Hacking Philosophy
Circle of Hacking
    [~~~~~~~~~~~~~~~~~~]
 +->[ Sighting Problem ] 
 |  [~~~~~~~~~~~~~~~~~~]----->[~~~~~~~~~~~~~~~~~] 
 |                            [ Analyze Problem ]
 |  [~~~~~~~~~~~~~~~~~~]<-----[~~~~~~~~~~~~~~~~~]
 |  [  Finding Exploit ]
 |  [~~~~~~~~~~~~~~~~~~]----->[~~~~~~~~~~~~~~~~~]
 |                            [ Using/Reporting ]
 +<---------------------------[~~~~~~~~~~~~~~~~~]
Art of Hacking
From 'Rig Veda'
"Who so would kill us, whether he be a strange foe or one of us."
Means: "The security parameters could be defeated by (un/mis)-handled feature or an already compromised component present within an un-breakable system."
"Loosed from the Bowstring fly away, thou arrow, sharpened by our Prayer. Go to the foemen, strike them home, and let not one be left alive."
Means: "Make an exploit robust, accurate, infectious and untraceable."
Skills could be seen as 13 chapters of Sun Tzu's 'Art of War' ~
- Laying PlansExploit the parameter never thought to be a part of the security implications of the system. 
- Waging WarDon't overburden yourself with complex routes, if there exist less techie but more easy options. 
- Strategic Attack PlanningExploit the parameter never thought to be a part of the security implications of the system. 
- Tactical DispositionFirst secure your own location & technologies, then you are in safe & stronger place to attack. 
- Directed EnergyAttacking a complex security infrastrucure is no different than a simple one. Break it down. 
- Weaknesses & StrengthsAnalyze the system well to aim its vulnerability and leave it's alarm system untouched. 
- Engaging the ForceOne can't defeat an opponent without knowledge of opponent's security & service design. 
- Variations & AdaptabilityThe system, service & security could be set up with any kind of tweaking and hence makes the pre-analysis for attack a failure. Attacker must be always ready to amend its ways. 
- The Army on the MarchWhen to attack, and when to wait. Instincts to stay out of trap & sense enemies. 
- Situational PositioningAccess, attack & safety parameters involved. 
- The 9 BattlegroundsDifferent types of security parameters lead to different attack or sometimes no attack practices. 
- 5 Ways of Attacking with Fire- Break-in target's system with deception
- Starve the resources powering security
- Attack availability of service
- Defeat the implemented security system
- Infect reachable systems related to target
 
- Intelligence & EspionageGather as much information possible and try attacks like spear phishing to have a slave. 
It's your Dharma to Hack, if you are a Geek.
& it all starts in following part of this Eden Guide