ilias13
03-01-2017, 08:03 PM
http://i.minus.com/iRUjfEEfkoFf8.png
Hello
I saw a lot of questions in the Beginner Hacking section about how you can start with hacking.
I gave a long answer on the first, and on the second, but by the third, fourth,... I thought it could be good to make a little tutorial about it. :)
So, lets start!
http://i.minus.com/ibalhtBIZJZdtJ.png
The first thing you definitely have to learn is programming.
Programming is done for a lot of things, actually, everything you see and use on the internet.
Yeah, also the editor I used to write this guide, and even Hackforums is programmed!
If you for example press Ctrl + U on your keyboard at the same time, you’ll see a new screen popping-up with a lot of weird words and characters, well that is an example of a code.
The programming languages you see there, are HTML and CSS. HTML and CSS are the languages who are used on almost every single site... If you go to your favourite site like Facebook, Twitter, iCode4U.tk (*cough *) or anything else, you can use this as well, and see how that site is programmed for a part!
But there is also another side of programming ‘a dark side’, like I said before, everything you use on the internet is programmed, and so are the viruses, malware, spyware... You download and people use to ruin your PC!
But before we start the ‘cool’ stuff, you have to learn some programming.
I’ll refer you to some interesting programming languages, and where you can learn them.
Programming languages:
Web-Desing:/Developing:
HTML5 (Easy)
CSS3 (Easy)
JavaScript (Easy – Average)
PHP (Average – Hard)
mySQL (Average – Hard)
Computer programming:
Batch (Easy)
C++ (Average)
Python (Easy)
Visual Basics (Easy with Visual Studio)
A bit more explanation about all these languages, HTML5 is the newest version of HTML, and is used to decide what the content of a site is, every sentence, paragraph and most images are made in HTML, how they look, size,... are made in CSS.
So short, HTML is the content and CSS is the layout (how it is designed).
Javascript is one of the most popular and powerful scripting languages used on the web... It also exists so long as the web does. And you can do awesome things with it.
You can’t only make nice slideshows with it, but also get the history of an user for example, actually really easy... Or opening thousands of tabs in once, with a simple easy trick.
PHP and mySQL are mostly used for databases, mySQL is a type of database and PHP is another really popular language on the web. The most forums/chats/whatever are based on PHP.
It’s good to understand those languages, they have a huge part in the security of websites. Especially mySQL.
Let’s go over to the computer programming languages, with computer programming you can’t make websites, but other nice things like applications, calculators, mail senders, little games, owh! But also viruses, malware, spammers, port scanners,... ;)
Let me explain this languages a bit more:
Batch is an a pretty much used languages, not that much for professional big things, but for small effective or fun things.
It’s mostly used for automation. There are people who also make little viruses with it to let other’s PC crash, however that isn’t the head purpose of Batch at all. Those are also a bit effective.
C++ is used, for well, everything, you can make everything with it!
The only bad thing about it is that you have to make a separated GUI for it, (Graphic User Interface – The layout of your application)
A lot of good e-books about this language can help you a lot further!
Visual Basics is another great language, but to make it yourself easier, you have to download Visual Studio for it (Don’t worry about that price! The product key is easy to find) ;)
With Visual Basics you can make your own professional app, you can also do a lot of things with it, a lot of RATs are made in Visual Basics, And some small browsers too! :D
Well, now you know what all those programming languages are and do, but where can you learn them? Google is your best friend! :D
Good websites to learn:
Hackforums.net <of course! :D
Webdeveloper.com <Good for HTML & CSS
icode4u.tk/forum <Small cosy forum
stackoverflow.com <’HQ’ forum (actually not recommended)
codecademy.com <interactive fun courses, good way to learn
So, good Luck! :D
http://i.minus.com/iAXLTEOD5R4nb.png
But you don’t always need to do everything yourself! Some other nice people sometimes already did it for you.
There are a lot of (free) programs on the market who will help you in your journey for sure.
Programs are actually tools, who help you do things faster and easier, what it makes easy is most of the time the GUI (Graphic User Interface – Layout of the application), because you could actually replace that buttons, text,... With codes, you could do what you do on the GUI also programmatically... Because there is a code behind each button you trigger by clicking it. :)
I’ll list some programs you’ll definitely need + some examples.
Programs:
RAT (Remote Administration Tool)
Key-logger
Brute-Force
Booter
VPN
examples:
Darkcomet (RAT)
REFOG (Key-logger)
Hydra (Brute-force)
Rage Booter (Booter)
Cyberghost5 (VPN)
Well, that were a lot of programs, let me explain some of them.
A RAT (Remote Administration Tool) is a program that allows hackers to control the PC of his victim.
The hacker earns victims (better known as slaves) by spreading a Trojan, a Trojan is malware (malicious software) and is mostly presented as a helpful handy program. But in fact it gives the hacker access to your PC. This gives him the possibility to access all your files, webcam, keyboard, mouse it can let you open sites, download stuff and edit your folders,... To achieve its goal a Trojan must be undetectable, hackers do that by crypting it. If this is done well, the AV (Anti-Virus) of the victim doesn’t detect the Trojan.
A bunch of slaves is called a Botnet, that is mostly used to perform a DDoS attack/mining. A DDoS Attack to take sites/servers down, or mining bitcoins to earn digital money.
A good free RAT today is Darkcomet, it should be pretty easy to use.
Like you see, a RAT is a powerful tool!
A key-logger does actually a part of a RAT but easier, it records everything a victim types on his keyboard, this is of course used to find the password of your victim. An example of a key-logger is REFOG... You have to spread this like a RAT as well.
A brute-force program, well, it actually says it all... It forces a password to be right brute. :P
To be able to work with a brute-force program you need some things: The program, a password list, a username list (optional).
Well, an example of a brute-force program is Hydra, on Windows you won’t have its GUI but it’s okay to run it through CMD as well.
A password list is well, just a list of passwords... The program will try every word in that list until he has find the good one.
An username list actually does the same, but you only have to use this when you don’t know the username of your victim, for example hacking a FTP-server.
Dictionary hacking and brute-forcing are actually the same, except that dictionary is only with words and brute-forcing also with characters... It’s smart to run a dictionary attack first because such a list contains a lot of for-common passwords.
A booter is a tool to DDoS, do well know! DDoS’ing =/= Hacking!
A DDoS (Distributed Denial of Service) is used a lot to take sites or servers down.
Every time you visit a site, you ping that site with 32 bytes, the sites accept that request and answer it. A site or server wants to answer on every request it receives.
A good DDoS can contains 65000GB/second Of course the site or server can’t answer at all those requests and it gets overwhelmed and finally taken of the internet. (Think on the engine of a car, when it gets overheated it explodes too!).
A DDoS can also be performed with a Botnet, you let every PC on your botnet pings that site. ;)
The little cousin of a DDoS is a DoS (Denial of Service) it isn’t distributed so means that it is only performed from one PC, one network. You can do it simply with CMD (Winkey + R > “CMD” > Enter > Ping example.com –t –l 65000) you can only take down small sites with it who has a low bandwidth (amount of visitors a site can take).
A VPN (Virtual Private Network) is a tool to hide your IP.
An IP is used to trace your physical location, with a VPN you can hide that location and so, stay anonymous. An example of a Free VPN is Cyberghost5.
But you have to choose your VPN carefully, some VPN keep logs. That means that they keep your info and real IP stored in their database. Other VPNs don’t keep logs (but those aren’t free).
VPNs who don’t keep logs are more safe than others.
http://i.minus.com/ibapXhny9gs6C0.png
Another important thing in the world of hacking is staying anonymous. You won’t be found by cops when you’re doing your illegal activities.
Or when you’re doing ethical stuff (<Yay! :D) you won’t be that the bad guys cyber-attacks you!
To stay anonymous you need some tools, a VPN and Proxy.
A VPN like I already explained hides your IP by connecting you to another server, a proxy actually does the same! :D
But of course, for making homework you don’t need to stay anonymous.
You have to know when to use VPNs and proxies and when not to!
Like Mr. Logic says: You only have to use a VPN when you’re doing your activities, after them, you turn it off.
Let me explain it a bit. People will do everything to find you, so every little hole you make you’ll be found! You have to put people on a dead track.
When you’re planning to do your activities you start your PC on with a proxy, so it looks like you’re starting it up from another location. You do your activities and when you’re done you turn it off and don’t use the internet anymore for like 15-20 minutes. After that, you just start it up without proxy, and do your legal normal things (going to the site of your school/work, checking mails,...)
http://i.minus.com/is1Wla89gNwW.png
In the scheme above the red line presents hacking activities, the green line normal activities.
It’s suspicious if a PC gets de-connected from a server and another pops-up somewhere else directly.
With the good method you put people on a dead track. :)
Or if you also do your normal activities with the same VPN.
For example:
You just DDoS’ed a site and someone wants to track you, but because of the VPN they can’t track your physical location... But when you’re done and you log-in on Facebook with your real name using that VPN, you actually made the tracing very easy because you gave your real name.
It is maybe also smart holding all your programs or/and logs on a USB you can easily hide (not under your bed...) or even delete the data with a strong (electro)magnet.
Also it’s handy to use drop-email addresses, it are mails you make at gmail or whatever use it for registration and confirming for your account, and than just drop it and never use it again.
Of course, to make these you have to use a VPN, and another name and password like you do normally... I also recommend using another VPN server for making these. There may not be any connection between that address and everything else related to you. :D
http://i.minus.com/iSFteu6MEsJWi.png
There are also other programs you have to know, or other thing you have to know.
I’ll list some of them.
Other:
CMD
VM
Knowledge of networking
Hardware
Copycatting
CMD (CoManD prompt) is still really handy to do things and or little tricks, The programming language Batch is related with CMD... CMD is actually the GUI of Batch.
Every Windows PC has automatic, just do Ctrl + R > “CMD” > Enter.
Search something about it, it is really fun and handy! :D
A VM (Virtual Machine) allows you to run multiple OS’s on one PC.
It is used a lot to test own-made OS’s and pen-testing OS’s (Kali Linux).
Also to test viruses save. :D
Having some knowledge of networking is also a basic, you must know how computers, internet,... works. Reading 1-2 good books will be okay! :D
Also your hardware must be up-to-date, the better hardware the better the results are.
It’s also handy to know how a PC works.
Copycatting is copying sites. You can do this easy by pressing Ctrl + S on any site, or Ctrl + U and copy/paste the source code.
Of course there are also advanced and more effective ways to do this.
Remember, this is piracy and against the law of copyright!
http://i.minus.com/ibhlyR5sH75l5Z.png
There are a lot of ways to hack, I’ll list some of them and explain them! :D
Methods:
RAT-infecting
SQLi
Wi-Fi hacking
E-whoring
Key-logging
Brute-Forcing
If you were concentrated you saw we already discussed the most of these things.
But we also included one new thing, SQLi, Wi-Fi hacking and e-whoring.
A SQLi means SQL injection, and actually means hacking the database of a website.
You don’t need a special program for it but just a browser!
It also isn’t that hard at all. You play with the URL of the website so the result are the content of the database.
Like you probably know a Wi-Fi is actually a wireless router.
And you are able to hack it! :D
You can do it with any brute-force program like Hydra but there are also special programs for it like Reaver.
E-whoring isn't really hacking, but could be important too if you want to learn it.
Mostly hackers act like they are girls in chat rooms, they have fake pictures, videos, and web-cam videos. Men pays a lot of money for more pictures and videos, or even sometimes send money to the hacker (fake girl) for a whole plane ticket... Of course, it's all fake.
A lot of people makes tons of money with it, but the method could be sometimes a bit 'ewww'. ;)
http://i.minus.com/ibcWdeNYdbmZRA.png
Hackforums is of course an awesome (best) place on the internet to learn hacking, I'll link you some interesting and important boards here:
Boards:
Viruses
SQLi
Wi-Fi hacking
Programs (Also check sub-boards)
Botnets
[Whole coding section]
Read 5-7 threads on all of these boards and everything gets more clear! :D
http://i.minus.com/iRJD5EB5OUu1z.png
Well, know you finally have some knowledge about hacking, but what are you go to do with that knowledge?
Are go to use if for good ethical purposes?
Or by doing harm to innocent people?
It is your choice to chose what hat to wear.
You could choose to be a black hat, this includes ALL illegal activities related with hacking.
You could also choose to be a white hat, this include all legal authorized activities.
But of course your choice is really important and can be life-changing.
If you choose to be a black hat and doing harm to innocent people, cops will look for you... And in extreme cases you could get mess with governments or security agencies. And you can try, but believe me; Those are more powerful than you...
But if you choose to be a White Hat and use your knowledge for ethical purposes, cops of course won’t look for you.
Even when you do un-authorized things for good, your punishment would be really soft/none at all. ;)
I highly recommend using it for White Hat purposes, of course... E-whoring once a year to make $20 a month won’t be a problem in most cases... But infecting random people and break their privacy can cause you problems.
Yeah, even when you’re under-aged.
_____
Anyway, I hope you found my mini-tutorial a bit interesting and helped you! :D
Part2
Any suggestions are appreciated! ;)
Thanks for reading,
Niely
Hello
I saw a lot of questions in the Beginner Hacking section about how you can start with hacking.
I gave a long answer on the first, and on the second, but by the third, fourth,... I thought it could be good to make a little tutorial about it. :)
So, lets start!
http://i.minus.com/ibalhtBIZJZdtJ.png
The first thing you definitely have to learn is programming.
Programming is done for a lot of things, actually, everything you see and use on the internet.
Yeah, also the editor I used to write this guide, and even Hackforums is programmed!
If you for example press Ctrl + U on your keyboard at the same time, you’ll see a new screen popping-up with a lot of weird words and characters, well that is an example of a code.
The programming languages you see there, are HTML and CSS. HTML and CSS are the languages who are used on almost every single site... If you go to your favourite site like Facebook, Twitter, iCode4U.tk (*cough *) or anything else, you can use this as well, and see how that site is programmed for a part!
But there is also another side of programming ‘a dark side’, like I said before, everything you use on the internet is programmed, and so are the viruses, malware, spyware... You download and people use to ruin your PC!
But before we start the ‘cool’ stuff, you have to learn some programming.
I’ll refer you to some interesting programming languages, and where you can learn them.
Programming languages:
Web-Desing:/Developing:
HTML5 (Easy)
CSS3 (Easy)
JavaScript (Easy – Average)
PHP (Average – Hard)
mySQL (Average – Hard)
Computer programming:
Batch (Easy)
C++ (Average)
Python (Easy)
Visual Basics (Easy with Visual Studio)
A bit more explanation about all these languages, HTML5 is the newest version of HTML, and is used to decide what the content of a site is, every sentence, paragraph and most images are made in HTML, how they look, size,... are made in CSS.
So short, HTML is the content and CSS is the layout (how it is designed).
Javascript is one of the most popular and powerful scripting languages used on the web... It also exists so long as the web does. And you can do awesome things with it.
You can’t only make nice slideshows with it, but also get the history of an user for example, actually really easy... Or opening thousands of tabs in once, with a simple easy trick.
PHP and mySQL are mostly used for databases, mySQL is a type of database and PHP is another really popular language on the web. The most forums/chats/whatever are based on PHP.
It’s good to understand those languages, they have a huge part in the security of websites. Especially mySQL.
Let’s go over to the computer programming languages, with computer programming you can’t make websites, but other nice things like applications, calculators, mail senders, little games, owh! But also viruses, malware, spammers, port scanners,... ;)
Let me explain this languages a bit more:
Batch is an a pretty much used languages, not that much for professional big things, but for small effective or fun things.
It’s mostly used for automation. There are people who also make little viruses with it to let other’s PC crash, however that isn’t the head purpose of Batch at all. Those are also a bit effective.
C++ is used, for well, everything, you can make everything with it!
The only bad thing about it is that you have to make a separated GUI for it, (Graphic User Interface – The layout of your application)
A lot of good e-books about this language can help you a lot further!
Visual Basics is another great language, but to make it yourself easier, you have to download Visual Studio for it (Don’t worry about that price! The product key is easy to find) ;)
With Visual Basics you can make your own professional app, you can also do a lot of things with it, a lot of RATs are made in Visual Basics, And some small browsers too! :D
Well, now you know what all those programming languages are and do, but where can you learn them? Google is your best friend! :D
Good websites to learn:
Hackforums.net <of course! :D
Webdeveloper.com <Good for HTML & CSS
icode4u.tk/forum <Small cosy forum
stackoverflow.com <’HQ’ forum (actually not recommended)
codecademy.com <interactive fun courses, good way to learn
So, good Luck! :D
http://i.minus.com/iAXLTEOD5R4nb.png
But you don’t always need to do everything yourself! Some other nice people sometimes already did it for you.
There are a lot of (free) programs on the market who will help you in your journey for sure.
Programs are actually tools, who help you do things faster and easier, what it makes easy is most of the time the GUI (Graphic User Interface – Layout of the application), because you could actually replace that buttons, text,... With codes, you could do what you do on the GUI also programmatically... Because there is a code behind each button you trigger by clicking it. :)
I’ll list some programs you’ll definitely need + some examples.
Programs:
RAT (Remote Administration Tool)
Key-logger
Brute-Force
Booter
VPN
examples:
Darkcomet (RAT)
REFOG (Key-logger)
Hydra (Brute-force)
Rage Booter (Booter)
Cyberghost5 (VPN)
Well, that were a lot of programs, let me explain some of them.
A RAT (Remote Administration Tool) is a program that allows hackers to control the PC of his victim.
The hacker earns victims (better known as slaves) by spreading a Trojan, a Trojan is malware (malicious software) and is mostly presented as a helpful handy program. But in fact it gives the hacker access to your PC. This gives him the possibility to access all your files, webcam, keyboard, mouse it can let you open sites, download stuff and edit your folders,... To achieve its goal a Trojan must be undetectable, hackers do that by crypting it. If this is done well, the AV (Anti-Virus) of the victim doesn’t detect the Trojan.
A bunch of slaves is called a Botnet, that is mostly used to perform a DDoS attack/mining. A DDoS Attack to take sites/servers down, or mining bitcoins to earn digital money.
A good free RAT today is Darkcomet, it should be pretty easy to use.
Like you see, a RAT is a powerful tool!
A key-logger does actually a part of a RAT but easier, it records everything a victim types on his keyboard, this is of course used to find the password of your victim. An example of a key-logger is REFOG... You have to spread this like a RAT as well.
A brute-force program, well, it actually says it all... It forces a password to be right brute. :P
To be able to work with a brute-force program you need some things: The program, a password list, a username list (optional).
Well, an example of a brute-force program is Hydra, on Windows you won’t have its GUI but it’s okay to run it through CMD as well.
A password list is well, just a list of passwords... The program will try every word in that list until he has find the good one.
An username list actually does the same, but you only have to use this when you don’t know the username of your victim, for example hacking a FTP-server.
Dictionary hacking and brute-forcing are actually the same, except that dictionary is only with words and brute-forcing also with characters... It’s smart to run a dictionary attack first because such a list contains a lot of for-common passwords.
A booter is a tool to DDoS, do well know! DDoS’ing =/= Hacking!
A DDoS (Distributed Denial of Service) is used a lot to take sites or servers down.
Every time you visit a site, you ping that site with 32 bytes, the sites accept that request and answer it. A site or server wants to answer on every request it receives.
A good DDoS can contains 65000GB/second Of course the site or server can’t answer at all those requests and it gets overwhelmed and finally taken of the internet. (Think on the engine of a car, when it gets overheated it explodes too!).
A DDoS can also be performed with a Botnet, you let every PC on your botnet pings that site. ;)
The little cousin of a DDoS is a DoS (Denial of Service) it isn’t distributed so means that it is only performed from one PC, one network. You can do it simply with CMD (Winkey + R > “CMD” > Enter > Ping example.com –t –l 65000) you can only take down small sites with it who has a low bandwidth (amount of visitors a site can take).
A VPN (Virtual Private Network) is a tool to hide your IP.
An IP is used to trace your physical location, with a VPN you can hide that location and so, stay anonymous. An example of a Free VPN is Cyberghost5.
But you have to choose your VPN carefully, some VPN keep logs. That means that they keep your info and real IP stored in their database. Other VPNs don’t keep logs (but those aren’t free).
VPNs who don’t keep logs are more safe than others.
http://i.minus.com/ibapXhny9gs6C0.png
Another important thing in the world of hacking is staying anonymous. You won’t be found by cops when you’re doing your illegal activities.
Or when you’re doing ethical stuff (<Yay! :D) you won’t be that the bad guys cyber-attacks you!
To stay anonymous you need some tools, a VPN and Proxy.
A VPN like I already explained hides your IP by connecting you to another server, a proxy actually does the same! :D
But of course, for making homework you don’t need to stay anonymous.
You have to know when to use VPNs and proxies and when not to!
Like Mr. Logic says: You only have to use a VPN when you’re doing your activities, after them, you turn it off.
Let me explain it a bit. People will do everything to find you, so every little hole you make you’ll be found! You have to put people on a dead track.
When you’re planning to do your activities you start your PC on with a proxy, so it looks like you’re starting it up from another location. You do your activities and when you’re done you turn it off and don’t use the internet anymore for like 15-20 minutes. After that, you just start it up without proxy, and do your legal normal things (going to the site of your school/work, checking mails,...)
http://i.minus.com/is1Wla89gNwW.png
In the scheme above the red line presents hacking activities, the green line normal activities.
It’s suspicious if a PC gets de-connected from a server and another pops-up somewhere else directly.
With the good method you put people on a dead track. :)
Or if you also do your normal activities with the same VPN.
For example:
You just DDoS’ed a site and someone wants to track you, but because of the VPN they can’t track your physical location... But when you’re done and you log-in on Facebook with your real name using that VPN, you actually made the tracing very easy because you gave your real name.
It is maybe also smart holding all your programs or/and logs on a USB you can easily hide (not under your bed...) or even delete the data with a strong (electro)magnet.
Also it’s handy to use drop-email addresses, it are mails you make at gmail or whatever use it for registration and confirming for your account, and than just drop it and never use it again.
Of course, to make these you have to use a VPN, and another name and password like you do normally... I also recommend using another VPN server for making these. There may not be any connection between that address and everything else related to you. :D
http://i.minus.com/iSFteu6MEsJWi.png
There are also other programs you have to know, or other thing you have to know.
I’ll list some of them.
Other:
CMD
VM
Knowledge of networking
Hardware
Copycatting
CMD (CoManD prompt) is still really handy to do things and or little tricks, The programming language Batch is related with CMD... CMD is actually the GUI of Batch.
Every Windows PC has automatic, just do Ctrl + R > “CMD” > Enter.
Search something about it, it is really fun and handy! :D
A VM (Virtual Machine) allows you to run multiple OS’s on one PC.
It is used a lot to test own-made OS’s and pen-testing OS’s (Kali Linux).
Also to test viruses save. :D
Having some knowledge of networking is also a basic, you must know how computers, internet,... works. Reading 1-2 good books will be okay! :D
Also your hardware must be up-to-date, the better hardware the better the results are.
It’s also handy to know how a PC works.
Copycatting is copying sites. You can do this easy by pressing Ctrl + S on any site, or Ctrl + U and copy/paste the source code.
Of course there are also advanced and more effective ways to do this.
Remember, this is piracy and against the law of copyright!
http://i.minus.com/ibhlyR5sH75l5Z.png
There are a lot of ways to hack, I’ll list some of them and explain them! :D
Methods:
RAT-infecting
SQLi
Wi-Fi hacking
E-whoring
Key-logging
Brute-Forcing
If you were concentrated you saw we already discussed the most of these things.
But we also included one new thing, SQLi, Wi-Fi hacking and e-whoring.
A SQLi means SQL injection, and actually means hacking the database of a website.
You don’t need a special program for it but just a browser!
It also isn’t that hard at all. You play with the URL of the website so the result are the content of the database.
Like you probably know a Wi-Fi is actually a wireless router.
And you are able to hack it! :D
You can do it with any brute-force program like Hydra but there are also special programs for it like Reaver.
E-whoring isn't really hacking, but could be important too if you want to learn it.
Mostly hackers act like they are girls in chat rooms, they have fake pictures, videos, and web-cam videos. Men pays a lot of money for more pictures and videos, or even sometimes send money to the hacker (fake girl) for a whole plane ticket... Of course, it's all fake.
A lot of people makes tons of money with it, but the method could be sometimes a bit 'ewww'. ;)
http://i.minus.com/ibcWdeNYdbmZRA.png
Hackforums is of course an awesome (best) place on the internet to learn hacking, I'll link you some interesting and important boards here:
Boards:
Viruses
SQLi
Wi-Fi hacking
Programs (Also check sub-boards)
Botnets
[Whole coding section]
Read 5-7 threads on all of these boards and everything gets more clear! :D
http://i.minus.com/iRJD5EB5OUu1z.png
Well, know you finally have some knowledge about hacking, but what are you go to do with that knowledge?
Are go to use if for good ethical purposes?
Or by doing harm to innocent people?
It is your choice to chose what hat to wear.
You could choose to be a black hat, this includes ALL illegal activities related with hacking.
You could also choose to be a white hat, this include all legal authorized activities.
But of course your choice is really important and can be life-changing.
If you choose to be a black hat and doing harm to innocent people, cops will look for you... And in extreme cases you could get mess with governments or security agencies. And you can try, but believe me; Those are more powerful than you...
But if you choose to be a White Hat and use your knowledge for ethical purposes, cops of course won’t look for you.
Even when you do un-authorized things for good, your punishment would be really soft/none at all. ;)
I highly recommend using it for White Hat purposes, of course... E-whoring once a year to make $20 a month won’t be a problem in most cases... But infecting random people and break their privacy can cause you problems.
Yeah, even when you’re under-aged.
_____
Anyway, I hope you found my mini-tutorial a bit interesting and helped you! :D
Part2
Any suggestions are appreciated! ;)
Thanks for reading,
Niely