I have decided to release the biggest hack tutorial of them all. How to become a hacker.


[Image: 35f7ea303a35145aa9dfc0c450f11f2a.jpg] [Image: Brontobyte-1.jpg]


Part 1 – The basic knowledge of hacking

– This tutorial is in 2 parts, part 1 is basic knowledge, part 2 is the real hacking tutorial.
– Use Ctrl+f to find that content you want.
– If you are a beginner, then i’ll recommend you to read the full thread.
– Don’t try to hack anything after reading this thread, you probalbly still be a “beginner” but you have more knowledge and that can lead you to a pro hacker.
– To get a fully understand of this, be 13+ (recommended)

What is hacking?
Hacking is the practice of modifying the features of a system, in order to accomplish a goal outside of the creator’s original purpose. The person who is consistently engaging in hacking activities, and has accepted hacking as a lifestyle and philosophy of their choice, is called a hacker.

Computer hacking is the most popular form of hacking nowadays, especially in the field of computer security, but hacking exists in many other forms, such as phone hacking, brain hacking, etc. and it’s not limited to either of them.

Due to the mass attention given to blackhat hackers from the media, the whole hacking term is often mistaken for any security related cyber crime. This damages the reputation of all hackers, and is very cruel and unfair to the law abiding ones of them, from who the term itself originated. The goal of this website is to introduce people the true philosophy and ethics of hackers, hopefully clearing their name and giving them the social status they deserve.

What is a “hacker”?

In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge or enjoyment.

The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community.

While other uses of the word hacker exist that are not related to computer security, such as referring to someone with an advanced understanding of computers and computer networks, they are rarely used in mainstream context.

They are subject to the longstanding hacker definition controversy about the term’s true meaning. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone who breaks into computers, whether computer criminal (black hats) or computer security expert (white hats), is more appropriately called a cracker instead.

Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called “crackers”.

Different types of hackers
(In this tutorial, I’ll try to keep it short, so I only gonna talk about the three most popular types of hackers.)

White hat:
White hat describes a hacker who identifies a security weakness in a computer system or network but, instead of taking malicious advantage of it, exposes the weakness in a way that will allow the system’s owners to fix the breach before it can be taken advantage by others (such as black hat hackers.)

Black hat:
A “black hat” hacker is a hacker who “violates computer security for little reason beyond maliciousness or for personal gain” (Moore, 2005).Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are “the epitome of all that the public fears in a computer criminal”. Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network. Black hat hackers are also referred to as the “crackers” within the security industry and by modern programmers. Crackers keep the awareness of the vulnerabilities to themselves and do not notify the general public or manufacturer for patches to be applied. Individual freedom and accessibility is promoted over privacy and security. Once they have gained control over a system, they may apply patches or fixes to the system only to keep their reigning control. Richard Stallman invented the definition to express the maliciousness of a criminal hacker versus a white hat hacker who performs hacking duties to identify places to repair.

Grey hat:
A grey hat hacker is a combination of a black hat and a white hat hacker. A grey hat hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has a security defect, for example. They may then offer to correct the defect for a fee.

History of hacking
Watch this

Hacker’s manifesto – A hacker’s inspiration

Quote:The Hacker’s Manifesto

By The Mentor (a.k.a. Loyd Blankenship

Another one got caught today, it’s all over the papers.
“Teenager Arrested in Computer Crime Scandal”, “Hacker Arrested after
Bank Tampering”…

Damn kids. They’re all alike.

But did you, in your three-piece psychology and 1950’s
technobrain ever take a look behind the eyes of the Hacker? Did you ever
wonder what made him tick, what forces shaped him, what may have molded

I am a Hacker, enter my world….

Mine is a world that begins with school… I’m smarter than most
of the other kids, this crap they teach us bores me…

Damn underachiever. They’re all alike.

I made a discovery today. I found a comupter. Wait a second,
this is cool. It does what I want it to. If it makes a mistake it’s
because I screwed it up. Not because it doesn’t like me…
Or feels threatened by me…
Or thinks I’m a smart ass…
Or doesn’t like teaching and shouldn’t be here…

Damn kid. All he does is play games. They’re all alike.

And then it happened… a door opened to a world… rushing
through the phone line like heroin through an addict’s veins, an
electronic pulse is sent out, a refuge from the day-to-day incompetencys
is sought… a bored is found.

“This is it… this is where I belong…”
I know everyone here… even if I’ve never met them, never talked
to them, may never hear from them again… I know you all…

Damn kid. Tying up the phone line again. They’re all alike…

You bet your ass we’re all alike… we’ve been spoon-fed baby
food at school when we hungered for steak… the bits of meat that you
did let slip were pre-chewed and tasteless. We’ve been dominated by
sadists, or ignored by the apathetic. The few that had somthing to
teach found us willing pupils, but those few are like drops of water in
the desert.

This is our world now… the world of the electron and the
switch, the beauty of the baud. We make use of the service already
existing without paying for what could be dirt-cheap if it wasn’t run by
profiteering gluttons, and you call us criminals. We explore… and you
call us criminals. We seek after knowledge, and you call us criminals.
We exist without skin color, without nationality, without religous
bias… and you call us criminals.
You build atomic bombs, you wage wars, you murder, cheat, and
lie to us and try to make us believe it’s for our own good, yet we’re the

Yes, I am a crimial. My crime is that of curiosity. My crime is
that of judging people by what they say and think, not what they look
like. My crime is that of outsmarting you, something you will never
forgive me for.

I am a Hacker, and this is my manifesto. You may stop this
individual, but you can’t stop us all. After all… we’re all alike.


Before you go out, and hack a website or try to ddos someone, you’ll have to know what punishment you can face. Try to ask yourself, is it worth it?

Read more about punishment down below:
What is the punishment if you are caught hacking into another computer
Computer and internet crime laws
penalties hacking illegally computer

Part 2 – How to hack


Where should I start?
Many people finally decide that they are going to begin learning a
programming language, but don’t know where to start. I believe that before you begin to learn a programming language, you should first master HTML (HyperText Markup Language). HTML is part of what makes up all of the website pages you
see on the internet. HTML is very easy to learn and it’ll get you used to looking at source code.

From there I would suggest starting your programming life with C. C is one of the most popular languages, and it is what makes up the majority of the exploits out there today. C also makes up some of the most powerful hacking programs and viruses that are out there today.

Start Learning

Methode 1:

1. Purchase a beginners book on your programming language. Before you choose the book, make sure you read the reviews to make sure it’s a good choice.
2. When something difficult comes up or something that makes no sense to you, don’t avoid or skip it. Instead embrace it! This is how you actually learn. If you still don’t understand it after going over it multiple times, find someone that can help you.
3. Join a programming forum, make sure it’s a forum with your programming language.
4. Practice, practice and practice! Think of ideas for fun programs that you could make and program them!

Methode 2:

1. Use this guide to find what program language you want click here
2. Use the links down below, try them all, until you find one you like.
3. Now register on a forum with your program language.
4. Practice, practice & practice. Watch youtube videos, and ask people on the forum. and one day you will be a pro.

Programming – Start Your Journey Now!
Programming – The Easy Way
Programming – From Beginner To Expert
Programming – Learn Porgramming
Learn c++
Learn HTML

A hacker’s OS (Operating System)

What’s best?

It depends on what type of hacker you are, and what you wanna hack. Actually the most malware and botnet programmers use Windows.
But i would stil prefer Linux and i know alot of hackers also uses it.

Why Linux?

Reason #1: command line interface vs graphical user interface
Linux was designed around a strong and highly integrated command line interface. This grants users far greater access and control over their system, above an beyond customization. Many of the utilities built into Linux have greater functionality above and beyond their windows counterparts. In contrast, Windows was built around the graphic user interface (GUI). This restrict user interaction to point-and-click navigation (slower) and application/system menu options for configuration. Even with command lines, such as command prompt (nerfed since vista) and Power Shell, you still don’t have the complete functionality and integration compared with Linux.

Reason #2: Linux is lighter and more portable.
Hackers can easily create customized live boot disks and drives from any Linux distribution that they want. The installation is quick and its light on resources. To memory, I can only think of one program that lets you create Windows live disks and it wasn’t nearly as light or as quick to install.

Reason #3: Linux is typically more secure.
It’s lack of popularity amongst average users and popularity amongst programmers and hackers is one reason Linux has not be a profitable target. In more recent years, popularity has grown for UNIX based operating systems such as Mac OS, Android, and Linux. As a result, these platforms have become more profitable targets for attackers. Still, Linux is a great deal more secure than Windows out of the box.

Reason #4: Linux is pretty much universal.
Just about everything runs some form of UNIX (routers, web-servers, etc.). Doesn’t it make sense that you would target those systems from a device running the same platform? After all, the goal is to make things easier on yourself. You don’t want to worry about compatibility problems.

Hackers target platforms that are profitable. Windows has been the preferred choice within enterprise environments and with the average consumer. It’s the preferred choice for developers (apple licensing costs and restrictions), which is why Windows is so compatible. Apple has been too expensive for consumers and Linux is flat out not user friendly (buggy, lack of GUI, etc.). This has changed though in recent years with smartphones and tablets. As more users switch to Mac/iOS and Android/Linux, attackers will shift to targeting these platforms. It’s not that far of a stretch for them either as they are familiar with both platforms already.

Linux Kernel

What is a kernel? The kernel is a program that constitutes the central core of a computer operating system. It has complete control over everything that occurs in the system. (For more information click here)

Which kernel should i use?

No question. Just use Kali it’s the best. (some maybe say ubunto or something are best for beginners but i don’t think so)

How to get Kali?

Step-by-step (VM)
Video tutorial (VM)

Become Anonymous

This is one of the most important parts of being a hacker, to be anonymous means everything. It’s important because when you do your illegal stuff, you don’t want to get caught. Or you just don’t want to be doxed, and get hacked by other hackers.

Click Here To Become Anonymous

DESTROY ALL EVIDENCE – Nuke your computer

If the police, FBI etc… “knock” on your door, you need to be fast to delete all evidence, else you gonna sit in jail, and probalbly never get they job you always dreamed of.