GoodKat Posted November 12, 2007 Report Posted November 12, 2007 One of the most integral parts of a hacker's mindsetis his/her set of ethics. And ethics frequently go hand inhand with safety, which is obviously the most criticalpart of the process of hacking and the systemexploration, if you plan to spend your life outsideof the jail.A hacker's ethics are generally somewhat different fromthat of an average Juan dela Cruz. An average Juan delaCruz would be taught that it is bad to break laws, even thoughmost do anyways. We're encouraging you to break laws, but inthe quest for knowledge. In my mind, if hacking is done withthe right intentions it is not all that criminal. The media likesto make us out to be psychotic sociopaths bent on causingarmageddon with our PCs. Not likely. I could probably turn thetables on the fearmongering media by showing that the averageJuan dela Cruz who cheats on his taxes is harming the systemmore than a curious interloper, but WE refrain.. let them wallow...The one thing a hacker must never do is maliciously hack(also known as crash, trash, etc..) a system. Deletingand modifying files unnecessary is BAD. It serves nopurpose but to send the sysadmins on a warhuntfor your head, and to take away your account. Lame.Don't do it. Anyways, if you don't understand all of these,just do your best to follow them, and take our word for it.You'll understand the reasoning behind theseguidelines later.I. Don't ever maliciously hack a system. Do not delete or modify filesunnecessarily, or intentionally slow down or crash a system.The lone exception to this rule is the modification of system logs andaudit trails to hide your tracks.II. Don't give your name or real phone number to ANYONE,it doesn't matter who they are. Some of the most famousphreaks have turned narcs because they've been busted,and they will turn you in if you give them a chance. It'sbeen said that one out of every three hackers is a fed, andwhile this is an exaggeration, use this as a rule and youshould do fine. Meet them on a loop, alliance, bbs, chatsystem, whatever, just don't give out your voice number.III. Stay away from government computers. You willfind out very fast that attempting to hack a MilTac installationis next to impossible, and will get you arrested before youcan say "oh shit". Big Brother has infinite resources todraw on, and has all the time it needs to hunt you down.They will spend literally years tracking you down. As temptingas it may be, don't rush into it, you'll regret it in the end.IV. Don't use codes from your own home, ever! Period. Thisis the most incredibly lame thing we've seen throughout ourlives in the 'underground'; incredible abuse of codes, whichhas been the downfall of so many people. Most PBX/950/800shave ANI, and using them will eventually get you busted,without question. And calling cards are an even worse idea.Codes are a form of pseudo-phreaking which have nothingto do with the exploration of the telephone networks, whichis what phreaking is about. If you are too lazy to field phreakor be inventive, then forget about phreaking.V. Don't incriminate others, no matter how bad you hate them.Turning in people over a dispute is a terrible way to solve things;kick their ass, shut off their phones/power/water, whatever,just don't bust them. It will come back to you in the end..VI. Watch what you post. Don't post accounts or codesover open nets as a rule. They will die within days, andyou will lose your new treasure. And the posting of creditcard numbers is indeed a criminal offenseunder a law passed in the Reagan years.VII. Don't card items. This is actually a worse idea thanusing codes, the chances of getting busted are very high.VIII. If for some reason you have to use codes, useyour own, and nothing else. Never use a code you seeon a board, because chances are it has been abusedbeyond belief and it is already being monitored.IX. Feel free to ask questions, but keep them withinreason. People won't always be willing to hand out rareaccounts, and if this is the case don't be surprised. Keepthe questions technical as a rule. Try and learn as muchas you can from pure hands on experience.X. And finally, be somewhat paranoid. Use PGP (and otherstrong encryption programs) to encrypt your files, keepyour notes/printouts stored secretly, whatever you cando to prolong your stay in the hacking scene.XI. If you get busted, don't tell the authorities ANYTHING.Refuse to speak to them without a lawyer present.XII. If police arrive at your residence to serve asearch warrant, look it over carefully, it is yourright. Know what they can and can't do, andif they can't do something, make sure they don't.XIII. If at all possible, try not to hack off your ownphoneline. Splice your neighbor's line, call from aFortress Fone, phreak off a junction box,whatever.. if you hack long enough, chancesare one day you'll be traced. Don't believeyou are entirely safe on packet-switchednetworks either, it takes a while but if youscan/hack off your local access point theywill put a trace on it.XIV. Make the tracking of yourself as difficult aspossible for others. Bounce the call off severaloutdials, or try to go through at least twodifferent telco companies when making a call toa dialup. When on a packet-switched networkor a local or wide area network, try and bouncethe call off various pads or through other networksbefore you reach your destination. The more bounces,the more red tape for the investigator and theeasier it is for you to make a cleangetaway. Try not to stay on anysystem for *too* long, and alternateyour calling times and dates.XV. Do not keep written notes! Keep all informationon computer, encrypted with PGP or anothermilitary-standard encryption program.Written notes will only serve to incriminateyou in a court of law. If you write something downoriginally, shred the paper.. itty bittypieces is best, or even better, burn it! FedsDO trash, just like us, and throwing out yournotes complete will land in their hands, andthey'll use it against you.XVI. Finally, the day/night calling controversy.Some folks think it is a better idea to call duringthe day(or whenever the user would normallyuse his account) as to not arouse the sysadmin'ssuspicion of abnormal calling times, while othersthink it is better to call when nobody is around.This is a tough one, as there is no real answer.If the sysadmin keeps logs (and reads over them)he will definetly think it strange that asecretary calls in at 3 am.. he will probablythen look closer and find it even stranger thatthe secretary then grabbed the password file andproceeded to set him/herself up with a root shell.On the other hand, if you call during the time theuser would normally call, the real owner of theaccount may very well log in to see his namealready there, or even worse be denied accessbecause his account is already in use.In the end, it is down to your opinion.And remember, when you make a decision stickto it; remember the timezone changes.Words of wisdom from master Phatbooster. Quote