Benjamin M. James
2016 Time Room.
ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored, or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher
Why was this book written?
Numbers of books are being released every year with the sole purpose of teaching people how to become a hacker. Throughout the years, I read many of them to analyze their teachings. The more I read these books, the more I realized that they were missing a lot of demonstrations for reader. Even when some of these examples where presented in the book, they were not broken in a step-by-step formation. I immediately noticed that this wasnt very pleasant for the readers to understand, especially for the beginners.
What this also meant was that the book you and me wanted, wasnt written yet, and needed to be written urgently. So I immediately gathered the best people I knew that was considered to be hackers among most(including myself), to help build this amazing book and make it come to life with countless demonstrations. It took a while, but now its ready for you to enjoy!

Introduction
Right now hacking is the thing. It has become a form of fashion and adventure for everyone of all ages. Throughout this book we will give you the excitement and knowledge necessary on how to adapt yourself to modern hacking.
So who is a hacker exactly?
For ordinary people most of the time hackers are considered strange individuals, but for me I consider them to be special. A hacker is just regular human that wants to experiment on computers, softwares, internet security and all kinds of other types of security. But more importantly they do it for the fun of it. The feeling of hacking is like creating but playing at the same time.
There are several types of hackers, such as the Black Hats, the White Hats, the grey hats, the blue hats, etc. The two types of hackers more in common are the black hats and the white hats.
The black hats are the ones that operate in silent, either alone or in groups. They seek only personal gratification in a very malicious way. such as stealing money from others, stealing private files from others, Sometimes its about revenge or just for the fun of it.
White hats do the exacts opposite of black hats, their job is to prevent the hacking from happening (They get paid by the government and most of the time work in the FBI and other organizations),
Sometimes they hack their own systems security to find the weak spots they can fix, if by some chance the organization gets victimized by a hacker they will also carry the job to track the attacker to its location.
What does it take to become a hacker?
It takes countless failures and perseverance to become a real hacker. A hacker never finishes in confronting the everyday challenges and failures. Someone once said to me a good hacker is not defined in what he knows, but rather in how much failure he can withstand.
Because in the end going through all those failures he will eventually, become a pro in finding just like anything else in life. Apart from that a hacker needs good mentors not hypocrites pretending to be what they arent. Also without practice you cant gain proper experience on how it works, practice every day as much as you can and you will see fast result. Its just like math. Most people find math difficult, but the real problem behind it is that they dont practice enough.
Once you master these mindsets, you can move on in collecting the right hacking tools Im about to show you.
Top five hackers of all time
+ 
Kevin Mitnick is known as the king of all hackers with a lease is like the Condor and the dark side hacker Mitnick stand back to his youth in the late seventy's where he began taking advantage of the system, by tricking the Los Angeles bus transfer system to give free rides. as he aged of it Mitnick found his gift for code, and begin hacking into big name companies, like Nokia, Motorola, IBM and eventually the Pentagon. millions of dollars of information passed through his hands before he was finally arrested in 1995 hardly the third of it, Mitnick went on the run from the FBI for 3 years and was the most wanted computer criminal of his time. before he was sentenced to four more years in jail Mitnick didn't consider what he was doing as hacking and referred to it but lately as social engineering at one point the judge found him so threatening that he placed him in a solitary confinement. because he thought Mitnick could start a nuclear war by whistling codes into a payphone.

The dangerous British hacking duo of Matthew Bevan & Richard Price took the world for a potentially deadly ride for several weeks, in their thought back in 1994 that began by attacking the Pentagon's network for several weeks and progressed further by stealing battlefield simulations if that wasn't enough they started intercepting messages from us agents station to North Korea and access sensitive material from a Korean nuclear facility .this was all incredibly alarming to the US, because at the time price in Bevin where used us systems to infiltrate information from Korean systems, which simply put nearly sparked an international incident

You've probably heard about the infamous activist group, Anonymous or just a non-sprouting back in 2003 from the breeding grounds of 4 Chan anonymous consists of an unspecified number of politically active hackers they campaigned for Internet freedom, social justice and transparency in the law with nothing off limits. this group has hit the Chinese government the Vatican the FBI and CIA while spending just as much time legal documents are taking down websites with political events during the aftermath of tragedies like Charlie hed Bo, Michael Brown & launching large-scale personal attacks on individuals associated with the KKK while they may not be monetarily motivated the information they had impact on cases and cover ups has been huge. This is group has also vowed in a video, that they will take revenge on ISIS. for doing the attack in Paris in November 2015. On 24 of March in 2016 Anonymous released a video explaining they will carry many more cyber-attacks on ISIS due to the Brussels attack of 22 March 2016.
For more information on supporting the vigilant group Anonymous visit: https://www.facebook.com/AnonymousDirect
