Below are the steps to learn about white hat hack technology in our black bar safety net:
First, the early
1 , understand what hackers are, and what the spirit of hackers is. Of course, it is also necessary to understand the "family history" of hackers or hacks.
2 , some basic commands that hackers must have, including DOS command, and Unix/linux under the command.
3 , remote scanning, remote spying technology. This includes information piercing through the system's own commands and scanning with tools.
4 , password cracking. Understand the scope of the current password cracking, as well as the operating skills , and so on.
5 , overflow attacks. How to use the overflow tool.
6 , injection attacks. The injection attack is just a short name, and includes a series of scripting attack techniques such as XSS, Apostille, and remote containment.
7 , learn how to use the various compiler tools, can compile all ShellCode .
8 , learn to manually avira any trojan, virus, learn to analyze Windows operating system, to make self - The poison does not invade.
Second, mid-term
1 , learn all Windows steps to build down the server ( ASP , PHP , JSP ).
2 , Master for example Google hackers, Cookies , phishing, social engineering, etc.
3 , Learning HTML , JavaScript , VBScript .
4 , Learning Standards SQL language, and the use of most databases.
5 , Learning ASP , and has an excavation ASP the ability to script vulnerabilities.
6 , Learning PHP , and has an excavation PHP the ability to script vulnerabilities.
7 , Learning JSP , and has an excavation JSP the ability to script vulnerabilities.
8 , learn about the features of the latest scripts, and explore ways to exploit them
Third, late
1 and determine their own direction of development
2 , Learning C language, and try to rewrite some of the published ShellCode .
3 , Learning C + + , try to write a trojan that belongs to yourself (if you want to write it yourself trojan words).
4 , learning compilation
5 , Research Linux system kernel.
6 and Learning buffer overflow utilization technology.
7 , ShellCode technology.
8 , heap overflow utilization technology, format string exploit technology, kernel overflow utilization analysis of operation and exploit
Learn the steps of hacking.