- 3

Hacking guide.

Okay, so first of all you are doing this on your own and im not responsible for any damage you cause, this is only for educational purposes. If u want to become a hacker u have to think like a hacker. So first you need to know what is your hacking goal, to hack NASA or to have a job where you will be pen tester. Second thing to get started I to read a lot of books and learn simple languag like python, then learn SQL and in combination of two of them you will make progress and you will understand better.

14th Jan 2017, 2:02 PM
Aleksa Rajic
6 Réponses
0
Also what you need is to install kali linux and work in that OS because windows is not made for things like that. I hope this will help you and introduce you in hacking a little, feel free to ask questions :)
14th Jan 2017, 2:03 PM
Aleksa Rajic
0
This is incredibly broad and doesn't address the needed knowledge for CompSecurity.
14th Jan 2017, 2:49 PM
Louis Milotte
Louis Milotte - avatar
0
And become a fan of Mr Robot TV series and watch it daily
14th Jan 2017, 2:54 PM
Ariel Cani
Ariel Cani - avatar
0
@Aleksa Rajic This Topic was completely unnecessary. And you have not specified whether you would want the reader to be a White-Top-Hat Hacker, Grey-Top-Hot Hacker or a Black-Top-Hat Hacker. Basically the Good-Side or the Evil-Side. Additionally, this is unrelated to Programming Questions!
14th Jan 2017, 3:05 PM
ghostwalker13
ghostwalker13 - avatar
0
@Ghostwalker13 Hacking can be related to programming, being able to understand how computers and applications function is how hacking happens. i.e., breaking into a windows os requires knowing which applications are vulnerable at which stage of the boot sequence, and why. Network intrusion requires understanding as to which languages a networking component uses to function and how to navigate its firmware to intrude. Declaring the purpose of a tutorial is irrelevant. As to whether or not the target audience is would-be criminals or ethical hackers. The skills described on any discussion regarding cybersecurity are used by both, the defining factor is down to morality; which cannot be gauged without admitting to intent. -Source: I'm CompTia S+ pending certification, taking CEH and CISSP exams. Also, LAMP stack dev for 6 years.
14th Jan 2017, 3:31 PM
Louis Milotte
Louis Milotte - avatar