A Beginner's Guide to Hacking - Highly Recommended

insert image description here
A hacker is someone who finds a weakness in a computer or computer network, although the term can also refer to someone who has an in-depth knowledge of computers and computer networks. Motives of hackers can be various, such as profit, protest or challenge. The subculture that grew up around hackers is often called the "computer underground," but now it's an open community. While other uses of the word hacker have nothing to do with computer security, it is rarely used in mainstream contexts.

Part 1 Classification of Hackers

insert image description here

  • white hat hacker

A white hat hacker breaches security for non-malicious reasons, perhaps to test their own security systems, or work for a security company that works for a security software company. The term "white hat" is internet slang for an ethical hacker. This classification also includes individuals who perform penetration testing and vulnerability assessments in contractual agreements.
insert image description here

  • black hat hacker

A "black hat hacker" is a hacker who "violates computer security with little or no reason for malicious or personal gain". Black hats form the quintessential, outlaw hacker group that is often depicted in popular culture and is "the epitome of all the public fears of computer crime."
insert image description here

  • gray hat hacker

A gray hat hacker is a combination of a black hat hacker and a white hat hacker. For example, a gray hat hacker might browse the Internet and break into computer systems with the goal of notifying administrators that their systems have been hacked. They may then offer to fix their system for a small fee.

Part 2 Hacking Introductory Operation

1. Find a purpose

insert image description here

At this stage, the hacker decides what network to break into. Hackers may have a special interest in the target, whether political or personal, or be picked at random. Next, they'll port scan a network to see if it's vulnerable, which simply tests all the ports on the host for a response. Open ports (those that respond) - will allow hackers to access the system.

2. Study Gathering Information

insert image description here

At this stage, hackers access or contact the target in some way, hoping to find important information that will help them gain access to the system. The main way hackers get the desired results from this stage is "social engineering", which is explained below. In addition to social engineering, hackers can also use a technique called "garbage collection." "Trash hunting" is when hackers search users' spam in hopes of finding discarded files that may contain information that hackers can use directly or indirectly to help them gain access to the network.

3. Attack
insert image description here

At this stage, the hacker infiltrates the initial target he/she plans to attack or steal. Many "hackers" will be caught after this point, and they may be attracted to data called "honeypots" (traps set by computer security personnel).

Internet Security & Hacking Learning Resource Sharing:

Share with you a complete set of network security learning materials, and give some help to those who want to learn network security!

For students who have never been exposed to network security, we have prepared a detailed learning and growth roadmap for you. It can be said that it is the most scientific and systematic learning route, and it is no problem for everyone to follow this general direction.

Due to the limited space, only part of the information is displayed, friends, if necessaryA full set of " Introduction to Network Security + Advanced Learning Resource Pack ",needClick on the link belowYou can go to get

CSDN spree: "Hacker & Network Security Introduction & Advanced Learning Resource Pack" free sharing

picture

At the same time, there are supporting videos for each section corresponding to the growth route:

picture
Due to the limited space, only part of the information is displayed, friends, if necessaryA full set of " Introduction to Network Security + Advanced Learning Resource Pack ",needClick on the link belowYou can go to get

CSDN spree: "Hacker & Network Security Introduction & Advanced Learning Resource Pack" free sharing

Video supporting materials & domestic and foreign network security books and documents

Of course, in addition to supporting videos, we also organize various documents and books for you.

picture
picture
All the data is 282G in total , if you need it, friendsA full set of " Introduction to Network Security + Advanced Learning Resource Pack ",needClick on the link belowYou can go to get

CSDN spree: "Hacker & Network Security Introduction & Advanced Learning Resource Pack" free sharing

Guess you like

Origin blog.csdn.net/2301_76168381/article/details/130391399