Teach Yourself Cyber Security (Become a Hacker)

I. Introduction

The name hacker has always been accompanied by the development of the Internet. The first impression given to everyone is that they are cool, skilled, and omnipotent in the online world. At present, almost all companies and even relevant national departments will compete to hire skilled hackers with high salaries as the security guards of Internet organizations, so hackers are also envied by many people.

Hacking technology is a very attractive, valuable, and cool thing, but if you want to accomplish such a charming thing, you either need great luck, or you need to pay inhumanely. s hard work.

2. Definition of hacker

The American (Discovery) magazine gave five definitions of hackers:
1. People who study computer programs and use them to increase their skills
2. People who have infinite interest and enthusiasm for programming
3. People who can program quickly
4. Good at certain An expert in a specialized program, such as a UNIX hacker,5 who maliciously breaks into another person's computer or system with the intent of stealing sensitive information.
The most suitable word for this kind of people is "CRACKER editor: now this vocabulary has been assigned to people who are engaged in cracking (or reverse engineering enthusiasts are more professional), and it is no longer used as a scapegoat for "Hacker". Hacking and cracking have long been Divided into two camps]", not "HACKER". From the above definitions, we can see that three of them mention programming. It can be seen that programming and hackers are inseparable. To become a real hacker, you must learn programming.

For example, recently we often see media reports that a hacker from a certain domestic organization broke through the IE browser within a few seconds and bypassed the XX protection mechanism within a few seconds. But the truth of the matter is that they are actually running a code that they have prepared, and the few seconds mentioned in the media are actually the running time of the code. As far as I know, before they participate in the competition, the whole team needs to go through at least ten or even dozens of sleepless nights for these few seconds of ShowTime, and then they can create a work of art that may only be a few hundred bytes. The code (that is, Exploit) can only be taken to the scene to pass five levels and kill six generals.

3. Stages of becoming a hacker

To become a hacker, you have to go through the following stages:

Level 1 Lengtouqing [millions of people]: Can use security tools, can only scan and decipher passwords

Level 2 system administrators [tens of thousands]: make good use of security tools, especially familiar with systems and networks

Developers of Level 3 major companies or core security companies Da Niu [thousands of people]: very familiar with the operating system, started to develop codes, and wrote their own scanners

Level 4 can find and exploit vulnerabilities [hundreds of people]: who can find vulnerabilities by themselves, find 0DAY by themselves and write Exp to exploit vulnerabilities, and conduct protocol testing for system mining vulnerabilities

Level 5 high level [less than a hundred people]: people who defend and build systems

Level 6 elite level [dozens to a dozen people]: Deep understanding of the operating system

Level 7 Big Niu Niu [Few]: Mark Zuckerberg, Albert Einstein and other people who changed the world

4. Super hacker

This part of the content is still relatively far away for students with zero foundation, so I won’t go into details, and attach the learning route.

 

 If the picture is too large and compressed by the platform, you can’t see it clearly, you can leave a message in the comment area 111 and follow me, and I will share it with you in the background!

Video supporting materials & domestic and foreign network security books, documents & tools

Of course, in addition to supporting videos, various documents, books, materials & tools have been sorted out for you, and they have been classified into categories for you.

Some video tutorials that the author bought by himself, but which are not available on other platforms for free.

SRC&Hacking Technical Documentation

Hacking Tools Collection

If you want to get involved in hacking & network security, the author has prepared a copy for everyone: 282G the most complete network security data package on the entire network for free! Comment 111 or follow me and it will be sent to everyone automatically! After everyone pays attention, just pay attention to the background news~

 epilogue  

Cybersecurity is a critical issue in today's society. With the rapid development of science and technology, the network has penetrated into every aspect of our lives, bringing us great convenience and opportunities. However, there are also various risks and threats in the network, such as hacker attacks, data leakage, etc. Therefore, learning network security knowledge has become a problem that everyone should pay attention to and pay attention to.

Special statement:

This tutorial is purely technical sharing! The purpose of this tutorial is in no way to provide and technical support for those with bad motives! Nor does it assume joint and several liability arising from the misuse of technology! The purpose of this tutorial is to maximize everyone's attention to network security and take corresponding security measures to reduce economic losses caused by network security. ! ! !


 

Guess you like

Origin blog.csdn.net/2301_77732591/article/details/131739371