{"id":385,"date":"2016-12-31T21:03:46","date_gmt":"2017-01-01T04:03:46","guid":{"rendered":"http:\/\/www.1776again.com\/?p=385"},"modified":"2017-05-09T00:29:13","modified_gmt":"2017-05-09T06:29:13","slug":"anon-warrior-publishes-diy-guide-to-hacking","status":"publish","type":"post","link":"https:\/\/www.1776again.com\/2016\/12\/31\/anon-warrior-publishes-diy-guide-to-hacking\/","title":{"rendered":"Anon Warrior Publishes DIY Guide to Hacking"},"content":{"rendered":"

A DIY Guide for those without the patience to wait for whistleblowers<\/p>\n

–[ 1 ]– Introduction<\/p>\n

I’m not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz it took to 0wn Gamma. I’m writing this to demystify hacking, to show how simple it is, and to hopefully inform and inspire you to go out and hack shit. If you have no experience with programming or hacking, some of the text below might look like a foreign language. Check the resources section at the end to help you get started. And trust me, once you’ve learned the basics you’ll realize this really is easier than filing a FOIA request.<\/p>\n

–[ 2 ]– Staying Safe<\/p>\n

This is illegal, so you’ll need to take same basic precautions:<\/p>\n

    \n
  1. Make a hidden encrypted volume with Truecrypt 7.1a<\/li>\n
  2. Inside the encrypted volume install Whonix<\/li>\n
  3. (Optional) While just having everything go over Tor thanks to Whonix is probably sufficient, it’s better to not use an internet connection connected to your name or address. A cantenna, aircrack, and reaver can come in handy here.<\/li>\n<\/ol>\n

    https:\/\/truecrypt.ch\/downloads\/<\/a><\/p>\n

    https:\/\/www.whonix.org\/wiki\/Download#Install_Whonix <\/a><\/p>\n

    As long as you follow common sense like never do anything hacking related outside of Whonix, never do any of your normal computer usage inside Whonix, never mention any information about your real life when talking with other hackers, and never brag about your illegal hacking exploits to friends in real life, then you can pretty much do whatever you want with no fear of being v&.<\/p>\n

    NOTE: I do NOT recommend actually hacking directly over Tor. While Tor is usable for some things like web browsing, when it comes to using hacking tools like nmap, sqlmap, and nikto that are making thousands of requests, they will run very slowly over Tor. Not to mention that you’ll want a public IP address to receive connect back shells. I recommend using servers you’ve hacked or a VPS paid with bitcoin to hack from. That way only the low bandwidth text interface between you and the server is over Tor. All the commands you’re running will have a nice fast connection to your target.<\/p>\n

    –[ 3 ]– Mapping Out The Target<\/p>\n

    Basically I just repeatedly use fierce, whois lookups on IP addresses and domain names, and reverse whois lookups to find all IP address space and domain names associated with an organization.<\/p>\n

    http:\/\/ha.ckers.org\/fierce\/ <\/a><\/p>\n

    For an example let’s take Blackwater. We start out knowing their homepage is at academi.com. Running fierce.pl -dns academi.com we find the subdomains:<\/p>\n