Speed read the original - hacker entry (classification and behavior of hackers)

A classification and behavior of hackers

As I understand it, "hacker" in general should be divided into "positive", "evil" categories, decent off on their own knowledge to help system administrators identify vulnerabilities in the systems and be perfect, but hackers are Xiepai hacker skills through a variety of system attack, invasion or do some other things harmful to the network, because Xiepai hackers do things contrary to the "hacker Code", so they really called "hacker" (Cracker) and not "hackers" (hacker), that is, we usually often hear of "hackers" (Cacker) and "Honker" (hacker). No matter the kind of hackers, their initial learning content will be covered in this section, but also master the basic skills are the same. Even their own future took a different path, but also doing things similar, but the starting point of just not the same purpose. Many people have asked me: "What do hackers usually have to do is not very exciting??" It was also understood that the hackers "do boring and repetitive things every day." Which is actually a misconception, hackers usually requires a lot of time to learn, I do not know that this process has no end, just know that "the more the better." Because learning is completely black out of a hobby, so it does not matter "boring"; repetition is inevitable, because "practice makes perfect", only through constant contact, practice, it may be their own experience some can be felt, unspeakable experience. In more than learning, passengers should use their own knowledge to practice, either hacker made out of things, not fundamental purpose is to master the content of their learning in practice. Hackers behavior are the following:

First, the learning techniques : Once the new technology of the Internet, a hacker must learn immediately, and to master the technology in the shortest time, here's palm is not generally understood, but read about the "agreement" (rfc), in-depth understanding of the mechanism of this technology, or if stop learning, then rely on his former master the content, and can not maintain his' hacker identity "for over a year. Black primary knowledge to learn is difficult, because they have no foundation, so the learning curve to be in contact with a lot of basic content to the reader, however today's Internet has brought a lot of information, which requires primary learners to choose: too deep the content will be able to bring learning difficulties; content too "fancy" another useless to learn hacking. So beginners can not do too much, which try to find a book and complete their teaching, learning step by step.

Second, disguise themselves : a hacker's actions are logged off the server, a hacker must disguise themselves so that the other party can not identify his true identity, which requires sophisticated techniques used to disguise its own IP address, use springboard to evade tracking, recording disrupt cleanup other clues, open clever firewall. Camouflage is a very strong basic skills needed to achieve, which is for beginners as the "culmination world", and that is impossible for beginners to learn to disguise a short time, so I do not encourage beginners to learn to use their knowledge to attack the network, or if his deeds brought to light, the ultimate victims are victims of their own. If there is to be positive towards a hacker, I also do not agree that you attack the network, after all, the hacker's growth is a learning, rather than a crime.

Third, identify vulnerabilities : vulnerabilities for hackers is the most important information, hackers should always study the vulnerability of others found themselves trying to find unknown vulnerabilities, and find valuable vulnerabilities can be exploited to test from the mass of vulnerabilities, when their ultimate goal is the destruction by this vulnerability or vulnerabilities on patch. Hackers persistent in finding vulnerabilities are ordinary people with imagination, their slogan says "Breaking authority" hacker from practice again and again, the hackers also used his move to implement the world confirms this - not "the world does not exist programs hole. " In the eyes of hackers, called "seamless garment" but is "not found" only.

Fourth, the exploit : for decent hackers, vulnerabilities to be repaired; in Xiepai hackers, use a loophole to carry out his destruction. And their basic premise is to "exploit", hackers exploit to do the following things:

  1. Obtain system information: Some system information leak vulnerability can expose sensitive data, thereby further intrusion system;
  2. Intrusion system: By entering the loopholes within the system, or to obtain internal information on a server, or a server in charge of the whole;
  3. Find the next target: a victory means appear next target of hackers with the server should be fully in charge of their own has been used as a tool to find and under a system intrusion;
  4. Do something good: decent hacker after completion of the above work, or bug fixes will notify the system administrator, to do something to maintain network security; and do some bad things: Xiepai hackers after the completion of the above work, will determine whether the server there is value in use. If the value is useful, they'll implant Trojan or backdoor on the server, the next easy time here; and for no value of SERVER them no mercy, system crashes will make them feel infinite pleasure!
Released 1106 original articles · won praise 928 · views 60000 +

Guess you like

Origin blog.csdn.net/weixin_42528266/article/details/104014485