Hacker become a hacker

The hacker manual

the hacker manual is an article from manualdehacker.com. Please don´t be an anti hacker is better to hack, you can do to hack everything you want but  i´m not responsible about what you do. Okey? We start!




Hacker being a hacker

Hacker become a hacker image

the hacker manual
Hacker become a hacker  :  cybersecurity

Hacker highschool security awareness…

1. Introduction to be a hacker manual

Welcome to the Hacker Highschool! This manual is designed to encourage you to be well-rounded and resourceful. The hacker curiosity in you and to guide you progressively through your hacker education to help you grow into a responsible role, capable of determining security and privacy problems and making proper security decisions for yourself.





As a citizen of most countries, it is not only your right, but your responsibility, to report security and privacy leaks to the proper authorities. You do this not because you can, but because many other people can´t. You are helping those who can´t help themselves.

“This is what watchdog groups do. This is what you will learn to do”

1.1 resources hacker

This manual is about how to learn hacking, in reality, is a creative process that is based more on lifestyle. You have to learn yourself to recognized what you need to learn. It is much better for you to embrace hacker learning habits, which are probably the most vital part of hacking and will separate you from the script kiddie (a person who runs hacking tools without knowing how or why they work).





The words and concepts you don´t understand may require research on the web or in a library. Ignoring them will only make it difficult for you to understand concepts. This manual is the only one with a thorough explanation of how to research built into it, so be sure to spend as much time as you need to learn how to research using the various resources available to you.

Hacker become a hacker image

the hacker manual
Hacker become a hacker  : hacking code

Don´t just limit yourself because great hackers are well-rounded and creative. A lot of them are painters, writers, and designer. You can see The Prince by Machiavelli for an example as Political Science. You should be interested in how other businesses operate. Reading books on everything for example: Psychology, Science Fiction… This will make you a much more versatile and functional hacker.





The hacker must discover how his surroundings work to learn what types of vulnerabilities he has and be able to solve the problems that they can cause. Mainly the white hacker acts in good for the community.

1.1.1 resource hacker are books to learn hacking and another subjects

Want to know something about the fundamentals of a science, like the hardware details of your PC? Nothing will help you more than reading a current book on the subject. The main problem with books for computers is that they quickly become old. The secret is to learn to see the fundamental structure underneath the thin skin of details. MS-DOS and Windows are clearly different, but both are based on principles of Boolean logic that have driven computers since Ada, Countess of Lovelace, wrote the first computer programs in the nineteenth century.

Security and privacy concerns may have changed in the last 2,500 years, but The Art of War by Sun Tzu covers fundamental principles that still apply today.





It’s not necessary to start a library of your own, but you may want to write notes in margins or otherwise mark what you read, and this is something you can only do in your own books.

Hacker become a hacker image

the hacker manual
Hacker become a hacker  :  password cracked

Finally, don’t look at a book and give up before you even start just because of the size and complexity. Most of these massive tomes that you see sitting around are not read from cover to cover. Open one up to random page and begin to read. If you don’t understand something, go backward and look for the explanation (or skip forward to something that does make sense). Jump through the book, backwards and forwards, just as you would bounce from link to link in a web page. This type of non-linear reading is often much more interesting and satisfying for hackers, as it’s about satisfying curiosity more than it is about “reading”.

1.1.2 Resource hacker: Magazines and Newspapers

The use of magazines and newspapers is highly encouraged for providing  concise, timely information. This is something that a hacker needs to know – social engineering and password cracking, in particular, are more effective if you have a solid grounding in pop culture – but you also need to know that ‘pop journalism’ isn’t always ‘accurate journalism’.





Another issue you should consider is the topic or theme of the magazine. A Linux magazine will attempt to down-play Microsoft Windows, because it is a conflicting theme and that is what their main readers want to read.

The best way to combat these two flaws is by being well and widely read. If you read an interesting fact in a magazine, look into it further. Pretend that you believe it, and look for confirmations, then pretend that you don’t believe it, and look for rebuttals.

1.1.3 Resource hacker: Zines and Blogs

Zines are small, often free magazines that have a very small distribution (less than 10,000 readers) and are often produced by hobbyists and  amateur journalists. Zines, like the famous 2600 zine or Phrack Hacking web zine, are written by volunteers and the producers do not edit the content for non-technical errors. This means the language can be harsh for those not anticipating such writing. Zines have a very strong theme however, they are more likely to show and argue both sides, as they do not care to nor have to appease advertisers and subscribers.





Blogs are a modernization of the zine. Blogs are updated more often and use communities to tie in very strong themes. Like zines, however, anyone may criticize a story and show an opposing opinion.

Hacker become a hacker image

the hacker manual
Hacker become a hacker  :  web hacking

1.1.4 Resource hacker: Forums and Mailing Lists

Forums and mailing lists are communally developed media, much like a recording of a series of conversations at a party. Forums and mailing lists are similar, because there are many ways for people to contribute inaccurate information – sometimes intentionally – and there are also ways for people to contribute anonymously. Topics and themes change quickly, it’s important to read the whole thread of comments and not just the first few in order to get the best information.





You can find forums on almost any topic and many online magazines and newspapers offer forums for readers to write opinions regarding published articles. Many mailing lists exist on special topics, but these are hard to find. Often times, you must look for an idea before you find a mailing list community supporting it.

For a hacker, what is most important to know is that many forums and mailing lists are not searchable through major search engines. While you might find a forum or a list through a topic search in a search engine, you may not find information on individual posts. This information is called “the invisible web” as it contains information and data that is invisible to many since a very specific search is needed, often through meta-search engines or only  directly on the website of the forum.

1.1.5 Resource hacker: Newsgroups

Newsgroups have been around a long time. There were newsgroups long before the Web existed. Google purchased the entire archive of newsgroups and put them online at http://groups.google.com. You will find posts in there from the early 1990s. This archive is important for finding who is the original owner of an idea or a product. It is also useful for finding obscure information that is perhaps too small a topic for someone to put on a  web page.





Newsgroups are not used less today than they were years ago, before the web became the mainstream for sharing information. However, they also haven’t grown as their popularity is replaced by new web services like blogs and forums.

1.1.6 Resource hacker: Websites where you can learn how to become a hacker

The de facto standard for sharing information is currently through a web browser. While we classify this all as “the web” the real term is “web services,” as not everything on the web is a website. If you check e-mail using a web browser, you are using a web service. Often times, web services require privileges. This means you need a login name and password to gain access. Having access and the legal right to access is known as having “privileges”.

Hacking into a website to allow you to change the page may be having access, but since it is not your legal right to do so, it is not privileged access. We are only concerned with having privileged access, but as your experience grows with using the web, you will find many places give access to privileged areas by accident. As you find this, you should get into the habit of reporting this to the website owner.





Websites are searchable through a large number of search engines. It’s even possible to make your own search engine, if you have the time and hard drive space. Often, it’s the search engines who get privileged access and pass it on to you. Sometimes it is in the form of cache. A cache is an area of memory on the search engine’s server where the search engine stores pages that matched your search criteria. If you click on the link that says cached, instead of the actual link, then you will see a single page that shows what the search engine found during its search. The search engines save this information to prove that the search was valid – if, for instance, a page goes down or is changed between the time that you initiated your search and the time that you try to access the page that was returned – but you can also use the cached pages for other purposes, such as bypassing a slow server.

One of the most useful public caches is at http://www.archive.org. Here you will find cached versions of whole websites from over the years.





One final note on websites, do not assume you can trust the content of the websites you visit just because they appear in a search engine. Many hacker attacks and viruses are spread just by visiting a website or downloading programs to run. You can safeguard yourself by not downloading programs from untrusted websites and by making sure the  browser you use is up-to-date on security patches.

1.1.7 Resource hacker: Chat

where you will get information with others hackers about “whatsapp hack”, “hack like”, “game hacker”, “hacker news”, “hacking software”, everything is posible in the channels of chats.

Chats, also known as Internet Relay Chat (IRC), as well as Instant Messaging (IM), are very popular modes of quickly communicating with others.





As a research source, chat is extremely inconsistent, because you will be dealing with individuals in real time. Some will be friendly, and some will be rude. Some will be harmless pranksters, but some will be malicious liars. Some will be intelligent and willing to share information, and some will be completely uninformed, but no less willing to share. It can be difficult to know which is which.

However, once you get comfortable with certain groups and channels, you may be accepted into the community, and you will be allowed to ask more and more questions, and you will learn who you can trust. Eventually you will be able to learn the very newest security information (also known as zero day, which implies that it was just discovered) and advance your own knowledge.

1.1.8 Resource hacker: P2P

Do you know to get software, movie, music, documents, games, tutorials, manuals, hacking tools, apps, all online.





Peer to Peer, also known as P2P, is a network inside the Internet. Instead of many local computers communicating with each other through a centralized, remote computer, the computers in a P2P network communicate directly with each other. Most people associate P2P with the downloading of mp3s and pirated movies, however, many other P2P networks exist – both for the purposes of exchanging a wide variety of information and as a means to conduct research on distributed information sharing. One website dedicated to teaching about this, http://infoanarchy.org, is based on the premise that information should be free. On the Infoanarchy website, you can find a listing of available P2P networks and clients.

The problem with P2P networks is that, while you can find information on just about anything on them, some of that information is on the network illegally. The Hacker Highschool program doesn’t condone the use of P2P to illegally download intellectual property, but there is no question that P2P networks can be a vital resource for finding information.

Remember: there is nothing illegal about P2P networks – there are a lot of files that are available to be freely distributed under a wide variety of licenses – but there are also a lot of files on these networks that shouldn’t be there. Don’t be afraid to use P2P networks, but be aware of the dangers.




1.2 Further lessons

Now you should practice to master the skill of researching. The better you get at it, the more information you can find quickly, and the faster you will learn. To help you become a better researcher for the Hacker Highschool program, here are some additional topics and terms for you to investigate:

Meta Search
The Invisible Web or Deep Web
Google Hacking
How Search Engines Work
The Open Source Search Engine

“CITE” WWW.ISECOM.ORG Visit the web if you are interested in yours courses




the hacker manual : Hacker news

Hacker become a hacker image

the hacker manual
Hacker become a hacker  :  bluetooth vulnerability hacker news

the hacker manual : Bluetooth Hack Affects Millions of Devices

The Bluetooth hacking vulnerability, tracked as CVE-2018-5383, affects  firmware or operating system software drivers from some major vendors including Apple, Broadcom, Intel, and Qualcomm, while the implication of the bug on Google, Android and Linux are still unknown.

A highly critical cryptographic vulnerability has been found affecting some Bluetooth implementations that could allow an unauthenticated, remote attacker in physical proximity of targeted devices to intercept, monitor or manipulate the traffic they exchange.





The security vulnerability is related to two Bluetooth features—Bluetooth low energy (LE) implementations of Secure Connections Pairing in operating system software, and BR/EDR implementations of Secure Simple Pairing in device firmware.

“CITE” The hacker news-> https://thehackernews.com/2018/07/bluetooth-hack-vulnerability.html

the hacker manual : Links MANUALHACKER.COM