Jump to content
nepali_dude

Tips to be a hacker or security Master

Recommended Posts

This Tutorial for Newbies was created by Mixfever.

Content and Info from Xrak, Mixfever, PhreakerD7 ,

-------------------------

**Contents**

- Tips to becoming a hacker or Wanting to work with computers and Security

- Stuff you may want to think about and learn

- Before learning anything else

- Should also think about getting some of these on your box (for learning )

- A few good books to check out

- computer and Internet Terms (Small list)

- Links, Links & more Links / Other places to Hang out

- Tips from the Pro's

---------------------------------------------------------------------

-=-Tips to becoming a hacker or wanting to work with computers and security-=-

First thing most people will tell you is to use google ( www.google.com ). All ways use google before asking a question, Most the time google will answer your question within a few minutes. Also useing google will save you and me some time & also save space on This site or any site for other people to post questions they did not find on google.

 

Also Read as many books as you can. Run to your local bookstore pick up a book look at it and see if you like the info it gives you. Make sertain it's a book you can read and understand. A book for a newbie is perfect if your first starting out. There is always going to be something to learn about computers & Technology Since every day something new comes out and also there is the past to learn about.

---------------------------------------------------------------------

-=-Stuff you may want to think about and learn-=-

 

- A programming Languge (C, C++, Perl)

- TCP/IP

- Networking

- Unix based computers (linux, BSD, Solaris,)

- Learn as much as you can about windows also

- It might help to learn Social Engineering

- Just learn how a computer works and runs and the parts inside that make it work

 

here is a link to the above stuff I told you to learn. This link may help you learn about the above info http://www.jinx.com/forum/topic.asp?TOPIC_ID=5359 , http://www.comms.scitech.susx.ac.uk/fft/

 

Always learn new things and test what you learn with computers it's trial and error. Don't ever give up if you don't get something working the first time.

--------------------------------------------------------------------

-=-Before learning anything else:-=-

1. Learn about hardware - basicly how your computer works.

 

2. Learn about different types of software.

 

3. Learn your command line.

 

4. Learn how to make a few batch files.

- http://www.tnd.com/camosun/elex130/dosbatchtutor1.html

- http://www.tnd.com/camosun/elex130/dosbatchtutor2.html

 

5. Port scanning. ( download blues port scanner if it's your first time)

- http://www.securityconfig.com/software/spe...rt_scanner.html

 

6. Learn a few programming/markup languages

HTML,C/C++,Perl.... (i'd recommend learning Qbasic as your first lang)

 

7. How to secure yourself (proxy etc)

 

8. FTP and telnet

 

9. Your protocols TCP/IP , UDP , SMTP etc

 

10. Get your hands dirty with networking

---------------------------------------------------------------------

-=-Should also think about getting some of these on your box (for learning )-=-

An FTP client.

- http://www.download.com/Fastream-NetFile-F...tml?tag=lst-0-3

- http://www.download.com/SmartFTP/3000-2160...tml?tag=lst-0-1

- http://www.download.com/AceFTP/3000-2160_4...tml?tag=lst-0-5

 

A ping utility.

- http://www.download.com/vPing/3000-2155_4-...tml?tag=lst-0-3

- http://www.download.com/Inspyder-Sonar/300...tml?tag=lst-0-9

 

An IP scanner (also known as subnet scanner)

- http://www.download.com/NetworkActiv-Scann...tml?tag=lst-0-2

 

A port scanner.

- http://www.download.com/Advanced-Port-Scan...tml?tag=lst-0-1

- http://www.securityconfig.com/software/spe...rt_scanner.html

 

A whois and nslookup utility.

- http://www.itoolpad.com

-

A traceroute utility.

- http://www.oxid.it/cain.html

-

A password cracker.

- http://www.oxid.it/cain.html

-

A CGI vulnerability scanner

-

-

A Net BIOS share scanner.

-

-

A finger client.

-

-

Compilers.

- http://www.programmersheaven.com/zone24/cat351/

-

Cache rippers.

-

-

A brute force program of some sort.

- http://www.hoobie.net/brutus/brutus-download.html

-

Trojans, rootkits, and RAT's. (just for learning though)

-

-

Sniffers.

- http://www.oxid.it/cain.html

-

* Note * I'll add more links when I have time. *

---------------------------------------------------------------------

-=- A few good books to check out -=-

We tell you to check out books but we don't give any hints or ideas of what kind of books. Well I'll name a few books thatmay be of help to you.

 

- Hacking Exposed: Network Security Secrets and Solutions, Fourth Edition ISBN: 0072227427

 

- Google Hacks ISBN: 0596008570

 

- Hacking: The Art of Exploitation ISBN: 1593270070

 

- The Art of Deception: Controlling the Human Element of Security ISBN: 076454280X

 

- Dictionary of computer and Internet Terms (Eighth Edition) ISBN: 0764121669

 

- Gray Hat Hacking: The Ethical Hacker's Handbook ISBN: 0072257091

 

- Computer Security: Art and Science ISBN: 0201440997

 

- Networking in Easy Steps (In Easy Steps Series) ISBN: 0760753628

---------------------------------------------------------------------

-=-computer and Internet Terms (Small list)-=-

 

boot disk - A disk, diskette, or CD that can be used to BOOT (start up) a computer

 

IP address - A computers unique "address" Every computer has one. This address is the way people that aren't on your computer see you as. Without an IP, websites wouldn't be able to "Remember" you so you don't have to log in everytime. Everyones local ip address is 127.0.0.1. This is how your computer looks at you. But it's not the same as your "Real" IP address which is how everybody else sees you. Quick example of an IP address:

198.3.45.236

There are 4 "subnets" and none of these "subnets" can be over 255.

 

MAC address - This address is also for your computer. HOWEVER, this address was given to you by your hardware manufacturer. This is NOT the same as your IP address

 

Skiddie (Script-Kiddie) - Someone that uses others programs with no intent to use or even try to make his own. Real hackers try and make their own programs and use others for examples or for when theres no point in writing a new one

 

Cracker - Someone that cracks computers for malicious reasons. Whether it be black mailing, carding obtained card numbers, or just ****ing someone over.

 

sniffer - A hardware device or computer program for intercepting data packets as they pass throught a network either to test the network or to intercept other people's confidential data.

 

Trojan horse (Trojan) - a computer program with a hidden destructive function, such as erasing the disks on a specified date. Trojan horses are often distributed as conterfeit "new" versions of shareware products.

 

password cracker - is an application program that is used to identify an unknown or forgotten password to a computer or network resources. It can also be used to help a human cracker obtain unauthorized access to resources.

 

Compilers - Special programs that take instructions written in a high level language (e.g., Pascal, Fortran) and convert it into machine language or code the computer can understand.

Also called: Optimizing Compilers

 

FTP - ( File Transfer protocol ) a standard way of trasferring files from one computer to another on the Internet and on other TCP/IP networks..

 

google - a widely used search engine for the world wide web, accessible at www.google.com and throught links on many other web sites.

---------------------------------------------------------------------

-=Links, Links & more Links=-

Other Places to Hang out

 

- http://www.hackthissite.org

Hack this site is a very good War game site and training ground that is legal for hackers today.

 

- http://www.binrev.com

Binrev has a very nice Radio station with computer info and hacking tips, They also have a nice forum with nice members who love to help and show what they know. And also they have a hacking magazine

 

- http://www.2600.com

A great Hacking magazine that comes out Quarterly (Price= $5.99)

 

- http://www.blacklisted411.com

Another Hacking Magazine

 

- http://www.astalavista.com/

A great computer Security Area with lots of info

 

- http://www.hackerthreads.org

There a hacking forum with lots of members and lots of info

 

- http://www.hackaday.com

A kind of hacking Blog were they give you links and share info on what they find that day. Updated Daily!

 

- http://www.i-hacked.com

A good site with forums, Downloads, News, and much much more.

 

- http://www.phreaksandgeeks.com

The name says it for ya

 

- http://www.hnc3k.com/

Hacking Programs to download, Guides and Tips, and much more.

 

- http://www.informationleak.net

 

- http://www.digzine.com/

 

- http://www.blackhat.info/live/index.php?na...7&theme=Printer

 

- http://www.jinx.com

 

- http://www.irongeek.com

 

I don't have all day to add every single site there is ( I probly would not be able to find all of them ). But I do have one great link that goes to a sticky that a member from jinx who made a great list of sites that will help you and anyone out. http://www.jinx.com/forum/topic.asp?TOPIC_ID=5363

---------------------------------------------------------------------

-=- Tips from the Pro's -=-

From: XraK

 

Learn from my mistakes. Before beginning your programming journey you need to have have a basic understanding of programming...

 

1. Pseudocode.

2. Algorithms.

3. Flow charts.

3. Constants, Variables, operators.

4. Expressions.

5. Statements, Statement blocks, Modules etc...

6. Binary, Hex

7. The fundamentals of a compiler.

8. What an interpreted language is.

9. What OOP is.

10. What an array is.

11. What an object is.

12. Data structure.

13. ASCII (for character codes I use - http://www.lookuptables.com/)

14. What ANSI is all about.

 

I advise you to go to - http://en.wikipedia.org/wiki/Main_Page - use this site for definitions and whatever. Or do what I often do for definitions - http://www.google.co.uk/search?hl=en&q=define%3A&meta=

Share this post


Link to post
Share on other sites

Hey!

i know everything you have mentioned there like freebsd unix, tcp/ip, social engering, ccna , c,portsacn,tcpdump.. i did my bachelor in network design and security.However i don;t know how to hack...its not just so easy read a book and then booom...hack.. LOL

Share this post


Link to post
Share on other sites

Cade Hunter from Costa Mesa was looking for introduction brotherhood essay

Gunner Pearce found the answer to a search query introduction brotherhood essay


ESSAYERUDITE.COM


500x500.jpg


introduction brotherhood essay










research paper of sealing work of the holy spirit
esl scholarship essay ghostwriting services for college
thesis proposal capital structure
pay to write custom reflective essay on founding fathers
helen keller book report form
resume examples for office managers
top resume writer websites au
esl critical thinking ghostwriting sites for college
clinical forgiveness research proposal
esl dissertation conclusion writers websites for mba
order u.s. history and government essay
help writing critical essay on hillary clinton
esl dissertation abstract editing service uk
spoken english and broken english essay
sample literature review research paper pdf
what to write on a resume
animal crossing letters how to write letter
professional thesis proposal editing website for mba
essay scholarships canada 2018
professional case study proofreading website for masters
sample resume ranch administration
my future dream job essay
free essay on politics in india
statistics coursework advice
usajobs keywords resume
child development coursework child study
freedom choice essay
help with my composition dissertation methodology
esl dissertation proposal editor service online
help writing popular descriptive essay on hillary
security officer resume objective samples
professional book review editor website online
resume escadrille 80 wikipedia
how to write hymns
essay on life lessons
custom essay ghostwriters site online
pay for dissertation hypothesis online
best business plan writing websites us
planning assistant resume sample
help with best descriptive essay on trump
culture essay mexican
essay on the importance of the chain of command
essay on ignorance is blessing
key text resume
child rights india essay
definition essay ghostwriting services gb
topics for thesis in public policy
esl critical essay editor for hire au
how to write a negative letter
apple pages resume samples
literature review of research proposal examples
good attention grabbers persuasive essays
best movie review writer site for phd
sap ifrs resume
business plan for cooperatives
custom dissertation conclusion ghostwriting for hire online
cheap resume editing site for college
essays on movie love scenes
www dissertation
how to write topic
esl critical analysis essay writer service online
sample business plan computer repair shop
how to write a short paper in apa format
top content editor service for university
academic essay ghostwriter for hire
popular scholarship essay proofreading sites for mba
resume for database developer
free online sales resume samples
resume education part
best phd essay proofreading sites for university
how to show reference on resume
best ghostwriter services online
an example of a good essay introduction
example of a proposal for a literature review
can someone do my assignment for me
european exploration new world essay
apa style research paper sample 2012
best speech editing website for mba
book report about theodore roosevelt
correct apa citation format for journal article
dissertation community trust
cheap rhetorical analysis essay editor site for school
custom homework proofreading services ca
aptitudes para un resume de trabajo
content ghostwriters sites ca
ibps po mains 2017 question paper bankers adda
thesis writing guide engineering
best definition essay proofreading site gb
do my speech report
pay to do custom analysis essay on hillary clinton
homework quotes tumblr
how to write iterator java
figures in research papers
king movie novel paper stephen term vs
nsf doctoral dissertation improvement sociology
help writing scholarship essay on hacking
topics for admission essay
military punctuality essays
essay on the true art of playing
great biographical essay
resume for kitchen helper sample
cover letter chemist examples
help with my professional speech online
format of resume of marketing manager
resume key skill areas
how to write a descriptve essay
american romances essays
essay of e mail
1945 vannevar bush essay
good religion topics for essays
dissertation hypothesis ghostwriter site usa
example of an apa style paper
masters thesis paper
jobs in writing
writing an abstract in apa format
frankenstien research papers
homework asignment
top dissertation conclusion editing site usa
ap biology plasmid essay
a great sale cover letter examples
custom blog ghostwriter sites online
best thesis proposal proofreading websites online
cheap speech writing websites for mba
anna quindlen essay
resume united nations

economics essay proofreading sites
how to write a song title
rhetorical analysis of advertisement essay
number stairs maths coursework
marrakech is a short essay written by george orwell
short essay scholarships 2014
body communication context essay kinesics motion

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.