Hacker self-study route

 When talking about hackers, you may all think of hacking, but this is not necessarily the case; hackers are a group of people who love to study technology. The hacker circle is generally divided into three major circles: the entertainment circle, the technical circle, and the professional circle .

  Entertainment circle: Mainly junior high school students and high school students, who play online dating, popularity, space, and build websites to recruit apprentices to make money. There are also those with high skills, but they are rare.

  Technology circle: Hackers in this circle are for technical geeks who can master hacking skills to the extreme. I admire this group of people the most and hope that I can become such a person in the future.

  Professional circle: The people here mainly play HC. They walk between black and white, and they are the rich ones.

  Okay, back to the topic, this article is mainly about writing a new "hacker technology learning route". Let's take a look at the previous article as a Beta version.

If you want to learn hacking, you need to know the following:

  •   What is a hacker?

  •   Classification of hackers

  •   What do hackers mainly do?

  •   Passion Begins - Hacker Route Learning Plan

  What is a hacker?

  What is a hacker? This question is worth thinking about. Do hackers just play in circles, record tutorials and recruit apprentices for online dating? Make money by building a website and playing with space? Or a bunch of tech geeks? Or are they some groups walking between black and white? These are all worth pondering, but the term hacker existed in Shakespeare's time. The earliest computer was born at the University of Pennsylvania in 1946, while the earliest hackers appeared at MIT and Bell Labs. The first generation of hackers refers to researchers who are good at computer technology. They are keen on challenges, advocate freedom and advocate the sharing of information.

  From the first generation to the present, the development of hackers has gradually divided names. Since the "Sino-US Hacker War" in 1999, the word Honker has gradually come into people's attention. Honker is translated as 红客, which refers to a group of people who are good at hacking and patriotic. The founder of Honker is "Lion". Honker is a spirit; it is a spirit of loving the motherland, adhering to justice, and pioneering and enterprising. As long as you have these spirits, anyone can be a Hongke. Hongke usually uses the technology they have mastered to maintain the security of domestic networks and fight back against external attacks.

Main divisions of hacker names:

  Black hat hacker: A person who hacks into any electronic device of another party without permission is called a black hat hacker, or "black hat" for short.

  White hat hackers: Those who debug and analyze computer systems, and mine and submit vulnerabilities in major Web-based sites and operating systems are called white hat hackers, or "white hats" for short.

  Script kiddies: Script kiddies are mainly people who are good at using hacking tools but cannot program themselves.

  The first generation of hackers: Originally derived from the English hacker, it had a positive connotation in the American computer industry in the early days. They are all highly skilled computer experts, especially programmers, which is a general term.

  Hacker/Breaker: It is the transliteration of "Cracker", which means "cracker". Engaged in malicious cracking of commercial software and malicious intrusion into other people's websites. Similar to hackers, in fact, hackers and hackers are essentially the same, those who break into computer systems/software. There is not a very clear boundary between hackers and "crackers", but as the meanings of the two become increasingly blurred, the public's treatment of the two meanings has become less important.

 

What are hackers mainly doing?

  This is another thought-provoking question. The hacker group was originally a group of people who were keen on studying computer technology. Later, many branches appeared after slowly developing.

Passion Begins - Hacker Route Learning Plan

  PS: In order to nationalize hackers, I created this new article, just to enable novices to collect technology on the Internet.

 the first week:

You need to formally start to understand the basics of computers. The prerequisite is that you are a newbie who has never touched a computer. Computer basics include hardware basics and software basics. The hardware foundation requires understanding the various hardware in the computer, and the software foundation requires proficiency in using the operating system.

  the second week:

When you are proficient in using computers, you can start to understand hackers, such as the professional terms they often use. These professional terms can be collected on the Internet, so I don’t need to post links.

  The third week:

Okay, you have basically mastered some basics, and you can start trying to learn programming languages. In the hacker circle, programming languages ​​​​such as C, Python, Ruby, and Java are more commonly used. Some simple tools are even written in easy language. It takes about a month to learn the basic syntax of a programming language, and programming is a necessary condition for being a hacker.

  Week 8:

You also have a certain foundation in computer programming. You can try to write some small tools or viruses yourself. Of course, it is best to test them yourself; according to Article 62 of the Cybersecurity Law of the People's Republic of China: Carry out network security certification, testing, Risk assessment and other activities, or the release of network security information such as system vulnerabilities, computer viruses, network attacks, network intrusions to the public, the relevant competent authorities shall order corrections and give warnings; those who refuse to make corrections or if the circumstances are serious shall be fined not less than 10,000 yuan and ten thousand yuan. A fine of not more than 10,000 yuan may be imposed, and the relevant competent departments may order the suspension of relevant business, suspension of business for rectification, closure of websites, revocation of relevant business licenses or revocation of business licenses, and the directly responsible person in charge and other directly responsible personnel may be fined not less than 5,000 yuan and 50,000 yuan. A fine of less than RMB 10,000.

  Week 9:

From now on, you have basically met the conditions to be a hacker. Of course, there are only a few. There are many classifications of hacking techniques, and these are just a drop in the ocean. Without further ado, let’s get started. You can already start learning formal hacking techniques; based on Web sites, operating systems, driver security research… and other majors. There is also a hacker technology route learning branch chart on the Internet. I posted it, the road map is 15PB, I am too lazy to write this kind of flow chart.

  Week 10:

You can basically start learning DOS commands and Linux. Learning Linux is also the basic requirement for hackers; then learn the god-level editor-Vim. After that, you can try to get in touch with some operating systems used for penetration testing such as Kali linux, Parrot, Pentestbox, etc. , after you finish learning these, you can barely be considered a little hacker...

super hacker

This part of the content is still relatively far away for students with no basic knowledge, so I will not go into details and attach a learning route.

If the image is too large and compressed by the platform, making it difficult to see clearly.

After following me, the background will automatically send it to everyone! After you follow it, you can just watch the background news!

Video supporting materials & domestic and foreign network security books, documents & tools

Of course, in addition to supporting videos, we have also organized various documents, books and tools for you, and have divided them into categories for you.

Some video tutorials that I bought myself and are not available on other platforms.

SRC&hacker technical documentation

If you want to get into hacking and network security, the author has prepared a copy for you: 282G, the most complete network security information package on the entire network, can be obtained for free! After following me, it will be automatically sent to everyone! After everyone pays attention, just pay attention to the background news~

Conclusion

Cybersecurity is a vital issue in today's society. With the rapid development of technology, the Internet has penetrated into every aspect of our lives, bringing us tremendous convenience and opportunities. However, there are also various risks and threats in the network, such as hacker attacks, data leaks, etc. Therefore, learning network security knowledge has become an issue that everyone should pay attention to and attach importance to.

Special statement:

This tutorial is purely technical sharing! This tutorial is in no way intended to provide technical support to those with ill intentions! We also do not assume any joint liability arising from the misuse of technology! The purpose of this tutorial is to maximize everyone's attention to network security and take corresponding security measures, thereby reducing the economic losses caused by network security. ! ! !

Guess you like

Origin blog.csdn.net/2301_77512689/article/details/132451667