This is a part of "Eden Guide to Hacking" which is my writing attempt for a quick to read, broadway guide to HACKING ~ for anyone to have grasp of important concepts and skills which makes up the knowledge base of a hacker.
W.I.P. @ https://github.com/abhishekkr/eden_guide_to_hacking/
W.I.P. @ https://github.com/abhishekkr/eden_guide_to_hacking/
'Hacking Philosophy' ~ from Rig Veda and Sun Tzu's Art of War
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ [+] Art of Hacking | |[+] from 'Rig Veda' | | | |[+] "Who so would kill us, | | whether he be a strange foe or one of us." | | Means: "The security parameters could be defeated by | | (un/mis)-handled feature or an already compromised | | component present within an un-breakable system." | | | |[+] "Loosed from the Bowstring fly away, thou arrow, | | sharpened by our Prayer. | | Go to the foemen, strike them home, and let not one | | be left alive." | | Means: "Make an exploit robust, accurate, infectious | | and untraceable." | |_ | |[+] skills could be seen as 13 chapters of Sun Tzu's | | 'Art of War' ~ | | | |[+] Laying Plans | | | | | |[+] Exploit the parameter never thought to be a | | | part of the security implications of the system. | | |_ | | | |[+] Waging War | | | | | |[+] Don't overburden yourself with complex routes, | | | if there exist less techie but more easy options. | | |_ | | | |[+] Strategic Attack Planning | | | | | |[+] Exploit the parameter never thought to be a | | | part of the security implications of the system. | | |_ | | | |[+] Tactical Disposition | | | | | |[+] First secure your own location & technologies, | | | then you are in safe & stronger place to attack. | | |_ | | | |[+] Directed Energy | | | | | |[+] Attacking a complex security infrastrucure is | | | no different than a simple one. Break it down. | | |_ | | | |[+] Weaknesses & Strengths | | | | | |[+] Analyze the system well to aim its vulnerability | | | and leave it's alarm system untouched. | | |_ | | | |[+] Engaging the Force | | | | | |[+] One can't defeat an opponent without knowledge | | | of opponent's security & service design. | | |_ | | | |[+] Variations & Adaptability | | | | | |[+] The system, service & security could be set up | | | with any kind of tweaking and hence makes the | | | pre-analysis for attack a failure. | | | Attacker must be always ready to amend its ways. | | |_ | | | |[+] The Army on the March | | | | | |[+] When to attack, and when to wait. | | | Instincts to stay out of trap & sense enemies. | | |_ | | | |[+] Situational Positioning | | | | | |[+] Access, attack & safety parameters involved. | | |_ | | | |[+] The 9 Battlegrounds | | | | | |[+] Different types of security parameters lead to | | | different attack or sometimes no attack practices. | | |_ | | | |[+] 5 Ways of Attacking with Fire | | | | | |[+] Break-in target's system with deception | | |[+] Starve the resources powering security | | |[+] Attack availability of service | | |[+] Defeat the implemented security system | | |[+] Infect reachable systems related to target | | |_ | | | |[+] Intelligence & Espionage | | | | | |[+] Gather as much information possible and | | | try attacks like spear phishing to have a slave. | | |_ | |_ | |[+] It's your Dharma to Hack, if you are a Geek. | |[+] & it all starts in following part of this Eden Guide |_ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~