Find out more about hacking here

Learn to be a Hacker part 2


Like my promise yesterday which was stated in the article part 1 "Learning to be a hacker"
Before moving on to the next chapters, you need to know that the hacking process is not always negative, we will learn how to infiltrate other people's systems, but not damage or make changes. The person doing the hacking is what we know as the HACKER.

Conversely, people who damage other people's systems are called CRACKERS and their work is called CRACKING.

Based on RFC 1392, regarding the internet users glossary. Definition Hacker is an individual who is interested in specifically exploring the workings of an internal system, computer, laptop and network. Meanwhile, CRACKER is an individual who "forces" into a system intentionally without "permission" with "bad" purposes. The two terms are sometimes interpreted the same but are very different.

Before going any further, I will invite you to get to know and memorize numbered internet standards called RFCs. RFC stands for Request for Comment which is used in networks, the internet and some network operating systems such as windows. RFCs are under the direction of ISOC (Internet Society) and technical standards setting bodies such as the IETF (Internet Engineering Task Force) or IRTF (Internet Research Task Force)

This is a list of commonly used RFCs

  1. RFC 768 = User Datagram  Protocol
  2. RFC 791 = Internet Protocol
  3. RFC 792 = Control Message Protocol
  4. RFC 793 = Transmission Control Protocol
  5. RFC 821 = Simple Mail Transfer Protocol Change to RFC 2821
  6. RFC 822 = Format e-mail Change to RFC 2822
  7. RFC 826 = Address Resolution Protocol
  8. RFC 894 = IP via ethernet
  9. RFC 951 = Bootstrap Protocol
  10. RFC 959 = File Transfer Protocol
  11. RFC 1034 = Domain Name System - Konsep
  12. RFC 1035 = DNS - implementasi
  13. RFC 1122 = Terms Host 1
  14. RFC 1123 = Terms Host 2
  15. RFC 1191 = Path MTU
  16. RFC 1256 = Founder Router
  17. RFC 1323 = TCP high performance
  18. RFC 1350 = Trivial File Transfer Protocol
  19. RFC 1403 = Interactions BGP OSPF
  20. RFC 1459 = Protocol Internet Relay Chat
  21. RFC 1498 = Architectural Discussion
  22. RFC 1518 = CIDR alocation
  23. RFC 1519 = CIDR
  24. RFC 1591 = Domain Name Structure / DNS
  25. RFC 1661 = Point to point Protocol
  26. RFC 1738 = Uniform Resource Locator
  27. RFC 1771 = A border Gateway Protocol 4
  28. RFC 1772 = Aplication BGP
  29. RFC 1789 = Internet Phone / VoIP
  30. RFC 1812 = Router IPv4
  31. RFC 1889 = Real time Transport
  32. RFC 1905 = Simple Network Management Protocol
  33. RFC 1907 = MIB
  34. RFC 1918 = Network 10
  35. RFC 1939 = Post Office Protocol Version 3 (POP3)
  36. RFC 2001 = TCP Performance
  37. RFC 2026 = Internet Standar Process
  38. RFC 2045 = MIME
  39. RFC 2046 = MIME
  40. RFC 2047 = MIME
  41. RFC 2048 = MIME
  42. RFC 2049 = MIME
  43. RFC 2060 = Internet Message Access Protocol versi 4 (IMAP4) change to RFC 3501
  44. RFC 2131 = DHCP
  45. RFC 2223 = Intructions for RFC author
  46. RFC 2231 = Set aksara
  47. RFC 2328 = OSPF
  48. RFC 2401 = Security Architecture
  49. RFC 2453 = Routing Informations Protocol
  50. RFC 2525 = TCP problem
  51. RFC 2535 = DNS Security
  52. RFC 2581 = TCP Jam Control
  53. RFC 2616 = HTTP
  54. RFC 2663 = Network address Translation
  55. RFC 2766 = NAT-PT
  56. RFC 2821 = Simple Mail Transfer Protocol
  57. RFC 2822 = Format e-mail
  58. RFC 2960 = SCTP
  59. RFC 3010 = Network File System
  60. RFC 3031 = Arsitektur MPLS
  61. RFC 3066 = Tag language
  62. RFC 3092 = Etimologi "Foo"
  63. RFC 3098 = Email advertising
  64. RFC 3160 = Tao IETF
  65. RFC 3168 = ECN
  66. RFC 3501 = IMAP4rev1
The hacker's manifesto
This is our world now...the world of the electron and the switch,the beauty of the baud. We make use of a service already axisting without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons,and you call us criminals. We explore...and you call us criminals. We seek after knowledge...and you call us criminals. We exist without skin color,without nationality,without religius bias...and you call us criminals.You build atomic bombs,you wage wars, you murder,cheat and lie to us and try to make us believe it's for our own good,yet we're the criminals. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think,not what they look like. My crime is that of outsmarting you,something that you will never forgive me for

The principles and code of ethics of a hacker

  • Don't damage any system on purpose. Such as: Causing a crash, overflow, changing the index file of a website. Although there is also the argument that changing the index file is fine as long as the original file is stored on the same system and can be accessed by the administrator
  • Do not change system files other than those needed to secure your identity as the hackers
  • Do not leave your own (or anyone else's) real name, real phone number on any system that you access illegally. They can and will track you.
  • Be careful about sharing sensitive information. The government will get smarter. In general, if you don't know who the other person is, be careful with the person you're talking to.
  •  Don't start off by targeting government-owned computers. Yes, there are many government owned systems that are safe enough to hack, but the risks outweigh the benefits. Remember, the government has unlimited funds compared to ISPs / companies whose objective is to seek profit.


No comments:

Post a comment