that Black-and-green command prompt now. shutdown \\computername. A whole lot of text, which means wrong syntax. Looking through the help… GOTCHA!

Went to my friends computer: The pimply asian guy. Computer > Properties, wrote down his computer name on my palm with a pen. Back to my own. Shutdown /r /f /m \\D97618. 10 seconds pass. Network address not resolved! Crap… well who cares imma just try random computers displayed by net view. shutdown … shutdown … shutdown … shutdown …

meh! Nothing is happening! I pressed enter and the last shutdown command was hopelessly entered… Another failed experiment…

Teacher’s voice rises: “hmmm… What is this? Windows shutting down in a few seconds? Why?”

I looked at his face, then back to my screen, again at his face, then back to my screen. I didn’t mean to do it!!! And while my brain thought hidden, my tongue shouted the truth. The white hat on my head made me confess.

You can guess my teacher’s reaction: He didn’t like it, even though I was his best student. Even though I revealed a security threat to him which he could fix later. He told me not to tell anyone. Sure I wont… (Evil laugh!)

But why couldn’t I shutdown my friends computer?? I take a look at those names again. His computer name is not on the list, neither are all the other computers’ in that room. So, what are these???…

The thought passed from my mind like a thunder, shaking my entire body. “They better not be all the teachers computers…”
For the first time, I had experienced the sweet taste of power… The Power Of A Hacker…

It was so sweet that I came home and started this Diary, without a single ray of hope for anybody to read it. I don’t write it for the others to read it, after all, how many people know what I’m talking about when I speak about the world of Black and Green? How many people know what I’m talking about when I say GUI? How many people even care about whether they know about these stuff or not? How many people like to read the Diary of A Hacker????

But I don’t write it because I want the others to read it. I write it because I feel like doing it. It’s so sweet that remembering those memories gives me a happy time, and writing them down, makes me even happier. That’s why I write about hacking: Simply, because I’m a Hacker!

Source of Hacking Communities & Resources

Artemis V0R73X Is Here…
There are several topics I want to talk about in this post:

 

>>>Topic 1: Story of Hacking Community: What it was, and what it is now.

Let us travel back in time, back to 30 years ago, back to 80s, where hackers were the the source of all the revolutions that happened in the computer world, when hackers were the mysterious, prodigy people who could work with a UNIX operating system, code in assembly, do amazing thing with software AND hardware, and play with a commodore 64 computer!

Back in those times, a Hacker was someone who was an expert in working with computers. Hackers were the geniuses who knew software, hardware, everything about computers. Why did they exist? Because there was something in a computer that doesn’t exist in ANYTHING ELSE: The power, the perfection, and the view of the future that it gives us.

Hackers lived in an underground world (meaning, public didn’t know much about them), writing low-level code in the black-and-white MASM IDE (or Vi!), executing commands in the black & green environment of UNIX shell, listening to 8-bit chiptune music, dreaming in binary, thinking in digital, cracking software, hacking to the computer networks, doing what they really LOVED to do.

IT WAS JUST THEIR THING! NO MONEY NO PROFIT NO NOTHING INTO IT! THEY JUST LOVED IT!

But it was all because, well, companies didn’t care about security much. The ones who cared were the curious ones. When Commercialism Took Over, it all ended because then those curious people saw some profit in what they were doing, and once you get involved with the job, you lose all the ambition, cuz you thing that’s the happiness, that’s it you’re paid for what you know.

Security Became Important. Money Came Into Consideration. All The Hackers Turned Into Security Professionals. So it’s just an It was an inevitable event that couldn’t be helped. (I mean, even Dr. Mudge works for the government now, and Kevin Mitnick wears a shirt that says “I’m not a hacker, I’m a security professional!” !!!). The ones that didn’t turn into security professionals (instead of liberal hackers) were just probably some script kiddies who didn’t have valuable knowledge to be paid for.

It’s just like Linkin Park. At first days when they started everything, they were some bad-ass Nu-Metal band, but as they became famous, they turned into some kind of soft alternative rock band that doesn’t even compare to the old Linkin park. Money debases the quality into everything.

And then it was the literature that killed it. Government saw it necessary to scare people away from knowledge regarding security. Nowdays, if u use the old term Hacker, everyone will interpret it as Cyber Terrorism. I feel sorry for the change in the meaning of the term….

However…

NOTHING HAS CHANGED SO FAR.

I thought Hacking was vanished, I thought nobody really cared about the old dark underground world in which the smartest people did unbelievably amazing things.

I used to think that Hackers have always been egocentric. I thought they were an extinct specie. I thought they were some alone individuals living and learning on their own, and that was my reasoning for not finding many hackers around.

BUT I WAS WRONG!
NOTHING HAS CHANGED SO FAR
!

THERE ARE STILL TRUE HACKERS, AND THEY DO ASSEMBLE, AND THEY STILL DO CRAZY THINGS! THERE ARE STILL PEOPLE WHO CARE ABOUT HACKING, AS IF IT’S STILL 90s.

Hackerz Are Not Extinct, u just gotta find them!

and well, it’s true. Let’s face the truth: We’re still very obsolete regarding the issue of security. With all that ambition taken away, what can security professionals do? We still NEED hackers.

Evidence? Take a look at Windows, the most used operating system of all time (so called modern!) almost EVERY ORDINARY PERSON uses Windows as the main OS. Now we were celebrating the success of windows in making the users happy, then we realize that a virus, called Stuxnet, has exploited not only one, but FOUR different security bugs in windows and is able to cause PHYSICAL damage!!!

And this was in 2010.

Do I need to mention Flame as well? Or Flashback? Or the 10,000 Twitter accounts leaked? Or the IBM main website being hacked? Or SSL vulnerabilities being exploited everyday? AND THIS IS ALL IN 2012! OUR DAY!

So we still have hacking…

We’ll have more. Nothing has changed. Mac computers were considered to be invincible, but the only reason for which they were secured was because it didn’t get the attention of hackers. We see bugs being exploited in 2o12 on Mac computers!! And this is an Operating System created by a whole bunch of professionals…

HACKERS ARE STILL AROUND, NOT EVEN A FEW, BUT A WHOLE BUNCH OF THEM!
AND THAT’S WHY I’M WRITING THIS POST!!! ARTEMIS V0R73X HAS RISEN TO FIND EVERY SINGLE ONE OF THESE COMMUNITIES, AND LIST THEM HERE. EVIL OR GOOD, ALL SHALL BE WRITTEN DOWN.

 

>>>Topic 2: Why don’t hackers just create websites and start sharing exploits and hacking tutorials?

The exploits shared online are always the ones for white-hat and ethical hacking purposes. You can’t use them in a real effective way because they’re all patched before by the security professionals. In fact, the purpose of them being published online was to make the bug be patched.  Why? I mean, if you try to publish it online for the bad guys, obviously, before you get your hands on the exploit, the security professionals have already found out and patched the bugs. The only malicious use you could possibly get from online-published exploits is when you’re always on check and someone finds a 0day exploit and you are alerted as soon as its published.

In this case, well, you’ve got a couple of days to enjoy the exploitation while the good guys are patching it.

Tl;DR: DONT WASTE TIME LOOKING ONLINE FOR EXPLOITS! THE ONLY ONES THAT WILL
ACTUALLY WORK ARE THE ONLY ONES THAT YOU WRITE BY YOURSELF, EXPLOITING 0DAY
BUGS YOU FIND YOURSELF, and that’s exactly what hackers mean by ‘being a real hacker‘.

 

>>>Topic 3: There’s no unified underground world of hacker, but there is an underground.

well, you keep hearing this term ‘Undergound’. Ever wondered what exactly it means?

Basically, any Private place (like an IRC channel, a bulletin board, or a private website, or even a physical place for meetings) where hackers can come together and communicate without being noticed, which also means that me and you can’t get our hands on them, is part of the Underground. They all together create the entire Underground world of Hackers. Private means private. You can’t join. You can’t just go there and be part of the underground, unless, somehow, you find one of these places and proof that you’re harmless. But yes they do exist, they’re just not ONE SINGLE place.

But remember that Underground, in the hacking world, is not a UNIFIED THING. The only UNIFIED UNDERGROUND I see these days is thepiratebay.org, or similar free torrent sharing websites, and well DEFCON is considered underground, too. Other than these, Underground is a world created by little private communication centers here and there. You yourself can create one with a bunch of talented kids you know around, and be part of the underground. Or even create a blog and start blogging, blogs are kinda private, even if submitted to a search engine.

THIS IS UNDERGROUND WORLD: Hackers here and there, even may not know each other. Don’t be looking for such thing as www.Underground.com, because that’s just… dumb. Also this post is for this purpose itself: Knowing more about the underground. Lots of stuff posted here are not necessarily white-hat, ethical, and official. They’re not PRIVATE, but still…

 

>>>Topic 4: The V0R73X BlackList
So this is it people, the Underground I know!! xD

This list is not updated, but instead, I update a text file on dropbox whenever I find another resource. For the complete list, download this:

https://www.dropbox.com/s/k1pz4l7zqovm6i3/Source%20of%20Hacking%20Communities%20%26%20Resources.txt

Also if you want to get updated whenever I update this, here’s link to a public folder on my Dropbox which contains all the CRUX sources, including this one, so all you have to do is to add it to your dropbox, so it updates & notifies you automatically, like we’ve shared a folder:

https://www.dropbox.com/sh/5p6xarck90vwm5p/uonkijTvsp/CRUX%20Source

For a demo of what I’ve been writing before I found the Dropbox solution, well here it is, and Hell, it looks much better:

 

Communities, HackerSpaces & Hacking Groups:

A) Legal ones:

www.defcon.org:  DEFCON is the greatest hacking community of all time (DONT use the forum for technical discussion, DONT do what I did!!! That’s just not right.)

www.shmoocon.org: Just another hacking community about which I don’t know much but I know that Dr. Mudge once gave a speech in one of their conferences.

summercon.org/: They all end with CON, huh??? xD well, CON just means Condition, but they all came from the word DEFCON (kinda like Foobar) and yes this is also another community + speeches, party, competitions & lots of fun…

www.blackhat.com/: Black Hat was established by the same guy who found DEFCON, but DEFCON is kinda bigger.

http://www.hope.net/, http://hope94.hope.net/, http://thenexthope.org/, http://www.thelasthope.org/: Hackers Of Planet Earth, just another hacking community:

http://www.thehackersconference.com => International Conference of Hackers, this one is kinda gay compared to others but,… meh, anyway its another one.

http://www.rhok.org/: Random hacks of Kindness. A bunch of people gathered together for purpose of Good Hacking:

https://www.noisebridge.net/: A Hackerspace which has gathered bunch of people interested in computers & electronics who invent some neat stuff (like brain-controlled RC Helicopter)!

Now about the “not official” ones, they exist in 3 categories: Old Hacking Groups, Modern Hacking Groups, and Warez Groups (Crackers & Pirates)
Modern ones like Anonymous, SwaggSec, LulzSec, TeaMp0is0n, etc. Old ones like l0pht, cDc, rhino9, etc; (there were less old-school hacking groups, more individuals back in the old days, such as Mitnick, Poulsen, Lamo,…), and Warez groups like Razor1911, RELOADED, and SKiDROW.

B) Illegal groups:

For a list of Hacking groups & communities, Old & Modern, refer to This Page, or This Page.
For a list of Warez groups, Goto THIS PAGE. (these are the people who crack & pirate software instead of hacking actual computers/systems)
For a list of Hackers (like, the people! Black & White!) go Here, or Here.
For a list of Hackerspaces (like where a bunch of dedicated people meet and build things) HERE and HERE.

 

Online Resources, News & References:

www.thehackernews.com => Hacking News Website. Introduces new attacks, but does not share the exploit (usually) but you can read the topic and then use google to find out more about it. An Anonymous-type hacking website.

http://nakedsecurity.sophos.com => Exploits & Security news. Another website that ACTUALLY talks about specific exploits.

http://www.h-online.com/ => Security & programming news website

http://www.zone-h.org => All the hackers submit the defaced websites here, just to show their swag!! xD

http://threatpost.com => Kaspersky Labs News

 

Some Blogs, Websites & E-zines:

Websites:

NOTE: Think about it: is it good to share an exploit online? I mean, obviously, before you get your hands on the exploit, the security professionals have already found out and patched the bugs. that’s why exploits shouldn’t be published online if you have malicious uses for them! That’s why you have to FIND exploits yourself, that’s how you can be a real hacker. Therefore don’t expect the exploits you find online to work, unless you’re always on check and someone finds a 0day exploit and you are alerted as soon as its published. In this case, well, you’ve got a couple of days to enjoy the exploitation but basically the exploit being published online means the vulnerabilities being patched asap. so…

http://www.exploit-db.com => Source of all discovered exploits shared publicly. So this is not much of use if you’re gonna have malicious plans for those exploits, unless you get them before they developers release the patch. Anyways a good resource for ethical/white hat hackers…

http://phrack.org => AWESOME Hacking magazine. I EXTOL them for the stuff they publish about hacking. Very neat stuff.

http://www.securitytube.net => Full of video tutorials, about all kinds of hacks.

http://insecure.org/ => News & Tutorials! Haven’t had time to explore it yet, but it looks pretty legit.

http://seclists.org => Looks just like insecure.org, but has some other stuff!

http://www.offensive-security.com => Blog, Tutorials & More.

http://www.hackchina.com => Another good hacking resource in which exploits are shared.

http://www.gedzac.com => Another website that teaches hacking material in a very advanced level!!! It’s in spanish tho, just use Google Chrome translator…

Blogs:

http://attrition.org/fuck/ => Another awesome hacking magazine!

http://infinityexists.com/ => AWESOME blog which posts about hacking stuff…

http://sysc.tl/ => ANOTHER GOOD ONE!

http://www.get-root.com => Another good one!

http://hexale.blogspot.com/ => GREAT BLOG DUDE!

http://www.breakthesecurity.com/ => Found it very useful! xD

http://geneisdatabase.wordpress.com/=>Another Blog. Programming, and some hacking….! xD

http://blog.markloiseau.com/ => More programming, but AWESOME programming!! Low-level, close-to-machine, hacker favorite! xD

http://greyhat-security.com => Don’t know much about it but I guess it’s a good one.

http://www.koders.com/ => Some neat code is shared over there. Not bad to have a look at…

http://cyber-killers.com => Looks good. Contains good stuff, too…!!!

http://soldierx.com/ => This is kinda a well-known one.

http://py1337.get-root.com/ => The Python Guy!!

http://pythonlabs.blogspot.com/ => The OTHER Python Guy!!!!!

http://hansatan.com => Nice theme bro!

http://diablohorn.wordpress.com/ => Another good one… w8, is it called Diablo Horn??? Nice name…!

http://www.thexero.co.uk/ => The Xero! Weird name, but it’s cool at the same time… xD

http://h.ackack.net/ => Another good security blog.

http://bubzuru.comule.com/ => This guy used to be an amazing malware coder, but he got on drugs… so sad!

http://www.mattandreko.com/ => Another one…

http://g0tmi1k.blogspot.com/ => Another one…

http://mandeeplubana.blogspot.com/ => Just another one…

 

Youtubes:

http://www.youtube.com/user/L2DragonHunter/featured

http://www.youtube.com/user/mushroomHEADBANGERS/featured

http://www.youtube.com/user/gigafide (official website: tinketnut.com, with also facebook/twitter pages, but I found the ytube account most useful)

http://www.youtube.com/user/onlivegamer

 

Active Forums:

http://www.hackcommunity.com

http://evilzone.org/

http://securityoverride.org

http://www.hackforums.net

http://intern0t.net/

http://programisiai.lt/

http://teamxpc.com/

http://iexploit.org/

http://hacktalk.net/forum/

 

Challenge websites (Online Hacker Warz):

https://www.wechall.net/

http://exploit-exercises.com/

http://hax.tor.hu/welcome/

http://trythis0ne.com/

http://www.hackthissite.org/

http://netwars.info/

http://intruded.net/

http://www.overthewire.org/wargames/

https://cybersecuritychallenge.org.uk/index.php

http://hackquest.com/

http://www.try2hack.nl/

https://www.hacking-lab.com/

http://fc4.me/

http://coderace.me/

http://smashthestack.org/

http://www.pythonchallenge.com/

http://capture.thefl.ag/

http://wargame2k10.nuitduhack.com/

 

The Hacker Manifesto

Another one got caught today, it’s all over the papers. “Teenager Arrested in Computer Crime Scandal”, “Hacker Arrested after Bank Tampering”…

Damn kids. They’re all alike.

But did you, in your three-piece psychology and 1950′s technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him?

I am a hacker, enter my world…

Mine is a world that begins with school… I’m smarter than most of the other kids, this crap they teach us bores me…

Damn underachiever. They’re all alike.

I’m in junior high or high school. I’ve listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. “No, Ms. Smith, I didn’t show my work. I did it in my head…”

Damn kid. Probably copied it. They’re all alike.

I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it’s because I screwed it up. Not because it doesn’t like me… Or feels threatened by me.. Or thinks I’m a smart ass.. Or doesn’t like teaching and shouldn’t be here…

Damn kid. All he does is play games. They’re all alike.

And then it happened… a door opened to a world… rushing through the phone line like heroin through an addict’s veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought… a board is found. “This is it… this is where I belong…” I know everyone here… even if I’ve never met them, never talked to them, may never hear from them again… I know you all…

Damn kid. Tying up the phone line again. They’re all alike…

You bet your ass we’re all alike… we’ve been spoon-fed baby food at school when we hungered for steak… the bits of meat that you did let slip through were pre-chewed and tasteless. We’ve been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert.

This is our world now… the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn’t run by profiteering gluttons, and you call us criminals. We explore… and you call us criminals. We seek after knowledge… and you call us criminals. We exist without skin color, without nationality, without religious bias… and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it’s for our own good, yet we’re the criminals.

Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for.

I am a hacker, and this is my manifesto. You may stop this individual, but you can’t stop us all… after all, we’re all alike.

——————————————————————————————

This article is written by a Hacker called ++The Mentor++ in Written January 8, 1986. It’s also called “The Conscience of a Hacker”… I will say no sentence but one: “The Article That Changed My World And Made Me Who I Am Today”…!