- Thou shalt keep copious records of all known usernames and passwords.
- Thou shalt always try known credentials on new systems — they often reappear.
- Thou shalt always seek privilege escalation — never stop at the foothold.
- Thou shalt always uncover new credentials — the hunt never ends.
- Thou shalt never impact operations — ethical hacking leaves systems standing.
“Discipline is the root of discovery — hack with honor.”