当前位置:网站首页>3 minutes to tell you how to become a hacker | zero foundation to hacker getting started guide, you only need to master these five abilities
3 minutes to tell you how to become a hacker | zero foundation to hacker getting started guide, you only need to master these five abilities
2022-07-28 09:49:00 【segegefe】
List of articles
Speaking of hackers , Is everyone's image like this ?
Yeah . You can manipulate other people's mobile phones through only one computer , Access to the world's top secrets , Give Way ATM Unlimited cash dispensing …… It's really cool . Just ask which programmer has no dream of becoming a hacker ?
This article , Is to show you what hackers are , And what capabilities you need to be a hacker ?
What is a hacker ?
Explain from a computer perspective , Hackers are looking for websites 、 System 、 Software and other vulnerabilities , And exploit vulnerabilities to obtain some data or achieve control , Make the other party's program crash and other effects .
Most novice hackers are engaged in penetration work , And infiltration mostly belongs to web Safety direction . So call them by a simpler name —— Safety Engineer .
Is it not so mysterious at once ?
however , The so-called title is just a code . I think the real charm of hackers lies in their obsession and love for code , Confidence in one's abilities is similar to arrogance and creativity and courage to break stereotypes .
Of course, not including breaking the law .
What abilities do you need to have to be a hacker ?
The first point , Understand the way hackers think
The websites we use in our life 、 Software etc. , It's all made up of code written by programmers .
These codes are in the process of design , Are based on a forward logic , In order to achieve a certain purpose , The process or data transmission logic that completes an operation .
The thinking of hackers is reverse , They will analyze the current operation process or data transmission logic , Whether there is any risk that the verification is not rigorous or secret information is leaked , And make use of , So as to bypass the normal operation logic and achieve the ability of unauthorized access or operation .
Popular point theory , Programmers build houses , The hacker is to see if there is a leak in the house , There's a gap . Turn in and do whatever you want ; Some even demolished the house directly .
Second point , Learn a programming language
Hacker's weapon is also code . Want to be a hacker , First, learn a programming language that hackers need .
For Xiaobai who has no code experience , It can be downloaded from python、PHP or C Learn the .
The third point , Learn the basics of network security
As mentioned earlier , Hackers are actually security engineers . Safety engineers are also divided into several categories , Each type of learning path is also different .
This map gives a very comprehensive way for hackers to learn and develop , We can find the corresponding technology learning according to the direction we want to study .

With Web Examples of safety .
First of all, we have to deal with Web Know something about technology , For example, you want to crack a website , First, you have to be able to build a website . So we need to master :
Communication protocol , Such as TCP、HTTP, operating system , Such as Linux、Windows、 Service erection :Apache、Nginx etc. , database :MySQL or Oracle, And programming languages , Including front-end and back-end languages .
Then for Web Security technology also needs to be mastered : Back end security, such as SQL Inject 、 Upload files 、Webshell( Trojan horse ) etc. , Front end security, such as XSS Cross-site scripting attacks 、CSRF Cross Site Request Forgery, etc .
There are many basic skill points involved by hackers , Most people hold the heat for three minutes , Learn to learn and give up . Therefore, in the process of learning, we should first sort out a knowledge map , Then carry out systematic learning .
Fourth, , Practical operation
If you succeed in passing the third point , So congratulations , You are already a junior hacker . Next, it's better to practice , such as SRC Vulnerability mining ,WIFI Network cracking , Matching range practice, etc . Of course , You can also try to crack your girlfriend's QQ password .
The first five , Understand the law , Understand the law , Understand the law !
《 Network security law 》 Article 27
Any individual or organization shall not engage in illegal intrusion into other people's networks 、 Interfere with other people's normal network functions 、 Stealing network data and other activities endangering network security ; It shall not be provided specifically for the purpose of intruding into the network 、 Interfere with the normal function of the network and protective measures 、 Stealing network data and other programs endangering network security activities 、 Tools ; Knowing that others are engaged in activities endangering network security , Do not provide technical support 、 Advertising 、 Payment settlement and other help .
Article 44 No individual or organization may steal or illegally obtain personal information , Do not illegally sell or provide personal information to others .
《 The criminal law 》 Article 286
Violation of state regulations , Delete the function of computer information system 、 modify 、 increase 、 interfere , Causes the computer information system to be unable to operate normally , With serious consequences , He shall be sentenced to fixed-term imprisonment of not more than five years or criminal detention ; Especially serious , Sentenced to more than five years' imprisonment .
Not about technology , Just talk about quality . Malicious intrusion into other computer systems to make damage “Cracker” It's very shameful . The Internet is not out of the law , I want to popularize the knowledge of hackers to you, and I don't want to encourage the bad mentality of some friends .
I think it is necessary for a technician to understand and learn hacker knowledge , Because in this way, we can deal with safety risks in our daily work , Complete programming and operation and maintenance work with high safety awareness ; Of course , If you can successfully master some hacker principles and techniques , When you encounter an attack , It's not just about being strict , But to catch the ghost , The anti general Army .
Technology itself is not evil , Misuse of technology leads to evil !
Finally, use Chinese hackers —— The counter attack of the Green Corps ends this video .
China “ The godfather of hackers ” How tough ? Refuse Ma Yun's solicitation , Paralyze Japan !
边栏推荐
- 2.9.5 ext JS object type processing and convenient methods
- Source code analysis of activityrouter
- ConsoleAppender简介说明
- go语言切片Slice和数组Array对比panic runtime error index out of range问题解决
- Opencv installation configuration test
- The maximum recommended number of rows for MySQL is 2000W. Is it reliable?
- 对象到对象映射-AutoMapper
- CTF中常见的RSA相关问题总结:基础RSA加密与解密
- 软件测试与质量学习笔记2----黑盒测试
- Plato Farm-以柏拉图为目标的农场元宇宙游戏
猜你喜欢

My vivado practice - single cycle CPU instruction analysis

21 day learning challenge - "AUTOSAR from introduction to mastery - practical part"

C countdown tool

Introduction to shardingsphere (I)

What is cross domain? How to solve the cross domain problem?

matlab基本操作

使用 OpenSSL 创建ssl证书

C# 读写文件从用户态切到内核态,到底是个什么流程?

Linux操作系统(Centos7)安装MySQL

ECCV 2022 | 无需微调即可推广!基于配准的少样本异常检测框架
随机推荐
LinkedList内部原理解析
Arouter source code analysis (I)
就这么一个简单的校验,80%的程序员却做不到,更不理解!
PlatoFarm进展不断,接连上线正式版以及推出超级原始人NFT
Retrofit source code analysis
2.9.5 ext JS object type processing and convenient methods
Arouter source code analysis (II)
数据库高级技术学习笔记1--Oracle部署和PL/SQL综述
With frequent data leakage and deletion events, how should enterprises build a security defense line?
ActivityRouter源码解析
PlatoFarm几大创新经济模型,给予当下元宇宙市场的启发
C countdown tool
Introduction to shardingsphere (I)
这款微信插件太好用了
The maximum recommended number of rows for MySQL is 2000W. Is it reliable?
2022 supplementary questions for the first session of Niuke multi school
Pulse style | exclusive interview with Committee -- Tencent engineer Zhang Dawei calls you to eat "crab"
ThresholdFilter简介说明
路由器固件解密思路
opencv安装配置测试