The Hacker's Manual
by Scale
Do you think you could be a Hacker? The ordinary person thinks "Hacking is easy" or "I can learn everything about hacking within a week if I just study the art of it, and nonstop learn". But that isn't true, it takes experience. Learning and failing, learning and failing on repeat. Learning from your past mistakes will make you better at what you do, no matter what it is. When I first started I thought I would learn everything within a certain period of time, but it didn't work. It took me a lot longer to learn everything I know now, and even at the state I am now I don't know everything. You need to keep your mind open and ready to learn 24/7
How does a Hacker think? A hacker, to the normal eye might seem as a person who has no feelings whatsoever, and spends his/her whole life in their basement destroying other peoples lives. But that is not true, well some people may actually do that but no one can judge them. It's similar to sitting in your basement playing Xbox, Playstation, Steam/PC all day. Hackers are a lot smarter than you think (outside of the computer world), they hide the fact that everything in the normal world bores them. The typical math class, history class, science class bores them. The fact that everything is repetitive and nothing is new to learn.
What does a Hacker need? A hacker needs, a brain ready to learn from their mistakes and accept them, a computer, keyboard, mouse, and maybe a USB if it is needed. Most hackers run on the Linux Operating System, practically any Distribution. When you first begin you're going to think that you'll need Kali Linux, but that's not true at all. You can run any Linux Distribution and do anything that Kali can do, as long as you install all of the needed plugins.
Penetration Testing Linux Distributions
Anonymity Linux Distributions
User Friendly Distributions
Anonymity What is Anonymity? Anonymity is the hackers best friend. Definition of Anonymity - "the condition of being anonymous". Your anonymity is the most important thing in a hackers life. Also known as "OPSEC" Definition - "Operations security (OPSEC) is a term originating in U.S. military jargon, as a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them". In basic terms OPSEC is your Anonymity. If you keep to yourself, and have no public information on the internet then you are perfectly safe.
Keep to yourself As you will learn from experience, or watch around in the "Scene" is that people who keep to themselves will never become a target. If you keep to yourself and don't disturb any other hackers then you should have no problem. Also, do NOT make yourself sound stupid. Don't act like you're "Undoxable" its a stupid thing to even mention. Everyone is able to be "Doxed".
How to hide your IP Hiding your IP is the core of Anonymity. If no one knows your IP address, and cannot find it then you have a pretty great Anonymity. However there will be a point that you will forget to turn your VPN/Proxy on and go onto the internet. VPN - "Virtual Private Network" In a basic standpoint it masks your home IP address, with the VPN Providers Servers. Paid for services are and will always be better than Free services. RA4WVPN is probably my favorite VPN of all time, it has a low price and a ton of different Servers to connect through. VPNBook is a great free vpn, has a few servers.
Paid VPN's
RA4WVPN
CyberGhost
PrivateInternetAccess
Free VPN
VPNBook
The Onion Router (TOR) What is TOR? TOR is a free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. What does TOR do? TOR bounces your communications around a distributed network of relays (Proxy's). It protects you from people potentially watching over your Internet.
TOR Download
SQL Injection What is SQL? SQL - Structured Query Language. What is SQL Injection? SQL Injection is a code technique, used to attack driven applications, which malicious SQL statements are injected into an entry field for execution, to dump a database. You can find SQL Vulnerable sites via Google Dorks. You can tell when a site is vulnerable when you enter a ' at the end of the url, and it comes up as a "Syntax Error".
Example
Spoiler Show
As you can see there is a Syntax error. That's how you can tell that it is in fact SQL Vulnerable.
SQLmap SQLMap is wonderful tool for SQL Injection. It can be used on Windows, and Linux. (If you would like a Tutorial on how to use this, post below asking for one! )
SQLMap
SQLMap tutorial
Spoiler Show
Havij Havij is another wonderful SQL Injection tool, which literally does all the work for you. (Beginners I suggest you use this)
Havij
Doxing No doxing is not considered hacking, it is completely legal and I have no clue why it is associated with "Hacking" . I'm not going to be going into detail on how to ISP dox, it takes experience and and knowing how to social engineer to do it. Which I personally cannot teach you how to speak to someone. I do suggest when you are going to be ISP doxing someone, is that you do it on a VPN and through Skype.
Basic Doxing Tools
A Brain.
WhitePages
ThatsThem
Spokeo
( This took quite some time to write, so I really would enjoy the feedback! )