I found this little gem today cleaning out my google drive.

So this took place around 2012, right after sabu got 'popped' by the feds and before he went 'Hollywood' hacker.

What you are about to read is Hector's would be book that he was going to put up on Tumblr.

Every typo and fuck up is 100% his. Nothing other than my info was redacted from this paste.

I hope you all enjoy this.

And Sabu, if you are out there (we know you are) and you are reading this, I want you to know you are never going to be the next Kevin. No one wants to buy your book, no one wants to read what you have to say. No one will ever take you as a security pro.

Love

ShadowDXS

----------------------------------------------------------------------------------------------------------------------

(4:07:34 PM) kaze@jabber.at: #!/bin/echo "Breaking out of confinement"

Thus spake the master programmer:

``It's the little things that make Freedom become Not Freedom. ''

2.0 Think hard. Long. struggle with your thoughts. In order to dissent, you must first question yourself. In order to reach the Tao you must break yourself. Eliminate your own objections. Fire the ideas in your head that hold you back. Untangle yourself from the tangibles; Break your limitations. Break free, run. Ignore materialism. Accept acceptance. Be water. Survive.

2.1 You are the Yin, your thoughts are the Yang. It is hard to allign. Balance. If you can not balance: You can not Tao.

2.2 It thus said that the first philosopher was the first being to look at a beautiful flower and dissect its beauty; So I assume the first Hacktivist was the first being to have attacked its government and dissect its mailspool.

2.3 A hipster attacks its government for itself. An activist attacks its government for others. A critic attacks its government for verything. A Hacktivist attacks its government for everyone.

2.4 A novice asks a Master: "I do not understand. I SQLi'd and dumped my governments userlist. But no one on twitter follows me." The master arises from his desk, with cigerrete burning slowly like the soul of every government employee, and replies: "No one follows you because you do not know the Tao; SQLi is just the first step to exfiltration. You must crack the MD5 hashes with the power of a million Suns. Slide into their systems like a slithering snake through a field of sheep. Read their emails for the purpose of knowing who they are, and in this process you will know who you are. Once this point is reached you will thus become one with your target. Create a zine and twitter followers will praise you. But if you cheapen them, they will ignore you..." The novice interrupted: "Master, Nevermind. I have come to realize I don't need twitter followers. I do not need the acceptance of others. And I don't need a master. I am my own master." The master nodded, and they seperated ways.

2.5 Do not fear. The feds are elss sophisticated than you think.

(4:07:38 PM) kaze@jabber.at: second chapater

(4:28:47 PM) shadowdxs@swissjabber.ch: okay...

(4:58:20 PM) kaze@jabber.at: #!/bin/echo "Trusting is to deceive"

Thus spake the master programmer:

``Blend in.

Get trusted.

Trust no one.

Own everyone.

Disclose nothing.

Destroy everything.

Take back the scene.

Never sell out, never surrender.

Get in as anonymous, Leave with no trace.''

3.0 To trust, is to deceive. You deceive yourself by allowing someone into your world. You deceive the scene by allowing infiltration. You deceive the Tao because with trust you dishonour it. You can barely trust yourself. If you do trust yourself wholeheartedly you may corrupt yourself. And forever lose the Tao.

3.1 Situate yourself so that even if you are caught, you don't have a need to violate your honour. If your friends rat on you, accept it. Don't fight it. Don't fear it. It will happen. If you rat out people for no reason, then you will never see the Tao. And you're probably a twat.

3.2 The FBI sends in a covert-agent to social-engineer a hacker with little hopes of attaining worthy information. To their surprise the hacker was open. Shared everything. Gave the agent URLs to SQLi. Showed him how to hack into fbi.gov by providing him links. The agent, testing out these URLs executed the attacks. Confirmed the holes. Thus began the hunt for the hacker who seemed to have little to no care in the world he may be sharing information with an agent. "Stupid hacker" the covert-agent said to his colleagues. "I owned this guy really good. My skills are impervious to restraint." The next day the FBI raids the hackers home. Arrests him. Interrogates him. He requests a sit down with his lawyers, the covert-agent, and his bosses.

At the sit-down with his lawyers and agents, the hacker seemed enlightened. He showed no worries. No fears. The FBI took this as disrespect; they are the G-Men. Top of the foodchain for cybercrime. They wanted him to kneel but he wouldn't. And thus follow the dialogue that will forever change the course of the FBI:

covert-agent: Hacker, I have logs.

Hacker: Correct

covert-agent: screen shots.

Hacker: I'm sure

covert-agent: and URLs to servers you have hacked under my watchful eyes.

Hacker: Not true

covert-agent: Look! (as he slides out a pile of printed paper of URLs and logs)

Hacker: Firstly I want to add that I knew you were an agent from the beginning.

covert-agent: How so? I doubt that.

Hacker: You claimed to be a Hacktivist, but you did not know the Tao. You claimed to be a hacker, but did not research. You claimed to be an activist, but did not know your causes or had any beliefs of your own. Thus, you are an agent.

covert-agent: So what? I still caught you didn't I?

Hacker: With all due respect, but on the contrary. I caught you.

covert-agent: Come again?

Hacker: You asked me for URLs and I gave them to you. I googled "site:gov ext:php inurl:id". I then contemplated the attack scenario in my head down to the SQL queries in the scripts, all the way up to how the database is structured. In my head, I hacked these servers. In your head, I hacked these servers. In reality, you hacked these servers. By visiting the URLs, executing the SQLi injections, and validating something you needed to see instead of feeling - you infiltrated these databases and exfiltrated their databases to me. You don't need to hack when you have reached the Tao.

Afterwards they all had a cup of coffee while the Hacker spoke about the beautiful bliss that is the Tao. They all went home that night and read UNIX For Dummies.

3.3 How much wood would a Hacker hack if a Hacker could hack wood?

3.4 Treat your people as brothers and sisters. Treat your brothers and sisters as people. And treat every day like its your last. Tomorrow doesn't exist yet, so don't put your trust and faith into it. Because tomorrow will deceive you faster than the feds will.