[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y ] [Search | Free Show | Home]

I feel like you guys probably get this question so often that

This is a blue board which means that it's for everybody (Safe For Work content only). If you see any adult content, please report it.

Thread replies: 9
Thread images: 1

File: mjbade.jpg (227KB, 500x356px) Image search: [Google]
mjbade.jpg
227KB, 500x356px
I feel like you guys probably get this question so often that its a meme but here goes, pls no bully.

How exactly are web pages hacked into or where can I go to learn? I'm talking about someone going in, and changing perhaps a few lines of text. I am starting cybersecurity next year (im a complete noob atm) and this is kind of fascinating me. I want to try to get into my buddy's small business website for fun (hes cool with it) and see what I can do. To start, I know I want to be on TAILS in order to not have a chance at being tracked.

How would I begin to learn? Any resources you recommend? Thanks.
>>
Wouldn't your cyber security school teach you?
>>
>>62358378
You first install Gentoo
>>
>>62358378

>I feel like you guys probably get this question so often that its a meme
It is, now leave.
>>
you go through a list of known exploits and check if the server is vunerable to any of them
>>
>>62358492
im impatient and it wouldnt hurt getting a headstart.

>>62358536
do you recommend any resource of website to learn how to do that?
>>
You're retarded, op
>>
>>62358558
:)
>>
I don't know a fucking thing about hacking, but I'm pretty sure a good place to start is:

1. Find out what technologies your buddy is using to run his site.
2. Google known vulnerabilities in those technologies.
3. Try to exploit that vulnerability.

You can probably find guides on how to do (3), since I've seen some before...hackers generally like to brag about their work.
Thread posts: 9
Thread images: 1


[Boards: 3 / a / aco / adv / an / asp / b / bant / biz / c / can / cgl / ck / cm / co / cock / d / diy / e / fa / fap / fit / fitlit / g / gd / gif / h / hc / his / hm / hr / i / ic / int / jp / k / lgbt / lit / m / mlp / mlpol / mo / mtv / mu / n / news / o / out / outsoc / p / po / pol / qa / qst / r / r9k / s / s4s / sci / soc / sp / spa / t / tg / toy / trash / trv / tv / u / v / vg / vint / vip / vp / vr / w / wg / wsg / wsr / x / y] [Search | Top | Home]

I'm aware that Imgur.com will stop allowing adult images since 15th of May. I'm taking actions to backup as much data as possible.
Read more on this topic here - https://archived.moe/talk/thread/1694/


If you need a post removed click on it's [Report] button and follow the instruction.
DMCA Content Takedown via dmca.com
All images are hosted on imgur.com.
If you like this website please support us by donating with Bitcoins at 16mKtbZiwW52BLkibtCr8jUg2KVUMTxVQ5
All trademarks and copyrights on this page are owned by their respective parties.
Images uploaded are the responsibility of the Poster. Comments are owned by the Poster.
This is a 4chan archive - all of the content originated from that site.
This means that RandomArchive shows their content, archived.
If you need information for a Poster - contact them.