Here’s the kinds of things having to do with actual hacking I find on Hacker News (just going through my browser history now, so it may not catch everything; anything I didn’t see the comments on is missed):
That should give you an idea of the kinds of stuff I read. There are a lot of posts on HN detailing exactly how someone broke down a system. Not all of these are “breaking into computers”, but a lot are very similar.
Here’s the kinds of things having to do with actual hacking I find on Hacker News (just going through my browser history now, so it may not catch everything; anything I didn’t see the comments on is missed):
https://news.ycombinator.com/item?id=8876929 https://news.ycombinator.com/item?id=8608941 https://news.ycombinator.com/item?id=8854330 https://news.ycombinator.com/item?id=8839265 https://news.ycombinator.com/item?id=8834595 https://news.ycombinator.com/item?id=8834275 https://news.ycombinator.com/item?id=8814901 https://news.ycombinator.com/item?id=8651675 https://news.ycombinator.com/item?id=6148347 https://news.ycombinator.com/item?id=8758196 https://news.ycombinator.com/item?id=8693980 https://news.ycombinator.com/item?id=8712277 https://news.ycombinator.com/item?id=8808754
That should give you an idea of the kinds of stuff I read. There are a lot of posts on HN detailing exactly how someone broke down a system. Not all of these are “breaking into computers”, but a lot are very similar.