Tactics and strategy for novice hackers.



  • I will tell many novice hackers some aspects of choosing tactics and strategies for the subsequent acquisition of experience. To begin with, I would like to tell you who hackers really are. You need to know this for yourself.

    Short story:

    The world history of hacking dates back to the 60s of the 20th century, when students at the Massachusetts Institute of Technology began to make the first manipulations with computer programs. It was then that the word "hack" came into use in a new sense.

    In the 70s there was a "crossing" of phreakers and hackers. Frickers hack telephone and telecommunication networks. Specialists in all kinds of microcircuits, loopholes in networks and inventions. It was the phreakers who contributed to the history of hacking. The founder of the freekers, Vietnam war veteran John Draper (known as Cap'n Crunch), discovered that the toy souvenir whistle he had found in the Cap'n Crunch oatmeal box made a sound with a frequency of 2600 hertz, matching the frequency of the electrical signal access to the AT&T long-distance telephone network.

    He built the first Blue Box with a whistle inside that whistled into the microphone of the phone, allowing you to make free calls.
    In the 80s, phreakers began to closely associate their activities with computers and hacking. The first electronic bulletin board systems, BBS, are emerging, where hackers exchanged their experiences. The first hacker groups begin to form; "Legion of Doom" in the USA and "Chaos Computer Club" in Germany.

    In 1983, 6 teenagers were arrested, calling themselves "gang 414". Within 9 days, they hacked into 60 computers, including the machines of the Los Alamos Laboratory for Nuclear Research.

    In 1986, the United States recognized as dangerous hackers for the government. Congress passed the Computer Fraud and Abuse Act, which made computer hacking a crime. However, it did not apply to minors.

    The first significant damage from the malware was the self-propagating Morris Worm. It was written by a student at Cornell University, Robert Morris. The worm crashed about 6,000 university and government computers across America, causing massive damage. According to him, he wrote the program in order to study the dissemination of information in the UNIX environment of the ARPAnet network, the progenitor of the Internet.

    The first high-profile story of cyber espionage was in 1989. Hackers from Germany, closely associated with the Chaos Computer Club, infiltrated US government computers and sold KGB data from there. Hackers were arrested, sentenced to probation and fines. One of them committed suicide.

    In 1993, during a live car quiz on one of the radio stations, the hacker Kevin Paulsen and his two friends blocked the telephone network so that only radio calls were made from them. So they won two Porsche cars, tours and $ 20,000.
    In 1994, with the growing popularity of the Internet (International Network), hacker tools moved there and became available for virtually everyone. A freeware hacker program called "AOHell" (America-On-Hell) has become a real nightmare for America Online, the largest Internet service provider.

    With its help, even the most advanced user could plant multi-megabyte mail bombs in AOL e-mail services and bring down spam streams in chat rooms. Later, such software became more and more popular, and in 1998 the hacker team "Cult of the Dead Cow" created the program "Back Orifice" - for hacking Windows 95/98 / NT. This powerful means of capturing control of a remote machine through a mishandled Trojan server.

    All of the above gives a clear definition of hackers, as professionals in computers, in software, in programming, in invention and in network protocols. Now this definition, unfortunately, does not reach many people who, in their opinion, engage in hacking and are far from the classical understanding of this activity. An ordinary person who has managed (and one doesn’t have to have a lot of mind for this) to order goods by credit card is called a hacker. All the same classic - there is a classic. Of course, now a generation change is taking place.

    Every year new computers and new software appear. You can’t keep track of all this, it’s impossible to keep up with the times, so everything is mixed up. Previously, this art was accessible to few people in Russia, and with the progression of the Internet, with the right training strategy, the necessary knowledge and experience can be achieved. Of course, not in a short time, to master this art a lot of free time is needed, it takes years, and some even decades.

    Where to start?

    This question torments many. Everyone reaches a certain level of professionalism and is "blown away." For more they are not enough. Because, in my opinion, they chose a fuzzy learning strategy for themselves. I repeat the word "stratum" in vain



  • Don t hate the player... hate the game


Log in to reply
 


LIVE Chat
Login in your account to Start Chat