Join anonymous

You should start by studying Anonymous and learning the many reasons they’re not world top hackers.

Common tricks used by Anonymous are:

1. DDoS – A Distributed Denial of Service attack is carried out using DDoS programs that are simple scripts designed to continuously send refresh commands to the web server. The programs can refresh tens of thousands of times faster than you can by manually hitting F5.

When a large group of people focus DDoS programs on a single target, it can eventually overload the server and take the site down. The larger the site, the more traffic load it takes to take it down. This is the strategy Anonymous used to take down PayPal. PayPal 14

If you’d like to participate in a DDoS attack, google DDoS programs if you’re a script kiddie, or write a quick loop if you’re familiar with the most basic of programming basics in any language.

Though be aware the PayPal 14 faced harsher penalties than “real” hackers (i.e. computer programmers) to deter these programs from being used by the general public. The reason the term “script kiddie’ is used in hacker circles is because even a child can be taught to push a button and let a computer do its automated thing.

2. SQL Injection – Another popular Anonymous hacker technique is the SQL Injection attack. During a SQL injection, the attacker takes advantage of weaknesses in the backend databases storing information for a website by inserting malicious code into a field that causes the database to malfunction and allow access to the data fields.

This is the type of attack used on Sony repeatedly since 2011 (the first attack being on the PlayStation Network, due to a slow Apache server update): Sony Hacked Again, 1 Million Passwords Exposed?

With a few simple steps, companies can protect themselves from such attacks, though it only takes a slip-up for one second to leave the servers vulnerable.

3. Social Engineering – The majority of “real hacking” is social engineering. There’s no reason to brute-force someone’s password when you can simply convince them to give it to you. Social engineering is what made Kevin Mitnick infamous and the tactic Anonymous used to hack HBGary to reveal a defamation campaign against Wikileaks: Anonymous speaks: the inside story of the HBGary hack

The HBGary hack is what set off the PayPal hack, as PayPal, Visa, and Bank of America colluded to both ruin the reputations of Wikileaks supporters and backers and stop donations to the organization.

4. Skip Tracing – And of course, Anons LOVE skip tracing. Skiptrace

Skip tracing is the process of tracking a debtor or fugitive using a combination of public records requests, Internet social media and WhoIs searches, and intuition. Skip tracing is how anons on social media “d0x” each other, leaking personal information on a site like Pastebin.

Here’s one of many pathetic attempts to d0x me by anons when I spoke out against YourAnonNews for embezzling $55,000 from children: Brian M Penny 33 2228 N Illinois Street Chandler, Arizona 480-600-9010 – Pastebin.com

None of the information listed on my d0x is accurate, and the attempt is laughable, especially for an experienced, professional skip tracer. Locating the person attempting to attack you is much more important of a skill than actually launching an attack, and nearly every “elite anonymous hacker” involved in the above examples was traced, identified, and caught.

So to answer your question, the trick to becoming a l33t hacker is not ever getting caught, which very very very few “members” of Anonymous have ever accomplished.