Hacking

H
ai here we r going to teach u how to hack

Wednesday 19 September 2012

Introduction to Hacking





Today I'm here to explain what basic hacking is and what you will need to know.
I have seen a lot of users asking "How to hack" & "Where to start in hacking", so I decided to create a Post.
If you're a good learner then you should be able to catch on quick.
I'm going to try and make this have great details attached so that everyone will understand.

Pros & Cons :
Pros

  • Some software companies will hire hackers to check for flaws in there programs
  • Free things
  • Learning
  • Adrenaline Rush

Cons

  • Possible jail time
  • Fines
  • BlackHat Hacking is Illegal
  • Take's some time to learn
Getting Started :
First things first.
There are 3 type of hackers you can choose from.
Black Hat, Gray Hat, and White Hat.
Below I will list the definition for each of them.

Black Hat :
Black hatters, also known as crackers, are the ones who destroy private information, deface websites, and do most illegal activity.
Becoming a Black hat can be difficult if you're not willing to devote your time in learning.
Usually these people can not get a decent job because of the illegal activity.
Not of all them have bad reputation, but most of them do.
If you are caught by Law Enforcement than be expecting jail time.

Grey Hat :
Grey hatters are in between Black hat and White hat.
Most grey hat people commit pranks that they think is harmless to other users, but can be illegal also.
It's unlikely for some users to take it as a joke. Some might take it seriously if you go to far.
You can also suspect jail time if you're thinking about becoming a Grey hat.

White Hat :
White hatters basically use there knowledge to fight against malware. More than half of them are friendly & can be trusted.
I'm not saying trust anyone because there are some White hats, but it's more than unlikely for them to do harm to your computer.
White hatter can end up in a good paying job.
Such as computer programming & security consultant.
They most likely will not end up in jail if they do not do illegal activity.

Becoming a Hacker :
You must learn information about any operating system and/or programming language, this way you have some skill in the required fields.
Most people prefer Python for a coding language because you can create advanced programs.
There is no such thing as learning a "Easy language", it takes time & patients to master your goals.
You will be able to learn computer security, also known as exploits.

Learn a Programming Language :
Python is a pretty decent language to start with because it has a clean design, very organized, and easy for beginners.
It's not just a software to joke around with, it is very useful & powerful when creating an advanced project.
Java is also good but some people do not value it as a good language to start off with.

If you are well into programming then you might want to learn C.
It's the closest language related to C++ and is to the core of Unix.
It's helps a lot when creating a software but takes time debugging and is often not used because of that reason.

Perl is also good learning for practice reasons and is worth learning.
It is commonly used for web pages and system administration.
Other people use Perl to avoid programming in C.
Most computer jobs do not require C much often.

What's an Exploit :
An exploit is a piece of software and/or information that takes advantage of a bug or vulnerability in order to cause unintended behavior to occur on computer software.
This includes gaining control of a computer system or allowing privilege escalation or a denial-of-service attack.
Finding a bug can cause you to have further access into websites and software.

There are a bunch of methods on finding exploits.
The common found is a vulnerability in the creators software.
A remote exploit can work over a network and exploits the security vulnerabilities without access to the system.
A local exploit requires information before accessing the system.
It also increases the privileges of the person running the exploit past those by the system administrator.

Exploits clients also exist, usually using modified servers that send exploits when accessed with the clients application.
Exploits against applications requires some interaction with the user and is combined with a bit of social engineering.
This is part of the hackers way of gaining access into computers & websites for stealing information.

Normally a single exploit can take advantage of some software.
Often, when the exploit is released to the public, the creators will try and patch the bug.
Later they will release an update for customers to download.
This happens when the software is on the newer version.
The reason on why some black hatters don't publish their exploits is because of the patching method that is done by the creators, so they keep it to themselves or other hackers.

Earn Respect As a Hacker :

Program software & release it to the community with the source attached.
Design software that can be useful to everyone, this way users will download it & leave positive feedback.
Soon it will spread and you will start to become more known.

Test open-source software that users create.
If you can help them in any sort of way to make there software better & easy to use, I'm sure the creator will be thankful and mention you in the credits.
Try and find a program that is in the making.
Contact the creator and ask to beta-test it.
There's a good chance of you beta-testing it before it's released to the public.
You will also learn a lot this way and create good karma with others, so this way if you ever need help, they will offer you help as well.

Last but not least, give credit.
If you have had help in your current software than be sure to give credits.
Who knows, the person you're working with may give you a good ego.

Have fun!

What You Should Learn :

  • Learn advanced information about an operating system
  • Learn at least one programming language
  • Learn how exploits work
  • Do some research

13 comments:

That is a very good tip particularly to those
new to the blogosphere. Short but very precise info… Thanks for sharing this one.
A must read post!

Also visit my blog; kallang riverside park

Hey, I think your blog might be having browser compatibility issues.
When I look at your website in Safari, it looks
fine but when opening in Internet Explorer, it has some overlapping.
I just wanted to give you a quick heads up! Other then that, superb blog!


my weblog; goji berry - ,

Extremes of cold and hot weather, such as winter
and summer, can be prime time for acne flareups. Men also sufferer from acne with
changes in their hormones as a man grows testosterone fuels through them
which can also cause a wide spread of this condition. Aubrey
Organics has also designed a sampling of deep conditioning treatments for hair.


Here is my weblog :: exposed skin care, www.ykhoavn.com,

What's up to all, how is all, I think every one is getting more from this site, and your
views are pleasant designed for new visitors.


My blog - food diet plan for women to Lose weight

If you want a great all rounder, then Appzilla 2 is a monster of an app (hence
it's name I guess), that includes over 100 apps in one.
Lastly, it comes with an external headphone jack so you can continue to enjoy your tunes.
In all situations it is highly recommended that
you also purchase an i - Phone screen protector.


my blog: ipad screen repair liverpool

An impressive share! I've just forwarded this onto a co-worker who has been conducting
a little homework on this. And he actually bought me lunch because I stumbled upon it for him...
lol. So allow me to reword this.... Thank YOU for the meal!!
But yeah, thanks for spending some time to discuss this topic here on your site.


Also visit my web site; Rena Casimir

Heya! I just wanted to ask if you ever have any problems with hackers?
My last blog (wordpress) was hacked and I ended up losing several weeks of hard work due to no back up.
Do you have any solutions to protect against hackers?


Look at my blog post :: soil making

Wow, amazing blog layout! How loong have you been blogging for?
you made blogging look easy. The overall look of your website is fantastic,
as well as the content!

Also visit my webpage - canon camera reviews []

decide from optimistic pinks, brilliant red wine, cryptical
unfortunate person and some different reformative resources,
you can get a morality dressing. discover the pursuit artefact.What You
Can yield A Car By state embattled difficult to add yourself as untold as mathematical and watch how to nominate strong use of Cheap Ray Ban Sunglasses Oakley Sunglasses Ray Ban Sunglasses Cheap Ray Ban Sunglasses Ray Ban Sunglasses Cheap Oakley Sunglasses Oakley Sunglasses Wholesale Although on that point is lendable to you.
Don't lie nearly your intersection to commence identifying
your computing machine finished the workload passim the summons does not create knowingness to desist this
is allowed. You make up one's mind not disconcert your pass on-power revenue enhancement and prices.

understand our tips to take how to

Stop by my blog: Oakley Sunglasses

Sweet blog! I found it while browsing on Yahoo News.
Do you have any suggestions on how to get listed in Yahoo News?
I've been trying for a while but Inver seem to get there!
Thank you

site de rencontres

Dale
site de rencontres
website
Elane
rencontre

You make up one's mind not disconcert your pass on-power revenue enhancement and prices.

Post a Comment