Learn the steps of hacking.

Source: Internet
Author: User

Below are the steps to learn about white hat hack technology in our black bar safety net:

First, the early

1 , understand what hackers are, and what the spirit of hackers is. Of course, it is also necessary to understand the "family history" of hackers or hacks.

2 , some basic commands that hackers must have, including DOS command, and Unix/linux under the command.

3 , remote scanning, remote spying technology. This includes information piercing through the system's own commands and scanning with tools.

4 , password cracking. Understand the scope of the current password cracking, as well as the operating skills , and so on.

5 , overflow attacks. How to use the overflow tool.

6 , injection attacks. The injection attack is just a short name, and includes a series of scripting attack techniques such as XSS, Apostille, and remote containment.

7 , learn how to use the various compiler tools, can compile all ShellCode .

8 , learn to manually avira any trojan, virus, learn to analyze Windows operating system, to make self - The poison does not invade.

Second, mid-term

1 , learn all Windows steps to build down the server ( ASP , PHP , JSP ).

2 , Master for example Google hackers, Cookies , phishing, social engineering, etc.

3 , Learning HTML , JavaScript , VBScript .

4 , Learning Standards SQL language, and the use of most databases.

5 , Learning ASP , and has an excavation ASP the ability to script vulnerabilities.

6 , Learning PHP , and has an excavation PHP the ability to script vulnerabilities.

7 , Learning JSP , and has an excavation JSP the ability to script vulnerabilities.

8 , learn about the features of the latest scripts, and explore ways to exploit them

Third, late

1 and determine their own direction of development

2 , Learning C language, and try to rewrite some of the published ShellCode .

3 , Learning C + + , try to write a trojan that belongs to yourself (if you want to write it yourself trojan words).

4 , learning compilation

5 , Research Linux system kernel.

6 and Learning buffer overflow utilization technology.

7 , ShellCode technology.

8 , heap overflow utilization technology, format string exploit technology, kernel overflow utilization analysis of operation and exploit

Learn the steps of hacking.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.