 
How to become a Unix Hacker
Author: van Hauser / THC
So you've decided to become a unix hacker but you don't know how to start? Before you really begin make yourself the
following absolutly clear: 
   1.Hacking is much work. It's not a playground for kids who just want to have 15 nice minutes. You must learn how to
     operater and program a system. You must research how they react and read sourcecode. It's a long and hard way - so
     be warned. 
   2.Hacking is illegal. At least in most countries - only the netherlands and argentine come to my mind which hasn't got
     laws against hacking - so far! But be sure they will come.
     Even just to log on a system with an account which is not yours is a crime and can be punished. Once a judge spoke you
     guilty commiting a crime, it is put into your record. Your whole life might be ruined because there are only few
     companies who accept computer criminals as their employer. 
   3.Hacking is time consuming. You can't just do hacking half a year, then making a pause of 3+ month and then getting
     back to it. The time runs fast in the internet. New unix releases, new bugs and new fixes. Once you are outdated with
     your exploit data you must beg your chummers to give you the new stuff, and if you do that too often they won't be
     happy about that.
     50+ % of the hacking time you spend are actual information gathering. Speak to other hackers, read mailing lists and
     newsgroups, watch good www and ftp sites. 
But what is the motivation to actual do unix hacking? Thats up to you. You want to become one, so think about it why you
want to become one.
Forget movies like "The Net" or "Hackers" - that's NOT reality! Forget dreams about being the hero, hacking the pentagon
and becoming the sexiest man, getting every girl and ending with a cool payed job in the security company ;-) This is NOT
what will happen - so make yourself clear why you want to do it and what you expect. Can you imagine your mom crying
when the police come to arrest you? 
Keep these warnings in mind. This is to make sure that you know what you are doing and want to become. 
Note too that I wrote this fast guide only because I was asked that often from many guys, even successful
phreakers/blueboxers, "how can I hack unix ?" - and time after time I got tired. So here it is. Don't blame me for
incompleteness and mistakes - I don't care. Only the toughest survive - so try to get as much as possible out of this text if you
are really new. 
                  |-------------------------- HOW TO START ----------------------------|
   1.Get Familiar with it - or - How can you win a rodeo without learning how to handle a horse? 
   2.Get a unix distribution. Get Linux, FreeBSD, Solaris, Sinix etc. for your personal computer. Linux und FreeBSD are
     cheap and derived from BSD, whereas Solaris and Sinix are expensive and derived from Sys V. Tip: Get a linux
     distribution which has got a good handbook. You must learn how to operate your unix. Learn the basics, like changing
     directories, copy and delete commands and using the editor, first. 
   3.Motivate yourself to actual USE unix. How to do that - thats up to you. Maybe use a database which is in your unix
     distribution, program something in C for your school/university, what ever, you must learn to really use unix. 
   4.Get some books to help you. There are many out there, so just go into a good shop, best near an university, where the
     guys working there know what the good and the bad books for using unix are. I personally like the O'Reilly Nutshell
     handbooks much but dislike nearly all the Addison Wesley ones - but thats a personal opinion. 
   5.Get a real internet account with PPP and/or shell access. NEVER do hack or exchange hacking info not encrypted
     with PGP with this real account of your own! Try to configure your unix pc to connect to the inet provider. Some rare
     but good Linux Distribution have got a handbook (yes - something printed!) where they describe how to do that. 
Once you have followed these 5 steps and know how to operate unix (this should take about 2-8 weeks) then you should
move to the next step: 
                  |------------------------ LEARN THE BASICS -------------------------|
   6.Get some good books about unix and internet security. The best I found is "Practical Unix Security" by
     Garfinkel and Spafford, 2nd Edition, O'Reilly. Learn what the basic security problems, holes and features are unix have
     got, and what mistakes people make. 
   7.Try to get all the information and files you can find in the inet. Examine www and ftp sites and use search engines.
     Subscribe to important security mailing lists and read the newsgroups which might be important. Ask around on irc for
     good sites. 
     Here is something to start:
          http://underground.org
          ftp://onyx.infonexus.com
          nntp://comp.security.*
          And of course the links on the Security & Hackerscene page ;-) 
          bugtraq mailing list ->
          email : listserv@netspace.org
          message body : subscribe bugtraq you-real-name 
   8.Read and Analyze your files and data - and don't just collect them. 
     Once words like "suid", "sniffer", "buffer overflow", "firewall", "rdist", "nis", "nfs" and "satan" aren't secrets for you
     anymore and you really know what they mean and their consequences for you - move on. 
                  |------------------------- BEGIN HACKING ---------------------------|
   9.Get an account which isn't yours - try to get it from some hacker you know/met. Remember don't try to hack with your
     own account! 
  10.With this account you can try to hack your first system. Try your exploits etc. But remember the articles "How to
     cover your tracks" so your first illegal account isn't history after the 1st time using it. 
  11.Use ypx, remote sendmail exploits, insecure NFS exports etc. to get more hosts. You get very successful with this
     "old" stuff if you use big host lists and write/find scripts which automate the testing for you. But where can you find
     hostnames to build the host lists? Many possibilities. Try irc, /etc/hosts, www, statistical analysis data of the internet or
     www access etc. This should give you many hosts with accounts on. 
  12.Install a sniffer if possible on the system and you hacked root. That will give you many accounts to new hosts 
  13.try your exploit scripts. Finally some should work. Goto 12. 
                 |----------------------- BECOME A HACKER ---------------------------|
What - you already hacked some systems root - and you aren't a hacker yet - why that? A Hacker isn't someone who just
hacks a site, installs a sniffer and goes on. A real hacker is someone who wants to understand a system, know how it reacts,
has got fun seizing control over it and is interested in discovering bugs and inventing new tools. He's so to say the Columbus of
Cyberspace. 
  14.Try to get into touch with other hackers and exchange information, experiences, accounts, exploits and files. 
  15.Watch the discussions on the newsgroups, mailing lists and irc. Try to read some important RFCs, learn C and begin
     to program tools of your own. 
  16.Don't become "31337" - you know that you are cool and you don't need to convince everybody else of that fact.
     Behave normal and help others who are now asking you "how do I hack unix?" ... 
     ... 
  17.Don't get tired. Stay in the scene, keep an eye on newgroups mailing lists and friends, don't stop hacking. Goto 17 
  Yep - thats all from me guys ... that text should gag every newcomer's mouth. It was quick and dirty but it has got all it
  needs. 
Ciao... 
This page was created Wed Aug 11 23:45:54 EDT 1999
Using Linux
 version 2.0.32
 on an i586
	Main Page @ Matarese.com
The Myth of the 2600Hz Detector @ Matarese.com      
Acquiring Account Information @ Matarese.com      
 
Act2! by Symantec @ Matarese.com      
All hacks / Annoyance @ Matarese.com      
 
Alt 2600 Group FAQ @ Matarese.com      
Hacking Angelfire @ Matarese.com      
 
Anonymous E-Mail @ Matarese.com      
Anonymous FTP: Frequently Asked Questions (FAQ) @ Matarese.com      
 
Maintaining Access - Implementing Backdoors @ Matarese.com      
How to Receive Banned Newsgroups FAQ @ Matarese.com      
 
Hacking BBS's @ Matarese.com      
phreaking tutorial @ Matarese.com      
 
The Bluebox @ Matarese.com      
List of Common Bugs @ Matarese.com      
 
Things that go Bump on the Internet @ Matarese.com      
Hacking Calling Cards @ Matarese.com      
 
Expanding the capacity of Caller ID Boxes @ Matarese.com      
What is Caller-ID? @ Matarese.com      
 
Hacking Call Back Verify @ Matarese.com      
CULT OF THE DEAD COW @ Matarese.com      
 
Cellular Roaming: The New Deals @ Matarese.com      
CELLULAR TELEPHONE PHREAKING PHILE SERIES @ Matarese.com      
 
Cracking Unix passwords @ Matarese.com      
Hacking Webpages @ Matarese.com      
 
The Matarese Circle @ Matarese.com      
Cisco Password Cracking Script @ Matarese.com      
 
Customer Name and Address @ Matarese.com      
Cops and Robbers | UNIX Security @ Matarese.com      
 
Cracking NT Passwords @ Matarese.com      
Odins cracking/coding and PPE resources @ Matarese.com      
 
Credit Carding Part I @ Matarese.com      
How do I defeat Copy Protection? @ Matarese.com      
 
What are the DTMF frequencies? @ Matarese.com      
Exploits FAQ @ Matarese.com      
 
Making Free Calls @ Matarese.com      
FTP Bouncing @ Matarese.com      
 
Hackers Encyclopedia @ Matarese.com      
The Conscience of a Hacker / Hacker Manifesto @ Matarese.com      
 
Hacking from Windows9x FTP @ Matarese.com      
Hacking Tripod @ Matarese.com      
 
Hacking Web Pages @ Matarese.com      
How to crack a UNIX password file. @ Matarese.com      
 
Hacking Servers : A Begginners Guide @ Matarese.com      
TIPS FOR TRACKING HACKERS @ Matarese.com      
 
Hacking Tutorial @ Matarese.com      
Hacking UNIX @ Matarese.com      
 
How to Hack the WWWboard Message Board 2.0 @ Matarese.com      
Hackers Handbook @ Matarese.com      
 
Guide to Harmless-Hacking @ Matarese.com      
All about security holes @ Matarese.com      
 
Hacking Hotmail @ Matarese.com      
How to crack by +ORC complete tutorial in one file (BIG!) @ Matarese.com      
 
]How to Hack from from Harlequin and Archangel @ Matarese.com      
Improve security by breaking into your site @ Matarese.com      
 
Ch1can0 BEOWULF @ Matarese.com      
Internet Security @ Matarese.com      
 
Bugs and Backdoors in IRC clients, scripts and bots @ Matarese.com      
IRC Hacking @ Matarese.com      
 
FAQ for Trading For FileZ in IRC @ Matarese.com      
Creating a Xdcc offer bot for irc @ Matarese.com      
 
Integrated Systems Digital Network @ Matarese.com      
Everything you should know about computer viruses @ Matarese.com      
 
Lan Technology Scorecard @ Matarese.com      
Local Area Signalling Services (LASS) and Custom Calling Feature Control Codes @ Matarese.com      
 
Harmless Hacking - Linux @ Matarese.com      
INDEX @ Matarese.com      
 
Loops wanted! @ Matarese.com      
Mail Spoofing Explained @ Matarese.com      
 
Microsoft IIS Vulnerability @ Matarese.com      
Microsoft(Yuk) Index Server exposes IDs and Passwords @ Matarese.com      
 
Intresting Microsoft Access 7.0 Trick @ Matarese.com      
MS Money 2.0 Back Door @ Matarese.com      
 
Mind Your Own Business (MYOB) @ Matarese.com      
Nameserver listing! @ Matarese.com      
 
Newbies handbook / HOW TO BEGIN IN THE WORLD OF H/P @ Matarese.com      
Bugs in Windows NT (Too many to list here completely...) @ Matarese.com      
 
This Hack is for the OptiChat Original Chat Room @ Matarese.com      
Internet Outdials @ Matarese.com      
 
Pager Frequencies @ Matarese.com      
Password Recovery Techniques @ Matarese.com      
 
How to Steal Local Calls from Most Payphones @ Matarese.com      
PBX's (Private Branch Exchanges) and WATS @ Matarese.com      
 
Cryptography / PGP @ Matarese.com      
The PHF bug @ Matarese.com      
 
Introduction to the Internet Protocols @ Matarese.com      
Analysis of QueSO Performance @ Matarese.com      
 
Finger - ATTACKING FROM THE OUTSIDE @ Matarese.com      
The PPP protocol (Point-to-Point Protocol) @ Matarese.com      
 
Scam news / Hacking / Phreaking / Anarchy / Virii @ Matarese.com      
Hacking your school computers @ Matarese.com      
 
L0pht Security Advisory - Sendmail 8.7.5 @ Matarese.com      
Sniffer FAQ V 1.7 @ Matarese.com      
 
THE COMPLETE SOCIAL ENGINEERING FAQ! @ Matarese.com      
Socket Services @ Matarese.com      
 
Softice Manual @ Matarese.com      
Softice Manual 2 @ Matarese.com      
 
Softice Manual 3 @ Matarese.com      
Softice Manual 4 @ Matarese.com      
 
Softice Manual 5 @ Matarese.com      
SSPING/JOLT patches @ Matarese.com      
 
THE ULTIMATE BEGINNER'S GUIDE TO HACKING AND PHREAKING @ Matarese.com      
@ Matarese.com      
 
@ Matarese.com      
TCP/IP Services (Phrack Stuff) @ Matarese.com      
 
Telenet The Secret Exposed @ Matarese.com      
WORKING OUT-TELNETS @ Matarese.com      
 
Covering your tracks, Theory @ Matarese.com      
How to defeat the Tripod Advertisement on your webpage. @ Matarese.com      
 
BT Basics @ Matarese.com      
BT Phreaking @ Matarese.com      
 
The Psychotic Internet Services' Unix Bible @ Matarese.com      
The Psychotic Internet Services' Unix Bible @ Matarese.com      
 
UNIX FAQ @ Matarese.com      
Gibe's UNIX COMMAND Bible @ Matarese.com      
 
      
How do I post to a moderated newsgroup? @ Matarese.com      
 
What You Should Know About Computer Viruses @ Matarese.com      
How can I protect myself from viruses and such? @ Matarese.com      
 
What is a trojan/worm/virus/logic bomb? @ Matarese.com      
VMS Info (Password Cracking) @ Matarese.com      
 
HACKING THE WAL-MART ARMORGUARD COMPUTER PROTECTION SYSTEM @ Matarese.com      
Using web proxies to disguise your IP address @ Matarese.com      
 
Dig up hidden CD Keys @ Matarese.com      
X-Windows Security @ Matarese.com      
 
  Copyright (C) 1999 - Matarese.com