©2019 by Karen Miller

  • White Instagram Icon

Safe Practices

Learn to be a TRUSTED hacker:

Take your time in both learning and hacking. There are a lot of important concepts you need to understand and consider in order to avoid damaging a system or facing legal consequences.

T

Refrain from touching systems you don't own unless you have a legal agreement which permits you to. Set up your own environment or use one which is explicitly designed for practicing techniques.

R

Use tools, exploits, and guides from trusted sources. Malicious tools and exploits which are designed to compromise your system or publicly humiliate you do exist and are falsely advertised to trick people.

U

Segregate and segment appropriately to ensure important data and systems are separate and protected from your test environment.

S

Test exploits and tools in a safe, controlled environment to ensure they work as expected. This can help to gain further understanding of what the exploit or tool does and artifacts it may generate.

T

Exploit smartly, not blindly. Understand how an exploit works and what it does before trying it. Modify it as needed to suit your purposes.

E

Don't use your skills maliciously. However tempting it may be, just don't. It may cost you an absurd amount of money and prison time.

D