Picture Picture
Picture

HDC : Neophyte Haven

Everyone has to start somewhere, and since hacking will continue to grow and transform as technology progresses, there will always be newcomers. The purpose of Neophyte Haven is to present information that will help those new to the scene get started on their foray into the world of hacking and the computer underground. The best way to start, and continue, building your knowledge base is to read up on material that interests you. Try locating everything you can, on and offline,  about hacking, computers, programming, cellular phones, whatever interests you. Then read it. Study it. Understand it. You can never know too much...

Note: files marked with the `new' symbol are new additions to the site, not necessarily new releases.
Regards,
The HDC Staff
[ Text Files | Publications | Happy Hacker | GTmHH | Tips & Tools ]
Picture
Beginner's Text and HTML Files
Basic Usage Unix Commands Plus a chmod intro    
  v1.0 Compiled By InSaNiTy (April 2001) HTML

(14.6k)

The Unix Filesystem A short Tutorial    
  v1.0 Compiled By InSaNiTy (April 2001) HTML

(2.97k)

Basic Unix FAQ    
  v1.0 Compiled By UNIXkid (April 2001) HTML

(10.7k)

Virus FAQ    
  v1.0 Compiled by LiquidCh@os (March 2001) HTML

(15.5k)

Hack Kit    
  v2.0 - March 1997 by Invisible Evil

(290k)

The Neophyte's Guide To Hacking    
  1993 Edition by Deicide  

(170k)

New User's Guide    
  v1.0 by Phantom  

(48k)

The Newbie's Guide To Hacking and Phreaking    
  v1.0 - August 1997 by Terminal Killah  

(16k)

A Novice's Guide To Hacking    
  1989 Edition by The Mentor (Legion of Doom)  

(43k)

Hacking : A State of Mind    
  By Avatar  

(6k)

The Hacker's Handbook    
  © 1985 by Hugo Cornwall  

(125k)

Newbie's handbook    
  By Plowsk¥ Phreak  

(45k)

Newbie's Read This (Basic Hacking)    
  Unknown  

(13k)

The Official Phreaker's Manual    
  1987 - By The Jammer and Jack the Ripper  

(172k)

The Ultimate Beginner's Guide to Hacking    
  1996 - By Revelation (LOA - ASH)  

(63k)

Becoming a Uebercracker    
  1993 - By Christopher Klaus  

(9k)

Beginner's Guide to VAX/VMS Hacking    
  1989 - By Entity  

(116k)

The Hacker's Manifesto    
  Mentor's Last Words  

(4k)

Everything a Hacker Needs to Know About Getting Busted By The Feds    
  1997 - By Agent Steal (Written from Federal Prison)  

(67k)

The Hacker's Jargon File    
  July 1996 - Version 4.0.0  

(***)

Picture
Publications & Ezines
Phrack Magazine  (www.phrack.org)  
  Current Distro: Volume 8, Issue 52

Phrack is a long-time running hacking/phreaking oriented ezine which started in the early `80's. It is only published electronically, and, after recently changing editors, is is being published monthly. Back issues can be found at the Phrack website, or they are available for download from the Hackers.Com Archives. Issues provide more than a wealth of information.
 
2600 Magazine   (www.2600.com)  
  2600 - The Hacker Quarterly is another hacking oriented
magazine that is only available as a printed magazine. It tends to be more technically oriented, but it's been
around since the early `80's and is another great source of information. You can generally find it in your local bookstore with or near the computer magazines, but check out their
web site for more details. Published quarterly.
 
Books Worth Reading  
 

The following should be available at your local library or major bookstore:

Hacker Crackdown
  - Bruce Sterling, 1996

Cyberpunk
  - John Markoff et al

Masters of Deception: The Gang That Ruled Cyberspace
  - Josh Quittner et al

The Fugitive Game: Online with Kevin Mitnick
  - Jonathon Littman

The Watchman: The Twisted Life & Crimes of Kevin Poulsen
  - Jonathon Littman

At Large: The Strange Case of the Internet's Biggest Invasion
  - David H. Freedman & Charles C. Mann

Maximum Security: The Insider's Guide to Network Security
 
- Anonymous

Firewalls and Internet Security: Repelling the Wily Hacker
  - William R. Cheswick & Steve M. Bellovin

Applied Cryptography
  - Bruce Schneier

 
Picture
Beginner Tips and Tools

First, the tools:

Following is a small list of utilities that are worthy of having in any hackers arsenal. These won't make you a hacker, and using them isn't necessarily hacking. They are tools that can help aid the curious minded individual for whatever endeavors they see fit. But regardless, grab these to begin your collection:

Note: Programs mentioned are for DOS/Windows
ToneLoc v1.10  
  War Dialer. Often referred to as a scanner or demon dialer. It's purpose if to scan the local calling area (or long distance) for carrier tones with the hopes of finding a modem at the other end. If there is a modem, there's bound to be a computer attached to it, right? You can find others in our archives.  Click [ HERE ] to jump there... (315k)
Cracker Jack v1.4  
  Password Cracker. A utility used to exhibit brute force attempts at cracking Unix based password files (often denoted as etc/passwd). It runs under DOS, and has a decent collection of features. Similar utilities can also be found in the archives. Click [ HERE ] to jump there... (115k)
Hacker's Utility v1.02  
  Combo Pak. This program offers a number of useful utilities built into one package. It has a password cracker, word generator, word sorter, port scanner, finger lookup, file extractor, dummy file crator and more. Not a bad piece of software... (841k)
CyberKit v2.2  
  Internet Tools. A front-end for the following functions:
Ping, TraceRoute, Finger, Whois and NS Lookup. Useful if you happen to use the Internet. If you aren't sure, ask yourself how you're viewing this page...that should clarify things for ya...
(905k)
PGP Freeware v5.0  
  Encryption. Probably the best encryption utility you can use (currently), Pretty Good Privacy is a must for anyone who respects there privacy, hacker oriented or not. Learn it. Use it. Encrypt your email. Encrypt your files. Encrypt yourself. (3504k)
7th Sphere PortScan v1.1  
  Port Scanner. A useful and fast port scanner from 7th Sphere. Simple to setup, even simpler to run. (11k)

Now, the tips:

The following tips are just small words of wisdom for those starting out.
They aren't guidlines to live by, and they aren't intended to insult anyone's intelligence. They were just developed based on the kinds of feedback we get from neophytes. All we can say is, live and learn...

Tip #1

 

If you don't understand how to compress and decompress an archived file [ie. a zipped file (.zip)] then you really need to read a basic book on computing etc. before moving on. Believe it or not, it's more than common to read an email such as "...what viewer do I need to view the .zip files on your site?" You need WinZip (for Windows buffs) or a similar package (which is just a front-end for the pkzip and pkunzip utilities (v2.04)...get it, understand it, use it.
Tip #2
If you're completely new to the realm of computer hacking and the underground, the only way to learn is to read...read...and read some more. Then experiment with what you start learning, and ask intelligent questions of those who may know the answers. There is no shortcut to learning to hack. It comes with understanding and hands on experience, trial and error and a little patience...
Tip #3
When you ask someone (another hacker) a question...don't be surprised if you get flamed for being a newbie or told to get lost. It seems the mentality of those who feel they know it all is to horde info. Either way, just make sure you try and find out the answer and tap all other resources before asking for a blatant answer without attempting to answer it yourself. One aspect of hacking is being able to track down information, to solve a problem yourself using all the resources you can think of before going for the quick fix...research can lead to discovery...
Tip #4
Learn a programming and/or a scripting language, preferably one that is Unix based (C++, Perl, JavaScript etc.) Learning to program and write scripts can be vital components in understanding the ins and outs of an operating system (OS) in order to exploit weaknesses and security holes etc. Understanding how to exploit a weakness can in turn teach you how to locate and patch them...that is, if you're not bent on malicious intent, that would be taboo...it's all about exploration and satisfying curiosity.
Picture
menubar-r
menublip
mi-neo-over
menublip2
1-tabletop
Picture
H A C K E R S . C O M
Feedback: webmasters@hackers.com
Copyright © 1998 HDC - Read the Disclaimer before operating.

 
Return Home