OpSec by FunShine - Introduction

This series is meant for the average user looking to increase their knowledge surrounding OPSec while using their OS of choice. This is step one in your cyber career with learning all the right information you will need in order to be a successful cyber warrior. This is not the word of law when it comes to how to hack and OPSec but hopefully you're able to take away something from it.

OpSec by FunShine - Introduction


This guide was written by me, Funshine. Who the fuck am I? I'm a freelance blackhat hacker, nation state contractor, dark web phisher, spoofer, forum lurking master, and ex-associate (ish) at a well-known hacking firm. Since I enjoy writing and have been a journalist, activist, and hacktivist-turned cybercriminal for a number of years, I've opted into creating high quality courses for the people who take the time to find and read them. I'll also share my knowledge for anyone who is able to put some money on the table and get up-to-date hacking and cybercriminal information. I have other guides/tutorials in the making and I'm for hire as a mentor if interested. If you're a vendor or other criminal that needs a cyber security specialist for your criminal organization, reach out to me and we can work together.

Look in my bio for my contact details...donations are always welcome! Getting paid for writing these courses gives me more motivation to write more relevant hacking information.

BTC Address:

Monero Address:

First off, there is no one way of doing things. These courses are not the word of law when it comes to hacking, but they are told from my perspective, so if you have something to add, have a better way of explaining things, or anything you think that I don't know that pertains to the topics in these guides, send me a goddamn email and let me know what is WAT. That way we can keep it all updated for everyone to enjoy and cause a fuck show in their home towns. Arm yourselves friends which is exactly what you're going to be doing with the cyber warfare knowledge you're about to learn. Good job.

This course is meant for the "average" individual who wants more information on remaining hidden and staying anonymous while online so they can begin their career of being a cybercriminal. Hopefully you take away many useful points that you're able to incorporate into your daily activities.

Relevant hacking information is scattered across the web and going through all that reading, researching, testing, etc. will take years. Literally years. I've put it all together for you in a series of guides/courses that will help level up your knowledge to the level of script kiddie king right up to an intermediate hacker.

It's assumed that you have general knowledge of hacker techniques, lingo, interests, and terminology that is used in this guide. This document has been reviewed however there may be some language and grammatical errors as translation sometimes get misunderstand. If you come across errors (spelling or grammar) or have more information that you think can be added please let me know.

You'll understand how people are caught, and how you will be as well, if you're not careful. You may be a complete noob, novice, or a relatively experienced hacker, but the reality is that everyone starts somewhere and starting out can be the most confusing experience when trying to learn something new. There's never one way of doing something, but hopefully this develops your critical thinking and knowledge surrounding such activities and enhances your skill sets. If you want to be a better blackhat it's good to have the academics behind you, professional IT experience, computer security knowledge, and current credentials (CISSP, OSCP, CEH, GIAC, A+, etc.) to greatly improve your skills. Both work hand and hand.

The people I've worked with have numerous years in many different fields which has saved our asses from time to time on both sides of the fence. As you progress in your career you'll see why and understand that keeping in the know will help you in your future endeavors.

It's important to remain anonymous, blend in, and be very difficult, if not impossible, to track. Hackers, crackers, carders and the like are quite good at this as it's vital to their freedom and financial success. Unfortunately for you in the beginning when you're learning to master this trade, you're bound to make mistakes and be misguided. In this industry you need to practice in order to perfect, sharpen, and hone your skills. Going to jail or being charged with a criminal offence can and will ruin your career goals and your life as you know it. It's best to research the laws in your country to get a handle on the charges that will be laid against you should you make that "mistake". Don't blindly break laws.

By learning from how others have been caught, captured, and arrested can help you avoid the same fate. It's important to follow the news, Twitter, Facebook, or whichever social media network you use to follow people like hackers, IT security consultants, whitehats, and everything in between related to IT security. Follow, listen, read, and observe.

The quieter you are the more you'll be able to hear as you'll soon come to realize. Being involved this way will help educate you on how other hackers and cybercriminals are caught, the logistics of major hacks, new malware techniques, and the newest cyber attacks out there. Today there are a lot of "security researchers" out there trying to make a name for themselves that will literally make public all the new exploits, code, tools, and everything in between that makes your life a heck of a lot easier. They do this by revealing vulnerabilities, full disclosures, exploits, 0-days, etc. You don't even need to rely on finding your own 0-day because some security researcher will give it to you! In fact, it's quite frustrating finding out someone has revealed a "new" vulnerability that you've been using for some time that is now patched and over used. However, it definitely has taken some of the leg work out of doing it yourself so there are pros and cons.

Lastly, this guide does not include everything for you. Honestly how could it? It's expected that you're capable of doing some research on your own as well. These teachings will show you how to stay and remain hidden but you cannot be expected to be spoonfed with hand holding along the way. Google is your friend. If you find any question, problem, or error, paste it directly into Google and read through forums, blogs, etc. until you find your answer. If you're not capable of this, then please stop now before you hurt yourself.

You may think this is a cop-out but most, if not all, of your questions can be answered this way and realistically the amount of questions you'll have will be vast so it's best to get efficient in searching and finding your answers on your own. Being able to effectively search, read, learn, and find your answer is a skill on its own, so be prepared to be somewhat self-sufficient.

YouTube has a large number of videos that can walk you through your problem, literally, at the basic level. Having trouble installing VMware or VirtualBox? Having trouble getting dnsspoof to work? Google it or use YouTube. Use the internet to your advantage without compromising yourself and begin to become self-sufficient. Most people who are good at hacking, carding, etc. have learned step-by-step from books, or whatever means they needed to so treat this knowledge like a university or college course and do some homework, i.e. read, read, and read some more. If you have major problems following this guide and cannot replicate the teachings, then what you're attempting to do and learn is way beyond your capabilities, and you should stop what you're doing, accept your fate, and focus on something easier such as cabinet making, cake baking, or watching the world pass you by.

Most of this guide is intended for a *nix audience; however, Windows users will still benefit from this. There will be points throughout this guide marked in blue. These points are useful to fully grasp the concepts taught and help with understanding techniques and explanations on various topics. It's important that when you read them you stop and take the time to do what they say or follow up with them. The syntax of code to be typed into Terminal or the command line will be red. So anytime you see something in red, you know that it's syntax code and should be entered into your Linux terminal, Windows command prompt, etc.

Alright then comrades, let's get into it, shall we?

Follow me for part 2.