[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

Hacking

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 107
Thread images: 14

File: hacking.gif (9KB, 600x400px) Image search: [Google]
hacking.gif
9KB, 600x400px
Im interested in learning how to hack but I have no damn clue on how to start. Can any of you tell me how I can start self teaching myself to hack? It can be from books to online videos or courses. it doesn't matter I just want to learn.
>>
>>59467780
Learn C.

Read (and understand) "Smashing the Stack for Fun and Profit".

Start reading through open source code looking for holes.
>>
File: 0216.jpg (121KB, 333x500px) Image search: [Google]
0216.jpg
121KB, 333x500px
>>59467780
>I'm interested in learning

Welcome newfag!
>>
File: timthumb.jpg (234KB, 600x686px) Image search: [Google]
timthumb.jpg
234KB, 600x686px
>>59467780
Grey Hat Python is a quick and learningful read.
>>
>>59467780
Look me up on IRC. I never reveal my secrets on the normie-web.
>>
>>59467868
Nu-uh! IRC is full of traps.
>>
>>59467780
Well for starters I can tell you that you shouldn't come to 4chan for actually learning things. I only come here for entertainment
>>
File: 1488509211974.jpg (42KB, 898x886px) Image search: [Google]
1488509211974.jpg
42KB, 898x886px
>>59467780

Hacking_The_Art_of_Exploitation_2nd_Edition_Jon_Erickson.pdf

Via Google.
>>
>>59467780
overthewire.org/wargames
>>
>>59467852
and teaches you jackshit
>>
>>59467920
Yes, indeed it is.
>>
>>59467975
this is useless
>>
Math (at least Calc I) and logic (at least First Order Logic).

If you don't like that prospect give up now.
>>
>>59467780
Vulnhub, download broken / insecure systems, learn by practice and CTF, hackathons, etc.

learn general tools like nmap
>>
>>59468003
Why is it useless you faggot trap cocksucker
>>
>>59468021
because it's for gay fags and he's asking how to learn, not how to do retarded shit
>>
Learning:
http://www.securitytube.net/
http://cybrary.it//
http://null-byte.wonderhowto.com/how-to/
http://n0where.net/
http://www.offensive-security.com/metasploit-unleashed
http://www.exploit-db.com/
https://siph0n.net/
http://www.cvedetails.com/
http://resources.infosecinstitute.com/
http://www.windowsecurity.com/articles-tutorials/
http://www.securitysift.com/
http://www.sans.org/reading-room/
http://packetstormsecurity.com/files/
https://www.corelan.be/index.php/articles/
http://routerpwn.com/
http://opensecuritytraining.info/Training.html
https://www.blackhat.com/html/archives.html
http://magazine.hitb.org/hitb-magazine.html

News/CVE releases:
https://threatpost.com/
http://www.deepdotweb.com/
https://packetstormsecurity.com/
http://www.cvedetails.com/

Wargames:
http://overthewire.org/wargames/
https://www.pentesterlab.com/
http://www.itsecgames.com/
https://exploit-exercises.com/
http://www.enigmagroup.org/
http://smashthestack.org/
http://3564020356.org/
http://www.hackthissite.org/
http://www.hackertest.net/
http://0x0539.net/

Distros:
https://www.kali.org/
http://sourceforge.net/projects/metasploitable/
https://tails.boum.org/
http://ophcrack.sourceforge.net/
https://n0where.net/blackarch-linux/
http://seanux.net/index/en
http://sourceforge.net/p/attackvector/wiki/Home/
>>
>>59468021
>owasp top 10
>reverse engineering
>common exploit techniques
>useless

You're a fucking mess anon, get your life together
>>
>>59468101
>dude just start reverse engineering and do web app penetration testing without learning anything.

Well done normie. Excellent advice.

Sorry not everyone is as smart as you to know everythin gof fthe bat.
>>
>>59468057
You should really add "Advent of Code" to that list.
>>
>>59468167
That's why it's so good. It forces you to learn that stuff to complete the levels. You get practical relevant practice instead of simply reading a book.
>>
Lets all love lain
>>
>>59468223
>Dude just start using IDA pro right off the bat

Thank you so much normie.

Do you honestly think advice is useful for someone seeking help on /g/?
>>
What's the point? Of becoming a hacker I mean.
>>
>>59468365
>IDAPro

Use a man's disassembler

>radare masterrace
>>
>>59468210
>"lol xD coding puzzles" with hacking tutorials and material for learning hacking
>shill for me plzzzz
no
>>
>>59468446
>radare
Is it that good? I've been desperate to find something on par with Ida Pro, but I refuse to pay the ridiculous price.
>>
>>59467920
This is true if anything
>>
File: 1487965334358.png (141KB, 400x300px) Image search: [Google]
1487965334358.png
141KB, 400x300px
>>59468421
Becoming a cyber criminal and making fat stacks
>>
>>59468526
don't need to learn anything for that

Just pay multiple Boris's and Dimitry's to do it all for you
>>
>>59468494
It has all, well most, of the functionality but in a terminal application.

>sudo apt-get install r2

It's a pretty steep learning curve but there's several tutorials around
>>
>>59468526
Don't drop the soap.
>>
>>59468526
So basically a hacker is the equivalent of a griefer. Someone who finds enjoyment in the misery they cause others.
>>
>>59468226
knights are real, and they are really good hackers
see you on waiyado my dude
>>
>>59468606
>griefer
go back to playing minecraft you child
it's called "sadist"
>>
File: Bill_Gosper_2006.jpg (206KB, 849x959px) Image search: [Google]
Bill_Gosper_2006.jpg
206KB, 849x959px
>>59468606
Don't call them hackers, they're crackers: http://www.catb.org/jargon/html/crackers.html
>>
>>59468648
Ah, the worst kind of griefer.
>I did it for your sake, anon. You needed this.
>>
>>59468606
Gee willy wowzers, do you mean to tell me that PEOPLE sometimes DO BAD THINGS In order to GET MONEY?

I don't believe it. You're trying to tell me that there are some people with little morals who don't mind exploiting others? No. No. Tell me it isn't so.
>>
>>59468703
>what is government?
>>
>>59468454
.t underage faggot
>>
>>59468648
IN YOUR DREAMS, BUD.
>>
>>59468568
Sank you, if you're still around.
>>
>>59468008
>Math (at least Calc I) and logic (at least First Order Logic).
pffft
>>
>>59467994
I too like mr robot
>>
>>59469474
Predicate logic, hell, even first order logic are very fucking important.
>>
How do i stop being a skiddie?
>>
File: Anonymous_mom.gif (2MB, 330x204px) Image search: [Google]
Anonymous_mom.gif
2MB, 330x204px
>>59470591
>Install Kali
>set terminal font color to green
>get black hoodie
>Use wine too run vb guis
>hack planet
>>
>>59467780
install gentoo
>>
>>59470721
I'm doing it the cool /g/ kid way.

I downloaded kali (probably should've went with blackhat, though), put up a Lain wallpaper and an ascii of Lain on my terminal. Now i just need to find a way to keep superfluous information of my computer on my desktop at all times.
>>
>>59467780
Learn the C programming language. It's the most useful general purpose programming language. The internet is a fucking meme. Learn all about PC hardware and how it works. Lean how a CPU works, what RAM does, and the various kinds of RAM. Learn about how computers boot up. Start with the BIOS and work your way to the OS. Install Funtoo or whatever.

Learn C in 24 hours: http://aelinik.free.fr/c/index.html
>>
>>59470591
Make your own programs.
>>
With this you can hack pentago. Erase the mensagem after read.
>>
>>59471008
Why? If you can more efficiently use someone elses'?

There's leaked sourcecode for malware that you will NEVER out-code yourself. It's easier to just modify it instead.
>>
>>59470862
>superfluous information about my computer on my desktop

Look into conky
>>
File: debian.png (81KB, 1028x1270px) Image search: [Google]
debian.png
81KB, 1028x1270px
>>59467780
Allow me to help you my good friend:

http://www.dummies.com/programming/networking/hacking-for-dummies-cheat-sheet/
>>
>>59467962
For those looking:
https://doc.lagout.org/security/Hacking%20-%20The%20Art%20of%20Explotation.pdf
>>
>>59472540
You made my perfect day even better Anon
>>
File: images (2).jpg (3KB, 284x160px) Image search: [Google]
images (2).jpg
3KB, 284x160px
i do not know too man
>>
>>59467780
>black hat python

I started reading that for a while, the toolkit they teach you to make works pretty well, I modified it to be reverse connection, and encrypted the connection, which they teach the connection encryption in the book.
>>
File: 4d7.png (825KB, 700x700px) Image search: [Google]
4d7.png
825KB, 700x700px
>>59467994
>>59467868
>>
hello you must understand cpu design, os design, compiler design, program design and language design. then you must learn networking protocols, cryptography, filesystems, circuitry, radio and databases. then you must learn web and it stuff followed by social engineering. then you'll be able to find and use exploits to gain access to systems.
>>
>>59473250
sounds like a lot of work
>>
File: richard-stallman.jpg (251KB, 1200x1200px) Image search: [Google]
richard-stallman.jpg
251KB, 1200x1200px
>>59468648
I'd just like to interject for moment. What you're refering to as Linux, is in fact, GNU/Linux, or as I've recently taken to calling it, GNU plus Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX.

Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called Linux, and many of its users are not aware that it is basically the GNU system, developed by the GNU Project.

There really is a Linux, and these people are using it, but it is just a part of the system they use. Linux is the kernel: the program in the system that allocates the machine's resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called Linux distributions are really distributions of GNU/Linux!
>>
>>59470905
underrated post
>>
>>59469890
for what? you think anyone cooking up ransomware gives a fuck about maths?
>>
>>59468057
good list, thank you anon.

by good i mean big. i am yet to look through this in detail, i wont lie.
>>
>>59470862
>Lain
what?
>>
>>59467811
haha nice dude you owned him! *high fives anon*
>>
>>59468021
woah man
>>
Why do you want to become a "hacker"? It is for attention? fame?

No matter how much you try, there's always someone who does better than you, so mind as well give up.
>>
>>59474987
is that how you justify being a useless neet to yourself?
>>
>>59475006
A security expert actually, kiddo
>>
File: Watch_Dogs_box_art.jpg (22KB, 271x367px) Image search: [Google]
Watch_Dogs_box_art.jpg
22KB, 271x367px
>>59474987
The media really romanticizes the idea of hacking and being a hacker. It's the same with drug use. Movies and shows make it seem like using drugs is really great but it's actually really not great.
Nevertheless, being a hacker does look pretty awesome, especially after watching the Matrix or playing a game like Watch_Dogs. It definitely piques my interest and makes me want to learn more about computer science
>>
>>59475028
So why dont you give up even though you know theres people better than you?
>>
>>59467810

>Start reading through open source code looking for holes.

This is why open source is literally open sores.
>>
>>59467962
I have that book and it's absolute shit for a beginner. Outdated and if your system is in any way different from his, the assembly will be fucked up.
>>
>>59470905
I'm just visiting from [spoiler]/v/[/spoiler] so take this with a grain of salt but imo the most helpful thing for someone trying to "get into computers" is to demystify what a computer actually is. I remember being super confused for the longest fucking time because even if you read books on C or assembly there's still certain concepts that are just sort of vaguely assumed to "exist" somewhere in some abstract platonic space.

What finally cleared it up for me was reading about early mainframes, what a turing machine is, some basic logic maths, philosophy(the concept of the chinese room was very helpful for me), and analog precursors to the computer like babbage's analytical engine and mechanical looms.
>>
>>59475118
FUCK I forgot there aren't spoilers on this board goddammit
>>
>>59475053
Ok... Then become something productive, like a programmer, system administrator or so....
Being a "hacker" is no different than being a nigger fucking with other people and stealing bicycles.

>>59475089
Because I need money
>>
>>59467780
learn unix, it's the language of the internet
>>
>>59467780
>Learn python, easy to learn, powerful and a lot of tools are made with python.Some books for python are Learn python the hard way,Automate the boring stuff, black hat python, grey hat python
>Learn linux cause most of the servers use linux and a lot of the tools are made for it.Choose a distro there are many of which to choose from Debian,Mint,Ubuntu,Cent and the list goes on do a little bit of google search and you will find something.Also many suggest kali because it is made for hacking don't use it, use something more begginer friendly and download the tools on there.Try to do everything via the terminal (time saver).
>Learn networking,probably one of the most important things you need to know, i thought it would be a waste of time learning it but trust me.
>Choose a field you want to go in and study it.Want to go website hacking?Learn the languages of the web so you can perform sqli and xss attacks.
>Keep anonymous.Use tor proxychains or route all your pc traffic through tor.Or you can use a vpn (do research on it thouht.seriously)
>Google everything, don't understand something search for it, keep notes.
>Keep yourself interested, you are gonna get cocky and just use some existing tools that you probably don't know how they work but still use them anyway
> The list goes on....
>>
>>59474899
thanks for your honesty anon
>>
>>59468703
>other people do bad things so it's okay if I do too
>>
>>59475126
you idiot
>>
>>59469890
Enjoy your freshman year :^)
>>
>>59474890
>>59469474
not seeing many arguments here
>>
>>59467780
1. Get a degree in computer science/computer engineering
2. Get a degree in mathematics
3. Get a degre ein electrical engineering

Pick two of the above


Now that you have the foundation to learn:

Prowl through bug databases and exploit bugs. Target memory leaks, buffer overflows, or any other means possible. Do some research, learn about canaries, read PhD papers, etc.
>>
>>59467780
install gentoo

>>59467810
don't listen to this skid
buffer overflows are dead
>>
>>59468631
>minecraft
the word 'griefer' was used way before minecraft you fucking spastic downie
>>
>>59467810
>>59467810
Even Poo knows this shit
https://www.youtube.com/watch?v=RF7DF4kfs1E
>>
>>59470721
Fuck I have arch, gentoo, ubuntu, kali and majora installed in 5 different computers/laptops.
I always get confused which package manager do each use.
Am I correct?
Kali - apt-get
Arch - pacman
Gentoo - emerge
Ubuntu - apt-get
Manjaro - pacman
>>
So, you want to be a hacker?

You probably won't succeed, because you're asking on 4chan instead of going out and learning it. If you're the kind of person who needs their hand held, you will not be a good hacker.

But some advice regardless...

Untrusted input is the main flaw when dealing with hacking any kind of software, be it web apps, network services, or browsers. There are a lot of ways to fuck up in most languages. C has memory manipulation, which is hard to do right. PHP has mysql_ functions, because PHP devs are idiots. Also it has PHP, which is a disgusting abomination. There are similar flaws in all languages. You will need, at least, a grounding in C, some basic understanding of x86/x86-64 assembly, and knowledge of whatever language you're attacking: how people commonly implement things. How people commonly fuck up. How to make use of those fuckups.

Once that's done and you have code execution or database access or whatever, you'll need to understand what you're trying to do. This means familiarising yourself with bash, and with Linux in general. The same with Windows and OS X. You'll also need to learn about databases: SQL, for example, and how different DBs implement things differently. You'll need to learn common privilege-escalation methods, either via more exploits, or by misconfigurations. This requires a fairly holistic view of the operating system; you can't just install Ubuntu and expect to learn everything. Learn multiple distros.

Finally, you'll need stealth, and persistence. Learn what kind of logs your actions will leave: vim, for example, will create a .viminfo file in a home directory. Touch can be used to mirror a timestamp superficially, but actually, won't hold up to forensic investigation. How do you create backdoors on a system? How do you write agents for Windows? Do you do in-memory powershell persistence like all the cool kids? What about backdoors on Linux?
>>
>>59475937
>taking credit for someones elses work
Is your life so pathetically boring?
>>
>>59474929
Serial Experiments Lain
Every knights member knows about that anime
>>
>>59471574
conky is shit and so is htop if you want superfluous then use nmon
>>
>>59471422
not all tools have been made for every kind of attack or problem you are going to have to write something of your own. now it may not be some thing as big as wireshark but it will start out as simple script probably taking input from a log file
>>
>>59467780
read this:
https://mega.nz/#!8FgzDZYL!MrEOol2zx3-PooaIU7MH94h4WzikerjN7sQTf1NgOe8
>>
>>59480000
hm okay digits
>>
>>59467780
Don't even try this theme. If you commit something serious, you will be catched with 100% probability because the authorities will be always 2 step ahead of you
>>
>>59481246
> catched

You mean 2 steps ahead of YOU?
>>
Does anyone have any recommendations for what to read if I'm interested in learning reverse engineering?

I have a book on IDA, a book on reverse engineering, and a book on assembly, but are there any books in particular that would be useful? I was thinking that reading one on compilers might be beneficial since it would give me a better grasp on how the higher level code is translated to assembly, but correct me if I'm wrong.
>>
hmu on irc i can teach the ways
>>
>>59481246
This.

The cyber police will backtrace you and consequences will never be the same.
>>
Does anyone want a rip of the hack bb wiki?
>>
>>59475108
>Outdated
Yeah, but security is basically an arms race.
When a fix is deployed, someone will find a more complicated vulnerability, which will have a more complicated fix, and so on ad infinitum.

Therefore, all relevant techniques will be WAY beyond your comprehension unless you start with the "outdated" basics.
>>
>>59475137
>lacking self awareness this much
jesus christ
>>
>>59475952
>>59468809
Thread posts: 107
Thread images: 14


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.