Hacking Philosophy

Circle of Hacking

    [~~~~~~~~~~~~~~~~~~]
 +->[ Sighting Problem ] 
 |  [~~~~~~~~~~~~~~~~~~]----->[~~~~~~~~~~~~~~~~~] 
 |                            [ Analyze Problem ]
 |  [~~~~~~~~~~~~~~~~~~]<-----[~~~~~~~~~~~~~~~~~]
 |  [  Finding Exploit ]
 |  [~~~~~~~~~~~~~~~~~~]----->[~~~~~~~~~~~~~~~~~]
 |                            [ Using/Reporting ]
 +<---------------------------[~~~~~~~~~~~~~~~~~]

Art of Hacking

From 'Rig Veda'

"Who so would kill us, whether he be a strange foe or one of us."

Means: "The security parameters could be defeated by (un/mis)-handled feature or an already compromised component present within an un-breakable system."

"Loosed from the Bowstring fly away, thou arrow, sharpened by our Prayer. Go to the foemen, strike them home, and let not one be left alive."

Means: "Make an exploit robust, accurate, infectious and untraceable."

Skills could be seen as 13 chapters of Sun Tzu's 'Art of War' ~

  • Laying Plans

    Exploit the parameter never thought to be a part of the security implications of the system.

  • Waging War

    Don't overburden yourself with complex routes, if there exist less techie but more easy options.

  • Strategic Attack Planning

    Exploit the parameter never thought to be a part of the security implications of the system.

  • Tactical Disposition

    First secure your own location & technologies, then you are in safe & stronger place to attack.

  • Directed Energy

    Attacking a complex security infrastrucure is no different than a simple one. Break it down.

  • Weaknesses & Strengths

    Analyze the system well to aim its vulnerability and leave it's alarm system untouched.

  • Engaging the Force

    One can't defeat an opponent without knowledge of opponent's security & service design.

  • Variations & Adaptability

    The system, service & security could be set up with any kind of tweaking and hence makes the pre-analysis for attack a failure. Attacker must be always ready to amend its ways.

  • The Army on the March

    When to attack, and when to wait. Instincts to stay out of trap & sense enemies.

  • Situational Positioning

    Access, attack & safety parameters involved.

  • The 9 Battlegrounds

    Different types of security parameters lead to different attack or sometimes no attack practices.

  • 5 Ways of Attacking with Fire
    • Break-in target's system with deception
    • Starve the resources powering security
    • Attack availability of service
    • Defeat the implemented security system
    • Infect reachable systems related to target
  • Intelligence & Espionage

    Gather as much information possible and try attacks like spear phishing to have a slave.

It's your Dharma to Hack, if you are a Geek.

& it all starts in following part of this Eden Guide


results matching ""

    No results matching ""