当前位置:网站首页>3 minutes to tell you how to become a hacker | zero foundation to hacker getting started guide, you only need to master these five abilities
3 minutes to tell you how to become a hacker | zero foundation to hacker getting started guide, you only need to master these five abilities
2022-07-28 09:49:00 【segegefe】
List of articles
Speaking of hackers , Is everyone's image like this ?
Yeah . You can manipulate other people's mobile phones through only one computer , Access to the world's top secrets , Give Way ATM Unlimited cash dispensing …… It's really cool . Just ask which programmer has no dream of becoming a hacker ?
This article , Is to show you what hackers are , And what capabilities you need to be a hacker ?
What is a hacker ?
Explain from a computer perspective , Hackers are looking for websites 、 System 、 Software and other vulnerabilities , And exploit vulnerabilities to obtain some data or achieve control , Make the other party's program crash and other effects .
Most novice hackers are engaged in penetration work , And infiltration mostly belongs to web Safety direction . So call them by a simpler name —— Safety Engineer .
Is it not so mysterious at once ?
however , The so-called title is just a code . I think the real charm of hackers lies in their obsession and love for code , Confidence in one's abilities is similar to arrogance and creativity and courage to break stereotypes .
Of course, not including breaking the law .
What abilities do you need to have to be a hacker ?
The first point , Understand the way hackers think
The websites we use in our life 、 Software etc. , It's all made up of code written by programmers .
These codes are in the process of design , Are based on a forward logic , In order to achieve a certain purpose , The process or data transmission logic that completes an operation .
The thinking of hackers is reverse , They will analyze the current operation process or data transmission logic , Whether there is any risk that the verification is not rigorous or secret information is leaked , And make use of , So as to bypass the normal operation logic and achieve the ability of unauthorized access or operation .
Popular point theory , Programmers build houses , The hacker is to see if there is a leak in the house , There's a gap . Turn in and do whatever you want ; Some even demolished the house directly .
Second point , Learn a programming language
Hacker's weapon is also code . Want to be a hacker , First, learn a programming language that hackers need .
For Xiaobai who has no code experience , It can be downloaded from python、PHP or C Learn the .
The third point , Learn the basics of network security
As mentioned earlier , Hackers are actually security engineers . Safety engineers are also divided into several categories , Each type of learning path is also different .
This map gives a very comprehensive way for hackers to learn and develop , We can find the corresponding technology learning according to the direction we want to study .

With Web Examples of safety .
First of all, we have to deal with Web Know something about technology , For example, you want to crack a website , First, you have to be able to build a website . So we need to master :
Communication protocol , Such as TCP、HTTP, operating system , Such as Linux、Windows、 Service erection :Apache、Nginx etc. , database :MySQL or Oracle, And programming languages , Including front-end and back-end languages .
Then for Web Security technology also needs to be mastered : Back end security, such as SQL Inject 、 Upload files 、Webshell( Trojan horse ) etc. , Front end security, such as XSS Cross-site scripting attacks 、CSRF Cross Site Request Forgery, etc .
There are many basic skill points involved by hackers , Most people hold the heat for three minutes , Learn to learn and give up . Therefore, in the process of learning, we should first sort out a knowledge map , Then carry out systematic learning .
Fourth, , Practical operation
If you succeed in passing the third point , So congratulations , You are already a junior hacker . Next, it's better to practice , such as SRC Vulnerability mining ,WIFI Network cracking , Matching range practice, etc . Of course , You can also try to crack your girlfriend's QQ password .
The first five , Understand the law , Understand the law , Understand the law !
《 Network security law 》 Article 27
Any individual or organization shall not engage in illegal intrusion into other people's networks 、 Interfere with other people's normal network functions 、 Stealing network data and other activities endangering network security ; It shall not be provided specifically for the purpose of intruding into the network 、 Interfere with the normal function of the network and protective measures 、 Stealing network data and other programs endangering network security activities 、 Tools ; Knowing that others are engaged in activities endangering network security , Do not provide technical support 、 Advertising 、 Payment settlement and other help .
Article 44 No individual or organization may steal or illegally obtain personal information , Do not illegally sell or provide personal information to others .
《 The criminal law 》 Article 286
Violation of state regulations , Delete the function of computer information system 、 modify 、 increase 、 interfere , Causes the computer information system to be unable to operate normally , With serious consequences , He shall be sentenced to fixed-term imprisonment of not more than five years or criminal detention ; Especially serious , Sentenced to more than five years' imprisonment .
Not about technology , Just talk about quality . Malicious intrusion into other computer systems to make damage “Cracker” It's very shameful . The Internet is not out of the law , I want to popularize the knowledge of hackers to you, and I don't want to encourage the bad mentality of some friends .
I think it is necessary for a technician to understand and learn hacker knowledge , Because in this way, we can deal with safety risks in our daily work , Complete programming and operation and maintenance work with high safety awareness ; Of course , If you can successfully master some hacker principles and techniques , When you encounter an attack , It's not just about being strict , But to catch the ghost , The anti general Army .
Technology itself is not evil , Misuse of technology leads to evil !
Finally, use Chinese hackers —— The counter attack of the Green Corps ends this video .
China “ The godfather of hackers ” How tough ? Refuse Ma Yun's solicitation , Paralyze Japan !
边栏推荐
猜你喜欢

SD卡介绍(基于SPEC3.0)
C form application uses object binding DataGridView data binding

IJCAI 2022 | 图结构学习最新综述:研究进展与未来展望

What is cross domain? How to solve the cross domain problem?

译文推荐 | 调试 BookKeeper 协议 - 无界 Ledger

3分钟告诉你如何成为一名黑客|零基础到黑客入门指南,你只需要掌握这五点能力

Net 3 lines of code to realize the function of text to speech

超级原始人系列盲盒即将上线,PlatoFarm赋能超多权益

学个锤子 | .Net零基础逆向教程 第三课(壳与作业)

Opencv4.60 installation and configuration
随机推荐
软件测试与质量学习笔记2----黑盒测试
脉冲风采|Committer 专访——腾讯工程师张大伟喊你吃“螃蟹”啦
译文推荐 | 调试 BookKeeper 协议 - 无界 Ledger
C form application uses object binding DataGridView data binding
老板:公司系统太多,能不能实现账号互通?
《我的Vivado实战—单周期CPU指令分析》
【日志】日志干什么的?日志工厂是什么?log4j 的配置和使用? log4j.properties 文件配置、log4j jar包坐标
Introduction to SD card (based on spec3.0)
ARouter源码解析(二)
21 day learning challenge - "AUTOSAR from introduction to mastery - practical part"
领域事件和集成事件没那么高大上
MATLAB启动慢解决措施
matlab基本操作
Pulse style | exclusive interview with Committee -- Tencent engineer Zhang Dawei calls you to eat "crab"
[autosar-rte] - 3-runnable and its task mapping mapping
Real time editor of MATLAB
[autosar-rte] - introduction of 2-component, component and VFB
SQL server, MySQL master-slave construction, EF core read-write separation code implementation
opencv安装配置测试
Source code analysis of activityrouter