Hacker study guide notes (from entry to mastery of network security)

1. Are all hackers criminals?

Let me clarify to everyone that the hackers in the past were indeed lawbreakers who walked in the gray and black industry, but now they are different. They are high-tech talents who are proficient in network security penetration technology. Hackers are gradually becoming good, but mastering a hacking technique is also essential for those who do programming

2. Why do you want to learn hacking?

National policy supports cybersecurity! Network security has become more and more important to the country and to the enterprise

Network information space security has become the fourth largest battlefield after sea, land and air. In addition to the game between countries, there are also obvious competitions between domestic enterprises and enterprises. 

Network security hacking technology is one of the capabilities that both countries and enterprises are paying more and more attention to.

3. How to become a hacker?

A. First of all, your technical ability must meet the standard

The following is a brief summary after I learned how to become a hacker, you can follow the steps below to learn

1. First thing you should learn how to program, I suggest to learn python first, then java.

2. (Not required) Next, it is helpful to learn some algorithms and data structures, which will help you program better.

3. Once you learn how to program, you should learn how to program in c. Focus on the following topics:

structure

Arithmetic operations on pointers

call by value and call by reference

String IO Basics

macro

conditional compilation

program structure

4. Learn the basics of the UNIX operating system:

Unix shells

shell variables

File system

Common Unix commands

Shell scripting

Unix shell environment

5. (Optional) Learn assembly language. Understand how assembly language is converted into machine code and then into a program that can be executed by computer hardware. And you should learn how to analyze assembler, it's useful for reverse engineering.

6. Understand computer operating system and architecture

process management

memory management

File system interface and implementation

IO system, distributed system

computer network

java network programming

Protection and Safety

Understanding Sysadmins

Basic composition of computer system

major computer components

structure has a macroscopic understanding

Process management: processes, threads, process synchronization, CPU scheduling, java multi-threaded programming, and deadlocks. Memory management: main memory and virtual memory.

Experience different operating systems such as win unix linux command line and GUI mode.

7. (Not required) Learning cryptography is also very useful, and mathematics in cryptography is very useful.

traditional symmetric key

modern symmetric key

RSA

digital signature etc.

Application Layer Security

PGP

S/MIME

8. Understand computer network and Internet

Application layer: Web, HTTP, FTP, DNS and socket communication

Transport layer: UDP, TCP, and congestion control, etc.

There are also some other good topics: Network Administration

                                WireShark network traffic analysis

                                Penetration Testing and Network Security

                                In-Depth Computer and Network Forensics

                                Vulnerability and malware analysis

                                Low-level protocol packet analysis

9. Understand software engineering. Understand the phases of software development, including requirements, documentation, design, coding, testing, and maintenance, and the strengths and weaknesses of software development models.

I have also planned the complete entry learning route

High-res pdf is required—follow the auto-send

There are also supporting resources for the above-mentioned various knowledge points (pay attention to automatic sending)

 

 B. The actual combat ability has to be improved

In addition to academics, after learning the theory and some skills, it is very necessary to practice in actual combat:

take part in capture the flag

Participate in security meetings with a certain basis

Frequently Visit Safe Sites

try to dig holes

Try to build your own website

wait

Four, finally

The process of becoming a hacker is not easy

When you want to become a hacker or a penetration testing expert, these technical points are absolutely necessary. Behind the glamorous success is sweating and studying hard day and night!

Guess you like

Origin blog.csdn.net/dexi1113/article/details/131831420