Find your job hacker idol

Find your idol hackers

Hacker spirit
"hacker spirit Hacker, this term is used to describe people who are keen to solve problems, overcome the limitations of any profession can become a hacker. You can be a hacker carpenter. Is not necessarily high-tech, as long as the relevant skills and enamored focus on what you're doing, you'll be a hacker. "----- quote from" hacker Ethic and the spirit of the information age. "

Famous Hackers

foreign

Kevin Mitnick first wanted the FBI hacker. In 2002, for the once notorious computer hacker Kevin Mitnick, Christmas came early. This year, really happy Kevin Mitnick year. Not only get a complete freedom (from free to the Internet, can not access for the hacker, it is another kind of prison life). The 15-year-old he could hack into the Pentagon and the US within the host computer, steal confidential information, it was first included in the FBI reward for the capture of hackers. His superb technique can freely control computer system, continue to evade police. As he continues to conduct cybercrime, network security personnel very disgusted with his presence, he also handed declared: "We are the master of the world." His behavior is derived from interest and love, not from other angles, keen to solve problems, overcome limitations. I saw in him a fanatical love of a thing, and the constant pursuit of technological progress, the driving force behind all this is the love of hacking.

domestic

Guo Shenghua, in the world, he had three big move. The first is a national system to overcome Ukraine, and the second is the destruction of the terrorist organization's website, and the third is to stop Japan's whale swept action. It is because of the third act, the Japanese swept whale was forced to stop for a few months, the Japanese government has aroused strong dissatisfaction, limiting Guo Shenghua entry. I also saw in him a love of technology and the pursuit of the unknown unknown curiosity and the courage to challenge the intervention.


What tools need to know

Read the know Chong Yu developed the skills table V3.0 , SecTools.Org . I think we should want to master the following tools:
1.Wireshark
2.Metasploit
3.Aircrack
4.Snort
5.XSSEE 3.0 Beta
6.Burp Suite
7.Nmap
8.sqlmap
9.Hydra

Four years of study plan

1. understand the various technical terms, understand their role.
2. master the necessary skills, and learn to skillfully use a variety of essential tools.
3. have combat capability.

Guess you like

Origin www.cnblogs.com/lxy2019/p/11730315.html