From hackers to stationmaster: Follow the path of the dream

Source: Internet
Author: User

Intermediary transaction SEO diagnosis Taobao guest Cloud host technology Hall

The time I had to touch the computer was rather late, and I had to touch the computer in 04, when it was the popular "legend". I was born in a single parent family, and I didn't have a very good relationship. Since 04 began to often run outside, every day to the Internet cafes and friends to play "The legend" a play at least all day and night, even sometimes three nights. It is not until the body can not hold on to eat. Play for nearly 1 years, until the summer when I saw a friend of mine to learn computer maintenance, and then after the family to discuss. My family gave me 700 bucks to learn computer maintenance. At that time to learn the goal of computer maintenance is to be a "network management" continue to play legends and wages to take.

Went to school also did not how to learn things, nothing understand, also learn not to go in. Later, the teacher taught us to do legends, I am interested to come, I can also be a back to GM. I've also made it clear that the first time you set up a legendary personal version is 1.85. Such legends really set up well, you can play, suddenly interested in all gone. It was so simple to set up a legend. Download a version to modify some parameters. Find a computer that is the server we are talking about, and we can run it directly. And GM is directly waiting for members to pay him to buy equipment, I aftertaste a bit, we spend so much time, energy, and money every day in the Internet cafes are doing some meaningless things. During this time I understood a truth; I am not playing games but being played by the game "Play my time, my money, and play a disease." Suddenly from the heart want to learn computer maintenance.

In 04, in our Xinjiang, there are about 60% of the internet cafes are used by Windows 98, so the teacher from Windows 98 began to teach us to do the system, first learn to do Windows 98 then Windows 2000 then Windows 2003, The last is Windows XP. I learned so much that I finally felt that Windows XP was the easiest. Fully automated, and Windows 98 is relatively complex.

The

did the system and then began to learn to dress up games, software, and assemble computers. Although the heart is really want to maintain a good computer, but the heart is still unable to resist the temptation of the game, and occasionally still play a game. Flash one months passed, in an accident when my QQ was stolen, at that time did not know that there is password protection, or even what is password protection do not know. I wonder why my password will be wrong? And baffled, ran to school to ask the teacher, the teacher said maybe your QQ password may be hijacked by a Trojan horse. Then someone changed the password. Trojan Horse hijacking. Confused, then after the teacher 2 hours of explanation and I keep asking. Finally understand what is a trojan, then to the teacher said you teach me to steal QQ, the teacher meaningless smile, I do not teach these. Later, I ran to Baidu to search, the first contact with the word "hacker"! I remember the first time I saw a video tutorial is in 163 of a substation above, in order to make today's article more detailed and more real I found this site. The theme is "Hacker tutorial unfinished" URL address is http://tech.163.com/special/h/000915SN/hachervip.html this page of things I can say that every video is finished. Because the teacher there to learn the computer is Windows 98 system and no headphones, so I ran to the Internet café, took a. Because my friend in that Internet café do network management so also didn't say anything. It took a few days to see almost all the tutorials in it, and when I came to class by chance, I met another computer training student. He said he would steal QQ and also stole a lot of QQ, I have been asking him. Then he told me a website named "Trojan Horse base" URL address is http://www.mmbest.com because this time I was really the basis of the computer, access to the network, so these images are remembered as new. I downloaded a trojan stolen QQ, will not use the above are what to receive letters AH letter AH. Do not understand, and then Miss Wang to see me in this regard is very interested in coming over to give me a little pointers, he only said a few words I very clearly remember what he said "on the internet regardless of what to do, install the software also good configure the trojan, the software download down don't rush to open the software, but read the instructions first." If you really do not understand, on their own to Baidu search ", that a copy of the QQ Trojan is my first contact with the Trojan configuration, and successfully received the letter." At that time are 163 mailbox receipt, there is no current ASP to receive the letter.

Will configure the Trojan to explain that I can go to steal QQ. Ran to the Internet café configured a QQ Trojan and running on the computer, but a few days passed without anything. Then went to ask the teacher, the teacher told me that internet cafes have "freezing point." Freezing point? Later know that the freezing point is to prevent the Internet cafes in the computer Trojan and installation of the point of reducing the genie, then the teacher inadvertently said a word, "anything can be cracked", cracked? I began to find information Baidu, and later found that with a small tool can easily crack the freezing point 2005, so I stole a few QQ in the Internet café, Later, it didn't make any sense. Later, the teacher introduced me a few tools, "glacier" and "Guang Wai girls" now play hack people basically know that the software glaciers but not a few people know "wide outside girls." Later slowly will be over, began to control the Internet Café host. At that time, the management software of internet cafes is "Vientiane 2004" I clearly remember that there is nothing to their membership card to add a little money. Then some tools are too big do not know where to crack the freezing point of Internet cafes. Leave a disk without restoring. Put something on yourself.

It's been playing for about half a year, and then came out a new remote control software "Gray pigeon" believe that many people are familiar with this, but you really know the first "gray pigeon" what it looks like? How many versions?

Later, after the computer maintenance learned, I began to play in the Internet café, then basically did not play the game, every day playing gray pigeons, and then learned to catch chickens, 135, 139, 445, 3389, 1433, 4899, 5900. These methods of catching chickens are successively learned. But I put the Trojan to someone else's computer, the chicken is always not on the line, then know is "antivirus software" killed. Then began to learn to do the Trojan to avoid killing.

At that time, I feel very great, I like to show off in front of others, I remember often to two websites to learn "kill the customer base" and "Spear and shield" in the killing base when I know my good friend now, "Black Network show" he is also Xinjiang. is to kill a guest base stationmaster's apprentice. He was a bull in my heart then. Then I know the "Black Eagle Red Base" this site. I use my first pen to do "network management" salary to Black Hawk bought a VIP account 98 quick money to start learning. It was a time when I paid to study on the website. Is the first time to go to the website to do VIP is the last time to the hacker website to do VIP. At that time my favorite is "remote control" and "Catch Chicken" later also learned to brush QQ members and 4 diamonds. Later in the unintentional a friend asked me to borrow a VIP account I lent him. He told me there was no point in doing this. If you learn "scripting intrusion" and ARP, you'll be invincible. From that moment on I basically don't play with gray pigeons and catch chickens.

Started learning script invasion, I remember the first time I was using 1. Keywords: Co Net MIB Ver 1.0 default account password: ' or ' = ' or ' to take the site, because it is the first time so not how. I clearly remember that once was the "black Net Show" to help me. Later, I finally learned to change the suffix of the ASP Trojan to the Web site above and then back up to take Webshell. Then after Baidu search learned to "SQL injection" upload "backup" and Side note.

Later I accidentally saw a tutorial, the author is my good friend now "professional sex pervert" tutorial is the name of the ARP Hunan TV, think of the former friends to me that the ARP and script intrusion. I began to learn ARP, but to want to ARP must have a server, and later on the Internet to find a tutorial began to learn the right to get the server. At that time the most popular right to claim is serv right, basically serv are 6.0 and 6.1 in other words a new loophole in the discovery of the time is almost "pass kill" that is, as long as your server installed Serv on the wounded. Later learn to serv the right to use the ASP Trojan with the function of the right to mention, at that time also got several servers. Later found that sev-u claim 2 kinds of one is to find the Serv path of an INI file add serv parameters to the right to mention the use of the ASP Trojan with the Serv claim. Later, they have learned other ways to raise power. For example, pcanywhere rights, MYSQL root password, the use of radmin power, the use of NC rebound function, as well as MSSQL backup rights and so on and so on.

With their own server I began to learn ARP, and so I began to learn ARP when I found that ARP is a lot of different kinds of ARP spoofing, ARP sniffing, and ARP attacks. After I looked up the information on the Internet, I found ARP sniffing powerful. So I've only learned ARP sniffing. Just beginning to learn sniffing is learning on a team organization. The name "NCPH Studio" URL address is http://www.ncph.net. Webmaster is "Withered Rose" now this site seems to be closed! When I first started playing sniffing, all the ports were sniffing, backstage a friend of mine told me I just need to sniff a few useful ports. "21.80.3389" later I also know what 1433, 3306 smell is a bit of junk information.

Learned these, has been immediately 07 years and fast New year. No money, people say that people who play hackers are very rich. I did not, then after the introduction of friends I began to take the hacker business, intrusion site access list, at that time my friends have a lot of, I can say already is a part of this circle. Take the thousands of quick money list, save the New year. Later inadvertently sent "China is black website statistics" URL address is http://www.zone-h.com.cn open the site, ranked first is a "cold water qianqian" people. It sounds like a girl. Later, my friend told me that I was a man. Later, I began to organize my previous invasion of the site, all set up an HTML file published to the site, at least 20 to 300 a day station. Think one day must be more than he, so every day to invade the site submitted to the above. Later, some loopholes have been played enough, after the introduction of friends I began to go to some of the domestic site to see the article, learn from others intrusion methods, sorting ideas. The hacked site started to be submitted to the hacked site. In this way, day after days, and finally more than the sweat Qianqian, in the heart is still not happy, this circle of cattle too many, rookie more. I watched everyone else have a blog I started to build my own blog to write my own intrusion article. Since then, I am not Daniel. But also the circle of small famous people. There were more and more people looking for me to take the list. I have also received a lot of lists, although not a big list also make a little money. Then cheated a few times, I last pick up the list is to do a Henan portal site, 8000 of the list I took only half an hour to get the permission. Then I called the boss. The remote thing also looked. Said the money to go, people have not appeared. I haven't picked up the list since that time.

I have not read the tutorial early, every day to other people's blog to see only the article, and only to see the script intrusion article. Because I'm only interested in scripting intrusion and claim. It's okay to write articles. Also done a few tutorials, so boring to live.

Now the domestic hacker training website is more and more, all rely on the website VIP member to make money. I also have the idea that the same people, others can do, why can't I do? I bought the corn, bought some space, and spent weeks modifying the div CSS code. The station finally opened up, but I did not want to rely on the site's VIP members to maintain their livelihoods. In the hacker circle although I am not very niu B characters, but also is a small well-known, is also a webmaster.

It's been a while since we've actually been in touch with computers. From a computer maintenance kid. To be present. Suddenly recall. What I got, what I lost, the hacker circle. Got some people seemingly lofty and thin technology. Lost. Some people's concern. and a little contact with a former friend. !

All computer hackers have poor eyesight. The face is always so haggard. The time is always so urgent, the brow is always so locked. Face the computer all day. Penetrating the website loophole and system loophole, Sometimes even on the way home. I was thinking about the same thing when I was eating. How to penetrate the loophole. What can I get out of using the loophole? How... How...

Money can never be earned. Sometimes the life is even the same as begging. There is always a great deal of pressure. Great fear. Great loneliness and loneliness go to life.

The train of thought is often stifled. And often misunderstood and misunderstood by the rubbish in the circle. Be misunderstood and misinterpreted by those who are intellectuals and non-intellectuals. Sometimes I really wonder. I don't know what I'm doing. Hackers have become my dream. But I've lost so much. I really want to continue to pursue my dream. Or give up on this. .

Time flies, I am more and more big, the burden and responsibility is also getting bigger. At a time when a friend of mine told me that I wanted to buy a website that I had invaded before. I made a deal with him for 2 weeks. 20 stations per day. 50RMB. Then a word from that friend gave me great inspiration. His monthly income is guaranteed 2W, how does he make money? Why would he make so much money? Such problems often arise in my mind. I seemed to ask him a few times and he didn't tell me. Later a friend told me about an address http://www.admin5.com said to make a net to earn to go here. I just think everyone else can do it, why can't I do it?

I registered a member number in the Admin5 forum and went to the link area to see how others did it. In the forum inadvertently see a post "long-term substantial acquisition of black chain" I added his QQ asked him what is black chain. He told me it was black, and I said I had you here. He asked me how many I said there were more than 1000. So I slowly contacted the link to this industry. In a few days of contact I learned the Ming chain and the dark chain of the points. What is the Ming chain and what is the dark chain? I almost understand, open before I sold to the friend of the station found inside hung a lot of stops. Slowly I understand the price of the link. began to do it myself. In this way in the ADMIN5 forum for 20 days, I am very happy 20 days I earned 6000RMB, the most one day to get 1300RMB, slowly my "credibility" good, lost the package to repair, replacement. There are more and more people looking for me to hang the chain. I want to have a good rest when I see the Chinese New Year. Tidy up the former Webshell, ready to hang the chain next year. During this time, I learned how to buy my links how to make money, they buy chain is to do, all this thanks to my present boss. Good people, a chain is to be more than 500RMB chain, with his cooperation for a long time, I told him my ideas, others can do stand hanging ads to make money, why can't I? This friend said, you have to do station I provide you with the server for free. I suddenly felt the strong friendship, and finally know what is more than a friend more than one road.

I bought a certified member at the ADMIN5 Forum. And saw the former hack circle inside a liar, cheated others a lot of money, as for who, what name I here also don't say, everyone has dignity I respect him, respect each person. After Admin5 met him, he told me what he had done and regretted, and told me what he was doing in Admin5, who was the boss. Later the "King" QQ to me, I inquired about this person's relevant information. It feels like this guy is unbelievable. Do n more stations, what stations have done, grasp the network to build every opportunity of the station. I began to try to contact him, because I do not know what kind of person he is, do not look at the people like us. After contact with him I found that this person is very enthusiastic, and in his conversation I found him a busy man. I didn't say I admired a few people on the Internet. I talked to him for a while, and asked him if the Admin5 forum lacked the owner? And I also "volunteered" a bit, and passed the "king" certification, I began to learn in Admin5 to do net earn, sell links, do web sites, hanging ads. Admin5 is my second home, in this big family, I am not the best, but I will try to do my best.

I have a few words to say here!

1. For those who want to learn hacker technology, say:

Hackers in fact no great, do not worship what the so-called hackers, learning hacker technology is in fact to the Network Security Foundation, you only understand the attack, you know how to prevent. There is a saying that good "enemy can never be victorious" do not move to ask, if a really do not know you can Baidu it is your real teacher, "Ask for yourself" If you really like network security you can go to self-study network security, you have to believe that you must be better than "he" strong.

2. To those hack said:

Don't think of yourself as a bull B, in this vast virtual world of cyberspace, more than you have a cow B. Do not day boring to go to the black People's website, if you want to say that you are practicing your own technology, I support you, if you are to invade other people's website and go to hang Trojan, then I have nothing to say to you, not a day to tamper with other people's home page, now the network has been out of law, you fight but "Communist Party", more than one thing less, Everything has a degree, enough to do.

3. For those who play the game, say:

Games can play, but the appropriate play, if you play the game can play money you can continue to play. When you've had enough of your time, you play the game to make money, with you on the Internet to play games spent money, time, and energy, you calculate whether you have earned or lost, life can be appropriate game, but can not play life ' "You can play the game, but don't be played by the game"

For the safety of the people: A deadly trick, you prevent it?

For hackers: A deadly trick, will you?

Technology is innocent, happiness is thinking.

Defense is a philosophy, win or lose only in one trick.

Based on computer knowledge, to network information security responsibility. Help others and improve themselves. We are not hackers, but we have the thoughts, connotations, and responsibilities of real hackers.

By: Network kid Real experience. All rights Reserved!

blog:http://www.ykhack.com/

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.