Amon Otis Poston
Human Rights Focused Computer Scientist
PGP Fingerprint: 856B 3022 A763 BB23 EA1E DD91 E784 D6D5 7CAB 42A2

Hacking 101
08/27/25

I am writing this article in preparation for a panel I am sitting on. The panel is called "Hacking 101" and I will be asked questions on the fundamentals of hacking. I want to organize my thoughts, but also share them for those who might find use.

It's worth noting that I, wouldn't consider myself a hacker, although if you squint and turn your head sideways, you could say that I "hack". Nonetheless, I know the fundamentals of hacking, so listen up.. class is in session.

What is Hacking

In my words, hacking is an attempt to subvert control of a piece of technology away from its designated controller. Some definitions I found online say its gaining unauthorized access to a computer/network, however I don't believe you need to gain anything to be considered hacking. For example, a DDOS attack is considered a hack, yet the attacker has only subverted control by overwhelming the network, and has gained nothing.

Why would someone hack?

Several reason. Someone might hack for the joy of pranking a good friend. Something innocent like changing their wall paper to another version in order to make the computer appear to be cracked.

Someone might hack in order to secure a system. For example, if one were to put a website online, they might try to stress test it so that its flaws under stress become apparent. Fixing the flaws that arise will make the system stronger.

Someone might hack, finally, because doing so provides them with a momentary, political, or otherwise malicious purposes. In an area I'm most familiar, North Korea, the state is know for hacking banks in order to gain money for the state's operations. Even in America, our intelligence agencies hack its own citizens, under the guise of safety, though this notion is hotly contested.

What is black, white, and gray hat?

Motivation and consent are what determine the hat you wear as a hacker.

A white hat hacker is a person with full consent to hack a system whose motivations are to reveal insecurity for the same of strengthening it.

A black hat hacker on the other hand has the exact opposite motivations. They have no consent and aim to damage the system or capitalize off its vulnerability.

A grey hat hacker is somewhere in the middle. They may at times act with consent in accord with the target, they may also some times act without consent against their target.

How do you learn how to hack?

Learning how to hack can come naturally by way of learning how to build. As a developer of hackable things, you'll notice ways that your designs are flawed. Eventually, you'll come to realize that many developers have similar flaws. With this information you can chose to exploit those flaws. Some developers naturally transition to cybersecurity after a career of building in order to protect the software they once built.

What are some resources for young hackers?

Mitre and CVE

Advice for young hackers?

Pick a people before you pick a technology. Allow people and their needs govern your technological decisions. The more I grow in my career the more important this becomes. As much as you might want to grab for the sophisticated tool, something simpler might just be the best route. One day, though, you'll find that in 99% of the time

Please, please don't go down the road of tech-for-tech-sake. Its cold and dark and you will emerge with the answer to questions no one wants. Trust me.

-Amon