Hacking

1. Learn technology

Once a new technology appears on the Internet, the hacker must immediately learn and master the technology in the shortest possible time, and the mastery here is not a general understanding, but reading the relevant "protocol" (RFC) and in-depth understanding of the mechanism of this technology, otherwise once he stops learning, then relying on what he has mastered before, he cannot maintain his "hacker identity" for more than a year.

It is more difficult for beginner hackers to learn the knowledge because they have no foundation, so they need to be exposed to a lot of basic content to learn, but today's Internet brings a lot of information to readers, which requires beginner learners to choose: too deep content may bring difficulties to learning; Content that is too "fancy" is again useless for learning hacking. Therefore, beginners should not be greedy, they should try to find a book and their own complete textbook, and learn step by step.

2. Disguise yourself

Every move of the hacker will be recorded by the server, so the hacker must disguise himself so that the other party cannot identify his real identity, which requires skilled skills to disguise his IP address, use a springboard to evade tracking, clean up the record, disrupt the other party's clues, cleverly avoid firewalls, etc.

Camouflage requires very strong basic skills to achieve, which is a "great realm" for beginners, that is to say, it is impossible for beginners to learn camouflage in a short time, so I do not encourage beginners to use the knowledge they have learned to attack the network, otherwise once their deeds are revealed, the ultimate harm is themselves.

If you become a real hacker one day, I don't approve of you attacking the network, after all, the growth of hackers is a learning, not a crime.

3. Discover vulnerabilities

Vulnerabilities are the most important information for hackers, hackers should always learn from the vulnerabilities found by others, and strive to find unknown vulnerabilities by themselves, and find valuable and exploitable vulnerabilities from the massive vulnerabilities for experimentation, of course, their ultimate goal is to destroy or patch the vulnerabilities through the vulnerabilities.

Hackers' dedication to finding vulnerabilities is unimaginable to ordinary people, and their slogan says "break authority." From the practice of hacking again and again, hackers have also confirmed this to the world with their actual actions -- there is no program in the world that "does not have loopholes". In the eyes of hackers, the so-called "seamless" is nothing more than "not found".

4. Exploiting vulnerabilities

For decent hackers, vulnerabilities need to be patched; For cult hackers, vulnerabilities are meant to be used for sabotage. And their basic premise is "exploitation", and hackers can do the following by exploiting vulnerabilities:

1. Obtain system information: Some vulnerabilities can leak system information and expose sensitive data, thereby further invading the system

2. Intrusion into the system: Gain access to the system through vulnerabilities, or obtain internal information on the server, or take full control of the server

3. Find the next target: One victory means the next target, and hackers should make full use of the server they already control as a tool to find and hack the next system

4. Do something good: After a decent hacker has done the above work, they will fix the vulnerability or notify the system administrator to do something to maintain the network

5. Do some bad things: After completing the above work, the evil hacker will judge whether the server is still useful. If there is a use value, they will plant a Trojan or backdoor on the server to facilitate the next visit; And they will not show mercy to servers that have no use value, and the system crash will make them feel infinite pleasure

Edit this paragraph for beginner techniques

Cybersecurity, by its very nature, is information security on the network. Broadly speaking, all related technologies and theories related to the confidentiality, integrity, availability, authenticity and controllability of information on the network are the research fields of network security. Ensuring the information security of the network system is the goal of network security, and information security includes two aspects: the security of information storage and the security of information transmission. The storage security of information refers to the security of information in a static storage state, such as whether it will be called without authorization. The security of information transmission refers to the security of information during dynamic transmission. In order to ensure the security of network information transmission, there are the following issues:

(1) Interception of information on the network;

(2) counterfeiting of the user's identity;

(3) tampering with information on the network;

(4) deny the information sent;

(5) Resend information.