Ghost1pm

[PART 1] introduction [HACKING :THE ELITE ART!!!]

Recommended Posts

hello, ladies and gentleman today we are going to discuss what is an hacker. it's type and some Acronyms and words regarding it.

This is an part 1 of the series "HACKING : THE ELITE ART for more check out 

cracked.to and if you want to suggest some changes or want to share any amazing method from your collection then check out my contact information at the bottom of this tutorial. 

 

 

-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

 

[hide]

Introduction :-

 

I will guide you from noob to high or intermediate level.

 

"wait... does this mean I will be able to hack facebook or join the anonmous."

- calm your horses there as for facebook. I will teach you more then just facebook and as for joining anonmous i don't think they have any vacant seats as 

of yet. p.s :- just wait for this comment section to flood with those extraordinary people who will comment anonmous is  not a group you idiot you can't join it.

 

okay...let's get started :-

 

so, you want to become an hacker huh. but you are confused which path you should choose.I will point you in right direction.

note:- hacking is nothing like they show in hollywood movies. there is no software which will do all the hacking for you in one click.

if you were here for that software then here is the link for it. https://media.giphy.com/media/Zv6Apawffpa2k/giphy.gif

 

basically there are three major type of hackers :-       

 

The first is Black Hat Hackers.

 

This is the type you probably are here for this type is also known as The "crackers".

Hackers in this category are always tempted to gain privileges of someone's system without the authorization or permission.

Usually for their own gains. as a team they can be deadly and their impact can cause trouble to a far greater extent.

this is the type who earns the most and are major target of the authorities and those billionaires and millionaires who they stole from

believe me those rich faggots are more major threat to you as their ego is hurted because a kid with some tools was able to stole millons from them. enough about the threats now lets get on with the profits in this type of hacking you will either become rich or die trying.

I guarantee you that if you stay low and not try to hack nasa or some nuclear power plant or worse try to sell virginity of a drug lord's 

daughter(it's the worse speaking as of experience lol). after the end of this series I promise. you will be able to earn enough money

to purchase that good bike and impress that chick you like.

 

"wait... so you will not tell me any bullshit like do not go the blackhat way???." 

- even if I do tell you that at the end of the Day you will do what you desire so it's my duty to protect you from any harm.as if there

will be no bad guys them the ones which are good will grow in quantity and destroy the earth anyway.

 

bullshit alert!!!

 

think of it as the forest in which there are lions and other grass eating animals if there will be no lions then the grass eating animals 

will grow in quantity and will eat all the grass and when there will be no grass they will die eventually.

 

so if you chose the blackhat way then your psychology should be :- If they are hacked then it's their fault. there is no place for guilt.

 

white hat hackers :-

 

so, you are the good guy and want to do some good in this world.

 

yes, they are considered the good guys.

they are the type who oppose the Black hat hackers and are called White hat hackers and are infact the heroes to many.

They are also designated as "Ethical Hackers".

In fact, Ethical Hacking is a career in today's world for many. To be an approved as an White hat hacker, 

you need to be certified. But who cares about a certificate, when you can prove your skills.

I would advice you to become the white hat hacker because there are many opportunities as those big companies are investing 

millons of dollars to prevent the blackhats.anonmous consider themselves white hats.

 

remember The only way to stop a bad guy with a gun is a good guy with a gun. 

 

 

Grey Hat Hackers :- 

 

As you can probably imagine, these are those categories of

hackers who hacks for both good and bad. They usually do

Black hatting for their malicious intentions and do White

hatting with good intentions. In short, they help and harm.

and there are many more definitions available ont the internet like 

these are the type of hacker who make the site owner aware of their vulnerabilities

to show how good of hackers they are and want fame for themselves. They most of the time don't

do the hacking for money or good of people consider them the one joker meant in the dark knight 

gotham deserve high class of criminals not the ones who work for money they that type.

The majority of the people fall in this category. So they are typical hackers and still a potential threat!!!

 

 

 

Other types of Hackers 

 

"whoa you motherf**ker I thought you meant there are only 3 types."

- yeah there are only three types but these are subcategories of those 3 fundamental types.

 

Elite Hacker - A grade rank meant to describe the the most

skilled/ reputed hackers. They knew/ discover the hacking

methods that are still unknown and that are not been fixed.

 

Script Kiddie - A lower rank than the above one that

designates someone that uses tools made by others to do

some stuff and they don't even know a shit about the real

hacking.

 

Neophyte - A much lower rank that describes a person that

is a newbie to this matter and is having a little a knowledge

about this matter.

 

Hacktivist - As the name rhymes to "Terrorist", they are the

people who hacks to inject some religious, political

anarchy.

 

Green Hat Hackers- As the name indicates, they love

green. They hack only for money. They will not think about

the cause. They just want the money from their slaves.

 

 

that's all the types there are if I left any please do the honor to mention in the comment section I will get to learn a new type.

 

-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

 

 

Are you an rookie in hacking and don't know the basic terms. don't worry I got you covered.

 

bullshit alert!!!

 

now there are going to be two types of people while reading this first ones will be like sam.

sam :- s**t I am out enough of this f***er i know everything i can hack accounts of kids who play minecraft!!!

 

and other one will be like jhon.

jhonny :- Looks like ghost1pm did really hard work writing them(i just googled it and pasted them btw)!!!

I should check them out it will be good for me.    

 

be like jhonny!!! and I promise you that you will go places. as of sam he will roam around forums and will be like you got an R.A.T i got an dog lol.

i was an bad joke I know. anyways here are the Acronyms.

 

ACRONYMS

 

R.A.T :-                      Remote Administration Tool or Remote Access Trojan(according to some extra ordinary people).

 

DDoS :-                       Distributed Reflected Denial of Service Attack,

                              uses a list of reflection servers or other methods such as

                              DNS to spoof an attack to look like it's coming from

                              multiple ips. Amplification of power in the attack COULD

                              occur

 

VPS :-                        Virtual Private Sever

 

SE :-                         Social Engineering

 

HTTP :-                       Hyper Text Transfer Protocol. The foundation of

                              data communication for the World Wide Web.

 

SSH :-                        Secure Shell, used to connect to Virtual Private

                              Servers.

 

FTP :-                        File Transfer Protocol. Used for transferring files

                              over an FTP server.

 

XSS (CSS) :-                  Cross Site Scripting

 

Malware :-                    Malicious Software

 

Skid :-                       Script Kid/Script Kiddie

 

DDoS :-                       Distributed Denial of Service

 

VPN :-                        Virtual Private Networ

 

Nix :-                        Unix based operating system, usually referred to

                              here when referring to DDoS'in

 

SQL :-                        Structured Query Language. It usually goes along

                              with a word after it, such as "SQL |njection."

 

FUD :-                        Fully Undetectable

 

-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

 

 

WORDS

 

FUD :- Fully undetectable, can be used in many terms.

Generally in combination with crypters, or when trying to

infect someone.

 

LOIC/HOIC :- Tool(s) used by many anonymous members

to conduct DDoS attacks. It is not recommended to use

these under any circumstances.

 

Trojan :- A Trojan is a type of malware that masquerades

as a legitimate file or helpful program with the ultimate

purpose of granting a hacker unauthorized access to a

computer.

 

Botnet :- Computers infected by worms or Trojans and

taken over by hackers and brought into networks to send

spam, more viruses, or launch denial of service attacks.

 

SQL Injection :- An SQL injection is a method often used

to hack SQL databases via a website, and gain admin

control of the site.

 

Root :- Highest permission level on a computer, able to

modify anything on the system without restriction.

 

Warez :- Software piracy

 

White Hat :- A "white hat" refers to an ethical hacker, or a

computer security expert, who specializes in penetration

testing and in other testing methods to ensure the security

of a businesses information systems. (Good guy, per se)

 

Rootkit (ring3 ringO) :- A powerful exploit used by

malware to conceal all traces that it exists. Ring3 - Can be

removed easily without booting in safemode. Ring0 — Very

hard to remove and very rare in the wild, these can require

you to format, it's very hard to remove certain ring0 rootkits

without safemode.

 

Script Kiddie :- A script kid, or skid is a term used to

describe those who use scripts created by others to hack

computer systems and websites. Used as an insult,

meaning that they know nothing about hacking.

 

IP Grabber :- A link that grabs someone’s IP when they

visit it.

 

DDoS :- Distributed denial of service. Flooding someones

connection with packets. Servers or web-hosted shells can

send packets to a connection on a website usually from a

booter.

 

VPS :- The term is used for emphasizing that the virtual

machine, although running in software on the same

physical computer as other customers’ virtual machines, is

in many respects functionally equivalent to a separate

physical computer, is dedicated to the individual

customer's needs, has the privacy of a separate physical

computer, and can be configured to run server software.

 

Malware :- Software designed to do all kinds of evil stuff

like stealing identity information, running DDoS attacks, or

soliciting money from the slave.

 

Phreak :- Phone Freaks. Hackers who hack cell phones

for free calling. Free Long distance calling. Etc.

Bot :- A piece of malware that connects computer to an

attacker commonly using the HTTP or IRC protocal to

await malicous instructions.

 

Shell :- The common meaning here is a hacked web

server with a DoS script uploaded to conduct DDoS attacks

via a booter.

 

ANSI Bomb :- ANS|.SYS key-remapping commands

consist of cryptic-looking text that specifies, using ansi

numeric codes to _redefine_keys.

 

DOX :- Personal information about someone on the

Internet usualy contains real name, address, phone

number, SSN, credit card number, etc.

 

Worm :- Software designed to spread malware with little

to no human interaction.

 

Deface :- A website deface is an attack on a site that

changes the appearance of the site or a certain webpage

 

Keylogger :- A software program that records all

keystrokes on a computer's keyboard, used as a

surveillance tool or covertly as spyware.

 

Remote Administration Tool :- It's a general term for a

hack that can let someone remotely control your computer

with admin access.

 

 

This is the end of part one of my series.i hope you enjoyed it as much I liked writing it .if you really liked it then give it an upvote and if you disliked it tell me in the comment section i will try to rectify the problem and most probabaly try to hire hitmen on you lol. chill i won't do a thing just enjoy the stay at cracked.to more parts will be up soon.

 

for some more terms check out my thread KEYBOARD SHORTCUTS FOR BETTER CRACKING here https://cracked.to/Thread-Keyboard-Shortcuts-For-Better-Cracking

 

"wait... i don't have a laptop you nincompoop how am i going follow your upcoming tutorials."

- if that's the case then check out my tutorial on how to get a free laptop here.  

 

 

END WORDS :- if you did read all of that then give a pat on your back and if you really liked my continent then just write in the comment section :-

 

"master please accept me as your apprintice" and you are in. thank you have a great day.     

 

 

                                                                                   

- A series by Ghost1pm

[/hide]

-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

                                                                                                                                                                 

             

contact me here for anything but not how to lose virginity(guide under construction)

 

 

 

My Discord :- DarkEth#8995

To pm me at cracked.to :-

 

 

 

 

 

 

                 

For donations to keep the bread and butter at my table to keep me fed up.

 

                                            

 

 

 

BTC:- 17yFA5p4BQFKVp9Q8z82BxjRAGcw9E7AYk

ETC:- 0x714b81624f1e4BFE590E8Be755d96e1018F2043a

                                               

cracked.to creadits are also welcomed

cracked.to to donate.

Share this post


Link to post
Share on other sites

i wanna see who is an hacker

 

Read whole you will find it interesting it is kinda of unpolised but I will fix it when I will get time read and recommend.

Share this post


Link to post
Share on other sites

gooooooooooooddddd

 

Appreciate the reply looks like I need to polish this and start working on part 2.

Share this post


Link to post
Share on other sites

gooooooooooooddddd

 

Appreciate the reply looks like I need to polish this and start working on part 2.

 

YEES PLZ

Share this post


Link to post
Share on other sites

wanna see it

Share this post


Link to post
Share on other sites

thank you very much

Share this post


Link to post
Share on other sites

hello, ladies and gentleman today we are going to discuss what is an hacker. it's type and some Acronyms and words regarding it.

This is an part 1 of the series "HACKING : THE ELITE ART for more check out 

cracked.to and if you want to suggest some changes or want to share any amazing method from your collection then check out my contact information at the bottom of this tutorial. 

 

 

-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

 

 

-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

                                                                                                                                                                 

             

contact me here for anything but not how to lose virginity(guide under construction)

 

 

 

My Discord :- DarkEth#8995

To pm me at cracked.to :-

 

 

 

 

 

 

                 

For donations to keep the bread and butter at my table to keep me fed up.

 

                                            

 

 

 

BTC:- 17yFA5p4BQFKVp9Q8z82BxjRAGcw9E7AYk

ETC:- 0x714b81624f1e4BFE590E8Be755d96e1018F2043a

                                               

cracked.to creadits are also welcomed

cracked.to to donate.

 

nice brother well done

Share this post


Link to post
Share on other sites

i wanna see who is an hacker

Share this post


Link to post
Share on other sites

interesting to this thread

Share this post


Link to post
Share on other sites

hello, ladies and gentleman today we are going to discuss what is an hacker. it's type and some Acronyms and words regarding it.

This is an part 1 of the series "HACKING : THE ELITE ART for more check out 

cracked.to and if you want to suggest some changes or want to share any amazing method from your collection then check out my contact information at the bottom of this tutorial. 

 

 

-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

 

 

-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

                                                                                                                                                                 

             

contact me here for anything but not how to lose virginity(guide under construction)

 

 

 

My Discord :- DarkEth#8995

To pm me at cracked.to :-

 

 

 

 

 

 

                 

For donations to keep the bread and butter at my table to keep me fed up.

 

                                            

 

 

 

BTC:- 17yFA5p4BQFKVp9Q8z82BxjRAGcw9E7AYk

ETC:- 0x714b81624f1e4BFE590E8Be755d96e1018F2043a

                                               

cracked.to creadits are also welcomed

cracked.to to donate.

 

Thanks in advance .

Share this post


Link to post
Share on other sites

Thank you. I'm looking forward to reading this

Share this post


Link to post
Share on other sites

Thnxxxxxxxxx broooooooo

Share this post


Link to post
Share on other sites

hello, ladies and gentleman today we are going to discuss what is an hacker. it's type and some Acronyms and words regarding it.

This is an part 1 of the series "HACKING : THE ELITE ART for more check out 

cracked.to and if you want to suggest some changes or want to share any amazing method from your collection then check out my contact information at the bottom of this tutorial. 

 

 

-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

 

 

-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

                                                                                                                                                                 

             

contact me here for anything but not how to lose virginity(guide under construction)

 

 

 

My Discord :- DarkEth#8995

To pm me at cracked.to :-

 

 

 

 

 

 

                 

For donations to keep the bread and butter at my table to keep me fed up.

 

                                            

 

 

 

BTC:- 17yFA5p4BQFKVp9Q8z82BxjRAGcw9E7AYk

ETC:- 0x714b81624f1e4BFE590E8Be755d96e1018F2043a

                                               

cracked.to creadits are also welcomed

cracked.to to donate.

 

hopefully this shit works bro

Share this post


Link to post
Share on other sites

Coolllllllllllllllllllllllllllllllllllllllllllllllllllllllllll

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.