Welcome to the Grey Zone

The start of your education in grey hacking.

This is for educational purposes only. Any illegal uses with this information is at your expense.

Hey, I've wrote this script just for people like you. I understand that you want to hack. Thing is, there is no one click hack tool/script. So, if you want to keep learning, continue. Hacking takes time, curiousity, thinking, and seriousness. Now, continue. Hacking consists of several things.

  • Networking
  • Linux
  • Exploits
  • Custom Scripts
  • Cryptography
  • other smaller things

0x1 Exploits

Exploits are what make hackers go. XSS - Exploits It's what deanonymizes tor users. It's what helps hackers go farther. It's what hacking is for the most part. Not all exploits are breaking code. Some links for exploits are...

  • exploit-db.com
  • 0day.today
  • https://cve.mitre.org/
  • http://www.cvedetails.com/

[ Exploits can be written in python, bash, or any mainstream language. ]

0x2 Kali

Kali Linux is an OffSec OS. OffSec, Offensive Security, Hacking. Kali offers tons of tools, such as metasploit. Kali can operate as a functional main-os but it's better to not keep it as a main os. It's very unstable, and is a pain to use sometimes. Also, do not add Kali repositories to any other operating system. It will break your other OS. But. Kali Linux is a good operating system for a virtual machine. It's good for hacking. It has tools for...

  • Scanning
  • Exploitation (metasploit, armitage, sqlmap, etc)
  • Password Attacks
  • Wireless Attacks
  • Forensics
  • Social Engineering
  • Web App Annalysis
  • Information Gathering

On top of that, it is decently secure when only using Kali repositories.

0x3 Custom Scripts

Custom scripts/tools are what make you go from skid to decent hacker. A custom script can be the difference from a script that almost-just almost works and actually does work because you coded it to fit your needs. Kali might not have everything you need. But, when you can code, you do.

0x4 Cryptography

The big thing. Crypto. Encryption. Ciphers. First off in crypto. You need a vpn. A vpn will hide what you are doing from other hackers, your ISP, and the gov't. The gov't, obviously, doesn't like hackers. They will arrest you if you are caught doing things you shouldn't and you will be put away doing hard time for a long time. You need a vpn that does not log. Logging can include:

  • Bandwidth used
  • Sites connected too
  • IP that conencts to the server
  • Your traffic overall
  • Times connected/disconnected

And with that information (especially your ip) you can be found by any decent hacker, or any stupid gov't. Especially hardened governments. There are several vpns that don't log. But, if you don't want to trust another company then you can buy a vps/dedicated server (better to buy a vps.) Setting up a vpn isn't hard. Some vpns I personally trust would be: NordVPN MullvadVPN (portfowarding on this one) And maybe TorGuard. Another piece of cryptography would be your hard drive. You want all harddrives encrypted. If a figure steals your hard drives, then you don't want any incriminating evidence on that drive to put you in prison. Keeping your hard drive encrypted is an important thing.

0x5 Extra Stuff

Some other things to keep in mind is good opsec, never admit to anything, don't act too confident.

  1. You never know who is better than you.
  2. Don't act cocky because you could get messed up by someone who is a thousand times better than you and would've been willing to teach you if you hadn't been acting so confident and tough.
  3. Good opsec (Operation Security) would be usernames, passwords, emails, vpns.
  4. Never use the same username anywhere.
  5. Never use the same password anywhere.
  6. Never use the same e-mail anywhere.
  7. Keep rotating your vpn ip around.
  8. Don't admit to anything online.
  9. You never know who is a federal agent. (fed)
  10. You never know who is just logging to push you over in the future.
  11. You never know who wants to get rid of hackers.
  12. Also: You will get the people who have dealt with hackers and were messed over before, so they secured themselves.