Hacker Tradecraft · Volume 20

Hacker Tradecraft Volume 20 — Cheatsheet

Field-grade laminate-ready synthesis cards

Contents

SectionCard
1About this cheatsheet
2Hat-spectrum card
3Two-axis map card
4Engagement-lifecycle card
5RF-band quick card
6Legal-line card
7Cert-ladder card
8Disclosure-decision card
9Which volume answers X — index card
10Cross-tool quick reference card
11Starter-kit card

1. About this cheatsheet

Each numbered card below is a self-contained one-pager. Print individual cards, laminate, carry. The cheatsheet is the synthesis of Vols 1-19 into field-grade reference artifacts — bullets per Vols 2/3/4/5 and the §8 “cheatsheet bullets” callouts in Vols 6-12 were authored with this volume as the explicit destination. Where a card asserts a load-bearing fact, the depth source is named in the card’s footer; consult the named volume for citations. Nothing here is legal advice — Vol 19 is the canonical legal reference and itself opens with that disclaimer. All cert / comp / pricing figures are early-2026; verify before relying.

Use modeWhat you do
Carry-into-engagementPrint Cards 3, 6, 8 (lifecycle, legal-line, disclosure). Three sheets cover scoping → ROE → out-of-scope → disclosure.
Bench referencePin Cards 2, 5, 7, 10 above the bench (hat spectrum, RF bands, certs, cross-tool map).
Mentoring / hiring conversationsCards 2, 7, 11 (spectrum, cert ladder, starter kit).
Pre-engagement legal-readoutCard 6 (legal-line) is the laminate; read it back to the client at scope-signing.
Quick navigationCard 9 maps any factual question to the volume that answers it.

Density convention. Cards trade prose for tables and boxed ASCII. Prose paragraphs are ≤3 sentences anywhere in this volume. If a card looks empty it is because the table is the content.


2. Hat-spectrum card

╔══════════════════════════════════════════════════════════════════════════╗
║                  THE SEVEN HATS — ONE ROW EACH                           ║
║                  Read left-to-right. The hat is the paperwork.           ║
╚══════════════════════════════════════════════════════════════════════════╝
HatAuthorization stanceEngagement roleLegal exposure”If you are X, your goal is Y”
WhiteAuthorized — written scope, signed SOW, ROE in handOffense (pentest / red-team-as-service)Legal inside scope; out-of-scope work is unauthorized accessFind vulns the client agreed to let you find, document them, report them, retest after fix
BlackUnauthorized — by definitionOffense for personal / financial / ideological / destructive endsFelony in essentially every jurisdiction (CFAA / CMA / Directive 2013/40/EU)Get in, get value out, get out without being caught — and accept the consequences if caught
GreyUnauthorized — but constructive intent, disclose afterwardOffense → disclosureSame statutory exposure as black; good intentions are not a legal defenceFind a vuln in the wild, prove it, disclose responsibly. Modern path: route the same work through a bug-bounty program for safe harbor
GreenSanctioned-lab only — CTF, HackTheBox, owned-hardware labLearner; not yet operationalLegal as long as practice stays in sanctioned environmentsBuild skill via build → break → understand → write up. Avoid the “I’ll just try it on a real site” failure mode
BlueAuthorized by employment roleDefense — SOC / IR / threat hunting / detection engineeringLegal by definition; “hack-back” is the edge case (don’t)Detect, triage, respond, hunt; make “once” rare and contained when it happens
RedAuthorized adversary emulation (modern usage)Offense — adversary emulation, longer scope than pentestLegal under written authorization; vigilante sense is illegal everywhereEmulate a named threat actor against a named objective, exercise the defender, hand off the detection-gap list
PurpleAuthorized — both sides on same payrollSynthesis — red+blue collaboration, real-timeLegal by constructionClose the loop: red executes TTP → blue observes → detection-engineering fills gap → red revalidates
   ┌─ AXIS 1 — Motivation / Legality ─┐  ┌─ AXIS 2 — Engagement role ─┐
   │                                  │  │                            │
   │   BLACK ── GREY    GREEN  WHITE  │  │    RED ←──→ BLUE  + PURPLE │
   │ ─────────────────────────────────│  │  (atk side)  (def side)    │
   │  unauthorized       authorized   │  │            (synthesis)     │
   │  illegal            legal        │  │                            │
   └──────────────────────────────────┘  └────────────────────────────┘
   The hat = ethical stance.    The team color = role this week.
   A white-hat can play red, blue, or purple on different engagements.

Load-bearing facts to memorize.

  • The hat is the paperwork, not the gear. Same toolkit; the SOW determines color.
  • Authorization is binary. No defense by intent, no defense by skill, no defense by “vulnerability was obvious.”
  • “Red hat” has three senses (engagement-role / vigilante / Red Hat Inc.) — disambiguate from context.
  • “Blue hat” has two live senses (defender / Microsoft BlueHat program) — disambiguate from context.
  • “Purple is a verb.” A practice an organization does, not (mostly) a job title.

Source depth: Vol 1 §3-4, Vol 5 §6, Vols 6-12 §1 each.


3. Two-axis map card

The classic hats describe what side of the law an operator is on. The team colors describe what role an operator is playing in a structured exercise. The terms are routinely conflated; this card separates them.

═══════════════════════════════════════════════════════════════════════
                     AXIS 1 — Ethical stance / Legality
                     (the original "hat" axis)

   unauthorized ◄──────────────────────────────────────► authorized
   illegal               neutral                          legal
        │                                                      │
        ▼                ▼              ▼                      ▼
      BLACK ──────── GREY ─────────── GREEN ────────────── WHITE
   (criminal)  (unauth research)   (newcomer)         (auth pentest)
═══════════════════════════════════════════════════════════════════════
                     AXIS 2 — Engagement role
                     (the "team color" axis)

                  ┌──────────────────────────────────┐
                  │      PURPLE = the synthesis      │
                  │      (red+blue in feedback loop) │
                  │      ┌──────────────────────┐    │
                  │  RED │  shared defenders'   │ BLU│
                  │ atk  │   visibility window  │ def│
                  │      └──────────────────────┘    │
                  └──────────────────────────────────┘

   "Red hat" = the team-color sense if context is engagement-role;
              the vigilante sense if context is motivation/legality.
═══════════════════════════════════════════════════════════════════════

The composition table — Axis 1 × Axis 2:

White-hatBlack-hatGrey-hatGreen-hat
Red team roleAuthorized adversary emulation (modal industry usage)Not a thing — unauthorized = crimeFringe disclosure-activist framing; still unauthorizedInapplicable
Blue team roleThe modal in-house defender / SOC consultantInsider-threat framingAlmost never overlapsCommon entry path — many green-hats start in SOC
Purple team roleModal in mature SecOps shopsN/AN/ARare — requires operational maturity on both sides

The single sentence that disambiguates the language. The hat is your ethical stance; the team color is your engagement role this week. A white-hat operator can play red on Monday, blue on Tuesday, and purple on Wednesday — the hat doesn’t change.

Source depth: Vol 5 §6, §8, Vol 1 §4.


4. Engagement-lifecycle card

The authorized-engagement lifecycle, end to end, for a white-hat / red-team practitioner. Every box is a phase; every callout is a gate the engagement must clear before proceeding.

   ┌──────────────────────────────────────────────────────────────────────┐
   │              AUTHORIZED-ENGAGEMENT LIFECYCLE                          │
   └──────────────────────────────────────────────────────────────────────┘

   ┌─ SCOPING ──────┐    ┌─ AUTHORIZATION ─┐    ┌─ RECON ──────────┐
   │ Define target  │ ─► │  SOW signed     │ ─► │ Passive recon    │
   │ Define window  │    │  Scope final    │    │ (OSINT, DNS,     │
   │ Define rules   │    │  ROE signed     │    │  cert transp.)   │
   │                │    │  GOJL in pocket │    │ Active recon     │
   └────────────────┘    └─────────────────┘    │ (Nmap, banners)  │
                                                 └─────────┬────────┘

   ┌─ REPORT ──────┐    ┌─ POST-EX ────┐    ┌─ EXPLOIT / GAIN ─────┐
   │ Findings doc  │ ◄─ │ Lateral move │ ◄─ │ Initial access       │
   │ Risk ratings  │    │ Priv esc     │    │ Vuln chain → foothold│
   │ Repro steps   │    │ Persistence  │    │ Stay in scope ←─ key │
   │ Remediation   │    │ (red-team)   │    │ rule                 │
   └───────┬───────┘    │ Objective    │    └──────────────────────┘
           │            └──────────────┘

   ┌─ CLEANUP ─────┐    ┌─ RETEST ─────────┐
   │ Remove tools  │ ─► │ Verify fixes     │
   │ Remove persist│    │ Re-exploit those │
   │ (white-hat)   │    │ that aren't fixed│
   └───────────────┘    └──────────────────┘

Authorization stack — must all be present before the first packet:

DocumentWhat it doesWho signs
SOW (Statement of Work)Defines deliverables, dates, feesClient-side executive with budget authority + consultancy principal
Scope documentLists targets (CIDR ranges / FQDNs / facility addresses / app URLs); enumerates what is in and what is outClient-side IT + legal; pentest lead
ROE (Rules of Engagement)Permitted actions, prohibited actions, test windows, emergency contacts, deconfliction protocolClient-side IT-ops + security; pentest lead
GOJL (“Get Out Of Jail Letter”)Authorization letter the operator carries during physical-entry / red-team engagements; states the bearer has authority to be thereClient-side senior executive (often C-suite)

Fillable engagement-data slots:

   ┌─────────────────────────────────────────────────────────────────┐
   │  CLIENT: ______________________   ENGAGEMENT ID: ____________   │
   │  PRIMARY POC: ________________   PHONE: _____________________   │
   │  ESCALATION POC: _____________   PHONE: _____________________   │
   │  ENGAGEMENT WINDOW: ____________ to ____________                │
   │  IN-SCOPE: __________________________________________________   │
   │  OUT-OF-SCOPE: ______________________________________________   │
   │  EMERGENCY-STOP SIGNAL: _____________________________________   │
   │  REPORT DUE DATE: ___________  RETEST WINDOW: ______________    │
   └─────────────────────────────────────────────────────────────────┘

Red flags during engagement:

  • Out-of-scope finding — stop, notify, document, do not pivot. (See Card 8.)
  • Live-traffic risk — DoS-class technique against a target not pre-authorized for it.
  • Client communication breakdown — POC unreachable >24h while engagement is hot.
  • Scope drift — verbal authorization to test additional system without paperwork update. Get the paperwork first.
  • Detection-evasion ambiguity — ROE doesn’t specify whether to evade EDR; assume not unless authorized.

Time-budget rule. ~50% of engagement time is reporting. Budget for it from day one. Cleanup is part of the engagement, not optional — persistence forgotten = access the consultant created without authorization.

Source depth: Vol 6 §4, Vol 11 §4, Vol 19 §4.


5. RF-band quick card

╔══════════════════════════════════════════════════════════════════════════╗
║         THE SPECTRUM MAP — SECURITY-RELEVANT BANDS, ONE LINE EACH        ║
║         Receive ≈ generally legal. Transmit ≈ license/Part-15 only.      ║
╚══════════════════════════════════════════════════════════════════════════╝
BandFrequencyTypical useTypical toolTX legality (US)
LF RFID125–134 kHzEM4100 / HID Prox / Indala access cardsProxmark3, Flipper Zero RFIDInductive, very short range; unlicensed
AM broadcast530–1700 kHzCommercial AMRTL-SDR V4 (HF)Licensed broadcaster only
HF amateur1.8–30 MHzAmateur (160m–10m), SW broadcastRTL-SDR V4 native HFFCC Part 97 (amateur license)
NFC / HF RFID13.56 MHzMIFARE / DESFire / FeliCa / payments / passportsProxmark3, Flipper NFC, ACR122UInductive, very short range; unlicensed
FM broadcast88–108 MHzCommercial FMAny SDR (canonical first capture)Licensed broadcaster only
VHF aviation108–137 MHzATC voice (AM), ACARS, VOR/ILS, ADS-B uplinkRTL-SDR — canonical aircraft toolFAA/FCC licensed
VHF marine / AIS156–162 MHzMarine VHF; AIS at 161.975 / 162.025RTL-SDR + rtl_aisFCC Part 80 (license)
2 m / 70 cm amateur144 / 420–450 MHzAmateur VHF / UHFRTL-SDR / HackRFFCC Part 97 (license)
ISM 315 MHz315 MHzTPMS (US), garage doors, key fobsRTL-SDR, HackRF, Flipper sub-GHzFCC Part 15 (low-power unlicensed)
ISM 433 MHz433.05–434.79 MHzGarage doors, key fobs (EU+intl), sensors — the most populated sub-GHz bandRTL-SDR + rtl_433, FlipperFCC Part 15 §15.231 / ETSI EN 300 220
ISM 868 MHz863–870 MHzLoRa EU, Z-Wave EU, smart-meter EUHackRF, dedicated LoRaETSI EN 300 220
ISM 915 MHz902–928 MHzLoRa US, Z-Wave US, smart-meter US, 802.15.4HackRFFCC Part 15.247 (FHSS)
GPS L11575.42 MHzGPS civil signalActive antenna + GPS receiverReceive unrestricted; spoofing/jamming illegal (§ 333)
GSM legacy824–894 / 1800 / 1900 MHz2G (largely shut down in US)gr-gsm, HackRFLicensed cellular; interception barred by ECPA
LTE / 5G NR700 MHz – 3.5 GHz / 24–40 GHzCellular 4G/5GHard — specialty SDR / lab gearLicensed cellular
ADS-B1090 MHzAircraft position broadcast (Mode-S)RTL-SDR + dump1090 — canonical demoLicensed transponder; RX unrestricted
2.4 GHz ISM2400–2483.5 MHzWi-Fi 2.4 / BLE / Zigbee / drone controlAtheros / Realtek monitor-mode adapters, Ubertooth, HackRF (edge)FCC Part 15 / ETSI
5 GHz U-NII5150–5895 MHzWi-Fi 5/6802.11 monitor-mode adapterFCC Part 15.247 / §15.407
6 GHz Wi-Fi 6E/75925–7125 MHzWi-Fi 6E / 76E-capable adapter; HackRF cuts off at 6 GHzFCC Part 15 (2020 expansion)

Five facts that drive operator behavior:

  1. 433.92 MHz is the population center of sub-GHz consumer wireless. Any unknown-environment survey starts there.
  2. GPS L1 is −130 dBm below thermal noise — recovered only via CDMA correlation. Passive waterfall shows nothing usable; the receiver does the correlation.
  3. LoRa is CSS, not OOK/FSK — rtl_433 won’t decode it. Use gr-lora / rpitx-LoRa / dedicated LoRa gateway.
  4. 47 U.S.C. § 333 prohibits willful interference with licensed radio. Marriott was fined $600,000 (Oct 3, 2014) for jamming guest Wi-Fi hotspots.
  5. ECPA 18 U.S.C. § 2510 et seq. bars interception of cellular voice — receive-only ≠ legal for cellular.

Source depth: Vol 13 §3 + §6, Vol 14, Vol 15 §2, Vol 19 §6.


╔══════════════════════════════════════════════════════════════════════════╗
║                     THE LEGAL LINE — CARRY THIS CARD                      ║
║                                                                           ║
║   "Good intentions are not a legal defence."                              ║
║   The line is paperwork. The line is binary. When in doubt — don't.       ║
╚══════════════════════════════════════════════════════════════════════════╝

United States — CFAA 18 U.S.C. § 1030.

SubsectionWhat it criminalizesMax penalty (first offense)
§ 1030(a)(1)Espionage — gathering national defense info10 yrs
§ 1030(a)(2)Access without authorization → obtain info from protected computer1 yr (misdemeanor); 5 yrs (felony if value > $5K / commercial gain / further crime)
§ 1030(a)(3)Access without authorization to nonpublic federal computer1 yr (misdemeanor)
§ 1030(a)(4)Access without authorization with intent to defraud + > $5K obtained5 yrs
§ 1030(a)(5)(A)Knowingly causing transmission that intentionally damages a computer10 yrs
§ 1030(a)(5)(B)Intentional access without authorization causing reckless damage5 yrs
§ 1030(a)(5)(C)Intentional access without authorization causing damage and loss1 yr
§ 1030(a)(7)Extortion via threat to damage / disclose / not repair5 yrs

Penalty stacking is the geometry. CFAA + wire fraud (§ 1343) + conspiracy (§ 371) + aggravated identity theft (§ 1028A, mandatory 2-year consecutive) + money laundering (§ 1957) routinely sum to decades on indictment. The Swartz September 2012 superseding indictment was the canonical illustration; the Gonzalez 20-year sentence is the modal disposition for high-volume cases.

The Van Buren narrowing. Van Buren v. United States 593 U.S. 374 (2021), No. 19-783, 141 S. Ct. 1648 — 6-3 (Barrett majority joined by Breyer, Sotomayor, Kagan, Gorsuch, Kavanaugh; Thomas dissent joined by Roberts, Alito). Gates-up-or-down: “exceeds authorized access” applies only when an operator accesses files / folders / databases the system rules say they can’t, not to misuse of files they were permitted to access. Critical: Van Buren narrowed the “exceeds authorized access” prong; the “without authorization” prong remains broad. Most grey-hat exposure is still under the “without authorization” prong, which Van Buren did not touch.

DOJ May 19, 2022 charging policy narrowed federal prosecutorial discretion: “good-faith security research” is defined and presumptively not charged. Not a defense, not immunity: it is internal DOJ guidance, doesn’t bind state prosecutors, doesn’t affect § 1030(g) civil liability (uncapped).

International equivalents.

JurisdictionStatuteMax penalty (basic offense)
UKComputer Misuse Act 1990, § 1/2/3/3ZA/3A12 mos summary / 2-10 yrs indictment; § 1 = 2 yrs; § 3A = 2 yrs
EUDirective 2013/40/EU, Articles 3-72 / 3 / 5 yr minimums per offense class
CanadaCriminal Code s. 342.110 yrs (indictment)
AustraliaCybercrime Act 2001, Part 10.710 yrs
GermanyStGB §§ 202a / 202b / 202c3 yrs (§ 202a) / 2 yrs (§ 202b) / 1 yr (§ 202c — “Hackerparagraph”; BVerfG 2 BvR 2233/07 (2009) requires specific intent)
JapanAct 128/1999 (eff. Feb 13 2000)3 yrs / ¥1M
Russia / ChinaBroad statutes; jurisdictional reach mattersVariable
MultilateralBudapest Convention (~70 ratifying states; not Russia or China)Sets baseline

Authorization checklist (Card 4 has the lifecycle context):

  • SOW signed by client executive with budget authority
  • Scope document final, listing in-scope and out-of-scope targets
  • ROE signed, permitted actions enumerated, deconfliction defined
  • GOJL in operator’s pocket for physical-entry / red-team work
  • Bug-bounty work: published program scope + explicit safe-harbor language

Out-of-scope discovery protocol — the four-step:

   1. STOP       — halt the current action immediately
   2. NOTIFY     — call the client POC; document the time
   3. DOCUMENT   — record the discovery; do not pivot
   4. DISCLOSE   — finding goes into the report as out-of-scope observation

RF-specific quick reference.

  • Receive is generally legal in the US (47 U.S.C. § 605 has narrow disclosure restrictions). Transmit requires license or Part 15-compliant device.
  • ECPA § 2510 bars interception of cellular voice — even passive receive.
  • 47 U.S.C. § 333 bars willful interference. Marriott $600K (Oct 3 2014) is the precedent.
  • Replay against systems you don’t own → CFAA + state law overlap, regardless of how the captured packet got into your possession.

International / cross-border — your jurisdiction is not the only one that applies. Engaging a UK target from US soil exposes the operator to both CMA and CFAA. The Budapest Convention’s MLAT framework makes cross-border evidence-sharing routine.

The single load-bearing rule. No paperwork → no engagement. The line is binary. Owning the hardware is not authorization. Believing the target’s security is bad is not authorization. “I was just looking” is not authorization. When in doubt: don’t. Consult an attorney (EFF Coders’ Rights Project, Open Rights Group UK, CCC legal-aid Germany are starting points).

Source depth: Vol 19 §2-7. This card is not legal advice — Vol 19 itself isn’t either.


7. Cert-ladder card

╔══════════════════════════════════════════════════════════════════════════╗
║         THE CERT LADDER — APPROXIMATE COSTS AS OF EARLY 2026             ║
║         The certs open the door. The portfolio decides what's behind it. ║
╚══════════════════════════════════════════════════════════════════════════╝

Tier 1 — Entry / HR filter. Required by procurement, not by practitioners.

CertProvider~CostFormatSignalWhen useful
Security+CompTIA$390MC + perf-basedFoundational; DoD 8140 baselineEntry HR filter; required for cleared roles
CySA+CompTIA$404MC + perf-basedSOC-focusedSOC tier-1 / tier-2 HR pass
PenTest+CompTIA$404MC + perf-basedPentest-adjacentEntry pentest HR pass
CEHEC-Council$1,200MC (+ optional practical)Low with practitioners; high for DoD 8140 procurementFederal-contractor procurement; resume bullet
eJPTINE$20048-hr practicalRising (practitioner-respected)First hands-on cert; cheap practical signal

Tier 2 — Practitioner / hands-on. What the field actually respects.

CertProvider~CostFormatSignalWhen useful
OSCP / OSCP+Offensive Security~$1,749 (standard PEN-200 bundle)24-hr practical + reportHigh — industry baselineEntry-to-mid pentest hires; canonical hands-on. Rebranded OSCP+ Nov 1, 2024 with 3-year expiration; pre-Nov-1 OSCP grandfathered lifetime. See Vol 18 §3.2.
PNPTTCM Security$399–$5995-day practical, AD-focusedRisingAccessible OSCP alternative; AD-focused
CRTOZero-Point Security$500Practical labHigh in red-team circlesMid-to-senior red-team operator
CRTPAltered Security$300Practical labMid-high (AD-specialization)Mid-level AD red-team
OSDA (SOC-200)OffSec$1,999Practical + reportRising (defender track)Defender-track practical

Tier 3 — Specialized / senior. Earned after demonstrated work.

CertProvider~CostSignalRole
OSEP (PEN-300)OffSec$2,499HighSenior offensive / evasion
OSWE (WEB-300)OffSec$2,499HighSenior web-app
OSED (EXP-301)OffSec$2,499HighSenior exploit-dev
OSEE (EXP-401)OffSecVaries (on-site)Elite (small holder pool)Windows kernel exploit-dev
CRTLZero-Point Security$1,200HighSenior red-team lead
CRTEAltered Security$500HighSenior AD red-team
GPEN / GXPN / GWAPTSANS GIAC~$8,000+ each (course bundle)High enterprise/govEnterprise pentest / advanced exploit / web
GCIHSANS GIAC~$8,000+High (canonical IR)Mid-senior IR
GCFA / GREMSANS GIAC~$8,000+ eachHigh (DFIR / malware)Senior DFIR / malware analyst
GCDA / GDATSANS GIAC~$8,000+ eachRising (DE / purple)Detection-engineering / purple-team
MAD ATT&CKMAD20$499/yr (sub)Mid (ATT&CK fluency)ATT&CK-framework practical

Tier 4 — Managerial / governance. Procurement gold; practitioner skepticism.

CertProvider~CostSignalRole
CISSP(ISC)²$749 + maintenanceHigh (managerial)Manager / architect / CISO
CISMISACA$760High (managerial)Security manager / CISO
CISAISACA$760High (audit)Audit / compliance
CCSP(ISC)²$599High (cloud-architect)Vendor-agnostic cloud architect

Cloud-specialist add-ons — AWS Security Specialty ($300), Microsoft SC-100 ($165), Google PCSE ($200). High in cloud-aligned roles.

Reading the ladder.

  • Entry-into-the-field: Security+ → eJPT → OSCP is the canonical 12-18 month progression.
  • Pentest career: OSCP floor → CRTO / OSEP → senior. The portfolio (CVEs, CTFs, conference talks) is the differentiator above the floor.
  • Defender career: Security+ → CySA+ → GCIH → GCFA. SANS GIAC is the canonical defender ladder; course bundles are expensive but employer-paid is the norm.
  • Red-team career: pentest experience (3-5 yrs) → CRTO → CRTL. Entry-level direct-to-red-team is rare.
  • Purple-team career: come from red or blue first; SANS GDAT + MAD as the ATT&CK fluency credential.
  • Managerial pivot: CISSP at the 5-10 year mark; CISM for the security-program-management track.

The pricing qualifier. All figures are early-2026. SANS bundles have trended up consistently 5 yrs running. OffSec restructured PEN-200 pricing multiple times. CompTIA vouchers are routinely discounted via academic / bulk / promotional channels. Verify against the issuing organization’s current site before any budget decision.

Source depth: Vol 18 §3. Per-hat cert ladders: Vols 6/8-12 §6 each.


8. Disclosure-decision card

╔══════════════════════════════════════════════════════════════════════════╗
║         YOU FOUND A VULN. WHAT NOW?                                       ║
║         The decision tree below covers the modal cases.                   ║
╚══════════════════════════════════════════════════════════════════════════╝
                       ┌─────────────────────────┐
                       │  YOU FOUND A VULN       │
                       └────────────┬────────────┘

                ┌───────────────────▼─────────────────────┐
                │ Q1: Authorized engagement / bug bounty? │
                └───────────────────┬─────────────────────┘

                  ┌─────────────────┼─────────────────┐
                YES                                  NO
                  │                                   │
                  ▼                                   ▼
        ┌─────────────────┐               ┌──────────────────────┐
        │ Follow the ROE  │               │ Q2: VDP / coordinated│
        │ Report to client│               │ disclosure published │
        │ Patch + retest  │               │ by vendor?           │
        └─────────────────┘               └─────────┬────────────┘

                                  ┌─────────────────┼─────────────┐
                                YES                                NO
                                  │                                │
                                  ▼                                ▼
                       ┌─────────────────────┐     ┌─────────────────────────┐
                       │ Submit via VDP      │     │ Q3: Identifiable PSIRT  │
                       │ (HackerOne /        │     │ contact / security@?    │
                       │  Bugcrowd / vendor) │     └─────────┬───────────────┘
                       │ 90-day default      │               │
                       │ deadline            │      ┌────────┼────────┐
                       └─────────────────────┘     YES                NO
                                                    │                  │
                                                    ▼                  ▼
                                         ┌──────────────────┐  ┌─────────────────────┐
                                         │ Notify privately │  │ CERT/CC as          │
                                         │ Set deadline     │  │ intermediary —      │
                                         │ (90-day default) │  │ kb.cert.org/vuls    │
                                         │ Plan release     │  └─────────┬───────────┘
                                         └────────┬─────────┘            │
                                                  │                       │
                                                  └───────────┬───────────┘

                                              ┌───────────────▼───────────────┐
                                              │ Q4: Vendor responds + patches │
                                              │ within deadline?              │
                                              └───────────────┬───────────────┘

                                            ┌─────────────────┼─────────────────┐
                                          YES                                    NO
                                            │                                     │
                                            ▼                                     ▼
                                ┌───────────────────────┐         ┌───────────────────────────┐
                                │ Coordinated public    │         │ Q5: Critical infra /      │
                                │ disclosure post-patch │         │ life-safety?              │
                                └───────────────────────┘         └───────────┬───────────────┘

                                                              ┌───────────────┼──────────────┐
                                                            YES                             NO
                                                              │                              │
                                                              ▼                              ▼
                                                  ┌───────────────────────┐  ┌────────────────────────┐
                                                  │ Notify CISA / NCSC /  │  │ Consider full disclosure│
                                                  │ sector-ISAC first;    │  │ (Bugtraq lineage) — or  │
                                                  │ extend deadline       │  │ withhold (legitimate    │
                                                  └───────────────────────┘  │ choice)                 │
                                                                             └────────────────────────┘

The four canonical paths:

PathWhat you doWhen it’s rightWhen it’s wrong
CoordinatedNotify vendor privately; agree on disclosure date; publish post-patchModal path; default unless vendor is unresponsiveVendor consistently unresponsive; bug actively exploited in wild
Full disclosurePublish details (Bugtraq lineage) without vendor coordinationVendor unresponsive 90+ days; public safety case for forcing patchWhen vendor is responsive; when no PoC pressure to fix is needed
Sale to brokerSell to ZDI / Zerodium / vendor programLegal pathway for commercial researcherNSO / sovereign-customer brokers — ethically contested; map to your personal line
Sit on itDon’t disclose; archive privatelyPersonal data-protection cases; thesis-period researchWhen bug is actively exploited; when you’ve signaled disclosure publicly

The 90-day default. Google Project Zero (founded July 2014) established the 90-day deadline + 14-day grace period for imminent patch norm. Modern bug-bounty programs (HackerOne, Bugcrowd, Intigriti, YesWeHack) inherit it.

Bug-bounty safe-harbor language — the load-bearing legal layer:

  • Published program scope must enumerate in-scope targets and prohibited actions.
  • Explicit safe-harbor clause confirming the program is the operator’s authorization.
  • “Good faith” research definition matching the DOJ May 2022 framework.
  • Caveat: safe-harbor is between researcher and vendor — does not bind third parties, does not affect ECPA-class violations.

Vendor-unresponsive failure-mode — the 6-step:

   1. Resubmit through alternate channel (security@ → CISO → exec → CEO)
   2. Document every contact attempt with timestamp + medium
   3. Engage CERT/CC as intermediary if vendor is unreachable for 60+ days
   4. Notify CISA (or national CERT) if critical-infra / life-safety
   5. Set hard public-disclosure deadline; communicate it
   6. Engage counsel (EFF Coders' Rights Project) before publishing

“Good intentions are not a legal defence.” Grey-hat exposure is identical to black-hat exposure under the CFAA “without authorization” prong. Van Buren narrowed only “exceeds authorized access.” The 2022 DoJ charging policy provides discretion, not immunity. The disclosure tree above is for people who have already done the technical work — the legal exposure was incurred at the moment of unauthorized access, not at the moment of disclosure.

Source depth: Vol 8 §4, Vol 19 §5, Vol 4 §3.


9. Which volume answers X — index card

A practitioner’s question → the volume + section that answers it. Top entries by question density; the complete machine-readable anchor catalog is Vol 21 §3.

QuestionVolumeSection
What does CFAA § 1030(a)(2) actually say?Vol 19CFAA in depth
What did Van Buren narrow? What did it not narrow?Vol 19CFAA in depth §2.3
What’s the difference between SOW / scope / ROE / GOJL?Vol 19Authorization in practice
How do I run the disclosure-decision tree?Vol 19Disclosure ethics §5.2
What’s the receive-vs-transmit rule for RF?Vol 19RF-specific law
What is the engagement lifecycle for a white-hat?Vol 6Methods and tradecraft
What’s the black-hat criminal economy look like?Vol 7The criminal economy
What’s the grey-hat disclosure decision point?Vol 8Methods and tradecraft
What’s the canonical green-hat learning loop?Vol 9§3 (RF starter kit) + §4 (learning platforms)
Where does the defender start? (SOC stack)Vol 10Tools of the trade
Red-team vs pentest — what’s the difference?Vol 11Methods and tradecraft
What’s purple-team actually?Vol 12§1 + Methods and tradecraft
What’s the SDR receive chain look like?Vol 13SDR fundamentals
Which SDR should I buy?Vol 13The gear
What’s the rogue-AP family of techniques?Vol 14The rogue-AP family
How do I capture and crack a WPA2 handshake?Vol 14Handshake-capture pipeline
How do I clone an HID Prox card?Vol 15Access-control attacks
LF vs HF RFID — what’s the physics?Vol 15LF vs HF RFID
What’s the Hak5 implant family?Vol 16The Hak5 implant family
BadUSB / HID injection — how does it work?Vol 16HID injection
What are Cialdini’s six (seven) principles?Vol 17The psychology
What’s the AiTM phishing setup (Evilginx)?Vol 17Phishing, vishing, smishing
Career paths — what are my options?Vol 18The paths
What cert should I take next?Vol 18Certs decoded
What’s the comp band for SOC tier-1?Vol 18Leveling and compensation
How do I build a portfolio / home lab?Vol 18The portfolio and home lab
Where did “white hat” / “black hat” come from?Vol 5Western trope + Migration into computing
Why is the metaphor still useful (or not)?Vol 5Criticisms of the metaphor
What’s the two-axis problem?Vol 5Two-axis problem
How did phreaking start?Vol 2The phone network
What was the Morris worm?Vol 3Morris worm
What’s the ransomware-as-a-business model?Vol 4Ransomware-as-a-business
What’s the full anchor index for cross-deep-dive links?Vol 21Canonical anchor index

The decision graph in compact form:

   What are you trying to do?                Read
   ─────────────────────────────             ─────────────────────
   Understand the field                      Vols 1, 5, 20
   Read the history of how we got here       Vols 2, 3, 4
   Learn one specific hat                    Vol 6/7/8/9/10/11/12
   Reference the technique                   Vols 13-17 + linked tool deep dives
   Career / hiring / cert decisions          Vols 18, 9 (green), 6 (white)
   Legal line                                Vol 19 + every hat's §1 callout
   Cross-deep-dive anchor lookup             Vol 21

Source depth: Vol 1 §6, Vol 21.


10. Cross-tool quick reference card

╔══════════════════════════════════════════════════════════════════════════╗
║         THE HACK TOOLS HUB — DEVICES + WHEN TO REACH FOR EACH            ║
║         Each row links to the device's full deep dive in this hub.       ║
╚══════════════════════════════════════════════════════════════════════════╝
Tool deep diveBand / capabilityWhen to reach for it
HackRF One1 MHz – 6 GHz wideband SDR transmit + receive; 20 MS/s; 8-bit; ~$300RF capture and replay at engineer depth; portable RF research bench; sub-GHz through 5 GHz Wi-Fi (edge)
OpenSourceSDRLab PortaRFHackRF-class handheld with integrated display + keyboard + batteryThe “HackRF as a handheld” use case; tjscientist’s porta already combines HackRF + PortaPack H2+ as the separate-board alternative
RTL-SDR500 kHz – 1.766 GHz receive-only; 2.4 MS/s; ~$30The entry SDR; ADS-B, FM, AIS, sub-GHz receive, rtl_433 decoder
Flipper ZeroSub-GHz (300–928 MHz CC1101) + LF/HF RFID + NFC + IR + BadUSB + GPIOMulti-tool front-end; field-friendly form factor; everyday-carry RF/RFID/NFC swiss-army knife
Proxmark3 RDV4LF (125 kHz) + HF (13.56 MHz) RFID; lab-grade with antennasSerious RFID/NFC work — MIFARE Classic / DESFire / iCLASS / HID Prox; the access-control research bench
WiFi PineappleHak5 purpose-built Wi-Fi auditing — PineAP / rogue-AP / KARMA / evil-twin / Cloud C2Wi-Fi auditing engagements; the rogue-AP toolkit; highest legal-posture device alongside Ducky Script
ESP32 Marauder FirmwareOpen-source Wi-Fi / BLE pentest firmware (runs on AWOK Dual Touch V3, Flipper devboard, Marauder hardware)Open-source Pineapple-adjacent alternative; ESP32-based; cheap; modify the firmware
Ducky ScriptHak5 keystroke-injection language; Rubber Ducky / Bash Bunny / Key Croc / O.MG familyBadUSB / HID injection; physical-entry payload staging; highest legal-posture alongside WiFi Pineapple
AWOK Dual Touch V3Dual ESP32-WROOM + resistive touch + GPS; Flipper moduleWardriving with GPS; ESP32-based Wi-Fi audit; mounted on tjscientist’s AWOKflip
Ruckus Game OverESP32-S3 + OLED + joystick + CC1101/NRF24 daughter slotMulti-radio handheld (Wi-Fi + BLE + sub-GHz + 2.4 NRF24); mounted on tjscientist’s game-over-host
Nyan BoxESP32 + 3× NRF24L01+ + OLED; education-firstTriple-NRF24 parallel-channel sniffing; drone RemoteID; hidden-camera detection (features unique in the lineup)
RayhunterEFF IMSI-catcher detector on Verizon Orbic RC400LDefensive RF — passive IMSI-catcher / Stingray detection; no overlap with the rest of the lineup
Bus Pirate 6UART / I²C / SPI / JTAG / SWD / 1-Wire / smart-card / DDR5-SPD on 8 buffered I/O pinsEmbedded-protocol Swiss-army knife; the “follow-along logic analyzer” via 74LVC8T245 look-behind buffer
M5Stack Cardputer ADVESP32-S3 handheld + QWERTY + 1.14” IPS + IR + Grove + EXT bus + Cap LoRa-1262 optionField handheld for ESP32-S3 work; Cardputer ADV is the platform reference
Clockwork PicoCalcRP2040/RP2350 handheld + QWERTY + 320×320 IPSRP2040/2350 development platform; pico-sdk apps
GL-iNet GL-BE3600Beryl AX Pro Wi-Fi 7 travel routerNetworking half of the travel kit; portable OpenWrt platform

Capability-quick-pick by question:

“I need to…”Reach for
Capture a sub-GHz signal of unknown originRTL-SDR (receive) → HackRF (capture + replay)
Clone an HID Prox cardFlipper Zero (field) or Proxmark3 (lab)
Audit a Wi-Fi networkWiFi Pineapple (purpose-built) or AWOK + Marauder firmware (DIY)
Drop a BadUSB payloadO.MG Cable (covert) or Bash Bunny (capability) or Rubber Ducky (price)
Capture WPA2 handshakesWiFi Pineapple, or any Atheros/Realtek 802.11 monitor-mode adapter
Find rogue base stationsRayhunter (defensive IMSI-catcher detection)
Decode a custom 433 MHz remoteRTL-SDR + URH + rtl_433
Probe a UART/JTAG header on a boardBus Pirate 6
Sniff drone RemoteIDNyan Box (triple-NRF24)
Build a portable RF research benchHackRF One + PortaPack H2+ (current setup) or PortaRF (integrated alternative)

Higher-resolution: _shared/capability_matrix.html — 16 scored axes, 50+ capability detail cells, weights panel for per-decision tuning.

Source depth: Vol 1 §7. Sortable matrix: _shared/capability_matrix.html. Cross-tool prose: _shared/comparison.md.


11. Starter-kit card

╔══════════════════════════════════════════════════════════════════════════╗
║         "IF YOU'RE STARTING TOMORROW, DO THIS"                            ║
║         The minimum viable green-hat kit, learning path, and portfolio.   ║
╚══════════════════════════════════════════════════════════════════════════╝

Hardware — the green-hat RF starter kit (~$330 floor):

OrderToolCostWhat it teaches
1RTL-SDR Blog V4$30Receive-only SDR; FM, ADS-B, AIS, sub-GHz decode; canonical first capture
2Flipper Zero$170Sub-GHz capture/replay; LF + HF RFID; NFC; IR; the field-friendly form factor
3HackRF One$300–340Wideband TX+RX; the SDR career bench
4Proxmark3 RDV4$400Lab-grade RFID/NFC; MIFARE, DESFire, iCLASS, HID Prox

Total ~$900 over 12-24 months; first $200 covers the first 6 months of learning.

Computer / lab — the minimum software setup:

  • Kali Linux (USB or VM) — Metasploit + Burp Suite + Wireshark + Nmap baseline
  • A second box for the defender side — Wazuh / Velociraptor / Sysmon home-lab instrumentation
  • A vulnerable-target stack — DVWA, HackTheBox VPN, TryHackMe rooms
  • An AD home lab — 1 DC + 1 client; misconfigure intentionally to practice escalation
  • A cheap router for Wi-Fi practice (test against your own networks only)

Learning path — the 24-month progression:

   Month 0-3      Month 3-6           Month 6-12             Month 12-18         Month 18-24
   ──────────     ──────────          ──────────             ──────────          ──────────
   TryHackMe      HackTheBox          PortSwigger            OSCP prep           OSCP exam
   guided paths   Starting Point      Web Academy            (PEN-200 +          + first
                  + easy boxes        + first CVE attempt    Try Harder mindset) bug bounty
   picoCTF        + first             + Security+ exam       eJPT or PNPT        + first
   beginner       writeup blog        + GitHub portfolio                         conference
                                      published                                  CFP submission

The learning loop — the discipline that compounds:

   build ───► break ───► understand ───► write up ───► (back to build)
     │          │             │             │
     │          │             │             └─ this step compounds into a career
     │          │             │
     │          │             └─ this step is what separates the practitioner
     │          │                from the script-user
     │          │
     │          └─ this step is the technique

     └─ this step (homelab, CTF box, owned hardware) is the legal-safe foundation

Portfolio — what hiring managers actually look at:

ElementWhy it mattersBare-minimum quantity
CTF writeupsShows you can explain technique, not just execute5-10 published
GitHubShows you can ship code; pinned repos are read3+ pinned projects
First CVEShows you can find a real bug + responsibly disclose1, ideally
Conference talkShows you can teach (BSides is the lowest-barrier first stop)1 BSides talk
Bug bounty profileShows you can find real vulns in real softwareSome reputation on HackerOne / Bugcrowd
Sigma rules / detectionsDefender-track equivalent of the CVESeveral published

First-job targets:

RoleCert floorComp band (US, early 2026)Common pre-job path
SOC tier-1Security+$55-75kBootcamp / IT support / self-taught + Security+
IT-to-securitySecurity+ + CySA+$70-90k2-3 yrs sysadmin → security pivot
Junior pentestOSCP (or PNPT)$70-95kPortfolio + CTF history + OSCP
AppSec dev(any web cert)$90-130k2-3 yrs dev experience + secure-coding interest
DFIR juniorSecurity+ + CHFI$65-85kSOC tier-1 → tier-2 → DFIR

The non-linear path is the modal path. The field absorbs IT support, sysadmins, developers, RF engineers, network engineers, military, self-taught — every entry point ends up at the same mid-career destination. Entry-point matters less than sustained work. The single load-bearing decision is to start writing publicly about the work you’re doing; everything else compounds from there.

The first 90-day program — concrete actions:

   Days 1-7    Set up Kali VM. Complete TryHackMe "Intro to Cyber Security."
   Days 8-30   Work through TryHackMe paths daily. Start a writeup blog.
   Days 31-60  Move to HackTheBox Starting Point. Buy the RTL-SDR.
   Days 61-90  Schedule Security+ exam. Start picoCTF challenges. Publish
               first writeup. Open a GitHub. Post your first technical
               thread on Mastodon / Bluesky / X.

Source depth: Vol 9 §3-4, Vol 18 §3-6.


This is Volume 20 of the Hacker Tradecraft series. Next: Vol 21 — Glossary and canonical anchor index — closes the series with the A-Z glossary and the cross-deep-dive anchor catalog that other Hack Tools deep dives use to link into this one.