::.. =[]= ..::     ::.. =[]= ..::     ::.. =[]= ..::     ::.. =[]= ..::
 

This article has essential information for anyone associated with interest in pen-testing, security, hacking, Social Engineering or other tech topics. We aim to provide beginner to advanced free courses. Courses will be run daily (see schedule) and ten students shall be chosen to sit each lesson. Tutors shall sit each course to assist with questions and answers. Lessons are being taught via IRC with lesson material available for students to read along.

Our goal is to educate. And we hope you came to learn. No one here will ask you something that would compromise your identity nor ask you to do anything illegal. We may, however, give you the tools and knowledge necessary to commit what some would consider a crime. Creating secure communities is about more than being educated. Fundamentally, it means creating working dynamics of respect, education and inclusion in all our work. Building strong communities that act in solidarity with one another is the best protection against infiltration, disruption and other conditions of repression. So what is a security culture? It’s a culture where the people know their rights and, more importantly, assert them in all situations. Those who belong to a security culture also know what behavior compromises security and are quick to work with people who exhibit insecure or oppressive behavior. Security consciousness becomes a culture when a community as a whole adopts this awareness and demonstrates that those behaviors which violate security are unacceptable.

The unfortunate truth is there are some security-ignorant people in the movement and others who have possibly been raised in a “scene” that thrives on bragging and gossiping. It doesn’t mean these people are bad, but it does mean they need to inform themselves and learn about personal and group security. Even seasoned activists make mistakes when there is a general lack of security consciousness in our groups. And that’s where those of you reading this can help. We must ALWAYS act to inform persons whose behavior breaches security. If someone you know is bragging about doing an action or spreading security-compromising gossip, it is your responsibility to explain to her or him why that sort of talk violates security and is inappropriate.
You should strive to share this knowledge in a manner that encourages the person’s understanding and changes her/his behavior. It should be done without damaging the person’s pride. Show your sincere interest in helping him/her to become a more effective activist. Keep your humility and avoid presenting a superior, “holier than-thou” attitude. Such an attitude can raise an individual’s defenses and prevent them from listening to and using the advice offered. The goal of addressing these issues with others is to reduce insecure behavior, rather than showing how much more security-conscious you are.

Share your concerns and knowledge in private, so that the person does not feel as if they are being publicly humiliated. Addressing the person as soon as possible after the security violation increases effectiveness.
If each of us remains responsible for discussing security information with people who slip up, we can dramatically improve security in our groups and activities. When people recognize that lying, gossiping, bragging, and inappropriate debriefing damages both themselves and others, these behaviors will soon end. By developing a culture where breaches of security are pointed out and discouraged, all sincere activists will quickly understand.

Your contribution means a lot and we encourage you to take part…

..:: Central Committee CgAn great authority and exceptional ability at their discretion proclaims “we learn u once so be there…” nologs after lessons. ::..
..:: Our Supreme, Glorious chairman Meow saw it was good. He is right as always!! (All stand up and applause …) ::..

Connect to IRC. Channel: #Cgan-lessons

Note: Time for courses: Classes will be listed in Greenwich Mean Time GMT or BST If a course is listed at [ 7 PM BST that equals UTC/GMT 20:00 ]
Cgan-Lessons listings/schedule:

  • Lesson 1 – The Whonix Virtual Machines system (basic) ~Mink Date: 8 December 2017
  • Lesson 2 – Hack without jail time, using Kali against Metasploitable and DVWA (intermediate) ~Mink Date: 9 December 2017
  • Lesson 3 – i2p – Date: 10 December 2017
  • Lesson 4 – Malware – Date: 11 December 2017 – 7 PM GMT +1
  • Lesson 5 – Public Key Encryption – Date: 12 December 2017 (meTa)
  • Lesson 7 – Burpsuit 101 – Date: 13 December 2017
  • Lesson 8 – OWASP ZAP – Date: 14 December 2017
  • Lesson 9 – Footprinting and Reconnaissance theory. NON TECHNICAL – Date: 15 December 2017 (basic) (Atillda)
  • Lesson 10 – SQLmap – Date: 16 December 2017 – 7 PM GMT +1 (sqlm4p3r)

Cgan-Lessons listings/schedule: https://cgan.pw/6d

(Visited 604 times, 1 visits today)

8 Responses to CgAn Teach the World About Hacking Hacktivism #2

  1. i’m interested

  2. Pingback: CyberGuerrilla soApboX » Blog Archive » CgAn Lesson #2 Course #3 – I2P

    […] See https://archive.cyberguerrilla.org/a/2017/cgan-teach-the-world-about-hacking-hacktivism-2/ […]

  3. Is the course #3 gonna be share like the course #2 on i2p ? Thank you !

  4. yeap

  5. governemant touched governemenant touched http://textes.matnuhpv.gov.ma/juridiques/wp-admin/anon.php

  6. Pingback: Hacktivist Group Anonymous Announces #OpIsrael After Trump Jerusalem Move - The Fifth Column

    […] open source instructions for joining the planned attacks. Days before that, on December 4th, an article was posted on…

  7. amen hermano

  8. Pingback: TFC Exclusive: #OpIsrael Anons Talk The Present And Future Of Anonymous - The Fifth Column

    […] instructions for installing Window’s XP, code for participating in denial of service attacks, or an article on teaching hacktivism…

Please note: Comment moderation is enabled and may delay your comment. There is no need to resubmit your comment.