Neophyte Haven: JPG - 36k

---------------------------------------------------

Everyone has to start somewhere, and since hacking will continue to grow and transform as technology progresses, there will always be newcomers. The purpose of Neophyte Haven is to present information that will help those new to the scene get started on their foray into the world of hacking and the computer underground. The best way to start, and continue, building your knowledge base is to read up on material that interests you. Try locating everything you can, on and offline, about hacking, computers, programming, cellular phones, whatever interests you. Then read it. Study it. Understand it. Never underestimate the power of knowledge - you can never know too much...lastly, a few of the informational texts below are outdated in terms of the technology discussed, so just use them to build your understanding of where technology was compared to where it is going today.

Regards,
Silicon Toad

Text Files: JPG - 5k Reading: JPG - 5k Useful Tips: JPG - 5k

.ooO Text Files | Further Reading | Useful Tips | HappyHacker Ooo.
.ooO Guide To (mostly) Harmless Hacking Ooo.

---------------------------------------------------

BEGINNER'S READING

* The Ethics of Hacking *
By Dissident - (6K)
* The Hacker's Handbook *
© 1985 Hugo Cornwall - (127K)
* The Hacker's Jargon File *
Version 3.3.1 January 25, 1996 - (507K)
* The Hacker Test *
By Felix Lee, John Hayes and Angela Thomas - (21K)
* How to Crack - A Tutorial *
By +ORC - (120K)
* The Newbies Handbook *
By PlowskĄ Phreak - (45K)
* A Novices Guide To Hacking *
By The Mentor - Legion Of Doom/Legion Of Hackers
Dec. 1988 - (43K)
* The Official Phreaker's Manual *
By The Jammer and Jack The Ripper, 1987 - (186K)
* The Ultimate Beginner's Guide To Hacking and Phreaking *
By Revelation (LOA - ASH) Written 4 Aug. 96 - (63K)
* Unix: A Hacking Tutorial *
By Sir Hackalot 1990 - (85K)
* Useful Unix Commands *
By Scott Walters - London, CANADA - (23K)


---------------------------------------------------

FURTHER READING

PHRACK Phrack is a long-time running hacking/phreaking oriented ezine. It is only published electronically, and, after recently changing editors, is is being published monthly. Back issues are available for download, which provide more than a wealth of information.
2600 2600 - The Hacker Quarterly is another hacking oriented magazine that is only available as a printed magazine. It generally tends to be more technically oriented, but it's been around since the 1980's and is another great source of information. You can generally find it in your local bookstore with or near the computer magazines, but check out their web site for more details. Published quarterly.
BOOKS The following should be available at any library or bookstore:

---------------------------------------------------

HappyHacker

The Happy Hacker Mailing List is something I stumbled upon while reading an issue of The Internet Underground magazine. The purpose of the mailing list and associated articles is to help educate the "newbie" in the arena of hacking - naturally the goal is to mold today's generation into understanding and reliable future system administrators...and the articles that Carolyn Meinel (Happy Hacker Moderator) writes do shed some light on basic hacking skills for the ultimate newbie. Visit the Hacker Forum online chat group, to partake in discussions concerning hacking, and submit questions about The Guide to (Mostly) Harmless Hacking, also by Carolyn Meinel. Below are the current volumes of the ezine for your perusal...and be sure to visit the above site for further information.

To subscribe to the mailing list, send an email to hacker@techbroker.com with the
message "subscribe hh".....that should do it.



Guide To (mostly) Harmless Hacking

GTmHH (Vol. 1 Number 1) How to finger a user via telnet.
GTmHH (Vol. 1 Number 2) How to forge email -- and spot forgeries.
GTmHH (Vol. 1 Number 3) How finger can be used as one of the most common ways to crack into non-public parts of an Internet host.
GTmHH (Vol. 1 Number 4) How get Usenet spammers kicked off their ISPs.
GTmHH (Vol. 1 Number 5) More on dealing with Usenet spammers.
GTmHH (Vol. 1 Number 6) How to nuke offensive Web sites.
GTmHH (Vol. 2 Number 1) Internet for Dummies - further issues will discuss several ways to get logged on as the superuser in the root account of some Internet host computers.
GTmHH (Vol. 2 Number 2) Linux for beginners.
GTmHH (Vol. 2 Number 3) Intro to TCP/IP - Oversized ping packet and denial-of-service exploit explained.
GTmHH (Vol. 2 Number 4) More on TCP/IP - Port surfing! Daemons! How to get on almost any computer without logging in and without breaking the law.
GTmHH (Vol. 3 Number 1) How to protect yourself from email bombs using procmail filtering.
GTmHH (Vol. 3 Number 2) Mapping the Internet using Dig, Whois, Traceroute and other utilites.
GTmHH (Vol. 3 Number 3) How to keep from getting kicked off IRC!
GTmHH
(Computer Crime Law #1)
Understanding computer crime law...will you get busted?

---------------------------------------------------

USEFUL TIPS

Tip #1: If you don't understand how to compress and decompress an archived file [ie. a zipped file (.zip)] then you really need to read a basic book on computing etc. before moving on. Believe it or not, I do get questions asking "...what viewer do I need to view the .zip files on your site?" You need pkzip and pkunzip 2.04...get it, understand it, use it.
Tip #2: If you're completely new to the realm of computer hacking and the underground, the only way to learn is to read...read...and read some more. Then experiment with what you start learning, and ask intelligent questions of those who may know the answers. There is no shortcut to learning to hack. It comes with understanding and hands on experience, trial and error and a little patience...
Tip #3: When you ask someone (another hacker) a question...don't be surprised if you get flamed for being a newbie or told to get lost. It seems the mentality of those who feel they know it all is to horde info and blast around on an ego rocket. Either way, just make sure you try and find out the answer and tap all other resources before asking for a blatant answer without attempting to answer it yourself. One aspect of hacking is being able to track down information, to solve a problem yourself using all the resources you can think of before going for the quick fix...research can lead to discovery...man, this is starting to sound like a documentary...
Tip #4: Learn a programming and/or a scripting language, preferably one that is Unix based (C++, Perl, JavaScript etc.) Learning to program and write scripts can be vital components in understanding the ins and outs of an operating system (OS) in order to exploit weaknesses and security holes etc. Understanding how to exploit a weakness can in turn teach you how to locate and patch them...that is, if you're not bent on malicious intent, that would be taboo...it's all about exploration and satisfying curiosity.
Tip #5: Learn and understand the Unix (or one of it's many flavors: Linux, OSF etc.) Operating System...it's the choice of the masses...
Tip #6: Encrypt data that you feel to be confidential in one form or another...kind of obvious huh...
Tip #7: Look before you speak. Asking a question before looking for the answer is definitely newbie material...especially when the answer is right in front of you. For example, I have people ask me where they can find plans for a Black Box etc. Weeeell, I do have a page devoted to that material, have you looked for it? Or did you have an itchy mouse trigger finger and hit the email button on the home page before looking through the site...? Eh? Comprende? It happens folks...seek and ye shall find, most of the time <grin>
Tip #8: Email bombing is not hacking. Generating credit card numbers is not hacking (and it's illegal). Using a hacked mIRC program on IRC is not hacking. They are being mischievous and having some fun. Too many people now-a- days think hacking is having a program...a program that either mass mails someone, or generates fake CC#'s etc. and it's not. They can be fun to mess around with, but don't get confused and start thinking that having and using such utilities is hacking...
Tip #9: Hmmmmmm...just had a brain spasm. I'll write more once the grey matter settles down....take it easy all...

---------------------------------------------------

Mentor's Last Words

"This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual,but you can't stop us all... after all, we're all alike."

+++The Mentor+++

---------------------------------------------------

Home Top silicon@netwalk.com Disclaimer

Copyright © 1995-1997 Silicon Toad
Thou Shalt Not Copy
silicon@netwalk.com
Latest Revision: 01.Apr.1997

  _________.___.____    .____________  ________    _______
 /   _____/|   |    |   |   \_   ___ \ \       \   \      \
 \_____  \ |   |    |   |   /    \  \/ |   |    \  /   |   \
 /        \|   |    |___|   \     \____|   |     \/    |    \
/  _____  /|___|________|___|\________/\_________/\  __|__  /
| /     \/         [   T    O    A    D   ]        \/     \ |
|(                                                         )|
('                                                         ')