[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

how vital is an understanding of basic code languages; C, C++,

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 8
Thread images: 1

File: 1454827947251.jpg (861KB, 1700x1000px) Image search: [Google]
1454827947251.jpg
861KB, 1700x1000px
how vital is an understanding of basic code languages; C, C++, Js, etc. if one were to learn the basic premise of h4cking?
>>
It's not. Learn PHP and SQL for hacking.
>>
thankyou.
>>
>>54865196
>if one were to learn the basic premise of h4cking?
>the basic premise of h4cking

Find vulnerability in code/protocol/logic -> exploit vulnerability -> plant backdoor

basic premise of hacking explained with 0 understanding of programming.

If you want to learn about exploit development and it depends on your goal platform (Processes, databases, web applications, etc) but you should understand how memory allocation works, the stack, pointers, program control at the assembler level, user input validation (especially pitfalls/caveats of common input validation techniques) in popular languages for your platform, and platform-specific info (eg, XSS for web exploits, SQLi for database exploits, buffer overflows and return-oriented programming for C/C++/similar exploits, command injection for applications that pass information to a shell (common enough in web apps)).

Additionally, understand the security practices put in place by the operating systems you're attempting to hack, eg how user privileges are handled, cracking passwords, known attacks (pass-the-hash, privilege escalation exploits), and kernel-levei protections (ASLR, W^X, etc) and their pitfalls.

Learn how to use a unix command line because many tools require it and shell scripting is a godsend.
>>
>>54865213
>SQL for hack.
Yeah better change some names in a database about adresses muh nigga
>>
>>54866377
Or inject you fewl
>>
>>54866341
thankyou.
>>
>c++ for hacking

learn assembly faggot
Thread posts: 8
Thread images: 1


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

If you need a post removed click on it's [Report] button and follow the instruction.
If you like this website please support us by donating with Bitcoin at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties. Posts and uploaded images are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that website. If you need information about a Poster - contact 4chan. This project is not affiliated in any way with 4chan.